diff options
author | Jakub Kicinski <jakub.kicinski@netronome.com> | 2019-04-25 12:32:01 -0700 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2019-04-27 16:52:21 -0400 |
commit | e49d268db95b90f1fd97d4e3de1ec9f4bcfa8399 (patch) | |
tree | b2b3ea1f026a31f9ae42ab293d835cf004e8e948 /arch/openrisc | |
parent | 30e5a9a5ba853b896250f0665a2e10bbafa2f6bc (diff) | |
download | linux-e49d268db95b90f1fd97d4e3de1ec9f4bcfa8399.tar.gz linux-e49d268db95b90f1fd97d4e3de1ec9f4bcfa8399.tar.bz2 linux-e49d268db95b90f1fd97d4e3de1ec9f4bcfa8399.zip |
net/tls: don't log errors every time offload can't proceed
Currently when CONFIG_TLS_DEVICE is set each time kTLS
connection is opened and the offload is not successful
(either because the underlying device doesn't support
it or e.g. it's tables are full) a rate limited error
will be printed to the logs.
There is nothing wrong with failing TLS offload. SW
path will process the packets just fine, drop the
noisy messages.
Signed-off-by: Jakub Kicinski <jakub.kicinski@netronome.com>
Reviewed-by: Simon Horman <simon.horman@netronome.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'arch/openrisc')
0 files changed, 0 insertions, 0 deletions