
OPERATIONAL DEFECT DATABASE
...

...
Description of problem: Virtio-win-guest-tools' repair function couldn't install the uninstalled driver. Steps to Reproduce: 1.boot up win2019 guest with virtio device. 2.install drivers via Virtio-win-guest-tools.exe 3.uninstall rng and balloon driver right click "My computers"->"properties"->"device manager"--->choose "Virtio Balloon Driver"--> right-click "Uninstall" ---->choose "Delete the driver software for this device"-->Uninstall the driver. 4.open Virtio-win-guest-tools.exe and click repair button 5.reboot guest 6.check if rng and baloon driver is installed Actual results: repair function can not install rng/balloon driver all logs are in attachment. Expected results: repair function can install the uninstalled driver. Additional info: 1.qemu command line /usr/libexec/qemu-kvm -name $1 -enable-kvm -m 6G -smp 8,maxcpus=12,cores=4,threads=1,sockets=3 -rtc base=localtime,driftfix=none -boot order=cd,menu=on -monitor stdio -qmp tcp:0:1235,server,nowait -M q35 \ -cpu 'EPYC',hv_stimer,hv_synic,hv_vpindex,hv_reset,hv_relaxed,hv_spinlocks=0x1fff,hv_vapic,hv_time,hv-tlbflush,+kvm_pv_unhalt \ -cdrom /home/kvm_autotest_root/iso/windows/virtio-win.iso.el8 \ -device pcie-root-port,port=0x10,chassis=1,id=pci.1,bus=pcie.0,multifunction=on,addr=0x3 \ -device pcie-root-port,port=0x11,chassis=2,id=pci.2,bus=pcie.0,addr=0x3.0x1 \ -device pcie-root-port,port=0x12,chassis=3,id=pci.3,bus=pcie.0,addr=0x3.0x2 \ -device pcie-root-port,port=0x13,chassis=4,id=pci.4,bus=pcie.0,addr=0x3.0x3 \ -device pcie-root-port,port=0x14,chassis=5,id=pci.5,bus=pcie.0,addr=0x3.0x4 \ -device pcie-root-port,port=0x15,chassis=6,id=pci.6,bus=pcie.0,addr=0x3.0x5 \ -device pcie-root-port,port=0x16,chassis=7,id=pci.7,bus=pcie.0,addr=0x3.0x6 \ -device pcie-root-port,port=0x17,chassis=8,id=pci.8,bus=pcie.0,addr=0x3.0x7 \ -device pcie-root-port,port=0x18,chassis=9,id=pci.9,bus=pcie.0,multifunction=on,addr=0x4 \ -drive file=$1,if=none,id=drive_system_disk,format=qcow2,cache=none,aio=native,werror=stop,rerror=stop \ -device ide-drive,bus=ide.0,unit=0,drive=drive_system_disk,id=ide0-0-0 \ -blockdev driver=file,cache.direct=off,cache.no-flush=on,filename=/home/data-disk2.qcow2,node-name=system_file \ -blockdev driver=qcow2,node-name=drive_blk_disk,file=system_file \ -object iothread,id=thread0 -device virtio-blk-pci,iothread=thread0,drive=drive_blk_disk,id=virtio-disk0,serial=GAGENT_TEST,bus=pci.1 \ -netdev tap,script=/etc/qemu-ifup,downscript=no,id=hostnet0,vhost=on,queues=4 \ -device virtio-net-pci,netdev=hostnet0,id=net0,mac=00:52:11:36:4d:0d,bus=pci.2,mq=on,vectors=10 \ -device virtio-serial-pci,id=virtio-serial1,max_ports=31,bus=pci.3 \ -chardev socket,id=channel1,host=127.0.0.1,port=2222,server,nowait -device virtserialport,bus=virtio-serial1.0,chardev=channel1,name=com.redhat.rhevm.vdsm1,id=port1 \ -chardev socket,id=channel2,path=/tmp/helloworld2,server,nowait -device virtserialport,bus=virtio-serial1.0,chardev=channel2,name=org.qemu.guest_agent.0,id=port2 \ -blockdev driver=file,cache.direct=off,cache.no-flush=on,filename=/home/data-disk1.qcow2,node-name=data_file \ -blockdev driver=qcow2,node-name=drive_data_disk,file=data_file \ -device virtio-scsi-pci,id=scsi0,num_queues=4,bus=pci.4 -device scsi-hd,bus=scsi0.0,drive=drive_data_disk,id=scsi-disk0 \ -object rng-random,filename=/dev/urandom,id=rng0 -device virtio-rng-pci,rng=rng0,bus=pci.5 \ -device virtio-balloon-pci,id=balloon0,bus=pci.6 \ -device pvpanic,id=pvpanic0,ioport=0x0505 \ -device virtio-keyboard-pci,id=kbd0,serial=virtio-keyboard,bus=pci.7 -device virtio-mouse-pci,id=mouse0,serial=virtio-mouse,bus=pci.8 -device virtio-tablet-pci,id=tablet0,serial=virtio-tablet,bus=pci.9 \ -spice id=on,disable-ticketing,port=5912 -vga qxl
Done
Red Hat Integration
Learn more about where this data comes from
Bug Scrub Advisor
Streamline upgrades with automated vendor bug scrubs
BugZero Enterprise
Wish you caught this bug sooner? Get proactive today.