smb: client: stop flooding dmesg in smb2_calc_signature()
authorPaulo Alcantara <pc@manguebit.com>
Wed, 18 Sep 2024 05:04:01 +0000 (02:04 -0300)
committerSteve French <stfrench@microsoft.com>
Thu, 26 Sep 2024 23:15:06 +0000 (18:15 -0500)
When having several mounts that share same credential and the client
couldn't re-establish an SMB session due to an expired kerberos ticket
or rotated password, smb2_calc_signature() will end up flooding dmesg
when not finding SMB sessions to calculate signatures.

Signed-off-by: Paulo Alcantara (Red Hat) <pc@manguebit.com>
Signed-off-by: Steve French <stfrench@microsoft.com>
fs/smb/client/smb2transport.c

index e4636fca821d9aae7a0afb48b0c47476c58eee2a..c8bf0000f73bdcd4329efa90e655c2618637f450 100644 (file)
@@ -242,7 +242,7 @@ smb2_calc_signature(struct smb_rqst *rqst, struct TCP_Server_Info *server,
 
        ses = smb2_find_smb_ses(server, le64_to_cpu(shdr->SessionId));
        if (unlikely(!ses)) {
-               cifs_server_dbg(VFS, "%s: Could not find session\n", __func__);
+               cifs_server_dbg(FYI, "%s: Could not find session\n", __func__);
                return -ENOENT;
        }