diff --git a/src/runmode-af-packet.c b/src/runmode-af-packet.c index f2500d3d3b0c..6b8eef1facbf 100644 --- a/src/runmode-af-packet.c +++ b/src/runmode-af-packet.c @@ -738,7 +738,10 @@ int AFPRunModeIsIPS() } if (has_ids && has_ips) { - SCLogInfo("AF_PACKET mode using IPS and IDS mode"); + SCLogWarning(SC_ERR_INVALID_ARGUMENT, + "AF_PACKET using both IPS and TAP/IDS mode, this will not " + "be allowed in Suricata 8 due to undefined behavior. See " + "https://redmine.openinfosecfoundation.org/issues/5588"); for (ldev = 0; ldev < nlive; ldev++) { const char *live_dev = LiveGetDeviceName(ldev); if (live_dev == NULL) { diff --git a/src/runmode-netmap.c b/src/runmode-netmap.c index 85c9d27e7f90..c0ac88019bcf 100644 --- a/src/runmode-netmap.c +++ b/src/runmode-netmap.c @@ -374,7 +374,10 @@ int NetmapRunModeIsIPS() } if (has_ids && has_ips) { - SCLogInfo("Netmap mode using IPS and IDS mode"); + SCLogWarning(SC_ERR_INVALID_ARGUMENT, + "Netmap using both IPS and TAP/IDS mode, this will not be " + "allowed in Suricata 8 due to undefined behavior. See " + "https://redmine.openinfosecfoundation.org/issues/5588"); for (ldev = 0; ldev < nlive; ldev++) { const char *live_dev = LiveGetDeviceName(ldev); if (live_dev == NULL) {