Red Hat Enterprise Linux-6-6.0 Release Notes-En-US
Red Hat Enterprise Linux-6-6.0 Release Notes-En-US
Martin Prpic
Legal Notice
Co pyright 20 10 Red Hat.
This do cument is licensed by Red Hat under the Creative Co mmo ns Attributio n-ShareAlike 3.0
Unpo rted License. If yo u distribute this do cument, o r a mo dified versio n o f it, yo u must pro vide
attributio n to Red Hat, Inc. and pro vide a link to the o riginal. If the do cument is mo dified, all Red
Hat trademarks must be remo ved.
Red Hat, as the licenso r o f this do cument, waives the right to enfo rce, and agrees no t to assert,
Sectio n 4 d o f CC-BY-SA to the fullest extent permitted by applicable law.
Red Hat, Red Hat Enterprise Linux, the Shado wman lo go , JBo ss, MetaMatrix, Fedo ra, the Infinity
Lo go , and RHCE are trademarks o f Red Hat, Inc., registered in the United States and o ther
co untries.
Linux is the registered trademark o f Linus To rvalds in the United States and o ther co untries.
Java is a registered trademark o f Oracle and/o r its affiliates.
XFS is a trademark o f Silico n Graphics Internatio nal Co rp. o r its subsidiaries in the United
States and/o r o ther co untries.
MySQL is a registered trademark o f MySQL AB in the United States, the Euro pean Unio n and
o ther co untries.
No de.js is an o fficial trademark o f Jo yent. Red Hat So ftware Co llectio ns is no t fo rmally
related to o r endo rsed by the o fficial Jo yent No de.js o pen so urce o r co mmercial pro ject.
The OpenStack Wo rd Mark and OpenStack Lo go are either registered trademarks/service
marks o r trademarks/service marks o f the OpenStack Fo undatio n, in the United States and o ther
co untries and are used with the OpenStack Fo undatio n's permissio n. We are no t affiliated with,
endo rsed o r spo nso red by the OpenStack Fo undatio n, o r the OpenStack co mmunity.
All o ther trademarks are the pro perty o f their respective o wners.
Abstract
The Release No tes do cument the majo r features and enhancements implemented in the Red
Hat Enterprise Linux 6 release.
T able of Contents
. .. . Int
1
. . .roduct
. . . . . .ion
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3. . . . . . . . . .
. .. .Inst
2
. . . aller
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3. . . . . . . . . .
2 .1. Ins tallatio n Metho d s
2 .2. Creating Bac kup Pas s p hras es During Ins tallatio n
2 .3. DVD Med ia Bo o t Catalo g Entries
2 .4. Ins tallatio n Cras h Rep o rting
2 .5. Ins tallatio n Lo g s
3
6
6
7
8
. . .File
3
. . .Syst
. . . .ems
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8. . . . . . . . . .
3 .1. Fo urth Extend ed Files ys tem (ext4) Sup p o rt
8
3 .2. XFS
9
3 .3. Blo c k Dis c ard enhanc ed s up p o rt fo r thinly p ro vis io ned LUNs and SSD d evic es
9
3 .4. Netwo rk File Sys tem (NFS)
9
. .. .St
4
. .orage
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9. . . . . . . . . .
4 .1. Sto rag e Inp ut/O utp ut Alig nment and Siz e
9
4 .2. Dynamic Lo ad Balanc ing with DM-Multip ath
10
4 .3. Lo g ic al Vo lume Manag er (LVM)
10
. . .Power
5
. . . . . Management
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1. 1. . . . . . . . . .
5 .1. p o werto p
11
5 .2. tuned
11
. .. .Package
6
. . . . . . . Management
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1. 1. . . . . . . . . .
6 .1. Stro ng p ac kag e c hec ks ums
11
6 .2. The Pac kag eKit Pac kag e Manag er
12
6 .3. Yum
12
. .. .Clust
7
. . . . ering
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1. 2. . . . . . . . . .
7 .1. Co ro s ync Clus ter Eng ine
12
7 .2. Unified Lo g g ing Co nfig uratio n
12
7 .3. Hig h Availab ility Ad minis tratio n
12
7 .4. G eneral Hig h Availab ility Imp ro vements
13
. .. .Securit
8
. . . . . .y. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1. 3. . . . . . . . . .
8 .1. Sys tem Sec urity Servic es Daemo n (SSSD)
13
8 .2. Sec urity-Enhanc ed Linux (SELinux)
13
8 .3. Bac kup Pas s p hras es fo r Enc ryp ted Sto rag e Devic es
14
8 .4. s Virt
14
8 .5. Enterp ris e Sec urity Client
14
. .. .Net
9
. . .working
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1. 5. . . . . . . . . .
9 .1. Multiq ueue Netwo rking
15
9 .2. Internet Pro to c o l vers io n 6 (IPv6 )
15
9 .3. Netlab el
15
9 .4. G eneric Rec eive O fflo ad
15
9 .5. Wireles s Sup p o rt
15
. .0.. .Deskt
1
. . . . .op
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1. 5. . . . . . . . . .
10 .1. G rap hic al Startup
15
10 .2. Sus p end and Res ume
16
10 .3. Multip le Dis p lay Sup p o rt
16
10 .4. no uveau Driver fo r NVIDIA G rap hic s Devic es
18
10 .5. Internatio naliz atio n
18
18
10 .6 . Ap p lic atio ns
18
20
10 .8 . KDE 4.3
20
. .1.. .Document
1
. . . . . . . . .at
. .ion
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2. 0. . . . . . . . . .
11.1. Releas e Do c umentatio n
11.2. Ins tallatio n and Dep lo yment
11.3. Sec urity
11.4. To o ls & Perfo rmanc e
11.5. Hig h Availab ility
11.6 . Virtualiz atio n
21
21
22
22
22
23
. .2.. .Kernel
1
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2. 3. . . . . . . . . .
12.1. Res o urc e Co ntro l
23
12.2. Sc alab ility
23
12.3. Erro r Rep o rting
24
12.4. Po wer Manag ement
24
12.5. Analyz ing Kernel Perfo rmanc e
24
12.6 . G eneral Kernel Up d ates
25
. .3.. .Compiler
1
. . . . . . . .and
. . . .T.ools
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2. 5. . . . . . . . . .
13.1. Sys temTap
13.2. O Pro file
25
26
26
26
27
. .4.. .Int
1
. . eroperabilit
..........y
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2. 7. . . . . . . . . .
14.1. Samb a
27
. .5.. .Virt
1
. . .ualiz
. . . .at
. .ion
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2. 8. . . . . . . . . .
15.1. Kernel-b as ed Virtual Mac hine
28
15.2. Xen
15.3. virt-v2v
30
31
. .6.. .Support
1
. . . . . . . abilit
. . . . .y. and
. . . .Maint
. . . . .enance
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
...........
16 .1. firs taid kit Sys tem Rec o very To o l
31
16 .2. Bug Rep o rting
16 .3. Auto mated Bug Rep o rting To o l
31
31
. .7.. .Web
1
. . . .Servers
. . . . . . .and
. . . .Services
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
...........
17.1. Ap ac he HTTP Web Server
32
17.2. PHP: Hyp ertext Prep ro c es s o r (PHP)
32
17.3. memc ac hed
33
. .8.. .Dat
1
. . .abases
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
...........
18 .1. Po s tg reSQ L
18 .2. MySQ L
33
33
. .9.. .Archit
1
. . . . . ect
. . .ure
. . . Specific
. . . . . . . .Not
. . . es
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
...........
. .. .Revision
A
. . . . . . . .Hist
. . . ory
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
...........
Note
This version of the Release Notes may contain outdated material. Refer to the Online Release
Notes for a current overview of the new features contained in this release
2. Inst aller
The Red Hat Enterprise Linux installer (also known as anaco nd a) assists in the installation of Red
Hat Enterprise Linux 6. This section of the release notes provides an overview of the new features
implemented in the installer for Red Hat Enterprise Linux 6.
Further Reading
The Red Hat Enterprise Linux 6 Installation Guide provides detailed documentation of the
installer and the installation process.
multipath devices, and other storage area network (SAN) devices can now be easily configured using
the new interface.
The Installer allows storage devices to be specified as either install target devices or data storage
devices prior to installation.
2 .1 .2 . Kickst art
Kickstart is an automated installation method that system administrators use to install Red Hat
Enterprise Linux. Using kickstart, a single file is created, containing the answers to all the questions
that would normally be asked during a typical installation.
Red Hat Enterprise Linux 6 introduces improvements to the validation of kickstart files, allowing the
installer to capture issues with kickstart file syntax before an installation commences.
Note
Some installations require advanced installation options that are not present in the text-based
installer. If the target system cannot run the graphical installer locally, use the Virtual Network
Computing (VNC) display protocol to complete the installation.
Note
Currently, creating backup passphrases for encrypted devices during installation can only be
achieved during a kickstart installation. More information on this new feature, including how to
utilize this feature in a kickstart installation of Red Hat Enterprise Linux 6, refer to the D isk
Encryption appendix in the Installation Guide.
Important
Some systems with very old BIOS implementations will not boot from media which include
more than one boot catalog entry. Such systems will not boot from a Red Hat Enterprise Linux
6 D VD but may be bootable using a USB drive or over a network using PXE.
Note
UEFI and BIOS boot configurations differ significantly from each other and are not
interchangeable. An installed instance of Red Hat Enterprise Linux 6 will not boot if the
firmware it was configured for is changed. You cannot, for example, install the operating
system on a BIOS-based system and then boot the installed instance on a UEFI-based system.
The details of the error can be instantly reported to the Red Hat Bugzilla bug tracking website, or in
cases where there is no internet connectivity, saved locally to disk.
4 . St orage
more efficient allocation of disk space, no limit on the number of subdirectories within a directory,
faster file system checking, and more robust journaling. The ext4 file system is selected by default
and is highly recommended.
3.2. XFS
XFS is a highly scalable, high-performance file system which was originally designed at Silicon
Graphics, Inc. It was created to support filesystems up to 16 exabytes (approximately 16 million
terabytes), files up to 8 exabytes (approximately 8 million terabytes) and directory structures
containing tens of millions of entries.
XFS supports metadata journaling, which facilitates quicker crash recovery. The XFS file systems
can also be defragmented and expanded while mounted and active.
3.3. Block Discard enhanced support for t hinly provisioned LUNs and SSD
devices
Filesystems in Red Hat Enterprise Linux 6 use the new block discard feature to allows a storage
device to be informed when the filesystem detects that portions of a device (also known as blocks)
are no longer in active use. While few storage devices feature block discard capabilities, newer solid
state drives (SSD s) utilize this feature to optimize internal data layout and invoke proactive wear
levelling. Additionally, some high end SCSI devices use block discard information to help implement
thinly provisioned LUNs.
4 . St orage
4 .1. St orage Input /Out put Alignment and Siz e
Recent enhancements to the SCSI and ATA standards allow storage devices to indicate their
preferred (and in some cases, required) I/O alignment and I/O size. This information is particularly
useful with newer disk drives that increase the physical sector size from 512 byes to 4K bytes. This
information may also be beneficial for RAID devices, where the chunk size and stripe size may impact
performance.
The Red Hat Enterprise Linux 6 provides the ability to read and utilize this information, and optimize
how data is read and written from storage devices.
Further Reading
The Storage Administation Guide features a chapter that covers I/O Limits in further detail.
Further Reading
The D M Multipath book provides information on using the D evice-Mapper Multipath feature of
Red Hat Enterprise Linux 6.
Important
system-co nfi g -l vm is a graphical user interface provided in Red Hat Enterprise Linux to
manage logical volumes. The functionality provided by system-co nfi g -l vm is in the
process of transitioning to a more maintainable tool named g no me-d i sk-uti l i ty (also
referred to as pal i mpsest). As a result, Red Hat will be very selective in updating systemco nfi g -l vm. As g no me-d i sk-uti l i ty reaches feature parity with system-co nfi g l vm, Red Hat reserves the right to remove system-co nfi g -l vm during the life of Red Hat
Enterprise Linux 6.
Further Reading
The Logical Volume Manager Administration document describes the LVM logical volume
manager, including information on running LVM in a clustered environment.
10
5 . Power Management
4 .3.1.2. Merg in g Sn ap sh o t s
Red Hat Enterprise Linux 6 introduces the ability to merge a snapshot of a logical volume back into
the origin logical volume. This allows system administrators to revert any changes that have
occurred on a logical volume by merging back to the point preserved by a snapshot.
For more information about the new snapshot merge feature, consult the l vco nvert manpage.
4 .3.1.3. Fo u r- Vo lu me Mirro rs
LVM in Red Hat Enterprise Linux 6 supports creating a logical volume with up to four mirrors.
4 .3.1.4 . Mirro rin g mirro r lo g s
LVM maintains a small log (on a separate device) which it uses to keep track of which regions are in
sync with the mirror or mirrors. Red Hat Enterprise Linux 6 provides the ability to mirror this log
device.
5. Power Management
Further Reading
The Power Management Guide provides information on effectively managing power
consumption on Red Hat Enterprise Linux 6.
5.1. powert op
The introduction of the tickless kernel in Red Hat Enterprise Linux 6 (refer to Section 12.4.2, Tickless
Kernel ) allows the CPU to enter the idle state more frequently, reducing power consumption and
improving power management. The new p o wert o p tool provides the ability to identify specific
components of kernel and userspace applications that frequently wake up the CPU. p o wert o p was
used in development to identify and tune many applications in this release, reducing unnecessary
CPU wake up by a factor of 10.
5.2. t uned
t u n ed is a system tuning daemon that monitors system components and dynamically tunes system
settings. Utilizing kt u n e (the static mechanism for system tuning), t u n ed can monitor and tune
devices (e.g. hard disk drives and ethernet devices). Red Hat Enterprise Linux 6 also introduces
d iskd evst at for monitoring disk operations and n et d evst at for monitoring network operations.
6. Package Management
6.1. St rong package checksums
RPM provides support for signed packages using strong hash algorithms such as SHA-256 in order
11
to ensure package integrity and increase security. Red Hat Enterprise Linux 6 packages are
transparently compressed with the XZ lossless compression library, which implements the LZ MA2
compression algorithm for greater compression (thus reducing package size) and speedier
unpacking (when installing RPMs). Further information on the stronger package checksums is
available in the D eployment Guide
6.3. Yum
Via its plugin architecture, Yum provides new or enhanced support for various capabilities such as
delta RPMs (using the presto plugin), RHN communication (rhnplugin), and auditing and applying
using a calculated least-invasive (minimal) number of updatesonly relevant security fixes to a
system (security plugin).
Yum also ships with the yum-config-manager utility, which shows exhaustive information about all
set configuration options and parameters for each individual repository. Further information on
updates to Yum is available in the D eployment Guide
7. Clust ering
Clusters are multiple computers (nodes) working in concert to increase reliability, scalability, and
availability to critical production services. High Availability using Red Hat Enterprise Linux 6 can be
deployed in a variety of configurations to suit varying needs for performance, high-availability, load
balancing, and file sharing.
Further Reading
The Cluster Suite Overview document provides an overview of Red Hat Cluster Suite for Red
Hat Enterprise Linux 6. Additionally, the High Availability Administration document describes
the configuration and management of Red Hat cluster systems for Red Hat Enterprise Linux 6.
12
8 . Securit y
Conga is an integrated set of software components that provides centralized configuration and
management for Red Hat Enterprise Linux High Availability. One of the primary components of Conga
is luci, a server that runs on one computer and communicates with multiple clusters and computers.
In Red Hat Enterprise Linux 6 the web interface that is used to interact with luci has been redesigned.
8. Securit y
Further Reading
The Security Guide assists users and administrators in learning the processes and practices
of securing workstations and servers against local and remote intrusion, exploitation and
malicious activity.
Further Reading
The D eployment Guide contains a section that describes how to install and configure the
System Security Services D aemon (SSSD ), and how to use the features that it provides.
8 .2 .1 . Co nfine d Use rs
Traditionally, SELinux is used to define and control how an application interacts with the system.
SELinux in Red Hat Enterprise Linux 6 introduces a set of policies that allows system administrators
to control what particular users can access on a system.
13
8 .2 .2 . Sandbo x
SELinux in Red Hat Enterprise Linux 6 features the new security sandbox feature. The security
sandbox adds a set of SELinux policies that enables a system administrator to run any application
within a tightly confined SELinux domain. Using the sandbox, system administrators can test the
processing of untrusted content without damaging the system.
Fig u re 7. D ecryp t in g D at a
However, if the passphrase is misplaced, the encryption key cannot be used, and data on the
encrypted storage device cannot be accessed.
Red Hat Enterprise Linux 6 provides the ability to save encryption keys and create backup
passphrases. This feature allows for the recovery of an encrypted volume (including the root device)
even when the original passphrase is misplaced.
8.4 . sVirt
libvirt is a C language application programming interface (API) for managing and interacting with the
virtualization capabilities of Red Hat Enterprise Linux 6. In this release, libvirt features the new sVirt
component. sVirt integrates with SELinux, providing security mechanisms to prevent unauthorized
access of guests and hosts in a virtualized environment.
14
9 . Net working
9. Net working
9.1. Mult iqueue Net working
Every data packet transferred over a network device represents processing which must be completed
by a CPU. The low-level network implementation in Red Hat Enterprise Linux 6 allows network device
drivers to divide network packet processing across multiple queues. D ividing these processes allows
a system to better utilize the multiple processors and CPU cores present on modern systems.
10. Deskt op
10.1. Graphical St art up
Red Hat Enterprise Linux 6 introduces a new, seamless graphical boot sequence that commences
immediately after the hardware has initialized.
15
Note
System Administrators are still able to view detailed progress of the boot sequence by pressing
the F11 key at any time during the graphical boot.
16
9 . Net working
Note
By default, the additional display is added in a spanning layout to the left of the current
display.
The automatic detection of additional displays is useful in situations where displays are added and
removed frequently (e.g. setting up a laptop with an external projector)
17
Note
The previous default driver for NVID IA hardware (nv) is still available in Red Hat Enterprise
Linux 6.
1 0 .5 .5 . Fo nt s
Font support in Red Hat Enterprise Linux 6 has been improved, with updates to fonts for Chinese,
Japanese, Korean, Indic and Thai languages.
1 0 .6 .1 . Fire fo x
18
9 . Net working
Red Hat Enterprise Linux 6 introduces version 3.5 of the Mozilla Firefox web browser.
For details on the new features in Firefox, refer to the Firefox Release Notes
1 0 .6 .2 . T hunde rbird 3
Red Hat Enterprise Linux 6 includes version 3 of the Mozilla Thunderbird email client, providing
tabbed messaging, smart folders, and a message archive. For further details on new features in
Thunderbird 3, refer to the Thunderbird Release Notes
19
10.8. KDE 4 .3
Red Hat Enterprise Linux 6 provides KD E 4.3 as an alternative desktop enviroment.
KD E 4.3 features an entirely new user experience, featuring:
The new Plasma D esktop Workspace, including Plasma Widgets for a more customizable
desktop.
Oxygen, with enhanced icon and sound themes.
Enhancements to the KD E Window Manager (kwin)
Additionally, the d o l phi n file browser has replaced ko nq uero r as the KD E default.
20
1 1 . Document at ion
Release D ocumentation
Installation and D eployment
Security
Tools and Performance
Clustering
Virtualization
21
11.3. Securit y
Secu rit y G u id e
The Security Guide is designed to assist users and administrators in learning the processes and
practices of securing workstations and servers against local and remote intrusion, exploitation and
malicious activity.
SELin u x U ser G u id e
The SELinux User Guide covers the management and use of Security-Enhanced Linux for those with
minimal or no experience with the framework. It serves as an introduction to SELinux and explains
the terms and concepts in use.
Man ag in g C o n f in ed Services
The Managing Confined Services guide is designed to assist advanced users and administrators
when using and configuring Security-Enhanced Linux (SELinux). It is focused on Red Hat Enterprise
Linux and describes the components of SELinux as they pertain to services an advanced user or
administrator might need to configure. Also included are real-world examples of configuring these
services and demonstrations of how SELinux complements their operation.
22
1 2 . Kernel
The Cluster Suite Overview document provides an overview of High Availability for Red Hat Enterprise
Linux 6.
H ig h Availab ilit y Ad min ist rat io n
The High Availability Administration document describes the configuration and management of Red
Hat High Availability systems for Red Hat Enterprise Linux 6.
Virt u al Server Ad min ist rat io n
The Virtual Server Administration book discusses the configuration of high-performance systems and
services with Red Hat Enterprise Linux 6 and the Linux Virtual Server (LVS) system.
D M Mu lt ip at h
The D M Multipath book provides information on using the D evice-Mapper Multipath feature of Red
Hat Enterprise Linux 6.
12. Kernel
12.1. Resource Cont rol
1 2 .1 .1 . Co nt ro l Gro ups
Control groups are a new feature of the Linux kernel in Red Hat Enterprise Linux 6. Each control
group is a set of tasks on a system that have been grouped together to better manage their
interaction with system hardware. Control groups can be tracked to monitor the system resources that
they use. Additionally, system administrators can use control group infrastructure to allow or to deny
specific control groups access to system resources such as memory, CPUs (or groups of CPUs),
networking, I/O, or the scheduler. Management of control groups in userspace is provided by
l i bcg ro up, enabling system administrators to create new control groups, start new processes in a
specific control group and set control group parameters.
Note
Control Groups and other resource management features are discussed in detail in the Red
Hat Enterprise Linux 6 Resource Management Guide
12.2. Scalabilit y
1 2 .2 .1 . Co m ple t e ly Fair Sche dule r (CFS)
23
A process (or task) scheduler is a specific kernel subsystem that is responsible for assigning the
order in which processes are sent to the CPU. The kernel (version 2.6.32) shipped in Red Hat
Enterprise Linux 6 replaces the O (1) scheduler with the new C o mpl etel y Fai r Sched ul er
(C FS). The CFS implements the fair queuing scheduling algorithm.
1 2 .4 .2 . T ickle ss Ke rne l
Previously the kernel implemented a timer that periodically queried the system to check if there were
any outstanding tasks to process. Consequently, the CPU would remain in an active state,
consuming unnecessary power. The kernel in Red Hat Enterprise Linux 6 enables the new tickless
kernel feature, replacing the periodic timer interrupts with on-demand interrupts. The tickless kernel
allows a CPU to enter longer sleep states when idle, and wake only when a task is queued for
processing.
24
1 2 .5 .2 . Ft race and pe rf
Two new tools are available in Red Hat Enterprise Linux 6 to assist in analyzing kernel performance.
Ftrace provides call graph style tracing for the kernel. The new perf tool monitors, logs and analyzes
system hardware events.
25
Important
Unprivileged mode is new and experimental. The stap-server facility on which it relies is
undergoing work for security improvements and should be deployed with care on a
trustworthy network.
13.2. OProfile
OProfile is a system-wide profiler for Linux systems. The profiling runs transparently in the
background and profile data can be collected at any time.
Red Hat Enterprise Linux 6 features version 0.9.5 of OProfile, adding support for new Intel and AMD
processors.
26
1 4 . Int eroperabilit y
The g etad d ri nfo () function now has support for the D atagram Congestion Control Protocol
(D CCP) and the UD P-Lite protocol. Additionally, g etad d ri nfo () now has the ability to look up
IPv4 and IPv6 addresses simultaneously.
14 . Int eroperabilit y
14 .1. Samba
Samba is a suite of programs which use NetBIOS over TCP/IP (NetBT) to enable the sharing of files,
printers and other information (such as directories of available files and printers). This package
provides a Server Message Block or SMB server (also known as a Common Internet File System or
CIFS server) which can provide network services to SMB/CIFS clients.
Red Hat Enterprise Linux 6 provides the following significant enhancements to Samba:
Internet Protocol version 6 support (IPv6)
Support for Windows 2008 (R2) trust relationships.
27
Further Reading
Refer to the D eployment Guide for futher information on Samba configuration on Red Hat
Enterprise Linux 6.
1 5 .1 .1 . Me m o ry e nhance m e nt s
Transparent Hugepages increase the memory page size from 4 kilobytes to 2 megabytes.
Transparent Hugepages provide significant performance advantages on systems with highly
contended resources and large memory workloads. Additionally, Red Hat Enterprise Linux 6
provides support for utilizing Transparent Hugepages with KSM.
Extended Page Table age bits enables a host to make smarter choices for swapping memory
under memory pressure and allows swapping of Transparent Hugepages by breaking the
extended pages into smaller pages.
28
The new x2api c virtual Advanced Programmable Interrupt Controller (APIC) improves virtualized
x86 _6 4 guest performance by allowing direct guest APIC access and removing the overhead of
emulated access.
New user space notifiers allow the caching of CPU registers, avoiding the computationally
expensive actions of preserving register states of unused components during context switches.
Read copy update (RCU) kernel locking is now uses enhanced symmetric multiprocessing
support. RCU kernel locking provides greater performance for networking functions and multiprocessing systems.
1 5 .1 .3. St o rage
The Q EMU emulated block driver features support for fully asynchronous I/O, pread v and
pwri tev functions. These functions increase performance for storage devices using the QEMU
emulated block driver.
The QEMU Monitor Protocol (QMP) allows applications to communicate with the QEMU Monitor
correctly. QEMU provides a text-based format that can be easily parsed and support for
asynchronous messages and capabilities negotiation.
Indirect ring entries (spin locks) for the para-virtualized (virt io ) driver improve block I/O
performance and allows more concurrent I/O operations.
Virtualized storage devices can now be added and removed (hot plugged) from guests during
runtime.
Support for block alignment storage topology awareness. Underlying storage hardware features
and physical storage sector sizes (for example, 4KB sectors) are presented to guests. This feature
requires compatible storage device information and commands. Guest topology awareness
allows virtualized guests to optimize file system layouts and improved performance of
applications using I/O optimizations.
Performance enhancements for the qcow2 virtualized image format.
1 5 .1 .4 . Ne t wo rking
The vh o st - n et feature moves various network functions from the QEMU user space into the
kernel. vh o st - n et uses fewer context switches and vmexit calls. These enhancements improve
performance of SR-IOV devices, directly assigned network device and other network devices.
MSI-X support which increases the number of interrupts available to network devices. MSI-X
support increases the performance of compatible hardware.
Virtualized network devices can now be hot plugged and hot removed from running guests.
Network boot using gpxe fora more advanced PXE network booting.
29
1 5 .1 .7 . SR-IOV
SR-IOV now supports a raw socket mode. Previously networking interrupts were handled through
software bridging in tap mode. SR-IOV supports assigning logical network interfaces to guests.
SR-IOV, previously, did not support migration. The vhost-net abstraction provides SR-IOV with
transparent assignment and allows migration with non-identical systems.
1 5 .1 .9 . sVirt
sVirt is a new feature included with Red Hat Enterprise Linux 6.0 that integrates SELinux and
virtualization. sVirt applies Mandatory Access Control (MAC) to improve security when using
virtualized guests. sVirt improves security and hardens the system against bugs in the hypervisor
that might be used as an attack vector for the host or to another virtualized guest.
1 5 .1 .1 0 . Migrat io n
Guest ABI stability provides enhanced migration support. Guests PCI device numbers are
preserved during migration and identical PCI device positions are presented after migrating the
guest.
Migration now accounts for CPU models. CPU models allow guests to take advantage of new
processor instruction sets. Guests can be migrated to hosts with a compatible CPU model.
The vhost-net feature allows guests using SR-IOV to migrate to non-identical host configurations
that also use SR-IOV devices.
Enhancements to the migration protocol.
Note
Red Hat Enterprise Linux 6 includes components providing functionality for the Simp le
Pro t o co l f o r In d ep en d en t C o mp u t in g En viro n men t s ( SPIC E) remote display protocol.
These components are only supported for use in conjunction with Red Hat Enterprise
Virtualization products and are not guaranteed to have a stable ABI. The components will be
updated to synchronize with functional requirements of Red Hat Enterprise Virtualization
products. Migration to future releases may require manual operations on a per-system basis.
15.2. Xen
30
Red Hat Enterprise Linux 6 is supported as a Xen guest for the x86 and the AMD 64 and Intel 64
architectures. The para-virtualized operations (pv-ops) are included in the Red Hat Enterprise Linux
6 kernel. The default Red Hat Enterprise Linux 6 kernel can be used as a Xen para-virtualized guest
and as a Xen full virtualized guest on Red Hat Enterprise Linux 5 hosts. Red Hat Enterprise Linux 6
includes the para-virtualized drivers for fully virtualized Xen guest installations.
Red Hat Enterprise Linux 6 is not supported as a Xen host.
Further Reading
The Virtualization Guide details the process to install, configure and manage the virtualization
technologies in Red Hat Enterprise Linux 6.
Important
fi rstai d ki t is considered a Technology Preview in Red Hat Enterprise Linux 6.
31
32
1 8 . Dat abases
17.3. memcached
memcached is a high-performance distributed object caching server that is designed to increase the
performance of dynamic web applications by reducing database load. memcached is a new feature
in this release, and provides bindings for C, PHP, Perl and Python programming languages.
18.2. MySQL
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon
(mysqld) and many client programs and libraries.
This release features version 5.1 of MySQL. For a list of all enhancements that this version provides,
refer to the MySQL Release Notes
33
Lau ra B ailey
R evisio n 1- 0
Wed Au g 12 2010
Initial version of the Red Hat Enterprise Linux 6 Release Notes
R yan Lerch
34