[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]

[RHBA-2001:131-03] anaconda installer would not properly install to some 3ware cards

                   Red Hat, Inc. Red Hat Bug Fix Advisory

Synopsis:          anaconda installer would not properly install to some 3ware cards
Advisory ID:       RHBA-2001:131-03
Issue date:        2001-10-09
Updated on:        2001-10-21
Product:           Red Hat Linux
Keywords:          anaconda installer 3ware
Cross references:  

1. Topic:

This is an update diskette for the anaconda installer to correct the
following issue:

- Some machines with 3ware controllers freeze at the partitioning screen
and are unable to install to disks connected to the 3ware controller.

2. Relevant releases/architectures:

Red Hat Linux 7.2 - i386

3. Problem description:

The installer was unable to install to drives attached to 3ware
controllers on some machines and reports an invalid partition table on the

4. Solution:

Download the update disk image, then create an update diskette. This can be
done by using the same procedure used to create a boot diskette.

For more information, refer to


Please note that you must substitute the update disk image filename for the
filename used in the example.

When booting into the anaconda installation program, type "linux updates"
at the boot prompt, followed by any other installation options which are
required (such as "expert" or "text" or "ks"). The installation process
will prompt you to insert the updates disk when it is required, and the
install will then proceed as normal.

5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):

54363 - 3w-xxxx driver fails to pass partitioning screen
51214 - 3ware 3w-xxxx module init of sda fails during installation.

6. RPMs required:

Red Hat Linux 7.2:


7. Verification:

MD5 sum                           Package Name
4d83030aefdc56a369e416d18198be47 7.2/en/os/images/i386/update-disk-20011009.img

These packages are GPG signed by Red Hat, Inc. for security.  Our key
is available at:

You can verify each package with the following command:
    rpm --checksig  <filename>

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    rpm --checksig --nogpg <filename>

8. References:

Copyright(c) 2000, 2001 Red Hat, Inc.

Redhat-watch-list mailing list
To unsubscribe, visit: https://listman.redhat.com/mailman/listinfo/redhat-watch-list

[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]