Bug 1146180

Summary: Devices address dynamic allocation causing virtual hardware re-detection/re-installation
Product: Red Hat Enterprise Virtualization Manager Reporter: Amador Pahim <asegundo>
Component: ovirt-engineAssignee: Nobody <nobody>
Status: CLOSED DUPLICATE QA Contact:
Severity: urgent Docs Contact:
Priority: urgent    
Version: 3.4.0CC: asegundo, ecohen, gklein, iheim, lpeer, lsurette, michal.skrivanek, mkalinin, pablo.iranzo, rbalakri, Rhev-m-bugs, rhodain, scohen, tdosek, yeylon
Target Milestone: ---   
Target Release: 3.5.0   
Hardware: All   
OS: Linux   
Whiteboard: virt
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2014-10-10 17:18:53 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Attachments:
Description Flags
libvirt xmls and qemu commands none

Description Amador Pahim 2014-09-24 17:05:57 UTC
Description of problem:

Installing a Windows VM with "Console / USB Policy" set to "Native" will attach an USB2 controller to the VM. This USB2 controller will use the first available address, 0x05 in this case. Then, libvirt will create the virtio-serial controller and the virtio-balloon-pci device using the next addresses, 0x06 and 0x07 in this case.

After the OS installation, if we start the VM with "Console / USB Policy" set to "Disabled", USB2 controller will not be present, the virtio-serial controller will use the address 0x05 and the virtio-balloon-pci device will use the address 0x06. This will trigger an unwanted new hardware detection/installation inside the Guest, with consequent request to reboot. The problem is worst considering large deployments of VDI, where the users are not allowed to provide admin credentials to complete the new hardware install.

See attachment for full libvirt XMLs and qemu commands from a VM started with USB Policy set to Native and then started again with USB Policy set to Disabled.

Version-Release number of selected component (if applicable):
rhevm-3.4.1-0.31.el6ev.noarch
vdsm-4.14.11-5.el6ev.x86_64

How reproducible:
100%

Steps to Reproduce:
1. Install a Windows VM with "Console / USB Policy" set to "Native".
2. Shutdown VM.
3. Start the VM with "Console / USB Policy" set to "Disabled".

Actual results:
You can observe the new hardware detected and then installed by windows, followed by a reboot request.

Expected results:
USB Policy cahnge should not trigger new hardware detection for other devices.

Comment 1 Amador Pahim 2014-09-24 17:06:29 UTC
Created attachment 940834 [details]
libvirt xmls and qemu commands

Comment 3 Michal Skrivanek 2014-09-26 14:43:37 UTC
looks like a duplicate of bug 1028387
looking at the flags - so is 3.5 ok?

Comment 4 Amador Pahim 2014-09-26 15:20:00 UTC
(In reply to Michal Skrivanek from comment #3)
> looks like a duplicate of bug 1028387
> looking at the flags - so is 3.5 ok?

Yes, duplicate indeed. In my case, this is a consequence of BZ#1080144. 3.5 is fine for now.

Comment 5 Michal Skrivanek 2014-10-10 17:18:53 UTC

*** This bug has been marked as a duplicate of bug 1028387 ***