Well the packet origin is worthless, the result of logging potentially
harmful and the value of logging nil. You can log such packets into user
space (especially once the socket filters are in 2.2) and in user space
run some sensible attack analysis heuristics and also take evasive
action