Note: This bug is displayed in read-only format because the product is no longer active in Red Hat Bugzilla.

Bug 1693571

Summary: [v2v] VMware UEFI VM is imported as i440fx/seabios instead of q35/ovmf
Product: [oVirt] ovirt-engine Reporter: zhoujunqin <juzhou>
Component: GeneralAssignee: bugs <bugs>
Status: CLOSED CURRENTRELEASE QA Contact: Nisim Simsolo <nsimsolo>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 4.3.0CC: asabadra, bugs, hetz, lleistne, michal.skrivanek, mxie, nsimsolo, rbarry, rjones, srosenbe, tzheng, xiaodwan, zili
Target Milestone: ovirt-4.3.5Flags: pm-rhel: ovirt-4.3+
Target Release: 4.3.5.2   
Hardware: x86_64   
OS: Unspecified   
Whiteboard:
Fixed In Version: ovirt-engine-4.3.5.2 Doc Type: Bug Fix
Doc Text:
Cause: Importing via VMWare was not providing the Bios Type neither in the getExternalVMs response message, nor during Post Conversion when reading from the OVF file and updating the VM. Consequence: The Bios Type for Imported VMs was being set to the default which is i440fx/seabios when for example the VMWare VM was set to Q35 UEFI. Fix: When performing the Post Conversion for updating the VM from the OVF, we update the Bios Type of the VM to the proper value from the OVF file data received. Result: For VMWare which uses the Post Conversion, the Bios Type of the VM is updated to the Bios Type of the OVF file which should be the correct Bios Type of the VM if libguestfs version 1.40 or greater was installed on the Host. As a note, this will not affect KVM which does not have a Post Conversion process.
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-07-30 14:08:18 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: Virt RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Attachments:
Description Flags
import log
none
ovirt-engine.log
none
Configuration for import vm from VMware
none
The wrong BIOS type page
none
VM failed to boot up page
none
screenshot for import vm via kvm
none
Example ovf file from VMWare Importing
none
reassigned: vdsm.log
none
reassigned: engine.log
none
reassigned: import.log
none
secure boot issue, engine.log
none
secure boot issue, vdsm.log
none
secure boot issue, vdsm.log
none
secure boot issue, Windows10 import.log
none
secure boot issue, Fedora28 import.log none

Description zhoujunqin 2019-03-28 08:35:31 UTC
Created attachment 1548898 [details]
import log

Description of problem:
On rhv UI, import a uefi vm from VMware server, but failed to boot up for the BIOS type is set as 'default'.

Version-Release number of selected component (if applicable):
libvirt-4.5.0-11.el7.x86_64
libguestfs-1.40.2-2.el7.x86_64
virt-v2v-1.40.2-2.el7.x86_64
qemu-kvm-rhev-2.12.0-25.el7.x86_64
kernel-3.10.0-957.5.1.el7.x86_64
python-ovirt-engine-sdk4-4.3.0-1.el7ev.x86_64
rhv-guest-tools-iso-4.3-6.el7ev.noarch

rhv4.3: ovirt-engine-4.3.0.1-0.1.el7.noarch

How reproducible:
100%

Steps to Reproduce:
1. Login with administration portal, System->Virtual Machines. 
2. Click "Import" button, then "Import Virtual Machine(s)" window pop up. Then you can choose "Data Center" and "Soure" which you want to use.
Data Center
Source:Export Domain
            Virtual Appliance (OVA)           
            XEN (Via RHEL)
            KVM (Via Libvirt)
            VMware
3. Select VMware as source  and complete details for my vCenter environment, then click "Load" button
4. After load, then select vm "esx6.7-rhel7.6-uefi-without-agent" in "Virtual Machines on Source" to import, then click "OK" in next page, then guest import start.


Actual results:
4.1 Import vm from VMware finished successfully.
4.2 VM failed to boot up, the BIOS type is set as 'default'.

Expected results:
The BIOS type should be "Q35 Chipset with UEFI BIOS", and vm can boot up successfully.

Additional info:
1. https://bugzilla.redhat.com/show_bug.cgi?id=1509931#c20
From Richard W.M. Jones 

There's not much information to do on here.  I suggest opening a new bug against
ovirt-engine and we can collect the extra information there.  We'll probably need
to see the oVirt logs from when the guest was booted and the full qemu command line.

However from the virt-v2v point of view:

- It's a UEFI guest.
- We are setting the correct <BiosType> (UEFI = 2) in the output OVF.

2. qemu command line
# ps -ef |grep esx6.7-rhel7.6-uefi-without-agent
qemu      2163     1 99 16:24 ?        00:05:41 /usr/libexec/qemu-kvm -name guest=esx6.7-rhel7.6-uefi-without-agent,debug-threads=on -S -object secret,id=masterKey0,format=raw,file=/var/lib/libvirt/qemu/domain-151-esx6.7-rhel7.6-uefi-/master-key.aes -machine pc-i440fx-rhel7.6.0,accel=kvm,usb=off,dump-guest-core=off -cpu SandyBridge,vmx=on -m size=2097152k,slots=16,maxmem=8388608k -realtime mlock=off -smp 1,maxcpus=16,sockets=16,cores=1,threads=1 -object iothread,id=iothread1 -numa node,nodeid=0,cpus=0,mem=2048 -uuid 422c50e0-9da5-f8df-54ce-1323d7234c43 -smbios type=1,manufacturer=Red Hat,product=RHEV Hypervisor,version=7.6-4.el7_6,serial=4c4c4544-0030-4d10-804a-cac04f485931,uuid=422c50e0-9da5-f8df-54ce-1323d7234c43 -no-user-config -nodefaults -chardev socket,id=charmonitor,fd=32,server,nowait -mon chardev=charmonitor,id=monitor,mode=control -rtc base=2019-03-28T08:24:15,driftfix=slew -global kvm-pit.lost_tick_policy=delay -no-hpet -no-shutdown -global PIIX4_PM.disable_s3=1 -global PIIX4_PM.disable_s4=1 -boot strict=on -device piix3-usb-uhci,id=usb,bus=pci.0,addr=0x1.0x2 -device virtio-serial-pci,id=ua-8641134a-26d2-411a-9855-e7392bbf6714,max_ports=16,bus=pci.0,addr=0x4 -drive if=none,id=drive-ua-2bd8914f-372a-4eb4-966e-0bec22ee8e81,werror=report,rerror=report,readonly=on -device ide-cd,bus=ide.1,unit=0,drive=drive-ua-2bd8914f-372a-4eb4-966e-0bec22ee8e81,id=ua-2bd8914f-372a-4eb4-966e-0bec22ee8e81 -drive file=/rhev/data-center/mnt/10.66.144.40:_home_nfs__data/b6e22633-de12-45b8-a61c-e9888e87d6f6/images/647d4afa-508c-4909-90c7-165e70827bad/a7e72b38-2c08-4e0e-951a-c671317e4eed,format=raw,if=none,id=drive-ua-647d4afa-508c-4909-90c7-165e70827bad,serial=647d4afa-508c-4909-90c7-165e70827bad,werror=stop,rerror=stop,cache=none,aio=threads -device virtio-blk-pci,iothread=iothread1,scsi=off,bus=pci.0,addr=0x5,drive=drive-ua-647d4afa-508c-4909-90c7-165e70827bad,id=ua-647d4afa-508c-4909-90c7-165e70827bad,bootindex=1,write-cache=on -netdev tap,fd=34,id=hostua-9ff158ed-422e-4d01-89b9-9c2fd095fc10,vhost=on,vhostfd=35 -device virtio-net-pci,host_mtu=1500,netdev=hostua-9ff158ed-422e-4d01-89b9-9c2fd095fc10,id=ua-9ff158ed-422e-4d01-89b9-9c2fd095fc10,mac=00:50:56:ac:10:80,bus=pci.0,addr=0x3 -chardev socket,id=charchannel0,fd=36,server,nowait -device virtserialport,bus=ua-8641134a-26d2-411a-9855-e7392bbf6714.0,nr=1,chardev=charchannel0,id=channel0,name=ovirt-guest-agent.0 -chardev socket,id=charchannel1,fd=37,server,nowait -device virtserialport,bus=ua-8641134a-26d2-411a-9855-e7392bbf6714.0,nr=2,chardev=charchannel1,id=channel1,name=org.qemu.guest_agent.0 -chardev spicevmc,id=charchannel2,name=vdagent -device virtserialport,bus=ua-8641134a-26d2-411a-9855-e7392bbf6714.0,nr=3,chardev=charchannel2,id=channel2,name=com.redhat.spice.0 -spice port=5900,tls-port=5901,addr=10.66.144.40,x509-dir=/etc/pki/vdsm/libvirt-spice,tls-channel=main,tls-channel=display,tls-channel=inputs,tls-channel=cursor,tls-channel=playback,tls-channel=record,tls-channel=smartcard,tls-channel=usbredir,seamless-migration=on -device qxl-vga,id=ua-0a25391d-78bd-4505-b268-e04e91eb8a25,ram_size=67108864,vram_size=33554432,vram64_size_mb=0,vgamem_mb=16,max_outputs=1,bus=pci.0,addr=0x2 -device virtio-balloon-pci,id=ua-33cab82d-7398-4d29-a395-5461831bf949,bus=pci.0,addr=0x6 -object rng-random,id=objua-576df790-1c38-4ec4-87e5-06a673b85ebb,filename=/dev/urandom -device virtio-rng-pci,rng=objua-576df790-1c38-4ec4-87e5-06a673b85ebb,id=ua-576df790-1c38-4ec4-87e5-06a673b85ebb,bus=pci.0,addr=0x7 -device vmcoreinfo -sandbox on,obsolete=deny,elevateprivileges=deny,spawn=deny,resourcecontrol=deny -msg timestamp=on

Comment 1 zhoujunqin 2019-03-28 08:36:04 UTC
Created attachment 1548899 [details]
ovirt-engine.log

Comment 2 zhoujunqin 2019-03-28 08:36:57 UTC
Created attachment 1548900 [details]
Configuration for import vm from VMware

Comment 3 zhoujunqin 2019-03-28 08:37:47 UTC
Created attachment 1548901 [details]
The wrong BIOS type page

Comment 4 zhoujunqin 2019-03-28 08:38:15 UTC
Created attachment 1548902 [details]
VM failed to boot up page

Comment 5 Richard W.M. Jones 2019-03-28 14:27:48 UTC
I'm not seeing the expected ‘pflash’ parameters.

Comment 6 Michal Skrivanek 2019-03-29 06:50:12 UTC
the integrated import is not using the OVF output and creates the VM beforehand, it's missing there

Comment 9 zhoujunqin 2019-04-18 07:47:53 UTC
Hi all,
I can also reproduce this issue when i try to IMPORT a VM to rhv via "KVM (Via Libvirt)" method.

Packages:
libvirt-4.5.0-12.el7.x86_64
libguestfs-1.40.2-3.el7.x86_64
virt-v2v-1.40.2-3.el7.x86_64
qemu-kvm-rhev-2.12.0-26.el7.x86_64
python-ovirt-engine-sdk4-4.3.1-1.el7ev.x86_64
OVMF-20180508-6.gitee3198e672e2.el7.noarch


rhv4.3: ovirt-engine-4.3.0.1-0.1.el7.noarch


Steps to Reproduce:
1. Prepare a vm with Q35 machine type.
...
  <os>
    <type arch='x86_64' machine='pc-q35-rhel7.6.0'>hvm</type>
    <loader readonly='yes' secure='yes' type='pflash'>/usr/share/OVMF/OVMF_CODE.secboot.fd</loader>
    <nvram>/var/lib/libvirt/qemu/nvram/rhel7.6-uefi_VARS.fd</nvram>
    <boot dev='hd'/>
  </os>
...

2. Setup tcp env on kvm host
#vi /etc/sysconfig/libvirtd and remove # for LIBVIRTD_ARGS="--listen"
#vi /etc/libvirt/libvirtd.conf and remove # for listen_tcp = 1 and listen_tls = 0
#vi /etc/libvirt/libvirtd.conf and remove # for auth_tcp = "sasl" and change "sasl" to "none"
#service libvirtd restart

Disable firewall on kvm server
#service firewalld stop

3. Login with administration portal, System->Virtual Machines. 

4. Click "Import" button, then "Import Virtual Machine(s)" window pop up. Then you can choose "Data Center" and "Source" which you want to use.
Data Center
Source:Export Domain
            Virtual Appliance (OVA)           
            XEN (Via RHEL)
            KVM (Via Libvirt)
            VMware

5. Select KVM as source and complete details information as Screenshot attached, then click "Load" button.

6. After load, then select vm "rhel7.7-uefi" in "Virtual Machines on Source" to import, then click "OK" in next page, then guest import start.

Results:
6.1 Import vm from KVM finished successfully.
6.2 VM failed to boot up, the BIOS type is set as 'default'.

Comment 10 zhoujunqin 2019-04-18 07:48:43 UTC
Created attachment 1556094 [details]
screenshot for import vm via kvm

Comment 12 Richard W.M. Jones 2019-04-23 12:15:56 UTC
I'm unclear why libvirt is involved here.  Virt-v2v -o vdsm writes an OVF file to a
particular location.  You can find the exact OVF file that is written by looking at
the end of the import log file attached to this bug.  It contains the <BiosType>
field and as far as I'm concerned VDSM ought to be reading the file and not
asking libvirt for anything.

Comment 22 Michal Skrivanek 2019-04-29 11:44:48 UTC
I dont' see a reason why you can't take the final OVF and "Edit" the VM, we have UpdateConvertedVmCommand for that....

Comment 23 Steven Rosenberg 2019-04-29 13:10:26 UTC
(In reply to Michal Skrivanek from comment #22)
> I dont' see a reason why you can't take the final OVF and "Edit" the VM, we
> have UpdateConvertedVmCommand for that....

Well the issues are as follows:

1. If we just take the Bios Type from the final OVF which only comes when the import has completed, the user can see that the Bios Type is the default until the import completely ends. So the question here is if it is enough.
2. The OVF files do not currently have the Bios Type so it would need to be added to the file.
3. Then the engine would have to extract the Bios Type from the return of the getConvertedVm() function.


If we agree we can live with the Bios Type being incorrect until the "final OVF" than we can eliminate item 1. 

We still have Item 2 in order for Item 3 to work.

Comment 24 Ryan Barry 2019-04-29 13:17:19 UTC
We can avoid finalizing the import until it's complete, which we should do anyway (as this is tracked as an event inside the engine), so we can live with 1 as long as we block

In Richard's last comment, it looks like BiosType is present in the OVF. If it isn't in your tests, do you have one I can look at? I don't have a VMware environment to check

Comment 25 Steven Rosenberg 2019-04-29 14:22:14 UTC
Created attachment 1559943 [details]
Example ovf file from VMWare Importing

This is an example ovf file I created during VMWare Importing. I do not see a Bios Type field nor the expected Bios Type as we see in the log.

Comment 26 Steven Rosenberg 2019-04-29 14:22:54 UTC
(In reply to Ryan Barry from comment #24)
> We can avoid finalizing the import until it's complete, which we should do
> anyway (as this is tracked as an event inside the engine), so we can live
> with 1 as long as we block
> 
> In Richard's last comment, it looks like BiosType is present in the OVF. If
> it isn't in your tests, do you have one I can look at? I don't have a VMware
> environment to check

https://bugzilla.redhat.com/show_bug.cgi?id=1693571#c25

Comment 27 Steven Rosenberg 2019-04-29 14:31:06 UTC
(In reply to Ryan Barry from comment #24)
> We can avoid finalizing the import until it's complete, which we should do
> anyway (as this is tracked as an event inside the engine), so we can live
> with 1 as long as we block
> 
> In Richard's last comment, it looks like BiosType is present in the OVF. If
> it isn't in your tests, do you have one I can look at? I don't have a VMware
> environment to check

Actually though the point is we do not "block", the user can still enter the VM details screen and the edit during the importing and see the details received from the initial details message (what Richard seems to call -o vdsm mode) and thus that the Bios Type is the Default before the import has completed. Again I can always implement the ovf prart, assuming we are able to obtain the Bios Type from the ovf file (I have attached what I have).

Comment 28 Richard W.M. Jones 2019-04-29 14:52:27 UTC
>  <!-- generated by virt-v2v 1.36.10rhel=7,release=6.el7_5.2,libvirt -->

This version is older than the one which supports BiosType.  You need >= 1.39.12
(upstream), and I'm not sure of the RHEL version but the latest version for
RHEL 7.7 is libguestfs-1.40.2-4.el7 which should contain this.

Comment 29 Ryan Barry 2019-04-29 15:14:45 UTC
Thanks Richard -

Steven, safe enough. 4.3.5 should be 7.7. Can you put libguestfs from 7.7 (fetched from brew) on your environment for testing?

Comment 30 Steven Rosenberg 2019-04-29 15:20:33 UTC
(In reply to Ryan Barry from comment #29)
> Thanks Richard -
> 
> Steven, safe enough. 4.3.5 should be 7.7. Can you put libguestfs from 7.7
> (fetched from brew) on your environment for testing?

I recently installed a Host from the master and it gave me:

libguestfs.x86_64                        1:1.38.2-12.el7_6.2

Which according to you is still too low. What is the date of the libguestfs 1.39.12 and is it available yet for installing from the current master:

https://resources.ovirt.org/pub/yum-repo/ovirt-release-master.rpm

Dated April 29, 2019? 
  

This is how I am currently installing hosts.

Comment 31 Richard W.M. Jones 2019-04-29 20:32:23 UTC
I have checked now and there was no BZ filed for the BiosType feature so it was never
backported.  Instead we got it in the rebase in RHEL 7.7.  So you will need
libguestfs >= 1.40 for RHEL 7.7 (from brew).

Comment 32 Steven Rosenberg 2019-05-02 13:47:47 UTC
After some investigation it seems it is not advisable to mix versions and this issue is specifically for oVirt, not Rhel. As per our conversation please confirm.

Comment 37 Steven Rosenberg 2019-05-06 13:30:11 UTC
This issue has been addressed by obtaining the Bios Type from the ovf file during post conversion as per Michal's suggestion in using the UpdateConvertedVmCommand module. This means that the Bios Type will only be updated when:

1. The import is VMWare and possibly Xen. KVM does not use the Post Convert update VM functionality and will not be supported via this change.
2. When the libguestfs' version is at least 1.40. Older versions do not include the Bios Type update within the ovf file.
3. Only after the File Conversion has been completed, which means that during import, the VM details and edit functionality will display the default which is i440fx/seabios.

To resolve Items 1 and 3, the getExternalVMs response message would need to include the Bios Type and the oVirt engine modified accordingly.
To resolve Item 2, one would need to upgrade the libguestfs version which currently needs to be back ported to the upstream for this implementation to work.

Comment 38 Ryan Barry 2019-05-15 03:39:57 UTC
*** Bug 1675721 has been marked as a duplicate of this bug. ***

Comment 39 Nisim Simsolo 2019-06-19 14:07:51 UTC
Reassigned: 
- Although import of VMware VM with EFI BIOS succeeds, the BIOS type and custom emulated machine of the imported VM remains default (in my case it's default BIOS and pc-i440fx).
- Running the imported VM will get stuck in "booting from hard disk" phase and will never complete boot.
- Changing BIOS and emulated machine type manually from WebAdmin to Q35 with UEFI BIOS is solving the boot issue.

Verification builds:
host and engine are running on RHEL 7.7 Beta (Maipo)
rhvm-4.3.5-0.1.el7
vdsm-4.30.19-1.el7ev.x86_64
virt-v2v-1.40.2-5.el7.x86_64
libguestfs-1.40.2-5.el7.x86_64
qemu-kvm-rhev-2.12.0-32.el7.x86_64
libvirt-4.5.0-22.el7.x86_64

vdsm.log, engine.log and import.log attached.
VM name which changed to Q35 with UEFI BIOS is RHEL77_Beta_EFI

Comment 40 Nisim Simsolo 2019-06-19 14:16:30 UTC
Created attachment 1582261 [details]
reassigned: vdsm.log

Comment 41 Nisim Simsolo 2019-06-19 14:20:24 UTC
Created attachment 1582264 [details]
reassigned: engine.log

Comment 42 Nisim Simsolo 2019-06-19 14:20:54 UTC
Created attachment 1582265 [details]
reassigned: import.log

Comment 43 Steven Rosenberg 2019-06-20 09:32:04 UTC
(In reply to Nisim Simsolo from comment #39)
> Reassigned: 
> - Although import of VMware VM with EFI BIOS succeeds, the BIOS type and
> custom emulated machine of the imported VM remains default (in my case it's
> default BIOS and pc-i440fx).
> - Running the imported VM will get stuck in "booting from hard disk" phase
> and will never complete boot.
> - Changing BIOS and emulated machine type manually from WebAdmin to Q35 with
> UEFI BIOS is solving the boot issue.
> 
> Verification builds:
> host and engine are running on RHEL 7.7 Beta (Maipo)
> rhvm-4.3.5-0.1.el7
> vdsm-4.30.19-1.el7ev.x86_64
> virt-v2v-1.40.2-5.el7.x86_64
> libguestfs-1.40.2-5.el7.x86_64
> qemu-kvm-rhev-2.12.0-32.el7.x86_64
> libvirt-4.5.0-22.el7.x86_64
> 
> vdsm.log, engine.log and import.log attached.
> VM name which changed to Q35 with UEFI BIOS is RHEL77_Beta_EFI

Back Ported to 4.3

Comment 44 Nisim Simsolo 2019-07-02 09:04:06 UTC
Reassigned:
- Importing VMware VMs with EFI BIOS are now converted to "Q35 chipset with UEFI BIOS" as expected.
- But importing VMware VMs with EFI BIOS and secure boot enabled are converted also to "Q35 chipset with UEFI BIOS" instead of being converted to "Q35 chipset with SecureBoot".
In such case, the VM is running but without secured boot.
- Possible workaround is to manually change VM BIOS type from "Q35 chipset with UEFI BIOS" to "Q35 chipset with SecureBoot" before running the VM.
- VMs imported from VMware are with operating system type that works OOB when using secure boot (Windows 10 and Fedora 28).

Verification builds: 
rhvm-4.3.5.2-0.1.el7
vdsm-4.30.22-1.el7ev.x86_64
virt-v2v-1.40.2-5.el7.x86_64
libvirt-4.5.0-23.el7.x86_64
qemu-kvm-rhev-2.12.0-33.el7.x86_64

Verification scenario:
1. Import from VMware  Windows 10 VM and Fedora 28 VM with EFI BIOS and secure boot enabled.
2. After import completion, from WebAdmin -> Compute -> VMs -> edit VM -> system: observe VMs BIOS type.
3. Run VMs and verify VMs are running with secure boot.
4. Work around: power off VMs and change BIOS type to "Q35 chipset with SecureBoot". Run VMs.

Actual results:
2. BIOS type is  "Q35 chipset with UEFI BIOS" instead of "Q35 chipset with SecureBoot" on both VMs.
3. Both VMs are running without secure boot. 
An example from Windows PowerShell:
PS C:\Confirm-SecureBootUEFI
False

Import logs, vdsm.log and engine.log attached.
engine.log Windows import started at 2019-06-30 18:15:50,461+03, Fedora import started at 2019-06-30 13:36:05,056+03

Comment 45 RHEL Program Management 2019-07-02 09:04:10 UTC
Target release should be placed once a package build is known to fix a issue. Since this bug is not modified, the target version has been reset. Please use target milestone to plan a fix for a oVirt release.

Comment 46 Nisim Simsolo 2019-07-02 09:05:10 UTC
Created attachment 1586597 [details]
secure boot issue, engine.log

Comment 47 Nisim Simsolo 2019-07-02 09:08:08 UTC
Created attachment 1586598 [details]
secure boot issue, vdsm.log

Comment 48 Nisim Simsolo 2019-07-02 09:08:35 UTC
Created attachment 1586599 [details]
secure boot issue, vdsm.log

Comment 49 Nisim Simsolo 2019-07-02 09:09:09 UTC
Created attachment 1586600 [details]
secure boot issue, Windows10 import.log

Comment 50 Nisim Simsolo 2019-07-02 09:09:47 UTC
Created attachment 1586601 [details]
secure boot issue, Fedora28 import.log

Comment 51 Ryan Barry 2019-07-02 12:04:13 UTC
If this works without secureboot enabled, let's pass it through and open a separate bug for secureboot, which isn't quite there yet

Comment 53 Nisim Simsolo 2019-07-03 07:23:42 UTC
Verified:
rhvm-4.3.5.2-0.1.el7
vdsm-4.30.22-1.el7ev.x86_64
virt-v2v-1.40.2-5.el7.x86_64
libvirt-4.5.0-23.el7.x86_64
qemu-kvm-rhev-2.12.0-33.el7.x86_64

Verification scenario: 
Polarion test case added to external trackers.

Comment 54 Sandro Bonazzola 2019-07-30 14:08:18 UTC
This bugzilla is included in oVirt 4.3.5 release, published on July 30th 2019.

Since the problem described in this bug report should be
resolved in oVirt 4.3.5 release, it has been closed with a resolution of CURRENT RELEASE.

If the solution does not work for you, please open a new bug report.