Red Hat Enterprise Linux-8-8.4 Release Notes-En-US
Red Hat Enterprise Linux-8-8.4 Release Notes-En-US
Red Hat Enterprise Linux-8-8.4 Release Notes-En-US
The text of and illustrations in this document are licensed by Red Hat under a Creative Commons
Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is
available at
http://creativecommons.org/licenses/by-sa/3.0/
. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must
provide the URL for the original version.
Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert,
Section 4d of CC-BY-SA to the fullest extent permitted by applicable law.
Red Hat, Red Hat Enterprise Linux, the Shadowman logo, the Red Hat logo, JBoss, OpenShift,
Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States
and other countries.
Linux ® is the registered trademark of Linus Torvalds in the United States and other countries.
XFS ® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States
and/or other countries.
MySQL ® is a registered trademark of MySQL AB in the United States, the European Union and
other countries.
Node.js ® is an official trademark of Joyent. Red Hat is not formally related to or endorsed by the
official Joyent Node.js open source or commercial project.
The OpenStack ® Word Mark and OpenStack logo are either registered trademarks/service marks
or trademarks/service marks of the OpenStack Foundation, in the United States and other
countries and are used with the OpenStack Foundation's permission. We are not affiliated with,
endorsed or sponsored by the OpenStack Foundation, or the OpenStack community.
Abstract
The Release Notes provide high-level coverage of the improvements and additions that have been
implemented in Red Hat Enterprise Linux 8.4 and document known problems in this release, as well
as notable bug fixes, Technology Previews, deprecated functionality, and other details.
Table of Contents
Table of Contents
. . . . . . . . . .OPEN
MAKING . . . . . . SOURCE
. . . . . . . . . .MORE
. . . . . . .INCLUSIVE
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5. . . . . . . . . . . . .
. . . . . . . . . . . . . FEEDBACK
PROVIDING . . . . . . . . . . . . ON
. . . .RED
. . . . .HAT
. . . . .DOCUMENTATION
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6. . . . . . . . . . . . .
.CHAPTER
. . . . . . . . . . 1.. .OVERVIEW
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7. . . . . . . . . . . . .
1.1. MAJOR CHANGES IN RHEL 8.4 7
Security 7
Networking 7
Kernel 7
High availability and clusters 8
Dynamic programming languages, web and database servers 8
Compilers and development tools 8
OpenJDK 11 is now available 8
Identity Management 8
1.2. IN-PLACE UPGRADE AND OS CONVERSION 9
In-place upgrade from RHEL 7 to RHEL 8 9
In-place upgrade from RHEL 6 to RHEL 8 9
Conversion from a different Linux distribution to RHEL 9
1.3. RED HAT CUSTOMER PORTAL LABS 9
1.4. ADDITIONAL RESOURCES 10
. . . . . . . . . . . 2.
CHAPTER . . ARCHITECTURES
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11. . . . . . . . . . . . .
.CHAPTER
. . . . . . . . . . 3.
. . DISTRIBUTION
. . . . . . . . . . . . . . . . OF
. . . .CONTENT
. . . . . . . . . . .IN
. . .RHEL
. . . . . .8. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
..............
3.1. INSTALLATION 12
3.2. REPOSITORIES 12
3.3. APPLICATION STREAMS 13
.CHAPTER
. . . . . . . . . . 4.
. . .NEW
. . . . .FEATURES
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
..............
4.1. INSTALLER AND IMAGE CREATION 14
4.2. RHEL FOR EDGE 14
4.3. SOFTWARE MANAGEMENT 15
4.4. SHELLS AND COMMAND-LINE TOOLS 16
4.5. INFRASTRUCTURE SERVICES 19
4.6. SECURITY 22
4.7. NETWORKING 26
4.8. KERNEL 28
4.9. FILE SYSTEMS AND STORAGE 36
4.10. HIGH AVAILABILITY AND CLUSTERS 38
4.11. DYNAMIC PROGRAMMING LANGUAGES, WEB AND DATABASE SERVERS 40
4.12. COMPILERS AND DEVELOPMENT TOOLS 47
4.13. IDENTITY MANAGEMENT 57
4.14. DESKTOP 61
4.15. GRAPHICS INFRASTRUCTURES 62
4.16. THE WEB CONSOLE 64
4.17. RED HAT ENTERPRISE LINUX SYSTEM ROLES 65
4.18. VIRTUALIZATION 67
4.19. RHEL IN CLOUD ENVIRONMENTS 68
4.20. SUPPORTABILITY 68
4.21. CONTAINERS 69
.CHAPTER
. . . . . . . . . . 5.
. . IMPORTANT
. . . . . . . . . . . . . .CHANGES
. . . . . . . . . . .TO
. . . .EXTERNAL
. . . . . . . . . . . .KERNEL
. . . . . . . . .PARAMETERS
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .72
..............
5.1. NEW KERNEL PARAMETERS 72
1
Red Hat Enterprise Linux 8.4 8.4 Release Notes
.CHAPTER
. . . . . . . . . . 6.
. . .DEVICE
. . . . . . . .DRIVERS
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .75
..............
6.1. NEW DRIVERS 75
Network drivers 75
Graphics drivers and miscellaneous drivers 75
6.2. UPDATED DRIVERS 76
Graphics and miscellaneous driver updates 76
.CHAPTER
. . . . . . . . . . 7.
. . BUG
. . . . . .FIXES
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .77
..............
7.1. INSTALLER AND IMAGE CREATION 77
7.2. SOFTWARE MANAGEMENT 78
7.3. SHELLS AND COMMAND-LINE TOOLS 78
7.4. INFRASTRUCTURE SERVICES 79
7.5. SECURITY 79
7.6. NETWORKING 82
7.7. KERNEL 83
7.8. FILE SYSTEMS AND STORAGE 85
7.9. HIGH AVAILABILITY AND CLUSTERS 85
7.10. DYNAMIC PROGRAMMING LANGUAGES, WEB AND DATABASE SERVERS 86
7.11. COMPILERS AND DEVELOPMENT TOOLS 86
7.12. IDENTITY MANAGEMENT 87
7.13. GRAPHICS INFRASTRUCTURES 88
7.14. RED HAT ENTERPRISE LINUX SYSTEM ROLES 88
7.15. VIRTUALIZATION 89
7.16. RHEL IN CLOUD ENVIRONMENTS 89
7.17. CONTAINERS 90
. . . . . . . . . . . 8.
CHAPTER . . .TECHNOLOGY
. . . . . . . . . . . . . . . PREVIEWS
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
..............
8.1. INSTALLER AND IMAGE CREATION 91
8.2. NETWORKING 91
8.3. KERNEL 94
8.4. FILE SYSTEMS AND STORAGE 95
8.5. HIGH AVAILABILITY AND CLUSTERS 97
8.6. IDENTITY MANAGEMENT 98
8.7. DESKTOP 99
8.8. GRAPHICS INFRASTRUCTURES 99
8.9. RED HAT ENTERPRISE LINUX SYSTEM ROLES 100
8.10. VIRTUALIZATION 101
8.11. CONTAINERS 102
.CHAPTER
. . . . . . . . . . 9.
. . .DEPRECATED
. . . . . . . . . . . . . . .FUNCTIONALITY
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .103
...............
9.1. INSTALLER AND IMAGE CREATION 103
9.2. SOFTWARE MANAGEMENT 104
9.3. SHELLS AND COMMAND-LINE TOOLS 104
9.4. SECURITY 104
9.5. NETWORKING 106
9.6. KERNEL 106
9.7. FILE SYSTEMS AND STORAGE 107
9.8. HIGH AVAILABILITY AND CLUSTERS 108
9.9. COMPILERS AND DEVELOPMENT TOOLS 108
9.10. IDENTITY MANAGEMENT 109
9.11. DESKTOP 111
2
Table of Contents
. . . . . . . . . . . 10.
CHAPTER . . . KNOWN
. . . . . . . . . ISSUES
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .118
..............
10.1. INSTALLER AND IMAGE CREATION 118
10.2. SUBSCRIPTION MANAGEMENT 120
10.3. INFRASTRUCTURE SERVICES 121
10.4. SECURITY 121
10.5. NETWORKING 126
10.6. KERNEL 127
10.7. HARDWARE ENABLEMENT 132
10.8. FILE SYSTEMS AND STORAGE 132
10.9. HIGH AVAILABILITY AND CLUSTERS 133
10.10. DYNAMIC PROGRAMMING LANGUAGES, WEB AND DATABASE SERVERS 134
10.11. COMPILERS AND DEVELOPMENT TOOLS 135
10.12. IDENTITY MANAGEMENT 135
10.13. DESKTOP 137
10.14. GRAPHICS INFRASTRUCTURES 137
10.15. VIRTUALIZATION 138
10.16. RHEL IN CLOUD ENVIRONMENTS 141
10.17. SUPPORTABILITY 143
10.18. CONTAINERS 144
. . . . . . . . . . . 11.
CHAPTER . . .INTERNATIONALIZATION
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .145
...............
11.1. RED HAT ENTERPRISE LINUX 8 INTERNATIONAL LANGUAGES 145
11.2. NOTABLE CHANGES TO INTERNATIONALIZATION IN RHEL 8 145
. . . . . . . . . . . .A.
APPENDIX . . LIST
. . . . . .OF
. . . TICKETS
. . . . . . . . . .BY
. . . COMPONENT
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .147
...............
. . . . . . . . . . . .B.
APPENDIX . . REVISION
. . . . . . . . . . . HISTORY
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .156
...............
3
Red Hat Enterprise Linux 8.4 8.4 Release Notes
4
MAKING OPEN SOURCE MORE INCLUSIVE
5
Red Hat Enterprise Linux 8.4 8.4 Release Notes
For simple comments on specific passages, make sure you are viewing the documentation in the
Multi-page HTML format. Highlight the part of text that you want to comment on. Then, click
the Add Feedback pop-up that appears below the highlighted text, and follow the displayed
instructions.
3. Fill in the Description field with your suggestion for improvement. Include a link to the
relevant part(s) of documentation.
6
CHAPTER 1. OVERVIEW
CHAPTER 1. OVERVIEW
The scap-security-guide packages have been rebased to version 0.1.54, and OpenSCAP has been
rebased to version 1.3.4. These updates provide substantial improvements, including:
The fapolicyd framework now provides integrity checking, and the RPM plugin now registers any
system update that is handled by either the YUM package manager or the RPM Package Manager.
The rhel8-tang container image provides Tang-server decryption capabilities for Clevis clients that run
either in OpenShift Container Platform (OCP) clusters or in separate virtual machines.
Networking
Nmstate is a network API for hosts and fully supported in RHEL 8.4. The nmstate packages provide a
library and the nmstatectl command-line utility to manage host network settings in a declarative
manner.
The Multi-protocol Label Switching (MPLS) is an in-kernel data-forwarding mechanism to route traffic
flow across enterprise networks. For example, you can add tc filters for managing packets received
from specific ports or carrying specific types of traffic, in a consistent way. The MPLS support is
available in this release as a Technology Preview.
The iproute2 utility introduces three new traffic control ( tc) actions; mac_push, push_eth, and
pop_eth to add MPLS labels, build an Ethernet header at the beginning of the packet, and drop the
outer Ethernet header respectively.
The support for bareudp devices is now available with the ip link command as a Technology Preview.
For more information about the features introduced in this release and changes in the existing
functionality, see Section 4.7, “Networking”.
Kernel
The kpatch-dnf package provides a DNF plugin for subscribing a RHEL system to kernel live patch
updates. The plugin enables automatic subscription for any kernel the system currently uses, and also
for kernels to-be-installed in the future.
Proactive compaction regularly initiates memory compaction work before a request for allocation is
made. Therefore, latency for specific memory allocation requests is lowered.
A new implementation of slab memory controller for the control groups technology is now available in
RHEL 8. The slab memory controller brings improvement in slab utilization, and enables to shift the
memory accounting from the page level to the object level. As a result, you can observe a significant
drop in the total kernel memory footprint and positive effects on memory fragmentation.
The time namespace feature is available in RHEL 8.4. This feature is suited for changing the date and
7
Red Hat Enterprise Linux 8.4 8.4 Release Notes
The time namespace feature is available in RHEL 8.4. This feature is suited for changing the date and
time inside Linux containers. The in-container clock adjustments after restoration from a checkpoint are
also now possible.
RHEL 8 supports the Error Detection and Correction (EDAC) kernel module set in 8th and 9th
generation Intel Core Processors.
For more information about the features introduced in this release and changes in the existing
functionality, see Section 4.8, “Kernel” .
For information on creating a persistent Pacemaker resource agent, you can now consult the article
Creating a Persistent (Daemonized) Pacemaker Resource Agent .
Python 3.9
SWIG 4.0
Subversion 1.14
Redis 6
PostgreSQL 13
MariaDB 10.5
See Section 4.11, “Dynamic programming languages, web and database servers” for more information.
GCC Toolset 10
Go Toolset 1.15.7
See Section 4.12, “Compilers and development tools” for more information.
Identity Management
RHEL 8.4 provides Ansible modules for automated management of role-based access control (RBAC)
8
CHAPTER 1. OVERVIEW
RHEL 8.4 provides Ansible modules for automated management of role-based access control (RBAC)
in Identity Management (IdM), an Ansible role for backing up and restoring IdM servers, and an Ansible
module for location management.
From RHEL 7.9 to RHEL 8.4 on the 64-bit Intel, IBM POWER 8 (little endian), and IBM Z
architectures
From RHEL 7.6 to RHEL 8.4 on architectures that require kernel version 4.14: IBM POWER 9
(little endian) and IBM Z (Structure A)
From RHEL 7.7 to RHEL 8.2 on systems with SAP HANA. To ensure your system with SAP
HANA remains supported after upgrading to RHEL 8.2, enable the RHEL 8.2 Update Services
for SAP Solutions (E4S) repositories.
For more information, see Supported in-place upgrade paths for Red Hat Enterprise Linux . For
instructions on performing an in-place upgrade, see Upgrading from RHEL 7 to RHEL 8 .
With the release of RHEL 8.4, additional required data files are now downloaded automatically from
cloud.redhat.com if you are using Red Hat Subscription Manager (RHSM) and have not previously
downloaded older required data files without performing the upgrade.
If you are using an earlier version of CentOS Linux or Oracle Linux, namely versions 6 or 7, you can
convert your operating system to RHEL and then perform an in-place upgrade to RHEL 8. Note that
CentOS Linux 6 and Oracle Linux 6 conversions use the unsupported Convert2RHEL utility. For more
information on unsupported conversions, see How to convert from CentOS Linux 6 or Oracle Linux 6 to
RHEL 6.
For information regarding how Red Hat supports conversions from other Linux distributions to RHEL,
see the Convert2RHEL Support Policy document .
Registration Assistant
9
Red Hat Enterprise Linux 8.4 8.4 Release Notes
Kickstart Generator
Kickstart Converter
Information regarding the Red Hat Enterprise Linux life cycle is provided in the Red Hat
Enterprise Linux Life Cycle document.
Instructions on how to perform an in-place upgrade from RHEL 7 to RHEL 8are provided by
the document Upgrading to RHEL 8 .
The Red Hat Insights service, which enables you to proactively identify, examine, and resolve
known technical issues, is now available with all RHEL subscriptions. For instructions on how to
install the Red Hat Insights client and register your system to the service, see the Red Hat
Insights Get Started page.
10
CHAPTER 2. ARCHITECTURES
CHAPTER 2. ARCHITECTURES
Red Hat Enterprise Linux 8.4 is distributed with the kernel version 4.18.0-305, which provides support
for the following architectures:
64-bit IBM Z
Make sure you purchase the appropriate subscription for each architecture. For more information, see
Get Started with Red Hat Enterprise Linux - additional architectures . For a list of available subscriptions,
see Subscription Utilization on the Customer Portal.
11
Red Hat Enterprise Linux 8.4 8.4 Release Notes
3.1. INSTALLATION
Red Hat Enterprise Linux 8 is installed using ISO images. Two types of ISO image are available for the
AMD64, Intel 64-bit, 64-bit ARM, IBM Power Systems, and IBM Z architectures:
Binary DVD ISO: A full installation image that contains the BaseOS and AppStream repositories
and allows you to complete the installation without additional repositories.
NOTE
The Binary DVD ISO image is larger than 4.7 GB, and as a result, it might not fit
on a single-layer DVD. A dual-layer DVD or USB key is recommended when using
the Binary DVD ISO image to create bootable installation media. You can also
use the Image Builder tool to create customized RHEL images. For more
information about Image Builder, see the Composing a customized RHEL system
image document.
Boot ISO: A minimal boot ISO image that is used to boot into the installation program. This
option requires access to the BaseOS and AppStream repositories to install software packages.
The repositories are part of the Binary DVD ISO image.
See the Performing a standard RHEL installation document for instructions on downloading ISO images,
creating installation media, and completing a RHEL installation. For automated Kickstart installations
and other advanced topics, see the Performing an advanced RHEL installation document.
3.2. REPOSITORIES
Red Hat Enterprise Linux 8 is distributed through two main repositories:
BaseOS
AppStream
Both repositories are required for a basic RHEL installation, and are available with all RHEL
subscriptions.
Content in the BaseOS repository is intended to provide the core set of the underlying OS functionality
that provides the foundation for all installations. This content is available in the RPM format and is
subject to support terms similar to those in previous releases of RHEL. For a list of packages distributed
through BaseOS, see the Package manifest.
Content in the Application Stream repository includes additional user space applications, runtime
languages, and databases in support of the varied workloads and use cases. Application Streams are
available in the familiar RPM format, as an extension to the RPM format called modules, or as Software
Collections. For a list of packages available in AppStream, see the Package manifest.
In addition, the CodeReady Linux Builder repository is available with all RHEL subscriptions. It provides
additional packages for use by developers. Packages included in the CodeReady Linux Builder
repository are unsupported.
For more information about RHEL 8 repositories, see the Package manifest.
12
CHAPTER 3. DISTRIBUTION OF CONTENT IN RHEL 8
Components made available as Application Streams can be packaged as modules or RPM packages and
are delivered through the AppStream repository in RHEL 8. Each Application Stream component has a
given life cycle, either the same as RHEL 8 or shorter. For details, see Red Hat Enterprise Linux Life
Cycle.
Modules are collections of packages representing a logical unit: an application, a language stack, a
database, or a set of tools. These packages are built, tested, and released together.
Module streams represent versions of the Application Stream components. For example, several
streams (versions) of the PostgreSQL database server are available in the postgresql module with the
default postgresql:10 stream. Only one module stream can be installed on the system. Different
versions can be used in separate containers.
Detailed module commands are described in the Installing, managing, and removing user-space
components document. For a list of modules available in AppStream, see the Package manifest.
13
Red Hat Enterprise Linux 8.4 8.4 Release Notes
With this update the problem is fixed, but the previous list of devices is cleared when updating the boot
device NVRAM variable.
(BZ#1854307)
Now, when a user executes the installation in KVM, and QEMU provides a virtio-gpu driver, the installer
automatically starts the graphical console. The user can switch to text or VNC mode by appending the
inst.text or inst.vnc boot parameters in the VM’s kernel command line.
(BZ#1609325)
With this release, appropriate warning messages are displayed when the boot arguments are used
without the inst prefix. The warning messages are displayed in dracut when booting the installation and
also when the installation program is started on a terminal.
Deprecated boot argument %s must be used with the inst. prefix. Please use inst.%s instead.
Anaconda boot arguments without inst. prefix have been deprecated and will be removed in a future
major release.
$1 has been deprecated. All usage of Anaconda boot arguments without the inst. prefix have been
deprecated and will be removed in a future major release. Please use $2 instead.
(BZ#1897657)
14
CHAPTER 4. NEW FEATURES
blueprint for RHEL for Edge image using the CLI, you can define the name of the kernel to be used in an
image, by setting the customizations.kernel.name key. If you do not specify any kernel name, the
image include the default kernel package.
(BZ#1960043)
(BZ#1865803)
Previously, running the createrepo_c command on RHEL8 packages to create a new repository did not
include modular repodata in this repository. Consequently, it caused various problems with repositories.
With this update, createrepo_c:
merges the found module YAML files into a single modular document modules.yaml
As a result, adding modular metadata to repositories is now automatic and no longer has to be done as a
separate step using the modifyrepo_c command.
(BZ#1795936)
The ability to mirror a transaction between systems within DNF is now supported
With this update, the user can store and replay a transaction within DNF.
To store a transaction from DNF history into a JSON file, run the dnf history store command.
To replay the transaction later on the same machine, or on a different one, run the dnf history
replay command.
Comps groups operations storing and replaying is supported. Module operations are not yet supported,
and consequently, are not stored or replayed.
(BZ#1807446)
The createrepo_c packages have been rebased to version 0.16.2 which provides the following notable
changes over the previous version:
(BZ#1894361)
15
Red Hat Enterprise Linux 8.4 8.4 Release Notes
(BZ#1698145)
The OpenIPMI packages have been upgraded to version 2.0.29. Notable changes over the previous
version include:
(BZ#1796588)
The freeipmi packages have been upgraded to version 1.6.6. Notable changes over the previous version
include:
(BZ#1861627)
The opal-prd package has been rebased to version 6.6.3. Notable changes include:
Fixed the bug for opal-gard on POWER9P so that the system can identify the chip targets for
gard records.
16
CHAPTER 4. NEW FEATURES
For hw/phb4:
(BZ#1844427)
The opencryptoki packages have been rebased to version 3.15.1. Notable changes include:
Fixed private and public token object conversion on Little Endian platforms.
Replaced deprecated OpenSSL interfaces in mech_ec.c file and in ICA, TPM, and Soft tokens.
Added IBM specific SHA3 HMAC and SHA512/224/256 HMAC mechanisms in the Soft token.
17
Red Hat Enterprise Linux 8.4 8.4 Release Notes
(BZ#1847433)
The powerpc-utils packages have been rebased to version 1.3.8. Notable changes include:
Commands that do not depend on Perl are now moved to the core subpackage.
Added helper function to calculate the delta, scaled timebase, and to derive PURR/SPURR
values.
Fixed the bash command substitution warning using the lsdevinfo utility.
(BZ#1853297)
The net_id built-in from systemd-udevd service gains a new kernel cmdline option net.naming-
18
CHAPTER 4. NEW FEATURES
The net_id built-in from systemd-udevd service gains a new kernel cmdline option net.naming-
scheme=SCHEME_VERSION. Based on the value of the SCHEME_VERSION, a user can select a
version of the algorithm that will generate the network device name.
For example, to use the features of net_id built-in in RHEL 8.4, set the value of the
SCHEME_VERSION to rhel-8.4.
Similarly, you can set the value of the SCHEME_VERSION to any other minor release that includes the
required change or fix.
(BZ#1827462)
# postconf info_log_address_format=external
# postconf smtpd_discard_ehlo_keywords=
# postconf rhel_ipv6_normalize=yes
(BZ#1688389)
Changed the default EDNS buffer size from 4096 to 1232 bytes. This change will prevent the
loss of fragmented packets in some networks.
Fixed the crashing problem in the named service when cleaning the reused dead nodes in the
lib/dns/rbtdb.c file.
Fixed the problem of configured multiple forwarders sometimes occurring in the named service.
Fixed the problem of the named service of assigning incorrect signed zones with no DS record
at the parent as bogus.
(BZ#1882040)
With this enhancement, the following three options have been added to the unbound configuration:
19
Red Hat Enterprise Linux 8.4 8.4 Release Notes
log-servfail enables log lines that explain the reason for the SERVFAIL error code to clients.
log-tag-queryreply enables tagging of log queries and log replies in the log file.
(BZ#1850460)
The ghostscript-9.27 release contains security fixes for the following vulnerabilities:
CVE-2020-14373
CVE-2020-16287
CVE-2020-16288
CVE-2020-16289
CVE-2020-16290
CVE-2020-16291
CVE-2020-16292
CVE-2020-16293
CVE-2020-16294
CVE-2020-16295
CVE-2020-16296
CVE-2020-16297
CVE-2020-16298
CVE-2020-16299
CVE-2020-16300
CVE-2020-16301
CVE-2020-16302
CVE-2020-16303
CVE-2020-16304
CVE-2020-16305
CVE-2020-16306
CVE-2020-16307
CVE-2020-16308
20
CHAPTER 4. NEW FEATURES
CVE-2020-16309
CVE-2020-16310
CVE-2020-17538
(BZ#1874523)
(BZ#1874052)
DNSTAP provides an advanced way to monitor and log details of incoming name queries. It also records
sent answers from the named service. Classic query logging of the named service has a negative impact
on the performance of the named service.
As a result, DNSTAP offers a way to perform continuous logging of detailed incoming queries without
impacting the performance penalty. The new dnstap-read utility allows you to analyze the queries
running on a different system.
(BZ#1854148)
The SpamAssassin package has been upgraded to version 3.4.4. Notable changes include:
(BZ#1822388)
(BZ#1883999)
(BZ#1868041)
21
Red Hat Enterprise Linux 8.4 8.4 Release Notes
This enhancement enables support for capturing RDMA traffic with tcpdump. It allows users to capture
and analyze offloaded RDMA traffic with the tcpdump tool. As a result, users can use tcpdump to view
RDMA capable devices, capture RoCE and VMA traffic, and analyze its content.
(BZ#1743650)
4.6. SECURITY
libreswan rebased to 4.3
The libreswan packages have been upgraded to version 4.3. Notable changes over the previous version
include:
(BZ#1891128)
(BZ#1372050)
(BZ#1025061)
The libpwquality package has been rebased to version 1.4.4. This release includes multiple bug fixes and
translation updates. Most notably, the following setting options have been added to the pwquality.conf
file:
22
CHAPTER 4. NEW FEATURES
retry
enforce_for_root
local_users_only
(BZ#1537240)
The p11-kit packages have been upgraded from version 0.23.14 to version 0.23.19. The new version
fixes several bugs and provides various enhancements, notably:
(BZ#1887853)
The pyOpenSSL packages have been rebased to upstream version 19.0.0. This version provides bug
fixes and enhancements, most notably:
No longer raising an error when trying to add a duplicate certificate with X509Store.add_cert
(BZ#1629914)
The Operating System Protection Profile (OSPP) has been updated in accordance with the
Protection Profile for General Purpose Operating Systems for Red Hat Enterprise Linux 8.4.
The ANSSI family of profiles based on the ANSSI BP-028 recommendations from the French
National Security Agency (ANSSI), has been introduced. The content contains profiles
implementing rules of the Minimum, Intermediary and Enhanced hardening levels.
The Security Technical Implementation Guide (STIG) security profile has been updated, and it
implements rules from the recently-released version V1R1.
(BZ#1889344)
Fixed certain memory issues that were causing systems with large amounts of files to run out of
memory.
23
Red Hat Enterprise Linux 8.4 8.4 Release Notes
Improved yamlfilecontent: updated yaml-filter, extended the schema and probe to be able to
work with a set of values in maps.
Platform elements in XCCDF files are now properly resolved in accordance with the XCCDF
specification.
Fixed dpkginfo probe to use pkgCacheFile instead of manually opening the cache.
(BZ#1887794)
You should use only the current version of this profile because the draft profile is no longer valid.
WARNING
(BZ#1918742)
Profiles for ANSSI-BP-028 Minimal, Intermediary and Enhanced levels are now available in
SCAP Security Guide
With the new profiles, you can harden the system to the recommendations from the French National
Security Agency (ANSSI) for GNU/Linux Systems at the Minimal, Intermediary and Enhanced hardening
levels. As a result, you can configure and automate compliance of your RHEL 8 systems according to
your required ANSSI hardening level by using the ANSSI Ansible Playbooks and the ANSSI SCAP
profiles.
(BZ#1778188)
24
CHAPTER 4. NEW FEATURES
The scap-workbench GUI tool now supports scanning remote systems using passwordless sudo
access. This feature reduces the security risk imposed by supplying root’s credentials.
Be cautious when using scap-workbench with passwordless sudo access and the remediate option.
Red Hat recommends dedicating a well-secured user account just for the OpenSCAP scanner.
(BZ#1877522)
With this release, the rhel8/rhel8-tang container image is available in the registry.redhat.io catalog.
The container image provides Tang-server decryption capabilities for Clevis clients that run either in
OpenShift Container Platform (OCP) clusters or in separate virtual machines.
(BZ#1913310)
Clevis now produces a generic initramfs and no longer automatically adds the rd.neednet=1
parameter to the kernel command line.
Clevis now properly handles incorrect configurations that use the sss pin, and the clevis
encrypt sss sub-command returns outputs that indicate the error cause.
(BZ#1887836)
If your configuration uses the previous functionality, you can either enter the dracut command with the -
-hostonly-cmdline argument or create the clevis.conf file in the /etc/dracut.conf.d and add the
hostonly_cmdline=yes option to the file. A Tang binding must be present during the initrd build
process.
(BZ#1853651)
(BZ#1869874)
The fapolicyd packages have been rebased to upstream version 1.0.2. This version provides many bug
fixes and enhancements over the previous version, most notably:
Added the integrity configuration option for enabling integrity checks through:
25
Red Hat Enterprise Linux 8.4 8.4 Release Notes
The fapolicyd RPM plugin now registers any system update that is handled by either the YUM
package manager or the RPM Package Manager.
You can now include rule numbers in debug and syslog messages.
(BZ#1887451)
New RPM plugin notifies fapolicyd about changes during RPM transactions
This update of the rpm packages introduces a new RPM plugin that integrates the fapolicyd framework
with the RPM database. The plugin notifies fapolicyd about installed and changed files during an RPM
transaction. As a result, fapolicyd now supports integrity checking.
Note that the RPM plugin replaces the YUM plugin because its functionality is not limited to YUM
transactions but covers also changes by RPM.
(BZ#1923167)
4.7. NETWORKING
XDP is conditionally supported
Red Hat supports the eXpress Data Path (XDP) feature only if all of the following conditions apply:
You use the libxdp library to load the program into the kernel
The XDP program does not use the XDP hardware offloading
In RHEL 8.4, XDP_TX and XDP_REDIRECT return codes are now supported in XDP programs.
For details about unsupported XDP features, see XDP features that are available as Technology Preview
(BZ#1952421)
The ipv4.dhcp-reject-servers connection property has been added to define from which DHCP
server IDs NetworkManager should reject lease offers.
The active_slave bond option has been deprecated. Instead, set the primary option in the
controller connection.
26
CHAPTER 4. NEW FEATURES
Support for the WPA3 Enterprise Suite-B 192-bit mode has been added.
For further information about notable changes, read the upstream release notes:
NetworkManager 1.30.0
NetworkManager 1.28.0
(BZ#1878783)
The iproute2 utility introduces traffic control actions to add MPLS headers before Ethernet
header
With this enhancement, the iproute2 utility offers three new traffic control ( tc) actions:
mac_push - The act_mpls module provides this action to add MPLS labels before the original
Ethernet header.
push_eth - The act_vlan module provides this action to build an Ethernet header at the
beginning of the packet.
pop_eth - The act_vlan module provides this action to drop the outer Ethernet header.
These tc actions help in implementing layer 2 virtual private network (L2VPN) by adding multiprotocol
label switching (MPLS) labels before Ethernet headers. You can use these actions while adding tc filters
to the network interfaces.
Red Hat provides these actions as unsupported Technology Preview, because MPLS itself is a
Technology Preview feature.
For more information about these actions and their parameters, refer to the tc-mpls(8) and tc-vlan(8)
man pages.
(BZ#1861261)
For further details, see the /usr/share/doc/nmstate/README.md file and the sections about
nmstatectl in the Configuring and managing networking documentation.
(BZ#1674456)
27
Red Hat Enterprise Linux 8.4 8.4 Release Notes
Note that in order for the virtual console or virtual network interface to be operational, the target must
be running a tmfifo driver.
(BZ#1744737)
The iptraf-ng packages have been rebased to upstream version 1.2.1, which provides several bug fixes
and improvements. Most notably:
The iptraf-ng application no longer causes 100% CPU usage when showing the detailed
statistics of a deleted interface.
Partial support for IP over InfiniBand (IPoIB) interface has been added. Because the kernel does
not provide the source address on the interface, you cannot use this feature in the LAN station
monitor mode.
Packet capturing abstraction has been added to allow iptraf-ng to capture packets at multi-
gigabit speed.
You can now scroll using the Home, End, Page up, and Page down keyboard keys.
(BZ#1906097)
4.8. KERNEL
Kernel version in RHEL 8.4
Red Hat Enterprise Linux 8.4 is distributed with the kernel version 4.18.0-305.
See also Important Changes to External Kernel Parameters and Device Drivers.
(BZ#1839151)
The eBPF bytecode first loads to the kernel, followed by its verification, code translation to the native
machine code with just-in-time compilation, and then the virtual machine executes the code.
Red Hat ships numerous components that utilize the eBPF virtual machine. Each component is in a
different development phase, and thus not all components are currently fully supported. In RHEL 8.4,
the following eBPF components are supported:
28
CHAPTER 4. NEW FEATURES
The BPF Compiler Collection (BCC) tools package, which provides tools for I/O analysis,
networking, and monitoring of Linux operating systems using eBPF.
The BCC library which allows the development of tools similar to those provided in the BCC
tools package.
The eBPF for Traffic Control (tc)feature, which enables programmable packet processing
inside the kernel network data path.
The eXpress Data Path (XDP) feature, which provides access to received packets before the
kernel networking stack processes them, is supported under specific conditions.
The libbpf package, which is crucial for bpf related applications like bpftrace and bpf/xdp
development.
The xdp-tools package, which contains userspace support utilities for the XDP feature, is now
supported on the AMD and Intel 64-bit architectures. This includes the libxdp library, the xdp-
loader utility for loading XDP programs, the xdp-filter example program for packet filtering,
and the xdpdump utility for capturing packets from a network interface with XDP enabled.
Note that all other eBPF components are available as Technology Preview, unless a specific component
is indicated as supported.
The following notable eBPF components are currently available as Technology Preview:
The AF_XDP socket for connecting the eXpress Data Path (XDP) path to user space
For more information regarding the Technology Preview components, see Technology Previews.
(BZ#1780124)
(BZ#1827015)
The xmon program changes to support Secure Boot and kernel_lock resilience against
attacks
If the Secure Boot mechanism is disabled, you can set the xmon program into read-write mode
(xmon=rw) on the kernel command-line. However, if you specify xmon=rw and boot into Secure Boot
mode, the kernel_lockdown feature overrides xmon=rw and changes it to read-only mode. The
additional behavior of xmon depending on Secure Boot enablement is listed below:
xmon=ro (default)
29
Red Hat Enterprise Linux 8.4 8.4 Release Notes
These changes to xmon behavior aim to support the Secure Boot and kernel_lock resilience against
attackers with root permissions.
For information how to configure kernel command-line parameters, see Configuring kernel command-
line parameters on the Customer Portal.
(BZ#1952161)
For instructions on installing Omni-Path Architecture, see: Cornelis Omni-Path Fabric Software Release
Notes file.
(BZ#1960412)
(BZ#1871214)
Added support for handling the Trusted Platform Module (TPM2) multi-banks feature
Extended the boot aggregate value to Platform Configuration Registers (PCRs) 8 and 9
Added support for Intel Task State Segment (TSS2) PCR reading
Added support for the original Integrity Measurement Architecture (IMA) template
Both the libimaevm.so.0 and libimaevm.so.2 libraries are part of ima-evm-utils. Users of
30
CHAPTER 4. NEW FEATURES
Both the libimaevm.so.0 and libimaevm.so.2 libraries are part of ima-evm-utils. Users of
libimaevm.so.0 will not be affected, when their more recent applications use libimaevm.so.2.
(BZ#1868683)
AMD64 and Intel 64: specific architecture policy in secure boot state.
IBM Power System (little-endian): specific architecture policy in secure and trusted boot state.
For all architectures, the measurement template has changed to IMA-SIG The template
includes the signature bits when present. Its format is d-ng|n-ng|sig.
The goal of this update is to decrease the level of feature difference in IMA and EVM, so that userspace
applications can behave equally across all supported CPU architectures.
(BZ#1869758)
WARNING
Proactive compaction can result in increased compaction activity. This might have
serious, system-wide impact, because memory pages that belong to different
processes are moved and remapped. Therefore, enabling proactive compaction
requires utmost care to avoid latency spikes in applications.
(BZ#1848427)
With this update, RHEL 8 supports the Error Detection and Correction (EDAC) kernel module set in 8th
31
Red Hat Enterprise Linux 8.4 8.4 Release Notes
With this update, RHEL 8 supports the Error Detection and Correction (EDAC) kernel module set in 8th
and 9th generation Intel Core Processors (CoffeeLake). The EDAC kernel module mainly handles Error
Code Correction (ECC) memory and detect and report PCI bus parity errors.
(BZ#1847567)
(BZ#1798711)
Note that the new and more precise memory accounting requires more CPU time. However, the
difference seems to be negligible in practice.
(BZ#1877019)
(BZ#1548297)
(BZ#1839055)
NOTE
32
CHAPTER 4. NEW FEATURES
Using the --group-sort-idx command line option, it is possible to sort by the column number.
(BZ#1851933)
(BZ#1867910, BZ#1886901)
The update provides multiple bug fixes and enhancements. Notable changes include:
Added Berkeley Packet Filter (BPF) iterator for map elements and to iterate all BPF programs
for efficient in-kernel inspection.
Programs in the same control group (cgroup) can share the cgroup local storage map.
The SO_KEEPALIVE and related options are available to the bpf_setsockopt() helper.
Note that some BPF programs may need changes to their source code.
(BZ#1874005)
Fix to make the tcptracer tool output show SPORT and DPORT columns for IPv6 addresses
(BZ#1879411)
Fixed a failure to load the Berkeley Packet Filter (BPF) program on IBM Z architectures
33
Red Hat Enterprise Linux 8.4 8.4 Release Notes
(BZ#1879413)
Added support for accessing Berkeley Packet Filter (BPF) map fields in the bpf_map struct
from programs that have BPF Type Format (BTF) struct access
(BZ#1919345)
perf now supports adding or removing tracepoints from a running collector without having
to stop or restart perf
Previously, to add or remove tracepoints from an instance of perf record, the perf process had to be
stopped. As a consequence, performance data that occurred during the time the process was stopped
was not collected and, therefore, lost. With this update, you can dynamically enable and disable
tracepoints being collected by perf record via the control pipe interface without having to stop the perf
record process.
(BZ#1844111)
The perf tool now supports recording and displaying absolute timestamps for trace data
With this update, perf script can now record and display trace data with absolute timestamps.
Note: To display trace data with absolute timestamps, the data must be recorded with the clock ID
specified.
To display trace data recorded with the specified clock ID, execute the following command:
(BZ#1811839)
(BZ#1903566)
perf now supports circular buffers that use specified events to trigger snapshots
With this update, you can create custom circular buffers that write data to a perf.data file when an event
you specify is detected. As a result, perf record can run continuously in the system background without
34
CHAPTER 4. NEW FEATURES
generating excess overhead by continuously writing data to a perf.data file, and only recording data you
are interested in.
To create a custom circular buffer using the perf tool that records event specific snapshots, use the
following command:
(BZ#1844086)
Kernel DRBG and Jitter entropy source are compliant to NIST SP 800-90A and NIST SP
800-90B
Kernel Deterministic Random Bit Generator (DRBG) and Jitter entropy source are now compliant to
recommendation for random number generation using DRBG (NIST SP 800-90A) and
recommendation for the entropy sources used for random bit generation (NIST SP 800-90B)
specifications. As a result, applications in FIPS mode can use these sources as FIPS-compliant
randomness and noise sources.
(BZ#1905088)
kdump now supports Virtual Local Area Network tagged team network interface
This update adds support to configure Virtual Local Area Network tagged team interface for kdump. As
a result, this feature now enables kdump to use a Virtual Local Area Network tagged team interface to
dump a vmcore file.
(BZ#1844941)
(BZ#1858099, BZ#1858105)
When it detects a stalled thread, stalld temporarily changes the scheduling policy to
SCHED_DEADLINE and assigns the thread a slice of CPU time to make forward progress. When the
time slice completes or the thread blocks, the thread goes back to its original scheduling policy.
(BZ#1875037)
(BZ#1844416)
35
Red Hat Enterprise Linux 8.4 8.4 Release Notes
Metrics for POWERPC hv_24x7 nest events are now available for perf. By aggregating multiple events,
these metrics provide a better understanding of the values obtained from perf counters and how
effectively the CPU is able to process the workload.
(BZ#1780258)
The hwloc functionality can report details on Nonvolatile Memory Express (NVMe) drives
including total disk size and sector size.
(BZ#1841354)
(BZ#1495358)
With this update, for automatic partitioning, the installer continues to create a swap partition of
maximum 128 GB, but in case of manual partitioning, you can now create a swap partition of 16 TiB.
(BZ#1656485)
Additional requirements from the hardware platform or the software running on the platform
might be necessary for successful surprise removal of NVMe devices.
Surprise removing an NVMe device that is critical to the system operation is not supported. For
example, you cannot remove an NVMe device that contains the operating system or a swap
partition.
(BZ#1634655)
With this enhancement, Stratis filesystem symlink paths have changed from /stratis/<stratis-
36
CHAPTER 4. NEW FEATURES
With this enhancement, Stratis filesystem symlink paths have changed from /stratis/<stratis-
pool>/<filesystem-name> to /dev/stratis/<stratis-pool>/<filesystem-name>. Consequently, all
existing Stratis symlinks must be migrated to utilize the new symlink paths.
Use the included stratis_migrate_symlinks.sh migration script or reboot your system to update the
symlink paths. If you manually changed the systemd unit files or the /etc/fstab file to automatically
mount Stratis filesystems, you must update them with the new symlink paths.
NOTE
If you do not update your configuration with the new Stratis symlink paths, or if you
temporarily disable the automatic mounts, the boot process might not complete the next
time you reboot or start your system.
(BZ#1798244)
Stratis now supports binding encrypted pools to a supplementary Clevis encryption policy
With this enhancement, you can now bind encrypted Stratis pools to Network Bound Disk Encryption
(NBDE) using a Tang server, or to the Trusted Platform Module (TPM) 2.0. Binding an encrypted Stratis
pool to NBDE or TPM 2.0 facilitates automatic unlocking of pools. As a result, you can access your
Stratis pools without having to provide the kernel keyring description after each system reboot. Note
that binding a Stratis pool to a supplementary Clevis encryption policy does not remove the primary
kernel keyring encryption.
(BZ#1868100)
New mount options to control when DAX is enabled on XFS and ext4 file systems
This update introduces new mount options which, when combined with the FS_XFLAG_DAX inode flag,
provide finer-grained control of the Direct Access (DAX) mode for files on XFS and ext4 file systems. In
prior releases, DAX was enabled for the entire file system using the dax mount option. Now, the direct
access mode can be enabled on a per-file basis.
The on-disk flag, FS_XFLAG_DAX, is used to selectively enable or disable DAX for a particular file or
directory. The dax mount option dictates whether or not the flag is honored:
-o dax=inode - follow FS_XFLAG_DAX. This is the default when no dax option is specified.
-o dax - is a legacy option which is an alias for "dax=always". This may be removed in the future,
so "-o dax=always" is preferred.
You can set FS_XFLAG_DAX flag by using the xfs_io utility’s chatter command:
(BZ#1838876, BZ#1838344)
(BZ#1887940)
37
Red Hat Enterprise Linux 8.4 8.4 Release Notes
fsopen() - creates a blank filesystem configuration context within the kernel for the filesystem
named in the fsname parameter, adds it into creation mode, and attaches it to a file descriptor,
which it then returns.
fsmount() - takes the file descriptor returned by fsopen() and creates a mount object for the
file system root specified there.
fsconfig() - supplies parameters to and issues commands against a file system configuration
context as set up by the fsopen(2) or fspick(2) system calls.
fspick() - creates a new file system configuration context within the kernel and attaches a pre-
existing superblock to it so that it can be reconfigured.
move_mount() - moves a mount from one location to another; it can also be used to attach an
unattached mount created by fsmount() or open_tree() with the OPEN_TREE_CLONE
system call.
open_tree() - picks the mount object specified by the pathname and attaches it to a new file
descriptor or clones it and attaches the clone to the file descriptor.
Note that the old API based on the mount() system call is still supported.
For additional information, see the Documentation/filesystems/mount_api.txt file in the kernel source
tree.
(BZ#1622041)
(BZ#1533270)
(BZ#1900674)
38
CHAPTER 4. NEW FEATURES
be set to true or false, and resources have a critical meta-attribute, which can also be set to true or
false. The value of the critical resource meta option determines the default value of the influence
option for all colocation constraints involving the resource as a dependent resource.
When the influence colocation constraint option has a value of true Pacemaker will attempt to keep
both the primary and dependent resource active. If the dependent resource reaches its migration
threshold for failures, both resources will move to another node, if possible.
When the influence colocation option has a value of false, Pacemaker will avoid moving the primary
resource as a result of the status of the dependent resource. In this case, if the dependent resource
reaches its migration threshold for failures, it will stop if the primary resource is active and can remain on
its current node.
By default, the value of the critical resource meta option is set to true, which in turn determines that the
default value of the influence option is true. This preserves the previous behavior where Pacemaker
attempted to keep both resources active.
(BZ#1371576)
(BZ#1869399)
Ability to specify a custom clone ID when creating a clone resource or promotable clone
resource
When you create a clone resource or a promotable clone resource, the clone resource is named
resource-id -clone by default. If that ID is already in use, PCS adds the suffix - integer, starting with an
integer value of 1 and incrementing by one for each additional clone. You can now override this default
by specifying a name for a clone resource ID or promotable clone resource ID with the clone-id option
when creating a clone resource with the pcs resource create or the pcs resource clone command. For
information on creating clone resources, see Creating cluster resources that are active on multiple
nodes.
(BZ#1741056)
(BZ#1667066)
(BZ#1667061)
39
Red Hat Enterprise Linux 8.4 8.4 Release Notes
You can change the configuration of the Corosync crypto cipher and hash with the pcs cluster
config update command.
You can change the Corosync authkey with the pcs cluster authkey corosync command.
(BZ#1457314)
New crypt resource agent for shared and encrypted GFS2 file systems
RHEL HA now supports a new crypt resource agent, which allows you to configure a LUKS encrypted
block device that can be used to provide shared and encrypted GFS2 file systems. Using the crypt
resource is currently supported only with GFS2 file systems. For information on configuring an
encrypted GFS2 file system, see Configuring an encrypted GFS2 file system in a cluster .
(BZ#1471182)
The merge (|) and update (|=) operators have been added to the dict class.
Type hinting generics have been added to certain standard types, such as list and dict.
The IANA Time Zone Database is now available through the new zoneinfo module.
Python 3.9 and packages built for it can be installed in parallel with Python 3.8 and Python 3.6 on the
same system.
$ python3.9
$ python3.9 -m pip --help
Note that Red Hat will continue to provide support for Python 3.6 until the end of life of RHEL 8.
40
CHAPTER 4. NEW FEATURES
Note that Red Hat will continue to provide support for Python 3.6 until the end of life of RHEL 8.
Similarly to Python 3.8, Python 3.9 will have a shorter life cycle; see Red Hat Enterprise Linux 8
Application Streams Life Cycle.
(BZ#1877430)
Changes in the default separator for the Python urllib parsing functions
To mitigate the Web Cache Poisoning CVE-2021-23336 in the Python urllib library, the default
separator for the urllib.parse.parse_qsl and urllib.parse.parse_qs functions is being changed from
both ampersand (&) and semicolon (;) to only an ampersand.
This change has been implemented in Python 3.6 with the release of RHEL 8.4, and will be backported
to Python 3.8 and Python 2.7 in the following minor release of RHEL 8.
The change of the default separator is potentially backwards incompatible, therefore Red Hat provides a
way to configure the behavior in Python packages where the default separator has been changed. In
addition, the affected urllib parsing functions issue a warning if they detect that a customer’s application
has been affected by the change.
For more information, see the Mitigation of Web Cache Poisoning in the Python urllib library (CVE-
2021-23336).
Python 3.9 is unaffected and already includes the new default separator (&), which can be changed only
by passing the separator parameter when calling the urllib.parse.parse_qsl and urllib.parse.parse_qs
functions in Python code.
(BZ#1935686, BZ#1928904)
The only supported Python versions are: 2.7 and 3.2 to 3.8.
The Python module has been improved: the generated code has been simplified and most
optimizations are now enabled by default.
PHP 7 is now the only supported PHP version; support for PHP 5 has been removed.
Performance has been significantly improved when running SWIG on large interface files.
Support for a command-line options file (also referred to as a response file) has been added.
If you want to upgrade from the swig:3.0 stream, see Switching to a later stream .
41
Red Hat Enterprise Linux 8.4 8.4 Release Notes
For information about the length of support for the swig module streams, see the Red Hat Enterprise
Linux 8 Application Streams Life Cycle.
(BZ#1853639)
Subversion 1.14 includes Python 3 bindings for automation and integration of Subversion
into the customer’s build and release infrastructure.
A new svnadmin rev-size command enables users to determine the total size of a revision.
A new experimental command has been added to provide an overview of the current working
copy status.
Various improvements to the svn log, svn info, and svn list commands have been
implemented. For example, svn list --human-readable now uses human-readable units for file
sizes.
Significant improvements to svn status for large working copies have been made.
Compatibility information:
Subversion 1.10 clients and servers interoperate with Subversion 1.14 servers and clients.
However, certain features might not be available unless both client and server are upgraded to
the latest version.
Repositories created under Subversion 1.10 can be successfully loaded in Subversion 1.14.
Subversion 1.14 distributed in RHEL 8 enables users to cache passwords in plain text on the
client side. This behaviour is the same as Subversion 1.10 but different from the upstream
release of Subversion 1.14.
The experimental Shelving feature has been significantly changed, and it is incompatible with
shelves created in Subversion 1.10. See the upstream documentation for details and upgrade
instructions.
If you want to upgrade from the subversion:1.10 stream, see Switching to a later stream .
For information about the length of support for the subversion module streams, see the Red Hat
Enterprise Linux 8 Application Streams Life Cycle.
42
CHAPTER 4. NEW FEATURES
(BZ#1844947)
Redis now supports Access Control List (ACL), which defines user permissions for command
calls and key pattern access.
Redis now supports a new RESP3 protocol, which returns more semantical replies.
Redis now offers server-side support for client-side caching of key values.
The Redis active expire cycle has been improved to enable faster eviction of expired keys.
Redis 6 is compatible with Redis 5, with the exception of this backward incompatible change:
When a set key does not exist, the SPOP <count> command no longer returns null. In Redis 6,
the command returns an empty set in this scenario, similar to a situation when it is called with a 0
argument.
If you want to upgrade from the redis:5 stream, see Switching to a later stream .
For information about the length of support for the redis module streams, see the Red Hat Enterprise
Linux 8 Application Streams Life Cycle.
(BZ#1862063)
Incremental sorting
Note that support for Just-In-Time (JIT) compilation, available in upstream since PostgreSQL 11, is
not provided by the postgresql:13 module stream.
43
Red Hat Enterprise Linux 8.4 8.4 Release Notes
If you want to upgrade from an earlier postgresql stream within RHEL 8, follow the procedure described
in Switching to a later stream and then migrate your PostgreSQL data as described in Migrating to a
RHEL 8 version of PostgreSQL.
For information about the length of support for the postgresql module streams, see the Red Hat
Enterprise Linux 8 Application Streams Life Cycle.
(BZ#1855776)
MariaDB now uses the unix_socket authentication plug-in by default. The plug-in enables
users to use operating system credentials when connecting to MariaDB through the local Unix
socket file.
MariaDB supports a new FLUSH SSL command to reload SSL certificates without a server
restart.
MariaDB adds mariadb-* named binaries and mysql* symbolic links pointing to the mariadb-*
binaires. For example, the mysqladmin, mysqlaccess, and mysqlshow symlinks point to the
mariadb-admin, mariadb-access, and mariadb-show binaries, respectively.
MariaDB supports a new INET6 data type for storing IPv6 addresses.
MariaDB now uses the Perl Compatible Regular Expressions (PCRE) library version 2.
The SUPER privilege has been split into several privileges to better align with each user role. As
a result, certain statements have changed required privileges.
MariaDB adds a new global variable, binlog_row_metadata, as well as system variables and
status variables to control the amount of metadata logged.
The default value of the eq_range_index_dive_limit variable has been changed from 0 to 200.
A new SHUTDOWN WAIT FOR ALL SLAVES server command and a new mysqladmin
shutdown --wait-for-all-slaves option have been added to instruct the server to shut down
only after the last binlog event has been sent to all connected replicas.
InnoDB now supports an instant DROP COLUMN operation and enables users to change the
column order.
44
CHAPTER 4. NEW FEATURES
MariaDB Galera Cluster has been upgraded to version 4 with the following notable changes:
Galera adds a new streaming replication feature, which supports replicating transactions of
unlimited size. During an execution of streaming replication, a cluster replicates a transaction in
small fragments.
The default value for the wsrep_on option in the /etc/my.cnf.d/galera.cnf file has changed
from 1 to 0 to prevent end users from starting wsrep replication without configuring required
additional options.
If you want to upgrade from the mariadb:10.3 module stream, see Upgrading from MariaDB 10.3 to
MariaDB 10.5.
For information about the length of support for the mariadb module streams, see the Red Hat
Enterprise Linux 8 Application Streams Life Cycle.
(BZ#1855781)
MariaDB 10.5 adds a new version of the Pluggable Authentication Modules (PAM) plug-in. The PAM
plug-in version 2.0 performs PAM authentication using a separate setuid root helper binary, which
enables MariaDB to utilize additional PAM modules.
In MariaDB 10.5, the Pluggable Authentication Modules (PAM) plug-in and its related files have been
moved to a new package, mariadb-pam. This package contains both PAM plug-in versions: version 2.0 is
the default, and version 1.0 is available as the auth_pam_v1 shared object library.
Note that the mariadb-pam package is not installed by default with the MariaDB server. To make the
PAM authentication plug-in available in MariaDB 10.5, install the mariadb-pam package manually.
See also known issue PAM plug-in version 1.0 does not work in MariaDB.
(BZ#1936842)
(BZ#1895021)
The python-PyMySQL package, which provides the pure-Python MySQL client library, has been
updated to version 0.10.1. The package is included in the python36, python38, and python39 modules.
45
Red Hat Enterprise Linux 8.4 8.4 Release Notes
This update adds support for the ed25519 and caching_sha2_password authentication
mechanisms.
The default character set in the python38 and python39 modules is utf8mb4, which aligns with
upstream. The python36 module preserves the default latin1 character set to maintain
compatibility with earlier versions of this module.
(BZ#1820628, BZ#1885641)
(BZ#1881490)
Note that the micropipenv package is distributed in the AppStream repository and is provided under
the Compatibility level 4. For more information, see the Red Hat Enterprise Linux 8 Application
Compatibility Guide.
(BZ#1849096)
Note that the py3c-devel and py3c-docs packages are distributed through the unsupported
CodeReady Linux Builder (CRB) repository .
(BZ#1841060)
(BZ#1869576)
With this update, you can use non-end-entity (non-leaf) certificates, such as a Certificate Authority
(CA) or intermediate certificate, with the SSLProxyMachineCertificateFile and
SSLProxyMachineCertificatePath configuration directives in the Apache HTTP Server. The Apache
HTTP server now treats such certificates as trusted CAs, as if they were used with the
46
CHAPTER 4. NEW FEATURES
(BZ#1883648)
When the timeout has been reached, httpd now fails with an error message Timeout was reached. Note
that in this scenario, the error message also contains Syntax error even if the configuration file is
syntactically valid. The httpd behavior upon timeout depends on the value of the
SecRemoteRulesFailAction configuration directive (the default value is Abort).
(BZ#1824859)
The mod_fcgid module can now pass up to 1024 environment variables to an FCGI server
process
With this update, the mod_fcgid module for the Apache HTTP Server can pass up to 1024 environment
variables to a FastCGI (FCGI) server process. The previous limit of 64 environment variables could
cause applications running on the FCGI server to malfunction.
(BZ#1876525)
The perl-IO-String package, which provides the Perl IO::String module, is now distributed through the
supported AppStream repository. In previous releases of RHEL 8, the perl-IO-String package was
available in the unsupported CodeReady Linux Builder repository.
(BZ#1890998)
Note that the quota-devel package is distributed through the unsupported CodeReady Linux Builder
(CRB) repository.
(BZ#1868671)
With this enhancement, glibc supports locating optimized library implementations in the glibc-hwcaps
subdirectories. The dynamic loader checks for library files in the sub-directories based on the CPU in
use and its hardware capabilities. This feature is available on following architectures: IBM Power Systems
47
Red Hat Enterprise Linux 8.4 8.4 Release Notes
(BZ#1817513)
The glibc dynamic loader now activates selected audit modules at run time
Previously, the binutils link editor ld supported the --audit option to select audit modules for activation
at run time, but the glibc dynamic loader ignored the request. With this update, the glib dynamic loader
no longer ignores the request, and loads the indicated audit modules. As a result, it is possible to
activate audit modules for specific programs without writing wrapper scripts or using similar
mechanisms.
(BZ#1871385)
This update introduces new implementations of the functions strlen, strcpy, stpcpy, and rawmemchr
for IBM POWER9. As a result, these functions now execute faster on IBM POWER9 hardware which
leads to performance gains.
(BZ#1871387)
(BZ#1871395)
(BZ#1821994)
GCC now emits vector alignment hints for certain IBM Z systems
This update enables the GCC compiler to emit vector load and store alignment hints for IBM z13
processors. To use this enhancement the assembler must support such hints. As a result, users now
benefit from improved performance of certain vector operations.
(BZ#1850498)
(BZ#1892001)
48
CHAPTER 4. NEW FEATURES
The elfutils package has been updated to version 0.182. Notable bug fixes and enhancements include:
elf_update now fixes bad sh_addralign values in sections that have set the
SHF_COMPRESSED flag.
debuginfod has a more efficient package traversal, tolerating various errors during scanning.
The grooming process is more visible and interruptible, and provides more Prometheus metrics.
(BZ#1875318)
Users can now access implicit thread local storage variables on these architectures: AMD64,
Intel 64, IBM Z, the little-endian variant of IBM Power Systems.
Improved concurrency for scripts using global variables. The locks required to protect
concurrent access to global variables have been optimized so that they span the smallest
possible critical region.
New syntax for defining aliases with both a prologue and an epilogue.
For further information about notable changes, read the upstream release notes before updating.
(BZ#1875341)
(BZ#1504123)
To use CMake on a project that requires the version 3.18.2 or less, use the command
cmake_minimum_required(version x.y.z).
49
Red Hat Enterprise Linux 8.4 8.4 Release Notes
For further information on new features and deprecated functionalities, see the CMake Release Notes .
(BZ#1816874)
The libmpc package has been rebased to version 1.1.0, which provides several enhancements and bug
fixes over the previous version. For details, see GNU MPC 1.1.0 release notes .
(BZ#1835193)
The GCC compiler has been updated to the upstream version, which provides multiple bug fixes.
The following tools and versions are provided by GCC Toolset 10:
Tool Version
GCC 10.2.1
GDB 9.2
Valgrind 3.16.0
SystemTap 4.4
Dyninst 10.2.1
binutils 2.35
elfutils 0.182
dwz 0.12
make 4.2.1
strace 5.7
ltrace 0.7.91
50
CHAPTER 4. NEW FEATURES
Tool Version
annobin 9.29
To run a shell session where tool versions from GCC Toolset 10 override system versions of these tools:
The GCC Toolset 10 components are available in the two container images:
rhel8/gcc-toolset-10-toolchain, which includes the GCC compiler, the GDB debugger, and the
make automation tool.
Note that only the GCC Toolset 10 container images are now supported. Container images of earlier
GCC Toolset versions are deprecated.
For details regarding the container images, see Using the GCC Toolset container images .
(BZ#1918055)
(BZ#1656139)
GCC Toolset 10: GCC now supports ENQCMD and ENQCMDS instructions on Intel Sapphire
Rapids processors
In GCC Toolset 10, the GNU Compiler Collection (GCC) now supports the ENQCMD and ENQCMDS
instructions, which you can use to submit work descriptors to devices automatically. To apply this
enhancement, run GCC with the -menqcmd option.
(BZ#1891998)
51
Red Hat Enterprise Linux 8.4 8.4 Release Notes
In GCC Toolset 10, the Dyninst binary analysis and modification tool has been updated to version 10.2.1.
Notable bug fixes and enhancements include:
(BZ#1892007)
elf_update now fixes bad sh_addralign values in sections that have set the
SHF_COMPRESSED flag.
debuginfod has a more efficient package traversal, tolerating various errors during scanning.
The grooming process is more visible and interruptible, and provides more Prometheus metrics.
(BZ#1879758)
Linking is now faster and requires less memory due to the newly implemented object file format
and increased concurrency of internal phases. With this enhancement, internal linking is now the
default. To disable this setting, use the compiler flag -ldflags=-linkmode=external.
Allocating small objects has been improved for high core counts, including worst-case latency.
Treating the CommonName field on X.509 certificates as a host name when no Subject
Alternative Names are specified is now disabled by default. To enable it, add the value
x509ignoreCN=0 to the GODEBUG environment variable.
Go now includes the new package time/tzdata. It enables you to embed the timezone database
into a program even if the timezone database is not available on your local system.
(BZ#1870531)
You can now use the path of a rustdoc page item to link to it in rustdoc.
52
CHAPTER 4. NEW FEATURES
The rust test framework now hides thread output. Output of failed tests still show in the
terminal.
You can now use [T; N]: TryFrom<Vec<T>> to turn a vector into an array of any length.
You can now use slice::select_nth_unstable to perform ordered partitioning. This function is
also available with the following variants:
You can now use ManuallyDrop as the type of a union field. It is also possible to use impl Drop
for Union to add the Drop trait to existing unions. This makes it possible to define unions where
certain fields need to be dropped manually.
Container images for Rust Toolset have been deprecated and Rust Toolset has been added to
the Universal Base Images (UBI) repositories.
(BZ#1896712)
Support for the -fstack-clash-protection command-line option has been added to the AMD
and Intel 64-bit architectures, IBM Power Systems, Little Endian, and IBM Z. This new compiler
flag protects from stack-clash attacks by automatically checking each stack page.
The new compiler flag -fno-common is now enabled by default. With this enhancement, code
written in C using tentative variable definitions in multiple translation units now triggers
multiple-definition linker errors. To disable this setting, use the -fcommon flag.
Container images for LLVM Toolset have been deprecated and LLVM Toolset has been added
to the Universal Base Images (UBI) repositories.
(BZ#1892716)
The pcp package has been upgraded to version 5.2.5. Notable changes include:
pmdaperfevent(1) support for the hv_24x7 core-level and hv_gpci event metrics.
53
Red Hat Enterprise Linux 8.4 8.4 Release Notes
New Linux process accounting metrics, Linux ZFS metrics, Linux XFS metric, Linux kernel socket
metrics, Linux multipath TCP metrics, Linux memory and ZRAM metrics, and S.M.A.R.T. metric
support for NVM Express disks.
New pcp-atop(1) utility to process accounting statistics and per-process network statistics
reporting.
New pmseries(1) utility to query functions, language extensions, and REST API.
New pmie(1) rules for detecting OOM kills and socket connection saturation.
(BZ#1854035)
Accessing remote hosts through a central pmproxy for the Vector data source in grafana-
pcp
In some environments, the network policy does not allow connections from the dashboard viewer’s
browser to the monitored hosts directly. This update makes it possible to customize the hostspec in
order to connect to a central pmproxy, which forwards the requests to the individual hosts.
(BZ#1845592)
The grafana package has been upgraded to version 7.3.6. Notable changes include:
For more information, see What’s New in Grafana v7.0 , What’s New in Grafana v7.1 , What’s New in
Grafana v7.2, and What’s New in Grafana v7.3 .
(BZ#1850471)
54
CHAPTER 4. NEW FEATURES
The grafana-pcp package has been upgraded to version 3.0.2. Notable changes include:
Redis:
Vector:
Supports derived metrics, which allows the usage of arithmetic operators and statistical
functions inside a query. For more information, see the pmRegisterDerived(3) man page.
Configurable hostspec, where you can access remote Performance Metrics Collector
Daemon (PMCDs) through a central pmproxy.
Dashboards:
Detects potential performance issues and shows possible solutions with the checklist
dashboards, using the Utilization Saturation and Errors (USE) method.
New MS SQL server dashboard, eBPF/BCC dashboard, and container overview dashboard
with the CGroups v2.
All dashboards are now located in the Dashboards tab in the Datasource settings pages
and are not imported automatically.
Upgrade notes:
1. Edit the /etc/grafana/grafana.ini Grafana configuration file and make sure that the following
option is set:
allow_loading_unsigned_plugins = pcp-redis-datasource
(BZ#1854093)
(BZ#1847808)
The rhel8/grafana container image provides Grafana. Grafana is an open source utility with metrics
dashboard, and graphic editor for Graphite, Elasticsearch, OpenTSDB, Prometheus, InfluxDB, and
55
Red Hat Enterprise Linux 8.4 8.4 Release Notes
Performance Co-Pilot (PCP). The grafana-container package has been upgraded to version 7.3.6.
Notable changes include:
The rebase updates the rhel8/grafana image in the Red Hat Container Registry.
(BZ#1916154)
The rhel8/pcp container image provides Performance Co-Pilot, which is a system performance analysis
toolkit. The pcp-container package has been upgraded to version 5.2.5. Notable changes include:
The rebase updates the rhel8/pcp image in the Red Hat Container Registry.
(BZ#1916155)
The Treemap viewer has been added to the JOverflow plug-in for visualizing memory usage by
classes.
The Threads graph has been enhanced with more filtering and zoom options.
JDK Mission Control now provides support for opening JDK Flight Recorder recordings
compressed with the LZ4 algorithm.
New columns have been added to the Memory and TLAB views to help you identify areas of
allocation pressure.
JMC in RHEL 8 requires JDK version 8 or later to run. Target Java applications must run with at least
OpenJDK version 8 so that JMC can access JDK Flight Recorder features.
56
CHAPTER 4. NEW FEATURES
The core profile, which installs only the core Java libraries ( jmc-core)
Change the profile name to core to install only the jmc-core package.
(BZ#1919283)
The word master is going to be replaced with more precise language, depending on the context:
(JIRA:RHELPLAN-73418)
(BZ#1859218)
(JIRA:RHELPLAN-63081)
57
Red Hat Enterprise Linux 8.4 8.4 Release Notes
You can use the ipapermission module to create, modify, and delete permissions and
permission members in IdM RBAC.
You can use the ipaprivilege module to create, modify, and delete privileges and privilege
members in IdM RBAC.
You can use the iparole module to create, modify, and delete roles and role members in IdM
RBAC.
You can use the ipadelegation module to delegate permissions over users in IdM RBAC.
You can use the ipaselfservice module to create, modify, and delete self-service access rules
in IdM.
You can use the ipabackup role to create, copy, and remove IdM server backups and restore an
IdM server either locally or from the control node.
You can use the ipalocation module to ensure the presence or absence of the physical
locations of hosts, such as their data center racks.
(JIRA:RHELPLAN-72660)
(JIRA:RHELPLAN-58629)
AD users can now log in to IdM with UPN suffixes subordinate to known UPN suffixes
Previously, Active Directory (AD) users could not log into Identity Management (IdM) with a Universal
Principal Name (UPN) (for example, sub1.ad-example.com) that is a subdomain of a known UPN suffix
(for example, ad-example.com) because internal Samba processes filtered subdomains as duplicates of
any Top Level Names (TLNs). This update validates UPNs by testing if they are subordinate to the
known UPN suffixes. As a result, users can now log in using subordinate UPN suffixes in the described
scenario.
(BZ#1891056)
(BZ#1819012)
Enabling or disabling SSSD domains within the [domain] section of the sssd.conf file
With this update, you can now enable or disable an SSSD domain by modifying its respective [domain]
58
CHAPTER 4. NEW FEATURES
With this update, you can now enable or disable an SSSD domain by modifying its respective [domain]
section in the sssd.conf file.
Previously, if your SSSD configuration contained a standalone domain, you still had to modify the
domains option in the [sssd] section of the sssd.conf file. This update allows you to set the enabled=
option in the domain configuration to true or false.
Setting the enabled option to true enables a domain, even if it is not listed under the domains
option in the [sssd] section of the sssd.conf file.
Setting the enabled option to false disables a domain, even if it is listed under the domains
option in the [sssd] section of the sssd.conf file.
If the enabled option is not set, the configuration in the domains option in the [sssd] section of
the sssd.conf is used.
(BZ#1884196)
This update adds the offline_timeout_max option to manually control the maximum length of each
interval, allowing you more flexibility to track the server behavior in SSSD.
Note that you should set this value in correlation to the offline_timeout parameter value. A value of 0
disables the incrementing behavior.
(BZ#1884213)
Support for exclude_users and exclude_groups with scope=all in SSSD session recording
configuration
Red Hat Enterprise 8.4 now provides new SSSD options for defining session recording for large lists of
groups or users:
1. exclude_users
A comma-separated list of users to be excluded from recording, only applicable with the
scope=all configuration option.
2. exclude_groups
A comma-separated list of groups, members of which should be excluded from recording. Only
applicable with the scope=all configuration option.
(BZ#1784459)
To avoid a security issue that allows unauthenticated users to take over a domain using the
netlogon protocol, ensure that your Samba servers use the default value ( yes) of the server
schannel parameter. To verify, use the testparm -v | grep 'server schannel' command. For
59
Red Hat Enterprise Linux 8.4 8.4 Release Notes
The Samba "wide links" feature has been converted to a VFS module .
You can now use Samba on RHEL with FIPS mode enabled. Due to the restrictions of the FIPS
mode:
You cannot use NT LAN Manager (NTLM) authentication because the RC4 cipher is
blocked.
By default in FIPS mode, Samba client utilities use Kerberos authentication with AES
ciphers.
You can use Samba as a domain member only in Active Directory (AD) or Red Hat Identity
Management (IdM) environments with Kerberos authentication that uses AES ciphers. Note
that Red Hat continues supporting the primary domain controller (PDC) functionality IdM
uses in the background.
The following parameters for less-secure authentication methods, which are only usable over
the server message block version 1 (SMB1) protocol, are now deprecated:
An issue with the GlusterFS write-behind performance translator, when used with Samba, has
been fixed to avoid data corruption.
Samba automatically updates its tdb database files when the smbd, nmbd, or winbind service starts.
Back up the database files before starting Samba. Note that Red Hat does not support downgrading tdb
database files.
For further information about notable changes, read the upstream release notes before updating.
(BZ#1878109)
New GSSAPI PAM module for passwordless sudo authentication with SSSD
With the new pam_sss_gss.so Pluggable Authentication Module (PAM), you can configure the System
Security Services Daemon (SSSD) to authenticate users to PAM-aware services with the Generic
Security Service Application Programming Interface (GSSAPI).
For example, you can use this module for passwordless sudo authentication with a Kerberos ticket. For
additional security in an IdM environment, you can configure SSSD to grant access only to users with
specific authentication indicators in their tickets, such as users that have authenticated with a smart
card or a one-time password.
For additional information, see Granting sudo access to an IdM user on an IdM client .
60
CHAPTER 4. NEW FEATURES
(BZ#1893698)
https://www.port389.org/docs/389ds/releases/release-1-4-3-16.html
https://www.port389.org/docs/389ds/releases/release-1-4-3-15.html
https://www.port389.org/docs/389ds/releases/release-1-4-3-14.html
https://www.port389.org/docs/389ds/releases/release-1-4-3-13.html
https://www.port389.org/docs/389ds/releases/release-1-4-3-12.html
https://www.port389.org/docs/389ds/releases/release-1-4-3-11.html
https://www.port389.org/docs/389ds/releases/release-1-4-3-10.html
https://www.port389.org/docs/389ds/releases/release-1-4-3-9.html
(BZ#1862529)
Directory Server now logs the work and operation time in RESULT entries
With this update, Directory Server now logs two additional time values in RESULT entries in the
/var/log/dirsrv/slapd-<instance_name>/access file:
The wtime value indicates how long it took for an operation to move from the work queue to a
worker thread.
The optime value shows the time the actual operation took to be completed once a worker
thread started the operation.
The new values provide additional information about how the Directory Server handles load and
processes operations.
For further details, see the Access Log Reference section in the Red Hat Directory Server
Configuration, Command, and File Reference.
(BZ#1850275)
(BZ#1851975)
4.14. DESKTOP
61
Red Hat Enterprise Linux 8.4 8.4 Release Notes
Certain applications cannot respond to the signal in time. As a consequence, GNOME displays the dialog
even when the application is working properly.
With this update, you can configure the time between the signals. The setting is stored in the
org.gnome.mutter.check-alive-timeout GSettings key. To completely disable the unresponsive
application detection, set the key to 0.
For details on configuring a GSettings key, see Working with GSettings keys on command line .
(BZ#1886034)
62
CHAPTER 4. NEW FEATURES
You no longer have to set the i915.alpha_support=1 or i915.force_probe=* kernel option to enable
Tiger Lake GPU support.
(BZ#1882620)
Intel GPUs that use the 11th generation Core microprocessors are now supported
This release adds support for the 11th generation Core CPU architecture (formerly known as Rocket
Lake) with Xe gen 12 integrated graphics, which is found in the following CPU models:
63
Red Hat Enterprise Linux 8.4 8.4 Release Notes
RTX A4000
RTX A5000
RTX A6000
Nvidia A40
Note that the nouveau graphics driver does not yet support 3D acceleration with the Nvidia Ampere
family.
(BZ#1916583)
64
CHAPTER 4. NEW FEATURES
(JIRA:RHELPLAN-59941)
(JIRA:RHELPLAN-59938)
Check Managing remote systems in the web console for more details.
(JIRA:RHELPLAN-59950)
(BZ#1889484)
(BZ#1893712)
This update introduces the concept of a fully qualified collection name (FQCN), that consists of a
namespace and the collection name. For example, the Kernel role fully qualified name is:
redhat.rhel_system_roles.kernel_settings
The combination of a namespace and a collection name guarantees that the objects are unique.
The combination of a namespace and a collection name ensures that the objects are shared
across the Collections and namespaces without any conflicts.
Install the Collection using an RPM package. Ensure that you have the python3-jmespath installed on
the host on which you execute the playbook:
65
Red Hat Enterprise Linux 8.4 8.4 Release Notes
The RPM package includes the roles in both the legacy Ansible Roles format as well as the new Ansible
Collection format. For example, to use the network role, perform the following steps:
Legacy format:
---
- hosts: all
roles:
rhel-system-roles.network
Collection format:
---
- hosts: all
roles:
redhat.rhel_system_roles.network
If you are using Automation Hub and want to install the System Roles Collection hosted in Automation
Hub, enter the following command:
Then you can use the roles in the Collection format, as previously described. This requires configuring
your system with the ansible-galaxy command to use Automation Hub instead of Ansible Galaxy. See
How to configure the ansible-galaxy client to use Automation Hub instead of Ansible Galaxy for more
details.
(BZ#1893906)
Metrics role supports configuration and enablement of metrics collection for SQL server via
PCP
The metrics RHEL System Role now provides the ability to connect SQL Server, mssql with
Performance Co-Pilot, pcp. SQL Server is a general purpose relational database from Microsoft. As it
runs, SQL Server updates internal statistics about the operations it is performing. These statistics can be
accessed using SQL queries but it is important for system and database administrators undertaking
performance analysis tasks to be able to record, report, visualize these metrics. With this enhancement,
users can use the metrics RHEL System Role to automate connecting SQL server, mssql, with
Performance Co-Pilot, pcp, which provides recording, reporting, and visualization functionality for
mssql metrics.
(BZ#1893908)
(BZ#1895188)
66
CHAPTER 4. NEW FEATURES
(BZ#1893696)
(BZ#1893699)
(BZ#1889893)
The networking RHEL System Role now supports the ethtool settings
With this enhancement, you can use the networking RHEL System Role to configure ethtool coalesce
settings of a NetworkManager connection. When using the interrupt coalescing procedure, the
system collects network packets and generates a single interrupt for multiple packets. As a result, this
increases the amount of data sent to the kernel with one hardware interrupt, which reduces the interrupt
load, and maximizes the throughput.
(BZ#1893961)
4.18. VIRTUALIZATION
s390x virtual machines can now run up to 248 CPUs
Previously, the number of CPUs that you could use in an s390x virtual machine (VM), with DIAG318
enabled, was limited to 240. Now, using the Extended-Length SCCB, s390x VMs can run up to 248
CPUs.
(JIRA:RHELPLAN-44450)
(JIRA:RHELPLAN-37817)
Virtual machines can now use features of Intel Atom P5000 Processors
The Snowridge CPU model name is now available for virtual machines (VMs). On hosts with Intel Atom
P5000 processors, using Snowridge as the CPU type in the XML configuration of the VM exposes new
features of these processors to the VM.
67
Red Hat Enterprise Linux 8.4 8.4 Release Notes
(JIRA:RHELPLAN-37579)
virtio-gpu devices now work better on virtual machines with Windows 10 and later
This update extends the virtio-win drivers to also provide custom drivers for virtio-gpu devices on
selected Windows platforms. As a result, the virtio-gpu devices now have improved performance on
virtual machines that use Windows 10 or later as their guest systems. In addition, the devices will also
benefit from future enhancements to virtio-win.
(BZ#1861229)
(BZ#1790620)
(BZ#1905398, BZ#1932804)
With this update, the cloud-init utility can be used to configure RHEL 8 virtual machines hosted on IBM
Power Systems hosts and running in the IBM Cloud Virtual Server service.
(BZ#1886430)
4.20. SUPPORTABILITY
sos rebased to version 4.0
The sos package has been upgraded to version 4.0. This major version release includes a number of new
features and changes.
A new sos binary has replaced the former sosreport binary as the main entry point for the utility.
sos report is now used to generate sosreport tarballs. The sosreport binary is maintained as a
redirection point and now invokes sos report.
The /etc/sos.conf file has been moved to /etc/sos/sos.conf, and its layout has changed as
follows:
The [general] section has been renamed to [global], and may be used to specify options
that are available to all sos commands and sub-commands.
68
CHAPTER 4. NEW FEATURES
Each sos component, report, collect, and clean, has its own dedicated section. For
example, sos report loads options from global and from report.
sos collect
sos collect formally brings the sos-collector utility into the main sos project, and is used to collect
sosreports from multiple nodes simultaneously. The sos-collector binary is maintained as a redirection
point and invokes sos collect. The standalone sos-collector project will no longer be independently
developed. Enhancements for sos collect include:
sos collect is now supported on all distributions that sos report supports, that is any
distribution with a Policy defined.
The --threads option, used to connect simultaneously to the number of nodes, has been
renamed to --jobs
sos clean
sos clean formally brings the functionality of the soscleaner utility into the main sos project. This
subcommand performs further data obfuscation on reports, such as cleaning IP addresses, domain
names, and user-provided keywords.
Note: When the --clean option is used with the sos report or sos collect command, sos clean is
applied on a report being generated. Thus, it is not necessary to generate a report and only after then
apply the cleaner function on it.
Support for IPv4 address obfuscation. Note that this will attempt to preserve topological
relationships between discovered addresses.
The --clean or --mask flag used with the sos report command obfuscates a report being
generated. Alternatively, the following command obfuscates an already existing report:
Using the former results in a single obfuscated report archive, while the latter results in two; an
obfuscated archive and the un-obfuscated original.
For full information on the changes contained in this release, see sos-4.0.
(BZ#1966838)
4.21. CONTAINERS
Podman now supports volume plugins written for Docker
69
Red Hat Enterprise Linux 8.4 8.4 Release Notes
Podman now has support for Docker volume plugins. These volume plugins or drivers, written by vendors
and community members, can be used by Podman to create and manage container volumes.
The podman volume create command now supports creation of the volume using a volume plugin with
the given name. The volume plugins must be defined in the [engine.volume_plugins] section of the
container.conf configuration file.
Example:
[engine.volume_plugins]
testvol = "/run/docker/plugins/testvol.sock"
where testvol is the name of the plugin and /run/docker/plugins/testvol.sock is the path to the plugin
socket.
You can use the podman volume create --driver testvol to create a volume using a testvol plugin.
(BZ#1734854)
(JIRA:RHELPLAN-56664)
(JIRA:RHELPLAN-56661)
Enforcing: If no matching alias is found during the image pull, Podman prompts the user to
choose one of the unqualified-search registries. If the selected image is pulled successfully,
Podman automatically records a new short-name alias in the users
$HOME/.config/containers/short-name-aliases.conf file. If the user cannot be prompted (for
example, stdin or stdout are not a TTY), Podman fails. Note that the short-name-aliases.conf
file has precedence over registries.conf file if both specify the same alias.
Permissive: Similar to enforcing mode but it does not fail if the user cannot be prompted.
Instead, Podman searches in all unqualified-search registries in the given order. Note that no
alias is recorded.
Example:
unqualified-search-registries=[“registry.fedoraproject.org”, “quay.io”]
70
CHAPTER 4. NEW FEATURES
[aliases]
"fedora"="registry.fedoraproject.org/fedora"
(JIRA:RHELPLAN-39843)
The container-tools:3.0 stable module stream, which contains the Podman, Buildah, Skopeo, and runc
tools is now available. This update provides bug fixes and enhancements over the previous version.
For instructions how to upgrade from an earlier stream, see Switching to a later stream .
(JIRA:RHELPLAN-56782)
71
Red Hat Enterprise Linux 8.4 8.4 Release Notes
supplier boot state clean up (only after all consumers have probed)
suspend, resume and runtime Power Management (PM) (consumers first, then suppliers)
Format: { off | permissive | on | rpm }
permissive - Create device links from firmware info but use it only for ordering boot state
clean up (sync_state() calls).
on - Create device links from firmware info and use it to enforce probe and suspend or
resume ordering.
init_on_alloc = [MM]
This parameter fills newly allocated pages and heap objects with zeroes.
Format: 0 | 1
init_on_free = [MM]
This parameter fills freed pages and heap objects with zeroes.
Format: 0 | 1
72
CHAPTER 5. IMPORTANT CHANGES TO EXTERNAL KERNEL PARAMETERS
nofsgsbase [X86]
This parameter disables FSGSBASE instructions.
nosgx [X86-64,SGX]
This parameter disables Intel Software Guard Extensions (SGX) kernel support.
rcutree.rcu_min_cached_objs = [KNL]
Minimum number of objects which are cached and maintained per one CPU. Object size is equal to
PAGE_SIZE. The cache allows to reduce the pressure to page allocator. Also it makes the whole
algorithm to behave better in low memory condition.
rcuperf.kfree_rcu_test = [KNL]
This parameter is used to measure performance of the kfree_rcu() function flooding.
rcuperf.kfree_nthreads = [KNL]
The number of threads running loops of kfree_rcu().
rcuperf.kfree_alloc_num = [KNL]
Number of allocations and frees done in an iteration.
rcuperf.kfree_loops = [KNL]
Number of loops doing rcuperf.kfree_alloc_num number of allocations and frees.
rcupdate.rcu_cpu_stall_ftrace_dump = [KNL]
This parameter dumps ftrace buffer after reporting Read-copy-update (RCU) CPU stall warning.
nopvspin = [X86,KVM]
This parameter disables the qspinlock slow path using Para-virtualization (PV) optimizations. This
allows the hypervisor to 'idle' the guest on lock contention.
Be careful when setting this parameter to extreme values such as 100. This can cause excessive
background compaction activity.
watermark_boost_factor
This parameter controls the level of reclaim when memory is being fragmented. It defines the
73
Red Hat Enterprise Linux 8.4 8.4 Release Notes
percentage of the high watermark of a zone that will be reclaimed if pages of different mobility are
being mixed within pageblocks. The intent is that compaction has less work to do in the future and to
increase the success rate of future high-order allocations such as SLUB allocations, THP and
hugetlbfs pages.
With respect to the watermark_scale_factor parameter, the unit is in fractions of 10,000. The
default value of 15,000 on !DISCONTIGMEM configurations means that up to 150% of the high
watermark is reclaimed in the event of a pageblock being mixed due to fragmentation. The level of
reclaim is determined by the number of fragmentation events that occurred in the recent past. If this
value is smaller than a pageblock then a pageblocks worth of pages are going to be reclaimed (e.g.
2MB on 64-bit x86). A boost factor of 0 will disable the feature.
74
CHAPTER 6. DEVICE DRIVERS
Driver for AMD Energy reporting from RAPL MSR via HWMON interface (amd_energy.ko.xz)
75
Red Hat Enterprise Linux 8.4 8.4 Release Notes
Standalone drm driver for the VMware SVGA device (vmwgfx.ko.xz) has been updated to
version 2.18.0.0.
Cisco FCoE HBA Driver (fnic.ko.xz) has been updated to version 1.6.0.53.
Driver for HP Smart Array Controller version 3.4.20-200-RH1 (hpsa.ko.xz) has been updated to
version 3.4.20-200-RH1.
Emulex LightPulse Fibre Channel SCSI driver 12.8.0.5 (lpfc.ko.xz) has been updated to version
0:12.8.0.5.
LSI MPT Fusion SAS 3.0 Device Driver (mpt3sas.ko.xz) has been updated to version
35.101.00.00.
QLogic Fibre Channel HBA Driver (qla2xxx.ko.xz) has been updated to version 10.02.00.104-k.
SCSI debug adapter driver (scsi_debug.ko.xz) has been updated to version 0190.
Driver for Microsemi Smart Family Controller version 1.2.16-012 (smartpqi.ko.xz) has been
updated to version 1.2.16-012.
76
CHAPTER 7. BUG FIXES
With this update, in text mode Anaconda recognizes ldl and unformatted DASD disks and shows a
dialog where users can format them properly for the future utilization for the installation.
(BZ#1874394)
RHEL installer failed to start when InfiniBand network interfaces were configured using
installer boot options
Previously, when you configured InfiniBand network interfaces at an early stage of RHEL installation
using installer boot options (for example, downloaded installer image using PXE server), the installer
failed to activate the network interfaces.
This issue occured because the RHEL NetworkManager failed to recognize the network interfaces in
InfiniBand mode, and instead configured Ethernet connections for the interfaces.
As a result, connection activation failed, and if the connectivity over the InfiniBand interface was
required at an early stage, RHEL installer failed to start the installation.
With this release, the installer successfully activates the InfiniBand network interfaces that you configure
at an early stage of RHEL installation using installer boot options, and the installation completes
successfully.
(BZ#1890009)
With this update, the problem has been fixed. Now you can schedule the automatic partitioning in the
installer.
(BZ#1642391)
With this update, the problem has been fixed. You can configure the wireless network during the
installation while using Anaconda GUI.
(BZ#1847681)
77
Red Hat Enterprise Linux 8.4 8.4 Release Notes
(BZ#1834931)
The popt packages have been upgraded to the upstream version 1.18, which provides the following
notable changes over the previous version:
Failing to drop privileges on the alias exec command has been fixed.
(BZ#1843787)
Previously, the snmpbulkget command did not provide valid output for a non-existing PID.
Consequently, this command would fail with the output as no results found.
(BZ#1817190)
The CRON command now sends an email as per the trigger conditions.
Previously, when the Relax-and-Recover (ReaR) utility was configured incorrectly, the CRON command
triggered an error message that was sent to the administrator through an email. Consequently, the
administrator would receive emails even if the configuration was not performed for ReaR.
With this update, the CRON command is modified and sends an email as per the trigger conditions.
(BZ#1729499)
Using NetBackup version 8.2 as the backup mechanism in ReaR now works.
Previously, when using NetBackup as a backup method, the Relax-and-Recover (ReaR) utility did not
start the vxpbx_exchanged service in the rescue system. Consequently, restoring the data from the
backup in the rescue system with NetBackup 8.2 failed with the following error messages logged on the
NetBackup server:
Error bpbrm (pid=…) cannot execute cmd on clientInfo tar (pid=…) done. status: 25: cannot
connect on socketError bpbrm (pid=…) client restore EXIT STATUS 25: cannot connect on socket
With this update, ReaR adds the vxpbx_exchanged service and related required files to the rescue
system, and starts the service when the rescue system launches.
(BZ#1898080)
78
CHAPTER 7. BUG FIXES
(BZ#1844429)
Previously, when at least one LUKS2 encrypted partition was present on the system to backup with
Relax-and-Recover (Rear) utility, the user was not informed that ReaR does not support LUKS2
encrypted partition. Consequently, the ReaR utility was unable to recreate the original state of the
system during the restore phase.
With this update, support of basic LUKS2 configuration, error checking, and improved output has been
added to the ReaR utility. The ReaR utility now restores systems using basic LUKS2 encrypted
partitions or notifies users in the opposite case.
(BZ#1832394)
Previously, the Poppler utility underwent an update for API changes. Consequently, due to these API
changes the Texlive build did not function. With this update, the Texlive build now functions correctly
with the new Poppler utility.
(BZ#1889802)
(BZ#1876492)
7.5. SECURITY
Improved padding for pkcs11
Previously, the pkcs11 token label had extra padding for some smart cards. As a consequence, the
wrong padding could cause issues matching cards based on the label attribute. With this update, the
padding is fixed for all the cards and defined PKCS #11 URIs and matching against them in application
should work as expected.
(BZ#1877973)
79
Red Hat Enterprise Linux 8.4 8.4 Release Notes
between sealert and setroubleshootd. Now sealert reports an error message and exits in case the
setroubleshoot daemon crashes.
(BZ#1875290)
(BZ#1794807)
(BZ#1868717)
Previously, the setfiles utility stopped whenever it failed to relabel a file. Consequently, mislabeled files
were left in the target directory. With this update, setfiles skips files it cannot relabel, and as a result,
setfiles processes all files in the target directory.
(BZ#1926386)
Rebuilds of the SELinux policy store are now more resistant to power failures
Previously, SELinux-policy rebuilds were not resistant to power failures due to write caching.
Consequently, the SELinux policy store may become corrupted after a power failure during a policy
rebuild. With this update, the libsemanage library writes all pending modifications to metadata and
cached file data to the file system that contains the policy store before using it. As a result, the policy
store is now more resistant to power failures and other interruptions.
(BZ#1913224)
Previously, the libselinux library failed to determine the default context of SELinux users on some
systems, due to the use of the deprecated security_compute_user() function. As a consequence, some
system services were unavailable on systems with complex security policies. With this update, libselinux
no longer uses security_compute_user() and determines the SELinux user’s default context properly,
regardless of policy complexity.
(BZ#1879368)
(BZ#1889673)
80
CHAPTER 7. BUG FIXES
Setting SELinux booleans no longer causes a deadlock with certain types of audit rules
The Audit subsystem allows filtering records by SElinux context using the subj_* or obj_* fields.
Previously, having such rules loaded would cause the kernel to deadlock when changing the state of
SELinux booleans. With this update, the kernel handles this situation properly and no longer deadlocks.
(BZ#1924230)
OpenSCAP can now scan systems with large numbers of files without running out of
memory
Previously, when scanning systems with low RAM and large numbers of files, the OpenSCAP scanner
sometimes caused the system to run out of memory. With this update, OpenSCAP scanner memory
management has been improved. As a result, the scanner no longer runs out of memory on systems with
low RAM when scanning large numbers of files, for example package groups Server with GUI and
Workstation.
(BZ#1824152)
(BZ#1927019)
(BZ#1840579)
(BZ#1940289)
When an update replaces the binary of a running application, the kernel modifies the application binary
path in memory by appending the (deleted) suffix. Previously, the fapolicyd file access policy daemon
treated such applications as untrusted. As a consequence, fapolicyd prevented these applications from
opening and executing any other files. With this update, fapolicyd ignores the suffix in the binary path
so the binary can match the trust database. As a result, fapolicyd enforces the rules correctly and the
update process can finish.
(BZ#1896875)
81
Red Hat Enterprise Linux 8.4 8.4 Release Notes
Rule files inside the rules.d directory now load in alphanumeric order.
Some use cases when the policy of multiple devices could not be changed by a single rule have
been fixed.
(BZ#1887448)
(BZ#1940060)
Previously, the tangd daemon returned an error exit code for some invalid requests. As a consequence,
tangd.socket@.service failed, which in turn might have caused problems if the number of such failed
units increased. With this update, tangd exits with an error code only when the tangd server itself is
facing problems. As a result, tangd handles invalid requests correctly.
(BZ#1828558)
7.6. NETWORKING
Migrating an iptables rule set from RHEL 7 to RHEL 8 with rules involving ipset lookups no
longer fails
Previously, the ipset counters were updated only if all the additional constraints match while referring to
an ipset command with enabled counters from an iptables rule set. Consequently, the rules involving
ipset lookups, e.g. -m set --match-set xxx src --bytes-gt 100 will never get chance to match, because
the member’s counter of ipset will not be added up. With this update, migrating an iptables rule set with
rules involving ipset lookups works as expected.
(BZ#1806882)
(BZ#1842690)
Network access is now available when using DHCP in the Anaconda ip boot option
The initial RAM disk (initrd) uses NetworkManager to manage networking. Previously, the dracut
82
CHAPTER 7. BUG FIXES
NetworkManager module provided by the RHEL 8.3 ISO file incorrectly assumed that the first field of
the ip option in the Anaconda boot options was always set. As a consequence, if you used DHCP and set
ip=::::<host_name>::dhcp, NetworkManager did not retrieve an IP address, and the network was not
available in Anaconda. This problem has been fixed. As a result, the Anaconda ip boot option works as
expected when you use the RHEL 8.4 ISO to install a host in the mentioned scenario.
(BZ#1900260)
Unloading XDP programs no longer fails on Netronome network cards that use the nfp
driver
Previously, the nfp driver for Netronome network cards contained a bug. As a consequence, unloading
eXpress Data Path (XDP) programs failed if you used such a card and loaded the XDP program using
the IFLA_XDP_EXPECTED_FD feature with the XDP_FLAGS_REPLACE flag. For example, this
affected XDP programs that were loaded using the libxdp library. This bug has been fixed. As a result,
unloading an XDP program from Netronome network cards works as expected.
(BZ#1880268)
NetworkManager now tries to retrieve the host name using DHCP and reverse DNS
lookups on all interfaces
Previously, if the host name was not set in the /etc/hostname file, NetworkManager tried to obtain the
host name using DHCP or a reverse DNS lookup only through the interface with the default route with
the lowest metric value. As a consequence, it was not possible to automatically assign a host name on
networks without a default route. This update changes the behavior, and NetworkManager now first
tries to retrieve the host name using the default route interface. If this process fails, NetworkManager
tries other available interfaces. As a result, NetworkManager tries to retrieve the host name using DHCP
and reverse DNS lookups on all interfaces if it is not set in /etc/hostname.
[connection-hostname-only-from-default]
hostname.only-from-default=1
(BZ#1766944)
7.7. KERNEL
The kernel no longer returns false positive warnings on IBM Z systems
Previously, IBM Z systems on RHEL 8 were missing an allowed entry for the ZONE_DMA memory zone
to allow user access. Consequently, the kernel returned false positive warnings such as:
...
Bad or missing usercopy whitelist? Kernel memory exposure attempt detected from SLUB object
'dma-kmalloc-192' (offset 0, size 144)!
WARNING: CPU: 0 PID: 8519 at mm/usercopy.c:83 usercopy_warn+0xac/0xd8
...
83
Red Hat Enterprise Linux 8.4 8.4 Release Notes
The warnings appeared when accessing certain system information through the sysfs interface. For
example, by running the debuginfo.sh script.
This update adds a flag in the Direct Memory Access (DMA) buffer, so that user space applications can
access the buffer.
(BZ#1660290)
At least two CPU threads try to modify the same set of data simultaneously.
At least one of these CPU threads tries to do a write operation on the dataset.
Based on the exact timing of each thread to modify the dataset, the result can be A, B, or AB
(indeterminate).
When a container was under memory pressure, the situation likely led to multiple Out of Memory (OOM)
kills, causing the container locking up and becoming unresponsive. In this release, the RHEL kernel code
for locking and optimization has been updated. As a result, the kernel no longer becomes unresponsive,
and the data does not become subject to race conditions.
(BZ#1860031)
(BZ#1867490)
With this update, the NUMA systems no longer experience the memory layouts issue.
(BZ#1844157)
84
CHAPTER 7. BUG FIXES
(BZ#1884857)
This update enables the HRTICK feature, which provides high resolution preemption. HRTICK uses a
high resolution timer, which enforces the throttling mechanism when a task completes its runtime. As a
result, this problem no longer occurs in the described scenario.
(BZ#1885850)
(BZ#1855177)
(BZ#1871246)
(BZ#1893882)
85
Red Hat Enterprise Linux 8.4 8.4 Release Notes
and broader applicability. For information on modifying the token timeout value, see How to change
totem token timeout value in a RHEL 5, 6, 7, or 8 High Availability cluster?
(BZ#1870449)
(BZ#1895852)
With this update, the second parallel response is now recognized as valid. As a result, the glibc DNS
stub resolver avoids excessive timeouts due to unrecognized responses.
(BZ#1868106)
Reading configuration files with fgetsgent() and fgetsgent_r() is now more robust
Specifically structured entries in the /etc/gshadow file, or changes in file sizes while reading, sometimes
caused the fgetsgent() and fgetsgent_r() functions to return invalid pointers. Consequently,
applications that used these functions to read /etc/gshadow, or other configuration files in /etc/, failed
with a segmentation fault error. This update modifies fgetsgent() and fgetsgent_r() to make reading of
configuration files more robust. As a result, applications are now able to read configuration files
successfully.
(BZ#1871397)
The glibc string functions now avoid negative impact on system cache on AMD64 and Intel
64 processors
Previously, the glibc implementation of string functions incorrectly estimated the amount of last-level
cache available to a thread on the 64-bit AMD and Intel processors. As a consequence, calling the
memcpy function on large buffers either negatively impacted the overall cache performance of the
system or slowed down the memcpy system call.
With this update, the last-level cache size is no longer scaled with the number of reported hardware
threads in the system. As a result, the string functions now bypass caches for large buffers, avoiding
negative impact on the rest of the system cache.
(BZ#1880670)
86
CHAPTER 7. BUG FIXES
(BZ#1882466)
The glibc dynamic linker now restricts part of the static thread-local storage space to static
TLS allocations
Previously, the glibc dynamic linker used all available static thread-local storage (TLS) space for
dynamic TLS, on a first come, first served basis. Consequently, loading additional shared objects at run
time using the dlopen function sometimes failed, because dynamic TLS allocations had already
consumed all available static TLS space. This problem occurred particularly on the 64-bit ARM
architecture and IBM Power Systems.
Now, the dynamic linker restricts part of the static TLS area to static TLS allocations and does not use
this space for dynamic TLS optimizations. As a result, dlopen calls succeed in more cases with the
default setting. Applications that require more allocated static TLS than the default setting allows can
use a new glibc.rtld.optional_static_tls tunable.
(BZ#1871396)
The glibc dynamic linker now disables lazy binding for the 64-bit ARM variant calling
convention
Previously, the glibc dynamic linker did not disable lazy binding for functions using the 64-bit ARM
(AArch64) variant calling convention. As a consequence, the dynamic linker corrupted arguments in such
function calls, leading to incorrect results or process failures. With this update, the dynamic linker now
disables lazy binding in the described scenario, and the function arguments are passed correctly.
(BZ#1893662)
The GNU Compiler Collection (GCC) has been rebased to upstream version 8.4, which provides a
number of bug fixes over the previous version.
(BZ#1868446)
Important: Red Hat recommends not to use the insecure wide links feature. Instead, use a bind mount
to mount a part of the file hierarchy to a directory that you shared in Samba. For details about
configuring a bind mount, see the Bind mount operation section in the mount(8) man page.
87
Red Hat Enterprise Linux 8.4 8.4 Release Notes
1. For every symbolic link that links outside of a share, replace the link with a bind mount. For
details, see the Bind mount operation section in the mount(8) man page.
2. Remove all wide links = yes entries from the /etc/samba/smb.conf file.
3. Reload Samba:
(BZ#1925192)
(BZ#1859301)
Certificates issued by PKI ACME Responder connected to PKI CA no longer fail OCSP
validation
Previously, the default ACME certificate profile provided by PKI CA contained a sample OCSP URL that
did not point to an actual OCSP service. As a consequence, if PKI ACME Responder was configured to
use a PKI CA issuer, the certificates issued by the responder could fail OCSP validation. This update
removes hard-coded URLs in the ACME certificate profile and adds an upgrade script to fix the profile
configuration file in case you did not customize it.
(BZ#1868233)
With this update, RHEL adds support for the proprietary backlight interface, and as a result, display
control now works as expected.
(BZ#1885406)
Previously, NVME disks used a different partition naming convention than the one used by virtio/scsi
and the Storage role did not reflect it. As a consequence, running the Storage role with NVME disks
resulted in a crash. With this fix, the Storage RHEL System Role now obtains the partition name from the
blivet module.
88
CHAPTER 7. BUG FIXES
(BZ#1865990)
The selinux RHEL System Role no longer uses variable named present
Previously, some tasks in the selinux RHEL System Role were incorrectly using a variable named
present instead of using the string present. As a consequence, the selinux RHEL System Role returned
an error informing that there is no variable named present. This update fixes this issue, changing those
tasks to use the string present. As a result, the selinux RHEL System Role works as expected, with no
error message.
(BZ#1926947)
A global tls rsyslog-gnutls package is required when the logging RHEL System Role is configured to
provide secure remote input and secure forward output. Previously, thel tls rsyslog-gnutls package
was changed to install unconditionally in the previous version. As a consequence, when the tls rsyslog-
gnutls package was not available on the managed nodes, the logging role configuration failed, even if
the secure remote input and secure forward output were not included as part of the configuration. This
update fixes the issue by examining if the secure connection is configured and checking the global tls
logging_pki_files variable. The rsyslog-gnutls package is installed only when the secure connection is
configured. As a result, the operation to configure Red Hat Enterprise Virtualization Hypervisor to
integrate elasticsearch as the logging output no longer fails with the missing rsyslog-gnutls package.
(BZ#1927943)
7.15. VIRTUALIZATION
Connecting to the RHEL 8 guest console on a Windows Server 2019 host is no longer
slowed down
Previously, when using RHEL 8 as a guest operating system in multi-user mode on a Windows Server
2019 host, connecting to a console output of the guest currently took significantly longer than expected.
This update improves the performance of VRAM on the Hyper-V hypervisor, which fixes the problem.
(BZ#1908893)
Displaying multiple monitors of virtual machines that use Wayland is now possible with QXL
Previously, using the remote-viewer utility to display more than one monitor of a virtual machine (VM)
that was using the Wayland display server caused the VM to become unresponsive and the Waiting for
display status message to be displayed indefinitely. The underlying code has been fixed, which prevents
the described problem from occurring.
(BZ#1642887)
With this update, the impacted VMs on Microsoft Azure handle their GPUs correctly after resuming,
89
Red Hat Enterprise Linux 8.4 8.4 Release Notes
With this update, the impacted VMs on Microsoft Azure handle their GPUs correctly after resuming,
which prevents the problem from occurring.
(BZ#1846838)
The TX/RX packet counters increase as intended after virtual machines resume from
hibernation
Previously, the TX/RX packet counters stopped increasing when a RHEL 8 virtual machine using a CX4
VF NIC resumed from hibernation on Microsoft Azure. This update resolves the issue, and the packet
counters increase as intended.
(BZ#1876527)
(BZ#1876519)
This was a redundant error message and has now been removed.
For more information on the problem, see the Red Hat Knowledgebase solution .
(BZ#1919745)
7.17. CONTAINERS
podman system connection add automatically set the default connection
Previously, the podman system connection add command did not automatically set the first
connection to be the default connection. As a consequence, you must manually run the podman
system connection default <connection_name> command to set the default connection. With this
update, the podman system connection add command works as expected.
(BZ#1881894)
90
CHAPTER 8. TECHNOLOGY PREVIEWS
For information on Red Hat scope of support for Technology Preview features, see Technology Preview
Features Support Scope.
For more information, see the Red Hat Connector Configuration Guide .
(BZ#1957316)
8.2. NETWORKING
Introducing bareudp device support for encapsulating MPLS traffic over UDP tunnel as a
Technology Preview
The support for bareudp devices is now available with the ip link command as a Technology Preview.
The bareudp devices provide L3 encapsulation tunnelling support for routing traffic with different L3
protocols, such as unicast and multicast multi protocol label switching (MPLS) and IPv4/IPv6 inside the
UDP tunnel. You can start routing MPLS packets in UDP with the help of adding tc filters and actions.
For example, to create a new bareudp device, use the following command:
# ip link add dev bareudp0 type bareudp dstport 6635 ethertype mpls_uc
To route MPLS incoming packets in UDP tunnel using the bareudp0 device, use the following command:
For more information about options and parameters used while creating bareudp devices, refer to the
Bareudp Type Support section in the ip-link(8) man page.
(BZ#1849815)
Address Family eXpress Data Path (AF_XDP) socket is designed for high-performance packet
processing. It accompanies XDP and grants efficient redirection of programmatically selected packets
to user space applications for further processing.
(BZ#1633143)
91
Red Hat Enterprise Linux 8.4 8.4 Release Notes
(BZ#1570255)
Loading XDP programs on architectures other than AMD and Intel 64-bit. Note that the libxdp
library is not available for architectures other than AMD and Intel 64-bit.
The XDP hardware offloading. Before using this feature, see Unloading XDP programs fails on
Netronome network cards that use the nfp driver.
(BZ#1889737)
After packets enter the enterprise network, MPLS routers perform multiple operations on the packets,
such as push to add a label, swap to update a label, and pop to remove a label. MPLS allows defining
actions locally based on one or multiple labels in RHEL. You can configure routers and set traffic control
(tc) filters to take appropriate actions on the packets based on the MPLS label stack entry ( lse)
elements, such as label, traffic class, bottom of stack, and time to live.
For example, the following command adds a filter to the enp0s1 network interface to match incoming
packets having the first label 12323 and the second label 45832. On matching packets, the following
actions are taken:
the resulting packet is transmitted over enp0s2, with destination MAC address
00:00:5E:00:53:01 and source MAC address 00:00:5E:00:53:02
# tc filter add dev enp0s1 ingress protocol mpls_uc flower mpls lse depth 1 label 12323 lse
depth 2 label 45832 \
action mpls dec_ttl pipe \
action mpls modify label 549386 pipe \
action pedit ex munge eth dst set 00:00:5E:00:53:01 pipe \
action pedit ex munge eth src set 00:00:5E:00:53:02 pipe \
action mirred egress redirect dev enp0s2
(BZ#1814836, BZ#1856415)
92
CHAPTER 8. TECHNOLOGY PREVIEWS
The act_mpls module is now available in the kernel-modules-extra rpm as a Technology Preview. The
module allows the application of Multiprotocol Label Switching (MPLS) actions with Traffic Control
(TC) filters, for example, push and pop MPLS label stack entries with TC filters. The module also allows
the Label, Traffic Class, Bottom of Stack, and Time to Live fields to be set independently.
(BZ#1839311)
Active-backup support
Note that either the applications running on the server must natively support MPTCP or administrators
must load an eBPF program into the kernel to dynamically change IPPROTO_TCP to
IPPROTO_MPTCP.
(JIRA:RHELPLAN-57712)
Note that, even if the systemd package provides systemd-resolved, this service is an unsupported
Technology Preview.
(BZ#1906489)
You can install the nispor package as a dependency of nmstate or as an individual package.
93
Red Hat Enterprise Linux 8.4 8.4 Release Notes
(BZ#1848817)
8.3. KERNEL
The kexec fast reboot feature is available as Technology Preview
The kexec fast reboot feature continues to be available as a Technology Preview. kexec fast reboot
significantly speeds the boot process by allowing the kernel to boot directly into the second kernel
without passing through the Basic Input/Output System (BIOS) first. To use this feature:
(BZ#1769727)
(BZ#1843266)
(BZ#1660337)
The virtual machine includes a new system call bpf(), which supports creating various types of maps, and
also allows to load programs in a special assembly-like code. The code is then loaded to the kernel and
translated to the native machine code with just-in-time compilation. Note that the bpf() syscall can be
successfully used only by a user with the CAP_SYS_ADMIN capability, such as the root user. See the
bpf(2) manual page for more information.
The loaded programs can be attached onto a variety of points (sockets, tracepoints, packet reception)
to receive and process data.
There are numerous components shipped by Red Hat that utilize the eBPF virtual machine. Each
component is in a different development phase, and thus not all components are currently fully
94
CHAPTER 8. TECHNOLOGY PREVIEWS
supported. All components are available as a Technology Preview, unless a specific component is
indicated as supported.
The following notable eBPF components are currently available as a Technology Preview:
bpftrace, a high-level tracing language that utilizes the eBPF virtual machine.
AF_XDP, a socket for connecting the eXpress Data Path (XDP) path to user space for
applications that prioritize packet processing performance.
(BZ#1559616)
The data streaming accelerator driver for kernel is available as a Technology Preview
The data streaming accelerator (DSA) driver for the kernel is currently available as a Technology
Preview. DSA is an Intel CPU integrated accelerator and supports a shared work queue with process
address space ID (pasid) submission and shared virtual memory (SVM).
(BZ#1837187)
The use of NVMe/TCP as either a storage client or a target is manageable with tools provided by the
nvme-cli and nvmetcli packages.
The NVMe/TCP target Technology Preview is included only for testing purposes and is not currently
planned for full support.
(BZ#1696451)
File system DAX is now available for ext4 and XFS as a Technology Preview
In Red Hat Enterprise Linux 8, file system DAX is available as a Technology Preview. DAX provides a
means for an application to directly map persistent memory into its address space. To use DAX, a
system must have some form of persistent memory available, usually in the form of one or more Non-
Volatile Dual In-line Memory Modules (NVDIMMs), and a file system that supports DAX must be created
on the NVDIMM(s). Also, the file system must be mounted with the dax mount option. Then, an mmap
of a file on the dax-mounted file system results in a direct mapping of storage into the application’s
address space.
(BZ#1627455)
OverlayFS
OverlayFS is a type of union file system. It enables you to overlay one file system on top of another.
Changes are recorded in the upper file system, while the lower file system remains unmodified. This
allows multiple users to share a file-system image, such as a container or a DVD-ROM, where the base
image is on read-only media.
OverlayFS remains a Technology Preview under most circumstances. As such, the kernel logs warnings
when this technology is activated.
95
Red Hat Enterprise Linux 8.4 8.4 Release Notes
Full support is available for OverlayFS when used with supported container engines (podman, cri-o, or
buildah) under the following restrictions:
OverlayFS is supported for use only as a container engine graph driver. Its use is supported only
for container COW content, not for persistent storage. You must place any persistent storage
on non-OverlayFS volumes. You can use only the default container engine configuration: one
level of overlay, one lowerdir, and both lower and upper levels are on the same file system.
Only XFS is currently supported for use as a lower layer file system.
The OverlayFS kernel ABI and user-space behavior are not considered stable, and might
change in future updates.
OverlayFS provides a restricted set of the POSIX standards. Test your application thoroughly
before deploying it with OverlayFS. The following cases are not POSIX-compliant:
Lower files opened with O_RDONLY do not receive st_atime updates when the files are
read.
Lower files opened with O_RDONLY, then mapped with MAP_SHARED are inconsistent
with subsequent modification.
Fully compliant st_ino or d_ino values are not enabled by default on RHEL 8, but you can
enable full POSIX compliance for them with a module option or mount option.
To get consistent inode numbering, use the xino=on mount option.
You can also use the redirect_dir=on and index=on options to improve POSIX compliance.
These two options make the format of the upper layer incompatible with an overlay without
these options. That is, you might get unexpected results or errors if you create an overlay
with redirect_dir=on or index=on, unmount the overlay, then mount the overlay without
these options.
To determine whether an existing XFS file system is eligible for use as an overlay, use the
following command and see if the ftype=1 option is enabled:
SELinux security labels are enabled by default in all supported container engines with
OverlayFS.
Several known issues are associated with OverlayFS in this release. For details, see Non-
standard behavior in the Linux kernel documentation:
https://www.kernel.org/doc/Documentation/filesystems/overlayfs.txt.
For more information about OverlayFS, see the Linux kernel documentation:
https://www.kernel.org/doc/Documentation/filesystems/overlayfs.txt.
(BZ#1690207)
Stratis enables you to more easily perform storage tasks such as:
96
CHAPTER 8. TECHNOLOGY PREVIEWS
To administer Stratis storage, use the stratis utility, which communicates with the stratisd background
service.
For more information, see the Stratis documentation: Managing layered local storage with Stratis .
RHEL 8.3 updated Stratis to version 2.1.0. For more information, see Stratis 2.1.0 Release Notes .
(JIRA:RHELPLAN-1212)
IdM now supports setting up a Samba server on an IdM domain member as a Technology
Preview
With this update, you can now set up a Samba server on an Identity Management (IdM) domain member.
The new ipa-client-samba utility provided by the same-named package adds a Samba-specific
Kerberos service principal to IdM and prepares the IdM client. For example, the utility creates the
/etc/samba/smb.conf with the ID mapping configuration for the sss ID mapping back end. As a result,
administrators can now set up Samba on an IdM domain member.
Due to IdM Trust Controllers not supporting the Global Catalog Service, AD-enrolled Windows hosts
cannot find IdM users and groups in Windows. Additionally, IdM Trust Controllers do not support
resolving IdM groups using the Distributed Computing Environment / Remote Procedure Calls
(DCE/RPC) protocols. As a consequence, AD users can only access the Samba shares and printers from
IdM clients.
(JIRA:RHELPLAN-13195)
(BZ#1839637)
(BZ#1619620)
97
Red Hat Enterprise Linux 8.4 8.4 Release Notes
(BZ#1784200)
If the heuristics agent is configured on the same fencing level as the fence agent that does the actual
fencing but is configured before that agent in sequence, fencing issues an off action on the heuristics
agent before it attempts to do so on the agent that does the fencing. If the heuristics agent gives a
negative result for the off action it is already clear that the fencing level is not going to succeed, causing
Pacemaker fencing to skip the step of issuing the off action on the agent that does the fencing. A
heuristics agent can exploit this behavior to prevent the agent that does the actual fencing from fencing
a node under certain conditions.
A user might want to use this agent, especially in a two-node cluster, when it would not make sense for a
node to fence the peer if it can know beforehand that it would not be able to take over the services
properly. For example, it might not make sense for a node to take over services if it has problems
reaching the networking uplink, making the services unreachable to clients, a situation which a ping to a
router might detect in that case.
(BZ#1775847)
Previously, the IdM API was enhanced to enable multiple versions of API commands. These
enhancements could change the behavior of a command in an incompatible way. Users are now able to
continue using existing tools and scripts even if the IdM API changes. This enables:
Administrators to use previous or later versions of IdM on the server than on the managing
client.
Developers can use a specific version of an IdM call, even if the IdM version changes on the
server.
In all cases, the communication with the server is possible, regardless if one side uses, for example, a
newer version that introduces new options for a feature.
For details on using the API, see Using the Identity Management API to Communicate with the IdM
Server (TECHNOLOGY PREVIEW).
(BZ#1664719)
98
CHAPTER 8. TECHNOLOGY PREVIEWS
Users who decide to secure their DNS zones with DNSSEC are advised to read and follow these
documents:
Note that IdM servers with integrated DNS use DNSSEC to validate DNS answers obtained from other
DNS servers. This might affect the availability of DNS zones that are not configured in accordance with
recommended naming practices.
(BZ#1664718)
8.7. DESKTOP
GNOME for the 64-bit ARM architecture available as a Technology Preview
The GNOME desktop environment is now available for the 64-bit ARM architecture as a Technology
Preview. This enables administrators to configure and manage servers from a graphical user interface
(GUI) remotely, using the VNC session.
As a consequence, new administration applications are available on the 64-bit ARM architecture. For
example: Disk Usage Analyzer (baobab), Firewall Configuration (firewall-config), Red Hat
Subscription Manager (subscription-manager), or the Firefox web browser. Using Firefox,
administrators can connect to the local Cockpit daemon remotely.
(JIRA:RHELPLAN-27737)
(BZ#1698565)
99
Red Hat Enterprise Linux 8.4 8.4 Release Notes
Intel Tiger Lake UP3 and UP4 Xe graphics are now available as a Technology Preview.
To enable hardware acceleration with Intel Tiger Lake graphics, add the following option on the kernel
command line:
i915.force_probe=pci-id
The * character to enable the i915 driver with all alpha-quality hardware
(BZ#1783396)
(BZ#1893743)
kdump
network
selinux
storage
timesync
For more information, see the Knowledgebase article about RHEL System Roles .
100
CHAPTER 8. TECHNOLOGY PREVIEWS
(BZ#1812552)
8.10. VIRTUALIZATION
KVM virtualization is usable in RHEL 8 Hyper-V virtual machines
As a Technology Preview, nested KVM virtualization can now be used on the Microsoft Hyper-V
hypervisor. As a result, you can create virtual machines on a RHEL 8 guest system running on a Hyper-V
host.
Note that currently, this feature only works on Intel systems. In addition, nested virtualization is in some
cases not enabled by default on Hyper-V. To enable it, see the following Microsoft documentation:
https://docs.microsoft.com/en-us/virtualization/hyper-v-on-windows/user-guide/nested-virtualization
(BZ#1519039)
Note that the number of VMs that can use this feature at a time on a single host is determined by the
host hardware. Current AMD EPYC processors support up to 509 running VMs using SEV.
Also note that for VMs with SEV configured to be able to boot, you must also configure the VM with a
hard memory limit. To do so, add the following to the VM’s XML configuration:
<memtune>
<hard_limit unit='KiB'>N</hard_limit>
</memtune>
The recommended value for N is equal to or greater then the guest RAM + 256 MiB. For example, if the
guest is assigned 2 GiB RAM, N should be 2359296 or greater.
Intel vGPU
As a Technology Preview, it is now possible to divide a physical Intel GPU device into multiple virtual
devices referred to as mediated devices. These mediated devices can then be assigned to multiple
virtual machines (VMs) as virtual GPUs. As a result, these VMs share the performance of a single
physical Intel GPU.
Note that only selected Intel GPUs are compatible with the vGPU feature.
In addition, it is possible to enable a VNC console operated by Intel vGPU. By enabling it, users can
connect to a VNC console of the VM and see the VM’s desktop hosted by Intel vGPU. However, this
currently only works for RHEL guest operating systems.
(BZ#1528684)
Nested KVM virtualization is provided as a Technology Preview for KVM virtual machines (VMs) running
101
Red Hat Enterprise Linux 8.4 8.4 Release Notes
Nested KVM virtualization is provided as a Technology Preview for KVM virtual machines (VMs) running
on Intel, AMD64, and IBM Z systems hosts with RHEL 8. With this feature, a RHEL 7 or RHEL 8 VM that
runs on a physical RHEL 8 host can act as a hypervisor, and host its own VMs.
(JIRA:RHELPLAN-14047, JIRA:RHELPLAN-24437)
Select Intel network adapters now support SR-IOV in RHEL guests on Hyper-V
As a Technology Preview, Red Hat Enterprise Linux guest operating systems running on a Hyper-V
hypervisor can now use the single-root I/O virtualization (SR-IOV) feature for Intel network adapters
supported by the ixgbevf and iavf drivers. This feature is enabled when the following conditions are
met:
The virtual function (VF) from the NIC is attached to the virtual machine
The feature is currently supported with Microsoft Windows Server 2019 and 2016.
(BZ#1348508)
ESXi hypervisor and SEV-ES available as a Technology Preview for RHEL VMs
As a Technology Preview, in RHEL 8.4 and later, you can enable the AMD Secure Encrypted
Virtualization-Encrypted State (SEV-ES) to secure RHEL virtual machines (VMs) on VMware’s ESXi
hypervisor, versions 7.0.2 and later.
(BZ#1904496)
8.11. CONTAINERS
CNI plugins are available in Podman as a Technology Preview
CNI plugins are now available to use in Podman rootless mode as a Technology Preview. To enable this
feature, users are required to build their own rootless CNI infrastructure container image.
(BZ#1932083)
(BZ#1841438)
(JIRA:RHELPLAN-56659)
102
CHAPTER 9. DEPRECATED FUNCTIONALITY
Deprecated functionality continues to be supported until the end of life of Red Hat Enterprise Linux 8.
Deprecated functionality will likely not be supported in future major releases of this product and is not
recommended for new deployments. For the most recent list of deprecated functionality within a
particular major release, refer to the latest version of release documentation.
Deprecated hardware components are not recommended for new deployments on the current or future
major releases. Hardware driver updates are limited to security and critical fixes only. Red Hat
recommends replacing this hardware as soon as reasonably feasible.
A package can be deprecated and not recommended for further use. Under certain circumstances, a
package can be removed from a product. Product documentation then identifies more recent packages
that offer functionality similar, identical, or more advanced to the one deprecated, and provides further
recommendations.
For information regarding functionality that is present in RHEL 7 but has been removed in RHEL 8, see
Considerations in adopting RHEL 8 .
auth or authconfig
device
deviceprobe
dmraid
install
lilo
lilocheck
mouse
multipath
bootloader --upgrade
ignoredisk --interactive
partition --active
reboot --kexec
Where only specific options are listed, the base command and its other options are still available and not
deprecated.
For more details and related changes in Kickstart, see the Kickstart changes section of the
103
Red Hat Enterprise Linux 8.4 8.4 Release Notes
For more details and related changes in Kickstart, see the Kickstart changes section of the
Considerations in adopting RHEL 8 document.
(BZ#1642765)
The --interactive option of the ignoredisk Kickstart command has been deprecated
Using the --interactive option in future releases of Red Hat Enterprise Linux will result in a fatal
installation error. It is recommended that you modify your Kickstart file to remove the option.
(BZ#1637872)
(BZ#1904251)
The previous back end lorax-composer for Image Builder is considered deprecated. It will only receive
select fixes for the rest of the Red Hat Enterprise Linux 8 life cycle and will be omitted from future
major releases. Red Hat recommends that you uninstall lorax-composer the and install osbuild-
composer back end instead.
(BZ#1893767)
With this update, the rpmbuild --sign command has become deprecated. Using this command in future
releases of Red Hat Enterprise Linux can result in an error. It is recommended that you use the rpmsign
command instead.
(BZ#1688849)
(BZ#1886310)
9.4. SECURITY
NSS SEED ciphers are deprecated
The Mozilla Network Security Services (NSS) library will not support TLS cipher suites that use a SEED
cipher in a future release. To ensure smooth transition of deployments that rely on SEED ciphers when
NSS removes support, Red Hat recommends enabling support for other cipher suites.
104
CHAPTER 9. DEPRECATED FUNCTIONALITY
(BZ#1817533)
For more information, see the Strong crypto defaults in RHEL 8 and deprecation of weak crypto
algorithms Knowledgebase article on the Red Hat Customer Portal and the update-crypto-policies(8)
man page.
(BZ#1660839)
(BZ#1646541)
The Transport Layer Security (TLS) protocol version 1.2 and earlier allow to start a negotiation with a
Client Hello message formatted in a way that is backward compatible with the Secure Sockets Layer
(SSL) protocol version 2. Support for this feature in the Network Security Services ( NSS) library has
been deprecated and it is disabled by default.
Applications that require support for this feature need to use the new
SSL_ENABLE_V2_COMPATIBLE_HELLO API to enable it. Support for this feature may be removed
completely in future releases of Red Hat Enterprise Linux 8.
(BZ#1645153)
(BZ#1657927)
If your scenario really requires to completely disable SELinux, Red Hat recommends disabling SELinux
by adding the selinux=0 parameter to the kernel command line as described in the Changing SELinux
modes at boot time section of the Using SELinux title.
105
Red Hat Enterprise Linux 8.4 8.4 Release Notes
(BZ#1932222)
The ipa SELinux module has been removed from the selinux-policy package, because it is no longer
maintained. The functionality is now included in the ipa-selinux subpackage. If you need to use types or
interfaces from the ipa module in a local SELinux policy, install the ipa-selinux package.
(BZ#1461914)
9.5. NETWORKING
Network scripts are deprecated in RHEL 8
Network scripts are deprecated in Red Hat Enterprise Linux 8 and they are no longer provided by
default. The basic installation provides a new version of the ifup and ifdown scripts which call the
NetworkManager service through the nmcli tool. In Red Hat Enterprise Linux 8, to run the ifup and the
ifdown scripts, NetworkManager must be running.
Note that custom commands in /sbin/ifup-local, ifdown-pre-local and ifdown-local scripts are not
executed.
If any of these scripts are required, the installation of the deprecated network scripts in the system is
still possible with the following command:
The ifup and ifdown scripts link to the installed legacy network scripts.
Calling the legacy network scripts shows a warning about their deprecation.
(BZ#1647725)
(BZ#1894877)
For more information on using the perf command line tool, see the Getting started with Perf section on
the Red Hat customer portal or the perf man page.
(BZ#1929173)
9.6. KERNEL
106
CHAPTER 9. DEPRECATED FUNCTIONALITY
Installing RHEL for Real Time 8 using diskless boot is now deprecated
Diskless booting allows multiple systems to share a root file system via the network. While convenient,
diskless boot is prone to introducing network latency in realtime workloads. With a future minor update
of RHEL for Real Time 8, the diskless booting feature will no longer be supported.
(BZ#1748980)
The upstream Linux kernel has removed support for the elevator parameter, but it is still available in
RHEL 8 for compatibility reasons.
Note that the kernel selects a default disk scheduler based on the type of device. This is typically the
optimal setting. If you require a different scheduler, Red Hat recommends that you use udev rules or the
Tuned service to configure it. Match the selected devices and switch the scheduler only for those
devices.
(BZ#1665295)
Red Hat recommends that you use LVM RAID 1 devices with a segment type of raid1 instead of mirror.
The raid1 segment type is the default RAID configuration type and replaces mirror as the
recommended solution.
To convert mirror devices to raid1, see Converting a mirrored LVM device to a RAID1 device .
LVM mirror has several known issues. For details, see known issues in file systems and storage .
(BZ#1827628)
peripety is deprecated
The peripety package is deprecated since RHEL 8.3.
The Peripety storage event notification daemon parses system storage logs into structured storage
events. It helps you investigate storage issues.
(BZ#1871953)
sync
async
107
Red Hat Enterprise Linux 8.4 8.4 Release Notes
async-unsafe
auto
Starting with RHEL 8.4, the following write modes are deprecated:
sync
Devices above the VDO layer cannot recognize if VDO is synchronous, and consequently, the
devices cannot take advantage of the VDO sync mode.
async-unsafe
VDO added this write mode as a workaround for the reduced performance of async mode, which
complies to Atomicity, Consistency, Isolation, and Durability (ACID). Red Hat does not recommend
async-unsafe for most use cases and is not aware of any users who rely on it.
auto
This write mode only selects one of the other write modes. It is no longer necessary when VDO
supports only a single write mode.
For more information on VDO write modes, see Selecting a VDO write mode .
(JIRA:RHELPLAN-70700)
(BZ#1592011)
The pcs commands that support the clufter tool for analyzing cluster configuration formats have been
deprecated. These commands now print a warning that the command has been deprecated and sections
related to these commands have been removed from the pcs help display and the pcs(8) man page.
(BZ#1851335)
108
CHAPTER 9. DEPRECATED FUNCTIONALITY
The gdb.i686 packages will no longer be updated. Users must install gdb.x86_64 instead.
If you have gdb.i686 installed, installing gdb.x86_64 will cause dnf to report package gdb-8.2-
14.el8.x86_64 obsoletes gdb < 8.2-14.el8 provided by gdb-8.2-12.el8.i686. This is expected.
Either uninstall gdb.i686 or pass dnf the --allowerasing option to remove gdb.i686 and install
gdb.x8_64.
Users will no longer be able to install the gdb.i686 packages on 64-bit systems, that is, those
with the libc.so.6()(64-bit) packages.
(BZ#1853140)
The libdwarf library has been deprecated in RHEL 8. The library will likely not be supported in future
major releases. Instead, use the elfutils and libdw libraries for applications that wish to process
ELF/DWARF files.
Alternatives for the libdwarf-tools dwarfdump program are the binutils readelf program or the
elfutils eu-readelf program, both used by passing the --debug-dump flag.
(BZ#1920624)
The openssh-ldap subpackage has been deprecated in Red Hat Enterprise Linux 8 and will be removed
in RHEL 9. As the openssh-ldap subpackage is not maintained upstream, Red Hat recommends using
SSSD and the sss_ssh_authorizedkeys helper, which integrate better with other IdM solutions and are
more secure.
By default, the SSSD ldap and ipa providers read the sshPublicKey LDAP attribute of the user object,
if available. Note that you cannot use the default SSSD configuration for the ad provider or IdM trusted
domains to retrieve SSH public keys from Active Directory (AD), since AD does not have a default LDAP
attribute to store a public key.
To allow the sss_ssh_authorizedkeys helper to get the key from SSSD, enable the ssh responder by
adding ssh to the services option in the sssd.conf file. See the sssd.conf(5) man page for details.
(BZ#1871025)
If you have configured services or users to only use DES or 3DES encryption, you might experience
service interruptions such as:
109
Red Hat Enterprise Linux 8.4 8.4 Release Notes
Kerberos Distribution Centers (KDCs) with DES-encrypted Database Master Keys (K/M) fail to
start
1. Check if your KDC uses DES or 3DES encryption with the krb5check open source Python
scripts. See krb5check on GitHub.
2. If you are using DES or 3DES encryption with any Kerberos principals, re-key them with a
supported encryption type, such as Advanced Encryption Standard (AES). For instructions on
re-keying, see Retiring DES from MIT Kerberos Documentation.
3. Test independence from DES and 3DES by temporarily setting the following Kerberos options
before upgrading:
b. For every host, in /etc/krb5.conf and any files in /etc/krb5.conf.d, set allow_weak_crypto
to false. It is false by default.
c. For every host, in /etc/krb5.conf and any files in /etc/krb5.conf.d, set permitted_enctypes,
default_tgs_enctypes, and default_tkt_enctypes and do not include des or des3.
4. If you do not experience any service interruptions with the test Kerberos settings from the
previous step, remove them and upgrade. You do not need those settings after upgrading to
the latest Kerberos packages.
(BZ#1877991)
The ctdb service is managed as a pacemaker resource with the resource-agent ctdb.
The ctdb service uses storage volumes that contain either a GlusterFS file system provided by
the Red Hat Gluster Storage product or a GFS2 file system.
The stand-alone use case of the ctdb service has been deprecated and will not be included in a next
major release of Red Hat Enterprise Linux. For further information on support policies for Samba, see
the Knowledgebase article Support Policies for RHEL Resilient Storage - ctdb General Policies .
(BZ#1916296)
As long as the Samba version in RHEL 8 provides the PDC and BDC modes, Red Hat supports these
modes only in existing installations with Windows versions which support NT4 domains. Red Hat
recommends not setting up a new Samba NT4 domain, because Microsoft operating systems later than
Windows 7 and Windows Server 2008 R2 do not support NT4 domains.
If you use the PDC to authenticate only Linux users, Red Hat suggests migrating to Red Hat Identity
110
CHAPTER 9. DEPRECATED FUNCTIONALITY
If you use the PDC to authenticate only Linux users, Red Hat suggests migrating to Red Hat Identity
Management (IdM) that is included in RHEL subscriptions. However, you cannot join Windows systems
to an IdM domain. Note that Red Hat continues supporting the PDC functionality IdM uses in the
background.
Red Hat does not support running Samba as an AD domain controller (DC).
(BZ#1926114)
(BZ#1881992)
9.11. DESKTOP
The libgnome-keyring library has been deprecated
The libgnome-keyring library has been deprecated in favor of the libsecret library, as libgnome-
keyring is not maintained upstream, and does not follow the necessary cryptographic policies for RHEL.
The new libsecret library is the replacement that follows the necessary security standards.
(BZ#1607766)
(BZ#1569610)
(BZ#1666722)
The geoipupdate package requires a third-party subscription and it also downloads proprietary content.
111
Red Hat Enterprise Linux 8.4 8.4 Release Notes
The geoipupdate package requires a third-party subscription and it also downloads proprietary content.
Therefore, the geoipupdate package has been deprecated, and will be removed in the next major RHEL
version.
(BZ#1874892)
9.15. VIRTUALIZATION
virt-manager has been deprecated
The Virtual Machine Manager application, also known as virt-manager, has been deprecated. The RHEL
8 web console, also known as Cockpit, is intended to become its replacement in a subsequent release. It
is, therefore, recommended that you use the web console for managing virtualization in a GUI. Note,
however, that some features available in virt-manager may not be yet available the RHEL 8 web
console.
(JIRA:RHELPLAN-10304)
Note that a new VM snapshot mechanism is under development and will be fully implemented in a future
minor release of RHEL 8.
(BZ#1686057)
(BZ#1651994)
(JIRA:RHELPLAN-71200)
Instead, Red Hat recommends using signatures based on the SHA2 algorithm, or later.
(BZ#1935497)
112
CHAPTER 9. DEPRECATED FUNCTIONALITY
For advanced remote display functions, use third party tools such as RDP, HP RGS, or
Mechdyne TGX.
(BZ#1849563)
9.16. CONTAINERS
The Podman varlink-based API v1.0 has been removed
The Podman varlink-based API v1.0 was deprecated in a previous release of RHEL 8. Podman v2.0
introduced a new Podman v2.0 RESTful API. With the release of Podman v3.0, the varlink-based API
v1.0 has been completely removed.
(JIRA:RHELPLAN-45858)
The container-tools:1.0 module has been deprecated and will no longer receive security updates. It is
recommended to use a newer supported stable module stream, such as container-tools:2.0 or
container-tools:3.0.
(JIRA:RHELPLAN-59825)
389-ds-base-legacy-tools
authd
custodia
geoipupdate
hostname
isl
isl-devel
libidn
libdwarf
libdwarf-devel
libdwarf-static
libdwarf-tools
libpng12
lorax-composer
mailman
113
Red Hat Enterprise Linux 8.4 8.4 Release Notes
mercurial
ncompress
net-tools
netcf
netcf-libs
network-scripts
nss_nis
nss-pam-ldapd
openssh-ldap
parfait
peripety
perl-prefork
perl-Sys-Virt
python3-nose
python3-pymongo
redhat-support-lib-python
redhat-support-tool
scala
sendmail
xdelta
yp-tools
ypbind
ypserv
114
CHAPTER 9. DEPRECATED FUNCTIONALITY
PCI bnx2
115
Red Hat Enterprise Linux 8.4 8.4 Release Notes
116
CHAPTER 9. DEPRECATED FUNCTIONALITY
PCI myri10ge
PCI netxen_nic
117
Red Hat Enterprise Linux 8.4 8.4 Release Notes
To work around this problem, verify that the BaseOS and AppStream repositories are available to the
installer or use the authselect Kickstart command during installation.
(BZ#1640697)
The reboot --kexec and inst.kexec commands do not provide a predictable system state
Performing a RHEL installation with the reboot --kexec Kickstart command or the inst.kexec kernel
boot parameters do not provide the same predictable system state as a full reboot. As a consequence,
switching to the installed system without rebooting can produce unpredictable results.
Note that the kexec feature is deprecated and will be removed in a future release of Red Hat Enterprise
Linux.
(BZ#1697896)
To work around this problem, add ip=dhcp to boot options to enable network access when the
installation starts. Optionally, passing a Kickstart file or a repository located on the network using boot
options also resolves the problem. As a result, the network-based installation features can be used.
(BZ#1757877)
To work around this problem, use the harddrive --partition=sdX --dir=/ command to install from USB
CD-ROM drive. As a result, the installation does not fail.
(BZ#1914955)
To workaround this problem, set encryption in the custom partitioning screen for each device you want
to encrypt. Anaconda will ask for a passphrase when leaving the dialog.
118
CHAPTER 10. KNOWN ISSUES
(BZ#1903786)
(BZ#1954408)
The new osbuild-composer back end does not replicate the blueprint state from lorax-
composer on upgrades
Image Builder users that are upgrading from the lorax-composer back end to the new osbuild-
composer back end, blueprints can disappear. As a result, once the upgrade is complete, the blueprints
do not display automatically. To work around this problem, perform the following steps.
Prerequisites
Procedure
1. Run the command to load the previous lorax-composer based blueprints into the new osbuild-
composer back end:
As a result, the same blueprints are now available in osbuild-composer back end.
Additional resources
For more details about this Known Issue, see the Image Builder blueprints are no longer present
following an update to Red Hat Enterprise Linux 8.3 article.
(BZ#1897383)
Adding the same username in both blueprint and Kickstart files causes Edge image
installation to fail
To install a RHEL for Edge image, users must create a blueprint to build a rhel-edge-container image
and also create a Kickstart file to install the RHEL for Edge image. When a user adds the same
username, password, and SSH key in both the blueprint and the Kickstart file, the RHEL for Edge image
installation fails. Currently, there is no workaround.
(BZ#1951964)
GUI installation might fail if an attempt to unregister using the CDN is made before the
repository refresh is completed
Since RHEL 8.2, when registering your system and attaching subscriptions using the Content Delivery
Network (CDN), a refresh of the repository metadata is started by the GUI installation program. The
refresh process is not part of the registration and subscription process, and as a consequence, the
119
Red Hat Enterprise Linux 8.4 8.4 Release Notes
Unregister button is enabled in the Connect to Red Hat window. Depending on the network
connection, the refresh process might take more than a minute to complete. If you click the Unregister
button before the refresh process is completed, the GUI installation might fail as the unregister process
removes the CDN repository files and the certificates required by the installation program to
communicate with the CDN.
To work around this problem, complete the following steps in the GUI installation after you have clicked
the Register button in the Connect to Red Hat window:
1. From the Connect to Red Hat window, click Done to return to the Installation Summary
window.
2. From the Installation Summary window, verify that the Installation Source and Software
Selection status messages in italics are not displaying any processing information.
3. When the Installation Source and Software Selection categories are ready, click Connect to
Red Hat.
After performing these steps, you can safely unregister the system during the GUI installation.
(BZ#1821192)
Use a different user account that does not belong to multiple organizations.
Use the Activation Key authentication method available in the Connect to Red Hat feature for
GUI and Kickstart installations.
Skip the registration step in Connect to Red Hat and use Subscription Manager to register your
system post-installation.
(BZ#1822880)
Red Hat Insights client fails to register the operating system when using the graphical
installer
Currently, the installation fails with an error at the end, which points to the Insights client.
To work around this problem, uncheck the Connect to Red Hat Insightsoption during the Connect to
Red Hat step before registering the systems in the installer.
As a result, you can complete the installation and register to Insights afterwards by using this command:
# insights-client --register
(BZ#1931069)
120
CHAPTER 10. KNOWN ISSUES
In Red Hat Enterprise Linux 8, four attributes of the syspurpose command-line tool have been added:
role,usage, service_level_agreement and addons. Currently, only role, usage and
service_level_agreement affect the output of running the subscription-manager attach --auto
command. Users who attempt to set values to the addons argument will not observe any effect on the
subscriptions that are auto-attached.
(BZ#1687900)
For more details, see the related Knowledgebase article Fix postfix TLS in the FIPS mode by switching to
SHA-256 instead of MD5.
(BZ#1711885)
10.4. SECURITY
Users can run sudo commands as locked users
In systems where sudoers permissions are defined with the ALL keyword, sudo users with permissions
can run sudo commands as users whose accounts are locked. Consequently, locked and expired
accounts can still be used to execute commands.
To work around this problem, enable the newly implemented runas_check_shell option together with
proper settings of valid shells in /etc/shells. This prevents attackers from running commands under
system accounts such as bin.
(BZ#1786990)
The libselinux-python package contains only Python 2 bindings for developing SELinux applications
and it is used for backward compatibility. For this reason, libselinux-python is no longer available in the
default RHEL 8 repositories through the dnf install libselinux-python command.
To work around this problem, enable both the libselinux-python and python27 modules, and install the
libselinux-python package and its dependencies with the following commands:
Alternatively, install libselinux-python using its install profile with a single command:
121
Red Hat Enterprise Linux 8.4 8.4 Release Notes
(BZ#1666328)
udica processes UBI 8 containers only when started with --env container=podman
The Red Hat Universal Base Image 8 (UBI 8) containers set the container environment variable to the
oci value instead of the podman value. This prevents the udica tool from analyzing a container
JavaScript Object Notation (JSON) file.
To work around this problem, start a UBI 8 container using a podman command with the --env
container=podman parameter. As a result, udica can generate an SELinux policy for a UBI 8 container
only when you use the described workaround.
(BZ#1763210)
See the Negative effects of the RHEL default logging setup on performance and their mitigations
Knowledgebase article for more information.
(JIRA:RHELPLAN-10431)
File permissions of /etc/passwd- are not aligned with the CIS RHEL 8 Benchmark 1.0.0
Because of an issue with the CIS Benchmark, the remediation of the SCAP rule that ensures permissions
on the /etc/passwd- backup file configures permissions to 0644. However, the CIS Red Hat Enterprise
Linux 8 Benchmark 1.0.0 requires file permissions 0600 for that file. As a consequence, the file
permissions of /etc/passwd- are not aligned with the benchmark after remediation.
(BZ#1858866)
Disabling SELinux using the SELINUX=disabled option in the /etc/selinux/config results in a process in
which the kernel boots with SELinux enabled and switches to disabled mode later in the boot process.
This might cause memory leaks.
To work around this problem, disable SELinux by adding the selinux=0 parameter to the kernel
command line as described in the Changing SELinux modes at boot time section of the Using SELinux
title if your scenario really requires to completely disable SELinux.
(JIRA:RHELPLAN-34199)
The RHEL 8 system-wide cryptographic policies should disable Camellia ciphers in all policy levels, as
stated in the product documentation. However, the Kerberos protocol enables the ciphers by default.
In the previous command, replace DEFAULT with the cryptographic level name if you have switched
from DEFAULT previously.
As a result, Camellia ciphers are correctly disallowed across all applications that use system-wide crypto
122
CHAPTER 10. KNOWN ISSUES
As a result, Camellia ciphers are correctly disallowed across all applications that use system-wide crypto
policies only when you disable them through the workaround.
(BZ#1919155)
To work around this problem, upgrade the server to use certificates signed with SHA-256 or stronger
hash, or switch to the LEGACY policy.
(BZ#1628553)
(BZ#1934058)
Using multiple labeled IPsec connections with IKEv2 do not work correctly
When Libreswan uses the IKEv2 protocol, security labels for IPsec do not work correctly for more than
one connection. As a consequence, Libreswan using labeled IPsec can establish only the first
connection, but cannot establish subsequent connections correctly. To use more than one connection,
use the IKEv1 protocol.
(BZ#1934859)
(BZ#1810911)
Smart-card provisioning process through OpenSC pkcs15-init does not work properly
The file_caching option is enabled in the default OpenSC configuration, and the file caching
functionality does not handle some commands from the pkcs15-init tool properly. Consequently, the
smart-card provisioning process through OpenSC fails.
To work around the problem, add the following snippet to the /etc/opensc.conf file:
app pkcs15-init {
framework pkcs15 {
use_file_caching = false;
}
}
123
Red Hat Enterprise Linux 8.4 8.4 Release Notes
The smart-card provisioning through pkcs15-init only works if you apply the previously described
workaround.
(BZ#1947025)
Execute the command using a shell script with the -c option. For example,
bash -c command
Execute the command from a common path using /bin, /sbin, /usr/sbin, /usr/local/bin, and
/usr/local/sbin common directories.
(BZ#1860443)
The libreswan package in RHEL 8.4 supports IPsec-based VPNs using TCP encapsulation. However,
the selinux-policy package does not reflect this update. As a consequence, when you set Libreswan to
use TCP, the ipsec service fails to bind to the given TCP port.
# vim local_ipsec_tcp_listen.cil
# semodule -i local_ipsec_tcp_listen.cil
As a result, Libreswan can bind and connect to the commonly used 4500/tcp port.
(BZ#1931848)
Installation with the Server with GUI or Workstation software selections and CIS security
profile is not possible
The CIS security profile is not compatible with the Server with GUI and Workstation software
selections. As a consequence, a RHEL 8 installation with the Server with GUI software selection and
124
CHAPTER 10. KNOWN ISSUES
CIS profile is not possible. An attempted installation using the CIS profile and either of these software
selections will generate the error message:
package xorg-x11-server-common has been added to the list of excluded packages, but it can't be
removed from the current software selection without breaking the installation.
To work around the problem, do not use the CIS security profile with the Server with GUI or
Workstation software selections.
(BZ#1843932)
The rpm_verify_permissions rule compares file permissions to package default permissions. However,
the Center for Internet Security (CIS) profile, which is provided by the scap-security-guide packages,
changes some file permissions to be more strict than default. As a consequence, verification of certain
files using rpm_verify_permissions fails.
To work around this problem, manually verify that these files have the following permissions:
/etc/cron.d (0700)
/etc/cron.hourly (0700)
/etc/cron.monthly (0700)
/etc/crontab (0600)
/etc/cron.weekly (0700)
/etc/cron.daily (0700)
(BZ#1843913)
(BZ#1665082)
(BZ#1750755)
OSCAP Anaconda Addon does not install all packages in text mode
The OSCAP Anaconda Addon plugin cannot modify the list of packages selected for installation by the
system installer if the installation is running in text mode. Consequently, when a security policy profile is
specified using Kickstart and the installation is running in text mode, any additional packages required by
the security policy are not installed during installation.
125
Red Hat Enterprise Linux 8.4 8.4 Release Notes
To work around this problem, either run the installation in graphical mode or specify all packages that
are required by the security policy profile in the security policy in the %packages section in your
Kickstart file.
As a result, packages that are required by the security policy profile are not installed during RHEL
installation without one of the described workarounds, and the installed system is not compliant with the
given security policy profile.
(BZ#1674001)
The OSCAP Anaconda Addon plugin does not properly handle security profiles with customizations in
separate files. Consequently, the customized profile is not available in the RHEL graphical installation
even when you properly specify it in the corresponding Kickstart section.
To work around this problem, follow the instructions in the Creating a single SCAP data stream from an
original DS and a tailoring file Knowledgebase article. As a result of this workaround, you can use a
customized SCAP profile in the RHEL graphical installation.
(BZ#1691305)
(BZ#1834716)
NONE:+VERS-ALL:-VERS-TLS1.3:+MAC-ALL:+DHE-RSA:+AES-256-GCM:+SIGN-RSA-
SHA384:+COMP-ALL:+GROUP-ALL
To work around this problem, use only correctly working priority strings:
NONE:+VERS-ALL:-VERS-TLS1.3:+MAC-ALL:+ECDHE-RSA:+AES-128-CBC:+SIGN-RSA-
SHA1:+COMP-ALL:+GROUP-ALL
As a result, current configurations must be limited to the strings that work correctly.
(BZ#1679512)
10.5. NETWORKING
IPsec network traffic fails during IPsec offloading when GRO is disabled
IPsec offloading is not expected to work when Generic Receive Offload (GRO) is disabled on the
device. If IPsec offloading is configured on a network interface and GRO is disabled on that device,
IPsec network traffic fails.
126
CHAPTER 10. KNOWN ISSUES
(BZ#1649647)
10.6. KERNEL
Systems with a large amount of persistent memory experience delays during the boot
process
Systems with a large amount of persistent memory take a long time to boot because the initialization of
the memory is serialized. Consequently, if there are persistent memory file systems listed in the
/etc/fstab file, the system might timeout while waiting for devices to become available. To work around
this problem, configure the DefaultTimeoutStartSec option in the /etc/systemd/system.conf file to a
sufficiently large value.
(BZ#1666538)
(BZ#1907271)
Consequently, the capture kernel fails to save vmcore if a kernel crash is triggered after the memory
hot-plug or hot-unplug operation.
To work around this problem, restart the kdump service after hot-plug or hot-unplug:
(BZ#1793389)
127
Red Hat Enterprise Linux 8.4 8.4 Release Notes
kdumpctrl rebuild
(BZ#1931266)
(BZ#1659609)
As a result, the crash kernel allocates memory within the 32-bit region and the kdump service works as
expected.
(BZ#1940674)
As a result, users can determine versions of the affected kernel drivers in scenarios where it is necessary.
128
CHAPTER 10. KNOWN ISSUES
Note that the perceived amount of change in a driver version string has no actual bearing on the amount
of change in the driver itself.
(BZ#1944639)
3. Restart the kdump service by running the systemctl restart kdump command.
As a result, the first kernel boots correctly and the vmcore file is expected to be captured upon the
kernel crash.
Note that the kdump service can use a significant amount of crash kernel memory to dump the vmcore
file. Ensure that the capture kernel has sufficient memory available for the kdump service.
(BZ#1654962)
1. The Generate NMI button on the Integrated Lights-Out (iLO) server management software.
This button is triggered by a user.
2. The hpwdt watchdog. The expiration by default sends an NMI to the server.
Both sequences typically occur when the system is unresponsive. Under normal circumstances, the NMI
handler for both these situations calls the kernel panic() function and if configured, the kdump service
generates a vmcore file.
Because of the missing NMI, however, kernel panic() is not called and vmcore is not collected.
In the first case (1.), if the system was unresponsive, it remains so. To work around this scenario, use the
virtual Power button to reset or power cycle the server.
In the second case (2.), the missing NMI is followed 9 seconds later by a reset from the Automated
System Recovery (ASR).
129
Red Hat Enterprise Linux 8.4 8.4 Release Notes
The HPE Gen9 Server line experiences this problem in single-digit percentages. The Gen10 at an even
smaller frequency.
(BZ#1602962)
The tuned-adm profile powersave command causes the system to become unresponsive
Executing the tuned-adm profile powersave command leads to an unresponsive state of the Penguin
Valkyrie 2000 2-socket systems with the older Thunderx (CN88xx) processors. Consequently, reboot
the system to resume working. To work around this problem, avoid using the powersave profile if your
system matches the mentioned specifications.
(BZ#1609288)
The kernel ACPI driver reports it has no access to a PCIe ECAM memory region
The Advanced Configuration and Power Interface (ACPI) table provided by firmware does not define a
memory region on the PCI bus in the Current Resource Settings (_CRS) method for the PCI bus device.
Consequently, the following warning message occurs during the system boot:
[ 2.817152] acpi PNP0A08:00: [Firmware Bug]: ECAM area [mem 0x30000000-0x31ffffff] not
reserved in ACPI namespace
[ 2.827911] acpi PNP0A08:00: ECAM at [mem 0x30000000-0x31ffffff] for [bus 00-1f]
However, the kernel is still able to access the 0x30000000-0x31ffffff memory region, and can assign that
memory region to the PCI Enhanced Configuration Access Mechanism (ECAM) properly. You can verify
that PCI ECAM works correctly by accessing the PCIe configuration space over the 256 byte offset with
the following output:
03:00.0 Non-Volatile memory controller: Sandisk Corp WD Black 2018/PC SN720 NVMe SSD (prog-
if 02 [NVM Express])
...
Capabilities: [900 v1] L1 PM Substates
L1SubCap: PCI-PM_L1.2- PCI-PM_L1.1- ASPM_L1.2+ ASPM_L1.1- L1_PM_Substates+
PortCommonModeRestoreTime=255us PortTPowerOnTime=10us
L1SubCtl1: PCI-PM_L1.2- PCI-PM_L1.1- ASPM_L1.2- ASPM_L1.1-
T_CommonMode=0us LTR1.2_Threshold=0ns
L1SubCtl2: T_PwrOn=10us
For more information about the problem, see the "Firmware Bug: ECAM area mem 0x30000000-
0x31ffffff not reserved in ACPI namespace" appears during system boot solution.
(BZ#1868526)
The hwloc commands with the default settings do not work on single CPU Power9 and
Power10 LPARs
With the hwloc package of version 2.2.0, any single-node Non-Uniform Memory Access (NUMA)
system that runs Power9 / Power10 CPU is considered to be "disallowed". Consequently, all hwloc
commands do not work and the following error message is displayed:
You can use either of these two options to work around this problem:
130
CHAPTER 10. KNOWN ISSUES
As a result, the hwloc command does not return any errors in the described scenario.
(BZ#1917560)
(BZ#1708456)
The OPEN MPI library may trigger run-time failures with default PML
In OPEN Message Passing Interface (OPEN MPI) implementation 4.0.x series, Unified Communication X
(UCX) is the default point-to-point communicator (PML). The later versions of OPEN MPI 4.0.x series
deprecated openib Byte Transfer Layer (BTL).
However, OPEN MPI, when run over a homogeneous cluster (same hardware and software
configuration), UCX still uses openib BTL for MPI one-sided operations. As a consequence, this may
trigger execution errors. To work around this problem:
where,
The -mca pml ucx parameter configures OPEN MPI to use ucx PML.
The OPEN MPI, when run over a heterogeneous cluster (different hardware and software
configuration), it uses UCX as the default PML. As a consequence, this may cause the OPEN MPI jobs to
run with erratic performance, unresponsive behavior, or crash failures. To work around this problem, set
the UCX priority as:
-mca pml_ucx_priority 5
As a result, the OPEN MPI library is able to choose an alternative available transport layer over UCX.
(BZ#1866402)
131
Red Hat Enterprise Linux 8.4 8.4 Release Notes
(BZ#1930576)
Having a lower printk value persistent across a reboot reduces the likelihood of system hangs.
Note that this setting change comes at the expense of losing the extra debugging information.
(JIRA:RHELPLAN-28940)
On EFI systems, the EFI System Partition conventionally serves as the /boot file system. The
uEFI standard requires a specific GPT partition type and a specific file system type for this
partition.
RHEL 8 uses the Boot Loader Specification (BLS) for system boot entries. This specification
requires that the /boot file system is readable by the platform firmware. On EFI systems, the
platform firmware can read only the /boot configuration defined by the uEFI standard.
The support for LVM logical volumes in the GRUB 2 boot loader is incomplete. Red Hat does
not plan to improve the support because the number of use cases for the feature is decreasing
due to standards such as uEFI and BLS.
Red Hat does not plan to support /boot on LVM. Instead, Red Hat provides tools for managing system
snapshots and rollback that do not need the /boot file system to be placed on an LVM logical volume.
(BZ#1496229)
LVM no longer allows creating volume groups with mixed block sizes
LVM utilities such as vgcreate or vgextend no longer allow you to create volume groups (VGs) where
the physical volumes (PVs) have different logical block sizes. LVM has adopted this change because file
systems fail to mount if you extend the underlying logical volume (LV) with a PV of a different block size.
To re-enable creating VGs with mixed block sizes, set the allow_mixed_block_sizes=1 option in the
lvm.conf file.
(BZ#1768536)
132
CHAPTER 10. KNOWN ISSUES
The writecache LVM caching method has the following limitations, which are not present in the cache
method:
You cannot name a writecache logical volume when using pvmove commands.
You cannot use logical volumes with writecache in combination with thin pools or VDO.
You cannot resize a logical volume while cache or writecache is attached to it.
LVM mirror devices that store a LUKS volume sometimes become unresponsive
Mirrored LVM devices with a segment type of mirror that store a LUKS volume might become
unresponsive under certain conditions. The unresponsive devices reject all I/O operations.
To work around the issue, Red Hat recommends that you use LVM RAID 1 devices with a segment type
of raid1 instead of mirror if you need to stack LUKS volumes on top of resilient software-defined
storage.
The raid1 segment type is the default RAID configuration type and replaces mirror as the
recommended solution.
To convert mirror devices to raid, see Converting a mirrored LVM device to a RAID1 device .
(BZ#1730502)
An NFS 4.0 patch can result in reduced performance under an open-heavy workload
Previously, a bug was fixed that, in some cases, could cause an NFS open operation to overlook the fact
that a file had been removed or renamed on the server. However, the fix may cause slower performance
with workloads that require many open operations. To work around this problem, it might help to use
NFS version 4.1 or higher, which have been improved to grant delegations to clients in more cases,
allowing clients to perform open operations locally, quickly, and safely.
(BZ#1748451)
xfs_quota state doesn’t output all grace times when multiple quota types are specified
Currently, the xfs_quota state command doesn’t output the grace time for quotas as expected with
options specifying multiple quota types. To work around this issue, specify the required quota type in
command option individually, i. e. xfs_quota state -g, xfs_quota state -p or xfs_quota state -u.
(BZ#1949743)
133
Red Hat Enterprise Linux 8.4 8.4 Release Notes
It is recommended that clusters that use the ocf:heartbeat:pgsql resource agent not be upgraded to
RHEL 8.4 until the z-stream is available.
(BZ#1948620)
When a user of NIS uses a 32-bit application that calls the getpwnam() function, the call fails if the
nss_nis.i686 package is missing. To work around this problem, manually install the missing package by
using the yum install nss_nis.i686 command.
(BZ#1803161)
Since the RHEL 8.3 update to the Apache Portable Runtime (APR) library, you can work around the
problem by setting the APR_DEEPBIND environment variable, which enables the use of the
RTLD_DEEPBIND dynamic linker option when loading httpd modules. When the APR_DEEPBIND
environment variable is enabled, crashes no longer occur in httpd configurations that load conflicting
libraries.
(BZ#1819607)
MariaDB 10.5 does not warn about dropping a non-existent table when the OQGraph plug-in
is enabled
When the OQGraph storage engine plug-in is loaded to the MariaDB 10.5 server, MariaDB does not
warn about dropping a non-existent table. In particular, when the user attempts to drop a non-existent
table using the DROP TABLE or DROP TABLE IF EXISTS SQL commands, MariaDB neither returns
an error message nor logs a warning.
Note that the OQGraph plug-in is provided by the mariadb-oqgraph-engine package, which is not
installed by default.
(BZ#1944653)
Since the RHEL 8.3 update to the pam and systemd-pam packages, the PAM plug-in version 1.0 in
MariaDB does not work.
To work around this problem, use the PAM plug-in version 2.0 provided by the mariadb:10.5 module
stream.
See also MariaDB 10.5 provides the PAM plug-in version 2.0 .
134
CHAPTER 10. KNOWN ISSUES
(BZ#1942330)
The pyodbc module currently does not work with the MariaDB 10.3 server included in the RHEL 8.4
release. Earlier versions of the MariaDB 10.3 server and the MariaDB 10.5 server are not affected by
this problem.
Note that the root cause is in the mariadb-connector-odbc package and the affected package versions
are as follows:
pyodbc-4.0.30
mariadb-server-10.3.27
mariadb-connector-odbc-3.0.7
(BZ#1944692)
(BZ#1937340)
To work around this problem, unhide the hidden replica that has the KRA role before you add new KRA
instances. You can hide it again when ipa-kra-install completes successfully.
(BZ#1816784)
Using the cert-fix utility with the --agent-uid pkidbuser option breaks Certificate System
Using the cert-fix utility with the --agent-uid pkidbuser option corrupts the LDAP configuration of
Certificate System. As a consequence, Certificate System might become unstable and manual steps are
required to recover the system.
(BZ#1729215)
The /var/log/lastlog sparse file on IdM hosts can cause performance problems
During the IdM installation, a range of 200,000 UIDs from a total of 10,000 possible ranges is randomly
selected and assigned. Selecting a random range in this way significantly reduces the probability of
conflicting IDs in case you decide to merge two separate IdM domains in the future.
135
Red Hat Enterprise Linux 8.4 8.4 Release Notes
However, having high UIDs can create problems with the /var/log/lastlog file. For example, if a user with
the UID of 1280000008 logs in to an IdM client, the local /var/log/lastlog file size increases to almost
400 GB. Although the actual file is sparse and does not use all that space, certain applications are not
designed to identify sparse files by default and may require a specific option to handle them. For
example, if the setup is complex and a backup and copy application does not handle sparse files
correctly, the file is copied as if its size was 400 GB. This behavior can cause performance problems.
In case of a standard package, refer to its documentation to identify the option that handles
sparse files.
In case of a custom application, ensure that it is able to manage sparse files such as
/var/log/lastlog correctly.
(JIRA:RHELPLAN-59111)
To work around the problem, choose a password that is 249 characters or fewer.
(BZ#1723362)
FIPS mode does not support using a shared secret to establish a cross-forest trust
Establishing a cross-forest trust using a shared secret fails in FIPS mode because NTLMSSP
authentication is not FIPS-compliant. To work around this problem, authenticate with an Active
Directory (AD) administrative account when establishing a trust between an IdM domain with FIPS mode
enabled and an AD domain.
(BZ#1924707)
Downgrading authselect after the rebase to version 1.2.2 breaks system authentication
The authselect package has been rebased to the latest upstream version 1.2.2. Downgrading
authselect is not supported and breaks system authentication for all users, including root.
If you downgraded the authselect package to 1.2.1 or earlier, perform the following steps to work
around this problem:
1. At the GRUB boot screen, select Red Hat Enterprise Linux with the version of the kernel that
you want to boot and press e to edit the entry.
2. Type single as a separate word at the end of the line that starts with linux and press Ctrl+x to
start the boot process.
(BZ#1892761)
136
CHAPTER 10. KNOWN ISSUES
10.13. DESKTOP
Disabling flatpak repositories from Software Repositories is not possible
Currently, it is not possible to disable or remove flatpak repositories in the Software Repositories tool in
the GNOME Software utility.
(BZ#1668760)
(BZ#1717947)
Generation 2 RHEL 8 virtual machines sometimes fail to boot on Hyper-V Server 2016
hosts
When using RHEL 8 as the guest operating system on a virtual machine (VM) running on a Microsoft
Hyper-V Server 2016 host, the VM in some cases fails to boot and returns to the GRUB boot menu. In
addition, the following error is logged in the Hyper-V event log:
The guest operating system reported that it failed with the following error code: 0x1E
This error occurs due to a UEFI firmware bug on the Hyper-V host. To work around this problem, use
Hyper-V Server 2019 as the host.
(BZ#1583445)
The radeon kernel driver currently does not reset hardware in the kexec context correctly. Instead,
radeon falls over, which causes the rest of the kdump service to fail.
To work around this problem, disable radeon in kdump by adding the following line to the
/etc/kdump.conf file:
Restart the machine and kdump. After starting kdump, the force_rebuild 1 line may be removed from
the configuration file.
Note that in this scenario, no graphics will be available during kdump, but kdump will work successfully.
(BZ#1694705)
137
Red Hat Enterprise Linux 8.4 8.4 Release Notes
of the displays.
(BZ#1812577)
To work around this problem, use the sudo -E command to run graphical applications as a root user.
(BZ#1673073)
VNC Viewer displays wrong colors with the 16-bit color depth on IBM Z
The VNC Viewer application displays wrong colors when you connect to a VNC session on an IBM Z
server with the 16-bit color depth.
To work around the problem, set the 24-bit color depth on the VNC server. With the Xvnc server,
replace the -depth 16 option with -depth 24 in the Xvnc configuration.
As a result, VNC clients display the correct colors but use more network bandwidth with the server.
(BZ#1886147)
To enable hardware acceleration or Vulkan on ARM, install the proprietary Nvidia driver.
(JIRA:RHELPLAN-57914)
To work around the problem, configure the hypervisor to assign at least 16 MB of video memory to the
VM. As a result, the GUI on the VM no longer crashes.
(BZ#1910358)
10.15. VIRTUALIZATION
virsh iface-\* commands do not work consistently
Currently, virsh iface-* commands, such as virsh iface-start and virsh iface-destroy, frequently fail
due to configuration dependencies. Therefore, it is recommended not to use virsh iface-\* commands
for configuring and managing host network connections. Instead, use the NetworkManager program and
its related management applications.
(BZ#1664592)
138
CHAPTER 10. KNOWN ISSUES
Virtual machines sometimes fail to start when using many virtio-blk disks
Adding a large number of virtio-blk devices to a virtual machine (VM) may exhaust the number of
interrupt vectors available in the platform. If this occurs, the VM’s guest OS fails to boot, and displays a
dracut-initqueue[392]: Warning: Could not boot error.
(BZ#1719687)
Attaching LUN devices to virtual machines using virtio-blk does not work
The q35 machine type does not support transitional virtio 1.0 devices, and RHEL 8 therefore lacks
support for features that were deprecated in virtio 1.0. In particular, it is not possible on a RHEL 8 host to
send SCSI commands from virtio-blk devices. As a consequence, attaching a physical disk as a LUN
device to a virtual machine fails when using the virtio-blk controller.
Note that physical disks can still be passed through to the guest operating system, but they should be
configured with the device='disk' option rather than device='lun'.
(BZ#1777138)
Virtual machines using Cooperlake cannot boot when TSX is disabled on the host
Virtual machines (VMs) that use the Cooperlake CPU model currently fail to boot when the TSX CPU
flag is diabled on the host. Instead, the host displays the following error message:
the CPU is incompatible with host CPU: Host CPU does not provide required features: hle, rtm
To make VMs with Cooperlake usable on such host, disable the HLE, RTM, and TAA_NO flags in the VM
configuration in the VM’s XML configuration:
(BZ#1860743)
Using perf kvm record on IBM POWER Systems can cause the VM to crash
When using a RHEL 8 host on the little-endian variant of IBM POWER hardware, using the perf kvm
record command to collect trace event samples for a KVM virtual machine (VM) in some cases results in
the VM becoming unresponsive. This situation occurs when:
The perf utility is used by an unprivileged user, and the -p option is used to identify the VM - for
example perf kvm record -e trace_cycles -p 12345.
To work around this problem, use the perf kvm utility with the -i option to monitor VMs that were
created using the virsh shell. For example:
Note that when using the -i option, child tasks do not inherit counters, and threads will therefore not be
monitored.
(BZ#1924016)
139
Red Hat Enterprise Linux 8.4 8.4 Release Notes
To work around this problem, disable Transparent Huge Pages (THP) on the RHEL 7-ALT host, which
enables the migration to complete successfully.
(BZ#1741436)
To avoid this issue, add --selinux-relabel to the kernel command line of the VM after modifying its disk
image with virt-customize.
(BZ#1554735)
(BZ#1910848)
SMT CPU topology is not detected by VMs when using host passthrough mode on AMD
EPYC
When a virtual machine (VM) boots with the CPU host passthrough mode on an AMD EPYC host, the
TOPOEXT CPU feature flag is not present. Consequently, the VM is not able to detect a virtual CPU
topology with multiple threads per core. To work around this problem, boot the VM with the EPYC CPU
model instead of host passthrough.
(BZ#1740002)
Windows Server 2016 virtual machines with Hyper-V enabled fail to boot when using certain
CPU models
Currently, it is not possible to boot a virtual machine (VM) that uses Windows Server 2016 as the guest
operating system, has the Hyper-V role enabled, and uses one of the following CPU models:
EPYC-IBPB
EPYC
To work around this problem, use the EPYC-v3 CPU model, or manually enable the xsaves CPU flag
for the VM.
(BZ#1942888)
Deleting a macvtap interface from a virtual machine resets all macvtap connections
Currently, deleting a macvtap interface from a running virtual machines (VM) with multiple macvtap
devices also resets the connection settings of the other macvtap interfaces. As a consequence, the VM
may experience network issues.
140
CHAPTER 10. KNOWN ISSUES
(BZ#1332758)
(BZ#1865745)
Setting static IP in a RHEL 8 virtual machine on a VMWare host does not work
Currently, when using RHEL 8 as a guest operating system of a virtual machine (VM) on a VMWare host,
the DatasourceOVF function does not work correctly. As a consequence, if you use the cloud-init utility
to set the VM’s network to static IP and then reboot the VM, the VM’s network will be changed to
DHCP.
(BZ#1750862)
Core dumping RHEL 8 virtual machines with certain NICs to a remote machine on Azure
takes longer than expected
Currently, using the kdump utility to save the core dump file of a RHEL 8 virtual machine (VM) on a
Microsoft Azure hypervisor to a remote machine does not work correctly when the VM is using a NIC with
enabled accelerated networking. As a consequence, the dump file is saved after approximately 200
seconds, instead of immediately. In addition, the following error message is logged on the console
before the dump file is saved.
(BZ#1854037)
(BZ#1912236)
The SCSI host address sometimes changes when booting a Hyper-V VM with multiple
guest disks
Currently, when booting a RHEL 8 virtual machine (VM) on the Hyper-V hypervisor, the host portion of
the Host, Bus, Target, Lun (HBTL) SCSI address in some cases changes. As a consequence, automated
tasks set up with the HBTL SCSI identification or device node in the VM do not work consistently. This
occurs if the VM has more than one disk or if the disks have different sizes.
To work around the problem, modify your kickstart files, using one of the following methods:
141
Red Hat Enterprise Linux 8.4 8.4 Release Notes
You can use for example the following powershell script to determine the specific device identifiers:
# Output what the /dev/disk/by-id/<value> for the specified hyper-v virtual disk.
# Takes a single parameter which is the virtual disk file.
# Note: kickstart syntax works with and without the /dev/ prefix.
param (
[Parameter(Mandatory=$true)][string]$virtualdisk
)
$p = $part[0]
$s0 = $p[6] + $p[7] + $p[4] + $p[5] + $p[2] + $p[3] + $p[0] + $p[1]
$p = $part[1]
$s1 = $p[2] + $p[3] + $p[0] + $p[1]
You can use this script on the hyper-v host, for example as follows:
Afterwards, the disk values can be used in the kickstart file, for example as follows:
As these values are specific for each virtual disk, the configuration needs to be done for each VM
instance. It may, therefore, be useful to use the %include syntax to place the disk information into a
separate file.
A kickstart file that configures disk selection based on size must include lines similar to the following:
...
...
# Dump whole SCSI/IDE disks out sorted from smallest to largest ouputting
# just the name
disks=(`lsblk -n -o NAME -l -b -x SIZE -d -I 8,3`) || exit 1
142
CHAPTER 10. KNOWN ISSUES
%end
(BZ#1906870)
RHEL 8 virtual machines have lower network performance on AWS ARM64 instances
When using RHEL 8 as a guest operating system in a virtual machine (VM) that runs on an Amazon Web
Services (AWS) ARM64 instance, the VM has lower than expected network performance when the
iommu.strict=1 kernel parameter is used or when no iommu.strict parameter is defined.
To work around this problem, change the parameter to iommu.strict=0. However, this can also decrease
the security of the VM.
(BZ#1836058)
(BZ#1934033, BZ#1944636)
SSH keys are not generated correctly on EC2 instanced created from a backup AMI
Currently, when creating a new Amazon EC2 instance of RHEL 8 from a backup Amazon Machine Image
(AMI), cloud-init deletes existing SSH keys on the VM but does not create new ones. Consequently, the
VM in some cases cannot connect to the host.
To work around this problem, edit the cloud.cgf file and change the "ssh_genkeytypes: ~" line to
ssh_genkeytypes: ['rsa', 'ecdsa', 'ed25519'].
This makes it possible for SSH keys to be deleted and generated correctly when provisioning a RHEL 8
VM in the described circumstances.
(BZ#1957532)
10.17. SUPPORTABILITY
redhat-support-tool does not work with the FUTURE crypto policy
Because a cryptographic key used by a certificate on the Customer Portal API does not meet the
requirements by the FUTURE system-wide cryptographic policy, the redhat-support-tool utility does
not work with this policy level at the moment.
To work around this problem, use the DEFAULT crypto policy while connecting to the Customer Portal
143
Red Hat Enterprise Linux 8.4 8.4 Release Notes
To work around this problem, use the DEFAULT crypto policy while connecting to the Customer Portal
API.
(BZ#1802026)
10.18. CONTAINERS
The podman run --pid=host does not work in a rootless mode
When running the podman run --pid=host command as a rootless user, an OCI permission error occurs:
to:
(BZ#1940854)
144
CHAPTER 11. INTERNATIONALIZATION
East Asian Languages - Japanese, Korean, Simplified Chinese, and Traditional Chinese.
European Languages - English, German, Spanish, French, Italian, Portuguese, and Russian.
The following table lists the fonts and input methods provided for various major languages.
English dejavu-sans-fonts
French dejavu-sans-fonts
German dejavu-sans-fonts
Italian dejavu-sans-fonts
Russian dejavu-sans-fonts
Spanish dejavu-sans-fonts
Portuguese dejavu-sans-fonts
Support for the Unicode 11 computing industry standard has been added.
145
Red Hat Enterprise Linux 8.4 8.4 Release Notes
A number of glibc locales have been synchronized with Unicode Common Locale Data
Repository (CLDR).
146
APPENDIX A. LIST OF TICKETS BY COMPONENT
Component Tickets
OpenIPMI BZ#1796588
SLOF BZ#1910848
accel-config BZ#1843266
apr BZ#1819607
authselect BZ#1892761
bcc BZ#1879411
bpftrace BZ#1879413
cmake BZ#1816874
cockpit BZ#1666722
corosync-qdevice BZ#1784200
corosync BZ#1870449
147
Red Hat Enterprise Linux 8.4 8.4 Release Notes
Component Tickets
crun BZ#1841438
dhcp BZ#1883999
dwarves BZ#1903566
edk2 BZ#1935497
fence-agents BZ#1775847
freeipmi BZ#1861627
freeradius BZ#1723362
gdb BZ#1853140
ghostscript BZ#1874523
gnome-shell-extensions BZ#1717947
gnome-software BZ#1668760
gnutls BZ#1628553
go-toolset BZ#1870531
grafana-container BZ#1916154
148
APPENDIX A. LIST OF TICKETS BY COMPONENT
Component Tickets
grafana BZ#1850471
grub2 BZ#1583445
ima-evm-utils BZ#1868683
iproute BZ#1849815
jmc BZ#1919283
kernel-rt BZ#1858099
kmod-redhat-oracleasm BZ#1827015
kpatch BZ#1798711
krb5 BZ#1877991
149
Red Hat Enterprise Linux 8.4 8.4 Release Notes
Component Tickets
libbpf BZ#1919345
libgnome-keyring BZ#1607766
libguestfs BZ#1554735
libmpc BZ#1835193
libpcap BZ#1743650
libpwquality BZ#1537240
libselinux-python-2.8- BZ#1666328
module
libselinux BZ#1879368
libsemanage BZ#1913224
libvpd BZ#1844429
llvm-toolset BZ#1892716
mariadb-connector-odbc BZ#1944692
mesa BZ#1886147
micropipenv BZ#1849096
mod_fcgid BZ#1876525
mod_security BZ#1824859
mutter BZ#1886034
150
APPENDIX A. LIST OF TICKETS BY COMPONENT
Component Tickets
mysql-selinux BZ#1895021
net-snmp BZ#1817190
nfs-utils BZ#1592011
nispor BZ#1848817
nmstate BZ#1674456
nss_nis BZ#1803161
opal-prd BZ#1844427
opencryptoki BZ#1847433
opencv BZ#1886310
openmpi BZ#1866402
openssl BZ#1810911
osbuild-composer BZ#1951964
p11-kit BZ#1887853
pcp-container BZ#1916155
perl-IO-String BZ#1890998
151
Red Hat Enterprise Linux 8.4 8.4 Release Notes
Component Tickets
perl-Time-HiRes BZ#1895852
popt BZ#1843787
powerpc-utils BZ#1853297
py3c BZ#1841060
pyOpenSSL BZ#1629914
pykickstart BZ#1637872
pyodbc BZ#1881490
python-PyMySQL BZ#1820628
python-blivet BZ#1656485
quota BZ#1868671
redhat-support-tool BZ#1802026
redis BZ#1862063
resource-agents BZ#1471182
rshim BZ#1744737
152
APPENDIX A. LIST OF TICKETS BY COMPONENT
Component Tickets
rust-toolset BZ#1896712
scap-workbench BZ#1877522
sendmail BZ#1868041
skopeo BZ#1940854
sos BZ#1966838
spamassassin BZ#1822388
spice BZ#1849563
stalld BZ#1875037
subscription-manager BZ#1905398
subversion BZ#1844947
sudo BZ#1786990
swig BZ#1853639
systemd BZ#1827462
systemtap BZ#1875341
tang-container BZ#1913310
153
Red Hat Enterprise Linux 8.4 8.4 Release Notes
Component Tickets
tang BZ#1828558
texlive BZ#1889802
tpm2-abrmd BZ#1855177
tuned BZ#1874052
udica BZ#1763210
unbound BZ#1850460
virtio-win BZ#1861229
wayland BZ#1673073
xdp-tools BZ#1880268
xfsprogs BZ#1949743
xorg-x11-drv-qxl BZ#1642887
xorg-x11-server BZ#1698565
154
APPENDIX A. LIST OF TICKETS BY COMPONENT
Component Tickets
155
Red Hat Enterprise Linux 8.4 8.4 Release Notes
0.0-3
Wed Jun 16 2021, Lucie Maňásková (lmanasko@redhat.com)
0.0-2
Fri Jun 04 2021, Lenka Špačková (lspackova@redhat.com)
0.0-1
Wed May 18 2021, Lucie Maňásková (lmanasko@redhat.com)
0.0-0
Wed Mar 31 2021, Lucie Maňásková (lmanasko@redhat.com)
Release of the Red Hat Enterprise Linux 8.4 Beta Release Notes.
156