Date: Tue, 19 Dec 2017 20:33:13 +0700 From: Eugene Grosbein <eugen@grosbein.net> To: wishmaster <artemrts@ukr.net>, freebsd-net@freebsd.org Subject: Re: ng_patch and swap_pager_getswapspace error Message-ID: <5A391519.8040707@grosbein.net> In-Reply-To: <1513663683.700534911.voagagit@frv52.fwdcdn.com> References: <1513663683.700534911.voagagit@frv52.fwdcdn.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On 19.12.2017 13:15, wishmaster wrote: > Hi, > > after I have applied ng_patch for setting TTL for outgoing packets with below rules > > kldload ng_ipfw 2>/dev/null > kldload ng_patch 2>/dev/null > > /usr/sbin/ngctl -f- <<-SEQ > mkpeer ipfw: patch 100 in > name ipfw:100 ttl_set > msg ttl_set: setconfig { count=1 csum_flags=1 ops=[ \ > { mode=1 value=128 length=1 offset=8 } ] } > SEQ > > /sbin/ipfw add 15002 netgraph 100 ip from me to not me recv "*" Why do you have incoming ip packets sourced from your IP? This generally means source was spoofed and such incoming packets should be silently dropped. > What is this? "After" does not mean "because of". Your processes ate all memory and swap and ng_patch cannot be responsible for that.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?5A391519.8040707>