XCP-ng
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    XCP-ng 8.3 updates announcements and testing

    Scheduled Pinned Locked Moved News
    297 Posts 34 Posters 96.6k Views 50 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • D Offline
      dinhngtu Vates 🪐 XCP-ng Team @acebmxer
      last edited by dinhngtu

      @acebmxer You can confirm if there are other affected VMs using this command:

      xe vm-list --minimal | xargs -d, -Ix sh -c "echo Scanning x 1>&2; varstore-ls x" > /dev/null
      

      If there are still affected VMs, you must fix them on varstored-1.2.0-3.2 by secureboot-certs clear + propagating before downgrading to 2.3 (if you wish).

      Note that downgrading to 2.3 with pool certs cleared means you'll need to set up guest Secure Boot again. So I recommend staying on 3.2 if it's possible for you.

      F 1 Reply Last reply Reply Quote 0
      • F Offline
        flakpyro @dinhngtu
        last edited by

        @dinhngtu The output of that command seems to result in the output of "Scanningn every UUID in my pool", most of which do not use SB. Im guessing that normal and i do not have any affected VMs any longer?

        1 Reply Last reply Reply Quote 0
        • A Offline
          acebmxer
          last edited by

          I opened a support ticket #7746470

          I get the following from different host...

          Pool1 Master host:
          [09:48 xcp-ng-vyadytkn ~]# xe vm-list --minimal | xargs -d, -Ix sh -c "echo Scanning x 1>&2; varstore-ls x" > /dev/null
          Scanning ab9e8cde-fad8-5089-29c8-c904a810857a
          Scanning d2025b59-6268-6bb9-28cd-e4812395563c
          Scanning 4567b8da-3a3c-00a4-cf6b-ccdae302a645
          Scanning 291f9d05-88c8-fc37-107a-368a55c649be
          Scanning 88d7ba09-e65a-dd82-8d45-ec3df3e3f9d4
          Scanning bcc182c6-dbb7-33c4-3e8b-c7db9b246e7b
          Scanning 5a2c18ca-e9ce-abfc-8bd7-2794f94c6c3a
          Scanning f4a4669a-2baf-47f2-b16a-08f60963e922
          Scanning d4352870-d73c-5cda-9470-ffd7cd01e251
          Scanning b0c21701-7309-dd9c-fa2a-bdc84a24565e
          Scanning 342b470e-fac9-6579-f82d-2517b8de6112
          Scanning 2c21c005-9230-f3f3-cdf6-2d39407b3456
          Scanning 102a5ac2-ab7f-68ca-9fa1-b549d64ec4a9
          Scanning c9dadc90-6fb8-eee7-d3e5-e1ae1024a77f
          Scanning 5703adef-d804-6b15-ba2f-7b3357a711bb
          Scanning a8858f86-ceab-2d5d-5d46-1b083c3fa399
          Scanning 82b191df-a63c-4357-b618-4467f714008a
          
          Pool 2 Master host (Problem VM)
          
          [10:02 localhost ~]# xe vm-list --minimal | xargs -d, -Ix sh -c "echo Scanning x 1>&2; varstore-ls x" > /dev/null
          Scanning ece6db75-533b-5359-1a99-28d5dc1a6912
          Scanning c81f1f1b-9f95-38ec-f96e-5ce8fea073e6
          unserialize_variables: Tolerating oversized data 60440 > 57344
          Scanning 4fb6dee8-c251-93e6-0c20-b1c1c67351ba
          Scanning 8a570993-6522-c837-0931-6fd1812dbd96
          Scanning b31749b8-bc1a-0e8a-a864-50a06391592e
          Scanning bf1b61d5-14ca-9f0e-7040-24c177693cea
          Scanning af6eeff7-5640-28a9-dbdb-87f094a04665
          Scanning 43ba924b-8bf7-4a50-b258-2e977f6f2f0c
          Scanning 5a625c92-3702-2ce6-1790-39497745e83c
          Scanning 9f36a8c5-c988-8546-b0f9-30ac9d0a5015
          Scanning a7f5b1bb-7fe2-d0b5-5187-f29e5d4d15d7
          
          
          D 1 Reply Last reply Reply Quote 0
          • G Offline
            Greg_E
            last edited by

            My production pool upgraded fine as far as I can tell, but not so good with the windows drivers, I'll make a thread on the drivers.

            1 Reply Last reply Reply Quote 2
            • D Offline
              dinhngtu Vates 🪐 XCP-ng Team @acebmxer
              last edited by

              @flakpyro said in XCP-ng 8.3 updates announcements and testing:

              @dinhngtu The output of that command seems to result in the output of "Scanningn every UUID in my pool", most of which do not use SB. Im guessing that normal and i do not have any affected VMs any longer?

              Yes, it'll produce an error message in unserialize_variables when there's a problem.

              @acebmxer Scanning on 1 host will scan the whole pool at once.

              In the output you posted, there's only c81f1f1b-9f95-38ec-f96e-5ce8fea073e6 which needs fixing.

              A 1 Reply Last reply Reply Quote 0
              • A Offline
                acebmxer @dinhngtu
                last edited by

                @dinhngtu

                @acebmxer Scanning on 1 host will scan the whole pool at once.

                In the output you posted, there's only c81f1f1b-9f95-38ec-f96e-5ce8fea073e6 which needs fixing.

                That is the same pool/host i ran the following command on.

                wget https://koji.xcp-ng.org/repos/user/8/8.3/xcpng-users.repo -O /etc/yum.repos.d/xcpng-users.repo
                yum update --enablerepo=xcp-ng-ndinh1 varstored varstored-tools
                secureboot-certs clear
                

                The vm being called out is the vm that would not boot that is booting now after running the above command.

                Is this the command i need to run?

                varstore-rm c81f1f1b-9f95-38ec-f96e-5ce8fea073e6 d719b2cb-3d3a-4596-a3bc-dad00e67656f dbx
                
                D 1 Reply Last reply Reply Quote 0
                • D Offline
                  dinhngtu Vates 🪐 XCP-ng Team @acebmxer
                  last edited by

                  @acebmxer Yes, that'll fix the situation.

                  Note that we're discussing a different approach for the official update, which will involve using a manual repair tool.

                  A 1 Reply Last reply Reply Quote 0
                  • A Offline
                    acebmxer @dinhngtu
                    last edited by

                    @dinhngtu
                    Thank you for all the help. See output below. Please let me know if you would like for me to test anything from my side.

                    [10:02 localhost ~]# xe vm-list --minimal | xargs -d, -Ix sh -c "echo Scanning x 1>&2; varstore-ls x" > /dev/null
                    Scanning ece6db75-533b-5359-1a99-28d5dc1a6912
                    Scanning c81f1f1b-9f95-38ec-f96e-5ce8fea073e6
                    unserialize_variables: Tolerating oversized data 60440 > 57344
                    Scanning 4fb6dee8-c251-93e6-0c20-b1c1c67351ba
                    Scanning 8a570993-6522-c837-0931-6fd1812dbd96
                    Scanning b31749b8-bc1a-0e8a-a864-50a06391592e
                    Scanning bf1b61d5-14ca-9f0e-7040-24c177693cea
                    Scanning af6eeff7-5640-28a9-dbdb-87f094a04665
                    Scanning 43ba924b-8bf7-4a50-b258-2e977f6f2f0c
                    Scanning 5a625c92-3702-2ce6-1790-39497745e83c
                    Scanning 9f36a8c5-c988-8546-b0f9-30ac9d0a5015
                    Scanning a7f5b1bb-7fe2-d0b5-5187-f29e5d4d15d7
                    
                    [10:23 localhost ~]# varstore-rm c81f1f1b-9f95-38ec-f96e-5ce8fea073e6 d719b2cb-3d3a-4596-a3bc-dad00e67656f dbx
                    unserialize_variables: Tolerating oversized data 60440 > 57344
                    [11:40 localhost ~]# xe vm-list --minimal | xargs -d, -Ix sh -c "echo Scanning x 1>&2; varstore-ls x" > /dev/null
                    Scanning ece6db75-533b-5359-1a99-28d5dc1a6912
                    Scanning c81f1f1b-9f95-38ec-f96e-5ce8fea073e6
                    Scanning 4fb6dee8-c251-93e6-0c20-b1c1c67351ba
                    Scanning 8a570993-6522-c837-0931-6fd1812dbd96
                    Scanning b31749b8-bc1a-0e8a-a864-50a06391592e
                    Scanning bf1b61d5-14ca-9f0e-7040-24c177693cea
                    Scanning af6eeff7-5640-28a9-dbdb-87f094a04665
                    Scanning 43ba924b-8bf7-4a50-b258-2e977f6f2f0c
                    Scanning 5a625c92-3702-2ce6-1790-39497745e83c
                    Scanning 9f36a8c5-c988-8546-b0f9-30ac9d0a5015
                    Scanning a7f5b1bb-7fe2-d0b5-5187-f29e5d4d15d7
                    [11:40 localhost ~]#
                    
                    D 1 Reply Last reply Reply Quote 0
                    • D Offline
                      dinhngtu Vates 🪐 XCP-ng Team @acebmxer
                      last edited by

                      @acebmxer All looks good from the output. There might be some VMs that need fixes for Windows dbx updates to work properly, I'll try to add that in the official version.

                      1 Reply Last reply Reply Quote 0
                      • J Offline
                        john.c @stormi
                        last edited by john.c

                        @stormi said in XCP-ng 8.3 updates announcements and testing:

                        📣 IMPORTANT NOTICE!

                        After publishing the updates, we discovered a very nasty bug when using the UEFI certificates that we distribute. Long story short, they're too big, and there's only limited space (57K), and combined to a preexisting bug in varstored, this will cause the VM to stop booting after Windows or any other OS attempts to append to the DBX (revocation database).

                        We pulled the varstored update, but those who updated can be affected.

                        There are conditions for the issue:

                        • Existing VMs are not affected, unless you propagated the new certs to them
                        • New VMs are affected only if you never installed UEFI certs to the pool yourself (through XOA or secureboot-certs install), or cleared them using secureboot-certs clear in order to use our default certificates.

                        If you have the affected version of varstored (rpm -q varstored yields varstored-1.2.0-3.1.xcpng8.3) :

                        • on every host, downgrade it with yum downgrade varstored-1.2.0-2.3.xcpng8.3. No reboot or toolstack restart required.
                        • if you have affected UEFI VMs, that is VMs that meet the conditions above but are not broken yet, don't install updates, turn them off, and fix them by deleting their DBX database: https://docs.xcp-ng.org/guides/guest-UEFI-Secure-Boot/#remove-certificates-from-a-vm. This has to be done when the VM is off. Your OS will add its own DBX afterwards.
                        • If you already have broken VMs (this warning reaching you too late), revert to a snapshot or backup. Other ways to fix them will require a patched varstored currently in the making.

                        @dinhngtu A little trick for the future when determining whether a user’s system, is affected by a bad update based on version, as well as remediation checks.

                        You can use “yum history list <packagename>”, to retrieve transaction IDs. The script can then iterate over the transaction IDs retrieving the package versions.

                        The specific transaction info can be retrieved with “yum history info <transaction_id>”. This will enable you to go back much further, thus seeing if remediation is required more easily!!

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post