From: Ilya Dryomov Date: Sat, 21 Nov 2020 10:01:40 +0000 (+0100) Subject: msg/async/ProtocolV2: allow rxbuf/txbuf get bigger in testing, again X-Git-Tag: v16.1.0~499^2 X-Git-Url: http://git-server-git.apps.pok.os.sepia.ceph.com/?a=commitdiff_plain;h=422f922c4acdd0a0db3be41f2d55663c864df59d;p=ceph.git msg/async/ProtocolV2: allow rxbuf/txbuf get bigger in testing, again With CEPHX_V2 authorizer challenges brought back in commit 4a82c72e3bdd, these need to be bumped again, as two authorizers (without and then with the challenge) are transmitted and signed instead of one (without the challenge). See commit 94953dd9398a ("msg/async/ProtocolV2: allow rxbuf/txbuf get bigger in testing") for details. Signed-off-by: Ilya Dryomov --- diff --git a/src/msg/async/ProtocolV2.cc b/src/msg/async/ProtocolV2.cc index fff0e762062e..855006447f79 100644 --- a/src/msg/async/ProtocolV2.cc +++ b/src/msg/async/ProtocolV2.cc @@ -749,7 +749,7 @@ CtPtr ProtocolV2::read(CONTINUATION_RXBPTR_TYPE &next, if (unlikely(pre_auth.enabled) && r >= 0) { pre_auth.rxbuf.append(*next.node); ceph_assert(!cct->_conf->ms_die_on_bug || - pre_auth.rxbuf.length() < 10000000); + pre_auth.rxbuf.length() < 20000000); } next.r = r; run_continuation(next); @@ -759,7 +759,7 @@ CtPtr ProtocolV2::read(CONTINUATION_RXBPTR_TYPE &next, if (unlikely(pre_auth.enabled) && r == 0) { pre_auth.rxbuf.append(*next.node); ceph_assert(!cct->_conf->ms_die_on_bug || - pre_auth.rxbuf.length() < 10000000); + pre_auth.rxbuf.length() < 20000000); } next.r = r; return &next; @@ -791,7 +791,7 @@ CtPtr ProtocolV2::write(const std::string &desc, if (unlikely(pre_auth.enabled)) { pre_auth.txbuf.append(buffer); ceph_assert(!cct->_conf->ms_die_on_bug || - pre_auth.txbuf.length() < 10000000); + pre_auth.txbuf.length() < 20000000); } ssize_t r =