File Systems and Storage
The following features, enhancements, and changes related to file systems and storage are introduced in this Oracle Linux 10 release.
cryptsetup
Released at Version 2.7
cryptsetup
version 2.7 includes the following changes:
libcryptsetup
improved support for LUKS encrypted devices in thekdump
enabled systems.- Critical fixes for LUKS2 SED OPAL feature.
- known or already fixed issues with LUSK2 SED OPAL feature avoided.
Snapshot Manager
The Snapshot Manager, snapm
, is a new software component designed
to help manage system state snapshots when a system is using copy-on-write and thinly
provisioned logical volume management (LVM2) volumes. You can use
snapm
to create snapshots of the system at a moment in time and
to rollback to that system state based on the snapshot that you have taken.
See https://github.com/snapshotmanager/snapm for more information about this utility.
device-mapper-multipath
Released at Version 0.9.9
The device-mapper-multipath
package is released at version 0.9.9, providing
various bug fixes and enhancements.
This update includes several notable changes and enhancements, including:
-
The
multipathd.socket systemd
unit is no longer enabled by default. However,multipathd
continues to run automatically on boot. If stopped, you must restart it manually or update themultipathd.socket
systemd file to uncomment the line:# WantedBy=sockets.target
-
multipathd
runs as a real-time process with a moderate priority (10) by default. If unsuccessful, it continues to run as a normal process, but with an increased priority. -
The
systemctl reload multipathd.service
ormultipathd reconfigure
commands reload a device only if something has changed, instead of reloading everymultipath
device. -
A new
path_grouping_policy
calledgroup_by_tpg
is introduced to group paths by their alua target port group. -
Configuration settings
detect_pgpolicy
anddetect_pgpolicy_use_tpg
are introduced to control the path grouping policy.-
detect_pgpolicy
is a configuration setting that controls whethermultipath
automatically detects the path grouping policy for a device. If enabled,multipath
sets thepath_grouping_policy
togroup_by_prio
orgroup_by_tpg
based on the prioritizer used. -
detect_pgpolicy_use_tpg
is a configuration setting that controls whetherdetect_pgpolicy
sets thepath_grouping_policy
togroup_by_tpg
when the prioritizer isalua
orsysfs
. If enabled,detect_pgpolicy
sets the policy togroup_by_tpg
; otherwise, it sets the policy togroup_by_prio
.
-
NVMe SED Available
The nvme-cli
and cryptsetup
commands can
automate encryption management and drive unlocking for NVMe Self-Encrypting Drives
(SED). NVMe SED is an Opal storage specification of hardware encryption technology that
provides a secure way to protect data at rest by encrypting data stored on the
drive.
To use NVMe SED options on an NVMe disk with nvme-cli
, you can
perform the following actions:
-
Discover SED features on a SED Opal device. See the
nvme-sed-discover(1)
manual page.nvme sed discover /dev/nvme0n1
-
Initialize a SED Opal device for locking. See the
nvme-sed-initialize(1)
manual page.nvme sed initialize /dev/nvme0n1
-
Lock a SED Opal device. See the
nvme-sed-lock(1)
manual page.nvme sed lock /dev/nvme0n1
-
Unlock a SED Opal device. See the
nvme-sed-unlock(1)
manual page.nvme sed unlock /dev/nvme0n1
-
Change the locking password on a SED Opal device. See the
nvme-sed-password(1)
manual page.nvme sed password /dev/nvme0n1
-
Revert a SED Opal device from it's locking state. See the
nvme-sed-revert(1)
manual page.nvme sed revert /dev/nvme0n1
These commands provide a flexible and secure way to manage NVMe SEDs, to automate encryption management and drive unlocking.
NFS with TLS Support
NFS with Transport Layer Security (TLS) is now fully supported on RHCK, enhancing NFS security by encrypting RPC traffic.
NFS with TLS is available in previous releases with UEK R7U3 and later. NFS with TLS continues to be support with UEK 8.
Atomic Write
Oracle Linux 10 introduces atomic write in RHCK, ensuring that write operations are atomic and preventing partial data writes or torn writes.
Atomic write is useful for applications that require high data consistency and reliability, such as databases. By ensuring that write operations are atomic, applications can optimize their performance and reduce the risk of data corruption or loss.
When atomic write is enabled, the file system, block layer, and drivers work together to ensure that write operations are run as a single, atomic unit.
To take advantage of atomic write, applications must use the RWF_ATOMIC
flag when performing write operations by using various programming interfaces, such as
the write()
system call or higher-level libraries and frameworks.