Did minor testing. Seems ok.
Haven't tested Backups.
Best posts made by gb.123
-
RE: XCP-ng 8.3 updates announcements and testing
-
RE: Xen 4.17 on XCP-ng 8.3!
WHAT THIS VERSION OF XEN CHANGES
I must admit I haven't done my homework yet here. You can check the upstream changelogs at the Xen Project. I'll update this post if someone provides a useful bullet list.
Here you go :
Notable Features
This release has seen the increase in hardware support for both x86 and Arm, together with the addition of other improvements and features:- MISRA-C integration: The project has officially adopted four directives and 24 rules, added MISRA-C checker build integration, and defined how to document deviations. A number of MISRA-C violations have been fixed.
- Static configuration options for ARM: In many embedded environments, we know ahead of time exactly what resources all guests will need at boot time. In constrained resource environments, allocation on use increases the possibility that the allocation will fail at runtime. With static configuration, resources are allocated statically when the hypervisor boots, removing the possibility of runtime failure. Resources which can be statically configured as of 4.17 include event channels, shared memory, and hypervisor heap.
- ARM: Add βtech previewβ implementation for VirtIO. Xen now includes full support for VirtIO on embedded systems, on ARM, for the virtio-mmio transport, allowing a wide range of VirtIO devices to be supported. This includes front-end support in Linux, toolstack (libxl/xl) and dom0less support, and a userspace backend. Currently, the following stand-alone backends are available and have been tested: virtio-disk, virtio-net, i2c, and gpio.
- dom0less / Hyperlaunch: cpupools can be specified at boot using device tree. This allows the use of cpupools in dom0less / Hyperlaunch -style configurations; in particular, it makes it possible to assign different types of CPUs of an ARM big.LITTLE system to different cpupools at boot time.
- dom0less / Hyperlaunch: PV frontend / backend connections can now be specified between guests, allowing statically booted guests with PV devices
- On ARM, p2m structures are now allocated out of a pool of memory set aside at domain creation; this provides better isolation between guests against memory resource failures
- ARM: Mitigations against Spectre-BHB
- x86: IOMMU superpage support for all guest types; improving performance of PCI pass-through
- x86: Security support hosts with up to 12 TiB of RAM
- x86: Can now set cpuid parameters for dom0 at boot time
- x86: mwait-idle support: Added SPR and ADL
- x86: Improved speculative mitigation support, including VIRT_SSBD and MSR_SPEC_CTRL features to help guests know what speculative mitigations they don't need to be done (due to mitigations on the hypervisor side), and to control what kind of speculative mitigations the hypervisor performs on their behalf
- Out-of-tree builds for the hypervisor now supported
- ARM: Since addition of Zephyr RTOS guests support (Xen 4.15, Zephyr 3.1.0), work has been done on making it possible to run Zephyr in dom0 improving boot time, stability and paving the way for future safety certification for Xen-based systems
Source : https://wiki.xenproject.org/wiki/Xen_Project_4.17_Feature_List
-
RE: XCP-ng 8.3 updates announcements and testing
@stormi said in XCP-ng 8.3 updates announcements and testing:
A few days late because internal tests led to a few fixes, here are the pre-release ISO images for a refreshed XCP-ng 8.3 installer:
$ cat SHA256SUMS 22deae59e7c5cff7d4691c447af9dbf27b29a372748c1844c280bdc212ef2a5f xcp-ng-8.3-20250606-linstor-upgradeonly.pre3.iso 9a5dcc8d98949ee207d28307b8b94320d1ffd24841e34ca74e1c0f0422e5ecab xcp-ng-8.3-20250606-netinstall.pre3.iso 4d6f5a99da0d70920bc313470ad2b14decab66038f0863ca68a2b81126ee2977 xcp-ng-8.3-20250606.pre3.iso
- No need to upgrade XCP-ng 8.3 with these. It is not a new release. It's refreshed installation images, with all updates included.
- When we release them, at the same time, XCP-ng 8.3 will be officially labeled LTS. Again, the existing XCP-ng 8.3 that you already use. Not a new XCP-ng release.
- This is also when XOSTOR becomes officially supported in XCP-ng 8.3
.
This is definitely the best part... I just installed XCP-NG on my test bench (a few days back) with the previous ISOs to test the updates !
Will try this ISO as soon as I get my new PC!
Was eagerly waiting to try XOSTOR in the meantime. -
RE: XCP-ng 8.3 betas and RCs feedback π
I have a suggestion w.r.t interface-rename.
Can we have a screen at the installation (using iso method) which lists all the NICs and we can rename the interfaces at install time itself ? -
RE: XOSTOR on 8.3?
@olivierlambert
I don't mean to push or ask for an ETA; but since it's been a few months so I was wondering if there is any update on this ?
Waiting eagerly to have XOSTOR on 8.3 -
RE: XCP-ng 8.3 betas and RCs feedback π
Installed in my Homelab. Install went smoothly.
Small bugs I have noticed :
1.
This ONLY happens when using KVM and 'scaling' the display to fit window.
This happens ONLY on the first boot after applying patch ( 6 programs ) once release iso is installed.
This goes away from the second boot.
Everything seems to be working smoothly for now. Kudos to the Vates Team !
-
RE: XCP-ng 8.3 betas and RCs feedback π
For everyone who needs to ensure
usb-policy.conf
remains intact after update/reboot, I have posted a workaround script here.Please note this is a workaround script only till a better implementation is done by the xcp-ng team.
-
RE: XCP-ng 8.3 betas and RCs feedback π
Thanks for the prompt reply !
You are right. The device was filtered. I am now removing from filter and re-testing.
Update: Re-tested and everything seems to work fine.
I will further try to use the signature device to see if it actually works inside the VM.PS: I see no reason to filter tokens by default. Can we remove the DENY line for smartcards by default ?
We also need to add :DENY: Class=03 subclass=00 prot=00 # HID
as this class is used by some MSI motherboards for HID. Since rest of the HID are filtered, this should be added too for consistency sake. -
RE: EOL: XCP-ng Center has come to an end (New Maintainer!)
Very excited to receive a wonderful and detailed reply from @michael-manley.
Thanks @michael-manley for taking over the maintenance of XCP-ng Center!
Latest posts made by gb.123
-
RE: XCP-ng 8.3 updates announcements and testing
@stormi
Just for clarification sake (I know this might have been said before), installing patches is the same as upgrading from iso in this case ?
(Unlike with previous update where it was mandatory to upgrade using iso) -
RE: XCP-ng 8.3 updates announcements and testing
Did minor testing. Seems ok.
Haven't tested Backups. -
RE: Compatibility of Intel Ultra processors with XCP-ng
Can anyone tell me if the P & E cores can be explicitly chosen while allotting it to the VM or do they get allotted randomly ?
-
RE: Intel CPUs with P and E cores or other server CPU suggestions
Can you let me know if you can 'choose' between the P & E Cores when assigning it to the VM ? Or does it allot randomly ?
-
RE: Pass Through of USB Storage Adapters Not Working
Could it be that the drive is not getting detected due to some speed mismatch (backward compatibility while negotiating connection) ?
^
This is just a guess -
RE: Pass Through of USB Storage Adapters Not Working
@stormi @andriy.sultanov @olivierlambert
I can confirm the issue for Windows 10 Guest on XCP-Ng 8.3 (Latest updates installed)
Testing Procedure & Findings:
If the drive enclosure is plugged into USB3 port (USB 3.2), then Windows 10 does not recognize the SSD. If the same enclosure is plugged into USB2 port, then Windows 10 can recognize the drive.XCP-Ng shows the device in XO as USB 3.2 and also creates a vUSB 3.2 for the Guest. But the guest itself does not recognize this.
Also tested the enclosure on another PC directly running Windows 10 and the enclosure seems to work fine there.
Hardware Used:
RTL9210B-CG based SSD Enclosure (USB 3.2) -
RE: XCP-ng 8.3 updates announcements and testing
@stormi said in XCP-ng 8.3 updates announcements and testing:
A few days late because internal tests led to a few fixes, here are the pre-release ISO images for a refreshed XCP-ng 8.3 installer:
$ cat SHA256SUMS 22deae59e7c5cff7d4691c447af9dbf27b29a372748c1844c280bdc212ef2a5f xcp-ng-8.3-20250606-linstor-upgradeonly.pre3.iso 9a5dcc8d98949ee207d28307b8b94320d1ffd24841e34ca74e1c0f0422e5ecab xcp-ng-8.3-20250606-netinstall.pre3.iso 4d6f5a99da0d70920bc313470ad2b14decab66038f0863ca68a2b81126ee2977 xcp-ng-8.3-20250606.pre3.iso
- No need to upgrade XCP-ng 8.3 with these. It is not a new release. It's refreshed installation images, with all updates included.
- When we release them, at the same time, XCP-ng 8.3 will be officially labeled LTS. Again, the existing XCP-ng 8.3 that you already use. Not a new XCP-ng release.
- This is also when XOSTOR becomes officially supported in XCP-ng 8.3
.
This is definitely the best part... I just installed XCP-NG on my test bench (a few days back) with the previous ISOs to test the updates !
Will try this ISO as soon as I get my new PC!
Was eagerly waiting to try XOSTOR in the meantime. -
RE: XOSTOR on 8.3?
@olivierlambert
I don't mean to push or ask for an ETA; but since it's been a few months so I was wondering if there is any update on this ?
Waiting eagerly to have XOSTOR on 8.3 -
RE: AMD MxGPU
Wow Olivier ! Such quick response ! I am truly amazed !
MxGPU working with XCP-NG could be HUGE for people with data-centers.