On Tue, 8 May 2007, Andrew Morton wrote:

>   happens when a local process sends packets with invalid IP headers
>   through raw sockets.
[...]
> Whatever happens, that printk should be toned down, shouldn't it?  We
> prefer to not let unprivileged apps spam the logs.

Isn't "unprivileged app sending packet through raw socket" an oxymoron? As 
Patrick pointed out, the message is there for a reason, I'd suggest using 
printk_ratelimit() in this case.

-- 
Jiri Kosina
-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to