Solved

CD-rom problem

Posted on 1998-09-13
6
263 Views
Last Modified: 2013-12-15
I have hitachi 4x Cdrom and I use Redhat 5.1 when I boot kernel sees ide tape drive not cdrom when I boot from bootdisk from win98 my cd rom detected and also when I use autoboot from cd-rom what I need to do do get my cd-rom working under linux
0
Comment
Question by:JBURGHARDT
6 Comments
 
LVL 1

Expert Comment

by:pestilence
ID: 1630780
Simply do the following after you have booted in Linux:
#] cd /
#] mkdir cdrom
(take a look at the appropriate hd that coresponds to your cd , you can see that while the Kernel boots e.g
hdd IDE ATAPI CDROM HITACHI)
#] mount /dev/hdd /cdrom
and you are ready...

0
 
LVL 5

Author Comment

by:JBURGHARDT
ID: 1630781
The problem is that cd-rom is seen as ide tape drive not cd-rom can add stuff to lilo like hdx=cdrom(I try this but kernel said that tis is bad option)
0
 
LVL 5

Author Comment

by:JBURGHARDT
ID: 1630782
It did not work kernel see cd-rom as tape drive
0
Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

 
LVL 2

Expert Comment

by:JYoungman
ID: 1630783
You don't ACTUALLY say "hdx=cdrom", you use the correct name for your CD-ROM drive, for example hdb, hdc, or hdd.

0
 
LVL 1

Accepted Solution

by:
t2pp earned 30 total points
ID: 1630784
JB, the only way you'll get this working is to code the following in your /etc/lilo.conf...
append = "hdx=noprobe hdx=cdrom"
where "x" is your CD-ROM's device.
Good Luck :)
0
 
LVL 5

Author Comment

by:JBURGHARDT
ID: 1630785
I removed jumper from cd-rom (was set as slave) and got new vlb ide card
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Join Greg Farro and Ethan Banks from Packet Pushers (http://packetpushers.net/podcast/podcasts/pq-show-93-smart-network-monitoring-paessler-sponsored/) and Greg Ross from Paessler (https://www.paessler.com/prtg) for a discussion about smart network …
Fine Tune your automatic Updates for Ubuntu / Debian
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.

948 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now