Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 12 Jun 2021 06:08:26 +0000
From:      bugzilla-noreply@freebsd.org
To:        net@FreeBSD.org
Subject:   [Bug 256439] if_bridge(4): Kernel panic on FreeBSD 13.0-RELEASE: bridge_rthash
Message-ID:  <bug-256439-7501-eSYrEt3ctp@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-256439-7501@https.bugs.freebsd.org/bugzilla/>
References:  <bug-256439-7501@https.bugs.freebsd.org/bugzilla/>

next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D256439

--- Comment #26 from crypt47 <cryptogranny@gmail.com> ---
BTW, can somebody point me at ipfw packet flow diagram? It drives me crazy =
that
one packet may be injected in ipfw several times and why some directives st=
op
it's further flow and some don't. Example for just one ICMP packet that pas=
sed
two rules 5 times:

00302  2  168 setfib 1 ip from any to any tagged 1
00304  3  252 allow tag 1 icmp from x.x.x.x to any
00306  0    0 setfib 1 ip from any to any tagged 1
00308  0    0 allow log icmp from x.x.x.x to any

--=20
You are receiving this mail because:
You are on the CC list for the bug.
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-256439-7501-eSYrEt3ctp>