This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.

Jump to contentJump to page navigation: previous page [access key p]/next page [access key n]
Back to Release Notes for SUSE products / SUSE Linux Enterprise Server Release Notes
SUSE Linux Enterprise Server 16.0

SUSE Linux Enterprise Server Release Notes

Publication Date: 2025-06-13, Version: @VERSION@

SUSE Linux Enterprise Server is a modern, modular operating system for both multimodal and traditional IT. This document provides a high-level overview of features, capabilities and limitations, and highlights important product updates.

1 About the release notes

These Release Notes are identical across all architectures, and the most recent version is always available online at https://www.suse.com/releasenotes.

Entries are only listed once but they can be referenced in several places if they are important and belong to more than one section.

Release notes usually only list changes that happened between two subsequent releases. Certain important entries from the release notes of previous product versions are repeated. To make these entries easier to identify, they contain a note to that effect.

However, repeated entries are provided as a courtesy only. Therefore, if you are skipping one or more service packs, check the release notes of the skipped service packs as well. If you are only reading the release notes of the current release, you could miss important changes.

1.1 Documentation and other information

For the most up-to-date version of the documentation for SUSE Linux Enterprise Server, see:

2 SUSE Linux Enterprise Server Version 16.0

These release notes apply to SUSE Linux Enterprise Server 16.0.

2.1 Changes affecting all architectures

2.1.1 Removal of 32-bit support

SUSE Linux Enterprise Server 16.0 only supports 64-bit binaries. Support for 31-/32-bit binaries has been removed.

This means that statically-linked 31-/32-bit binaries and container images cannot be run anymore.

2.1.2 Compiling kernel uses non-default compiler

Customers who need to build kernel modules or rebuild the kernel must use the same compiler version the kernel was built with. The kernel is built with gcc version 13, which is not the default compiler. Install the gcc version 13 compiler using the gcc13 package and invoke it with the command gcc-13. This specific compiler version is only supported for building kernel modules and the kernel.

2.1.3 Optimized libraries for newer hardware architectures

We have added support for the glibc-HWCAPS feature which loads optimized versions of libraries for specific newer CPUs automatically.

The build infrastructure for this feature is enabled for the following libraries:

  • blosc2

  • boost

  • brotli

  • bzip2

  • flac

  • jsoncpp

  • lame

  • leveldb

  • libdb-4_8

  • libgcrypt

  • libiscsi

  • libjpeg-turbo

  • libjxl

  • libmng

  • libnettle

  • libpng16

  • libvorbis

  • libxmlb

  • lz4

  • lzo

  • openjpeg2

  • openssl-3

  • python311

  • python313

  • sqlite3

  • talloc

  • tree-sitter

  • wavpack

  • xxhash

  • xz

  • zlib

  • zopfli

  • zstd

2.1.4 No remote root login with password

Warning
Warning

If you install the system using only a root password and do not provide an SSH key for the root user, sshd will not be enabled automatically after installation. You will not be able to log in remotely as root using the password.

By default, remote password-based root login is disabled. The installer enables the sshd service only when an SSH key for root is configured during setup. To allow remote root login, configure an SSH key for root during installation.

2.1.5 Default user group assignment changed

Previously, all user accounts belonged to a single users group.

Now instead of being added to the common users group, each new user now gets their own primary group matching their username. This is due to USERGROUPS_ENAB being enabled in /usr/etc/login.defs. This change affects all new installations and upgraded systems that did not change the default /etc/login.defs. This has several consequences:

  • files created by new users are not group-readable by default

  • configurations that used the primary users group as a condition do not work anymore

  • configurations that used the primary or secondary users group as a condition need to have the users group manually added to these user accounts in order to continue to work, for example, to for @users in the sudoers file

  • home directories inherited from a previous system need to standardize the GID of the files by running: find "$HOME" -group users -exec chgrp myuser {} \;, or chgrp -R myuser "$HOME" if you did not use any GID other than users

2.1.6 SysV init.d scripts support

SysV init.d scripts have been deprecated since SLES 15 SP2.

In SLES 16.0, support of SysV init.d scripts has been removed.

2.2 Changes affecting all architectures (Beta4)

2.2.1 Configuring network interfaces during installation

Currently, the installer does not allow for setting up network interfaces using the UI. However, in the meantime you can use dracut-like command-line options, for example:

ifname=<interface>:<MAC>
ip=<interface>:dhcp

Additionally, the inst.copy_network is not available in Beta4.

2.2.2 SAP workloads on SLES 16.0

For running SAP workloads on SUSE Linux Enterprise Server 16.0, do the following:

  1. Run these commands after system installation:

    semanage boolean -m --on selinuxuser_execmod
    semanage boolean -m --on unconfined_service_transition_to_unconfined_user
    semanage permissive -a snapper_grub_plugin_t
    restorecon -R /
  2. Install SAP workload or SAP HANA

  3. Run restorecon -R /.

2.2.3 FIPS 140-3 not working properly

FIPS 140-3 installation has not been fully validated and may cause unexpected software failure or crashes. Therefore, we discourage you from using it on Beta4.

2.3 Changes affecting all architectures (Beta3)

2.3.1 Missing libnsl.so.1 library

The libnsl.so.1 library has been deprecated in SLES 15 and finally removed in SUSE Linux Enterprise Server 16.0.

As a workaround for applications that cannot be installed without it (but presumaly do not use it for anything), we provide the libnsl-stub1 package that includes ABI-compatible but otherwise function-less stub of the library file.

2.3.2 firewalld not usable with many interfaces

Due to an upstream bug, firewalld might take a long time or time out when adding many interfaces. The error occurs when firewalld is restarted after applying such a configuration. The following message appears in the system logs:

ERROR:dbus.proxies:Introspect error on :1.18:/org/fedoraproject/FirewallD1: dbus.exceptions.DBusException: org.freedesktop.DBus.Error.NoReply: Did not receive a reply.
Possible causes include: the remote application did not send a reply, the message bus security policy blocked the reply, the reply timeout expired, or the network connection was broken.

See https://github.com/firewalld/firewalld/issues/1399 for more information.

2.4 Changes affecting all architectures (Beta2)

2.4.1 Switch from YaST to Cockpit

SUSE Linux Enterprise Server 16.0 has switched from YaST to Cockpit for manual system administration. We have enhanced Cockpit with new modules with the intention to upstream them later. Despite being functional, bugs might appear and features might be missing.

New modules

  • cockpit-subscriptions: register, de-register and view SUSE Linux Enterprise registrations. Does not work for unprivileged users yet.

  • cockpit-repositories: add, remove, view repositories, change settings and refresh them. Does not work for unprivileged users yet.

  • cockpit-packages: show installed packages, search available repositories, install and uninstall packages. Requires administrative access. Be aware that there are no safety measures implemented as far as system usability goes.

Enhanced modules

  • cockpit-packagekit: update packages from available repositories. The module now allows to individually select packages to update.

Upstream modules

cockpit, cockpit-bridge, cockpit-kdump, cockpit-machines, cockpit-networkmanager, cockpit-podman, cockpit-selinux, cockpit-storaged, cockpit-system, cockpit-ws: these modules are updated to the recent stable base version 332 (or their respective).

Default selection

Installation of the pattern cockpit will pull in the following modules: cockpit, cockpit-bridge, cockpit-networkmanager, cockpit-packagekit, cockpit-packages, cockpit-repos, cockpit-selinux, cockpit-storaged, cockpit-subscriptions, cockpit-system, cockpit-ws.

2.4.2 dovecot 2.4 configuration upgrade

In SUSE Linux Enterprise Server 16.0 dovecot has been upgraded to version 2.4. The configuration of this version is incompatible with the previous versions.

Configuration has to be updated manually. For more information see https://doc.dovecot.org/2.4.0/installation/upgrade/2.3-to-2.4.html.

2.5 Changes affecting all architectures (Beta1)

2.5.1 Disk configuration UI during installation

Currently, choosing disk configurations other than "An existing disk" (installation to a single disk) suffer from poor usability. This is expected to change in a future update.

2.5.2 Non-functioning zypper after installation

There is currently a known issue that adds a non-functioning zypper repository which prevents zypper from working correctly.

To fix this issue, remove the repository in question and add the installation medium repository manually:

  1. Remove repository with zypper rr. To remove the first repository, for example, run: zypper rr 1.

  2. Add the installation medium as repository by running zypper ar hd:/install?device=/dev/disk/by-label/agama-installer medium (the medium at the end is a name you want to give the repository).

  3. Run zypper refresh to refresh the added repository.

2.5.3 systemd uses cgroup v2 by default

SUSE Linux Enterprise Server 16.0 uses cgroup v2 by default and v1 is unsupported. If you need to use cgroup v1, SLES 15 SP6 can be switched to hybrid mode using a boot parameter.

2.6 IBM Z-specific changes (s390x)

2.6.1 parmfile now points to ISO

Previously, parmfile would point to a directory of unpacked files.

Now it need to point to a loop-mounted ISO via FTP. For example:

root=live:ftp://$SERVER_URL/install/agama-online.iso
agama.install_url=ftp://$SERVER_URL/install/agama

For more information see https://agama-project.github.io/docs/user/boot_options.

2.6.2 Disk selection UI problems during installation

If you want to enable a disk, click on Storage in the left panel, then Install new system on and choose "storage techs". Then you can choose a type of disk. This can be avoided if you have defined your parmfile as described in Section 2.6.1, “parmfile now points to ISO”.

If you choose DASD, you should see disks based on your parmfile and cio_ignore configuration. Then choose a disk and activate it by clicking Perform an action and then Activate. This can take a moment. If it is not visible, then you need to click on Storage or refresh the page.

In the zFCP section, after activating a disk a gray line will appear. This is just a visual bug, the disk will activate correctly.

2.6.3 Installation failure on zVM

Due to a change from linuxrc to dracut, the parmfile needs to define not only installation source but also a network and disks.

The parmfile needs to be filled with a dracut-like options, for example:

root=live:ftp://$SERVER_URL/install/online.iso
ip=$IP_address::$IP_gateway:24:SLE16-Beta4:$NETWORK_DEVICE:none
rd.zdev=qeth,0.0.0800:0.0.0801:0.0.0802,layer2=1,portno=0
cio_ignore=all,!condev,!0.0.0160 nameserver=$NAMEserverIP
live.password=linux rd.zdev=dasd,0.0.0160

2.7 POWER-specific changes (ppc64le)

Information in this section applies to SUSE Linux Enterprise Server for POWER 16.0.

2.7.1 KVM guests in LPAR

The ability to run KVM Guests in an LPAR is a new feature in PowerVM Firmware 1060.10 release and supported in SUSE Linux Enterprise Server 16.0. This enables users to run KVM guests in a PowerVM LPAR bringing industry standard Linux KVM virtualization stack to IBM PowerVM, which easily integrates with existing Linux virtualization ecosystem. This enables a lot of interesting usecases which were earlier difficult to realize in a PowerVM LPAR.

KVM in a PowerVM LPAR is a new type of LPAR (logical partition) that allows the SUSE Linux Enterprise Server 16.0 kernel to host KVM guests inside an LPAR on PowerVM. A KVM enabled LPAR allows standard Linux KVM tools (for example, virsh) to create and manage lightweight Linux Virtual Machines (VM). A KVM Linux LPAR uses dedicated cores which enables Linux to have full control of when Linux VMs are scheduled to run, just like KVM on other platforms.

2.8 Arm-specific changes (AArch64)

2.8.1 System-on-Chip driver enablement

SLES 16.0 includes driver enablement for the following System-on-Chip (SoC) chipsets:

  • Ampere* X-Gene*, eMAG*, Altra*, Altra Max, AmpereOne*

  • AWS* Graviton, Graviton2, Graviton3

  • Broadcom* BCM2837/BCM2710, BCM2711

  • Fujitsu* A64FX

  • Huawei* Kunpeng* 916, Kunpeng 920

  • Marvell* ThunderX*, ThunderX2*; OCTEON TX*; Armada* 7040, Armada 8040

  • NVIDIA* Grace; Tegra* X1, Tegra X2, Xavier*, Orin; BlueField*, BlueField-2, BlueField-3

  • NXP* i.MX 8M, 8M Mini; Layerscape* LS1012A, LS1027A/LS1017A, LS1028A/LS1018A, LS1043A, LS1046A, LS1088A, LS2080A/LS2040A, LS2088A, LX2160A

  • Rockchip RK3399

  • Socionext* SynQuacer* SC2A11

  • Xilinx* Zynq* UltraScale*+ MPSoC

Note
Note

Driver enablement is done as far as available and requested. Refer to the following sections for any known limitations.

Some systems might need additional drivers for external chips, such as a Power Management Integrated Chip (PMIC), which may differ between systems with the same SoC chipset.

For booting, systems need to fulfill either the Server Base Boot Requirements (SBBR) or the Embedded Base Boot Requirements (EBBR), that is, the Unified Extensible Firmware Interface (UEFI) either implementing the Advanced Configuration and Power Interface (ACPI) or providing a Flat Device Tree (FDT) table. If both are implemented, the kernel will default to the Device Tree; the kernel command line argument acpi=force can override this default behavior.

Check for SUSE YES! certified systems, which have undergone compatibility testing.

2.9 Virtualization

2.9.1 QEMU

QEMU has been updated to version 10.0.0, full list of changes are available at https://wiki.qemu.org/ChangeLog/10.0

Highlights include: * Removed features: https://qemu-project.gitlab.io/qemu/about/removed-features.html * Deprecated features: https://qemu-project.gitlab.io/qemu/about/deprecated.html

2.9.2 libvirt

libvirt has been updated to version 11.3.0, this include many incremental improvements and bug fixes, see https://libvirt.org/news.html#v11-3-0-2025-05-02

libvirt provides now a modular daemons.

2.9.3 VMware

2.9.3.1 open-vm-tools

open-vm-tools has been updated to version 12.5.0 that addresses a few critical problems and bug fixes. See https://github.com/vmware/open-vm-tools/blob/stable-12.5.0/ReleaseNotes.md

2.9.4 Others

2.9.4.1 libguestfs

libguestfs has been updated to version 1.55.13.

2.9.4.2 virt-v2v

Update to version 2.7.16. As there is no release notes for check the code changes at: https://github.com/libguestfs/virt-v2v/tree/v2.7.16

  • Implement --parallel=N for parallel disk copies

  • Update Translations

  • Various fixes

2.9.4.3 sevctl

The sevctl package has been updated to version 0.6.0.

2.9.4.4 snpguest

The snpguest package has been updated to version 7.1.

2.9.4.5 virtiofsd

The virtiofsd has been updated to 1.12.0.

2.9.4.6 virt-manager

virt-manager is now shipped in version 5.0.0. Spice and XML editing are not available in this version. You should setup VNC for remote viewing and do all the XML editing using the virsh command. Full list of changes is available at https://github.com/virt-manager/virt-manager/releases/tag/v5.0.0

2.9.4.7 Intel TDX Confidential Computing

We are pleased to announce that Kernel shipped in this release now incorporates the latest upstream Intel Trust Domain Extensions (TDX) patches. This significant update prepares the virtualization toolstack for Intel TDX confidential computing capabilities.

With these patches, the kernel is now ready to support the foundational requirements for creating and managing trust domains, a crucial step towards enabling confidential computing environments on Intel TDX-enabled hardware.

Important Note: While the kernel is now ready, the full Intel TDX confidential computing experience is not yet complete. Integration work is still in progress for the QEMU and Libvirt components. These elements are necessary to fully leverage and orchestrate Intel TDX features within your virtualized environments. We anticipate further updates in upcoming releases as these integrations are finalized.

2.10 Removed and deprecated features and packages

This section lists features and packages that were removed from SUSE Linux Enterprise Server or will be removed in upcoming versions.

2.10.1 Removed features and packages

The following features and packages have been removed in this release.

2.11 Deprecated features and packages

The following features and packages are deprecated and will be removed in a future version of SUSE Linux Enterprise Server.

  • The 2MB OVMF image will be deprecated and removed in SUSE Linux Enterprise Server 16.1.

3 Obtaining source code

This SUSE product includes materials licensed to SUSE under the GNU General Public License (GPL). The GPL requires SUSE to provide the source code that corresponds to the GPL-licensed material. The source code is available for download at https://www.suse.com/download/sles/ on Medium 2. For up to three years after distribution of the SUSE product, upon request, SUSE will mail a copy of the source code. Send requests by e-mail to sle_source_request@suse.com. SUSE may charge a reasonable fee to recover distribution costs.