1 /* $OpenBSD: pfctl.c,v 1.213 2004/03/20 09:31:42 david Exp $ */
2 /* $DragonFly: src/usr.sbin/pfctl/pfctl.c,v 1.1 2004/09/21 21:25:28 joerg Exp $ */
5 * Copyright (c) 2001 Daniel Hartmeier
6 * Copyright (c) 2002,2003 Henning Brauer
9 * Redistribution and use in source and binary forms, with or without
10 * modification, are permitted provided that the following conditions
13 * - Redistributions of source code must retain the above copyright
14 * notice, this list of conditions and the following disclaimer.
15 * - Redistributions in binary form must reproduce the above
16 * copyright notice, this list of conditions and the following
17 * disclaimer in the documentation and/or other materials provided
18 * with the distribution.
20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
21 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
22 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
23 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
24 * COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
25 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
26 * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
27 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
28 * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
30 * ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
31 * POSSIBILITY OF SUCH DAMAGE.
35 #include <sys/param.h>
36 #include <sys/ioctl.h>
37 #include <sys/socket.h>
40 #include <netinet/in.h>
41 #include <net/pf/pfvar.h>
42 #include <arpa/inet.h>
44 #include <altq/altq.h>
57 #include "pfctl_parser.h"
61 int pfctl_enable(int, int);
62 int pfctl_disable(int, int);
63 int pfctl_clear_stats(int, int);
64 int pfctl_clear_rules(int, int, char *, char *);
65 int pfctl_clear_nat(int, int, char *, char *);
66 int pfctl_clear_altq(int, int);
67 int pfctl_clear_src_nodes(int, int);
68 int pfctl_clear_states(int, const char *, int);
69 int pfctl_kill_states(int, const char *, int);
70 int pfctl_get_pool(int, struct pf_pool *, u_int32_t, u_int32_t, int,
72 void pfctl_print_rule_counters(struct pf_rule *, int);
73 int pfctl_show_rules(int, int, int, char *, char *);
74 int pfctl_show_nat(int, int, char *, char *);
75 int pfctl_show_src_nodes(int, int);
76 int pfctl_show_states(int, const char *, int);
77 int pfctl_show_status(int, int);
78 int pfctl_show_timeouts(int, int);
79 int pfctl_show_limits(int, int);
80 int pfctl_debug(int, u_int32_t, int);
81 int pfctl_clear_rule_counters(int, int);
82 int pfctl_test_altqsupport(int, int);
83 int pfctl_show_anchors(int, int, char *);
84 const char *pfctl_lookup_option(char *, const char **);
91 const char *pf_device = "/dev/pf";
94 const char *tblcmdopt;
106 static const struct {
110 { "states", PF_LIMIT_STATES },
111 { "src-nodes", PF_LIMIT_SRC_NODES },
112 { "frags", PF_LIMIT_FRAGS },
120 static const struct pf_hint pf_hint_normal[] = {
121 { "tcp.first", 2 * 60 },
122 { "tcp.opening", 30 },
123 { "tcp.established", 24 * 60 * 60 },
124 { "tcp.closing", 15 * 60 },
125 { "tcp.finwait", 45 },
126 { "tcp.closed", 90 },
129 static const struct pf_hint pf_hint_satellite[] = {
130 { "tcp.first", 3 * 60 },
131 { "tcp.opening", 30 + 5 },
132 { "tcp.established", 24 * 60 * 60 },
133 { "tcp.closing", 15 * 60 + 5 },
134 { "tcp.finwait", 45 + 5 },
135 { "tcp.closed", 90 + 5 },
138 static const struct pf_hint pf_hint_conservative[] = {
139 { "tcp.first", 60 * 60 },
140 { "tcp.opening", 15 * 60 },
141 { "tcp.established", 5 * 24 * 60 * 60 },
142 { "tcp.closing", 60 * 60 },
143 { "tcp.finwait", 10 * 60 },
144 { "tcp.closed", 3 * 60 },
147 static const struct pf_hint pf_hint_aggressive[] = {
149 { "tcp.opening", 5 },
150 { "tcp.established", 5 * 60 * 60 },
151 { "tcp.closing", 60 },
152 { "tcp.finwait", 30 },
153 { "tcp.closed", 30 },
157 static const struct {
159 const struct pf_hint *hint;
161 { "normal", pf_hint_normal },
162 { "satellite", pf_hint_satellite },
163 { "high-latency", pf_hint_satellite },
164 { "conservative", pf_hint_conservative },
165 { "aggressive", pf_hint_aggressive },
169 static const char *clearopt_list[] = {
170 "nat", "queue", "rules", "Sources",
171 "state", "info", "Tables", "osfp", "all", NULL
174 static const char *showopt_list[] = {
175 "nat", "queue", "rules", "Anchors", "Sources", "state", "info",
176 "Interfaces", "labels", "timeouts", "memory", "Tables", "osfp",
180 static const char *tblcmdopt_list[] = {
181 "kill", "flush", "add", "delete", "load", "replace", "show",
185 static const char *debugopt_list[] = {
186 "none", "urgent", "misc", "loud", NULL
193 fprintf(stderr, "usage: %s [-AdeghNnOqRrvz] ", getprogname());
194 fprintf(stderr, "[-a anchor[:ruleset]] [-D macro=value]\n");
195 fprintf(stderr, " ");
196 fprintf(stderr, "[-F modifier] [-f file] [-i interface] ");
197 fprintf(stderr, "[-k host] [-p device]\n");
198 fprintf(stderr, " ");
199 fprintf(stderr, "[-s modifier] [-T command [address ...]] ");
200 fprintf(stderr, "[-t table] [-x level]\n");
205 pfctl_enable(int dev, int opts)
207 if (ioctl(dev, DIOCSTART)) {
209 errx(1, "pf already enabled");
213 if ((opts & PF_OPT_QUIET) == 0)
214 fprintf(stderr, "pf enabled\n");
216 if (altqsupport && ioctl(dev, DIOCSTARTALTQ))
218 err(1, "DIOCSTARTALTQ");
224 pfctl_disable(int dev, int opts)
226 if (ioctl(dev, DIOCSTOP)) {
228 errx(1, "pf not enabled");
232 if ((opts & PF_OPT_QUIET) == 0)
233 fprintf(stderr, "pf disabled\n");
235 if (altqsupport && ioctl(dev, DIOCSTOPALTQ))
237 err(1, "DIOCSTOPALTQ");
243 pfctl_clear_stats(int dev, int opts)
245 if (ioctl(dev, DIOCCLRSTATUS))
246 err(1, "DIOCCLRSTATUS");
247 if ((opts & PF_OPT_QUIET) == 0)
248 fprintf(stderr, "pf: statistics cleared\n");
253 pfctl_clear_rules(int dev, int opts, char *anchorname, char *rulesetname)
257 if (*anchorname && !*rulesetname) {
258 struct pfioc_ruleset pr;
261 memset(&pr, 0, sizeof(pr));
262 memcpy(pr.anchor, anchorname, sizeof(pr.anchor));
263 if (ioctl(dev, DIOCGETRULESETS, &pr)) {
265 fprintf(stderr, "No rulesets in anchor '%s'.\n",
268 err(1, "DIOCGETRULESETS");
272 for (nr = mnr - 1; nr >= 0; --nr) {
274 if (ioctl(dev, DIOCGETRULESET, &pr))
275 err(1, "DIOCGETRULESET");
276 r = pfctl_clear_rules(dev, opts | PF_OPT_QUIET,
277 anchorname, pr.name);
281 if ((opts & PF_OPT_QUIET) == 0)
282 fprintf(stderr, "rules cleared\n");
285 memset(&t, 0, sizeof(t));
286 t.pfrb_type = PFRB_TRANS;
287 if (pfctl_add_trans(&t, PF_RULESET_SCRUB, anchorname, rulesetname) ||
288 pfctl_add_trans(&t, PF_RULESET_FILTER, anchorname, rulesetname) ||
289 pfctl_trans(dev, &t, DIOCXBEGIN, 0) ||
290 pfctl_trans(dev, &t, DIOCXCOMMIT, 0))
291 err(1, "pfctl_clear_rules");
292 if ((opts & PF_OPT_QUIET) == 0)
293 fprintf(stderr, "rules cleared\n");
298 pfctl_clear_nat(int dev, int opts, char *anchorname, char *rulesetname)
302 if (*anchorname && !*rulesetname) {
303 struct pfioc_ruleset pr;
306 memset(&pr, 0, sizeof(pr));
307 memcpy(pr.anchor, anchorname, sizeof(pr.anchor));
308 if (ioctl(dev, DIOCGETRULESETS, &pr)) {
310 fprintf(stderr, "No rulesets in anchor '%s'.\n",
313 err(1, "DIOCGETRULESETS");
317 for (nr = mnr - 1; nr >= 0; --nr) {
319 if (ioctl(dev, DIOCGETRULESET, &pr))
320 err(1, "DIOCGETRULESET");
321 r = pfctl_clear_nat(dev, opts | PF_OPT_QUIET,
322 anchorname, pr.name);
326 if ((opts & PF_OPT_QUIET) == 0)
327 fprintf(stderr, "nat cleared\n");
330 memset(&t, 0, sizeof(t));
331 t.pfrb_type = PFRB_TRANS;
332 if (pfctl_add_trans(&t, PF_RULESET_NAT, anchorname, rulesetname) ||
333 pfctl_add_trans(&t, PF_RULESET_BINAT, anchorname, rulesetname) ||
334 pfctl_add_trans(&t, PF_RULESET_RDR, anchorname, rulesetname) ||
335 pfctl_trans(dev, &t, DIOCXBEGIN, 0) ||
336 pfctl_trans(dev, &t, DIOCXCOMMIT, 0))
337 err(1, "pfctl_clear_nat");
338 if ((opts & PF_OPT_QUIET) == 0)
339 fprintf(stderr, "nat cleared\n");
343 #ifndef __DragonFly__
345 pfctl_clear_altq(int dev, int opts)
351 memset(&t, 0, sizeof(t));
352 t.pfrb_type = PFRB_TRANS;
353 if (pfctl_add_trans(&t, PF_RULESET_ALTQ, "", "") ||
354 pfctl_trans(dev, &t, DIOCXBEGIN, 0) ||
355 pfctl_trans(dev, &t, DIOCXCOMMIT, 0))
356 err(1, "pfctl_clear_altq");
357 if ((opts & PF_OPT_QUIET) == 0)
358 fprintf(stderr, "altq cleared\n");
364 pfctl_clear_src_nodes(int dev, int opts)
366 if (ioctl(dev, DIOCCLRSRCNODES))
367 err(1, "DIOCCLRSRCNODES");
368 if ((opts & PF_OPT_QUIET) == 0)
369 fprintf(stderr, "source tracking entries cleared\n");
374 pfctl_clear_states(int dev, const char *iface, int opts)
376 struct pfioc_state_kill psk;
378 memset(&psk, 0, sizeof(psk));
379 if (iface != NULL && strlcpy(psk.psk_ifname, iface,
380 sizeof(psk.psk_ifname)) >= sizeof(psk.psk_ifname))
381 errx(1, "invalid interface: %s", iface);
383 if (ioctl(dev, DIOCCLRSTATES, &psk))
384 err(1, "DIOCCLRSTATES");
385 if ((opts & PF_OPT_QUIET) == 0)
386 fprintf(stderr, "%d states cleared\n", psk.psk_af);
391 pfctl_kill_states(int dev, const char *iface, int opts)
393 struct pfioc_state_kill psk;
394 struct addrinfo *res[2], *resp[2];
395 struct sockaddr last_src, last_dst;
396 int killed, sources, dests;
399 killed = sources = dests = 0;
401 memset(&psk, 0, sizeof(psk));
402 memset(&psk.psk_src.addr.v.a.mask, 0xff,
403 sizeof(psk.psk_src.addr.v.a.mask));
404 memset(&last_src, 0xff, sizeof(last_src));
405 memset(&last_dst, 0xff, sizeof(last_dst));
406 if (iface != NULL && strlcpy(psk.psk_ifname, iface,
407 sizeof(psk.psk_ifname)) >= sizeof(psk.psk_ifname))
408 errx(1, "invalid interface: %s", iface);
410 if ((ret_ga = getaddrinfo(state_kill[0], NULL, NULL, &res[0]))) {
411 errx(1, "getaddrinfo: %s", gai_strerror(ret_ga));
414 for (resp[0] = res[0]; resp[0]; resp[0] = resp[0]->ai_next) {
415 if (resp[0]->ai_addr == NULL)
417 /* We get lots of duplicates. Catch the easy ones */
418 if (memcmp(&last_src, resp[0]->ai_addr, sizeof(last_src)) == 0)
420 last_src = *(struct sockaddr *)resp[0]->ai_addr;
422 psk.psk_af = resp[0]->ai_family;
425 if (psk.psk_af == AF_INET)
426 psk.psk_src.addr.v.a.addr.v4 =
427 ((struct sockaddr_in *)resp[0]->ai_addr)->sin_addr;
428 else if (psk.psk_af == AF_INET6)
429 psk.psk_src.addr.v.a.addr.v6 =
430 ((struct sockaddr_in6 *)resp[0]->ai_addr)->
433 errx(1, "Unknown address family %d", psk.psk_af);
435 if (state_killers > 1) {
437 memset(&psk.psk_dst.addr.v.a.mask, 0xff,
438 sizeof(psk.psk_dst.addr.v.a.mask));
439 memset(&last_dst, 0xff, sizeof(last_dst));
440 if ((ret_ga = getaddrinfo(state_kill[1], NULL, NULL,
442 errx(1, "getaddrinfo: %s",
443 gai_strerror(ret_ga));
446 for (resp[1] = res[1]; resp[1];
447 resp[1] = resp[1]->ai_next) {
448 if (resp[1]->ai_addr == NULL)
450 if (psk.psk_af != resp[1]->ai_family)
453 if (memcmp(&last_dst, resp[1]->ai_addr,
454 sizeof(last_dst)) == 0)
456 last_dst = *(struct sockaddr *)resp[1]->ai_addr;
460 if (psk.psk_af == AF_INET)
461 psk.psk_dst.addr.v.a.addr.v4 =
462 ((struct sockaddr_in *)resp[1]->
464 else if (psk.psk_af == AF_INET6)
465 psk.psk_dst.addr.v.a.addr.v6 =
466 ((struct sockaddr_in6 *)resp[1]->
469 errx(1, "Unknown address family %d",
472 if (ioctl(dev, DIOCKILLSTATES, &psk))
473 err(1, "DIOCKILLSTATES");
474 killed += psk.psk_af;
475 /* fixup psk.psk_af */
476 psk.psk_af = resp[1]->ai_family;
478 freeaddrinfo(res[1]);
480 if (ioctl(dev, DIOCKILLSTATES, &psk))
481 err(1, "DIOCKILLSTATES");
482 killed += psk.psk_af;
483 /* fixup psk.psk_af */
484 psk.psk_af = res[0]->ai_family;
488 freeaddrinfo(res[0]);
490 if ((opts & PF_OPT_QUIET) == 0)
491 fprintf(stderr, "killed %d states from %d sources and %d "
492 "destinations\n", killed, sources, dests);
497 pfctl_get_pool(int dev, struct pf_pool *pool, u_int32_t nr,
498 u_int32_t ticket, int r_action, char *anchorname, char *rulesetname)
500 struct pfioc_pooladdr pp;
501 struct pf_pooladdr *pa;
504 memset(&pp, 0, sizeof(pp));
505 memcpy(pp.anchor, anchorname, sizeof(pp.anchor));
506 memcpy(pp.ruleset, rulesetname, sizeof(pp.ruleset));
507 pp.r_action = r_action;
510 if (ioctl(dev, DIOCGETADDRS, &pp)) {
511 warn("DIOCGETADDRS");
515 TAILQ_INIT(&pool->list);
516 for (pnr = 0; pnr < mpnr; ++pnr) {
518 if (ioctl(dev, DIOCGETADDR, &pp)) {
522 pa = calloc(1, sizeof(struct pf_pooladdr));
525 bcopy(&pp.addr, pa, sizeof(struct pf_pooladdr));
526 TAILQ_INSERT_TAIL(&pool->list, pa, entries);
533 pfctl_clear_pool(struct pf_pool *pool)
535 struct pf_pooladdr *pa;
537 while ((pa = TAILQ_FIRST(&pool->list)) != NULL) {
538 TAILQ_REMOVE(&pool->list, pa, entries);
544 pfctl_print_rule_counters(struct pf_rule *rule, int opts)
546 if (opts & PF_OPT_DEBUG) {
547 const char *t[PF_SKIP_COUNT] = { "i", "d", "f",
548 "p", "sa", "sp", "da", "dp" };
551 printf(" [ Skip steps: ");
552 for (i = 0; i < PF_SKIP_COUNT; ++i) {
553 if (rule->skip[i].nr == rule->nr + 1)
556 if (rule->skip[i].nr == (uint32_t)(-1))
559 printf("%u ", rule->skip[i].nr);
563 printf(" [ queue: qname=%s qid=%u pqname=%s pqid=%u ]\n",
564 rule->qname, rule->qid, rule->pqname, rule->pqid);
566 if (opts & PF_OPT_VERBOSE)
567 printf(" [ Evaluations: %-8llu Packets: %-8llu "
568 "Bytes: %-10llu States: %-6u]\n",
569 (unsigned long long)rule->evaluations,
570 (unsigned long long)rule->packets,
571 (unsigned long long)rule->bytes, rule->states);
575 pfctl_print_title(const char *title)
580 printf("%s\n", title);
584 pfctl_show_rules(int dev, int opts, int format, char *anchorname,
587 struct pfioc_rule pr;
588 u_int32_t nr, mnr, header = 0;
589 int rule_numbers = opts & (PF_OPT_VERBOSE2 | PF_OPT_DEBUG);
591 if (*anchorname && !*rulesetname) {
592 struct pfioc_ruleset pr2;
595 memset(&pr2, 0, sizeof(pr2));
596 memcpy(pr2.anchor, anchorname, sizeof(pr2.anchor));
597 if (ioctl(dev, DIOCGETRULESETS, &pr2)) {
599 fprintf(stderr, "No rulesets in anchor '%s'.\n",
602 err(1, "DIOCGETRULESETS");
605 if (opts & PF_OPT_SHOWALL && pr2.nr)
606 pfctl_print_title("FILTER RULES:");
608 for (nr = 0; nr < mnr; ++nr) {
610 if (ioctl(dev, DIOCGETRULESET, &pr2))
611 err(1, "DIOCGETRULESET");
612 r = pfctl_show_rules(dev, opts, format, anchorname,
620 memset(&pr, 0, sizeof(pr));
621 memcpy(pr.anchor, anchorname, sizeof(pr.anchor));
622 memcpy(pr.ruleset, rulesetname, sizeof(pr.ruleset));
623 if (opts & PF_OPT_SHOWALL) {
624 pr.rule.action = PF_PASS;
625 if (ioctl(dev, DIOCGETRULES, &pr)) {
626 warn("DIOCGETRULES");
631 pr.rule.action = PF_SCRUB;
632 if (ioctl(dev, DIOCGETRULES, &pr)) {
633 warn("DIOCGETRULES");
636 if (opts & PF_OPT_SHOWALL) {
637 if (format == 0 && (pr.nr > 0 || header))
638 pfctl_print_title("FILTER RULES:");
639 else if (format == 1 && labels)
640 pfctl_print_title("LABEL COUNTERS:");
643 for (nr = 0; nr < mnr; ++nr) {
645 if (ioctl(dev, DIOCGETRULE, &pr)) {
650 if (pfctl_get_pool(dev, &pr.rule.rpool,
651 nr, pr.ticket, PF_SCRUB, anchorname, rulesetname) != 0)
656 if (pr.rule.label[0]) {
657 printf("%s ", pr.rule.label);
658 printf("%llu %llu %llu\n",
659 (unsigned long long)pr.rule.evaluations,
660 (unsigned long long)pr.rule.packets,
661 (unsigned long long)pr.rule.bytes);
665 if (pr.rule.label[0] && (opts & PF_OPT_SHOWALL))
667 print_rule(&pr.rule, rule_numbers);
668 pfctl_print_rule_counters(&pr.rule, opts);
670 pfctl_clear_pool(&pr.rule.rpool);
672 pr.rule.action = PF_PASS;
673 if (ioctl(dev, DIOCGETRULES, &pr)) {
674 warn("DIOCGETRULES");
678 for (nr = 0; nr < mnr; ++nr) {
680 if (ioctl(dev, DIOCGETRULE, &pr)) {
685 if (pfctl_get_pool(dev, &pr.rule.rpool,
686 nr, pr.ticket, PF_PASS, anchorname, rulesetname) != 0)
691 if (pr.rule.label[0]) {
692 printf("%s ", pr.rule.label);
693 printf("%llu %llu %llu\n",
694 (unsigned long long)pr.rule.evaluations,
695 (unsigned long long)pr.rule.packets,
696 (unsigned long long)pr.rule.bytes);
700 if (pr.rule.label[0] && (opts & PF_OPT_SHOWALL))
702 print_rule(&pr.rule, rule_numbers);
703 pfctl_print_rule_counters(&pr.rule, opts);
705 pfctl_clear_pool(&pr.rule.rpool);
711 pfctl_show_nat(int dev, int opts, char *anchorname, char *rulesetname)
713 struct pfioc_rule pr;
715 static int nattype[3] = { PF_NAT, PF_RDR, PF_BINAT };
716 int i, dotitle = opts & PF_OPT_SHOWALL;
718 if (*anchorname && !*rulesetname) {
719 struct pfioc_ruleset pr2;
722 memset(&pr2, 0, sizeof(pr2));
723 memcpy(pr2.anchor, anchorname, sizeof(pr2.anchor));
724 if (ioctl(dev, DIOCGETRULESETS, &pr2)) {
726 fprintf(stderr, "No rulesets in anchor '%s'.\n",
729 err(1, "DIOCGETRULESETS");
733 for (nr = 0; nr < mnr; ++nr) {
735 if (ioctl(dev, DIOCGETRULESET, &pr2))
736 err(1, "DIOCGETRULESET");
737 r = pfctl_show_nat(dev, opts, anchorname, pr2.name);
744 memset(&pr, 0, sizeof(pr));
745 memcpy(pr.anchor, anchorname, sizeof(pr.anchor));
746 memcpy(pr.ruleset, rulesetname, sizeof(pr.ruleset));
747 for (i = 0; i < 3; i++) {
748 pr.rule.action = nattype[i];
749 if (ioctl(dev, DIOCGETRULES, &pr)) {
750 warn("DIOCGETRULES");
754 for (nr = 0; nr < mnr; ++nr) {
756 if (ioctl(dev, DIOCGETRULE, &pr)) {
760 if (pfctl_get_pool(dev, &pr.rule.rpool, nr,
761 pr.ticket, nattype[i], anchorname,
765 pfctl_print_title("TRANSLATION RULES:");
768 print_rule(&pr.rule, opts & PF_OPT_VERBOSE2);
769 pfctl_print_rule_counters(&pr.rule, opts);
770 pfctl_clear_pool(&pr.rule.rpool);
777 pfctl_show_src_nodes(int dev, int opts)
779 struct pfioc_src_nodes psn;
780 struct pf_src_node *p;
781 char *inbuf = NULL, *newinbuf = NULL;
785 memset(&psn, 0, sizeof(psn));
789 newinbuf = realloc(inbuf, len);
790 if (newinbuf == NULL)
792 psn.psn_buf = inbuf = newinbuf;
794 if (ioctl(dev, DIOCGETSRCNODES, &psn) < 0) {
795 warn("DIOCGETSRCNODES");
798 if (psn.psn_len + sizeof(struct pfioc_src_nodes) < len)
800 if (len == 0 && psn.psn_len == 0)
802 if (len == 0 && psn.psn_len != 0)
804 if (psn.psn_len == 0)
805 return (0); /* no src_nodes */
808 p = psn.psn_src_nodes;
809 if (psn.psn_len > 0 && (opts & PF_OPT_SHOWALL))
810 pfctl_print_title("SOURCE TRACKING NODES:");
811 for (i = 0; i < psn.psn_len; i += sizeof(*p)) {
812 print_src_node(p, opts);
819 pfctl_show_states(int dev, const char *iface, int opts)
821 struct pfioc_states ps;
823 char *inbuf = NULL, *newinbuf = NULL;
825 int i, dotitle = (opts & PF_OPT_SHOWALL);
827 memset(&ps, 0, sizeof(ps));
831 newinbuf = realloc(inbuf, len);
832 if (newinbuf == NULL)
834 ps.ps_buf = inbuf = newinbuf;
836 if (ioctl(dev, DIOCGETSTATES, &ps) < 0) {
837 warn("DIOCGETSTATES");
840 if (ps.ps_len + sizeof(struct pfioc_states) < len)
842 if (len == 0 && ps.ps_len == 0)
844 if (len == 0 && ps.ps_len != 0)
847 return (0); /* no states */
851 for (i = 0; i < ps.ps_len; i += sizeof(*p), p++) {
852 if (iface != NULL && strcmp(p->u.ifname, iface))
855 pfctl_print_title("STATES:");
858 print_state(p, opts);
864 pfctl_show_status(int dev, int opts)
866 struct pf_status status;
868 if (ioctl(dev, DIOCGETSTATUS, &status)) {
869 warn("DIOCGETSTATUS");
872 if (opts & PF_OPT_SHOWALL)
873 pfctl_print_title("INFO:");
874 print_status(&status, opts);
879 pfctl_show_timeouts(int dev, int opts)
884 if (opts & PF_OPT_SHOWALL)
885 pfctl_print_title("TIMEOUTS:");
886 memset(&pt, 0, sizeof(pt));
887 for (i = 0; pf_timeouts[i].name; i++) {
888 pt.timeout = pf_timeouts[i].timeout;
889 if (ioctl(dev, DIOCGETTIMEOUT, &pt))
890 err(1, "DIOCGETTIMEOUT");
891 printf("%-20s %10d", pf_timeouts[i].name, pt.seconds);
892 if (i >= PFTM_ADAPTIVE_START && i <= PFTM_ADAPTIVE_END)
903 pfctl_show_limits(int dev, int opts)
905 struct pfioc_limit pl;
908 if (opts & PF_OPT_SHOWALL)
909 pfctl_print_title("LIMITS:");
910 memset(&pl, 0, sizeof(pl));
911 for (i = 0; pf_limits[i].name; i++) {
912 pl.index = pf_limits[i].index;
913 if (ioctl(dev, DIOCGETLIMIT, &pl))
914 err(1, "DIOCGETLIMIT");
915 printf("%-10s ", pf_limits[i].name);
916 if (pl.limit == UINT_MAX)
917 printf("unlimited\n");
919 printf("hard limit %6u\n", pl.limit);
924 /* callbacks for rule/nat/rdr/addr */
926 pfctl_add_pool(struct pfctl *pf, struct pf_pool *p, sa_family_t af)
928 struct pf_pooladdr *pa;
930 if ((pf->opts & PF_OPT_NOACTION) == 0) {
931 if (ioctl(pf->dev, DIOCBEGINADDRS, &pf->paddr))
932 err(1, "DIOCBEGINADDRS");
936 TAILQ_FOREACH(pa, &p->list, entries) {
937 memcpy(&pf->paddr.addr, pa, sizeof(struct pf_pooladdr));
938 if ((pf->opts & PF_OPT_NOACTION) == 0) {
939 if (ioctl(pf->dev, DIOCADDADDR, &pf->paddr))
940 err(1, "DIOCADDADDR");
947 pfctl_add_rule(struct pfctl *pf, struct pf_rule *r)
950 struct pfioc_rule pr;
954 if ((loadopt & PFCTL_FLAG_FILTER) == 0)
956 rs_num = PF_RULESET_SCRUB;
960 if ((loadopt & PFCTL_FLAG_FILTER) == 0)
962 rs_num = PF_RULESET_FILTER;
966 if ((loadopt & PFCTL_FLAG_NAT) == 0)
968 rs_num = PF_RULESET_NAT;
972 if ((loadopt & PFCTL_FLAG_NAT) == 0)
974 rs_num = PF_RULESET_RDR;
978 if ((loadopt & PFCTL_FLAG_NAT) == 0)
980 rs_num = PF_RULESET_BINAT;
983 errx(1, "Invalid rule type");
987 if ((pf->opts & PF_OPT_NOACTION) == 0) {
988 bzero(&pr, sizeof(pr));
989 if (strlcpy(pr.anchor, pf->anchor, sizeof(pr.anchor)) >=
991 strlcpy(pr.ruleset, pf->ruleset, sizeof(pr.ruleset)) >=
993 errx(1, "pfctl_add_rule: strlcpy");
994 if (pfctl_add_pool(pf, &r->rpool, r->af))
996 pr.ticket = pfctl_get_ticket(pf->trans, rs_num, pf->anchor,
998 pr.pool_ticket = pf->paddr.ticket;
999 memcpy(&pr.rule, r, sizeof(pr.rule));
1000 if (ioctl(pf->dev, DIOCADDRULE, &pr))
1001 err(1, "DIOCADDRULE");
1003 if (pf->opts & PF_OPT_VERBOSE)
1004 print_rule(r, pf->opts & PF_OPT_VERBOSE2);
1005 pfctl_clear_pool(&r->rpool);
1009 #ifndef __DragonFly__
1011 pfctl_add_altq(struct pfctl *pf, struct pf_altq *a)
1014 (loadopt & PFCTL_FLAG_ALTQ) != 0) {
1015 memcpy(&pf->paltq->altq, a, sizeof(struct pf_altq));
1016 if ((pf->opts & PF_OPT_NOACTION) == 0) {
1017 if (ioctl(pf->dev, DIOCADDALTQ, pf->paltq)) {
1019 errx(1, "qtype not configured");
1020 else if (errno == ENODEV)
1021 errx(1, "%s: driver does not support "
1024 err(1, "DIOCADDALTQ");
1027 pfaltq_store(&pf->paltq->altq);
1034 pfctl_rules(int dev, char *filename, int opts, char *anchorname,
1035 char *rulesetname, struct pfr_buffer *trans)
1037 #define ERR(x) do { warn(x); goto _error; } while(0)
1038 #define ERRX(x) do { warnx(x); goto _error; } while(0)
1041 struct pfr_buffer *t, buf;
1042 struct pfioc_altq pa;
1044 struct pfr_table trs;
1047 if (trans == NULL) {
1048 bzero(&buf, sizeof(buf));
1049 buf.pfrb_type = PFRB_TRANS;
1054 osize = t->pfrb_size;
1057 memset(&pa, 0, sizeof(pa));
1058 memset(&pf, 0, sizeof(pf));
1059 memset(&trs, 0, sizeof(trs));
1060 if (strlcpy(trs.pfrt_anchor, anchorname,
1061 sizeof(trs.pfrt_anchor)) >= sizeof(trs.pfrt_anchor) ||
1062 strlcpy(trs.pfrt_ruleset, rulesetname,
1063 sizeof(trs.pfrt_ruleset)) >= sizeof(trs.pfrt_ruleset))
1064 ERRX("pfctl_rules: strlcpy");
1065 if (strcmp(filename, "-") == 0) {
1069 if ((fin = fopen(filename, "r")) == NULL) {
1070 warn("%s", filename);
1077 pf.loadopt = loadopt;
1079 pf.loadopt &= ~PFCTL_FLAG_ALTQ;
1083 pf.anchor = anchorname;
1084 pf.ruleset = rulesetname;
1086 if ((opts & PF_OPT_NOACTION) == 0) {
1087 if ((pf.loadopt & PFCTL_FLAG_NAT) != 0) {
1088 if (pfctl_add_trans(t, PF_RULESET_NAT, anchorname,
1090 pfctl_add_trans(t, PF_RULESET_BINAT, anchorname,
1092 pfctl_add_trans(t, PF_RULESET_RDR, anchorname,
1096 if (((altqsupport && (pf.loadopt & PFCTL_FLAG_ALTQ) != 0))) {
1097 if (pfctl_add_trans(t, PF_RULESET_ALTQ, anchorname,
1101 if ((pf.loadopt & PFCTL_FLAG_FILTER) != 0) {
1102 if (pfctl_add_trans(t, PF_RULESET_SCRUB, anchorname,
1104 pfctl_add_trans(t, PF_RULESET_FILTER, anchorname,
1108 if (pf.loadopt & PFCTL_FLAG_TABLE) {
1109 if (pfctl_add_trans(t, PF_RULESET_TABLE, anchorname,
1113 if (pfctl_trans(dev, t, DIOCXBEGIN, osize))
1115 if (altqsupport && (pf.loadopt & PFCTL_FLAG_ALTQ))
1116 pa.ticket = pfctl_get_ticket(t, PF_RULESET_ALTQ,
1117 anchorname, rulesetname);
1118 if (pf.loadopt & PFCTL_FLAG_TABLE)
1119 pf.tticket = pfctl_get_ticket(t, PF_RULESET_TABLE,
1120 anchorname, rulesetname);
1122 if (parse_rules(fin, &pf) < 0) {
1123 if ((opts & PF_OPT_NOACTION) == 0)
1124 ERRX("Syntax error in config file: "
1125 "pf rules not loaded");
1129 #ifndef __DragonFly__
1130 if ((altqsupport && (pf.loadopt & PFCTL_FLAG_ALTQ) != 0))
1131 if (check_commit_altq(dev, opts) != 0)
1132 ERRX("errors in altq config");
1137 /* process "load anchor" directives */
1138 if (!anchorname[0] && !rulesetname[0])
1139 if (pfctl_load_anchors(dev, opts, t) == -1)
1140 ERRX("load anchors");
1142 if (trans == NULL && (opts & PF_OPT_NOACTION) == 0)
1143 if (pfctl_trans(dev, t, DIOCXCOMMIT, 0))
1148 if (trans == NULL) { /* main ruleset */
1149 if ((opts & PF_OPT_NOACTION) == 0)
1150 if (pfctl_trans(dev, t, DIOCXROLLBACK, 0))
1151 err(1, "DIOCXROLLBACK");
1153 } else /* sub ruleset */
1161 pfctl_set_limit(struct pfctl *pf, const char *opt, unsigned int limit)
1163 struct pfioc_limit pl;
1166 if ((loadopt & PFCTL_FLAG_OPTION) == 0)
1169 memset(&pl, 0, sizeof(pl));
1170 for (i = 0; pf_limits[i].name; i++) {
1171 if (strcasecmp(opt, pf_limits[i].name) == 0) {
1172 pl.index = pf_limits[i].index;
1174 if ((pf->opts & PF_OPT_NOACTION) == 0) {
1175 if (ioctl(pf->dev, DIOCSETLIMIT, &pl)) {
1176 if (errno == EBUSY) {
1177 warnx("Current pool "
1178 "size exceeds requested "
1182 err(1, "DIOCSETLIMIT");
1188 if (pf_limits[i].name == NULL) {
1189 warnx("Bad pool name.");
1193 if (pf->opts & PF_OPT_VERBOSE)
1194 printf("set limit %s %d\n", opt, limit);
1200 pfctl_set_timeout(struct pfctl *pf, const char *opt, int seconds, int quiet)
1205 if ((loadopt & PFCTL_FLAG_OPTION) == 0)
1208 memset(&pt, 0, sizeof(pt));
1209 for (i = 0; pf_timeouts[i].name; i++) {
1210 if (strcasecmp(opt, pf_timeouts[i].name) == 0) {
1211 pt.timeout = pf_timeouts[i].timeout;
1216 if (pf_timeouts[i].name == NULL) {
1217 warnx("Bad timeout name.");
1221 pt.seconds = seconds;
1222 if ((pf->opts & PF_OPT_NOACTION) == 0) {
1223 if (ioctl(pf->dev, DIOCSETTIMEOUT, &pt))
1224 err(1, "DIOCSETTIMEOUT");
1227 if (pf->opts & PF_OPT_VERBOSE && ! quiet)
1228 printf("set timeout %s %d\n", opt, seconds);
1234 pfctl_set_optimization(struct pfctl *pf, const char *opt)
1236 const struct pf_hint *hint;
1239 if ((loadopt & PFCTL_FLAG_OPTION) == 0)
1242 for (i = 0; pf_hints[i].name; i++)
1243 if (strcasecmp(opt, pf_hints[i].name) == 0)
1246 hint = pf_hints[i].hint;
1248 warnx("Bad hint name.");
1252 for (i = 0; hint[i].name; i++)
1253 if ((r = pfctl_set_timeout(pf, hint[i].name,
1254 hint[i].timeout, 1)))
1257 if (pf->opts & PF_OPT_VERBOSE)
1258 printf("set optimization %s\n", opt);
1264 pfctl_set_logif(struct pfctl *pf, char *ifname)
1268 if ((loadopt & PFCTL_FLAG_OPTION) == 0)
1271 memset(&pi, 0, sizeof(pi));
1272 if ((pf->opts & PF_OPT_NOACTION) == 0) {
1273 if (!strcmp(ifname, "none"))
1274 bzero(pi.ifname, sizeof(pi.ifname));
1276 if (strlcpy(pi.ifname, ifname,
1277 sizeof(pi.ifname)) >= sizeof(pi.ifname))
1278 errx(1, "pfctl_set_logif: strlcpy");
1280 if (ioctl(pf->dev, DIOCSETSTATUSIF, &pi))
1281 err(1, "DIOCSETSTATUSIF");
1284 if (pf->opts & PF_OPT_VERBOSE)
1285 printf("set loginterface %s\n", ifname);
1291 pfctl_set_hostid(struct pfctl *pf, u_int32_t hostid)
1293 if ((loadopt & PFCTL_FLAG_OPTION) == 0)
1298 if ((pf->opts & PF_OPT_NOACTION) == 0) {
1299 if (ioctl(dev_fd, DIOCSETHOSTID, &hostid))
1300 err(1, "DIOCSETHOSTID");
1303 if (pf->opts & PF_OPT_VERBOSE)
1304 printf("set hostid 0x%08x\n", ntohl(hostid));
1310 pfctl_set_debug(struct pfctl *pf, char *d)
1314 if ((loadopt & PFCTL_FLAG_OPTION) == 0)
1317 if (!strcmp(d, "none"))
1318 level = PF_DEBUG_NONE;
1319 else if (!strcmp(d, "urgent"))
1320 level = PF_DEBUG_URGENT;
1321 else if (!strcmp(d, "misc"))
1322 level = PF_DEBUG_MISC;
1323 else if (!strcmp(d, "loud"))
1324 level = PF_DEBUG_NOISY;
1326 warnx("unknown debug level \"%s\"", d);
1330 if ((pf->opts & PF_OPT_NOACTION) == 0)
1331 if (ioctl(dev_fd, DIOCSETDEBUG, &level))
1332 err(1, "DIOCSETDEBUG");
1334 if (pf->opts & PF_OPT_VERBOSE)
1335 printf("set debug %s\n", d);
1341 pfctl_debug(int dev, u_int32_t level, int opts)
1343 if (ioctl(dev, DIOCSETDEBUG, &level))
1344 err(1, "DIOCSETDEBUG");
1345 if ((opts & PF_OPT_QUIET) == 0) {
1346 fprintf(stderr, "debug level set to '");
1349 fprintf(stderr, "none");
1351 case PF_DEBUG_URGENT:
1352 fprintf(stderr, "urgent");
1355 fprintf(stderr, "misc");
1357 case PF_DEBUG_NOISY:
1358 fprintf(stderr, "loud");
1361 fprintf(stderr, "<invalid>");
1364 fprintf(stderr, "'\n");
1370 pfctl_clear_rule_counters(int dev, int opts)
1372 if (ioctl(dev, DIOCCLRRULECTRS))
1373 err(1, "DIOCCLRRULECTRS");
1374 if ((opts & PF_OPT_QUIET) == 0)
1375 fprintf(stderr, "pf: rule counters cleared\n");
1380 pfctl_test_altqsupport(int dev, int opts)
1382 struct pfioc_altq pa;
1384 if (ioctl(dev, DIOCGETALTQS, &pa)) {
1385 if (errno == ENODEV) {
1386 if (!(opts & PF_OPT_QUIET))
1387 fprintf(stderr, "No ALTQ support in kernel\n"
1388 "ALTQ related functions disabled\n");
1391 err(1, "DIOCGETALTQS");
1397 pfctl_show_anchors(int dev, int opts, char *anchorname)
1402 struct pfioc_anchor pa;
1404 memset(&pa, 0, sizeof(pa));
1405 if (ioctl(dev, DIOCGETANCHORS, &pa)) {
1406 warn("DIOCGETANCHORS");
1410 for (nr = 0; nr < mnr; ++nr) {
1412 if (ioctl(dev, DIOCGETANCHOR, &pa)) {
1413 warn("DIOCGETANCHOR");
1416 if (!(opts & PF_OPT_VERBOSE) &&
1417 !strcmp(pa.name, PF_RESERVED_ANCHOR))
1419 printf(" %s\n", pa.name);
1422 struct pfioc_ruleset pr;
1424 memset(&pr, 0, sizeof(pr));
1425 memcpy(pr.anchor, anchorname, sizeof(pr.anchor));
1426 if (ioctl(dev, DIOCGETRULESETS, &pr)) {
1427 if (errno == EINVAL)
1428 fprintf(stderr, "No rulesets in anchor '%s'.\n",
1431 err(1, "DIOCGETRULESETS");
1435 for (nr = 0; nr < mnr; ++nr) {
1437 if (ioctl(dev, DIOCGETRULESET, &pr))
1438 err(1, "DIOCGETRULESET");
1439 printf(" %s:%s\n", pr.anchor, pr.name);
1446 pfctl_lookup_option(char *cmd, const char **list)
1448 if (cmd != NULL && *cmd)
1449 for (; *list; list++)
1450 if (!strncmp(cmd, *list, strlen(cmd)))
1456 main(int argc, char *argv[])
1460 int mode = O_RDONLY;
1462 char anchorname[PF_ANCHOR_NAME_SIZE];
1463 char rulesetname[PF_RULESET_NAME_SIZE];
1468 while ((ch = getopt(argc, argv,
1469 "a:AdD:eqf:F:ghi:k:nNOp:rRs:t:T:vx:z")) != -1) {
1475 opts |= PF_OPT_DISABLE;
1479 if (pfctl_cmdline_symset(optarg) < 0)
1480 warnx("could not parse macro definition %s",
1484 opts |= PF_OPT_ENABLE;
1488 opts |= PF_OPT_QUIET;
1491 clearopt = pfctl_lookup_option(optarg, clearopt_list);
1492 if (clearopt == NULL) {
1493 warnx("Unknown flush modifier '%s'", optarg);
1502 if (state_killers >= 2) {
1503 warnx("can only specify -k twice");
1507 state_kill[state_killers++] = optarg;
1511 opts |= PF_OPT_NOACTION;
1514 loadopt |= PFCTL_FLAG_NAT;
1517 opts |= PF_OPT_USEDNS;
1524 opts |= PF_OPT_DEBUG;
1527 loadopt |= PFCTL_FLAG_ALTQ;
1530 loadopt |= PFCTL_FLAG_FILTER;
1533 loadopt |= PFCTL_FLAG_OPTION;
1539 showopt = pfctl_lookup_option(optarg, showopt_list);
1540 if (showopt == NULL) {
1541 warnx("Unknown show modifier '%s'", optarg);
1549 tblcmdopt = pfctl_lookup_option(optarg, tblcmdopt_list);
1550 if (tblcmdopt == NULL) {
1551 warnx("Unknown table command '%s'", optarg);
1556 if (opts & PF_OPT_VERBOSE)
1557 opts |= PF_OPT_VERBOSE2;
1558 opts |= PF_OPT_VERBOSE;
1561 debugopt = pfctl_lookup_option(optarg, debugopt_list);
1562 if (debugopt == NULL) {
1563 warnx("Unknown debug level '%s'", optarg);
1569 opts |= PF_OPT_CLRRULECTRS;
1580 if (tblcmdopt != NULL) {
1585 loadopt |= PFCTL_FLAG_TABLE;
1588 mode = strchr("acdfkrz", ch) ? O_RDWR : O_RDONLY;
1589 } else if (argc != optind) {
1590 warnx("unknown command line argument: %s ...", argv[optind]);
1597 memset(anchorname, 0, sizeof(anchorname));
1598 memset(rulesetname, 0, sizeof(rulesetname));
1599 if (anchoropt != NULL) {
1602 if ((t = strchr(anchoropt, ':')) == NULL) {
1603 if (strlcpy(anchorname, anchoropt,
1604 sizeof(anchorname)) >= sizeof(anchorname))
1605 errx(1, "anchor name '%s' too long",
1610 if ((p = strdup(anchoropt)) == NULL)
1611 err(1, "anchoropt: strdup");
1612 t = strsep(&p, ":");
1613 if (*t == '\0' || *p == '\0')
1614 errx(1, "anchor '%s' invalid", anchoropt);
1615 if (strlcpy(anchorname, t, sizeof(anchorname)) >=
1617 errx(1, "anchor name '%s' too long", t);
1618 if (strlcpy(rulesetname, p, sizeof(rulesetname)) >=
1619 sizeof(rulesetname))
1620 errx(1, "ruleset name '%s' too long", p);
1621 free(t); /* not p */
1623 loadopt &= PFCTL_FLAG_FILTER|PFCTL_FLAG_NAT|PFCTL_FLAG_TABLE;
1626 if ((opts & PF_OPT_NOACTION) == 0) {
1627 dev_fd = open(pf_device, mode);
1629 err(1, "%s", pf_device);
1630 altqsupport = pfctl_test_altqsupport(dev_fd, opts);
1632 dev_fd = open(pf_device, O_RDONLY);
1634 opts |= PF_OPT_DUMMYACTION;
1635 /* turn off options */
1636 opts &= ~ (PF_OPT_DISABLE | PF_OPT_ENABLE);
1637 clearopt = showopt = debugopt = NULL;
1641 if (opts & PF_OPT_DISABLE)
1642 if (pfctl_disable(dev_fd, opts))
1645 if (showopt != NULL) {
1648 pfctl_show_anchors(dev_fd, opts, anchorname);
1651 pfctl_load_fingerprints(dev_fd, opts);
1652 pfctl_show_rules(dev_fd, opts, 0, anchorname,
1656 pfctl_load_fingerprints(dev_fd, opts);
1657 pfctl_show_rules(dev_fd, opts, 1, anchorname,
1661 pfctl_load_fingerprints(dev_fd, opts);
1662 pfctl_show_nat(dev_fd, opts, anchorname, rulesetname);
1664 #ifndef __DragonFly__
1666 pfctl_show_altq(dev_fd, ifaceopt, opts,
1667 opts & PF_OPT_VERBOSE2);
1671 pfctl_show_states(dev_fd, ifaceopt, opts);
1674 pfctl_show_src_nodes(dev_fd, opts);
1677 pfctl_show_status(dev_fd, opts);
1680 pfctl_show_timeouts(dev_fd, opts);
1683 pfctl_show_limits(dev_fd, opts);
1686 opts |= PF_OPT_SHOWALL;
1687 pfctl_load_fingerprints(dev_fd, opts);
1689 pfctl_show_nat(dev_fd, opts, anchorname, rulesetname);
1690 pfctl_show_rules(dev_fd, opts, 0, anchorname,
1692 #ifndef __DragonFly__
1693 pfctl_show_altq(dev_fd, ifaceopt, opts, 0);
1695 pfctl_show_states(dev_fd, ifaceopt, opts);
1696 pfctl_show_src_nodes(dev_fd, opts);
1697 pfctl_show_status(dev_fd, opts);
1698 pfctl_show_rules(dev_fd, opts, 1, anchorname, rulesetname);
1699 pfctl_show_timeouts(dev_fd, opts);
1700 pfctl_show_limits(dev_fd, opts);
1701 pfctl_show_tables(anchorname, rulesetname, opts);
1702 pfctl_show_fingerprints(opts);
1705 pfctl_show_tables(anchorname, rulesetname, opts);
1708 pfctl_load_fingerprints(dev_fd, opts);
1709 pfctl_show_fingerprints(opts);
1712 pfctl_show_ifaces(ifaceopt, opts);
1717 if (clearopt != NULL) {
1718 switch (*clearopt) {
1720 pfctl_clear_rules(dev_fd, opts, anchorname, rulesetname);
1723 pfctl_clear_nat(dev_fd, opts, anchorname, rulesetname);
1725 #ifndef __DragonFly__
1727 pfctl_clear_altq(dev_fd, opts);
1731 pfctl_clear_states(dev_fd, ifaceopt, opts);
1734 pfctl_clear_src_nodes(dev_fd, opts);
1737 pfctl_clear_stats(dev_fd, opts);
1740 pfctl_clear_rules(dev_fd, opts, anchorname, rulesetname);
1741 pfctl_clear_nat(dev_fd, opts, anchorname, rulesetname);
1742 pfctl_clear_tables(anchorname, rulesetname, opts);
1743 if (!*anchorname && !*rulesetname) {
1744 #ifndef __DragonFly__
1745 pfctl_clear_altq(dev_fd, opts);
1747 pfctl_clear_states(dev_fd, ifaceopt, opts);
1748 pfctl_clear_src_nodes(dev_fd, opts);
1749 pfctl_clear_stats(dev_fd, opts);
1750 pfctl_clear_fingerprints(dev_fd, opts);
1754 pfctl_clear_fingerprints(dev_fd, opts);
1757 pfctl_clear_tables(anchorname, rulesetname, opts);
1762 pfctl_kill_states(dev_fd, ifaceopt, opts);
1764 if (tblcmdopt != NULL) {
1765 error = pfctl_command_tables(argc, argv, tableopt,
1766 tblcmdopt, rulesopt, anchorname, rulesetname, opts);
1770 if (rulesopt != NULL)
1771 if (pfctl_file_fingerprints(dev_fd, opts, PF_OSFP_FILE))
1774 if (rulesopt != NULL) {
1775 if (pfctl_rules(dev_fd, rulesopt, opts, anchorname, rulesetname,
1778 else if (!(opts & PF_OPT_NOACTION) &&
1779 (loadopt & PFCTL_FLAG_TABLE))
1780 warn_namespace_collision(NULL);
1783 if (opts & PF_OPT_ENABLE)
1784 if (pfctl_enable(dev_fd, opts))
1787 if (debugopt != NULL) {
1788 switch (*debugopt) {
1790 pfctl_debug(dev_fd, PF_DEBUG_NONE, opts);
1793 pfctl_debug(dev_fd, PF_DEBUG_URGENT, opts);
1796 pfctl_debug(dev_fd, PF_DEBUG_MISC, opts);
1799 pfctl_debug(dev_fd, PF_DEBUG_NOISY, opts);
1804 if (opts & PF_OPT_CLRRULECTRS) {
1805 if (pfctl_clear_rule_counters(dev_fd, opts))