Ingo,

Yes, I use the same. But the drivers "SUSE Storage/Net" in Windows Optional 
updates override them. 
Verified on 2008r2 and 2012r2.
Luckily the damage is limited as they are in the Optional channel, not sure how 
many people chose to install those alongside the Important ones, but hopefully 
it won't be that many.

I also got fscked by an update Microsoft pushed for some Intel fake-raid the 
other day.
You'd think a humongous, multi-billion dollar company has some resources to do 
QA, especially on their "Enterprise" products.

--
Sent from the Delta quadrant using Borg technology!

Nux!
www.nux.ro

----- Original Message -----
> From: "Jochim, Ingo" <ingo.joc...@bautzen-it.de>
> To: users@cloudstack.apache.org, "dev" <d...@cloudstack.apache.org>
> Sent: Thursday, 10 December, 2015 11:58:03
> Subject: AW: Run Windows on top of KVM+virtio? Watch out for Windows updates, 
> system unbootable!

> Hi,
> 
> you can use the virtio drivers from the Fedora Project.
> I didn't have problems on W2k12 and W2k12R2.
> 
> https://fedoraproject.org/wiki/Windows_Virtio_Drivers
> 
> Regards,
> Ingo
> 
> 
> -----Ursprüngliche Nachricht-----
> Von: Nux! [mailto:n...@li.nux.ro]
> Gesendet: Mittwoch, 9. Dezember 2015 10:42
> An: dev
> Cc: Cloudstack Users List
> Betreff: Run Windows on top of KVM+virtio? Watch out for Windows updates, 
> system
> unbootable!
> 
> Hi,
> 
> Just a quick heads-up!
> Someone on the CentOS ML reported his Windows 2008r2 VM on top of KVM+VirtIO 
> PV
> ended up unbootable after he installed the SUSE Network and Storage drivers
> from the Optional Updates channel.
> I've just checked now and it's the case, the system blue screens after reboot.
> Will test 2012r2 shortly.
> 
> 
> It'd be best if you don't install those updates/drivers for now, looks like
> someone in Redmond didn't do his homework.
> 
> --
> Sent from the Delta quadrant using Borg technology!
> 
> Nux!
> www.nux.ro
> 
> --
> This email was Virus checked by UTM 9. http://www.sophos.com
> 
> --
> This email was Virus checked by UTM 9. http://www.sophos.com

Reply via email to