SUSE Linux Enterprise Server 15 GA

Release Notes

This document provides guidance and an overview to high level general features and updates for SUSE Linux Enterprise Server 15 GA. Besides architecture or product-specific information, it also describes the capabilities and limitations of SUSE Linux Enterprise Server 15 GA.

These release notes are updated periodically. The latest version of these release notes is always available at https://www.suse.com/releasenotes. General documentation can be found at https://www.suse.com/documentation/sles-15.

Publication Date: 2018-05-18, Version: 15.0.20180518
1 About the Release Notes
2 SUSE Linux Enterprise Server
2.1 Interoperability and Hardware Support
2.2 Support and Life Cycle
2.3 What Is New?
2.4 Important Sections of This Document
2.5 Documentation and Other Information
2.6 Support Statement for SUSE Linux Enterprise Server
2.7 General Support
2.8 Technology Previews
2.9 Modules, Extensions, and Related Products
3 Installation and Upgrade
3.1 Installation
3.2 Upgrade-Related Notes
3.3 For More Information
4 Architecture Independent Information
4.1 Kernel
4.2 Kernel Modules
4.3 Security
4.4 Networking
4.5 Systems Management
4.6 Performance Related Information
4.7 Storage
4.8 Virtualization
4.9 Miscellaneous
5 AMD64/Intel 64 (x86_64) Specific Information
5.1 System and Vendor Specific Information
6 POWER (ppc64le) Specific Information
6.1 Support for POWER9 24x7 Counters Has Been Added
6.2 Support for POWER9 Radix Page Tables When Running as KVM Guest
6.3 GLIBC Support for POWER9
6.4 Optimized GLIBC for POWER9
6.5 Support for POWER9 Has Been Added to GDB
6.6 Support for POWER9 PMU Events Has Been Added to the perf Tool
6.7 GLIBC/GCC Support of Standard Math Functions for _Float128 (POWER9)
6.8 Support for POWER9 Has Been Added to PAPI
6.9 Support for POWER9 Has Been Added to LibPFM
7 IBM Z (s390x) Specific Information
7.1 Hardware
7.2 Virtualization
7.3 Storage
7.4 Network
7.5 Security
7.6 Reliability, Availability, Serviceability (RAS)
7.7 Performance
7.8 Miscellaneous
8 ARM 64-Bit (AArch64) Specific Information
8.1 Cavium ThunderX2 CRB Firmware Requirements
9 Packages and Functionality Changes
9.1 New Packages
9.2 Updated Packages
9.3 Removed Packages and Features
9.4 Deprecated Packages and Features
9.5 Changes in Packaging and Delivery
9.6 Modules
10 Technical Information
10.1 Supported Host Operating Systems and Hypervisors
10.2 Kernel Limits
10.3 KVM Limits
10.4 Xen Limits
10.5 File Systems
10.6 Supported Java Versions
11 Obtaining Source Code
12 Legal Notices

1 About the Release Notes

These Release Notes are identical across all architectures, and the most recent version is always available online at https://www.suse.com/releasenotes.

Entries can be listed twice, if they are important and belong to more than one section.

Release notes usually only list changes that happened between two subsequent releases. Certain important entries from the release notes documents of previous product versions are repeated. To make these entries easier to identify, they contain a note to that effect.

However, repeated entries are provided as a courtesy only. Therefore, if you are skipping one or more service packs, check the release notes of the skipped service packs as well. If you are only reading the release notes of the current release, you could miss important changes.

2 SUSE Linux Enterprise Server

SUSE Linux Enterprise Server is a highly reliable, scalable, and secure server operating system, built to power mission-critical workloads in both physical and virtual environments. It is an affordable, interoperable, and manageable open source foundation. With it, enterprises can cost-effectively deliver core business services, enable secure networks, and simplify the management of their heterogeneous IT infrastructure, maximizing efficiency and value.

The only enterprise Linux recommended by Microsoft and SAP, SUSE Linux Enterprise Server is optimized to deliver high-performance mission-critical services, edge of network, and Web infrastructure workloads.

2.1 Interoperability and Hardware Support

Designed for interoperability, SUSE Linux Enterprise Server integrates into classical Unix and Windows environments, supports open standard interfaces for systems management, and has been certified for IPv6 compatibility.

This modular, general purpose operating system runs on four processor architectures and is available with optional extensions that provide advanced capabilities for tasks such as real time computing and high availability clustering.

SUSE Linux Enterprise Server is optimized to run as a high performing guest on leading hypervisors and supports an unlimited number of virtual machines per physical system with a single subscription. This makes it the perfect guest operating system for virtual computing.

2.2 Support and Life Cycle

SUSE Linux Enterprise Server is backed by award-winning support from SUSE, an established technology leader with a proven history of delivering enterprise-quality support services.

SUSE Linux Enterprise Server 15 has a 13-year life cycle, with 10 years of General Support and 3 years of Extended Support. The current version (GA) will be fully maintained and supported until 6 months after the release of SUSE Linux Enterprise Server 15 SP1.

If you need additional time to design, validate and test your upgrade plans, Long Term Service Pack Support can extend the support duration. You can buy an additional 12 to 36 months in twelve month increments. This means, you receive a total of 3 to 5 years of support per Service Pack.

For more information, check our Support Policy page https://www.suse.com/support/policy.html or the Long Term Service Pack Support Page https://www.suse.com/support/programs/long-term-service-pack-support.html.

2.3 What Is New?

SUSE Linux Enterprise Server 15 introduces many innovative changes compared to SUSE Linux Enterprise Server 12.

Changes to the installation and the module system:

  • Unified installer: All SUSE Linux Enterprise 15 products can be installed by the same unified installer media. For information about available modules, see Section 2.9.1, “Modules in the SLE 15 GA Product Line” .

  • Installation without network using Packages media: To install without network connection, all necessary packages are available on the Packages media. This media consists of directories with module repositories which need to be added manually as needed. RMT (Repository Mirroring Tool) and SUSE Manager provide additional options for disconnected or managed installation.

  • Migration from openSUSE Leap to SUSE Linux Enterprise Server: Starting with SUSE Linux Enterprise 15 GA, we support migrating from openSUSE Leap 15 to SUSE Linux Enterprise Server 15. Thus, even if you decide to start out with the free community distribution you can later easily upgrade to a distribution with enterprise-class support.

  • Extended package search: Use the new Zypper command zypper search-packages to search across all SUSE repositories available for your product even if they are not yet enabled. This functionality makes it easier for administrators and system architects to find the software packages needed. To do so, it leverages the SCC.

  • Software Development Kit: With SUSE Linux Enterprise 15, the Software Development Kit is now integrated into the products. Development packages are packaged alongside regular packages. In addition, the Development Tools module contains the tools for development.

  • RMT replaces SMT: SMT (Subscription Management Tool) has been removed. Instead, RMT (Repository Mirroring Tool) now allows mirroring SUSE repositories and custom repositories. You can then register systems directly with RMT. In environments with tightened security, RMT can also proxy other RMT servers. For more information, see Section 3.2.1, “SMT Has Been Replaced by RMT” .

Major updates to the software selection:

  • Salt: SUSE Linux Enterprise 15 can be managed via salt to help integration into up-to-date management solutions, such as SUSE Manager.

  • Python 3: As the first enterprise distribution, SUSE Linux Enterprise 15 GA offers full support for Python 3 development in addition to Python 2.

  • Directory Server: 386 Directory Server replaces OpenLDAP to provide a sustainable directory service.

2.4 Important Sections of This Document

If you are upgrading from a previous SUSE Linux Enterprise Server release, you should review at least the following sections:

2.5 Documentation and Other Information

2.5.1 Available on the Product Media

  • Read the READMEs on the media.

  • Get the detailed change log information about a particular package from the RPM (where <FILENAME>.rpm is the name of the RPM):

    rpm --changelog -qp <FILENAME>.rpm
  • Check the ChangeLog file in the top level of the media for a chronological log of all changes made to the updated packages.

  • Find more information in the docu directory of the media of SUSE Linux Enterprise Server 15 GA.

2.5.2 Externally Provided Documentation

2.6 Support Statement for SUSE Linux Enterprise Server

To receive support, you need an appropriate subscription with SUSE. For more information, see https://www.suse.com/support/programs/subscriptions/?id=SUSE_Linux_Enterprise_Server.

The following definitions apply:

L1

Problem determination, which means technical support designed to provide compatibility information, usage support, ongoing maintenance, information gathering and basic troubleshooting using available documentation.

L2

Problem isolation, which means technical support designed to analyze data, reproduce customer problems, isolate problem area and provide a resolution for problems not resolved by Level 1 or prepare for Level 3.

L3

Problem resolution, which means technical support designed to resolve problems by engaging engineering to resolve product defects which have been identified by Level 2 Support.

For contracted customers and partners, SUSE Linux Enterprise Server 15 GA and its Modules are delivered with L3 support for all packages, except the following:

SUSE will only support the usage of original (that is, unchanged and un-recompiled) packages.

2.7 General Support

To learn about supported kernel, virtualization, and file system features, as well as supported Java versions, see Section 10, “Technical Information”.

2.7.1 Reflink Feature of XFS Is Not Supported

XFS reflink support is currently considered experimental in current upstream Linux and is also not supported in SUSE Linux Enterprise.

2.8 Technology Previews

Technology previews are packages, stacks, or features delivered by SUSE which are not supported. They may be functionally incomplete, unstable or in other ways not suitable for production use. They are included for your convenience and give you a chance to test new technologies within an enterprise environment.

Whether a technology preview becomes a fully supported technology later depends on customer and market feedback. Technology previews can be dropped at any time and SUSE does not commit to providing a supported version of such technologies in the future.

Give your SUSE representative feedback, including your experience and use case.

2.8.1 Technology Previews for All Architectures

2.8.1.1 KVM Nested Virtualization

KVM Nested Virtualization is available in SLE 15 as a technology preview. For more information about nested virtualization, see https://github.com/torvalds/linux/blob/master/Documentation/virtual/kvm/nested-vmx.txt.

2.8.2 Technology Previews for AMD64/Intel 64 64-Bit (x86_64)

2.8.2.1 Support for AMD Secure Encrypted Virtualization

As a technology preview, SLE 15 now support AMD Secure Encrypted Virtualization (SEV). SEV integrates main memory encryption capabilities (SME) with the existing AMD-V virtualization architecture to support encrypted virtual machines. Encrypting virtual machines helps protect them from physical threats and other virtual machines or even the hypervisor itself. SEV represents a new approach to security that is particularly suited to cloud computing where virtual machines need not fully trust the hypervisor and administrator of their host system. As with SME, no application software modifications are required to support SEV.

2.8.3 Technology Previews for IBM Z (s390x)

2.8.3.1 Exploitation of Shared Memory Communications

As a technology preview, the kernel of SLE 15 enables Shared Memory Communications over RDMA (SMC-R) enabled. SMC-R allows RDMA network interface controllers (RNICs) to offer RDMA over Converged Ethernet (RoCE).

2.8.3.2 Support for dm-crypt with Protected Keys

As a technology preview in SLE 15, you can now use protected keys to encrypt partitions for effective end-to-end encryption.

2.9 Modules, Extensions, and Related Products

This section comprises information about modules and extensions for SUSE Linux Enterprise Server 15 GA. Modules and extensions add parts or functionality to the system.

2.9.1 Modules in the SLE 15 GA Product Line

The SLE 15 GA product line is made up of modules that contain software packages. Each module has a clearly defined scope. Different modules can have a different life cycles and update timelines.

The following modules are available within the product line based on SUSE Linux Enterprise 15 GA at the release of SUSE Linux Enterprise Server 15 GA. However, not all modules are available with a subscription for SUSE Linux Enterprise Server 15 GA itself (see the column available with).

Name and Content

Dependencies on Other Modules

Available with

Support1

Base System

SLE base system

None

SLES, SLES for SAP, SLED, SLE RT, SLE HPC (default on all)

life cycle: 10 years

additional: 3 years of LTSS

support level: L3

Containers

Docker, tools, prepackaged images

Base System

SLES, SLES for SAP, SLE HPC

life cycle: 10 years

additional: no

support level: L3

Desktop Applications

Basic desktop functionality

Base System

SLED (default), SLE-WE (default), SLES, SLES for SAP, SLED, SLE RT, SLE HPC

life cycle: 10 years

additional: no

support level: L3

Workstation Extension

Office tools and multimedia

Base System, Desktop Applications

SLED, SLE-WE

life cycle: 10 years

additional: no

support level: mixed L2/L3 (depending on package)

Development Tools

Helps in developing applications, replaces the SLE SDK

Base System, Desktop Applications

SLES, SLES for SAP, SLED, SLE RT, SLE HPC

life cycle: 10 years

additional: 3 years of LTSS

support level: L3

High Availability

HA tools such as Hawk, crm, Pacemaker, Corosync

Base System

SLE HA (default)

life cycle: 10 years

additional: 3 years of LTSS

support level: L3

High Performance Computing

Tools and libraries related to High Performance Computing (HPC)

Base System

SLE HPC

life cycle: 10 years

additional: 3 years of LTSS, 12 months of ESPOS

support level: L3

Legacy

Packages for migration purposes with limited support timeframe

Base System

Public Cloud

Public cloud initialization code and tools

Base System

SLES, SLES for SAP, SLE HPC

support level: L3

SAP Applications

Packages specific to SLES for SAP

Base System

SLES for SAP (default)

life cycle: 10 years

additional: 3 years of LTSS, 12 months of ESPOS

support level: L3

Server Applications

Web server, NVDIMM support, OFED

Base System

SLES, SLES for SAP, SLE RT, SLE HPC

life cycle: 10 years

additional: 3 years of LTSS

support level: L3

1 ESPOS: Extended Service Pack Overlay Support, LTSS: Long-Term Service Pack Support

2.9.2 Available Extensions

Extensions add extra functionality to the system and require their own registration key, usually at additional cost. Usually, extensions have their own release notes documents that are available from https://www.suse.com/releasenotes.

The following extensions are available for SUSE Linux Enterprise Server 15 GA:

Additionally, there is the following extension which is not covered by SUSE support agreements, available at no additional cost and without an extra registration key:

2.9.3 Derived and Related Products

This sections lists derived and related products. Usually, these products have their own release notes documents that are available from https://www.suse.com/releasenotes.

3 Installation and Upgrade

SUSE Linux Enterprise Server can be deployed in several ways:

  • Physical machine

  • Virtual host

  • Virtual machine

  • System containers

  • Application containers

3.1 Installation

This section includes information related to the initial installation of SUSE Linux Enterprise Server 15 GA.

Important
Important: Installation Documentation

The following release notes contain additional notes regarding the installation of SUSE Linux Enterprise Server. However, they do not document the installation procedure itself.

For installation documentation, see Deployment Guide at https://www.suse.com/documentation/sles-15/singlehtml/book_sle_deployment/book_sle_deployment.html.

3.1.1 Remote Installation via VNC

The installation can be done remotely using VNC, and there are two options for the client software: A native VNC viewer or a Web browser viewer. For the Web browser viewer we replaced a Java-applet based implementation with an implementation using JavaScript/WebSocket, as Java is no longer supported in mainstream browsers. Unfortunately, that has resulted in the loss of an encryption layer for the Web browser viewer.

The VNC connection on port 5801 is unencrypted. The connection on port 5901 continues to be encrypted.

3.1.2 Parted Supports Linux-Specific GPT GUID for Partitions

When Parted 3.1, the version shipped with earlier versions of SLE, was released, there was no Linux-specific GPT GUID. Therefore, it used the Microsoft Basic Data partition type for all new partitions.

With SLE 15, Parted 3.2 is shipped. This version uses the new Linux GPT GUID by default. If an old Linux GPT partition that uses the Microsoft Basic Data type is found, Parted will set the flag msftdata on it.

In partition editors and other GPT-enabled disk tools, such partitions may be mislabeled as Windows Data Partitions or similar. This affects the YaST Expert Partitioner, as well as fdisk, gdisk, etc.

The partition can be converted and the flag be cleared like this:

parted [DEVICE] set [PARTITION_NUMBER] msftdata off

3.1.3 Handling of Extension Repositories in AutoYaST

Starting with SLE 15, AutoYaST handles extension repositories in a more user-friendly way:

  • AutoYaST automatically reorders extension repositories according to their dependent repositories during registration. That means the order of extensions in the AutoYaST profile is not important anymore.

  • If dependent extensions are missing from the AutoYaST profile, AutoYaST will automatically register them. However, this only works for extensions that do not require a registration key. Extensions that require a registration key must be listed in the AutoYaST profile, including the registration key.

3.1.4 AutoYaST Configuration Is Done After Reboot

A regular YaST-based installation of SLES 15 is performed in a single stage. However, the AutoYaST installation process is divided into two stages. After the installation of the basic system, the system boots into the second stage during which the system is configured.

Make sure that the packages autoyast2 and autoyast2-installation are installed by the first stage, so the second stage can be executed correctly.

Otherwise, an error will be shown before booting into the installed system.

3.1.5 SuSEFirewall2 Has Been Replaced by firewalld

SuSEFirewall2 has been removed from SLES 15.

SLE 15 introduces firewalld as the new software firewall. This also incurs changes to installation and system management with YaST and AutoYaST.

YaST

firewalld already provides a command-line interface (firewall-cmd) and a new graphical interface (firewall-config) for configuration. Therefore, the YaST command-line interface and the GUI for SuSEFirewall2 have largely been removed. However, YaST continues to provide a common interface for opening ports for different services.

AutoYaST

AutoYaST profiles based on SuSEFirewall2 do not fit with the firewalld configuration. This meant that a new AutoYaST schema for configuring firewalld was needed. However, you can still use SuSEFirewall2-based profiles but are limited in terms of supported properties. This configuration will then be translated to firewalld rules. However, we recommend using the new schema and also checking the configuration when the system is installed.

For more information about configuring firewalld in AutoYaST, see AutoYaST Guide, Firewall Configuration (a draft version of the guide is provided at https://www.suse.com/documentation/sles-15/singlehtml/book_autoyast/book_autoyast.html#CreateProfile.firewall).

3.2 Upgrade-Related Notes

This section includes upgrade-related information for SUSE Linux Enterprise Server 15 GA.

Important
Important: Upgrade Documentation

The following release notes contain additional notes regarding the upgrade of SUSE Linux Enterprise Server. However, they do not document the upgrade procedure itself.

For upgrade documentation, see https://www.suse.com/documentation/sles-15/singlehtml/book_sle_upgrade/.

3.2.1 SMT Has Been Replaced by RMT

SLE 12 is the last codestream that SMT (Subscription Management Tool) is available for.

When upgrading your OS installation to SLE 15, we recommend also upgrading from SMT to its replacement RMT (Repository Mirroring Tool). RMT provides the following functionality:

  • Mirroring of SUSE-originated repositories for the SLE 12-based and SLE 15-based products your organization has valid subscriptions for.

  • Synchronization of subscriptions from SUSE Customer Center using your organization's mirroring credentials. (These credentials can be found in SCC under Select Organization, Organization, Organization Credentials)

  • Selecting repositories to be mirrored locally via rmt-cli tool.

  • Registering systems directly to RMT to get required updates.

  • Adding custom repositories from external sources and distributing them via RMT to target systems.

  • Improved security with proxying: If you have strict security requirements, an RMT instance with direct Internet access can proxy to another RMT instance without direct Internet access

  • Nginx as Web server: The default Web server of RMT is Nginx which has a smaller memory footprint and comparable performance than that used for SMT.

Note that unlike SMT, RMT does not support installations of SLE 11 and earlier.

For more information about RMT, also see the new RMT Guide at https://www.suse.com/documentation/sles-15.

3.2.2 /etc/SuSE-release Has Been Removed

With SLE 15, the file /etc/SuSE-release has been removed. Previously, this file contained information on the version of SUSE Linux Enterprise that you were using.

Version information can now be found in /etc/os-release. The advantages of /etc/os-release are:

  • The the file exists across all major Linux distributions

  • its format is well-specified and easily parseable

  • it can be sourced by a shell script

For more information, see the man page of os-release: man 5 os-release in the installed system or online at https://www.freedesktop.org/software/systemd/man/os-release.html.

3.2.3 qemu-kvm Wrapper Not Installed by Default

By default, the qemu-kvm wrapper binary is no longer installed on SLE 15. This change is transparent in new installations. However, in pre-SLE 15 environments, there may be VM configurations which use the legacy qemu-kvm wrapper. Migrating such a VM to a SLE 15 host will fail because the legacy wrapper qemu-kvm is not available.

Instead of using qemu-kvm, use QEMU by directly starting the qemu-system-ARCH binary.

To resolve the issue during migration:

  • Change the VM configuration on the original host to use the qemu-system-ARCH emulator directly (preferred).

  • Manually install the package qemu-kvm on the destination SLE 15 host.

3.2.4 cryptconfig Has Been Removed

Previous versions of SLE supported encrypting home directories individually via cryptconfig. This feature and the cryptconfig package have been removed in SLE 15.

To encrypt user data on SLE 15, encrypt the whole partition or volume which contains the home directories.

Important
Important: Decrypt Before Upgrading

Before performing an upgrade from SLE 12, encrypted home directory images need to be decrypted. Otherwise, users will not have access to them after the upgrade.

3.2.5 Migrating Systems with BIOS RAID from SLES 11 to SLES 15

Systems with BIOS RAID handled via device mapper (DM-RAID) cannot be upgraded from SLES 11 to SLES 15 directly.

BIOS RAID, as provided by some chipsets or additional cards, is managed by the Linux kernel with either Device Mapper or via MD-RAID arrays. In SLES11, DM-RAID was used for some systems which is not supported in SLES 15 anymore. We recommend reinstalling these systems from scratch. Alternatively upgrade to SLES 12 first and then to SLES 15.

3.2.6 Manually Selecting Repositories When Upgrading from SLES 12 to SLES 15

When upgrading a system which is registered against SCC, the registration server drives the selection of modules and repositories to be used during upgrade. This works well in most cases. However, there are scenarios in which modules or extensions are not selected as desired. For example, this can be the case when third-party software is installed and needs to be upgraded.

To allow manual selection of repositories, when booting the upgrade ISO, add media_upgrade=1 to the kernel command line. This will make YaST skip the communication with SCC and you will have full control over the selection of repositories.

After the upgrade the system needs to be registered again, to update the registration data in SCC and to get access to the update channels for SUSE Linux Enterprise 15.

Notes for the standard migration (via SCC):

At the beginning of the upgrade YaST registers the system to SLE15. If the upgrade is aborted then YaST automatically rolls back the registration back to the SLE12 state. However, if the upgrade is aborted unexpectedly (e.g. a power failure, hard reset) then the registration state is not rolled back. In that case you might need to run the rollback manually after booting the original system using command " SUSEConnect --rollback ".

3.2.7 System-wide Locale/Keymap/Font Settings are not read from /etc/sysconfig/ anymore

Previously, there were different places for configuring a given setting.

For example, to set the system-wide locale, you could either:

  • write the settings in /etc/locale.conf

  • use localectl

  • write ROOT_USES_LANG in /etc/sysconfig/language if LANG was not already configured in /etc/locale.conf.

This could be confusing, especially since settings in /etc/sysconfig/language usually override the locale settings used by users's shells only and therefore should not influence the system-wide locale.

Similar situations and similar problems could also be seen for the keymap/font settings:

  • The keyboard layout could be configured in both /etc/vconsole.conf and /etc/sysconfig/keyboard, the former having a higher priority.

  • the font used by virtual consoles could be read from both /etc/vconsole.conf and /etc/sysconfig/console.conf, the former having a higher priority.

With SLE 15, systemd does not read certain settings from the following files anymore:

  • /etc/sysconfig/language for the system-wide locale settings (ROOT_USES_LANG)

  • /etc/sysconfig/keyboard for the keyboard layout used by the virtual consoles (CONSOLE_FONT, CONSOLE_SCREENMAP, CONSOLE_UNICODEMAP)

  • /etc/sysconfig/console for the font used by the virtual consoles (KEYTABLE)

All variables defined in /etc/sysconfig/language will still be used to override the system-wide locale and to define a different locale settings for users's shells as it is currently described in the official documentation.

To keep backward compatibility with the old systems, during the update of the systemd package, all variables mentioned will be migrated from sysconfig to their final destinations if they are not already defined there.

Replacement settings:

Locale:

  • The system-wide locale can be changed via localectl(1) or YaST.

  • The settings are stored in /etc/locale.conf, see man 5 locale.conf.

Virtual Consoles: The settings can instead be written directly in /etc/vconsole.conf. Also see man 5 vconsole.conf.

Keyboard:

  • The system-wide locale can be changed via localect(1).

  • The settings are stored in /etc/vconsole.conf, see man vconsole.conf(5).

3.3 For More Information

For more information, see Section 4, “Architecture Independent Information” and the sections relating to your respective hardware architecture.

4 Architecture Independent Information

Information in this section pertains to all architectures supported by SUSE Linux Enterprise Server 15 GA.

4.1 Kernel

4.1.1 Device Error Prevention Enabled (CONFIG_IO_STRICT_DEVMEM)

With SLE 15, the kernel build option CONFIG_IO_STRICT_DEVMEM has been enabled to prevent device errors. This option disables tampering with device state while a kernel driver is using the device.

Unfortunately, some vendor tools currently use such functionality. If you depend on such a tool, make sure to set the kernel boot parameter iomem=relaxed. Among others, this affects several firmware flash tools for POWER9 machines.

4.1.2 Intel Resource Director Technology Interface Update and Skylake Errata

Due to CPU defects identified in the Intel Skylake platform, most of the Resource Director Technology features are switched off by default on Skylake. Additionally, the mainline kernel is adopting a new interface for the resource management functions.

The features can be re-enabled using the kernel parameter rdt. For information on its usage, see /usr/src/linux/Documentation/admin-guide/kernel-parameters.txt. The old perf-based interface has been deprecated in favor of the new resctrl file system.

4.1.3 Kernel Address Space Randomization (KASLR) Enabled by Default

Kernel Address Space Randomization is one of several kernel hardening techniques that raise a practical hurdle for exploiting memory corruption vulnerabilities. Starting with SLE 15, this feature is enabled in the kernel by default. The feature can be switched off by specifying nokaslr option on kernel command line.

4.1.4 Support for Scalable Machine Check Architecture (Scalable MCA)

Scalable MCA improves hardware error reporting to better diagnose issues in AMD Zen processors. It provides a clearer, easier to use rules for the kinds of information supplied by the hardware when reporting errors.

This clearer separation of architectural and implementation-specific functions allows operating systems to better take advantage of architectural features.

In addition, it expands information logged in MCA banks to allow for improved error handling, better diagnosability, and future scalability.

4.1.5 Support for AMD Memory Encryption

To provide protection against physical attacks on a system, AMD SME can provide full or partial memory encryption depending on the use case, on AMD family 17h CPU processors. Full memory encryption means all DRAM contents are encrypted using random keys. This provides strong protection against cold boot, DRAM interface snooping and similar types of attacks. This technology is especially prominent for systems equipped with NVDIMMs whose contents remain intact after powering down the system.

Memory encryption support is present in SLE 15 kernels but not enabled by default. To enable it on compatible hardware (AMD family 17h CPU, with proper BIOS/UEFI support), supply the boot option mem_encrypt=on.

4.2 Kernel Modules

An important requirement for every enterprise operating system is the level of support available for specific environments. Kernel modules are the most relevant connector between hardware (controllers) and the operating system.

For more information about the handling of kernel modules, see the SUSE Linux Enterprise Administration Guide.

4.2.1 IPVS Has Been Moved From the HA Extension to the Base OS

IPVS (IP Virtual Server) implements transport-layer load balancing (Layer 4 LAN switching) in the Linux kernel. In SLES 12 and prior versions, IPVS was shipped only with the SUSE Linux Enterprise High Availability extension. However, IPVS is increasingly used outside the HA context, for example by Docker.

With SLES 15, IPVS has been moved into the base system. Other HA-related functionality that relies on IPVS remains part of the HA extension.

4.3 Security

4.3.1 systemctl stop apparmor Does Not Work

In the past, there could be confusion over the difference between how the very similarly named systemctl subcommands reload and restart worked for AppArmor:

  • systemctl reload apparmor properly reloaded all AppArmor profiles. (It was and continues to be the recommended way of reloading AppArmor profiles.)

  • systemctl restart apparmor meant that AppArmor would stop, thereby unloading all AppArmor profiles and then restart which left all existing processes unconfined. Only newly started processes would then be confined again.

Unfortunately, systemd does not provide a solution within its unit file format for the issue posed by the restart scenario.

Starting with AppArmor 2.12, the command systemctl stop apparmor will not work. As a consequence, systemctl restart apparmor will now correctly reload AppArmor profiles.

To unload all AppArmor profiles, use the new command aa-teardown instead which matches the previous behavior of systemctl stop apparmor.

For more information, see https://bugzilla.opensuse.org/show_bug.cgi?id=996520 and https://bugzilla.opensuse.org/show_bug.cgi?id=853019.

4.3.2 New AppArmor Features to Restrict Processes

To properly protect processes, they must be safeguarded from not only from files and network connections, but also from other process. For example, processes can be arbitrarily terminated by signals from other processes.

The version of AppArmor shipped with SLE 15 includes new features to further safeguard and restrict your processes. These features include:

  • mount

  • pivot_root

  • ptrace

  • signal

4.3.3 GnuPG Uses SHA-2 Family of Digests by Default

Research was published that showed weakesses in the SHA-1 family of hashes for some applications. The use of stronger digests is advised for most applications.

The default behavior for GnuPG (gpg2) has been changed to use SHA-2 family digests for key certificates, default preferences stored in keys, and signature generation in the absense of a configuration file. GnuPG no longer generates a new configuration when called in an empty home. Existing GnuPG configurations are not altered. GnuPG continues to support SHA-1 digest generation and verification as mandated by OpenPGP standards.

4.3.4 All SLE 15 Packages Are Enabled for Address Space Layout Randomization

Security consists of layers of defense. One of those layers of defense is randomizing address for programs, so offsets and functions and similar are at randomized addresses on every start.

All SUSE Linux Enterprise 15 binaries are built with support for PIE (Position-Independent Executables) which will randomize all code layout in memory on every startup of the binary.

4.3.5 firewalld Replaces SuSEfirewall2 as Default Software Firewall

SuSEfirewall2 was originally tailored towards running a router with forwarding and/or NAT rules. This use case is rarely required anymore. Furthermore, the static nature of SuSEfirewall2 made it difficult to react to today's dynamic networking events like hotplugged network interfaces or virtual networking.

To allow greater flexibility in SLE 15, the default firewall has been switched to the firewalld upstream solution. It provides a resident daemon process which can dynamically adjust firewall rules on behalf of the user or other programs. SuSEfirewall2 is no longer available.

There is no automatic migration from SuSEfirewall2 to firewalld. To migrate an existing SuSEfirewall2 configuration to firewalld, you can use the script from the package susefirewall2-to-firewalld. However, after running the script, you still need to manually adjust and verify the resulting firewalld rules.

More technical information about firewalld could be found in the Security Guide at https://www.suse.com/documentation/sles-15/singlehtml/book_security/book_security.html#sec.security.firewall.firewalld.

4.4 Networking

4.4.1 Wicked: Use rfc4361 dhcp4 client-id on Ethernet

RFC 4361 updates the client-id defined in RFC 2132, section 9.14 to be compatible with DHCP 6 client-id (duid).

The use of an RFC 4361 is mandatory on Infiniband (RFC 4390) and is also required to perform DNS record updates in the same zone for DHCP 4 and DHCP 6 addresses also on Ethernet.

In SLE 15:

  • ISC DHCP 4.3.x server supports the new RFC 4361 (required for DNS update)

  • wicked provides an option to send such a client-id and to automatically use a DHCP 6-based client-id in DHCP 4 (used on Infiniband).

To send the client-id during the installation, use linuxrc (also see https://en.opensuse.org/SDB:Linuxrc) with the following ifcfg:

ifcfg=eth0=dhcp,DHCLIENT_CLIENT_ID=01:03:52:54:00:02:c2:67,DHCLIENT6_CLIENT_ID=00:03:52:54:00:02:c2:67

For mmore information, see the documentation for the options dhcp4 "create-cid", dhcp6 "default-duid" in man 5 wicked-config, in wicked duid --help and wicked iaid --help.

The traditionally used RFC 2132 DHCP 4 client-id on ethernet is constructed from the hardware type (01 for Ethernet) and followed by the hardware address (the MAC address), for example:

01:52:54:00:02:c2:67

The RFC 4361 client-id starts with 0xff (instead of the hardware type), followed by the DHCP 6 IAID (the interface-address association ID that describes the interface on the machine), followed by the DHCP 6 DUID (client-id which identifies the machine).

Using the above hardware type-based and hardware address-based DUID (llt type used by default), the new RFC 4361 DHCP 4 client-id would be:

  • Using the last bytes of the MAC address as the IAID: ff:00:02:c2:67:00:01:xx:xx:xx:xx:52:54:00:02:c2:67

  • When the IAID is a simple incremented number: ff:00:00:00:01:00:01:xx:xx:xx:xx:52:54:00:02:c2:67

The xx:xx:xx:xx in the duid-llt is a creation timestamp. A duid-ll (00:03:00:01:$MAC) does not have a timestamp.

4.4.2 Open vSwitch Has Been Updated to Version 2.8

Open vSwitch has been updated to version 2.8. Major changes are:

  • ovs-ofctlt can now accept and display port names in place of numbers. By default it always accepts names and in interactive use it displays them; use --names or --no-names to override. For more information, see ovs-ofctl(8) for details.

  • ovs-ofctl dump-flows now accepts --no-stats to omit flow statistics.

  • New ovs-dpctl command ct-stats-show to show connection tracking stats.

  • DPDK log messages are redirected to the OVS logging subsystem. The log level can be changed by using ovs-appctl vlog commands for the >dpdk module (as for other modules). The lower bound can still be configured via extra arguments for DPDK EAL.

  • dpdkvhostuser ports are marked as deprecated. They will be removed in an upcoming release.

  • Support for DPDK v17.05.1.

  • New support for multiple VLANs (802.1ad or "QinQ"), including a new dot1q-tunnel port VLAN mode.

  • Added NAT support for user-space data path.

  • Added FTP and TFTP support with NAT for user-space data path.

  • Experimental NSH (Network Service Header) support in user-space data path.

  • Tracing with ofproto/trace now traces through recirculation.

  • New support for role-based access control

  • New commands stp/show and rstp/show

  • All features required by OpenFlow 1.4 are now implemented, so ovs-vswitchd now enables OpenFlow 1.4 by default (in addition to OpenFlow 1.0 to 1.3).

  • Better support for OpenFlow 1.6 (draft).

  • The learn action now supports a limit option

  • OpenFlow 1.5 packet-out is now supported.

  • Support for OpenFlow 1.5 field packet_type and packet-type-aware pipeline (PTAP).

  • Added generic encapsulation and decapsulation actions (EXT-382). First supported use case is encapsulation/decapsulation for Ethernet.

  • Added NSH (Network Service Header) support in userspace Used generic encap and decap actions to implement encapsulation and decapsulation of NSH header. For more infoprovider, see the IETF NSH draft at https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/.

  • ovs-vswitchd and ovsdb-server run as non-root users by default.

  • Add --cleanup option to command ovs-appctl exit

  • Use new tunnel port option packet_type to configure L2 vs. L3.

  • In conjunction with PTAP tunnel ports can handle a mix of L2 and L3 payload.

  • New vxlan tunnel extension gpe to support VXLAN-GPE tunnels.

  • New support for non-Ethernet (L3) payloads in GRE and VXLAN-GPE.

  • Added experimental support for hardware offloading.

  • Hardware offloading is disabled by default.

  • Hardware offloading is done through the TC interface.

  • The next major version of OVS will introduce a change in the Conntrack API. Conntrack state is only available to the processing path that follows the recirc_table argument of the ct() action. Starting in OVS 2.9, this state will be cleared for the current processing path whenever ct() is called.

4.4.3 Intel* Omni-Path Architecture (OPA) Host Software

Intel Omni-Path Architecture (OPA) host software is fully supported in SUSE Linux Enterprise Server 15. Intel OPA provides Host Fabric Interface (HFI) hardware with initialization and setup for high performance data transfers (high bandwidth, high message rate, low latency) between compute and I/O nodes in a clustered environment.

For more information, see the Intel Omni-Path Architecture documentation at https://www.intel.com/content/dam/support/us/en/documents/network-and-i-o/fabricproducts/Intel_OP_Software_SLES_15_RN_J98644.pdf.

4.4.4 Support for the IDNA2008 Standard for Internationalized Domain Names

The original method for implementing Internationalized Domain Names was IDNA2003. This has been replaced by the IDNA2008 standard, the use of which is mandatory for some top-level domains.

The network utilities wget and curl have been updated to support IDNA2008 through the use of libidn2. This update also affects consumers of the libcurl library.

4.5 Systems Management

4.5.1 Searching Packages Across All SLE Modules

To search for packages both within and outside of currently enabled SLE modules, use the following command:

zypper search-packages -d SEARCH_TERM

This command contacts the SCC and searches all modules for matching packages.

4.5.2 SDT Markers in Select Applications and Libraries

SDT markers are static tracepoints included in the source code that expose certain information deemed useful by the application/library developers for various purposes including debugging and performance monitoring. Tools such as perf, systemtap and bcc can be used to record data provided at these tracepoints, and for subsequent processing.

In SLES 15, certain userspace applications and libraries (for example, glibc) are built with SDT markers enabled. This enhances the serviceability tooling.

4.5.3 Better AutoYaST Device Resize Handling

In SLE 12 and earlier, AutoYaST only supported resizing partitions but not logical volumes. Moreover, specifying the new size was quite limited, as values like max or auto were not allowed. Additionally, when using a percentage as the value of a resizing operation, the percentage was assumed to refer to the previous size of the partition. This was different from creating a partition where percentages refer to device size.

AutoYaST now supports resizing both partitions and logical volumes. Additionally, the size element will behave the same way, no matter whether a partition or logical volume is being created or resized: Percentages always refer to size of the whole device.

4.5.4 Zypper Return Code for Non-Fatal Failures

Similarly to other commands, Zypper signifies success exits with a return code of 0 and signifies failures with an error-specific non-zero return code. Prior to SLE 15 GA, Zypper would return 0 for some non-fatal failures. For example, this happened when a package was installed but there were issues with a post-installation script.

In cases of such non-fatal failures, Zypper now returns exit code 100 or higher. The list of exit codes is available in the man page (man zypper).

4.5.5 New SAP Applications Module

The SAP Applications module contains specialized tools for SAP Applications administration. The module is maintained and supported through the SUSE Linux Enterprise Server for SAP Applications product subscription. It can be installed using the on-line repository or from the installer media.

Important
Important

The default installation workflow of the SUSE Linux Enterprise Server for SAP base product depends on a graphical environment. If you decide to proceed with the "SLES for SAP" system role without installing the Desktop Applications Module, the message "Failed to select default product pattern gnome_basic. Pattern has not been found." will appear.

4.5.6 389 Directory Server Is Now the Primary LDAP Server

389 Directory Server is a full-featured LDAPv3-compliant server. It is the fit for modern environments and supports very large LDAP deployments.

The 389 Directory Server was included and set as the primary LDAP server on SLE 15. The YaST modules provided by the package yast2-auth-server were updated to ease the deployment and Kerberos integration of the new 389-ds.

The OpenLDAP server is still available on the Legacy Module for migration purposes, but it will not be maintained for the entire SLE 15 lifecycle.

4.5.7 Support for UEFI HTTPS Boot

SLE 15 now supports the use of UEFI HTTP protocol for network booting in IPv4 or IPv6 environment. This uses a new extension to the DHCP options for URI-based identification for Network Boot Program (NBP), you can specify it with the https:// scheme to boot remotely from an HTTPS server.

The authentication is done one-way. That means that the server authenticates an unauthenticated client. The server CA certificate needs to be enrolled in the client-side firmware to enable the HTTPS Boot feature. Securely encrypted connections can only be established with authenticated server using its enrolled certificate.

4.5.8 Refactored YaST iSCSI LIO server

lio-utils, the former back-end of the YaST module iSCSI LIO Server was incompatible with current kernel modules and configFS interfaces. It was also based on Python 2 which has been removed in SLE 15. In addition, SUSEfirewall2 has been replaced by firewalld in SLE 15.

The SLE 15 version of the YaST module iSCSI LIO Server has been completely refactored. The following changes were made:

  • lio-utils has been replaced with targetcli-fb now.

  • SUSEfirewall2-related settings have been replaced by firewalld settings.

  • The Edit button for LUNs has been removed in both Add iSCSI target and Edit iSCSI target page, because users should not edit a LUN configuration: If, for example, a LUN path is changed, that will lead a mismatch situation and errors on the initiator side

  • In Modify Initiator's ACLs page, the Copy button has been removed, to avoid accidental leaking ACLs.

4.5.9 Support for Floppy Disks Has Been Removed from YaST

Starting with the version shipped in SLE 15, YaST does not have support for floppy disks anymore. For example, this means, that you can no longer install the boot loader to floppy disk or use AutoYaST files from floppy disk.

4.5.10 YaST Partitioner: Redesigned Back-end and UI Changes

Back-end Changes

The partitioning back-end previously used by YaST, libstorage, has been replaced by libstorage-ng that is architected to allow new capabilities that were not possible before. For example, it is now possible to install a fully encrypted system without LVM using the automatic proposal and to correctly handle file systems placed directly on a disk without any partitioning.

UI Changes

Along with the library replacement, the yast2-storage module will be replaced by yast2-storage-ng which reimplements the storage code of YaST. Several outdated and less useful system views were removed from the partitioner in that rewrite:

  • Crypt Files - Use LUKS-based encryption instead

  • Device Mapper

  • Unused Devices

  • Mount Graph

  • Tmpfs - Largely managed by systemd now

In addition, the Hard Disks system view does not display devices that cannot be manipulated using the partitioner. That includes:

  • Unformatted DASDs

  • Individual devices (that is, wires) of a multipath device

  • Disks that are part of a BIOS RAID

Moreover, the "Configure" menu button in the initial partitioner screen does not longer include the "Provide Crypt Password" and "Configure Multipath" options. During installation, any operation implying a system rescan (like using the "Rescan Devices" button in the very same screen) will always ask the user about what to do with inactive Multipath systems and closed encrypted devices.

AutoYaST Changes

While the back-end that handles the AutoYaST section <partitioning> has changed, we kept compatibility in mind and there should be no changes in the XML layout.

4.6 Performance Related Information

4.6.1 sapconf SAP Tuning Tool Sets All Specified Tuning Values on OS Irrespective of Current Value

The previous solution only allowed sapconf to increase values, but in some cases a lower value may be the correct path to take. Therefore, sapconf needed to set all values irrespective of whether the current value is greater than or less than what sapconf wants to set.

sapconf provides a default set of values for SAP workloads which should apply to the majority of use cases. If a default sapconf value is not appropriate for any reason (for example, special workloads, support cases), then sapconf offers the possibility to enter own values.

4.6.2 NFS Tuning

On systems with a high NFS load, connections may block.

To work around such performance regressions with NFSv4, you can open more than one TCP connection to the same physical host. This can be accomplished with the following mount options that will request that the transport is not shared:

mount -o sharetransport=N server:/path /mountpoint

In this case, N must be unique. If N is different for two mounts, they will not share the transport. If N is the same, they might (if they are for the same server, etc).

4.7 Storage

4.7.1 lvmlockd Has Been Added As an Alternative to clvm

clvmd is a daemon that makes basic LVM2 functionality cluster-aware. However, due to its design, clvmd could make it hard to troubleshoot cluster-wide errors, such as cluster deadlock issues.

lvmlockd is a redesign that addresses design issues of clvmd and to add more functionality. For example, it supports both sanlock and dlm as the cluster locking managers, and it supports lvmetad in the cluster. It also allows scaling LVM2 for use in large virtualization/storage clusters.

For more information about lvmlockd, see the man page lvmlockd(8).

4.7.2 XFS Realtime Volumes Feature Has Been Disabled

The XFS feature realtime volumes was abandoned upstream.

Starting with SLE 15, the kernel module for XFS is compiled without support for realtime volumes.

4.7.3 Alignment of Partition Size in the Storage Proposal and Expert Partitioner

To avoid the performance drop caused by excessive read-modify-write cycles, the partitions in a system must be properly aligned. Even beyond performance considerations, some types of partition tables require alignment to work. For example, DASD partition tables need to be aligned to tracks (usually 12 sectors).

In SLE 15, the expert partitioner of YaST takes alignment into consideration when creating and resizing partitions. It ensures alignment where it is required (such as DASD tracks) and encourages alignment where it can help performance, avoiding gaps between partitions in the process.

If you specify a size in the expert partitoner, the start and end of the partition will be aligned to ensure optimal performance and to minimize gaps. This may result in a slightly smaller partition (the difference is usually less than 1 MiB).

If you specify a custom region, the start and end will be honored as closely as possible, without attempting to optimize performance. However, mandatory alignment, such as DASD tracks, will take place. This option is best suited to creating very small partitions.

The same considerations for optimal alignment will also be taken into account while resizing an existing partition and calculating the minimal and maximal sizes suggested by the partitioner during that process.

4.8 Virtualization

4.8.1 Support for Nested Virtualization Performance Features in Newer AMD Processors

In nested virtualization, the hypervisor has to intercept and emulate most virtualization instructions in KVM guests in software. This slows down nested virtualization.

Newer AMD processors have support for hardware virtualization of common virtualization instructions, making software emulation unnecessary. These features in newer AMD processors are now supported, making nested virtualization faster.

4.8.2 KVM

4.8.2.1 KVM/libvirt: Support for Setting OEM Strings Table in SMBIOS

The SMBIOS defines an "OEM Strings" table whose purpose is to allow exposing arbitrary vendor specific strings to the operating system.

Management and orchestration services often need to convey information to virtual machines in the environment. For example, to set up new machines, OpenStack conveys sysprep information to the setup command cloud-init running in the instances it creates. SUSE Manager could also use SMBIOS information for inventory purposes.

With SLE 15, libvirt and QEMU now support setting the OEM strings table in the SMBIOS presented to virtual machines. Applications running inside KVM virtual machines can now access the information using dmidecode.

4.8.3 Xen

4.8.3.1 QEMU Guest Agent Is Now Supported on Xen

The QEMU guest agent has been available for KVM guests for some time. Custom tooling using the guest agent could not be used for Xen guests, posing a challenge in environments with both KVM and Xen.

With SLE 15, the QEMU guest agent is now supported in Xen guests. The package xen-tools-domU now contains a udev rule and a script that configures the guest agent device.

To use the guest agent in a Xen guest:

  • Install the packages xen-tools-domU and qemu-guest-agent.

  • Add a channel device for the agent to the libvirt XML.

  • Restart the guest. After the restart, the guest agent will automatically use the channel device.

4.8.4 Others

4.8.4.1 Supported Offline Migration Scenarios

The following host operating system combinations will be fully supported (L3) for migrating guests from one host to another for SLES 15:

  • SLES 12 SP2 to SLES 15

  • SLES 12 SP3 to SLES 15

  • SLES 12 SP4 to SLES 15 (once released)

4.8.4.2 Supported JeOS Image Formats

With SLE 15, there are now supported JeOS images for the following virtualization platforms:

  • KVM and Xen PV

  • Xen HVM

  • VMware

  • Microsoft Hyper-V

  • OpenStack

4.9 Miscellaneous

4.9.1 MariaDB: Dates After 2038

In MariaDB, the data type TIMESTAMP is limited to dates until 2038.

For dates beyond 2038, use the data type DATETIME.

4.9.2 MariaDB: Default Encoding and Collation Changed to utf8mb4

The utf8 encoding of MariaDB only support Unicode codepoints up to three bytes. The string would be truncated at the first encountered codepoint that would be encoded with four bytes.

The default encoding and collation of MariaDB was changed to utf8mb4 which supports all codepoints.

4.9.3 MariaDB: Support for TokuDB Storage Engine

The version of MariaDB shipped with SLE 15 on Intel 64/AMD64 now supports TokuDB. TokuDB is a high-performance storage engine focused on scalability and operational efficiency.

Note that the TokuDB storage engine cannot be used when the transparent hugepages feature of the Linux kernel is enabled. To disable transparent hugepages, follow the instructions at https://mariadb.com/kb/en/library/enabling-tokudb/#check-for-transparent-hugepage-support-on-linux.

4.9.4 Graphics Chipset Compatibility under Wayland

The drivers for the following graphics chipsets do not yet support Wayland sessions:

  • Nvidia GPUs running under the proprietary driver from Nvidia

  • Cirrus Logic chipsets in QEMU virtual machines

  • Matrox mgag20 chipset

  • Aspeed graphics chipsets

In all of these cases, even if the Wayland stack is fully installed, GNOME will automatically fall back to starting an X session.

4.9.5 CUPS No Longer Supports System V-Style Interface Scripts

In SLE 15 GA, the CUPS print server has been updated to version 2.2.x.

Among other things, this version also includes a backward-incompatible change: For security reasons, it does no longer support System V-style interface scripts. Hence, the directory that stored them, /etc/cups/interfaces has also been removed.

To replicate the functionality of System V-style Interface Scripts in with CUPS 2.2.0 and later, create an interface script that is called as a normal CUPS filter.

To do so, create a PPD file that specifies the interface script in a cupsFilter line. You can copy an existing PPD file and strip out most of the options but you need to to leave at least one paper size for your printer (with PageSize, PageRegion, ImageableArea, and PaperDimension) in the PPD file so that it passes the cupstestppd program's checks.

For example, a minimal PPD file with a cupsFilter line pointing to an existing interface script for text-only printing (for example, called /usr/lib/cups/filter/TextToPrinter) could look similar to this:

*PPD-Adobe: "4.3"
*FormatVersion: "4.3"
*FileVersion: "1.0"
*LanguageVersion: English
*LanguageEncoding: ISOLatin1
*PCFileName: "txtprntr.ppd"
*Product: "(Text Printer)"
*Manufacturer: "Text"
*ModelName: "Printer"
*NickName: "Text Printer"
*ShortNickName: "Text Printer"
*PSVersion: "(none) 0"
*cupsFilter: "text/plain 0 /usr/lib/cups/filter/TextToPrinter"
*OpenUI *PageSize/Media Size: PickOne
*OrderDependency: 10 AnySetup *PageSize
*DefaultPageSize: A4
*PageSize A4: ""
*CloseUI: *PageSize
*OpenUI *PageRegion/Media Size: PickOne
*OrderDependency: 10 AnySetup *PageRegion
*DefaultPageRegion: A4
*PageRegion A4: ""
*CloseUI: *PageRegion
*DefaultImageableArea: A4
*ImageableArea A4: "0 0 595 842"
*DefaultPaperDimension: A4
*PaperDimension A4: "595 842"

For more general information about Print Filters, see https://en.opensuse.org/SDB:Using_Your_Own_Filters_to_Print_with_CUPS.

4.9.6 No Default Compose Key Combination

In previous versions of SLE, the compose key combination allowed typing characters that were not part of the regular keyboard layout. For example, to produce "å", you could press and release Shift-Right Ctrl and then press a twice.

Starting with SLE 15, there is no longer a predefined compose key combination because Shift-Right Ctrl does not work as expected anymore.

  • To define a system-wide custom compose key combination, use the file /etc/X11/Xmodmap and look for the following lines:

    [...]
    !! Third example: Change right Control key to Compose key.
    !! To do Compose Character, press this key and afterwards two
    !! characters (e.g. `a' and `^' to get 342).
    !remove  Control  = Control_R
    !keysym Control_R = Multi_key
    !add     Control  = Control_R
    [...]

    To uncomment the example code, remove the ! characters at the beginning of lines. However, note that the setup from Xmodmap will be overwritten if you are using setxkbmap.

  • To define a user-specific compose key combination, use your desktop's keyboard configuration tool or the command-line tool setxkbmap:

    setxkbmap [...] -option compose:COMPOSE_KEY

    For the variable COMPOSE_KEY, use your preferred character, for example ralt, lwin, rwin, menu, rctl, or caps.

  • Alternatively, use an IBus input method that allows typing the characters you need without a Compose key.

4.9.7 MariaDB Has Been Upgraded to 10.2

The MariaDB package has been upgraded to the 10.2 series that brings many new features and bug fixes. The list of major changes can be found at https://mariadb.com/kb/en/library/changes-improvements-in-mariadb-102/.

The update to the new MariaDB package generally does not cause issues. However, there are certain incompatible changes that need to be considered during this process. For example, InnoDB is the default storage engine now, some options have updated default values, some options have been removed/renamed etc. For more information about upgrading, see the upgrade notes at https://mariadb.com/kb/en/library/upgrading-from-mariadb-100-to-mariadb-101/ and https://mariadb.com/kb/en/library/upgrading-from-mariadb-101-to-mariadb-102/.

MariaDB now uses the client library libmariadb3 instead of the library libmysqlclient. The library libmariadb3 is provided by the package mariadb-connector-c.

5 AMD64/Intel 64 (x86_64) Specific Information

Information in this section pertains to the version of SUSE Linux Enterprise Server 15 GA for the AMD64/Intel 64 architectures.

5.1 System and Vendor Specific Information

5.1.1 Support for 32-bit Runtimes on Intel 64/AMD64 (x86-64)

Some tools to set up software or hardware are still compiled as 32-bit binaries.

SUSE Linux Enterprise 15 contains a 32-bit environment to run such applications on the architectures Intel 64/AMD64 (x86-64). The support targets tools to set up software or hardware. Other 32-bit applications may work with the given environment, but the environment is not intended to be a full replacement for a 32-bit installation.

Building 32-bit applications is not supported on SUSE Linux Enterprise 15.

5.1.2 TPM 2.0 Software Stack Has Been Updated

The upstream projects for Intel's TPM 2.0 Software Stack have introduced major changes to the project structure. Notably, the resource manager daemon has been replaced by a new implementation that fixes stability and security issues.

The packaging has been adjusted to the upstream changes. The previous resource manager daemon, resourcemgr, which was previously part of the tpm2-0-tss package has been dropped. The new package tpm2.0-abrmd provides the new resource manager implementation (tpm2-abrmd / tabrmd).

6 POWER (ppc64le) Specific Information

Information in this section pertains to the version of SUSE Linux Enterprise Server 15 GA for the POWER architecture.

6.1 Support for POWER9 24x7 Counters Has Been Added

SLES 15 adds support for the new version of the hypervisor API which is used to access 24x7 performance counters on POWER9 systems.

6.2 Support for POWER9 Radix Page Tables When Running as KVM Guest

Using hash memory page tables is not efficient when running as a KVM guest.

With SLES 15, radix page tables are supported on POWER9.

6.3 GLIBC Support for POWER9

GLIBC provides full support for the POWER9 architecture and exposes its features via AT_PLATFORM (power9) and AT_HWCAP2 (darn, ieee128 and arch_3_00).

6.4 Optimized GLIBC for POWER9

SLES 15 provides POWER9-optimized versions of strcmp and strncmp, via GNU IFUNC, which are automatically used without requiring an application rebuild.

6.5 Support for POWER9 Has Been Added to GDB

GDB now supports disassembling, recording and replaying new Power ISA 3.0 instructions. Additionally, GDB now supports basic encoding and decoding of 128-bit IEEE floating-point types.

6.6 Support for POWER9 PMU Events Has Been Added to the perf Tool

When executed on a POWER9 system, the perf tool now supports listing or specifying POWER9 PMU events by name.

6.7 GLIBC/GCC Support of Standard Math Functions for _Float128 (POWER9)

The math library now implements 128-bit floating point operations as defined by ISO/IEC/IEEE 60559:2011.

6.8 Support for POWER9 Has Been Added to PAPI

PAPI package updated to include support for POWER9 processors.

6.9 Support for POWER9 Has Been Added to LibPFM

The LibPFM package has been updated to include support for POWER9 processors.

7 IBM Z (s390x) Specific Information

Information in this section pertains to the version of SUSE Linux Enterprise Server 15 GA for the IBM Z architecture. For more information, see https://www.ibm.com/developerworks/linux/linux390/documentation_novell_suse.html

IBM zEnterprise 196 (z196) and IBM zEnterprise 114 (z114), subsequently called z196 and z114.

7.1 Hardware

Support for IBM z13 and IBM z14 Machines

SUSE Linux Enterprise Server 15 GA has improved support for IBM z13 and IBM z14 machines. This following new features are supported:

  • With z14, the hardware provides an indication of the configuration level of SIE, for example LPAR or KVM. IBM z14 sample configurations help to analyze and optimize KVM performance.

  • CPU-MF Hardware Counters are added for IBM z13 and z13s. You can now access counters from the MT-diagnostic counter set that is available with IBM z13. You can also specify z13 specific counters using their symbolic event names and obtain counter descriptions with the lscpumf utility.

  • For IBM z14 machines, access to the host's INVALIDATE PAGE TABLE is provided via the Guest Address-Space-Control Element (ASCE). The KVM host kernel can use the host DAT-enhancement 1 facility to avoid unnecessary purging of guest TLB entries.

  • Store Hypervisor Information (STHYI) from LPAR is available in KVM. Non-privileged user-space applications running on KVM can retrieve hypervisor capacity data through the LPAR if not provided by the Linux kernel.

  • KVM guests can now use CPU features, including CPACF functions, that were introduced with IBM z14.

  • The LLVM compiler supports IBM z14 instructions for improved performance.

  • OpenSSL, ibmca, and libica support IBM z14 instructions for AES-GCM-based encryption of data in flight.

  • Support for the True Random Number Generator (TRNG, CPACF MSA7) in IBM z14 machines via CPACF. This improves the availability of random data in the kernel entropy pool.

  • libica supports hardware acceleration for the SHA3 algorithm (CPACF MSA6) using CPACF hardware in IBM z14 machines.

  • Improved performance on IBM z14 machines through enhanced instruction set support in the toolchain.

  • The SIMD instructions for IBM z14 can be used in user space for improved performance of analytic workloads and math libraries.

7.2 Virtualization

The following new features are supported in SUSE Linux Enterprise Server 15 GA under KVM:

  • Standard network boot setups can be used to deploy KVM guests.

  • LOADPARM and BOOTPROG are fully supported. A boot menu selection is available during IPL, for example, to recover from a defective KVM guest operating system.

  • Keyless Guests are supported for performance gains through improved memory handling for workloads running on Linux.

  • Guarded Storage Facility is supported for improved performance of all Java workloads on KVM virtual servers.

  • Store Hypervisor Information (STHYI) from LPAR is available in KVM. Non-privileged user-space applications running on KVM can retrieve hypervisor capacity data through the LPAR if not provided by the Linux kernel.

  • Machine checks caused by failing KVM guests are now targeted at the KVM virtual server instead of the KVM hypervisor, thus making the hypervisor more resilient.

  • TLB Purge Enhancements are supported under KVM. This improves performance for KVM guests, in particular when subject to memory pressure.

  • Transparent Facility Bit Handling is supported. Hardware functions that do not need a specific configuration in the KVM hypervisor are enabled for KVM guests.

  • The IBM Call Home feature is enabled for KVM.

7.2.1 SIMD Extensions for IBM z14

The SIMD instructions for IBM z14 can be used in user space for improved performance of analytic workloads and math libraries.

7.3 Storage

7.3.1 No dasd_reload During Installation

In previous versions of SLES, when a DASD was activated during the installation, other DASDs may be renumbered. This renumbering could be confusing to users.

Starting with SLES 15, the call to dasd_reload has been removed from the installation. For addressing disks on z Systems, YaST now uses udev device names primarily. This prevents issues with disk name changes and is similar to the behavior on other hardware architectures.

7.4 Network

7.4.1 Support for SET VNIC_CHARS in qeth

qeth now supports SET VNIC_CHARS. You can configure MAC address flooding, learning, forwarding, and takeover behavior for HiperSockets devices.

7.5 Security

7.5.1 libica Supports FIPS 140-2 Mode

The FIPS PUB 140-2 Security Requirements for Cryptographic Modules specify that cryptographic modules in FIPS mode must only use NIST-approved algorithms and perform integrity checks and a self-test upon activation.

In SLES 15, libica is enabled for FIPS 140-2 certification and supports a FIPS mode. To enable this mode, add the boot parameter fips=1 which will set the flag /proc/sys/crypto/fips_enabled to 1

7.5.2 OpenSSH Supports Using Hardware Security Modules (HSMs) for Connecting via OpenSSL

In SLE 15, OpenSSH can use hardware security modules (HSM) that are available through the use of the OpenSSL engines openssl-ibmca and openssl-ibmpkcs11. Previously, the OpenSSH seccomp filter denied some system calls from being made, preventing the use of openssl-ibmca and openssl-ibmpkcs11. The update on seccomp filter enabled such system calls on IBM Z.

7.5.3 Support for libseccomp in systemd

With SLES 15, you can restrict the runtime environment, system calls and network use per application, in particular for containers.

7.5.4 Concurrent Support of Multiple Crypto Domains

With SLES 15, the support for generic cryptographic device drivers supports multiple cryptographic domains simultaneously.

7.5.5 Support for Transforming Secure Keys Into Protected Keys

Using a new device driver, cryptographic applications can generate protected keys from secure keys or from clear keys. Protected keys can be used by CPACF for accelerated encryption and decryption.

7.6 Reliability, Availability, Serviceability (RAS)

7.6.1 Zone Awareness for lsmem / chmem

When setting hotplug memory online or offline using chmem, you can now specify a memory zone. The output of lsmem shows the available memory zones.

7.6.2 lsmem and chmem Have Been Moved to util-linux

In SUSE Linux Enterprise Server 15, the IBM Z-specific commands lsmem and chmem are available in the common Linux tool package util-linux.

7.6.3 Parted Has Been Upgraded to Use fdasd/vtoc Code Base from s390-tools

The partitioning tool GNU Parted now uses the fdasd/vtoc code base from a current version of the IBM Z-specific package s390-tools.

7.6.4 Support for Uprobes

SLES 15 eases debugging user-space programs by enabling the uprobes architecture backend for IBM Z architecture.

7.6.5 Persistent Device Configuration

The following SUSE-supplied commands are now deprecated:

  • ctc_configure

  • dasd_configure

  • qeth_configure

  • zfcp_disk_configure

  • zfcp_host_configure

With SLES 15, as an intermediate step, these scripts have been modified to use the IBM-supplied commands chzdev and lszdev. These commands will be removed in a future release.

If you are using the SUSE-supplied scripts, discontinue their use and directly use the commands chzdev and lszdev provided by IBM in the package s390-tools.

7.6.6 CPU Speed Information Provided on procfs Interface

Statistics and dynamic CPU speed can now be obtained through the cpuinfo interface for improved debugging.

7.6.7 Support for DASD Block Layer Discard

SLES 15 includes support for the Linux discard function that releases unused space on z/VM VDISKs.

7.7 Performance

7.7.1 Single Increment Assignment of Memory

A new option for the “Attach Storage Element” SCLP command to speed up memory hotplug is available.

7.7.2 Backend Support for eBPF

In SLES 15, the Extended Berkeley Packet Filter (eBPF) is supported on IBM Z. It provides enhanced performance over other packet filters.

7.7.3 Improved CRC-32 Algorithm in the Kernel

SLES 15 ships with an optimized CRC-32 implementation that uses the Vector Extension Facility on the IBM Z architecture.

7.7.4 IBM z13 Lock Optimizations in glibc

Improved performance for applications via enhanced instruction support in glibc for IBM z13 machines.

7.7.5 Guest Kernel Support to Avoid Unnecessary TLB Purges

The Linux kernel now tags pages that are not used as part of a page table, so that the hypervisor can avoid unnecessary purging of guest TLB (translation lookaside buffer) entries.

7.7.6 Kernel Interface for the Guarded Storage Facility Added to Improve Java Performance

Optimized Java processes improve performance for many Java applications.

7.8 Miscellaneous

7.8.1 31-Bit Libraries Have Been Removed

In SLES 15, 31-bit libraries are not available anymore.

8 ARM 64-Bit (AArch64) Specific Information

Information in this section pertains to the version of SUSE Linux Enterprise Server 15 GA for the AArch64 architecture.

8.1 Cavium ThunderX2 CRB Firmware Requirements

Unlike SUSE Linux Enterprise Server 12 SP3, SUSE Linux Enterprise Server 15 relies on the firmware to indicate which SMMU version is available in hardware. Early versions of the Cavium ThunderX2 "Sabre" reference boards did not indicate the SMMU model in the IORT ACPI table.

Update the firmware of boards that do not correctly report the SMMU model:

  • For the ThunderX2 "Sabre" reference board, make sure the AMI firmware version is 0ACKL006 or newer.

  • For ThunderX CRB systems, make sure the AMI firmware version is 0ACGA018 or newer.

9 Packages and Functionality Changes

This section comprises changes to packages, such as additions, updates, removals and changes to the package layout of software. It also contains information about modules available for SUSE Linux Enterprise Server. For information about changes to package management tools, such as Zypper or RPM, see Section 4.5, “Systems Management”.

9.1 New Packages

9.1.1 OpenJDK 10 Has Been Added

SUSE Linux Enterprise 15 ships with OpenJDK 10. Note that due to the accelerated development cycle of Java, we expect to move OpenJDK 10 to the Legacy Module and replace it by a then-current OpenJDK version in SUSE Linux Enterprise 15 SP1.

For more information about supported Java versions, also see Section 10.6, “Supported Java Versions” .

9.1.2 PostgreSQL: psqlODBC Driver Has Been Added to Replace unixODBC

The unixODBC driver for PostgreSQL is not maintained anymore.

With SLE 15, the unixODBC driver is not include it in the package unixODBC anymore. However, we have added the psqlODBC driver from the upstream PostgreSQL project which is much better supported.

9.1.3 wodim Has Been Replaced by cdrtools

wodim was created as fork of cdrtools. Unfortunately, the wodim project stagnated over the years.

SLE 15 migrates back to using cdrtools. This means that some tools have been renamed. The following package names have changed:

  • genisoimage has been renamed to mkisofs

  • wodim has been renamed to cdrecord

  • icedax has been renamed to cdda2wav

cdrkit-cdrtools-compat is no longer supplied. It only provided symbolic links for compatibility between cdrtools and wodim. If you were using it, no changes are necessary. If you were using the replaced packages above, executable binaries were renamed accordingly.

9.1.4 nginx Has Been Added

Starting with SUSE Linux Enterprise 15, the Web server software nginx is supported.

9.1.5 UnRAR Has Been Replaced by unar

UnRAR is freeware command-line application for extracting RAR archives. Unfortunately, it is non-free.

In SLE 15, The Unarchiver command-line tool, which is LGPL-licensed (package unar, binaries unar and lsar), has replaced UnRAR.

Unarchiver supports the same archive formats (including RAR5), except for UUE, JAR, and limited support for ARJ (no multi-part) and ACE (no support for Ace 2.0).

UnRAR and Unarchiver are not completely CLI-compatible, as they have a different set of options. Because of this, a simple wrapper script was added within the unrar_wrapper package (with a symbolic link to /usr/bin/unrar). This script transforms a subset of unrar commands to unar and lsar to provide a backwards compatibility:

  • Supported commands: l[t[a],b], t, v[t[a],b], x.

  • Supported options: -o+, -o-, -or, -p

  • Other: files, @listfiles and path_to_extract/ (only for extracting)

  • Return codes: 0 (success), 1 (error), 2 (invalid argument)

For more information about functionality supported by the wrapper, see https://github.com/openSUSE/unrar_wrapper.

9.1.6 ntpd Has Been Replaced With Chrony

The time server synchronization daemon ntpd has been replaced with the more modern daemon Chrony.

This change means that AutoYaST files with an ntp_client section need to be updated to a new format for this section. For more information about the new AutoYaST ntp_client format, see AutoYaST Guide, section NTP Client (a draft version of the document is available at https://www.suse.com/documentation/sles-15/singlehtml/book_autoyast/book_autoyast.html#Configuration.Network.Ntp).

To sync time in intervals, YaST sets up a cron configuration file. From SLE 15 on, the configuration file used for this is owned by the package yast2-ntp-client (previously no package owned it). The configuration file has been renamed from novell.ntp-synchronization to suse-ntp_synchronization to be consistent with other cron configuration files. Upgrade from previous versions of SLE is performed automatically: If a file with the old name is found, it will be renamed and references to ntpd in it will be replaced by chrony.

ntpd has been moved to the Legacy module. For more information, see Section 9.6.3, “Legacy Module: ntpd is now part of the Legacy Module”.

9.1.7 Open MPI Has Been Replaced by Open MPI 2

Open MPI 1.x has reached its end-of-life upstream, as Open MPI 3.0 has been released.

With SLE 15, Open MPI 2 (package openmpi2) has been added and should be used.

Open MPI 1 (package openmpi) has been moved to the Legacy module.

9.1.8 lshw Has Been Added

lshw provides detailed information on the hardware configuration of the machine. It can report exact memory configuration, firmware version, mainboard configuration, CPU version and speed, cache configuration, bus speed, etc.

9.1.9 BPF Compiler Collection (BCC) Has Been Added

BCC is a toolkit for creating efficient kernel tracing and manipulation programs. It uses Extended Berkeley Packet Filters (eBPF) and includes tools to capture and analyze system or application data such as disk I/O stats, database query latencies, filesystem stats, network stats, method calls in high-level languages (often used to develop enterprise applications), and many more.

9.2 Updated Packages

9.2.1 OpenSSH Has Been Updated to Version 7.6p1

OpenSSH was updated to 7.6p1 for updated and improved security features. The package follows the upstream recommendation of disabling less secure legacy cryptography options. This includes the ssh-dss (DSA) public key algorithm.

The ssh-dss (DSA) public key algorithm can be re-enabled using the configuration option HostKeyAlgorithms.

  • On the command line:

    ssh -oHostKeyAlgorithms=+ssh-dss user@legacyhost
  • In the configuration file ~/.ssh/config:

    Host somehost.example.org
      HostKeyAlgorithms +ssh-dss

9.2.2 Squid Has Been Updated to Version 4

Squid has been updated to the 4.x branch. Current users updating from squid 3.5.x (and earlier) should update their configuration files and get acquainted with the new features.

For more information, see the Squid 4 Release Notes at http://www.squid-cache.org/Versions/v4/RELEASENOTES.html.

9.2.3 Ceph Client Packages Have Been Updated to Upstream Release "Mimic" (13.0)

Keep Ceph client packages aligned with latest version of SUSE Enterprise Storage.

In SLE 15, the Ceph client packages (ceph-common, librados, librbd, etc.) have been updated to be based on the latest upstream Ceph release "Mimic" (13.0) to ensure they work optimally with the upcoming SUSE Enterprise Storage 6.

9.2.4 LIO target utilities and libraries Have Been Updated

In SLE 15, LIO-related packages in userspace have been updated to current versions. This affects the packages python-configshell-fb (now: version 1.1), python-rtslib-fb (now: version 2.1), targetcli-fb (now: version 2.1), and tcmu-runner (now: version 1.3). For more information about the updates, see the package change log.

9.2.5 Wireshark Qt UI Replaces Deprecated GTK+ UI

The GTK+ user interface of the Wireshark network protocol analyzer has been deprecated by the upstream project.

The Wireshark Qt interface is now shipped in the package wireshark-ui-qt.

9.2.6 DPDK Has Been Updated, libdpdk Package Has Been Added

SLE 15 ships with DPDK (Data Plane Development Kit) 17.11.

Because certain applications may need specific versions of the DPDK library, SLE 15 ships with a versioned package of that library (currently, libdpdk-17_11). For the future, this enables installing more than one version of the DPDK library at the same time.

9.3 Removed Packages and Features

The following packages have been removed in this release.

The following packages and groups of packages have been removed or replaced in SUSE Linux Enterprise 15:

9.3.1 x11vnc Has Been Removed

In SLE 15, the package x11vnc is not available anymore. Instead, use x0vncserver. The command x11vnc is now a compatibility wrapper that internally starts x0vncserver. It does not have all features that x11vnc had, but it is faster, more secure, and built from better tested and maintained code.

9.3.2 libibcm Has Been Removed

libibcm is deprecated and unmaintained in the upstream community. Starting with rdma-core 17, it will also not be distributed anymore by upstream and it is planned to remove kernel support of ucm.

With SLE 15 and the update to rdma-core 16, the tool libibcm has been removed, along with the package that contained it, libibcm1.

9.3.3 atftp Has Been Removed

SLE 12 included two implementations of server for the TFTP protocol, tftp and atftp. Of these two implementations, only tftp is actively developed.

With SLE 15, atftp has been removed. Therefore, tftp is the recommended solution for most use cases.

However, there are important feature differences between the two implementations:

  • tftp does not support multicast.

  • tftp does not support symbolic links within a directory tree that point to locations outside of that directory tree. This can lead to unusable systems.

To work around both issues, you can use the TFTP server built into dnsmasq instead. If you do not need the DHCP and DNS features that dnsmasq provides, set it up in a TFTP-only mode. To do so, configure the following settings in /etc/dnsmasq.conf:

# disable DNS and DHCP
port=0
# Enable dnsmasq's built-in TFTP server
enable-tftp
# Set the root directory for files available via FTP.
tftp-root=/srv/tftpboot
# Do not abort if the tftp-root is unavailable
tftp-no-fail

If you need to work with symbolic links pointing outside the directory tree:

  • If the listed TFTP_DIR values do not contain the path referred to by a symbolic link below the tftp-root directory, make sure to adapt its value.

  • If you are additionally using AppArmor, update the configuration in /etc/apparmor.d/usr.sbin.dnsmasq:

    @{TFTP_DIR}=/var/tftp /srv/tftpboot [YOUR_SYMBOLIC_LINK_DIRECTORY]

9.3.4 xinetd and yast2-inetd Have Been Removed

In SLE 15, xinetd and yast2-inetd have been removed, in favor of systemd sockets. All software provided in SLE is already adapted to use systemd sockets and YaST modules activate socket instead of xinetd. If you are working with third-party software, it might have to be updated.

9.4 Deprecated Packages and Features

The following packages are deprecated and will be removed with SUSE Linux Enterprise Server 16.

9.4.1 net-tools Has Been Split into net-tools and net-tools-deprecated

The tools arp, route, netstat, iptunnel, ipmaddr, and ifconfig from the package net-tools are now deprecated.

With SLE 15, to separate the deprecated tools from the others in the package net-tools, the package was split into net-tools and net-tools-deprecated.

The package net-tools retains the following tools:

  • ether-wake

  • nameif

  • plipconfig

  • slattach

The package net-tools-deprecated contains the obsolete tools that can be replaced with ip subcommands as below:

  • arp -> ip [r] neigh

  • route -> ip route

  • netstat -> ss [-r]

  • iptunnel -> ip tunnel

  • ipmaddr -> ip maddress

  • ifconfig -> ip address

The tools hostname, domainname, dnsdomainname have been moved to the package hostname which is required by net-tools and net-tools-deprecated.

9.4.2 YaPI Is Deprecated and Should Not Be Used Anymore

YaPI, a Perl API for YaST, is now considered deprecated and must not be called by applications outside of YaST/Installer anymore. It will be removed completely from YaST in a close future.

9.5 Changes in Packaging and Delivery

The following packages and groups of packages have been renamed or have had major packaging changes in SLE 15:

9.5.1 The libpsm_infinipath1 Implementation from the Package libpsm_infinipath1 Will Be Picked By Default

The library libpsm_infinipath1 is provided by two packages: libpsm_infinipath1 and libpsm2-compat. Both provide a library with the same file name, API and ABI, but libpsm_infinipath1 is targeted for TrueScale hardware, while libpsm2-compat provides a compatibility layer to run on OmniScale/PSM2 hardware.

Because both RPM packages provide the same library, in the past, Zypper would pick either of the packages when trying to install libpsm_infinipath1 to satisfy the dependency of another package. However, libpsm2-compat is only targeted at PSM1 users testing software on PSM2 hardware and should therefore not be picked by default.

The SLE 15 version of the package libpsm_infinipath1 is marked as obsoleting libpsm2-compat. This ensures that it will be picked by Zypper by default. To try PSM1 applications on PSM2 hardware, make sure to downgrade to libpsm2-compat.

9.6 Modules

This section contains information about important changes to modules. For more information about available modules, see Section 2.9.1, “Modules in the SLE 15 GA Product Line”.

9.6.1 Development Module: OProfile Support for POWER9

The OProfile package has been updated to include support for POWER9 processors.

9.6.2 Development Module: Valgrind Support for POWER9

Valgrind has been updated to include support for POWER9 processors.

9.6.3 Legacy Module: ntpd is now part of the Legacy Module

With SLE 15, the network time daemon ntpd has been replaced by chrony. ntpd has been moved to the Legacy module instead.

9.6.4 Legacy Module: OpenSSL 0.9.8 Has Been Removed

In December 2015, OpenSSL 0.9.8 reached its end of life. The code was maintained via source backports in the SUSE Linux Enterprise Server 12 Legacy Module.

With SLE 15, OpenSSL 0.9.8 has been removed from the product. Users of OpenSSL must upgrade code to version 1.0 or 1.1, both of which which bring many improvements such updated protocol support.

9.6.5 Legacy Module: OpenSSL 1.0.x Has Been Moved to the Legacy Module

The lifetime of OpenSSL versions 1.0.x does not cover the full lifetime of the product. Additionally, OpenSSL will not support TLS 1.3. However, some applications may require this older version for a transitional period.

OpenSSL libraries version 1.0.x were moved to the Legacy Module. The module has a different lifecycle from SUSE Linux Enterprise Server itself. This version is not expected to receive feature updates or security certifications. For new development, make sure to use the default OpenSSL version 1.1.x.

9.6.6 Legacy Module: OpenLDAP Client Libraries Has Been Moved to the Legacy Module

Even though 389 Directory Server (package 389-ds) is the new default LDAP server on SLE, the OpenLDAP client libraries are widely used for LDAP integrations.

As 389-ds is compatible with the OpenLDAP client libraries, they will be still provided and supported on SLE 15 to provide an easier transition for customers that currently use the OpenLDAP Server. For more information on 389 Directory Server, see Section 4.5.6, “389 Directory Server Is Now the Primary LDAP Server” .

The packages pam_ldap and nss_ldap are considered legacy and were therefore moved to the Legacy Module on SLE 15. Consider using the System Security Services Daemon (SSSD) instead.

10 Technical Information

This section contains information about system limits, technical changes and enhancements for experienced users.

When talking about CPUs, we use the following terminology:

CPU Socket

The visible physical entity, as it is typically mounted to a mainboard or an equivalent.

CPU Core

The (usually not visible) physical entity as reported by the CPU vendor.

On IBM Z, this is equivalent to an IFL.

Logical CPU

This is what the Linux Kernel recognizes as a CPU.

We avoid the word thread (which is sometimes used), as the word thread would also become ambiguous subsequently.

Virtual CPU

A logical CPU as seen from within a virtual machine.

10.1 Supported Host Operating Systems and Hypervisors

SUSE Hosts

The following SUSE host operating systems and hypervisors are supported to run SLE 15 GA guests:

  • SLES 11 SP4 with KVM or Xen

  • SLES 12 SP1 with KVM or Xen

  • SLES 12 SP2 with KVM or Xen

  • SLES 12 SP3 with KVM or Xen

  • SLES 12 SP4 with KVM or Xen (after SLES 12 SP4 has been released)

  • SLES 15 with KVM or Xen

  • SLES 15 SP1 with KVM or Xen (after SLES 15 SP1 has been released)

When running on one of the SUSE host operating system listed above, your installation will enjoy full L3 support from SUSE, both for the guest and host.

Third-Party Hosts

The following third-party host operating systems and hypervisors are supported to run SLE 15 GA guests:

  • VMware ESXi 6.0

  • VMware ESXi 6.5

  • Microsoft Windows 2008 SP2 and later

  • Microsoft Windows 2008 R2 SP1 and later

  • Microsoft Windows 2012 and later

  • Microsoft Windows 2012 R2 and later

  • Microsoft Windows 2016

  • Citrix XenServer 6.5

  • Oracle VM 3.3

When running on one of the third-party host operating system listed above, your installation will enjoy full L3 support from SUSE for the guest. To learn about support options for the third-party hosts, contact the third-party vendor in question.

10.2 Kernel Limits

http://www.suse.com/products/server/technical-information/#Kernel

This table summarizes the various limits which exist in our recent kernels and utilities (if related) for SUSE Linux Enterprise Server 15 GA.

SLES 15 GA (Linux 4.12) AMD64/Intel 64 (x86_64)IBM Z (s390x)POWER (ppc64le)AArch64 (ARMv8)

CPU bits

64

64

64

64

Maximum number of logical CPUs

8192

256

2048

256

Maximum amount of RAM (theoretical/certified)

> 1 PiB/64 TiB

10 TiB/256 GiB

1 PiB/64 TiB

256 TiB/n.a.

Maximum amount of user space/kernel space

128 TiB/128 TiB

n.a.

512 TiB 1/2 EiB

256 TiB/128 TiB

Maximum amount of swap space

Up to 29 * 64 GB (x86_64) or 30 * 64 GB (other architectures)

Maximum number of processes

1048576

Maximum number of threads per process

Upper limit depends on memory and other parameters (tested with more than 120,000)2

Maximum size per block device

Up to 8 EiB on all 64-bit architectures

FD_SETSIZE

1024

1 By default, the user space memory limit on the POWER architecture is 128 TiB. However, you can explicitly request mmaps up to 512 TiB.

2 The total number of all processes and all threads on a system may not be higher than the maximum number of processes.

10.3 KVM Limits

SLES 15 GA Virtual Machine (VM) Limits

Maximum VMs per host

Unlimited (total number of virtual CPUs in all guests being no greater than 8 times the number of CPU cores in the host)

Maximum Virtual CPUs per VM

240

Maximum Memory per VM

4 TiB

Virtual Host Server (VHS) limits are identical to those of SUSE Linux Enterprise Server.

10.3.1 Supported Live Migration Scenarios

The following KVM live migration scenarios are supported:

  • SLE 12 SP3 to SLE 15

  • SLE 12 SP4 to SLE 15 (after SLE 12 SP4 has been released)

  • SLE 15 to SLE 15

10.4 Xen Limits

Since SUSE Linux Enterprise Server 11 SP2, we removed the 32-bit hypervisor as a virtualization host. 32-bit virtual guests are not affected and are fully supported with the provided 64-bit hypervisor.

SLES 15 GA Virtual Machine (VM) Limits

Maximum number of virtual CPUs per VM

64

Maximum amount of memory per VM

16 GiB x86_32, 511 GiB x86_64

SLES 15 GA Virtual Host Server (VHS) Limits

Maximum number of physical CPUs

256

Maximum number of virtual CPUs

256

Maximum amount of physical memory

5 TiB

Maximum amount of Dom0 physical memory

500 GiB

Maximum number of block devices

12,000 SCSI logical units

  • PV:  Paravirtualization

  • FV:  Full virtualization

For more information about acronyms, see the virtualization documentation provided at https://www.suse.com/documentation/sles-12/.

10.5 File Systems

https://www.suse.com/products/server/technical-information/#FileSystem

10.5.1 Comparison of Supported File Systems

SUSE Linux Enterprise was the first enterprise Linux distribution to support journaling file systems and logical volume managers back in 2000. Later, we introduced XFS to Linux, which today is seen as the primary work horse for large-scale file systems, systems with heavy load and multiple parallel reading and writing operations. With SUSE Linux Enterprise 12, we went the next step of innovation and started using the copy-on-write file system Btrfs as the default for the operating system, to support system snapshots and rollback.

+ supported
unsupported

FeatureBtrfsXFSExt4OCFS 2 1

Support in products

SLE

SLE

SLE

SLE HA

Data/metadata journaling

N/A 2

– / +

+ / +

– / +

Journal internal/external

N/A 2

+ / +

+ / +

+ / –

Journal checksumming

N/A 3

+

+

+

Subvolumes

+

Offline extend/shrink

+ / +

– / –

+ / +

+ / – 3

Online extend/shrink

+ / +

+ / –

+ / –

– / –

Inode allocation map

B-tree

B+-tree

table

B-tree

Sparse files

+

+

+

+

Tail packing

Small files stored inline

+ (in metadata)

+ (in inode)

+ (in inode)

Defragmentation

+

+

+

Extended file attributes/ACLs

+ / +

+ / +

+ / +

+ / +

User/group quotas

– / –

+ / +

+ / +

+ / +

Project quotas

+

+

Subvolume quotas

+

N/A

N/A

N/A

Data dump/restore

+

Block size default

4 KiB 4

Maximum file system size

16 EiB

8 EiB

1 EiB

4 PiB

Maximum file size

16 EiB

8 EiB

1 EiB

4 PiB

1 OCFS 2 is fully supported as part of the SUSE Linux Enterprise High Availability Extension.

2 Btrfs is a copy-on-write file system. Instead of journaling changes before writing them in-place, it writes them to a new location and then links the new location in. Until the last write, the changes are not committed. Because of the nature of the file system, quotas are implemented based on subvolumes (qgroups).

3 To extend an OCFS 2 file system, the cluster must be online but the file system itself must be unmounted.

4 The block size default varies with different host architectures. 64 KiB is used on POWER, 4 KiB on other systems. The actual size used can be checked with the command getconf PAGE_SIZE.

Additional Notes

Maximum file size above can be larger than the file system's actual size because of the use of sparse blocks. All standard file systems on SUSE Linux Enterprise Server have LFS, which gives a maximum file size of 263 bytes in theory.

The numbers in the above table assume that the file systems are using a 4 KiB block size which is the most common standard. When using different block sizes, the results are different.

In this document: 1024 Bytes = 1 KiB; 1024 KiB = 1 MiB; 1024 MiB = 1 GiB; 1024 GiB = 1 TiB; 1024 TiB = 1 PiB; 1024 PiB = 1 EiB. See also http://physics.nist.gov/cuu/Units/binary.html.

NFSv4 with IPv6 is only supported for the client side. An NFSv4 server with IPv6 is not supported.

The version of Samba shipped with SUSE Linux Enterprise Server 15 GA delivers integration with Windows 7 Active Directory domains. In addition, we provide the clustered version of Samba as part of SUSE Linux Enterprise High Availability Extension 15 GA.

Some file system features are available in SUSE Linux Enterprise Server 15 GA but are not supported by SUSE. By default, the file system drivers in SUSE Linux Enterprise Server 15 GA will refuse mounting file systems that use unsupported features (in particular, in read-write mode). To enable unsupported features, set the module parameter allow_unsupported=1 in /etc/modprobe.d or write the value 1 to /sys/module/MODULE_NAME/parameters/allow_unsupported. However, note that setting this option will render your kernel and thus your system unsupported.

10.5.2 Supported Btrfs Features

The following table lists supported and unsupported Btrfs features across multiple SLES versions.

+ supported
unsupported

FeatureSLES 11 SP4SLES 12 SP3SLES 15 GA
Copy on Write+++
Snapshots/Subvolumes+++
Metadata Integrity+++
Data Integrity+++
Online Metadata Scrubbing+++
Automatic Defragmentation
Manual Defragmentation+++
In-band Deduplication
Out-of-band Deduplication+++
Quota Groups+++
Metadata Duplication+++
Multiple Devices++
RAID 0++
RAID 1++
RAID 10++
RAID 5
RAID 6
Hot Add/Remove++
Device Replace
Seeding Devices
Compression++
Big Metadata Blocks++
Skinny Metadata++
Send Without File Data++
Send/Receive++
Inode Cache
Fallocate with Hole Punch++

10.6 Supported Java Versions

The following table lists Java implementations available in SUSE Linux Enterprise Server 15 GA

Name (Package Name)VersionSUSE Linux Enterprise Server ModuleSupport
OpenJDK (java-10-openjdk)10Base SystemSUSE, L3
IBM Java (java-1_8_0-ibm)1.8.0LegacyExternal

11 Obtaining Source Code

This SUSE product includes materials licensed to SUSE under the GNU General Public License (GPL). The GPL requires SUSE to provide the source code that corresponds to the GPL-licensed material. The source code is available for download at http://www.suse.com/download-linux/source-code.html. Also, for up to three years after distribution of the SUSE product, upon request, SUSE will mail a copy of the source code. Requests should be sent by e-mail to mailto:sle_source_request@suse.com or as otherwise instructed at http://www.suse.com/download-linux/source-code.html. SUSE may charge a reasonable fee to recover distribution costs.

Print this page