diff options
| author | Paulo Alcantara <[email protected]> | 2024-09-18 05:04:01 +0000 |
|---|---|---|
| committer | Steve French <[email protected]> | 2024-09-26 23:15:06 +0000 |
| commit | a13ca780afab350f37f8be9eda2bf79d1aed9bdd (patch) | |
| tree | eb1ebc0e50b3e7f11fa0638b32a1ebcea3cdb11c | |
| parent | smb: client: allocate crypto only for primary server (diff) | |
| download | kernel-a13ca780afab350f37f8be9eda2bf79d1aed9bdd.tar.gz kernel-a13ca780afab350f37f8be9eda2bf79d1aed9bdd.zip | |
smb: client: stop flooding dmesg in smb2_calc_signature()
When having several mounts that share same credential and the client
couldn't re-establish an SMB session due to an expired kerberos ticket
or rotated password, smb2_calc_signature() will end up flooding dmesg
when not finding SMB sessions to calculate signatures.
Signed-off-by: Paulo Alcantara (Red Hat) <[email protected]>
Signed-off-by: Steve French <[email protected]>
| -rw-r--r-- | fs/smb/client/smb2transport.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/fs/smb/client/smb2transport.c b/fs/smb/client/smb2transport.c index e4636fca821d..c8bf0000f73b 100644 --- a/fs/smb/client/smb2transport.c +++ b/fs/smb/client/smb2transport.c @@ -242,7 +242,7 @@ smb2_calc_signature(struct smb_rqst *rqst, struct TCP_Server_Info *server, ses = smb2_find_smb_ses(server, le64_to_cpu(shdr->SessionId)); if (unlikely(!ses)) { - cifs_server_dbg(VFS, "%s: Could not find session\n", __func__); + cifs_server_dbg(FYI, "%s: Could not find session\n", __func__); return -ENOENT; } |
