Hi Simon,

I'm exploring a solution for the same, I've found that the python based 
patching script fails to wait for the message to be written on the unix socket 
before that the socket is closed. I reckon this could be related to serial port 
device handling related changes in qemu-ev 2.12, as the same mechanism used to 
work in past versions.


I'm exploring/testing a solution where I replace the python based patching 
script into a bash one. Can you test the following in your envrionment (ensure 
socat is installed), just backup and replace the patchviasocket.py file with 
this:

https://gist.github.com/rhtyd/aab23357fef2d8a530c0e83ec8be10c5


The short term solution would be one of the ways to ensure patching works 
without much change in the scripts or systemvmtemplate. However, longer term we 
need to explore and standardize patching mechanism across all hypervisors, for 
example by using a small payload via a config drive iso.


Regards,

Rohit Yadav

Software Architect, ShapeBlue

https://www.shapeblue.com

________________________________
From: Simon Weller <swel...@ena.com.INVALID>
Sent: Friday, April 12, 2019 8:29:04 PM
To: dev; users
Subject: Latest Qemu KVM EV appears to be broken with ACS

All,

After troubleshooting a strange issue with a new lab environment yesterday, it 
appears that the patchviasocket functionality we rely on for key and ip 
injection into our router/SSVM/CPVM images is broken with 
qemu-kvm-ev-2.12.0-18.el7 (January 2019 release). This was tested on Centos 7.6.
No data is injected and this was confirmed using socat on /dev/vport0p1. 
qemu-kvm-ev-2.10.0-21.el7_5.7.1 works, so hopefully this will save someone some 
pain and suffering trying to figure out why the deployed seems broken.

We're going to dig in and see if can figure out the patches responsible for it 
breaking.

-Si



rohit.ya...@shapeblue.comĀ 
www.shapeblue.com
Amadeus House, Floral Street, London  WC2E 9DPUK
@shapeblue
  
 

Reply via email to