Solved

Virtual to Physical Migration (V2P) - How to inject new scsi drivers?

Posted on 2006-11-19
5
1,569 Views
Last Modified: 2012-08-14
Hello Experts!@

I am attempting to do a Virtual Machine to Physical Machine migration of Windows 2000. I've built a Bart's PE utility disk to assist with this. I was able to ghost the primary partition (out of two total) to a new blade, but i can't seem to get past the "inaccessible boot device" BSOD.

If a system is booting with one scsi driver...and you want to change that driver...how is this done?

-neo
0
Comment
Question by:neomage23
5 Comments
 
LVL 16

Expert Comment

by:btassure
ID: 17979486
http://www.microsoft.com/technet/prodtechnol/windows2000serv/reskit/prork/prbd_std_ccef.mspx?mfr=true

should help you out. it's a bit cryptic but if you change the files around as needed in the virtual machine right before you power it down it should be boot up with the new boot.ini settings.
0
 
LVL 30

Expert Comment

by:pgm554
ID: 17981278
Change the name of the driver (buslogic *.sys to *.bak in the win32 dir)then rename the driver you are using for the new box to the old buslogic *.sys

Otherwise to a repair reinstall over the Ghosted image on the new box using the W2K cdrom.
0
 
LVL 6

Author Comment

by:neomage23
ID: 18004437
Hi guys, neither of your suggestions worked, but i did solve my own problem...there is a utility for Bart's PE called "fixvmscsi" it does sort of a manual driver injection for Win2k and Win2k3/XP.
Your suggestions didn't work because neither updates the necessary registry settings to install the driver.

It doesn't work on NT 4.0 however...

-neo
0
 
LVL 1

Accepted Solution

by:
Computer101 earned 0 total points
ID: 18256251
PAQed with points refunded (500)

Computer101
EE Admin
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

I use more than 1 computer in my office for various reasons. Multiple keyboards and mice take up more than just extra space, they make working a little more complicated. Using one mouse and keyboard for all of my computers makes life easier. This co…
A clone is a duplicate copy. Sheep have been cloned and maybe someday even people will be cloned, but disk cloning (performed by the hard drive cloning software) is a vital tool used to manage and protect data. Let’s look at what hard drive cloning …
Concerto provides fully managed cloud services and the expertise to provide an easy and reliable route to the cloud. Our best-in-class solutions help you address the toughest IT challenges, find new efficiencies and deliver the best application expe…
A company’s greatest vulnerability is their email. CEO fraud, ransomware and spear phishing attacks are the no1 threat to a company’s security. Cybercrime is responsible for the largest loss of money to companies today with losses projected to r…

919 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now