diff options
author | Xiubo Li <xiubli@redhat.com> | 2022-03-29 12:48:01 +0800 |
---|---|---|
committer | Ilya Dryomov <idryomov@gmail.com> | 2022-05-25 20:45:13 +0200 |
commit | 1980b1bf17a4975fee5ee42df167f50f7f67b3d9 (patch) | |
tree | 85ccf90fb9122521b686bc00e4e11a710da75f31 /security | |
parent | 6c1dc50284c4dab9f1e563efba6f9c4a47af894a (diff) | |
download | linux-1980b1bf17a4975fee5ee42df167f50f7f67b3d9.tar.bz2 |
ceph: stop forwarding the request when exceeding 256 times
The type of 'num_fwd' in ceph 'MClientRequestForward' is 'int32_t',
while in 'ceph_mds_request_head' the type is '__u8'. So in case
the request bounces between MDSes exceeding 256 times, the client
will get stuck.
In this case it's ususally a bug in MDS and continue bouncing the
request makes no sense.
URL: https://tracker.ceph.com/issues/55130
Signed-off-by: Xiubo Li <xiubli@redhat.com>
Reviewed-by: Jeff Layton <jlayton@kernel.org>
Reviewed-by: Luís Henriques <lhenriques@suse.de>
Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
Diffstat (limited to 'security')
0 files changed, 0 insertions, 0 deletions