From 422f922c4acdd0a0db3be41f2d55663c864df59d Mon Sep 17 00:00:00 2001 From: Ilya Dryomov Date: Sat, 21 Nov 2020 11:01:40 +0100 Subject: [PATCH] msg/async/ProtocolV2: allow rxbuf/txbuf get bigger in testing, again With CEPHX_V2 authorizer challenges brought back in commit 4a82c72e3bdd, these need to be bumped again, as two authorizers (without and then with the challenge) are transmitted and signed instead of one (without the challenge). See commit 94953dd9398a ("msg/async/ProtocolV2: allow rxbuf/txbuf get bigger in testing") for details. Signed-off-by: Ilya Dryomov --- src/msg/async/ProtocolV2.cc | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/src/msg/async/ProtocolV2.cc b/src/msg/async/ProtocolV2.cc index fff0e762062..855006447f7 100644 --- a/src/msg/async/ProtocolV2.cc +++ b/src/msg/async/ProtocolV2.cc @@ -749,7 +749,7 @@ CtPtr ProtocolV2::read(CONTINUATION_RXBPTR_TYPE &next, if (unlikely(pre_auth.enabled) && r >= 0) { pre_auth.rxbuf.append(*next.node); ceph_assert(!cct->_conf->ms_die_on_bug || - pre_auth.rxbuf.length() < 10000000); + pre_auth.rxbuf.length() < 20000000); } next.r = r; run_continuation(next); @@ -759,7 +759,7 @@ CtPtr ProtocolV2::read(CONTINUATION_RXBPTR_TYPE &next, if (unlikely(pre_auth.enabled) && r == 0) { pre_auth.rxbuf.append(*next.node); ceph_assert(!cct->_conf->ms_die_on_bug || - pre_auth.rxbuf.length() < 10000000); + pre_auth.rxbuf.length() < 20000000); } next.r = r; return &next; @@ -791,7 +791,7 @@ CtPtr ProtocolV2::write(const std::string &desc, if (unlikely(pre_auth.enabled)) { pre_auth.txbuf.append(buffer); ceph_assert(!cct->_conf->ms_die_on_bug || - pre_auth.txbuf.length() < 10000000); + pre_auth.txbuf.length() < 20000000); } ssize_t r = -- 2.39.5