Dieser Inhalt ist in der von Ihnen ausgewählten Sprache nicht verfügbar.
Chapter 16. Kernel
Review the most notable changes to kernel and boot loader between RHEL 9 and RHEL 10.
16.1. Notable changes to kernel Link kopierenLink in die Zwischenablage kopiert!
Review the most notable changes to kernel between RHEL 9 and RHEL 10.
sched_ext schedulerfor creating a custom schedulerIn RHEL 10, with
sched_extyou can create custom process scheduling code in extended Berkeley Packet Filter (eBPF) at runtime. Thesched_extscheduler allows you to replace the standard kernel scheduler with your own scheduling logic to control process prioritization, resource allocation, and execution behavior.Please note that Red Hat does not provide support for a custom scheduler.
- CFS is replaced with the EEVDF scheduler
The Completely Fair Scheduler (CFS) is replaced with a new scheduler, Enhanced Earliest Deadline First (EEVDF). This includes the following changes:
-
sched_min_granularityis nowsched_base_slice, and it uses the same unit.sched_base_slicedefines the minimum time that a task can be deferred from running. -
sched_wakeup_granularitysets the baseline priority (as a fraction of a CPU) for all tasks on the CPU.sched_wakeup_granularityis unused in EEVDF and therefore, it is removed.
CFS and EEVDF deliver similar workload results in most cases. However, minor variations in performance might be observed because the logic of each task selection is different.
-
- LUKS-encrypted kdump support on 64-bit x86
In Red Hat Enterprise Linux 10, the kdump feature on systems that use LUKS-encrypted block devices supports automatic crash dumping without manual passphrase entry. Previously, when the root file system or kdump target device used LUKS encryption, the crash kernel could not access the encrypted device unless an administrator entered the passphrase on the console or configured a separate unencrypted kdump target.
With Red Hat Enterprise Linux 10, the running kernel can pass the LUKS volume key to the kdump kernel when loading it with kexec. Together with updates in kdump utilities, this change enables:
- Unattended crash dumping on LUKS-encrypted systems, including headless and remote deployments
- Using the same LUKS-encrypted device as both the root file system and the kdump target, where supported
- More consistent behavior between encrypted and unencrypted installations
To use this capability, ensure that the system runs a Red Hat Enterprise Linux 10 kernel that includes this change, that kdump is configured and enabled, and that the kdump target device is reachable in the crash kernel environment. For configuration details and supported scenarios, see the Red Hat Enterprise Linux 10 kdump documentation.
- Identifying CVEs patched only by kernel live patches
The kpatch tooling can report a list of vulnerabilities that are currently fixed by live patches applied to the running kernel. The report focuses on CVEs that are patched only by live patches, not by the on-disk kernel packages. As a result, security and compliance teams can verify that a system is protected even if the kernel version reported by
unameappears vulnerable according to external advisories or scanners.This change is especially important in environments that rely on strict uptime requirements, where rebooting into a new kernel is delayed or coordinated across many systems. By exposing which CVEs are covered by live patches, Red Hat Enterprise Linux 10 makes it easier to integrate kernel live patch status into security reporting, risk assessments, and automated scanning workflows.
When planning an upgrade from RHEL 9 to Red Hat Enterprise Linux 10, consider how your existing vulnerability management and compliance processes can take advantage of this kpatch reporting. You might need to update internal documentation, dashboards, or scanner configuration to recognize that some CVEs are remediated only through live patches on the currently running kernel, even if the kernel package version does not yet include the fix.
- Changes in live kernel patch build tooling (
klp-build) and kernel modules The kernel live patch build tool (
klp-build) is now available in Red Hat Enterprise Linux 10 and is used to generate live patches from input kernel patches. As part of this change, the kernel build system uses additionalobjtoolprocessing when building kernel modules.Because of these changes, kernel modules can now have non-zero section load addresses (for example, non-zero
sh_addrvalues for.textand related sections). This is different from earlier Red Hat Enterprise Linux releases, where many tools assumed that kernel module sections start at address 0.This change can affect debugging and tracing tools that parse kernel module ELF metadata directly, such as tools based on
elfutilsorSystemTap, if they rely on the previous zero-based section address layout. To avoid unexpected failures or incorrect symbol resolution:-
Use versions of
elfutils,SystemTap, and related tooling that support kernel modules with non-zero section addresses on Red Hat Enterprise Linux 10. - If you maintain in-house or third-party tools that inspect kernel module ELF files, update them to handle non-zero section addresses correctly.
If you rely on live patching workflows or custom tooling that processes kernel modules, test your scenarios on Red Hat Enterprise Linux 10 before upgrading production systems from earlier Red Hat Enterprise Linux versions.
-
Use versions of
perftooling synchronized with upstream Linux 6.17In Red Hat Enterprise Linux 10.2, the user-space
perftooling is synchronized with the upstream Linux 6.17perfcodebase. This change affects system administrators and developers who useperffor performance analysis, profiling, and hardware event sampling on Red Hat Enterprise Linux systems.The rebase brings support for new and updated Performance Monitoring Units (PMUs) and events across several hardware platforms, including recent Intel uncore PMUs, new IBM Z CPU-MF counters, and additional vendor-specific platforms such as Fujitsu Monaka. As a result, the set of available events, metrics, and reporting options in
perfcan differ from earlier Red Hat Enterprise Linux major versions.Because of these changes, some existing
perfworkflows might require adjustment:- Event names, event aliases, and metrics that you used in earlier Red Hat Enterprise Linux major versions might be renamed, deprecated, or replaced.
-
Scripts, automation, and documentation that call
perfwith specific command-line options or event names might need updates to match the new upstream behavior. -
perf.datafiles that you collect on Red Hat Enterprise Linux 10.2 might not be fully compatible with olderperfversions from earlier Red Hat Enterprise Linux major versions.
Before upgrading to Red Hat Enterprise Linux 10.2, review and test your
perf-based tooling and scripts in a non-production environment. After upgrading, verify available events and metrics with theperf listandperf helpcommands, and update any automation that relies on older event names or behaviors.perftool rebased to upstream 6.18In Red Hat Enterprise Linux 10.2, the
perfuserspace tool is rebased to the upstream Linux 6.18 version. This rebase aligns the Red Hat Enterprise Linux performance monitoring stack with newer hardware support and upstream behavior.When upgrading to Red Hat Enterprise Linux 10.2, note the following changes:
- New and updated Performance Monitoring Unit (PMU) events are available on supported Intel systems, including additional core and uncore events on Intel Core Ultra (WCL-U) platforms.
-
Some event names, metric groups, and formulas have changed to follow upstream conventions. If you use scripted invocations such as
perf stat -M <metric-name>or parseperfJSON metrics, you must verify that the expected metrics and aliases are still present. -
Output from commands such as
perf statandperf reportcan differ slightly in formatting, column names, or default sort keys. Tools that parseperfoutput might require updates.
Before upgrading performance-sensitive environments or CI jobs that rely on
perf, test your existing workflows on Red Hat Enterprise Linux 10.2 with thekernel-6.12.0-177.el10build and re-baseline key measurements, because updated events and metric definitions can influence how results are reported.perfnow statically links tolibbpfIn Red Hat Enterprise Linux 10, the
perfprofiling tool now links statically to thelibbpflibrary that is included in the kernel source tree, instead of using thelibbpfshared library from thelibbpfruntime package.This change provides the following benefits:
-
perfalways uses a version oflibbpfthat is tested together with the corresponding kernel build. -
API and ABI changes in
libbpfthat are required byperfcan be delivered in a single kernel update, without requiring a matchinglibbpfpackage update. -
When the kernel source RPM is rebuilt,
perfis rebuilt with the matching in-treelibbpfcode.
For most users, this change is transparent and does not require any manual action. Existing
perfworkflows and command-line options continue to work as before.However, if you relied on the
perfbinary dynamically linking against the systemlibbpfshared library—for example, for troubleshooting or for validating behavior against a specificlibbpfpackage version—you can no longer changeperf’s `libbpfbehavior by updating only thelibbpfruntime package. In such cases, you must use theperftool from the kernel build that includes the desired in-treelibbpfversion.-
- BPF subsystem rebased to Linux kernel 6.17
In Red Hat Enterprise Linux 10, the Berkeley Packet Filter (BPF) subsystem is rebased to the upstream Linux kernel 6.17 level. This update adds new BPF features, a verifier, and performance improvements, which can change how existing BPF programs and tools behave after an upgrade from earlier Red Hat Enterprise Linux major versions.
Compared to previous Red Hat Enterprise Linux releases, the BPF rebase to 6.17 introduces:
- New BPF instructions and helper functions for observability and networking use cases.
- Stricter verifier checks for pointer arithmetic, bounds checks, and map access.
- Updates to BPF maps, program types, and attach points used by networking, tracing, and observability tools.
After upgrading to Red Hat Enterprise Linux 10:
- Some BPF programs that previously loaded might now be rejected by the updated verifier due to stricter safety checks or register state tracking.
- BPF-based tools that depend on earlier verifier behavior or kernel internals might require updates.
Before upgrading, test your existing BPF programs and workflows on a non-production Red Hat Enterprise Linux 10 system and rebuild BPF user-space components against the Red Hat Enterprise Linux 10 toolchain and kernel headers.
- Changes to AMD CCP driver support for Venice platforms
On AMD Venice-based systems, the AMD Cryptographic Co-processor (CCP) driver in Red Hat Enterprise Linux 10.2 is updated to recognize additional Venice PCI device IDs. As a result, CCP hardware on these systems is now correctly detected and initialized by the kernel.
This change can affect environments that use the CCP engine for cryptographic acceleration (for example, IPsec or
dm-cryptworkloads) on Venice platforms:- Systems that previously did not expose CCP-based acceleration on Venice hardware might start using it after upgrading to Red Hat Enterprise Linux 10.2, which can change performance characteristics of cryptographic workloads.
- Monitoring and capacity planning tools might report different CPU utilization profiles because some cryptographic operations are now offloaded to the CCP device.
If you rely on specific performance baselines, hardware offload behavior, or FIPS-compliant crypto configurations, review and validate your workload performance and security policies after upgrading Venice-based systems to Red Hat Enterprise Linux 10.2.
- Intel In-Memory Analytics Accelerator support on Wildcat Lake platform
On systems based on the Intel Wildcat Lake platform, Red Hat Enterprise Linux 10 now recognizes the PCI device IDs for the Intel In-Memory Analytics Accelerator (IAA) devices. Previously, these IAA devices might not have been detected correctly and could not be used by the operating system.
As a result, when you run Red Hat Enterprise Linux 10 on supported Wildcat Lake systems with IAA hardware, the kernel can now discover and expose the accelerator devices for supported workloads such as compression and analytics offload.
To use these accelerators after upgrading to Red Hat Enterprise Linux 10 on Wildcat Lake systems:
- Ensure that the system firmware and BIOS are updated to vendor-recommended versions and that accelerator features are enabled in the firmware setup.
- Install the Red Hat Enterprise Linux 10 kernel and related packages that provide support for Intel IAA on the Wildcat Lake platform.
- Follow your hardware vendor’s documentation and the Red Hat Enterprise Linux hardware enablement documentation to configure and verify accelerator usage in your environment.
- Intel QuickAssist Technology (QAT) driver updates for Intel DMR CPUs
In Red Hat Enterprise Linux 10.2, the Intel QuickAssist Technology (QAT) kernel driver is updated to a version based on upstream 6.18. This update enables QAT acceleration on recent Intel DMR-family CPUs and includes bug fixes that apply to all supported QAT devices.
These changes can improve hardware-accelerated cryptography and data compression performance on systems with the listed processors. Because the driver includes multiple functional fixes, QAT behavior on existing platforms can change compared to earlier Red Hat Enterprise Linux 10 minor releases.
When planning an upgrade to Red Hat Enterprise Linux 10.2 on systems that use Intel QAT:
- Verify that the kernel recognizes QAT devices after the upgrade and that QAT-based workloads complete successfully.
- Re-evaluate performance-sensitive cryptography and compression workloads that depend on QAT acceleration.
- Review any monitoring or troubleshooting tools that report QAT device or driver information, because identifiers and version details might differ from earlier Red Hat Enterprise Linux 10 releases.
- Updated
tpm2-toolsand related TPM 2.0 components In Red Hat Enterprise Linux 10, Trusted Platform Module (TPM) 2.0 tooling continues to evolve to match current hardware requirements and security practices. When planning an upgrade from RHEL 9 to RHEL 10 on Lenovo 64-bit x86 platforms, review any dependencies on the
tpm2-toolspackage and associated TPM-based workflows.If your deployments rely on TPM 2.0 for secure boot measurements, sealed key storage, attestation, or platform integrity checks, validate that your automation, scripts, and operating procedures remain compatible with the TPM tooling included in RHEL 10. In particular, verify behavior such as command-line options, output formats, and integration with provisioning or compliance pipelines before large-scale rollout. This reduces the risk of unexpected regressions in environments that treat TPM-backed trust as a critical part of their platform integrity and compliance strategy.
16.2. Notable changes to boot loader Link kopierenLink in die Zwischenablage kopiert!
Review the most notable changes to boot loader between RHEL 9 and RHEL 10.
- Secure Boot
shimsigning requirements Red Hat Enterprise Linux uses the
shimboot loader as the first component in the UEFI Secure Boot chain. Theshimbinary must be signed with keys that the platform firmware trusts, andshimmust trust the keys that sign later boot components such asgrub2and the kernel.In RHEL 10.2, the
shimbinaries are signed with three keys, in this order:- Microsoft Windows UEFI Driver Publisher (2011)
- Microsoft UEFI CA 2023
- Red Hat UEFI Publisher 2024
For a
shimbinary to load under Secure Boot, at least one of the corresponding certificates must be enrolled in the system firmware trust store. Earliershimbuilds were signed only with the Microsoft Windows UEFI Driver Publisher (2011) key.For more information about these signatures and their impact on Red Hat Enterprise Linux Secure Boot, see the Secure Boot Certificate Changes in 2026: Guidance for Red Hat Enterprise Linux Environments.
- Changes in trusted keys for
grub2and the kernel Starting with RHEL 10.1, the
grub2and kernel binaries are signed with longer, more secure keys. To load these components,shimmust trust both Red Hat Certificate Authority (CA) 5 and CA 8. As a result, systems that upgrade to RHEL 10.2 must have a sufficiently recentshimin the existing installation before attempting the upgrade.The minimum supported
shimlevels for upgrade are:-
From RHEL 8: Update to RHEL 8.10 and ensure that
shim-15.8-6or later is installed before upgrading to RHEL 10.x. -
From RHEL 9: Ensure that
shim-15.8-3or later is installed before upgrading to RHEL 10.x. You cannot upgrade from RHEL 9.0 directly; you must be on RHEL 9.2 or later before moving to RHEL 10.x.
If the existing RHEL 8 or RHEL 9 deployments use older
shimbuilds that do not trust both CA 5 and CA 8,shimcannot verify the newergrub2and kernel signatures. In such cases, systems with Secure Boot enabled will fail to start the updated boot chain.-
From RHEL 8: Update to RHEL 8.10 and ensure that
- Planning for June 2026 Microsoft certificate changes
Microsoft will no longer use the current Secure Boot signing key after June 2026. However,
shimbinaries that are signed only with the Microsoft Windows UEFI Driver Publisher (2011) key continue to boot after June 2026, provided that the corresponding 2011 certificate remains enrolled in firmware. The RHEL 10.2shimbinaries are also signed with the Microsoft UEFI CA 2023 certificate and the Red Hat UEFI Publisher 2024 key, which enables them to work with updated Secure Boot trust configurations.When planning upgrades to RHEL 10.2 on systems with Secure Boot enabled, perform all of the following actions:
Verify that the firmware enrolls at least one of the following certificates:
- Microsoft Windows UEFI Driver Publisher (2011)
- Microsoft UEFI CA 2023
- Red Hat UEFI Publisher 2024
-
Ensure that the installed
shimpackages on existing RHEL 8 and RHEL 9 systems meet the minimum version requirements so thatshimtrusts both Red Hat CA 5 and CA 8 and can loadgrub2and the kernel binaries signed with longer, more secure keys. -
Review any custom boot flows that bypass the standard
shimbinary and update them to comply with the RHEL Secure Boot trust model.
Failure to meet these conditions might cause RHEL 10.2 systems to fail to boot under Secure Boot and might require firmware configuration changes or rework of the Secure Boot chain of trust before deployment.
- Secure Boot shim signing for RHEL 10 on x86_64 and aarch64
- Red Hat Enterprise Linux (RHEL) 10 requires a signed shim binary to support Secure Boot on x86_64 and aarch64 architectures. The shim functions as the initial boot loader, verifying and loading subsequent boot components if you enabled Secure Boot. If a signed and trusted shim is not available, RHEL 10 cannot boot on systems with Secure Boot enforced. This limitation might affect deployments in enterprise and cloud environments.