cloudstack-users mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From Rohit Yadav <>
Subject Re: Latest Qemu KVM EV appears to be broken with ACS
Date Fri, 12 Apr 2019 16:21:09 GMT
Hi Simon,

I'm exploring a solution for the same, I've found that the python based patching script fails
to wait for the message to be written on the unix socket before that the socket is closed.
I reckon this could be related to serial port device handling related changes in qemu-ev 2.12,
as the same mechanism used to work in past versions.

I'm exploring/testing a solution where I replace the python based patching script into a bash
one. Can you test the following in your envrionment (ensure socat is installed), just backup
and replace the file with this:

The short term solution would be one of the ways to ensure patching works without much change
in the scripts or systemvmtemplate. However, longer term we need to explore and standardize
patching mechanism across all hypervisors, for example by using a small payload via a config
drive iso.


Rohit Yadav

Software Architect, ShapeBlue

From: Simon Weller <>
Sent: Friday, April 12, 2019 8:29:04 PM
To: dev; users
Subject: Latest Qemu KVM EV appears to be broken with ACS


After troubleshooting a strange issue with a new lab environment yesterday, it appears that
the patchviasocket functionality we rely on for key and ip injection into our router/SSVM/CPVM
images is broken with qemu-kvm-ev-2.12.0-18.el7 (January 2019 release). This was tested on
Centos 7.6.
No data is injected and this was confirmed using socat on /dev/vport0p1. qemu-kvm-ev-2.10.0-21.el7_5.7.1
works, so hopefully this will save someone some pain and suffering trying to figure out why
the deployed seems broken.

We're going to dig in and see if can figure out the patches responsible for it breaking.


Amadeus House, Floral Street, London  WC2E 9DPUK

  • Unnamed multipart/alternative (inline, None, 0 bytes)
View raw message