XCP-ng
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    XCP-ng 8.3 updates announcements and testing

    Scheduled Pinned Locked Moved News
    297 Posts 34 Posters 103.2k Views 50 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • A Offline
      acebmxer @dinhngtu
      last edited by acebmxer

      @dinhngtu

      All 4 host have the same version. They were just not updated the same way at the same time was the point i was making and that so far only 1 vm seems to be affected.

      But i guess to play it self i should downgrade all 4 host.

      Edit - ran the following commands on master host of pool with the vm with issue. VM now boots up.

      Sorry for all the questions.

      wget https://koji.xcp-ng.org/repos/user/8/8.3/xcpng-users.repo -O /etc/yum.repos.d/xcpng-users.repo
      yum update --enablerepo=xcp-ng-ndinh1 varstored varstored-tools
      secureboot-certs clear
      

      Should run that above commands on all the remaining host?

      Or should i run this command on any of the four host?

      yum downgrade varstored-1.2.0-2.3.xcpng8.3
      
      D 1 Reply Last reply Reply Quote 0
      • D Offline
        dinhngtu Vates 🪐 XCP-ng Team @acebmxer
        last edited by dinhngtu

        @acebmxer You can confirm if there are other affected VMs using this command:

        xe vm-list --minimal | xargs -d, -Ix sh -c "echo Scanning x 1>&2; varstore-ls x" > /dev/null
        

        If there are still affected VMs, you must fix them on varstored-1.2.0-3.2 by secureboot-certs clear + propagating before downgrading to 2.3 (if you wish).

        Note that downgrading to 2.3 with pool certs cleared means you'll need to set up guest Secure Boot again. So I recommend staying on 3.2 if it's possible for you.

        F 1 Reply Last reply Reply Quote 0
        • F Offline
          flakpyro @dinhngtu
          last edited by

          @dinhngtu The output of that command seems to result in the output of "Scanningn every UUID in my pool", most of which do not use SB. Im guessing that normal and i do not have any affected VMs any longer?

          1 Reply Last reply Reply Quote 0
          • A Offline
            acebmxer
            last edited by

            I opened a support ticket #7746470

            I get the following from different host...

            Pool1 Master host:
            [09:48 xcp-ng-vyadytkn ~]# xe vm-list --minimal | xargs -d, -Ix sh -c "echo Scanning x 1>&2; varstore-ls x" > /dev/null
            Scanning ab9e8cde-fad8-5089-29c8-c904a810857a
            Scanning d2025b59-6268-6bb9-28cd-e4812395563c
            Scanning 4567b8da-3a3c-00a4-cf6b-ccdae302a645
            Scanning 291f9d05-88c8-fc37-107a-368a55c649be
            Scanning 88d7ba09-e65a-dd82-8d45-ec3df3e3f9d4
            Scanning bcc182c6-dbb7-33c4-3e8b-c7db9b246e7b
            Scanning 5a2c18ca-e9ce-abfc-8bd7-2794f94c6c3a
            Scanning f4a4669a-2baf-47f2-b16a-08f60963e922
            Scanning d4352870-d73c-5cda-9470-ffd7cd01e251
            Scanning b0c21701-7309-dd9c-fa2a-bdc84a24565e
            Scanning 342b470e-fac9-6579-f82d-2517b8de6112
            Scanning 2c21c005-9230-f3f3-cdf6-2d39407b3456
            Scanning 102a5ac2-ab7f-68ca-9fa1-b549d64ec4a9
            Scanning c9dadc90-6fb8-eee7-d3e5-e1ae1024a77f
            Scanning 5703adef-d804-6b15-ba2f-7b3357a711bb
            Scanning a8858f86-ceab-2d5d-5d46-1b083c3fa399
            Scanning 82b191df-a63c-4357-b618-4467f714008a
            
            Pool 2 Master host (Problem VM)
            
            [10:02 localhost ~]# xe vm-list --minimal | xargs -d, -Ix sh -c "echo Scanning x 1>&2; varstore-ls x" > /dev/null
            Scanning ece6db75-533b-5359-1a99-28d5dc1a6912
            Scanning c81f1f1b-9f95-38ec-f96e-5ce8fea073e6
            unserialize_variables: Tolerating oversized data 60440 > 57344
            Scanning 4fb6dee8-c251-93e6-0c20-b1c1c67351ba
            Scanning 8a570993-6522-c837-0931-6fd1812dbd96
            Scanning b31749b8-bc1a-0e8a-a864-50a06391592e
            Scanning bf1b61d5-14ca-9f0e-7040-24c177693cea
            Scanning af6eeff7-5640-28a9-dbdb-87f094a04665
            Scanning 43ba924b-8bf7-4a50-b258-2e977f6f2f0c
            Scanning 5a625c92-3702-2ce6-1790-39497745e83c
            Scanning 9f36a8c5-c988-8546-b0f9-30ac9d0a5015
            Scanning a7f5b1bb-7fe2-d0b5-5187-f29e5d4d15d7
            
            
            D 1 Reply Last reply Reply Quote 0
            • G Offline
              Greg_E
              last edited by

              My production pool upgraded fine as far as I can tell, but not so good with the windows drivers, I'll make a thread on the drivers.

              1 Reply Last reply Reply Quote 2
              • D Offline
                dinhngtu Vates 🪐 XCP-ng Team @acebmxer
                last edited by

                @flakpyro said in XCP-ng 8.3 updates announcements and testing:

                @dinhngtu The output of that command seems to result in the output of "Scanningn every UUID in my pool", most of which do not use SB. Im guessing that normal and i do not have any affected VMs any longer?

                Yes, it'll produce an error message in unserialize_variables when there's a problem.

                @acebmxer Scanning on 1 host will scan the whole pool at once.

                In the output you posted, there's only c81f1f1b-9f95-38ec-f96e-5ce8fea073e6 which needs fixing.

                A 1 Reply Last reply Reply Quote 0
                • A Offline
                  acebmxer @dinhngtu
                  last edited by

                  @dinhngtu

                  @acebmxer Scanning on 1 host will scan the whole pool at once.

                  In the output you posted, there's only c81f1f1b-9f95-38ec-f96e-5ce8fea073e6 which needs fixing.

                  That is the same pool/host i ran the following command on.

                  wget https://koji.xcp-ng.org/repos/user/8/8.3/xcpng-users.repo -O /etc/yum.repos.d/xcpng-users.repo
                  yum update --enablerepo=xcp-ng-ndinh1 varstored varstored-tools
                  secureboot-certs clear
                  

                  The vm being called out is the vm that would not boot that is booting now after running the above command.

                  Is this the command i need to run?

                  varstore-rm c81f1f1b-9f95-38ec-f96e-5ce8fea073e6 d719b2cb-3d3a-4596-a3bc-dad00e67656f dbx
                  
                  D 1 Reply Last reply Reply Quote 0
                  • D Offline
                    dinhngtu Vates 🪐 XCP-ng Team @acebmxer
                    last edited by

                    @acebmxer Yes, that'll fix the situation.

                    Note that we're discussing a different approach for the official update, which will involve using a manual repair tool.

                    A 1 Reply Last reply Reply Quote 0
                    • A Offline
                      acebmxer @dinhngtu
                      last edited by

                      @dinhngtu
                      Thank you for all the help. See output below. Please let me know if you would like for me to test anything from my side.

                      [10:02 localhost ~]# xe vm-list --minimal | xargs -d, -Ix sh -c "echo Scanning x 1>&2; varstore-ls x" > /dev/null
                      Scanning ece6db75-533b-5359-1a99-28d5dc1a6912
                      Scanning c81f1f1b-9f95-38ec-f96e-5ce8fea073e6
                      unserialize_variables: Tolerating oversized data 60440 > 57344
                      Scanning 4fb6dee8-c251-93e6-0c20-b1c1c67351ba
                      Scanning 8a570993-6522-c837-0931-6fd1812dbd96
                      Scanning b31749b8-bc1a-0e8a-a864-50a06391592e
                      Scanning bf1b61d5-14ca-9f0e-7040-24c177693cea
                      Scanning af6eeff7-5640-28a9-dbdb-87f094a04665
                      Scanning 43ba924b-8bf7-4a50-b258-2e977f6f2f0c
                      Scanning 5a625c92-3702-2ce6-1790-39497745e83c
                      Scanning 9f36a8c5-c988-8546-b0f9-30ac9d0a5015
                      Scanning a7f5b1bb-7fe2-d0b5-5187-f29e5d4d15d7
                      
                      [10:23 localhost ~]# varstore-rm c81f1f1b-9f95-38ec-f96e-5ce8fea073e6 d719b2cb-3d3a-4596-a3bc-dad00e67656f dbx
                      unserialize_variables: Tolerating oversized data 60440 > 57344
                      [11:40 localhost ~]# xe vm-list --minimal | xargs -d, -Ix sh -c "echo Scanning x 1>&2; varstore-ls x" > /dev/null
                      Scanning ece6db75-533b-5359-1a99-28d5dc1a6912
                      Scanning c81f1f1b-9f95-38ec-f96e-5ce8fea073e6
                      Scanning 4fb6dee8-c251-93e6-0c20-b1c1c67351ba
                      Scanning 8a570993-6522-c837-0931-6fd1812dbd96
                      Scanning b31749b8-bc1a-0e8a-a864-50a06391592e
                      Scanning bf1b61d5-14ca-9f0e-7040-24c177693cea
                      Scanning af6eeff7-5640-28a9-dbdb-87f094a04665
                      Scanning 43ba924b-8bf7-4a50-b258-2e977f6f2f0c
                      Scanning 5a625c92-3702-2ce6-1790-39497745e83c
                      Scanning 9f36a8c5-c988-8546-b0f9-30ac9d0a5015
                      Scanning a7f5b1bb-7fe2-d0b5-5187-f29e5d4d15d7
                      [11:40 localhost ~]#
                      
                      D 1 Reply Last reply Reply Quote 0
                      • D Offline
                        dinhngtu Vates 🪐 XCP-ng Team @acebmxer
                        last edited by

                        @acebmxer All looks good from the output. There might be some VMs that need fixes for Windows dbx updates to work properly, I'll try to add that in the official version.

                        1 Reply Last reply Reply Quote 0
                        • J Offline
                          john.c @stormi
                          last edited by john.c

                          @stormi said in XCP-ng 8.3 updates announcements and testing:

                          📣 IMPORTANT NOTICE!

                          After publishing the updates, we discovered a very nasty bug when using the UEFI certificates that we distribute. Long story short, they're too big, and there's only limited space (57K), and combined to a preexisting bug in varstored, this will cause the VM to stop booting after Windows or any other OS attempts to append to the DBX (revocation database).

                          We pulled the varstored update, but those who updated can be affected.

                          There are conditions for the issue:

                          • Existing VMs are not affected, unless you propagated the new certs to them
                          • New VMs are affected only if you never installed UEFI certs to the pool yourself (through XOA or secureboot-certs install), or cleared them using secureboot-certs clear in order to use our default certificates.

                          If you have the affected version of varstored (rpm -q varstored yields varstored-1.2.0-3.1.xcpng8.3) :

                          • on every host, downgrade it with yum downgrade varstored-1.2.0-2.3.xcpng8.3. No reboot or toolstack restart required.
                          • if you have affected UEFI VMs, that is VMs that meet the conditions above but are not broken yet, don't install updates, turn them off, and fix them by deleting their DBX database: https://docs.xcp-ng.org/guides/guest-UEFI-Secure-Boot/#remove-certificates-from-a-vm. This has to be done when the VM is off. Your OS will add its own DBX afterwards.
                          • If you already have broken VMs (this warning reaching you too late), revert to a snapshot or backup. Other ways to fix them will require a patched varstored currently in the making.

                          @dinhngtu A little trick for the future when determining whether a user’s system, is affected by a bad update based on version, as well as remediation checks.

                          You can use “yum history list <packagename>”, to retrieve transaction IDs. The script can then iterate over the transaction IDs retrieving the package versions.

                          The specific transaction info can be retrieved with “yum history info <transaction_id>”. This will enable you to go back much further, thus seeing if remediation is required more easily!!

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post