Cari di RHE Linux 
    RHE Linux User Manual
Daftar Isi
(Sebelumnya) 30 : Index - Developer Guide31 : 4. Storage and Filesystem ... (Berikutnya)

Technical Notes

Technical Release Documentation

Red Hat Engineering Content Services

Legal Notice

Copyright © 2010 Red Hat.
The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution-Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version.
Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law.
Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries.
Linux® is the registered trademark of Linus Torvalds in the United States and other countries.
Java® is a registered trademark of Oracle and/or its affiliates.
XFS® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries.
MySQL® is a registered trademark of MySQL AB in the United States, the European Union and other countries.
All other trademarks are the property of their respective owners.


1801 Varsity Drive
RaleighNC 27606-2072 USA
Phone: +1 919 754 3700
Phone: 888 733 4281
Fax: +1 919 754 3701

Daftar Isi

Abstract

Red Hat Enterprise Linux 6.0 Technical notes provide details on various features shipped in Red Hat Enterprise Linux 6.0, as well as all known issues of this release.
1. Installer
1.1. Known Issues
2. Deployment
2.1. Known Issues
3. Virtualization
3.1. Known Issues
4. Storage and Filesystems
4.1. Technology Previews
4.2. Known Issues
5. Networking
5.1. Technology Previews
5.2. Known Issues
6. Clustering
6.1. Technology Previews
6.2. Known Issues
7. Authentication
7.1. Technology Previews
7.2. Known Issues
8. Security
8.1. Technology Previews
9. Devices and Device Drivers
9.1. Technology Previews
9.2. Known Issues
10. Kernel
10.1. Technology Previews
10.2. Known Issues
11. Development and Tools
11.1. Technology Previews
11.2. Known Issues
12. Desktop
12.1. Known Issues
A. Package Manifest
B. Package Updates
B.1. apr
B.1.1. RHSA-2011:0507 - Moderate: apr security update
B.2. apr-util
B.2.1. RHSA-2010:0950 - Moderate: apr-util security update
B.3. autofs
B.3.1. RHBA-2011:0403 - autofs bug fix update
B.4. bind
B.4.1. RHSA-2010:0975 - Important: bind security update
B.5. bzip2
B.5.1. RHSA-2010:0858 - Important: bzip2 security update
B.6. chkconfig
B.6.1. RHBA-2012:0417 - chkconfig bug fix update
B.7. cifs-utils
B.7.1. RHBA-2011:0380 - cifs-utils bug fix update
B.8. cluster
B.8.1. RHBA-2011:1178 - cluster and gfs2-utils bug fix update
B.8.2. RHBA-2011:0361 - cluster and gfs2-utils bug fix update
B.8.3. RHBA-2010:0844 - cluster and gfs2-utils bug fix update
B.9. compat-dapl
B.9.1. RHBA-2011:0343 - compat-dapl bug fix update
B.10. corosync
B.10.1. RHBA-2012:1216 - corosync bug fix update
B.10.2. RHBA-2012:0735 - corosync bug fix update
B.10.3. RHBA-2012:0534 - corosync bug fix update
B.10.4. RHBA-2012:0374 - corosync bug fix update
B.10.5. RHBA-2011:1363 - corosync bug fix update
B.10.6. RHBA-2011:0854 - corosync bug fix update
B.10.7. RHBA-2011:0360 - corosync bug fix update
B.11. cups
B.11.1. RHSA-2010:0866 - Important: cups security update
B.12. cvs
B.12.1. RHSA-2010:0918 - Moderate: cvs security update
B.13. dapl
B.13.1. RHBA-2011:0354 - dapl bug fix and enhancement update
B.14. dbus
B.14.1. RHSA-2011:0376 - Moderate: dbus security update
B.15. device-mapper-multipath
B.15.1. RHBA-2011:1485 - device-mapper-multipath bug fix update
B.15.2. RHBA-2011:0831 - device-mapper-multipath bug fix update
B.15.3. RHBA-2011:0384 - device-mapper-multipath bug fix update
B.15.4. RHBA-2011:0294 - device-mapper-multipath bug fix update
B.15.5. RHBA-2011:0173 - device-mapper-multipath bug fix update
B.16. dhcp
B.16.1. RHSA-2010:0923 - Moderate: dhcp security update
B.16.2. RHSA-2011:0256 - Moderate: dhcp security update
B.16.3. RHSA-2011:0428 - Important: dhcp security update
B.17. dmidecode
B.17.1. RHBA-2011:1396 - dmidecode bug fix update
B.18. dracut
B.18.1. RHEA-2011:0141 - dracut enhancement update
B.18.2. RHBA-2010:0877 - dracut bug fix update
B.19. evince
B.19.1. RHSA-2011:0009 - Moderate: evince security update
B.20. fence-agents
B.20.1. RHBA-2011:0363 - fence-agents bug fix update
B.20.2. RHEA-2010:0904 - fence-agents enhancement update
B.21. firefox
B.21.1. RHSA-2010:0861 - Critical: firefox security update
B.21.2. RHSA-2010:0966 - Critical: firefox security update
B.21.3. RHSA-2011:0310 - Critical: firefox security and bug fix update
B.21.4. RHSA-2011:0373 - Important: firefox security update
B.21.5. RHSA-2011:0471 - Critical: firefox security update
B.22. flash-plugin
B.22.1. RHSA-2010:0867 - Critical: flash-plugin security update
B.23. freetype
B.23.1. RHSA-2010:0864 - Important: freetype security update
B.23.2. RHSA-2010:0889 - Important: freetype security update
B.24. gdb
B.24.1. RHBA-2011:0145 - gdb bug fix update
B.25. gdm
B.25.1. RHSA-2011:0395 - Moderate: gdm security update
B.26. git
B.26.1. RHSA-2010:1003 - Moderate: git security update
B.27. glibc
B.27.1. RHSA-2010:0872 - Important: glibc security and bug fix update
B.27.2. RHSA-2011:0413 - Important: glibc security update
B.27.3. RHBA-2011:1180 - glibc bug fix update
B.27.4. RHBA-2011:0321 - glibc bug fix update
B.28. gpxe
B.28.1. RHBA-2011:0415 - gpxe bug fix update
B.29. hplip
B.29.1. RHSA-2011:0154 - Moderate: hplip security update
B.30. initscripts
B.30.1. RHBA-2010:1004 - initscripts bug fix update
B.31. java-1.5.0-ibm
B.31.1. RHSA-2011:0364 - Critical: java-1.5.0-ibm security update
B.31.2. RHSA-2011:0291 - Moderate: java-1.5.0-ibm security update
B.31.3. RHSA-2011:0169 - Critical: java-1.5.0-ibm security and bug fix update
B.31.4. RHSA-2010:0873 - Critical: java-1.5.0-ibm security update
B.32. java-1.6.0-ibm
B.32.1. RHSA-2011:0357 - Critical: java-1.6.0-ibm security update
B.32.2. RHSA-2011:0290 - Moderate: java-1.6.0-ibm security update
B.32.3. RHSA-2010:0987 - Critical: java-1.6.0-ibm security and bug fix update
B.33. java-1.6.0-openjdk
B.33.1. RHSA-2010:0865 - Important: java-1.6.0-openjdk security and bug fix update
B.33.2. RHSA-2011:0214 - Moderate: java-1.6.0-openjdk security update
B.33.3. RHSA-2011:0281 - Important: java-1.6.0-openjdk security and bug fix update
B.34. java-1.6.0-sun
B.34.1. RHSA-2011:0282 - Critical: java-1.6.0-sun security update
B.35. kabi-whitelists
B.35.1. RHBA-2010:0856 - kabi-whitelists bug fix update
B.36. kdelibs
B.36.1. RHSA-2011:0464 - Moderate: kdelibs security update
B.37. kdenetwork
B.37.1. RHSA-2011:0465 - Important: kdenetwork security update
B.38. kernel
B.38.1. RHSA-2010:0842 - Important: kernel security and bug fix update
B.38.2. RHSA-2011:0007 - Important: kernel security and bug fix update
B.38.3. RHSA-2011:0283 - Moderate: kernel security, bug fix and enhancement update
B.38.4. RHSA-2011:0329 - Important: kernel security update
B.38.5. RHSA-2011:0421 - Important: kernel security and bug fix update
B.38.6. RHSA-2011:0498 - Important: kernel security, bug fix and enhancement update
B.38.7. RHBA-2012:0540 - kernel bug fix update
B.38.8. RHBA-2012:0362 - kernel bug fix update
B.38.9. RHSA-2011:0883 - Important: kernel security and bug fix update
B.38.10. RHBA-2011:1495 - kernel bug fix update
B.38.11. RHBA-2011:1412 - kernel bug fix update
B.38.12. RHBA-2011:1283 - kernel bug fix update
B.39. krb5
B.39.1. RHSA-2010:0863 - Important: krb5 security update
B.39.2. RHSA-2010:0925 - Important: krb5 security and bug fix update
B.39.3. RHSA-2011:0200 - Important: krb5 security update
B.39.4. RHSA-2011:0356 - Important: krb5 security update
B.39.5. RHSA-2011:0447 - Moderate: krb5 security update
B.40. libcap-ng
B.40.1. RHBA-2010:0906 - libcap-ng bug fix update
B.41. libcgroup
B.41.1. RHSA-2011:0320 - Important: libcgroup security update
B.42. libnl
B.42.1. RHBA-2011:0325 - libnl bug fix update
B.43. libtiff
B.43.1. RHSA-2011:0318 - Important: libtiff security update
B.43.2. RHSA-2011:0392 - Important: libtiff security and bug fix update
B.43.3. RHSA-2011:0452 - Important: libtiff security update
B.44. libuser
B.44.1. RHSA-2011:0170 - Moderate: libuser security update
B.45. libvirt
B.45.1. RHSA-2011:0391 - Important: libvirt security update
B.45.2. RHSA-2011:0479 - Moderate: libvirt security and bug fix update
B.45.3. RHBA-2011:0446 - libvirt bug fix update
B.46. libvpx
B.46.1. RHSA-2010:0999 - Moderate: libvpx security update
B.47. lldpad
B.47.1. RHBA-2010:0857 - lldpad bug fix update
B.48. logrotate
B.48.1. RHSA-2011:0407 - Moderate: logrotate security update
B.49. logwatch
B.49.1. RHSA-2011:0324 - Important: logwatch security update
B.50. luci
B.50.1. RHBA-2011:0906 - luci bug fix update
B.50.2. RHBA-2010:0851 - luci bug fix update
B.51. lvm2
B.51.1. RHEA-2010:0994 - lvm2 enhancement update
B.51.2. RHBA-2010:0951 - lvm2 bug fix update and enhancement
B.51.3. RHBA-2010:0849 - lvm2 bug fix update
B.52. mailman
B.52.1. RHSA-2011:0308 - Moderate: mailman security update
B.53. mod_auth_mysql
B.53.1. RHSA-2010:1002 - Moderate: mod_auth_mysql security update
B.54. mysql
B.54.1. RHSA-2011:0164 - Moderate: mysql security update
B.55. net-snmp
B.55.1. RHBA-2010:0901 - net-snmp bug fix update
B.56. NetworkManager
B.56.1. RHBA-2010:0836 - NetworkManager bug fix and enhancement update
B.57. nss
B.57.1. RHSA-2010:0862 - Low: nss security update
B.57.2. RHSA-2011:0472 - Important: nss security update
B.58. nss_db
B.58.1. RHBA-2011:0941 - nss_db bug fix update
B.59. openldap
B.59.1. RHSA-2011:0347 - Moderate: openldap security update
B.60. openoffice.org
B.60.1. RHSA-2011:0183 - Important: openoffice.org security and bug fix update
B.61. openssh
B.61.1. RHBA-2010:0943 - openssh bug fix update
B.62. openssl
B.62.1. RHSA-2010:0888 - Important: openssl security update
B.62.2. RHSA-2010:0979 - Moderate: openssl security update
B.63. openswan
B.63.1. RHSA-2010:0892 - Moderate: openswan security update
B.64. pam
B.64.1. RHSA-2010:0891 - Moderate: pam security update
B.65. pango
B.65.1. RHSA-2011:0180 - Moderate: pango security update
B.65.2. RHSA-2011:0309 - Critical: pango security update
B.66. php
B.66.1. RHSA-2011:0195 - Moderate: php security update
B.67. pidgin
B.67.1. RHSA-2010:0890 - Moderate: pidgin security update
B.68. pixman
B.68.1. RHBA-2010:0905 - pixman bug fix update
B.69. policycoreutils
B.69.1. RHSA-2011:0414 - Important: policycoreutils security update
B.70. polkit
B.70.1. RHSA-2011:0455 - Important: polkit security update
B.71. poppler
B.71.1. RHSA-2010:0859 - Important: poppler security update
B.72. postfix
B.72.1. RHSA-2011:0423 - Moderate: postfix security update
B.73. postgresql
B.73.1. RHSA-2010:0908 - Moderate: postgresql security update
B.73.2. RHSA-2011:0197 - Moderate: postgresql security update
B.74. psmisc
B.74.1. RHBA-2011:0171 - psmisc bug fix update
B.75. python
B.75.1. RHBA-2011:0284 - python bug fix update
B.76. python-dmidecode
B.76.1. RHBA-2011:1157 - python-dmidecode bug fix update
B.77. python-gudev
B.77.1. RHBA-2010:0850 - python-gudev bug fix update
B.78. qemu-kvm
B.78.1. RHSA-2011:0345 - Moderate: qemu-kvm security update
B.78.2. RHBA-2011:0012 - qemu-kvm bug fix update
B.78.3. RHBA-2010:0855 - qemu-kvm bug fix update
B.79. quagga
B.79.1. RHSA-2010:0945 - Moderate: quagga security update
B.79.2. RHSA-2011:0406 - Moderate: quagga security update
B.80. rdesktop
B.80.1. RHSA-2011:0506 - Moderate: rdesktop security update
B.81. resource-agents
B.81.1. RHBA-2010:0835 - resource-agents bug fix update
B.82. rsync
B.82.1. RHSA-2011:0390 - Moderate: rsync security update
B.83. ruby
B.83.1. RHBA-2011:0005 - ruby bug fix update
B.84. samba
B.84.1. RHSA-2010:0860 - Critical: samba security update
B.84.2. RHSA-2011:0305 - Important: samba security update
B.85. scsi-target-utils
B.85.1. RHSA-2011:0332 - Important: scsi-target-utils security update
B.86. selinux-policy
B.86.1. RHBA-2010:0845 - selinux-policy bug fix update
B.87. spice-client
B.87.1. RHEA-2010:0932 - spice-client enhancement update
B.88. spice-xpi
B.88.1. RHSA-2011:0426 - Moderate: spice-xpi security update
B.89. sssd
B.89.1. RHBA-2010:0971 - sssd bug fix update
B.89.2. RHBA-2010:0852 - sssd bug fix update
B.90. subversion
B.90.1. RHSA-2011:0258 - Moderate: subversion security update
B.90.2. RHSA-2011:0328 - Moderate: subversion security update
B.91. sysstat
B.91.1. RHBA-2010:0912 - sysstat bug fix update
B.92. system-config-firewall
B.92.1. RHBA-2010:0942 - system-config-firewall bug fix update
B.93. system-config-users
B.93.1. RHBA-2011:0221 - system-config-users bug fix update
B.94. systemtap
B.94.1. RHSA-2010:0894 - Important: systemtap security update
B.95. tdb-tools
B.95.1. RHEA-2011:1430 - new packages: tdb-tools
B.96. thunderbird
B.96.1. RHSA-2010:0896 - Moderate: thunderbird security update
B.96.2. RHSA-2010:0969 - Moderate: thunderbird security update
B.96.3. RHSA-2011:0311 - Critical: thunderbird security update
B.96.4. RHSA-2011:0374 - Important: thunderbird security and bug fix update
B.96.5. RHSA-2011:0475 - Critical: thunderbird security update
B.97. tomcat6
B.97.1. RHSA-2011:0335 - Important: tomcat6 security and bug fix update
B.98. tuned
B.98.1. RHBA-2010:0847 - tuned bug fix update
B.99. upstart
B.99.1. RHBA-2010:0848 - upstart bug fix update
B.100. util-linux-ng
B.100.1. RHBA-2011:0201 - util-linux-ng bug fix update
B.101. vsftpd
B.101.1. RHSA-2011:0337 - Important: vsftpd security update
B.102. webkitgtk
B.102.1. RHSA-2011:0177 - Moderate: webkitgtk security update
B.103. wireshark
B.103.1. RHSA-2010:0924 - Moderate: wireshark security update
B.103.2. RHSA-2011:0013 - Moderate: wireshark security update
B.103.3. RHSA-2011:0369 - Moderate: wireshark security update
B.104. xguest
B.104.1. RHBA-2010:0853 - xguest bug fix update
B.105. xorg-x11-drv-qxl
B.105.1. RHBA-2010:0917 - xorg-x11-drv-qxl bug fix update
B.106. xorg-x11-drv-wacom and wacomcpl
B.106.1. RHBA-2011:0341 - xorg-x11-drv-wacom and wacomcpl bug fix update
B.107. xorg-x11-server
B.107.1. RHBA-2011:0340 - xorg-x11-server bug fix update
B.108. xorg-x11-server-utils
B.108.1. RHSA-2011:0433 - Moderate: xorg-x11-server-utils security update
B.108.2. RHBA-2011:0453 - xorg-x11-server-utils bug fix update
B.109. yaboot
B.109.1. RHBA-2010:0854 - yaboot bug fix update
B.110. yum
B.110.1. RHBA-2010:0846 - yum bug fix update
B.111. yum-rhn-plugin and rhn-client-tools
B.111.1. RHEA-2010:0949 - yum-rhn-plugin and rhn-client-tools enhancement update
C. Revision History

1. Installer

The Red Hat Enterprise Linux installer (also known as anaconda) assists in the installation of Red Hat Enterprise Linux 6.
Installation on systems with multipath and non-multipath storage devices
Installation of Red Hat Enterprise Linux 6 on a system with multipath and non-multipath storage devices the automatic partitioning layout in the installer may create volume groups containing a mix of multipath and non-multipath devices, thus defeating the purpose of multipath storage.
Users are advised to either select only multipath or only non-multipath devices on the disk selection screen that appears after selecting automatic partitioning. Alternatively, users can select custom partitioning.

1.1. Known Issues

  • The following issue applies to IBM Power Systems only.
    anaconda will not create a new PReP boot partition on the root disk when performing a new Red Hat Enterprise Linux 6 installation on a system that contains existing PReP Boot partitions that need to be preserved. Consequently, the Power SMS boot manager will be unable to boot the new Red Hat Enterprise Linux 6 installation. To work around this issue,
    1. Use the fdisk utility to temporarily change the partition type from type 41 'PReP Boot' to type 83 'Linux' for all existing Linux installations on the system.
    2. Perform the Red Hat Enterprise Linux 6 installation. During installation, a new PReP Boot partition will be created on the Red Hat Enterprise Linux 6 root disk.
    3. Post-installation, once the new Red Hat Enterprise Linux 6 installation is up and running, use the fdisk utility to restore all changed partition types to type 41 'PReP Boot'.
  • Anaconda now utilizes NetworkManager for network interface configuration. Consequently, kickstart users that referenced the network settings located in /tmp/netinfo must now source the ifcfg files found in /etc/sysconfig/network-scripts
  • In some circumstances, disks that contain a whole disk format (e.g. a LVM Physical Volume populating a whole disk) are not cleared correctly using the clearpart --initlabel kickstart command. Adding the --all switch - as in clearpart --initlabel --all - ensures disks are cleared correctly.
  • The nodmraid boot parameter currently cannot be used to force installation on disks containing spurious BIOS RAID metadata. To work around this issue, boot into rescue mode and run the command dmraid -rE /dev/sdX on the disks in question. Alternatively, run dd if=/dev/zero of=/dev/sdX and let it process up until the end of the disk. Note, however that this alternate procedure may take longer to complete and will erase all data on the disk.
  • Installation of Red Hat Enterprise Linux 6 on an IBM ThinkPad T43 notebook may appear to stall after choosing storage options. In these circumstances, the installer is attempting to interact with the floppy drive, and may be unresponsive for up to 30 minutes.
  • During the installation on POWER systems, the error messages similar to:
    attempt to access beyond end of deviceloop0: rw=0, want=248626, limit=248624
    may be returned to sys.log. The errors do not prevent installation and only occur during initial setup. The filesystem created by the installer will function correctly.
  • Installation on large disks (i.e. more than 2TB) on non-EFI platforms may encounter some limitations. Many BIOS systems can only boot disks that contain MSDOS partition tables, which cannot fully address large disks. A GPT partition table can address the full disk, but may not be bootable from BIOS. Consequently, the Red Hat Enterprise Linux installer does not support installing the GRUB bootloader to disks that contain GPT partition tables on non-EFI systems. When installing Red Hat Enterprise Linux 6 on a non-EFI system that contains one or more large disks, create a GPT partition table on each of the disks before proceeding to the storage configuration portion of the install process. Leaving the large disks uninitialized, or using an MSDOS partition table on them, can cause problems when creating partitions using anaconda.
  • Some Cisco UCS storage devices do not have UEFI support, which may lead to an unbootable Red Hat Enterprise Linux 6 system when installation is performed through virtual media with the system in "strict UCSM boot order rules" mode. Consequently, when installing using the UEFI method, after installation and reboot, the system will hang with a flashing cursor. To work around this issue, install the system using the BIOS install method as follows:
    1. Map the Red Hat Enterprise Linux 6 "boot.iso" file or entire OS DVD ISO using the virtual media tool
    2. Press F2 during boot to enter the BIOS setup screen
    3. Go to the "Boot Options" screen
    4. Change "UCSM boot order rules" to "Loose"
    5. Save settings and reboot
    6. Press F6 to access the boot device menu
    7. In the menu will be two options for the virtual media: "Cisco Virtual CD/DVD 1.20" and "EFI: Cisco Virtual CD/DVD 1.20 CDROM File1" select the first option to install using BIOS method. Note that only the first option will be present if using the "boot.iso" file, as it has no UEFI support.
    8. It may be necessary to re-order the devices in the BIOS Options screen after "Loose" mode has been selected in order to make the hard drive mapped to the system the first device in the boot order.
    The use of BIOS install method will effectively work around the bug, but will prevent booting from disks using a GPT partition table. This will restrict the size of disks usable as a boot disk.
  • When installing on the s390x architecture, if the installation is being performed over SSH, avoid resizing the terminal window containing the SSH session. If the terminal window is resized during installation, the installer will exit and installation will terminate.
  • Multipath storage devices with serial numbers not exactly 16 or 32 characters in length will not be detected by anaconda during installation.
  • Due to an issue with the shutdown sequence of the installer, Intel BIOS RAID sets might be left in an unclean condition post installation. Consequently, they will be rebuilt during the first boot of the system after installation. Note that this issue has no impact other than a slower first boot up after installation.
  • The installer currently does not support having the /boot volume on a logical volume. Consequently, when setting up mount points during installation, the /boot volume cannot be on an LVM volume. System z supports /boot on an LVM volume. In order to exploit this, manual configuration after installation is required. Refer to the zipl documentation for further information.
  • Minimal installations lack NetworkManager, so users wishing to have network interfaces configured for use on the first boot after installation need to make sure the network interfaces are configured and the network service is enabled at boot time. The following kickstart commands will enable eth0 for DHCP and enable the 'network' service:
    network --device eth0 --onboot yes --bootproto dhcpservices --enabled=network
    Refer to the network device configuration documentation for more details on what the ifcfg-ethX files may contain.
  • The kernel image provided on the CD/DVD is too large for Open Firmware. Consequently, on the POWER architecture, directly booting the kernel image over a network from the CD/DVD is not possible. Instead, use yaboot to boot from a network.
  • The anaconda partition editing interface includes a button labeled Resize. Note that you can only shrink a partition with this button, not enlarge a partition.
  • System z installations cannot use the ext4 filesystem for the boot partition. The recommended alternative filesystem is ext3.
  • Channel IDs(read, write, data) for network devices are required for defining and configuring network devices on s390 systems. However, system-config-kickstart - the graphical user interface for generating a kickstart configuration - cannot define channel IDs for a network device. To work around this issue, manually edit the kickstart configuration that system-config-kickstart generates to include the desired network devices.
  • During an MPATH installation on IBM POWER 7 systems, a "DiskLabelCommit Error" might be returned. To work around this issue, first install the system in a single path configuration. Connect to the system via SSH, clear the partitions using the fdisk -l command, and delete the partitions, then exit the SSH session. Finally, continue the installation from the installer.
  • anaconda in Red Hat Enterprise Linux 6 for Power writes an incorrect value to /etc/rpm/macros that can cause issues when installing 32 and 64-bit PowerPC packages together. Users are advised to remove this file after installation.

2. Deployment

Upstart
In Red Hat Enterprise Linux 6, init from the sysvinit package has been replaced with Upstart, an event-based init system. This system handles the starting of tasks and services during boot, stopping them during shutdown and supervising them while the system is running. For more information on Upstart itself, refer to the init(8) man page.
Processes are known to Upstart as jobs and are defined by files in the /etc/init directory. Upstart is very well documented via man pages. Command overview is in init(8) and job syntax is described in init(5).
Upstart provides the following behavioral changes in Red Hat Enterprise Linux 6:
  • The /etc/inittab file is deprecated, and is now used only for setting up the default runlevel via the initdefault line. Other configuration is done via upstart jobs in the /etc/init directory.
  • The number of active tty consoles is now set by the ACTIVE_CONSOLES variable in /etc/sysconfig/init, which is read by the /etc/init/start-ttys.conf job. The default value is ACTIVE_CONSOLES=/dev/tty[1-6], which starts a getty on tty1 through tty6.
  • A serial getty is still automatically configured if the serial console is the primary system console. In prior releases, this was done by kudzu, which would edit /etc/inittab. In Red Hat Enterprise Linux 6, configuration of the primary serial console is handled by /etc/init/serial.conf.
  • To configure a getty running on a non-default serial console, you must now write an Upstart job instead of editing /etc/inittab. For example, if a getty on ttyS1 is desired, the following job file (/etc/init/serial-ttyS1.conf) would work:
    # This service maintains a getty on /dev/ttyS1.start on stopped rc RUNLEVEL=[2345]stop on starting runlevel [016]respawnexec /sbin/agetty /dev/ttyS1 115200 vt100-nav
As in prior releases, you should still make sure that ttyS1 is in /etc/securetty if you wish to allow root logins on this getty.
There are some features from prior releases that are not supported in the move to Upstart. Among these are:
  • Custom runlevels 7, 8 and 9. These custom runlevels can no longer be used.
  • Using /etc/shutdown.allow for defining who can shut the machine down.
System z Performance
Some of the default tunables in Red Hat Enterprise Linux 6 are currently not optimally configured for System z workloads. Under most circumstances, System z machines will perform better using the following recommendations.
Dirty Ratio
It is recommended that the dirty ratio be set to 40 (Red Hat Enterprise Linux 6 default 20) Changing this tunable tells the system to not spend as much process time too early to write out dirty pages. Add the following line to /etc/sysctl.conf to set this tunable:
vm.dirty_ratio = 40
Scheduler
To increase the average time a process runs continuously and also improve the cache utilization and server style workload throughput at minor latency cost it is recommended to set the following higher values in /etc/sysctl.conf.
kernel.sched_min_granularity_ns = 10000000kernel.sched_wakeup_granularity_ns = 15000000kernel.sched_tunable_scaling = 0kernel.sched_latency_ns = 80000000
Additionally, deactivating the Fair-Sleepers feature improves performance on a System z machine. To achieve this, set the following value in /etc/sysctl.conf
kernel.sched_features = 15834234
False positive hung task reports
It is recommended to prevent false positive hung task reports (which are rare, but might occur under very heavy overcommitment ratios). This feature can be used, but to improve performance, deactivate it by default by setting the following parameter in /etc/sysctl.conf:
kernel.hung_task_timeout_secs = 0
irqbalance service on the POWER architecture
On POWER architecture, the irqbalance service is recommended for automatic device Interrupt Request (IRQ) distribution across system CPUs to ensure optimal I/O performance. The irqbalance service is normally installed and configured to run during Red Hat Enterprise Linux 6 installation. However, under some circumstances, the irqbalance service is not installed by default. To confirm that the irqbalance service is running, execute the following command as root:
service irqbalance status
If the service is running, command will return a message similar to:
irqbalance (pid  1234) is running...
However, if the message lists the service as stopped, execute the following commands as root to start the irqbalance service:
service irqbalance startchkconfig --level 345 irqbalance on
If the output of the service irqbalance status command lists irqbalance as an unrecognized service, use yum to install the irqbalance package, and then start the service.
yum install irqbalanceservice irqbalance start

Note

The system does not need to be restarted after starting the irqbalance service
Setting the console log level
Use of the LOGLEVEL parameter in /etc/sysconfig/init to set the console loglevel is no longer supported. To set the console loglevel in Red Hat Enterprise Linux 6, pass loglevel=<number>' as a boot time parameter.
Upgrading from previous pre-release versions
Upgrading to Red Hat Enterprise Linux 6 from Red Hat Enterprise Linux 5 or from previous pre-release versions of Red Hat Enterprise Linux 6 is not supported. If an upgrade of this type is attempted issues may be encountered including upgrading Java/OpenJDK packages. To work around this, manually remove the old packages and reinstall.

2.1. Known Issues

  • When a system is configured to require smart card authentication, and there is no smartcard currently plugged into the system, then users might see the debug message:
    ERROR: pam_pkcs11.c:334: no suitable token available'
    This message can be safely ignored.
  • Red Hat Enterprise Linux 6 Beta features Dovecot version 2.0. The configuration files used by Dovecot 2.0 are significantly different from those found in dovecot 1.0.x, the version shipped in previous releases of Red Hat Enterprise Linux. Specifically, /etc/dovecot.conf has been split into /etc/dovecot/dovecot.conf and /etc/dovecot/conf.d/*.conf
  • Under some circumstances, the readahead service may cause the auditd service to stop. To work around this potential issue, disable the readahead collector by adding the following lines to the /etc/sysconfig/readahead configuration file:
    READAHEAD_COLLECT="no"READAHEAD_COLLECT_ON_RPM="no"
    Alternatively, the readahead package can be removed entirely.
  • An error exists in the communication process between the samba daemon and the Common Unix Printing System (CUPS) scheduler. Consequently, the first time a print job is submitted to a Red Hat Enterprise Linux 6 system via Server Message Block (SMB), a timeout will occur. To work around this issue, use the following command to create a CUPS certificate before the first print job is submitted:
    lpstat -E -s
  • Under some circumstances, using the rhn_register command to register a system with the Red Hat Network (RHN) might fail. When this issue is encountered, the rhn_register command will return an error similar to:
    # rhn_registerSegmentation fault (core dumped)or# rhn_register***MEMORY-ERROR***: rhn_register[11525]: GSlice: assertion failed:sinfo->n_allocated > 0Aborted (core dumped)
    To work around this issue, set the following environment variable, then run the rhn_register command again:
    G_SLICE=always-malloc
  • If a user has a .bashrc which outputs to stderr, the user will be unable to sftp into their account. From the user's point of view, the sftp session is immediately terminated after authentication.

2.1.1. Architecture Specific Known Issues

2.1.1.1. System z
The minimum hardware requirement to run Red Hat Enterprise Linux Beta is IBM System z9 (or better). The system may not IPL (i.e. boot) on earlier System Z hardware (e.g. z900 or z990)
2.1.1.2. IBM POWER (64-bit)
  • When network booting an IBM POWER5 series system, you may encounter an error such as:
    DEFAULT CATCH!, exception-handler=fff00300
    If the path that locates the kernel and ramdisk is greater than 63 characters long, it will overflow a firmware buffer and the firmware will drop into the debugger.
    POWER6 and POWER7 firmware includes a correction for this problem. Note that IBM POWER5 series is not a supported system.
  • On some machines yaboot may not boot, returning the error message:
    Cannot load ramdisk.image.gz: Claim failed for initrd memory at 02000000 rc=ffffffff
    To work around this issue, change real-base from to c00000. Real-base can be obtained from OpenFirmware prompt with the printenv command and set with setenv command.
  • Remote installs on IBM BladeCenter JS22 servers may encounter the following error message:
    No video available. Your server may be in an unsupported resolution/refresh rate.
    To work around this issue, specify the following GUI parameters:
    video=SVIDEO-1:d radeon.svideo=0
  • Some HP Proliant servers may report incorrect CPU frequency values in /proc/cpuinfo or /sys/device/system/cpu/*/cpufreq. This is due to the firmware manipulating the CPU frequency without providing any notification to the operating system. To avoid this ensure that the "HP Power Regulator" option in the BIOS is set to "OS Control". An alternative available on more recent systems is to set "Collaborative Power Control" to "Enabled".
  • filecap crashes with a segmentation fault when run directly on an empty file. For example:
    # filecap /path/to/empty_fileSegmentation fault (core dumped)
    To work around this, run filecap on the directory that contains the empty file, and search the results for the required information. For example:
    filecap /path/to/ | grep empty_file
  • A change in the package that the sos tool uses to determine the installed version of Red Hat Enterprise Linux will cause the tool to incorrectly identify the major release version. This adversely impacts a small number of non-default sos plugins and may cause incomplete information to be captured from the system when these plugins are enabled. The affected plugins are:
    • general (only when using the non-default all_logs option)
    • cluster (diagnostics may not be run)
    Users affected by this problem should retrieve any missing data manually from systems.

3. Virtualization

Para Virtualization on Hardware Virtualized Machines (PV on HVM)
Red Hat Enterprise Linux 6 guests under Red Hat Enterprise Linux 5 Xen hosts can now utilize the PV on HVM drivers to improve the performance of I/O on virtualized network devices (xen-vnif) and virtualized block storage devices.
To enable Xen PV on HVM support in a Red Hat Enterprise Linux 6 HVM guest, add the following to the kernel boot command line:
   xen_pv_hvm=enable
Note, however, that due to conflicts with network configuration scripts, it is recommended that the xen guest vif specification set 'type=netfront' if the emulated rtl8139 device is not desired as the primary network interconnect.
virtio network device packet transmission algorithms
The virtio network device has two available algorithms for transmitting packets. The default is to use an asynchronous bottom half transmitter which typically shows good performance for all workloads. The alternate implementation uses a timer to delay transmit in an attempt to batch multiple packets together. The timer approach typically results higher latency, but may improve overall efficiency. To change from the default algorithm to the timer based approach, use the following procedure to create a wrapper script around qemu-kvm and specify it as the emulator for guests that require it.
  1. create the wrapper script
    $ cat > /usr/libexec/qemu-kvm.txtimer << EOF#!/bin/shexec /usr/libexec/qemu-kvm \`echo "\$@" | sed's|virtio-net-pci|virtio-net-pci,tx=timer|g'\`EOF
  2. Make script executable
    $ chmod 755 /usr/libexec/qemu-kvm.txtimer
  3. Set selinux permissions
    $ restorecon /usr/libexec/qemu-kvm.txtimer
  4. Create selinux module
    $ cat > qemutxtimer.te << EOFpolicy_module(qemutxtimer, 1.0)gen_require(\` attribute virt_domain; type qemu_exec_t;')can_exec(virt_domain, qemu_exec_t)EOF
  5. Build selinux module
    $ make -f /usr/share/selinux/devel/Makefile
  6. Install selinux module
    $ semodule -i qemutxtimer.pp # May later be uninstalled with -r
  7. Update guest XML to use qemu-kvm wrapper
    $ virsh edit $GUEST
    Replace:
     <emulator>/usr/libexec/qemu-kvm</emulator>
    With:
     <emulator>/usr/libexec/qemu-kvm.txtimer</emulator>

3.1. Known Issues

  • Under some circumstances, installation of a Red Hat Enterprise Linux 6 virtual guest stalls after the optional testing of media. Note that this issue has only been observed with Red Hat Enterprise Linux 6 guests that utilize multiple virtualized CPUs. To work around this issue, use a media source that is known to be verified, and skip the media test, or use a single virtualized CPU during installation.
  • Cancelling the disk physical cache for block devices and use of barriers for filesystems may slow down qcow2 dramatically. Use the following command to reduce the frequency of sync requests by pre-allocating new images and setting the cluster size to 2M
    ./qemu-img create  -opreallocation=metadata -ocluster_size=2M -f qcow2 $DISK $SIZE
  • In earlier versions of Red Hat Enterprise Linux, libvirt permitted PCI devices to be insecurely assigned to guests. In Red Hat Enterprise Linux 6, assignment of insecure devices is disabled by default by libvirt. However, this may cause assignment of previously working devices to start failing. To enable the old, insecure setting, edit /etc/libvirt/qemu.conf, set "relaxed_acs_check = 1", and restart libvirtd. Note that this action will re-open possible security issues.
  • Users upgrading from pre-release versions of Red Hat Enterprise Linux 6 (i.e. the virt-v2v versions less than virt-v2v-0.6.2-2.el6) may be required to update the default virt-v2v configuration file. Specifically, the 'viostor' app for Windows guests is replaced by the 'virtio' app, which now points to the directory containing the complete driver. Refer to the updated default configuration file for further details.
  • I/O Advanced Programmable Interrupt Controller (I/O APIC) timer interrupts are not emulated as non-maskable interrupts (NMIs) to virtualized guests. Consequently, if a virtualized guest uses the kernel parameter nmi_watchdog=1, the guest kernel will panic on boot.
  • The balloon service on Windows 7 guests can only be started by the "Administrator" user.
  • Direct Asynchronous IO (AIO) that is not issued on filesystem block boundaries, and falls into a hole in a sparse file on ext4 or xfs filesystems, may corrupt file data if multiple I/O operations modify the same filesystem block. Specifically, if qemu-kvm is used with the aio=native IO mode over a sparse device image hosted on the ext4 or xfs filesystem, guest filesystem corruption will occur if partitions are not aligned with the host filesystem block size. Generally, do not use aio=native option along with cache=none for QEMU. This issue can be avoided by using one of the following techniques:
    1. Align AIOs on filesystem block boundaries, or do not write to sparse files using AIO on xfs or ext4 filesystems.
    2. KVM: Use a non-sparse system image file or allocate the space by zeroing out the entire file.
    3. KVM: Create the image using an ext3 host filesystem instead of ext4.
    4. KVM: Invoke qemu-kvm with aio=threads (this is the default).
    5. KVM: Align all partitions within the guest image to the host's filesystem block boundary (default 4k).
  • On Red Hat Enterprise Linux 6 KVM virtual guests, unmounting a filesystem on an mdraid volume does not immediately free the underlying device for the mdadm --stop operation. Consequently, during installation on a system with pre-existing mdraid volumes the following error can appear while anaconda is looking for storage devices:
    MDRaidError: mddeactivate failed for /dev/md1: 08:26:59,485 ERROR   : Perhaps arunning process, mounted filesystem or active volume group?
    To work around this issue, erase all data on the volume before installation by clearing the first several sectors of the volume with zeros.
  • Libvirt uses transient iptables rules for managing NAT or bridging to virtual machine guests. Any external command that reloads iptables state ( such as running system-config-firewall) will overwrite the entries needed by libvirt. Consequently, after running any command or tool that changes the state of iptables, guests may lose access the network. To work around this issue, use the command 'service libvirt reload' to restore libvirt's additional iptables rules.
  • Adding an rtl8139 NIC to an active Windows 2008 guest may result in the qemu-kvm process exiting. To work around this issue, shutdown the guest before adding additional rtl8139 NICs. Alternatively, install the virtio-net drivers and add a virtio NIC.
  • KVM users with a mix of virtio and ata disks should verify the boot device that anaconda chooses during installation. To verify the boot device, locate the "Install Target Devices" list in the disk selection screen that follows the partitioning type screen. Verify the boot device selection, which is indicated by a selector in the left-most column of the "Install Target Devices" list.
  • When installing Red Hat Enterprise Linux 6 as a new KVM guest, installer may incorrectly report amount of free memory available. Consequently, installation may terminate or switch to the text user interface. To work around this issue, increase amount of RAM allocated for the guest to 128 MB more than specified for the architecture and installation method.
  • A Windows virtual machine must be restarted after the installation of the kernel windows driver framework. If the virtual machine is not restarted it may crash when a memory balloon operation is performed.
  • Under some circumstances, if an 82576 Network driver (igb) is reloaded with the max_vfs=8 parameter and an uncorrectable PCIe AER error is seen on its port, the operation will hang or crash the host system. This error has been encountered with two 82576 devices connected via an IDT PES12N3A PCI Express Switch (rev 0c) plugged into a Westmere-EP's 5520/5500/X58 I/O Hub PCI Express Root Port 3. Note that other 82576 devices and IDT switches have worked in other Westmere-based systems
    If the error occurs, two workarounds have been found to enable the use of all eight virtual functions (VFs) for guest virtual machines(VMs):
    1. Reload the 82576 driver with max_vfs=1, then unload, then reload with max_vfs=8. For example:
      rmmod igbmodprobe igb max_vfs=1rmmmod igbvfrmmod igbmodprobe igb max_vfs=8
    2. If PCI AER functionality is not needed in the host, boot the kernel with the parameter setting: pci=noaer
  • A dual function, 82576 interface (codename: Kawela, PCI Vendor/Device ID: 8086:10c9) cannot have both physical functions (PF's) device-assigned to a Windows 2008 guest. Either physical function can be device assigned to a Windows 2008 guest (PCI function 0 or function 1), but not both.
  • virt-v2v is able to convert guests running on ESX server. A current limitation in virt-v2v means that if an ESX guest has a disk with a snapshot, the snapshot must be on the same datastore as the underlying disk storage. If the snapshot and underlying storage are on different datastores, virt-v2v will report a 404 error while trying to retrieve the storage.
  • Under some circumstances, the virtio queue will fill if an application on a guest repeatedly writes to a virtio-serial character device while the host is not processing the queue. Consequently, the guest will enter an infinite loop and appear to be hung. Once the host side of the character device is read from, the guest will return to normal functionality.
  • The qemu-kvm options to enable VMware device emulation are not functional or supported in Red Hat Enterprise Linux 6.
  • Avoid running guestfish (without the --ro option), virt-edit, virt-tar (in upload mode), virt-win-reg (in merge mode) or guestmount (without the --ro option) on live virtual machine disks. If any of these tools are used on live virtual machines, disk corruption might occur.
(Sebelumnya) 30 : Index - Developer Guide31 : 4. Storage and Filesystem ... (Berikutnya)