Dear All
I am running CentOS 7 with Xen 4.6
I see 4.7 is out now, and want to upgrade to see if the USB Passthrough will work. I have not been able to get it to work in 4.6
What is the best way to upgrade. I am using the centos-release-xen at the moment.
Regards
Francis
This is not abit issue just a minor annoyance.
I use Foreman to provision my systems and to keep control I remove all
the default *.repo files andkeep away from installing more *.repo files
so I can control the content via the foreman(katello) provided redhat.repo.
I would argue that the *-release-*.rpm should not contain any setup
code but just the stuff in /etc/yum.repos.d.
--
Alvin Starr || voice: (905)513-7688
Netvel Inc. || Cell: (416)806-0133
alvin(a)netvel.net ||
Hi.
I have a Supermicro 5018D-FN4T (Xeon D-1541 based SBC) that I use for virtualization. I’m running Centos 7.3 on it (updated), with the CentOS-QEMU-EV.repo repository as the source for virtualization packages.
I run an Ubuntu 16.04-2 guest VM on it, which is ordinary enough. What’s perhaps less ordinary is that I’ve attached a Lexar Media, Inc. “Lexar Professional Workflow CR1 CFast 2.0 USB 3.0 Reader” (LRWCR1TBNA) as well as a WEme Superspeed Aluminum USB 3.0 Multi-in-1 Card Reader … for CF/SD/TF Micro SD. Here’s the relevant lsusb output:
Bus 004 Device 004: ID 0bda:0309 Realtek Semiconductor Corp.
Bus 004 Device 025: ID 05dc:ba04 Lexar Media, Inc.
and both are hanging off of an Amazon Basics 4-port USB 3.0 hub:
Bus 004 Device 002: ID 2109:8110 VIA Labs, Inc. Hub
The Ubuntu VM I use for doing buildroot cross builds of an embedded Linux environment, which I then burn the image of onto a CFast card, having attached the Lexar card reader to the guest VM.
Problem is that the card reader is extremely dodgy, and sometimes I guess a flurry of messages on the virtualization host complaining about the device:
Mar 11 15:52:46 kvm1 kernel: usb 4-2.2: Disable of device-initiated U1 failed.
Mar 11 15:52:46 kvm1 kernel: usb 4-2.2: Disable of device-initiated U2 failed.
Mar 11 15:52:46 kvm1 kernel: usb 4-2.2: Set SEL for device-initiated U1 failed.
Mar 11 15:52:46 kvm1 kernel: usb 4-2.2: Set SEL for device-initiated U2 failed.
Mar 11 15:52:47 kvm1 kernel: usb 4-2.2: reset SuperSpeed USB device number 25 using xhci_hcd
Mar 11 15:52:47 kvm1 kernel: scsi host13: uas
Mar 11 15:52:47 kvm1 kernel: scsi 13:0:0:0: Direct-Access Lexar WorkflowCR1 0 PQ: 0 ANSI: 6
Mar 11 15:52:47 kvm1 kernel: sd 13:0:0:0: [sda] 30198988 512-byte logical blocks: (15.4 GB/14.3 GiB)
Mar 11 15:52:47 kvm1 kernel: sd 13:0:0:0: Attached scsi generic sg0 type 0
Mar 11 15:52:47 kvm1 kernel: sd 13:0:0:0: [sda] Write Protect is off
Mar 11 15:52:47 kvm1 kernel: sd 13:0:0:0: [sda] Write cache: disabled, read cache: enabled, doesn't support DPO or FUA
Mar 11 15:52:47 kvm1 kernel: sda: sda1 sda2
Mar 11 15:52:47 kvm1 kernel: sd 13:0:0:0: [sda] Attached SCSI removable disk
Mar 11 15:52:48 kvm1 kernel: usb 4-2.2: usbfs: process 4354 (CPU 3/KVM) did not claim interface 0 before use
Mar 11 15:52:48 kvm1 kernel: usb 4-2.2: usbfs: process 4354 (CPU 3/KVM) did not claim interface 0 before use
Mar 11 15:53:21 kvm1 kernel: usb 4-2.2: usbfs: process 4355 (CPU 4/KVM) did not claim interface 0 before use
Mar 11 15:53:21 kvm1 kernel: usb 4-2.2: reset SuperSpeed USB device number 25 using xhci_hcd
Mar 11 15:53:21 kvm1 kernel: usb 4-2.2: reset SuperSpeed USB device number 25 using xhci_hcd
but lately it just kills my VM when I’m writing to the device. So from annoying to a serious potential for losing work.
I run “yum update” a couple of times a week but now I’m thinking that was a mistake, since this has gone from being ultra-reliable to being a hazard.
Is there a workaround? Would I be better off plugging the USB 3.0 card-reader into a USB 2.0 hub and settling for slower throughput… but not crashing?
Below, for instance, I was doing a “dd if=xyzzy of=/dev/sda bs=1M” where /dev/sda is the device assigned to the USB card storage device.
Thanks,
-Philip
URL for ABRT report: https://da.gd/emJO
Hello, All!
virtio-win.iso contains two different Windows drivers.
these Windows Server 2012 R2 drivers have different hardware IDs:
\vioscsi\2k12R2\amd64\vioscsi.inf
"Red Hat VirtIO SCSI pass-through controller"
PCI\VEN_1AF4&DEV_1004&SUBSYS_00081AF4&REV_00
PCI\VEN_1AF4&DEV_1048&SUBSYS_11001AF4&REV_01
\viostor\2k12R2\amd64\viostor.inf
"Red Hat VirtIO SCSI controller"
PCI\VEN_1AF4&DEV_1001&SUBSYS_00021AF4&REV_00
PCI\VEN_1AF4&DEV_1042&SUBSYS_11001AF4&REV_01
When I use "VirtIO SCSI controller" in virt-manager,
and when I install Windows Server 2012 R2 -
I can use only viostor driver and can't use vioscsi driver,
Windows Server 2012 R2 can't load vioscsi driver (?)
from virtio-win.iso and did not see virtual hard disks
with vioscsi driver. Only viostor driver work normally.
How I can use "Red Hat VirtIO SCSI pass-through controller"
for Windows Server 2012 R2 virtual machine, what I need
to configure in xml-config?
current /etc/libvirt/qemu/windows.xml config:
<controller type='scsi' index='0' model='virtio-scsi'>
<address type='pci' domain='0x0000' bus='0x00' slot='0x07'
function='0x0'/>
</controller>
<disk type='file' device='disk'>
<driver name='qemu' type='raw' cache='none' io='native'
discard='unmap'/>
<source file='/volume/kvm-windows-system'/>
<target dev='vda' bus='virtio'/>
<boot order='1'/>
<address type='pci' domain='0x0000' bus='0x00' slot='0x08'
function='0x0'/>
</disk>
Additional info:
================
virtio-win.iso version: virtio-win-0.1.126.iso
from https://fedoraproject.org/wiki/Windows_Virtio_Drivers
OS: CentOS Linux release 7.3.1611 (Core)
QEMU: qemu-kvm-1.5.3-126.el7_3.5.x86_64
Windows Server 2012 R2 MSDN installation ISO image:
en_windows_server_2012_r2_with_update_x64_dvd_6052708.iso
sha1sum: 865494e969704be1c4496d8614314361d025775e
size: 5397889024 bytes
devcon.exe output inside Windows Server 2012 R2 Virtual Machine:
PCI\VEN_1AF4&DEV_1001&SUBSYS_00021AF4&REV_00\3&13C0B0C5&0&40
Name: Red Hat VirtIO SCSI controller
Hardware IDs:
PCI\VEN_1AF4&DEV_1001&SUBSYS_00021AF4&REV_00
PCI\VEN_1AF4&DEV_1001&SUBSYS_00021AF4
PCI\VEN_1AF4&DEV_1001&CC_010000
PCI\VEN_1AF4&DEV_1001&CC_0100
Compatible IDs:
PCI\VEN_1AF4&DEV_1001&REV_00
PCI\VEN_1AF4&DEV_1001
PCI\VEN_1AF4&CC_010000
PCI\VEN_1AF4&CC_0100
PCI\VEN_1AF4
PCI\CC_010000
PCI\CC_0100
PCI\VEN_1AF4&DEV_1001&SUBSYS_00021AF4&REV_00\3&13C0B0C5&0&50
Name: Red Hat VirtIO SCSI controller
Hardware IDs:
PCI\VEN_1AF4&DEV_1001&SUBSYS_00021AF4&REV_00
PCI\VEN_1AF4&DEV_1001&SUBSYS_00021AF4
PCI\VEN_1AF4&DEV_1001&CC_010000
PCI\VEN_1AF4&DEV_1001&CC_0100
Compatible IDs:
PCI\VEN_1AF4&DEV_1001&REV_00
PCI\VEN_1AF4&DEV_1001
PCI\VEN_1AF4&CC_010000
PCI\VEN_1AF4&CC_0100
PCI\VEN_1AF4
PCI\CC_010000
PCI\CC_0100
PCI\VEN_1AF4&DEV_1004&SUBSYS_00081AF4&REV_00\3&13C0B0C5&0&38
Name: Red Hat VirtIO SCSI controller
Hardware IDs:
PCI\VEN_1AF4&DEV_1004&SUBSYS_00081AF4&REV_00
PCI\VEN_1AF4&DEV_1004&SUBSYS_00081AF4
PCI\VEN_1AF4&DEV_1004&CC_010000
PCI\VEN_1AF4&DEV_1004&CC_0100
Compatible IDs:
PCI\VEN_1AF4&DEV_1004&REV_00
PCI\VEN_1AF4&DEV_1004
PCI\VEN_1AF4&CC_010000
PCI\VEN_1AF4&CC_0100
PCI\VEN_1AF4
PCI\CC_010000
PCI\CC_0100
--
Best regards,
Gena
Hi,
Now I can update the qemu-kvm-ev to the latest version
2.6.0-28.el7_3.3.1 provided by qemu-kvm-ev repo, but I couldn't find
the according source package in source repo. was forgot :)? where can I
find it?
--
Sincerely,
Chen Fan
Hi,
just pushed to testing a new build of qemu-kvm-ev, here's the ChangeLog:
* Thu Mar 2 2017 Sandro Bonazzola <sbonazzo(a)redhat.com> -
ev-2.6.0-28.el7_3.6.1
- Removing RH branding from package name
* Mon Feb 13 2017 Miroslav Rezanina <mrezanin(a)redhat.com> -
rhev-2.6.0-28.el7_3.6
- kvm-cirrus-fix-patterncopy-checks.patch [bz#1420493]
- kvm-Revert-cirrus-allow-zero-source-pitch-in-pattern-fil.patch
[bz#1420493]
- kvm-cirrus-add-blit_is_unsafe-call-to-cirrus_bitblt_cput.patch
[bz#1420493]
- Resolves: bz#1420493
(EMBARGOED CVE-2017-2620 qemu-kvm-rhev: Qemu: display: cirrus: potential
arbitrary code execution via cirrus_bitblt_cputovideo [rhel-7.3.z])
* Fri Feb 10 2017 Miroslav Rezanina <mrezanin(a)redhat.com> -
rhev-2.6.0-28.el7_3.5
- kvm-memory-Provide-memory_region_init_rom.patch [bz#1420456]
- kvm-pci-mark-ROMs-read-only.patch [bz#1420456]
- kvm-vhost-skip-ROM-sections.patch [bz#1420456]
- kvm-display-cirrus-check-vga-bits-per-pixel-bpp-value.patch [bz#1418234]
- kvm-display-cirrus-ignore-source-pitch-value-as-needed-i.patch
[bz#1418234]
- kvm-cirrus-handle-negative-pitch-in-cirrus_invalidate_re.patch
[bz#1418234]
- kvm-cirrus-allow-zero-source-pitch-in-pattern-fill-rops.patch [bz#1418234]
- kvm-cirrus-fix-blit-address-mask-handling.patch [bz#1418234]
- kvm-cirrus-fix-oob-access-issue-CVE-2017-2615.patch [bz#1418234]
- Resolves: bz#1418234
(CVE-2017-2615 qemu-kvm-rhev: Qemu: display: cirrus: oob access while
doing bitblt copy backward mode [rhel-7.3.z])
- Resolves: bz#1420456
([ppc64le]reset vm when do migration, HMP in src host promp "tcmalloc:
large alloc 1073872896 bytes...")
* Wed Feb 08 2017 Miroslav Rezanina <mrezanin(a)redhat.com> -
rhev-2.6.0-28.el7_3.4
- kvm-Disable-usbredir-and-libcacard-for-unsupported-archi.patch
[bz#1420428]
- Resolves: bz#1420428
(Remove dependencies required by spice on ppc64le)
In order to test it:
# yum install centos-release-qemu-ev
# yum-config-manager --enable centos-qemu-ev-test
# yum install qemu-kvm-ev
Or just yum update if you already have qemu-kvm-ev installed and test
repository enabled.
If you test it, please provide feedback.
--
Sandro Bonazzola
Better technology. Faster innovation. Powered by community collaboration.
See how it works at redhat.com
The CentOS VIrtualization Special Interest Group wants to remind
everyone that the End of Life for the Xen-4.4 branch (currently
4.4.4-19) will be March 31st, 2017.
This is because the Xen Project will no longer support Xen-4.4 after
that date, based on this link:
https://wiki.xenproject.org/wiki/Xen_Project_Release_Features
Xen-4.6 is still available and will be maintained until October 2018 (on
both CentOS-6 and CentOS-7) and Xen-4.8 will be available soon.
Thanks,
Johnny Hughes