summaryrefslogtreecommitdiff
path: root/net/mptcp
diff options
context:
space:
mode:
authorPaolo Abeni <pabeni@redhat.com>2021-05-25 14:23:11 -0700
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2021-06-03 09:00:39 +0200
commitdeeb7d84f20a5b390c1b1bae088170f568958d20 (patch)
treeafc39a54fceab206a7bdca36ea718ce771639b4c /net/mptcp
parent71227b62143d6d3f7a59d689ecdb393273015a7a (diff)
mptcp: drop unconditional pr_warn on bad opt
commit 3812ce895047afdb78dc750a236515416e0ccded upstream. This is a left-over of early day. A malicious peer can flood the kernel logs with useless messages, just drop it. Fixes: f296234c98a8 ("mptcp: Add handling of incoming MP_JOIN requests") Signed-off-by: Paolo Abeni <pabeni@redhat.com> Signed-off-by: Mat Martineau <mathew.j.martineau@linux.intel.com> Signed-off-by: David S. Miller <davem@davemloft.net> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'net/mptcp')
-rw-r--r--net/mptcp/options.c1
1 files changed, 0 insertions, 1 deletions
diff --git a/net/mptcp/options.c b/net/mptcp/options.c
index a044dd43411d..91034a221983 100644
--- a/net/mptcp/options.c
+++ b/net/mptcp/options.c
@@ -127,7 +127,6 @@ static void mptcp_parse_option(const struct sk_buff *skb,
memcpy(mp_opt->hmac, ptr, MPTCPOPT_HMAC_LEN);
pr_debug("MP_JOIN hmac");
} else {
- pr_warn("MP_JOIN bad option size");
mp_opt->mp_join = 0;
}
break;