On Thu, Dec 6, 2018 at 1:41 AM William Allen Simpson <
william.allen.simpson(a)gmail.com> wrote:
In any case, this particular denial of service attack should be easy to
fix by
adding SVC_DESTROY to the Ganesha umount code path(s).
Should I do SVC_DESTROY or SVC_RELEASE in unmount?
Also I am not sure if we will hit this issue if client mount and reboot
without unmount.
I will test that, will unmount fix work in that case?
However, because it seems
rather unlikely this could happen in production, it's not currently a high
priority.
Do you have a production environment or customer report where this
occurred?
No its not customer issue, I faced it after taking extra ref fix
https://github.com/nfs-ganesha/ntirpc/pull/155.
But as I mentioned earlier if it happens in client reboot case also then
its likely to happen in production if there is client which is crashing and
coming up. I will check it.
Would you like help writing the Ganesha patch?
I would surely like to help with the fix.
Are you with Nutanix? Or IBM?
I am with Nutanix.
-Gaurav