From owner-freebsd-hackers@FreeBSD.ORG Tue May 3 14:29:17 2005 Return-Path: Delivered-To: freebsd-hackers@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 453FD16A4CE for ; Tue, 3 May 2005 14:29:17 +0000 (GMT) Received: from mp2.macomnet.net (mp2.macomnet.net [195.128.64.6]) by mx1.FreeBSD.org (Postfix) with ESMTP id 3B8C943D8A for ; Tue, 3 May 2005 14:29:16 +0000 (GMT) (envelope-from maxim@macomnet.ru) Received-SPF: pass (mp2.macomnet.net: domain of maxim@macomnet.ru designates 127.0.0.1 as permitted sender) receiver=mp2.macomnet.net; client_ip=127.0.0.1; envelope-from=maxim@macomnet.ru; Received: from localhost (localhost [127.0.0.1]) by mp2.macomnet.net (8.12.11/8.12.11) with ESMTP id j43ETAj3027174; Tue, 3 May 2005 18:29:11 +0400 (MSD) (envelope-from maxim@macomnet.ru) Date: Tue, 3 May 2005 18:29:10 +0400 (MSD) From: Maxim Konovalov To: Imri Zvik In-Reply-To: Message-ID: <20050503182746.H26834@mp2.macomnet.net> References: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII cc: freebsd-hackers@freebsd.org Subject: Re: ipfw causing panic 4.11-RELEASE-p4 X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 03 May 2005 14:29:17 -0000 On Mon, 2 May 2005, 13:20+0300, Imri Zvik wrote: > Hi, > > I was playing around with ipfw, and when I tried something like: > > /sbin/ipfw disable firewall > > /sbin/ipfw flush && sysctl net.inet.ip.fw.dyn_buckets=600 > > > > /sbin/ipfw enable firewall > > > > The machine paniced: Mine doesn't: shy# uname -a FreeBSD shy.macomnet.ru 4.11-STABLE FreeBSD 4.11-STABLE #0: Thu Apr 21 05:48:09 MSD 2005 maxim@shy.macomnet.ru:/usr/obj/usr/src/sys/GENERIC i386 shy# /sbin/ipfw disable firewall shy# /sbin/ipfw flush && sysctl net.inet.ip.fw.dyn_buckets=600 Are you sure? [yn] y Flushed all rules. net.inet.ip.fw.dyn_buckets: 256 -> 600 shy# ipfw add 1 allow all from any to any 00001 allow ip from any to any shy# /sbin/ipfw enable firewall Could you show your rules? -- Maxim Konovalov