[GIT PULL] Ceph updates for 7.0-rc1
From: Ilya Dryomov
Date: Tue Feb 17 2026 - 12:40:26 EST
Hi Linus,
The following changes since commit 05f7e89ab9731565d8a62e3b5d1ec206485eeb0b:
Linux 6.19 (2026-02-08 13:03:27 -0800)
are available in the Git repository at:
https://github.com/ceph/ceph-client.git tags/ceph-for-7.0-rc1
for you to fetch changes up to cfdde144ae455b8612a756fe7419d57c9b7833c1:
ceph: assert loop invariants in ceph_writepages_start() (2026-02-11 19:14:32 +0100)
----------------------------------------------------------------
This adds support for the upcoming aes256k key type in CephX that is
based on Kerberos 5 and brings a bunch of assorted CephFS fixes from
Ethan and Sam. One of Sam's patches in particular undoes a change in
the fscrypt area that had an inadvertent side effect of making CephFS
behave as if mounted with wsize=4096 and leading to the corresponding
degradation in performance, especially for sequential writes.
----------------------------------------------------------------
Ilya Dryomov (5):
libceph: define and enforce CEPH_MAX_KEY_LEN
libceph: generalize ceph_x_encrypt_offset() and ceph_x_encrypt_buflen()
libceph: introduce ceph_crypto_key_prepare()
libceph: add support for CEPH_CRYPTO_AES256KRB5
libceph: adapt ceph_x_challenge_blob hashing and msgr1 message signing
Sam Edwards (4):
ceph: do not propagate page array emplacement errors as batch errors
ceph: fix write storm on fscrypted files
ceph: remove error return from ceph_process_folio_batch()
ceph: assert loop invariants in ceph_writepages_start()
ethanwu (2):
ceph: supply snapshot context in ceph_zero_partial_object()
ceph: supply snapshot context in ceph_uninline_data()
fs/ceph/addr.c | 47 +++++---
fs/ceph/file.c | 17 ++-
include/linux/ceph/ceph_fs.h | 5 +-
net/ceph/Kconfig | 1 +
net/ceph/auth_x.c | 195 +++++++++++++++++++++---------
net/ceph/auth_x_protocol.h | 38 ++++++
net/ceph/crypto.c | 275 +++++++++++++++++++++++++++++++++++--------
net/ceph/crypto.h | 21 +++-
net/ceph/messenger_v2.c | 16 +--
9 files changed, 481 insertions(+), 134 deletions(-)