In <[EMAIL PROTECTED]> Russell King <[EMAIL PROTECTED]> 
writes:

>NAT: 3 dropping untracked packet c065d3a0 1 192.168.0.1 -> 192.168.0.9

I see loads of these, in a firewall (state matching) and SNAT setup.
When I send mail, I see them quite regularly.  It is quite annoying,
since they get dumped to the active text-mode console, in addition to
being logged.

Looking at the code a while back, quite a few of the netfilter
printk()'s did not have a log-level setting. Was this omitted
intentionally ? (Just checked 2.4.0-test9-pre4, it hasn't changed).
-- 
Henrik Storner      | "Crackers thrive on code secrecy. Cockcroaches breed 
<[EMAIL PROTECTED]> |  in the dark. It's time to let the sunlight in."
                    |  
                    |          Eric S. Raymond, re. the Frontpage backdoor
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/

Reply via email to