7.4 Release Notes
Red Hat Enterprise Linux 7
Release Notes for Red Hat Enterprise Linux 7.4
Abstract
The Release Notes provide high-level coverage of the improvements and additions that have been implemented in Red Hat Enterprise Linux 7.4 and document known problems in this release, as well as notable bug fixes, Technology Previews, deprecated functionality, and other details.
Preface
Red Hat Enterprise Linux minor releases are an aggregation of individual security, enhancement, and bug fix errata. The Red Hat Enterprise Linux 7.4 Release Notes document describes the major changes made to the Red Hat Enterprise Linux 7 operating system and its accompanying applications for this minor release, as well as known problems and a complete list of all currently available Technology Previews.
Capabilities and limits of Red Hat Enterprise Linux 7 as compared to other versions of the system are available in the Red Hat Knowledgebase article available at https://access.redhat.com/articles/rhel-limits.
Packages distributed with this release are listed in Red Hat Enterprise Linux 7 Package Manifest. Migration from Red Hat Enterprise Linux 6 is documented in the Migration Planning Guide.
For information regarding the Red Hat Enterprise Linux life cycle, refer to https://access.redhat.com/support/policy/updates/errata/.
Chapter 1. Overview Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
Security
- Red Hat Enterprise Linux 7.4 introduces support for Network Bound Disk Encryption (NBDE), which enables the system administrator to encrypt root volumes of hard drives on bare metal machines without requiring to manually enter password when systems are rebooted.
- The
USBGuardsoftware framework provides system protection against intrusive USB devices by implementing basic whitelisting and blacklisting capabilities based on device attributes. - The
OpenSSHlibraries update includes the ability to resume interrupted uploads in Secure File Transfer Protocol (SFTP) and adds support for a new fingerprint type that uses the SHA-256 algorithm. ThisOpenSSHversion also removes server-side support for the SSH-1 protocol. - Multiple new Linux Audit capabilities have been added to enable easier administration, to filter the events logged by the Audit system, gather more information from critical events, and to interpret large numbers of records.
- The
OpenSCset of libraries and utilities adds support for Common Access Card (CAC) cards and now provides also theCoolKeyapplet functionality. - The
OpenSSLupdate includes multiple enhancements, such as support for the Datagram Transport Layer Security (DTLS) version 1.2 protocol and Application-Layer Protocol Negotiation (ALPN). - The
OpenSCAPtools have been NIST-certified, which enables easier adoption in regulated environments. - Cryptographic protocols and algorithms that are considered insecure have been deprecated. However, this version also introduces a lot of other cryptographic-related improvements. For more information, see Part V, “Deprecated Functionality” and the Enhancing the Security of the Operating System with Cryptography Changes in Red Hat Enterprise Linux 7.4 Knowledgebase article on the Red Hat Customer Portal.
See Chapter 15, Security for more information on security enhancements.
Identity Management
- The System Security Services Daemon (SSSD) in a container is now fully supported. The Identity Management (IdM) server container is available as a Technology Preview feature.
- Users are now able to install new Identity Management servers, replicas, and clients on systems with FIPS mode enabled.
- Several enhancements related to smart card authentication have been introduced.
For detailed information on changes in IdM, see Chapter 5, Authentication and Interoperability. For details on deprecated capabilities related to IdM, see Part V, “Deprecated Functionality”.
Networking
- NetworkManager supports additional features for routing, enables the Media Access Control Security (MACsec) technology, and is now able to handle unmanaged devices.
- Kernel Generic Routing Encapsulation (GRE) tunneling has been enhanced.
For more networking features, see Chapter 14, Networking.
Kernel
- Support for NVMe Over Fabric has been added to the NVM-Express kernel driver, which increases flexibility when accessing high performance NVMe storage devices located in the data center on both Ethernet or Infiniband fabric infrastructures.
For further kernel-related changes, refer to Chapter 12, Kernel.
Storage and File Systems
- LVM provides full support for RAID takeover, which allows users to convert a RAID logical volume from one RAID level to another, and for RAID reshaping, which allows users to reshape properties, such as the RAID algorithm, stripe size, or number of images.
- You can now enable SELinux support for containers when you use OverlayFS with Docker.
- NFS over RDMA (NFSoRDMA) server is now fully supported when accessed by Red Hat Enterprise Linux clients.
See Chapter 17, Storage for further storage-related features and Chapter 9, File Systems for enhancements to file systems.
Tools
- The Performance Co-Pilot (PCP) application has been enhanced to support new client tools, such as
pcp2influxdb,pcp-mpstat, andpcp-pidstat. Additionally, new PCP performance metrics from several subsystems are available for a variety of Performance Co-Pilot analysis tools.
For more information regarding updates to various tools, see Chapter 7, Compiler and Tools.
High Availability
- Red Hat Enterprise Linux 7.4 introduces full support for the following features:
clufter, a tool for transforming and analyzing cluster configuration formats- Quorum devices (QDevice) in a Pacemaker cluster for managing stretch clusters
Boothcluster ticket manager
For more information on the high availability features introduced in this release, see Chapter 6, Clustering.
Virtualization
- Red Hat Enterprise Linux 7 guest virtual machines now support the Elastic Network Adapter (ENA), and thus provide enhanced networking capabilities when running on the the Amazon Web Services (AWS) cloud.
For further enhancements to Virtualization, see Chapter 19, Virtualization.
Management and Automation
- Red Hat Enterprise Linux 7.4 includes Red Hat Enterprise Linux System Roles powered by Ansible, a configuration interface that simplifies management and maintenance of Red Hat Enterprise Linux deployments. This feature is available as a Technology Preview.
For details, refer to Chapter 47, Red Hat Enterprise Linux System Roles Powered by Ansible.
Red Hat Insights
Since Red Hat Enterprise Linux 7.2, the Red Hat Insights service is available. Red Hat Insights is a proactive service designed to enable you to identify, examine, and resolve known technical issues before they affect your deployment. Insights leverages the combined knowledge of Red Hat Support Engineers, documented solutions, and resolved issues to deliver relevant, actionable information to system administrators.
The service is hosted and delivered through the customer portal at https://access.redhat.com/insights/ or through Red Hat Satellite. For further information, data security, and limits, refer to https://access.redhat.com/insights/splash/.
Red Hat Customer Portal Labs
Red Hat Customer Portal Labs is a set of tools in a section of the Customer Portal available at https://access.redhat.com/labs/. The applications in Red Hat Customer Portal Labs can help you improve performance, quickly troubleshoot issues, identify security problems, and quickly deploy and configure complex applications. Some of the most popular applications are:
Chapter 2. Architectures Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
Red Hat Enterprise Linux 7.4 is distributed with the kernel version 3.10.0-693, which provides support for the following architectures: [1]
[1]
Note that the Red Hat Enterprise Linux 7.4 installation is supported only on 64-bit hardware. Red Hat Enterprise Linux 7.4 is able to run 32-bit operating systems, including previous versions of Red Hat Enterprise Linux, as virtual machines.
[2]
Red Hat Enterprise Linux 7.4 (big endian) is currently supported as a KVM guest on Red Hat Enterprise Virtualization for Power, and on PowerVM.
[3]
Red Hat Enterprise Linux 7.4 (little endian) is currently supported as a KVM guest on Red Hat Enterprise Virtualization for Power, on PowerVM, and PowerNV (bare metal).
[4]
Note that Red Hat Enterprise Linux 7.4 supports IBM zEnterprise 196 hardware or later; IBM z10 Systems mainframe systems are no longer supported and will not boot Red Hat Enterprise Linux 7.4.
Chapter 3. Important Changes to External Kernel Parameters Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
This chapter provides system administrators with a summary of significant changes in the kernel shipped with Red Hat Enterprise Linux 7.4. These changes include added or updated
proc entries, sysctl, and sysfs default values, boot parameters, kernel configuration options, or any noticeable behavior changes.
Updated /proc/sys/kernel entries
- hung_task_panic
- Controls the behavior of the kernel when an unresponsive task is detected. This file occurs if
CONFIG_DETECT_HUNG_TASKis enabled.Format: { "0" | "1" }0 - Continue operation. Default behavior.1 - Panic immediately. - hung_task_check_count
- Provides the upper bound on the number of tasks that are checked. This file occurs if
CONFIG_DETECT_HUNG_TASKis enabled. - hung_task_timeout_secs
- Checks interval. Reports a warning in case that a task in D state is not scheduled for longer time than this value. This file occurs if
CONFIG_DETECT_HUNG_TASKis enabled.0 - Infinite timeout - no checking done. - hung_task_warning
- Provides the maximum number of warnings to report during a check interval. When this value is reached, no more warnings will be reported. This file occurs if
CONFIG_DETECT_HUNG_TASKis enabled.-1 - Reports an infinite number of warnings. - panic_on_rcu_stall
- When set to 1, calls the panic() function after RCU stall detection messages. This is useful to define the root cause of RCU stalls using a vmcore.0 - Do not panic when RCU stall takes place. Default behavior.1 - Panic after printing RCU stall messages.
Updated /proc/sys/user entries
You can use the files in the
/proc/sys/user directory to override the default limits for the number of namespaces and other objects that have per user namespace limits. The purpose of these limits is to stop programs that malfunction and attempt to create a high number of objects. The default values of these limits are adjusted so that any program in normal operation cannot reach them.
The creation of per user namespace objects is charged to the user in the user namespace who created the object and who verified to be below the per user limit in that user namespace. The creation of such objects happens in user namespaces and is also charged to all users who created user namespaces.
This recursive counting of created objects ensures that creating a user namespace does not allow a user to exceed their current limits.
The updated files in
/proc/sys/user are:
- max_cgroup_namespaces
- The maximum number of control group namespaces that any user in the current user namespace can create.
- max_ipc_namespaces
- The maximum number of interprocess communication namespaces that any user in the current user namespace can create.
- max_mnt_namespaces
- The maximum number of mount namespaces that any user in the current user namespace can create.
- max_net_namespaces
- The maximum number of network namespaces that any user in the current user namespace can create.
- max_pid_namespaces
- The maximum number of process ID namespaces that any user in the current user namespace can create.
- max_user_namespaces
- The maximum number of user ID namespaces that any user in the current user namespace can create.
- max_uts_namespaces
- The maximum number of UNIX Timesharing System (UTS) namespaces that any user in the current user namespace can create.
Kernel parameters
- acpi_force_table_verification [HW,ACPI]
- Enables table checksum verification during early stage. By default, disabled on the 32-bit AMD and Intel architecture due to early mapping size limitation.
- acpi_no_auto_ssdt [HW,ACPI]
- Disables automatic loading of Secondary System Description Table (SSDT).
- acpi_no_static_ssdt [HW,ACPI]
- Disables installation of static SSDTs at early boot time. By default, SSDTs contained in the Root System Description Table (RSDT) or eXtended System Descriptor Table (XSDT) are installed automatically and they appear in the
/sys/firmware/acpi/tablesdirectory.This option turns off this feature. Specifying this option does not affect dynamic table installation which installs SSDT tables to the/sys/firmware/acpi/tables/dynamicdirectory. - irqaffinity= [SMP]
- Sets the default irq affinity mask in the following formats:Format: <cpu number>,..., <cpu number>or<cpu number>-<cpu number>You can use a positive range in ascending order or a combination.<cpu number>,...,<cpu number>-<cpu number>
- nokaslr [KNL]]
- Disables installation of static SSDTs at early boot time. By default, SSDTs contained in the RSDT or XSDT are installed automatically and they appear in the
/sys/firmware/acpi/tablesdirectory.Disables kernel and module base offset Address SpaceLayout Randomization (ASLR) ifCONFIG_RANDOMIZE_BASEis set. - nohibernate
- Disables hibernation and resume.
- crash_kexec_post_notifiers
- Runs
kdumpafter running panic-notifiers and dumping kmsg. - [PCI] hpbussize=nn
- Provides the minimum amount of additional bus numbers reserved for buses below a hotplug bridge. Default is 1.
- pcie_port_pm=[PCIE]
- PCIe port power management handling:Format: { "off" | "force" }off - Disables power management of all PCIe ports.1 - Enables power management of all PCIe ports.
- sunrpc.svc_rpc_per_connection_limit=[NFS,SUNRPC]
- Limits the number of requests for the server to process in parallel from a single connection. The default value is 0 (no limit).
Part I. New Features Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
This part documents new features and major enhancements introduced in Red Hat Enterprise Linux 7.4.
Chapter 4. General Updates Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
In-place upgrade from Red Hat Enterprise Linux 6 to Red Hat Enterprise Linux 7
An in-place upgrade offers a way of upgrading a system to a new major release of Red Hat Enterprise Linux by replacing the existing operating system. To perform an in-place upgrade, use the
Preupgrade Assistant, a utility that checks the system for upgrade issues before running the actual upgrade, and that also provides additional scripts for the Red Hat Upgrade Tool. When you have solved all the problems reported by the Preupgrade Assistant, use the Red Hat Upgrade Tool to upgrade the system.
For details regarding procedures and supported scenarios, see https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/Migration_Planning_Guide/chap-Red_Hat_Enterprise_Linux-Migration_Planning_Guide-Upgrading.html and https://access.redhat.com/solutions/637583.
Note that the
Preupgrade Assistant and the Red Hat Upgrade Tool are available in the Red Hat Enterprise Linux 6 Extras channel, see https://access.redhat.com/support/policy/updates/extras. (BZ#1432080)
cloud-init moved to the Base channel
As of Red Hat Enterprise Linux 7.4, the cloud-init package and its dependencies have been moved from the Red Hat Common channel to the Base channel.
Cloud-init is a tool that handles early initialization of a system using metadata provided by the environment. It is typically used to configure servers booting in a cloud environment, such as OpenStack or Amazon Web Services. Note that the cloud-init package has not been updated since the latest version provided through the Red Hat Common channel. (BZ#1427280)
Chapter 5. Authentication and Interoperability Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
SSSD in a container now fully supported
The rhel7/sssd container image, which provides the System Security Services Daemon (SSSD), is no longer a Technology Preview feature. The image is now fully supported. Note that the
rhel7/ipa-server container image is still a Technology Preview feature.
For details, see https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html-single/using_containerized_identity_management_services. (BZ#1467260)
Identity Management now supports FIPS
With this enhancement, Identity Management (IdM) supports the Federal Information Processing Standard (FIPS). This enables you to run IdM in environments that must meet the FIPS criteria. To run IdM with FIPS mode enabled, you must set up all servers in the IdM environment using Red Hat Enterprise Linux 7.4 with FIPS mode enabled.
Note that you cannot:
- Enable FIPS mode on existing IdM servers previously installed with FIPS mode disabled.
- Install a replica in FIPS mode when using an existing IdM server with FIPS mode disabled.
For further details, see https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html-single/Linux_Domain_Identity_Authentication_and_Policy_Guide/index.html#prerequisites. (BZ#1125174)
SSSD supports obtaining a Kerberos ticket when users authenticate with a smart card
The System Security Services Daemon (SSSD) now supports the Kerberos PKINIT preauthentication mechanism. When authenticating with a smart card to a desktop client system enrolled in an Identity Management (IdM) domain, users receive a valid Kerberos ticket-granting ticket (TGT) if the authentication was successful. Users can then use the TGT for further single sign-on (SSO) authentication from the client system.
For details, see https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/Linux_Domain_Identity_Authentication_and_Policy_Guide/sc-pkinit-auth.html. (BZ#1200767, BZ#1405075)
SSSD enables logging in to different user accounts with the same smart card certificate
Previously, the System Security Services Daemon (SSSD) required every certificate to be uniquely mapped to a single user. When using smart card authentication, users with multiple accounts were not able to log in to all of these accounts with the same smart card certificate. For example, a user with a personal account and a functional account (such as a database administrator account) was able to log in only to the personal account.
With this update, SSSD no longer requires certificates to be uniquely mapped to a single user. As a result, users can now log in to different accounts with a single smart card certificate.
For details, see https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/Linux_Domain_Identity_Authentication_and_Policy_Guide/smart-cards.html. (BZ#1340711, BZ#1402959)
IdM web UI enables smart card login
The Identity Management web UI enables users to log in using smart cards.
For details, see https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/Linux_Domain_Identity_Authentication_and_Policy_Guide/sc-web-ui-auth.html. (BZ#1366572)
New packages: keycloak-httpd-client-install
The keycloak-httpd-client-install packages provide various libraries and tools that can automate and simplify the configuration of Apache
httpd authentication modules when registering as a Red Hat Single Sign-On (RH-SSO, also called Keycloak) federated Identity Provider (IdP) client.
For details on RH-SSO, see https://access.redhat.com/products/red-hat-single-sign-on.
As part of this update, new dependencies have been added to Red Hat Enterprise Linux:
- The python-requests-oauthlib package: This package provides the OAuth library support for the python-requests package, which enables python-requests to use OAuth for authentication.
- The python-oauthlib package: This package is a Python library providing OAuth authentication message creation and consumption. It is meant to be used in conjunction with tools providing message transport. (BZ#1401781, BZ#1401783, BZ#1401784)
New Kerberos credential cache type: KCM
This update adds a new SSSD service named
kcm. The service is included in the sssd-kcm subpackage.
When the
kcm service is installed, you can configure the Kerberos library to use a new credential cache type named KCM. When the KCM credential cache type is configured, the sssd-kcm service manages the credentials.
The KCM credential cache type is well-suited for containerized environments:
- With KCM, you can share credential caches between containers on demand, based on mounting the UNIX socket on which the
kcmservice listens. - The
kcmservice runs in user space outside the kernel, unlike the KEYRING credential cache type that RHEL uses by default. With KCM, you can run thekcmservice only in selected containers. With KEYRING, all containers share the credential caches because they share the kernel.
Additionally, the KCM credential cache type supports cache collections, unlike the FILE ccache type.
For details, see the sssd-kcm(8) man page. (BZ#1396012)
AD users can log in to the web UI to access their self-service page
Previously, Active Directory (AD) users were only able to authenticate using the
kinit utility from the command line. With this update, AD users can also log in to the Identity Management (IdM) web UI. Note that the IdM administrator must create an ID override for an AD user before the user is able to log in.
As a result, AD users can access their self-service page through the IdM web UI. The self-service page displays the information from the AD users' ID override.
For details, see https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/Linux_Domain_Identity_Authentication_and_Policy_Guide/using-the-ui.html#ad-users-idm-web-ui. (BZ#872671)
SSSD enables configuring an AD subdomain in the SSSD server mode
Previously, the System Security Services Daemon (SSSD) automatically configured trusted Active Directory (AD) domains. With this update, SSSD supports configuring certain parameters for trusted AD domains in the same way as the joined domain.
As a result, you can set individual settings for trusted domains, such as the domain controller that SSSD communicates with. To do this, create a section in the
/etc/sssd/sssd.conf file with a name that follows this template:
[domain/main_domain/trusted_domain]
[domain/main_domain/trusted_domain]
For example, if the main IdM domain name is ipa.com and the trusted AD domain name is ad.com, the corresponding section name is:
[domain/ipa.com/ad.com]
[domain/ipa.com/ad.com]
(BZ#1214491)
SSSD supports user and group lookups and authentication with short names in AD environments
Previously, the System Security Services Daemon (SSSD) supported user names without the domain component, also called short names, for user and group resolution and authentication only when the daemon was joined to a standalone domain. Now, you can use short names for these purposes in all SSSD domains in these environments:
- On clients joined to Active Directory (AD)
- In Identity Management (IdM) deployments with a trust relationship to an AD forest
The output format of all commands is always fully-qualified even when using short names. This feature is enabled by default after you set up a domain's resolution order list in one of the following ways (listed in order of preference):
- Locally, by configuring the list using the
domain_resolution_orderoption in the[sssd]section of the/etc/sssd/sssd.conffile - By using an ID view
- Globally, in the IdM configuration
To disable the feature, set the
use_fully_qualified_names option to True in the [domain/example.com] section of the /etc/sssd/sssd.conf file. (BZ#1330196)
SSSD supports user and group resolution, authentication, and authorization in setups without UIDs or SIDs
In traditional System Security Services Daemon (SSSD) deployments, users and groups either have POSIX attributes set or SSSD can resolve the users and groups based on Windows security identifiers (SID).
With this update, in setups that use LDAP as the identity provider, SSSD now supports the following functionality even when UIDs or SIDs are not present in the LDAP directory:
- User and group resolution through the D-Bus interface
- Authentication and authorization through the plugabble authentication module (PAM) interface (BZ#1425891)
SSSD introduces the sssctl user-checks command, which checks basic SSSD functionality in a single operation
The
sssctl utility now includes a new command named user-checks. The sssctl user-checks command helps debug problems in applications that use the System Security Services Daemon (SSSD) as a back end for user lookup, authentication, and authorization.
- The
sssctl user-checks [USER_NAME]command displays user data available through Name Service Switch (NSS) and the InfoPipe responder for the D-Bus interface. The displayed data shows whether the user is authorized to log in using thesystem-authpluggable authentication module (PAM) service. - Additional options accepted by
sssctl user-checkscheck authentication or different PAM services.
For details on
sssctl user-checks, use the sssctl user-checks --help command. (BZ#1414023)
Support for secrets as a service
This update adds a responder named
secrets to the System Security Services Daemon (SSSD). This responder allows an application to communicate with SSSD over a UNIX socket using the Custodia API. This enables SSSD to store secrets in its local database or to forward them to a remote Custodia server. (BZ#1311056)
IdM enables semi-automatic upgrades of the IdM DNS records on an external DNS server
To simplify updating the Identity Management (IdM) DNS records on an external DNS server, IdM introduces the
ipa dns-update-system-records --dry-run --out [file] command. The command generates a list of records in a format accepted by the nsupdate utility.
You can use the generated file to update the records on the external DNS server by using a standard dynamic DNS update mechanism secured with the Transaction Signature (TSIG) protocol or the GSS algorithm for TSIG (GSS-TSIG).
For details, see https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/Linux_Domain_Identity_Authentication_and_Policy_Guide/dns-updates-external.html. (BZ#1409628)
IdM now generates SHA-256 certificate and public key fingerprints
Previously, Identity Management (IdM) used the MD5 hash algorithm when generating fingerprints for certificates and public keys. To increase security, IdM now uses the SHA-256 algorithm in the mentioned scenario. (BZ#1444937)
IdM supports flexible mapping mechanisms for linking smart card certificates to user accounts
Previously, the only way to find a user account corresponding to a certain smart card in Identity Management (IdM) was to provide the whole smart card certificate as a Base64-encoded DER string. With this update, it is possible to find a user account also by specifying attributes of the smart card certificates, not just the certificate string itself. For example, the administrator can now define matching and mapping rules to link smart card certificates issued by a certain certificate authority (CA) to a user account in IdM. (BZ#1402959)
New user-space tools enable a more convenient LMDB debugging
This update introduces the
mdb_copy, mdb_dump, mdb_load, and mdb_stat tool in the /usr/libexec/openldap/ directory. The addition includes relevant man pages in the man/man1 subdirectory. Use the new tools only to debug problems related to the Lightning Memory-Mapped Database (LMDB) back end. (BZ#1428740)
openldap rebased to version 2.4.44
The openldap packages have been upgraded to upstream version 2.4.44, which provides a number of bug fixes and enhancements over the previous version. In particular, this new version fixes many replication and Lightning Memory-Mapped Database (LMDB) bugs. (BZ#1386365)
Improved security of DNS lookups and robustness of service principal lookups in Identity Management
The Kerberos client library no longer attempts to canonicalize host names when issuing ticket-granting server (TGS) requests. This feature improves:
- Security because DNS lookups, which were previously required during canonicalization, are no longer performed
- Robustness of service principal lookups in more complex DNS environments, such as clouds or containerized applications
Make sure you specify the correct fully qualified domain name (FQDN) in host and service principals. Due to this change in behavior, Kerberos does not attempt to resolve any other form of names in principals, such as short names. (BZ#1404750)
samba rebased to version 4.6.2
The samba packages have been upgraded to version 4.6.2, which provides a number of bug fixes and enhancements over the previous version:
- Samba now verifies the ID mapping configuration before the
winbinddservice starts. If the configuration is invalid,winbinddfails to start. Use thetestparmutility to verify your/etc/samba/smb.conffile. For further details, see theIDENTITY MAPPING CONSIDERATIONSsection in thesmb.confman page. - Uploading printer drivers from Windows 10 now works correctly.
- Previously, the default value of the
rpc server dynamic port rangeparameter was1024-1300. With this update, the default has been changed to49152-65535and now matches the range used in Windows Server 2008 and later. Update your firewall rules if necessary. - The
net ads unregistercommand can now delete the DNS entry of the host from the Active Directory DNS zone when leaving the domain. - SMB 2.1 leases are now enabled by default in the
smb2 leasesparameter. SMB leasing enables clients to aggressively cache files. - To improve security, the NT LAN manager version 1 (NTLMv1) protocol is now disabled by default. If you require the insecure NTLMv1 protocol, set the
ntlm authparameter in the/etc/samba/smb.conffile toyes. - The
eventsubcommand has been added to thectdbutility for interacting with event scripts. - The
idmap_hashID mapping back end is marked as deprecated will be removed in a future Samba version. - The deprecated
only userandusernameparameters have been removed.
Samba automatically updates its tdb database files when the
smbd, nmbd, or winbind daemon starts. Back up the databases files before starting Samba. Note that Red Hat does not support downgrading tdb database files.
For further information about notable changes, read the upstream release notes before updating. (BZ#1391954)
authconfig can enable SSSD to authenticate users with smart cards
This new feature allows the
authconfig command to configure the System Security Services Daemon (SSSD) to authenticate users with smart cards, for example:
authconfig --enablesssd --enablesssdauth --enablesmartcard --smartcardmodule=sssd --smartcardaction=0 --updateall
# authconfig --enablesssd --enablesssdauth --enablesmartcard --smartcardmodule=sssd --smartcardaction=0 --updateall
With this update, smart card authentication can now be performed on systems where
pam_pkcs11 is not installed. However, if pam_pkcs11 is installed, the --smartcardmodule=sssd option is ignored. Instead, the first pkcs11_module defined in the /etc/pam_pkcs11/pam_pkcs11.conf is used as default.
For details, see https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/Linux_Domain_Identity_Authentication_and_Policy_Guide/auth-idm-client-sc.html. (BZ#1378943)
authconfig can now enable account locking
This update adds the
--enablefaillock option for the authconfig command. When the option is enabled, the configured account will be locked for 20 minutes after four consecutive failed login attempts within a 15-minute interval. (BZ#1334449)
Improved performance of the IdM server
The Identity Management (IdM) server has a higher performance across many of the common workflows and setups. These improvements include:
- Vault performance has been increased by reducing the round trips within the IdM server management framework.
- The IdM server management framework has been tuned to reduce the time spent in internal communication and authentication.
- The Directory Server connection management has been made more scalable with the use of the
nunc-stansframework. - On new installations, the Directory Server now auto-tunes the database entry cache and the number of threads based on the hardware resources of the server.
The default session expiration period in the IdM web UI has changed
Previously, when the user logged in to the Identity Management (IdM) web UI using a user name and password, the web UI automatically logged the user out after 20 minutes of inactivity. With this update, the default session length is the same as the expiration period of the Kerberos ticket obtained during the login operation. To change the default session length, use the
kinit_lifetime option in the /etc/ipa/default.conf file, and restart the httpd service. (BZ#1459153)
The dbmon.sh script now uses instance names to connect to Directory Server instances
The
dbmon.sh shell script enables you to monitor the Directory Server database and entry cache usage. With this update, the script no longer uses the HOST and PORT environment variables. To support secure binds, the script now reads the Directory Server instance name from the SERVID environment variable and uses it to retrieve the host name, port, and the information if the server requires a secure connection. For example, to monitor the slapd-localhost instance, enter:
SERVID=slapd-localhost INCR=1 BINDDN="cn=Directory Manager" BINDPW="password" dbmon.sh
SERVID=slapd-localhost INCR=1 BINDDN="cn=Directory Manager" BINDPW="password" dbmon.sh
(BZ#1394000)
Directory Server now uses the SSHA_512 password storage scheme as default
Previously, Directory Server used the weak 160-bit salted secure hash algorithm (SSHA) as default password storage scheme set in the
passwordStorageScheme and nsslapd-rootpwstoragescheme parameters in the cn=config entry. To increase security, the default of both parameters has been changed to the strong 512-bit SSHA scheme (SSHA_512).
The new default is used:
- When performing new Directory Server installations.
- When the
passwordStorageSchemeparameter is not set, and you are updating passwords stored inuserPasswordattributes. - When the
nsslapd-rootpwstorageschemeparameter is not set, and you are updating the Directory Server manager password set in thensslapd-rootpwattribute. (BZ#1425907)
Directory Server now uses the tcmalloc memory allocator
Red Hat Directory Server now uses the
tcmalloc memory allocator. The previously used standard glibc allocator required more memory, and in certain situations, the server could run out of memory. Using the tcmalloc memory allocator, Directory Server now requires less memory, and the performance increased. (BZ#1426275)
Directory Server now uses the nunc-stans framework
The
nunc-stans event-based framework has been integrated into Directory Server. Previously, the performance could be slow when many simultaneous incoming connections were established to Directory Server. With this update, the server is able to handle a significantly larger number of connections without performance degradation. (BZ#1426278, BZ#1206301, BZ#1425906)
Improved performance of the Directory Server memberOf plug-in
Previously, when working with large or nested groups, plug-in operations could take a long time. With this update, the performance of the Red Hat Directory Server
memberOf plug-in has been improved. As a result, the memberOf plug-in now adds and removes users faster from groups. (BZ#1426283)
Directory Server now logs severity levels in the error log file
Directory Server now logs severity levels in the
/var/log/dirsrv/slapd-instance_name/errors log file. Previously, it was difficult to distinguish the severity of entries in the error log file. With this enhancement, administrators can use the severity level to filter the error log. (BZ#1426289)
Directory Server now supports the PBKDF2_SHA256 password storage scheme
To increase security, this update adds the 256-bit password-based key derivation function 2 (PBKDF2_SHA256) to the list of supported password-storage schemes in Directory Server. The scheme uses 30,000 iterations to apply the 256-bit secure hash algorithm (SHA256).
Note that the network security service (NSS) database in Red Hat Enterprise Linux prior to version 7.4 does not support PBKDF2. Therefore, you cannot use this password scheme in a replication topology with previous Directory Server versions. (BZ#1436973)
Improved auto-tuning support in Directory Server
Previously, you had to monitor the databases and manually tune settings to improve the performance. With this update, Directory Server supports optimized auto-tuning for:
- The database and entry cache
- The number of threads created
Directory Server tunes these settings, based on the hardware resources of the server.
Auto-tuning is now automatically enabled by default if you install a new Directory Server instance. On instances upgraded from earlier versions, Red Hat recommends to enable auto-tuning. (BZ#1426286)
New PKI configuration parameter allows control of the TCP keepalive option
This update adds the
tcp.keepAlive parameter to the CS.cfg configuration file. This parameter accepts boolean values, and is set to true by default. Use this parameter to configure the TCP keepalive option for all LDAP connections created by the PKI subsystem. This option is useful in cases where certificate issuance takes a very long time and connections are being closed automatically after being idle for too long. (BZ#1413132)
PKI Server now creates PKCS #12 files using strong encryption
When generating PKCS #12 files, the
pki pkcs12 command previously used the PKCS #12 deprecated key derivation function (KDF) and the triple DES (3DES) algorithm. With this update, the command now uses the password-based encryption standard 2 (PBES2) scheme with the password-based key derivation function 2 (PBKDF2) and the Advanced Encryption Standard (AES) algorithm to encrypt private keys. As a result, this enhancement increases the security and complies the Common Criteria certification requirements. (BZ#1426754)
CC-compliant algorithms available for encryption operations
Common Criteria requires that encryption and key-wrapping operations are performed using approved algorithms. These algorithms are specified in section FCS_COP.1.1(1) in the Protection Profile for Certification Authorities. This update modifies encryption and decryption in the KRA to use approved AES encryption and wrapping algorithms in the transport and storage of secrets and keys. This update required changes in both the server and client software. (BZ#1445535)
New options to allow configuring visibility of menu items in the TPS interface
Previously, menu items grouped under the
System menu in the Token Processing System (TPS) user interface were determined statically based on user roles. In certain circumstances, the displayed menu items did not match components actually accessible by the user. With this update, the System menu in the TPS user interface only displays menu items based on the target.configure.list parameter for TPS administrators, and the target.agent_approve.list parameter for TPS agents. These parameters can be modified in the instance CS.cfg file to match accessible components. (BZ#1391737)
Added a profile component to copy certificate Subject Common Name to the Subject Alternative Name extension
Some TLS libraries now warn or refuse to validate DNS names when the DNS name only appears in the Subject Common Name (CN) field, which is a practice that was deprecated by RFC 2818. This update adds the
CommonNameToSANDefault profile component, which copies the Subject Common Name to the Subject Alternative Name (SAN) extension, and ensures that certificates are compliant with current standards. (BZ#1305993)
New option to remove LDAP entries before LDIF import
When migrating a CA, if an LDAP entry existed before the LDIF import, then the entry was not recreated from the LDAP import, causing some fields to be missing. Consequently, the request ID showed up as undefined. This update adds an option to remove the LDAP entry for the signing certificate at the end of the pkispawn process. This entry is then re-created in the subsequent LDIF import. Now, the request ID and other fields show up correctly if the signing entry is removed and re-added in the LDIF import. The correct parameters to add are (X represents the serial number of the signing certificate being imported, in decimal):
pki_ca_signing_record_create=False pki_ca_signing_serial_number=X
pki_ca_signing_record_create=False
pki_ca_signing_serial_number=X
(BZ#1409946)
Certificate System now supports externally authenticated users
Previously, you had to create users and roles in Certificate System. With this enhancement, you can now configure Certificate System to admit users authenticated by an external identity provider. Additionally, you can use realm-specific authorization access control lists (ACLs). As a result, it is no longer necessary to create users in Certificate System. (BZ#1303683)
Certificate System now supports enabling and disabling certificate and CRL publishing
Prior to this update, if publishing was enabled in a certificate authority (CA), Certificate System automatically enabled both certificate revocation list (CRL) and certificate publishing. Consequently, on servers that did not have certificate publishing enabled, error messages were logged. Certificate System has been enhanced, and now supports enabling and disabling certificate and CRL publishing independently in the
/var/lib/pki/<instance>/ca/conf/CS.cfg file.
To enable or disable both certificate and CRL publishing, set:
ca.publish.enable = True|False
ca.publish.enable = True|False
To enable only CRL publishing, set:
ca.publish.enable = True ca.publish.cert.enable = False
ca.publish.enable = True
ca.publish.cert.enable = False
To enable only certificate publishing, set:
ca.publish.enable = True ca.publish.crl.enable = False
ca.publish.enable = True
ca.publish.crl.enable = False
(BZ#1325071)
The searchBase configuration option has been added to the DirAclAuthz PKI Server plug-in
To support reading different sets of authorization access control lists (ACL), the
searchBase configuration option has been added to the DirAclAuthz PKI Server plug-in. As a result, you can set the sub-tree from which the plug-in loads ACLs. (BZ#1388622)
For better performance, Certificate System now supports ephemeral
Before this update, Certificate System key recovery agent (KRA) instances always stored recovery and storage requests of secrets in the LDAP back end. This is required to store the state if multiple agents must approve the request. However, if the request is processed immediately and only one agent must approve the request, storing the state is not required. To improve performance, you can now set the
kra.ephemeralRequests=true option in the /var/lib/pki/<instance>/kra/conf/CS.cfg file to no longer store requests in the LDAP back end. (BZ#1392068)
Section headers in PKI deployment configuration file are no longer case sensitive
The section headers (such as
[Tomcat]) in the PKI deployment configuration file were previously case-sensitive. This behavior increased the chance of an error while providing no benefit. Starting with this release, section headers in the configuration file are case-insensitive, reducing the chance of an error occurring. (BZ#1447144)
Certificate System now supports installing a CA using HSM on FIPS-enabled Red Hat Enterprise Linux
During the installation of a Certificate System Certificate Authority (CA) instance, the installer needs to restart the instance. During this restart, instances on an operating system having the Federal Information Processing Standard (FIPS) mode enabled and using a hardware security module (HSM), need to connect to the non-secure HTTP port instead of the HTTPS port. With this update, it is now possible to install a Certificate System instance on FIPS-enabled Red Hat Enterprise Linux using an HSM. (BZ#1450143)
CMC requests now use a random IV for AES and 3DES encryption
With this update, Certificate Management over CMS (CMC) requests in PKI Server use a randomly generated initialization vector (IV) when encrypting a key to be archived. Previously, the client and server code used a fixed IV in this scenario. The CMC client code has been enhanced, and as a result, using random IVs increase security when performing encryption for both Advanced Encryption Standard (AES) and Triple Data Encryption Algorithm (3DES). (BZ#1458055)
Chapter 6. Clustering Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
clufter rebased to version 0.76.0 and fully supported
The clufter packages provide a tool for transforming and analyzing cluster configuration formats. They can be used to assist with migration from an older stack configuration to a newer configuration that leverages Pacemaker. The
clufter tool, previously available as a Technology Preview, is now fully supported. For information on the capabilities of clufter, see the clufter(1) man page or the output of the clufter -h command. For examples of clufter usage, see the following Red Hat Knowledgebase article: https://access.redhat.com/articles/2810031.
The clufter packages have been upgraded to upstream version 0.76.0, which provides a number of bug fixes and new features. Among the notable updates are the following:
- When converting either CMAN + RGManager stack specific configuration into the respective Pacemaker configuration (or sequence of
pcscommands) with theccs2pcs*families of commands, thecluftertool no longer refuses to convert entirely valid lvm resource agent configuration. - When converting CMAN-based configuration into the analogous configuration for a Pacemaker stack with the
ccs2pcsfamily of commands, some resources related configuration bits previously lost in processing (such as maximum number of failures before returning a failure to a status check) are now propagated correctly. - When producing
pcscommands with thecib2pcsandpcs2pcscmdfamilies ofcluftercommands, proper finalized syntax is now used for the alert handlers definitions, for which the (default) behavior of single-step push of the configuration changes is now respected. - When producing
pcscommands, thecluftertool now supports a preferred ability to generatepcscommands that will update only the modifications made to a configuration by means of a differential update rather than a pushing a wholesale update of the entire configuration. Likewise when applicable, thecluftertool now supports instructing thepcstool to configure user permissions (ACLs). For this to work across the instances of various major versions of the document schemas,cluftergained the notion of internal on-demand format upgrades, mirroring the internal mechanics ofpacemaker. Similarly,clufteris now capable of configuring thebundlefeature. - In any script-like output sequence such as that produced by the
ccs2pcscmdandpcs2pcscmdfamilies ofcluftercommands, the intended shell interpreter is now emitted as a first, commented line as also understood directly by the operating system in order to clarify where Bash rather than a mere POSIX shell is expected. This might have been misleading under some circumstances in the past. - The Bash completion file for
clufterno longer fails to work properly when the=character is to specify an option's value in the sequence being completed.
Support for quorum devices in a Pacemaker cluster
Red Hat Enterprise Linux 7.4 provides full support for quorum devices, previously available as a Technology Preview. This feature provides the ability to configure a separate quorum device (QDevice) which acts as a third-party arbitration device for the cluster. Its primary use is to allow a cluster to sustain more node failures than standard quorum rules allow. A quorum device is recommended for clusters with an even number of nodes and highly recommended for two-node clusters. For information on configuring a quorum device, see https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/High_Availability_Add-On_Reference/. (BZ#1158805)
Support for Booth cluster ticket manager
Red Hat Enterprise Linux 7.4 provides full support for a Booth cluster ticket manager. This feature, previously available as a Technology Preview, allows you to configure multiple high availability clusters in separate sites that communicate through a distributed service to coordinate management of resources. The Booth ticket manager facilitates a consensus-based decision process for individual tickets that ensure that specified resources are run at only one site at a time, for which a ticket has been granted. For information on configuring multi-site clusters with the Booth ticket manager, see the https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/High_Availability_Add-On_Reference/ (BZ#1302087, BZ#1305049)
Support added for using shared storage with the SBD daemon
Red Hat Enterprise Linux 7.4 provides support for using the SBD (Storage-Based Death) daemon with a shared block device. This allows you to enable fencing by means of a shared block-device in addition to fencing by means of a watchdog device, which had previously been supported. The
fence-agents package now provides the fence_sbd fence agent which is needed to trigger and control the actual fencing by means of an RHCS-style fence agent. SBD is not supported on Pacemaker remote nodes. (BZ#1413951)
Full support for CTDB resource agent
The CTDB resource agent used to implement a Samba deployment is now supported in Red Hat Enterprise Linux. (BZ#1077888)
The High Availability and Resilient Storage Add-Ons are now available for IBM POWER, little endian
Red Hat Enterprise Linux 7.4 adds support for the High Availability and Resilient Storage Add-Ons for the IBM POWER, little endian architecture. Note that this support is provided only for cluster nodes running on PowerVM on POWER8 servers. (BZ#1289662, BZ#1426651)
pcs now provides the ability to set up a cluster with encrypted corosync communication
The
pcs cluster setup command now supports a new --encryption flag that controls the setting of corosync encryption in a cluster. This allows users to set up a cluster with encrypted corosync communication in a not entirely trusted environment. (BZ#1165821)
New commands for supporting and removing remote and guest nodes
Red Hat Enterprise Linux 7.4 provides the following new commands for creating and removing remote and guest nodes:
- pcs cluster node add-guest
- pcs cluster node remove-guest
- pcs cluster node add-remote
- pcs cluster node remove-remote
These commands replace the
pcs cluster remote-node add and pcs cluster remote-node remove commands, which have been deprecated. (BZ#1176018, BZ#1386512)
Ability to configure pcsd bind addresses
You can now configure
pcsd bind addresses in the /etc/sysconfig/pcsd file. In previous releases, pcsd could bind to all interfaces, a situation that is not suitable for some users. By default, pcsd binds to all interfaces. (BZ#1373614)
New option to the pcs resource unmanage command to disable monitor operations
Even when a resource is in unmanaged mode, monitor operations are still run by the cluster. That may cause the cluster to report errors the user is not interested in as those errors may be expected for a particular use case when the resource is unmanaged. The
pcs resource unmanage command now supports the --monitor option, which disables monitor operations when putting a resource into unmanaged mode. Additionally, the pcs resource manage command also supports the --monitor option, which enables the monitor operations when putting a resource back into managed mode. (BZ#1303969)
Support for regular expressions in pcs command line when configuring location constraints
pcs now supports regular expressions in location constraints on the command line. These constraints apply to multiple resources based on the regular expression matching resource name. This simplifies cluster management as one constraint may be used where several were needed before. (BZ#1362493)
Specifying nodes in fencing topology by a regular expression or a node attribute and its value
It is now possible to specify nodes in fencing topology by a regular expression applied on a node name and by a node attribute and its value.
For example, the following commands configure nodes
node1, node2, and node3 to use fence devices apc1 and apc2, and nodes node4, node5, and node6 to use fence devices apc3 and apc4.
pcs stonith level add 1 "regexp%node[1-3]" apc1,apc2 pcs stonith level add 1 "regexp%node[4-6]" apc3,apc4
pcs stonith level add 1 "regexp%node[1-3]" apc1,apc2
pcs stonith level add 1 "regexp%node[4-6]" apc3,apc4
The following commands yield the same results by using node attribute matching.
(BZ#1261116)
Support for Oracle 11g for the resource agents Oracle and OraLsnr
Red Hat Enterprise Linux 7.4 provides support for Oracle Database 11g for the
Oracle and OraLsnr resource agents used with Pacemaker. (BZ#1336847)
Support for using SBD with shared storage
Support has been added for configured SBD (Storage-Based Death) with shared storage using the
pcs commands. For information on SBD fending, see https://access.redhat.com/articles/2943361. (BZ#1413958)
Support for NodeUtilization resource agent
Red Hat Enterprise Linux 7.4 supports the
NodeUtilization resource agent. The NodeUtilization agent can detect the system parameters of available CPU, host memory availability, and hypervisor memory availability and add these parameters into the CIB. You can run the agent as a clone resource to have it automatically populate these parameters on each node. For information on the NodeUtilization resource agent and the resource options for this agent, run the pcs resource describe NodeUtilization command. For information on utilization and placement strategy in Pacemaker, see https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/High_Availability_Add-On_Reference/s1-utilization-HAAR.html. (BZ#1430304)
Chapter 7. Compiler and Tools Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
pcp rebased to version 3.11.8
The
Performance Co-Pilot application (PCP) has been upgraded to upstream version 3.11.81, which provides a number of bug fixes and enhancements over the previous version. Notable enhancements include:
- A new client tool
pcp2influxdbhas been added to allow export of performance metric values to theinfluxdbdatabase. - New client tools
pcp-mpstatandpcp-pidstathave been added to allow retrospective analysis of mpstat and pidstat values. - New performance metrics have been added for device mapper,
Cephdevices, cpusched cgroups, per-processor soft IRQs,buddyinfo,zoneinfo, shared memory,libvirt, same-page-sharing,lio,Redis, andDocker. - Additional performance metrics from several subsystems are now available for a variety of PCP analysis tools. (BZ#1423020)
systemtap rebased to version 3.1
The systemtap package has been upgraded to upstream version 3.1, which provides a number of bug fixes and enhancements over the previous version. Notable changes include:
- The probes for system calls no longer default to being based on
debuginfoinformation. - Support for probing
Pythonfunctions has been added. - Access to
Javafunction parameters has been made more uniform. - The performance of statistical aggregate variables has been improved.
- A new statistics operator
@variancehas been added. - More options for fetching and setting user-space values have been added.
- NFS monitoring has been improved with sample
valgrind rebased to version 3.12
The valgrind package has been upgraded to upstream version 3.12, which provides a number of bug fixes and enhancements over the previous version. Notable changes include:
- A new option
--ignore-range-below-sphas been added to the memcheck tool to ignore memory accesses below the stack pointer. This is a generic replacement for the now deprecated option--workaround-gcc296-bugs=yes. - The maximum number of callers in a suppression entry generated by the
--gen-suppressions=yesoption is now equal to the value given by the--num-callersoption. - The cost of instrumenting code blocks for the most common use case, the
memchecktool on the AMD64 and Intel 64 architectures, has been reduced. - Performance has been improved for debugging programs which discard a lot of instruction address ranges of 8KB or less.
- Support for IBM Power 9 (ISA 3.0) architecture has been added.
- Partial support for AMD FMA4 instructions has been added.
- Support for cryptographic and CRC instructions on the 64-bit ARM architecture version 8 has been added. (BZ#1391217)
New package: unitsofmeasurement
The unitsofmeasurement package enables expressing units of measurement in Java code. With the new API for units of measurement, handling of physical quantities is easier and less error-prone. The package's API is efficient in use of memory and resources. (BZ#1422263)
SSL/TLS certificate verification for HTTP clients is now enabled by default in the Python standard library
The default global setting for HTTP clients has been changed in the Python standard library to verify SSL/TLS certificates by default. Customers using the file-based configuration are not affected. For details, see https://access.redhat.com/articles/2039753. (BZ#1219110)
Support for %gemspec_add_dep and %gemspec_remove_dep has been added
This update adds support for the
%gemspec_add_dep and %gemspec_remove_dep macros. These macros allow easier adjustment of rubygem-* package dependencies. In addition, all current macros have been extended to improve support for pre-release version of packages. (BZ#1397390)
ipmitool rebased to version 1.8.18
The ipmitool package has been upgraded to upstream version 1.8.18, which provides a number of bug fixes and enhancements over the previous version. Notable changes include:
- The PEF user interface has been redesigned
- A new subcommand
lan6has been added for IP version 6 local area network parameters - Support for VITA-specific sensor types and events has been added
- Support for HMAC_MD5 and HMAC_SHA256 encryption has been added
- Support for checking PICMG extension 5.x has been added
- Support for USB medium as a new communication interface has been added
- The USB driver has been enabled by default for GNU Linux systems (BZ#1398658)
lshw updated for the little-endian variant of IBM Power
The lshw packages, which provide detailed information on the hardware configuration of a machine, have been updated for the little-endian variant of IBM Power System. (BZ#1368704)
perf now supports uncore events on Intel Xeon v5
With this update, Performance analysis tool for Linux (perf) has been updated to support uncore events on Intel Xeon v5 server CPU. These events provide additional performance monitoring information for advanced users. (BZ#1355919)
dmidecode updated
The dmidecode package has been updated to a later version, which provides several bug fixes and hardware enablement improvements. (BZ#1385884)
iSCSI now supports configuring the ALUA operation by using targetcli
With multiple paths from the initiator to a target, you can use Asymmetric Logical Unit Assignment (ALUA) to configure preferences for how to use the paths in a non-uniform, preferential way. The Linux-IO (LIO) kernel target has always supported this feature. With this update, you can use the
targetcli command shell to configure the ALUA operation. (BZ#1243410)
jansson rebased to version 2.10
The
jansson library has been updated to version 2.10, which provides several bug fixes and enhancements over the previous version. Notably, interfaces have been added to support the clevis, tang and jose applications. (BZ#1389805)
A new compatibility environmental variable for egrep and fgrep
In an earlier
grep rebase, the egrep and fgrep commands were replaced by grep -E and grep -F respectively. This change could affect customer scripts because only grep was shown in the outupt of the ps command. To prevent such problems, this update introduces a new compatibility environmental variable: GREP_LEGACY_EGREP_FGREP_PS. To preserve showing egrep and fgrep in ps output, set the variable to 1:
GREP_LEGACY_EGREP_FGREP_PS=1
GREP_LEGACY_EGREP_FGREP_PS=1
(BZ#1297441)
lastcomm now supports the --pid option
The
lastcomm command now supports the --pid option. This option shows the process ID (PID) and parent-process ID (PPID) for each record if supported by the kernel. (BZ#1255183)
New package: perl-Perl4-CoreLibs
A new perl-Perl4-CoreLibs package is now available in the Base channel of Red Hat Enterprise Linux 7. This package contains libraries that were previously available in Perl 4 but were removed from Perl 5.16, which is distributed with Red Hat Enterprise Linux 7. In the previous release, these libraries were provided in a Perl subpackage through the Optional channel. (BZ#1366724)
tar now follows symlinks to directories when extracting from the archive
This update adds the
--keep-directory-symlink option to the tar command. This option changes the behavior of tar when it encounters a symlink with the same name as the directory that it is about to extract. By default, tar would first remove the symlink and then proceed extracting the directory. The --keep-directory-symlink option disables this behavior and instructs tar to follow symlinks to directories when extracting from the archive. (BZ#1350640)
The IO::Socket::SSL Perl module now supports restricting of TLS version
The
Net:SSLeay Perl module has been updated to support explicit specification of the TLS protocol versions 1.1 or 1.2 to improve security, and the IO::Socket::SSL module has been updated accordingly. When a new IO::Socket::SSL object is created, it is now possible to restrict the TLS version to 1.1 or 1.2 by setting the SSL_version option to TLSv1_1 or TLSv1_2 respectively. Alternatively, TLSv11 and TLSv12 can be used. Note that these values are case-sensitive. (BZ#1335035)
The Net:SSLeay Perl module now supports restricting of TLS version
The
Net:SSLeay Perl module has been updated to support explicit specification of the TLS protocol version, which can be used for improving security. To restrict TLS version to 1.1 or 1.2, set the Net::SSLeay::ssl_version variable to 11 or 12 respectively. (BZ#1335028)
wget now supports specification of the TLS protocol version
Previously, the
wget utility used the highest TLS protocol version 1.2 by default when connecting to a remote server. With this update, wget has been enhanced to allow the user to explicitly select the TLS protocol minor version by adding the --secure-protocol=TLSv1_1 or --secure-protocol=TLSv1_2 command-line options to the wget command. (BZ#1439811)
tcpdump rebased to version 4.9.0
The tcpdump package has been upgraded to upstream version 4.9.0, which provides a number of bug fixes and enhancements over the previous version. Notable changes include:
- Many security vulnerabilities have been fixed
- Numerous improvements have been made in the dissection of popular network protocols
- The default
snaplenfeature has been increased to 262144 bytes - The capture buffer has been enlarged to 4 MiB (BZ#1422473)
The option to set capture direction for tcpdump changed from -P to -Q
Previously, the
tcpdump utility in Red Hat Enterprise Linux used the -P option to set the capture direction, while the upstream version used -Q. The -Q option has been implemented and is now preferred. The -P option retains the previous function as an alias of -Q, but displays a warning. (BZ#1292056)
OpenJDK now supports SystemTap on the 64-bit ARM architecture
The
OpenJDK platform now supports introspection with the SystemTap instrumentation tool on the 64-bit ARM architecture. (BZ#1373986)
sos rebased to version 3.4
The sos package has been updated to upstream version 3.4, which provides a number of enhancements, new features, and bug fixes, including:
- New plug-ins have been added for
ceph_ansible,collectd,crypto,dracut,gnocchi,jars,nfsganesha,nodejs,npm,openstack_ansible,openstack_instack,openstack_manila,salt,saltmaster, andstorageconsole - API plug-in enhancements
- Internationalisation updates
- The networking plug-in no longer crashes when a network name contains the single quote character
' - The
foreman-debugplug-in is now run with a longer timeout to prevent incompleteforeman-debuginformation collected - Certain private SSL certificate files are no longer collected (BZ#1414879)
targetd rebased to version 0.8.6
The targetd packages have been upgraded to upstream version 0.8.6, which provides a number of bug fixes and enhancements over the previous version. Notably, the
targetd service now runs on either Python 2 or Python 3 run time, and the following APIs have been added: initiator_list, access_group_list, access_group_create, access_group_destroy, access_group_init_add, access_group_init_del, access_group_map_list, access_group_map_create, and access_group_map_destroy.
Notable bug fixes include:
targetdis now compliant with JSON-RPC response version 2.0.- the
export_createAPI can now be used to map the same LUN to multiple initiators. targetdnow ensures that SSL certificates are present at start-up. (BZ#1162381)
shim rebased to version 12-1
With this update, the shim package has been upgraded to upstream version 12-1, which provides a number of bug fixes and enhancements over the previous version. Notably, the support for 32-bit UEFI firmware and Extensible Firmware Interface (EFI) utilities has been added. (BZ#1310766)
rubygem-abrt rebased to version 0.3.0
The rubygem-abrt package has been rebased to version 0.3.0, which provides several bug fixes and enhancements over the previous version. Notably:
- The
Ruby ABRThandler now supportsuReports, automatic anonymous microreports. WithuReportsenabled, developers are promptly notified about application issues and are able to fix bugs and resolve problems faster. - Previously, when a
Rubyapplication was usingBundlerto manage its dependencies and an error occurred, an incorrect logic was used to load components of theRuby ABRThandler. Consequently, an unexpectedLoadReporterror was reported to the user instead of a properABRTreport. The loading logic has been fixed, and theRubyapplication errors are now correctly handled and reported usingABRT. (BZ#1418750)
New package: http-parser
The new http-parser package provides a utility for parsing HTTP messages. It parses both requests and responses. The parser is designed to be used in applications managing HTTP performance. It does not make any syscalls or allocations, it does not buffer data, and it can be interrupted at any time. Depending on your architecture, it only requires about 40 bytes of data per message stream. (BZ#1393819)
Intel and IBM POWER transactional memory support for all default POSIX mutexes
The default POSIX mutexes can be transparently substituted with Intel and IBM POWER transactional memory support, which significantly reduces the cost of lock acquisition. To enable transactional memory support for all default POSIX mutexes, set the
RHEL_GLIBC_TUNABLES=glibc.elision.enable environment variable to 1. As a result, performance of some applications can be improved.
Developers are advised to use profiling to decide whether enabling of this feature improves performance for their applications. (BZ#841653, BZ#731835)
glibc now supports group merging
The ability to merge group members from different Name Service modules has been added to
glibc. As a result, management of centralized user access control and group membership across multiple hosts is now easier. (BZ#1298975)
glibc now supports optimized string comparison functions on The IBM POWER9 architecture
The string comparison functions
strcmp and strncmp from the glibc library have been optimized for the IBM POWER9 architecture. (BZ#1320947)
Improved performance for dynamically loaded libraries using the Intel SSE, AVX and AVX512 features
Dynamic library loading has been updated for libraries using the Intel SSE, AVX, and AVX512 features. As a result, performance while loading these libraries has improved. Additionally, support for LD_AUDIT-style auditing has been added. (BZ#1421155)
elfutils rebased to version 0.168
The elfutils package has been upgraded to upstream version 0.168, which provides a number of bug fixes and enhancements:
- The option
--symbolsof theeu-readelfutility now allows selecting the section for displaying symbols. - New functions for the creation of ELF/DWARF string tables have been added to the
libdwlibrary. - The
DW_LANG_PL1constant has been changed toDW_LANG_PLI. The previous name is still accepted. - The return type of the
gelf_newehdrandgelf_newphdrfunctions from thelibelflibrary has been changed tovoid*for source compatibility with otherlibelfimplementations. This change retains binary compatibility on all platforms supported by Red Hat Enterprise Linux. (BZ#1400302)
bison rebased to version 3.0.4
The bison package has been upgraded to upstream version 3.0.4, which provides a number of bug fixes and enhancements:
- Endless diagnostics caused by caret errors have been fixed.
- The
-Werror=CATEGORYoption has been added to treat specified warnings as errors. The warnings do not have to be explicitly activated using the-Woption. - Many improvements in handling of precedence rules and useless rules.
Additionally, the following changes breaking backward compatibility have been introduced:
- The following features have been deprecated:
YYFAIL,YYLEX_PARAM,YYPARSE_PARAM,yystype,yyltype - Missing semicolons at the end of actions are no longer automatically added.
- To use Bison extensions with the
autoconfutility versions 2.69 and earlier, pass the option-Wno-yaccto(AM_)YFLAGS. (BZ#1306000)
The system default CA bundle has been set as default in the compiled-in default setting or configuration in Mutt
Previously, when connecting to a new system via TLS/SSL, the
Mutt email client required the user to save the certificate. With this update, the system Certificate Authority (CA) bundle is set in Mutt by default. As a result, Mutt now connects via SSL/TLS to hosts with a valid certificate without prompting the user to approve or reject the certificate. (BZ#1388511)
objdump mixed listing speed up
Previously, the BFD library for parsing DWARF debug information and locating source code was very slow. The BFD library is used by the
objdump tool. As a consequence, objdump became significantly slower when producing a mixed listing of source code and disassembly. Performance of the BFD library has been improved. As a result, producing a mixed listing with objdump is faster. (BZ#1366052)
ethtool support for human readable output from the fjes driver
The
ethtool utility has been enhanced to provide a human readable form of register dump output from the fjes driver. As a result, users of ethtool can inspect the Fujitsu Extended Socket Network Device driver more comfortably. (BZ#1402701)
ecj rebased to version 4.5.2
The ecj package has been upgraded to upstream version 4.5.2, which provides a number of bug fixes and enhancements over the previous version. Notably, support for features added to the Java language in version 8 has been completed. As a result, compilation of Java code using Java 8 features no longer fails. This includes cases where code not using Java 8 features referenced code using these features, such as system classes provided by the Java Runtime Environment. (BZ#1379855)
rhino rebased to version 1.7R5
The rhino package has been upgraded to upstream version 1.7R5, which provides a number of bug fixes and enhancements over the previous version. Notably, the former problem with an infinite loop while parsing regular expressions has been fixed. Applications using
Rhino that previously encountered this bug now function correctly. (BZ#1350331)
scap-security-guide and oscap-docker now support containers
The user can now use the
oscap-docker utility and the SCAP Security Guide to assess compliance of container or container image without encountering false positive results. Tests that make no sense in container context, such as partitioning, has been set to the not applicable value, and containers can be now scanned with a selected security policy. (BZ#1404392)
Chapter 8. Desktop Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
GNOME rebased to version 3.22.3
The GNOME Desktop has been updated to upstream version 3.22.3, which provides a number of bug fixes and enhancements over the previous version. Notable changes include:
- Overhauled desktop notifications
- Built-in integration with world clocks and media players
- Automatically adjusting screen brightness (for systems with an integrated light sensor)
- In many applications, support for a standard dialog to document keyboard shortcuts
- Improvements to several setting panels (printer, mouse, touchpad, keyboard shortcuts)
- Option to rename multiple files at once
- Built-in support for compressed files and for Google Drive
- Undo support for trash (BZ#1383353)
The xorg-x11-drv-libinput driver has been added to the X.Org input drivers
The
xorg-x11-drv-libinput X.Org driver is a wrapper driver for the low-level libinput library. This update adds the driver to the X.Org input drivers. After you install xorg-x11-drv-libinput, it is possible to remove the xorg-x11-drv-synaptics driver and get access to some of the improved input device handling offered by libinput. (BZ#1413811)
Change of default driver for some Intel and nVidia Hardware
This change affects:
- 4th Generation Intel Core Processors and later
- nVidia GeForce 8 hardware and later
The default DDX driver has changed to be
xf86-video-modesetting.
Previously the defaults were
xf86-video-nouveau and xf86-video-intel for nVidia and Intel hardware respectively. (BZ#1404868)
dconf-editor is now provided by a separate package
The upstream
dconf team have split the dconf-editor into its own package. This release reflects that change.
In addition, the user interface has been redesigned in version 3.22.
- The tree view on the left side has been removed.
- Keys and directories are now shown in the same window.
- The ability to go back in the hierarchy has moved to the path shown in the header-bar. (BZ#1388931)
Chapter 9. File Systems Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
SELinux security labels are now supported on the OverlayFS file system
With this update, the OverlayFS file system now supports SELinux security labels. When using Docker containers with the OverlayFS storage driver, you no longer have to configure Docker to disable SELinux support for the containers. (BZ#1297929)
NFSoRDMA server is now fully supported
NFS over RDMA (NFSoRDMA) server, previously provided as a Technology Preview, is now fully supported when accessed by Red Hat Enterprise Linux clients. For more information on NFSoRDMA see the following section in the Red Hat Enterprise Linux 7 Storage Administration Guide: https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html-single/Storage_Administration_Guide/index.html#nfs-rdma (BZ#1400501)
autofs now supports the browse options of amd format maps
The browse functionality of sun format maps makes available automount points visible in directory listings of mounted automount-managed mounts and is now also available for
autofs amd format maps.
You can now add mount point sections to the
autofs configuration for amd format mounts, in the same way automount points are configured in amd, without the need to also add a corresponding entry to the master map. As a result, you can avoid having incompatible master map entries in the autofs master map within shared multi-vendor environments.
The
browsable_dirs option can be used in either the autofs [ amd ] configuration section, or following amd mount point sections. The browsable and utimeout map options of amd type auto map entries can also be used.
To make searching logs easier, autofs now provides identifiers of mount request log entries
For busy sites, it can be difficult to identify log entries for specific mount attempts when examining mount problems. The entries are often mixed with other concurrent mount requests and activities if the log recorded a lot of activity. Now, you can quickly filter entries for specific mount requests if you enable adding a mount request log identifier to mount request log entries in the
autofs configuration. The new logging is turned off by default and is controlled by the use_mount_request_log_id option, as described in the autofs.conf file. (BZ#1382093)
GFS2 on IBM z Systems is now supported in SSI environments
Starting with Red Hat Enterprise Linux 7.4, GFS2 on IBM z Systems (Resilient Storage on the
s390x add-on) is supported in z/VM Single System Image (SSI) environments, with multiple central electronics complexes (CECs). This allows the cluster to stay up even when logical partitions (LPARs) or CECs are restarted. Live migration is not supported due to the real-time requirements of High Availability (HA) clustering. The maximum node limit of 4 nodes on IBM z Systems still applies. For information on configuring high availability and resilient storage for IBM z systems, see https://access.redhat.com/articles/1543363. (BZ#1273401)
gfs2-utils rebased to version 3.1.10
The gfs2-utils packages have been upgraded to upstream version 3.1.10, which provides a number of bug fixes and enhancements over the previous version. Notably, this update provides:
- various checking and performance improvements of the
fsck.gfs2command - better handling of odd block device geometry in the
mkfs.gfs2command. gfs2_edit savemetaleaf chain block handling bug fixes.- handling UUIDs by the
libuuidlibrary instead of custom functions. - new
--enable-gprofconfiguration option for profiling. - documentation improvements. (BZ#1413684)
FUSE now supports SEEK_HOLE and SEEK_DATA in lseek calls
This update provides the
SEEK_HOLE and SEEK_DATA features for the Filesystem in Userspace (FUSE) lseek system call. Now, you can use FUSE lseek to adjust the offset of the file to the next location in the file that contains data, with SEEK_DATA, or a hole, with SEEK_HOLE. (BZ#1306396)
NFS server now supports limited copy-offload
The NFS server-side copy feature now allows the NFS client to copy file data between two files that reside on the same file system on the same NFS server without the need to transmit data back and forth over the network through the NFS client. Note that the NFS protocol also allows copies between different file systems or servers, but the Red Hat Enterprise Linux implementation currently does not support such operations. (BZ#1356122)
SELinux is supported for use with GFS2 file systems
Security Enhanced Linux (SELinux) is now supported for use with GFS2 file systems. Since use of SELinux with GFS2 incurs a small performance penalty, you may choose not to use SELinux with GFS2 even on a system with SELinux in enforcing mode. For information on how to configure this, see https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/Global_File_System_2/index.html. (BZ#437984)
NFSoRDMA client and server now support Kerberos authentication
This update adds Kerberos authentication support for NFS over RDMA (NFSoRDMA) client and server to allow you to use krb5, krb5i, and krb5p authentication with NFSoRDMA features. You can now use Kerberos with NFSoRDMA for secure authentication of each Remote Procedure Call (RPC) transaction. Note that you need version 1.3.0-0.36 or higher of the nfs-utils package to be installed to use Kerberos with NFSoRDMA. (BZ#1401797)
rpc.idmapd now supports obtaining NFSv4 ID Domains from DNS
The NFS domain name that is used in the ID mapping can now be retrieved from DNS. If the
Domain variable is not set in the /etc/idmapd.conf file, DNS is queried to search for the _nfsv4idmapdomain Text record. If a value is found, it is used as the NFS domain. (BZ#980925)
NFSv4.1 is now the default NFS mount protocol
Prior to this update, NFSv4.0 was the default NFS mount protocol. NFSv4.1 provides significant feature improvements over NFSv4.0, such as sessions, pNFS, parallel OPENs, and session trunking. With this update, NFSv4.1 is the default NFS mount protocol.
If you have already specified the mount protocol minor version, this update causes no change in behavior. This update causes a change in behavior if you have specified NFSv4 without a specific minor version, provided the server supports NFSv4.1. If the server only supports NFSv4.0, the mount remains a NFSv4.0 mount. You can retain the original behavior by specifying
0 as the minor version:
- on the mount command line,
- in the
/etc/fstabfile, - or in the
/etc/nfsmount.conffile. (BZ#1375259)
Setting nfs-utils configuration options has been centralized in nfs.conf
With this update,
nfs-utils uses configuration centralized in the nfs.conf file, which is structured into stanzas for each nfs-utils program. Each nfs-utils program can read the configuration directly from the file, so you no longer need to use the systemctl restart nfs-config.service command, but restart only the specific program. For more information, see the nfs.conf(5) manual page.
For compatibility with earlier releases, the older
/etc/sysconfig/nfs configuration method is still available. However, it is recommended to avoid specifying configuration settings in both the /etc/sysconfig/nfs and /etc/nfs.conf file. (BZ#1418041)
Locking performance for NFSv4.1 mounts has been improved for certain workloads
NFSv4 clients poll the server at an interval to obtain a lock under contention. As a result, the locking performance for contented locks for NFSv4 is slower than the performance of NFSv3.
The CB_NOTIFY_LOCK operation has been added to the NFS client and server, so NFSv4.1 and later allow servers to call back to clients waiting on a lock.
This update improves the locking performance for contented locks on NFSv4.1 mounts for certain workloads. Note that the performance might not improve for longer lock contention times. (BZ#1377710)
The CephFS kernel client is fully supported with Red Hat Ceph Storage 3
The Ceph File System (CephFS) kernel module enables Red Hat Enterprise Linux nodes to mount Ceph File Systems from Red Hat Ceph Storage clusters. The kernel client in Red Hat Enterprise Linux is a more efficient alternative to the Filesystem in Userspace (FUSE) client included with Red Hat Ceph Storage. Note that the kernel client currently lacks support for CephFS quotas.
The CephFS kernel client was introduced in Red Hat Enterprise Linux 7.3 as a Technology Preview, and since the release of Red Hat Ceph Storage 3, CephFS is fully supported.
For more information, see the Ceph File System Guide for Red Hat Ceph Storage 3: https://access.redhat.com/documentation/en-us/red_hat_ceph_storage/3/html/ceph_file_system_guide/. (BZ#1626527)
Chapter 10. Hardware Enablement Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
Hardware utility tools now correctly identify recently released hardware
Prior to this update, obsolete ID files caused that recently released hardware connected to a computer was reported as unknown. To fix this bug, PCI, USB, and vendor device identification files have been updated. As a result, hardware utility tools now correctly identify recently released hardware. (BZ#1386133)
New Wacom driver introduced in 7.4 to support upcoming tablets
With this update, a new Wacom driver was introduced to support recently-released and upcoming tablets meanwhile the current driver continues supporting previously-released tablets.
Notable features:
- Wacom 27QHT (touch) is now supported
- ExpressKey Remote (BZ#1385026)
Wacom kernel driver now supports ThinkPad X1 Yoga touch screen
With this update, the support for the ThinkPad X1 Yoga touch screen has been added to the Wacom kernel driver. As a result, the touch screen can be properly used when running Red Hat Enterprise Linux 7 on these machines. (BZ#1388646)
The touch functionality has been added to the Wacom Cintiq 27 QHDT tablets
This update adds support of the touch functionality for the Wacom Cintiq 27 QHDT tablets, which makes it possible to properly use the touch screen when running Red Hat Enterprise Linux 7 on these machines. (BZ#1391668)
AMDGPU now supports the Southern Islands, Sea Islands, Volcanic Islands and Arctic Islands chipsets
The support for the
Southern Islands, Sea Islands, Volcanic Islands and Arctic Islands chipsets has been added. The AMDGPU graphics driver is the next generation family of open source graphics drivers for the latest AMD/ATI Radeon graphics cards. It is based on the Southern Islands, Sea Islands, Volcanic Islands, and Arctic Islands chipsets. It is necessary to install the proper firmware or microcode for the card provided by the linux-firmware package. (BZ#1385757)
Support added for the AMD mobile graphics
Support for the
AMD mobile graphics based on the Polaris architecture has been added. The Polaris architecture is based on the Arctic Islands chipsets. It is necessary to install the proper firmware or microcode for the card provided by the linux-firmware package. (BZ#1339127)
Netronome NFP devices are supported
With this update, the
nfp driver has been added to the Linux kernel. As a result, the Netronome Network Flow Processor (Netronome NFP 4000/6000 VF) devices are now supported on Red Hat Enterprise Linux 7. (BZ#1377767)
nvme-cli rebased to version 1.3
The
nvme-cli utility has been updated to version 1.3, which includes support for Nonvolatile Memory Express (NVMe). With the support for NVMe, you can find the targets over Remote Direct Memory Access (RDMA) and connect to these targets. (BZ#1382119)
The queued spinlocks have been implemented into the Linux kernel
This update has changed the spinlock implementation in the kernel from ticket spinlocks to queued spinlocks on AMD64 and Intel 64 architectures. The queued spinclocks are more scalable than the ticket spinlocks. As a result, the system performance has been improved especially on Symmetric Multi Processing (SMP) systems with large number of CPUs. The performance now increases more linearly with increasing number of the CPUs. Note that because of this change in the spinlock implementation, kernel modules built on Red Hat Enterprise Linux 7 might not be loadable on kernels from earlier releases. Kernel modules released in Red Hat Enterprise Linux (RHEL) versions earlier than 7.4 are loadable on the kernel released in RHEL 7.4. (BZ#1241990)
rapl now supports Intel Xeon v2 servers
The Intel
rapl driver has been updated to support Intel Xeon v2 servers. (BZ#1379590)
Further support for Intel Platform Controller Hub [PCH] devices
The kernel has been updated to enable support for new Intel PCH hardware on the Intel Xeon Processor E3 v6 Family CPUs. (BZ#1391219)
Included genwqe-tools to enable use of hardware accelerated zLib on IBM Power and s390x
The genwqe-tools package allows users of IBM Power and s390x hardware to utilize FPGA based PCIe cards for zLib compression and decompression processes.
These tools enable use of RFC1950, RFC1951 and RFC1952 compliant hardware to increase performance. (BZ#1275663)
librtas rebased to version 2.0.1
The librtas packages have been upgraded to upstream version 2.0.1, which provides a number of bug fixes and enhancements over the previous version. Notably, this update changes the soname of the provided libraries:
librtas.so.1 changes to librtas.so.2, and librtasevent.so.1 changes to librtasevent.so.2. (BZ#1380656)
The NFP driver
The Network Flow Processor (NFP) driver has been backported from version 4.11 of the Linux kernel. This driver supports Netronome NFP4000 and NFP6000 based cards working as an advanced Ethernet NIC. The driver works with both SR-IOV physical and virtual functions. (BZ#1406197)
Enable latest NVIDIA cards in Nouveau
This update includes enablement code to ensure that higher-end NVIDIA cards based on the Pascal platform work correctly. (BZ#1330457)
Support for Wacom ExpressKey Remote
The Wacom ExpressKey Remote (EKR) is now supported in Red Hat Enterprise Linux 7. EKR is an external device that allows you to access shortcuts, menus and commands. (BZ#1346348)
Wacom Cintiq 27 QHD now supports ExpressKey Remote
With this update, Wacom Cintiq 27 QHD tablets support ExpressKey Remote (EKR). EKR is an external device that allows you to access shortcuts, menus and commands. (BZ#1342990)
Chapter 11. Installation and Booting Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
Anaconda enables users to set RAID chunk size
This update allows the user to set the
--chunksize parameter for the raid utility in a kickstart file to specify the chunk size of a RAID storage, in KiB. Using the --chunksize parameter overrides the default one. As a result, the new chunk size can prevent a negative performance impact the default value might have. (BZ#1332316)
Anaconda text mode now supports IPoIB interfaces
This update adds support for IP over InfiniBand (IPoIB) network interfaces during manual installation in text mode. You can now view IPoIB interface status information and change interface configuration. (BZ#1366935)
inst.debug enables a more convenient debugging of Anaconda installation issues
This update adds the ability to save logs related to the initial state of the machine by starting the
Anaconda installation with the inst.debug boot option. This option stores three additional logs, lsblk, dmesg and lvmdump, in the /tmp/pre-anaconda-logs/ directory, allowing a more convenient debugging of issues which occurred during the installation. (BZ#1255659)
Kickstart installation failure automatically triggers %onerror scripts
This enhancement makes sure that the
%onerror sections in a kickstart file are run if the Anaconda installation fails. The scripts can be used to collect logs automatically for further examination. As a result of this update, when a traceback or another fatal error occurs during the installation, the installer performs the %onerror scripts and the %traceback scripts check if the error was caused by a traceback. (BZ#1412538)
Anaconda can now wait for network to become available before starting the installation
In some environments, the first DHCP request can be expected to fail. Previously, the first DHCP failure caused
Anaconda to proceed with the installation, which could cause problems especially with automatic installations where a connection could not be set up manually later. This update introduces a new Anaconda boot option, inst.waitfornet=X, which forces the installer to spend X seconds waiting for network connectivity before proceeding. The installation will continue once a connection is established, or after the specified time interval has passed. (BZ#1315160)
Multiple network locations of stage2 or Kickstart files can be specified to prevent installation failure
This update enables the specification of multiple
inst.stage2 and inst.ks boot options with network locations of stage2 and a Kickstart file. This avoids the situation in which the requested files cannot be reached and the installation fails because the contacted server with the stage2 or the Kickstart file is inaccessible.
With the new update, the installation failure can be avoided if multiple locations are specified. If all the defined locations are URLs, namely
HTTP, HTTPS, or FTP, they will be tried sequentially until the requested file is fetched successfully. If there is a location that is not a URL, only the last specified location is tried. The remaining locations are ignored. (BZ#1391724)
autopart --nohome in a kickstart file disables the creation of /home/ in automatic partitioning
This update adds the
--nohome option to the autopart command in a kickstart file to disable automatic creation of the /home/ partition. This enhancement avoids the need to perform manual partitioning if the /home/ partition is to be averted. As a result of the update, the /home partition is not created if partitioning is done automatically. (BZ#663099)
Loading driver disks from hard disk drives and USBs enabled
This update enables loading driver disks from a hard disk drive or a similar device instead of loading them over the network or from
initrd. The installation can proceed either using the kickstart or the boot options.
The procedure is as follows:
1. Load the driver disk on a hard disk drive, a USB or any similar device.
2. Set the label, for example,
DD, to this device.
Notes:
For kickstart installation, add
driverdisk LABEL=DD:/e1000.rpm
driverdisk LABEL=DD:/e1000.rpm
to your kickstart file.
For the boot option, start the installation with
inst.dd=hd:LABEL=DD:/dd.rpm
inst.dd=hd:LABEL=DD:/dd.rpm
as the boot argument.
In both the kickstart and the boot options, replace
DD with a specific label and replace dd.rpm with a specific name. Use anything supported by the inst.repo command instead of LABEL to specify your hard disk drive. Do not use non-alphanumeric characters in the argument specifying the LABEL of the kickstart driverdisk command. (BZ#1377233)
Changes in automatic partitioning behavior for LVM thin pools
Previously, every Logical Volume Management (LVM) thin pool created or used in the installation, whether using Kickstart or an interactive installation, 20 % of its size reserved.
This update brings the following changes:
- If you create a LVM thin pool with automatic partitioning, 20 % of the volume group size is reserved, with a minimum of 1 GiB and a maximum of 100 GiB.
- If you use the
logvol --thinpool --growcommand in a Kickstart file, the thin pool will grow to the maximum possible size, which means no space will be left for it in the volume group to grow. In this case, you can use thevolgroup --reserved-spaceorvolgroup --reserved-percentcommand to leave some space in the volume group reserved, which is recommended. (BZ#1131247)
32-bit boot loaders can now boot 64-bit kernels on UEFI
This update enables booting 64-bit kernels using 32-bit boot loaders, such as grub2-i386-efi, on systems with UEFI firmware. (BZ#1310775)
Lorax can now ignore SSL errors
Previously, the
lorax tool could not use HTTPS repositories with self-signed certificates. An attempt to do so resulted in an error with no way to continue. This update adds the --noverifyssl command line option to the utility, which can be used to skip verifying the server certificate and bypass the error. (BZ#1430483)
shim-signed rebased to version 12
With this update, the shim-signed package has been upgraded to upstream version 12, which provides a number of bug fixes and enhancements over the previous version. Notably, support for 32-bit UEFI firmware and Extensible Firmware Interface (EFI) utilities has been added. (BZ#1310764)
gnu-efi rebased to version 3.0.5.-9
With this update, the gnu-efi package has been upgraded to upstream version 3.0.5.-9, which provides a number of bug fixes and enhancements over the previous version. Notably, the support for 32-bit UEFI firmware and Extensible Firmware Interface (EFI) utilities has been added. (BZ#1310782)
Backward compatibility enabled for killproc() and status()
Prior to this update, the
/etc/rc.d/init.d/functions script shipped in Red Hat Enterprise Linux 7 lacked some of the features of the Red Hat Enterprise Linux 6 counterpart. The initscripts package has been updated to add support for the -b option to the killproc() and status() functions in the /etc/rc.d/init.d/functions file. This addition enables backward compatibility for Red Hat Enterprise Linux 6 and prevents possible regressions when performing an upgrade from Red Hat Enterprise Linux 6 to Red Hat Enterprise Linux 7. (BZ#1428935)
DHCP_FQDN allows specifying a fully qualified domain name of the system
Previously, the
ifcfg interface configuration files required that the DHCP_HOSTNAME directive was used to specify the hostname of the system. The new initscripts DHCP_FQDN directive now also allows specifying the fully qualified domain name of the system. This is a complement to the DHCP_HOSTNAME directive. In case both DHCP_HOSTNAME and DHCP_FQDN are specified, only DHCP_FQDN is used. (BZ#1260552)
You can now create thin logical volume snapshots during the installation process
This update adds support for a new Kickstart command,
snapshot. This command allows you to create a LVM thin volume snapshot either before or after the installation. Available options are:
<vg_name>/<lv_name>Specify the name of the volume group and logical volume to make a snapshot of.--name=Specify a name for the snapshot.--when=Specifypre-installif you want to take a snapshot before the installation begins, which can be useful if you want to preserve the state of a system before an upgrade. Alternatively, specifypost-installto take a snapshot of a newly installed system before any additional changes are made to it.
All three options are mandatory. Also note that you can use this command multiple times in a single Kickstart file to take a snapshot both before and after the installation, or to take snapshots of multiple logical volumes. Make sure that each
-name= parameter specifies a unique name when doing so. (BZ#1113207)
Chapter 12. Kernel Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
Kernel version in RHEL 7.4
Red Hat Enterprise Linux 7.4 is distributed with the kernel version 3.10.0-693. (BZ#1801759)
The NVMe driver rebased to kernel version 4.10
The NVM-Express kernel driver has been updated to upstream kernel version 4.10, which provides a number of bug fixes and enhancements over the previous version. The most notable change is: the initial NVMe-over-Fabrics transport implementation, which uses existing RDMA NICs (Infiniband, RoCE, iWARP) and existing NVMe SSDs, has been added to the driver, but does not include support for DIF/DIX and multipathing. (BZ#1383834)
crash rebased to version 7.1.9
With this update, the crash packages have been upgraded to upstream version 7.1.9, which provides a number of bug fixes and enhancements over the previous version. (BZ#1393534)
crash now analyzes vmcore dumps for IBM Power ISA 3.0
The
crash utility has been updated to correspond with changes in the kernel page table related to IBM Power ISA version 3.0 architecture. As a result, the crash utility is now able to analyze vmcore dumps of kernels on IBM Power ISA 3.0 systems. (BZ#1368711)
crash updated for IBM Power and for the little-endian variant of IBM Power
The crash packages have been updated to support IBM Power Systems and the little-endian variant of IBM Power Systems. These packages provide the core analysis suite, which is a self-contained tool that can be used to investigate live systems, as well as kernel core dumps created by the kexec-tools packages or the Red Hat Enterprise Linux kernel. (BZ#1384944)
memkind updated to version 1.3.0
The
memkind library has been updated to version 1.3.0, which provides several bug fixes and enhancements over the previous version.
Notable changes include:
- A logging mechanism has been introduced.
- Hardware Locality (hwloc) has been integrated, and can be turned on using the
--with-hwlocoption. - The symbols exposed by libmemkind.so have been cleaned up. For example,
libnumaandjemallocare no longer exposed. - AutoHBW files have been moved to to the
/memkind/autohbw/directory, code has been refactored and tests have been added to appropriate scenarios. - Flags improving security have been added to
memkind. The flags can be turned off with the--disable-secureconfigure time option. - The configuration of
jemallochas been changed to turn off unused features. - Several symbols have been deprecated. For details, see the Deprecated Functionality part. (BZ#1384549)
Jitter Entropy RNG added to the kernel
This update adds the Jitter Entropy Random Number Generator (RNG), which collects entropy through CPU timing differences to the Linux kernel. This RNG is by default available through the
algif_rng interface. The generated numbers can be added back to the kernel through the /dev/random file, which makes these numbers available to other /dev/random users. As a result, the operating system now has more sources of entropy available. (BZ#1270982)
/dev/random now shows notifications and warnings for the urandom pool initialization
With this update, the random driver (/dev/random), has been modified to print a message when the nonblocking pool (used by /dev/urandom) is initialized. (BZ#1298643)
fjes updated to version 1.2
The
fjes driver has been updated to version 1.2, which includes a number of bug fixes and enhancements over the previous version. (BZ#1388716)
Full support for user name spaces
User name spaces (userns) that were introduced in Red Hat Enterprise Linux 7.2 as Technology Preview are now fully supported. This feature provides additional security to servers running Linux containers by improving isolation between the host and the containers. Administrators of containers are no longer able to perform administrative operations on the host, which increases security.
The default value of
user.max_user_namespaces is 0. You can set it to a non-zero value, which stops the applications that malfunction. It is recommended that user.max_usernamespaces is set to a large value, such as 15000, so that the value does not need to be revisited in the normal course of operation. (BZ#1340238)
makedumpfile updated to version 1.6.1
The makedumpfile package has been upgraded to upstream version 1.6.1 as part of the kexec-tools 2.0.14 rpm, which provides a number of bug fixes and enhancements over the previous version. (BZ#1384945)
qat updated to the latest upstream version
The
qat driver has been updated to the latest upstream version, which provides a number of bug fixes and enhancements over the previous version.
Notable bug fixes and enhancements:
- Added support for the Diffie-Hellman (DH) software
- Added support for Elliptic Curve Diffie–Hellman (ECDH) software
- Added support for Error-correcting Code (ECC) software for curve P-192 and P-256 (BZ#1382849)
Addition of intel-cmt-cat package
The
pqos utility provided in this package enables administrators to monitor and manipulate L3 cache to improve utility and performance.
The tool bypasses the kernel API and operates on the hardware directly, this requires that CPU pinning is in use with the target process before use. (BZ#1315489)
i40e now supports trusted and untrusted VFs
This update adds support for both trusted and untrusted virtual functions into the
i40e NIC driver. (BZ#1384456)
Kernel support for OVS 802.1ad (QinQ)
This update provides the ability to use two VLAN tags with Open vSwitch (OVS) by enabling the 802.1ad (QinQ) networking standard in kernel. Note that the user-space part of this update is provided by the openvswitch package. (BZ#1155732)
Live post-copy migration support for shared memory and hugetlbfs
This update enhances the kernel to enable live post-copy migration to support shared memory and the
hugetlbfs file system. To benefit from this feature:
- Configure 2MiB huge pages on a host,
- Create a guest VM with 2MiB huge pages,
- Run the guest VM and a stress-test application to test the memory,
- Live-migrate the guest VM with post-copy. (BZ#1373606)
New package: dbxtool
The dbxtool package provides a command-line utility and a one-shot
systemd service for applying UEFI Secure Boot DBX updates. (BZ#1078990)
mlx5 now supports SRIOV-trusted VFs
This update adds support of Single Root I/O Virtualization (SRIOV)-trusted virtual functions (VFs) to the
mlx5 driver. (BZ#1383280)
rwsem performance updates from the 4.9 kernel backported
With this update, most upstream R/W semaphores (
rwsem) performance related changes up to the Linux kernel version 4.9 have been backported into the Linux kernel while maintaining kernel Application Binary Interface (kABI).
Notable changes include:
- Writer-optimistic spinning, which reduces locking latency and improves locking performance.
- Lock-less waiter wakeup without holding internal spinlock. (BZ#1416924)
getrandom added to the Linux kernel
This update adds the
getrandom system call to the Linux kernel. As a result, the user space can now request randomness from the same non-blocking entropy pool used by /dev/urandom, and the user space can block until at least 128 bits of entropy has been accumulated in that pool. (BZ#1432218)
A new status line, Umask, has been included in /proc/<PID>/status
Previously, it was not possible to read the process umask without modification. Without this change, a library cannot read the umask safely, especially if the main program is multithreaded. The proc filesystem (procfs) now exposes the umask in the
/proc/<PID>/status file. The format is Umask: OOOO, where OOOO is the octal representation of the umask of the task. (BZ#1391413)
Intel® Omni-Path Architecture (OPA) host software
Intel® Omni-Path Architecture (OPA) host software has been fully supported since Red Hat Enterprise Linux 7.3. Intel® OPA provides Host Fabric Interface (HFI) hardware with initialization and setup for high performance data transfers (high bandwidth, high message rate, low latency) between compute and I/O nodes in a clustered environment.
For instructions on how to obtain Intel® Omni-Path Architecture documentation, see https://access.redhat.com/articles/2039623. (BZ#1459948)
The XTS-AES key verification now meets the FIPS 140-2 requirements
With this update, while running Red Hat Enterprise Linux in FIPS mode and using kernel XTS-AES key verification, the AES key is forced to be different from the tweak key. This ensures that the FIPS 140-2 IG A.9 requirements are met. Additionally, the XEX-based tweaked-codebook mode with ciphertext stealing (XTS) test vectors now could be marked to be skipped. (BZ#1314179)
mlx5 is now supported on IBM z Systems
The Mellanox
mlx5 device driver is now also supported for Linux on IBM z Systems and can be used for Ethernet TCP/IP network. (BZ#1394197)
The perf tool now supports processor cache-line contention detection
The
perf tool now provides the c2c subcommand for Shared Data Cache-to-Cache (C2C) analysis. This enables you to inspect cache-line contention and detect both true sharing and false sharing.
Contention occurs when a processor core on a Symmetric Multi Processing (SMP) system modifies data items on the same cache line that is in use by other processors. All other processors using this cache line must then invalidate their copy and request an updated one, which can lead to degraded performance.
The new
c2c subcommand provides detailed information about the cache lines where contention has been detected, the processes reading and writing the data, the instructions causing the contention, and the Non-Uniform Memory Access (NUMA) nodes involved. (BZ#1391243)
SCSI-MQ support in the lpfc driver
The
lpfc driver updated in Red Hat Enterprise Linux 7.4 can now enable the use of SCSI-MQ (multiqueue) with the lpfc_use_blk_mq=1 module parameter. The default value is 0 (disabled).
Note that a recent performance testing at Red Hat with async IO over Fibre Channel adapters using SCSI-MQ has shown significant performance degradation under certain conditions. A fix is being tested but was not ready in time for Red Hat Enterprise Linux 7.4 General Availability. (BZ#1382101)
Chapter 13. Real-Time Kernel Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
About Red Hat Enterprise Linux for Real Time Kernel
The Red Hat Enterprise Linux for Real Time Kernel is designed to enable fine-tuning for systems with extremely high determinism requirements. The major increase in the consistency of results can, and should, be achieved by tuning the standard kernel. The real-time kernel enables gaining a small increase on top of increase achieved by tuning the standard kernel.
The real-time kernel is available in the
rhel-7-server-rt-rpms repository. The Installation Guide contains the installation instructions and the rest of the documentation is available at Product Documentation for Red Hat Enterprise Linux for Real Time.
kernel-rt rebased
The kernel-rt sources have been upgraded to be based on the latest Red Hat Enterprise Linux kernel source tree, which provides a number of bug fixes and enhancements over the previous version. (BZ#1391779)
Chapter 14. Networking Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
NetworkManager rebased to version 1.8
The NetworkManager package has been upgraded to upstream version 1.8, which provides a number of bug fixes and enhancements over the previous version. Notable changes include:
- Support for additional route options has been added.
- Managed state of device until reboot has been persisted.
- Devices that are externally managed are now correctly handled.
- Networked reliability on multihomed hosts has been enhanced.
- Hostname management is now more flexibly configured.
- Support for changing and enforcing
802-3 link propertieshas been added. (BZ#1414103)
NetworkManager now supports additional features for routes
With this update,
NetworkManager can set some advanced options: source_address (src, IPv4 only), from, type_of_service (tos), window, maximum_transmission_unit (mtu), congestion_window (cwnd), initial_congestion_window (initcwnd), and initial_receiver_window (initrwnd) for static IPv4 and IPv6 routes of connections. (BZ#1373698)
NetworkManager now better handles devices state
With this update,
NetworkManager now maintains the state of devices after the service restart and takes over interfaces which are set into managed mode during restart. In addition, NetworkManager can handle devices which are not explicitly set as unmanaged but controlled manually by the user or another network service. (BZ#1394579)
NetworkManager now supports MACsec (IEEE 802.1AE)
This update adds support for configuring Media Access Control Security (MACsec) encryption into
NetworkManager. (BZ#1337997)
NetworkManager now supports changing and enforcing 802-3 link properties
Previously,
NetworkManager only exposed 802-3 link properties : 802-3-ethernet.speed, 802-3 ethernet.duplex, and 802-3-ethernet.auto-negotiate. With this update, it is possible to change and enforce them. You can either do this automatically using auto-negotiate=yes, or manually using auto-negotiate=no, speed=<Mbit/s>, duplex=[half,full].
Note that if
auto-negotiate=no and either speed or duplex are not set, then the link negotiation is skipped and the auto-negotiate=no, speed=0, duplex=NULL default values are preserved.
Note also that the
auto-negotiate default value has been changed from yes to no to preserve backward compatibility. Previously, the property was ignored, but now an auto-negotiate value of yes can enforce link negotiation. Setting it to no with speed and/or duplex unset means that link negotiation is ignored. (BZ#1353612)
NetworkManager now supports ordering bond slaves based on device names
Previously, the existing order of activation for slave connections could cause problems determining the MAC address of the master interface. This update adds more predictable ordering based on device names. You can enable the new ordering using the
slaves-order=name setting in NetworkManager configuration.
Note that the new ordering is disabled by default and must be explicitly enabled. (BZ#1420708)
NetworkManager now supports VFs for SR-IOV devices
With this update, the
NetworkManager system service supports creating virtual functions (VFs) for Single Root I/O Virtualization (SR-IOV) PCI devices. The number of VFs can be specified using the sriov-num-vfs option in the device section of the NetworkManager configuration file. After VFs are created, NetworkManager can activate connection profiles on them.
Note that some properties of a VF interface, such as the Maximum Transmission Unit (MTU), can only be set to values compatible with those that are set on the physical interface. (BZ#1398934)
Kernel GRE rebased to version 4.8
Kernel Generic Routing Encapsulation (GRE) tunneling has been updated to upstream version 4.8, which provides a number of bug fixes and enhancements over the previous version. The most notable changes include:
- Code merge for transmit and receive paths for IPv4 GRE and IPv6 GRE
- Enhancements that allow link layer address changes without bringing the
gre(IPv4 GRE) orip6gre(IPv6 GRE) device down - Support for various offloads such as
checksum,scatter-gather,highdma,gso, orgro, for IPv6 GRE traffic - Automatic kernel module loading when adding
ip6gretapdevices - Miscellaneous tunneling fixes (such as error handling, MTU calculation, path MTU discovery) up to Linux kernel version 4.8 that affect GRE tunnels (BZ#1369158)
dnsmasq rebased to version 2.76
The dnsmasq packages have been upgraded to version 2.76, which provides a number of bug fixes and enhancements. Notable changes include the following:
- The
dhcp_release6utility is now supported. - The
ra-paramoption has been added. - Support for the
RFC-4242 information-refresh-timeoptions in the reply to the DHCPv6 information request has been added. - The
ra-advroutermode for RFC-3775-compliant mobile IPv6 support has been added. - The
script-arpscript has been added and two new functions for thedhcp-scriptscript have been included. - It is now possible to use random addresses for DHCPv6 temporary address allocations, instead of algorithmically determined stable addresses.
- New optional DNS Security Extensions (DNSSEC) support has been disabled.
BIND changes the way it handles URI resource records, impacting also URI backward compatibility
With this update, the BIND suite no longer adds an additional length byte to a value field when using a URI resource record. This also means that BIND in Red Hat Enterprise Linux (RHEL) 7.4 communicates only in the format described in RFC 7553: https://tools.ietf.org/html/rfc7553.
Note that this update makes new URI records incompatible with records created using BIND in previous versions of RHEL. Namely, BIND in RHEL 7.4 cannot:
- Understand URI records provided by previous versions of BIND in RHEL.
- Serve URI records to clients using previous versions of BIND in RHEL.
However, BIND in RHEL 7.4 still can:
- Cache and receive records from both earlier and future versions of BIND in RHEL.
- Serve records in the old URI format encoded as Unknown DNS Resource Record. See RFC 3597 for details: https://tools.ietf.org/html/rfc3597.
After this update, you do not need to make any change to the DNS zone files. (BZ#1388534)
A DHCP client hook example added for DDNS for Microsoft Azure cloud
An example of the
DHCP client hook for Dynamic DNS (DDNS) for Microsoft Azure cloud has been added to the dhclient package. The administrator can now easily enable this hook, and register Red Hat Enterprise Linux clients with a DDNS server. (BZ#1374119)
dhcp_release6 now releases IPv6 addresses
With this update, the
dhcp_release6 utility can release Dynamic Host Configuration Protocol version 6 (DHCPv6) leases for IPv6 addresses on the local dnsmasq server. See the dhcp_release6(1) man page for more information about the dhcp_release6 command. (BZ#1375569)
Sendmail now supports ECDHE
This update adds the Elliptic Curve Diffie-Hellman Ephemeral Keys (ECDHE) support to Red Hat Enterprise Linux 7
Sendmail. ECDHE is a variant of the Diffie-Hellman protocol that uses elliptic curve cryptography. It is an anonymous key agreement protocol that allows two parties to establish a shared secret over an insecure channel. (BZ#1124827)
telnet now supports the -6 option
Adjustable TTL limit for caching negative DNS responses in Unbound
This update adds the
cache-max-negative-ttl configuration option for the Unbound service, which enables adjustment of the maximum TTL specifically for caching negative DNS responses. Previously, this limit was determined by the domain SOA record, or it was automatically the same as the maximum TTL limit for caching all DNS responses, if configured.
Note that if
Unbound is determining the TTL for DNS response caching, the value set for the cache-min-ttl option has precedence over the value specified by cache-max-negative-ttl. (BZ#1382383)
The scalability of UDP sockets has been improved
This update improves UDP forward memory accounting and reduces the lock contention of UDP sockets. As a result, the overall ingress throughput of UDP sockets receiving traffic from multiple peers is considerably increased without any outward functional changes. (BZ#1388467)
IP now supports IP_BIND_ADDRESS_NO_PORT in the kernel
This update adds the
IP_BIND_ADDRESS_NO_PORT socket option to the kernel. This allows the kernel to skip L4 tuple reservation when a bind() request is used to a port number of 0. As a result, many simultaneous connections to different destination hosts can be maintained. (BZ#1374498)
IPVS Source Hash scheduling now supports L4 hashing and SH fallback
With this update, the IP Virtual Server (IPVS) Source Hash scheduling algorithm includes:
- L4 hashing
- SH fallback of requests to the next active server in case the destination server has a weight of
0, which indicates that the destination server is inactive.
As a result, it is now possible to balance the load of requests from one source IP address based on port numbers. Requests to inactive servers no longer time out. (BZ#1365002)
iproute now supports changing bridge port options
With this update, changing bridge port options such as
state, priority, and cost have been added to the iproute package. As a result, iproute can be used as an alternative to the bridge-utils package. (BZ#1373971)
New options of Sockets API Extensions for SCTP (RFC 6458) implemented
This update implements options
SCTP_SNDINFO, SCTP_NXTINFO, SCTP_NXTINFO and SCTP_DEFAULT_SNDINFO to the Sockets API Extensions for the Stream Control Transmission Protocol (RFC 6458).
These new options replace the options
SCTP_SNDRCV, SCTP_EXTRCV and SCTP_DEFAULT_SEND_PARAM, which are now deprecated. See also the deprecated functionality section. (BZ#1339791)
ss now supports SCTP sockets list
Previously, the
netstat utility provided a list of Stream Control Transmission Protocol (SCTP) sockets. With this update, the ss utility is able to display the same list. (BZ#1063934)
wpa_supplicant rebased to version 2.6
The wpa_supplicant packages have been upgraded to upstream version 2.6, which provides a number of bug fixes and enhancements. Notably, the
wpa_supplicant utility now supports the Media Access Control Security (MACsec) encryption 802.1AE, which enables MACsec to be used in configuration by default. (BZ#1404793, BZ#1338005)
Linux kernel now contains the switchdev infrastructure and mlxsw
This update backports the following functionality into the Linux kernel:
- The Ethernet switch device driver model - the
switchdevinfrastructure; as a result, switch devices can now offload forwarding data plane from the kernel - The
mlxswdriver
Switch hardware supported by
mlxsw :
- Mellanox SwitchX-2 (slow path only)
- Mellanox SwitchIB and SwitchIB-2
- Mellanox Spectrum
Features supported by
mlxsw :
- Per port jumbo frames, speed setting, state setting, statistics
- Port splitting together with splitter cables
- Port mirroring
- QoS: 802.1p, Data Center Bridging (DCB)
- Access Control Lists (ACLs) using TC flower offloading have been introduced as a Technology Preview
Layer 2 features:
- VLANs
- Spanning Tree Protocol (STP)
- Link Aggregation (LAG) using team or bonding offloading
- Link Layer Discovery Protocol (LLDP)
Layer 3 features:
- Unicast routing
To configure all these features, use standard tools provided by the iproute package that has been updated as well. (BZ#1297841, BZ#1275772, BZ#1414400, BZ#1434587, BZ#1434591)
The Linux bridge code rebased to version 4.9
The Linux bridge code has been upgraded to upstream version 4.9, which provides a number of bug fixes and enhancements over the previous version. Notable changes include:
- Support for 802.1ad VLAN filtering and Tx VLAN acceleration
- Support for 802.11 Proxy Address Resolution Protocol (ARP)
- Support for switching offloading by using
switchdev - VLAN support for user
mdbentries - Support for extended attributes in
mdbentries - Support for temporary port router
- Support for per-VLAN statistics
- Support for Internet Group Management Protocol/Multicast Listener Discovery (IGMP/MLD) statistics
- All configuration settings supported by using
sysfsare now supported by netlink as well - Added per-port flag to control the unknown multicast flood (BZ#1352289)
bind-dyndb-ldap rebased to version 11.1
The bind-dyndb-ldap package has been upgraded to upstream version 11.1, which provides a number of bug fixes and enhancements over the previous version.
Notably, the
/etc/named.conf file now uses the new DynDB API. Updating the bind-dyndb-ldap package automatically converts the file to the new API style. (BZ#1393889)
DynDB API from the upstream version 9.11.0 of BIND added to Red Hat Enterprise Linux
This update backports the API for the
dyndb system plug-in, which was introduced in the bind package version 9.11.0 in upstream. As a result, the bind-dyndb-ldap plug-in in Red Hat Enterprise Linux now uses the new API. The downstream feature dynamic_db, which was used in previous releases of Red Hat Enterprise Linux, is no longer supported.
Because the upstream
dyndb uses a different configuration syntax than the downstream dynamic_db, the syntax also changes with this update. However, you do not need to make any manual configuration changes. (BZ#1393886)
tboot rebased to version 1.9.5
The tboot packages have been upgraded to upstream version 1.9.5, which provides a number of bug fixes and enhancements over the previous version. Notable changes include:
- This update adds the 2nd generation of the Link Control Protocol (LCP) creation utility for Trusted Platform Module (TPM) 2.0, as well as a user guide for the updated LCP creation utility.
- A workaround has been implemented to ensure the correct behavior of Intel Platform Trust Technology (PTT) and the Linux PTT driver.
- New fields have been added in the Linux kernel header struct declaration, in order to accommodate for new capabilities of the Linux kernel. (BZ#1384210)
Packages related to rdma consolidated by rebase into rdma-core version 13
The packages related to the rdma package have been upgraded and consolidated into a single source package, rdma-core version 13. The packages are:
- rdma
- iwpmd
- libibverbs
- librdmacm
- ibacm
- libibumad
- libocrdma
- libmlx4
- libmlx5
- libhfi1verbs
- libi40iw
- srp_daemon (formerly srptools)
- libmthca
- libcxgb3
- libcxgb4
- libnes
- libipathverbs
- librxe
- rdma-ndd
The following, previously not included, packages have been added as part of the new package rdma-core:
- libqedr
- libhns
- libvmw_pvrdma
All
ibverbs hardware-specific provider libraries are now bundled in the libibverbs sub-package, streamlining installation and preventing possible versioning mismatches. (BZ#1404035)
OVN IP address management support added for static MAC addresses
This update adds support for dynamic IP address assignment with user-specified static MAC addresses. As a result, Open Virtual Network (OVN) users can now create configurations with dynamic IP that are associated with static MAC addresses. (BZ#1368043)
Enhanced networked reliability on multihomed hosts
On interfaces with a route that is already present on another interface, the NetworkManager utility now automatically switches the reverse path filtering method from
Strict to Loose. This enhances network reliability on multihomed host machines. (BZ#1394344)
Offloading of GENEVE, VXLAN, and GRE tunnels is now supported
With this update, the infrastructure to support offloading of GENEVE, VXLAN, and GRE tunnels has been added. In addition, various bugs have been fixed in the
GENEVE tunnel implementation. (BZ#1326309)
LCO for tunnel traffic is now supported
With this update, the
Local Checksum Offloading (LCO) technique has been added to enable certain network cards to utilize checksum offloading for tunnel traffic. This enhancement improves the performance of VXLAN, GRE, and other tunnels. (BZ#1326318)
Improved tunnel performance on NICs
With this update, tunnel performance on some Network Interface Cards (NICs) that do not support tunnel offloads by default has been enhanced. As a result, users can now take advantage of existing hardware offloads on these NICs. (BZ#1326353)
NPT is now supported in the kernel
With this update, the
IPv6-to-IPv6 Network Prefix Translation (NPTv6) function defined in RFC 6296 has been added in the Netfilter framework. As a result, it is now possible to enable NPT for stateless translation between IPv6 prefixes. (BZ#1432897)
DNS configuration is now supported through the D-Bus API
Previously, external applications could not easily retrieve the
DNS parameters used by NetworkManager. With this update, DNS configuration has been supported through the D-Bus API. As a result, all DNS-related information, including name servers and domains, is available to client applications through the D-Bus API of NetworkManager. An example of such application is the nmcli tool, which can now display DNS configuration. (BZ#1404594)
PPP support is now moved into a separate package
With this update, the Point-to-Point Protocol (PPP) support is moved into a separate, optional NetworkManager-ppp package. As a result, the dependency chain of
NetworkManager is smaller and it is possible to limit the number of installed packages.
Note that to configure PPP settings, you must make sure that the NetworkManager-ppp package is installed. (BZ#1404598)
The tc utility now supports flower
The
tc utility has been enhanced to use the kernel flower traffic control classifier. With this update, a user can add, modify, or delete flower classifier rules from an interface. (BZ#1422629)
Fix to the CRC32c value computation in SCTP forwarding path
Previously, the kernel incorrectly computed the
CRC32c value of Stream Control Transmission Protocol (SCTP) packets with offloaded checksum when the kernel forwarded them to an interface that did not support offloading. This update fixes the computation of CRC32c in the forwarding path. As a result, SCTP packets are now correctly transmitted in the described situation. (BZ#1072503)
New packages: iperf3
This update adds the iperf3 packages version 3.1.7 to Red Hat Enterprise Linux 7. The
iperf3 utility enables active measuring of the maximum achievable bandwidth on IP networks. (BZ#913329)
Installation of OVN now supports easily-configurable firewalld rules
This feature adds
firewalld configuration rules for Open Virtual Network (OVN) to the openvswitch packages. As a result, the user can install easier OVN with firewalld enabled, instead of needing to create firewalld configuration manually. (BZ#1390938)
netlink now supports bridge master attributes
With this update, whenever bridge attributes are changed, a notification is sent out to listeners. This includes changes triggered by sysfs, rtnl, ioctl, or user applications, such as
NetworkManager. (BZ#950243)
Chapter 15. Security Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
New packages: tang, clevis, jose, luksmeta
Network Bound Disk Encryption (NBDE) allows the user to encrypt root volumes of the hard drives on physical and virtual machines without requiring to manually enter password when systems are rebooted.
- Tang is a server for binding data to network presence. It includes a daemon which provides cryptographic operations for binding to a remote service. The tang package provides the server side of the NBDE project.
- Clevis is a pluggable framework for automated decryption. It can be used to provide automated decryption of data or even automated unlocking of LUKS volumes. The clevis package provides the client side of the NBDE project.
- José is a C-language implementation of the Javascript Object Signing and Encryption standards. The jose package is a dependency of the clevis and tang packages.
- LUKSMeta is a simple library for storing metadata in the LUKSv1 header. The luksmeta package is a dependency of the clevis and tang packages.
Note that the tang-nagios and clevis-udisk2 subpackages are available only as a Technology Preview. (BZ#1300697, BZ#1300696, BZ#1399228, BZ#1399229)
New package: usbguard
The
USBGuard software framework provides system protection against intrusive USB devices by implementing basic whitelisting and blacklisting capabilities based on device attributes. To enforce a user-defined policy, USBGuard uses the Linux kernel USB device authorization feature. The USBGuard framework provides the following components:
- The daemon component with an inter-process communication (IPC) interface for dynamic interaction and policy enforcement
- The command-line interface to interact with a running USBGuard instance
- The rule language for writing USB device authorization policies
- The C++ API for interacting with the daemon component implemented in a shared library (BZ#1395615)
openssh rebased to version 7.4
The openssh package has been updated to upstream version 7.4, which provides a number of enhancements, new features, and bug fixes, including:
- Added support for the resumption of interrupted uploads in
SFTP. - Added the extended log format for the authentication failure messages.
- Added a new fingerprint type that uses the SHA-256 algorithm.
- Added support for using PKCS#11 devices with external PIN entry devices.
- Removed support for the SSH-1 protocol from the
OpenSSHserver. - Removed support for the legacy
v00 certformat. - Added the
PubkeyAcceptedKeyTypesandHostKeyAlgorithmsconfiguration options for thesshutility and thesshddaemon to allow disabling key types selectively. - Added the
AddKeysToAgentoption for theOpenSSHclient. - Added the
ProxyJump sshoption and the corresponding-Jcommand-line flag. - Added support for key exchange methods for the Diffie-Hellman 2K, 4K, and 8K groups.
- Added the
Includedirective for thessh_configfile. - Removed support for the
UseLoginoption. - Removed support for the pre-authentication compression in the server.
- The seccomp filter is now used for the pre-authentication process. (BZ#1341754)
audit rebased to version 2.7.6
The audit packages have been updated to upstream version 2.7.6, which provides a number of enhancements, new features, and bug fixes, including:
- The
auditdservice now automatically adjusts logging directory permissions when it starts up. This helps keep directory permissions correct after performing a package upgrade. - The
ausearchutility has a new--formatoutput option. The--format textoption presents an event as an English sentence describing what is happening. The--format csvoption normalizes logs into a subject, object, action, results, and how it occurred in addition to some metadata fields which is output in the Comma Separated Value (CSV) format. This is suitable for pushing event information into a database, spreadsheet, or other analytic programs to view, chart, or analyze audit events. - The
auditctlutility can now reset the lost event counter in the kernel through the--reset-lostcommand-line option. This makes checking for lost events easier since you can reset the value to zero daily. ausearchandaureportnow have abootoption for the--startcommand-line option to find events since the system booted.ausearchandaureportprovide a new--escapecommand-line option to better control what kind of escaping is done to audit fields. It currently supportsraw,tty,shell, andshell_quoteescaping.auditctlno longer allows rules with the entry filter. This filter has not been supported since Red Hat Enterprise Linux 5. Prior to this release, on Red Hat Enterprise Linux 6 and 7,auditctlmoved any entry rule to the exit filter and displayed a warning that the entry filter is deprecated. (BZ#1381601)
opensc rebased to version 0.16.0
The
OpenSC set of libraries and utilities provides support for working with smart cards. OpenSC focuses on cards that support cryptographic operations and enables their use for authentication, mail encryption, or digital signatures.
Notable enhancements in Red Hat Enterprise Linux 7.4 include:
OpenSCadds support for Common Access Card (CAC) cards.OpenSCimplements thePKCS#11API and now provides also theCoolKeyapplet functionality. The opensc packages replace the coolkey packages.
Note that the coolkey packages will remain supported for the lifetime of Red Hat Enterprise Linux 7, but new hardware enablement will be provided through the opensc packages. (BZ#1081088, BZ#1373164)
openssl rebased to version 1.0.2k
The openssl package has been updated to upstream version 1.0.2k, which provides a number of enhancements, new features, and bug fixes, including:
- Added support for the Datagram Transport Layer Security TLS (DTLS) protocol version 1.2.
- Added support for the automatic elliptic curve selection for the ECDHE key exchange in TLS.
- Added support for the Application-Layer Protocol Negotiation (ALPN).
- Added Cryptographic Message Syntax (CMS) support for the following schemes: RSA-PSS, RSA-OAEP, ECDH, and X9.42 DH.
Note that this version is compatible with the API and ABI in the
OpenSSL library version in previous releases of Red Hat Enterprise Linux 7. (BZ#1276310)
openssl-ibmca rebased to version 1.3.0
The openssl-ibmca package has been updated to upstream version 1.3.0, which provides a number of bug fixes and enhancements over the previous version. Notable changes include:
- Added support for SHA-512.
- Cryptographic methods are dynamically loaded when the
ibmcaengine starts. This enablesibmcato direct cryptographic methods if they are supported in hardware through thelibicalibrary. - Fixed a bug in block-size handling with stream cipher modes. (BZ#1274385)
OpenSCAP 1.2 is NIST-certified
OpenSCAP 1.2, the Security Content Automation Protocol (SCAP) scanner, has been certified by the National Institute of Standards and Technology (NIST) as a U. S. government-evaluated configuration and vulnerability scanner for Red Hat Enterprise Linux 6 and 7. OpenSCAP analyzes and evaluates security automation content correctly and it provides the functionality and documentation required by NIST to run in sensitive, security-conscious environments. Additionally, OpenSCAP is the first NIST-certified configuration scanner for evaluating Linux containers. Use cases include evaluating the configuration of Red Hat Enterprise Linux 7 hosts for PCI and DoD Security Technical Implementation Guide (STIG) compliance, as well as performing known vulnerability scans using Red Hat Common Vulnerabilities and Exposures (CVE) data. (BZ#1363826)
libreswan rebased to version 3.20
The libreswan packages have been upgraded to upstream version 3.20, which provides a number of bug fixes and enhancements over the previous version. Notable enhancements include:
- Added support for Opportunistic IPsec (Mesh Encryption), which enables IPsec deployments that cover a large number of hosts using a single simple configuration on all hosts.
- FIPS further tightened.
- Added support for routed-based VPN using Virtual Tunnel Interface (VTI).
- Improved support for non-root configurations.
- Improved Online Certificate Status Protocol (OCSP) and Certificate Revocation Lists (CRL) support.
- Added new
whackcommand options:--fipsstatus,--fetchcrls,--globalstatus, and--shuntstatus. - Added support for the NAT Opportunistic Encryption (OE) Client Address Translation:
leftcat=yes. - Added support for the Traffic Flow Confidentiality mechanism:
tfc=. - Updated cipher preferences as per RFC 4307bis and RFC 7321bis.
- Added support for Extended Sequence Numbers (ESN):
esn=yes. - Added support for disabling and increasing the replay window:
replay-window=. (BZ#1399883)
Audit now supports filtering based on session ID
With this update, the Linux Audit system supports user rules to filter audit messages based on the
sessionid value. (BZ#1382504)
libseccomp now supports IBM Power architectures
With this update, the
libseccomp library supports the IBM Power, 64-bit IBM Power, and 64-bit little-endian IBM Power architectures, which enables the GNOME rebase. (BZ#1425007)
AUDIT_KERN_MODULE now records module loading
The
AUDIT_KERN_MODULE auxiliary record has been added to AUDIT_SYSCALL records for the init_module(), finit_module(), and delete_module() functions. This information is stored in the audit_context structure. (BZ#1382500)
OpenSSH now uses SHA-2 for public key signatures
Previously,
OpenSSH used the SHA-1 hash algorithm for public key signatures using RSA and DSA keys. SHA-1 is no longer considered secure, and new SSH protocol extension allows to use SHA-2. With this update, SHA-2 is the default algorithm for public key signatures. SHA-1 is available only for backward compatibility purposes. (BZ#1322911)
firewalld now supports additional IP sets
With this update of the
firewalld service daemon, support for the following ipset types has been added:
- hash:ip,port
- hash:ip,port,ip
- hash:ip,port,net
- hash:ip,mark
- hash:net,net
- hash:net,port
- hash:net,port,net
- hash:net,iface
The following
ipset types that provide a combination of sources and destinations at the same time are not supported as sources in firewalld. IP sets using these types are created by firewalld, but their usage is limited to direct rules:
- hash:ip,port,ip
- hash:ip,port,net
- hash:net,net
- hash:net,port,net
The ipset packages have been rebased to upstream version 6.29, and the following
ipset types are now additionally supported:
- hash:mac
- hash:net,port,net
- hash:net,net
- hash:ip,mark (BZ#1419058)
firewalld now supports actions on ICMP types in rich rules
With this update, the
firewalld service daemon allows using Internet Control Message Protocol (ICMP) types in rich rules with the accept, log and mark actions. (BZ#1409544)
firewalld now supports disabled automatic helper assignment
This update of the
firewalld service daemon introduces support for the disabled automatic helper assignment feature. firewalld helpers can be now used without adding additional rules also if automatic helper assignment is turned off. (BZ#1006225)
nss and nss-util now use SHA-256 by default
With this update, the default configuration of the NSS library has been changed to use a stronger hash algorithm when creating digital signatures. With RSA, EC, and 2048-bit (or longer) DSA keys, the SHA-256 algorithm is now used.
Note that also the NSS utilities, such as
certutil, crlutil, and cmsutil, now use SHA-256 in their default configurations. (BZ#1309781)
Audit filter exclude rules now contain additional fields
The exclude filter has been enhanced, and it now contains not only the
msgtype field, but also the pid, uid, gid, auid, sessionID, and SELinux types. (BZ#1382508)
PROCTITLE now provides the full command in Audit events
This update introduces the
PROCTITLE record addition to Audit events. PROCTITLE provides the full command being executed. The PROCTITLE value is encoded so it is not able to circumvent the Audit event parser. Note that the PROCTITLE value is still not trusted since it is manipulable by the user-space date. (BZ#1299527)
nss-softokn rebased to version 3.28.3
The nss-softokn packages have been upgraded to upstream version 3.28.3, which provides a number of bug fixes and enhancements over the previous version:
- Added support for the ChaCha20-Poly1305 (RFC 7539) algorithm used by TLS (RFC 7905), the Internet Key Exchange Protocol (IKE), and IPsec (RFC 7634).
- For key exchange purposes, added support for the Curve25519/X25519 curve.
- Added support for the Extended Master Secret (RFC 7627) extension. (BZ#1369055)
libica rebased to version 3.0.2
The libica package has been upgraded to upstream version 3.0.2, which provides a number of fixes over the previous version. Notable additions include
- support for Federal Information Processing Standards (FIPS) mode
- support for generating pseudorandom numbers, including enhanced support for Deterministic Random Bit Generator compliant with the updated security specification NIST SP 800-90A. (BZ#1391558)
opencryptoki rebased to version 3.6.2
The opencryptoki packages have been upgraded to upstream version 3.6.2, which provides a number of bug fixes and enhancements over the previous version:
- Added support for
OpenSSL1.1 - Replaced deprecated
OpenSSLinterfaces. - Replaced deprecated libica interfaces.
- Improved performance for IBM Crypto Accelerator (ICA).
- Added support for the
rc=8, reasoncode=2028error message in theicsftoken. (BZ#1391559)
AUDIT_NETFILTER_PKT events are now normalized
The
AUDIT_NETFILTER_PKT audit events are now simplified and message fields are now displayed in a consistent manner. (BZ#1382494)
p11tool now supports writing objects by specifying a stored ID
With this update, the
p11tool GnuTLS PKCS#11 tool supports the new --id option to write objects by specifying a stored ID. This allows the written object to be addressable by more applications than p11tool. (BZ#1399232)
new package: nss-pem
This update introduces the nss-pem package, which previously was part of the nss packages, as a separate package. The nss-pem package provides the PEM file reader for Network Security Services (NSS) implemented as a PKCS#11 module. (BZ#1316546)
pmrfc3164 replaces pmrfc3164sd in rsyslog
With the update of the rsyslog packages, the
pmrfc3164sd module, which is used for parsing logs in the BSD syslog protocol format (RFC 3164), has been replaced by the official pmrfc3164 module. The official module does not fully cover the pmrfc3164sd functionality, and thus it is still available in rsyslog. However, it is recommended to use new pmrfc3164 module wherever possible. The pmrfc3164sd module is not supported anymore. (BZ#1431616)
libreswan now supports right=%opportunisticgroup
With this update, the
%opportunisticgroup value for the right option in the conn part of Libreswan configuration is supported. This allows the opportunistic IPsec with X.509 authentication, which significantly reduces the administrative overhead in large environments. (BZ#1324458)
ca-certificates now meet Mozilla Firefox 52.2 ESR requirements
The Network Security Services (NSS) code and Certificate Authority (CA) list have been updated to meet the recommendations as published with the latest Mozilla Firefox Extended Support Release (ESR). The updated CA list improves compatibility with the certificates that are used in the Internet Public Key Infrastructure (PKI). To avoid certificate validation refusals, Red Hat recommends installing the updated CA list on June 12, 2017. (BZ#1444413)
nss now meets Mozilla Firefox 52.2 ESR requirements for certificates
The Certificate Authority (CA) list have been updated to meet the recommendations as published with the latest Mozilla Firefox Extended Support Release (ESR). The updated CA list improves compatibility with the certificates that are used in the Internet Public Key Infrastructure (PKI). To avoid certificate validation refusals, Red Hat recommends installing the updated CA list on June 12, 2017. (BZ#1444414)
scap-security-guide rebased to version 0.1.33
The scap-security-guide packages have been upgraded to upstream version 0.1.33, which provides a number of bug fixes and enhancements over the previous version. In particular, this new version enhances existing compliance profiles and expands the scope of coverage to include two new configuration baselines:
- Extended support for PCI-DSS v3 Control Baseline
- Extended support for United States Government Commercial Cloud Services (C2S).
- Extended support for Red Hat Corporate Profile for Certified Cloud Providers.
- Added support for the Defense Information Systems Agency (DISA) Security Technical Implementation Guide (STIG) for Red Hat Enterprise Linux 7 profile, aligning to the DISA STIG for Red Hat Enterprise Linux V1R1 profile.
- Added support for the Unclassified Information in Non-federal Information Systems and Organizations (NIST 800-171) profile configures Red Hat Enterprise Linux 7 to the NIST Special Publication 800-53 controls identified for securing Controlled Unclassified Information (CUI).
- Added support for the United States Government Configuration Baseline (USGCB/STIG) profile, developed in partnership with the U. S. National Institute of Standards and Technology (NIST), U. S. Department of Defense, the National Security Agency, and Red Hat.
The USGCB/STIG profile implements configuration requirements from the following documents:
- Committee on National Security Systems Instruction No. 1253 (CNSSI 1253)
- NIST Controlled Unclassified Information (NIST 800-171)
- NIST 800-53 control selections for moderate impact systems (NIST 800-53)
- U. S. Government Configuration Baseline (USGCB)
- NIAP Protection Profile for General Purpose Operating Systems v4.0 (OSPP v4.0)
- DISA Operating System Security Requirements Guide (OS SRG)
Note that several previously-contained profiles have been removed or merged. (BZ#1410914)
Chapter 16. Servers and Services Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
chrony rebased to version 3.1
The chrony package has been upgraded to upstream version 3.1, which provides a number of bug fixes and enhancements over the previous version. Notable enhancements include:
- Added support for software and hardware timestamping for improved accuracy (sub-microsecond accuracy may be possible).
- Improved accuracy with asymmetric network jitter.
- Added support for interleaved mode.
- Added support for configuration and monitoring over Unix domain socket to replace authentication with command key (remote configuration is no longer possible).
- Improved automatic replacement of servers.
- Added orphan mode compatible with the
ntpddaemon. - Added response rate limiting for NTP servers.
- Added detailed manual pages, which replace the documentation in the info format. (BZ#1387223)
linuxptp rebased to version 1.8
The linuxptp packages have been upgraded to upstream version 1.8, which provides a number of bug fixes and enhancements over the previous version. Notable enhancements include:
- Added support for hybrid end-to-end (E2E) delay measurements using unicast messages to reduce network traffic in large networks.
- Added support for running a boundary clock (BC) using independent Precision Time Protocol (PTP) hardware clocks.
- Added options to configure Time to Live (TTL) and Differentiated Services Code Point (DSCP) of PTP messages. (BZ#1359311)
tuned rebased to version 2.8.0
The tuned packages have been upgraded to upstream version 2.8.0, which provides a number of bug fixes and enhancements over the previous version. Notable changes include the following:
- CPU partitioning profile has been added.
- Support for cores isolation has been added.
- Support for
initrdoverlays has been added. - Inheritance has been improved.
logrotate now uses /var/lib/logrotate/logrotate.status as the default state file
Previously, the
logrotate cron job used a modified path to the logrotate state file. Consequently, the path used by the cron job did not match the default state file path used by logrotate itself. To prevent confusion, the default state file path used by logrotate has been changed to match the state file path used by logrotate cron job. As a result, logrotate now uses /var/lib/logrotate/logrotate.status as the default state file path in both scenarios. (BZ#1381719)
rsyslog rebased to version 8.24.0
The
rsyslog utility has been rebased to upstream version 8.24.0, which includes numerous enhancements, new features and bug fixes. Notable improvements include:
- A new core engine has been implemented, offering faster message processing.
- Speed and stability when handling data in the JSON format have been improved.
- The RainerScript configuration format has been selected as default and improved with more options.
- A new
mmexternalmodule for manipulation of messages insidersyslogusing external applications has been added. - The
omprogmodule has received improvements for better communication with external binaries. - Modules
imrelpandomrelpnow support encrypted transmission using the TLS protocol. - The
imuxsockmodule now supports rule sets for individual sockets, which override the global rule set. - When the
imuxsockmodule is used, rate limiting messages now include PID of the process that causes the rate limiting. - The TCP server error messages now include the IP address of the remote host.
- The
imjournalmodule no longer stops receiving logs after switching to the persistentjournaldconfiguration. - Logging to the runtime journal no longer completely stops after a reboot when the machine's clock was set to an earlier time.
- Previously, when the
logrotateutility withcopytruncateoption was rotating a log file, theimfilemodule might not have read all of the log messages from the file being rotated. As a consequence, these log messages were lost. Theimfilemodule has been extended to handle this situation. As a consquence, messages are no longer lost whenlogrotatecopytruncateis used on log files.
Customers using custom modules are advised to update their modules for the current rsyslog version.
See also the Deprecated Functionality chapter for information about deprecated
rsyslog options. (BZ#1313490, BZ#1174345, BZ#1053641, BZ#1196230, BZ#1326216, BZ#1088021, BZ#1419228, BZ#1133687)
New cache configuration options for mod_nss
This update adds new options to control cahing of OCSP responses to the
mod_nss module. The new options allow the user to control:
- Time to wait for OCSP responses
- Size of the OCSP cache
- Minimum and maximum duration for an item's presence in cache, including not caching at all (BZ#1392582)
Database and prefix options have been removed from nss_pcache
The
nss_pcache pin-caching service no longer shares the Network Security Services (NSS) database of the mod_nss Apache module because nss_pcache does not need access to the tokens. The options for the NSS database and the prefix have been removed and are now handled automatically by mod_nss. (BZ#1382102)
New package: libfastjson
This update introduces the
libfastjson library as a replacement of the json-c library for rsyslog. The limited feature set of libfastjson allows for greatly improved performance compared to json-c. (BZ#1395145)
tuned now supports initrd overlays
tuned now supports initrd overlays, which can extend default (Dracut) initrd images. It is supported by the bootloader plugin. The example shows typical usage in the Tuned profile:
[bootloader]
initrd_add_dir=${i:PROFILE_DIR}/overlay.img
[bootloader]
initrd_add_dir=${i:PROFILE_DIR}/overlay.img
This adds the content of the overlay.img directory to the current initrd when the profile is activated. (BZ#1414098)
openwsman now supports disabling of particular SSL protocols
Previously, there was no way to disable particular SSL protocols with the
openwsman utility. A new configuration file option for a list of disabled protocols has been added. As a result, it is now possible to disable particular SSL protocols through the openwsman configuration file. (BZ#1190689)
rear rebased to version 2.0
Updated rear packages that fix several bugs and add various enhancements are now available for Red Hat Enterprise Linux 7. Notable changes include:
- The
Cyclic Redundancy Check(CRC) feature is now enabled by default on the XFS file systems. Previously,rearignored this change in behavior, and formatted the/bootpartition with an incompatible UUID flag. This caused the recovery process to fail. With this rebase,rearchecks for the CRC feature, and properly preserves UUID during recovery. - Support for the
GRUBandGRUB2boot loaders for IBM Power Systems architecture has been added. - Linux capabilities are now preserved if the directive
NETFS_RESTORE_CAPABILITIESis set to theyoption in the/usr/share/rear/conf/default.confconfiguration file. - CIFS credentials are now preserved in rescue image.
GRUB_SUPERUSERandGRUB_RESCUE_PASSWORDdirectives have been dropped to avoid possible unexpected behaviour change of theGRUB2bootloader in the currently running system.- Documentation has been improved.
- Creation of multiple backups have been enabled. (BZ#1355667)
python-tornado rebased to version 4.2.1
The python-tornado package has been upgraded to upstream version 4.2.1, which provides a number of bug fixes and new features over the previous version. Notable changes include:
- A new
tornado.netutil.Resolverclass, which provides an asynchronous interface to DNS resolution - A new
tornado.tcpclientmodule, which creates TCP connections with non-blocking DNS, SSL handshaking, and support for IPv6 - The
IOLoop.instance()function is now thread-safe - Logging has been improved; low-level logs are less frequent;
Tornadouses its own logger instead of the root logger, which enables more detailed configuration - Multiple reference cycles have been separated within python-tornado, enabling more efficient garbage collection on
CPython - Coroutines are now faster and are used extensively within
Tornado. (BZ#1158617)
Chapter 17. Storage Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
Support added in LVM for RAID level takeover
LVM now provides full support for RAID takeover, previously available as a Technology Preview, which allows users to convert a RAID logical volume from one RAID level to another. This release expands the number of RAID takeover combinations. Support for some transitions may require intermediate steps. New RAID types that are added by means of RAID takeover are not supported in older released kernel versions; these RAID types are raid0, raid0_meta, raid5_n, and raid6_{ls,rs,la,ra,n}_6. Users creating those RAID types or converting to those RAID types on Red Hat Enterprise Linux 7.4 cannot activate the logical volumes on systems running previous releases. RAID takeover is available only on top-level logical volumes in single machine mode (that is, takeover is not available for cluster volume groups or while the RAID is under a snapshot or part of a thin pool). (BZ#1366296)
LVM now supports RAID reshaping
LVM now provides support for RAID reshaping. While takeover allows users to change from one RAID type to another, reshaping allows users to change properties such as the RAID algorithm, stripe size, region size, or number of images. For example, a user can change a 3-way stripe to a 5-way stripe by adding two additional devices. Reshaping is available only on top-level logical volumes in single machine mode, and only while the logical volume is not in-use (for example, when it is mounted by a file system). (BZ#1191935, BZ#834579, BZ#1191978, BZ#1392947)
Device Mapper linear devices now support DAX
Direct Access (DAX) support has been added to the
dm-linear and dm-stripe targets. Multiple Non-Volatile Dual In-line Memory Module (NVDIMM) devices can now be combined to provide larger persistent memory (PMEM) block devices. (BZ#1384648)
libstoragemgmt rebased to version 1.4.0
The libstoragemgmt packages have been upgraded to upstream version 1.4.0, which provides a number of bug fixes and enhancements over the previous version. Notably, the following libraries have been added:
- Query serial number of local disk: lsm_local_disk_serial_num_get()/lsm.LocalDisk.serial_num_get()
- Query LED status of local disk: lsm_local_disk_led_status_get()/lsm.LocalDisk.led_status_get()
- Query link speed of local disk: lsm_local_disk_link_speed_get()/lsm.LocalDisk.link_speed_get()
Notable bug fixes include:
- The
megaraidplug-in for the Dell PowerEdge RAID Controller (PERC) has been fixed. - The local disk rotation speed query on the NVM Express (NVMe) disk has been fixed.
lsmcliincorrect error handling on a local disk query has been fixed.- All gcc compile warnings have been fixed.
- The obsolete usage of the
autoconfAC_OUTPUT macro has been fixed. (BZ#1403142)
mpt3sas updated to version 15.100.00.00
The
mpt3sas storage driver has been updated to version 15.100.00.00, which adds support for new devices. Contact your vendor for more details. (BZ#1306453)
The lpfc_no_hba_reset module parameter for the lpfc driver is now available
With this update, the
lpfc driver for certain models of Emulex Fibre Channel Host Bus Adapters (HBAs) has been enhanced by adding the lpfc_no_hba_reset module parameter. This parameter accepts a list of one or more hexadecimal world-wide port numbers (WWPNs) of HBAs that are not reset during SCSI error handling.
Now,
lpfc allows you to control which ports on the HBA may be reset during SCSI error handling time. Also, lpfc now allows you to set the eh_deadline parameter, which represents an upper limit of the SCSI error handling time. (BZ#1366564)
LVM now detects Veritas Dynamic Multi-Pathing systems and no longer accesses the underlying device paths directly
For LVM to work correctly with Veritas Dynamic Multi-Pathing, you must set
obtain_device_list_from_udev to 0 in the devices section of the configuration file /etc/lvm/lvm.conf. These multi-pathed devices are not exposed through the standard udev interfaces and so without this setting LVM will be unaware of their existence. (BZ#1346280)
The libnvdimm kernel subsystem now supports PMEM subdivision
Intel's Non-Volatile Dual In-line Memory Module (NVDIMM) label specification has been extended to allow more than one Persistent Memory (PMEM) namespace to be configured per region (interleave set). The kernel shipped with Red Hat Enterprise Linux 7.4 has been modified to support these new configurations.
Without subdivision support, a single region could previously be used in only one mode:
pmem, device dax, or sector. With this update, a single region can be subdivided, and each subdivision can be configured independently of the others. (BZ#1383827)
Warning messages when multipathd is not running
Users now get warning messages if they run a
multipath command that creates or lists multipath devices while multipathd is not running.
If
multipathd is not running, then the devices are not able to restore paths that have failed or react to changes in the device setup. The multipathd daemon now prints a warning message if there are multipath devices and multipathd is not running. (BZ#1359510)
c library interface added to multipathd to give structured output
Users can now use the libdmmp library to get structured information from multipathd. Other programs that want to get information from multipathd can now get this information without running a command and parsing the results. (BZ#1430097)
New remove retries multipath configuration value
If a multipath device is temporarily in use when multipath tries to remove it, the remove will fail. It is now possible to control the number of times that the
multipath command will retry removing a multipath device that is busy by setting the remove_retries configuration value. The default value is 0, in which case multipath will not retry failed removes. (BZ#1368211)
New multipathd reset multipaths stats commands
Multipath now supports two new
multipathd commands: multipathd reset multipaths stats and multipathd reset multipath dev stats. These commands reset the device stats that multipathd tracks for all the devices, or the specified device, respectively. This allows users to reset their device stats after they make changes to them. (BZ#1416569)
New disable_changed_wwids mulitpath configuration parameter
Multipath now supports a new
multipath.conf defaults section parameter, disable_changed_wwids. Setting this will make multipathd notice when a path device changes its wwid while in use, and will disable access to the path device until its wwid returns to its previous value.
When the wwid of a scsi device changes, it is often a sign that the device has been remapped to a different LUN. If this happens while the scsi device is in use, it can lead to data corruption. Setting the
disable_changed_wwids parameter will warn users when the scsi device changes its wwid. In many cases multipathd will disable access to the path device as soon as it gets unmapped from its original LUN, removing the possibility of corruption. However multipathd is not always able to catch the change before the scsi device has been remapped, meaning there may still be a window for corruption. Remapping in-use scsi devices is not currently supported. (BZ#1169168)
Updated built-in configuration for HPE 3PAR array
The built-in configuration for the 3PAR array now sets
no_path_retry to 12. (BZ#1279355)
Added built-in configuration for NFINIDAT InfiniBox.* devices
Multipath now autoconfigures NFINIDAT InfiniBox.* devices (BZ#1362409)
device-mapper-multipath now supports the max_sectors_kb configuration parameter
With this update,
device-mapper-multipath provides a new max_sectors_kb parameter in the defaults, devices, and multipaths sections of the multipath.conf file. The max_sectors_kb parameter allows you to set the max_sectors_kb device queue parameter to the specified value on all underlying paths of a multipath device before the multipath device is first activated.
When a multipath device is created, the device inherits the
max_sectors_kb value from the path devices. Manually raising this value for the multipath device or lowering this value for the path devices can cause multipath to create I/O operations larger than the path devices allow.
Using the
max_sectors_kb multipath.conf parameter is an easy way to set these values before a multipath device is created on top of the path devices, and prevent invalid-sized I/O operations from being passed down. (BZ#1394059)
New detect_checker multipath configuration parameter
Some devices, such as the VNX2, can be optionally configured in ALUA mode. In this mode, they need to use a different
path_checker and prioritizer than in their non-ALUA mode. Multipath now supports the detect_checker parameter in the multipath.conf defaults and devices sections. If this is set, multipath will detect if a device supports ALUA, and if so, it will override the configured path_checker and use the TUR checker instead. The detect_checker option allows devices with an optional ALUA mode to be correctly autoconfigured, regardless of what mode they are in. (BZ#1372032)
Multipath now has a built-in default configuration for Nimble Storage devices
The multipath default hardware table now includes an entry for Nimble Storage arrays. (BZ#1406226)
LVM supports reducing the size of a RAID logical volume
As of Red Hat Enterprise Linux 7,4, you can use the
lvreduce or lvresize command to reduce the size of a RAID logical volume. (BZ#1394048)
iprutils rebased to version 2.4.14
The iprutils packages have been upgraded to upstream version 2.4.14, which provides a number of bug fixes and enhancements over the previous version. Notably:
- Endian swapped device_id is now compatible with earlier versions.
- VSET write cache in bare metal mode is now allowed.
- Creating RAIDS on dual adapter setups has been fixed.
- Verifying rebuilds for single adapter configurations is now disabled by default. (BZ#1384382)
mdadm rebased to version 4.0
The mdadm packages have been upgraded to upstream version 4.0, which provides a number of bug fixes and enhancements over the previous version. Notably, this update adds bad block management support for Intel Matrix Storage Manager (IMSM) metadata. The features included in this update are supported on external metadata formats, and Red Hat continues supporting the Intel Rapid Storage Technology enterprise (Intel RSTe) software stack. (BZ#1380017)
LVM extends the size of a thin pool logical volume when a thin pool fills over 50 percent
When a thin pool logical volume fills by more than 50 percent, by default the
dmeventd thin plugin now calls the dmeventd thin_command command with every 5 percent increase. This resizes the thin pool when it has been filled above the configured thin_pool_autoextend_threshold in the activation section of the configuration file. A user may override this default by configuring an external command and specifying this command as the value of thin_command in the dmeventd section of the lvm.conf file. For information on the thin plugin and on configuring external commands to maintain a thin pool, see the dmeventd(8) man page.
In previous releases, when a thin pool resize failed, the
dmeventd plugin would try to unmount unconditionally all thin volumes associated with the thin pool when a compile-time defined threshold of more than 95 percent was reached. The dmeventd plugin, by default, no longer unmounts any volumes. Reproducing the previous logic requires configuring an external script. (BZ#1442992)
LVM now supports dm-cache metadata version 2
LVM/DM cache has been significantly improved. It provides support for larger cache sizes, better adaptation to changing workloads, greatly improved startup and shutdown times, and higher performance overall. Version 2 of the dm-cache metadata format is now the default when creating cache logical volumes with LVM. Version 1 will continue to be supported for previously created LVM cache logical volumes. Upgrading to version 2 will require the removal of the old cache layer and the creation of a new cache layer. (BZ#1436748)
Support for DIF/DIX (T10 PI) on specified hardware
SCSI T10 DIF/DIX is fully supported in Red Hat Enterprise Linux 7.4, provided that the hardware vendor has qualified it and provides full support for the particular HBA and storage array configuration. DIF/DIX is not supported on other configurations, it is not supported for use on the boot device, and it is not supported on virtualized guests.
At the current time, the following vendors are known to provide this support.
FUJITSU supports DIF and DIX on:
EMULEX 16G FC HBA:
- EMULEX LPe16000/LPe16002, 10.2.254.0 BIOS, 10.4.255.23 FW, with:
- FUJITSU ETERNUS DX100 S3, DX200 S3, DX500 S3, DX600 S3, DX8100 S3, DX8700 S3, DX8900 S3, DX200F, DX60 S3, AF250, AF650
QLOGIC 16G FC HBA:
- QLOGIC QLE2670/QLE2672, 3.28 BIOS, 8.00.00 FW, with:
- FUJITSU ETERNUS DX100 S3, DX200 S3, DX500 S3, DX600 S3, DX8100 S3, DX8700 S3, DX8900 S3, DX200F, DX60 S3
Note that T10 DIX requires database or some other software that provides generation and verification of checksums on disk blocks. No currently supported Linux file systems have this capability.
EMC supports DIF on:
EMULEX 8G FC HBA:
- LPe12000-E and LPe12002-E with firmware 2.01a10 or later, with:
- EMC VMAX3 Series with Enginuity 5977; EMC Symmetrix VMAX Series with Enginuity 5876.82.57 and later
EMULEX 16G FC HBA:
- LPe16000B-E and LPe16002B-E with firmware 10.0.803.25 or later, with:
- EMC VMAX3 Series with Enginuity 5977; EMC Symmetrix VMAX Series with Enginuity 5876.82.57 and later
QLOGIC 16G FC HBA:
- QLE2670-E-SP and QLE2672-E-SP, with:
- EMC VMAX3 Series with Enginuity 5977; EMC Symmetrix VMAX Series with Enginuity 5876.82.57 and later
Please refer to the hardware vendor's support information for the latest status.
Support for DIF/DIX remains in Technology Preview for other HBAs and storage arrays. (BZ#1457907)
The dmstats facility can now track the statistics for files that change
Previously, the
dmstats facility was able to report statistics for files that did not change in size. It now has the ability to watch files for changes and update its mappings to track file I/O even as the file changes in size (or fills holes that may be in the file). (BZ#1378956)
Support for thin snapshots of cached logical volumes
LVM in Red Hat Enterprise Linux 7.4 allows you to create thin snapshots of cached logical volumes. This feature was not available in earlier releases. These external origin cached logical volumes are converted to a read-only state and thus can be used by different thin pools. (BZ#1189108)
New package: nvmetcli
The
nvmetcli utility enables you to configure Red Hat Enterprise Linux as an NVMEoF target, using the NVME-over-RDMA fabric type. With nvmetcli, you can configure nvmet interactively, or use a JSON file to save and restore the configuration. (BZ#1383837)
Device DAX is now available for NVDIMM devices
Device DAX enables users like hypervisors and databases to have raw access to persistent memory without an intervening file system. In particular, Device DAX allows applications to have predictable fault granularities and the ability to flush data to the persistence domain from user space. Starting with Red Hat Enterprise Linux 7.4, Device Dax is available for Non-Volatile Dual In-line Memory Module (NVDIMM) devices. (BZ#1383489)
Chapter 18. System and Subscription Management Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
New payload_gpgcheck option added to yum
With this update, the new configuration option
payload_gpgcheck has been added to the yum utility. This option enables a GNU Privacy Guard (GPG) signature check on the payload sections of packages, thus enhancing the security and integrity when installing packages. Previously, when gpgcheck option was enabled, yum only performed a GPG signature check on headers. Consequently, if the payload data were tampered with or corrupted, RPM unpacking error occurred, and the package was left in a partly installed state. This might have put the operating system into an inconsistent and vulnerable state.
You can use the new
payload_gpgcheck option in conjunction with the gpgcheck or localpkg_gpgcheck options to prevent this problem. As a result, when payload_gpgcheck is enabled, yum performs a GPG signature check on the payload and aborts the transaction if it is not verified. Using payload_gpgcheck is equivalent to manually running rpm -K on downloaded packages. (BZ#1343690)
A no-proxy configuration is available for virt-who
With this update, the
virt-who service can be set to ignore proxy network settings. This enables virt-who to work properly on environments that use a proxy connection with one-way communication.
To set up this functionality, add the
NO_PROXY environment variable to the /etc/sysconfig/virt-who file. Alternatively, you can add the no_proxy variable to the [server] section of the /etc/rhsm/rhsm.conf file.
Note that the NO_PROXY setting does not work when synchronizing the hypervisor using Red Hat Satellite 5. (BZ#1299643)
virt-who respects independent interval settings
With this update, the
virt-who command reports each interval on all sources that have updates. In addition, if virt-who is configured to send updates to more than one destination, for example to an Red Hat Satellite instance and the Red Hat Subscription Management (RHSM), the interval for each is maintained separately. This means that all updates can be sent to each configured destination, regardless of the state of communication with other destinations. (BZ#1436811)
Password options added to virt-who-password
With this update, the
-p and --password options have been added to the virt-who-password utility. This enables the utility to be used in scripts. (BZ#1426058)
Regular expressions and wildcards can be used in some virt-who configuration parameters
With this update, regular expressions and wildcards can be used in the
filter_hosts and exclude_hosts configuration parameters. This enables users of virt-who to maintain a list of hosts to report on with much more ease.
By using regular expressions and wildcards to specify which hosts to report on or exclude, the hosts list can be much more concise. (BZ#1405967)
virt-who configuration files are easier to manage
The
virt-who service now only uses configuration files in the /etc/virt-who.d/ directory that end with the .conf extension. This enables easier management of virt-who configuration files, for example for testing or backup purposes. (BZ#1369107)
Chapter 19. Virtualization Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
ENA drivers for Amazon Web Services
This update adds support for Amazon Elastic Network Adapter (ENA) drivers to the Red Hat Enterprise Linux 7 kernel. ENA significantly enhances networking efficiency of Red Hat Enterprise Linux 7 guest virtual machines for certain instance types of the Amazon Web Services cloud.
For more information about ENA, see https://aws.amazon.com/blogs/aws/elastic-network-adapter-high-performance-network-interface-for-amazon-ec2. (BZ#1357491, BZ#1410047)
Synthetic Hyper-V FC adapters are supported by the storvsc driver
This update improves the way the
storvsc driver handles Fibre Channel (FC) devices on Hyper-V virtualization. Notably, when a new synthetic Fibre Channel (FC) adapter is configured on a Hyper-V hypervisor, a new hostX (for example host1) file is created in the /sys/class/fc_host/ and /sys/class/scsi_host/ directories. This file contains the port_name and host_name entries determined by the Hyper-V FC Adapter world-wide port number (WWPN) and world-wide node number (WWNN). (BZ#1308632, BZ#1425469)
Parent HBA can be defined by a WWNN/WWPN pair
With this release, a parent host bus adapter (HBA) can be identified by a World Wide Node Name (WWNN) and World Wide Port Name (WWPN),in addition to a
scsi_host#. When defined by a scsi_host#, if hardware is added to the host machine, the scsi_host# may change after the host machine reboots. By using a WWNN/WWPN pair, the assignment remains unchanged regardless of hardware changes to the host machine. (BZ#1349696)
libvirt rebased to version 3.2.0
The libvirt packages have been upgraded to upstream version 3.2.0, which provides a number of bug fixes and enhancements over the previous version. Notable changes:
- This update makes it possible to install and uninstall specific
libvirtstorage sub-drivers, which reduces the installation footprint. - You can now configure the
/etc/nsswitch.conffile to instruct Name Services Switch (NSS) to automatically resolve names of KVM guests to their network addresses. (BZ#1382640)
KVM now supports MCE
This update adds support for Machine Check Exception (MCE) to the KVM kernel modules, which makes it possible to use the Local MCE (LMCE) feature of Intel Xeon v5 processors in KVM guest virtual machines. LMCE can deliver MCE to a single processor thread instead of broadcasting to all threads, which ensures the machine check does not impact the performance of more vCPUs than needed. As a result, this reduces software load when processing MCE on machines with a large number of processor threads. (BZ#1402102, BZ#1402116)
Added support for rx batching on tun/tap devices
With this release, rx batching for tun/tap devices is now supported. This enables receiving bundled network frames which can improve performance. (BZ#1414627)
libguestfs rebased to version 1.36.3
The libguestfs packages have been upgraded to upstream version 1.36.3, which provides a number of bug fixes and enhancements over the previous version. Notable changes include:
- This update adds the
virt-tailutility, which can be used to follow (tail) log files within a guest, similar to thetail -fcommand. For details, see the virt-tail(1) man page. - The
virt-v2vutility supports more operating systems and more input sources. In addition, the conversion of Windows guests has been substantially rewritten and simplified. - Multiple options have been added for the
virt-customize,virt-builder, andvirt-systpreputilities. (BZ#1359086)
Improved virt-v2v installation of QXL drivers
This update reworks the
virt-v2v implementation of QXL driver installation in Windows guest virtual machines, which ensures that QXL drivers are installed correctly on these guests. (BZ#1233093, BZ#1255610, BZ#1357427, BZ#1374651)
virt-v2v can export disk images to qcow2 format 1.1
With this update, the
virt-v2v utility exports disk images compatible with qcow2 format version 1.1 when using the -o rhev option. In addition, virt-v2v adds the --vdsm-compat=COMPAT option for the vdsm output mode. This option specifies which version of the qcow2 format virt-v2v uses when exporting images with the -o vdsm option. (BZ#1400205)
Additional virt tools can work on LUKS whole-disk encrypted guests
This update adds support for working on LUKS whole-disk encrypted guests using the
virt-customize, virt-get-kernel, virt-sparsify, and virt-sysprep tools. As a result, these tools can provide keys or passphrases for opening LUKS whole-disk encrypted guests. (BZ#1362649)
Tab completion for all libguestfs commands
Bash completion scripts have been added for all
libguestfs tools. As a result, it is now possible to use Tab completion in bash with every libguestfs command. (BZ#1367738)
Resized disks can be written directly to a remote location
With this update, the
virt-resize utility can write its output to a remote location. This may be useful, for example, in directly writing the resized disk image to a Ceph storage volume. The virt-resize output disk can be specified using a URI. Any supported input protocol and format can be used to specify the output. (BZ#1404182)
User namespace is now fully supported
The user namespace feature, previously available as a Technology Preview, is now fully supported. It provides additional security to servers running Linux containers by providing better isolation between the host and the containers. Administrators of a container are no longer able to perform administrative operations on the host, which increases security. (BZ#1138782)
Driver added for devices that connect over a PCI Express bus in guest virtual machine under Hyper-V
In this update, a new driver was added that exposes a root PCI bus when a devices that connects over a PCI Express bus is passed through to a Red Hat Enterprise Linux guest virtual machine running on the Hyper-V hypervisor. The feature is currently supported with Microsoft Windows Server 2016. (BZ#1302147)
Chapter 20. Atomic Host and Containers Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
Red Hat Enterprise Linux Atomic Host
Red Hat Enterprise Linux Atomic Host is a secure, lightweight, and minimal-footprint operating system optimized to run Linux containers.
Chapter 21. Red Hat Software Collections Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
Red Hat Software Collections is a Red Hat content set that provides a set of dynamic programming languages, database servers, and related packages that you can install and use on all supported releases of Red Hat Enterprise Linux 6 and Red Hat Enterprise Linux 7 on AMD64 and Intel 64 architectures. Red Hat Developer Toolset is included as a separate Software Collection.
Red Hat Developer Toolset is designed for developers working on the Red Hat Enterprise Linux platform. It provides current versions of the GNU Compiler Collection, GNU Debugger, and other development, debugging, and performance monitoring tools. Since Red Hat Software Collections 2.3, the Eclipse development platform is provided as a separate Software Collection.
Dynamic languages, database servers, and other tools distributed with Red Hat Software Collections do not replace the default system tools provided with Red Hat Enterprise Linux, nor are they used in preference to these tools. Red Hat Software Collections uses an alternative packaging mechanism based on the
scl utility to provide a parallel set of packages. This set enables optional use of alternative package versions on Red Hat Enterprise Linux. By using the scl utility, users can choose which package version they want to run at any time.
Important
Red Hat Software Collections has a shorter life cycle and support term than Red Hat Enterprise Linux. For more information, see the Red Hat Software Collections Product Life Cycle.
See the Red Hat Software Collections documentation for the components included in the set, system requirements, known problems, usage, and specifics of individual Software Collections.
See the Red Hat Developer Toolset documentation for more information about the components included in this Software Collection, installation, usage, known problems, and more.
Part II. Notable Bug Fixes Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
This part describes bugs fixed in Red Hat Enterprise Linux 7.4 that have a significant impact on users.
Chapter 22. General Updates Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
Addition of CtrlAltDelBurstAction for Systemd
The
systemd response to multiple CTRL+ALT+DEL events is now configurable by setting the CtrlAltDelBurstAction option in /etc/systemd/system.conf (BZ#1353028)
cgred can now resolve rules concerning NSS users and groups
Previously, the
cgred service was not configured to start up after services providing Name Service Switch (NSS) users and groups. Also, information about skipping invalid rules was shown only in debug mode. Consequently, rules in the cgrules.conf file concerning NSS users and groups were sometimes ignored without any log message. With this update, cgred is configured to start after the nss-user-lookup target and level of log messages about skipping rules is changed to warning, which is also set as a default log level for the cgred daemon. As a result, NSS users and groups are now always resolved before starting cgred. Also, the warning message is logged in case some rules in cgrules.conf are invalid. (BZ#1406927)
Chapter 23. Authentication and Interoperability Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
yum no longer reports package conflicts after installing ipa-client
After the user installed the ipa-client package, the
yum utility unexpectedly reported package conflicts between the ipa and freeipa packages. These errors occurred after failed transactions or after using the yum check command. With this update, yum no longer reports errors about self-conflicting packages because such conflicts are allowed by RPM. As a result, yum no longer displays the described errors after installing ipa-client. (BZ#1370134)
In FIPS mode, the slapd_pk11_getInternalKeySlot() function is now used to retrieve the key slot for a token
The Red Hat Directory Server previously tried to retrieve the key slot from a fixed token name, when FIPS mode was enabled on the security database. However, the token name can change. If the key slot is not found, Directory Server is unable to decode the replication manager's password and replication sessions fail. To fix the problem, the
slapd_pk11_getInternalKeySlot() function now uses FIPS mode to retrieve the current key slot. As a result, replication sessions using SSL or STTARTTLS no longer fail in the described situation. (BZ#1378209)
Certificate System no longer fails to install with a Thales HSM on systems in FIPS mode
After installing with the Certificate System (CS) with a Thales hardware security module (HSM), the SSL protocol did not work correctly if you generated all system keys on the HSM. Consequently, CS failed to install on systems with FIPS mode enabled, requiring you to manually modify the
sslRangeCiphers parameter in the server.xml file. This bug has been fixed, and installation FIPS-enabled systems with Thales HSM works as expected. (BZ#1382066)
The dependency list for pkispawn now correctly includes openssl
Previously, when the openssl package was not installed, using the
pkispawn utility failed with the following error:
Installation failed: [Errno 2] No such file or directory
Installation failed: [Errno 2] No such file or directory
This problem occured because the openssl package was not included as a runtime dependency of the pki-server package contained within the pki-core package. This bug has been fixed by adding the missing dependency, and
pkispawn installations no longer fail due to missing openssl. (BZ#1376488)
Error messages from the PKI Server profile framework are now passed through to the client
Previously, PKI Server did not pass through certain error messages generated by the profile framework for certificate requests to the client. Consequently, the error messages displayed on the web UI or in the output of the
pki command did not describe why a request failed. The code has been fixed and now passes through error messages. Now users can see the reason why an enrollment failed or was rejected. (BZ#1249400)
Certificate System does not start a Lightweight CA key replication during installation
Previously, Certificate System incorrectly started a Lightweight CA key replication during a two-step installation. As a consequence, the installation failed and an error was displayed. With this update, the two-step installation does not start the Lightweight CA key replication and the installation completes successfully. (BZ#1378275)
PKI Server now correctly compares subject DNs during startup
Due to a bug in the routine that adds a Lightweight CA entry for the primary CA, PKI Server previously failed to compare subject distinguished names (DN) if it contained attributes using encodings other than
UTF8String. As a consequence, every time the primary CA started, an additional Lightweight CA entry was added. PKI Server now compares the subject DNs in canonical form. As a result, PKI server no longer adds additional Lightweight CA entries in the mentioned scenario. (BZ#1378277)
KRA installation no longer fails when connecting to an intermediate CA with an incomplete certificate chain
Previously, installing a Key Recovery Authority (KRA) subsystem failed with an
UNKNOWN_ISSUER error if the KRA attempted to connect to an intermediate CA that had a trusted CA certificate but did not have the root CA certificate. With this update, KRA installation ignores the error and completes successfully. (BZ#1381084)
The startTime field in certificate profiles now uses long integer format
Previously, Certificate System stored the value in the
startTime field of a certificate profile as integer. If you entered a larger number, Certificate System interpreted the value as a negative number. Consequently, the certificate authority issued certificates that contained a start date located in the past. With this update, the input format of the startTime field has been changed to a long integer. As a result, the issued certificates now have a correct start date. (BZ#1385208)
Subordinate CA installation no longer fails due with a PKCS#11 token is not logged in error
Previously, subordinate Certificate Authority (sub-CA) installation failed due to a bug in the Network Security Services (NSS) library, which generated the
SEC_ERROR_TOKEN_NOT_LOGGED_IN error. This update adds a workaround to the installer which allows the installation to proceed. If the error is still displayed, it can now be ignored. (BZ#1395817)
The pkispawn script now correctly sets the ECC key sizes
Previously, when a user ran the
pkispawn script with an Elliptic Curve Cryptography (ECC) key size parameter set to a different value than the default, which is nistp256, the setting was ignored. Consequently, the created PKI Server instance issued system certificates, which incorrectly used the default ECC key curve. With this update, PKI Server uses the value set in the pkispawn configuration for the ECC key curve name. As a result, the PKI Server instance now uses the ECC key size set when setting up the instance. (BZ#1397200)
CA clone installation in FIPS mode no longer fails
Previously, installing a CA clone or a Key Recovery Authority (KRA) failed in FIPS mode due to an inconsistency in handling internal NSS token names. With this update, the code that handles the token name has been consolidated to ensure that all token names are handled consistently. T allows the KRA and CA clone installation to complete properly in FIPS mode. (BZ#1411428)
PKI Server no longer fails to start when an entryUSN attribute contains a value larger than 32-bit
Previously, the *LDAP Profile Monitor" and the
Lightweight CA Monitor parsed values in entryUSN attributes as a 32-bit integer. As a consequence, when the attribute contained a value larger than that, a NumberFormatException error was logged and the server failed to start. The problem has been fixed, and the server no longer fails to start in the mentioned scenario. (BZ#1412681)
Tomcat now works with IPv6 by default
The
IPv4-specific 127.0.0.1 loopback address was previously used in the default server configuration file as the default AJP host name. This caused connections to fail on servers which run in IPv6-only environments. With this update, the default value is changed to localhost, which works with both IPv4 and IPv6 protocols. Additionally, an upgrade script is available to automatically change the AJP host name on existing server instances. (BZ#1413136)
pkispawn no longer generates invalid NSS database passwords
Prior to this update,
pkispawn generated a random password for the NSS database which in some cases contained a backslash (\) character. This caused problems when NSS established SSL connections, which in turn caused the installation to fail with a ACCESS_SESSION_ESTABLISH_FAILURE error.
This update ensures that the randomly generated password can not contain the backslash character and a connection can always be established, allowing the installation to finish successfully. (BZ#1447762)
Certificate retrieval no longer fails when adding a user certificate with the --serial option
Using the
pki user-cert-add command with the --serial parameter previously used an improperly set up SSL connection to the certificate authority (CA), causing certificate retrieval to fail. With this update, the command uses a properly configured SSL connection to the CA, and the operation now completes successfully. (BZ#1246635)
CA web interface no longer shows a blank certificate request page if there is only one entry
Previously, when the certificate request page in the CA web user interface only contained one entry, it displayed an empty page instead of showing the single entry. This update fixes the web user interface, and the certificate request page now correctly shows entries in all circumstances. (BZ#1372052)
Installing PKI Server in a container environment no longer displays a warning
Previously, when installing the pki-server RPM package in a container environment, the
systemd daemon was reloaded. As a consequence, a warning was displayed. A patch has been applied to reload the daemon only during an RPM upgrade. As a result, the warning is no longer displayed in the mentioned scenario. (BZ#1282504)
Re-enrolling a token using a G&D smart card no longer fails
Previously, when re-enrolling a token using a Giesecke & Devrient (G&D) smart card, the enrollment of the token could fail in certain situations. The problem has been fixed, and as a result, re-enrolling a token works as expected. (BZ#1404881)
PKI Server provides more detailed information about certificate validation errors on startup
Previously, PKI Server did not provide sufficient information if a certificate validation error occurred when the server was started. Consequently, troubleshooting the problem was difficult. PKI Server now uses the new Java security services (JSS) API which provides more detailed information about the cause of the error in the mentioned scenario. (BZ#1330800)
PKI Server no longer fails to re-initialize the LDAPProfileSubsystem profile
Due to a race condition during re-initializing the
LDAPProfileSubsystem profile, PKI Server previously could incorrectly reported that the requested profile does not exist. Consequently, requests to use the profile could fail. The problem has been fixed, and requests to use the profile no longer fail. (BZ#1376226)
Extracting private keys generated on an HSM no longer fails
Previously, when generating asymmetric keys on a Lunasa or Thales hardware security module (HSM) using the new Asymmetric Key Generation REST service on the key recovery agent (KRA), PKI Server set incorrect flags. As a consequence, users were unable to retrieve the generated private keys. The code has been updated to set the correct flags for keys generated on these HSMs. As a result, users can now retrieve private keys in the mentioned scenario. (BZ#1386303)
pkispawn no longer generates passwords consisting only of digits
Previously,
pkispawn could generate a random password for NSS database consisting only digits. Such passwords are not FIPS-compliant. With this update, the installer has been modified to generate FIPS-compliant random passwords which consist of a mix of digits, lowercase letters, uppercase letters, and certain punctuation marks. (BZ#1400149)
CA certificates are now imported with correct trust flags
Previously, the
pki client-cert-import command imported CA certificates with CT,c, trust flags, which was insufficient and inconsistent with other PKI tools. With this update, the command has been fixed and now sets the trust flags for CA certificates to CT,C,C. (BZ#1458429)
Generating a symmetric key no longer fails when using the --usage verify option
The
pki utility checks a list of valid usages for the symmetric key to be generated. Previously, this list was missing the verify usage. As a consequence, using the key-generate --usage verify option returned an error message. The code has been fixed, and now the verify option works as expected. (BZ#1238684)
Subsequent PKI installation no longer fails
Previously, when installing multiple public key infrastructure (PKI) instances in batch mode, the installation script did not wait until the CA instance was restarted. As a consequence, the installation of subsequent PKI instances could fail. The script has been updated and now waits until the new subsystem is ready to handle requests before it continues. (BZ#1446364)
Two-step subordinate CA installation in FIPS mode no longer fails
Previously, a bug in subordinate CA installation in FIPS mode caused two-step installations to fail because the installer required the instance to not exist in the second step. This update changes the workflow so that the first step (installation) requires the instance to not exist, and the second step (configuration) requires the instance to exist.
Two new options, "--skip-configuration` and
--skip-installation, have been added to the pkispawn command to replace the previous pki_skip_configuration and pki_skip_installation deployment parameters. This allows you to use the same deployment configuration file for both steps without modifications. (BZ#1454450)
The audit log no longer records success when a certificate request was rejected or canceled
Previously when a certificate request was rejected or canceled, the server generated a
CERT_REQUEST_PROCESSED audit log entry with Outcome=Success. This was incorrect because there was no certificate issued for the request. This bug has been fixed, and the CERT_REQUEST_PROCESSED audit log entry for a rejected or canceled request now reads Outcome=Failure. (BZ#1452250)
PKI subsystems which failed self tests are now automatically re-enabled on startup
Previously, if a PKI subsystem failed to start due to self test failure, it was automatically disabled to prevent it from running in an inconsistent state. The administrator was expected to re-enable the subsystem manually using
pki-server subsystem-enable after fixing the problem. However, this was not clearly communicated, potentially causing confusion among administrators who were not always aware of this requirement.
To alleviate this problem, all PKI subsystems are now re-enabled automatically on startup by default. If a self-test fails, the subsystem is disabled as before, but it will no longer require manual re-enabling.
This behavior is controlled by a new boolean option in the
/etc/pki/pki.conf file, PKI_SERVER_AUTO_ENABLE_SUBSYSTEMS. (BZ#1454471)
CERT_REQUEST_PROCESSED audit log entries now include certificate serial number instead of encoded data
Previously,
CERT_REQUEST_PROCESSED audit log entries included Base64-encoded certificate data. For example:
[AuditEvent=CERT_REQUEST_PROCESSED]...[InfoName=certificate][InfoValue=MIIDBD...]
[AuditEvent=CERT_REQUEST_PROCESSED]...[InfoName=certificate][InfoValue=MIIDBD...]
This information was not very useful because the certificate data would have to be decoded separately. The code has been changed to include the certificate serial number directly into the log entry, as shown in the following example:
[AuditEvent=CERT_REQUEST_PROCESSED]...[CertSerialNum=7]
[AuditEvent=CERT_REQUEST_PROCESSED]...[CertSerialNum=7]
(BZ#1452344)
Updating the LDAPProfileSubsystem profile now supports removing attributes
Previously, when updating the
LDAPProfileSubsystem profile on PKI Server, attributes could not be removed. As a result, PKI Server was unable to load the profile or issue certificates after updating the profile in certain situations. A patch has been applied, and now PKI Server clears the existing profile configuration before loading the new configuration. As a result, updates in the LDAPProfileSubsystem profile can now remove configuration attributes. (BZ#1445088)
Chapter 24. Clustering Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
Pacemaker Remote may shut down, even if its connection to the cluster is unmanaged
Previously, if a Pacemaker Remote connection was unmanaged, the Pacemaker Remote daemon would never receive a shutdown acknowledgment from the cluster. As a result, Pacemaker Remote would be unable to shut down. With this fix, if a Pacemaker Remote connection is unmanaged, the cluster now immediately sends a shutdown acknowledgement to Pacemaker Remote nodes that request shutdown, rather than wait for resources to stop. As a result, Pacemaker Remote may shut down, even if its connection to the cluster is unmanaged. (BZ#1388489)
pcs now validates the name and the host of a remote and guest node
Previously, the
pcs command did not validate whether the name or the host of a remote or guest node conflicted with a resource ID or with a cluster node, a situation that would cause the cluster not to work correctly. With this fix, validation has been added to the relevant commands and pcs does not allow a user to configure a cluster with a conflicting name or conflicting host of a remote or guest node. (BZ#1386114)
New syntax of master option in pcs resource create command allows correct creation of meta attributes
Previously, when a
pcs resource creation command included the --master flag, all options after the keyword meta were interpreted as master meta attributes. This made it impossible to create meta attributes for the primitive when the --master flag was specified. This fix provides a new syntax for specifying a resource as a master slave clone by using the following format for the command:
pcs resource create resource_id standard:provider:type|type [resource options] master [master_options...]
pcs resource create resource_id standard:provider:type|type [resource options] master [master_options...]
This allows you to specify
meta options as follows:
pcs resource create resource_id standard:provider:type|type [resource_options] meta meta_options... master [master_options...]
pcs resource create resource_id standard:provider:type|type [resource_options] meta meta_options... master [master_options...]
Additionally, with this fix, you specify a clone resource with the
clone option rather than the --clone flag, as in previous releases. The new format for specifying a clone resource is as follows:
pcs resource create resource_id standard:provider:type|type [resource_options] clone
pcs resource create resource_id standard:provider:type|type [resource_options] clone
(BZ#1378107)
Chapter 25. Compiler and Tools Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
The PCRE library now correctly recognizes non-ASCII printable characters as required by Unicode
When matching a Unicode string with non-ASCII printable characters using the Perl Compatible Regular Expressions (PCRE) library, the library was previously unable to correctly recognize printable non-ASCII characters. A patch has been applied, and the PCRE library now recognizes printable non-ASCII characters in UTF-8 mode. (BZ#1400267)
Applications using Bundler to manage dependencies can now properly load the JSON library
Previously, when
Bundler was used to manage Ruby application dependencies, it was sometimes impossible to load the JSON library. Consequently, the application failed with a LoadError. This caused problems especially because Ruby on Rails no longer explicitly specifies dependency on the JSON library. With this update, JSON is always available on the load path, and the described problem no longer occurs. (BZ#1308992)
Git can now be used with HTTP or HTTPS and SSO
Since
libcurl version 7.21.7, a new paramater for delegating Kerberos tickets is required because of CVE-2011-2192. Previously, Git did not provide a way to set such a parameter. As a consequence, using Git with Single Sign-On on HTTP or HTTPS connections failed. With this update, Git provides a new http.delegation configuration variable, which corresponds to the cURL --delegation parameter. Users need to set this parameter when delegation of Kerberos tickets is required. (BZ#1369173)
rescan-scsi-bus.sh --luns=1 now scans only LUNs numbered with 1
The sg3_utils package contains utilities that send SCSI commands to devices. In version 1.28-5 and all previous versions of sg3_utils, the
rescan-scsi-bus.sh --luns=1 command rescaned only Logical Unit Numbers (LUNs) numbered with 1. After the update to version 1.28-6, rescan-scsi-bus.sh --luns=1 incorrectly rescaned all LUNs. With this update, the underlying source code has been fixed, and rescan-scsi-bus.sh --luns=1 now scans only LUNs numbered with 1. (BZ#1380744)
ps no longer removes prefixes from wait channel names
The
ps utility was previously removing the sys_ and do_ prefixes from wait channel (WCHAN) data. This prevented the user from distinguishing functions with names intentionally containing these prefixes in a ps output. The code for prefix removing has been removed, and ps now shows full wait channel names. (BZ#1373246)
tcsh no longer becomes unresponsive when the .history file is located on a network file system
Previously, if the
.history file was located on a network file system, such as NFS or Samba, the tcsh command language interpreter sometimes became unresponsive during the login process. A patch has been applied to avoid .history file-locking if .history is located on a network file system, and tcsh no longer becomes unresponsive in the described situation.
Note that having multiple instances of
tcsh running can cause .history to become corrupted. To resolve this problem, enable explicit file-locking mechanism by add the lock parameter to the savehist option. For example:
cat /etc/csh.cshrc # csh configuration for all shell invocations. set savehist = (1024 merge lock)
$ cat /etc/csh.cshrc
# csh configuration for all shell invocations.
set savehist = (1024 merge lock)
The
lock option must be the third parameter of the savehist option to force tcsh to use file-locking when .history is located on a network file system. Red Hat does not guarantee that using the lock parameter prevents tcsh from becoming unresponsive during the login process. (BZ#1388426)
fcoeadm --target no longer causes fcoeadm to crash
Previously, executing the
fcoeadm --target command sometimes caused the fcoeadm utility to terminate unexpectedly with a segmentation fault. With this update, fcoeadm has been modified to ignore sysfs paths for non-FCoE targets, and fcoeadm --target no longer causes fcoeadm to crash. (BZ#1384707)
tar option --directory no longer ignored
Previously, the
--directory option of the tar command was ignored when used in combination with the --remove-files option. As a consequence, files in the current working directory were removed instead of the files in the directory specified by the --directory option. To fix this bug, new functions and an attribute that retrieve, store, and act upon the --directory option have been added. As a result, files are now correctly removed from the directory specified by the --directory option. (BZ#1319820)
tar options --xattrs-exclude and --xattrs-include no longer ignored
Previously, the
tar command ignored the --xattrs-exclude and --xattrs-include options. To fix this bug, tar has been modified to apply include and exclude masks when fetching extended attributes. As a result, the --xattrs-exclude and --xattrs-include options are no longer ignored. (BZ#1341786)
tar now restores incremental backup correctly
Previously, the
tar command did not restore incremental backup correctly. Consequently, a file removed in the incremental backup was not removed when restoring. The bug has been fixed, and tar now restores incremental backup correctly. (BZ#1184697)
The perl-homedir profile scripts now support csh
Previously, the
perl-homedir profile scripts were unable to handle the C shell (csh) syntax. Consequently, when the the perl-homedir package was installed and the /etc/sysconfig/perl-homedir file contained the PERL_HOMEDIR=0 line, executing the profile scripts resulted in the following error:
PERL_HOMEDIR=0: Command not found.
PERL_HOMEDIR=0: Command not found.
This update adds support for the
csh syntax, and the described problem no longer occurs. (BZ#1122993)
getaddrinfo no longer accessing uninitialised data
On systems with the
nscd daemon enabled, the getaddrinfo() function in the glibc library could access uninitialized data and consequently could return false address information. This update prevents uninitialized data access and ensures that correct addresses are returned. (BZ#1324568)
Additional security checks performed in malloc implementation in glibc
Previously, because the
glibc library was compiled without assertions, the functions implementing malloc did not check the heap consistency. This increased the risk that heap-based buffer overflows could be exploited. The heap consistency check has been converted from an assertion into an explicit check. As a result, the security of calls to malloc implementation in glibc is now increased. (BZ#1326739)
chrpath rebased to version 0.16
The chrpath package has been upgraded to upstream version 0.16, which provides a number of bug fixes over the previous version. Notably, the
chrpath tool could only modify the run path property of 64-bit binaries on 64-bit systems, and 32-bit binaries on 32-bit systems. This bug has been fixed, and chrpath on a 64-bit system can now modify run paths of binaries for a 32-bit system and binaries for a 32-bit system on a 64-bit system. (BZ#1271380)
Updated translations for the system-config-language package
To resolve missing translations for
system-config-language, the following 10 languages have been added; de, es, fr, it, ja, ko, pt_BR, ru, zh_CN, zh_TW. (BZ#1304223)
Mutt no longer send emails with an incomplete From header when a host name lacks the domain part
Previously, when a host name did not include the domain name, the
Mutt email client sent an email with a From header that was missing the host name. As a consequence, it was impossible to reply to such an email. This bug has been fixed, and Mutt now correctly handles host names that do not contain the domain part. (BZ#1388512)
strace displays correctly the O_TMPFILE flag and mode for open() function
Previously, the
strace utility did not recognize existence of the O_TMPFILE flag for the system function open() and its requirement for presence of mode option. As a consequence, the strace output did not show name of the respective flag and lacked the mode option value. The strace utility has been extended to recognize this situation. As a result, the O_TMPFILE flag and mode are displayed correctly. (BZ#1377847)
ld no longer enters an infinite loop when linking large programs
In large programs for the IBM Power Systems architecture the
.text segment is serviced by two stub sections. Previously, the ld linker sizing termination condition was never satisfied when sizing such segments because one of the sections always had to grow. As a consequence, ld entered an infinite loop and had to be terminated. ld has been extended to recognize this situation and alter the sizing termination condition. As a result, ld terminates correctly. (BZ#1406498)
gold warning messages for cross object references to hidden symbols fixed
The
gold linker produces a warning message when linking shared libraries where the code in one library references a hidden symbol in a second library or object file. Previously, gold produced this warning message even if another library or object file provided a visible definition of the same symbol. To fix this bug, gold has been extended with a check for this specific case and produces the warning message only if there are no visible definitions of the symbol. As a result, gold no longer displays the wrong warning message. (BZ#1326710)
OProfile default event on Intel Xeon® C3xxx Processors with Denverton SOC fixed
Previously, incorrect values were used in the default cycle counting event for
OProfile on Intel Xeon® C3xxx Processors with Denverton SOC. As a consequence, OProfile sampling and counting using the default event did not work. The relevant OProfile setting was corrected. As a result, the default event now works on Intel Xeon® C3xxx Processors with Denverton SOC. (BZ#1380809)
Chapter 26. Desktop Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
Empathy now can validate certificate chains for Google Talk
Previously, the
Empathy instant messaging client was not able to validate the certificate chain for Google Talk by ignoring disabled legacy certificate authorities, such as Equifax Secure Certificate Authority, in the chain. As a consequence, Empathy prompted the user about an invalid certificate when connecting to Google Talk, even though there was no problem with the chain. This update fixes the bug and Empathy now ignores disabled legacy certificate authorities in the list returned by the server and attempts to construct alternate chains that might be valid. (BZ#1386616)
Chapter 27. File Systems Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
Setting the retry timeout can now prevent autofs from starting without mounts from SSSD
When starting the
autofs utility, the sss map source was previously sometimes not ready to provide map information, but sss did not return an appropriate error to distinguish between the map does not exist and not available condition. As a consequence, automounting did not work correctly, and autofs started without mounts from SSSD. To fix this bug, autofs retries asking SSSD for the master map when the map does not exist error occurs for a configurable amount of time. Now, you can set the retry timeout to a suitable value so that the master map is read and autofs starts as expected. (BZ#1101782)
The autofs package now contains the README.autofs-schema file and an updated schema
The
samples/autofs.schema distribution file was out of date and incorrect. As a consequence, it is possible that somebody is using an incorrect LDAP schema. However, a change of the schema in use cannot be enforced. With this update:
- The
README.autofs-schemafile has been added to describe the problem and recommend which schema to use, if possible. - The schema included in the autofs package has been updated to
samples/autofs.schema.new. (BZ#1383910)
automount no longer needs to be restarted to access maps stored on the NIS server
Previously, the
autofs utility did not wait for the NIS client service when starting. As a consequence, if the network map source was not available at program start, the master map could not be read, and the automount service had to be restarted to access maps stored on the NIS server. With this update, autofs waits until the master map is available to obtain a startup map. As a result, automount can access the map from the NIS domain, and autofs no longer needs to be restarted on every boot.
If the NIS maps are still not available after the configured wait time, the
autofs configuration master_wait option might need to be increased. In the majority of cases, the wait time used by the package is sufficient. (BZ#1383194)
Checking local mount availability with autofs no longer leads to a lengthy timeout before failing
Previously, a server availability probe was not done for mount requests that
autofs considered local because a bind mount on the local machine is expected to be available for use. If the bind mount failed, an NFS mount on the local machine was then tried. However, if the NFS server was not running on the local machine, the mount attempt sometimes suffered a lengthy timeout before failing.
An availability probe has been added to the case where a bind mount is first tried, but fails, and
autofs now falls back to trying to use an NFS server on the local machine. As a result, if a bind mount on the local machine fails, the fallback to trying an NFS mount on the local machine fails quickly if the local NFS server is not running. (BZ#1420574)
The journal is marked as idle when mounting a GFS2 file system as read-only
Previously, the kernel did not mark the file system journal as idle when mounting a GFS2 file system as read-only. As a consequence, the
gfs2_log_flush() function incorrectly tried to write a header block to the journal and a sequence-out-of-order error was logged. A patch has been applied to mark the journal idle when mounting a GFS2 file system as read-only. As a result, the mentioned error no longer occurs in the described scenario. (BZ#1213119)
The id command no longer shows incorrect UIDs and GIDs
When running Red Hat Enterprise Linux on an NFSv4 client connected to an NFSv4 server, the
id command showed incorrect UIDs and GIDs after the key expired out of the NFS idmapper keyring. The problem persisted for 5 minutes, until the expired keys were garbage collected, after which the new key was created in the keyring and the id command provided the correct output. With this update, the keyring facility has been fixed, and the id command no longer shows incorrect output under the described circumstances. (BZ#1408330)
Labeled NFS is now turned off by default
The SELinux labels on a Red hat Enterprise Linux NFS server are not normally visible to NFS clients. Instead, NFS clients see all files labeled as type
nfs_t regardless of what label the files have on the server.
Since Red Hat Enterprise Linux 7.3, the NFS server has the ability to communicate individual file labels to clients. Sufficiently recent clients, such as recent Fedora clients, see NFS files labeled with the same labels that those files have on the server. This is useful in certain cases, but it can also lead to unexpected access permission problems on recent clients after a server is upgraded to Red Hat Enterprise Linux 7.3 and later.
Note that labeled NFS support is turned off by default on the NFS server. You can re-enable labeled NFS support by using the
security_label export option. (BZ#1406885)
autofs mounts no longer enter an infinite loop after reaching a shutdown state
If an
autofs mount reached a shutdown state, and a mount request arrived and was processed before the mount-handling thread read the shutdown notification, the mount-handling thread previously exited without cleaning up the autofs mount. As a consequence, the main program never reached its exit condition and entered an infinite loop, as the autofs-managed mount was left mounted. To fix this bug, the exit condition check now takes place after each request is processed, and cleanup operations are now performed if an autofs mount has reached its shutdown state. As a result, the autofs daemon now exits as expected at shutdown. (BZ#1420584)
autofs is now more reliable when handling namespaces
Previously, the
autofs kernel module was unable to check whether the last component of a path was a mount point in the current namespace, only whether it was a mount point in any namespace. Due to this bug, autofs sometimes incorrectly decided whether a mount point cloned into a propagation private namespace was already present.
As a consequence, the automount point failed to be mounted and the error message
Too many levels of symbolic links was returned. This happened, for example, when a systemd service that used the PrivateTmp option was restarted while an autofs mount was active.
With this update, a namespace-aware mounted check has been added in the kernel. As a result,
autofs is now more resilient to cases where a mount namespace that includes autofs mounts has been cloned to a propagation private namespace.
For more details, see the KBase article at https://access.redhat.com/articles/3104671. (BZ#1320588)
Chapter 28. Installation and Booting Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
Automatic partitioning now works when installing on a single FBA DASD on IBM z Series
Previously, when installing Red Hat Enterprise Linux 7 on IBM z Series systems with a single Fixed Block Architecture (FBA) Direct Access Storage Device (DASD) with the
cms disk layout as the target, automatic partitioning failed because the installer attempted to create multiple partitions on the device, which is not supported on cms-formatted FBA DASDs. This caused the installation finish with a corrupted disk.
With this update, the installer first creates a
msdos partition table on the target DASD, which allows up to three partitions on the device. As long as the installer only creates three or fewer partitions, the installation will succeed. Note that it is recommended to use the autopart --nohome Kickstart option to ensure that the installer does not create a separate /home partition. (BZ#1214407)
Activation of bridge configured in Kickstart no longer fails when Kickstart proceeds from the disk
Previously, if the bridge device was configured in a Kickstart file and the Kickstart file was fetched from the disk, the lack of network connection meant that the bridge was not created and the installation failed at an early stage. With this update, the bridge Kickstart configuration is passed to the
dracut tool at an early stage. As a result, dracut can create and activate the bridge device even when no network is required at the early stage of installation. (BZ#1373360)
Anaconda now correctly allows creating users without passwords
Previously, it was not possible to deselect the
Require a password to use this account option in the Create User screen during an interactive installation. As a consequence, all user accounts created during the installation required a password. This bug has been fixed, and creating users with no password is now possible. (BZ#1380277)
Minimal installation no longer installs open-vm-tools-desktop and dependencies
The open-vm-tools-desktop package was previously marked as default in the @platform-vmware package group (Virtualization utilities and drivers for VMWare). This group is automatically installed by
Anaconda when it detects that the installation is using a VMWare hypervisor. At the same time, this package has many dependencies including a large number of X libraries which are not useful in a minimal installation, and this was causing Anaconda to install a high number of unnecessary packages.
The open-vm-tools-desktop package is now optional in the @platform-vmware group, and therefore not being installed by default. The other package in the group, open-vm-tools, remains mandatory and is therefore installed by default. (BZ#1408694)
Anaconda no longer generates invalid Kickstart files
Previously, if a Kickstart file was used during an installation which defined some LVM logical volumes absolutely (the
--size= parameter) and others relatively (the --percent= parameter), the resulting Kickstart file which is saved on the installed system, anaconda-ks.cfg, defined all logical volumes using both of these parameters. These parameters are mutually exclusive, and the generated Kickstart file was therefore invalid. With this update, Anaconda correctly handles usage of relative and absolute sizes, and the resulting post-installation Kickstart files are valid. (BZ#1317370)
Anaconda no longer fails to identify RAID arrays specified by name
Previously, when a RAID array was specified by name in the
ignoredisk or clearpart command in a Kickstart file, the installation could not proceed because RAID names are not available during initial stages of the installation. This update improves RAID support by ensuring that Anaconda also checks devices in /dev/md/ for a matching name. For example, if the Kickstart file contains the command ignoredisk --only-use=myraid, Anaconda will now also attempt to find an array located at /dev/md/myraid. This allows the installer to locate RAID arrays specified by name at any point during the installation, and enables specifying only RAID array names in Kickstart files. (BZ#1327439)
Kickstart no longer accepts passwords that are too short
Previously, when using a Kickstart file to install Red Hat Enterprise Linux 7, the Anaconda installer immediately accepted passwords shorter than the minimal length defined by the
--minlen Kickstart option, if the password was sufficiently strong (quality value 50 or above by default). This bug has been fixed, and the --minlen option now works even with strong passwords. (BZ#1356975)
Initial Setup now correctly opens in a graphical interface over SSH on IBM z Systems
Previously, when connecting to an IBM z Systems machine using SSH, the text version of the
Initial Setup interface opened even if X forwarding was enabled. This bug has been fixed, and the graphical version of Initial Setup now opens correctly when using X forwarding. (BZ#1378082)
Extra time is no longer needed for installation when geolocation services are enabled
When installing Red Hat Enterprise Linux 7.3 with limited or no internet access, the installer previously paused for several minutes in the Installation Summary screen with the Security Policy section being
Not ready. This was caused by the geolocation service being unable to determine the system's location. Consequently, the installation could not proceed before the service timed out. With this update, the geolocation service correctly times out if it can not find the location within 3 seconds, and the installation can proceed almost immediately even with limited or no network connection. (BZ#1380224)
The ifup-aliases script now sends gratuitous ARP updates when adding new IP addresses
When moving one or more IP aliases from one server to another, associated IP addresses may be unreachable for some time, depending on the Address Resolution Protocol (ARP) time-out value that is configured in the upstream router. This bug has been addressed in the initscripts package, and
ifup-aliases now updates other systems on the network significantly faster in this situation. (BZ#1367554)
The netconsole utility now launches correctly
Previously, if
nameserver address lines were not present in the /etc/resolv.conf file, launching netconsole sometimes resulted in an error and netconsole did not start. The initscripts package has been updated, and netconsole now starts correctly in this situation. (BZ#1278521)
rc.debug kernel allows easier debugging of initscripts
This enhancement introduces the
rc.debug option for the kernel command line. Adding the rc.debug option to the kernel command line prior to booting produces a log of all the activity of the initscripts files during the boot and termination processes. The log appears as part of the /var/log/dmesg log file. As a result, adding the rc.debug option to the kernel command line enables easier debugging of initscripts if needed. (BZ#1394191)
The system no longer fails to terminate with /usr on iSCSI or NFS
In previous versions of Red Hat Enterprise Linux 7, the termination of the system sometimes failed and the system remained hung if the
/usr folder was mounted over a network (for example, NFS or iSCSI). This issue has been resolved, and the system should now shut down normally. (BZ#1369790, BZ#1446171)
rhel-autorelabel no longer corrupts the filesystem
In previous versions of Red Hat Enterprise Linux 7, forcing the SELinux autorelabel by creating the
/.autorelabel file sometimes partially corrupted the filesystem. This made the system unbootable. A patch has been applied to prevent this behaviour. As a result, applying the autorelabel operation using the touch /.autorelabel command is no more expected to corrupt the filesystem. (BZ#1385272)
The rpmbuild command now correctly processes Perl requires
Previously, a bug in
rpm caused my variable = << blocks to be treated as code instead of string constants when building packages using the rpmbuild command. This caused rpm to add unintended dependencies to packages being built in cases where the variable contained the word use followed by another word. With this update, rpm correctly skips these blocks when searching for dependencies, and packages no longer contain unintended dependencies. (BZ#1378307)
Installer now correctly recognizes BIOS RAID devices when using ignoredisk in Kickstart
Previously, some BIOS RAID devices were not correctly recognized during installation when using a Kickstart file with the
ignoredisk --onlyuse=<bios raid name> command. This caused the installation to fail and report lack of free space because the device could not be used. With this update, Anaconda recognizes BIOS RAID devices reliably when they are specified in a Kickstart file, and installations no longer fail in these circumstances. (BZ#1327463)
Single quotes now work for values in the ifcfg-* files
Previously, it was only possible to specify values by using double quotes in the
ifcfg-* files. Using single quotes did not work. With this update, single quotes work too, for example:
ONBOOT='yes'
ONBOOT='yes'
(BZ#1428574)
rhel-import-state no longer changes access permissions for /dev/shm/, allowing the system to boot correctly
Previously, problems during the boot-up process occurred due to the introduction of a new script in a
dracut update. The new script changed the access permission to the /dev/shm/ directory when the dracut utility placed the directory to the /run/initramfs/state/. With this update, rhel-import-state no longer changes the access permissions for /dev/shm/, and the system starts correctly. (BZ#1406254)
Backward compatibility enabled for Red Hat Enterprise Linux 6 initscripts
The initscripts files in Red Hat Enterprise Linux 7 have been patched to enable backward compatibility and to prevent possible regressions when doing an upgrade from Red Hat Enterprise Linux 6 to Red Hat Enterprise Linux 7. (BZ#1392766)
initscripts now specifies /etc/rwtab and /etc/statetab as configuration files
Previously, a reinstallation of the initscripts package replaced the
/etc/rwtab and /etc/statetab files. If these files had contained user’s configuration, the reinstallation process overwrote it.
The initscripts package has been updated to specify the
/etc/rwtab and /etc/statetab files as configuration files. If these files are modified by the user, performing the reinstallation now creates the *.rpmnew files containing the new configuration in the /etc/ folder. As a result of this update, a reinstallation of the initscripts package leaves the /etc/rwtab and /etc/statetab files intact. (BZ#1434075)
The ifup script no longer slows down NetworkManager
Previously, the
ifup script was very slow when notifying NetworkManager. This particularly affected Red Hat Virtualization (RHV) network startup times. A patch has been applied to initscripts, and the described problem no longer occurs. (BZ#1408219)
Gnome Initial Setup can now be disabled by the firstboot --disable command in kickstart
With this update, the gnome-initial-setup package has been fixed to respect the
firstboot --disable kickstart command. As a result, Gnome Initial Setup can be robustly turned off during a kickstart installation and users are no longer forced to create user account on the first boot under the described circumstances as long as the installation kickstart contains the firstboot --disable command. (BZ#1226819)
Setting NM_CONTROLLED now works correctly across all the ifcfg-* files
When the
NM_CONTROLLED=no parameter was set for an interface in its ifcfg-* file, other interfaces in some cases inherited this configuration. This behaviour prevented the NetworkManager daemon from controlling these interfaces. The issue has now been resolved, and setting the NM_CONTROLLED parameter now works correctly across all the ifcfg-* files. As a result, the user can choose which interface is controlled by NetworkManager, and which is not. (BZ#1374837)
The dhclient command no longer incorrectly uses localhost when hostname is not set
The
dhclient command incorrectly sent localhost to the DHCP server as the host name when the hostname variable was not set. This has been fixed, and dhclient no longer sends an incorrect host name in these situations. (BZ#1398686)
The initscripts utility now handles LVM2 correctly
Previously, later versions of the
initscripts utility made use of a new --ignoreskippedcluster option for the vgchange command during boot. This option was missing in earlier versions of the lvm2 utilities. As a consequence, systems using earlier versions of the Logical Volume Manager device mapper (LVM2) could fail to boot correctly. With this update, the initscripts RPM indicates the version of lvm2 required, and if a sufficient version is installed, systems with LVM2 boot correctly. (BZ#1398683)
The service network stop command no longer attempts to stop services which are already stopped
Previously, when a tunnel interface was present, the
service network stop command incorrectly attempted to stop services which had been stopped already, displaying an error message. This bug has been fixed, and the service network stop command now stops only running services. (BZ#1398679)
ifdown on a loopback device now works correctly
In previous versions of Red Hat Enterprise Linux 7, executing the
ifdown command on a local loopback device failed to remove the device. A patch has been applied, and the removal of an existing loopback device using ifdown now succeeds. (BZ#1398678)
Scripts in initscripts handle static IPv6 address assignment more robustly
Previously, scripts in the initscripts package sometimes failed to correctly assign static IPv6 addresses if a Router Advertisement (RA) was received during system initialization. This bug has been fixed, and now the statically assigned address is correctly applied in the described situation. (BZ#1398671)
Deselecting an add-on option in Software Selection no longer requires a double-click
When installing Red Hat Enterprise Linux 7.3, the user had to double-click in order to deselect an
add-on checkbox after a Base environment change. The bug occurred in the Software Selection dialogue of the graphical installation. With this update, the system no longer requires double-clicking when deselecting an option after a Base environment change. A single click is sufficient. (BZ#1404158)
The target system hostname can be configured via installer boot options in Kickstart installations
In Red Hat Enterprise Linux 7.3, the hostname specified via the
Anaconda installer boot options during a Kickstart installation was previously incorrectly not set for installed system and the default localhost.localdomain hostname value was used instead. With this update, Anaconda has been fixed to apply the hostname set by the boot option to the target system configuration. As a result, users can now configure the target system hostname via the installer boot options also for Kickstart installations. (BZ#1441337)
Anaconda no longer asks for Installation Source verification after network configuration
Previously, during an
Anaconda installation from a repository, when the user changed network settings after repository packages had already been selected, the Installation Source required verification. This request was made even when the repository was still reachable after the network change, resulting in an unnecessary step. With this update, the Anaconda installer keeps the original source repository and verifies whether it is still reachable after the Network & Hostname configuration. As a result, the user is only required to reconfigure the Installation Source if the original repository is not reachable. (BZ#1358778)
Disks using the OEMDRV label are now correctly ignored during automatic installation
The OEMDRV disk label is used on driver update disks during installation. Due to a bug, disks with this label were being used by Anaconda as installation targets during automatic installations, which meant they were being erased and used as part of the installed system storage. This update ensures that Anaconda ignores disks with this label unless they are explicitly selected as installation targets, and the problem no longer occurs. (BZ#1412022)
Chapter 29. Kernel Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
RAID 4 and RAID 10 creation and activation fully supported
In Red Hat Enterprise Linux 7.3, existing RAID4 or RAID10 logical volumes created with previous releases failed to activate. Additionally, users were instructed not to create new RAID4 logical volumes created under Red Hat Enterprise Linux 7.3 as these might fail to activate with later releases and updates. With this update, Red Hat Enterprise Linux 7.4 fully supports RAID 4 and RAID 10 creation and activation and rejects invalid RAID 4 and RAID 10 layouts which may have been created with Red Hat Enterprise Linux 7.3. (BZ#1385149)
kdump now works with legacy type 12 NVDIMMs
Previously, systems with legacy type 12 Non-Volatile Dual In-line Memory Modules (NVDIMMs), either real dual in-line memory modules (DIMMs), or emulated using the
memmap=XG!YG kernel command line parameter, were unable to successfully capture a kernel crash dump. For systems with real NVDIMMs, attempts to capture a kernel crash dump occasionally resulted in data corruption. With this update, the underlying source code has been fixed, and the systems with legacy type 12 NVDIMMs can now capture the kernel crash dump as expected. (BZ#1351098)
Creating a file that inherits ACLs no longer loses mask
Previously, creating a file that inherited Access Control Lists (ACLs) caused the mask to be lost, unlike on a local file system. With this update, clients using NFSv4.2 can set the
umask attribute when creating files to cause the server to apply umask always except when inheriting permissions from the parent directory. As a result, new NFS files get the same permissions as files created locally. Note that you need to apply this update on both your NFS clients and NFS servers, and mount with the -overs=4.2 parameter. (BZ#1217546)
Chapter 30. Real-Time Kernel Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
Removing USB no longer causes a might_sleep() warning on MRG Realtime kernel
Removing an USB device on MRG Realtime kernel previously caused taking a sleeping spin lock with interruptions disabled. Consequently,the system logged a
might_sleep() warning. This update replaces the local_irq_disable and local_irq_enable calls by local_irq_disable_nort and local_irq_enable_nort, respectively, which fixes this bug. (BZ#1443711)
Chapter 31. Networking Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
SNMP response is no longer timed out
Previously, all the Simple Network Management Protocol version 1 (SNMPv1) and SNMPv2c responses that followed an SNMPv3 message were checked against the last recorded SNMPv3
max message size property. As a consequence, an SNMPv3 request with a small max message size could lead to SNMPv1 and SNMPv2c bulk requests timing out. With this update, the session maximum message size is checked only for SNMPv3 requests, and the SNMPv1 and SNMPv2c response is no longer timed out. (BZ#1324306)
ICMP redirects no longer cause kernel to crash
Previously, a socket failed to be locked between user space and the process of Internet Control Message Protocol (ICMP) redirect packets, creating a race condition. As a consequence, kernel terminated unexpectedly. The bug has been fixed by skipping the process of ICMP redirect packets when the socket is locked by user space and now the described problem no longer occurs. (BZ#1387485)
The net.ipv4.ip_nonlocal_bind kernel parameter is set in name spaces
Previously, using a floating IP address inside a network name space in some cases failed with the following error message:
bind: Cannot assign requested address.
bind: Cannot assign requested address.
With this update, the kernel respects setting of the
net.ipv4.ip_nonlocal_bind parameter to 1 in name spaces, and the floating IP address is now assigned as expected. (BZ#1363661)
The netfilter REJECT rule now works on SCTP packets
Previously, the
conntrack tool did not check the CRC32c value for Stream Control Transmission Protocol (SCTP) packets. As a consequence, the netfilter REJECT rule was not applied as expected on SCTP packets. The bug has been fixed by setting CHECKSUM_UNNECESSARY on SCTP packets which have valid CRC32c. As a result, the netfilter REJECT is allowed to generate an Internet Control Message Protocol (ICMP) response. (BZ#1353218)
NetworkManager no longer duplicates a connection with already-set DHCP_HOSTNAME
Previously, after a restart of the
NetworkManager service, a connection with an already-set DHCP_HOSTNAME property was duplicated. Consequently, a DHCP lease was not always renewed upon its expiry. With this update, the connection is no longer duplicated, and a DHCP lease is correctly renewed in this scenario.
Note that the fix includes ignoring the already-set hostname properties in the matching process. To avoid possible problems, remove all unused connections with an incorrect
ipv4.dhcp-hostname. For more information, see https://access.redhat.com/articles/2948041. (BZ#1393997)
Improved SCTP congestion_window management
Previously, small data chunks caused the Stream Control Transmission Protocol (SCTP) to account the
receiver_window (rwnd) values incorrectly when recovering from a zero-window situation. As a consequence, window updates were not sent to the peer, and an artificial growth of rwnd could lead to packet drops. This update properly accounts such small data chunks and ignores the rwnd pressure values when reopening a window. As a result, window updates are now sent, and the announced rwnd reflects better the real state of the receive buffer. (BZ#1084802)
Value of DCTCP alpha now drops to 0 and cwnd remains at values more than 137
Previously, the
alpha value of Datacenter TCP (DCTCP) was shifted before subtraction, causing precision loss. As a consequence, the real alpha value did not fall below 15 and uncongested flows eventually dropped to a congestion_window (cwnd) value of 137. This bug has been fixed by canceling the shift operation when alpha is low. As a result, alpha drops to 0 and cwnd remains at values more than 137 for uncongested flows. (BZ#1370638)
ss now displays correctly cwnd
Previously, the
ss utility displayed Transmission Control Protocol congestion window (TCP cwnd) values from the kernel, performing a cast from unsigned to signed 32-bit integer. As a consequence, some values can overflow and be interpreted as a negative value. With this update, the ss code has been fixed, and the utility no longer displays negative cwnd values. (BZ#1375215)
Value of cwnd no longer increases using DCTCP
Previously, the
congestion_window (cwnd) increased unexpectedly after a packet loss. As a consequence, the Data Center TCP (DCTCP) congestion control module became ineffective in avoiding congestion, because repeated problems on the same flow occurred. With this update, the cwnd value is saved on loss and the old one is restored on recovery. As a result, cwnd remains stable. (BZ#1386923)
Negated range matches have been fixed
Previously, using a range of values in a negated match would never evaluate as true. With this update, such matches work as expected. For example:
nft add rule ip ip_table filter_chain_input ip length != 100-200 drop
# nft add rule ip ip_table filter_chain_input ip length != 100-200 drop
now correctly drops packets smaller than
100 bytes or larger than 200 bytes. (BZ#1418967)
The nmcli connection show command now displays the correct output for both empty and NULL values
Previously, the output of the
nmcli connection show command did not display consistently the empty and NULL values among different properties. As a consequence, the empty values were displayed by -- or without a value. With this update, the output of the nmcli connection show command displays -- for both empty and NULL values in normal or pretty modes.
Note that in
terse mode, values are printed only in their raw form and the empty and NULL values are not printed at all. (BZ#1391170)
snmpd no longer rejects large packets from AgentX subagents
Previously, the SNMP daemon (snmpd) limited the size of packets sent from AgentX subagents to 1472 bytes. This caused
snmpd to refuse large packets from AgentX subagents. The packet size limit has been increased to 65535 bytes. As a result, snmpd no longer rejects large packets from AgentX subagents. (BZ#1286693)
Macvlan can now be unregistered correctly
Previously, attempts to unregister the
Macvlan driver failed with broken sysfs links from or to devices in another namespace. With this update, Macvlan has been fixed, thus fixing this bug. (BZ#1412898)
Chapter 32. Security Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
Configurations that depend on chrooting in user-non-searchable paths now work properly
In Red Hat Enterprise Linux 7.3, the
chroot process in the OpenSSH tool had been changed to help harden the SELinux system policy, and root UID was dropped before performing chroot. Consequently, existing configurations that depend on chrooting in user-non-searchable paths stopped working. With this update of the openssh packages, the change has been reverted. Additionally, the problem has been fixed in the SELinux system policy by allowing confined users to use OpenSSH chroot if the administrator enables the selinuxuser_use_ssh_chroot boolean. The described configurations now work in the same way as in Red Hat Enterprise Linux 7.2. (BZ#1418062)
firewalld now supports all ICMP types
Previously, the Internet Control Message Protocol (ICMP) type list was not complete. As a consequence, some ICMP types such as
packet-too-big could not be blocked or allowed. With this update, support for additional ICMP types has been added, and the firewalld service daemon now allows to handle all ICMP types. (BZ#1401978)
docker.pp replaced with container.pp in selinux-policy
Prior to this update, the
container.te file in the container-selinux package contained Docker interfaces, which point to the equivalent container interfaces, and also the docker.if file. Consequently, when compiling the container.te file, the compiler warned about duplicate interfaces. With this update, the docker.pp file in the selinux-policy package has been replaced with the container.pp file, and the warning no longer occurs in the described scenario. (BZ#1386916)
Recently-added kernel classes and permission defined in selinux-policy
Previously, several new classes and permissions had been added to the kernel. As a consequence, these classes and permissions that were not defined in the system policy caused SELinux denials or warnings. With this update, all recently-added kernel classes and permissions have been defined in the selinux-policy package, and the denials and warnings no longer occur. (BZ#1368057)
nss now properly handles PKCS#12 files
Previously, when using the
pk12util tool to list certificates in a PKCS#12 file with strong ciphers using PKCS#5 v2.0 format, there was no output. Additionally, when using pk12util to list certificates in a PKCS#12 file with the SHA-2 Message Authentication Code (MAC), a MAC error was reported, but no certificates were printed. With this update, importing and exporting PKCS#12 files has been changed to be compatible with the OpenSSL handling, and PKCS#12 files are now processed properly in the described scenarios. (BZ#1220573)
OpenSCAP now produces only useful messages and warnings
Previously, default scan output settings have been changed, and debug messages were also printed to standard output. As a consequence, the
OpenSCAP output was full of errors and warnings. The output was hard to read and the SCAP Workbench was unable to handle those messages, too. With this update, the change of default output setting has been reverted, and OpenSCAP now produces useful output. (BZ#1447341)
AIDE now logs in the syslog format
With this update, the
AIDE detection system with the syslog_format option logs in the rsyslog-compatible format. Multiline logs cause problems while parsing on the remote rsyslog server. With the new syslog_format option, AIDE is now able to log with every change logged as a single line. (BZ#1377215)
Installations with the OpenSCAP security-hardening profile now proceed
Prior to this update, typos in the scap-security-guide package caused the
Anaconda installation program to exit and restart a machine. Consequently, it was not possible to select any of the security-hardened profiles such as Criminal Justice Information Services (CJIS) during the Red Hat Enterprise Linux 7.4 installation process. The typos have been fixed, and installations with the OpenSCAP security-hardening profile now proceed. (BZ#1450731)
OpenSCAP and SSG are now able to scan RHV-H systems correctly
Previously, using the OpenSCAP and SCAP Security Guide (SSG) tools to scan a Red Hat Enterprise Linux system working as a Red Hat Virtualization Host (RHV-H) returned
Not Applicable results. With this update, OpenSCAP and SSG correctly identify RHV-H as Red Hat Enterprise Linux, which enables OpenSCAP and SSG to scan RHV-H systems properly. (BZ#1420038)
OpenSCAP now handles also uncompressed XML files in a CVE OVAL feed
Previously, the
OpenSCAP tool was able to handle only compressed CVE OVAL files from a feed. As a consequence, the CVE OVAL feed provided by Red Hat cannot be used as a base for vulnerability scanning. With this update, OpenSCAP supports not only ZIP and BZIP2 files but also uncompressed XML files in a CVE OVAL feed, and the CVE OVAL-based scanning works properly without additional steps. (BZ#1440192)
Chapter 33. Servers and Services Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
rear now correctly preserves Linux capabilities
Previously,
rear did not preserve the Linux capabilities set on the original system during the backup phase. The recovered system was subsequently missing these capabilities. With this update, Linux capabilities are correctly preserved if the directive NETFS_RESTORE_CAPABILITIES is set to the y option in the /usr/share/rear/conf/default.conf configuration file. (BZ#1343119)
sblim-cmpi-fsvol no longer shows file systems mounted with DM as disabled
Previously, the sblim-cmpi-fsvol Common Information Model (CIM) provider could not identify the file systems (FS) that were mounted with the Device Mapper (DM) correctly. Consequently, when enumerating the CIM_UnixLocalFileSystem class instances, sblim-cmpi-fsvol showed some FS that were already mounted as disabled. With this update, sblim-cmpi-fsvol has been fixed to parse the output of the dmsetup command instead of parsing the output of the mount command for FS mounted with DM. As a result, sblim-cmpi-fsvol now shows the FS mounted with DM correctly. (BZ#1136116)
SPNEGO in Cyrus SASL is now compatible with Microsoft Windows
Prior to this update, the Red Hat Enterprise Linux implementation of Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO) in Cyrus Simple Authentication and Security Layer (SASL) was not compatible with the Microsoft Windows counterpart. As a consequence, the Red Hat Enterprise Linux tools using the cyrus-sasl packages were not able to use SPNEGO when attempting to connect to Windows services. These tools were also not able to accept connections from Windows clients. The cyrus-sasl packages have been fixed, and SPNEGO in the Red Hat Enterprise Linux Cyrus SASL version is now compatible with the Microsoft Windows counterpart. (BZ#1421663)
Data are no longer lost when the MariaDB init script fails
Previously, if the
MariaDB init script failed, it called rm -rf on the whole directory. This could consequently lead to a loss of data or even deletion of the mount point. With this update, several additional checking mechanisms have been added to the init script. Now, if the script fails, it removes only files newer than a timestamp generated prior to the critical file operations. In addition, a set of human-readable status reports and error messages have been added. (BZ#1356897)
ypbind no longer starts before access to the network is guaranteed
The
ypbind service was set to start after the systemd target network.target. However, network.target does not guarantee the networking functionality required by ypbind. As a consequence, the ypbind service sometimes did not have access to the network when started during the boot process. The service file for ypbind has been changed to start ypbind after the target network-online.target, and ypbind is now guaranteed to have access to the network when started. (BZ#1382804)
Remote users' account settings are no longer reverted to default settings on restart due to ypbind
Because of wrong service starting order,
ypbind did not start before all Name Service Switch (NSS) look-up operations had been completed. This caused the user's account settings file to revert to default settings on restart for users fulfilling all of the following conditions:
- Using Gnome Display Manager auto-login
- Using NIS authentication
- Home directory located on NFS
The
ypbind service file ordering has been fixed to make ypbind start before the user/group database is set up. The user's account settings file is now handled properly. (BZ#1217435)
yppasswd no longer crashes due to Network Information System security features used
The
yppasswd client tried to use a wrong string as salt when checking passwords because it did not recognize the following situations:
- The NIS server was configured to use the
passwd.adjunctmap - The variable
MERGE_PASSWD=falsewas set in the NIS server's file/var/yp/Makefile
As a consequence,
yppasswd failed with the following error message: crypt() failed. The yppasswd client has been fixed to recognize these situations and now delegates the checks to the yppasswdd daemon running on the server. (BZ#1401432)
Evince now displays PostScript files again
Due to a bug, the
evince document viewer failed to display the content of PostScript files. A patch has been applied, and evince now displays PostScript files again. (BZ#1411725)
db_verify no longer causes libdb to run out of free mutexes
Previously, the
libdb database did not correctly release all unused mutexes. When running the db_verify command on libdb database files multiple times, libdb quickly ran out of resources for mutex operations. Consequently, libdb exited with the error message:
Unable to allocate memory for mutex; resize mutex region
Unable to allocate memory for mutex; resize mutex region
leaving the database in an inconsistent state. This bug has been fixed,
libdb now correctly releases mutexes, and the described problem no longer occurs. (BZ#1277887)
ghostscript no longer becomes unresponsive in some situations
Under certain circumstances, the
ghostscript application previously entered an infinite loop, became unresponsive, and caused excessive CPU load. This update fixes the underlying code, which prevents the described problem from occurring. (BZ#1424752)
Converting postscript to PDF no longer causes ps2pdf to terminate unexpectedly
Previously, converting a postscript file to PDF in some cases caused the
ps2pdf utility to terminate unexpectedly with a segmentation fault. This bug has been fixed, and converting postscript to PDF no longer causes ps2pdf to crash. (BZ#1390847)
sapconf now works correctly with higher kernel.shmall and kernel.shmmax values
Previously, the
kernel.shmall and kernel.shmmax values were increased by default displaying an error in the sapconf utility. Consequently, sapconf failed with the following error message:
integer expression expected
integer expression expected
This update adds a new check which allows the high values of
kernel.shmall and kernel.shmmax, and the described problem no longer occurs. (BZ#1391881)
Chapter 34. Storage Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
lvconvert --repair now works properly on cache logical volumes
Due to a regression in the lvm2-2.02.166-1.el package, released in Red Hat Enterprise Linux 7.3, the
lvconvert --repair command could not be run properly on cache logical volumes. As a consequence, the Cannot convert internal LV error occurred. The underlying source code has been modified to fix this bug, and lvconvert --repair now works as expected. (BZ#1380532)
LVM2 library incompatibilities no longer cause device monitoring to fail and be lost during an upgrade
Due to a bug in the lvm2-2.02.166-1.el package, released in Red Hat Enterprise Linux 7.3, the library was incompatible with earlier versions of Red Hat Enterprise Linux 7. The incompatibility could cause device monitoring to fail and be lost during an upgrade. As a consequence, device failures could go unnoticed (RAID), or out-of-space conditions were not handled properly (thin-p). This update fixes the incompatibility, and the logical volume monitoring now works as expected. (BZ#1382688)
be2iscsi driver errors no longer cause the system to become unresponsive
Previously, the operating system sometimes became unresponsive due to
be2iscsi driver errors. This update fixes be2iscsi, and the operating system no longer hangs due to be2iscsi errors. (BZ#1324918)
Interaction problems no longer occur with the lvmetad daemon when mirror segment type is used
Previously, when the legacy
mirror segment type was used to create mirrored logical volumes with 3 or more legs, interaction problems could occur with the lvmetad daemon. Problems observed occurred only after a second device failure, when mirror fault policies were set to the non-default allocate option, when lvmetad was used, and there had been no reboot of the machine between device failure events. This bug has been fixed, and the described interaction problems no longer occur. (BZ#1380521)
The multipathd daemon no longer shows incorrect error messages for blacklisted devices
Previously, the
multipathd daemon showed incorrect error messages that it could not find devices that were blacklisted, causing users to see error messages when nothing was wrong. With this fix, multipath checks if a device has been blacklisted before issuing an error message. (BZ#1403552)
Multipath now flags device reloads when there are no usable paths
Previously, when the last path device to a multipath device was removed, the state of
lvmetad became incorrect, and lvm devices on top of multipath could stop working correctly. This was because there was no way for the device-mapper to know how many working paths there were when a multipath device got reloaded. Because of this, the multipath udev rules that dealt with disabling scanning and other dm rules only worked when multipath devices lost their last usable path because it failed, instead of because of a device table reload. With this fix, multipath now flags device reloads when there are no usable paths, and the multipath udev rules now correctly disable scanning and other dm rules whenever a multipath device loses its last usable path. As a result, the state of lvmetad remains correct, and LVM devices on top of multipath continue working correctly. (BZ#1239173)
Read requests sent after failed writes will always return the same data on multipath devices
Previously, if a write request wass hung in the
rbd module, and the iSCSI initiator and multipath layer decided to fail the request to the application, read requests sent after the failure may not have reflected the state of the write. This was because When a Ceph rbd image is exported through multiple iSCSI targets, the rbd kernel module will grab the exclusive lock when it receives a write request. With this fix, The rbd module will grab the exclusive lock for both reads and writes. This will cause hung writes to be flushed and or failed before executing reads. As a result, read requests sent after failed writes will always return the same data. (BZ#1380602)
When a path device in a multipath device switches to read-only, the multipath device will be reloaded read-only
Previously, when reloading a multipath device, the multipath code always tried to reload the device read-write first, and then failed back to read-only. If a path device had already been opened read-write in the kernel, it would continue to be opened read-write even if the device had switched to read-only mode and the read-write reload would succeed. Consequently, when path devices switched to from read-write to read-only, the multipath device would still be read-write (even though all writes to the read-only device would fail). With this fix, multipathd now reloads the multipath device read-only when it gets a
uevent showing that a path devices has become read-only. As a result, when a path device in a multipath device switches to read-only, the multipath device will be reloaded read-only. (BZ#1431562)
Users no longer get potentially confusing stale data for multipath devices that are not being checked
Previously, when a path device is orphaned (not a member of a multipath device), the device state and checker state displayed with the
show paths command in the state of the device before it was orphaned. As a result, the show paths command showed out of date information on devices that was no longer checking. With this fix, the show paths command now displays undef as the checker state and unknown as the device state of orphaned paths and users no longer get potentially confusing stale data for devices that are not being checked. (BZ#1402092)
The multipathd daemon no longer hangs as a result of running the prioritizer on failed paths
Previously,
multipathd was running the prioritizer on paths that had failed in some cases. Because of this, if multipathd was configured with a synchronous prioritizer, it could hang trying to run the prioritizer on a failed path. With this fix, multipathd no longer runs the prioritizer when a path has failed and it no longer fails for this reason. (BZ#1362120)
New RAID4 volumes, and existing RAID4 or RAID10 logical volumes after a system upgrade are now correctly activated
After creating RAID4 logical volumes on Red Hat Enterprise Linux version 7.3, or after upgrading a system that has existing RAID4 or RAID10 logical volumes to version 7.3, the system sometimes failed to activate these volumes. With this update, the system activates these volumes successfully. (BZ#1386184)
LVM tools no longer crash due to an incorrect status of PVs
When LVM observes particular types of inconsistencies between the metadata on Physical Volumes (PVs) in a Volume Group (VG), LVM can automatically repair them. Such inconsistencies happen, for example, if a VG is changed while some of its PVs are temporarily invisible to the system and then the PVs reappear.
Prior to this update, when such a repair operation was performed, all the PVs were sometimes temporarily considered to have returned even if this was not the case. As a consequence, LVM tools sometimes terminated unexpectedly with a segmentation fault. With this update, the described problem no longer occurs. (BZ#1434054)
Chapter 35. System and Subscription Management Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
Undercloud no longer fails on a system with no configured repositories
Previously, when the user tried to install the OpenStack
Undercloud on a system with no configured repositories, the yum package manager required installation of MySQL dependencies which have been already installed. As a conseqence, the Undercloud install script failed. To fix the bug, yum has been fixed to correctly detect already installed MySQL dependencies. As a result, the Undercloud install script no longer fails on a system with no configured repositories. (BZ#1352585)
the yum commands provided by the yum-plugin-verify now set the exit status to 1 if any mismatches are found
The
yum commands provided by the yum-plugin-verify plug-in returned exit code 0 for any discrepancies found in a package. The bug has been fixed, and the exit status is now set to 1 in case any mismatches are found. (BZ#1406891)
Chapter 36. Virtualization Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
SeaBIOS recognizes SCSI devices with a non-zero LUN
Previously, SeaBIOS only recognized SCSI devices when the logical unit number (LUN) was set to zero. Consequently, if a SCSI device was defined with a LUN other than zero, SeaBIOS failed to boot. With this update, SeaBIOS recognizes SCSI devices with LUNs other than zero. As a result, SeaBIOS boots successfully. (BZ#1020622)
The libguestfs tools now correctly handle guests where /usr/ is not on the same partition as root
Previously, the
libguestfs library did not recognize the guest operating system when the /usr/ directory was not located on the same partition as the root directory. As a consequence, multiple libguestfs tools, such as the virt-v2v utility, did not perform as expected when used on such guests. This update ensures that libguestfs recognizes guest operating systems when /usr/ is not on the same partition as root. As a result, the affected libguestfs tools perform as expected. (BZ#1401474)
virt-v2v can convert Windows guests with corrupted or damaged Windows registries
Previously, the
hivex library used by libguestfs to manipulate the Windows registry could not handle corrupted registries. Consequently, the virt-v2v utility was not able to convert Windows guests with corrupted or damaged Windows registries. With this update, libguestfs configures hivex to be less strict when reading the Windows registry. As a result, virt-v2v can now convert most Windows guests with corrupted or damaged Windows registries. (BZ#1311890, BZ#1423436)
Converting Windows guests with non-system dynamic disks using virt-v2v now works correctly
Previously, using the
virt-v2v utility to convert a Windows guest virtual machine with non-system dynamic disks did not work correctly, and the guest were not usable after the conversion. This update fixes the underlying code and thus prevents the described problem.
Note that the conversion of Windows guests using dynamic disks on the system disk (C: drive) is still not supported. (BZ#1265588)
Guests can be converted to Glance images, regardless of the Glance client version
Previously, if the
Glance command-line client version 1.0.0 or greater was installed on the virt-v2v conversion server, using the virt-v2v utility to convert a guest virtual machine to a Glance image failed. With this release, when exporting images, virt-v2v directly sets all the properties of images. As a result, the conversion to Glance works regardless of the version of the Glance client installed on the virt-v2v conversion server. (BZ#1374405)
Red Hat Enterprise Linux 6.2 - 6.5 guest virtual machines can now be converted using virt-v2v
Previously, an error in the SELinux
file_contexts file in Red Hat Enterprise Linux versions 6.2 - 6.5 prevented conversion of these guests using the virt-v2v utiltiy. With this update, virt-v2v automatically fixes the error in the SElinux file_contexts file. As a result, Red Hat Enterprise Linux 6.2-6.5 guest virtual machines can now be converted using virt-v2v. (BZ#1374232)
Btrfs entries in /etc/fstab are now parsed correctly by libguestfs
Previously, Btrfs sub-volume entries with more than one comma-separated option in
/etc/fstab were not parsed properly by libguestfs. Consequently, Linux guest virtual machines with these configurations could not be inspected, and the virt-v2v utility could not convert them. With this update, libguestfs parses Btrfs sub-volume entries with more than one comma-separated option in /etc/fstab correctly. As a result, these entries can be inspected and converted by virt-v2v. (BZ#1383517)
libguestfs can now correctly open libvirt domain disks that require authentication
Previously, when adding disks from a
libvirt domain, libguestfs did not read any disk secrets. Consequently, libguestfs could not open disks that required authentication. With this update, libguestfs reads secrets of disks in libvirt domains, if present. As a result, libguestfs can now correctly open disks of libvirt domains that require authentication. (BZ#1392798)
Converted Windows UEFI guests boot properly
Previously, when converting Windows 8 UEFI guests, virtio drivers were not installed correctly. Consequently, the converted guests did not boot. With this update, virtio drivers are installed correctly in Windows UEFI guests. As a result, converted Windows UEFI guests boot properly. (BZ#1431579)
The virt-v2v utility now ignores proxy environment variables consistently
Prior to this update, when using the
virt-v2v utility to convert a VMware guest virtual machine, virt-v2v used the proxy environment variables for some connections to VMware, but not for others. This in some cases caused conversions to fail. Now, virt-v2v ignores all proxy environment settings during the conversion, which prevents the described problem. (BZ#1354507)
virt-v2v only copies rhev-apt.exe and rhsrvany.exe when needed
Previously,
virt-v2v always copied the rhev-apt.exe and rhsrvany.exe files when converting Windows guests. Consequently, they were present in the converted Windows guests, even when they were not needed. With this update, virt-v2v only copies these files when they are needed in the Windows guest. (BZ#1161019)
Guests with VLAN over a bonded interaface no longer stop passing traffic after a failover
Previously, on guest virtual machines with VLAN configured over a bonded interface that used
ixgbe virtual functions (VFs), the bonded network interface stopped passing traffic when a failover occurred. The hypervisor console also logged this error as a requested MACVLAN filter but is administratively denied message. With this update ensures that failovers are handled correctly and thus prevents the described problem. (BZ#1379787)
virt-v2v imports OVAs that do not have the <ovf:Name> attribute
Previously, the
virt-v2v utility rejected the import of Open Virtual Appliances (OVAs) without the <ovf:Name> attribute. As a consequence, the virt-v2v utility did not import OVAs exported by Amazon Web Services (AWS). In this release, if the <ovf:Name> attribute is missing, virt-v2v uses the base name of the disk image file as the name of the virtual machine. As a result, the virt-v2v utility now imports OVAs exported by AWS. (BZ#1402301)
Part III. Technology Previews Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
This part provides a list of all Technology Previews available in Red Hat Enterprise Linux 7.4.
For information on Red Hat scope of support for Technology Preview features, see https://access.redhat.com/support/offerings/techpreview/.
Chapter 37. General Updates Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
The systemd-importd VM and container image import and export service
Latest
systemd version now contains the systemd-importd daemon that was not enabled in the earlier build, which caused the machinectl pull-* commands to fail. Note that the systemd-importd daemon is offered as a Technology Preview and should not be considered stable. (BZ#1284974)
Chapter 38. Authentication and Interoperability Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
Use of AD and LDAP sudo providers
The Active Directory (AD) provider is a back end used to connect to an AD server. Starting with Red Hat Enterprise Linux 7.2, using the AD sudo provider together with the LDAP provider is available as a Technology Preview. To enable the AD sudo provider, add the
sudo_provider=ad setting in the [domain] section of the sssd.conf file. (BZ#1068725)
DNSSEC available as Technology Preview in IdM
Identity Management (IdM) servers with integrated DNS now support DNS Security Extensions (DNSSEC), a set of extensions to DNS that enhance security of the DNS protocol. DNS zones hosted on IdM servers can be automatically signed using DNSSEC. The cryptographic keys are automatically generated and rotated.
Users who decide to secure their DNS zones with DNSSEC are advised to read and follow these documents:
- DNSSEC Operational Practices, Version 2: http://tools.ietf.org/html/rfc6781#section-2
- Secure Domain Name System (DNS) Deployment Guide: http://dx.doi.org/10.6028/NIST.SP.800-81-2
- DNSSEC Key Rollover Timing Considerations: http://tools.ietf.org/html/rfc7583
Note that IdM servers with integrated DNS use DNSSEC to validate DNS answers obtained from other DNS servers. This might affect the availability of DNS zones that are not configured in accordance with recommended naming practices described in the Red Hat Enterprise Linux Networking Guide: https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/Networking_Guide/ch-Configure_Host_Names.html#sec-Recommended_Naming_Practices. (BZ#1115294)
Identity Management JSON-RPC API available as Technology Preview
An API is available for Identity Management (IdM). To view the API, IdM also provides an API browser as Technology Preview.
In Red Hat Enterprise Linux 7.3, the IdM API was enhanced to enable multiple versions of API commands. Previously, enhancements could change the behavior of a command in an incompatible way. Users are now able to continue using existing tools and scripts even if the IdM API changes. This enables:
- Administrators to use previous or later versions of IdM on the server than on the managing client.
- Developers to use a specific version of an IdM call, even if the IdM version changes on the server.
In all cases, the communication with the server is possible, regardless if one side uses, for example, a newer version that introduces new options for a feature.
For details on using the API, see https://access.redhat.com/articles/2728021 (BZ#1298286)
The Custodia secrets service provider is now available
As a Technology Preview, you can now use Custodia, a secrets service provider. Custodia stores or serves as a proxy for secrets, such as keys or passwords.
For details, see the upstream documentation at http://custodia.readthedocs.io. (BZ#1403214)
Containerized Identity Management server available as Technology Preview
The
rhel7/ipa-server container image is available as a Technology Preview feature. Note that the rhel7/sssd container image is now fully supported.
For details, see https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html-single/using_containerized_identity_management_services. (BZ#1405325, BZ#1405326)
Chapter 39. Clustering Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
The pcs tool now manages bundle resources in Pacemaker
As a Technology Preview starting with Red Hat Enterprise Linux 7.4, the
pcs tool supports bundle resources. You can now use the pcs resource bundle create and the pcs resource bundle update commands to create and modify a bundle. You can add a resource to an existing bundle with the pcs resource create command. For information on the parameters you can set for a bundle resource, run the pcs resource bundle --help command. (BZ#1433016)
Chapter 40. Compiler and Tools Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
Shenandoah garbage collector
The new, low pause time Shenandoah garbage collector, is now available as a Technology Preview for OpenJDK on the Intel 64, AMD64, and 64-bit ARM architectures. Shenandoah performs concurrent evacuation which allows users to run with large heaps without long pause times. For more information, see https://wiki.openjdk.java.net/display/shenandoah/Main. (BZ#1400306)
Chapter 41. File Systems Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
File system DAX is now available for ext4 and XFS as a Technology Preview
Starting with Red Hat Enterprise Linux 7.3, Direct Access (DAX) provides, as a Technology Preview, a means for an application to directly map persistent memory into its address space.
To use DAX, a system must have some form of persistent memory available, usually in the form of one or more Non-Volatile Dual In-line Memory Modules (NVDIMMs), and a file system that supports DAX must be created on the NVDIMM(s). Also, the file system must be mounted with the
dax mount option. Then, an mmap of a file on the dax-mounted file system results in a direct mapping of storage into the application's address space. (BZ#1274459)
pNFS and Block Layout Support
As a Technology Preview, the upstream code has been backported to the Red Hat Enterprise Linux client to provide the pNFS block layout feature.
In addition, Red Hat Enterprise Linux 7.4 includes the Technology Preview of the pNFS SCSI layout. This feature is similar to pNFS block layout, but limited only to SCSI devices, so it is easier to use. Therefore, Red Hat recommends the use of pNFS SCSI layout rather than the pNFS block layout. (BZ#1111712)
OverlayFS
OverlayFS is a type of union file system. It allows the user to overlay one file system on top of another. Changes are recorded in the upper file system, while the lower file system remains unmodified. This allows multiple users to share a file-system image, such as a container or a DVD-ROM, where the base image is on read-only media. Refer to the kernel file Documentation/filesystems/overlayfs.txt for additional information.
OverlayFS remains a Technology Preview in Red Hat Enterprise Linux 7.4 under most circumstances. As such, the kernel will log warnings when this technology is activated.
Full support is available for OverlayFS when used with Docker under the following restrictions:
- OverlayFS is only supported for use as a Docker graph driver. Its use can only be supported for container COW content, not for persistent storage. Any persistent storage must be placed on non-OverlayFS volumes to be supported. Only default Docker configuration can be used; that is, one level of overlay, one lowerdir, and both lower and upper levels are on the same file system.
- Only XFS is currently supported for use as a lower layer file system.
- On Red Hat Enterprise Linux 7.3 and earlier, SELinux must be enabled and in enforcing mode on the physical machine, but must be disabled in the container when performing container separation, that is the
/etc/sysconfig/dockerfile must not contain--selinux-enabled. Starting with Red Hat Enterprise Linux 7.4, OverlayFS supports SELinux security labels, and you can enable SELinux support for containers by specifying--selinux-enabledin/etc/sysconfig/docker. - The OverlayFS kernel ABI and userspace behavior are not considered stable, and may see changes in future updates.
- In order to make the yum and rpm utilities work properly inside the container, the user should be using the yum-plugin-ovl packages.
Note that OverlayFS provides a restricted set of the POSIX standards. Test your application thoroughly before deploying it with OverlayFS.
Note that XFS file systems must be created with the
-n ftype=1 option enabled for use as an overlay. With the rootfs and any file systems created during system installation, set the --mkfsoptions=-n ftype=1 parameters in the Anaconda kickstart. When creating a new file system after the installation, run the # mkfs -t xfs -n ftype=1 /PATH/TO/DEVICE command. To determine whether an existing file system is eligible for use as an overlay, run the # xfs_info /PATH/TO/DEVICE | grep ftype command to see if the ftype=1 option is enabled.
There are also several known issues associated with OverlayFS as of Red Hat Enterprise Linux 7.3 release. For details, see
Non-standard behavior in the Documentation/filesystems/overlayfs.txt file. (BZ#1206277)
pNFS SCSI layouts client and server support is now provided
Client and server support for parallel NFS (pNFS) SCSI layouts is provided as a Technology Preview starting with Red Hat Enterprise Linux 7.3. Building on the work of block layouts, the pNFS layout is defined across SCSI devices and contains sequential series of fixed-size blocks as logical units that must be capable of supporting SCSI persistent reservations. The Logical Unit (LU) devices are identified by their SCSI device identification, and fencing is handled through the assignment of reservations. (BZ#1305092)
Btrfs file system
The
Btrfs (B-Tree) file system is available as a Technology Preview in Red Hat Enterprise Linux 7.
Red Hat Enterprise Linux 7.4 introduces the last planned update to this feature.
Btrfs has been deprecated, which means Red Hat will not be moving Btrfs to a fully supported feature and it will be removed in a future major release of Red Hat Enterprise Linux. (BZ#1477977)
Chapter 42. Hardware Enablement Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
Trusted Computing Group TPM 2.0 System API library and management utilities available
Two new packages have been added to Red Hat Enterprise Linux to support the Trusted Computing Group's Trusted Platform Module (TPM) 2.0 hardware as a Technology Preview:
- The tpm2-tss package adds the Intel implementation of the TPM 2.0 System API library. This library enables programs to interact with TPM 2.0 devices.
- The tpm2-tools package adds a set of utilities for management and utilization of TPM 2.0 devices from user space. (BZ#1275027, BZ#1275029)
New package: tss2
The tss2 package adds IBM implementation of a Trusted Computing Group Software Stack (TSS) 2.0 as a Technology Preview. This package allows users to interact with TPM 2.0 devices. (BZ#1384452)
LSI Syncro CS HA-DAS adapters
Red Hat Enterprise Linux 7.1 included code in the megaraid_sas driver to enable LSI Syncro CS high-availability direct-attached storage (HA-DAS) adapters. While the megaraid_sas driver is fully supported for previously enabled adapters, the use of this driver for Syncro CS is available as a Technology Preview. Support for this adapter is provided directly by LSI, your system integrator, or system vendor. Users deploying Syncro CS on Red Hat Enterprise Linux 7.2 and later are encouraged to provide feedback to Red Hat and LSI. (BZ#1062759)
Chapter 43. Installation and Booting Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
Multi-threaded xz compression in rpm-build
Compression can take long time for highly parallel builds as it currently uses only one core. This is problematic especially for continuous integration of large projects that are built on hardware with many cores.
This feature, which is provided as a Technology Preview, enables multi-threaded
xz compression for source and binary packages when setting the %_source_payload or %_binary_payload macros to the wLTX.xzdio pattern . In it, L represents the compression level, which is 6 by default, and X is the number of threads to be used (may be multiple digits), for example w6T12.xzdio. This can be done by editing the /usr/lib/rpm/macros file or by declaring the macro within the spec file or at the command line. (BZ#1278924)
Chapter 44. Kernel Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
Heterogeneous memory management included as a Technology Preview
Red Hat Enterprise Linux 7.3 introduced the heterogeneous memory management (HMM) feature as a Technology Preview. This feature has been added to the kernel as a helper layer for devices that want to mirror a process address space into their own memory management unit (MMU). Thus a non-CPU device processor is able to read system memory using the unified system address space. To enable this feature, add
experimental_hmm=enable to the kernel command line. (BZ#1230959)
criu rebased to version 2.12
Red Hat Enterprise Linux 7.2 introduced the
criu tool as a Technology Preview. This tool implements Checkpoint/Restore in User-space (CRIU), which can be used to freeze a running application and store it as a collection of files. Later, the application can be restored from its frozen state.
Note that the
criu tool depends on Protocol Buffers, a language-neutral, platform-neutral extensible mechanism for serializing structured data. The protobuf and protobuf-c packages, which provide this dependency, were also introduced in Red Hat Enterprise Linux 7.2 as a Technology Preview.
With Red Hat Enterprise Linux 7.4, the criu packages have been upgraded to upstream version 2.12, which provides a number of bug fixes and enhancements over the previous version. (BZ#1400230)
kexec as a Technology Preview
The
kexec system call has been provided as a Technology Preview. This system call enables loading and booting into another kernel from the currently running kernel, thus performing the function of the boot loader from within the kernel. Hardware initialization, which is normally done during a standard system boot, is not performed during a kexec boot, which significantly reduces the time required for a reboot. (BZ#1460849)
kexec fast reboot as a Technology Preview
As a Technology Preview, this update adds the
kexec fast reboot feature, which makes the reboot significantly faster. To use this feature, you must load the kexec kernel manually, and then reboot the operating system. It is not possible to make kexec fast reboot as the default reboot action.
Special case is using
kexec fast reboot for Anaconda. It still does not enable to make kexec fast reboot default. However, when used with Anaconda, the operating system can automatically use kexec fast reboot after the installation is complete in case that user boots kernel with the anaconda option. To schedule a kexec reboot, use the inst.kexec command on the kernel command line, or include a reboot --kexec line in the Kickstart file. (BZ#1464377)
Unprivileged access to name spaces can be enabled as a Technology Preview
You can now set the
namespace.unpriv_enable kernel command-line option if required, as a Technology Preview.
The default setting is off.
When set to
1, issuing a call to the clone() function with the flag CLONE_NEWNS as an unprivileged user no longer returns an error and allows the operation.
However, to enable the unprivileged access to name spaces, the
CAP_SYS_ADMIN flag has to be set in some user name space to create a mount name space. (BZ#1350553)
KASLR as a Technology Preview
Kernel address space layout randomization (KASLR) is now available as a Technology Preview. KASLR is a kernel feature that contains two parts, kernel text KASLR and
mm KASLR. These two parts work together to enhance the security of the Linux kernel.
The physical address and virtual address of kernel text itself are randomized to a different position separately. The physical address of the kernel can be anywhere under 64TB, while the virtual address of the kernel is restricted between [0xffffffff80000000, 0xffffffffc0000000], the 1GB space.
The starting address of three
mm sections (the direct mapping, vmalloc, and vmemmap section) is randomized in a specific area. Previously, starting addresses of these sections were fixed values.
KASLR can thus prevent inserting and redirecting the execution of the kernel to a malicious code if this code relies on knowing where symbols of interest are located in the kernel address space.
Note that KASLR code is now compiled in the Linux kernel, but it is disabled by default. If you want to use it, add the
kaslr kernel option to the kernel command line to enable it explicitly. (BZ#1449762)
Updated NFSv4 pNFS clients with flexible file layout
Flexible file layout on
NFSv4 clients was first introduced in Red Hat Enterprise Linux 7.2 as a Technology Preview. Red Hat Enterprise Linux 7.4 adds updates to this feature, however, it is still being offered as a Technology Preview.
NFSv4 flexible file layout enables advanced features such as non-disruptive file mobility and client-side mirroring, which provides enhanced usability in areas such as databases, big data and virtualization. See https://datatracker.ietf.org/doc/draft-ietf-nfsv4-flex-files/ for detailed information about NFS flexible file layout. (BZ#1349668)
CUIR enhanced scope detection
The Linux support for Control Unit Initiated Reconfiguration (CUIR) enables concurrent storage service with no or minimized down time. In addition to the support for Linux instances running in Logical Partitioning (LPAR) mode, support for Linux instances on IBM z/VM systems has been added as a Technology Preview. (BZ#1274456)
SCSI-MQ as a Technology Preview in the qla2xxx driver
The
qla2xxx& driver updated in Red Hat Enterprise Linux 7.4 can now enable the use of SCSI-MQ (multiqueue) with the ql2xmqsupport=1 module parameter. The default value is 0 (disabled). The SCSI-MQ functinality is provided as a Technology Preview when used with the qla2xxx driver.
Note that a recent performance testing at Red Hat with async IO over Fibre Channel adapters using SCSI-MQ has shown significant performance degradation under certain conditions. A fix is being tested but was not ready in time for Red Hat Enterprise Linux 7.4 General Availability. (BZ#1414957)
Intel Cache Allocation Technology as a Technology Preview
This update adds Intel Cache Allocation Technology (CAT) as a Technology Preview. This technology enables the software to restrict cache allocation to a defined subset of cache. The defined subset can overlap with other subsets. (BZ#1288964)
Chapter 45. Real-Time Kernel Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
New scheduler class: SCHED_DEADLINE
This update introduces the
SCHED_DEADLINE scheduler class for the real-time kernel as a Technology Preview. The new scheduler enables predictable task scheduling based on application deadlines. SCHED_DEADLINE benefits periodic workloads by reducing application timer manipulation. (BZ#1297061)
Chapter 46. Networking Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
Cisco usNIC driver
Cisco Unified Communication Manager (UCM) servers have an optional feature to provide a Cisco proprietary User Space Network Interface Controller (usNIC), which allows performing Remote Direct Memory Access (RDMA)-like operations for user-space applications. The libusnic_verbs driver, which is available as a Technology Preview, makes it possible to use usNIC devices via standard InfiniBand RDMA programming based on the Verbs API. (BZ#916384)
Cisco VIC kernel driver
The Cisco VIC Infiniband kernel driver, which is available as a Technology Preview, allows the use of Remote Directory Memory Access (RDMA)-like semantics on proprietary Cisco architectures. (BZ#916382)
Trusted Network Connect
Trusted Network Connect, available as a Technology Preview, is used with existing network access control (NAC) solutions, such as TLS, 802.1X, or IPsec to integrate endpoint posture assessment; that is, collecting an endpoint's system information (such as operating system configuration settings, installed packages, and others, termed as integrity measurements). Trusted Network Connect is used to verify these measurements against network access policies before allowing the endpoint to access the network. (BZ#755087)
SR-IOV functionality in the qlcnic driver
Support for Single-Root I/O virtualization (SR-IOV) has been added to the qlcnic driver as a Technology Preview. Support for this functionality will be provided directly by QLogic, and customers are encouraged to provide feedback to QLogic and Red Hat. Other functionality in the qlcnic driver remains fully supported. (BZ#1259547)
The libnftnl and nftables packages
The nftables and libnftl packages are available as a Technology Preview since Red Hat Enterprise Linux 7.3.
The nftables packages provide a packet-filtering tool, with numerous improvements in convenience, features, and performance over previous packet-filtering tools. It is the designated successor to the
iptables, ip6tables, arptables, and ebtables utilities.
The libnftnl packages provide a library for low-level interaction with nftables Netlink's API over the
libmnl library. (BZ#1332585)
The flower classifier with off-loading support
flower is a Traffic Control (TC) classifier intended to allow users to configure matching on well-known packet fields for various protocols. It is intended to make it easier to configure rules over the u32 classifier for complex filtering and classification tasks. flower also supports the ability to off-load classification and action rules to underlying hardware if the hardware supports it. The flower TC classifier is now provided as a Technology Preview. (BZ#1393375)
Chapter 47. Red Hat Enterprise Linux System Roles Powered by Ansible Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
New packages: ansible
Red Hat Enterprise Linux System Roles, now available as a Technology Preview, is a configuration interface for Red Hat Enterprise Linux subsystems, which makes system configuration easier through the inclusion of
Ansible Roles. This interface enables managing system configurations across multiple versions of Red Hat Enterprise Linux, as well as adopting new major releases.
With Red Hat Enterprise Linux 7.4, the Red Hat Enterprise Linux System Roles packages are distributed through the Extras channel. For details regarding Red Hat Enterprise Linux System Roles, see https://access.redhat.com/articles/3050101.
Notes:
- Currently,
Ansibleis not a part of the Red Hat Enterprise Linux FIPS validation process. We hope to address this in future releases. Ansibleis being included as an unsupported runtime dependency. (BZ#1313263)
Chapter 48. Security Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
The tang-nagios and clevis-udisk2 subpackages available as a Technology Preview
The tang and clevis packages, which are part of the Red Hat Enterprise Linux Network Bound Disk Encryption (NBDE) project, contain also the tang-nagios and clevis-udisk2 subpackages. These subpackages are provided only as a Technology Preview. (BZ#1467338)
USBGuard is now available for IBM Power as a Technology Preview
The usbguard packages, which provide system protection against intrusive USB devices, are now available. With this update, the
USBGuard software framework for the IBM Power architectures is provided as a Technology Preview. Full support is targeted for a later release of Red Hat Enterprise Linux.
Note that USB is not supported on IBM z Systems, and the
USBGuard framework cannot be provided on those systems. (BZ#1467369)
Chapter 49. Storage Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
Multi-queue I/O scheduling for SCSI
Red Hat Enterprise Linux 7 includes a new multiple-queue I/O scheduling mechanism for block devices known as blk-mq. The scsi-mq package allows the Small Computer System Interface (SCSI) subsystem to make use of this new queuing mechanism. This functionality is provided as a Technology Preview and is not enabled by default. To enable it, add
scsi_mod.use_blk_mq=Y to the kernel command line.
Although blk-mq is intended to offer improved performance, particularly for low-latency devices, it is not guaranteed to always provide better performance. In particular, in some cases, enabling scsi-mq can result in significantly worse performance, especially on systems with many CPUs. (BZ#1109348)
Targetd plug-in from the libStorageMgmt API
Since Red Hat Enterprise Linux 7.1, storage array management with libStorageMgmt, a storage array independent API, has been fully supported. The provided API is stable, consistent, and allows developers to programmatically manage different storage arrays and utilize the hardware-accelerated features provided. System administrators can also use libStorageMgmt to manually configure storage and to automate storage management tasks with the included command-line interface.
The Targetd plug-in is not fully supported and remains a Technology Preview. (BZ#1119909)
Support for Data Integrity Field/Data Integrity Extension (DIF/DIX)
DIF/DIX is a new addition to the SCSI Standard. It is fully supported in Red Hat Enterprise Linux 7 for the HBAs and storage arrays specified in the Features chapter, but it remains in Technology Preview for all other HBAs and storage arrays.
DIF/DIX increases the size of the commonly used 512 byte disk block from 512 to 520 bytes, adding the Data Integrity Field (DIF). The DIF stores a checksum value for the data block that is calculated by the Host Bus Adapter (HBA) when a write occurs. The storage device then confirms the checksum on receipt, and stores both the data and the checksum. Conversely, when a read occurs, the checksum can be verified by the storage device, and by the receiving HBA. (BZ#1072107)
Chapter 50. Virtualization Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
USB 3.0 support for KVM guests
USB 3.0 host adapter (xHCI) emulation for KVM guests remains a Technology Preview in Red Hat Enterprise Linux 7.4. (BZ#1103193)
Select Intel network adapters now support SR-IOV as a guest on Hyper-V
In this update for Red Hat Enterprise Linux guest virtual machines running on Hyper-V, a new PCI passthrough driver adds the ability to use the single-root I/O virtualization (SR-IOV) feature for Intel network adapters supported by the ixgbevf driver. This ability is enabled when the following conditions are met:
- SR-IOV support is enabled for the network interface controller (NIC)
- SR-IOV support is enabled for the virtual NIC
- SR-IOV support is enabled for the virtual switch
The virtual function (VF) from the NIC is attached to the virtual machine.
The feature is currently supported with Microsoft Windows Server 2016. (BZ#1348508)
No-IOMMU mode for VFIO drivers
As a Technology Preview, this update adds No-IOMMU mode for virtual function I/O (VFIO) drivers. The No-IOMMU mode provides the user with full user-space I/O (UIO) access to a direct memory access (DMA)-capable device without a I/O memory management unit (IOMMU). Note that in addition to not being supported, using this mode is not secure due to the lack of I/O management provided by IOMMU. (BZ#1299662)
The ibmvnic Device Driver has been added
The
ibmvnic Device Driver was introduced as a Technology Preview in Red Hat Enterprise Linux 7.3 for IBM POWER architectures. vNIC (Virtual Network Interface Controller) is a new PowerVM virtual networking technology that delivers enterprise capabilities and simplifies network management. It is a high-performance, efficient technology that when combined with SR-IOV NIC provides bandwidth control Quality of Service (QoS) capabilities at the virtual NIC level. vNIC significantly reduces virtualization overhead, resulting in lower latencies and fewer server resources, including CPU and memory, required for network virtualization. (BZ#947163)
virt-v2v can now use vmx configuration files to convert VMware guests
As a Technology Preview, the
virt-v2v utility now includes the vmx input mode, which enables the user to convert a guest virtual machine from a VMware vmx configuration file. Note that to do this, you also need access to the corresponding VMware storage, for example by mounting the storage using NFS. (BZ#1441197)
virt-v2v can convert Debian and Ubuntu guests
As a technology preview, the
virt-v2v utility can now convert Debian and Ubuntu guest virtual machines. Note that the following problems currently occur when performing this conversion:
virt-v2vcannot change the default kernel in the GRUB2 configuration, and the kernel configured in the guest is not changed during the conversion, even if a more optimal version of the kernel is available on the guest.- After converting a Debian or Ubuntu VMware guest to KVM, the name of the guest's network interface may change, and thus requires manual configuration. (BZ#1387213)
Virtio devices can now use vIOMMU
As a Technology Preview, this update enables virtio devices to use virtual Input/Output Memory Management Unit (vIOMMU). This guarantees the security of Direct Memory Access (DMA) by allowing the device to DMA only to permitted addresses. However, note that only guest virtual machines using Red Hat Enterprise Linux 7.4 or later are able to use this feature. (BZ#1283251, BZ#1464891)
Open Virtual Machine Firmware
The Open Virtual Machine Firmware (OVMF) is available as a Technology Preview in Red Hat Enterprise Linux 7. OVMF is a UEFI secure boot environment for AMD64 and Intel 64 guests. However, OVMF is not bootable with virtualization components available in RHEL 7. Note that OVMF is fully supported in RHEL 8. (BZ#653382)
Part IV. Device Drivers Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
This part provides a comprehensive listing of all device drivers that are new or have been updated in Red Hat Enterprise Linux 7.4.
Chapter 51. New Drivers Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
Storage Drivers
- nvme-fabrics
- nvme-rdma
- nvmet
- nvmet-rdma
- nvme-loop
- qedi
- qedf
Network Drivers
- qedr
- rdma_rxe
- ntb_transport
- ntb_perf
- mdev
- vfio_mdev
- amd-xgbe
- atlantic
- libcxgb
- ena
- rocker
- amd8111e
- nfp
- mlxsw_core
- mlxsw_i2c
- mlxsw_spectrum
- mlxsw_pci
- mlxsw_switchx2
- mlxsw_switchib
- mlxsw_minimal
Graphics Drivers and Miscellaneous Drivers
- ccp
- chcr
- uio_hv_generic
- usbip-core
- vhost_vsock
- tpm_tis_spi
- gpio-amdpt
- joydev
- sdio_uart
- ptp_kvm
- mei_wdt
- dell-rbtn
- dell-smo8800
- intel-hid
- dell-smbios
- skx_edac
- kvmgt
- pinctrl-intel
- pinctrl-sunrisepoint
- pinctrl-amd
- dax_pmem
- dax
- nfit
- ledtrig-usbport
Chapter 52. Updated Drivers Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
Storage Driver Updates
- The aacraid driver has been updated to version 1.2.1[50792]-custom.
- The lpfc driver has been updated to version 0:11.2.0.6.
- The vmw_pvscsi driver has been updated to version 1.0.7.0-k.
- The megaraid_sas driver has been updated to version 07.701.17.00-rh1.
- The bfa driver has been updated to version 3.2.25.1.
- The hpsa driver has been updated to version 3.4.18-0-RH1.
- The be2iscsi driver has been updated to version 11.2.1.0.
- The qla2xxx driver has been updated to version 8.07.00.38.07.4-k1.
- The mpt2sas driver has been updated to version 20.103.00.00.
- The mpt3sas driver has been updated to version 15.100.00.00.
Network Driver Updates
- The ntb driver has been updated to version 1.0.
- The igbvf driver has been updated to version 2.4.0-k.
- The igb driver has been updated to version 5.4.0-k.
- The ixgbevf driver has been updated to version 3.2.2-k-rh7.4.
- The i40e driver has been updated to version 1.6.27-k.
- The fm10k driver has been updated to version 0.21.2-k.
- The i40evf driver has been updated to version 1.6.27-k.
- The ixgbe driver has been updated to version 4.4.0-k-rh7.4.
- The be2net driver has been updated to version 11.1.0.0r.
- The qede driver has been updated to version 8.10.10.21.
- The qlge driver has been updated to version 1.00.00.35.
- The qed driver has been updated to version 8.10.10.21.
- The bna driver has been updated to version 3.2.25.1r.
- The bnxt driver has been updated to version 1.7.0.
- The enic driver has been updated to version 2.3.0.31.
- The fjes driver has been updated to version 1.2.
- The hpwdt driver has been updated to version 1.4.02.
Graphics Driver and Miscellaneous Driver Updates
- The vmwgfx driver has been updated to version 2.12.0.0.
- The hpilo driver has been updated to version 1.5.0.
Part V. Deprecated Functionality Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
This part provides an overview of functionality that has been deprecated in all minor releases up to Red Hat Enterprise Linux 7.4.
Deprecated functionality continues to be supported until the end of life of Red Hat Enterprise Linux 7. Deprecated functionality will likely not be supported in future major releases of this product and is not recommended for new deployments. For the most recent list of deprecated functionality within a particular major release, refer to the latest version of release documentation.
Deprecated hardware components are not recommended for new deployments on the current or future major releases. Hardware driver updates are limited to security and critical fixes only. Red Hat recommends replacing this hardware as soon as reasonably feasible.
A package can be deprecated and not recommended for further use. Under certain circumstances, a package can be removed from a product. Product documentation then identifies more recent packages that offer functionality similar, identical, or more advanced to the one deprecated, and provides further recommendations.
Chapter 53. Deprecated Functionality in Red Hat Enterprise Linux 7 Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
Deprecated packages related to Identity Management
The following packages are deprecated and will not be included in a future major release of Red Hat Enterprise Linux:
| Deprecated Packages | Proposed Replacement Package or Product |
|---|---|
| authconfig | authselect |
| pam_pkcs11 | sssd [a] |
| pam_krb5 | sssd [b] |
| openldap-servers | Depending on the use case, migrate to Identity Management included in Red Hat Enterprise Linux or to Red Hat Directory Server. [c] |
[a]
System Security Services Daemon (SSSD) contains enhanced smart card functionality.
[b]
For details on migrating from pam_krb5 to sssd, see How to migrate from pam_krb5 to SSSD Knowledgebase article on the Red Hat Customer Portal.
[c]
Red Hat Directory Server requires a valid Directory Server subscription.
| |
Deprecated Insecure Algorithms and Protocols
Algorithms that provide cryptographic hashes and encryption as well as cryptographic protocols have a lifetime after which they are considered either too risky to use or plain insecure. See the Enhancing the Security of the Operating System with Cryptography Changes in Red Hat Enterprise Linux 7.4 Knowledgebase article on the Red Hat Customer Portal for more information.
- Weak ciphers and algorithms are no longer used by default in
OpenSSH - With this update, the
OpenSSHlibrary removes several weak ciphers and algorithms from default configurations. However, backward compatibility is ensured in most cases.The following have been removed from theOpenSSHserver and client:- Host key algorithms:
- ssh-rsa-cert-v00@openssh.com
- ssh-dss-cert-v00@openssh.com
- Ciphers:
- arcfour256
- arcfour128
- arcfour
- rijndael-cbc@lysator.liu.se
- MACs:
- hmac-md5
- hmac-md5-96
- hmac-md5-96-etm@openssh.com
- hmac-md5-etm@openssh.com
- hmac-ripemd160
- hmac-ripemd160-etm@openssh.com
- hmac-ripemd160@openssh.com
- hmac-sha1-96
- hmac-sha1-96-etm@openssh.com
The following have been removed from theOpenSSHclient:- Ciphers:
- blowfish-cbc
- cast128-cbc
- 3des-cbc
OpenSSHno longer uses the SHA-1-based key exchange algorithms in FIPS mode- This update removes the SHA-1-based key exchange algorithms from the default list in FIPS mode. To enable those algorithms, use the following configuration snippet for the
~/.ssh/configand/etc/ssh/sshd_configfiles:KexAlgorithms=+diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1
KexAlgorithms=+diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1Copy to Clipboard Copied! Toggle word wrap Toggle overflow - The SSH-1 protocol has been removed from the
OpenSSHserver - SSH-1 protocol support has been removed from the
OpenSSHserver. For more information, see the The server-side SSH-1 protocol removal from RHEL 7.4 Knowledgebase article. - MD5, MD4, and SHA0 can no longer be used as signing algorithms in
OpenSSL - With this update, support for verification of MD5, MD4, and SHA0 signatures in certificates, Certificate Revocation Lists (CRL) and message signatures has been removed.Additionally, the default algorithm for generating digital signatures has been changed from SHA-1 to SHA-256. The verification of SHA-1 signatures is still enabled for legacy purposes.The system administrator can enable MD5, MD4, or SHA0 support by modifying the
LegacySigningMDsoption in theetc/pki/tls/legacy-settingspolicy configuration file, for example:echo 'LegacySigningMDs algorithm' >> /etc/pki/tls/legacy-settings
echo 'LegacySigningMDs algorithm' >> /etc/pki/tls/legacy-settingsCopy to Clipboard Copied! Toggle word wrap Toggle overflow To add more than one legacy algorithm, use a comma or any whitespace character except for a new line. See theREADME.legacy-settingsfile in theOpenSSLpackage for more information.You can also enable MD5 verification by setting theOPENSSL_ENABLE_MD5_VERIFYenvironment variable. OpenSSLclients no longer allow connections to servers with DH shorter than 1024 bits- This update prevents
OpenSSLclients from connecting to servers with Diffie-Hellman (DH) parameters shorter than 1024 bits. This ensures that clients usingOpenSSLare not susceptible to vulnerabilities, such as Logjam.The system administrator can enable shorter DH parameter support by modifying theMinimumDHBitsoption in the/etc/pki/tls/legacy-settings, for example:echo 'MinimumDHBits 768' > /etc/pki/tls/legacy-settings
echo 'MinimumDHBits 768' > /etc/pki/tls/legacy-settingsCopy to Clipboard Copied! Toggle word wrap Toggle overflow This option can also be used to raise the minimum if required by the system administrator. - SSL 2.0 support has been completely removed from
OpenSSL - The SSL protocol version 2.0, which is considered insecure for more than seven years, was deprecated by RFC 6176 in 2011. In Red Hat Enterprise Linux, support of SSL 2.0 was already disabled by default. With this update, SSL 2.0 support has been removed completely. The
OpenSSLlibrary API calls that use this protocol version now return an error message. - EXPORT cipher suites in
OpenSSLhave been deprecated - This change removes support for EXPORT cipher suites from the
OpenSSLtoolkit. Disabling these weak cipher suites ensures that clients usingOpenSSLare not susceptible to vulnerabilities, such as FREAK. EXPORT cipher suites are no longer required in anyTLSprotocol configurations. GnuTLSclients no longer allow connections to servers with DH shorter than 1024 bits- This change prevents GNU Transport Layer Security (GnuTLS) clients from connecting to servers with Diffie-Hellman (DH) parameters shorter than 1024 bits. This ensures that clients using
GnuTLSare not susceptible to vulnerabilities, such as Logjam.In applications that accept a priority string from the user or configuration directly, this change can be reverted by appending the priority string%PROFILE_VERY_WEAKto the used priority string. NSSclients usingTLSno longer allow connections to servers with DH shorter than 1024 bits- This change prevents Network Security Services (NSS) clients from connecting to servers with Diffie-Hellman (DH) parameters shorter than 1024 bits. This ensures that clients using
NSSare not susceptible to vulnerabilities, such as Logjam.The system administrator can enable shorter DH parameter support by modifying the/etc/pki/nss-legacy/nss-rhel7.configpolicy configuration file to:Copy to Clipboard Copied! Toggle word wrap Toggle overflow Note that an empty line is required at the end of the file. - EXPORT cipher suites in
NSShave been deprecated - This change removes support for EXPORT cipher suites in the Network Security Services (NSS) library. Disabling these weak cipher suites protects against vulnerabilities, such as FREAK. EXPORT cipher suites are not required in any
TLSprotocol configuration.
Legacy CA certificates removed from the ca-certificates package
Previously, to allow older versions of the
GnuTLS, OpenSSL, and glib-networking libraries to remain compatible with the Public Key Infrastructure (PKI), the ca-certificates package included a set of legacy CA certificates with 1024-bit RSA keys as trusted by default.
Since Red Hat Enterprise Linux 7.4, updated versions of
OpenSSL, GnuTLS, and glib-networking are available, which are able to correctly identify a replacement of root CA certificates. Trusting these legacy CA certificates is no longer required for public web PKI compatibility.
The legacy configuration mechanism, which could previously be used to disable the legacy CA certificates, is no longer supported; the list of legacy CA certificates has been changed to empty.
The ca-legacy tool is still available and it also keeps current configuration settings for potential future reuse.
coolkey replaced with opensc
The
OpenSC library implements the PKCS#11 API and replaces the coolkey packages. In Red Hat Enterprise Linux 7, the CoolKey Applet functionality is also provided by the opensc package.
The coolkey package will remain supported for the lifetime of Red Hat Enterprise Linux 7, but new hardware enablement will be provided through the opensc package.
The inputname option of the rsyslog imudp module has been deprecated
The
inputname option of the imudp module for the rsyslog service has been deprecated. Use the name option instead.
FedFS has been deprecated
Federated File System (FedFS) has been deprecated because the upstream FedFS project is no longer being actively maintained. Red Hat recommends migrating FedFS installations to use
autofs, which provides more flexible functionality.
Btrfs has been deprecated
The
Btrfs file system has been in Technology Preview state since the initial release of Red Hat Enterprise Linux 6. Red Hat will not be moving Btrfs to a fully supported feature and it will be removed in a future major release of Red Hat Enterprise Linux.
The
Btrfs file system did receive numerous updates from the upstream in Red Hat Enterprise Linux 7.4 and will remain available in the Red Hat Enterprise Linux 7 series. However, this is the last planned update to this feature.
tcp_wrappers deprecated
The tcp_wrappers package, which provides a library and a small daemon program that can monitor and filter incoming requests for
systat, finger, FTP, telnet, rlogin, rsh, exec, tftp, talk, sshd, and other network services, has been deprecated.
nautilus-open-terminal replaced with gnome-terminal-nautilus
Since Red Hat Enterprise Linux 7.3, the nautilus-open-terminal package has been deprecated and replaced with the gnome-terminal-nautilus package. This package provides a Nautilus extension that adds the option to the right-click context menu in Nautilus. nautilus-open-terminal is replaced by gnome-terminal-nautilus during the system upgrade.
sslwrap() removed from Python
The
sslwrap() function has been removed from Python 2.7. After the 466 Python Enhancement Proposal was implemented, using this function resulted in a segmentation fault. The removal is consistent with upstream.
Red Hat recommends using the
ssl.SSLContext class and the ssl.SSLContext.wrap_socket() function instead. Most applications can simply use the ssl.create_default_context() function, which creates a context with secure default settings. The default context uses the system's default trust store, too.
Symbols from libraries linked as dependencies no longer resolved by ld
Previously, the
ld linker resolved any symbols present in any linked library, even if some libraries were linked only implicitly as dependencies of other libraries. This allowed developers to use symbols from the implicitly linked libraries in application code and omit explicitly specifying these libraries for linking.
For security reasons,
ld has been changed to not resolve references to symbols in libraries linked implicitly as dependencies.
As a result, linking with
ld fails when application code attempts to use symbols from libraries not declared for linking and linked only implicitly as dependencies. To use symbols from libraries linked as dependencies, developers must explicitly link against these libraries as well.
To restore the previous behavior of
ld, use the -copy-dt-needed-entries command-line option. (BZ#1292230)
Windows guest virtual machine support limited
As of Red Hat Enterprise Linux 7, Windows guest virtual machines are supported only under specific subscription programs, such as Advanced Mission Critical (AMC).
libnetlink is deprecated
The
libnetlink library contained in the iproute-devel package has been deprecated. The user should use the libnl and libmnl libraries instead.
S3 and S4 power management states for KVM have been deprecated
Native KVM support for the S3 (suspend to RAM) and S4 (suspend to disk) power management states has been discontinued. This feature was previously available as a Technology Preview.
The Certificate Server plug-in udnPwdDirAuth is discontinued
The
udnPwdDirAuth authentication plug-in for the Red Hat Certificate Server was removed in Red Hat Enterprise Linux 7.3. Profiles using the plug-in are no longer supported. Certificates created with a profile using the udnPwdDirAuth plug-in are still valid if they have been approved.
Red Hat Access plug-in for IdM is discontinued
The Red Hat Access plug-in for Identity Management (IdM) was removed in Red Hat Enterprise Linux 7.3. During the update, the redhat-access-plugin-ipa package is automatically uninstalled. Features previously provided by the plug-in, such as Knowledgebase access and support case engagement, are still available through the Red Hat Customer Portal. Red Hat recommends to explore alternatives, such as the
redhat-support-tool tool.
The Ipsilon identity provider service for federated single sign-on
The ipsilon packages were introduced as Technology Preview in Red Hat Enterprise Linux 7.2. Ipsilon links authentication providers and applications or utilities to allow for single sign-on (SSO).
Red Hat does not plan to upgrade Ipsilon from Technology Preview to a fully supported feature. The ipsilon packages will be removed from Red Hat Enterprise Linux in a future minor release.
Red Hat has released Red Hat Single Sign-On as a web SSO solution based on the Keycloak community project. Red Hat Single Sign-On provides greater capabilities than Ipsilon and is designated as the standard web SSO solution across the Red Hat product portfolio.
Several rsyslog options deprecated
The
rsyslog utility version in Red Hat Enterprise Linux 7.4 has deprecated a large number of options. These options no longer have any effect and cause a warning to be displayed.
- The functionality previously provided by the options
-c,-u,-q,-x,-A,-Q,-4, and-6can be achieved using thersyslogconfiguration. - There is no replacement for the functionality previously provided by the options
-land-s
Deprecated symbols from the memkind library
The following symbols from the
memkind library have been deprecated:
memkind_finalize()memkind_get_num_kind()memkind_get_kind_by_partition()memkind_get_kind_by_name()memkind_partition_mmap()memkind_get_size()MEMKIND_ERROR_MEMALIGNMEMKIND_ERROR_MALLCTLMEMKIND_ERROR_GETCPUMEMKIND_ERROR_PMTTMEMKIND_ERROR_TIEDISTANCEMEMKIND_ERROR_ALIGNMENTMEMKIND_ERROR_MALLOCXMEMKIND_ERROR_REPNAMEMEMKIND_ERROR_PTHREADMEMKIND_ERROR_BADPOLICYMEMKIND_ERROR_REPPOLICY
Options of Sockets API Extensions for SCTP (RFC 6458) deprecated
The options
SCTP_SNDRCV, SCTP_EXTRCV and SCTP_DEFAULT_SEND_PARAM of Sockets API Extensions for the Stream Control Transmission Protocol have been deprecated per the RFC 6458 specification.
New options
SCTP_SNDINFO, SCTP_NXTINFO, SCTP_NXTINFO and SCTP_DEFAULT_SNDINFO have been implemented as a replacement for the deprecated options.
Managing NetApp ONTAP using SSLv2 and SSLv3 is no longer supported by libstorageMgmt
The SSLv2 and SSLv3 connections to the NetApp ONTAP storage array are no longer supported by the
libstorageMgmt library. Users can contact NetApp support to enable the Transport Layer Security (TLS) protocol.
dconf-dbus-1 has been deprecated and dconf-editor is now delivered separately
With this update, the
dconf-dbus-1 API has been removed. However, the dconf-dbus-1 library has been backported to preserve binary compatibility. Red Hat recommends using the GDBus library instead of dconf-dbus-1.
The
dconf-error.h file has been renamed to dconf-enums.h. In addition, the dconf Editor is now delivered in the separate dconf-editor package; see Chapter 8, Desktop for more information.
FreeRADIUS no longer accepts Auth-Type := System
The
FreeRADIUS server no longer accepts the Auth-Type := System option for the rlm_unix authentication module. This option has been replaced by the use of the unix module in the authorize section of the configuration file.
Deprecated Device Drivers
- 3w-9xxx
- 3w-sas
- mptbase
- mptctl
- mptsas
- mptscsih
- mptspi
- mvsas
- qla3xxx
- The following controllers from the
megaraid_sasdriver have been deprecated:- Dell PERC5, PCI ID 0x15
- SAS1078R, PCI ID 0x60
- SAS1078DE, PCI ID 0x7C
- SAS1064R, PCI ID 0x411
- VERDE_ZCR, PCI ID 0x413
- SAS1078GEN2, PCI ID 0x78
- The following adapters from the
qla2xxxdriver have been deprecated:- ISP24xx, PCI ID 0x2422
- ISP24xx, PCI ID 0x2432
- ISP2422, PCI ID 0x5422
- QLE220, PCI ID 0x5432
- QLE81xx, PCI ID 0x8001
- QLE10000, PCI ID 0xF000
- QLE84xx, PCI ID 0x8044
- QLE8000, PCI ID 0x8432
- QLE82xx, PCI ID 0x8021
- The following Ethernet adapter controlled by the
be2netdriver has been deprecated:- TIGERSHARK NIC, PCI ID 0x0700
- The following controllers from the
be2iscsidriver have been deprecated:- Emulex OneConnect 10Gb iSCSI Initiator (generic), PCI ID 0x212
- OCe10101, OCm10101, OCe10102, OCm10102 BE2 adapter family, PCI ID 0x702
- OCe10100 BE2 adapter family, PCI ID 0x703
- The following Emulex boards from the
lpfcdriver have been deprecated:BladeEngine 2 (BE2) Devices
- TIGERSHARK FCOE, PCI ID 0x0704
Fibre Channel (FC) Devices
- FIREFLY, PCI ID 0x1ae5
- PROTEUS_VF, PCI ID 0xe100
- BALIUS, PCI ID 0xe131
- PROTEUS_PF, PCI ID 0xe180
- RFLY, PCI ID 0xf095
- PFLY, PCI ID 0xf098
- LP101, PCI ID 0xf0a1
- TFLY, PCI ID 0xf0a5
- BSMB, PCI ID 0xf0d1
- BMID, PCI ID 0xf0d5
- ZSMB, PCI ID 0xf0e1
- ZMID, PCI ID 0xf0e5
- NEPTUNE, PCI ID 0xf0f5
- NEPTUNE_SCSP, PCI ID 0xf0f6
- NEPTUNE_DCSP, PCI ID 0xf0f7
- FALCON, PCI ID 0xf180
- SUPERFLY, PCI ID 0xf700
- DRAGONFLY, PCI ID 0xf800
- CENTAUR, PCI ID 0xf900
- PEGASUS, PCI ID 0xf980
- THOR, PCI ID 0xfa00
- VIPER, PCI ID 0xfb00
- LP10000S, PCI ID 0xfc00
- LP11000S, PCI ID 0xfc10
- LPE11000S, PCI ID 0xfc20
- PROTEUS_S, PCI ID 0xfc50
- HELIOS, PCI ID 0xfd00
- HELIOS_SCSP, PCI ID 0xfd11
- HELIOS_DCSP, PCI ID 0xfd12
- ZEPHYR, PCI ID 0xfe00
- HORNET, PCI ID 0xfe05
- ZEPHYR_SCSP, PCI ID 0xfe11
- ZEPHYR_DCSP, PCI ID 0xfe12
To check the PCI IDs of the hardware on your system, run the
lspci -nn command.
Note that other controllers from the mentioned drivers that are not listed here remain unchanged.
SFN4XXX adapters have been deprecated
Starting with Red Hat Enterprise Linux 7.4, SFN4XXX Solarflare network adapters have been deprecated. Previously, Solarflare had a single driver
sfc for all adapters. Recently, support of SFN4XXX was split from sfc and moved into a new SFN4XXX-only driver, called sfc-falcon. Both drivers continue to be supported at this time, but sfc-falcon and SFN4XXX support is scheduled for removal in a future major release.
Software initiated only FCoE storage technologies have been deprecated
The software initiated only portion of Fibre Channel over Ethernet (FCoE) storage technology has been deprecated due to limited customer adoption. The software initiated only storage technology will remain supported for the life of Red Hat Enterprise Linux 7. The deprecation notice indicates the intention to remove software-initiated-based FCoE support in a future major release of Red Hat Enterprise Linux. It is important to note that the hardware support and the associated userspace tools (such as drivers,
libfc, or libfcoe) are unaffected by this deprecation notice.
Containers using the libvirt-lxc tooling have been deprecated
The following libvirt-lxc packages are deprecated since Red Hat Enterprise Linux 7.1:
- libvirt-daemon-driver-lxc
- libvirt-daemon-lxc
- libvirt-login-shell
Future development on the Linux containers framework is now based on the docker command-line interface. libvirt-lxc tooling may be removed in a future release of Red Hat Enterprise Linux (including Red Hat Enterprise Linux 7) and should not be relied upon for developing custom container management applications.
For more information, see the Red Hat KnowledgeBase article.
Part VI. Known Issues Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
This part documents known problems in Red Hat Enterprise Linux 7.4.
Chapter 54. Authentication and Interoperability Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
sudo unexpectedly denies access when performing group lookups
This problem occurs on systems that meet all of these conditions:
- A group name is configured in a
sudoersrule available through multiple Name Service Switch (NSS) sources, such asfilesorsss. - The NSS priority is set to local group definitions. This is true when the
/etc/nsswitch.conffile includes the following line:
sudoers: files sss
sudoers: files sss
- The
sudoDefaults option namedmatch_group_by_gidis set totrue. This is the default value for the option.
Because of the NSS source priority, when the
sudo utility tries to look up the GID of the specified group, sudo receives a result that describes only the local group definition. Therefore, if the user is a member of the remote group, but not the local group, the sudoers rule does not match, and sudo denies access.
To work around this problem, choose one of the following:
- Explicitly disable the
match_group_by_gidDefaults forsudoers. Open the/etc/sudoersfile, and add this line:
Defaults !match_group_by_gid
Defaults !match_group_by_gid
- Configure NSS to prioritize the
sssNSS source overfiles. Open the/etc/nsswitch.conffile, and make sure it listssssbeforefiles:
sudoers: sss files
sudoers: sss files
This ensures that
sudo permits access to users that belong to the remote group. (BZ#1293306)
The KCM credential cache is not suitable for a large number of credentials in a single credential cache
If the credential cache contains too many credentials, Kerberos operations, such as
klist, fail due to a hardcoded limit on the buffer used to transfer data between the sssd-kcm component and the sssd-secrets component.
To work around this problem, add the
ccache_storage = memory option in the [kcm] section of the /etc/sssd/sssd.conf file. This instructs the kcm responder to only store the credential caches in-memory, not persistently. Note that if you do this, restarting the system or sssd-kcm clears the credential caches. (BZ#1448094)
The sssd-secrets component crashes when it is under load
When the
sssd-secrets component receives many requests, the situation triggers a bug in the Network Security Services (NSS) library that causes sssd-secrets to terminate unexpectedly. However, the systemd service restarts sssd-secrets for the next request, which means that the denial of service is only temporary. (BZ#1460689)
SSSD does not correctly handle multiple certificate matching rules with the same priority
If a given certificate matches multiple certificate matching rules with the same priority, the System Security Services Daemon (SSSD) uses only one of the rules. As a workaround, use a single certificate matching rule whose LDAP filter consists of the filters of the individual rules concatenated with the
| (or) operator. For examples of certificate matching rules, see the sss-certamp(5) man page. (BZ#1447945)
SSSD can look up only unique certificates in ID overrides
When multiple ID overrides contain the same certificate, the System Security Services Daemon (SSSD) is unable to resolve queries for the users that match the certificate. An attempt to look up these users does not return any user. Note that looking up users by using their user name or UID works as expected. (BZ#1446101)
The ipa-advise command does not fully configure smart card authentication
The
ipa-advise config-server-for-smart-card-auth and ipa-advise config-client-for-smart-card-auth commands do not fully configure the Identity Management (IdM) server and client for smart card authentication. As a consequence, after running the script that the ipa-advise command generated, smart card authentication fails. To work around the problem, see the manual steps for the individual use case in the Linux Domain Identity, Authentication, and Policy Guide: https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/Linux_Domain_Identity_Authentication_and_Policy_Guide/smart-cards.html (BZ#1455946)
The libwbclient library fails to connect to Samba shares hosted on Red Hat Enterprise Linux 7.4
The interface between Samba and the System Security Services Daemon's (SSSD) Winbind plug-in implementation changed. However, this change is missing in SSSD. As a consequence, systems that use the SSSD
libwbclient library instead of the Winbind daemon fail to access shares provided by Samba running on Red Hat Enterprise Linux 7.4. There is no workaround available, and Red Hat recommends to not upgrade to Red Hat Enterprise 7.4 if you are using the libwbclient library without running the Winbind daemon. (BZ#1462769)
Certificate System ubsystems experience communication problems with TLS_ECDHE_RSA_* ciphers and certain HSMs
When certain HSMs are used while
TLS_ECDHE_RSA_* ciphers are enabled, subsystems experience communication problems. The issue occurs in the following scenarios:
- When a CA has been installed and a second subsystem is being installed and tries to contact the CA as a security domain, thus preventing the installation from succeeding.
- While performing a certificate enrollment on the CA, when archival is required, the CA encounters the same communication problem with the KRA. This scenario can only occur if the offending ciphers were temporarily disabled for the installation.
To work around this problem, keep the
TLS_ECDHE_RSA_* ciphers turned off if possible. Note that while the Perfect Forward Secrecy provides added security by using the TLS_ECDHE_RSA_* ciphers, each SSL session takes about three times longer to establish. Also, the default TLS_RSA_* ciphers are adequate for the Certificate System operations. (BZ#1256901)
Chapter 55. Compiler and Tools Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
Performance of regular expressions cannot be boosted with the JIT technique if executable stack is disabled
When the
SELinux policy disallows executable stack, the PCRE library cannot use JIT compilation to speed up regular expressions. As a result, attempting JIT compilation for regular expressions is ignored and their performance is not boosted.
To work around this problem, amend the
SELinux policy with a rule for enabling the execmem action on affected SELinux domains to enable JIT compilation. Some of the rules are already provided and can be enabled by specific SELinux booleans. To list these booleans, see the output of the following command:
getsebool -a | grep execmem
getsebool -a | grep execmem
An alternative workaround is changing application code to not request JIT compilation with calls to the
pcre_study() function. (BZ#1290432)
Memory leaks occur when certain applications fail to exit after unloading the Gluster libraries
Gluster consists of many internal components and different translators that implement functions and features. The
gfapi access method was added to integrate Gluster tightly with applications. However, not all components and translators are designed to be unloaded in running applications. As a consequence, programs that do not exit after unloading the Gluster libraries are unable to release some of the memory allocations that are performed internally by Gluster.
To reduce the amount of memory leaks, prevent applications from calling the
glfs_init() and glfs_fini() functions whenever possible. To release the leaked memory, you must restart long-running applications. (BZ#1409773)
URL to DISA SRGs is incorrect
The SCAP Security Guide (SSG) rules refer to Defense Information Systems Agency Security Requirement Guides (DISA SRGs). Connecting to the URL fails with an
404 - not found error. As a consequence, users have no direct reference to SRGs. (BZ#1464899)
The ensure_gpgcheck_repo_metadata rule fails
During remediation of the
ensure_gpgcheck_repo_metadata rule, certain profiles update the yum.conf file to enable the repo_gpgcheck option. Red Hat does not currently provide signed repository metadata. As a consequence, the yum utility is no longer able to install any package from official repositories. To work around the problem, use a tailoring file to remove ensure_gpgcheck_repo_metadata from the profile. If remediation already breaks the system, update yum.conf and set repo_gpgcheck to 0. (BZ#1465677)
The SSG pam_faillock module utilization check incorrectly accepts default=die
The SCAP Security Guide (SSG) pam_faillock module utilization check incorrectly accepts the
default=die option. Consequently, when a user authentication using the pam_unix module fails, the pam stack evaluation stops immediately without incrementing the counter of pam_faillock. To work around this problem, do not use default=die before the authfail option. This ensures that the pam_faillock counter is incremented properly. (BZ#1448952)
Chapter 56. Desktop Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
Updating totem alone fails
Explicit dependency between the totem and gstreamer1-plugins-bad-free packages is missing. Consequently, when trying to update just the totem package, the operation fails. To work around this problem, do not update the totem package by itself and rely on the system update instead. (BZ#1451211)
The operating system always assumes Wacom Expresskeys Remote mode 1 when booting
The Wacom Expresskeys Remote (EKR) is a standalone device and thus can be switched to any operating mode when the operating system (OS) boots. Currently, however, the OS always assumes that the EKR is set to mode 1 upon boot. Consequently, the EKR is not synchronized with the OS when the EKR mode was not set to 1 prior to system boot. To work around this problem, set the EKR to mode 1 before starting the OS. (BZ#1458351)
Cannot install downloaded RPM files from Nautilus
When an RPM file is double clicked in the
Nautilus file manger, the following error is returned instead of the file being installed:
Sorry, this did not work, File is not supported
Sorry, this did not work, File is not supported
This happens because the
yum backend to PackageKit does not support getting details about local files.
This problem can be worked around by either installing gnome-packagekit to handle the double-click action or by manually installing the files using
yum. (BZ#1434477)
Yelp does not correctly display HTML formatted files
In earlier versions of
yelp, HTML formatted files could be displayed. With version 3.22, this functionality no longer works, returning an Unknown Error with the qualifying text URL cannot be shown.
There is no workaround at this time, as the problem may be related to architectural changes in
yelp itself.
System administrators should note that
yelp does not support this use case and expects Mallard or Docbook data as input.
Alternative methods for displaying HTML formatted content should be considered. (BZ#1443179)
Automatic modesetting fails when attaching monitors with some AMD hardware
With some configurations, adding an additional monitor to a system using AMD hardware can fail to activate the new hardware automatically.
The problem is currently under investigation.
To workaround the issue, system administrators should manually call xrandr(1) to enable the monitor. (BZ#1393951)
Gnome Documents can not display some documents when installed without LibreOffice due to a missing dependency
Gnome Documents uses libraries provided by the LibreOffice suite for rendering certain types of documents, such as OpenDocument Text or Open Office XML formats. However, the required libraries (libreoffice-filters) are missing from the dependency list of the gnome-documents package. Therefore, if you install Gnome Documents on a system that does not have LibreOffice, the aforementioned document types can not be rendered.
To work around this problem, install libreoffice-filters package manually, even if you do not plan to use LibreOffice itself. (BZ#1466164)
Application Installer displays packages even though they can not be installed on big endian architectures
When you use the
Application Installer graphical package installer (the gnome-software package) on a big-endian system such as IBM Power Systems or IBM z Systems, some of the packages listed as available will not be possible to install, and an attempt to do so results in an installing not available error message. This is a known issue caused by package metadata currently being generated only for 64-bit AMD and Intel-compatible (little-endian) systems, and assuming all packages are also available on big-endian architectures, which is not the case.
There is no workaround to this problem; however, the error message has no consequences other than the package not being installable. (BZ#1464139)
The Add/Remove Software tool (gpk-application) does not use a newly imported key on the first try
When using the
Add/Remove Software graphical interface in GNOME to install a package signed by a key that was not already imported, the tool displays a prompt allowing you to import the key. However, even if the key is imported, the installation is still unsuccessful due to a bug that prevents using the key immediately. To work around the problem, install the same package again; at that point the key is already imported from the previous attempt, and the installation succeeds. (BZ#1387181)
Resizing a display of a virtual machine with multiple displays using multiple PCI devices causes X to crash
A bug in the
QXL driver (xorg-x11-drv-qxl) causes the X.Org display server on a virtual machine to crash upon display resize if the virtual machine has multiple displays configured to use multiple PCI devices. Make sure guest virtual machines running Red Hat Enterprise Linux with multiple monitors are configured to use a single PCI device. In Red Hat Virtualization, this setting is controlled by the Single PCI Device check box under Edit -> Console, and is enabled by default. (BZ#1428340)
Nautilus does not hide icons in the GNOME Classic Session
The GNOME Tweak Tool to show or hide icons in the gnome session, where the icons are hidden by default, is ignored in the GNOME Classic Session. As a result, it is not possible to hide icons in the GNOME Classic Session even though the GNOME Tweak Tool displays this option. (BZ#1474852)
Incorrect dependency in flatpak
Due to a wrong dependency in the flatpak package, the user can encounter the following error:
flatpak: error while loading shared libraries: libostree-1.so.1: cannot open shared object file: No such file or directory
flatpak: error while loading shared libraries: libostree-1.so.1: cannot open shared object file: No such file or directory
To work around this problem, install the flatpak-libs package. Alternatively, instead of initially installing just flatpak, install both of the packages by running:
sudo yum -y install flatpak flatpak-libs
sudo yum -y install flatpak flatpak-libs
(BZ#1476905)
Firefox does not start after update
After the upgrade to firefox-52.1.2-.el7.x86_64 and further, the browser does not start in some cases. This is due to the nspr and nss packages not being updated from the Red Hat Enterprise Linux 7.4 batch. To work around this problem, update the nspr and nss packages from Red Hat Enterprise 7.4 release. Another possible workaround is to downgrade Firefox, but this option is not recommended. As a result, it is possible to start the Firefox web browser again. (BZ#1455798)
Limited support for visuals in Xorg
In the Xorg server, only TrueColor and DirectColor visuals at depth 16 or higher are supported for hardware drivers. Legacy applications that need a PseudoColor visual can be run against the Xephyr nested X server, which implements PseudoColor translation when displayed on a TrueColor screen. (BZ#1185690)
Chapter 57. File Systems Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
NetApp storage appliances serving NFSv4 are advised to check their configuration
Note that features can be enabled or disabled on a per-minor version basis when using NetApp storage appliances that serve NFSv4.
It is recommended to verify the configuration to ensure that the appropriate features are enabled as desired, for example by using the following Data ONTAP command:
vserver nfs show -vserver <vserver-name> -fields v4.0-acl,v4.0-read-delegation,v4.0-write-delegation,v4.0-referrals,v4.0-migration,v4.1-referrals,v4.1-migration,v4.1-acl,v4.1-read-delegation,v4.1-write-delegation
vserver nfs show -vserver <vserver-name> -fields v4.0-acl,v4.0-read-delegation,v4.0-write-delegation,v4.0-referrals,v4.0-migration,v4.1-referrals,v4.1-migration,v4.1-acl,v4.1-read-delegation,v4.1-write-delegation
(BZ#1450447)
Chapter 58. Hardware Enablement Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
The i40e driver rejects the most general HWTSTAMP filter
Because of disabling L4 timestamping (UDP) in the security fix for Intel Ethernet Controller X710 and XL710 family described in the INTEL-SA-00063 advisory, the i40e device driver rejects the most general HWTSTAMP filter. This problem only affects the Intel X710 devices, not the newer X722 device. (BZ#1431964)
Chapter 59. Installation and Booting Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
FIPS mode unsupported when installing from an HTTPS kickstart source
Installation images do not support FIPS mode during installation with an HTTPS kickstart source. As a consequence, it is currently impossible to to install a system with the
fips=1 and inst.ks=https://<location>/ks.cfg options added to the command line. (BZ#1341280)
PXE boot with UEFI and IPv6 displays the GRUB2 shell instead of the operating system selection menu
When the
Pre-Boot Execution Environment (PXE) starts on a client configured with UEFI and IPv6, the boot menu configured in the /boot/grub/grub.cfg file is not displayed. After a timeout, the GRUB2 shell is displayed instead of the configured operating system selection menu. (BZ#1154226)
Specifying a driverdisk partition with non-alphanumeric characters generates an invalid output Kickstart file
When installing Red Hat Enterprise Linux using the
Anaconda installer, you can add a driver disk by including a path to the partition containing the driver disk in the Kickstart file. At present, if you specify the partition by LABEL or CDLABEL which has non-alphanumeric characters in it, for example:
driverdisk "CDLABEL=Fedora 23 x86_64:/path/to/rpm"
driverdisk "CDLABEL=Fedora 23 x86_64:/path/to/rpm"
the output Kickstart file created during the
Anaconda installation will contain incorrect information. To work around this problem, use only alphanumeric characters when specifying the partition by LABEL or CDLABEL. (BZ#1452770)
The Scientific Computing variant is missing packages required for certain security profiles
When installing the
Red Hat Enterprise Linux for Scientific Computing variant, also known as Compute Node, you can select a security profile similarly to any other variant's installation process. However, since this variant is meant to be minimal, it is missing packages which are required by certain profiles, such as United States Government Configuration Baseline. If you select this profile, the installer displays a warning that some packages are missing.
The warning allows you to continue the installation despite missing packages, which can be used to work around the problem. The installation will complete normally, however, note that if you install the system despite the warning, and then attempt to run a security scan after the installation, the scan will report failing rules due to these missing packages. This behavior is expected. (BZ#1462647)
Chapter 60. Kernel Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
kexec fails when secondary cores do not offline
Under certain circumstances, secondary-core offlining fails on AppliedMicro X-Gene platforms like HP ProLiant m400 and AppliedMicro Mustang. As a consequence, the kernel sometimes fails to trigger the
kdump crash dump mechanism through kexec when a kernel panic occurs. As a result, the kernel crash dump file is not saved. (BZ#1218374)
File-system corruption due to incorrect flushing of cache has been fixed but I/O operations can be slower
Due to a bug in the
megaraid_sas driver, file-system corruption previously occurred in some cases when the file system was used with a disk-write back cache during system shutdown, reboot, or power loss. This update fixes megaraid_sas to transfer the flush cache commands correctly to the raid card. As a result, if you also update the raid card firmware, the file-system corruption no longer occurs under the described circumstances.
With Broadcom
megaraid_sas raid adapter, you can check the functionality in the system log (dmesg). The proper functionality is indicated by the following text string:
FW supports sync cache Yes
FW supports sync cache Yes
Note that this fix can slow down I/O operations because the cache is now flushed properly. (BZ#1380447)
Wacom Cintiq 12WX is not redetected when unplugged and plugged in quickly
When unplugging and quickly plugging in Wacom Cintiq 12WX within the same USB port, the tablet is currently not recognized. To work around this problem, wait 3-5 seconds before plugging the tablet back in. (BZ#1458354)
Installing to some IBM POWER8 machines using a Virtual DVD fails when starting GUI
Red Hat Enterprise Linux 7.4 can fail to install on some IBM POWER8 hardware (including S822LC machines) while starting the Anaconda GUI.
The problem is characterized by errors starting X11, followed by a
Pane is dead message in the Anaconda screen.
The workaround is to append
inst.text to the kernel command line and install in text mode.
This issue is confined to Virtual DVD installations, additional testing with the netboot image allows GUI installation. (BZ#1377857)
Entering full screen mode using a keyboard shortcut causes display problems on VMWare ESXi 5.5
When using Red Hat Enterprise Linux 7.4 as a virtual machine guest running on a VMWare ESXi 5.5 host, pressing
Ctrl+Alt+Enter to enter full screen mode in the console causes the display to become unusable. At the same time, errors such as the following example are saved into the system log (dmesg):
[drm:vmw_cmdbuf_work_func [vmwgfx]] *ERROR* Command buffer error.
[drm:vmw_cmdbuf_work_func [vmwgfx]] *ERROR* Command buffer error.
To work around this problem, shut down the virtual machine, open its
.vmx configuration file, and add or modify the following parameters:
svga.maxWidth = X svga.maxHeight = Y svga.vramSize = "X * Y * 4"
svga.maxWidth = X
svga.maxHeight = Y
svga.vramSize = "X * Y * 4"
In the above, replace X and Y with the horizontal and vertical resolution of your screen. The
svga.vramSize parameter takes a value that is equal to X times Y times 4. An example setup for a screen with a resolution of 1920x1080 therefore is:
svga.maxWidth = 1920 svga.maxHeight = 1080 svga.vramSize = "8294400"
svga.maxWidth = 1920
svga.maxHeight = 1080
svga.vramSize = "8294400"
Note that VMWare ESXi 5.5 is the only version reported to encounter this bug; other versions can enter full screen mode without problems. (BZ#1451242)
KSC currently does not support xz compression
The Kernel module Source Checker (the
ksc tool) is currently unable to process the xz compression method and reports the following error:
Invalid architecture, supported architectures are x86_64, ppc64, s390x
Invalid architecture, supported architectures are x86_64, ppc64, s390x
Until this limitation is resolved, system administrators should manually uncompress any third party modules using
xz compression, before running the ksc tool. (BZ#1463600)
Chapter 61. Networking Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
Verification of signatures using the MD5 hash algorithm is disabled in Red Hat Enterprise Linux 7
It is impossible to connect to any Wi-Fi Protected Access (WPA) Enterprise Access Point (AP) that requires MD5 signed certificates. To work around this problem, copy the wpa_supplicant.service file from the /usr/lib/systemd/system/ directory to the /etc/systemd/system/ directory and add the following line to the Service section of the file:
Environment=OPENSSL_ENABLE_MD5_VERIFY=1
Environment=OPENSSL_ENABLE_MD5_VERIFY=1
Then run the
systemctl daemon-reload command as root to reload the service file.
Important: Note that MD5 certificates are highly insecure and Red Hat does not recommend using them. (BZ#1062656)
freeradius might fail when upgrading from RHEL 7.3
A new configuration property,
correct_escapes, in the /etc/raddb/radiusd.conf file was introduced in the freeradius version distributed since RHEL 7.4. When an administrator sets correct_escapes to true, the new regular expression syntax for backslash escaping is expected. If correct_escapes is set to false, the old syntax is expected where backslashes are also escaped. For backward compatibility reasons, false is the default value.
When upgrading, configuration files in the
/etc/raddb/ directory are overwritten unless modified by the administrator, so the value of correct_escapes might not always correspond to which type of syntax is used in all the configuration files. As a consequence, authentication with freeradius might fail.
To prevent the problem from occurring, after upgrading from
freeradius version 3.0.4 (distributed with RHEL 7.3) and earlier, make sure all configuration files in the /etc/raddb/ directory use the new escaping syntax (no double backslash characters can be found) and that the value of correct_escapes in /etc/raddb/radiusd.conf is set to true.
For more information and examples, see the solution at https://access.redhat.com/solutions/3241961. (BZ#1489758)
Chapter 62. Security Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
certutil does not return the NSS database password requirements in FIPS mode
When creating a new Network Security Services (NSS) database with the
certutil tool, the user has nowhere to find out what the database password requirements are when running in FIPS mode. The prompt message does not provide password requirements, and certutil returns only a generic error message:
certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: SEC_ERROR_IO: An I/O error occurred during security authorization.
certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: SEC_ERROR_IO: An I/O error occurred during security authorization.
(BZ#1401809)
systemd-importd runs as init_t
The
systemd-importd service is using the NoNewPrivileges security flag in the systemd unit file. This blocks the SELinux domain transition from the init_t to systemd_importd_t domain. (BZ#1365944)
The SCAP password length requirement is ignored in the kickstart installation
The interactive kickstart installation does not enforce the password length check defined by the SCAP rule and accepts shorter root passwords. To work around this problem, use the
--strict option with the pwpolicy root command in the kickstart file. (BZ#1372791)
rhnsd.pid is writable by group and others
In Red Hat Enterprise Linux 7.4, the default permissions of the
/var/run/rhnsd.pid file are set to -rw-rw-rw-.. This setting is not secure. To work around this problem, change the permissions of this file to be writable only by the owner:
chmod go-w /var/run/rhnsd.pid
# chmod go-w /var/run/rhnsd.pid
(BZ#1480306)
Chapter 63. Storage Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
No support for thin provisioning on top of RAID in a cluster
While RAID logical volumes and thinly provisioned logical volumes can be used in a cluster when activated exclusively, there is currently no support for thin provisioning on top of RAID in a cluster. This is the case even if the combination is activated exclusively. Currently this combination is only supported in LVM's single machine non-clustered mode. (BZ#1014758)
Anaconda installation can fail when LVM or md device has metadata from a previous install
During Red Hat Enetrprise Linux 7 installation on a machine where a disk to be multipathed already starts with LVM or md metadata on it from a previous install, multipath will not get set up on the device, and LVM/md will get set up on one of the path devices while Anaconda is starting up. This can create problems with Anaconda, and cause the installation to fail. The workaround for this issue is to add
mpath.wwid=<WWID> to the kernel command line when booting up for the installation. <WWID> is the wwid of the device that multipath should claim. This value is also the same as the ID_SERIAL udev database value for scsi devices and ID_UID for DASD devices. (BZ#1378714)
Chapter 64. System and Subscription Management Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
System upgrade may cause Yum to install unneeded 32-bit packages if rdma-core is installed
In Red Hat Enterprise Linux 7.4, the rdma-core.noarch packages are obsoleted by rdma-core.i686 and rdma-core.x86_64. During a system upgrade,
Yum replaces the original package with both of the new packages, and installs any required dependencies. This means that the 32-bit package, as well a potentially large amount of its 32-bit dependencies, is installed by default, even if not required.
To work around this problem, you can either use the
yum update command with the --exclude=\*.i686 option, or you can use yum remove rdma-core.i686 after the upgrade to remove the 32-bit package. (BZ#1458338)
Chapter 65. Virtualization Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
Booting OVMF guests fails
Attempting to boot a guest virtual machine that uses the Open Virtual Machine Firmware (OVMF) on a Red Hat Enterprise Linux host using the qemu-kvm package currently fails, with the guest becoming unresponsive and displaying a blank screen. (BZ#1174132)
Bridge creation with virsh iface-bridge fails
When installing Red Hat Enterprise Linux 7 from other sources than the network, network device names are not specified by default in the interface configuration files (this is done with a
DEVICE= line). As a consequence, creating a network bridge by using the virsh iface-bridge command fails with an error message. To work around the problem, add DEVICE= lines into the /etc/sysconfig/network-scripts/ifcfg-* files.
For more information, see the Red Hat Knowledgebase: https://access.redhat.com/solutions/2792701 (BZ#1100588)
Guests sometimes fail to boot on ESXi 5.5
When running Red Hat Enterprise Linux 7 guests with 12 GB RAM or above on a VMware ESXi 5.5 hypervisor, certain components currently initialize with incorrect memory type range register (MTRR) values or incorrectly reconfigure MTRR values across boots. This sometimes causes the guest kernel to panic or the guest to become unresponsive during boot.
To work around this problem, add the
disable_mtrr_trim option to the guest's kernel command line, which enables the guest to continue booting when MTRRs are configured incorrectly. Note that with this option, the guest prints WARNING: BIOS bug messages during boot, which you can safely ignore. (BZ#1429792)
The STIG for Red Hat Virtualization Hypervisor profile is not displayed in Anaconda
The
oscap-anaconda-addon module is currently not able to properly parse the STIG for Red Hat Virtualization Hypervisor security hardening profile. As a consequence, the profile's name is shown as DISA STIG for Red Hat Enterprise Linux 7 or United States Government Configuration Baseline (USGCB / STIG) - DRAFT in the Anaconda interface selection. However, this is only a display problem, and you can safely use the DISA STIG for Red Hat Enterprise Linux 7 profile instead of the STIG for Red Hat Virtualization Hypervisor profile. (BZ#1437106)
Appendix A. Component Versions Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
This appendix provides a list of key components and their versions in the Red Hat Enterprise Linux 7.4 release.
|
Component
|
Version
|
|---|---|
|
Kernel
|
3.10.0-693
|
|
QLogic
qla2xxx driver
|
8.07.00.38.07.4-k1
|
|
QLogic
qla4xxx driver
|
5.04.00.00.07.02-k0
|
|
Emulex
lpfc driver
|
0:11.2.0.6
|
|
iSCSI initiator utils
|
iscsi-initiator-utils-6.2.0.874-4
|
|
DM-Multipath
|
device-mapper-multipath-0.4.9-111
|
|
LVM
|
lvm2-2.02.171-8
|
Appendix B. List of Bugzillas by Component Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
This appendix provides a list of all components and their related Bugzillas that are included in this book.
| Component | New Features | Notable Bug Fixes | Technology Previews | Known Issues |
|---|---|---|---|---|
| 389-ds-base | BZ#1394000, BZ#1395940, BZ#1425907 | BZ#1378209 | ||
| Doc-administration-guide | BZ#1426286, BZ#1426289 | |||
| Doc-release-notes | BZ#1426275, BZ#1426278, BZ#1426283, BZ#1436973 | |||
| NetworkManager | BZ#1337997, BZ#1353612, BZ#1373698, BZ#1394344, BZ#1394579, BZ#1398934, BZ#1404594, BZ#1404598, BZ#1414103, BZ#1420708 | BZ#1391170, BZ#1393997 | ||
| aide | BZ#1377215 | |||
| anaconda | BZ#663099, BZ#1113207, BZ#1131247, BZ#1255659, BZ#1315160, BZ#1332316, BZ#1366935, BZ#1377233, BZ#1391724, BZ#1412538 | BZ#1317370, BZ#1327439, BZ#1356975, BZ#1358778, BZ#1373360, BZ#1380224, BZ#1380277, BZ#1404158, BZ#1412022, BZ#1441337 | BZ#1378714 | |
| ansible | BZ#1313263 | |||
| audit | BZ#1381601 | |||
| authconfig | BZ#1334449, BZ#1378943 | |||
| autofs | BZ#1367576, BZ#1382093 | BZ#1101782, BZ#1383194, BZ#1383910, BZ#1420574, BZ#1420584, BZ#1320588 | ||
| bind | BZ#1388534, BZ#1393886 | |||
| bind-dyndb-ldap | BZ#1393889 | |||
| binutils | BZ#1366052 | BZ#1326710, BZ#1406498 | ||
| bison | BZ#1306000 | |||
| booth | BZ#1302087 | |||
| ca-certificates | BZ#1444414 | |||
| chrony | BZ#1387223 | |||
| chrpath | BZ#1271380 | |||
| clevis | BZ#1300697 | |||
| cloud-init | BZ#1427280 | |||
| clufter | BZ#1387424 | |||
| crash | BZ#1368711, BZ#1384944, BZ#1393534 | |||
| criu | BZ#1400230 | |||
| custodia | BZ#1403214 | |||
| cyrus-sasl | BZ#1421663 | |||
| dbxtool | BZ#1078990 | |||
| dconf-editor | BZ#1388931 | |||
| device-mapper-multipath | BZ#1169168, BZ#1279355, BZ#1359510, BZ#1362409, BZ#1368211, BZ#1372032, BZ#1394059, BZ#1406226, BZ#1416569, BZ#1430097 | BZ#1239173, BZ#1362120, BZ#1380602, BZ#1402092, BZ#1403552, BZ#1431562 | ||
| dhcp | BZ#1374119 | |||
| distribution | BZ#1062656 | |||
| dmidecode | BZ#1385884 | |||
| dnsmasq | BZ#1375527, BZ#1375569 | |||
| ecj | BZ#1379855 | |||
| elfutils | BZ#1400302 | |||
| empathy | BZ#1386616 | |||
| ethtool | BZ#1402701 | |||
| fcoe-utils | BZ#1384707 | |||
| firefox | BZ#1455798 | |||
| firewalld | BZ#1006225, BZ#1409544, BZ#1419058 | BZ#1401978 | ||
| flatpak | BZ#1476905 | |||
| freeradius | BZ#1489758 | |||
| genwqe-tools | BZ#1275663 | |||
| gfs2-utils | BZ#1413684 | |||
| ghostscript | BZ#1390847, BZ#1411725, BZ#1424752 | |||
| git | BZ#1369173 | |||
| glibc | BZ#841653, BZ#1298975, BZ#1320947, BZ#1421155 | BZ#1324568, BZ#1326739 | ||
| glusterfs | BZ#1409773 | |||
| gnome-initial-setup | BZ#1226819 | |||
| gnome-packagekit | BZ#1387181 | |||
| gnome-shell | BZ#1383353 | |||
| gnome-software | BZ#1434477, BZ#1464139 | |||
| gnu-efi | BZ#1310782 | |||
| gnutls | BZ#1399232 | |||
| grep | BZ#1297441 | |||
| grub2 | BZ#1154226 | |||
| gstreamer1-plugins-good | BZ#1451211 | |||
| http-parser | BZ#1393819 | |||
| hwdata | BZ#1386133 | |||
| initial-setup | BZ#1378082 | |||
| initscripts | BZ#1260552, BZ#1428935 | BZ#1278521, BZ#1367554, BZ#1369790, BZ#1374837, BZ#1385272, BZ#1392766, BZ#1394191, BZ#1398671, BZ#1398678, BZ#1398679, BZ#1398683, BZ#1398686, BZ#1406254, BZ#1408219, BZ#1428574, BZ#1434075 | ||
| intel-cmt-cat | BZ#1315489 | |||
| ipa | BZ#872671, BZ#1125174, BZ#1200767, BZ#1366572, BZ#1402959, BZ#1404750, BZ#1409628, BZ#1459153 | BZ#1115294, BZ#1298286 | BZ#1455946 | |
| ipa-server-docker | BZ#1405325 | |||
| iperf3 | BZ#913329 | |||
| ipmitool | BZ#1398658 | |||
| iproute | BZ#1063934, BZ#1422629 | BZ#1375215 | ||
| iprutils | BZ#1384382 | |||
| jansson | BZ#1389805 | |||
| java-1.7.0-openjdk | BZ#1373986 | |||
| java-1.8.0-openjdk | BZ#1400306 | |||
| kernel | BZ#437984, BZ#950243, BZ#1072503, BZ#1138782, BZ#1155732, BZ#1241990, BZ#1270982, BZ#1273401, BZ#1297841, BZ#1297929, BZ#1298643, BZ#1299527, BZ#1302147, BZ#1306396, BZ#1306453, BZ#1308632, BZ#1314179, BZ#1326309, BZ#1326318, BZ#1326353, BZ#1330457, BZ#1339127, BZ#1339791, BZ#1340238, BZ#1346348, BZ#1352289, BZ#1355919, BZ#1356122, BZ#1357491, BZ#1365002, BZ#1366564, BZ#1369158, BZ#1373606, BZ#1373971, BZ#1374498, BZ#1377710, BZ#1377767, BZ#1379590, BZ#1382101, BZ#1382494, BZ#1382500, BZ#1382504, BZ#1382508, BZ#1382849, BZ#1383280, BZ#1383827, BZ#1383834, BZ#1384456, BZ#1384648, BZ#1385026, BZ#1385757, BZ#1388467, BZ#1388646, BZ#1388716, BZ#1391219, BZ#1391243, BZ#1391413, BZ#1391668, BZ#1394197, BZ#1400501, BZ#1401797, BZ#1402102, BZ#1406197, BZ#1416924, BZ#1432218, BZ#1432897, BZ#1383489, BZ#1626527 | BZ#1084802, BZ#1213119, BZ#1217546, BZ#1324918, BZ#1351098, BZ#1353218, BZ#1363661, BZ#1370638, BZ#1379787, BZ#1385149, BZ#1386923, BZ#1387485, BZ#1406885, BZ#1408330, BZ#1412898 | BZ#916382, BZ#947163, BZ#1109348, BZ#1111712, BZ#1206277, BZ#1230959, BZ#1274456, BZ#1274459, BZ#1299662, BZ#1305092, BZ#1348508, BZ#1349668, BZ#1350553, BZ#1393375, BZ#1414957, BZ#1449762, BZ#1460849, BZ#1288964 | BZ#1377857, BZ#1380447, BZ#1429792, BZ#1431964, BZ#1451242, BZ#1458354 |
| kernel-aarch64 | BZ#1218374 | |||
| kernel-rt | BZ#1391779 | BZ#1443711 | BZ#1297061 | |
| kexec-tools | BZ#1384945 | |||
| keycloak-httpd-client-install | BZ#1401781 | |||
| libcgroup | BZ#1406927 | |||
| libdb | BZ#1277887 | |||
| libfastjson | BZ#1395145 | |||
| libguestfs | BZ#1233093, BZ#1359086, BZ#1362649, BZ#1367738, BZ#1400205, BZ#1404182 | BZ#1161019, BZ#1265588, BZ#1311890, BZ#1354507, BZ#1374232, BZ#1374405, BZ#1383517, BZ#1392798, BZ#1401474, BZ#1402301, BZ#1431579 | BZ#1387213, BZ#1441197 | |
| libica | BZ#1391558 | |||
| libnfsidmap | BZ#980925 | |||
| libnftnl | BZ#1418967 | BZ#1332585 | ||
| libreoffice | BZ#1466164 | |||
| libreswan | BZ#1324458, BZ#1399883 | |||
| librtas | BZ#1380656 | |||
| libseccomp | BZ#1425007 | |||
| libstoragemgmt | BZ#1403142 | BZ#1119909 | ||
| libusnic_verbs | BZ#916384 | |||
| libvirt | BZ#1349696, BZ#1382640, BZ#1414627 | BZ#1283251 | ||
| libwacom | BZ#1342990 | BZ#1458351 | ||
| linuxptp | BZ#1359311 | |||
| logrotate | BZ#1381719 | |||
| lorax | BZ#1310775, BZ#1430483 | BZ#1341280 | ||
| lshw | BZ#1368704 | |||
| lvm2 | BZ#1189108, BZ#1191935, BZ#1346280, BZ#1366296, BZ#1378956, BZ#1394048, BZ#1436748, BZ#1442992 | BZ#1380521, BZ#1380532, BZ#1382688, BZ#1386184, BZ#1434054 | BZ#1014758 | |
| mariadb | BZ#1356897 | |||
| mdadm | BZ#1380017 | |||
| memkind | BZ#1384549 | |||
| mod_nss | BZ#1382102, BZ#1392582 | |||
| mutt | BZ#1388511 | BZ#1388512 | ||
| mutter | BZ#1393951 | |||
| nautilus | BZ#1474852 | |||
| net-snmp | BZ#1286693, BZ#1324306 | |||
| netcf | BZ#1100588 | |||
| nfs-utils | BZ#1375259, BZ#1418041 | BZ#1450447 | ||
| nss | BZ#1309781, BZ#1316546, BZ#1444413 | BZ#1220573 | BZ#1401809 | |
| nss-softokn | BZ#1369055 | |||
| nvme-cli | BZ#1382119 | |||
| nvmetcli | BZ#1383837 | |||
| opencryptoki | BZ#1391559 | |||
| openldap | BZ#1386365, BZ#1428740 | |||
| opensc | BZ#1081088 | |||
| openscap | BZ#1363826 | BZ#1420038, BZ#1440192, BZ#1447341 | ||
| openssh | BZ#1322911, BZ#1341754 | BZ#1418062 | ||
| openssl | BZ#1276310 | |||
| openssl-ibmca | BZ#1274385 | |||
| openvswitch | BZ#1368043, BZ#1390938 | |||
| openwsman | BZ#1190689 | |||
| oprofile | BZ#1380809 | |||
| oscap-anaconda-addon | BZ#1372791, BZ#1437106, BZ#1462647 | |||
| other | BZ#1432080, BZ#1444937, BZ#1457907, BZ#1459948, BZ#1467260 | BZ#1408694 | BZ#1062759, BZ#1072107, BZ#1259547, BZ#1464377, BZ#1467338, BZ#1477977 | BZ#1174132, BZ#1458338, BZ#1463600 |
| OVMF | BZ#653382 | |||
| pacemaker | BZ#1289662 | BZ#1388489 | ||
| pcp | BZ#1422263, BZ#1423020 | |||
| pcre | BZ#1400267 | BZ#1290432 | ||
| pcs | BZ#1158805, BZ#1165821, BZ#1176018, BZ#1261116, BZ#1303969, BZ#1362493, BZ#1373614, BZ#1413958 | BZ#1386114, BZ#1378107 | BZ#1433016 | |
| perl-IO-Socket-SSL | BZ#1335035 | |||
| perl-Net-SSLeay | BZ#1335028 | |||
| perl-Perl4-CoreLibs | BZ#1366724 | |||
| perl-local-lib | BZ#1122993 | |||
| pki-core | BZ#1303683, BZ#1305993, BZ#1325071, BZ#1388622, BZ#1391737, BZ#1392068, BZ#1409946, BZ#1413132, BZ#1426754, BZ#1445535, BZ#1447144, BZ#1450143, BZ#1458055 | BZ#1238684, BZ#1246635, BZ#1249400, BZ#1282504, BZ#1330800, BZ#1372052, BZ#1376226, BZ#1376488, BZ#1378275, BZ#1378277, BZ#1381084, BZ#1382066, BZ#1385208, BZ#1386303, BZ#1395817, BZ#1397200, BZ#1400149, BZ#1404881, BZ#1411428, BZ#1412681, BZ#1413136, BZ#1445088, BZ#1446364, BZ#1447762, BZ#1452250, BZ#1452344, BZ#1454450, BZ#1454471, BZ#1458429 | BZ#1256901 | |
| procps-ng | BZ#1373246 | |||
| psacct | BZ#1255183 | |||
| pykickstart | BZ#1452770 | |||
| python | BZ#1219110 | |||
| python-blivet | BZ#1214407, BZ#1327463 | |||
| python-tornado | BZ#1158617 | |||
| qemu-kvm | BZ#1103193 | |||
| rdma-core | BZ#1404035 | |||
| rear | BZ#1355667 | BZ#1343119 | ||
| resource-agents | BZ#1077888, BZ#1336847, BZ#1430304 | |||
| rhino | BZ#1350331 | |||
| rhnsd | BZ#1480306 | |||
| rpm | BZ#1378307 | BZ#1278924 | ||
| rsyslog | BZ#1313490, BZ#1431616 | |||
| ruby | BZ#1397390 | BZ#1308992 | ||
| rubygem-abrt | BZ#1418750 | |||
| samba | BZ#1391954 | |||
| sapconf | BZ#1391881 | |||
| sbd | BZ#1413951 | |||
| sblim-cmpi-fsvol | BZ#1136116 | |||
| scap-security-guide | BZ#1404392, BZ#1410914 | BZ#1450731 | BZ#1448952, BZ#1464899, BZ#1465677 | |
| seabios | BZ#1020622 | |||
| selinux-policy | BZ#1368057, BZ#1386916 | BZ#1365944 | ||
| sendmail | BZ#1124827 | |||
| sg3_utils | BZ#1380744 | |||
| shim | BZ#1310766 | |||
| shim-signed | BZ#1310764 | |||
| sos | BZ#1414879 | |||
| sssd | BZ#1214491, BZ#1311056, BZ#1330196, BZ#1340711, BZ#1396012, BZ#1414023, BZ#1425891 | BZ#1068725 | BZ#1446101, BZ#1447945, BZ#1448094, BZ#1460689, BZ#1462769 | |
| strace | BZ#1377847 | |||
| strongimcv | BZ#755087 | |||
| sudo | BZ#1293306 | |||
| system-config-language | BZ#1304223 | |||
| systemd | BZ#1353028 | BZ#1284974 | ||
| systemtap | BZ#1398393 | |||
| tar | BZ#1350640 | BZ#1184697, BZ#1319820, BZ#1341786 | ||
| targetcli | BZ#1243410 | |||
| targetd | BZ#1162381 | |||
| tboot | BZ#1384210 | |||
| tcpdump | BZ#1292056, BZ#1422473 | |||
| tcsh | BZ#1388426 | |||
| telnet | BZ#1367415 | |||
| tpm2-tss | BZ#1275027 | |||
| tss2 | BZ#1384452 | |||
| tuned | BZ#1388454, BZ#1414098 | |||
| unbound | BZ#1382383 | |||
| usbguard | BZ#1395615 | BZ#1467369 | ||
| valgrind | BZ#1391217 | |||
| virt-who | BZ#1299643, BZ#1369107, BZ#1405967, BZ#1426058, BZ#1436811 | |||
| wget | BZ#1439811 | |||
| wpa_supplicant | BZ#1404793 | |||
| xorg-x11-drv-libinput | BZ#1413811 | |||
| xorg-x11-drv-qxl | BZ#1428340 | |||
| xorg-x11-server | BZ#1404868 | BZ#1185690 | ||
| yelp | BZ#1443179 | |||
| yp-tools | BZ#1401432 | |||
| ypbind | BZ#1217435, BZ#1382804 | |||
| yum | BZ#1343690 | BZ#1352585, BZ#1370134 | ||
| yum-utils | BZ#1406891 |
Appendix C. Revision History Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
| Revision History | ||||
|---|---|---|---|---|
| Revision 0.5-0 | Wed Feb 12 2020 | |||
| ||||
| Revision 0.4-9 | Mon Oct 07 2019 | |||
| ||||
| Revision 0.4-8 | Mon May 13 2019 | |||
| ||||
| Revision 0.4-7 | Sun Apr 28 2019 | |||
| ||||
| Revision 0.4-6 | Mon Feb 04 2019 | |||
| ||||
| Revision 0.4-5 | Thu Sep 13 2018 | |||
| ||||
| Revision 0.4-4 | Tue Apr 17 2018 | |||
| ||||
| Revision 0.4-3 | Tue Apr 10 2018 | |||
| ||||
| Revision 0.4-2 | Thu Apr 05 2018 | |||
| ||||
| Revision 0.4-1 | Thu Mar 22 2018 | |||
| ||||
| Revision 0.4-0 | Fri Mar 16 2018 | |||
| ||||
| Revision 0.3-9 | Mon Feb 19 2018 | |||
| ||||
| Revision 0.3-8 | Tue Feb 06 2018 | |||
| ||||
| Revision 0.3-7 | Wed Jan 17 2018 | |||
| ||||
| Revision 0.3-6 | Wed Jan 10 2018 | |||
| ||||
| Revision 0.3-5 | Thu Dec 14 2017 | |||
| ||||
| Revision 0.3-4 | Tue Dec 12 2017 | |||
| ||||
| Revision 0.3-3 | Wed Nov 22 2017 | |||
| ||||
| Revision 0.3-2 | Wed Nov 15 2017 | |||
| ||||
| Revision 0.3-1 | Tue Oct 31 2017 | |||
| ||||
| Revision 0.3-3 | Mon Oct 30 2017 | |||
| ||||
| Revision 0.3-2 | Wed Sep 13 2017 | |||
| ||||
| Revision 0.3-1 | Mon Sep 11 2017 | |||
| ||||
| Revision 0.3-0 | Mon Sep 04 2017 | |||
| ||||
| Revision 0.2-9 | Mon Aug 21 2017 | |||
| ||||
| Revision 0.2-8 | Tue Aug 15 2017 | |||
| ||||
| Revision 0.2-7 | Mon Aug 14 2017 | |||
| ||||
| Revision 0.2-6 | Thu Aug 10 2017 | |||
| ||||
| Revision 0.2-5 | Tue Aug 08 2017 | |||
| ||||
| Revision 0.2-4 | Mon Aug 07 2017 | |||
| ||||
| Revision 0.2-3 | Fri Aug 04 2017 | |||
| ||||
| Revision 0.2-2 | Thu Aug 03 2017 | |||
| ||||
| Revision 0.2-1 | Tue Aug 01 2017 | |||
| ||||
| Revision 0.0-4 | Tue May 23 2017 | |||
| ||||
Legal Notice Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
Copyright © 2017-2019 Red Hat, Inc.
This document is licensed by Red Hat under the Creative Commons Attribution-ShareAlike 3.0 Unported License. If you distribute this document, or a modified version of it, you must provide attribution to Red Hat, Inc. and provide a link to the original. If the document is modified, all Red Hat trademarks must be removed.
Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law.
Red Hat, Red Hat Enterprise Linux, the Shadowman logo, the Red Hat logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries.
Linux® is the registered trademark of Linus Torvalds in the United States and other countries.
Java® is a registered trademark of Oracle and/or its affiliates.
XFS® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries.
MySQL® is a registered trademark of MySQL AB in the United States, the European Union and other countries.
Node.js® is an official trademark of Joyent. Red Hat is not formally related to or endorsed by the official Joyent Node.js open source or commercial project.
The OpenStack® Word Mark and OpenStack logo are either registered trademarks/service marks or trademarks/service marks of the OpenStack Foundation, in the United States and other countries and are used with the OpenStack Foundation's permission. We are not affiliated with, endorsed or sponsored by the OpenStack Foundation, or the OpenStack community.
All other trademarks are the property of their respective owners.