SUSE Linux Enterprise Server for SAP applications Release Notes #
SUSE Linux Enterprise Server for SAP applications is the leading Linux platform for SAP HANA, SAP NetWeaver, and SAP S/4HANA applications that provides optimized performance, reduced downtime, and faster SAP landscape deployments. It includes features to secure SAP HANA systems and ease the transition to SAP S/4HANA for systems administrators. SUSE Linux Enterprise Server for SAP applications combines SUSE Linux Enterprise Server and SUSE Linux Enterprise High Availability with additional software specifically meant to simplify running and managing SAP applications. This document provides an overview of high-level general features, capabilities and limitations of SUSE Linux Enterprise Server for SAP applications and important product updates.
1 About the release notes #
These Release Notes are identical across all architectures, and the most recent version is always available online at https://www.suse.com/releasenotes.
Entries are only listed once but they can be referenced in several places if they are important and belong to more than one section.
Release notes usually only list changes that happened between two subsequent releases. Certain important entries from the release notes of previous product versions are repeated. To make these entries easier to identify, they contain a note to that effect.
However, repeated entries are provided as a courtesy only. Therefore, if you are skipping one or more service packs, check the release notes of the skipped service packs as well. If you are only reading the release notes of the current release, you could miss important changes.
1.1 Documentation and other information #
For the most up-to-date version of the documentation for SUSE Linux Enterprise Server for SAP applications, see:
2 SUSE Linux Enterprise Server for SAP applications Version 16.0 #
These release notes apply to SUSE Linux Enterprise Server for SAP applications 16.0.
2.1 Changes affecting all architectures #
We now provide a unified image that can be used to install either SLES or SLES for SAP
2.1.1 Simplified SBD management #
A new crm sbd command has been added in order to simplify SBD management.
It can:
display the real-time SBD status and the static SBD configuration
manage the configuration file for both disk-based and diskless SBD scenarios, and the on-disk metadata for the disk-based scenario
There is also a crm maintenance command which can help with advanced tasks like kernel crashdump configuration procedure.
2.1.2 Resource agent removal #
Some resource agents have been removed from the resource-agent package:
ldirectordsfex_*HA-related part of IPVS
conntrack-toolsdependency fromha_slespattern
2.1.3 saptune base tuning #
The saptune package will enable base tuning upon installation.
Base tuning only will be enabled if saptune was not configured before (no SAP Notes or Solutions selected).
2.1.4 hostname command behavior difference #
On SLES 15 SP6, the hostname command returns the short hostname by default.
However, on SUSE Linux Enterprise Server for SAP applications 16.0, the hostname command returns the fully qualified domain name by default.
This difference in default behavior might cause issues in installation scripts that rely on a specific output format of the hostname command without using options like -s or -A.
Scripts should be reviewed to explicitly request the desired hostname format using hostname -s for the short hostname or hostname -A for the fully qualified domain name to ensure consistent behavior across different SUSE Linux Enterprise Server for SAP applications versions.
2.2 Changes affecting all architectures (Beta 4) #
This section contains information specific to Beta4. We are working on fixing the problems mentioned here. The content of this section will be removed for the final released product.
2.2.1 /etc/init.d not found #
When installing SAP HANA or SAP NetWeaver, the following error is shown:
Installation of SAP HANA Database System failed.
Installation of SAP HANA Database failed
Installation failed
error installing
Cannot create system
Cannot copy file /hana/shared/PBO/global/hdb/saphostagent_setup/sapinit' => '/etc/init.d/sapinit'
Destination directory /etc/init.d not found: No such file or directoryThis is due to the removal of SysV init script support.
As a workaround, create the /etc/init.d directory.
2.2.2 SELinux enforcing mode causes error during SAP HANA installation #
When installing SAP HANA, the following error is shown:
Installing SAP Host Agent version 7.22.62...
Starting SAP HANA Database system...
Installation of SAP HANA Database System failed.
Installation of SAP HANA Database failed
Installation failed
error installing
Cannot create Instance
Cannot start system
Start instance 00 on host 'susetest' (worker) failed.
Cannot establish http connection to unix domain socket '/tmp/.sapstream50013' (No such file or directory)
Check the log file for SAP HANA Database error messagesAs a workaround, run these commands:
Run these commands after operating system installation:
semanage boolean -m --on selinuxuser_execmod semanage boolean -m --on unconfined_service_transition_to_unconfined_user semanage permissive -a snapper_grub_plugin_t restorecon -R /Install SAP Workload or SAP HANA
Run
restorecon -R /.
If you are on a transactional system, run this instead of restorecon -R /: touch /etc/selinux/.autorelabel.
2.2.3 Missing /etc/services file causes NetWeaver installation failure #
Installing NetWeaver can result in the following error:
>ERROR 2025-01-22 16:07:29.467 (root/sapinst) (startInstallation) [CSiStepExecute.cpp:1104] id=controller.stepExecuted errno=FCO-00011 >CSiStepExecute::execute() >The step createPorts with step key >|NW_ABAP_ASCS|ind|ind|ind|ind|0|0|NW_System|ind|ind|ind|ind|system|0|NW_SAPHostAgent|ind|ind|ind|ind|hostagent|0|createPorts was executed with status ERROR (Last error reported by the step: Node /etc/services does not exist).
Accessing /etc/services is considered a software bug and should be fixed in the affected software.
As a temporary workaround, an empty /etc/services file will be added later.
If you need to work around this problem earlier, create the file manually: touch /etc/services.
2.3 Changes affecting all architectures (Beta2) #
This section contains information specific to Beta2. We are working on fixing the problems mentioned here. The content of this section will be removed for the final released product.
2.3.1 Not possible to SSH after installation #
After installation of SUSE Linux Enterprise Server for SAP applications, SSH is not enabled by default.
To enable SSH during installation, provide a SSH public key for the root user.
This behavior differs between SUSE Linux Enterprise Server and SUSE Linux Enterprise Server for SAP Applications.
In SUSE Linux Enterprise Server, SSH is enabled by default during installation even if public key for root is not provided.
2.4 Removed and deprecated features and packages #
This section lists features and packages that were removed from SUSE Linux Enterprise Server for SAP applications or will be removed in upcoming versions.
2.4.1 Removed features and packages #
The following features and packages have been removed in this release.
SAPHanaSRandSAPHanaSR-scaleouthave been removed. UseSAPHanaSR-angiinstead.
3 What’s new? #
3.1 Package and module changes in 16.0 #
The full list of changed packages compared to 15 SP7 can be seen at this URL:
https://documentation.suse.com/package-lists/sle/16.0/package-changes_SLE-15-SP7-GA_SLE-16.0-GA.txt
The full list of changed modules compared to 15 SP7 can be seen at this URL:
https://documentation.suse.com/package-lists/sle/16.0/module-changes_SLE-15-SP7-GA_SLE-16.0-GA.txt
4 Support and lifecycle #
SUSE Linux Enterprise Server is backed by award-winning support from SUSE, an established technology leader with a proven history of delivering enterprise-quality support services.
The current version (16.0) will be fully maintained and supported until 31 Jul 2034.
If you need additional time to design, validate and test your upgrade plans, Long Term Service Pack Support can extend the support duration. You can buy an additional 12 to 36 months in twelve month increments. This means that you can receive support up to Dec 2037.
For more information, see the pages Support Policy and Long Term Service Pack Support.
4.1 Support statement for SUSE Linux Enterprise Server #
To receive support, you need an appropriate subscription with SUSE. For more information, see https://example.com/support.
The following definitions apply:
- L1
Problem determination, which means technical support designed to provide compatibility information, usage support, ongoing maintenance, information gathering, and basic troubleshooting using the documentation.
- L2
Problem isolation, which means technical support designed to analyze data, reproduce customer problems, isolate the problem area, and provide a resolution for problems not resolved by Level 1 or prepare for Level 3.
- L3
Problem resolution, which means technical support designed to resolve problems by engaging engineering to resolve product defects which have been identified by Level 2 Support.
For contracted customers and partners, SUSE Linux Enterprise Server is delivered with L3 support for all packages, except for the following:
Technology Previews, see Section 4.3, “Technology previews”
Sound, graphics, fonts and artwork
Packages that require an additional customer contract, see Section 4.2.1, “Software requiring specific contracts”
Some packages shipped as part of the module Workstation Extension are L2-supported only
Packages with names ending in
-devel(containing header files and similar developer resources) will only be supported together with their main packages.
SUSE will only support the usage of original packages. That is, packages that are unchanged and not recompiled.
4.2 General support #
To learn about supported features and limitations, refer to the following sections in this document:
4.2.1 Software requiring specific contracts #
Certain software delivered as part of SUSE Linux Enterprise Server may require an external contract.
Check the support status of individual packages using the RPM metadata that can be viewed with rpm, zypper, or YaST.
Major packages and groups of packages affected by this are:
PostgreSQL (all versions, including all subpackages)
4.2.2 Software under GNU AGPL #
SUSE Linux Enterprise Server 16.0 (and the SUSE Linux Enterprise modules) includes the following software that is shipped only under a GNU AGPL software license:
Ghostscript (including subpackages)
velociraptorandvelociraptor-clientzypp-boot-plugin
SUSE Linux Enterprise Server 16.0 (and the SUSE Linux Enterprise modules) includes the following software that is shipped under multiple licenses that include a GNU AGPL software license:
MySpell dictionaries and LightProof
ArgyllCMS
4.3 Technology previews #
Technology previews are packages, stacks, or features delivered by SUSE to provide glimpses into upcoming innovations. Technology previews are included for your convenience to give you a chance to test new technologies within your environment. We would appreciate your feedback! If you test a technology preview, contact your SUSE representative and let them know about your experience and use cases. Your input is helpful for future development.
Technology previews come with the following limitations:
Technology previews are still in development. Therefore, they may be functionally incomplete, unstable, or in other ways not suitable for production use.
Technology previews are not supported.
Technology previews may only be available for specific hardware architectures. Details and functionality of technology previews are subject to change. As a result, upgrading to subsequent releases of a technology preview may be impossible and require a fresh installation.
Technology previews can be removed from a product at any time. This may be the case, for example, if SUSE discovers that a preview does not meet the customer or market needs, or does not comply with enterprise standards.
4.3.1 Agentic AI #
As technology preview, an AI agent using Model Context Protocol (MCP) standard called mcphost is available in SUSE Linux Enterprise Server 16.0.
By default, it will be configured with no permissions. To start using it, you need to configure permissions according to your needs and connect it to your LLM of choice.
4.3.2 lklfuse #
As technology preview, lklfuse is available in SUSE Linux Enterprise Server 16.0.
lklfuse is intentionally built without Btrfs support.
Btrfs filesystems can be multi-device (for example, RAID1) but lklfuse currently only supports a single device per mount.
5 Changes affecting all architectures #
rasdaemonhas been updated to version 8.3.0. This version supports machine checks related to CXL memory.We now provide Grafana Alloy which can integrate with SUSE Observability as well.
NetworkManageris now the only network configuration stack in SUSE Linux Enterprise Server 16.0.We now provide a unified image that can be used to install either SLES or SLES for SAP
5.1 Blank screen after installation #
This is most likely due to the Nouveau open-source Nvidia driver being used and not working properly. As a workaround, first disable Nouveau before installation by adding this kernel parameter:
rd.driver.blacklist=nouveau
Then install the proprietary NVIDIA driver.
5.2 Userspace live patching #
Currently, libpulp supports ULP (user space live patching) of glibc and openssl binaries on the following architectures:
x86-64
ppc64le
For more information see https://documentation.suse.com/sles/15-SP7/html/SLES-all/cha-ulp.html
5.3 Switch to mountfd API in util-linux #
The util-linux mount command has switched from the old string-based method to the new kernel mountfd API.
This change introduces new features but also comes with some minor incompatibilities.
There is a special case that cannot be handled by mountfd and needs to be handled by applications:
mountfddiscriminates between the physical mount layer and the virtual mount layeronce the physical mount layer is read-only, read-write mount on the virtual layer is not possible
If the first mount is read-only, then the physical filesystem is mounted read-only, and later mounting of the same file system as read-write is not possible. To solve this problem, the first mount needs to be read-only on the virtual layer only, keeping the physical layer read-write. The userspace fix is simple. Instead of:
mount -oro
use
mount -oro=vfs
This will keep the physical layer read-write, but the virtual file system layer (and the userspace access) read-only.
5.4 Switch to predictable network names #
The persistent network naming scheme used in SLES 15 became legacy with the switch to the systemd predictable network names.
For complicated setups, we recommend using systemd.link.
For more information, see:
In the future, when upgrading from SL Micro to SLES 16.1 (so-called "SLE merge"), some systems will have net.ifnames=0 set on their kernel command line (this is the case for new installations of SL Micro 6.0 and 6.1).
This boot option will prevent the system from switching to the predictable naming scheme and it will need to be removed.
5.5 systemd default configurations moved to /usr #
Main configuration files have been moved from /etc to /usr.
This ensures that main configuration files have lower precedence, allowing them to be overriden by package-supplied drop-in snippets.
Local configuration should be created by either modifying the default file in /usr (or a copy of it placed in /etc if the original file is shipped in /usr), or by creating drop-in snippets in the appropriate directory in (for example, /etc/systemd/coredump.conf.d/) - this is recommended.
Remove configurations in /etc to restore defaults.
5.6 Password access as root via SSH disabled #
Previously, it was possible to SSH as root using password-based authentication. In SLES 16.0 only key-based authentication is allowed by default. Systems upgraded to 16.0 from a previous version will carry over the old behavior. New installations will enforce the new behavior.
Installing the package openssh-server-config-rootlogin restores the old behavior and allows password-based login for the root user.
5.7 Minimum hardware requirements #
SUSE Linux Enterprise Server 16.0 requires hardware to meet requirements on these architectures:
For AMD64 and Intel* 64 systems: Microarchitecture level x86-64-v2 or higher.
For IBM* Power LE systems: POWER10 or higher (see note below).
For Arm64* systems: Armv8.0-A or higher.
For IBM* Z systems: z14 or higher.
POWER9 systems may work with SLES 16.0 but are not supported by IBM, the hardware vendor.
5.8 SHA1 to be disabled or mark unapproved #
Due to FIPS 140-3 certification requirements, the SHA1 cryptographic algorithm will be disabled or marked unapproved when running in FIPS mode.
5.9 Added tuned #
The tuned package contains a daemon that tunes system settings dynamically.
5.10 Lightweight guard region support #
This is a new feature in madvise() that installs a lightweight guard region into a specified address range.
See madvise() man page for more information.
5.11 Harmless error messages sometimes displayed when launching some applications #
The following messages are sometimes displayed when launching specific applications:
gnome-desktopsome times failes to create transient scope:> gnome-session-binary: GnomeDesktop-WARNING: Could not create transient scope for PID 7883: GDBus.Error:org.freedesktop.DBus.Error.UnixProcessIdUnknown: Process with ID 7883 does not exist.
systemdsometimes failes to assign cgroup:> systemd: app-gnome-gnome\x2dkeyring\x2dpkcs11-6708.scope: Couldn't move process 6708 to requested cgroup '/user.slice/user-0.slice/user@0.service/app.slice/app-gnome-gnome\x2dkeyring\x2dpkcs11-6708.scope': No such process > systemd: app-gnome-gnome\x2dkeyring\x2dpkcs11-6708.scope: Failed to add PIDs to scope's control group: No such process > systemd: app-gnome-gnome\x2dkeyring\x2dpkcs11-6708.scope: Failed with result 'resources'. > systemd: Failed to start Application launched by gnome-session-binary.
These messages are harmless and can be ignored.
5.12 NFS over TLS support #
NFS over TLS is now supported for storage traffic.
5.13 saptune replaces sapconf #
In SLES 16.0, sapconf is replaced with saptune.
saptune will also be enabled with a base tuning, similar to sapconf.
Base tuning only will be enabled if saptune was not configured before (no SAP Notes or Solutions selected).
5.14 Azure Entra ID authentication via himmelblau #
The himmelblau package has been added.
It provides interoperability with for Microsoft Azure Entra ID and Intune.
It supports Linux authentication to Microsoft Azure Entra ID via PAM and NSS modules.
For more information see https://github.com/himmelblau-idm/himmelblau.
5.15 Legacy BIOS support #
Legacy BIOS is still supported in SUSE Linux Enterprise Server 16.0. However, some features are not available when using it (for example, full-disk encryption with TPM). Finally, support for legacy BIOS will be discontinued in the future. For that reason we recommend switching to UEFI at the nearest opportunity.
5.16 /tmp not persistent #
In SUSE Linux Enterprise Server 16.0, /tmp is no longer persistent between reboots but uses tmpfs instead.
See https://susedoc.github.io/doc-modular/main/html/SLE-comparison/index.html#sle16-tmp for more information.
5.17 Python update strategy #
/usr/bin/python3is currently set to use Python 3.13. In a future minor version update this is likely going to be changed to a newer Python version.SUSE Linux Enterprise Server 16.0 contains around 700 popular Python packages, which form a basic set of functionality for packages that depends on Python and for developing apps without needing to install Python modules from an external provider.
We have been working on removing the dependencies of packages and tools on the
/usr/bin/python3binary, which means that SUSE Linux Enterprise Server could use a newer version of the Python interpreter in the future. This new Python interpreter will coexist with the previous version that will then be maintained as legacy interpreter for a limited time.
5.18 Removal of 32-bit support #
SUSE Linux Enterprise Server 16.0 only supports 64-bit binaries. Support for 32-bit binaries (or 31-bit binaries on IBM Z) has been removed.
This means that statically-linked 32-bit binaries (or 31-bit binaries on IBM Z) and container images cannot be run anymore.
32-bit syscalls are still enabled by default on arm64, and can be enabled on x86_64 via the kernel parameter ia32_emulation.
On other architectures it’s disabled without any option to enable it.
5.19 Compiling kernel uses non-default compiler #
Customers who need to build kernel modules or rebuild the kernel must use the same compiler version the kernel was built with.
The kernel is built with gcc version 13, which is not the default compiler.
Install the gcc version 13 compiler using the gcc13 package and invoke it with the command gcc-13.
This specific compiler version is only supported for building kernel modules and the kernel.
5.20 Optimized libraries for newer hardware architectures #
We have added support for the glibc-HWCAPS feature which loads optimized versions of libraries for specific newer CPUs automatically.
The build infrastructure for this feature is enabled for the following libraries:
blosc2boostbrotlibzip2flacjsoncpplameleveldblibdb-4_8libgcryptlibiscsilibjpeg-turbolibjxllibmnglibnettlelibpng16libvorbislibxmlblz4lzoopenjpeg2openssl-3python311python313sqlite3talloctree-sitterwavpackxxhashxzzlibzopflizstd
5.21 No remote root login with password #
If you install the system using only a root password and do not provide an SSH key for the root user, sshd will not be enabled automatically after installation.
You will not be able to log in remotely as root using the password.
By default, remote password-based root login is disabled.
The installer enables the sshd service only when an SSH key for root is configured during setup.
To allow remote root login, configure an SSH key for root during installation.
5.22 Default user group assignment changed #
Previously, all user accounts belonged to a single users group.
Now instead of being added to the common users group, each new user now gets their own primary group matching their username.
This is due to USERGROUPS_ENAB being enabled in /usr/etc/login.defs.
This change affects all new installations and upgraded systems that did not change the default /etc/login.defs.
This has several consequences:
files created by new users are not group-readable by default
configurations that used the primary
usersgroup as a condition do not work anymoreconfigurations that used the primary or secondary
usersgroup as a condition need to have theusersgroup manually added to these user accounts in order to continue to work, for example, to for@usersin the sudoers filehome directories inherited from a previous system need to standardize the GID of the files by running:
find "$HOME" -group users -exec chgrp myuser {} \;, orchgrp -R myuser "$HOME"if you did not use any GID other thanusers
5.23 SysV init.d scripts support #
SysV init.d scripts have been deprecated since SLES 15 SP2.
In SLES 16.0, support of SysV init.d scripts has been removed.
6 Changes affecting all architectures (RC1) #
This section contains information specific to RC1. We are working on fixing the problems mentioned here. The content of this section will be removed for the final released product.
6.1 /etc/services removal #
The /etc/services file is just a dummy file that will be removed in the future.
Software that appends to it without creating it should have its behavior changed.
7 Changes affecting all architectures (Beta4) #
This section contains information specific to Beta4. We are working on fixing the problems mentioned here. The content of this section will be removed for the final released product.
7.1 Configuring network interfaces during installation #
Currently, the installer does not allow for setting up network interfaces using the UI. However, in the meantime you can use dracut-like command-line options, for example:
ifname=<interface>:<MAC> ip=<interface>:dhcp
Additionally, the inst.copy_network is not available in Beta4.
7.2 SAP workloads on SLES 16.0 #
For running SAP workloads on SUSE Linux Enterprise Server 16.0, do the following:
Unpack the SAP installer.
Run the following commands to change policies:
semanage boolean -m --on selinuxuser_execmod semanage boolean -m --on unconfined_service_transition_to_unconfined_user semanage permissive -a snapper_grub_plugin_t restorecon -R /Run the following commands to lable all files:
test -d ./snapshots && restorecon -R / -e /.snapshots test -d ./snapshots || restorecon R /Install SAP workload or SAP HANA
Label all files again:
test -d /.snapshots && restorecon -R / -e /.snapshots test -d /.snapshots || restorecon -R /
7.3 FIPS 140-3 not working properly #
FIPS 140-3 installation has not been fully validated and may cause unexpected software failure or crashes. Therefore, we discourage you from using it on Beta4.
8 Changes affecting all architectures (Beta3) #
This section contains information specific to Beta3. We are working on fixing the problems mentioned here. The content of this section will be removed for the final released product.
8.1 Kernel crash in QEMU #
SUSE Linux Enterprise Server 16.0 requires a CPU that supports a so-called "x86-64-v2" microarchitecture. Due to this, running a SLES image using QEMU currently results in a kernel crash.
As a workaround you can run QEMU with the -cpu host argument.
8.2 Missing libnsl.so.1 library #
The libnsl.so.1 library has been deprecated in SLES 15 and finally removed in SUSE Linux Enterprise Server 16.0.
As a workaround for applications that cannot be installed without it (but presumaly do not use it for anything), we provide the libnsl-stub1 package that includes ABI-compatible but otherwise function-less stub of the library file.
8.3 firewalld not usable with many interfaces #
Due to an upstream bug, firewalld might take a long time or time out when adding many interfaces.
The error occurs when firewalld is restarted after applying such a configuration.
The following message appears in the system logs:
ERROR:dbus.proxies:Introspect error on :1.18:/org/fedoraproject/FirewallD1: dbus.exceptions.DBusException: org.freedesktop.DBus.Error.NoReply: Did not receive a reply. Possible causes include: the remote application did not send a reply, the message bus security policy blocked the reply, the reply timeout expired, or the network connection was broken.
See https://github.com/firewalld/firewalld/issues/1399 for more information.
9 Changes affecting all architectures (Beta2) #
This section contains information specific to Beta2. We are working on fixing the problems mentioned here. The content of this section will be removed for the final released product.
9.1 Switch from YaST to Cockpit #
SUSE Linux Enterprise Server 16.0 has switched from YaST to Cockpit for manual system administration. We have enhanced Cockpit with new modules with the intention to upstream them later. Despite being functional, bugs might appear and features might be missing.
New modules
cockpit-subscriptions: register, de-register and view SUSE Linux Enterprise registrations. Does not work for unprivileged users yet.cockpit-repositories: add, remove, view repositories, change settings and refresh them. Does not work for unprivileged users yet.cockpit-packages: show installed packages, search available repositories, install and uninstall packages. Requires administrative access. Be aware that there are no safety measures implemented as far as system usability goes.
Enhanced modules
cockpit-packagekit: update packages from available repositories. The module now allows to individually select packages to update.
Upstream modules
cockpit, cockpit-bridge, cockpit-kdump, cockpit-machines, cockpit-networkmanager, cockpit-podman, cockpit-selinux, cockpit-storaged, cockpit-system, cockpit-ws: these modules are updated to the recent stable base version 332 (or their respective).
Default selection
Installation of the pattern cockpit will pull in the following modules: cockpit, cockpit-bridge, cockpit-networkmanager, cockpit-packagekit, cockpit-packages, cockpit-repos, cockpit-selinux, cockpit-storaged, cockpit-subscriptions, cockpit-system, cockpit-ws.
9.2 dovecot 2.4 configuration upgrade #
In SUSE Linux Enterprise Server 16.0 dovecot has been upgraded to version 2.4.
The configuration of this version is incompatible with the previous versions.
Configuration has to be updated manually. For more information see https://doc.dovecot.org/2.4.0/installation/upgrade/2.3-to-2.4.html.
10 Changes affecting all architectures (Beta1) #
This section contains information specific to Beta1. We are working on fixing the problems mentioned here. The content of this section will be removed for the final released product.
10.1 Disk configuration UI during installation #
Currently, choosing disk configurations other than "An existing disk" (installation to a single disk) suffer from poor usability. This is expected to change in a future update.
10.2 Non-functioning zypper after installation #
There is currently a known issue that adds a non-functioning zypper repository which prevents zypper from working correctly.
To fix this issue, remove the repository in question and add the installation medium repository manually:
Remove repository with
zypper rr. To remove the first repository, for example, run:zypper rr 1.Add the installation medium as repository by running
zypper ar hd:/install?device=/dev/disk/by-label/agama-installer medium(themediumat the end is a name you want to give the repository).Run
zypper refreshto refresh the added repository.
10.3 systemd uses cgroup v2 by default #
SUSE Linux Enterprise Server 16.0 uses cgroup v2 by default and v1 is unsupported. If you need to use cgroup v1, SLES 15 SP6 can be switched to hybrid mode using a boot parameter.
11 x86-64-specific changes #
Information in this section applies to the x86-64 architecture.
11.1 AMD EPYC Turin automonous frequency scaling #
In SLES 16.0, the default Linux CPU frequency scaling driver for AMD EPYC Turin (and later processors) has shifted to the AMD P-State driver to enable autonomous frequency scaling.
With the AMD P-State driver, it enables the use of the Energy Performance Preference (EPP) for more granular control over performance versus power efficiency to adjust the CPU frequencies based on workload and hardware feedback dynamically.
12 IBM Z-specific changes (s390x) #
Information in this section applies to SUSE Linux Enterprise Server for IBM Z 16.0. For more information, see https://www.ibm.com/docs/en/linux-on-systems?topic=distributions-suse-linux-enterprise-server
12.1 Hardware #
support has been added for IBM z17 in
kernelproviding machine name, kconfig options, new instructions etc.support has been added for IBM z17 in
gdb,valgrind,binutilsSupport has been added for IBM z16 - reset DAT-Protection facility support
identify ConnectX devices through port rather than PCHID
Processor Activity Instrumentation / Neural Network Processing Assist counters for new IBM Z hardware was added into kernel
kprobes are now supported without
stop machinePromiscuous Mode Exploitation for NETH Virtual Functions for IBM z17 and LinuxONE 5
Vertical CPU Polarization support for IBM z17 and LinuxONE 5
qclib has been updated to support IBM z17
The Integrated Accelerator for AI has new operations, which are now supported by libzdnn low-level driver library
Enhanced RAS and Call Home for zPCI
the kernel image can move into vmalloc space, where random physical pages are used to map virtual pages (V!=R)
Add new CPU-MF Counters for new IBM Z Hardware (libpfm)
Deactivate CONFIG_QETH_OSX kernel config option
Upgrade Mellanox (mlx5) driver to latest version
12.2 Performance #
LPAR level power consumption reporting is now available in kernel and s390-tools.
12.3 Security #
12.3.1 In-kernel crypto support #
With this service pack are additionaly supported:
MSA 10 XTS instructions for in-kernel crypto
MSA 11 HMAC instructions for in-kernel crypto
MSA 12 (SHA3) has been added and introduces new options to call CPACF SHA 3 functions
MSA 11 HMAC instructions for in-kernel crypto
MSA 10 XTS crypto PAES support for in-kernel crypto
12.3.2 OpenSSL features #
This release brings these features and improvements:
XTS instructions support in libcrypto/openSSL
new MSA 11 HMAC instruction support in libcrypto/openSSL
added support for MSA 12 (SHA3), which also introduces new options to call CPACF SHA3 and SHKE functions
extended support of the openssl-pkcs11 provider such that it can be used by programs that issue forks
replace openssl-ibmpkcs11 with openssl-pkcs11
upgrade openssl-ibmca to the latest version
12.3.3 openCryptoki #
The new version of
libicaandlibzpcis included.The openCryptoki CCA Token is now available on x86_64 and ppc64le architectures.
12.3.4 p11-kit #
Add support for IBM specific attributes and mechanisms to the PKCS11 client-server implementation of p11-kit.
12.3.5 pkey #
The kernel pkey module can now generate keys AES-XTS keys (MSA 10) and HMAC key (MSA 11) from clear keys.
The module can also generate keys represented by identifiers of secure execution retrievable keys.
The pkey also supports EP11 API ordinal 6 for secure guests.
12.3.6 zcrypt #
The zcrypt extends error recovery to deal with device scans of unavailable devices.
12.4 Virtualization #
KVM guests can exploit z17 & LinuxONE 5 CPU features
KVM can display available host key hashes for Secure Execution (Query Host-key hash UVC)
KVM can benefit from genprotimg rewritten in Rust to re-use existing rust libraries (s390-tools feature)
KVM benefits from genprotimg validation of SE image running on particular host(s) (s390-tools feature)
KVM benefits from using pvimg info command to display encrypted & unencrypted SE image information (s390-tools)
KVM can use unencrypted SE images for creating generic images (s390-tools feature)
KVM passthrough is available for guests i.e. retrievable secrets in Secure Execution guests
KVM can use unencrypted SE images for creating generic images (s390-tools feature)
KVM implements counters for nested guest shadow events
KVM implements virsh hypervisor-cpu-models (libvirt)
KVM provides enhanced and dynamic CPU topology for KVM guests (qemu)
KVM and libvirt full boot order enables users to attempt booting from multiple targets
KVM provides Atomic Memop for Key-Checked Compare-and-swap
KVM enhances CCW address translation architectural compliance
KVM improves memory reclaiming for z15 Secure Execution guests and above (libvirt)
12.5 Miscellaneous #
plymouthwas replaced byblogon s390x, asplymouthcouldn’t work without graphical display.The
Eigenlibrary is the backend used byTensorflowfor computations executed on the CPU. Several GCC adjustments have been implemented to speed up Eigen with IBM z14 support and above.Allow
httpdcustomers to protect their web server identity using HSMs (via CryptoExpress adapters).
12.5.1 Enhancements in s390-tools #
Latest s390-tool update brings these noticable changes:
* additional channel measurements - kernel & s390-tools
* a new tool cpacinfo shall provide information on CPACF including the supported MSA levels, instructions, subfunctions per instruction. https://www.ibm.com/docs/en/linux-on-systems?topic=hw-cpacf
12.5.2 parmfile now points to ISO #
Previously, parmfile would point to a directory of unpacked files.
Now it needs to point to a loop-mounted ISO via FTP. For example:
root=live:ftp://$SERVER_URL/install/agama-online.iso agama.install_url=ftp://$SERVER_URL/install/agama
For more information see https://agama-project.github.io/docs/user/boot_options.
12.5.3 Disk selection UI problems during installation #
If you want to enable a disk, click on Storage in the left panel, then Install new system on and choose "storage techs".
Then you can choose a type of disk.
This can be avoided if you have defined your parmfile as described in Section 12.5.2, “parmfile now points to ISO”.
If you choose DASD, you should see disks based on your parmfile and cio_ignore configuration.
Then choose a disk and activate it by clicking Perform an action and then Activate.
This can take a moment.
If it is not visible, then you need to click on Storage or refresh the page.
In the zFCP section, after activating a disk a gray line will appear. This is just a visual bug, the disk will activate correctly.
12.5.4 Installation failure on zVM #
Due to a change from linuxrc to dracut, the parmfile needs to define not only installation source but also a network and disks.
The parmfile needs to be filled with a dracut-like options, for example:
root=live:ftp://$SERVER_URL/install/online.iso ip=$IP_address::$IP_gateway:24:SLE16-Beta4:$NETWORK_DEVICE:none rd.zdev=qeth,0.0.0800:0.0.0801:0.0.0802,layer2=1,portno=0 cio_ignore=all,!condev,!0.0.0160 nameserver=$NAMEserverIP live.password=linux rd.zdev=dasd,0.0.0160
13 POWER-specific changes (ppc64le) #
Information in this section applies to SUSE Linux Enterprise Server for POWER 16.0.
13.1 KVM guests in LPAR #
The ability to run KVM Guests in an LPAR is a new feature in PowerVM Firmware 1060.10 release and supported in SUSE Linux Enterprise Server 16.0. This enables users to run KVM guests in a PowerVM LPAR bringing industry standard Linux KVM virtualization stack to IBM PowerVM, which easily integrates with existing Linux virtualization ecosystem. This enables a lot of interesting usecases which were earlier difficult to realize in a PowerVM LPAR.
KVM in a PowerVM LPAR is a new type of LPAR (logical partition) that allows the SUSE Linux Enterprise Server 16.0 kernel to host KVM guests inside an LPAR on PowerVM.
A KVM enabled LPAR allows standard Linux KVM tools (for example, virsh) to create and manage lightweight Linux Virtual Machines (VM).
A KVM Linux LPAR uses dedicated cores which enables Linux to have full control of when Linux VMs are scheduled to run, just like KVM on other platforms.
13.2 Login times out on HMC virtual terminal #
If you install SUSE Linux Enterprise Server for POWER with the GNOME desktop on LPAR and try to login via the HMC virtual terminal, the login may time out while entering your credentials.
To work around this issue, disable the Plymouth graphical boot screen by appending the boot parameter plymouth.enable=0 to the kernel command line.
14 Arm-specific changes (AArch64) #
14.1 System-on-Chip driver enablement #
SLES 16.0 includes driver enablement for the following System-on-Chip (SoC) chipsets:
Ampere* X-Gene*, eMAG*, Altra*, Altra Max, AmpereOne*
AWS* Graviton, Graviton2, Graviton3
Broadcom* BCM2837/BCM2710, BCM2711
Fujitsu* A64FX
Huawei* Kunpeng* 916, Kunpeng 920
Marvell* ThunderX*, ThunderX2*; OCTEON TX*; Armada* 7040, Armada 8040
NVIDIA* Grace; Tegra* X1, Tegra X2, Xavier*, Orin; BlueField*, BlueField-2, BlueField-3
NXP* i.MX 8M, 8M Mini; Layerscape* LS1012A, LS1027A/LS1017A, LS1028A/LS1018A, LS1043A, LS1046A, LS1088A, LS2080A/LS2040A, LS2088A, LX2160A
Rockchip RK3399
Socionext* SynQuacer* SC2A11
Xilinx* Zynq* UltraScale*+ MPSoC
Driver enablement is done as far as available and requested. Refer to the following sections for any known limitations.
Some systems might need additional drivers for external chips, such as a Power Management Integrated Chip (PMIC), which may differ between systems with the same SoC chipset.
For booting, systems need to fulfill either the Server Base Boot Requirements (SBBR)
or the Embedded Base Boot Requirements (EBBR),
that is, the Unified Extensible Firmware Interface (UEFI) either
implementing the Advanced Configuration and Power Interface (ACPI) or
providing a Flat Device Tree (FDT) table. If both are implemented, the kernel
will default to the Device Tree; the kernel command line argument acpi=force can
override this default behavior.
Check for SUSE YES! certified systems, which have undergone compatibility testing.
14.2 Virtualization #
iSCSI boot support is disabled in OVMF images.
14.2.1 QEMU #
QEMU has been updated to version 10.0.2, full list of changes are available at https://wiki.qemu.org/ChangeLog/10.0
Highlights include: * Removed features: https://qemu-project.gitlab.io/qemu/about/removed-features.html * Deprecated features: https://qemu-project.gitlab.io/qemu/about/deprecated.html
14.2.2 libvirt #
libvirt has been updated to version 11.4.0, this include many incremental improvements and bug fixes, see https://libvirt.org/news.html#v11-4-0-2025-06-02.
libvirt provides now a modular daemons.
14.2.3 VMware #
14.2.3.1 open-vm-tools #
open-vm-tools has been updated to version 13.0.0 that addresses a few critical problems and bug fixes. See https://github.com/vmware/open-vm-tools/blob/stable-13.0.0/ReleaseNotes.md.
14.2.4 Confidential Computing #
14.2.4.1 sevctl #
The sevctl package has been updated to version 0.6.0.
14.2.4.2 snpguest #
The snpguest package has been updated to version 0.9.1.
Full list of changes is available at: https://github.com/virtee/snpguest/compare/v0.7.1…v0.9.1
14.2.4.3 snphost #
The snphost package version 0.6.0 has been added.
14.2.4.4 Intel TDX Confidential Computing #
In SUSE Linux Enterprise Server 16.0 the kernel now incorporates the latest upstream Intel Trust Domain Extensions (TDX) patches. This significant update prepares the virtualization toolstack for Intel TDX confidential computing capabilities.
These patches are important for enabling the kernel to support creating and managing trust domains, which is a step towards enabling confidential computing environments on Intel TDX-enabled hardware.
The full Intel TDX confidential computing experience also requires integrating QEMU and libvirt components, which will be part of a future update.
14.2.4.5 Enhanced VM Security with AMD SEV-SNP #
AMD SEV-SNP (Secure Encrypted Virtualization-Secure Nested Paging) is a hardware security feature in AMD EPYC processors that provides a highly secure and confidential environment for virtual machines (VMs). It offers strong memory confidentiality through per-VM encryption keys and AES encryption, and crucially, robust memory integrity protection to prevent tampering from the hypervisor or other threats. It also provides enhanced isolation and remote attestation capabilities, making it ideal for protecting sensitive data and workloads in untrusted environments like cloud computing. This release fully integrates AMD SEV-SNP for KVM-based virtual machines. This means integrated support in our kernel, along with updated QEMU, Libvirt, and OVMF Firmware. To use AMD SEV-SNP, you’ll need, AMD EPYC™ 3rd Gen Processors (Milan) or newer and SEV-SNP enabled in your system’s BIOS/UEFI.
14.2.5 Others #
14.2.5.1 numatop #
numatop is available in version 2.5, adding support for Intel GNR and SRF platforms.
14.2.5.2 numactl #
numactl is shipped in version 2.0.19.
Full changes at: https://github.com/numactl/numactl/releases/tag/v2.0.19
14.2.5.3 libguestfs #
libguestfs has been updated to version 1.55.13.
14.2.5.4 virt-v2v #
Update to version 2.7.16. While there are no dedicated release notes, you can review the code changes in Github: https://github.com/libguestfs/virt-v2v/tree/v2.7.16
Implement --parallel=N for parallel disk copies
Update Translations
Various fixes
14.2.5.5 virtiofsd #
The virtiofsd has been updated to 1.12.0.
14.2.5.6 virt-manager #
virt-manager is now shipped in version 5.0.0. Its preferable to setup VNC for remote viewing and do all the XML editing using the virsh command.
Full list of changes is available at https://github.com/virt-manager/virt-manager/releases/tag/v5.0.0
14.2.5.7 virt-bridge-setup #
virt-bridge-setup is a script designed to simplify network bridge creation on a specified interface using nmcli. It was developed as a replacement for the automatic "yast2 virtualization" bridge creation and is particularly useful for setting up virtualization environments.
Important considerations:
It supports IPv4 only.
This is a simple script not intended for complex network scenarios (vlan, bonding, etc…); manual bridge setup is recommended for intricate configurations.
The script should be run locally (not remotely) immediately after installation and before any custom network configurations.
15 Removed and deprecated features and packages #
This section lists features and packages that were removed from SUSE Linux Enterprise Server or will be removed in upcoming versions.
15.1 Removed features and packages #
The following features and packages have been removed in this release.
Xorg server has been removed. Only Wayland is supported for graphical display. X11 applications compatibility is provided via XWayland. For setting up GNOME Remote Desktop on Wayland see https://susedoc.github.io/doc-modular/main/html/SLES-gnome-remote-desktop/.
sapconfhas been removed. See Section 5.13, “saptunereplacessapconf” for more info.YaST has been removed. See Section 9.1, “Switch from YaST to Cockpit” for more info.
WSL1 is not supported anymore
The Xen hypervisor was removed in favor of KVM. You no longer run SLE 16 as Xen host or as paravirtualized guest (PV). Running SLE 16 as fully virtualized Xen guest (HVM) or using using hardware virtualization features (PVH) is still possible.
nscdhas been removedThe snIPL package is deprecated as HMC is providing most capabilities. There is also available a command line client to interact with the HMC Web Services API: the zhmccli https://github.com/zhmcclient.
removed
rc<service>controls of systemd servicesremoved the
KBD_DISABLE_CAPS_LOCKfeature from/etc/sysconfig/keyboardnetiucvandlcsdriversansible-9andansible-core-2.16criucompat-libpthread-nonsharedcrunhas been removed. Useruncinstead.
15.2 Deprecated features and packages #
The following features and packages are deprecated and will be removed in a future version of SUSE Linux Enterprise Server.
The 2MB OVMF image will be deprecated and removed in SUSE Linux Enterprise Server 16.1.
15.2.1 nmap deprecation notice #
The nmap project has moved to a new source license that makes future releases of nmap incompatible with our product.
In SLES 16.0, we are shipping the latest version of nmap released under the old license. In an upcoming release we will switch to an alternative tool.
16 Obtaining source code #
This SUSE product includes materials licensed to SUSE under the GNU General Public License (GPL). The GPL requires SUSE to provide the source code that corresponds to the GPL-licensed material. The source code is available for download at https://www.suse.com/download/sles/ on Medium 2. For up to three years after distribution of the SUSE product, upon request, SUSE will mail a copy of the source code. Send requests by e-mail to sle_source_request@suse.com. SUSE may charge a reasonable fee to recover distribution costs.
17 Legal notices #
SUSE makes no representations or warranties with regard to the contents or use of this documentation, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, SUSE reserves the right to revise this publication and to make changes to its content, at any time, without the obligation to notify any person or entity of such revisions or changes.
Further, SUSE makes no representations or warranties with regard to any software, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, SUSE reserves the right to make changes to any and all parts of SUSE software, at any time, without any obligation to notify any person or entity of such changes.
Any products or technical information provided under this Agreement may be subject to U.S. export controls and the trade laws of other countries. You agree to comply with all export control regulations and to obtain any required licenses or classifications to export, re-export, or import deliverables. You agree not to export or re-export to entities on the current U.S. export exclusion lists or to any embargoed or terrorist countries as specified in U.S. export laws. You agree to not use deliverables for prohibited nuclear, missile, or chemical/biological weaponry end uses. Refer to https://www.suse.com/company/legal/ for more information on exporting SUSE software. SUSE assumes no responsibility for your failure to obtain any necessary export approvals.
Copyright © 2024-2025 SUSE LLC.
This release notes document is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License (CC-BY-ND-4.0). You should have received a copy of the license along with this document. If not, see https://creativecommons.org/licenses/by-nd/4.0/.
SUSE has intellectual property rights relating to technology embodied in the product that is described in this document. In particular, and without limitation, these intellectual property rights may include one or more of the U.S. patents listed at https://www.suse.com/company/legal/ and one or more additional patents or pending patent applications in the U.S. and other countries.
For SUSE trademarks, see the SUSE Trademark and Service Mark list (https://www.suse.com/company/legal/). All third-party trademarks are the property of their respective owners.