summaryrefslogtreecommitdiff
path: root/source3
diff options
context:
space:
mode:
authorVolker Lendecke <vlendec@samba.org>2004-07-05 09:46:38 +0000
committerGerald (Jerry) Carter <jerry@samba.org>2007-10-10 10:52:07 -0500
commit5f9af6df053f6608fba9a9c17a4945189de38a58 (patch)
treec3645ee4238cfa47dc8f029d117044f171a20965 /source3
parent7b4151e173323e6ebc05a7ccc1671ab88f4e1660 (diff)
downloadsamba-5f9af6df053f6608fba9a9c17a4945189de38a58.tar.gz
samba-5f9af6df053f6608fba9a9c17a4945189de38a58.tar.bz2
samba-5f9af6df053f6608fba9a9c17a4945189de38a58.zip
r1338: A netlogon schannel failure is a normal event with XP clients. They cache the
netlogon session key and try to reconnect using that key. This fails with a restarted smbd, we expect another serverauth2. XP falls back immediately. Make the corresponding messages a debug level 3, not 0 to not flood log.smbd. Volker (This used to be commit 4fda68a62fec6c1e95d5176bc5d06bd49da6f358)
Diffstat (limited to 'source3')
-rw-r--r--source3/rpc_server/srv_pipe.c2
-rw-r--r--source3/rpc_server/srv_pipe_hnd.c2
2 files changed, 2 insertions, 2 deletions
diff --git a/source3/rpc_server/srv_pipe.c b/source3/rpc_server/srv_pipe.c
index 13d894d2d8..36929150e5 100644
--- a/source3/rpc_server/srv_pipe.c
+++ b/source3/rpc_server/srv_pipe.c
@@ -1397,7 +1397,7 @@ BOOL api_pipe_netsec_process(pipes_struct *p, prs_struct *rpc_in)
SENDER_IS_INITIATOR,
&netsec_chk,
prs_data_p(rpc_in)+old_offset, data_len)) {
- DEBUG(0,("failed to decode PDU\n"));
+ DEBUG(3,("failed to decode PDU\n"));
return False;
}
diff --git a/source3/rpc_server/srv_pipe_hnd.c b/source3/rpc_server/srv_pipe_hnd.c
index ccf571a0e2..7f7a3025a9 100644
--- a/source3/rpc_server/srv_pipe_hnd.c
+++ b/source3/rpc_server/srv_pipe_hnd.c
@@ -602,7 +602,7 @@ static BOOL process_request_pdu(pipes_struct *p, prs_struct *rpc_in_p)
}
if (p->netsec_auth_validated && !api_pipe_netsec_process(p, rpc_in_p)) {
- DEBUG(0,("process_request_pdu: failed to do schannel processing.\n"));
+ DEBUG(3,("process_request_pdu: failed to do schannel processing.\n"));
set_incoming_fault(p);
return False;
}