diff options
author | Paolo Abeni <pabeni@redhat.com> | 2021-05-25 23:23:11 +0200 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2021-05-26 00:56:20 +0200 |
commit | 3812ce895047afdb78dc750a236515416e0ccded (patch) | |
tree | 3f6d1cb8c25ff785268e8da25aee696080f7bdf1 | |
parent | mptcp: avoid OOB access in setsockopt() (diff) | |
download | linux-3812ce895047afdb78dc750a236515416e0ccded.tar.xz linux-3812ce895047afdb78dc750a236515416e0ccded.zip |
mptcp: drop unconditional pr_warn on bad opt
This is a left-over of early day. A malicious peer can flood
the kernel logs with useless messages, just drop it.
Fixes: f296234c98a8 ("mptcp: Add handling of incoming MP_JOIN requests")
Signed-off-by: Paolo Abeni <pabeni@redhat.com>
Signed-off-by: Mat Martineau <mathew.j.martineau@linux.intel.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
-rw-r--r-- | net/mptcp/options.c | 1 |
1 files changed, 0 insertions, 1 deletions
diff --git a/net/mptcp/options.c b/net/mptcp/options.c index 99fc21406168..71c535f4e1ef 100644 --- a/net/mptcp/options.c +++ b/net/mptcp/options.c @@ -130,7 +130,6 @@ static void mptcp_parse_option(const struct sk_buff *skb, memcpy(mp_opt->hmac, ptr, MPTCPOPT_HMAC_LEN); pr_debug("MP_JOIN hmac"); } else { - pr_warn("MP_JOIN bad option size"); mp_opt->mp_join = 0; } break; |