Hi Simon,
I'm exploring a solution for the same, I've found that the python based patching script fails to wait for the message to be written on the unix socket before that the socket is closed. I reckon this could be related to serial port device handling related changes in qemu-ev 2.12, as the same mechanism used to work in past versions. I'm exploring/testing a solution where I replace the python based patching script into a bash one. Can you test the following in your envrionment (ensure socat is installed), just backup and replace the patchviasocket.py file with this: https://gist.github.com/rhtyd/aab23357fef2d8a530c0e83ec8be10c5 The short term solution would be one of the ways to ensure patching works without much change in the scripts or systemvmtemplate. However, longer term we need to explore and standardize patching mechanism across all hypervisors, for example by using a small payload via a config drive iso. Regards, Rohit Yadav Software Architect, ShapeBlue https://www.shapeblue.com ________________________________ From: Simon Weller <swel...@ena.com.INVALID> Sent: Friday, April 12, 2019 8:29:04 PM To: dev; users Subject: Latest Qemu KVM EV appears to be broken with ACS All, After troubleshooting a strange issue with a new lab environment yesterday, it appears that the patchviasocket functionality we rely on for key and ip injection into our router/SSVM/CPVM images is broken with qemu-kvm-ev-2.12.0-18.el7 (January 2019 release). This was tested on Centos 7.6. No data is injected and this was confirmed using socat on /dev/vport0p1. qemu-kvm-ev-2.10.0-21.el7_5.7.1 works, so hopefully this will save someone some pain and suffering trying to figure out why the deployed seems broken. We're going to dig in and see if can figure out the patches responsible for it breaking. -Si rohit.ya...@shapeblue.comĀ www.shapeblue.com Amadeus House, Floral Street, London WC2E 9DPUK @shapeblue