Solved

Using a non-ATAPI CDROM

Posted on 1997-07-08
2
317 Views
Last Modified: 2013-12-15
Hi,

I have a 2x CDROM drive which I would like to use with Linux (Redhat
4.2)

I have little documentation with it, but it appears to be from a
 company called Bluepoint and they call it an ICD-300 (it has a Philips
mechanism, and an Oak Technology interface chip). Bluepoints docs state
that it is a non-ATAPI IDE drive. I have tried searching the web for
info, but have failed completely.

I have used it successfully with Win95, as I have a driver on disk
(which appears to be written by from Oak technology).

Linux however completely fails to detect it as an IDE CDROM (I presume
because it is non-ATAPI).

Is there any hope this can ever work with Linux?? Does anyone else
have a non-ATAPI CDROM ?? Should I just bin it and buy a new one
(I hate doing that!!)

Cheers

Warren
0
Comment
Question by:frostw
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 

Expert Comment

by:deatsch
ID: 1628573
Warren,
Read the Howto's from your Redhat install.  The one you want is CDrom howto.  I'm not sure on the capitilzation though.
Take a look at /usr/src/linux/Documentation/cdrom.
It's possible you will have to recomplie the kernel.
Jim
0
 
LVL 2

Accepted Solution

by:
cedric earned 50 total points
ID: 1628574
Hy,
you have to recompile your kernel for this.
go to your /usr/src/linux and type make menuconfig
go to the CDROM drivers and check all the boxes.
compile and install your new kernel, reboot and watch the messages. Or less /var/log/messages or dmesg. and look for your cdrom beeing recognized. Then uncheck all the other boxes in the kernel configuration (all but your cdrom driver).
And you should be ok.

Byby
0

Featured Post

[Webinar] How Hackers Steal Your Credentials

Do You Know How Hackers Steal Your Credentials? Join us and Skyport Systems to learn how hackers steal your credentials and why Active Directory must be secure to stop them. Thursday, July 13, 2017 10:00 A.M. PDT

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Google Drive is extremely cheap offsite storage, and it's even possible to get extra storage for free for two years.  You can use the free account 15GB, and if you have an Android device..when you install Google Drive for the first time it will give…
In part one, we reviewed the prerequisites required for installing SQL Server vNext. In this part we will explore how to install Microsoft's SQL Server on Ubuntu 16.04.
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
Learn how to navigate the file tree with the shell. Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to move…
Suggested Courses

626 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question