diff --git a/fs/ceph/file.c b/fs/ceph/file.c index f74563e11058..f9e775d6cdf0 100644 --- a/fs/ceph/file.c +++ b/fs/ceph/file.c @@ -2526,6 +2526,10 @@ static ssize_t __ceph_copy_file_range(struct file *src_file, loff_t src_off, return -EOPNOTSUPP; } + /* Every encrypted inode gets its own key, so we can't offload them */ + if (IS_ENCRYPTED(src_inode) || IS_ENCRYPTED(dst_inode)) + return -EOPNOTSUPP; + if (len < src_ci->i_layout.object_size) return -EOPNOTSUPP; /* no remote copy will be done */
If we have an encrypted inode, then the client will need to re-encrypt the contents of the new object. Disable copy offload to or from encrypted inodes. Signed-off-by: Jeff Layton <jlayton@kernel.org> --- fs/ceph/file.c | 4 ++++ 1 file changed, 4 insertions(+)