Release Notes 8.2

BeeGFS 8.2 improves ACL performance, introduces background data rebalancing, adds full IPv6 support and SELinux integration, and delivers a wide range of quality-of-life improvements and bug fixes.

Note

Please refer to GitHub for patch release notes.

General Changes/Improvements

  • ACL Performance: Adds client-side ACL caching, controlled with a new sysACLsRevalidate option. The default cache mode only revalidates ACLs after sysDirSubentryCacheValidityMS (default 1s) / sysFileSubentryCacheValidityMS (default 0s). This slightly delays ACL change propagation, but can significantly improve performance when ACLs are enabled. To preserve legacy behavior and propagate ACL changes immediately, set sysACLsRevalidate=always, which fetches ACLs on every access.

  • Background Data Rebalancing (enterprise feature): Migrates file contents efficiently between storage targets in the background. Metadata services coordinate with storage nodes to move chunks directly between targets and update stripe patterns without needing to rewrite files completely. Common use cases include redistributing data across new targets when expanding the file system, or moving infrequently accessed data from hot to cold storage pools.

    • Rebalancing is integrated into the beegfs entry migrate command as an alternative to the default migration mode (temporary files) and can be enabled using the --rebalance flag.

    • Files are locked while they are being rebalanced and a “Device or resource busy” (EBUSY) error is returned until the rebalancing is complete.

    • Supports migrating hard links and all special file types.

  • IPv6 Support: All BeeGFS components now support IPv6. By default when both IPv4 and IPv6 addresses are available, IPv4 remains preferred. This ensures systems configured with preferred interfaces continue to follow the same routes as before 8.2.

    • To use both IPv4 and IPv6 together, dual-stack sockets (IPv4+IPv6) are required. This is enabled by default on most modern Linux distributions (IPV6_V6ONLY=0). If IPv6 is disabled, BeeGFS automatically falls back to IPv4.

    • Extends the syntax for connInterfacesFile, connInterfacesList and connNetFilterFile. The new syntax is fully backwards compatible, but in addition to preferred interfaces preferred network addresses and protocols (IPv4 or IPv6) can now be defined. Refer to the configuration file for each service for additional details.

  • SELinux Support: BeeGFS now stores and retrieves per-file and per-directory SELinux security contexts (security labels) used by the kernel’s Linux Security Module (LSM) to enforce SELinux policies. Labels are persistent across reboots and new files inherit labels from their parent directories. Label updates are propagated across all clients, with configurable per-client caching to improve performance. See SELinux for more details and to get started.

Command Line Interface (CTL)

General:

  • Clarifies context cancellation errors indicate an intentional interruption of command execution (e.g., Ctrl+C or timeout), not a specific failure.

  • Documents that global flags can be set using environment variables.

  • Uses the client connAuthFile path from /proc/fs/beegfs/*/config when the management address is auto-configured and no --auth-file exists at the default path.

  • By default, CTL no longer uses an HTTP proxy (e.g., if HTTPS_PROXY is set) to connect to BeeGFS services unless --use-http-proxy is explicitly specified. Since BeeGFS services typically do not run behind a proxy, the old default behavior was often unexpected.

Command Updates:

  • entry info:

    • By default, when BeeGFS is mounted, entry info is collected using an ioctl. On most systems this is expected to be more performant as ioctl system calls leverage client metadata caching. If BeeGFS is not mounted or if the --no-ioctl flag is specified, CTL uses an RPC instead.

    • Adds a --parallel flag to collect entry info concurrently. This can greatly speed up command execution, but results are not returned in stable lexicographical order. It is most useful when results will be post-processed and order is not important. For example to build a database of entries for cross-referencing entry IDs and paths.

  • entry migrate:

    • Adds a --filter-files flag that uses a simple query language to select which files to migrate. This allows recursively walking a directory tree but only migrating files that match criteria such as access time, modification time, ownership, size, and more.

    • Allows migrating files to specific destination --targets and/or --groups (previously limited to pools only). For each file, the destination targets/groups are randomly selected from the user specified list, bypassing regular metadata target selection policies.

    • Integrates with background data rebalancing using the --rebalance flag. In this mode, the command returns once migrations are started for all selected files. Re-run the command later to check migration status.

      Example: Migrate all files larger than 1GiB that have not been accessed in 30 days from the fast pool to the archive pool using background rebalancing.

      $ beegfs entry migrate /mnt/beegfs/ \
        --recurse \
        --filter-files='size >= 1GiB and atime > 30d' \
        --from-pools=fast \
        --pool=archive \
        --rebalance
      
  • health check: Prints clearer output, with different text for passing vs. failing checks, to make it more intuitive when action is required.

  • index: Extends the ls, find, stat, and query commands with support for changing the --output format to json, json-pretty, or ndjson.

  • remote status:

    • Adds a --filter-files flag with the same behavior as entry migrate.

    • Introduces a --verify-remote flag (see the Remote Storage Targets section for details).

    • Runs status checks in parallel by default to improve performance. To return entries in stable lexicographical order instead, set --num-workers=1.

  • remote push/pull: Adds an --update flag that updates the remote target in an entry’s metadata when pushing or pulling from a specific remote target, avoiding the need to run entry set separately. Note this flag will replace any existing remote targets with the new one.

Remote Storage Targets

  • Improves performance with a caching mechanism for commonly used file system objects (such as node lists and buddy group to primary node mappings). The cache is automatically refreshed periodically or when an expected object is not found.

    • Eliminates the need to restart Remote and Sync services when nodes are added or removed from the file system.

  • Extends remote status with a --verify-remote flag that optionally queries file status with the remote target instead of only consulting the local Remote database. This is useful in environments where Remote/Sync are not the only applications writing to the remote target, and files might be changed externally.

    • Note: Checking the remote status against the provider may incur API charges, depending on the storage service. For this reason, file status is determined by the Remote database by default.

  • On startup Remote and Sync now verify the sysBypassFileAccessCheckOnMeta parameter introduced in 8.1 is set to true, and will refuse to start if it is set incorrectly. If the parameter does not yet exist in the client configuration (e.g., an 8.0 client) only a warning is printed.

File System Checker (fsck)

  • Re-enables orphan chunk deletion as a repair action, with a new interactive confirmation prompt.

    • Previously disabled to prevent accidental data loss, since deleting orphaned chunks is not always the correct recovery procedure. The new prompt explains when deletion is appropriate and requires typing a confirmation phrase to prevent accidental acknowledgements.

    • When running fsck with the automatic repair option (discouraged), orphan chunk deletion is always skipped.

Fixes

  • Client: Adds missing client configuration parameters to /proc/fs/beegfs/*/config.

  • Client: Fixes an SELinux issue where the BeeGFS kernel module did not receive the correct SELinux context (modules_object_t) during install or rebuild. This could cause module insertion to fail with modprobe: ERROR: could not insert 'beegfs': Permission denied.

  • Client: Fixes a build failure on newer kernels that expect to use iov_iter_get_pages2 / iov_iter_alloc_pages2 when compiling the kernel module with GPU Direct Storage support (NVFS).

  • Client: Fixes a crash in the fsync path when GPU Direct Storage Support (NVFS) is enabled.

  • Client: Improved rebuild times by performing feature detection in parallel and caching results.

  • CTL: Fixes an issue where the copy mode returning a non-zero exit code always produced Error: error waiting for copy to complete, which was confusing and inaccurate in some contexts.

  • CTL: Fixes a security issue where non-root users could use entry info with multiple paths to infer the existence of files they should not have permission to access. This was only possible if the first specified path was valid and accessible to the user.

  • CTL: Fixes the order target/groups are printed in the entry info --retro output. This is especially important if the output is used to determine the target order in a file’s stripe pattern. The default table output was not affected by this issue.

  • CTL: Fixes a panic in the node list reachability check when receiving a UDP datagram from an unknown source IP.

  • CTL: Fixes an issue with entry migrate where --from-node would return invalid entity ID.

  • CTL: Fixes an issue where migrating files with a deinlined inode could result in a “Path does not exist” error if the inode and dentry were on different metadata nodes.

  • CTL: Corrected node types and license information captured by health bundle.

  • Remote/Sync: Fixes an issue where logging from CTL library functions did not respect Remote/Sync logging configuration.

  • Remote/Sync: Fixes an issue completing/aborting multipart uploads with some S3 providers.

  • Remote/Sync: When Remote was configured to listen on all IPs by specifying 0.0.0.0:9010 or [::]:9010, then Sync nodes would not know which IP to use to send results back to Remote.

  • Remote: Fixes a panic when a file’s metadata or stub file contained a remote target ID that was not configured in beegfs-remote.toml.

  • Sync: Adds log messages for configuration changes affecting CTL (such as the management address) that require restarting all Sync nodes.

  • Mgmtd: Fixes an issue importing management data from a BeeGFS 7 file system which had target(s) that had been previously unmapped.

  • Mgmtd: Fixes an issue where after a reboot the management service could startup too quickly before the network-online.target was reached, causing it to not use all expected network interfaces.

  • Meta: Fixes an issue with disposal file cleanup that could leave orphaned inodes. Incorrect link count handling could remove disposal dentries while the inode was still in use, leaving it without any associated dentry. These orphaned inodes could only be removed with beegfs-fsck. The cleanup logic now preserves disposal dentries until the inode is fully released, ensuring proper removal of inodes and storage chunks by the normal disposal cleanup process.

  • Meta: Multiple improvements to prevent race conditions affecting various combinations of metadata operations, in particular:

    • Fixes a race between hard link, rename, and open/close operations that could cause an inode to be prematurely freed while still in use, resulting in a crash during close.

    • Fixes a race between rename, create, and link operations that could cause a hard link to target the wrong inode, resulting in a dangling dentry pointing to non-existent inode data.

      • Addresses situations where create encounters dangling dentries leftover from this/similar conditions, and the dentries have NULL stripe patterns which would previously cause a crash on buddy mirrored systems. Now the system detects and correctly handles dentries in this state, propagating results like EXISTS where appropriate.

    • Improves file-locking logic when dentries and inodes reside on different meta nodes. Previous behavior could lead to inconsistencies, particularly with cross-directory hard links.

    • Improves reliability of directory deletions with concurrent directory access. This eliminates cases where deletions could intermittently fail with “Device or resource busy” (EBUSY) errors.

      Note this release makes a number of proactive changes intended to mitigate potential races when executing various combinations of metadata operations in parallel on the same entries. Not all of these issues were actually observed in production workloads, and some were only triggered by synthetic stress tests designed to simulate extreme concurrency.

  • Mon: Corrected the disk I/O read time in the provided Grafana dashboards which incorrectly showed read_byte instead of read_time.

  • Storage: Removed spurious log messages for an invalid argument that could appear when removing directories.

  • Index: When specifying –targetid, substring matching instead of exact matching was performed. This meant a command like beegfs index find --targetid=2 also returned results for 23 or 123.

Known Issues and Limitations

  • IPv6 temporary, deprecated, and optimistic addresses are not automatically ignored by servers. These addresses may be advertised to other servers and clients as available for inbound connections if servers are not configured to listen or advertise specific interfaces, or if they use a wildcard or unspecified address notation. Refer to the upgrade guide for more details.

  • The 8.0 and 8.1 CTL beegfs stats client command and Monitoring service are not forward compatible with 8.2 servers due to a breaking change required to support IPv6. When used with 8.2 the command will return Error: TCP request to meta:2 failed: error reading BeeMsg: EOF and Mon will log Received a message with incompatible feature flags. Message type: RequestMetaDataResp (6005); Flags (hex): 1. Upgrade CTL and Mon to 8.2 before upgrading BeeGFS servers to 8.2. The 8.2 CTL and Mon are also backwards compatible with 8.0 and 8.1.

  • Issues have been observed with Soft-RoCE and the client module on newer kernels that currently affect RHEL 9.4 and Ubuntu 24.04 where the kernel locks up on RDMA connection attempts to meta and storage servers. This issue has never been observed on RoCE implementations other than the kernel RXE driver.

Supported Linux Distributions and Kernels

Supported distributions

The full integration test suite was run on Debian 11, Debian 12, openSUSE 15.6, Rocky Linux 8.10, Rocky Linux 9.4, CentOS Stream 10, Ubuntu 20.04, Ubuntu 22.04 and Ubuntu 24.04.

Packages are provided for the x86_64 and aarch64 architecture and the following distributions:

  • RHEL 8, 9, and 10 (packages can also be used on Rocky Linux and AlmaLinux).

  • SLES 15

  • Debian 11 and 12

  • Ubuntu 20.04, 22.04, and 24.04

The distributions we provide packages for are fully supported by the BeeGFS server services (mgmtd, meta, storage, mon, remote, and sync). Generally specific kernel and RDMA driver versions are not problematic for the servers, but can cause issues building the client module. Refer to the Client Build Testing section below what combinations have been tested.

Client build testing

Client build testing was done with the following combinations of operating systems and RDMA drivers. To keep the test matrix manageable and because kernel APIs tend to change frequently, even in distribution minor releases, the BeeGFS client generally only prioritizes support for the default slow moving distribution kernels (not hwe, backports and similar). Custom kernel builds might or might not work and are generally not supported. There can also be incompatibilities between the client and very recent distribution kernel releases. The same is true for RDMA driver versions that can sometimes cause issues building the client for a specific kernel version.

Starting with BeeGFS 8.2, known combinations that currently do not work are published, so there are no surprises during planning and upgrades. In many cases these reflect breaking changes in upstream kernel/driver versions rather than issues in BeeGFS itself. We expect to support additional combinations over time, potentially in patch releases between minor versions. For the very latest updates check GitHub for available patch releases.

Additional notes:

  • Combinations not explicitly listed below might or might not work.

  • Results from Rocky are expected to apply to other RedHat derivatives including AlmaLinux and RHEL.

  • With the introduction of the DOCA repositories, BeeGFS supports OFED versions included in the following DOCA releases: 1.5-LTS, 2.5-LTS, and 2.9-LTS.

    • Note that OFED versions and DOCA versions follow different versioning schemes, so the supported OFED versions in each DOCA release may differ. Always refer to the specific DOCA release notes for detailed compatibility information.

Click to expand the test matrixes for different distributions:

Tested Rocky Linux versions (with kernel RDMA drivers)
RHEL/Rocky/Alma Kernel version Pass/Fail
10.0 6.12.0-55.37.1.el10_0.x86_64
10 6.12.0-55.37.1.el10_0.x86_64
9.6 5.14.0-570.49.1.el9_6.x86_64
9.5 5.14.0-503.40.1.el9_5.x86_64
9.4 5.14.0-427.42.1.el9_4.x86_64
9.3 5.14.0-362.24.1.el9_3.0.1.x86_64
9.2
9.1 5.14.0-162.23.1.el9_1.x86_64
9.0 5.14.0-70.30.1.el9_0.x86_64
9 5.14.0-570.49.1.el9_6.x86_64
8.10 4.18.0-553.77.1.el8_10.x86_64
8.9 4.18.0-513.24.1.el8_9.x86_64
8.8 4.18.0-477.27.1.el8_8.x86_64
8.7 4.18.0-425.19.2.el8_7.x86_64
8.6 4.18.0-372.32.1.el8_6.x86_64
8.5 4.18.0-348.23.1.el8_5.x86_64
8.4 4.18.0-305.25.1.el8_4.x86_64
8 4.18.0-553.77.1.el8_10.x86_64
Tested Rocky Linux versions (with DOCA/OFED RDMA drivers)
RHEL/Rocky/Alma Version DOCA Version OFED Version Kernel Version Pass/Fail
10.0 3.1.0-091000 OFED-internal-25.07-0.9.7: 6.12.0-55.37.1.el10_0.x86_64
9.6 3.1.0-091000 OFED-internal-25.07-0.9.7: 5.14.0-570.49.1.el9_6.x86_64
9.5 2.9.1-0.1.9 OFED-internal-24.10-1.1.4: 5.14.0-503.40.1.el9_5.x86_64
9.5
9.4 3.1.0-091000 OFED-internal-25.07-0.9.7: 5.14.0-427.42.1.el9_4.x86_64
9.4 2.9.1-0.1.9 OFED-internal-24.10-1.1.4: 5.14.0-427.42.1.el9_4.x86_64
9.4 2.5.3-0.0.9 OFED-internal-23.10-4.0.9: 5.14.0-427.42.1.el9_4.x86_64
9.4 2.5.3-0.0.9 OFED-internal-23.10-4.0.9: 5.14.0-427.42.1.el9_4.x86_64
9.4 2.5.2-0.0.6 OFED-internal-23.10-3.2.2: 5.14.0-427.42.1.el9_4.x86_64
9.3 2.9.1-0.1.9 OFED-internal-24.10-1.1.4: 5.14.0-362.24.1.el9_3.0.1.x86_64
9.3 2.5.3-0.0.9 OFED-internal-23.10-4.0.9: 5.14.0-362.24.1.el9_3.0.1.x86_64
9.3 2.5.3-0.0.9 OFED-internal-23.10-4.0.9: 5.14.0-362.24.1.el9_3.0.1.x86_64
9.3 2.5.2-0.0.6 OFED-internal-23.10-3.2.2: 5.14.0-362.24.1.el9_3.0.1.x86_64
9.1 2.9.1-0.1.9 OFED-internal-24.10-1.1.4: 5.14.0-162.23.1.el9_1.x86_64
9.1 2.5.3-0.1.0 OFED-internal-23.10-4.0.9: 5.14.0-162.23.1.el9_1.x86_64
9.1 2.5.3-0.1.0 OFED-internal-23.10-4.0.9: 5.14.0-162.23.1.el9_1.x86_64
9.1 2.5.2-0.0.6 OFED-internal-23.10-3.2.2: 5.14.0-162.23.1.el9_1.x86_64
8.10 3.1.0-091000 OFED-internal-25.07-0.9.7: 4.18.0-553.77.1.el8_10.x86_64
8.10 2.9.1-0.1.9 OFED-internal-24.10-1.1.4: 4.18.0-553.77.1.el8_10.x86_64
8.10 2.5.3-0.0.9 OFED-internal-23.10-4.0.9: 4.18.0-553.77.1.el8_10.x86_64
8.10 2.5.3-0.0.9 OFED-internal-23.10-4.0.9: 4.18.0-553.77.1.el8_10.x86_64
8.10 2.5.2-0.0.6 OFED-internal-23.10-3.2.2: 4.18.0-553.77.1.el8_10.x86_64
8.9 3.1.0-091000 OFED-internal-25.07-0.9.7: 4.18.0-513.24.1.el8_9.x86_64
8.9 2.9.1-0.1.9 OFED-internal-24.10-1.1.4: 4.18.0-513.24.1.el8_9.x86_64
8.9 2.5.3-0.0.9 OFED-internal-23.10-4.0.9: 4.18.0-513.24.1.el8_9.x86_64
8.9 2.5.3-0.0.9 OFED-internal-23.10-4.0.9: 4.18.0-513.24.1.el8_9.x86_64
8.9 2.5.2-0.0.6 OFED-internal-23.10-3.2.2: 4.18.0-513.24.1.el8_9.x86_64
8.8 3.1.0-091000 OFED-internal-25.07-0.9.7: 4.18.0-477.27.1.el8_8.x86_64
8.8 2.9.1-0.1.9 OFED-internal-24.10-1.1.4: 4.18.0-477.27.1.el8_8.x86_64
8.8 2.5.3-0.1.0 OFED-internal-23.10-4.0.9: 4.18.0-477.27.1.el8_8.x86_64
8.8 2.5.3-0.1.0 OFED-internal-23.10-4.0.9: 4.18.0-477.27.1.el8_8.x86_64
8.8
8.7 2.9.1-0.1.9 OFED-internal-24.10-1.1.4: 4.18.0-425.19.2.el8_7.x86_64
8.6 3.1.0-091000 OFED-internal-25.07-0.9.7: 4.18.0-372.32.1.el8_6.x86_64
8.6 2.9.1-0.1.9 OFED-internal-24.10-1.1.4: 4.18.0-372.32.1.el8_6.x86_64
8.6 2.5.3-0.1.0 OFED-internal-23.10-4.0.9: 4.18.0-372.32.1.el8_6.x86_64
8.6 2.5.3-0.1.0 OFED-internal-23.10-4.0.9: 4.18.0-372.32.1.el8_6.x86_64
8.6 2.5.2-0.0.6 OFED-internal-23.10-3.2.2: 4.18.0-372.32.1.el8_6.x86_64
8.5 2.9.1-0.1.9 OFED-internal-24.10-1.1.4: 4.18.0-348.23.1.el8_5.x86_64
8.5 2.5.3-0.1.0 OFED-internal-23.10-4.0.9: 4.18.0-348.23.1.el8_5.x86_64
8.5 2.5.3-0.1.0 OFED-internal-23.10-4.0.9: 4.18.0-348.23.1.el8_5.x86_64
8.5 2.5.2-0.0.6 OFED-internal-23.10-3.2.2: 4.18.0-348.23.1.el8_5.x86_64
8.4 3.1.0-091000 OFED-internal-25.07-0.9.7: 4.18.0-305.25.1.el8_4.x86_64
8.4 2.9.1-0.1.9 OFED-internal-24.10-1.1.4: 4.18.0-305.25.1.el8_4.x86_64
8.4 2.5.3-0.0.9 OFED-internal-23.10-4.0.9: 4.18.0-305.25.1.el8_4.x86_64
8.4 2.5.3-0.0.9 OFED-internal-23.10-4.0.9: 4.18.0-305.25.1.el8_4.x86_64
8.4 2.5.2-0.0.6 OFED-internal-23.10-3.2.2: 4.18.0-305.25.1.el8_4.x86_64
Tested Debian versions (with kernel RDMA drivers)
Debian Version Kernel version Pass/Fail
13.1 linux-headers-6.12.48+deb13-amd64
13.0 linux-headers-6.12.38+deb13-amd64
12.12 linux-headers-6.1.0-40-amd64
12.11 linux-headers-6.1.0-37-amd64
12.10 linux-headers-6.1.0-34-amd64
12.9 linux-headers-6.1.0-31-amd64
12.8 linux-headers-6.1.0-28-amd64
12.7 linux-headers-6.1.0-26-amd64
12.6 linux-headers-6.1.0-23-amd64
12.5 linux-headers-6.1.0-21-amd64
12.4 linux-headers-6.1.0-17-amd64
12.2 linux-headers-6.1.0-13-amd64
12.1 linux-headers-6.1.0-12-amd64
12.0 linux-headers-6.1.0-9-amd64
11.11 linux-headers-5.10.0-35-amd64
11.10 linux-headers-5.10.0-31-amd64
11.9 linux-headers-5.10.0-30-amd64
11.8 linux-headers-5.10.0-27-amd64
11.7 linux-headers-5.10.0-25-amd64
11.6 linux-headers-5.10.0-21-amd64
11.5 linux-headers-5.10.0-19-amd64
11.4 linux-headers-5.10.0-17-amd64
11.3 linux-headers-5.10.0-36-amd64
11.2 linux-headers-5.10.0-36-amd64
11.1 linux-headers-5.10.0-36-amd64
11.0 linux-headers-5.10.0-36-amd64
Tested Debian versions (with DOCA/OFED RDMA drivers)
Debian Version OFED Version DOCA Version Kernel Version Pass/Fail
12.5 3.1.0-091000 OFED-internal-25.07-0.9.7: linux-headers-6.1.0-21-amd64
12.5 2.9.1-0.1.9 OFED-internal-24.10-1.1.4: linux-headers-6.1.0-21-amd64
12.5 2.5.3-0.1.0 OFED-internal-23.10-4.0.9: linux-headers-6.1.0-21-amd64
12.5 2.5.3-0.1.0 OFED-internal-23.10-4.0.9: linux-headers-6.1.0-21-amd64
12.5 2.5.2-0.0.6 OFED-internal-23.10-3.2.2: linux-headers-6.1.0-21-amd64
12.1 3.1.0-091000 OFED-internal-25.07-0.9.7: linux-headers-6.1.0-12-amd64
12.1 2.9.1-0.1.9 OFED-internal-24.10-1.1.4: linux-headers-6.1.0-12-amd64
12 3.1.0-091000 OFED-internal-25.07-0.9.7: linux-headers-6.1.0-40-amd64
12 2.9.1-0.1.9 OFED-internal-24.10-1.1.4: linux-headers-6.1.0-40-amd64
12 2.5.3-0.1.0 OFED-internal-23.10-4.0.9: linux-headers-6.1.0-40-amd64
12 2.5.3-0.1.0 OFED-internal-23.10-4.0.9: linux-headers-6.1.0-40-amd64
12 2.5.2-0.0.6 OFED-internal-23.10-3.2.2: linux-headers-6.1.0-40-amd64
11.3 2.9.1-0.1.9 OFED-internal-24.10-1.1.4: linux-headers-5.10.0-36-amd64
11 2.9.1-0.1.9 OFED-internal-24.10-1.1.4: linux-headers-5.10.0-35-amd64
Tested Ubuntu versions (with kernel RDMA drivers)
Ubuntu Version Kernel version Pass/Fail
25.10 linux-headers-6.17.0-5
25.04 linux-headers-6.14.0-15
24.04.3 linux-headers-6.14.0-27-generic
24.04.2 linux-headers-6.11.0-17-generic
24.04.1 linux-headers-6.8.0-41
24.04 linux-headers-6.8.0-31
22.04.5 linux-headers-6.8.0-40-generic
22.04.4 linux-headers-6.5.0-18-generic
22.04.3 linux-headers-6.2.0-26-generic
22.04.2 python3.10
22.04.1 python3.10
22.04 linux-headers-5.15.0-25
20.04.6 linux-headers-5.15.0-67-generic
20.04.5 linux-headers-5.15.0-46-generic
20.04.4 linux-headers-5.13.0-30-generic
20.04.3 linux-headers-5.11.0-27-generic
20.04.2 linux-headers-5.8.0-41-generic
20.04.1 linux-headers-5.4.0-42
20.04 linux-headers-5.4.0-26
Tested Ubuntu versions (with DOCA/OFED RDMA drivers)
Ubuntu Version OFED Version DOCA Version Kernel Version Pass/Fail
25.04 linux-headers-6.14.0-15-generic
24.04.3 3.1.0-091000 OFED-internal-25.07-0.9.7: linux-headers-6.14.0-27-generic
24.04.3 2.9.1-0.1.9 OFED-internal-24.10-1.1.4: linux-headers-6.14.0-27-generic
24.04.2 3.1.0-091000 OFED-internal-25.07-0.9.7: linux-headers-6.11.0-17-generic
24.04.2 2.9.1-0.1.9 OFED-internal-24.10-1.1.4: linux-headers-6.11.0-17-generic
24.04.1 3.1.0-091000 OFED-internal-25.07-0.9.7: linux-headers-6.8.0-41-generic
24.04.1 2.9.1-0.1.9 OFED-internal-24.10-1.1.4: linux-headers-6.8.0-41-generic
24.04 3.1.0-091000 OFED-internal-25.07-0.9.7: linux-headers-6.8.0-31-generic
24.04 2.9.1-0.1.9 OFED-internal-24.10-1.1.4: linux-headers-6.8.0-31-generic
22.04.5 3.1.0-091000 OFED-internal-25.07-0.9.7: linux-headers-6.8.0-40-generic
22.04.5 2.9.1-0.1.9 OFED-internal-24.10-1.1.4: linux-headers-6.8.0-40-generic
22.04.5 2.5.3-0.1.0 OFED-internal-23.10-4.0.9: linux-headers-6.8.0-40-generic
22.04.5 2.5.3-0.1.0 OFED-internal-23.10-4.0.9: linux-headers-6.8.0-40-generic
22.04.5 2.5.2-0.0.6 OFED-internal-23.10-3.2.2: linux-headers-6.8.0-40-generic
22.04.4 3.1.0-091000 OFED-internal-25.07-0.9.7: linux-headers-6.5.0-18-generic
22.04.4 2.9.1-0.1.9 OFED-internal-24.10-1.1.4: linux-headers-6.5.0-18-generic
22.04.4 2.5.3-0.1.0 OFED-internal-23.10-4.0.9: linux-headers-6.5.0-18-generic
22.04.4 2.5.3-0.1.0 OFED-internal-23.10-4.0.9: linux-headers-6.5.0-18-generic
22.04.4 2.5.2-0.0.6 OFED-internal-23.10-3.2.2: linux-headers-6.5.0-18-generic
22.04.3 3.1.0-091000 OFED-internal-25.07-0.9.7: linux-headers-6.2.0-26-generic
22.04.3 2.9.1-0.1.9 OFED-internal-24.10-1.1.4: linux-headers-6.2.0-26-generic
22.04.3 2.5.3-0.1.0 OFED-internal-23.10-4.0.9: linux-headers-6.2.0-26-generic
22.04.3 2.5.3-0.1.0 OFED-internal-23.10-4.0.9: linux-headers-6.2.0-26-generic
22.04.3 2.5.2-0.0.6 OFED-internal-23.10-3.2.2: linux-headers-6.2.0-26-generic
22.04.2 not_installed linux-headers-5.19.0-32-generic
22.04.2 not_installed linux-headers-5.19.0-32-generic
22.04.2 not_installed linux-headers-5.19.0-32-generic
22.04.2 not_installed linux-headers-5.19.0-32-generic
22.04.2 not_installed linux-headers-5.19.0-32-generic
22.04.1 not_installed linux-headers-5.15.0-43-generic
22.04.1 not_installed linux-headers-5.15.0-43-generic
22.04.1 not_installed linux-headers-5.15.0-43-generic
22.04.1 not_installed linux-headers-5.15.0-43-generic
22.04.1 not_installed linux-headers-5.15.0-43-generic
22.04 3.1.0-091000 OFED-internal-25.07-0.9.7: linux-headers-5.15.0-25-generic
22.04 2.9.1-0.1.9 OFED-internal-24.10-1.1.4: linux-headers-5.15.0-25-generic
22.04 2.5.3-0.1.0 OFED-internal-23.10-4.0.9: linux-headers-5.15.0-25-generic
22.04 2.5.3-0.1.0 OFED-internal-23.10-4.0.9: linux-headers-5.15.0-25-generic
22.04 2.5.2-0.0.6 OFED-internal-23.10-3.2.2: linux-headers-5.15.0-25-generic
20.04.6 3.1.0-091000 OFED-internal-25.07-0.9.7: linux-headers-5.15.0-67-generic
20.04.6 2.9.1-0.1.9 OFED-internal-24.10-1.1.4: linux-headers-5.15.0-67-generic
20.04.6 2.5.3-0.1.0 OFED-internal-23.10-4.0.9: linux-headers-5.15.0-67-generic
20.04.6 2.5.3-0.1.0 OFED-internal-23.10-4.0.9: linux-headers-5.15.0-67-generic
20.04.6 2.5.2-0.0.6 OFED-internal-23.10-3.2.2: linux-headers-5.15.0-67-generic
20.04.5 3.1.0-091000 OFED-internal-25.07-0.9.7: linux-headers-5.15.0-46-generic
20.04.5 2.9.1-0.1.9 OFED-internal-24.10-1.1.4: linux-headers-5.15.0-46-generic
20.04.5 2.5.3-0.1.0 OFED-internal-23.10-4.0.9: linux-headers-5.15.0-46-generic
20.04.5 2.5.3-0.1.0 OFED-internal-23.10-4.0.9: linux-headers-5.15.0-46-generic
20.04.5 2.5.2-0.0.6 OFED-internal-23.10-3.2.2: linux-headers-5.15.0-46-generic
20.04.4 3.1.0-091000 OFED-internal-25.07-0.9.7: linux-headers-5.13.0-30-generic
20.04.4 2.9.1-0.1.9 OFED-internal-24.10-1.1.4: linux-headers-5.13.0-30-generic
20.04.4 2.5.3-0.1.0 OFED-internal-23.10-4.0.9: linux-headers-5.13.0-30-generic
20.04.4 2.5.3-0.1.0 OFED-internal-23.10-4.0.9: linux-headers-5.13.0-30-generic
20.04.4 2.5.2-0.0.6 OFED-internal-23.10-3.2.2: linux-headers-5.13.0-30-generic
20.04.3 3.1.0-091000 OFED-internal-25.07-0.9.7: linux-headers-5.11.0-27-generic
20.04.3 2.9.1-0.1.9 OFED-internal-24.10-1.1.4: linux-headers-5.11.0-27-generic
20.04.3 2.5.3-0.1.0 OFED-internal-23.10-4.0.9: linux-headers-5.11.0-27-generic
20.04.3 2.5.3-0.1.0 OFED-internal-23.10-4.0.9: linux-headers-5.11.0-27-generic
20.04.3 2.5.2-0.0.6 OFED-internal-23.10-3.2.2: linux-headers-5.11.0-27-generic
20.04.2 3.1.0-091000 OFED-internal-25.07-0.9.7: linux-headers-5.8.0-41-generic
20.04.2 2.9.1-0.1.9 OFED-internal-24.10-1.1.4: linux-headers-5.8.0-41-generic
20.04.2 2.5.3-0.1.0 OFED-internal-23.10-4.0.9: linux-headers-5.8.0-41-generic
20.04.2 2.5.3-0.1.0 OFED-internal-23.10-4.0.9: linux-headers-5.8.0-41-generic
20.04.2 2.5.2-0.0.6 OFED-internal-23.10-3.2.2: linux-headers-5.8.0-41-generic
20.04.1 3.1.0-091000 OFED-internal-25.07-0.9.7: linux-headers-5.4.0-42-generic
20.04.1 2.9.1-0.1.9 OFED-internal-24.10-1.1.4: linux-headers-5.4.0-42-generic
20.04.1 2.5.3-0.1.0 OFED-internal-23.10-4.0.9: linux-headers-5.4.0-42-generic
20.04.1 2.5.3-0.1.0 OFED-internal-23.10-4.0.9: linux-headers-5.4.0-42-generic
20.04.1 2.5.2-0.0.6 OFED-internal-23.10-3.2.2: linux-headers-5.4.0-42-generic
20.04 3.1.0-091000 OFED-internal-25.07-0.9.7: linux-headers-5.4.0-26-generic
20.04 2.9.1-0.1.9 OFED-internal-24.10-1.1.4: linux-headers-5.4.0-26-generic
20.04 2.5.3-0.1.0 OFED-internal-23.10-4.0.9: linux-headers-5.4.0-26-generic
20.04 2.5.3-0.1.0 OFED-internal-23.10-4.0.9: linux-headers-5.4.0-26-generic
20.04 2.5.2-0.0.6 OFED-internal-23.10-3.2.2: linux-headers-5.4.0-26-generic
Tested OpenSUSE versions (with kernel RDMA drivers)
OpenSUSE Version Kernel version Pass/Fail
16.0 6.12.0-160000.5-default
15.6 6.4.0-150600.23.73-default
15.5 5.14.21-150500.55.88-default
15.4 5.14.21-150400.24.100-default
Tested OpenSUSE versions (with DOCA/OFED RDMA drivers)
OpenSUSE Version OFED Version DOCA Version Kernel Version Pass/Fail
15.6 3.1.0-091000 OFED-internal-25.07-0.9.7: 6.4.0-150600.21-default
15.6 2.9.1-0.1.9 OFED-internal-24.10-1.1.4: 6.4.0-150600.21-default
15.6 2.5.3-0.0.9 OFED-internal-23.10-4.0.9: 6.4.0-150600.21-default
15.6 2.5.3-0.0.9 OFED-internal-23.10-4.0.9: 6.4.0-150600.21-default
15.6 2.5.2-0.0.6 OFED-internal-23.10-3.2.2: 6.4.0-150600.21-default
15.5 3.1.0-091000 OFED-internal-25.07-0.9.7: 5.14.21-150500.53-default
15.5 2.9.1-0.1.9 OFED-internal-24.10-1.1.4: 5.14.21-150500.53-default
15.5 2.5.3-0.0.9 OFED-internal-23.10-4.0.9: 5.14.21-150500.53-default
15.5 2.5.3-0.0.9 OFED-internal-23.10-4.0.9: 5.14.21-150500.53-default
15.5 2.5.2-0.0.6 OFED-internal-23.10-3.2.2: 5.14.21-150500.53-default
15.4 3.1.0-091000 OFED-internal-25.07-0.9.7: 5.14.21-150400.22-default
15.4 2.9.1-0.1.9 OFED-internal-24.10-1.1.4: 5.14.21-150400.22-default
15.4 2.5.3-0.0.9 OFED-internal-23.10-4.0.9: 5.14.21-150400.22-default
15.4 2.5.3-0.0.9 OFED-internal-23.10-4.0.9: 5.14.21-150400.22-default
15.4 2.5.2-0.0.6 OFED-internal-23.10-3.2.2: 5.14.21-150400.22-default

Hint

An green ✅ indicates the client builds with that combination. A red ❌ indicates the client does not currently build with that combination.

Version Interoperability

Starting with version 8, BeeGFS more strictly adheres to semantic versioning guarantees. This means BeeGFS 8.2.0 components are compatible with components running any BeeGFS 8.y.z release, however the use of new functionality introduced in 8.2.0 requires the involved components to be running 8.2.0.

Note that BeeGFS 8 is not compatible with older major versions of BeeGFS due to changes in network and on-disk formats.

Upgrading from Older Versions

To upgrade from an older version, please refer to the Upgrade Guide.