Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 12 Jun 2021 06:08:26 +0000
From:      bugzilla-noreply@freebsd.org
To:        net@FreeBSD.org
Subject:   [Bug 256439] if_bridge(4): Kernel panic on FreeBSD 13.0-RELEASE: bridge_rthash
Message-ID:  <bug-256439-7501-eSYrEt3ctp@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-256439-7501@https.bugs.freebsd.org/bugzilla/>

index | next in thread | previous in thread | raw e-mail

https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=256439

--- Comment #26 from crypt47 <cryptogranny@gmail.com> ---
BTW, can somebody point me at ipfw packet flow diagram? It drives me crazy that
one packet may be injected in ipfw several times and why some directives stop
it's further flow and some don't. Example for just one ICMP packet that passed
two rules 5 times:

00302  2  168 setfib 1 ip from any to any tagged 1
00304  3  252 allow tag 1 icmp from x.x.x.x to any
00306  0    0 setfib 1 ip from any to any tagged 1
00308  0    0 allow log icmp from x.x.x.x to any

-- 
You are receiving this mail because:
You are on the CC list for the bug.
You are the assignee for the bug.

home | help

Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-256439-7501-eSYrEt3ctp>