Date: Sat, 12 Jun 2021 06:08:26 +0000 From: bugzilla-noreply@freebsd.org To: net@FreeBSD.org Subject: [Bug 256439] if_bridge(4): Kernel panic on FreeBSD 13.0-RELEASE: bridge_rthash Message-ID: <bug-256439-7501-eSYrEt3ctp@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-256439-7501@https.bugs.freebsd.org/bugzilla/> References: <bug-256439-7501@https.bugs.freebsd.org/bugzilla/>
next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D256439 --- Comment #26 from crypt47 <cryptogranny@gmail.com> --- BTW, can somebody point me at ipfw packet flow diagram? It drives me crazy = that one packet may be injected in ipfw several times and why some directives st= op it's further flow and some don't. Example for just one ICMP packet that pas= sed two rules 5 times: 00302 2 168 setfib 1 ip from any to any tagged 1 00304 3 252 allow tag 1 icmp from x.x.x.x to any 00306 0 0 setfib 1 ip from any to any tagged 1 00308 0 0 allow log icmp from x.x.x.x to any --=20 You are receiving this mail because: You are on the CC list for the bug. You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-256439-7501-eSYrEt3ctp>