From 1a51050583bfd58e4a38810616610fdac5a96413 Mon Sep 17 00:00:00 2001 From: Ilya Dryomov Date: Sat, 21 Nov 2020 11:01:40 +0100 Subject: [PATCH] msg/async/ProtocolV2: allow rxbuf/txbuf get bigger in testing, again With CEPHX_V2 authorizer challenges brought back in commit 4a82c72e3bdd, these need to be bumped again, as two authorizers (without and then with the challenge) are transmitted and signed instead of one (without the challenge). See commit 94953dd9398a ("msg/async/ProtocolV2: allow rxbuf/txbuf get bigger in testing") for details. Signed-off-by: Ilya Dryomov (cherry picked from commit 422f922c4acdd0a0db3be41f2d55663c864df59d) --- src/msg/async/ProtocolV2.cc | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/src/msg/async/ProtocolV2.cc b/src/msg/async/ProtocolV2.cc index 8921693df79f..381d42c3d0af 100644 --- a/src/msg/async/ProtocolV2.cc +++ b/src/msg/async/ProtocolV2.cc @@ -740,7 +740,7 @@ CtPtr ProtocolV2::read(CONTINUATION_RXBPTR_TYPE &next, if (unlikely(pre_auth.enabled) && r >= 0) { pre_auth.rxbuf.append(*next.node); ceph_assert(!cct->_conf->ms_die_on_bug || - pre_auth.rxbuf.length() < 10000000); + pre_auth.rxbuf.length() < 20000000); } next.r = r; run_continuation(next); @@ -750,7 +750,7 @@ CtPtr ProtocolV2::read(CONTINUATION_RXBPTR_TYPE &next, if (unlikely(pre_auth.enabled) && r >= 0) { pre_auth.rxbuf.append(*next.node); ceph_assert(!cct->_conf->ms_die_on_bug || - pre_auth.rxbuf.length() < 10000000); + pre_auth.rxbuf.length() < 20000000); } next.r = r; return &next; @@ -782,7 +782,7 @@ CtPtr ProtocolV2::write(const std::string &desc, if (unlikely(pre_auth.enabled)) { pre_auth.txbuf.append(buffer); ceph_assert(!cct->_conf->ms_die_on_bug || - pre_auth.txbuf.length() < 10000000); + pre_auth.txbuf.length() < 20000000); } ssize_t r = -- 2.47.3