|
@@ -2397,8 +2397,6 @@ cifs_set_cifscreds(struct smb_vol *vol __attribute__((unused)),
|
|
|
}
|
|
|
#endif /* CONFIG_KEYS */
|
|
|
|
|
|
-static bool warned_on_ntlm; /* globals init to false automatically */
|
|
|
-
|
|
|
static struct cifs_ses *
|
|
|
cifs_get_smb_ses(struct TCP_Server_Info *server, struct smb_vol *volume_info)
|
|
|
{
|
|
@@ -2475,14 +2473,6 @@ cifs_get_smb_ses(struct TCP_Server_Info *server, struct smb_vol *volume_info)
|
|
|
ses->cred_uid = volume_info->cred_uid;
|
|
|
ses->linux_uid = volume_info->linux_uid;
|
|
|
|
|
|
- /* ntlmv2 is much stronger than ntlm security, and has been broadly
|
|
|
- supported for many years, time to update default security mechanism */
|
|
|
- if ((volume_info->secFlg == 0) && warned_on_ntlm == false) {
|
|
|
- warned_on_ntlm = true;
|
|
|
- cERROR(1, "default security mechanism requested. The default "
|
|
|
- "security mechanism will be upgraded from ntlm to "
|
|
|
- "ntlmv2 in kernel release 3.3");
|
|
|
- }
|
|
|
ses->overrideSecFlg = volume_info->secFlg;
|
|
|
|
|
|
mutex_lock(&ses->session_mutex);
|