<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Very scary host reboot issue]]></title><description><![CDATA[<p dir="auto">Hello dear community,</p>
<p dir="auto">I have a very scary and unpleasant issue with two of my XCP-ng hosts (so far 2). I have latest stable 8.2.1 patched (everything but the latest 5 patches that appeared a few days back). I have OPNsense running as a VM providing a VPN tunnel via WireGuard.</p>
<p dir="auto">If I copy a large file (multiple GB) to a fileserver (on the same network as OPNsense) or to the host local ISO repostory, after a while during the copy operation the host restarts.</p>
<p dir="auto">I have this issue since around 2 months now. Initially I thought I had a hardware failure in my Dell R720 server that was causing the issue, but recently I experienced the same phenomenon on another server, unrelated hardware wise to my first server. The second host produced the reboot while copying an ISO file to its local ISO repository. The copy went via a WireGuard tunnel hosted by an OPNsense VM.</p>
<p dir="auto">No configuration change whatsoever took place in the previous months. These are production systems with critical workloads. The only thing I did was patching them via Xen Orchestra.</p>
<p dir="auto">Is there anything in the recent (Q2-Q3) patches that could cause something like this? How can I diagnose the problem? What can I do?</p>
<p dir="auto">Thanks in advance!</p>
]]></description><link>https://xcp-ng.org/forum/topic/7812/very-scary-host-reboot-issue</link><generator>RSS for Node</generator><lastBuildDate>Sat, 18 Apr 2026 06:29:48 GMT</lastBuildDate><atom:link href="https://xcp-ng.org/forum/topic/7812.rss" rel="self" type="application/rss+xml"/><pubDate>Tue, 03 Oct 2023 08:50:18 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to Very scary host reboot issue on Thu, 20 Jun 2024 12:45:06 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/forum/user/olivierlambert" aria-label="Profile: olivierlambert">@<bdi>olivierlambert</bdi></a> said in <a href="/forum/post/79058">Very scary host reboot issue</a>:</p>
<blockquote>
<p dir="auto">I am very very busy so I don't have time to make a search by myself but maybe someone else around with few minutes could point you to the blog post talking about this</p>
<p dir="auto">edit: found it in few sec luckily: <a href="https://xcp-ng.org/blog/2024/01/26/january-2024-security-update/" target="_blank" rel="noopener noreferrer nofollow ugc">https://xcp-ng.org/blog/2024/01/26/january-2024-security-update/</a></p>
</blockquote>
<p dir="auto">Thanks. I'll check this out.</p>
]]></description><link>https://xcp-ng.org/forum/post/79062</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/79062</guid><dc:creator><![CDATA[Mark]]></dc:creator><pubDate>Thu, 20 Jun 2024 12:45:06 GMT</pubDate></item><item><title><![CDATA[Reply to Very scary host reboot issue on Thu, 20 Jun 2024 11:34:28 GMT]]></title><description><![CDATA[<p dir="auto">I am very very busy so I don't have time to make a search by myself but maybe someone else around with few minutes could point you to the blog post talking about this</p>
<p dir="auto">edit: found it in few sec luckily: <a href="https://xcp-ng.org/blog/2024/01/26/january-2024-security-update/" target="_blank" rel="noopener noreferrer nofollow ugc">https://xcp-ng.org/blog/2024/01/26/january-2024-security-update/</a></p>
]]></description><link>https://xcp-ng.org/forum/post/79058</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/79058</guid><dc:creator><![CDATA[olivierlambert]]></dc:creator><pubDate>Thu, 20 Jun 2024 11:34:28 GMT</pubDate></item><item><title><![CDATA[Reply to Very scary host reboot issue on Thu, 20 Jun 2024 11:26:59 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/forum/user/olivierlambert" aria-label="Profile: olivierlambert">@<bdi>olivierlambert</bdi></a> said in <a href="/forum/post/79051">Very scary host reboot issue</a>:</p>
<blockquote>
<p dir="auto">IIRC, a fix was released preventing the issue to occur again.</p>
</blockquote>
<p dir="auto">You still have not told my anything about that fix you mentioned. Care to explain instead of teasing, but not telling? <img src="https://xcp-ng.org/forum/assets/plugins/nodebb-plugin-emoji/emoji/android/1f609.png?v=a78c449d9ac" class="not-responsive emoji emoji-android emoji--wink" style="height:23px;width:auto;vertical-align:middle" title=";-)" alt="😉" /></p>
]]></description><link>https://xcp-ng.org/forum/post/79057</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/79057</guid><dc:creator><![CDATA[Mark]]></dc:creator><pubDate>Thu, 20 Jun 2024 11:26:59 GMT</pubDate></item><item><title><![CDATA[Reply to Very scary host reboot issue on Thu, 20 Jun 2024 11:21:15 GMT]]></title><description><![CDATA[<p dir="auto">To rephrase: we support IPv6 in guests, but we do not support any modification on the Dom0. This doesn't prevent you to do it, but then it's harder to know what's the problem (maybe it's related, maybe not?).</p>
<p dir="auto">Anyway, your issue might worth another thread since I think the original problem was solved here <img src="https://xcp-ng.org/forum/assets/plugins/nodebb-plugin-emoji/emoji/android/1f642.png?v=a78c449d9ac" class="not-responsive emoji emoji-android emoji--slightly_smiling_face" style="height:23px;width:auto;vertical-align:middle" title=":)" alt="🙂" /></p>
]]></description><link>https://xcp-ng.org/forum/post/79056</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/79056</guid><dc:creator><![CDATA[olivierlambert]]></dc:creator><pubDate>Thu, 20 Jun 2024 11:21:15 GMT</pubDate></item><item><title><![CDATA[Reply to Very scary host reboot issue on Thu, 20 Jun 2024 11:13:06 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/forum/user/olivierlambert" aria-label="Profile: olivierlambert">@<bdi>olivierlambert</bdi></a> said in <a href="/forum/post/79054">Very scary host reboot issue</a>:</p>
<blockquote>
<blockquote>
<p dir="auto">This works flawlessly.</p>
</blockquote>
<p dir="auto">Obviously it does not <img src="https://xcp-ng.org/forum/assets/plugins/nodebb-plugin-emoji/emoji/android/1f604.png?v=a78c449d9ac" class="not-responsive emoji emoji-android emoji--smile" style="height:23px;width:auto;vertical-align:middle" title=":D" alt="😄" /> It's absolutely not supported and I have no idea the impact it could have with the existing network stack. XCP-ng is NOT your average Linux distro, doing this kind of modification sends you in the twilight zone.</p>
<p dir="auto">To get an idea on the amount of work needed: <a href="https://xcp-ng.org/blog/2021/02/09/ipv6-in-xcp-ng/" target="_blank" rel="noopener noreferrer nofollow ugc">https://xcp-ng.org/blog/2021/02/09/ipv6-in-xcp-ng/</a> (and this article is 3 years old, it doesn't count the huge amount of tests and bugs we found since then).</p>
<p dir="auto">So if you need IPv6 support in the Dom0, you have to rely on 8.3 and feedback/bug reports are very welcome <img src="https://xcp-ng.org/forum/assets/plugins/nodebb-plugin-emoji/emoji/android/1f642.png?v=a78c449d9ac" class="not-responsive emoji emoji-android emoji--slightly_smiling_face" style="height:23px;width:auto;vertical-align:middle" title=":)" alt="🙂" /></p>
</blockquote>
<p dir="auto">The linked article refers mainly to management and other "internal" XCP-ng handling of IPv6.</p>
<p dir="auto">I don't see the relevance, since I'm just passing through IPv6 within the Linux kernel without XCP-ng itself interacting with it.</p>
<p dir="auto">Mind you, it works crash-free on the "Model A" server and that is very old XCP-ng 8.0, while XCP-ng 8.2.1 on "Model B" crashes. So XCP-ng 8.0 has better IPv6 compatibility? <img src="https://xcp-ng.org/forum/assets/plugins/nodebb-plugin-emoji/emoji/android/1f914.png?v=a78c449d9ac" class="not-responsive emoji emoji-android emoji--thinking_face" style="height:23px;width:auto;vertical-align:middle" title=":thinking_face:" alt="🤔" /></p>
<p dir="auto">XCP-ng itself only accesses IPv4. Isn't that the point of "Dual Stack": Two worlds co-existing. Can be used together but also completely separately. A process can freely choose the address family it wants to use.</p>
]]></description><link>https://xcp-ng.org/forum/post/79055</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/79055</guid><dc:creator><![CDATA[Mark]]></dc:creator><pubDate>Thu, 20 Jun 2024 11:13:06 GMT</pubDate></item><item><title><![CDATA[Reply to Very scary host reboot issue on Thu, 20 Jun 2024 11:01:06 GMT]]></title><description><![CDATA[<blockquote>
<p dir="auto">This works flawlessly.</p>
</blockquote>
<p dir="auto">Obviously it does not <img src="https://xcp-ng.org/forum/assets/plugins/nodebb-plugin-emoji/emoji/android/1f604.png?v=a78c449d9ac" class="not-responsive emoji emoji-android emoji--smile" style="height:23px;width:auto;vertical-align:middle" title=":D" alt="😄" /> It's absolutely not supported and I have no idea the impact it could have with the existing network stack. XCP-ng is NOT your average Linux distro, doing this kind of modification sends you in the twilight zone.</p>
<p dir="auto">To get an idea on the amount of work needed: <a href="https://xcp-ng.org/blog/2021/02/09/ipv6-in-xcp-ng/" target="_blank" rel="noopener noreferrer nofollow ugc">https://xcp-ng.org/blog/2021/02/09/ipv6-in-xcp-ng/</a> (and this article is 3 years old, it doesn't count the huge amount of tests and bugs we found since then).</p>
<p dir="auto">So if you need IPv6 support in the Dom0, you have to rely on 8.3 and feedback/bug reports are very welcome <img src="https://xcp-ng.org/forum/assets/plugins/nodebb-plugin-emoji/emoji/android/1f642.png?v=a78c449d9ac" class="not-responsive emoji emoji-android emoji--slightly_smiling_face" style="height:23px;width:auto;vertical-align:middle" title=":)" alt="🙂" /></p>
]]></description><link>https://xcp-ng.org/forum/post/79054</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/79054</guid><dc:creator><![CDATA[olivierlambert]]></dc:creator><pubDate>Thu, 20 Jun 2024 11:01:06 GMT</pubDate></item><item><title><![CDATA[Reply to Very scary host reboot issue on Thu, 20 Jun 2024 10:56:33 GMT]]></title><description><![CDATA[<p dir="auto">Hi Olivier!</p>
<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/forum/user/olivierlambert" aria-label="Profile: olivierlambert">@<bdi>olivierlambert</bdi></a> said in <a href="/forum/post/79051">Very scary host reboot issue</a>:</p>
<blockquote>
<p dir="auto">IIRC, a fix was released preventing the issue to occur again.</p>
<p dir="auto">Note there's no IPv6 support in Dom0 in 8.2 (only in 8.3), so I'm not sure how did you ended configuring v6 on 8.2 <img src="https://xcp-ng.org/forum/assets/plugins/nodebb-plugin-emoji/emoji/android/1f914.png?v=a78c449d9ac" class="not-responsive emoji emoji-android emoji--thinking_face" style="height:23px;width:auto;vertical-align:middle" title=":thinking_face:" alt="🤔" /></p>
</blockquote>
<p dir="auto">XCP-ng v8.2.1 may not have real IPv6 support (and remains ignorant, uses a single IPv4 for management), but CentOS in Dom0 does. Activation:</p>
<p dir="auto">in /etc/sysctl.d/90-net.conf:</p>
<pre><code># Enable IPv6 on interfaces
net.ipv6.conf.all.disable_ipv6 = 0
net.ipv6.conf.default.disable_ipv6 = 0

# Enabling IPv4 forwarding
net.ipv4.ip_forward = 1

# ENABLE IPv6 forwarding
net.ipv6.conf.all.forwarding = 1
net.ipv6.conf.default.forwarding = 1
</code></pre>
<p dir="auto">/etc/rc.local addition:</p>
<pre><code># SAFETY: generous grace time period for XCP-ng xapi network start (allow xenbr0 to come up)
sleep 60

# activate additional IPv4 subnet

ip addr add xxx.251.xxx.1/28 dev xapi0

# prevent broadcasts leaking out externally
iptables -A FORWARD -m pkttype --pkt-type broadcast -i xenbr0 -j DROP

# IPv4 done

# activate IPv6 router address on xapi0
ip addr add 2a01:XXX:XXX:8041:ffff::2/127 dev xapi0
# add IPv6 default gw on xenbr0 (this is link-local)
ip -6 ro add default via fe80::1 dev xenbr0
# add IPv6 route for our /64 towards OPNsense
ip -6 ro add 2a01:XXX:XXX:8041::/64 via 2a01:XXX:XXX:8041:ffff::3 dev xapi0

# IPv6 done
</code></pre>
<p dir="auto">This works flawlessly. The OPNsense VM is the ::3 destination of the /64 route.</p>
<p dir="auto">As for the fix you mentioned, is that specific to 8.3 or is it also avaiable for 8.2.1? Can you point me to the relevant information?</p>
<p dir="auto">Thanks a lot for your quick response.</p>
]]></description><link>https://xcp-ng.org/forum/post/79052</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/79052</guid><dc:creator><![CDATA[Mark]]></dc:creator><pubDate>Thu, 20 Jun 2024 10:56:33 GMT</pubDate></item><item><title><![CDATA[Reply to Very scary host reboot issue on Thu, 20 Jun 2024 10:39:33 GMT]]></title><description><![CDATA[<p dir="auto">IIRC, a fix was released preventing the issue to occur again.</p>
<p dir="auto">Note there's no IPv6 support in Dom0 in 8.2 (only in 8.3), so I'm not sure how did you ended configuring v6 on 8.2 <img src="https://xcp-ng.org/forum/assets/plugins/nodebb-plugin-emoji/emoji/android/1f914.png?v=a78c449d9ac" class="not-responsive emoji emoji-android emoji--thinking_face" style="height:23px;width:auto;vertical-align:middle" title=":thinking_face:" alt="🤔" /></p>
]]></description><link>https://xcp-ng.org/forum/post/79051</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/79051</guid><dc:creator><![CDATA[olivierlambert]]></dc:creator><pubDate>Thu, 20 Jun 2024 10:39:33 GMT</pubDate></item><item><title><![CDATA[Reply to Very scary host reboot issue on Thu, 20 Jun 2024 10:23:47 GMT]]></title><description><![CDATA[<p dir="auto">Hi there,</p>
<p dir="auto">is there any more news on this topic? 'Cause I've got a similar one.</p>
<p dir="auto">I'll try to explain the setup:</p>
<p dir="auto">"Model A":</p>
<ul>
<li>
<p dir="auto">one XCP-ng Host v8.0 (no typo, old version)</p>
</li>
<li>
<p dir="auto">PX82 (machine rented from Hetzner datacenter in Falkenstein, Germany</p>
</li>
<li>
<p dir="auto">Dom0 acting as an IPv4 router (maps assigned IPv4 subnet to one of the xapi Interfaces)</p>
</li>
<li>
<p dir="auto">an OPNsense Firewall "24.1.6-amd64 FreeBSD 13.2-RELEASE-p11 OpenSSL 3.0.13" as a VM</p>
</li>
<li>
<p dir="auto">OPNsense  does all the external-to-internal stuff, OpenVPN and IPsec</p>
</li>
<li>
<p dir="auto">OPNsense "sees" 4 virtual NICs (xn0-3) and has Guest Tools installed for reporting back to XCP-ng</p>
</li>
<li>
<p dir="auto">XCP-ng handles VLAN tagging/untagging</p>
</li>
<li>
<p dir="auto">IPv4 routing only</p>
</li>
<li>
<p dir="auto">network driver is e1000e (Intel Corporation Ethernet Connection (7) I219-LM (rev 10))</p>
</li>
<li>
<p dir="auto">very, very stable (currently at 673 days uptime)</p>
</li>
<li>
<p dir="auto">LAST CHANGE: added IPv4/IPv6 dual stack operation, enabling IPv6 in Dom0, IPv6 Forwarding, IPv6 Static Network in OPNsense</p>
</li>
<li>
<p dir="auto">works flawlessly, still no crash</p>
</li>
</ul>
<p dir="auto">"Model B":</p>
<ul>
<li>
<p dir="auto">one XCP-ng Host v8.2.1</p>
</li>
<li>
<p dir="auto">AX101 machine rented from Hetzner datacenter in Falkenstein, Germany</p>
</li>
<li>
<p dir="auto">Dom0 acting as an IPv4 router (maps assigned IPv4 subnet to one of the xapi Interfaces)</p>
</li>
<li>
<p dir="auto">an OPNsense Firewall "24.1.6-amd64 FreeBSD 13.2-RELEASE-p11 OpenSSL 3.0.13" as a VM</p>
</li>
<li>
<p dir="auto">OPNsense does all the external-to-internal stuff and OpenVPN (no IPsec)</p>
</li>
<li>
<p dir="auto">OPNsense "sees" 4 virtual NICs (xn0-3) and has Guest Tools installed for reporting back to XCP-ng</p>
</li>
<li>
<p dir="auto">XCP-ng handles VLAN tagging/untagging</p>
</li>
<li>
<p dir="auto">IPv4 routing only</p>
</li>
<li>
<p dir="auto">network driver igb (Intel Corporation I210 Gigabit Network Connection (rev 03))</p>
</li>
<li>
<p dir="auto">WAS very stable (hundreds of days uptime)</p>
</li>
<li>
<p dir="auto">LAST CHANGE: added IPv4/IPv6 dual stack operation, enabling IPv6 in Dom0, IPv6 Forwarding, IPv6 Static Network in OPNsense</p>
</li>
<li>
<p dir="auto">now HOST crashes (reboots) about twice a day</p>
</li>
</ul>
<p dir="auto">I'm not using WireGuard, but I DO use identical OPNsense versions on two different hosts with different XCP-ng versions. And problems started to occur only after activating IPv6 on the "Model B" machine.</p>
<p dir="auto">I noticed both Intel NICs using different drivers. Is the "igb" driver a possible source of the problem (here: in conjunction with IPv6) and could/should I switch the "Model B" system to e1000e (as long as there is no risk of the host staying offline after reboot)?</p>
<p dir="auto">I do have a server status report exported from XCP-ng Center, but I'm not very experienced in reading it - there is so much stuff inside and I'm sure, most of it is irrelevant.</p>
]]></description><link>https://xcp-ng.org/forum/post/79049</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/79049</guid><dc:creator><![CDATA[Mark]]></dc:creator><pubDate>Thu, 20 Jun 2024 10:23:47 GMT</pubDate></item><item><title><![CDATA[Reply to Very scary host reboot issue on Wed, 11 Oct 2023 20:15:09 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/forum/user/tuxen" aria-label="Profile: tuxen">@<bdi>tuxen</bdi></a></p>
<ol>
<li>Absolutely no idea how to do this in Windows. I looked for any MTU setting but couldn't find any.</li>
<li>This is not a viable workaround for me, maybe it would be useful to pin the issue to the xen PV driver, maybe I'll do some more testing on spare hardware.</li>
<li>I read this, but I don't know how to test it. I didn't have any manual MTUs set so I don't know what values were before the update.</li>
</ol>
<p dir="auto">What most definitely fixed the issue for me was using PCIe passthrough for the WAN interface. I used a 10 GbE NIC. It uses the ix driver (ix0) so IDK if this is related. Somehow PPPoE + WG + Windows Client on the virtual interface (Xen PV driver) in OPNsense produces this issue.<br />
At the moment I am happy with this mitigation.</p>
<p dir="auto">I'm a little spread thin with free time at the moment. Anyone care to test this further?</p>
]]></description><link>https://xcp-ng.org/forum/post/66462</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/66462</guid><dc:creator><![CDATA[darabontors]]></dc:creator><pubDate>Wed, 11 Oct 2023 20:15:09 GMT</pubDate></item><item><title><![CDATA[Reply to Very scary host reboot issue on Tue, 10 Oct 2023 22:42:25 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/forum/user/darabontors" aria-label="Profile: darabontors">@<bdi>darabontors</bdi></a> some additional tests that I could think of:</p>
<ol>
<li>Minimum WG MTU on client-side (<code>MTU=1280</code>);</li>
<li>OPNSense with emulated <code>e1000</code> interfaces (bypass the PV driver but not OVS). It'll keep the VM 'agile' (hot-migrate) but with a <strong>big cost in performance</strong>;</li>
<li>The last OPNSense version <code>23.7.5</code>.</li>
</ol>
<p dir="auto">As for the last version, found this important info posted by the devs about a change in the MTU code <strong>[1]</strong>:</p>
<blockquote>
<p dir="auto">Today introduces a change in MTU handling for parent interfaces mostly<br />
noticed by PPPoE use where the respective MTU values need to fit the<br />
parent plus the additional header of the VLAN or PPPoE.  Should the<br />
MTU already be misconfigured to a smaller value it will be used as<br />
configured so check your configuration and clear the MTU value if you<br />
want the system to decide about the effective parent MTU size.<br />
(...)</p>
</blockquote>
<p dir="auto">Hope it helps.</p>
<hr />
<p dir="auto">[1] <a href="https://forum.opnsense.org/index.php?topic=36163.0" target="_blank" rel="noopener noreferrer nofollow ugc">https://forum.opnsense.org/index.php?topic=36163.0</a></p>
]]></description><link>https://xcp-ng.org/forum/post/66431</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/66431</guid><dc:creator><![CDATA[tuxen]]></dc:creator><pubDate>Tue, 10 Oct 2023 22:42:25 GMT</pubDate></item><item><title><![CDATA[Reply to Very scary host reboot issue on Tue, 10 Oct 2023 06:50:10 GMT]]></title><description><![CDATA[<p dir="auto">We'll be all happy when we'll find that bug <img src="https://xcp-ng.org/forum/assets/plugins/nodebb-plugin-emoji/emoji/android/1f642.png?v=a78c449d9ac" class="not-responsive emoji emoji-android emoji--slightly_smiling_face" style="height:23px;width:auto;vertical-align:middle" title=":)" alt="🙂" /></p>
]]></description><link>https://xcp-ng.org/forum/post/66413</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/66413</guid><dc:creator><![CDATA[olivierlambert]]></dc:creator><pubDate>Tue, 10 Oct 2023 06:50:10 GMT</pubDate></item><item><title><![CDATA[Reply to Very scary host reboot issue on Tue, 10 Oct 2023 03:30:10 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/forum/user/andrew" aria-label="Profile: Andrew">@<bdi>Andrew</bdi></a> That makes sense. I think I'll do just this. In the meantime I'll try to replicate the phenomenon on test hardware. I really need a permanent fix for this..</p>
]]></description><link>https://xcp-ng.org/forum/post/66412</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/66412</guid><dc:creator><![CDATA[darabontors]]></dc:creator><pubDate>Tue, 10 Oct 2023 03:30:10 GMT</pubDate></item><item><title><![CDATA[Reply to Very scary host reboot issue on Mon, 09 Oct 2023 00:02:46 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/forum/user/darabontors" aria-label="Profile: darabontors">@<bdi>darabontors</bdi></a> Yes, if you pass the PCIe LAN/WAN hardware to the VM then it will bypass the FreeBSD Xen network drivers and the Dom0 Xen OVS drivers.</p>
<p dir="auto">FreeBSD will use its own hardware drivers for the network interfaces.</p>
<p dir="auto">You won't be able to use the interfaces for any shared VM. You won't be able to hot migrate the VM to another host.</p>
]]></description><link>https://xcp-ng.org/forum/post/66386</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/66386</guid><dc:creator><![CDATA[Andrew]]></dc:creator><pubDate>Mon, 09 Oct 2023 00:02:46 GMT</pubDate></item><item><title><![CDATA[Reply to Very scary host reboot issue on Sun, 08 Oct 2023 20:39:27 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/forum/user/olivierlambert" aria-label="Profile: olivierlambert">@<bdi>olivierlambert</bdi></a> I'm thinking of a quick workaround. What if I use pci pass-through for the LAN and WAN interfaces and I physically connect the LAN port to another non PCIe pass-through port of the server and I use that port toninterface with my other VMs via OVS? Does it make any sense? Does it seem viable to mitigate this issue?</p>
]]></description><link>https://xcp-ng.org/forum/post/66383</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/66383</guid><dc:creator><![CDATA[darabontors]]></dc:creator><pubDate>Sun, 08 Oct 2023 20:39:27 GMT</pubDate></item><item><title><![CDATA[Reply to Very scary host reboot issue on Sun, 08 Oct 2023 18:47:33 GMT]]></title><description><![CDATA[<p dir="auto">Maybe it's time to ask FreeBSD devs, then <img src="https://xcp-ng.org/forum/assets/plugins/nodebb-plugin-emoji/emoji/android/1f61b.png?v=a78c449d9ac" class="not-responsive emoji emoji-android emoji--stuck_out_tongue" style="height:23px;width:auto;vertical-align:middle" title=":p" alt="😛" /></p>
]]></description><link>https://xcp-ng.org/forum/post/66379</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/66379</guid><dc:creator><![CDATA[olivierlambert]]></dc:creator><pubDate>Sun, 08 Oct 2023 18:47:33 GMT</pubDate></item><item><title><![CDATA[Reply to Very scary host reboot issue on Sat, 07 Oct 2023 14:33:53 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/forum/user/olivierlambert" aria-label="Profile: olivierlambert">@<bdi>olivierlambert</bdi></a> Last time I asked about a Xen driver issue, they deferred to the FreeBSD maintainers.</p>
]]></description><link>https://xcp-ng.org/forum/post/66376</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/66376</guid><dc:creator><![CDATA[Andrew]]></dc:creator><pubDate>Sat, 07 Oct 2023 14:33:53 GMT</pubDate></item><item><title><![CDATA[Reply to Very scary host reboot issue on Sat, 07 Oct 2023 08:10:37 GMT]]></title><description><![CDATA[<p dir="auto">Maybe it's time to ask OPNsense devs <img src="https://xcp-ng.org/forum/assets/plugins/nodebb-plugin-emoji/emoji/android/1f642.png?v=a78c449d9ac" class="not-responsive emoji emoji-android emoji--slightly_smiling_face" style="height:23px;width:auto;vertical-align:middle" title=":)" alt="🙂" /></p>
]]></description><link>https://xcp-ng.org/forum/post/66371</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/66371</guid><dc:creator><![CDATA[olivierlambert]]></dc:creator><pubDate>Sat, 07 Oct 2023 08:10:37 GMT</pubDate></item><item><title><![CDATA[Reply to Very scary host reboot issue on Fri, 06 Oct 2023 22:13:03 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/forum/user/olivierlambert" aria-label="Profile: olivierlambert">@<bdi>olivierlambert</bdi></a> said in <a href="/forum/post/66366">Very scary host reboot issue</a>:</p>
<blockquote>
<p dir="auto">FreeBSD PV driver inside OPNsense or Pfsense.</p>
</blockquote>
<p dir="auto">Who is maintaining the FreeBSD PV drivers?</p>
]]></description><link>https://xcp-ng.org/forum/post/66367</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/66367</guid><dc:creator><![CDATA[darabontors]]></dc:creator><pubDate>Fri, 06 Oct 2023 22:13:03 GMT</pubDate></item><item><title><![CDATA[Reply to Very scary host reboot issue on Fri, 06 Oct 2023 22:00:48 GMT]]></title><description><![CDATA[<p dir="auto">First report I heard was in April of this year, on Intel <code>ixgbe</code> driver on a R630 from someone using OPNsense in a VM + wireguard. I don't remember any OVS change that could explain this.</p>
<p dir="auto">We had the crash around in May/June IIRC, on a Dell 430 (or 420) but on a <code>e1000e</code> Intel driver.</p>
<p dir="auto">But after inspection, we've seen that the issue was happening inside OVS, before entering the NIC, so it might not be related to the hardware at all. Maybe the hardware "helps" to get the packet or instruction crashing OVS. But to me, there's more chances it's related to an update or something in the FreeBSD PV driver inside OPNsense or Pfsense. That would be interesting to see if something moves in that area in both projects in 2023.</p>
]]></description><link>https://xcp-ng.org/forum/post/66366</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/66366</guid><dc:creator><![CDATA[olivierlambert]]></dc:creator><pubDate>Fri, 06 Oct 2023 22:00:48 GMT</pubDate></item><item><title><![CDATA[Reply to Very scary host reboot issue on Fri, 06 Oct 2023 21:30:34 GMT]]></title><description><![CDATA[<p dir="auto">I found the MTU parameter. This time it was 1420 on both OPNsense WG interface and in Windows (client side). I was happy for about 5 minutes as I wasn't able to reproduce the crash, but then it happened again. My "favorite" way to trigger it is by pausing the file transfer, waiting for a couple of minutes and then resuming it. The transfer's MB/s jumps up like crazy in Windows, then freezes until it gets in sync with the real progress of the transfer. After two tries of pausing and resuming, the crash happened.</p>
<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/forum/user/olivierlambert" aria-label="Profile: olivierlambert">@<bdi>olivierlambert</bdi></a> I use this setup on my infrastructure and my clients since at least 4 years. I never experienced this issue until as recent as September this year. You guys saw this issue ~6 months ago. Isn't there a way to backtrack any recent updates to Openswitch? I know it might be some updates on the FreeBSD side that made this openswitch bug surface just in recent times... I know there was little to no development on the WireGuard side of things this year.</p>
]]></description><link>https://xcp-ng.org/forum/post/66365</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/66365</guid><dc:creator><![CDATA[darabontors]]></dc:creator><pubDate>Fri, 06 Oct 2023 21:30:34 GMT</pubDate></item><item><title><![CDATA[Reply to Very scary host reboot issue on Fri, 06 Oct 2023 21:13:02 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/forum/user/tuxen" aria-label="Profile: tuxen">@<bdi>tuxen</bdi></a> You might be on to something. I need to clarify something. I am positive this issue is related to the Windows WireGuard client. On the same host, same OPNsense VM I have 10+ SitetoSite Wireguard connections configured moving 100+ GB daily and the host never reboots. I can only trigger it from a Windows WG connection.</p>
<p dir="auto">How do I verify MTU size for the WG connection in Windows 11? I cannot find it for the life of me...</p>
]]></description><link>https://xcp-ng.org/forum/post/66364</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/66364</guid><dc:creator><![CDATA[darabontors]]></dc:creator><pubDate>Fri, 06 Oct 2023 21:13:02 GMT</pubDate></item><item><title><![CDATA[Reply to Very scary host reboot issue on Fri, 06 Oct 2023 19:58:08 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/forum/user/tuxen" aria-label="Profile: tuxen">@<bdi>tuxen</bdi></a> said in <a href="/forum/post/66353">Very scary host reboot issue</a>:</p>
<blockquote>
<p dir="auto">Regardless the tests, indeed there's a bug somewhere because a malformed packet/frame should be handled and not triggering a crash.</p>
</blockquote>
<p dir="auto">Obviously, but it might be a clue on how to trigger the bug <img src="https://xcp-ng.org/forum/assets/plugins/nodebb-plugin-emoji/emoji/android/1f642.png?v=a78c449d9ac" class="not-responsive emoji emoji-android emoji--slightly_smiling_face" style="height:23px;width:auto;vertical-align:middle" title=":)" alt="🙂" /></p>
]]></description><link>https://xcp-ng.org/forum/post/66358</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/66358</guid><dc:creator><![CDATA[olivierlambert]]></dc:creator><pubDate>Fri, 06 Oct 2023 19:58:08 GMT</pubDate></item><item><title><![CDATA[Reply to Very scary host reboot issue on Fri, 06 Oct 2023 19:22:52 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/forum/user/darabontors" aria-label="Profile: darabontors">@<bdi>darabontors</bdi></a> said in <a href="/forum/post/66295">Very scary host reboot issue</a>:</p>
<blockquote>
<p dir="auto">Some other detail that might be unrelated: my PPPoE connection to my ISP has MTU 1492. <strong>WireGuard connection also has MTU 1492</strong>. Is this relevant in any way?</p>
</blockquote>
<p dir="auto">I'm not into firewall/tunneling stuff but shouldn't the WireGuard MTU be lower than the PPPoE one in order to fit the WG protocol overhead? I read that the <code>default=1420</code> and <code>minimum=1280</code>. I'd first reset the WG MTU to default and also test lower values within this range if the crash still persists.</p>
<p dir="auto">Regardless the tests, indeed there's a bug somewhere because a malformed packet/frame should be handled and not triggering a crash.</p>
]]></description><link>https://xcp-ng.org/forum/post/66353</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/66353</guid><dc:creator><![CDATA[tuxen]]></dc:creator><pubDate>Fri, 06 Oct 2023 19:22:52 GMT</pubDate></item></channel></rss>