diff options
author | Tim Potter <tpot@samba.org> | 2001-08-23 18:05:44 +0000 |
---|---|---|
committer | Tim Potter <tpot@samba.org> | 2001-08-23 18:05:44 +0000 |
commit | 95307a5d3881803e57639431da967ee3872aacc4 (patch) | |
tree | 3aa2d86c10a956ecfad6ccfc3d0abd4d242176ee | |
parent | a896dc299eba12886d800e6c88309d534232cabc (diff) | |
download | samba-95307a5d3881803e57639431da967ee3872aacc4.tar.gz samba-95307a5d3881803e57639431da967ee3872aacc4.tar.xz samba-95307a5d3881803e57639431da967ee3872aacc4.zip |
Fix for filers sending -1 for the maximum read request length on the
LSA pipe.
-rw-r--r-- | source/rpc_server/srv_pipe_hnd.c | 10 |
1 files changed, 7 insertions, 3 deletions
diff --git a/source/rpc_server/srv_pipe_hnd.c b/source/rpc_server/srv_pipe_hnd.c index baa02beb654..cdcdb82923f 100644 --- a/source/rpc_server/srv_pipe_hnd.c +++ b/source/rpc_server/srv_pipe_hnd.c @@ -775,10 +775,14 @@ ssize_t read_from_pipe(pipes_struct *p, char *data, size_t n) * read request. */ + /* This condition should result in the connection being closed. + Netapp filers seem to set it to 0xffff which results in domain + authentications failing. Just ignore it so things work. */ + if(n > MAX_PDU_FRAG_LEN) { - DEBUG(0,("read_from_pipe: too large read (%u) requested on pipe %s. We can \ -only service %d sized reads.\n", (unsigned int)n, p->name, MAX_PDU_FRAG_LEN )); - return -1; + DEBUG(5,("read_from_pipe: too large read (%u) requested on " + "pipe %s. We can only service %d sized reads.\n", + (unsigned int)n, p->name, MAX_PDU_FRAG_LEN )); } /* |