Red Hat Enterprise Linux-8-8.6 Release Notes-En-Us
Red Hat Enterprise Linux-8-8.6 Release Notes-En-Us
The text of and illustrations in this document are licensed by Red Hat under a Creative Commons
Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is
available at
http://creativecommons.org/licenses/by-sa/3.0/
. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must
provide the URL for the original version.
Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert,
Section 4d of CC-BY-SA to the fullest extent permitted by applicable law.
Red Hat, Red Hat Enterprise Linux, the Shadowman logo, the Red Hat logo, JBoss, OpenShift,
Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States
and other countries.
Linux ® is the registered trademark of Linus Torvalds in the United States and other countries.
XFS ® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States
and/or other countries.
MySQL ® is a registered trademark of MySQL AB in the United States, the European Union and
other countries.
Node.js ® is an official trademark of Joyent. Red Hat is not formally related to or endorsed by the
official Joyent Node.js open source or commercial project.
The OpenStack ® Word Mark and OpenStack logo are either registered trademarks/service marks
or trademarks/service marks of the OpenStack Foundation, in the United States and other
countries and are used with the OpenStack Foundation's permission. We are not affiliated with,
endorsed or sponsored by the OpenStack Foundation, or the OpenStack community.
Abstract
The Release Notes provide high-level coverage of the improvements and additions that have been
implemented in Red Hat Enterprise Linux 8.6 and document known problems in this release, as well
as notable bug fixes, Technology Previews, deprecated functionality, and other details. For
information about installing Red Hat Enterprise Linux, see Installation.
Table of Contents
Table of Contents
. . . . . . . . . .OPEN
MAKING . . . . . . SOURCE
. . . . . . . . . .MORE
. . . . . . .INCLUSIVE
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5. . . . . . . . . . . . .
. . . . . . . . . . . . . FEEDBACK
PROVIDING . . . . . . . . . . . . ON
. . . .RED
. . . . .HAT
. . . . .DOCUMENTATION
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6. . . . . . . . . . . . .
.CHAPTER
. . . . . . . . . . 1.. .OVERVIEW
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7. . . . . . . . . . . . .
1.1. MAJOR CHANGES IN RHEL 8.6 7
Security 7
Dynamic programming languages, web and database servers 7
Compilers and development tools 7
Updated compiler toolsets 7
Java implementations in RHEL 8 7
Java tools 8
Identity Management 8
1.2. IN-PLACE UPGRADE AND OS CONVERSION 8
In-place upgrade from RHEL 7 to RHEL 8 8
In-place upgrade from RHEL 6 to RHEL 8 9
In-place upgrade from RHEL 8 to RHEL 9 9
Conversion from a different Linux distribution to RHEL 9
1.3. RED HAT CUSTOMER PORTAL LABS 9
1.4. ADDITIONAL RESOURCES 10
. . . . . . . . . . . 2.
CHAPTER . . ARCHITECTURES
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11. . . . . . . . . . . . .
.CHAPTER
. . . . . . . . . . 3.
. . DISTRIBUTION
. . . . . . . . . . . . . . . . OF
. . . .CONTENT
. . . . . . . . . . .IN
. . .RHEL
. . . . . .8. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
..............
3.1. INSTALLATION 12
3.2. REPOSITORIES 12
3.3. APPLICATION STREAMS 13
3.4. PACKAGE MANAGEMENT WITH YUM/DNF 13
. . . . . . . . . . . 4.
CHAPTER . . .NEW
. . . . .FEATURES
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
..............
4.1. INSTALLER AND IMAGE CREATION 14
4.2. RHEL FOR EDGE 14
4.3. SUBSCRIPTION MANAGEMENT 15
4.4. SOFTWARE MANAGEMENT 15
4.5. SHELLS AND COMMAND-LINE TOOLS 15
4.6. INFRASTRUCTURE SERVICES 17
4.7. SECURITY 19
4.8. NETWORKING 24
4.9. KERNEL 26
4.10. FILE SYSTEMS AND STORAGE 28
4.11. HIGH AVAILABILITY AND CLUSTERS 30
4.12. DYNAMIC PROGRAMMING LANGUAGES, WEB AND DATABASE SERVERS 31
4.13. COMPILERS AND DEVELOPMENT TOOLS 32
4.14. IDENTITY MANAGEMENT 37
4.15. DESKTOP 39
4.16. GRAPHICS INFRASTRUCTURES 40
4.17. THE WEB CONSOLE 40
4.18. RED HAT ENTERPRISE LINUX SYSTEM ROLES 41
4.19. VIRTUALIZATION 46
4.20. RHEL IN CLOUD ENVIRONMENTS 46
4.21. SUPPORTABILITY 47
4.22. CONTAINERS 48
1
Red Hat Enterprise Linux 8.6 8.6 Release Notes
.CHAPTER
. . . . . . . . . . 5.
. . IMPORTANT
. . . . . . . . . . . . . .CHANGES
. . . . . . . . . . .TO
. . . .EXTERNAL
. . . . . . . . . . . .KERNEL
. . . . . . . . .PARAMETERS
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
..............
New kernel parameters 51
Updated kernel parameters 52
.CHAPTER
. . . . . . . . . . 6.
. . .DEVICE
. . . . . . . .DRIVERS
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .55
..............
6.1. NEW DRIVERS 55
Network drivers 55
Graphics drivers and miscellaneous drivers 55
6.2. UPDATED DRIVERS 55
Network drivers 55
Storage drivers 56
Graphics and miscellaneous driver updates 56
.CHAPTER
. . . . . . . . . . 7.
. . BUG
. . . . . .FIXES
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .57
..............
7.1. INSTALLER AND IMAGE CREATION 57
7.2. SOFTWARE MANAGEMENT 57
7.3. SHELLS AND COMMAND-LINE TOOLS 58
7.4. SECURITY 58
7.5. NETWORKING 62
7.6. KERNEL 62
7.7. FILE SYSTEMS AND STORAGE 63
7.8. COMPILERS AND DEVELOPMENT TOOLS 64
7.9. IDENTITY MANAGEMENT 64
7.10. GRAPHICS INFRASTRUCTURES 66
7.11. RED HAT ENTERPRISE LINUX SYSTEM ROLES 67
7.12. VIRTUALIZATION 70
7.13. CONTAINERS 71
. . . . . . . . . . . 8.
CHAPTER . . .TECHNOLOGY
. . . . . . . . . . . . . . . PREVIEWS
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .72
..............
8.1. RHEL FOR EDGE 72
8.2. SHELLS AND COMMAND-LINE TOOLS 72
8.3. NETWORKING 72
8.4. KERNEL 74
8.5. FILE SYSTEMS AND STORAGE 75
8.6. HIGH AVAILABILITY AND CLUSTERS 78
8.7. IDENTITY MANAGEMENT 79
8.8. DESKTOP 80
8.9. GRAPHICS INFRASTRUCTURES 81
8.10. THE WEB CONSOLE 81
8.11. VIRTUALIZATION 81
8.12. CONTAINERS 83
.CHAPTER
. . . . . . . . . . 9.
. . .DEPRECATED
. . . . . . . . . . . . . . .FUNCTIONALITY
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .84
..............
9.1. INSTALLER AND IMAGE CREATION 84
9.2. SOFTWARE MANAGEMENT 85
9.3. SHELLS AND COMMAND-LINE TOOLS 85
9.4. SECURITY 86
9.5. NETWORKING 88
9.6. KERNEL 89
9.7. BOOT LOADER 90
9.8. FILE SYSTEMS AND STORAGE 90
9.9. HIGH AVAILABILITY AND CLUSTERS 92
9.10. DYNAMIC PROGRAMMING LANGUAGES, WEB AND DATABASE SERVERS 92
9.11. COMPILERS AND DEVELOPMENT TOOLS 93
2
Table of Contents
. . . . . . . . . . . 10.
CHAPTER . . . KNOWN
. . . . . . . . . ISSUES
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .139
...............
10.1. INSTALLER AND IMAGE CREATION 139
10.2. SUBSCRIPTION MANAGEMENT 140
10.3. SOFTWARE MANAGEMENT 141
10.4. SHELLS AND COMMAND-LINE TOOLS 141
10.5. INFRASTRUCTURE SERVICES 142
10.6. SECURITY 142
10.7. NETWORKING 147
10.8. KERNEL 149
10.9. FILE SYSTEMS AND STORAGE 154
10.10. DYNAMIC PROGRAMMING LANGUAGES, WEB AND DATABASE SERVERS 156
10.11. IDENTITY MANAGEMENT 157
10.12. DESKTOP 160
10.13. GRAPHICS INFRASTRUCTURES 160
10.14. THE WEB CONSOLE 161
10.15. RED HAT ENTERPRISE LINUX SYSTEM ROLES 162
10.16. VIRTUALIZATION 162
10.17. RHEL IN CLOUD ENVIRONMENTS 166
10.18. SUPPORTABILITY 168
10.19. CONTAINERS 169
. . . . . . . . . . . 11.
CHAPTER . . .INTERNATIONALIZATION
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .171
..............
11.1. RED HAT ENTERPRISE LINUX 8 INTERNATIONAL LANGUAGES 171
11.2. NOTABLE CHANGES TO INTERNATIONALIZATION IN RHEL 8 171
. . . . . . . . . . . .A.
APPENDIX . . LIST
. . . . . .OF
. . . TICKETS
. . . . . . . . . .BY
. . . COMPONENT
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
...............
. . . . . . . . . . . .B.
APPENDIX . . REVISION
. . . . . . . . . . . HISTORY
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .180
...............
3
Red Hat Enterprise Linux 8.6 8.6 Release Notes
4
MAKING OPEN SOURCE MORE INCLUSIVE
5
Red Hat Enterprise Linux 8.6 8.6 Release Notes
4. Enter your suggestion for improvement in the Description field. Include links to the relevant
parts of the documentation.
6
CHAPTER 1. OVERVIEW
CHAPTER 1. OVERVIEW
Packages for fapolicyd have been upgraded to the upstream version 1.1. Among other improvements,
you can now use the new rules.d/ and trust.d/ directories, the fagenrules script, and new options for
the fapolicyd-cli command.
The pcsc-lite packages have been rebased to upstream version 1.9.5, which provides many
enhancements and bug fixes.
You can now verify the versions of installed SELinux policy modules with the newly added --checksum
option to the semodule command.
The SCAP Security Guide (SSG) packages have been rebased to upstream version 0.1.60, and the
OpenSCAP packages have been rebased to upstream version 1.3.6.
PHP 8.0
Perl 5.32
See New features - Dynamic programming languages, web and database servers for more information.
GCC Toolset 11
Go Toolset 1.17.7
See New features - Compilers and development tools for more information.
The java-17-openjdk packages, which provide the OpenJDK 17 Java Runtime Environment and
the OpenJDK 17 Java Software Development Kit.
The java-11-openjdk packages, which provide the OpenJDK 11 Java Runtime Environment and
7
Red Hat Enterprise Linux 8.6 8.6 Release Notes
The java-11-openjdk packages, which provide the OpenJDK 11 Java Runtime Environment and
the OpenJDK 11 Java Software Development Kit.
The java-1.8.0-openjdk packages, which provide the OpenJDK 8 Java Runtime Environment
and the OpenJDK 8 Java Software Development Kit.
Java tools
RHEL 8.6 introduces a new log4j:2 module, which contains Apache Log4j 2, which is a Java logging
utility and a library enabling you to output log statements to a variety of output targets.
For more information, see New features - Compilers and development tools . information.
Identity Management
The ansible-freeipa roles and modules are now available in the Ansible Automation Hub, which provides
fast updates of the ansible-freeipa content.
From RHEL 7.9 to RHEL 8.4 and RHEL 8.6 on the 64-bit Intel, IBM POWER 8 (little endian), and
IBM Z architectures
From RHEL 7.6 to RHEL 8.4 on architectures that require kernel version 4.14: IBM POWER 9
(little endian) and IBM Z (Structure A). This is the final in-place upgrade path for these
architectures.
From RHEL 7.9 to RHEL 8.2 and RHEL 8.6 on systems with SAP HANA on the 64-bit Intel
architecture. To ensure your system with SAP HANA remains supported after upgrading to
RHEL 8.2, enable the RHEL 8.2 Update Services for SAP Solutions (E4S) repositories.
For more information, see Supported in-place upgrade paths for Red Hat Enterprise Linux . For
instructions on performing an in-place upgrade, see Upgrading from RHEL 7 to RHEL 8 . For instructions
on performing an in-place upgrade on systems with SAP environments, see How to in-place upgrade
SAP environments from RHEL 7 to RHEL 8.
With the release of RHEL 8.6, multiple upgrade paths are now available for the in-place upgrade
from RHEL 7 to RHEL 8. This allows you to decide which RHEL 8 minor version you want to
upgrade your system to instead of upgrading to the latest RHEL 8 minor version by default.
Note that the available upgrade paths differ between RHEL systems and RHEL systems with
SAP HANA.
The Leapp utility now runs significantly faster during the pre-upgrade and the initial stages of
the in-place upgrade.
The in-place upgrade is also supported for SAP hosting systems for the following cloud image
types:
Bring-your-own-subscription (BYOS) systems on any public cloud platform which uses Red
Hat Subscription Manager (RHSM) for a RHEL subscription.
Pay-as-you-go (PAYG) instances on Amazon Web Services (AWS) and Microsoft Azure
8
CHAPTER 1. OVERVIEW
Pay-as-you-go (PAYG) instances on Amazon Web Services (AWS) and Microsoft Azure
with Red Hat Update Infrastructure (RHUI).
If you are using an earlier version of CentOS Linux or Oracle Linux, namely versions 6 or 7, you can
convert your operating system to RHEL and then perform an in-place upgrade to RHEL 8. Note that
CentOS Linux 6 and Oracle Linux 6 conversions use the unsupported Convert2RHEL utility. For more
information on unsupported conversions, see How to perform an unsupported conversion from a RHEL-
derived Linux distribution to RHEL.
For information regarding how Red Hat supports conversions from other Linux distributions to RHEL,
see the Convert2RHEL Support Policy document .
Registration Assistant
Kickstart Generator
Kickstart Converter
9
Red Hat Enterprise Linux 8.6 8.6 Release Notes
Information regarding the Red Hat Enterprise Linux life cycle is provided in the Red Hat
Enterprise Linux Life Cycle document.
Major differences between RHEL 7 and RHEL 8, including removed functionality, are
documented in Considerations in adopting RHEL 8 .
Instructions on how to perform an in-place upgrade from RHEL 7 to RHEL 8are provided by
the document Upgrading from RHEL 7 to RHEL 8 .
The Red Hat Insights service, which enables you to proactively identify, examine, and resolve
known technical issues, is now available with all RHEL subscriptions. For instructions on how to
install the Red Hat Insights client and register your system to the service, see the Red Hat
Insights Get Started page.
10
CHAPTER 2. ARCHITECTURES
CHAPTER 2. ARCHITECTURES
Red Hat Enterprise Linux 8.6 is distributed with the kernel version 4.18.0-372, which provides support
for the following architectures:
64-bit IBM Z
Make sure you purchase the appropriate subscription for each architecture. For more information, see
Get Started with Red Hat Enterprise Linux - additional architectures . For a list of available subscriptions,
see Subscription Utilization on the Customer Portal.
11
Red Hat Enterprise Linux 8.6 8.6 Release Notes
3.1. INSTALLATION
Red Hat Enterprise Linux 8 is installed using ISO images. Two types of ISO image are available for the
AMD64, Intel 64-bit, 64-bit ARM, IBM Power Systems, and IBM Z architectures:
Binary DVD ISO: A full installation image that contains the BaseOS and AppStream repositories
and allows you to complete the installation without additional repositories.
NOTE
The Binary DVD ISO image is larger than 4.7 GB, and as a result, it might not fit
on a single-layer DVD. A dual-layer DVD or USB key is recommended when using
the Binary DVD ISO image to create bootable installation media. You can also
use the Image Builder tool to create customized RHEL images. For more
information about Image Builder, see the Composing a customized RHEL system
image document.
Boot ISO: A minimal boot ISO image that is used to boot into the installation program. This
option requires access to the BaseOS and AppStream repositories to install software packages.
The repositories are part of the Binary DVD ISO image.
See the Performing a standard RHEL 8 installation document for instructions on downloading ISO
images, creating installation media, and completing a RHEL installation. For automated Kickstart
installations and other advanced topics, see the Performing an advanced RHEL 8 installation document.
3.2. REPOSITORIES
Red Hat Enterprise Linux 8 is distributed through two main repositories:
BaseOS
AppStream
Both repositories are required for a basic RHEL installation, and are available with all RHEL
subscriptions.
Content in the BaseOS repository is intended to provide the core set of the underlying OS functionality
that provides the foundation for all installations. This content is available in the RPM format and is
subject to support terms similar to those in previous releases of RHEL. For a list of packages distributed
through BaseOS, see the Package manifest.
Content in the Application Stream repository includes additional user space applications, runtime
languages, and databases in support of the varied workloads and use cases. Application Streams are
available in the familiar RPM format, as an extension to the RPM format called modules, or as Software
Collections. For a list of packages available in AppStream, see the Package manifest.
In addition, the CodeReady Linux Builder repository is available with all RHEL subscriptions. It provides
additional packages for use by developers. Packages included in the CodeReady Linux Builder
repository are unsupported.
For more information about RHEL 8 repositories, see the Package manifest.
12
CHAPTER 3. DISTRIBUTION OF CONTENT IN RHEL 8
Components made available as Application Streams can be packaged as modules or RPM packages and
are delivered through the AppStream repository in RHEL 8. Each Application Stream component has a
given life cycle, either the same as RHEL 8 or shorter. For details, see Red Hat Enterprise Linux Life
Cycle.
Modules are collections of packages representing a logical unit: an application, a language stack, a
database, or a set of tools. These packages are built, tested, and released together.
Module streams represent versions of the Application Stream components. For example, several
streams (versions) of the PostgreSQL database server are available in the postgresql module with the
default postgresql:10 stream. Only one module stream can be installed on the system. Different
versions can be used in separate containers.
Detailed module commands are described in the Installing, managing, and removing user-space
components document. For a list of modules available in AppStream, see the Package manifest.
13
Red Hat Enterprise Linux 8.6 8.6 Release Notes
(JIRA:RHELPLAN-102505)
It makes it simple for watchdogs hardware users to adopt the built-in health checks
A set of default health checks that provide value for built-in OS components
The watchdog is now present as default presets, which makes it easy to enable or disable this
feature
Ability to create custom health checks based on the already available health checks.
(BZ#2083036)
Kernel arguments can now be updated in an idempotent way, by using the new --append-if-
missing and --delete-if-present kargs flags.
The Count Me feature from YUM is now fully disabled by default in all repo queries and will only
be triggered by the corresponding rpm-ostree-countme.timer and rpm-ostree-
countme.service units. See countme.
The post-processing logic can now process the user.ima IMA extended attribute. When an xattr
extended attribute is found, the system automatically translates it to security.ima in the final
OSTree package content.
The treefile file has a new repo-packages field. You can use it to pin a set of packages to a
specific repository.
14
CHAPTER 4. NEW FEATURES
Container images are now used as a compose target and also as an upgrade source.
(BZ#2032594)
The original subscription-manager modules (addons, role, service-level, and usage) are now
deprecated. Additionally, the package (python3-syspurpose) that provides the syspurpose command
line tool has been deprecated in RHEL 8.6. All the capabilities of this package are covered by the new
subscription-manager syspurpose module.
This update provides a consistent way to view, set, and update all system purpose attributes using a
single command of subscription-manager; this replaces all the existing system purpose commands with
their equivalent versions available as a new subcommand. For example, subscription-manager role --
set SystemRole becomes subscription-manager syspurpose role --set SystemRole and so on.
For complete information about the new commands, options, and other attributes, see the
SYSPURPOSE OPTIONS section in the subscription-manager man page.
(BZ#2000883)
This enhancement introduces the modulesync command to ensure the presence of modular metadata,
which ensures package installability. This command downloads rpm packages from modules and creates
a repository with modular metadata in a working directory.
(BZ#1868047)
The --path CLI option can be useful when a user excludes all documentation files at install time by using
the --nodocs option with yum. In this case, by using the --path option, you can display the owning
package of such an excluded file, whereas the --file option will not display the package because the
requested file does not exist.
(BZ#1940895)
15
Red Hat Enterprise Linux 8.6 8.6 Release Notes
(BZ#1993557)
The net-snmp-cert gencert tool now uses the SHA512 encryption algorithm instead of SHA1
In order to increase security, the net-snmp-cert gencert tool has been updated to generate certificates
using SHA512 encryption algorithm by default.
(BZ#1908331)
The dnn and text modules are available in the opencv package
The dnn module containing Deep Neural Networks for image classification inference and the text
module for scene text detection and recognition are now available in the opencv package.
(BZ#2007780)
Introduced lparnumascore command to detect the NUMA affinity score for the running LPAR.
(BZ#2028690)
16
CHAPTER 4. NEW FEATURES
The powerpc-utils package now supports Virtual Network Interface cards (vNIC) as a backup vdevice
for Hybrid Network Virtualization (HNV).
(BZ#2022225)
The WebSphere Application Server no longer fails to start with the hardware crypto adapter
enabled.
The opencryptoki.module was removed, and the p11-kit list-modules command no longer
causes error messages.
(BZ#1984993)
Certain network interfaces and IP addresses can be excluded when creating a rescue
image
You can use the EXCLUDE_IP_ADDRESSES variable to ignore certain IP addresses, and the
EXCLUDE_NETWORK_INTERFACES variable to ignore certain network interfaces when creating a
rescue image.
On servers with floating addresses, you need to stop the ReaR rescue environment from configuring
floating addresses that are moved to a fail-over server until the original server is recovered. Otherwise, a
conflict with the fail-over server would occur and cause a consequent disruption of the services running
on the fail-over server. To prevent conflicts, you can perform the following actions in the ReaR
configuration file /etc/rear/local.conf:
(BZ#2035939)
17
Red Hat Enterprise Linux 8.6 8.6 Release Notes
Introduced new naming conventions for zone types: primary and secondary zone types are used
as synonyms to master and slave.
Introduced a supplementary YAML output mode of dig, mdig, and delv commands.
The filter-aaaa functionality was moved into separate filter-a and filter-aaaa plugins.
Removed features:
The dnssec-enabled option has been removed, DNSSEC is enabled by default, and the dnssec-
enabled keywords are no longer accepted.
The lwresd lightweight resolver daemon, and liblwres lightweight resolver library have been
removed.
(BZ#1873486)
(BZ#1913715)
A multiple threads bug affecting RBTDB instances no longer results in assertion failure in
free_rbtdb().
The maximum supported number of NSEC3 iterations has been reduced to 150. Records with
more iterations are treated as insecure.
(BZ#2013993)
(BZ#2032965)
18
CHAPTER 4. NEW FEATURES
4.7. SECURITY
The pcsc-lite packages rebased to 1.9.5
The pcsc-lite packages have been rebased to upstream version 1.9.5. This update provides new
enhancements and bug fixes, most notably:
The pcscd daemon no longer automatically exits after inactivity when started manually.
The pcsc-spy utility now supports Python 3 and a new --thread option.
The poll() function replaced the select() function, which allows file descriptor numbers higher
than FD_SETSIZE.
(BZ#2014641)
(BZ#2023744)
(BZ#1926103)
Setting the SSHD configuration option ClientAliveCountMax to 0 now disables connection termination.
This aligns the behavior of this option with the upstream. As a consequence, OpenSSH no longer
disconnects idle SSH users when it reaches the timeout configured by the ClientAliveInterval option.
(BZ#2015828)
The libssh package has been rebased to upstream version 0.9.6. This version provides bug fixes and
enhancements, most notably:
Support for multiple identity files. The files are processed from the bottom to the top as listed in
the ~/.ssh/config file.
A handshake bug when AEAD cipher is matched but there is no HMAC overlap is fixed.
(BZ#1896651)
Support for childless initiation of Internet Key Exchange (IKE) Security Association (SA).
(BZ#2017352)
Because Common Intermediate Language (CIL) does not store module name and module version in the
module itself, there previously was no simple way to verify that the installed module is the same version
as the module which was supposed to be installed.
With the new command semodule -l --checksum, you receive a SHA256 hash of the specified module
and can compare it with the checksum of the original file, which is faster than reinstalling modules.
Example of use:
(BZ#1731501)
(BZ#1970529)
SSG now scans and remediates rules for home directories and interactive users
20
CHAPTER 4. NEW FEATURES
OVAL content to check and remediate all existing rules related to home directories used by interactive
users was added to the SCAP Security Guide (SSG) suite. Many benchmarks require verification of
properties and content usually found within home directories of interactive users. Because the
existence and the number of interactive users in a system may vary, there was previously no robust
solution to cover this gap using the OVAL language. This update adds OVAL checks and remediations
that detect local interactive users in a system and their respective home directories. As a result, SSG can
safely check and remediate all related benchmark requirements.
(BZ#1884687)
SCAP rules now have a warning message to configure Audit log buffer for large systems
The SCAP rule xccdf_org.ssgproject.content_rule_audit_basic_configuration now displays a
performance warning that suggests users of large systems where the Audit log buffer configured by this
rule might be too small and can override the custom value. The warning also describes the process to
configure a larger Audit log buffer. With this enhancement, users of large systems can stay compliant
and have their Audit log buffer set correctly.
(BZ#1993826)
(BZ#1956972)
Rules hardening the PAM stack now use authselect as the configuration tool.
Tailoring files that define profiles which represent the differences between DISA STIG
automated SCAP content and SCAP automated content (delta tailoring) are now supported.
(BZ#2014485)
When the STIG profile is applied on a Red Hat Virtualization Host (RHVH), on a self-hosted install
(RHELH), or on a host with RHV Manager installed, the following rules result in 'notapplicable':
package_gss_proxy_removed
21
Red Hat Enterprise Linux 8.6 8.6 Release Notes
package_krb5-workstation_removed
package_tuned_removed
sshd_disable_root_login
sudo_remove_nopasswd
sysctl_net_ipv4_ip_forward
xwindows_remove_packages
WARNING
(BZ#2021802)
You can provide local copies of remote SCAP source data stream components by using the --
local-files option.
OpenSCAP accepts multiple --rule arguments to select multiple rules on the command line.
OpenSCAP allows skipping evaluation of some rules using the --skip-rule option.
(BZ#2041781)
With this enhancement, the clevis-systemd package no longer depends on the nc package. The
dependency did not work correctly when used with Extra Packages for Enterprise Linux (EPEL).
(BZ#1949289)
The audit packages have been upgraded to version 3.0.7 which introduces many enhancements and bug
fixes. Most notably:
Added the --eoe-timeout option to the ausearch command and its analogous eoe_timeout
22
CHAPTER 4. NEW FEATURES
Added the --eoe-timeout option to the ausearch command and its analogous eoe_timeout
option to auditd.conf file that specifies the value for end of event timeout, which impacts how
ausearch parses co-located events.
Introduced a fix for the 'audisp-remote' plugin that used 100% of CPU capacity when the
remote location was not available.
(BZ#1939406)
Audit now provides options for specifying the end of the event timeout
With this release, the ausearch tool supports the --eoe-timeout option, and the auditd.conf file
contains the end_of_event_timeout option. You can use these options to specify the end of the event
timeout to avoid problems with parsing co-located events. The default value for the end of the event
timeout is set to two seconds.
(BZ#1921658)
(BZ#1927884)
Rsyslog includes the mmfields module for higher-performance operations and CEF
Rsyslog now includes the rsyslog-mmfields subpackage which provides the mmfields module. This is
an alternative to using the property replacer field extraction, but in contrast to the property replacer, all
fields are extracted at once and stored inside the structured data part. As a result, you can use
mmfields particularly for processing field-based log formats, for example Common Event Format
(CEF), and if you need a large number of fields or reuse specific fields. In these cases, mmfields has
better performance than existing Rsyslog features.
(BZ#1947907)
The libcap packages have been upgraded to upstream version 2.48, which provides a number of bug
fixes and enhancements over the previous version, most notably:
(BZ#2032813)
The fapolicyd packages have been upgraded to the upstream version 1.1, which contains many
improvements and bug fixes. Most notable changes include the following:
The /etc/fapolicyd/rules.d/ directory for files containing allow and deny execution rules
23
Red Hat Enterprise Linux 8.6 8.6 Release Notes
replaces the /etc/fapolicyd/fapolicyd.rules file. The fagenrules script now merges all
component rule files in this directory to the /etc/fapolicyd/compiled.rules file. See the new
fagenrules(8) man page for more details.
In addition to the /etc/fapolicyd/fapolicyd.trust file for marking files outside of the RPM
database as trusted, you can now use the new /etc/fapolicyd/trust.d directory, which supports
separating a list of trusted files into more files. You can also add an entry for a file by using the
fapolicyd-cli -f subcommand with the --trust-file directive to these files. See the fapolicyd-
cli(1) and fapolicyd.trust(13) man pages for more information.
The fapolicyd trust database now supports white spaces in file names.
fapolicyd now stores the correct path to an executable file when it adds the file to the trust
database.
(BZ#1939379)
The libseccomp packages have been rebased to upstream version 2.5.2. This version provides bug fixes
and enhancements, most notably:
Added the get_notify_fd() function to the Python bindings to get the notification file
descriptor.
Consolidated multiplexed syscall handling for all architectures into one location.
Added multiplexed syscall support to the PowerPC (PPC) and MIPS architectures.
Changed the libseccomp file descriptor notification logic to support the kernel’s previous and
new usage of SECCOMP_IOCTL_NOTIF_ID_VALID.
(BZ#2019893)
4.8. NETWORKING
CleanUpModulesOnExit firewalld global configuration option is now available
Previously, when restarting or otherwise shutting down firewalld, firewalld recursively unloaded kernel
modules. As a result, other packages attempting to use these modules or dependent modules would fail.
With this upgrade, users can set the CleanUpModulesOnExit option to no to stop firewalld from
unloading these kernel modules.
(BZ#1980206)
(BZ#2047821)
24
CHAPTER 4. NEW FEATURES
(BZ#2003976)
The nmstate API now supports VLAN and QoS ID in SR-IOV virtual functions
This update enhances the nmstate API with support for local area network (VLAN) and quality of service
(QoS) in single root I/O virtualization (SR-IOV) virtual functions. As a result, you can use nmstate to
configure these features.
(BZ#2004006)
The handling of layer 3 configurations has been reworked to improve the stability, performance,
and memory usage.
NetworkManager now supports the rd.znet_ifnames kernel command line option on the IBM Z
platform.
The blackhole, unreachable, and prohibit route types have been added.
The Wi-Fi Protected Access version 3 (WPA3) network security has been improved by enabling
the hash-to-element (H2E) method when generating simultaneous authentication of equals
(SAE) password elements.
The service now correctly handles replies from DHCP servers that send duplicate address or
mask options.
NetworkManager no longer listens for netlink events for traffic control objects, such as qdiscs
and filters.
For further information about notable changes, read the upstream release notes:
NetworkManager 1.36.0
NetworkManager 1.34.0
(BZ#1996617)
For details about configuring RHEL as an 802.1X authenticator with a FreeRADIUS back end, see Setting
25
Red Hat Enterprise Linux 8.6 8.6 Release Notes
For details about configuring RHEL as an 802.1X authenticator with a FreeRADIUS back end, see Setting
up an 802.1x network authentication service for LAN clients using hostapd with FreeRADIUS backend.
(BZ#2016946)
For example, to configure 2 receiving queues in OVS interface named ovs-iface0, enter:
(BZ#2001563)
The nftables framework now supports nft set elements with attached counters
Previously, in the netfilter framework, nftables set counters were not supported. The nftables
framework is configurable by the nft tool. The kernel allows this tool to count the network packets from a
given source address with a statement add @myset {ip saddr counter}. In this update, you can count
packets that match a specific criteria with a dynamic set and elements with attached counters.
(BZ#1983635)
4.9. KERNEL
Kernel version in RHEL 8.6
Red Hat Enterprise Linux 8.6 is distributed with the kernel version 4.18.0-372.
See also Important changes to external kernel parameters and Device Drivers.
(BZ#1839151)
The eBPF bytecode first loads to the kernel, followed by its verification, code translation to the native
machine code with just-in-time compilation, and then the virtual machine executes the code.
Red Hat ships numerous components that utilize the eBPF virtual machine. Each component is in a
different development phase, and thus not all components are currently fully supported. In RHEL 8.6,
the following eBPF components are supported:
The BPF Compiler Collection (BCC) tools package, which provides tools for I/O analysis,
networking, and monitoring of Linux operating systems using eBPF.
The BCC library which allows the development of tools similar to those provided in the BCC
tools package.
The eBPF for Traffic Control (tc)feature, which enables programmable packet processing
26
CHAPTER 4. NEW FEATURES
The eBPF for Traffic Control (tc)feature, which enables programmable packet processing
inside the kernel network data path.
The eXpress Data Path (XDP) feature, which provides access to received packets before the
kernel networking stack processes them, is supported under specific conditions. For more
information see, XDP is conditionally supported and Overview of networking eBPF features in
RHEL.
The libbpf package, which is crucial for bpf related applications like bpftrace and bpf/xdp
development.
The xdp-tools package, which contains userspace support utilities for the XDP feature, is now
supported on the AMD and Intel 64-bit architectures. This includes the libxdp library, the xdp-
loader utility for loading XDP programs, the xdp-filter example program for packet filtering,
and the xdpdump utility for capturing packets from a network interface with XDP enabled.
Note that all other eBPF components are available as Technology Preview, unless a specific component
is indicated as supported.
The following notable eBPF components are currently available as Technology Preview:
The AF_XDP socket for connecting the eXpress Data Path (XDP) path to user space
For more information regarding the Technology Preview components, see eBPF available as a
Technology Preview.
(BZ#1780124)
Red Hat, by default, enables eBPF in all RHEL versions for privileged users only
Extended Berkeley Packet Filter (eBPF) is a complex technology which allows users to execute custom
code inside the Linux kernel. Due to its nature, the eBPF code needs to pass through the verifier and
other security mechanisms. There were Common Vulnerabilities and Exposures (CVE) instances, where
bugs in this code could be misused for unauthorized operations. To mitigate this risk, Red Hat by default
enabled eBPF in all RHEL versions for privileged users only. It is possible to enable eBPF for
unprivileged users by using the kernel.command-line parameter unprivileged_bpf_disabled=0.
Applying unprivileged_bpf_disabled=0 disqualifies your kernel from Red Hat support and
opens your system to security risks.
Red Hat urges you to treat processes with the CAP_BPF capability as if the capability was equal
to CAP_SYS_ADMIN.
For information on how to apply kernel command-line parameters, see Configuring kernel command-
line parameters.
(BZ#2089409)
27
Red Hat Enterprise Linux 8.6 8.6 Release Notes
The osnoise tracer measures operating system noise. That is, the interruptions of applications by the
OS and hardware interrupts. It also provides a set of tracepoints to help find the source of the OS noise.
The timerlat tracer measures the wakeup latencies and helps to identify the causes of such latencies of
real-time (RT) threads. In RT computing, latency is absolutely crucial and even a minimal delay can be
detrimental. The osnoise and timerlat tracers enable you to investigate and find causes of OS
interference with applications and wakeup delay of RT threads.
(BZ#1979382)
The strace utility can now display mismatches between the actual SELinux contexts and the
definitions extracted from the SELinux context database
An existing --secontext option of strace has been extended with the mismatch parameter. This
parameter enables to print the expected context along with the actual one upon mismatch only. The
output is separated by double exclamation marks (!!), first the actual context, then the expected one. In
the examples below, the full,mismatch parameters print the expected full context along with the actual
one because the user part of the contexts mismatches. However, when using a solitary mismatch, it only
checks the type part of the context. The expected context is not printed because the type part of the
contexts matches.
[...]
$ strace --secontext=full,mismatch -e statx stat /home/user/file
statx(AT_FDCWD, "/home/user/file"
[system_u:object_r:user_home_t:s0!!unconfined_u:object_r:user_home_t:s0], ...
SELinux context mismatches often cause access control issues associated with SELinux. The
mismatches printed in the system call traces can significantly expedite the checks of SELinux context
correctness. The system call traces can also explain specific kernel behavior with respect to access
control checks.
(BZ#2038992, BZ#2038810)
(BZ#2012285)
(BZ#2022903, BZ#2024201)
Options in Samba utilities have been renamed and removed for a consistent user
28
CHAPTER 4. NEW FEATURES
Options in Samba utilities have been renamed and removed for a consistent user
experience
The Samba utilities have been improved to provide a consistent command-line interface. These
improvements include renamed and removed options. Therefore, to avoid problems after the update,
review your scripts that use Samba utilities, and update them, if necessary.
Several command-line options now have a corresponding smb.conf variable to control their
default value. See the man pages of the utilities to identify if a command-line option has an
smb.conf variable name.
By default, Samba utilities now log to standard error (stderr). Use the --debug-stdout option to
change this behavior.
--kerberos to --use-kerberos=required|desired|off
--krb5-ccache to --use-krb5-ccache=CCACHE
--scope to --netbios-scope=SCOPE
--use-ccache to --use-winbind-ccache
-e and --encrypt
-S and --signing
To avoid duplicate options, certain options have been removed or renamed from the following
utilities:
(BZ#2062117)
Compiler barrier changed to static inline function compiler_barrier to avoid name conflict
29
Red Hat Enterprise Linux 8.6 8.6 Release Notes
Compiler barrier changed to static inline function compiler_barrier to avoid name conflict
with function pointers
This enhancement provides additional features and a patch for a potential data corruption bug. The
compiler barrier is now set to a static inline function compiler_barrier. No name conflict occurs with the
hardware store barrier, when implementing hardware fencing for non-temporal memcpy variants, while
using a function pointer. As a result, RHEL 8.6 now includes pmdk version 1.11.1.
(BZ#2009889)
(BZ#1082146)
(BZ#1990784)
(BZ#1470834)
(BZ#1376538)
The pcs command-line interface now supports OCF 1.1 resource and STONITH agents. An OCF 1.1
agent’s metadata must comply with the OCF 1.1 schema. If an OCF 1.1 agent’s metadata does not comply
with the OCF 1.1 schema, pcs considers the agent invalid and will not create or update a resource of the
agent unless the --force option is specified. The pcsd Web UI and pcs commands for listing agents
omit OCF 1.1 agents with invalid metadata from the listing.
An OCF agent that declares that it implements any OCF version other than 1.1, or does not declare a
30
CHAPTER 4. NEW FEATURES
version at all, is validated against the OCF 1.0 schema. Validation issues are reported as warnings, but for
those agents it is not necessary to specify the --force option when creating or updating a resource of
the agent.
(BZ#1936833)
(BZ#1977588)
New named arguments are order-independent and self-documented, and enable you to specify
only required parameters.
New attributes enable you to use structured metadata with PHP’s native syntax.
New union types enable you to use native union type declarations that are validated at runtime
instead of PHPDoc annotations for a combination of types.
Internal functions now more consistently raise an Error exception instead of warnings if
parameter validation fails.
The Xdebug debugging and productivity extension for PHP has been updated to version 3. This
version introduces major changes in functionality and configuration compared to Xdebug 2.
If you want to upgrade from the php:7.4 stream, see Switching to a later stream .
For details regarding PHP usage on RHEL 8, see Using the PHP scripting language.
(BZ#1978356, BZ#2027285)
31
Red Hat Enterprise Linux 8.6 8.6 Release Notes
The POSIX::mblen(), mbtowc, and wctomb functions now work on shift state locales and are
thread-safe on C99 and above compilers when executed on a platform that has locale thread-
safety; the length parameters are now optional.
The new experimental isa infix operator tests whether a given object is an instance of a given
class or a class derived from it.
To upgrade from an earlier perl module stream, see Switching to a later stream .
(BZ#2021471)
(BZ#1991787)
MariaDB Galera now includes an upstream version of the garbd systemd service and a
wrapper script
MariaDB 10.3 and MariaDB 10.5 in RHEL 8 include a Red Hat version of garbd systemd service and a
wrapper script for the galera package in the /usr/lib/systemd/system/garbd.service and
/usr/sbin/garbd-wrapper files, respectively.
In addition to the Red Hat version of these files, RHEL 8 now also provides an upstream version. The
upstream files are located at /usr/share/doc/galera/garb-systemd and
/usr/share/doc/galera/garbd.service.
(BZ#2023420)
With this update, glibc string functions exhibit increased throughput and reduced latency on A64FX
CPUs.
32
CHAPTER 4. NEW FEATURES
(BZ#1929928)
(BZ#2000374)
(BZ#1875340)
The following tools and versions are provided by GCC Toolset 10:
Tool Version
GCC 11.2.1
GDB 10.2
Valgrind 3.17.0
SystemTap 4.5
Dyninst 11.0.0
binutils 2.36.1
elfutils 0.185
dwz 0.14
make 4.3
strace 5.13
ltrace 0.7.91
33
Red Hat Enterprise Linux 8.6 8.6 Release Notes
Tool Version
annobin 10.23
To run a shell session where tool versions from GCC Toolset 11 override system versions of these tools:
The GCC Toolset 11 components are available in the two container images:
rhel8/gcc-toolset-11-toolchain, which includes the GCC compiler, the GDB debugger, and the
make automation tool.
Note that only the GCC Toolset 11 container images are now supported. Container images of earlier
GCC Toolset versions are deprecated.
For details regarding the container images, see Using the GCC Toolset container images .
(BZ#1996862)
(BZ#2012818)
Clang now supports guaranteed tail calls with statement attributes [[clang::musttail]] in C++
and __attribute__((musttail)) in C.
Clang now supports the -Wreserved-identifier warning, which warns developers when using
reserved identifiers in their code.
34
CHAPTER 4. NEW FEATURES
Clang’s -Wshadow flag now also checks for shadowed structured bindings.
(BZ#2001133)
The Rust compiler now supports the 2021 edition of the language, featuring disjoint capture in
closure, IntoIterator for arrays, a new Cargo feature resolver, and more.
Rust 1.55
Rust 1.56
Rust 1.57
Rust 1.58
(BZ#2002883)
(BZ#2014088)
The pcp package has been rebased to version 5.3.5. Notable changes include:
35
Red Hat Enterprise Linux 8.6 8.6 Release Notes
(BZ#1991763)
Added a new prepare time series transformation for backward compatibility of panels that do
not support the new data frame format.
(BZ#1993214)
The grafana-pcp package has been rebased to version 3.2.0. Notable changes include:
Added visibility of empty histogram buckets in the PCP Vector eBPF/BCC Overview dashboard.
Fixed a bug where the metric() function of PCP Redis did not return all metric names.
(BZ#1993149)
The js-d3-flame-graph package has been rebased to version 4.0.7. Notable changes include:
(BZ#1993194)
Consumption metrics based on Running Average Power Limit (RAPL) readings, available on
recent Intel CPUs
36
CHAPTER 4. NEW FEATURES
Consumption metrics based on battery discharge, available on systems which have a battery
(BZ#1629455)
Log4j 2 provides significant improvements over Log4j 1. Notably, Log4j 2 introduces enhancements to
the Logback framework and fixes some inherent problems in the Logback architecture.
(BZ#1937468)
Previously in RHEL 8, before installing the ansible-freeipa package, you first had to enable the Ansible
repository and install the ansible package. In RHEL 8.6 and RHEL 9, you can install ansible-freeipa
without any preliminary steps. Installing ansible-freeipa automatically installs the ansible-core
package, a more basic version of ansible, as a dependency. Both ansible-freeipa and ansible-core are
available in the rhel-9-for-x86_64-appstream-rpms repository.
ansible-freeipa in RHEL 8.6 and RHEL 9 contains all the modules that it contained in RHEL 8.
(JIRA:RHELPLAN-100359)
IdM now supports the automountlocation, automountmap, and automountkey Ansible modules
With this update, the ansible-freeipa package contains the ipaautomountlocation,
ipaautomountmap, and ipaautomountkey modules. You can use these modules to configure
directories to be mounted automatically for IdM users logged in to IdM clients in an IdM location. Note
that currently, only direct maps are supported.
(JIRA:RHELPLAN-79161)
Note that in case the /etc/nsswitch.conf file is configured by the authselect tool, you must follow the
procedures described in the authselect documentation. When it is not the case, you can modify the
/etc/nsswitch.conf file manually.
(JIRA:RHELPLAN-103579)
37
Red Hat Enterprise Linux 8.6 8.6 Release Notes
In AAH, ansible-freeipa roles and modules are distributed in the collection format. Note that you need
an Ansible Automation Platform (AAP) subscription to access the content on the AAH portal. You also
need ansible version 2.9 or later.
The redhat.rhel_idm collection has the same content as the traditional ansible-freeipa package.
However, the collection format uses a fully qualified collection name (FQCN) that consists of a
namespace and the collection name. For example, the redhat.rhel_idm.ipadnsconfig module
corresponds to the ipadnsconfig module in ansible-freeipa provided by a RHEL repository. The
combination of a namespace and a collection name ensures that the objects are unique and can be
shared without any conflicts.
(JIRA:RHELPLAN-103147)
To execute ansible-freeipa modules on an IdM client, choose one of the following options:
Add the ipa_context: client line to the playbook task that uses the ansible-freeipa module.
You can set the ipa_context variable to client on an IdM server, too. However, the server context
usually provides better performance. If ipa_context is not set, ansible-freeipa checks if it is running on
a server or a client, and sets the context accordingly. Note that executing an ansible-freeipa module
with context set to server on an IdM client host raises an error of missing libraries.
(JIRA:RHELPLAN-103146)
The ipadnsconfig module now requires action: member to exclude a global forwarder
With this update, excluding global forwarders in Identity Management (IdM) by using the ansible-
freeipa ipadnsconfig module requires using the action: member option in addition to the state:
absent option. If you only use state: absent in your playbook without also using action: member, the
playbook fails. Consequently, to remove all global forwarders, you must specify all of them individually in
the playbook. In contrast, the state: present option does not require action: member.
(BZ#2046325)
(BZ#1731484)
SSSD default SSH hashing value is now consistent with the OpenSSH setting
38
CHAPTER 4. NEW FEATURES
The default value of ssh_hash_known_hosts has been changed to false. It is now consistent with the
OpenSSH setting, which does not hash host names by default.
However, if you need to continue to hash host names, add ssh_hash_known_hosts = True to the [ssh]
section of the /etc/sssd/sssd.conf configuration file.
(BZ#2015070)
Options in Samba utilities have been renamed and removed for a consistent user experience
The SMB2_22, SMB2_24, and SMB3_10 dialects, which were only used by Windows technical
previews, have been removed.
Back up the database files before starting Samba. When the smbd, nmbd, or winbind services start,
Samba automatically updates its tdb database files. Note that Red Hat does not support downgrading
tdb database files.
After updating Samba, verify the /etc/samba/smb.conf file using the testparm utility.
For further information about notable changes, read the upstream release notes before updating.
(BZ#2013596)
(BZ#2016014)
Directory Server now stores memory-mapped files of databases on a tmpfs file system
In Directory Server, the nsslapd-db-home-directory parameter defines the location of memory-
mapped files of databases. This enhancement changes the default value of the parameter from
/var/lib/dirsrv/slapd-instance_name/db/ to /dev/shm/. As a result, with the internal databases stored
on a tmpfs file system, the performance of Directory Server increases.
(BZ#1780842)
4.15. DESKTOP
Security classification banners at login and in the desktop session
You can now configure classification banners to state the overall security classification level of the
39
Red Hat Enterprise Linux 8.6 8.6 Release Notes
You can now configure classification banners to state the overall security classification level of the
system. This is useful for deployments where the user must be aware of the security classification level
of the system that they are logged into.
The classification banners can appear in the following contexts, depending on your configuration:
The classification banners can take the form of either a notification that you can dismiss, or a permanent
banner.
(BZ#1751336)
Support for Alder Lake-P graphics is disabled by default. To enable it, add the following option to the
kernel command line:
i915.force_probe=PCI_ID
Replace PCI_ID with either the PCI device ID of your Intel GPU, or with the * character to enable support
for all alpha-quality hardware that uses the i915 driver.
(BZ#1964761)
NOTE
40
CHAPTER 4. NEW FEATURES
NOTE
It is only possible to use one smart card to authenticate and gain sudo privileges. Using a
separate smart card for sudo is not supported.
(JIRA:RHELPLAN-95126)
(BZ#2049441)
(JIRA:RHELPLAN-103855)
(BZ#1854988)
Configuring fence devices, resources, resource groups, and resource clones including meta
attributes and resource operations
Running the role removes any configuration not supported by the role or not specified when running the
role.
(BZ#1893743)
41
Red Hat Enterprise Linux 8.6 8.6 Release Notes
Opportunistic Wireless Encryption (OWE) is a mode of opportunistic security for Wi-Fi networks that
provides encryption of the wireless medium but no authentication, such as public hot spots. OWE uses
encryption between Wi-Fi clients and access points, protecting them from sniffing attacks. With this
enhancement, the Networking RHEL System role supports OWE. As a result, administrators can now use
the Networking System Role to configure connections to Wi-Fi networks which use OWE.
(BZ#1993379)
(BZ#1993311)
(BZ#2021661)
(BZ#2016514)
The NBDE client System Role supports systems with static IP addresses
Previously, restarting a system with a static IP address and configured with the NBDE client System Role
would change the system’s IP address. With this change, systems with static IP addresses are supported
by the NBDE client System Role, and their IP addresses do not change after a reboot.
(BZ#1985022)
(BZ#2016511)
Support to add Elasticsearch username and password for authentication from rsyslog
This update adds the Elasticsearch username and password parameters to the logging System Role,
to enable the rsyslog to authenticate to Elasticsearch using username and password.
(BZ#2010327)
42
CHAPTER 4. NEW FEATURES
on the supported use cases, see Scope of support for the Ansible Core package included in the RHEL 9
and RHEL 8.6 and later AppStream repositories. Users must manually migrate their systems from
Ansible Engine to Ansible Core.
For details on that, see Using Ansible in RHEL 8.6 and later .
(BZ#2012316)
The network RHEL System Role now supports both named and numeric routing tables in
static routes.
This update adds support for both the named and numeric routing tables in static routes, which is a
prerequisite for supporting the policy routing (for example, source routing). The users can define policy
routing rules later to instruct the system which table to use to determine the correct route. As a result,
after the user specifies the table attribute in the route, the system can add routes into the routing
table.
(BZ#2031521)
The Certificate role consistently uses "Ansible_managed" comment in its hook scripts
With this enhancement, the Certificate role generates pre-scripts and post-scripts to support providers,
to which the role inserts the "Ansible managed" comment using the Ansible standard "ansible_managed"
variable:
/etc/certmonger/pre-scripts/script_name.sh
/etc/certmonger/post-scripts/script_name.sh
The comment indicates that the script files should not be directly edited because the Certificate role
can overwrite the file. As a result, the configuration files contain a declaration stating that the
configuration files are managed by Ansible.
(BZ#2054364)
The Terminal session recording System Role uses the "Ansible managed" comment in its
managed configuration files
The Terminal session recording role generates 2 configuration files:
/etc/sssd/conf.d/sssd-session-recording.conf
/etc/tlog/tlog-rec-session.conf
With this update, the Terminal session recording role inserts the Ansible managed comment into the
configuration files, using the standard Ansible variable ansible_managed. The comment indicates that
the configuration files should not be directly edited because the Terminal session recording role can
overwrite the file. As a result, the configuration files contain a declaration stating that the configuration
files are managed by Ansible.
(BZ#2054363)
Microsoft SQL System Role now supports customized repository for disconnected or
Satellite subscriptions
Previously, users in disconnected environments that needed to pull packages from a custom server or
Satellite users that needed to point to Satellite or Capsule had no support from Microsoft SQL Role .
This update fixes it, by enabling users to provide a customized URL to use for RPM key, client and
43
Red Hat Enterprise Linux 8.6 8.6 Release Notes
server mssql repositories. If no URL is provided, the mssql role uses the official Microsoft servers to
download RPMs.
(BZ#2038256)
The Microsoft SQL System Role consistently uses "Ansible_managed" comment in its
managed configuration files
The mssql role generates the following configuration file:
/var/opt/mssql/mssql.conf
With this update, the Microsoft SQL role inserts the "Ansible managed" comment to the configuration
files, using the Ansible standard ansible_managed variable. The comment indicates that the
configuration files should not be directly edited because the mssql role can overwrite the file. As a
result, the configuration files contain a declaration stating that the configuration files are managed by
Ansible.
(BZ#2057651)
(BZ#2008931)
(BZ#1695634)
If unspecified, the network role uses the default behavior of the selected network_provider.
(BZ#1897565)
The VPN role consistently uses Ansible_managed comment in its managed configuration
files
The VPN role generates the following configuration file:
/etc/ipsec.d/mesh.conf
44
CHAPTER 4. NEW FEATURES
/etc/ipsec.d/policies/clear
/etc/ipsec.d/policies/private
/etc/ipsec.d/policies/private-or-clear
With this update, the VPN role inserts the Ansible managed comment to the configuration files, using
the Ansible standard ansible_managed variable. The comment indicates that the configuration files
should not be directly edited because the VPN role can overwrite the file. As a result, the configuration
files contain a declaration stating that the configuration files are managed by Ansible.
(BZ#2054365)
(BZ#1932678)
The Networking System Role now uses the ‘Ansible managed’ comment in its managed
configuration files
When using the initscripts provider, the Networking System Role now generates commented ifcfg files
in the /etc/sysconfig/network-scripts directory. The Networking role inserts the Ansible managed
comment using the Ansible standard ansible_managed variable. The comment declares that an ifcfg
file is managed by Ansible, and indicates that the ifcfg file should not be edited directly as the
Networking role will overwrite the file. The Ansible managed comment is added when the provider is
initscripts. When using the Networking role with the nm (NetworkManager) provider, the ifcfg file is
managed by NetworkManager and not by the Networking role.
(BZ#2057656)
The Firewall System Role now supports setting the firewall default zone
You can now set a default firewall zone in the Firewall System role. Zones represent a concept to
manage incoming traffic more transparently. The zones are connected to networking interfaces or
assigned a range of source addresses. Firewall rules for each zone are managed independently enabling
the administrator to define complex firewall settings and apply them to the traffic. This feature allows
setting the default zone used as the default zone to assign interfaces to, same as firewall-cmd --set-
default-zone zone-name.
(BZ#2022458)
The Metrics System Role now generates files with the proper ansible_managed comment in
the header
Previously, the Metrics role did not add an ansible_managed header comment to files generated by the
role. With this fix, the Metrics role adds the ansible_managed header comment to files it generates, and
as a result, users can easily identify files generated by the Metrics role.
(BZ#2057645)
The Postfix System Role now generates files with the proper ansible_managed comment in
the header
Previously, the Postfix role did not add an ansible_managed header comment to files generated by the
45
Red Hat Enterprise Linux 8.6 8.6 Release Notes
Previously, the Postfix role did not add an ansible_managed header comment to files generated by the
role. With this fix, the Postfix role adds the ansible_managed header comment to files it generates, and
as a result, users can easily identify files generated by the Postfix role.
(BZ#2057661)
4.19. VIRTUALIZATION
Mediated devices are now supported by virtualization CLIs on IBM Z
Using virt-install or virt-xml, you can now attach mediated devices to your virtual machines (VMs), such
as vfio-ap and vfio-ccw. This for example enables more flexible management of DASD storage devices
and cryptographic coprocessors on IBM Z hosts. In addition, using virt-install, you can create a VM that
uses an existing DASD mediated device as its primary disk. For instructions to do so, see the Configuring
and Managing Virtualization in RHEL 8 guide.
(BZ#1995125)
(BZ#1662007)
(BZ#1904496)
(BZ#2036863, BZ#2004162)
(BZ#1949614)
Note that with this change, the default cloud-init configuration has been updated. Therefore, if you had
a local modification, make sure the /etc/cloud/cloud.cfg contains "ssh_genkeytypes: ['rsa', 'ecdsa',
'ed25519']" line.
46
CHAPTER 4. NEW FEATURES
Otherwise, cloud-init creates an image which fails to start the sshd service. If this occurs, do the
following to work around the problem:
3. If the /etc/ssh/ssh_host_* files do not exist, use the following command to generate host keys:
(BZ#2115791)
The --user-data option has been introduced for the cloud-init utility. Using this option, you can pass
scripts and metadata from the Azure Instance Metadata Service (IMDS) when setting up a RHEL 8
virtual machine on Azure.
(BZ#2023940)
With this update, the cloud-init utility is able to read the datasource for VMware guestinfo data. As a
result, using cloud-init to set up RHEL 8 virtual machines on VMware vSphere is now more efficient and
reliable.
(BZ#2026587)
4.21. SUPPORTABILITY
A new package: rig
RHEL 8 introduces the rig package, which provides the rig system monitoring and event handling utility.
The rig utility is designed to assist system administrators and support engineers in diagnostic data
collection for issues that are seemingly random in their occurrence, or occur at inopportune times for
human intervention.
(BZ#1888705)
This sos report update adds the --estimate-only option with which you can approximate the disk space
required for collecting an sos report from a RHEL server. Running the sos report --estimate-only
command:
47
Red Hat Enterprise Linux 8.6 8.6 Release Notes
Note that the final disk space estimation is very approximate. Therefore, it is recommended to double
the estimated value.
(BZ#1873185)
The Red Hat Support Tool has moved from the deprecated Strata APIs to the new Hydra APIs. This has
no impact on functionality. However, if you have configured the firewall to allow only the Strata API /rs/
path explicitly, update it to /support/ to ensure the firewall works correctly.
In addition, due to this change, you can now download files greater than 5 GB when using the Red Hat
Support Tool.
(BZ#2018194)
Red Hat Support Tool now supports Red Hat Secure FTP
When using Red Hat Support Tool, you can now upload files to the case by the Red Hat Secure FTP.
Red Hat Secure FTP is a more secure replacement of the deprecated Dropbox utility that Red Hat
Support Tool used to support in its earlier versions.
(BZ#2018195)
The Red Hat Support Tool now uses S3 APIs to upload files to the Red Hat Technical Support case. As
a result, users can upload a file greater than 1 GB to the case directly.
(BZ#1767195)
4.22. CONTAINERS
container-tools:4.0 stable stream is now available
The container-tools:4.0 stable module stream, which contains the Podman, Buildah, Skopeo, and runc
tools is now available. This update provides bug fixes and enhancements over the previous version.
For instructions on how to upgrade from an earlier stream, see Switching to a later stream .
(JIRA:RHELPLAN-100175)
(JIRA:RHELPLAN-75169)
Due to the changes in the network stack, containers created by Podman v3 and earlier will not
be usable in v4.0
48
CHAPTER 4. NEW FEATURES
Downgrading to earlier versions of Podman is not supported unless all containers are destroyed
and recreated
Podman tool has been upgraded to version 4.0, for further information about notable changes, see the
upstream release notes .
(JIRA:RHELPLAN-100174)
(JIRA:RHELPLAN-101137)
(JIRA:RHELPLAN-57941)
Podman now supports auto-building and auto-running pods using a YAML file
The podman play kube command automatically builds and runs multiple pods with multiple containers
in the pods using a YAML file.
(JIRA:RHELPLAN-108830)
Podman now has ability to source subUID and subGID ranges from IdM
The subUID and subGID ranges can now be managed by IdM. Instead of deploying the same
/etc/subuid and /etc/subgid files onto every host, you can now define range in a single central storage.
You have to modify the /etc/nsswitch.conf file and add sss to the services map line: services: files
sss.
For more details, see Managing subID ranges manually in IdM documentation.
(JIRA:RHELPLAN-101133)
registry.redhat.io/rhel8/openssl
registry.access.redhat.com/ubi8/openssl
(JIRA:RHELPLAN-101138)
49
Red Hat Enterprise Linux 8.6 8.6 Release Notes
Creating, managing, and removing network interfaces, including bridge and MACVLAN
interfaces
Configuring firewall settings, such as network address translation (NAT) and port mapping rules
NOTE
You have to use the same version of Netavark stack and the Aardvark authoritative DNS
server.
(JIRA:RHELPLAN-137623)
NOTE
Do not combine the restart action with the --restart option. When running inside of a
systemd unit, consider using the kill or stop action instead to make use of systemd’s
restart policy.
(BZ#2130912)
50
CHAPTER 5. IMPORTANT CHANGES TO EXTERNAL KERNEL PARAMETERS
no_hash_pointers
With this parameter you can force pointers that are printed to the console or buffers to be unhashed.
By default, when a pointer is printed using the %p format string that pointer’s value is obscured by
hashing. This is a security feature that hides actual kernel addresses from unprivileged users.
However, it also makes debugging the kernel more difficult since you cannot compare unequal
pointers. If this command-line parameter is specified, then all normal pointers will have their true
value printed. Pointers that are printed using the %pK format string can still be hashed. Specify
no_hash_pointers only when debugging the kernel and do not use it in production.
no_entry_flush = [PPC]
With this parameter it is possible to avoid flushing the L1-D cache when entering the kernel.
no_uaccess_flush = [PPC]
With this parameter it is possible to avoid flushing the L1-D cache after accessing user data.
rcutorture.nocbs_nthreads = [KNL]
With this parameter you can set the number of Read-copy-update (RCU) callback-offload togglers.
The default value is 0 (zero) and it disables toggling.
rcutorture.nocbs_toggle = [KNL]
With this parameter you can set the delay in milliseconds between successive callback-offload
toggling attempts.
refscale.verbose_batched = [KNL]
With this parameter you can batch the additional printk() statements.
You can print everything, by specifying zero (the default) or a negative value. Otherwise, print every
Nth verbose statement, where N is the value specified.
strict_sas_size = [X86]
Format: <bool>
With this parameter you can enable or disable strict sigaltstack size checks against the required
signal frame size which depends on the supported floating-point unit (FPU) features. You can use
this parameter to filter out binaries, which have not yet been made aware of the AT_MINSIGSTKSZ
auxiliary vector.
torture.verbose_sleep_frequency = [KNL]
This parameter specifies how many verbose printk() statements should be emitted between each
sleep.
51
Red Hat Enterprise Linux 8.6 8.6 Release Notes
torture.verbose_sleep_duration = [KNL]
This parameter specifies the duration of each verbose-printk() sleep in jiffies.
tsc_early_khz = [X86]
Format: <unsigned int>
This parameter enables to skip the early Time Stamp Counter (TSC) calibration and use the given
value instead. The parameter proves useful when the early TSC frequency discovery procedure is not
reliable. Such as on overclocked systems with CPUID.16h support and partial CPUID.15h support.
fullflush - Enable flushing of IO/TLB entries when they are unmapped. Otherwise they are
flushed before they will be reused, which is a lot of faster.
force_isolation - Force device isolation for all devices. The IOMMU driver is not allowed
anymore to lift isolation requirements as needed. This option does not override iommu=pt.
force_enable - Force enable the IOMMU on platforms known to be buggy with IOMMU
enabled. Use this option with care.
acpi.debug_level = [HW,ACPI,ACPI_DEBUG]
Format: <int>
CONFIG_ACPI_DEBUG must be enabled to produce any Advanced Configuration and Power
Interface (ACPI) debug output. Bits in debug_layer correspond to a _COMPONENT in an ACPI
source file. For example #define _COMPONENT ACPI_EVENTS Bits in debug_level correspond to a
level in ACPI_DEBUG_PRINT statements. For example ACPI_DEBUG_PRINT((ACPI_DB_INFO, …
The debug_level mask defaults to "info". See Documentation/acpi/debug.txt for more information
about debug layers and levels.
acpi.debug_layer=0x20000000
Enable AML "Debug" output, for example, stores to the Debug object while interpreting AML:
Some values produce so much output that the system is unusable. The log_buf_len parameter is
useful if you need to capture more output.
acpi_mask_gpe = [HW,ACPI]
Format: <byte> or <bitmap-list>
Due to the existence of _Lxx/_Exx, some general purpose events (GPEs) triggered by unsupported
52
CHAPTER 5. IMPORTANT CHANGES TO EXTERNAL KERNEL PARAMETERS
Due to the existence of _Lxx/_Exx, some general purpose events (GPEs) triggered by unsupported
hardware or firmware features can result in GPE floodings that cannot be automatically disabled by
the GPE dispatcher. You can use this facility to prevent such uncontrolled GPE floodings.
cgroup_disable = [KNL]
Format: <name of the controller(s) or feature(s) to disable>
With this parameter you can disable a particular controller or optional feature.
0 - lazy mode, requests that use of Direct Memory Access (DMA) unmap operations is
deferred
1 - strict mode (default), DMA unmap operations invalidate IOMMU hardware TLBs
synchronously.
On AMD64 and Intel 64, the default behavior depends on the equivalent driver-specific
parameters. However, a strict mode explicitly specified by either method takes precedence.
rcutree.use_softirq = [KNL]
If this parameter is set to zero, it moves all RCU_SOFTIRQ processing to per-CPU rcuc kthreads.
The default is a non-zero value. It means that RCU_SOFTIRQ is used by default.
Specify rcutree.use_softirq = 0 to use rcuc kthreads. But note that CONFIG_PREEMPT_RT=y
kernels disable this kernel boot parameter (forcibly setting it to zero).
rcupdate.rcu_normal_after_boot = [KNL]
This parameter enables to use only normal grace-period primitives once boot has completed. That is
after the rcu_end_inkernel_boot() call has been invoked. There is no effect on
CONFIG_TINY_RCU kernels.
The kernels with the CONFIG_PREEMPT_RT=y setting, enable this kernel boot parameter and
53
Red Hat Enterprise Linux 8.6 8.6 Release Notes
The kernels with the CONFIG_PREEMPT_RT=y setting, enable this kernel boot parameter and
forcibly they set it to the value one. That is, converting any post-boot attempt at an expedited Read-
copy-update (RCU) grace period to instead use normal non-expedited grace-period processing.
spectre_v2 = [X86]
With this parameter you can control mitigation of Spectre variant 2 (indirect branch speculation)
vulnerability.
The default operation protects the kernel from user space attacks.
Selecting 'on' will also enable the mitigation against user space to user space task attacks.
Selecting 'off' will disable both the kernel and the user space protections.
retpoline,generic - Retpolines
retpoline,ibrs_user - replace indirect branches with retpolines and use IBRS to protect
userland
54
CHAPTER 6. DEVICE DRIVERS
ntb_netdev (ntb_netdev.ko.xz)
Intel® Ethernet Switch Host Interface Driver (fm10k.ko.xz) has been updated.
Intel® Ethernet Connection XL710 Network Driver (i40e.ko.xz) has been updated.
Intel® Ethernet Adaptive Virtual Function Network Driver (iavf.ko.xz) has been updated.
55
Red Hat Enterprise Linux 8.6 8.6 Release Notes
Intel® Gigabit Virtual Function Network Driver (igbvf.ko.xz) has been updated.
Intel® 10 Gigabit PCI Express Network Driver (ixgbe.ko.xz) has been updated.
Intel® 10 Gigabit Virtual Function Network Driver (ixgbevf.ko.xz) has been updated.
Mellanox 5th generation network adapters (ConnectX series) core driver (mlx5_core.ko.xz) has
been updated.
VMware vmxnet3 virtual NIC driver (vmxnet3.ko.xz) has been updated to version 1.6.0.0-k.
Storage drivers
Emulex LightPulse Fibre Channel SCSI driver (lpfc.ko.xz) has been updated to version
0:14.0.0.4.
LSI MPT Fusion SAS 3.0 Device Driver (mpt3sas.ko.xz) has been updated to version
39.100.00.00.
QLogic Fibre Channel HBA Driver (qla2xxx.ko.xz) has been updated to version 10.02.06.200-k.
Driver for Microchip Smart Family Controller (smartpqi.ko.xz) has been updated to version
2.1.12-055.
Standalone drm driver for the VMware SVGA device (vmwgfx.ko.xz) has been updated to
version 2.18.1.0.
56
CHAPTER 7. BUG FIXES
With this update, the kickstart installation does not ignore the network --defroute option added in the
%include script and the network connection is configured as expected.
(BZ#1990145)
Users can now specify user accounts in the RHEL for Edge Installer blueprint
Previously, performing an update on your blueprint without a user account defined in the RHEL for Edge
Commit for the upgrade, such as adding a rpm package, would cause users to be locked out of their
system, after the upgrade was applied. It caused users to have redefine user accounts when upgrading
an existing system. This issue has been fixed to allow users to specify user accounts in the RHEL for
Edge Installer blueprint, that creates a user on the system at installation time, rather than having the
user as part of the ostree commit.
(BZ#1951936)
Image Builder users can create a customized image by adding additional packages. If the total size of the
packages and their dependencies exceeded 4GB size, users of RHEL 8.5 and earlier releases would see
the following error:
The problem happened because the ISO 9660 Level Of Interchange -isolevel 3 argument was not
passed to the xorrisofs command. To work around the problem, users had to permanently alter the ISO
level value to 3.
With the RHEL 8.6 release, the problem has been fixed, and users no longer need to permanently alter
the ISO level value.
(BZ#2056451)
57
Red Hat Enterprise Linux 8.6 8.6 Release Notes
preserve metadata, it required running the createrepo_c --update command with the additional --keep-
all-metadata option.
With this update, you can preserve modular metadata on a modular repository by running createrepo_c
--update without any additional option.
To remove additional metadata, you can use the new --discard-additional-metadata option.
(BZ#1992209)
(BZ#2022201)
Previously, ReaR produced an incorrect disk layout when an unused LVM physical volume (PV) was
present on the system. As a result, ReaR commands that need to produce the disk layout, such as the
mkrescue, mkbackup, mkbackuponly, savelayout commands, aborted with the error message:
With this update, ReaR now comments out unused PVs in the disk layout file and is thus able to back up
a system with unused PVs correctly.
(BZ#2048454)
ReaR does not incorrectly exclude multipath devices from the backup
Previously, ReaR was incorrectly excluding certain multipath devices whose names contained the
names of multipath devices that should have been excluded from the backup.
For example, if a device named /dev/mapper/mpatha was excluded from the backup, then a second
device named /dev/mapper/mpathaa would be incorrectly excluded as well. This would occur with more
than 26 multipath devices.
The bug has been fixed and ReaR now does not exclude multipath devices from the backup unless they
should be excluded. Note that you have to specify AUTOEXCLUDE_MULTIPATH=n in the ReaR
configuration file if there are multipath devices that should be included in the backup, otherwise ReaR
excludes all multipath devices automatically. This behavior has not changed.
(BZ#2049091)
7.4. SECURITY
Remote users are no longer repetitively prompted to access smart cards
Previously, the polkit policy for the pcscd daemon incorrectly requested user interaction. As a
58
CHAPTER 7. BUG FIXES
consequence, non-local and non-privileged users could not access smart cards and encountered large
numbers of prompts. With this update, the pcsc-lite package policy no longer includes the interactive
prompts. As a result, remote card users are no longer repeatedly asked for privilege escalation.
For additional information about adjusting the policy to escalate privileges of non-privileged users, see
Controlling access to smart cards using polkit in Security hardening in RHEL product documentation.
(BZ#1928154)
64-bit IBM Z systems no longer become unbootable when installing in FIPS mode
Previously, the fips-mode-setup command with the --no-bootcfg option did not execute the zipl tool.
Because fips-mode-setup regenerates the initial RAM disk ( initrd), and the resulting system needs an
update of zipl internal state to boot, this put 64-bit IBM Z systems into an unbootable state after
installing in FIPS mode. With this update, fips-mode-setup now executes zipl on 64-bit IBM Z systems
even if invoked with --no-bootcfg, and as a result, the newly installed system boots successfully.
(BZ#2020295)
Previously, the crypto-policies component used a wrong keyword to disable the ChaCha20 cipher in
OpenSSL. As a consequence, use of ChaCha20 in TLS 1.2 in OpenSSL could not be disabled through
crypto-policies. With this update, crypto-policies use the -CHACHA20 keyword instead of the -
CHACHA20-POLY1305 keyword. As a result, you can now use crypto-policies to disable the use of the
ChaCha20 cipher in OpenSSL for both TLS 1.2 and TLS 1.3.
(BZ#2023734)
Previously, systemd services could not execute files from the /home/user/bin/ directory because the
SELinux policy did not include the policy rules that allow such access. Consequently, the systemd
services failed and eventually logged the Access Vector Cache (AVC) denial Audit messages. This
update adds the missing SELinux rules that allow access, and systemd services can now correctly
execute commands from /home/user/bin/.
(BZ#1860443)
(BZ#1983061)
ANSSI Enhanced Profile correctly selects the "Ensure SELinux State is Enforcing" rule
Previously, the ANSSI Enhanced profile (anssi_bp28_enhanced) did not select the "Ensure SELinux
State is Enforcing" (selinux_state) rule. This update modified the rule selection and now the ANSSI
Enhanced Profile selects the "Ensure SELinux State is Enforcing" rule.
(BZ#2053587)
Previously, descriptions for rules "Record Any Attempts to Run restorecon" (CCE-80699-2) and
59
Red Hat Enterprise Linux 8.6 8.6 Release Notes
Previously, descriptions for rules "Record Any Attempts to Run restorecon" (CCE-80699-2) and
"Record Any Attempts to Run seunshare" (CCE-80933-5) were incorrect. With this update, the
descriptions of these rules are aligned with the automated OVAL check. As a result, applying the fix
recommended in the description now correctly fixes these rules.
(BZ#2023569)
(BZ#1990736)
(BZ#2002850)
(BZ#2000264)
(BZ#2058033)
(BZ#2030966)
60
CHAPTER 7. BUG FIXES
scap-workbench no longer hangs when scanning remote systems from RHEL 8 hosts
Previously, sending content files to the scanned system would hang and the scap-workbench utility
could not complete the scan. This was due to a bug in the kernel which blocked executed Qt
subprocesses. As a consequence, scanning of remote systems using the scap-workbench command
from RHEL 8 hosts did not work. With this update, the underlying kernel bug is fixed, and therefore
remote scans no longer hang on copying files to a remote system and successfully finish.
(BZ#2051890)
Previously, the usbguard-notifier service did not have inter-process communication (IPC) permissions
for connecting to the usbguard-daemon IPC interface. Consequently, usbguard-notifier failed to
connect to the interface, and it wrote a corresponding error message to the Journal. Because
usbguard-notifier started with the --wait option, which ensured that usbguard-notifier attempted to
connect to the IPC interface each second after a connection failure, by default, the log contained an
excessive amount of these messages soon.
With this update, usbguard-notifier does not start with --wait by default. The service attempts to
connect to the daemon only three times in the 1-second intervals. As a result, the log contains three
such error messages at maximum.
(BZ#2000000)
However, the pam_cap.so module is unable to set ambient capabilities because a capability needs to be
in both the permitted and the inheritable set to be in the ambient set. In addition, the permitted set gets
nullified after changing the UID (for example by using the setuid utility), so the ambient capability
cannot be set.
To fix this problem, the pam_cap.so module now supports the keepcaps option, which allows a process
to retain its permitted capabilities after changing the UID from root to non-root. The pam_cap.so
module now also supports the defer option, which causes pam_cap.so to reapply ambient capabilities
within a callback to pam_end(). This callback can be used by other applications after changing the UID.
Therefore, if the su and login utilities are updated and PAM-compliant, you can now use pam_cap.so
with the keepcaps and defer options to set ambient capabilities for non-root users.
(BZ#1950187)
(BZ#1963271)
Previously, the audisp-remote plugin did not detect that remote services became unavailable. As a
consequence, the audisp-remote process would enter a state with high CPU usage. With this update,
61
Red Hat Enterprise Linux 8.6 8.6 Release Notes
audisp-remote can properly detect remote services becoming unavailable. As a result, the process no
longer enters a high-CPU-usage state.
(BZ#1906065)
(BZ#2018292)
7.5. NETWORKING
NetworkManager now uses a static IPv4 IP address as primary
The main purpose of primary and secondary addresses is to enable source address selection for
connections that are not yet bound to an IP address. For these connections, the kernel automatically
chooses an address. In a NetworkManager connection profile, you can configure a static IPv4 address
and DHCP at the same time for one connection. Previously, if you configured a connection with DHCP
and a static IPv4 address from the same range as the one provided by the DHCP server,
NetworkManager incorrectly assigned the IP address that it received from the DHCP server as primary
and the static IP address as secondary.
RHEL 8.6 changes this to the intended behavior. As a result, if you configure both a static IPv4 address
and DHCP in one connection profile, the static IP address is now always the primary and the address
received from the DHCP server the secondary. Additionally, NetworkManager now also sets the src
attribute for routes assigned by a DHCP server. With this functionality, destinations reachable through
these routes use the IP address received from the DHCP server as a source.
(BZ#2096256)
7.6. KERNEL
The dmidecode --type 17 command now successfully decodes DDR5 memory information
Previously, the dmidecode command failed to decode the DDR5 memory information. Consequently,
dmidecode --type 17 returned the <OUT OF SPEC> message. The latest update of the package
(dmidecode-3.3-3.el8) has fixed this problem. As a result, dmidecode --type 17 now successfully
decodes DDR5 memory information.
(BZ#2027665)
kdump no longer fails on KVM virtual machines that use the default amount of memory
Previously, kdump failed on some kernel-based virtual machines (KVM) that uses the default amount of
memory. Consequently, the crash kernel failed to capture the crash dump file with following error:
/bin/sh: error while loading shared libraries: libtinfo.so.6: cannot open shared object file: No such
file or directory
With this update, the problem has been fixed and kdump works correctly on KVM virtual machines that
use the default amount of memory.
62
CHAPTER 7. BUG FIXES
(BZ#2004000)
Tunnel offloading now works as expected and supports the available hardware
Previously, the driver was not setting certain feature flags. Hence, tunnel offloading was not working as
expected. In this update, the driver sets the required flags to enable tunnel offloading and works as
expected.
(BZ#1910885)
Fixed the kernel warning while setting the rx ring buffer to max
Previously, an internal function expecting clean input was called with a reused and already initialized
structure. It caused the kernel to give the warning message: “missing unregister, handled but fix driver”.
This update fixes the bug, reinitializing the structure before trying to register it again.
(BZ#2040171)
Previously, while restoring a backup created using the xfsdump command, xfsrestore created an
orphanage directory. As a consequence, a few files were moved into the created orphanage directory
with the following messages:
With this update, the problem has been fixed and xfsrestore now works correctly.
(BZ#2020494)
The multipathd.socket unit file no longer disables multipathd after too many startup
attempts
Previously, the starting conditions for multipathd in the multipath.service unit file differed from the
triggering conditions in multipathd.socket. Consequently, the unit file repeatedly tried to start
multipathd and failed. This resulted in disabling multipathd after too many failed attempts. With this fix,
the starting conditions for multipathd.socket and multipathd.service have been set to the same
values. As a result, the multipathd.socket unit file no longer attempts to start multipathd where the
starting conditions for multipathd.service are not met.
63
Red Hat Enterprise Linux 8.6 8.6 Release Notes
(BZ#2008101)
(BZ#2009624)
(BZ#2004246)
(BZ#1934162)
Previously, the pthread_once() implementation could result in a hang when using libstdc++ library
functions. For example libstdc++'s std::call_once() called a function that threw an exception which
would result in a hang. With this update, pthread_once() is fixed and no longer hangs when an exception
is thrown.
(BZ#2007327)
Previously, requests for renewal of SCEP certificates sent by certmonger to an Active Directory (AD)
Network Device Enrollment Service (NDES) server included the challengePassword used to originally
obtain the certificate. However, AD treats challengePassword as a one-time password (OTP). As a
consequence, the renewal request was rejected.
This update adds the challenge_password_otp option to certmonger. When enabled, this option
prevents certmonger from sending the OTP with the SCEP renewal request. The administrator must
also add the DisableRenewalSubjectNameMatch entry with a value of 1 to the
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MSCEP subkey in the AD registry.
With this modification, AD no longer requires the signer certificate and requested certificate subject
names to match. As a result, the SCEP certificate renewal is successful.
64
CHAPTER 7. BUG FIXES
[scep]
challenge_password_otp = yes
4. Restart certmonger:
(BZ#1577570)
FreeRADIUS proxy server no longer stops working when a second FreeRADIUS server is
unavailable
When a FreeRADIUS server is configured as a proxy server it forwards request messages to another
FreeRADIUS server. Previously, if the connection between these two servers was interrupted, the
FreeRADIUS proxy server stopped working. With this fix, the FreeRADIUS proxy server is now able to
reestablish a connection when the other server becomes available.
(BZ#2030173)
(BZ#2033398)
Socket activation of SSSD succeeds when the SSSD cache is mounted in tmpfs as the
SSSD user
Previously, socket activation of SSSD would fail if the SSSD cache was mounted in a tmpfs temporary
file system because the /var/lib/sss/db/config.ldb SSSD configuration file was not owned by the sssd
user. With this fix, SSSD creates the config.ldb file as the sssd user and socket activation succeeds. If
you have mounted the /var/lib/sssd/db/ SSSD cache directory in tpmfs, you must remount it as the
sssd user so SSSD can create the config.ldb file in that location.
65
Red Hat Enterprise Linux 8.6 8.6 Release Notes
WARNING
Perform the following steps only if you have mounted your SSSD cache into tmpfs
for faster performance according to the steps in the Tuning performance in Identity
Management guide. In standard circumstances, Red Hat recommends using the
default location for the SSSD cache, on standard disk storage, instead.
Procedure
# ls -l /var/lib/sss | grep db
drwx------. 2 *root root* 40 Jul 26 04:48 db
3. If the db directory is a mount point and it is owned by the root user, add uid=sssd,gid=sssd to
the corresponding entry in the /etc/fstab file to mount it as the SSSD user:
Verification
# ls -l /var/lib/sss | grep db
drwx------. 2 sssd sssd 160 Jul 26 05:00 db
(BZ#2108316)
Prior to this release, your display showed no graphical output if you used the following system
66
CHAPTER 7. BUG FIXES
Prior to this release, your display showed no graphical output if you used the following system
configuration:
With this update, the mgag200 driver has been significantly rewritten, and as a result, the graphics
output now works as expected.
(BZ#1953926)
(BZ#1967321)
(BZ#2040038)
The Networking System Role no longer fails to set a DNS search domain if IPv6 is disabled
Previously, the nm_connection_verify() function of the libnm library did not ignore the DNS search
domain if the IPv6 protocol was disabled. As a consequence, when you used the Networking RHEL
System Role and set dns_search together with ipv6_disabled: true, the System Role failed with the
following error:
With this update, the nm_connection_verify() function ignores the DNS search domain if IPv6 is
disabled. As a consequence, you can use dns_search as expected, even if IPv6 is disabled.
(BZ#2041627)
The nm provider in the Networking System Role now correctly manages bridges
Previously, if you used the initscripts provider, the Networking System Role created an ifcfg file which
67
Red Hat Enterprise Linux 8.6 8.6 Release Notes
(BZ#2034908)
The SSH server role now detects FIPS mode and handles tasks correctly in FIPS mode
Previously, when managing RHEL8 and older systems in FIPS mode, one of the default hostkeys was not
allowed to be created. As a consequence, the SSH server role operation failed to generate the not
allowed key type when invoked. With this fix, the SSH server role detects FIPS mode and adjusts default
hostkey list accordingly. As a result, the SSH server role can now manage systems in FIPS mode with
default hostkeys configuration.
(BZ#1979714)
(BZ#2005727)
RHEL System Roles now handle multi-line ansible_managed comments in generated files
Previously, some of the RHEL System Roles were using # {{ ansible_managed }} to generate some of
the files. As a consequence, if a customer had a custom multi-line ansible_managed setting, the files
would be generated incorrectly. With this fix, all of the system roles use the equivalent of {{
ansible_managed | comment }} when generating files so that the ansible_managed string is always
properly commented, including multi-line ansible_managed values. Consequently, generated files have
the correct multi-line ansible_managed value.
(BZ#2006231)
The Logging role no longer misses quotes for the immark module interval value
Previously, the "interval" field value for the immark module was not properly quoted, because the
immark module was not properly configured. This fix ensures that the "interval" value is properly quoted.
Now, the immark module works as expected.
(BZ#2021678)
(BZ#2021683)
68
CHAPTER 7. BUG FIXES
header in the /etc/tuned/kernel_settings/tuned.conf file. Consequently, users could not provide their
custom ansible_managed header. In this update, the problem has been fixed so that kernel_settings
updates the header of /etc/tuned/kernel_settings/tuned.conf with user’s ansible_managed setting.
As a result, /etc/tuned/kernel_settings/tuned.conf has a proper ansible_managed header.
(BZ#2047504)
If logging_purge_confs is set to true, it removes files in rsyslog.d which do not belong to any
rpm packages. That includes configuration files generated by the previous logging role run. The
logging_purge_confs default value is false.
(BZ#2040812)
(BZ#2064388)
(BZ#2058655)
(BZ#2058772)
69
Red Hat Enterprise Linux 8.6 8.6 Release Notes
configure kdump on managed nodes. As a result, the Kdump role now does not ignore hosts, and either
completes successfully with the correct configuration, or fails with an error message describing what
users need to do to fix the issue.
(BZ#2029605)
The Firewall System Role now reloads the firewall immediately when target changes
Previously, the Firewall System Role was not reloading the firewall when the target parameter has been
changed. With this fix, the Firewall role reloads the firewall when the target changes, and as a result, the
target change is immediate and available for subsequent operations.
(BZ#2057172)
Default pcsd permissions for HA Cluster System Role now allow access for group haclient
Previously, when a user ran the HA Cluster System Role with the default pcsd permissions that were set
with the ha_cluster_pcs_permission_list variable, only members of the group hacluster had access
to the cluster. With this fix, the default pcsd permissions allow the group haclient to manage the cluster
and all members of haclient can now access and manage the cluster.
(BZ#2049747)
7.12. VIRTUALIZATION
strict NUMA binding policy no longer allows for moving runtime memory
Previously, when the strict NUMA binding policy was enabled in a VM ( <memory mode='strict'/>),
attempting to move runtime memory from that VM to another NUMA node in some cases partly or
completely failed. To avoid this problem, the strict policy now completely prohibits moving runtime
memory.
In addition, the restrictive policy has been added, which works like the strict policy did previously. This
means that it does allow for moving runtime memory to other NUMA nodes, but cannot ensure that the
memory is moved completely.
(BZ#2014369)
Previously, attempting to migrate a virtual machine (VM) using the multifd feature of QEMU caused the
migration to fail and the VM to terminate unexpectedly. The underlying code has been fixed, and
multifd migration now works as expected.
(BZ#1982993)
(BZ#2004416)
70
CHAPTER 7. BUG FIXES
hypervisor, attempting to remove an IBM Power Virtual Fibre Channel (IBMVFC) device from the
running VM failed. Instead, it displayed an outstanding translation error. The underlying code has been
fixed and live hot unplugs of IBMVFC device now work correctly on PowerVM.
(BZ#1959020)
7.13. CONTAINERS
Rootless containers created in RHEL 8.5 and earlier using fuse-overlayfs now recognize
removed files
Previously, in RHEL 8.4 and earlier, rootless images and containers were created or stored using the
fuse-overlayfs file system. Using such images and containers in RHEL 8.5 and later introduced problems
for unprivileged users using the overlayfs implementation provided by the kernel and who had removed
files or directories from a container or from an image in RHEL 8.4. This problem did not apply to
containers created by the root account.
As a consequence, files or directories that were removed from a container or from an image were
marked as such using the whiteout format when using the fuse-overlayfs file system. However, due to
differences in the format, the kernel overlayfs implementation did not recognize the whiteout format
created by fuse-overlayfs. As a result, any removed files or directories still appeared. This problem did
not apply to containers created by the root account.
(JIRA:RHELPLAN-92741)
71
Red Hat Enterprise Linux 8.6 8.6 Release Notes
For information on Red Hat scope of support for Technology Preview features, see Technology Preview
Features Support Scope.
(BZ#1989930)
The only output method currently available is Initial Program Load (IPL). IPL produces a kernel and an
initial ramdisk (initrd) that can be used with the zIPL bootloader.
WARNING
Currently, the rescue process reformats all the DASDs (Direct Attached Storage
Devices) connected to the system. Do not attempt a system recovery if there is any
valuable data present on the system storage devices. This also includes the device
prepared with the zIPL bootloader, ReaR kernel, and initrd that were used to boot
into the rescue environment. Ensure to keep a copy.
For more information, see Using a ReaR rescue image on the 64-bit IBM Z architecture .
(BZ#1868421)
8.3. NETWORKING
KTLS available as a Technology Preview
RHEL provides Kernel Transport Layer Security (KTLS) as a Technology Preview. KTLS handles TLS
records using the symmetric encryption or decryption algorithms in the kernel for the AES-GCM cipher.
KTLS also includes the interface for offloading TLS record encryption to Network Interface Controllers
72
CHAPTER 8. TECHNOLOGY PREVIEWS
(BZ#1570255)
Address Family eXpress Data Path (AF_XDP) socket is designed for high-performance packet
processing. It accompanies XDP and grants efficient redirection of programmatically selected packets
to user space applications for further processing.
(BZ#1633143)
Loading XDP programs on architectures other than AMD and Intel 64-bit. Note that the libxdp
library is not available for architectures other than AMD and Intel 64-bit.
(BZ#1889737)
After packets enter the enterprise network, MPLS routers perform multiple operations on the packets,
such as push to add a label, swap to update a label, and pop to remove a label. MPLS allows defining
actions locally based on one or multiple labels in RHEL. You can configure routers and set traffic control
(tc) filters to take appropriate actions on the packets based on the MPLS label stack entry ( lse)
elements, such as label, traffic class, bottom of stack, and time to live.
For example, the following command adds a filter to the enp0s1 network interface to match incoming
packets having the first label 12323 and the second label 45832. On matching packets, the following
actions are taken:
the resulting packet is transmitted over enp0s2, with destination MAC address
00:00:5E:00:53:01 and source MAC address 00:00:5E:00:53:02
# tc filter add dev enp0s1 ingress protocol mpls_uc flower mpls lse depth 1 label 12323 lse
depth 2 label 45832 \
action mpls dec_ttl pipe \
action mpls modify label 549386 pipe \
action pedit ex munge eth dst set 00:00:5E:00:53:01 pipe \
action pedit ex munge eth src set 00:00:5E:00:53:02 pipe \
action mirred egress redirect dev enp0s2
73
Red Hat Enterprise Linux 8.6 8.6 Release Notes
(BZ#1814836, BZ#1856415)
Note that, even if the systemd package provides systemd-resolved, this service is an unsupported
Technology Preview.
(BZ#1906489)
You can install the nispor package as a dependency of nmstate or as an individual package.
(BZ#1848817)
8.4. KERNEL
The kexec fast reboot feature is available as a Technology Preview
The kexec fast reboot feature continues to be available as a Technology Preview. The kexec fast
reboot significantly speeds the boot process as the kernel enables booting directly into the second
kernel without passing through the Basic Input/Output System (BIOS) first. To use this feature:
(BZ#1769727)
(BZ#1843266)
74
CHAPTER 8. TECHNOLOGY PREVIEWS
(BZ#1660337)
The virtual machine includes a new system call bpf(), which enables creating various types of maps, and
also allows to load programs in a special assembly-like code. The code is then loaded to the kernel and
translated to the native machine code with just-in-time compilation. Note that the bpf() syscall can be
successfully used only by a user with the CAP_SYS_ADMIN capability, such as the root user. See the
bpf(2) manual page for more information.
The loaded programs can be attached onto a variety of points (sockets, tracepoints, packet reception)
to receive and process data.
There are numerous components shipped by Red Hat that utilize the eBPF virtual machine. Each
component is in a different development phase. All components are available as a Technology Preview,
unless a specific component is indicated as supported.
The following notable eBPF components are currently available as a Technology Preview:
AF_XDP, a socket for connecting the eXpress Data Path (XDP) path to user space for
applications that prioritize packet processing performance.
(BZ#1559616)
The Intel data streaming accelerator driver for kernel is available as a Technology Preview
The Intel data streaming accelerator driver (IDXD) for the kernel is currently available as a Technology
Preview. It is an Intel CPU integrated accelerator and includes a shared work queue with process address
space ID (pasid) submission and shared virtual memory (SVM).
(BZ#1837187)
(BZ#1605216)
(BZ#1905243)
75
Red Hat Enterprise Linux 8.6 8.6 Release Notes
File system DAX is now available for ext4 and XFS as a Technology Preview
In Red Hat Enterprise Linux 8, the file system DAX is available as a Technology Preview. DAX provides a
means for an application to directly map persistent memory into its address space. To use DAX, a
system must have some form of persistent memory available, usually in the form of one or more Non-
Volatile Dual In-line Memory Modules (NVDIMMs), and a file system that provides the capability of DAX
must be created on the NVDIMM(s). Also, the file system must be mounted with the dax mount option.
Then, a mmap of a file on the dax-mounted file system results in a direct mapping of storage into the
application’s address space.
(BZ#1627455)
OverlayFS
OverlayFS is a type of union file system. It enables you to overlay one file system on top of another.
Changes are recorded in the upper file system, while the lower file system remains unmodified. This
allows multiple users to share a file-system image, such as a container or a DVD-ROM, where the base
image is on read-only media.
OverlayFS remains a Technology Preview under most circumstances. As such, the kernel logs warnings
when this technology is activated.
Full support is available for OverlayFS when used with supported container engines (podman, cri-o, or
buildah) under the following restrictions:
OverlayFS is supported for use only as a container engine graph driver. Its use is supported only
for container COW content, not for persistent storage. You must place any persistent storage
on non-OverlayFS volumes. You can use only the default container engine configuration: one
level of overlay, one lowerdir, and both lower and upper levels are on the same file system.
Only XFS is currently supported for use as a lower layer file system.
The OverlayFS kernel ABI and user-space behavior are not considered stable, and might
change in future updates.
OverlayFS provides a restricted set of the POSIX standards. Test your application thoroughly
before deploying it with OverlayFS. The following cases are not POSIX-compliant:
Lower files opened with O_RDONLY do not receive st_atime updates when the files are
read.
Lower files opened with O_RDONLY, then mapped with MAP_SHARED are inconsistent
with subsequent modification.
Fully compliant st_ino or d_ino values are not enabled by default on RHEL 8, but you can
enable full POSIX compliance for them with a module option or mount option.
To get consistent inode numbering, use the xino=on mount option.
You can also use the redirect_dir=on and index=on options to improve POSIX compliance.
These two options make the format of the upper layer incompatible with an overlay without
these options. That is, you might get unexpected results or errors if you create an overlay
with redirect_dir=on or index=on, unmount the overlay, then mount the overlay without
these options.
To determine whether an existing XFS file system is eligible for use as an overlay, use the
following command and see if the ftype=1 option is enabled:
76
CHAPTER 8. TECHNOLOGY PREVIEWS
SELinux security labels are enabled by default in all supported container engines with
OverlayFS.
Several known issues are associated with OverlayFS in this release. For details, see Non-
standard behavior in the Linux kernel documentation:
https://www.kernel.org/doc/Documentation/filesystems/overlayfs.txt.
For more information about OverlayFS, see the Linux kernel documentation:
https://www.kernel.org/doc/Documentation/filesystems/overlayfs.txt.
(BZ#1690207)
Stratis enables you to more easily perform storage tasks such as:
To administer Stratis storage, use the stratis utility, which communicates with the stratisd background
service.
For more information, see the Stratis documentation: Setting up Stratis file systems.
RHEL 8.3 updated Stratis to version 2.1.0. For more information, see Stratis 2.1.0 Release Notes .
(JIRA:RHELPLAN-1212)
Due to IdM Trust Controllers not supporting the Global Catalog Service, AD-enrolled Windows hosts
cannot find IdM users and groups in Windows. Additionally, IdM Trust Controllers do not support
resolving IdM groups using the Distributed Computing Environment / Remote Procedure Calls
(DCE/RPC) protocols. As a consequence, AD users can only access the Samba shares and printers from
IdM clients.
(JIRA:RHELPLAN-13195)
77
Red Hat Enterprise Linux 8.6 8.6 Release Notes
Accessing and sharing Nonvolatile Memory Express (NVMe) storage over TCP/IP networks
(NVMe/TCP) and its corresponding nvme_tcp.ko kernel module has been added as a Technology
Preview. The use of NVMe/TCP as a host is manageable with tools provided by the nvme-cli package.
The NVMe/TCP host Technology Preview is included only for testing purposes and is not currently
planned for full support.
(BZ#1696451)
(BZ#1619620)
(BZ#1784200)
If the heuristics agent is configured on the same fencing level as the fence agent that does the actual
fencing but is configured before that agent in sequence, fencing issues an off action on the heuristics
agent before it attempts to do so on the agent that does the fencing. If the heuristics agent gives a
negative result for the off action it is already clear that the fencing level is not going to succeed, causing
Pacemaker fencing to skip the step of issuing the off action on the agent that does the fencing. A
heuristics agent can exploit this behavior to prevent the agent that does the actual fencing from fencing
a node under certain conditions.
A user might want to use this agent, especially in a two-node cluster, when it would not make sense for a
node to fence the peer if it can know beforehand that it would not be able to take over the services
properly. For example, it might not make sense for a node to take over services if it has problems
reaching the networking uplink, making the services unreachable to clients, a situation which a ping to a
router might detect in that case.
(BZ#1775847)
78
CHAPTER 8. TECHNOLOGY PREVIEWS
location constraint that the command creates is automatically removed once the resource has been
moved.
(BZ#1847102)
Previously, the IdM API was enhanced to enable multiple versions of API commands. These
enhancements could change the behavior of a command in an incompatible way. Users are now able to
continue using existing tools and scripts even if the IdM API changes. This enables:
Administrators to use previous or later versions of IdM on the server than on the managing
client.
Developers can use a specific version of an IdM call, even if the IdM version changes on the
server.
In all cases, the communication with the server is possible, regardless if one side uses, for example, a
newer version that introduces new options for a feature.
For details on using the API, see Using the Identity Management API to Communicate with the IdM
Server (TECHNOLOGY PREVIEW).
(BZ#1664719)
Users who decide to secure their DNS zones with DNSSEC are advised to read and follow these
documents:
Note that IdM servers with integrated DNS use DNSSEC to validate DNS answers obtained from other
DNS servers. This might affect the availability of DNS zones that are not configured in accordance with
recommended naming practices.
(BZ#1664718)
79
Red Hat Enterprise Linux 8.6 8.6 Release Notes
In RHEL, the ACME service uses the Red Hat Certificate System (RHCS) PKI ACME responder. The
RHCS ACME subsystem is automatically deployed on every certificate authority (CA) server in the IdM
deployment, but it does not service requests until the administrator enables it. RHCS uses the
acmeIPAServerCert profile when issuing ACME certificates. The validity period of issued certificates is
90 days. Enabling or disabling the ACME service affects the entire IdM deployment.
IMPORTANT
It is recommended to enable ACME only in an IdM deployment where all servers are
running RHEL 8.4 or later. Earlier RHEL versions do not include the ACME service, which
can cause problems in mixed-version deployments. For example, a CA server without
ACME can cause client connections to fail, because it uses a different DNS Subject
Alternative Name (SAN).
WARNING
Currently, RHCS does not remove expired certificates. Because ACME certificates
expire after 90 days, the expired certificates can accumulate and this can affect
performance.
To enable ACME across the whole IdM deployment, use the ipa-acme-manage enable
command:
# ipa-acme-manage enable
The ipa-acme-manage command was successful
To disable ACME across the whole IdM deployment, use the ipa-acme-manage disable
command:
# ipa-acme-manage disable
The ipa-acme-manage command was successful
To check whether the ACME service is installed and if it is enabled or disabled, use the ipa-
acme-manage status command:
# ipa-acme-manage status
ACME is enabled
The ipa-acme-manage command was successful
(BZ#1628987)
8.8. DESKTOP
GNOME for the 64-bit ARM architecture available as a Technology Preview
The GNOME desktop environment is now available for the 64-bit ARM architecture as a Technology
Preview. This enables administrators to configure and manage servers from a graphical user interface
(GUI) remotely, using the VNC session.
80
CHAPTER 8. TECHNOLOGY PREVIEWS
As a consequence, new administration applications are available on the 64-bit ARM architecture. For
example: Disk Usage Analyzer (baobab), Firewall Configuration (firewall-config), Red Hat
Subscription Manager (subscription-manager), or the Firefox web browser. Using Firefox,
administrators can connect to the local Cockpit daemon remotely.
(JIRA:RHELPLAN-27737)
(BZ#1698565)
(JIRA:RHELPLAN-108438)
8.11. VIRTUALIZATION
AMD SEV and SEV-ES for KVM virtual machines
As a Technology Preview, RHEL 8 provides the Secure Encrypted Virtualization (SEV) feature for AMD
EPYC host machines that use the KVM hypervisor. If enabled on a virtual machine (VM), SEV encrypts
the VM’s memory to protect the VM from access by the host. This increases the security of the VM.
In addition, the enhanced Encrypted State version of SEV (SEV-ES) is also provided as Technology
Preview. SEV-ES encrypts all CPU register contents when a VM stops running. This prevents the host
from modifying the VM’s CPU registers or reading any information from them.
Note that SEV and SEV-ES work only on the 2nd generation of AMD EPYC CPUs (codenamed Rome)
or later. Also note that RHEL 8 includes SEV and SEV-ES encryption, but not the SEV and SEV-ES
security attestation.
Intel vGPU
As a Technology Preview, it is now possible to divide a physical Intel GPU device into multiple virtual
81
Red Hat Enterprise Linux 8.6 8.6 Release Notes
As a Technology Preview, it is now possible to divide a physical Intel GPU device into multiple virtual
devices referred to as mediated devices. These mediated devices can then be assigned to multiple
virtual machines (VMs) as virtual GPUs. As a result, these VMs share the performance of a single
physical Intel GPU.
Note that only selected Intel GPUs are compatible with the vGPU feature.
In addition, it is possible to enable a VNC console operated by Intel vGPU. By enabling it, users can
connect to a VNC console of the VM and see the VM’s desktop hosted by Intel vGPU. However, this
currently only works for RHEL guest operating systems.
(BZ#1528684)
(JIRA:RHELPLAN-14047, JIRA:RHELPLAN-24437)
Technology Preview: Select Intel network adapters now provide SR-IOV in RHEL guests on
Hyper-V
As a Technology Preview, Red Hat Enterprise Linux guest operating systems running on a Hyper-V
hypervisor can now use the single-root I/O virtualization (SR-IOV) feature for Intel network adapters
that are supported by the ixgbevf and iavf drivers. This feature is enabled when the following conditions
are met:
The virtual function (VF) from the NIC is attached to the virtual machine
The feature is currently provided with Microsoft Windows Server 2016 and later.
(BZ#1348508)
(BZ#1741615)
Note that currently, this feature only works on Intel and AMD systems. In addition, nested virtualization is
in some cases not enabled by default on Hyper-V. To enable it, see the following Microsoft
documentation:
https://docs.microsoft.com/en-us/virtualization/hyper-v-on-windows/user-guide/nested-virtualization
82
CHAPTER 8. TECHNOLOGY PREVIEWS
(BZ#1519039)
8.12. CONTAINERS
Toolbox is available as a Technology Preview
Previously, the Toolbox utility was based on RHEL CoreOS github.com/coreos/toolbox. With this
release, Toolbox has been replaced with github.com/containers/toolbox.
(JIRA:RHELPLAN-77238)
Creating, managing, and removing network interfaces, including bridge and MACVLAN
interfaces
Configuring firewall settings, such as network address translation (NAT) and port mapping rules
NOTE
You have to use the same version of Netavark stack and the aardvark-dns authoritative
DNS server.
(JIRA:RHELPLAN-137622)
(JIRA:RHELDOCS-16861)
83
Red Hat Enterprise Linux 8.6 8.6 Release Notes
Deprecated functionality will likely not be supported in future major releases of this product and is not
recommended for new deployments. For the most recent list of deprecated functionality within a
particular major release, refer to the latest version of release documentation.
The support status of deprecated functionality remains unchanged within Red Hat Enterprise Linux 8.
For information about the length of support, see Red Hat Enterprise Linux Life Cycle and Red Hat
Enterprise Linux Application Streams Life Cycle .
Deprecated hardware components are not recommended for new deployments on the current or future
major releases. Hardware driver updates are limited to security and critical fixes only. Red Hat
recommends replacing this hardware as soon as reasonably feasible.
A package can be deprecated and not recommended for further use. Under certain circumstances, a
package can be removed from a product. Product documentation then identifies more recent packages
that offer functionality similar, identical, or more advanced to the one deprecated, and provides further
recommendations.
For information regarding functionality that is present in RHEL 7 but has been removed in RHEL 8, see
Considerations in adopting RHEL 8 .
auth or authconfig
device
deviceprobe
dmraid
install
lilo
lilocheck
mouse
multipath
bootloader --upgrade
ignoredisk --interactive
partition --active
reboot --kexec
Where only specific options are listed, the base command and its other options are still available and not
84
CHAPTER 9. DEPRECATED FUNCTIONALITY
Where only specific options are listed, the base command and its other options are still available and not
deprecated.
For more details and related changes in Kickstart, see the Kickstart changes section of the
Considerations in adopting RHEL 8 document.
(BZ#1642765)
The --interactive option of the ignoredisk Kickstart command has been deprecated
Using the --interactive option in future releases of Red Hat Enterprise Linux will result in a fatal
installation error. It is recommended that you modify your Kickstart file to remove the option.
(BZ#1637872)
(BZ#1904251)
The rpmbuild --sign command is deprecated since RHEL 8.1. Using this command in future releases of
Red Hat Enterprise Linux can result in an error. It is recommended that you use the rpmsign command
instead.
(BZ#1688849)
(BZ#1886310)
The dump utility from the dump package has been deprecated
The dump utility used for backup of file systems has been deprecated and will not be available in RHEL
9.
In RHEL 9, Red Hat recommends using the tar, dd, or bacula, backup utility, based on type of usage,
which provides full and safe backups on ext2, ext3, and ext4 file systems.
Note that the restore utility from the dump package remains available and supported in RHEL 9 and is
available as the restore package.
(BZ#1997366)
The Automatic Bug Reporting Tool (ABRT) for detecting and reporting application crashes has been
85
Red Hat Enterprise Linux 8.6 8.6 Release Notes
The Automatic Bug Reporting Tool (ABRT) for detecting and reporting application crashes has been
deprecated in RHEL 8. As a replacement, use the systemd-coredump tool to log and store core dumps,
which are automatically generated files after a program crashes.
(BZ#2055826)
If you require this functionality, after an upgrade to RHEL 9, configure periodic runs of ReaR manually.
(BZ#2083301)
In addition, using this option might cause certain services started by systemd to produce SELinux AVC
denial messages and prevent other operations from completing.
For more information, see the related Is mounting /proc with "hidepid=2" recommended with RHEL7
and RHEL8?.
(BZ#2038929)
(BZ#1875485)
9.4. SECURITY
NSS SEED ciphers are deprecated
The Mozilla Network Security Services (NSS) library will not support TLS cipher suites that use a SEED
cipher in a future release. To ensure smooth transition of deployments that rely on SEED ciphers when
NSS removes support, Red Hat recommends enabling support for other cipher suites.
(BZ#1817533)
For more information, see the Strong crypto defaults in RHEL 8 and deprecation of weak crypto
86
CHAPTER 9. DEPRECATED FUNCTIONALITY
For more information, see the Strong crypto defaults in RHEL 8 and deprecation of weak crypto
algorithms Knowledgebase article on the Red Hat Customer Portal and the update-crypto-policies(8)
man page.
(BZ#1660839)
(BZ#1646541)
The Transport Layer Security (TLS) protocol version 1.2 and earlier allow to start a negotiation with a
Client Hello message formatted in a way that is backward compatible with the Secure Sockets Layer
(SSL) protocol version 2. Support for this feature in the Network Security Services ( NSS) library has
been deprecated and it is disabled by default.
Applications that require support for this feature need to use the new
SSL_ENABLE_V2_COMPATIBLE_HELLO API to enable it. Support for this feature may be removed
completely in future releases of Red Hat Enterprise Linux 8.
(BZ#1645153)
(BZ#1657927)
With the introduction of scopes for crypto-policies directives in custom policies, the following derived
properties have been deprecated: tls_cipher, ssh_cipher, ssh_group, ike_protocol, and
sha1_in_dnssec. Additionally, the use of the protocol property without specifying a scope is now
deprecated as well. See the crypto-policies(7) man page for recommended replacements.
(BZ#2011208)
If your scenario really requires to completely disable SELinux, Red Hat recommends disabling SELinux
by adding the selinux=0 parameter to the kernel command line as described in the Changing SELinux
modes at boot time section of the Using SELinux title.
(BZ#1932222)
87
Red Hat Enterprise Linux 8.6 8.6 Release Notes
The ipa SELinux module has been removed from the selinux-policy package because it is no longer
maintained. The functionality is now included in the ipa-selinux subpackage.
If your scenario requires the use of types or interfaces from the ipa module in a local SELinux policy,
install the ipa-selinux package.
(BZ#1461914)
fapolicyd.rules is deprecated
The /etc/fapolicyd/rules.d/ directory for files containing allow and deny execution rules replaces the
/etc/fapolicyd/fapolicyd.rules file. The fagenrules script now merges all component rule files in this
directory to the /etc/fapolicyd/compiled.rules file. Rules in /etc/fapolicyd/fapolicyd.trust are still
processed by the fapolicyd framework but only for ensuring backward compatibility.
(BZ#2054741)
9.5. NETWORKING
Network scripts are deprecated in RHEL 8
Network scripts are deprecated in Red Hat Enterprise Linux 8 and they are no longer provided by
default. The basic installation provides a new version of the ifup and ifdown scripts which call the
NetworkManager service through the nmcli tool. In Red Hat Enterprise Linux 8, to run the ifup and the
ifdown scripts, NetworkManager must be running.
Note that custom commands in /sbin/ifup-local, ifdown-pre-local and ifdown-local scripts are not
executed.
If any of these scripts are required, the installation of the deprecated network scripts in the system is
still possible with the following command:
The ifup and ifdown scripts link to the installed legacy network scripts.
Calling the legacy network scripts shows a warning about their deprecation.
(BZ#1647725)
For more information on using the perf command line tool, see the Getting started with Perf section on
the Red Hat customer portal or the perf man page.
(BZ#1929173)
88
CHAPTER 9. DEPRECATED FUNCTIONALITY
(BZ#2006665)
(BZ#2009113)
(BZ#2029338)
If you use xt_u32, migrate to the nftables packet filtering framework. For example, first change your
firewall to use iptables with native matches to incrementally replace individual rules, and later use the
iptables-translate and accompanying utilities to migrate to nftables. If no native match exists in
nftables, use the raw payload matching feature of nftables. For details, see the raw payload
expression section in the nft(8) man page.
(BZ#2061288)
(JIRA:RHELDOCS-17641)
9.6. KERNEL
Kernel live patching now covers all RHEL minor releases
Since RHEL 8.1, kernel live patches have been provided for selected minor release streams of RHEL
covered under the Extended Update Support (EUS) policy to remediate Critical and Important Common
Vulnerabilities and Exposures (CVEs). To accommodate the maximum number of concurrently covered
kernels and use cases, the support window for each live patch will be decreased from 12 to 6 months for
every minor, major and zStream version of the kernel. It means that on the day a kernel live patch is
released, it will cover every minor release and scheduled errata kernel delivered in the past 6 months.
For example, 8.4.x will have a one-year support window, but 8.4.x+1 will have 6 months.
For more information about this feature, see Applying patches with kernel live patching .
For details about available kernel live patches, see Kernel Live Patch life cycles .
(BZ#1958250)
Installing RHEL for Real Time 8 using diskless boot is now deprecated
Diskless booting allows multiple systems to share a root file system through the network. While
89
Red Hat Enterprise Linux 8.6 8.6 Release Notes
Diskless booting allows multiple systems to share a root file system through the network. While
convenient, diskless boot is prone to introducing network latency in real-time workloads. With a future
minor update of RHEL for Real Time 8, the diskless booting feature will no longer be supported.
(BZ#1748980)
The Linux firewire sub-system and its associated user-space components are deprecated
in RHEL 8
The firewire sub-system provides interfaces to use and maintain any resources on the IEEE 1394 bus. In
RHEL 9, firewire will no longer be supported in the kernel package. Note that firewire contains several
user-space components provided by the libavc1394, libdc1394, libraw1394 packages. These packages
are subject to the deprecation as well.
(BZ#1871863)
(BZ#1878207)
(BZ#2060759)
sync
async
async-unsafe
auto
Starting with RHEL 8.4, the following write modes are deprecated:
sync
Devices above the VDO layer cannot recognize if VDO is synchronous, and consequently, the
devices cannot take advantage of the VDO sync mode.
90
CHAPTER 9. DEPRECATED FUNCTIONALITY
async-unsafe
VDO added this write mode as a workaround for the reduced performance of async mode, which
complies to Atomicity, Consistency, Isolation, and Durability (ACID). Red Hat does not recommend
async-unsafe for most use cases and is not aware of any users who rely on it.
auto
This write mode only selects one of the other write modes. It is no longer necessary when VDO
supports only a single write mode.
For more information on VDO write modes, see Selecting a VDO write mode .
(JIRA:RHELPLAN-70700)
(BZ#1592011)
Due to lack of users, the cramfs kernel module is deprecated. squashfs is recommended as an
alternative solution.
(BZ#1794513)
The existing volumes created using the VDO management software can be converted using the
/usr/sbin/lvm_import_vdo script, provided by the lvm2 package. For more information on the LVM-
VDO implementation, see Deduplicating and compressing logical volumes on RHEL .
(BZ#1949163)
The upstream Linux kernel has removed support for the elevator parameter, but it is still available in
RHEL 8 for compatibility reasons.
Note that the kernel selects a default disk scheduler based on the type of device. This is typically the
optimal setting. If you require a different scheduler, Red Hat recommends that you use udev rules or the
TuneD service to configure it. Match the selected devices and switch the scheduler only for those
devices.
91
Red Hat Enterprise Linux 8.6 8.6 Release Notes
(BZ#1665295)
Red Hat recommends that you use LVM RAID 1 devices with a segment type of raid1 instead of mirror.
The raid1 segment type is the default RAID configuration type and replaces mirror as the
recommended solution.
To convert mirror devices to raid1, see Converting a mirrored LVM device to a RAID1 logical volume .
LVM mirror has several known issues. For details, see known issues in file systems and storage .
(BZ#1827628)
peripety is deprecated
The Peripety storage event notification daemon parses system storage logs into structured storage
events. It helps you investigate storage issues.
(BZ#1871953)
The pcs commands that support the clufter tool for analyzing cluster configuration formats have been
deprecated. These commands now print a warning that the command has been deprecated and sections
related to these commands have been removed from the pcs help display and the pcs(8) man page.
pcs config export for exporting cluster configuration to a list of pcs commands which recreate
the same cluster
(BZ#1851335)
Since RHEL 8, PHP scripts are run using the FastCGI Process Manager (php-fpm) by default. For more
information, see Using PHP with the Apache HTTP Server .
92
CHAPTER 9. DEPRECATED FUNCTIONALITY
(BZ#2225332)
The libdwarf library has been deprecated in RHEL 8. The library will likely not be supported in future
major releases. Instead, use the elfutils and libdw libraries for applications that wish to process
ELF/DWARF files.
Alternatives for the libdwarf-tools dwarfdump program are the binutils readelf program or the
elfutils eu-readelf program, both used by passing the --debug-dump flag.
(BZ#1920624)
The gdb.i686 packages will no longer be updated. Users must install gdb.x86_64 instead.
If you have gdb.i686 installed, installing gdb.x86_64 will cause dnf to report package gdb-8.2-
14.el8.x86_64 obsoletes gdb < 8.2-14.el8 provided by gdb-8.2-12.el8.i686. This is expected.
Either uninstall gdb.i686 or pass dnf the --allowerasing option to remove gdb.i686 and install
gdb.x8_64.
Users will no longer be able to install the gdb.i686 packages on 64-bit systems, that is, those
with the libc.so.6()(64-bit) packages.
(BZ#1853140)
The openssh-ldap subpackage has been deprecated in Red Hat Enterprise Linux 8 and will be removed
in RHEL 9. As the openssh-ldap subpackage is not maintained upstream, Red Hat recommends using
SSSD and the sss_ssh_authorizedkeys helper, which integrate better with other IdM solutions and are
more secure.
By default, the SSSD ldap and ipa providers read the sshPublicKey LDAP attribute of the user object,
if available. Note that you cannot use the default SSSD configuration for the ad provider or IdM trusted
domains to retrieve SSH public keys from Active Directory (AD), since AD does not have a default LDAP
attribute to store a public key.
To allow the sss_ssh_authorizedkeys helper to get the key from SSSD, enable the ssh responder by
adding ssh to the services option in the sssd.conf file. See the sssd.conf(5) man page for details.
93
Red Hat Enterprise Linux 8.6 8.6 Release Notes
(BZ#1871025)
If you have configured services or users to only use DES or 3DES encryption, you might experience
service interruptions such as:
Kerberos Distribution Centers (KDCs) with DES-encrypted Database Master Keys (K/M) fail to
start
1. Check if your KDC uses DES or 3DES encryption with the krb5check open source Python
scripts. See krb5check on GitHub.
2. If you are using DES or 3DES encryption with any Kerberos principals, re-key them with a
supported encryption type, such as Advanced Encryption Standard (AES). For instructions on
re-keying, see Retiring DES from MIT Kerberos Documentation.
3. Test independence from DES and 3DES by temporarily setting the following Kerberos options
before upgrading:
b. For every host, in /etc/krb5.conf and any files in /etc/krb5.conf.d, set allow_weak_crypto
to false. It is false by default.
c. For every host, in /etc/krb5.conf and any files in /etc/krb5.conf.d, set permitted_enctypes,
default_tgs_enctypes, and default_tkt_enctypes, and do not include des or des3.
4. If you do not experience any service interruptions with the test Kerberos settings from the
previous step, remove them and upgrade. You do not need those settings after upgrading to
the latest Kerberos packages.
(BZ#1877991)
The ctdb service is managed as a pacemaker resource with the resource-agent ctdb.
The ctdb service uses storage volumes that contain either a GlusterFS file system provided by
the Red Hat Gluster Storage product or a GFS2 file system.
The stand-alone use case of the ctdb service has been deprecated and will not be included in a next
major release of Red Hat Enterprise Linux. For further information on support policies for Samba, see
the Knowledgebase article Support Policies for RHEL Resilient Storage - ctdb General Policies .
94
CHAPTER 9. DEPRECATED FUNCTIONALITY
(BZ#1916296)
As long as the Samba version in RHEL 8 provides the PDC and BDC modes, Red Hat supports these
modes only in existing installations with Windows versions which support NT4 domains. Red Hat
recommends not setting up a new Samba NT4 domain, because Microsoft operating systems later than
Windows 7 and Windows Server 2008 R2 do not support NT4 domains.
If you use the PDC to authenticate only Linux users, Red Hat suggests migrating to Red Hat Identity
Management (IdM) that is included in RHEL subscriptions. However, you cannot join Windows systems
to an IdM domain. Note that Red Hat continues supporting the PDC functionality IdM uses in the
background.
Red Hat does not support running Samba as an AD domain controller (DC).
(BZ#1926114)
For a more robust solution with better resource and security separation, Red Hat recommends using a
cross-forest trust for indirect integration with Active Directory. See the Indirect integration
documentation.
(JIRA:RHELPLAN-100400)
(BZ#1947671)
To improve the security, by default, SMB1 is disabled in the Samba server and client utilities.
Jira:RHELDOCS-16612
95
Red Hat Enterprise Linux 8.6 8.6 Release Notes
NOTE
The PAM authentication module and other authentication modules that are provided as
part of the base package are not affected.
You can find replacements for the deprecated modules in community-supported packages, for example
in the Fedora project.
In addition, the scope of support for the freeradius package will be limited to the following use cases in
future RHEL releases:
Using FreeRADIUS to provide a source-of-truth for authentication in IdM, through the Python 3
authentication package.
In contrast to these deprecations, Red Hat will strengthen the support of the following external
authentication modules with FreeRADIUS:
Python 3 authentication
The focus on these integration options is in close alignment with the strategic direction of Red Hat IdM.
Jira:RHELDOCS-17573
9.13. DESKTOP
The libgnome-keyring library has been deprecated
The libgnome-keyring library has been deprecated in favor of the libsecret library, as libgnome-
keyring is not maintained upstream, and does not follow the necessary cryptographic policies for RHEL.
The new libsecret library is the replacement that follows the necessary security standards.
(BZ#1607766)
(BZ#1569610)
96
CHAPTER 9. DEPRECATED FUNCTIONALITY
The following Motif packages have been deprecated, including their development and debugging
variants:
motif
openmotif
openmotif21
openmotif22
Red Hat recommends using the GTK toolkit as a replacement. GTK is more maintainable and provides
new features compared to Motif.
(JIRA:RHELPLAN-98983)
(BZ#1666722)
(JIRA:RHELPLAN-147538)
(BZ#2021685)
Users must manually migrate their systems from Ansible Engine to Ansible Core. For that, follow the
97
Red Hat Enterprise Linux 8.6 8.6 Release Notes
Users must manually migrate their systems from Ansible Engine to Ansible Core. For that, follow the
steps:
Procedure
# cat /etc/redhat-release
4. Install the Ansible Core package from the RHEL 8 AppStream repository:
For more details, see: Using Ansible in RHEL 8.6 and later .
(BZ#2006081)
(BZ#1874892)
9.17. VIRTUALIZATION
virsh iface-* commands have become deprecated
The virsh iface-* commands, such as virsh iface-start and virsh iface-destroy, are now deprecated,
and will be removed in a future major version of RHEL. In addition, these commands frequently fail due
to configuration dependencies.
Therefore, it is recommended not to use virsh iface-* commands for configuring and managing host
network connections. Instead, use the NetworkManager program and its related management
applications, such as nmcli.
(BZ#1664592)
98
CHAPTER 9. DEPRECATED FUNCTIONALITY
(JIRA:RHELPLAN-10304)
Also note that the current mechanism of creating VM snapshots has been deprecated, and Red Hat does
not recommend using VM snapshots in a production environment.
(BZ#1686057)
(BZ#1651994)
(JIRA:RHELPLAN-71200)
(BZ#1935497)
Using SPICE to attach smart card readers to virtual machines has been deprecated
The SPICE remote display protocol has been deprecated in RHEL 8. Since the only recommended way
to attach smart card readers to virtual machines (VMs) depends on the SPICE protocol, the usage of
smart cards in VMs has also become deprecated in RHEL 8.
In a future major version of RHEL, the functionality of attaching smart card readers to VMs will only be
supported by third party remote visualization solutions.
(BZ#2059626)
For advanced remote display functions, use third party tools such as RDP, HP RGS, or
Mechdyne TGX.
(BZ#1849563)
99
Red Hat Enterprise Linux 8.6 8.6 Release Notes
9.18. CONTAINERS
The Podman varlink-based API v1.0 has been removed
The Podman varlink-based API v1.0 was deprecated in a previous release of RHEL 8. Podman v2.0
introduced a new Podman v2.0 RESTful API. With the release of Podman v3.0, the varlink-based API
v1.0 has been completely removed.
(JIRA:RHELPLAN-45858)
The container-tools:1.0 module has been deprecated and will no longer receive security updates. It is
recommended to use a newer supported stable module stream, such as container-tools:2.0 or
container-tools:3.0.
(JIRA:RHELPLAN-59825)
(JIRA:RHELPLAN-85066)
For changes to packages between RHEL 7 and RHEL 8, see Changes to packages in the Considerations
in adopting RHEL 8 document.
The following packages have been deprecated and remain supported until the end of life of RHEL 8:
389-ds-base-legacy-tools
abrt
abrt-addon-ccpp
abrt-addon-kerneloops
abrt-addon-pstoreoops
abrt-addon-vmcore
abrt-addon-xorg
abrt-cli
abrt-console-notification
abrt-dbus
abrt-desktop
abrt-gui
100
CHAPTER 9. DEPRECATED FUNCTIONALITY
abrt-gui-libs
abrt-libs
abrt-tui
adobe-source-sans-pro-fonts
adwaita-qt
alsa-plugins-pulseaudio
amanda
amanda-client
amanda-libs
amanda-server
ant-contrib
antlr3
antlr32
aopalliance
apache-commons-collections
apache-commons-compress
apache-commons-exec
apache-commons-jxpath
apache-commons-parent
apache-ivy
apache-parent
apache-resource-bundles
apache-sshd
apiguardian
aspnetcore-runtime-3.0
aspnetcore-runtime-3.1
aspnetcore-runtime-5.0
aspnetcore-targeting-pack-3.0
aspnetcore-targeting-pack-3.1
101
Red Hat Enterprise Linux 8.6 8.6 Release Notes
aspnetcore-targeting-pack-5.0
assertj-core
authd
auto
autoconf213
autogen
autogen-libopts
awscli
base64coder
batik
bea-stax
bea-stax-api
bind-export-devel
bind-export-libs
bind-libs-lite
bind-pkcs11
bind-pkcs11-devel
bind-pkcs11-libs
bind-pkcs11-utils
bind-sdb
bind-sdb
bind-sdb-chroot
bluez-hid2hci
boost-jam
boost-signals
bouncycastle
bpg-algeti-fonts
bpg-chveulebrivi-fonts
bpg-classic-fonts
102
CHAPTER 9. DEPRECATED FUNCTIONALITY
bpg-courier-fonts
bpg-courier-s-fonts
bpg-dedaena-block-fonts
bpg-dejavu-sans-fonts
bpg-elite-fonts
bpg-excelsior-caps-fonts
bpg-excelsior-condenced-fonts
bpg-excelsior-fonts
bpg-fonts-common
bpg-glaho-fonts
bpg-gorda-fonts
bpg-ingiri-fonts
bpg-irubaqidze-fonts
bpg-mikhail-stephan-fonts
bpg-mrgvlovani-caps-fonts
bpg-mrgvlovani-fonts
bpg-nateli-caps-fonts
bpg-nateli-condenced-fonts
bpg-nateli-fonts
bpg-nino-medium-cond-fonts
bpg-nino-medium-fonts
bpg-sans-fonts
bpg-sans-medium-fonts
bpg-sans-modern-fonts
bpg-sans-regular-fonts
bpg-serif-fonts
bpg-serif-modern-fonts
bpg-ucnobi-fonts
brlapi-java
103
Red Hat Enterprise Linux 8.6 8.6 Release Notes
bsh
buildnumber-maven-plugin
byaccj
cal10n
cbi-plugins
cdparanoia
cdparanoia-devel
cdparanoia-libs
cdrdao
cmirror
codehaus-parent
codemodel
compat-exiv2-026
compat-guile18
compat-hwloc1
compat-libpthread-nonshared
compat-libtiff3
compat-openssl10
compat-sap-c++-11
compat-sap-c++-10
compat-sap-c++-9
createrepo_c-devel
ctags
ctags-etags
custodia
cyrus-imapd-vzic
dbus-c++
dbus-c++-devel
dbus-c++-glib
104
CHAPTER 9. DEPRECATED FUNCTIONALITY
dbxtool
dhcp-libs
dirsplit
dleyna-connector-dbus
dleyna-core
dleyna-renderer
dleyna-server
dnssec-trigger
dnssec-trigger-panel
dotnet-apphost-pack-3.0
dotnet-apphost-pack-3.1
dotnet-apphost-pack-5.0
dotnet-host-fxr-2.1
dotnet-host-fxr-2.1
dotnet-hostfxr-3.0
dotnet-hostfxr-3.1
dotnet-hostfxr-5.0
dotnet-runtime-2.1
dotnet-runtime-3.0
dotnet-runtime-3.1
dotnet-runtime-5.0
dotnet-sdk-2.1
dotnet-sdk-2.1.5xx
dotnet-sdk-3.0
dotnet-sdk-3.1
dotnet-sdk-5.0
dotnet-targeting-pack-3.0
dotnet-targeting-pack-3.1
dotnet-targeting-pack-5.0
105
Red Hat Enterprise Linux 8.6 8.6 Release Notes
dotnet-templates-3.0
dotnet-templates-3.1
dotnet-templates-5.0
dotnet5.0-build-reference-packages
dptfxtract
drpm
drpm-devel
dump
dvd+rw-tools
dyninst-static
eclipse-ecf
eclipse-emf
eclipse-license
ed25519-java
ee4j-parent
elfutils-devel-static
elfutils-libelf-devel-static
enca
enca-devel
environment-modules-compat
evince-browser-plugin
exec-maven-plugin
farstream02
felix-osgi-compendium
felix-osgi-core
felix-osgi-foundation
felix-parent
file-roller
fipscheck
106
CHAPTER 9. DEPRECATED FUNCTIONALITY
fipscheck-devel
fipscheck-lib
firewire
fonts-tweak-tool
forge-parent
freeradius-mysql
freeradius-perl
freeradius-postgresql
freeradius-sqlite
freeradius-unixODBC
fuse-sshfs
fusesource-pom
future
gamin
gamin-devel
gavl
gcc-toolset-10
gcc-toolset-10-annobin
gcc-toolset-10-binutils
gcc-toolset-10-binutils-devel
gcc-toolset-10-build
gcc-toolset-10-dwz
gcc-toolset-10-dyninst
gcc-toolset-10-dyninst-devel
gcc-toolset-10-elfutils
gcc-toolset-10-elfutils-debuginfod-client
gcc-toolset-10-elfutils-debuginfod-client-devel
gcc-toolset-10-elfutils-devel
gcc-toolset-10-elfutils-libelf
107
Red Hat Enterprise Linux 8.6 8.6 Release Notes
gcc-toolset-10-elfutils-libelf-devel
gcc-toolset-10-elfutils-libs
gcc-toolset-10-gcc
gcc-toolset-10-gcc-c++
gcc-toolset-10-gcc-gdb-plugin
gcc-toolset-10-gcc-gfortran
gcc-toolset-10-gdb
gcc-toolset-10-gdb-doc
gcc-toolset-10-gdb-gdbserver
gcc-toolset-10-libasan-devel
gcc-toolset-10-libatomic-devel
gcc-toolset-10-libitm-devel
gcc-toolset-10-liblsan-devel
gcc-toolset-10-libquadmath-devel
gcc-toolset-10-libstdc++-devel
gcc-toolset-10-libstdc++-docs
gcc-toolset-10-libtsan-devel
gcc-toolset-10-libubsan-devel
gcc-toolset-10-ltrace
gcc-toolset-10-make
gcc-toolset-10-make-devel
gcc-toolset-10-perftools
gcc-toolset-10-runtime
gcc-toolset-10-strace
gcc-toolset-10-systemtap
gcc-toolset-10-systemtap-client
gcc-toolset-10-systemtap-devel
gcc-toolset-10-systemtap-initscript
gcc-toolset-10-systemtap-runtime
108
CHAPTER 9. DEPRECATED FUNCTIONALITY
gcc-toolset-10-systemtap-sdt-devel
gcc-toolset-10-systemtap-server
gcc-toolset-10-toolchain
gcc-toolset-10-valgrind
gcc-toolset-10-valgrind-devel
gcc-toolset-9
gcc-toolset-9-annobin
gcc-toolset-9-build
gcc-toolset-9-perftools
gcc-toolset-9-runtime
gcc-toolset-9-toolchain
gcc-toolset-11-make-devel
GConf2
GConf2-devel
gegl
genisoimage
genwqe-tools
genwqe-vpd
genwqe-zlib
genwqe-zlib-devel
geoipupdate
geronimo-annotation
geronimo-jms
geronimo-jpa
geronimo-parent-poms
gfbgraph
gflags
gflags-devel
glassfish-annotation-api
109
Red Hat Enterprise Linux 8.6 8.6 Release Notes
glassfish-el
glassfish-fastinfoset
glassfish-jaxb-core
glassfish-jaxb-txw2
glassfish-jsp
glassfish-jsp-api
glassfish-legal
glassfish-master-pom
glassfish-servlet-api
glew-devel
glib2-fam
glog
glog-devel
gmock
gmock-devel
gnome-abrt
gnome-boxes
gnome-menus-devel
gnome-online-miners
gnome-shell-extension-disable-screenshield
gnome-shell-extension-horizontal-workspaces
gnome-shell-extension-no-hot-corner
gnome-shell-extension-window-grouper
gnome-themes-standard
gnu-free-fonts-common
gnu-free-mono-fonts
gnu-free-sans-fonts
gnu-free-serif-fonts
gnupg2-smime
110
CHAPTER 9. DEPRECATED FUNCTIONALITY
gnuplot
gnuplot-common
gobject-introspection-devel
google-gson
google-noto-sans-syriac-eastern-fonts
google-noto-sans-syriac-estrangela-fonts
google-noto-sans-syriac-western-fonts
google-noto-sans-tibetan-fonts
google-noto-sans-ui-fonts
gphoto2
gsl-devel
gssntlmssp
gtest
gtest-devel
gtkmm24
gtkmm24-devel
gtkmm24-docs
gtksourceview3
gtksourceview3-devel
gtkspell
gtkspell-devel
gtkspell3
guile
gutenprint-gimp
gutenprint-libs-ui
gvfs-afc
gvfs-afp
gvfs-archive
hamcrest-core
111
Red Hat Enterprise Linux 8.6 8.6 Release Notes
hawtjni
hawtjni
hawtjni-runtime
highlight-gui
hivex-devel
hostname
hplip-gui
httpcomponents-project
hwloc-plugins
hyphen-fo
hyphen-grc
hyphen-hsb
hyphen-ia
hyphen-is
hyphen-ku
hyphen-mi
hyphen-mn
hyphen-sa
hyphen-tk
ibus-sayura
icedax
icu4j
idm-console-framework
iptables
ipython
isl
isl-devel
isorelax
istack-commons-runtime
112
CHAPTER 9. DEPRECATED FUNCTIONALITY
istack-commons-tools
iwl3945-firmware
iwl4965-firmware
iwl6000-firmware
jacoco
jaf
jakarta-oro
janino
jansi-native
jarjar
java-1.8.0-ibm
java-1.8.0-ibm-demo
java-1.8.0-ibm-devel
java-1.8.0-ibm-headless
java-1.8.0-ibm-jdbc
java-1.8.0-ibm-plugin
java-1.8.0-ibm-src
java-1.8.0-ibm-webstart
java-1.8.0-openjdk-accessibility
java-1.8.0-openjdk-accessibility-slowdebug
java_cup
java-atk-wrapper
javacc
javacc-maven-plugin
javaewah
javaparser
javapoet
javassist
javassist-javadoc
113
Red Hat Enterprise Linux 8.6 8.6 Release Notes
jaxen
jboss-annotations-1.2-api
jboss-interceptors-1.2-api
jboss-logmanager
jboss-parent
jctools
jdepend
jdependency
jdom
jdom2
jetty
jffi
jflex
jgit
jline
jnr-netdb
jolokia-jvm-agent
js-uglify
jsch
json_simple
jss-javadoc
jtidy
junit5
jvnet-parent
jzlib
kernel-cross-headers
ksc
kurdit-unikurd-web-fonts
kyotocabinet-libs
114
CHAPTER 9. DEPRECATED FUNCTIONALITY
ldapjdk-javadoc
lensfun
lensfun-devel
lftp-scripts
libaec
libaec-devel
libappindicator-gtk3
libappindicator-gtk3-devel
libatomic-static
libavc1394
libblocksruntime
libcacard
libcacard-devel
libcgroup
libcgroup-tools
libchamplain
libchamplain-devel
libchamplain-gtk
libcroco
libcroco-devel
libcxl
libcxl-devel
libdap
libdap-devel
libdazzle-devel
libdbusmenu
libdbusmenu-devel
libdbusmenu-doc
libdbusmenu-gtk3
115
Red Hat Enterprise Linux 8.6 8.6 Release Notes
libdbusmenu-gtk3-devel
libdc1394
libdnet
libdnet-devel
libdv
libdwarf
libdwarf-devel
libdwarf-static
libdwarf-tools
libeasyfc
libeasyfc-gobject
libepubgen-devel
libertas-sd8686-firmware
libertas-usb8388-firmware
libertas-usb8388-olpc-firmware
libgdither
libGLEW
libgovirt
libguestfs-benchmarking
libguestfs-devel
libguestfs-gfs2
libguestfs-gobject
libguestfs-gobject-devel
libguestfs-java
libguestfs-java-devel
libguestfs-javadoc
libguestfs-man-pages-ja
libguestfs-man-pages-uk
libguestfs-tools
116
CHAPTER 9. DEPRECATED FUNCTIONALITY
libguestfs-tools-c
libhugetlbfs
libhugetlbfs-devel
libhugetlbfs-utils
libIDL
libIDL-devel
libidn
libiec61883
libindicator-gtk3
libindicator-gtk3-devel
libiscsi-devel
libjose-devel
libkkc
libkkc-common
libkkc-data
libldb-devel
liblogging
libluksmeta-devel
libmalaga
libmcpp
libmemcached
libmemcached-libs
libmetalink
libmodulemd1
libmongocrypt
libmtp-devel
libmusicbrainz5
libmusicbrainz5-devel
libnbd-devel
117
Red Hat Enterprise Linux 8.6 8.6 Release Notes
liboauth
liboauth-devel
libpfm-static
libpng12
libpurple
libpurple-devel
libraw1394
libreport-plugin-mailx
libreport-plugin-rhtsupport
libreport-plugin-ureport
libreport-rhel
libreport-rhel-bugzilla
librpmem
librpmem-debug
librpmem-devel
libsass
libsass-devel
libselinux-python
libsqlite3x
libtalloc-devel
libtar
libtdb-devel
libtevent-devel
libtpms-devel
libunwind
libusal
libvarlink
libverto-libevent
libvirt-admin
118
CHAPTER 9. DEPRECATED FUNCTIONALITY
libvirt-bash-completion
libvirt-daemon-driver-storage-gluster
libvirt-daemon-driver-storage-iscsi-direct
libvirt-devel
libvirt-docs
libvirt-gconfig
libvirt-gobject
libvirt-lock-sanlock
libvirt-wireshark
libvmem
libvmem-debug
libvmem-devel
libvmmalloc
libvmmalloc-debug
libvmmalloc-devel
libvncserver
libwinpr-devel
libwmf
libwmf-devel
libwmf-lite
libXNVCtrl
libyami
log4j12
log4j12-javadoc
lohit-malayalam-fonts
lohit-nepali-fonts
lorax-composer
lua-guestfs
lucene
119
Red Hat Enterprise Linux 8.6 8.6 Release Notes
mailman
mailx
make-devel
malaga
malaga-suomi-voikko
marisa
maven-antrun-plugin
maven-assembly-plugin
maven-clean-plugin
maven-dependency-analyzer
maven-dependency-plugin
maven-doxia
maven-doxia-sitetools
maven-install-plugin
maven-invoker
maven-invoker-plugin
maven-parent
maven-plugins-pom
maven-reporting-api
maven-reporting-impl
maven-resolver-api
maven-resolver-connector-basic
maven-resolver-impl
maven-resolver-spi
maven-resolver-transport-wagon
maven-resolver-util
maven-scm
maven-script-interpreter
maven-shade-plugin
120
CHAPTER 9. DEPRECATED FUNCTIONALITY
maven-shared
maven-verifier
maven-wagon-file
maven-wagon-http
maven-wagon-http-shared
maven-wagon-provider-api
maven2
meanwhile
mercurial
mercurial-hgk
metis
metis-devel
mingw32-bzip2
mingw32-bzip2-static
mingw32-cairo
mingw32-expat
mingw32-fontconfig
mingw32-freetype
mingw32-freetype-static
mingw32-gstreamer1
mingw32-harfbuzz
mingw32-harfbuzz-static
mingw32-icu
mingw32-libjpeg-turbo
mingw32-libjpeg-turbo-static
mingw32-libpng
mingw32-libpng-static
mingw32-libtiff
mingw32-libtiff-static
121
Red Hat Enterprise Linux 8.6 8.6 Release Notes
mingw32-openssl
mingw32-readline
mingw32-sqlite
mingw32-sqlite-static
mingw64-adwaita-icon-theme
mingw64-bzip2
mingw64-bzip2-static
mingw64-cairo
mingw64-expat
mingw64-fontconfig
mingw64-freetype
mingw64-freetype-static
mingw64-gstreamer1
mingw64-harfbuzz
mingw64-harfbuzz-static
mingw64-icu
mingw64-libjpeg-turbo
mingw64-libjpeg-turbo-static
mingw64-libpng
mingw64-libpng-static
mingw64-libtiff
mingw64-libtiff-static
mingw64-nettle
mingw64-openssl
mingw64-readline
mingw64-sqlite
mingw64-sqlite-static
modello
mojo-parent
122
CHAPTER 9. DEPRECATED FUNCTIONALITY
mongo-c-driver
mousetweaks
mozjs52
mozjs52-devel
mozjs60
mozjs60-devel
mozvoikko
msv-javadoc
msv-manual
munge-maven-plugin
mythes-mi
mythes-ne
nafees-web-naskh-fonts
nbd
nbdkit-devel
nbdkit-example-plugins
nbdkit-gzip-plugin
nbdkit-plugin-python-common
nbdkit-plugin-vddk
ncompress
ncurses-compat-libs
net-tools
netcf
netcf-devel
netcf-libs
network-scripts
network-scripts-ppp
nkf
nss_nis
123
Red Hat Enterprise Linux 8.6 8.6 Release Notes
nss-pam-ldapd
objectweb-asm
objectweb-asm-javadoc
objectweb-pom
ocaml-bisect-ppx
ocaml-camlp4
ocaml-camlp4-devel
ocaml-lwt
ocaml-mmap
ocaml-ocplib-endian
ocaml-ounit
ocaml-result
ocaml-seq
opencryptoki-tpmtok
opencv-contrib
opencv-core
opencv-devel
openhpi
openhpi-libs
OpenIPMI-perl
openssh-cavs
openssh-ldap
openssl-ibmpkcs11
opentest4j
os-maven-plugin
pakchois
pandoc
paps-libs
paranamer
124
CHAPTER 9. DEPRECATED FUNCTIONALITY
parfait
parfait-examples
parfait-javadoc
pcp-parfait-agent
pcp-pmda-rpm
pcp-pmda-vmware
pcsc-lite-doc
peripety
perl-B-Debug
perl-B-Lint
perl-Class-Factory-Util
perl-Class-ISA
perl-DateTime-Format-HTTP
perl-DateTime-Format-Mail
perl-File-CheckTree
perl-homedir
perl-libxml-perl
perl-Locale-Codes
perl-Mozilla-LDAP
perl-NKF
perl-Object-HashBase-tools
perl-Package-DeprecationManager
perl-Pod-LaTeX
perl-Pod-Plainer
perl-prefork
perl-String-CRC32
perl-SUPER
perl-Sys-Virt
perl-tests
125
Red Hat Enterprise Linux 8.6 8.6 Release Notes
perl-YAML-Syck
phodav
php-recode
php-xmlrpc
pidgin
pidgin-devel
pidgin-sipe
pinentry-emacs
pinentry-gtk
pipewire0.2-devel
pipewire0.2-libs
platform-python-coverage
plexus-ant-factory
plexus-bsh-factory
plexus-cli
plexus-component-api
plexus-component-factories-pom
plexus-components-pom
plexus-i18n
plexus-interactivity
plexus-pom
plexus-velocity
plymouth-plugin-throbgress
powermock
prometheus-jmx-exporter
prometheus-jmx-exporter-openjdk11
ptscotch-mpich
ptscotch-mpich-devel
ptscotch-mpich-devel-parmetis
126
CHAPTER 9. DEPRECATED FUNCTIONALITY
ptscotch-openmpi
ptscotch-openmpi-devel
purple-sipe
pygobject2-doc
pygtk2
pygtk2-codegen
pygtk2-devel
pygtk2-doc
python-nose-docs
python-nss-doc
python-podman-api
python-psycopg2-doc
python-pymongo-doc
python-redis
python-schedutils
python-slip
python-sqlalchemy-doc
python-varlink
python-virtualenv-doc
python2-backports
python2-backports-ssl_match_hostname
python2-bson
python2-coverage
python2-docs
python2-docs-info
python2-funcsigs
python2-ipaddress
python2-mock
python2-nose
127
Red Hat Enterprise Linux 8.6 8.6 Release Notes
python2-numpy-doc
python2-psycopg2-debug
python2-psycopg2-tests
python2-pymongo
python2-pymongo-gridfs
python2-pytest-mock
python2-sqlalchemy
python2-tools
python2-virtualenv
python3-bson
python3-click
python3-coverage
python3-cpio
python3-custodia
python3-docs
python3-flask
python3-gevent
python3-gobject-base
python3-hivex
python3-html5lib
python3-hypothesis
python3-ipatests
python3-itsdangerous
python3-jwt
python3-libguestfs
python3-mock
python3-networkx-core
python3-nose
python3-nss
128
CHAPTER 9. DEPRECATED FUNCTIONALITY
python3-openipmi
python3-pillow
python3-ptyprocess
python3-pydbus
python3-pymongo
python3-pymongo-gridfs
python3-pyOpenSSL
python3-pytoml
python3-reportlab
python3-schedutils
python3-scons
python3-semantic_version
python3-slip
python3-slip-dbus
python3-sqlalchemy
python3-syspurpose
python3-virtualenv
python3-webencodings
python3-werkzeug
python38-asn1crypto
python38-numpy-doc
python38-psycopg2-doc
python38-psycopg2-tests
python39-numpy-doc
python39-psycopg2-doc
python39-psycopg2-tests
qemu-kvm-block-gluster
qemu-kvm-block-iscsi
qemu-kvm-block-ssh
129
Red Hat Enterprise Linux 8.6 8.6 Release Notes
qemu-kvm-hw-usbredir
qemu-kvm-tests
qpdf
qpdf-doc
qpid-proton
qrencode
qrencode-devel
qrencode-libs
qt5-qtcanvas3d
qt5-qtcanvas3d-examples
rarian
rarian-compat
re2c
recode
redhat-menus
redhat-support-lib-python
redhat-support-tool
reflections
regexp
relaxngDatatype
rhsm-gtk
rpm-plugin-prioreset
rpmemd
rsyslog-udpspoof
ruby-hivex
ruby-libguestfs
rubygem-abrt
rubygem-abrt-doc
rubygem-bson
130
CHAPTER 9. DEPRECATED FUNCTIONALITY
rubygem-bson-doc
rubygem-mongo
rubygem-mongo-doc
s390utils-cmsfs
samba-pidl
samba-test
samba-test-libs
samyak-devanagari-fonts
samyak-fonts-common
samyak-gujarati-fonts
samyak-malayalam-fonts
samyak-odia-fonts
samyak-tamil-fonts
sane-frontends
sanlk-reset
scala
scotch
scotch-devel
SDL_sound
selinux-policy-minimum
sendmail
sgabios
sgabios-bin
shrinkwrap
sisu-inject
sisu-mojos
sisu-plexus
skkdic
SLOF
131
Red Hat Enterprise Linux 8.6 8.6 Release Notes
smc-anjalioldlipi-fonts
smc-dyuthi-fonts
smc-fonts-common
smc-kalyani-fonts
smc-raghumalayalam-fonts
smc-suruma-fonts
softhsm-devel
sonatype-oss-parent
sonatype-plugins-parent
sos-collector
sparsehash-devel
spax
spec-version-maven-plugin
spice
spice-client-win-x64
spice-client-win-x86
spice-glib
spice-glib-devel
spice-gtk
spice-gtk-tools
spice-gtk3
spice-gtk3-devel
spice-gtk3-vala
spice-parent
spice-protocol
spice-qxl-wddm-dod
spice-server
spice-server-devel
spice-qxl-xddm
132
CHAPTER 9. DEPRECATED FUNCTIONALITY
spice-server
spice-streaming-agent
spice-vdagent-win-x64
spice-vdagent-win-x86
sssd-libwbclient
star
stax-ex
stax2-api
stringtemplate
stringtemplate4
subscription-manager-initial-setup-addon
subscription-manager-migration
subscription-manager-migration-data
subversion-javahl
SuperLU
SuperLU-devel
supermin-devel
swig
swig-doc
swig-gdb
swtpm-devel
swtpm-tools-pkcs11
system-storage-manager
tcl-brlapi
testng
tibetan-machine-uni-fonts
timedatex
tpm-quote-tools
tpm-tools
133
Red Hat Enterprise Linux 8.6 8.6 Release Notes
tpm-tools-pkcs11
treelayout
trousers
trousers-lib
tuned-profiles-compat
tuned-profiles-nfv-host-bin
tuned-utils-systemtap
tycho
uglify-js
unbound-devel
univocity-output-tester
univocity-parsers
usbguard-notifier
usbredir-devel
utf8cpp
uthash
velocity
vinagre
vino
virt-dib
virt-p2v-maker
vm-dump-metrics-devel
weld-parent
wodim
woodstox-core
wqy-microhei-fonts
wqy-unibit-fonts
xdelta
xmlgraphics-commons
134
CHAPTER 9. DEPRECATED FUNCTIONALITY
xmlstreambuffer
xinetd
xorg-x11-apps
xorg-x11-drv-qxl
xorg-x11-server-Xspice
xpp3
xsane-gimp
xsom
xz-java
xz-java-javadoc
yajl-devel
yp-tools
ypbind
ypserv
continue to be supported until the end of life of RHEL 8 but will likely not be supported in future
major releases of this product and are not recommended for new deployments. Support for
devices other than those listed remains unchanged. These are deprecated devices.
are available but are no longer being tested or updated on a routine basis in RHEL 8. Red Hat
may fix serious bugs, including security bugs, at its discretion. These devices should no longer be
used in production, and it is likely they will be disabled in the next major release. These are
unmaintained devices.
PCI device IDs are in the format of vendor:device:subvendor:subdevice. If no device ID is listed, all
devices associated with the corresponding driver have been deprecated. To check the PCI IDs of the
hardware on your system, run the lspci -nn command.
135
Red Hat Enterprise Linux 8.6 8.6 Release Notes
136
CHAPTER 9. DEPRECATED FUNCTIONALITY
Soft-
RoCE
(rdma_r
xe)
137
Red Hat Enterprise Linux 8.6 8.6 Release Notes
[a] Disabled in RHEL 8.0, re-enabled in RHEL 8.4 due to customer requests.
138
CHAPTER 10. KNOWN ISSUES
To work around this problem, install RHEL without enabling secure boot. After booting the system:
1. Copy the signed Kernel into the PReP partition using the dd command.
Once the firmware verifies the bootloader and the kernel, the system boots up successfully.
(BZ#2025814)
(BZ#2050140)
The auth and authconfig Kickstart commands require the AppStream repository
The authselect-compat package is required by the auth and authconfig Kickstart commands during
installation. Without this package, the installation fails if auth or authconfig are used. However, by
design, the authselect-compat package is only available in the AppStream repository.
To work around this problem, verify that the BaseOS and AppStream repositories are available to the
installer or use the authselect Kickstart command during installation.
(BZ#1640697)
The reboot --kexec and inst.kexec commands do not provide a predictable system state
Performing a RHEL installation with the reboot --kexec Kickstart command or the inst.kexec kernel
boot parameters do not provide the same predictable system state as a full reboot. As a consequence,
switching to the installed system without rebooting can produce unpredictable results.
Note that the kexec feature is deprecated and will be removed in a future release of Red Hat Enterprise
Linux.
(BZ#1697896)
139
Red Hat Enterprise Linux 8.6 8.6 Release Notes
To work around this problem, use the harddrive --partition=sdX --dir=/ command to install from USB
CD-ROM drive. As a result, the installation does not fail.
(BZ#1914955)
To work around this problem, add ip=dhcp to boot options to enable network access when the
installation starts. Optionally, passing a Kickstart file or a repository located on the network using boot
options also resolves the problem. As a result, the network-based installation features can be used.
(BZ#1757877)
To workaround this problem, add the following script in the kickstart file to format the disc before the
installation starts.
Note: Before performing the workaround, backup the data available on the disk. The wipefs command
formats all the existing data from the disk.
%pre
wipefs -a /dev/sda
%end
(BZ#1929105)
IBM Power systems with HASH MMU mode fail to boot with memory allocation failures
IBM Power Systems with HASH memory allocation unit (MMU) mode support kdump up to a
maximum of 192 cores. Consequently, the system fails to boot with memory allocation failures if kdump
is enabled on more than 192 cores. This limitation is due to RMA memory allocations during early boot in
HASH MMU mode. To work around this problem, use the Radix MMU mode with fadump enabled
instead of using kdump.
(BZ#2028361)
140
CHAPTER 10. KNOWN ISSUES
In Red Hat Enterprise Linux 8, four attributes of the syspurpose command-line tool have been added:
role,usage, service_level_agreement and addons. Currently, only role, usage and
service_level_agreement affect the output of running the subscription-manager attach --auto
command. Users who attempt to set values to the addons argument will not observe any effect on the
subscriptions that are auto-attached.
(BZ#1687900)
The createrepo_c C library has the API cr_compress_file_with_stat() function. This function is
declared with char **dst as a second parameter. Depending on its other parameters,
cr_compress_file_with_stat() either uses dst as an input parameter, or uses it to return an allocated
string. This unpredictable behavior can cause a memory leak, because it does not inform the user when
to free dst contents.
To work around this problem, a new API cr_compress_file_with_stat_v2 function has been added,
which uses the dst parameter only as an input. It is declared as char *dst. This prevents memory leak.
Note that the cr_compress_file_with_stat_v2 function is temporary and will be present only in RHEL
8. Later, cr_compress_file_with_stat() will be fixed instead.
(BZ#1973588)
Note that this is expected behavior that remains consistent between RPM and YUM. Any issues in
scriptlets should be addressed at the package level.
(BZ#1986657)
Consequently, dnf leaves the obsoleted package in the system, and the security upgrade is not fully
performed, potentially leaving the system in a vulnerable state.
To work around this problem, perform the full upgrade without security filters, or, first, verify that there
are no obsoleted packages involved in the upgrade process.
(BZ#2095764)
141
Red Hat Enterprise Linux 8.6 8.6 Release Notes
GNU Core Utilities (coreutils) started using the statx() system call. If a seccomp filter returns an
EPERM error code for unknown system calls, coreutils might consequently report misleading EPERM
error codes because EPERM can not be distinguished from the actual Operation not permitted error
returned by a working statx() syscall.
To work around this problem, update the seccomp filter to either permit the statx() syscall, or to return
an ENOSYS error code for syscalls it does not know.
(BZ#2030661)
For more details, see the related Knowledgebase article Fix postfix TLS in the FIPS mode by switching to
SHA-256 instead of MD5.
(BZ#1711885)
(BZ#2008197)
10.6. SECURITY
File permissions of /etc/passwd- are not aligned with the CIS RHEL 8 Benchmark 1.0.0
Because of an issue with the CIS Benchmark, the remediation of the SCAP rule that ensures permissions
on the /etc/passwd- backup file configures permissions to 0644. However, the CIS Red Hat Enterprise
Linux 8 Benchmark 1.0.0 requires file permissions 0600 for that file. As a consequence, the file
permissions of /etc/passwd- are not aligned with the benchmark after remediation.
(BZ#1858866)
The libselinux-python package contains only Python 2 bindings for developing SELinux applications
and it is used for backward compatibility. For this reason, libselinux-python is no longer available in the
default RHEL 8 repositories through the yum install libselinux-python command.
To work around this problem, enable both the libselinux-python and python27 modules, and install the
libselinux-python package and its dependencies with the following commands:
142
CHAPTER 10. KNOWN ISSUES
Alternatively, install libselinux-python using its install profile with a single command:
(BZ#1666328)
udica processes UBI 8 containers only when started with --env container=podman
The Red Hat Universal Base Image 8 (UBI 8) containers set the container environment variable to the
oci value instead of the podman value. This prevents the udica tool from analyzing a container
JavaScript Object Notation (JSON) file.
To work around this problem, start a UBI 8 container using a podman command with the --env
container=podman parameter. As a result, udica can generate an SELinux policy for a UBI 8 container
only when you use the described workaround.
(BZ#1763210)
Disabling SELinux using the SELINUX=disabled option in the /etc/selinux/config results in a process in
which the kernel boots with SELinux enabled and switches to disabled mode later in the boot process.
This might cause memory leaks.
To work around this problem, disable SELinux by adding the selinux=0 parameter to the kernel
command line as described in the Changing SELinux modes at boot time section of the Using SELinux
title if your scenario really requires to completely disable SELinux.
(JIRA:RHELPLAN-34199)
sshd -T provides inaccurate information about Ciphers, MACs and KeX algorithms
The output of the sshd -T command does not contain the system-wide crypto policy configuration or
other options that could come from an environment file in /etc/sysconfig/sshd and that are applied as
arguments on the sshd command. This occurs because the upstream OpenSSH project did not support
the Include directive to support Red-Hat-provided cryptographic defaults in RHEL 8. Crypto policies are
applied as command-line arguments to the sshd executable in the sshd.service unit during the
service’s start by using an EnvironmentFile. To work around the problem, use the source command
with the environment file and pass the crypto policy as an argument to the sshd command, as in sshd -
T $CRYPTO_POLICY. For additional information, see Ciphers, MACs or KeX algorithms differ from
sshd -T to what is provided by current crypto policy level . As a result, the output from sshd -T matches
the currently configured crypto policy.
(BZ#2044354)
(BZ#1810911)
143
Red Hat Enterprise Linux 8.6 8.6 Release Notes
The RHEL 8 system-wide cryptographic policies should disable Camellia ciphers in all policy levels, as
stated in the product documentation. However, the Kerberos protocol enables the ciphers by default.
In the previous command, replace DEFAULT with the cryptographic level name if you have switched
from DEFAULT previously.
As a result, Camellia ciphers are correctly disallowed across all applications that use system-wide crypto
policies only when you disable them through the workaround.
(BZ#1919155)
Smart-card provisioning process through OpenSC pkcs15-init does not work properly
The file_caching option is enabled in the default OpenSC configuration, and the file caching
functionality does not handle some commands from the pkcs15-init tool properly. Consequently, the
smart-card provisioning process through OpenSC fails.
To work around the problem, add the following snippet to the /etc/opensc.conf file:
app pkcs15-init {
framework pkcs15 {
use_file_caching = false;
}
}
The smart-card provisioning through pkcs15-init only works if you apply the previously described
workaround.
(BZ#1947025)
To work around this problem, upgrade the server to use certificates signed with SHA-256 or stronger
hash, or switch to the LEGACY policy.
(BZ#1628553)
(BZ#1989050)
144
CHAPTER 10. KNOWN ISSUES
installed system to a non-compliant state. As a workaround, you can scan and remediate the system
after the kickstart installation. This will fix the service-related issues.
(BZ#1834716)
RHV hypervisor may not work correctly when hardening the system during installation
When installing Red Hat Virtualization Hypervisor (RHV-H) and applying the Red Hat Enterprise Linux 8
STIG profile, OSCAP Anaconda Add-on may harden the system as RHEL instead of RVH-H and remove
essential packages for RHV-H. Consequently, the RHV hypervisor may not work. To work around the
problem, install the RHV-H system without applying any profile hardening, and after the installation is
complete, apply the profile by using OpenSCAP. As a result, the RHV hypervisor works correctly.
(BZ#2075508)
(BZ#2028428)
(BZ#1750755)
Server with GUI and Workstation installations are not possible with CIS Server profiles
The CIS Server Level 1 and Level 2 security profiles are not compatible with the Server with GUI and
Workstation software selections. As a consequence, a RHEL 8 installation with the Server with GUI
software selection and CIS Server profiles is not possible. An attempted installation using the CIS Server
Level 1 or Level 2 profiles and either of these software selections will generate the error message:
package xorg-x11-server-common has been added to the list of excluded packages, but it can't be
removed from the current software selection without breaking the installation.
If you need to align systems with the Server with GUI or Workstation software selections according to
CIS benchmarks, use the CIS Workstation Level 1 or Level 2 profiles instead.
(BZ#1843932)
(BZ#1665082)
145
Red Hat Enterprise Linux 8.6 8.6 Release Notes
An update of OpenSSH affected the rules in the following Defense Information Systems Agency
Security Technical Implementation Guide (DISA STIG) profiles:
When applied to SSH servers, each of these rules configures an option (ClientAliveCountMax and
ClientAliveInterval) that no longer behaves as previously. As a consequence, OpenSSH no longer
disconnects idle SSH users when it reaches the timeout configured by these rules. As a workaround,
these rules have been temporarily removed from the DISA STIG for RHEL 8 and DISA STIG with GUI for
RHEL 8 profiles until a solution is developed.
(BZ#2038977)
NONE:+VERS-ALL:-VERS-TLS1.3:+MAC-ALL:+DHE-RSA:+AES-256-GCM:+SIGN-RSA-
SHA384:+COMP-ALL:+GROUP-ALL
To work around this problem, use only correctly working priority strings:
NONE:+VERS-ALL:-VERS-TLS1.3:+MAC-ALL:+ECDHE-RSA:+AES-128-CBC:+SIGN-RSA-
SHA1:+COMP-ALL:+GROUP-ALL
As a result, current configurations must be limited to the strings that work correctly.
(BZ#1679512)
See the Negative effects of the RHEL default logging setup on performance and their mitigations
Knowledgebase article for more information.
(JIRA:RHELPLAN-10431)
146
CHAPTER 10. KNOWN ISSUES
provided with the RHEL subscription is reduced. As a consequence, running remediations that use
Ansible content included within the scap-security-guide package requires collections from the rhc-
worker-playbook package.
# cd /usr/share/scap-security-guide/ansible
3. Run the relevant Ansible playbook using environment variables that define the path to the
additional Ansible collections:
# ANSIBLE_COLLECTIONS_PATH=/usr/share/rhc-worker-
playbook/ansible/collections/ansible_collections/ ansible-playbook -c local -i localhost, rhel9-
playbook-cis_server_l1.yml
Replace cis_server_l1 with the ID of the profile against which you want to remediate the
system.
NOTE
(BZ#2114981)
10.7. NETWORKING
The nm-cloud-setup service removes manually-configured secondary IP addresses from
interfaces
Based on the information received from the cloud environment, the nm-cloud-setup service configures
network interfaces. Disable nm-cloud-setup to manually configure interfaces. However, in certain
cases, other services on the host can configure interfaces as well. For example, these services could add
secondary IP addresses. To avoid that nm-cloud-setup removes secondary IP addresses:
147
Red Hat Enterprise Linux 8.6 8.6 Release Notes
As a result, the service no longer removes manually-configured secondary IP addresses from interfaces.
(BZ#2132754)
The primary IP address of an instance changes after starting the nm-cloud-setup service in
Alibaba Cloud
After launching an instance in the Alibaba Cloud, the nm-cloud-setup service assigns the primary IP
address to an instance. However, if you assign multiple secondary IP addresses to an instance and start
the nm-cloud-setup service, the former primary IP address gets replaced by one of the already
assigned secondary IP addresses. The returned list of metadata verifies the same. To work around the
problem, configure secondary IP addresses manually to avoid that the primary IP address changes. As a
result, an instance retains both IP addresses and the primary IP address does not change.
(BZ#2079849)
NetworkManager does not support activating bond and team ports in a specific order
NetworkManager activates interfaces alphabetically by interface names. However, if an interface
appears later during the boot, for example, because the kernel needs more time to discover it,
NetworkManager activates this interface later. NetworkManager does not support setting a priority on
bond and team ports. Consequently, the order in which NetworkManager activates ports of these
devices is not always predictable. To work around this problem, write a dispatcher script.
For an example of such a script, see the corresponding comment in the ticket.
(BZ#1920398)
Systems with the IPv6_rpfilter option enabled experience low network throughput
Systems with the IPv6_rpfilter option enabled in the firewalld.conf file currently experience suboptimal
performance and low network throughput in high traffic scenarios, such as 100-Gbps links. To work
around the problem, disable the IPv6_rpfilter option. To do so, add the following line in the
/etc/firewalld/firewalld.conf file.
IPv6_rpfilter=no
As a result, the system performs better, but also has reduced security.
(BZ#1871860)
RoCE interfaces lose their IP settings due to an unexpected change of the network
interface name
The RDMA over Converged Ethernet (RoCE) interfaces lose their IP settings due to an unexpected
change of the network interface name if both conditions are met:
148
CHAPTER 10. KNOWN ISSUES
[Match]
Architecture=s390x
KernelCommandLine=!net.naming-scheme=rhel-8.7
[Link]
NamePolicy=kernel database slot path
AlternativeNamesPolicy=database slot path
MACAddressPolicy=persistent
Note that RoCE interfaces that are enumerated by function ID (FID) and are non-unique, will still use
unpredictable interface names unless you set the net.naming-scheme=rhel-8.7 kernel parameter. In
this case, the RoCE interfaces will switch to predictable names with the "ens" prefix.
(BZ#2169382)
10.8. KERNEL
Using net_prio or net_cls controllers in v1 mode deactivates some controllers of the cgroup-
v2 hierarchy
In cgroup-v2 environments, using either net_prio or net_cls controllers in v1 mode disables the
hierarchical tracking of socket data. As a result, the cgroup-v2 hierarchy for socket data tracking
controllers is not active, and the dmesg command reports the following message:
cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation
(BZ#2046396)
Anaconda in some cases fails after entering the passphrase for encrypted devices
If kdump is disabled when preparing an installation and the user selects encrypted disk partitioning, the
Anaconda installer fails with a traceback after entering the passphrase for the encrypted device.
Keep kdump enabled during the installation and disable it after the installation process is
complete.
(BZ#2086100)
You can work around the problem by loading the crash extension file only once. As a result,
segmentation faults no longer occur in the described scenario.
149
Red Hat Enterprise Linux 8.6 8.6 Release Notes
(BZ#1906482)
Consequently, the capture kernel fails to save vmcore if a kernel crash is triggered after the memory
hot-plug or hot-unplug operation.
To work around this problem, restart the kdump service after hot-plug or hot-unplug:
(BZ#1793389)
(BZ#1659609)
To work around this problem, enable the 32-bit memory region in BIOS as follows:
As a result, crash kernel memory allocation within the 32-bit region succeeds and the kdump service
works as expected.
(BZ#1940674)
The kernel ACPI driver reports it has no access to a PCIe ECAM memory region
The Advanced Configuration and Power Interface (ACPI) table provided by firmware does not define a
memory region on the PCI bus in the Current Resource Settings (_CRS) method for the PCI bus device.
Consequently, the following warning message occurs during the system boot:
150
CHAPTER 10. KNOWN ISSUES
[ 2.817152] acpi PNP0A08:00: [Firmware Bug]: ECAM area [mem 0x30000000-0x31ffffff] not
reserved in ACPI namespace
[ 2.827911] acpi PNP0A08:00: ECAM at [mem 0x30000000-0x31ffffff] for [bus 00-1f]
However, the kernel is still able to access the 0x30000000-0x31ffffff memory region, and can assign that
memory region to the PCI Enhanced Configuration Access Mechanism (ECAM) properly. You can verify
that PCI ECAM works correctly by accessing the PCIe configuration space over the 256 byte offset with
the following output:
03:00.0 Non-Volatile memory controller: Sandisk Corp WD Black 2018/PC SN720 NVMe SSD (prog-
if 02 [NVM Express])
...
Capabilities: [900 v1] L1 PM Substates
L1SubCap: PCI-PM_L1.2- PCI-PM_L1.1- ASPM_L1.2+ ASPM_L1.1- L1_PM_Substates+
PortCommonModeRestoreTime=255us PortTPowerOnTime=10us
L1SubCtl1: PCI-PM_L1.2- PCI-PM_L1.1- ASPM_L1.2- ASPM_L1.1-
T_CommonMode=0us LTR1.2_Threshold=0ns
L1SubCtl2: T_PwrOn=10us
For more information about the problem, see the "Firmware Bug: ECAM area mem 0x30000000-
0x31ffffff not reserved in ACPI namespace" appears during system boot solution.
(BZ#1868526)
The tuned-adm profile powersave command causes the system to become unresponsive
Executing the tuned-adm profile powersave command leads to an unresponsive state of the Penguin
Valkyrie 2000 2-socket systems with the older Thunderx (CN88xx) processors. Consequently, reboot
the system to resume working. To work around this problem, avoid using the powersave profile if your
system matches the mentioned specifications.
(BZ#1609288)
1. The Generate NMI button on the Integrated Lights-Out (iLO) server management software.
This button is triggered by a user.
2. The hpwdt watchdog. The expiration by default sends an NMI to the server.
Both sequences typically occur when the system is unresponsive. Under normal circumstances, the NMI
handler for both these situations calls the kernel panic() function and if configured, the kdump service
generates a vmcore file.
Because of the missing NMI, however, kernel panic() is not called and vmcore is not collected.
In the first case (1.), if the system was unresponsive, it remains so. To work around this scenario, use the
virtual Power button to reset or power cycle the server.
151
Red Hat Enterprise Linux 8.6 8.6 Release Notes
In the second case (2.), the missing NMI is followed 9 seconds later by a reset from the Automated
System Recovery (ASR).
The HPE Gen9 Server line experiences this problem in single-digit percentages. The Gen10 at an even
smaller frequency.
(BZ#1602962)
As a result, the first kernel boots correctly and the vmcore file is expected to be captured upon the
kernel crash.
Note that the Amazon Web Services Graviton 2 and Amazon Web Services Graviton 3 processors do
not require you to manually remove the irqpoll parameter in the /etc/sysconfig/kdump file.
The kdump service can use a significant amount of crash kernel memory to dump the vmcore file.
Ensure that the capture kernel has sufficient memory available for the kdump service.
For related information on this Known Issue, see the The irqpoll kernel command line parameter might
cause vmcore generation failure article.
(BZ#1654962)
(BZ#1930576)
The OPEN MPI library may trigger run-time failures with default PML
In OPEN Message Passing Interface (OPEN MPI) implementation 4.0.x series, Unified Communication X
152
CHAPTER 10. KNOWN ISSUES
In OPEN Message Passing Interface (OPEN MPI) implementation 4.0.x series, Unified Communication X
(UCX) is the default point-to-point communicator (PML). The later versions of OPEN MPI 4.0.x series
deprecated openib Byte Transfer Layer (BTL).
However, OPEN MPI, when run over a homogeneous cluster (same hardware and software
configuration), UCX still uses openib BTL for MPI one-sided operations. As a consequence, this may
trigger execution errors. To work around this problem:
where,
The -mca pml ucx parameter configures OPEN MPI to use ucx PML.
The OPEN MPI, when run over a heterogeneous cluster (different hardware and software
configuration), it uses UCX as the default PML. As a consequence, this may cause the OPEN MPI jobs to
run with erratic performance, unresponsive behavior, or crash failures. To work around this problem, set
the UCX priority as:
-mca pml_ucx_priority 5
As a result, the OPEN MPI library is able to choose an alternative available transport layer over UCX.
(BZ#1866402)
# sfboot vf-msix-limit=2
NOTE
For more information about parameters to be adjusted accordingly, see the Solarflare Server Adapter
user guide.
(BZ#1971506)
153
Red Hat Enterprise Linux 8.6 8.6 Release Notes
On certain 64-bit ARM based systems, the firmware uses the non-contiguous memory allocation
method, which reserves memory randomly at different scattered locations. Consequently, due to the
unavailability of consecutive blocks of memory, the crash kernel cannot reserve memory space for the
kdump mechanism.
To work around this problem, install the kernel version provided by RHEL 8.8 and later. The latest
version of RHEL supports the fallback dump capture mechanism that helps to find a suitable memory
region in the described scenario.
(BZ#2214235)
Hardware certification of the real-time kernel on systems with large core-counts might
require passing the skew-tick=1 boot parameter to avoid lock contentions
Large or moderate sized systems with numerous sockets and large core-counts can experience latency
spikes due to lock contentions on xtime_lock, which is used in the timekeeping system. As a
consequence, latency spikes and delays in hardware certifications might occur on multiprocessing
systems. As a workaround, you can offset the timer tick per CPU to start at a different time by adding
the skew_tick=1 boot parameter.
Note that enabling skew_tick=1 causes a significant increase in power consumption and, therefore, it
must be enabled only if you are running latency sensitive real-time workloads.
(BZ#2214508)
You cannot name a writecache logical volume when using pvmove commands.
You cannot use logical volumes with writecache in combination with thin pools or VDO.
You cannot resize a logical volume while cache or writecache is attached to it.
154
CHAPTER 10. KNOWN ISSUES
(BZ#2059262)
LVM mirror devices that store a LUKS volume sometimes become unresponsive
Mirrored LVM devices with a segment type of mirror that store a LUKS volume might become
unresponsive under certain conditions. The unresponsive devices reject all I/O operations.
To work around the issue, Red Hat recommends that you use LVM RAID 1 devices with a segment type
of raid1 instead of mirror if you need to stack LUKS volumes on top of resilient software-defined
storage.
The raid1 segment type is the default RAID configuration type and replaces mirror as the
recommended solution.
To convert mirror devices to raid, see Converting a mirrored LVM device to a RAID1 logical volume .
(BZ#1730502)
On EFI systems, the EFI System Partition conventionally serves as the /boot file system. The
uEFI standard requires a specific GPT partition type and a specific file system type for this
partition.
RHEL 8 uses the Boot Loader Specification (BLS) for system boot entries. This specification
requires that the /boot file system is readable by the platform firmware. On EFI systems, the
platform firmware can read only the /boot configuration defined by the uEFI standard.
The support for LVM logical volumes in the GRUB 2 boot loader is incomplete. Red Hat does
not plan to improve the support because the number of use cases for the feature is decreasing
due to standards such as uEFI and BLS.
Red Hat does not plan to support /boot on LVM. Instead, Red Hat provides tools for managing system
snapshots and rollback that do not need the /boot file system to be placed on an LVM logical volume.
(BZ#1496229)
LVM no longer allows creating volume groups with mixed block sizes
LVM utilities such as vgcreate or vgextend no longer allow you to create volume groups (VGs) where
the physical volumes (PVs) have different logical block sizes. LVM has adopted this change because file
systems fail to mount if you extend the underlying logical volume (LV) with a PV of a different block size.
To re-enable creating VGs with mixed block sizes, set the allow_mixed_block_sizes=1 option in the
lvm.conf file.
(BZ#1768536)
Using Device mapper multipath with the NVMe/TCP driver causes system instability
DM multipath is not supported with the NVMe/TCP driver. Using it causes sleeping functions in the
kernel to be called in an atomic context, which then results in system instability.
To workaround the problem, enable native NVMe multipath. Do not use DM multipath tools. For RHEL
155
Red Hat Enterprise Linux 8.6 8.6 Release Notes
To workaround the problem, enable native NVMe multipath. Do not use DM multipath tools. For RHEL
8, add the option nvme_core.multipath=Y to the kernel command line.
(BZ#2022359)
As a result, complex virtual device stacks are correctly deactivated during shutdown and do not produce
error messages.
(BZ#2011699)
When a user of NIS uses a 32-bit application that calls the getpwnam() function, the call fails if the
nss_nis.i686 package is missing. To work around this problem, manually install the missing package by
using the yum install nss_nis.i686 command.
(BZ#1803161)
MariaDB 10.5 does not warn about dropping a non-existent table when the OQGraph plug-in
is enabled
When the OQGraph storage engine plug-in is loaded to the MariaDB 10.5 server, MariaDB does not
warn about dropping a non-existent table. In particular, when the user attempts to drop a non-existent
table using the DROP TABLE or DROP TABLE IF EXISTS SQL commands, MariaDB neither returns
an error message nor logs a warning.
Note that the OQGraph plug-in is provided by the mariadb-oqgraph-engine package, which is not
installed by default.
(BZ#1944653)
The MariaDB PAM plug-in version 1.0 does not work in RHEL 8. To work around this problem, use the
PAM plug-in version 2.0 provided by the mariadb:10.5 module stream.
(BZ#1942330)
156
CHAPTER 10. KNOWN ISSUES
processes using the PHP ldap extension might terminate unexpectedly if the mod_security or
mod_auth_openidc modules are also loaded by the httpd configuration.
Since the RHEL 8.3 update to the Apache Portable Runtime (APR) library, you can work around the
problem by setting the APR_DEEPBIND environment variable, which enables the use of the
RTLD_DEEPBIND dynamic linker option when loading httpd modules. When the APR_DEEPBIND
environment variable is enabled, crashes no longer occur in httpd configurations that load conflicting
libraries.
(BZ#1819607)
(BZ#1971061)
Using the cert-fix utility with the --agent-uid pkidbuser option breaks Certificate System
Using the cert-fix utility with the --agent-uid pkidbuser option corrupts the LDAP configuration of
Certificate System. As a consequence, Certificate System might become unstable and manual steps are
required to recover the system.
(BZ#1729215)
The /var/log/lastlog sparse file on IdM hosts can cause performance problems
During the IdM installation, a range of 200,000 UIDs from a total of 10,000 possible ranges is randomly
selected and assigned. Selecting a random range in this way significantly reduces the probability of
conflicting IDs in case you decide to merge two separate IdM domains in the future.
However, having high UIDs can create problems with the /var/log/lastlog file. For example, if a user with
the UID of 1280000008 logs in to an IdM client, the local /var/log/lastlog file size increases to almost
400 GB. Although the actual file is sparse and does not use all that space, certain applications are not
designed to identify sparse files by default and may require a specific option to handle them. For
example, if the setup is complex and a backup and copy application does not handle sparse files
correctly, the file is copied as if its size was 400 GB. This behavior can cause performance problems.
In case of a standard package, refer to its documentation to identify the option that handles
sparse files.
In case of a custom application, ensure that it is able to manage sparse files such as
/var/log/lastlog correctly.
(JIRA:RHELPLAN-59111)
FIPS mode does not support using a shared secret to establish a cross-forest trust
Establishing a cross-forest trust using a shared secret fails in FIPS mode because NTLMSSP
authentication is not FIPS-compliant. To work around this problem, authenticate with an Active
Directory (AD) administrative account when establishing a trust between an IdM domain with FIPS mode
157
Red Hat Enterprise Linux 8.6 8.6 Release Notes
(BZ#1924707)
Procedure
[Service]
Environment=RADIUS_MD5_FIPS_OVERRIDE=1
2. To apply the change, reload the systemd configuration and start the radiusd service:
# systemctl daemon-reload
# systemctl start radiusd
# RADIUS_MD5_FIPS_OVERRIDE=1 radiusd -X
Note that though FreeRADIUS can run in FIPS mode, this does not mean that it is FIPS compliant as it
uses weak ciphers and functions when in FIPS mode.
For more information on configuring FreeRADIUS authentication in FIPS mode, see How to configure
FreeRADIUS authentication in FIPS mode.
(BZ#1958979)
Actions required when running Samba as a print server and updating from RHEL 8.4 and
earlier
With this update, the samba package no longer creates the /var/spool/samba/ directory. If you use
Samba as a print server and use /var/spool/samba/ in the [printers] share to spool print jobs, SELinux
prevents Samba users from creating files in this directory. Consequently, print jobs fail and the auditd
service logs a denied message in /var/log/audit/audit.log. To avoid this problem after updating your
system from 8.4 and earlier:
2. If the share definition contains path = /var/spool/samba/, update the setting and set the path
parameter to /var/tmp/.
158
CHAPTER 10. KNOWN ISSUES
If you newly installed Samba on RHEL 8.5 or later, no action is required. The default
/etc/samba/smb.conf file provided by the samba-common package in this case already uses the
/var/tmp/ directory to spool print jobs.
(BZ#2009213)
Downgrading authselect after the rebase to version 1.2.2 breaks system authentication
The authselect package has been rebased to the latest upstream version 1.2.2. Downgrading
authselect is not supported and breaks system authentication for all users, including root.
If you downgraded the authselect package to 1.2.1 or earlier, perform the following steps to work
around this problem:
1. At the GRUB boot screen, select Red Hat Enterprise Linux with the version of the kernel that
you want to boot and press e to edit the entry.
2. Type single as a separate word at the end of the line that starts with linux and press Ctrl+X to
start the boot process.
(BZ#1892761)
The default keyword for enabled ciphers in the NSS does not work in conjunction with other
ciphers
In Directory Server you can use the default keyword to refer to the default ciphers enabled in the
network security services (NSS). However, if you want to enable the default ciphers and additional ones
using the command line or web console, Directory Server fails to resolve the default keyword. As a
consequence, the server enables only the additionally specified ciphers and logs the following error:
Security Initialization - SSL alert: Failed to set SSL cipher preference information: invalid ciphers
<default,+__cipher_name__>: format is +cipher1,-cipher2... (Netscape Portable Runtime error 0 - no
error)
As a workaround, specify all ciphers that are enabled by default in NSS including the ones you want to
additionally enable.
(BZ#1817505)
Potential risk when using the default value for ldap_id_use_start_tls option
When using ldap:// without TLS for identity lookups, it can pose a risk for an attack vector. Particularly a
man-in-the-middle (MITM) attack which could allow an attacker to impersonate a user by altering, for
example, the UID or GID of an object returned in an LDAP search.
Currently, the SSSD configuration option to enforce TLS, ldap_id_use_start_tls, defaults to false.
Ensure that your setup operates in a trusted environment and decide if it is safe to use unencrypted
communication for id_provider = ldap. Note id_provider = ad and id_provider = ipa are not affected
as they use encrypted connections protected by SASL and GSSAPI.
If it is not safe to use unencrypted communication, enforce TLS by setting the ldap_id_use_start_tls
159
Red Hat Enterprise Linux 8.6 8.6 Release Notes
If it is not safe to use unencrypted communication, enforce TLS by setting the ldap_id_use_start_tls
option to true in the /etc/sssd/sssd.conf file. The default behavior is planned to be changed in a future
release of RHEL.
(JIRA:RHELPLAN-155168)
10.12. DESKTOP
Disabling flatpak repositories from Software Repositories is not possible
Currently, it is not possible to disable or remove flatpak repositories in the Software Repositories tool in
the GNOME Software utility.
(BZ#1668760)
Generation 2 RHEL 8 virtual machines sometimes fail to boot on Hyper-V Server 2016
hosts
When using RHEL 8 as the guest operating system on a virtual machine (VM) running on a Microsoft
Hyper-V Server 2016 host, the VM in some cases fails to boot and returns to the GRUB boot menu. In
addition, the following error is logged in the Hyper-V event log:
The guest operating system reported that it failed with the following error code: 0x1E
This error occurs due to a UEFI firmware bug on the Hyper-V host. To work around this problem, use
Hyper-V Server 2019 or later as the host.
(BZ#1583445)
(BZ#1717947)
The radeon kernel driver currently does not reset hardware in the kexec context correctly. Instead,
radeon falls over, which causes the rest of the kdump service to fail.
To work around this problem, disable radeon in kdump by adding the following line to the
/etc/kdump.conf file:
Restart the machine and kdump. After starting kdump, the force_rebuild 1 line may be removed from
the configuration file.
Note that in this scenario, no graphics will be available during kdump, but kdump will work successfully.
(BZ#1694705)
160
CHAPTER 10. KNOWN ISSUES
(BZ#1812577)
To work around the problem, configure the hypervisor to assign at least 16 MB of video memory to the
VM. As a result, the GUI on the VM no longer crashes.
If you encounter this issue, Red Hat recommends that you report it to VMware.
See also the following VMware article: VMs with high resolution VM console may experience a crash on
ESXi 7.0.1 (83194).
(BZ#1910358)
VNC Viewer displays wrong colors with the 16-bit color depth on IBM Z
The VNC Viewer application displays wrong colors when you connect to a VNC session on an IBM Z
server with the 16-bit color depth.
To work around the problem, set the 24-bit color depth on the VNC server. With the Xvnc server,
replace the -depth 16 option with -depth 24 in the Xvnc configuration.
As a result, VNC clients display the correct colors but use more network bandwidth with the server.
(BZ#1886147)
To work around this problem, use the sudo -E command to run graphical applications as a root user.
(BZ#1673073)
To enable hardware acceleration or Vulkan on ARM, install the proprietary Nvidia driver.
(JIRA:RHELPLAN-57914)
161
Red Hat Enterprise Linux 8.6 8.6 Release Notes
Removing USB host devices using the web console does not work as expected
When you attach a USB device to a virtual machine (VM), the device number and bus number of the
USB device might change after they are passed to the VM. As a consequence, using the web console to
remove such devices fails due to the incorrect correlation of the device and bus numbers. To
workaround this problem, remove the <hostdev> part of the USB device, from the VM’s XML
configuration.
(JIRA:RHELPLAN-109067)
Attaching multiple host devices using the web console does not work
When you select multiple devices to attach to a virtual machine (VM) using the web console, only a
single device is attached and the rest are ignored. To work around this problem, attach only one device
at a time.
(JIRA:RHELPLAN-115603)
(BZ#2041997)
10.16. VIRTUALIZATION
Network traffic performance in virtual machines might be reduced
In some cases, RHEL 8.6 guest virtual machines (VMs) have somewhat decreased performance when
handling high levels of network traffic.
(BZ#2069047)
Using a large number of queues might cause Windows virtual machines to fail
Windows virtual machines (VMs) might fail when the virtual Trusted Platform Module (vTPM) device is
enabled and the multi-queue virtio-net feature is configured to use more than 250 queues.
This problem is caused by a limitation in the vTPM device. The vTPM device has a hardcoded limit on the
maximum number of opened file descriptors. Since multiple file descriptors are opened for every new
queue, the internal vTPM limit can be exceeded, causing the VM to fail.
To work around this problem, choose one of the following two options:
Keep the vTPM device enabled, but use less than 250 queues.
162
CHAPTER 10. KNOWN ISSUES
(BZ#2020133)
Live post-copy migration of VMs with failover VFs does not work
Currently, attempting to post-copy migrate a running virtual machine (VM) fails if the VM uses a device
with the virtual function (VF) failover capability enabled. To work around the problem, use the standard
migration type, rather than post-copy migration.
(BZ#2054656)
Live migrating VMs to a RHEL 8.6 Intel host from an earlier minor version of RHEL 8 does
not work
Because the Intel Transactional Synchronization Extensions (TSX) feature has become deprecated,
RHEL 8.6 hosts on Intel hardware no longer use the hle and rtm CPU flags. As a consequence, live
migrating a virtual machine (VM) to a RHEL 8.6 host fails if the source host uses RHEL 8.5 or an earlier
minor version of RHEL 8.
For more information on TSX deprecation, see the Red Hat KnowledgeBase .
(BZ#2134184)
The Milan VM CPU type is sometimes not available on AMD Milan systems
On certain AMD Milan systems, the Enhanced REP MOVSB (erms) and Fast Short REP MOVSB ( fsrm)
feature flags are disabled in the BIOS by default. Consequently, the 'Milan' CPU type might not be
available on these systems. In addition, VM live migration between Milan hosts with different feature flag
settings might fail. To work around these problems, manually turn on erms and fsrm in the BIOS of your
host.
(BZ#2077770)
Attaching LUN devices to virtual machines using virtio-blk does not work
The q35 machine type does not support transitional virtio 1.0 devices, and RHEL 8 therefore lacks
support for features that were deprecated in virtio 1.0. In particular, it is not possible on a RHEL 8 host to
send SCSI commands from virtio-blk devices. As a consequence, attaching a physical disk as a LUN
device to a virtual machine fails when using the virtio-blk controller.
Note that physical disks can still be passed through to the guest operating system, but they should be
configured with the device='disk' option rather than device='lun'.
(BZ#1777138)
(BZ#1910848)
IBM POWER hosts may crash when using the ibmvfc driver
When running RHEL 8 on a PowerVM logical partition (LPAR), a variety of errors may currently occur
due to problems with the ibmvfc driver. As a consequence, the host’s kernel may panic under certain
circumstances, such as:
163
Red Hat Enterprise Linux 8.6 8.6 Release Notes
(BZ#1961722)
Using perf kvm record on IBM POWER Systems can cause the VM to crash
When using a RHEL 8 host on the little-endian variant of IBM POWER hardware, using the perf kvm
record command to collect trace event samples for a KVM virtual machine (VM) in some cases results in
the VM becoming unresponsive. This situation occurs when:
The perf utility is used by an unprivileged user, and the -p option is used to identify the VM - for
example perf kvm record -e trace_cycles -p 12345.
To work around this problem, use the perf kvm utility with the -i option to monitor VMs that were
created using the virsh shell. For example:
Note that when using the -i option, child tasks do not inherit counters, and threads will therefore not be
monitored.
(BZ#1924016)
Windows Server 2016 virtual machines with Hyper-V enabled fail to boot when using certain
CPU models
Currently, it is not possible to boot a virtual machine (VM) that uses Windows Server 2016 as the guest
operating system, has the Hyper-V role enabled, and uses one of the following CPU models:
EPYC-IBPB
EPYC
To work around this problem, use the EPYC-v3 CPU model, or manually enable the xsaves CPU flag
for the VM.
(BZ#1942888)
To work around this problem, disable Transparent Huge Pages (THP) on the RHEL 7-ALT host, which
enables the migration to complete successfully.
(BZ#1741436)
164
CHAPTER 10. KNOWN ISSUES
To avoid this problem, add the --selinux-relabel option to the virt-customize command.
(BZ#1554735)
Deleting a forward interface from a macvtap virtual network resets all connection counts of
this network
Currently, deleting a forward interface from a macvtap virtual network with multiple forward interfaces
also resets the connection status of the other forward interfaces of the network. As a consequence, the
connection information in the live network XML is incorrect. Note, however, that this does not affect the
functionality of the virtual network. To work around the issue, restart the libvirtd service on your host.
(BZ#1332758)
(BZ#1974622)
To work around this issue, use the virsh nodedev-start or mdevctl start commands to activate the
mediated device before using it in virt-manager.
(BZ#2026985)
<cpu mode="host-model">
<model>power8</model>
</cpu>
To work around this problem, do not use POWER8 compatibility mode in RHEL 9 VMs.
In addition, note that running RHEL 9 VMs is not possible on POWER8 hosts.
(BZ#2035158)
Virtual machines sometimes fail to start when using many virtio-blk disks
Adding a large number of virtio-blk devices to a virtual machine (VM) may exhaust the number of
interrupt vectors available in the platform. If this occurs, the VM’s guest OS fails to boot, and displays a
dracut-initqueue[392]: Warning: Could not boot error.
(BZ#1719687)
165
Red Hat Enterprise Linux 8.6 8.6 Release Notes
Windows Server 2022 guests in some cases boot very slowly on AMD Milan
Virtual machines (VMs) that use the Windows Server 2022 guest operating system and the qemu64
CPU model currently take a very long time to boot on hosts with an AMD EPYC 7003 series processor
(also known as AMD Milan).
To work work around the problem, do not use qemu64 as the CPU model, because it is an unsupported
setting for VMs in RHEL 8. For example, use the host-model CPU instead.
(BZ#2012373)
SMT CPU topology is not detected by VMs when using host passthrough mode on AMD
EPYC
When a virtual machine (VM) boots with the CPU host passthrough mode on an AMD EPYC host, the
TOPOEXT CPU feature flag is not present. Consequently, the VM is not able to detect a virtual CPU
topology with multiple threads per core. To work around this problem, boot the VM with the EPYC CPU
model instead of host passthrough.
(BZ#1740002)
(BZ#2068429)
Setting static IP in a RHEL 8 virtual machine on a VMware host does not work
Currently, when using RHEL 8 as a guest operating system of a virtual machine (VM) on a VMware host,
the DatasourceOVF function does not work correctly. As a consequence, if you use the cloud-init utility
to set the VM’s network to static IP and then reboot the VM, the VM’s network will be changed to
DHCP.
(BZ#1750862)
(BZ#1865745)
The SCSI host address sometimes changes when booting a Hyper-V VM with multiple
guest disks
Currently, when booting a RHEL 8 virtual machine (VM) on the Hyper-V hypervisor, the host portion of
the Host, Bus, Target, Lun (HBTL) SCSI address in some cases changes. As a consequence, automated
tasks set up with the HBTL SCSI identification or device node in the VM do not work consistently. This
occurs if the VM has more than one disk or if the disks have different sizes.
166
CHAPTER 10. KNOWN ISSUES
To work around the problem, modify your kickstart files, using one of the following methods:
You can use for example the following powershell script to determine the specific device identifiers:
# Output what the /dev/disk/by-id/<value> for the specified hyper-v virtual disk.
# Takes a single parameter which is the virtual disk file.
# Note: kickstart syntax works with and without the /dev/ prefix.
param (
[Parameter(Mandatory=$true)][string]$virtualdisk
)
$p = $part[0]
$s0 = $p[6] + $p[7] + $p[4] + $p[5] + $p[2] + $p[3] + $p[0] + $p[1]
$p = $part[1]
$s1 = $p[2] + $p[3] + $p[0] + $p[1]
You can use this script on the hyper-v host, for example as follows:
Afterwards, the disk values can be used in the kickstart file, for example as follows:
As these values are specific for each virtual disk, the configuration needs to be done for each VM
instance. It may, therefore, be useful to use the %include syntax to place the disk information into a
separate file.
A kickstart file that configures disk selection based on size must include lines similar to the following:
...
...
167
Red Hat Enterprise Linux 8.6 8.6 Release Notes
# Dump whole SCSI/IDE disks out sorted from smallest to largest ouputting
# just the name
disks=(`lsblk -n -o NAME -l -b -x SIZE -d -I 8,3`) || exit 1
%end
(BZ#1906870)
Starting a RHEL 8 virtual machine on AWS using cloud-init takes longer than expected
Currently, initializing an EC2 instance of RHEL 8 using the cloud-init service on Amazon Web Services
(AWS) takes an excessive amount of time. To avoid this problem, remove the /etc/resolv.conf file from
the image you are using for VM creation before uploading the image to AWS.
(BZ#1862930)
10.18. SUPPORTABILITY
The getattachment command fails to download multiple attachments
The getattachment command is able to download only a single attachment, but fails to download
multiple attachments.
As a workaround, you can download multiple attachments one by one by passing the case number and
UUID for each attachment in the getattachment command.
(BZ#2064575)
Because a cryptographic key used by a certificate on the Customer Portal API does not meet the
requirements by the FUTURE system-wide cryptographic policy, the redhat-support-tool utility does
not work with this policy level at the moment.
To work around this problem, use the DEFAULT crypto policy while connecting to the Customer Portal
API.
(BZ#1802026)
Timeout when running sos report on IBM Power Systems, Little Endian
When running the sos report command on IBM Power Systems, Little Endian with hundreds or
thousands of CPUs, the processor plugin reaches its default timeout of 300 seconds when collecting
huge content of the /sys/devices/system/cpu directory. As a workaround, increase the plugin’s timeout
accordingly:
168
CHAPTER 10. KNOWN ISSUES
For a permanent change, edit the [plugin_options] section of the /etc/sos/sos.conf file:
[plugin_options]
# Specify any plugin options and their values here. These options take the form
# plugin_name.option_name = value
#rpm.rpmva = off
processor.timeout = 1800
The example value is set to 1800. The particular timeout value highly depends on a specific system. To
set the plugin’s timeout appropriately, you can first estimate the time needed to collect the one plugin
with no timeout by running the following command:
(BZ#2011413)
10.19. CONTAINERS
Running systemd within an older container image does not work
Running systemd within an older container image, for example, centos:7, does not work:
# mkdir /sys/fs/cgroup/systemd
# mount none -t cgroup -o none,name=systemd /sys/fs/cgroup/systemd
# podman run --runtime /usr/bin/crun --annotation=run.oci.systemd.force_cgroup_v1=/sys/fs/cgroup -
-rm -ti centos:7 /usr/lib/systemd/systemd
(JIRA:RHELPLAN-96940)
Container images signed with a Beta GPG key can not be pulled
Currently, when you try to pull RHEL Beta container images, podman exits with the error message:
Error: Source image rejected: None of the signatures were accepted. The images fail to be pulled
due to current builds being configured to not trust the RHEL Beta GPG keys by default.
As a workaround, ensure that the Red Hat Beta GPG key is stored on your local system and update the
existing trust scope with the podman image trust set command for the appropriate beta namespace.
If you do not have the Beta GPG key stored locally, you can pull it by running the following command:
169
Red Hat Enterprise Linux 8.6 8.6 Release Notes
To add the Beta GPG key as trusted to your namespace, use one of the following commands:
and
(BZ#2020301)
170
CHAPTER 11. INTERNATIONALIZATION
East Asian Languages - Japanese, Korean, Simplified Chinese, and Traditional Chinese.
European Languages - English, German, Spanish, French, Italian, Portuguese, and Russian.
The following table lists the fonts and input methods provided for various major languages.
English dejavu-sans-fonts
French dejavu-sans-fonts
German dejavu-sans-fonts
Italian dejavu-sans-fonts
Russian dejavu-sans-fonts
Spanish dejavu-sans-fonts
Portuguese dejavu-sans-fonts
Support for the Unicode 11 computing industry standard has been added.
171
Red Hat Enterprise Linux 8.6 8.6 Release Notes
A number of glibc locales have been synchronized with Unicode Common Locale Data
Repository (CLDR).
172
APPENDIX A. LIST OF TICKETS BY COMPONENT
Component Tickets
SLOF BZ#1910848
accel-config BZ#1843266
apr BZ#1819607
authselect BZ#1892761
bind9.16 BZ#1873486
bind BZ#2013993
brltty BZ#2008197
certmonger BZ#1577570
cockpit BZ#1666722
coreutils BZ#2030661
corosync-qdevice BZ#1784200
crash BZ#1906482
173
Red Hat Enterprise Linux 8.6 8.6 Release Notes
Component Tickets
cups-container BZ#1913715
cups BZ#2032965
distribution BZ#1657927
dmidecode BZ#2027665
dnf-plugins-core BZ#1868047
dnf BZ#1986657
ec2-images BZ#1862930
fido-device-onboard BZ#1989930
galera BZ#2042306
gcc BZ#1996862
gnome-software BZ#1668760
gnutls BZ#1628553
golang BZ#2014088
174
APPENDIX A. LIST OF TICKETS BY COMPONENT
Component Tickets
grafana-pcp BZ#1993149
grafana BZ#1993214
grub2 BZ#1583445
hostapd BZ#2016946
initscripts BZ#1875485
js-d3-flame-graph BZ#1993194
kdump-anaconda-addon BZ#2086100
kexec-tools BZ#2004000
krb5 BZ#1877991
libffi BZ#1875340
libgnome-keyring BZ#1607766
libguestfs BZ#1554735
libseccomp BZ#2019893
175
Red Hat Enterprise Linux 8.6 8.6 Release Notes
Component Tickets
libselinux-python-2.8- BZ#1666328
module
libssh BZ#1896651
llvm-toolset BZ#2001133
log4j-2-module BZ#1937468
lsvpd BZ#1993557
make BZ#2004246
mesa BZ#1886147
net-snmp BZ#1908331
nfs-utils BZ#1592011
nftables BZ#2047821
nginx-1.20-module BZ#1991787
nispor BZ#1848817
nss_nis BZ#1803161
opencryptoki BZ#1984993
openmpi BZ#1866402
opensc BZ#1947025
176
APPENDIX A. LIST OF TICKETS BY COMPONENT
Component Tickets
openssl BZ#1810911
perl BZ#2021471
php BZ#1978356
pmdk-1_fileformat_v6- BZ#2009889
module
policycoreutils BZ#1731501
postfix BZ#1711885
pykickstart BZ#1637872
177
Red Hat Enterprise Linux 8.6 8.6 Release Notes
Component Tickets
restore BZ#1997366
rig BZ#1888705
rpm-ostree BZ#2032594
rteval BZ#2012285
rust-toolset BZ#2002883
scap-workbench BZ#2051890
spice BZ#1849563
strace BZ#2038992
178
APPENDIX A. LIST OF TICKETS BY COMPONENT
Component Tickets
texinfo BZ#2022201
udica BZ#1763210
vdo BZ#1949163
wayland BZ#1673073
xfsdump BZ#2020494
xorg-x11-server BZ#1698565
179
Red Hat Enterprise Linux 8.6 8.6 Release Notes
0.2-8
Tue February 13 2024, Lucie Vařáková (lvarakova@redhat.com)
0.2-7
Fri November 10 2023, Gabriela Fialová (gfialova@redhat.com)
0.2-6
Fri October 13 2023, Gabriela Fialová (gfialova@redhat.com)
0.2-5
Fri September 8 2023, Lucie Vařáková (lvarakova@redhat.com)
0.2-4
Tue September 05 2023, Jaroslav Klech (jklech@redhat.com)
0.2-3
Thu August 24 2023, Lucie Vařáková (lvarakova@redhat.com)
0.2-2
Fri August 4 2023, Lenka Špačková (lspackova@redhat.com)
0.2-1
Tue August 1 2023, Lenka Špačková (lspackova@redhat.com)
Improved abstract.
0.2-0
180
APPENDIX B. REVISION HISTORY
0.1-9
Thu Jun 29 2023, Marc Muehlfeld (mmuehlfeld@redhat.com)
0.1-8
Fri Jun 16 2023, Lucie Vařáková (lvarakova@redhat.com)
0.1-7
Wed May 10 2023, Jaroslav Klech (jklech@redhat.com)
0.1-6
Thu Apr 27 2023, Gabriela Fialová (gfialova@redhat.com)
0.1-5
Thu Apr 13 2023, Gabriela Fialová (gfialova@redhat.com)
0.1-4
Thu Mar 2 2023, Lucie Vařáková (lvarakova@redhat.com)
0.1-4
Tue Jan 24 2023, Lucie Vařáková (lvarakova@redhat.com)
0.1-3
Thu Dec 08 2022, Marc Muehlfeld (mmuehlfeld@redhat.com)
0.1-2
Tue Nov 08 2022, Lucie Vařáková (lvarakova@redhat.com)
181
Red Hat Enterprise Linux 8.6 8.6 Release Notes
0.1-1
Wed Sep 07 2022, Lucie Vařáková (lvarakova@redhat.com)
0.1-0
Fri Aug 19 2022, Lucie Vařáková (lvarakova@redhat.com)
0.0-9
Fri Aug 05 2022, Lucie Vařáková (lvarakova@redhat.com)
0.0-8
Wed Aug 03 2022, Lenka Špačková (lspackova@redhat.com)
0.0-7
Fri Jul 22 2022, Lucie Vařáková (lvarakova@redhat.com)
0.0-6
Mon Jul 11 2022, Lenka Špačková (lspackova@redhat.com)
0.0-5
Jun 08 2022, Lucie Vařáková (lmanasko@redhat.com)
0.0-4
May 31 2022, Lucie Vařáková (lmanasko@redhat.com)
Added information about the in-place upgrade from RHEL 8 to RHEL 9 to the In-place
182
APPENDIX B. REVISION HISTORY
Added information about the in-place upgrade from RHEL 8 to RHEL 9 to the In-place
upgrade and OS conversion section.
0.0-3
May 18 2022, Lucie Maňásková (lmanasko@redhat.com)
0.0-2
May 16 2022, Lucie Maňásková (lmanasko@redhat.com)
0.0-1
May 11 2022, Lucie Maňásková (lmanasko@redhat.com)
0.0-0
Mar 30 2022, Lucie Maňásková (lmanasko@redhat.com)
Release of the Red Hat Enterprise Linux 8.6 Beta Release Notes.
183