1/*	$OpenBSD: pfctl.c,v 1.278 2008/08/31 20:18:17 jmc Exp $ */
2
3/*-
4 * SPDX-License-Identifier: BSD-2-Clause
5 *
6 * Copyright (c) 2001 Daniel Hartmeier
7 * Copyright (c) 2002,2003 Henning Brauer
8 * All rights reserved.
9 *
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted provided that the following conditions
12 * are met:
13 *
14 *    - Redistributions of source code must retain the above copyright
15 *      notice, this list of conditions and the following disclaimer.
16 *    - Redistributions in binary form must reproduce the above
17 *      copyright notice, this list of conditions and the following
18 *      disclaimer in the documentation and/or other materials provided
19 *      with the distribution.
20 *
21 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
22 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
23 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
24 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
25 * COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
26 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
27 * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
28 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
29 * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
31 * ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
32 * POSSIBILITY OF SUCH DAMAGE.
33 *
34 */
35
36#include <sys/cdefs.h>
37#define PFIOC_USE_LATEST
38
39#include <sys/types.h>
40#include <sys/ioctl.h>
41#include <sys/socket.h>
42#include <sys/stat.h>
43#include <sys/endian.h>
44
45#include <net/if.h>
46#include <netinet/in.h>
47#include <net/pfvar.h>
48#include <arpa/inet.h>
49#include <net/altq/altq.h>
50
51#include <err.h>
52#include <errno.h>
53#include <fcntl.h>
54#include <libpfctl.h>
55#include <limits.h>
56#include <netdb.h>
57#include <stdint.h>
58#include <stdio.h>
59#include <stdlib.h>
60#include <string.h>
61#include <unistd.h>
62
63#include "pfctl_parser.h"
64#include "pfctl.h"
65
66void	 usage(void);
67int	 pfctl_enable(int, int);
68int	 pfctl_disable(int, int);
69int	 pfctl_clear_stats(int, int);
70int	 pfctl_get_skip_ifaces(void);
71int	 pfctl_check_skip_ifaces(char *);
72int	 pfctl_adjust_skip_ifaces(struct pfctl *);
73int	 pfctl_clear_interface_flags(int, int);
74int	 pfctl_flush_eth_rules(int, int, char *);
75int	 pfctl_flush_rules(int, int, char *);
76int	 pfctl_flush_nat(int, int, char *);
77int	 pfctl_clear_altq(int, int);
78int	 pfctl_clear_src_nodes(int, int);
79int	 pfctl_clear_iface_states(int, const char *, int);
80void	 pfctl_addrprefix(char *, struct pf_addr *);
81int	 pfctl_kill_src_nodes(int, const char *, int);
82int	 pfctl_net_kill_states(int, const char *, int);
83int	 pfctl_gateway_kill_states(int, const char *, int);
84int	 pfctl_label_kill_states(int, const char *, int);
85int	 pfctl_id_kill_states(int, const char *, int);
86void	 pfctl_init_options(struct pfctl *);
87int	 pfctl_load_options(struct pfctl *);
88int	 pfctl_load_limit(struct pfctl *, unsigned int, unsigned int);
89int	 pfctl_load_timeout(struct pfctl *, unsigned int, unsigned int);
90int	 pfctl_load_debug(struct pfctl *, unsigned int);
91int	 pfctl_load_logif(struct pfctl *, char *);
92int	 pfctl_load_hostid(struct pfctl *, u_int32_t);
93int	 pfctl_load_reassembly(struct pfctl *, u_int32_t);
94int	 pfctl_load_syncookies(struct pfctl *, u_int8_t);
95int	 pfctl_get_pool(int, struct pfctl_pool *, u_int32_t, u_int32_t, int,
96	    char *);
97void	 pfctl_print_eth_rule_counters(struct pfctl_eth_rule *, int);
98void	 pfctl_print_rule_counters(struct pfctl_rule *, int);
99int	 pfctl_show_eth_rules(int, char *, int, enum pfctl_show, char *, int, int);
100int	 pfctl_show_rules(int, char *, int, enum pfctl_show, char *, int, int);
101int	 pfctl_show_nat(int, char *, int, char *, int, int);
102int	 pfctl_show_src_nodes(int, int);
103int	 pfctl_show_states(int, const char *, int);
104int	 pfctl_show_status(int, int);
105int	 pfctl_show_running(int);
106int	 pfctl_show_timeouts(int, int);
107int	 pfctl_show_limits(int, int);
108void	 pfctl_debug(int, u_int32_t, int);
109int	 pfctl_test_altqsupport(int, int);
110int	 pfctl_show_anchors(int, int, char *);
111int	 pfctl_show_eth_anchors(int, int, char *);
112int	 pfctl_ruleset_trans(struct pfctl *, char *, struct pfctl_anchor *, bool);
113int	 pfctl_eth_ruleset_trans(struct pfctl *, char *,
114	    struct pfctl_eth_anchor *);
115int	 pfctl_load_eth_ruleset(struct pfctl *, char *,
116	    struct pfctl_eth_ruleset *, int);
117int	 pfctl_load_eth_rule(struct pfctl *, char *, struct pfctl_eth_rule *,
118	    int);
119int	 pfctl_load_ruleset(struct pfctl *, char *,
120		struct pfctl_ruleset *, int, int);
121int	 pfctl_load_rule(struct pfctl *, char *, struct pfctl_rule *, int);
122const char	*pfctl_lookup_option(char *, const char * const *);
123
124static struct pfctl_anchor_global	 pf_anchors;
125struct pfctl_anchor	 pf_main_anchor;
126struct pfctl_eth_anchor	 pf_eth_main_anchor;
127static struct pfr_buffer skip_b;
128
129static const char	*clearopt;
130static char		*rulesopt;
131static const char	*showopt;
132static const char	*debugopt;
133static char		*anchoropt;
134static const char	*optiopt = NULL;
135static const char	*pf_device = PF_DEVICE;
136static char		*ifaceopt;
137static char		*tableopt;
138static const char	*tblcmdopt;
139static int		 src_node_killers;
140static char		*src_node_kill[2];
141static int		 state_killers;
142static char		*state_kill[2];
143int			 loadopt;
144int			 altqsupport;
145
146int			 dev = -1;
147struct pfctl_handle	*pfh = NULL;
148static int		 first_title = 1;
149static int		 labels = 0;
150
151#define INDENT(d, o)	do {						\
152				if (o) {				\
153					int i;				\
154					for (i=0; i < d; i++)		\
155						printf("  ");		\
156				}					\
157			} while (0);					\
158
159
160static const struct {
161	const char	*name;
162	int		index;
163} pf_limits[] = {
164	{ "states",		PF_LIMIT_STATES },
165	{ "src-nodes",		PF_LIMIT_SRC_NODES },
166	{ "frags",		PF_LIMIT_FRAGS },
167	{ "table-entries",	PF_LIMIT_TABLE_ENTRIES },
168	{ NULL,			0 }
169};
170
171struct pf_hint {
172	const char	*name;
173	int		timeout;
174};
175static const struct pf_hint pf_hint_normal[] = {
176	{ "tcp.first",		2 * 60 },
177	{ "tcp.opening",	30 },
178	{ "tcp.established",	24 * 60 * 60 },
179	{ "tcp.closing",	15 * 60 },
180	{ "tcp.finwait",	45 },
181	{ "tcp.closed",		90 },
182	{ "tcp.tsdiff",		30 },
183	{ NULL,			0 }
184};
185static const struct pf_hint pf_hint_satellite[] = {
186	{ "tcp.first",		3 * 60 },
187	{ "tcp.opening",	30 + 5 },
188	{ "tcp.established",	24 * 60 * 60 },
189	{ "tcp.closing",	15 * 60 + 5 },
190	{ "tcp.finwait",	45 + 5 },
191	{ "tcp.closed",		90 + 5 },
192	{ "tcp.tsdiff",		60 },
193	{ NULL,			0 }
194};
195static const struct pf_hint pf_hint_conservative[] = {
196	{ "tcp.first",		60 * 60 },
197	{ "tcp.opening",	15 * 60 },
198	{ "tcp.established",	5 * 24 * 60 * 60 },
199	{ "tcp.closing",	60 * 60 },
200	{ "tcp.finwait",	10 * 60 },
201	{ "tcp.closed",		3 * 60 },
202	{ "tcp.tsdiff",		60 },
203	{ NULL,			0 }
204};
205static const struct pf_hint pf_hint_aggressive[] = {
206	{ "tcp.first",		30 },
207	{ "tcp.opening",	5 },
208	{ "tcp.established",	5 * 60 * 60 },
209	{ "tcp.closing",	60 },
210	{ "tcp.finwait",	30 },
211	{ "tcp.closed",		30 },
212	{ "tcp.tsdiff",		10 },
213	{ NULL,			0 }
214};
215
216static const struct {
217	const char *name;
218	const struct pf_hint *hint;
219} pf_hints[] = {
220	{ "normal",		pf_hint_normal },
221	{ "satellite",		pf_hint_satellite },
222	{ "high-latency",	pf_hint_satellite },
223	{ "conservative",	pf_hint_conservative },
224	{ "aggressive",		pf_hint_aggressive },
225	{ NULL,			NULL }
226};
227
228static const char * const clearopt_list[] = {
229	"nat", "queue", "rules", "Sources",
230	"states", "info", "Tables", "osfp", "all",
231	"ethernet", NULL
232};
233
234static const char * const showopt_list[] = {
235	"ether", "nat", "queue", "rules", "Anchors", "Sources", "states",
236	"info", "Interfaces", "labels", "timeouts", "memory", "Tables",
237	"osfp", "Running", "all", "creatorids", NULL
238};
239
240static const char * const tblcmdopt_list[] = {
241	"kill", "flush", "add", "delete", "load", "replace", "show",
242	"test", "zero", "expire", NULL
243};
244
245static const char * const debugopt_list[] = {
246	"none", "urgent", "misc", "loud", NULL
247};
248
249static const char * const optiopt_list[] = {
250	"none", "basic", "profile", NULL
251};
252
253void
254usage(void)
255{
256	extern char *__progname;
257
258	fprintf(stderr,
259"usage: %s [-AdeghMmNnOPqRrvz] [-a anchor] [-D macro=value] [-F modifier]\n"
260	"\t[-f file] [-i interface] [-K host | network]\n"
261	"\t[-k host | network | gateway | label | id] [-o level] [-p device]\n"
262	"\t[-s modifier] [-t table -T command [address ...]] [-x level]\n",
263	    __progname);
264
265	exit(1);
266}
267
268/*
269 * Cache protocol number to name translations.
270 *
271 * Translation is performed a lot e.g., when dumping states and
272 * getprotobynumber is incredibly expensive.
273 *
274 * Note from the getprotobynumber(3) manpage:
275 * <quote>
276 * These functions use a thread-specific data space; if the data is needed
277 * for future use, it should be copied before any subsequent calls overwrite
278 * it.  Only the Internet protocols are currently understood.
279 * </quote>
280 *
281 * Consequently we only cache the name and strdup it for safety.
282 *
283 * At the time of writing this comment the last entry in /etc/protocols is:
284 * divert  258     DIVERT          # Divert pseudo-protocol [non IANA]
285 */
286const char *
287pfctl_proto2name(int proto)
288{
289	static const char *pfctl_proto_cache[259];
290	struct protoent *p;
291
292	if (proto >= nitems(pfctl_proto_cache)) {
293		p = getprotobynumber(proto);
294		if (p == NULL) {
295			return (NULL);
296		}
297		return (p->p_name);
298	}
299
300	if (pfctl_proto_cache[proto] == NULL) {
301		p = getprotobynumber(proto);
302		if (p == NULL) {
303			return (NULL);
304		}
305		pfctl_proto_cache[proto] = strdup(p->p_name);
306	}
307
308	return (pfctl_proto_cache[proto]);
309}
310
311int
312pfctl_enable(int dev, int opts)
313{
314	int ret;
315
316	if ((ret = pfctl_startstop(pfh, 1)) != 0) {
317		if (ret == EEXIST)
318			errx(1, "pf already enabled");
319		else if (ret == ESRCH)
320			errx(1, "pfil registeration failed");
321		else
322			err(1, "DIOCSTART");
323	}
324	if ((opts & PF_OPT_QUIET) == 0)
325		fprintf(stderr, "pf enabled\n");
326
327	if (altqsupport && ioctl(dev, DIOCSTARTALTQ))
328		if (errno != EEXIST)
329			err(1, "DIOCSTARTALTQ");
330
331	return (0);
332}
333
334int
335pfctl_disable(int dev, int opts)
336{
337	int ret;
338
339	if ((ret = pfctl_startstop(pfh, 0)) != 0) {
340		if (ret == ENOENT)
341			errx(1, "pf not enabled");
342		else
343			err(1, "DIOCSTOP");
344	}
345	if ((opts & PF_OPT_QUIET) == 0)
346		fprintf(stderr, "pf disabled\n");
347
348	if (altqsupport && ioctl(dev, DIOCSTOPALTQ))
349			if (errno != ENOENT)
350				err(1, "DIOCSTOPALTQ");
351
352	return (0);
353}
354
355int
356pfctl_clear_stats(int dev, int opts)
357{
358	if (ioctl(dev, DIOCCLRSTATUS))
359		err(1, "DIOCCLRSTATUS");
360	if ((opts & PF_OPT_QUIET) == 0)
361		fprintf(stderr, "pf: statistics cleared\n");
362	return (0);
363}
364
365int
366pfctl_get_skip_ifaces(void)
367{
368	bzero(&skip_b, sizeof(skip_b));
369	skip_b.pfrb_type = PFRB_IFACES;
370	for (;;) {
371		pfr_buf_grow(&skip_b, skip_b.pfrb_size);
372		skip_b.pfrb_size = skip_b.pfrb_msize;
373		if (pfi_get_ifaces(NULL, skip_b.pfrb_caddr, &skip_b.pfrb_size))
374			err(1, "pfi_get_ifaces");
375		if (skip_b.pfrb_size <= skip_b.pfrb_msize)
376			break;
377	}
378	return (0);
379}
380
381int
382pfctl_check_skip_ifaces(char *ifname)
383{
384	struct pfi_kif		*p;
385	struct node_host	*h = NULL, *n = NULL;
386
387	PFRB_FOREACH(p, &skip_b) {
388		if (!strcmp(ifname, p->pfik_name) &&
389		    (p->pfik_flags & PFI_IFLAG_SKIP))
390			p->pfik_flags &= ~PFI_IFLAG_SKIP;
391		if (!strcmp(ifname, p->pfik_name) && p->pfik_group != NULL) {
392			if ((h = ifa_grouplookup(p->pfik_name, 0)) == NULL)
393				continue;
394
395			for (n = h; n != NULL; n = n->next) {
396				if (p->pfik_ifp == NULL)
397					continue;
398				if (strncmp(p->pfik_name, ifname, IFNAMSIZ))
399					continue;
400
401				p->pfik_flags &= ~PFI_IFLAG_SKIP;
402			}
403		}
404	}
405	return (0);
406}
407
408int
409pfctl_adjust_skip_ifaces(struct pfctl *pf)
410{
411	struct pfi_kif		*p, *pp;
412	struct node_host	*h = NULL, *n = NULL;
413
414	PFRB_FOREACH(p, &skip_b) {
415		if (p->pfik_group == NULL || !(p->pfik_flags & PFI_IFLAG_SKIP))
416			continue;
417
418		pfctl_set_interface_flags(pf, p->pfik_name, PFI_IFLAG_SKIP, 0);
419		if ((h = ifa_grouplookup(p->pfik_name, 0)) == NULL)
420			continue;
421
422		for (n = h; n != NULL; n = n->next)
423			PFRB_FOREACH(pp, &skip_b) {
424				if (pp->pfik_ifp == NULL)
425					continue;
426
427				if (strncmp(pp->pfik_name, n->ifname, IFNAMSIZ))
428					continue;
429
430				if (!(pp->pfik_flags & PFI_IFLAG_SKIP))
431					pfctl_set_interface_flags(pf,
432					    pp->pfik_name, PFI_IFLAG_SKIP, 1);
433				if (pp->pfik_flags & PFI_IFLAG_SKIP)
434					pp->pfik_flags &= ~PFI_IFLAG_SKIP;
435			}
436	}
437
438	PFRB_FOREACH(p, &skip_b) {
439		if (p->pfik_ifp == NULL || ! (p->pfik_flags & PFI_IFLAG_SKIP))
440			continue;
441
442		pfctl_set_interface_flags(pf, p->pfik_name, PFI_IFLAG_SKIP, 0);
443	}
444
445	return (0);
446}
447
448int
449pfctl_clear_interface_flags(int dev, int opts)
450{
451	struct pfioc_iface	pi;
452
453	if ((opts & PF_OPT_NOACTION) == 0) {
454		bzero(&pi, sizeof(pi));
455		pi.pfiio_flags = PFI_IFLAG_SKIP;
456
457		if (ioctl(dev, DIOCCLRIFFLAG, &pi))
458			err(1, "DIOCCLRIFFLAG");
459		if ((opts & PF_OPT_QUIET) == 0)
460			fprintf(stderr, "pf: interface flags reset\n");
461	}
462	return (0);
463}
464
465int
466pfctl_flush_eth_rules(int dev, int opts, char *anchorname)
467{
468	int ret;
469
470	ret = pfctl_clear_eth_rules(dev, anchorname);
471	if (ret != 0)
472		err(1, "pfctl_clear_eth_rules");
473
474	if ((opts & PF_OPT_QUIET) == 0)
475		fprintf(stderr, "Ethernet rules cleared\n");
476
477	return (ret);
478}
479
480int
481pfctl_flush_rules(int dev, int opts, char *anchorname)
482{
483	int ret;
484
485	ret = pfctl_clear_rules(dev, anchorname);
486	if (ret != 0)
487		err(1, "pfctl_clear_rules");
488	if ((opts & PF_OPT_QUIET) == 0)
489		fprintf(stderr, "rules cleared\n");
490	return (0);
491}
492
493int
494pfctl_flush_nat(int dev, int opts, char *anchorname)
495{
496	int ret;
497
498	ret = pfctl_clear_nat(dev, anchorname);
499	if (ret != 0)
500		err(1, "pfctl_clear_nat");
501	if ((opts & PF_OPT_QUIET) == 0)
502		fprintf(stderr, "nat cleared\n");
503	return (0);
504}
505
506int
507pfctl_clear_altq(int dev, int opts)
508{
509	struct pfr_buffer t;
510
511	if (!altqsupport)
512		return (-1);
513	memset(&t, 0, sizeof(t));
514	t.pfrb_type = PFRB_TRANS;
515	if (pfctl_add_trans(&t, PF_RULESET_ALTQ, "") ||
516	    pfctl_trans(dev, &t, DIOCXBEGIN, 0) ||
517	    pfctl_trans(dev, &t, DIOCXCOMMIT, 0))
518		err(1, "pfctl_clear_altq");
519	if ((opts & PF_OPT_QUIET) == 0)
520		fprintf(stderr, "altq cleared\n");
521	return (0);
522}
523
524int
525pfctl_clear_src_nodes(int dev, int opts)
526{
527	if (ioctl(dev, DIOCCLRSRCNODES))
528		err(1, "DIOCCLRSRCNODES");
529	if ((opts & PF_OPT_QUIET) == 0)
530		fprintf(stderr, "source tracking entries cleared\n");
531	return (0);
532}
533
534int
535pfctl_clear_iface_states(int dev, const char *iface, int opts)
536{
537	struct pfctl_kill kill;
538	unsigned int killed;
539
540	memset(&kill, 0, sizeof(kill));
541	if (iface != NULL && strlcpy(kill.ifname, iface,
542	    sizeof(kill.ifname)) >= sizeof(kill.ifname))
543		errx(1, "invalid interface: %s", iface);
544
545	if (opts & PF_OPT_KILLMATCH)
546		kill.kill_match = true;
547
548	if (pfctl_clear_states_h(pfh, &kill, &killed))
549		err(1, "DIOCCLRSTATES");
550	if ((opts & PF_OPT_QUIET) == 0)
551		fprintf(stderr, "%d states cleared\n", killed);
552	return (0);
553}
554
555void
556pfctl_addrprefix(char *addr, struct pf_addr *mask)
557{
558	char *p;
559	const char *errstr;
560	int prefix, ret_ga, q, r;
561	struct addrinfo hints, *res;
562
563	if ((p = strchr(addr, '/')) == NULL)
564		return;
565
566	*p++ = '\0';
567	prefix = strtonum(p, 0, 128, &errstr);
568	if (errstr)
569		errx(1, "prefix is %s: %s", errstr, p);
570
571	bzero(&hints, sizeof(hints));
572	/* prefix only with numeric addresses */
573	hints.ai_flags |= AI_NUMERICHOST;
574
575	if ((ret_ga = getaddrinfo(addr, NULL, &hints, &res))) {
576		errx(1, "getaddrinfo: %s", gai_strerror(ret_ga));
577		/* NOTREACHED */
578	}
579
580	if (res->ai_family == AF_INET && prefix > 32)
581		errx(1, "prefix too long for AF_INET");
582	else if (res->ai_family == AF_INET6 && prefix > 128)
583		errx(1, "prefix too long for AF_INET6");
584
585	q = prefix >> 3;
586	r = prefix & 7;
587	switch (res->ai_family) {
588	case AF_INET:
589		bzero(&mask->v4, sizeof(mask->v4));
590		mask->v4.s_addr = htonl((u_int32_t)
591		    (0xffffffffffULL << (32 - prefix)));
592		break;
593	case AF_INET6:
594		bzero(&mask->v6, sizeof(mask->v6));
595		if (q > 0)
596			memset((void *)&mask->v6, 0xff, q);
597		if (r > 0)
598			*((u_char *)&mask->v6 + q) =
599			    (0xff00 >> r) & 0xff;
600		break;
601	}
602	freeaddrinfo(res);
603}
604
605int
606pfctl_kill_src_nodes(int dev, const char *iface, int opts)
607{
608	struct pfioc_src_node_kill psnk;
609	struct addrinfo *res[2], *resp[2];
610	struct sockaddr last_src, last_dst;
611	int killed, sources, dests;
612	int ret_ga;
613
614	killed = sources = dests = 0;
615
616	memset(&psnk, 0, sizeof(psnk));
617	memset(&psnk.psnk_src.addr.v.a.mask, 0xff,
618	    sizeof(psnk.psnk_src.addr.v.a.mask));
619	memset(&last_src, 0xff, sizeof(last_src));
620	memset(&last_dst, 0xff, sizeof(last_dst));
621
622	pfctl_addrprefix(src_node_kill[0], &psnk.psnk_src.addr.v.a.mask);
623
624	if ((ret_ga = getaddrinfo(src_node_kill[0], NULL, NULL, &res[0]))) {
625		errx(1, "getaddrinfo: %s", gai_strerror(ret_ga));
626		/* NOTREACHED */
627	}
628	for (resp[0] = res[0]; resp[0]; resp[0] = resp[0]->ai_next) {
629		if (resp[0]->ai_addr == NULL)
630			continue;
631		/* We get lots of duplicates.  Catch the easy ones */
632		if (memcmp(&last_src, resp[0]->ai_addr, sizeof(last_src)) == 0)
633			continue;
634		last_src = *(struct sockaddr *)resp[0]->ai_addr;
635
636		psnk.psnk_af = resp[0]->ai_family;
637		sources++;
638
639		if (psnk.psnk_af == AF_INET)
640			psnk.psnk_src.addr.v.a.addr.v4 =
641			    ((struct sockaddr_in *)resp[0]->ai_addr)->sin_addr;
642		else if (psnk.psnk_af == AF_INET6)
643			psnk.psnk_src.addr.v.a.addr.v6 =
644			    ((struct sockaddr_in6 *)resp[0]->ai_addr)->
645			    sin6_addr;
646		else
647			errx(1, "Unknown address family %d", psnk.psnk_af);
648
649		if (src_node_killers > 1) {
650			dests = 0;
651			memset(&psnk.psnk_dst.addr.v.a.mask, 0xff,
652			    sizeof(psnk.psnk_dst.addr.v.a.mask));
653			memset(&last_dst, 0xff, sizeof(last_dst));
654			pfctl_addrprefix(src_node_kill[1],
655			    &psnk.psnk_dst.addr.v.a.mask);
656			if ((ret_ga = getaddrinfo(src_node_kill[1], NULL, NULL,
657			    &res[1]))) {
658				errx(1, "getaddrinfo: %s",
659				    gai_strerror(ret_ga));
660				/* NOTREACHED */
661			}
662			for (resp[1] = res[1]; resp[1];
663			    resp[1] = resp[1]->ai_next) {
664				if (resp[1]->ai_addr == NULL)
665					continue;
666				if (psnk.psnk_af != resp[1]->ai_family)
667					continue;
668
669				if (memcmp(&last_dst, resp[1]->ai_addr,
670				    sizeof(last_dst)) == 0)
671					continue;
672				last_dst = *(struct sockaddr *)resp[1]->ai_addr;
673
674				dests++;
675
676				if (psnk.psnk_af == AF_INET)
677					psnk.psnk_dst.addr.v.a.addr.v4 =
678					    ((struct sockaddr_in *)resp[1]->
679					    ai_addr)->sin_addr;
680				else if (psnk.psnk_af == AF_INET6)
681					psnk.psnk_dst.addr.v.a.addr.v6 =
682					    ((struct sockaddr_in6 *)resp[1]->
683					    ai_addr)->sin6_addr;
684				else
685					errx(1, "Unknown address family %d",
686					    psnk.psnk_af);
687
688				if (ioctl(dev, DIOCKILLSRCNODES, &psnk))
689					err(1, "DIOCKILLSRCNODES");
690				killed += psnk.psnk_killed;
691			}
692			freeaddrinfo(res[1]);
693		} else {
694			if (ioctl(dev, DIOCKILLSRCNODES, &psnk))
695				err(1, "DIOCKILLSRCNODES");
696			killed += psnk.psnk_killed;
697		}
698	}
699
700	freeaddrinfo(res[0]);
701
702	if ((opts & PF_OPT_QUIET) == 0)
703		fprintf(stderr, "killed %d src nodes from %d sources and %d "
704		    "destinations\n", killed, sources, dests);
705	return (0);
706}
707
708int
709pfctl_net_kill_states(int dev, const char *iface, int opts)
710{
711	struct pfctl_kill kill;
712	struct addrinfo *res[2], *resp[2];
713	struct sockaddr last_src, last_dst;
714	unsigned int newkilled;
715	int killed, sources, dests;
716	int ret_ga;
717
718	killed = sources = dests = 0;
719
720	memset(&kill, 0, sizeof(kill));
721	memset(&kill.src.addr.v.a.mask, 0xff,
722	    sizeof(kill.src.addr.v.a.mask));
723	memset(&last_src, 0xff, sizeof(last_src));
724	memset(&last_dst, 0xff, sizeof(last_dst));
725	if (iface != NULL && strlcpy(kill.ifname, iface,
726	    sizeof(kill.ifname)) >= sizeof(kill.ifname))
727		errx(1, "invalid interface: %s", iface);
728
729	if (state_killers == 2 && (strcmp(state_kill[0], "nat") == 0)) {
730		kill.nat = true;
731		state_kill[0] = state_kill[1];
732		state_killers = 1;
733	}
734
735	pfctl_addrprefix(state_kill[0], &kill.src.addr.v.a.mask);
736
737	if (opts & PF_OPT_KILLMATCH)
738		kill.kill_match = true;
739
740	if ((ret_ga = getaddrinfo(state_kill[0], NULL, NULL, &res[0]))) {
741		errx(1, "getaddrinfo: %s", gai_strerror(ret_ga));
742		/* NOTREACHED */
743	}
744	for (resp[0] = res[0]; resp[0]; resp[0] = resp[0]->ai_next) {
745		if (resp[0]->ai_addr == NULL)
746			continue;
747		/* We get lots of duplicates.  Catch the easy ones */
748		if (memcmp(&last_src, resp[0]->ai_addr, sizeof(last_src)) == 0)
749			continue;
750		last_src = *(struct sockaddr *)resp[0]->ai_addr;
751
752		kill.af = resp[0]->ai_family;
753		sources++;
754
755		if (kill.af == AF_INET)
756			kill.src.addr.v.a.addr.v4 =
757			    ((struct sockaddr_in *)resp[0]->ai_addr)->sin_addr;
758		else if (kill.af == AF_INET6)
759			kill.src.addr.v.a.addr.v6 =
760			    ((struct sockaddr_in6 *)resp[0]->ai_addr)->
761			    sin6_addr;
762		else
763			errx(1, "Unknown address family %d", kill.af);
764
765		if (state_killers > 1) {
766			dests = 0;
767			memset(&kill.dst.addr.v.a.mask, 0xff,
768			    sizeof(kill.dst.addr.v.a.mask));
769			memset(&last_dst, 0xff, sizeof(last_dst));
770			pfctl_addrprefix(state_kill[1],
771			    &kill.dst.addr.v.a.mask);
772			if ((ret_ga = getaddrinfo(state_kill[1], NULL, NULL,
773			    &res[1]))) {
774				errx(1, "getaddrinfo: %s",
775				    gai_strerror(ret_ga));
776				/* NOTREACHED */
777			}
778			for (resp[1] = res[1]; resp[1];
779			    resp[1] = resp[1]->ai_next) {
780				if (resp[1]->ai_addr == NULL)
781					continue;
782				if (kill.af != resp[1]->ai_family)
783					continue;
784
785				if (memcmp(&last_dst, resp[1]->ai_addr,
786				    sizeof(last_dst)) == 0)
787					continue;
788				last_dst = *(struct sockaddr *)resp[1]->ai_addr;
789
790				dests++;
791
792				if (kill.af == AF_INET)
793					kill.dst.addr.v.a.addr.v4 =
794					    ((struct sockaddr_in *)resp[1]->
795					    ai_addr)->sin_addr;
796				else if (kill.af == AF_INET6)
797					kill.dst.addr.v.a.addr.v6 =
798					    ((struct sockaddr_in6 *)resp[1]->
799					    ai_addr)->sin6_addr;
800				else
801					errx(1, "Unknown address family %d",
802					    kill.af);
803
804				if (pfctl_kill_states_h(pfh, &kill, &newkilled))
805					err(1, "DIOCKILLSTATES");
806				killed += newkilled;
807			}
808			freeaddrinfo(res[1]);
809		} else {
810			if (pfctl_kill_states_h(pfh, &kill, &newkilled))
811				err(1, "DIOCKILLSTATES");
812			killed += newkilled;
813		}
814	}
815
816	freeaddrinfo(res[0]);
817
818	if ((opts & PF_OPT_QUIET) == 0)
819		fprintf(stderr, "killed %d states from %d sources and %d "
820		    "destinations\n", killed, sources, dests);
821	return (0);
822}
823
824int
825pfctl_gateway_kill_states(int dev, const char *iface, int opts)
826{
827	struct pfctl_kill kill;
828	struct addrinfo *res, *resp;
829	struct sockaddr last_src;
830	unsigned int newkilled;
831	int killed = 0;
832	int ret_ga;
833
834	if (state_killers != 2 || (strlen(state_kill[1]) == 0)) {
835		warnx("no gateway specified");
836		usage();
837	}
838
839	memset(&kill, 0, sizeof(kill));
840	memset(&kill.rt_addr.addr.v.a.mask, 0xff,
841	    sizeof(kill.rt_addr.addr.v.a.mask));
842	memset(&last_src, 0xff, sizeof(last_src));
843	if (iface != NULL && strlcpy(kill.ifname, iface,
844	    sizeof(kill.ifname)) >= sizeof(kill.ifname))
845		errx(1, "invalid interface: %s", iface);
846
847	if (opts & PF_OPT_KILLMATCH)
848		kill.kill_match = true;
849
850	pfctl_addrprefix(state_kill[1], &kill.rt_addr.addr.v.a.mask);
851
852	if ((ret_ga = getaddrinfo(state_kill[1], NULL, NULL, &res))) {
853		errx(1, "getaddrinfo: %s", gai_strerror(ret_ga));
854		/* NOTREACHED */
855	}
856	for (resp = res; resp; resp = resp->ai_next) {
857		if (resp->ai_addr == NULL)
858			continue;
859		/* We get lots of duplicates.  Catch the easy ones */
860		if (memcmp(&last_src, resp->ai_addr, sizeof(last_src)) == 0)
861			continue;
862		last_src = *(struct sockaddr *)resp->ai_addr;
863
864		kill.af = resp->ai_family;
865
866		if (kill.af == AF_INET)
867			kill.rt_addr.addr.v.a.addr.v4 =
868			    ((struct sockaddr_in *)resp->ai_addr)->sin_addr;
869		else if (kill.af == AF_INET6)
870			kill.rt_addr.addr.v.a.addr.v6 =
871			    ((struct sockaddr_in6 *)resp->ai_addr)->
872			    sin6_addr;
873		else
874			errx(1, "Unknown address family %d", kill.af);
875
876		if (pfctl_kill_states_h(pfh, &kill, &newkilled))
877			err(1, "DIOCKILLSTATES");
878		killed += newkilled;
879	}
880
881	freeaddrinfo(res);
882
883	if ((opts & PF_OPT_QUIET) == 0)
884		fprintf(stderr, "killed %d states\n", killed);
885	return (0);
886}
887
888int
889pfctl_label_kill_states(int dev, const char *iface, int opts)
890{
891	struct pfctl_kill kill;
892	unsigned int killed;
893
894	if (state_killers != 2 || (strlen(state_kill[1]) == 0)) {
895		warnx("no label specified");
896		usage();
897	}
898	memset(&kill, 0, sizeof(kill));
899	if (iface != NULL && strlcpy(kill.ifname, iface,
900	    sizeof(kill.ifname)) >= sizeof(kill.ifname))
901		errx(1, "invalid interface: %s", iface);
902
903	if (opts & PF_OPT_KILLMATCH)
904		kill.kill_match = true;
905
906	if (strlcpy(kill.label, state_kill[1], sizeof(kill.label)) >=
907	    sizeof(kill.label))
908		errx(1, "label too long: %s", state_kill[1]);
909
910	if (pfctl_kill_states_h(pfh, &kill, &killed))
911		err(1, "DIOCKILLSTATES");
912
913	if ((opts & PF_OPT_QUIET) == 0)
914		fprintf(stderr, "killed %d states\n", killed);
915
916	return (0);
917}
918
919int
920pfctl_id_kill_states(int dev, const char *iface, int opts)
921{
922	struct pfctl_kill kill;
923	unsigned int killed;
924
925	if (state_killers != 2 || (strlen(state_kill[1]) == 0)) {
926		warnx("no id specified");
927		usage();
928	}
929
930	memset(&kill, 0, sizeof(kill));
931
932	if (opts & PF_OPT_KILLMATCH)
933		kill.kill_match = true;
934
935	if ((sscanf(state_kill[1], "%jx/%x",
936	    &kill.cmp.id, &kill.cmp.creatorid)) == 2) {
937	}
938	else if ((sscanf(state_kill[1], "%jx", &kill.cmp.id)) == 1) {
939		kill.cmp.creatorid = 0;
940	} else {
941		warnx("wrong id format specified");
942		usage();
943	}
944	if (kill.cmp.id == 0) {
945		warnx("cannot kill id 0");
946		usage();
947	}
948
949	if (pfctl_kill_states_h(pfh, &kill, &killed))
950		err(1, "DIOCKILLSTATES");
951
952	if ((opts & PF_OPT_QUIET) == 0)
953		fprintf(stderr, "killed %d states\n", killed);
954
955	return (0);
956}
957
958int
959pfctl_get_pool(int dev, struct pfctl_pool *pool, u_int32_t nr,
960    u_int32_t ticket, int r_action, char *anchorname)
961{
962	struct pfioc_pooladdr pp;
963	struct pf_pooladdr *pa;
964	u_int32_t pnr, mpnr;
965
966	memset(&pp, 0, sizeof(pp));
967	memcpy(pp.anchor, anchorname, sizeof(pp.anchor));
968	pp.r_action = r_action;
969	pp.r_num = nr;
970	pp.ticket = ticket;
971	if (ioctl(dev, DIOCGETADDRS, &pp)) {
972		warn("DIOCGETADDRS");
973		return (-1);
974	}
975	mpnr = pp.nr;
976	TAILQ_INIT(&pool->list);
977	for (pnr = 0; pnr < mpnr; ++pnr) {
978		pp.nr = pnr;
979		if (ioctl(dev, DIOCGETADDR, &pp)) {
980			warn("DIOCGETADDR");
981			return (-1);
982		}
983		pa = calloc(1, sizeof(struct pf_pooladdr));
984		if (pa == NULL)
985			err(1, "calloc");
986		bcopy(&pp.addr, pa, sizeof(struct pf_pooladdr));
987		TAILQ_INSERT_TAIL(&pool->list, pa, entries);
988	}
989
990	return (0);
991}
992
993void
994pfctl_move_pool(struct pfctl_pool *src, struct pfctl_pool *dst)
995{
996	struct pf_pooladdr *pa;
997
998	while ((pa = TAILQ_FIRST(&src->list)) != NULL) {
999		TAILQ_REMOVE(&src->list, pa, entries);
1000		TAILQ_INSERT_TAIL(&dst->list, pa, entries);
1001	}
1002}
1003
1004void
1005pfctl_clear_pool(struct pfctl_pool *pool)
1006{
1007	struct pf_pooladdr *pa;
1008
1009	while ((pa = TAILQ_FIRST(&pool->list)) != NULL) {
1010		TAILQ_REMOVE(&pool->list, pa, entries);
1011		free(pa);
1012	}
1013}
1014
1015void
1016pfctl_print_eth_rule_counters(struct pfctl_eth_rule *rule, int opts)
1017{
1018	if (opts & PF_OPT_VERBOSE) {
1019		printf("  [ Evaluations: %-8llu  Packets: %-8llu  "
1020			    "Bytes: %-10llu]\n",
1021			    (unsigned long long)rule->evaluations,
1022			    (unsigned long long)(rule->packets[0] +
1023			    rule->packets[1]),
1024			    (unsigned long long)(rule->bytes[0] +
1025			    rule->bytes[1]));
1026	}
1027	if (opts & PF_OPT_VERBOSE2) {
1028		char timestr[30];
1029
1030		if (rule->last_active_timestamp != 0) {
1031			bcopy(ctime(&rule->last_active_timestamp), timestr,
1032			    sizeof(timestr));
1033			*strchr(timestr, '\n') = '\0';
1034		} else {
1035			snprintf(timestr, sizeof(timestr), "N/A");
1036		}
1037		printf("  [ Last Active Time: %s ]\n", timestr);
1038	}
1039}
1040
1041void
1042pfctl_print_rule_counters(struct pfctl_rule *rule, int opts)
1043{
1044	if (opts & PF_OPT_DEBUG) {
1045		const char *t[PF_SKIP_COUNT] = { "i", "d", "f",
1046		    "p", "sa", "sp", "da", "dp" };
1047		int i;
1048
1049		printf("  [ Skip steps: ");
1050		for (i = 0; i < PF_SKIP_COUNT; ++i) {
1051			if (rule->skip[i].nr == rule->nr + 1)
1052				continue;
1053			printf("%s=", t[i]);
1054			if (rule->skip[i].nr == -1)
1055				printf("end ");
1056			else
1057				printf("%u ", rule->skip[i].nr);
1058		}
1059		printf("]\n");
1060
1061		printf("  [ queue: qname=%s qid=%u pqname=%s pqid=%u ]\n",
1062		    rule->qname, rule->qid, rule->pqname, rule->pqid);
1063	}
1064	if (opts & PF_OPT_VERBOSE) {
1065		printf("  [ Evaluations: %-8llu  Packets: %-8llu  "
1066			    "Bytes: %-10llu  States: %-6ju]\n",
1067			    (unsigned long long)rule->evaluations,
1068			    (unsigned long long)(rule->packets[0] +
1069			    rule->packets[1]),
1070			    (unsigned long long)(rule->bytes[0] +
1071			    rule->bytes[1]), (uintmax_t)rule->states_cur);
1072		if (!(opts & PF_OPT_DEBUG))
1073			printf("  [ Inserted: uid %u pid %u "
1074			    "State Creations: %-6ju]\n",
1075			    (unsigned)rule->cuid, (unsigned)rule->cpid,
1076			    (uintmax_t)rule->states_tot);
1077	}
1078	if (opts & PF_OPT_VERBOSE2) {
1079		char timestr[30];
1080		if (rule->last_active_timestamp != 0) {
1081			bcopy(ctime(&rule->last_active_timestamp), timestr,
1082			    sizeof(timestr));
1083			*strchr(timestr, '\n') = '\0';
1084		} else {
1085			snprintf(timestr, sizeof(timestr), "N/A");
1086		}
1087		printf("  [ Last Active Time: %s ]\n", timestr);
1088	}
1089}
1090
1091void
1092pfctl_print_title(char *title)
1093{
1094	if (!first_title)
1095		printf("\n");
1096	first_title = 0;
1097	printf("%s\n", title);
1098}
1099
1100int
1101pfctl_show_eth_rules(int dev, char *path, int opts, enum pfctl_show format,
1102    char *anchorname, int depth, int wildcard)
1103{
1104	char anchor_call[MAXPATHLEN];
1105	struct pfctl_eth_rules_info info;
1106	struct pfctl_eth_rule rule;
1107	int brace;
1108	int dotitle = opts & PF_OPT_SHOWALL;
1109	int len = strlen(path);
1110	char *npath, *p;
1111
1112	/*
1113	 * Truncate a trailing / and * on an anchorname before searching for
1114	 * the ruleset, this is syntactic sugar that doesn't actually make it
1115	 * to the kernel.
1116	 */
1117	if ((p = strrchr(anchorname, '/')) != NULL &&
1118			p[1] == '*' && p[2] == '\0') {
1119		p[0] = '\0';
1120	}
1121
1122	if (anchorname[0] == '/') {
1123		if ((npath = calloc(1, MAXPATHLEN)) == NULL)
1124			errx(1, "pfctl_rules: calloc");
1125		snprintf(npath, MAXPATHLEN, "%s", anchorname);
1126	} else {
1127		if (path[0])
1128			snprintf(&path[len], MAXPATHLEN - len, "/%s", anchorname);
1129		else
1130			snprintf(&path[len], MAXPATHLEN - len, "%s", anchorname);
1131		npath = path;
1132	}
1133
1134	/*
1135	 * If this anchor was called with a wildcard path, go through
1136	 * the rulesets in the anchor rather than the rules.
1137	 */
1138	if (wildcard && (opts & PF_OPT_RECURSE)) {
1139		struct pfctl_eth_rulesets_info	ri;
1140		u_int32_t                mnr, nr;
1141
1142		if (pfctl_get_eth_rulesets_info(dev, &ri, npath)) {
1143			if (errno == EINVAL) {
1144				fprintf(stderr, "Anchor '%s' "
1145						"not found.\n", anchorname);
1146			} else {
1147				warn("DIOCGETETHRULESETS");
1148				return (-1);
1149			}
1150		}
1151		mnr = ri.nr;
1152
1153		pfctl_print_eth_rule_counters(&rule, opts);
1154		for (nr = 0; nr < mnr; ++nr) {
1155			struct pfctl_eth_ruleset_info	rs;
1156
1157			if (pfctl_get_eth_ruleset(dev, npath, nr, &rs))
1158				err(1, "DIOCGETETHRULESET");
1159			INDENT(depth, !(opts & PF_OPT_VERBOSE));
1160			printf("anchor \"%s\" all {\n", rs.name);
1161			pfctl_show_eth_rules(dev, npath, opts,
1162					format, rs.name, depth + 1, 0);
1163			INDENT(depth, !(opts & PF_OPT_VERBOSE));
1164			printf("}\n");
1165		}
1166		path[len] = '\0';
1167		return (0);
1168	}
1169
1170	if (pfctl_get_eth_rules_info(dev, &info, path)) {
1171		warn("DIOCGETETHRULES");
1172		return (-1);
1173	}
1174	for (int nr = 0; nr < info.nr; nr++) {
1175		brace = 0;
1176		INDENT(depth, !(opts & PF_OPT_VERBOSE));
1177		if (pfctl_get_eth_rule(dev, nr, info.ticket, path, &rule,
1178		    opts & PF_OPT_CLRRULECTRS, anchor_call) != 0) {
1179			warn("DIOCGETETHRULE");
1180			return (-1);
1181		}
1182		if (anchor_call[0] &&
1183		   ((((p = strrchr(anchor_call, '_')) != NULL) &&
1184		   (p == anchor_call ||
1185		   *(--p) == '/')) || (opts & PF_OPT_RECURSE))) {
1186			brace++;
1187			int aclen = strlen(anchor_call);
1188			if (anchor_call[aclen - 1] == '*')
1189				anchor_call[aclen - 2] = '\0';
1190		}
1191		p = &anchor_call[0];
1192		if (dotitle) {
1193			pfctl_print_title("ETH RULES:");
1194			dotitle = 0;
1195		}
1196		print_eth_rule(&rule, anchor_call,
1197		    opts & (PF_OPT_VERBOSE2 | PF_OPT_DEBUG));
1198		if (brace)
1199			printf(" {\n");
1200		else
1201			printf("\n");
1202		pfctl_print_eth_rule_counters(&rule, opts);
1203		if (brace) {
1204			pfctl_show_eth_rules(dev, path, opts, format,
1205			    p, depth + 1, rule.anchor_wildcard);
1206			INDENT(depth, !(opts & PF_OPT_VERBOSE));
1207			printf("}\n");
1208		}
1209	}
1210
1211	path[len] = '\0';
1212	return (0);
1213}
1214
1215int
1216pfctl_show_rules(int dev, char *path, int opts, enum pfctl_show format,
1217    char *anchorname, int depth, int wildcard)
1218{
1219	struct pfctl_rules_info ri;
1220	struct pfctl_rule rule;
1221	char anchor_call[MAXPATHLEN];
1222	u_int32_t nr, header = 0;
1223	int rule_numbers = opts & (PF_OPT_VERBOSE2 | PF_OPT_DEBUG);
1224	int numeric = opts & PF_OPT_NUMERIC;
1225	int len = strlen(path), ret = 0;
1226	char *npath, *p;
1227
1228	/*
1229	 * Truncate a trailing / and * on an anchorname before searching for
1230	 * the ruleset, this is syntactic sugar that doesn't actually make it
1231	 * to the kernel.
1232	 */
1233	if ((p = strrchr(anchorname, '/')) != NULL &&
1234	    p[1] == '*' && p[2] == '\0') {
1235		p[0] = '\0';
1236	}
1237
1238	if (anchorname[0] == '/') {
1239		if ((npath = calloc(1, MAXPATHLEN)) == NULL)
1240			errx(1, "pfctl_rules: calloc");
1241		snprintf(npath, MAXPATHLEN, "%s", anchorname);
1242	} else {
1243		if (path[0])
1244			snprintf(&path[len], MAXPATHLEN - len, "/%s", anchorname);
1245		else
1246			snprintf(&path[len], MAXPATHLEN - len, "%s", anchorname);
1247		npath = path;
1248	}
1249
1250	/*
1251	 * If this anchor was called with a wildcard path, go through
1252	 * the rulesets in the anchor rather than the rules.
1253	 */
1254	if (wildcard && (opts & PF_OPT_RECURSE)) {
1255		struct pfioc_ruleset     prs;
1256		u_int32_t                mnr, nr;
1257
1258		memset(&prs, 0, sizeof(prs));
1259		memcpy(prs.path, npath, sizeof(prs.path));
1260		if (ioctl(dev, DIOCGETRULESETS, &prs)) {
1261			if (errno == EINVAL)
1262				fprintf(stderr, "Anchor '%s' "
1263				    "not found.\n", anchorname);
1264			else
1265				err(1, "DIOCGETRULESETS");
1266		}
1267		mnr = prs.nr;
1268
1269		pfctl_print_rule_counters(&rule, opts);
1270		for (nr = 0; nr < mnr; ++nr) {
1271			prs.nr = nr;
1272			if (ioctl(dev, DIOCGETRULESET, &prs))
1273				err(1, "DIOCGETRULESET");
1274			INDENT(depth, !(opts & PF_OPT_VERBOSE));
1275			printf("anchor \"%s\" all {\n", prs.name);
1276			pfctl_show_rules(dev, npath, opts,
1277			    format, prs.name, depth + 1, 0);
1278			INDENT(depth, !(opts & PF_OPT_VERBOSE));
1279			printf("}\n");
1280		}
1281		path[len] = '\0';
1282		return (0);
1283	}
1284
1285	if (opts & PF_OPT_SHOWALL) {
1286		ret = pfctl_get_rules_info_h(pfh, &ri, PF_PASS, path);
1287		if (ret != 0) {
1288			warn("DIOCGETRULES");
1289			goto error;
1290		}
1291		header++;
1292	}
1293	ret = pfctl_get_rules_info_h(pfh, &ri, PF_SCRUB, path);
1294	if (ret != 0) {
1295		warn("DIOCGETRULES");
1296		goto error;
1297	}
1298	if (opts & PF_OPT_SHOWALL) {
1299		if (format == PFCTL_SHOW_RULES && (ri.nr > 0 || header))
1300			pfctl_print_title("FILTER RULES:");
1301		else if (format == PFCTL_SHOW_LABELS && labels)
1302			pfctl_print_title("LABEL COUNTERS:");
1303	}
1304
1305	for (nr = 0; nr < ri.nr; ++nr) {
1306		if (pfctl_get_clear_rule_h(pfh, nr, ri.ticket, path, PF_SCRUB,
1307		    &rule, anchor_call, opts & PF_OPT_CLRRULECTRS)) {
1308			warn("DIOCGETRULENV");
1309			goto error;
1310		}
1311
1312		if (pfctl_get_pool(dev, &rule.rpool,
1313		    nr, ri.ticket, PF_SCRUB, path) != 0)
1314			goto error;
1315
1316		switch (format) {
1317		case PFCTL_SHOW_LABELS:
1318			break;
1319		case PFCTL_SHOW_RULES:
1320			if (rule.label[0][0] && (opts & PF_OPT_SHOWALL))
1321				labels = 1;
1322			print_rule(&rule, anchor_call, rule_numbers, numeric);
1323			printf("\n");
1324			pfctl_print_rule_counters(&rule, opts);
1325			break;
1326		case PFCTL_SHOW_NOTHING:
1327			break;
1328		}
1329		pfctl_clear_pool(&rule.rpool);
1330	}
1331	ret = pfctl_get_rules_info_h(pfh, &ri, PF_PASS, path);
1332	if (ret != 0) {
1333		warn("DIOCGETRULES");
1334		goto error;
1335	}
1336	for (nr = 0; nr < ri.nr; ++nr) {
1337		if (pfctl_get_clear_rule_h(pfh, nr, ri.ticket, path, PF_PASS,
1338		    &rule, anchor_call, opts & PF_OPT_CLRRULECTRS)) {
1339			warn("DIOCGETRULE");
1340			goto error;
1341		}
1342
1343		if (pfctl_get_pool(dev, &rule.rpool,
1344		    nr, ri.ticket, PF_PASS, path) != 0)
1345			goto error;
1346
1347		switch (format) {
1348		case PFCTL_SHOW_LABELS: {
1349			bool show = false;
1350			int i = 0;
1351
1352			while (rule.label[i][0]) {
1353				printf("%s ", rule.label[i++]);
1354				show = true;
1355			}
1356
1357			if (show) {
1358				printf("%llu %llu %llu %llu"
1359				    " %llu %llu %llu %ju\n",
1360				    (unsigned long long)rule.evaluations,
1361				    (unsigned long long)(rule.packets[0] +
1362				    rule.packets[1]),
1363				    (unsigned long long)(rule.bytes[0] +
1364				    rule.bytes[1]),
1365				    (unsigned long long)rule.packets[0],
1366				    (unsigned long long)rule.bytes[0],
1367				    (unsigned long long)rule.packets[1],
1368				    (unsigned long long)rule.bytes[1],
1369				    (uintmax_t)rule.states_tot);
1370			}
1371
1372			if (anchor_call[0] &&
1373			    (((p = strrchr(anchor_call, '/')) ?
1374			      p[1] == '_' : anchor_call[0] == '_') ||
1375			     opts & PF_OPT_RECURSE)) {
1376				pfctl_show_rules(dev, npath, opts, format,
1377				    anchor_call, depth, rule.anchor_wildcard);
1378			}
1379			break;
1380		}
1381		case PFCTL_SHOW_RULES:
1382			if (rule.label[0][0] && (opts & PF_OPT_SHOWALL))
1383				labels = 1;
1384			INDENT(depth, !(opts & PF_OPT_VERBOSE));
1385			print_rule(&rule, anchor_call, rule_numbers, numeric);
1386
1387			/*
1388			 * If this is a 'unnamed' brace notation
1389			 * anchor, OR the user has explicitly requested
1390			 * recursion, print it recursively.
1391			 */
1392			if (anchor_call[0] &&
1393			    (((p = strrchr(anchor_call, '/')) ?
1394			      p[1] == '_' : anchor_call[0] == '_') ||
1395			     opts & PF_OPT_RECURSE)) {
1396				printf(" {\n");
1397				pfctl_print_rule_counters(&rule, opts);
1398				pfctl_show_rules(dev, npath, opts, format,
1399				    anchor_call, depth + 1,
1400				    rule.anchor_wildcard);
1401				INDENT(depth, !(opts & PF_OPT_VERBOSE));
1402				printf("}\n");
1403			} else {
1404				printf("\n");
1405				pfctl_print_rule_counters(&rule, opts);
1406			}
1407			break;
1408		case PFCTL_SHOW_NOTHING:
1409			break;
1410		}
1411		pfctl_clear_pool(&rule.rpool);
1412	}
1413
1414 error:
1415	path[len] = '\0';
1416	return (ret);
1417}
1418
1419int
1420pfctl_show_nat(int dev, char *path, int opts, char *anchorname, int depth,
1421    int wildcard)
1422{
1423	struct pfctl_rules_info ri;
1424	struct pfctl_rule rule;
1425	char anchor_call[MAXPATHLEN];
1426	u_int32_t nr;
1427	static int nattype[3] = { PF_NAT, PF_RDR, PF_BINAT };
1428	int i, dotitle = opts & PF_OPT_SHOWALL;
1429	int ret;
1430	int len = strlen(path);
1431	char *npath, *p;
1432
1433	/*
1434	 * Truncate a trailing / and * on an anchorname before searching for
1435	 * the ruleset, this is syntactic sugar that doesn't actually make it
1436	 * to the kernel.
1437	 */
1438	if ((p = strrchr(anchorname, '/')) != NULL &&
1439	    p[1] == '*' && p[2] == '\0') {
1440		p[0] = '\0';
1441	}
1442
1443	if (anchorname[0] == '/') {
1444		if ((npath = calloc(1, MAXPATHLEN)) == NULL)
1445			errx(1, "pfctl_rules: calloc");
1446		snprintf(npath, MAXPATHLEN, "%s", anchorname);
1447	} else {
1448		if (path[0])
1449			snprintf(&path[len], MAXPATHLEN - len, "/%s", anchorname);
1450		else
1451			snprintf(&path[len], MAXPATHLEN - len, "%s", anchorname);
1452		npath = path;
1453	}
1454
1455	/*
1456	 * If this anchor was called with a wildcard path, go through
1457	 * the rulesets in the anchor rather than the rules.
1458	 */
1459	if (wildcard && (opts & PF_OPT_RECURSE)) {
1460		struct pfioc_ruleset     prs;
1461		u_int32_t                mnr, nr;
1462		memset(&prs, 0, sizeof(prs));
1463		memcpy(prs.path, npath, sizeof(prs.path));
1464		if (ioctl(dev, DIOCGETRULESETS, &prs)) {
1465			if (errno == EINVAL)
1466				fprintf(stderr, "NAT anchor '%s' "
1467				    "not found.\n", anchorname);
1468			else
1469				err(1, "DIOCGETRULESETS");
1470		}
1471		mnr = prs.nr;
1472
1473		pfctl_print_rule_counters(&rule, opts);
1474		for (nr = 0; nr < mnr; ++nr) {
1475			prs.nr = nr;
1476			if (ioctl(dev, DIOCGETRULESET, &prs))
1477				err(1, "DIOCGETRULESET");
1478			INDENT(depth, !(opts & PF_OPT_VERBOSE));
1479			printf("nat-anchor \"%s\" all {\n", prs.name);
1480			pfctl_show_nat(dev, npath, opts,
1481			    prs.name, depth + 1, 0);
1482			INDENT(depth, !(opts & PF_OPT_VERBOSE));
1483			printf("}\n");
1484		}
1485		path[len] = '\0';
1486		return (0);
1487	}
1488
1489	for (i = 0; i < 3; i++) {
1490		ret = pfctl_get_rules_info_h(pfh, &ri, nattype[i], path);
1491		if (ret != 0) {
1492			warn("DIOCGETRULES");
1493			return (-1);
1494		}
1495		for (nr = 0; nr < ri.nr; ++nr) {
1496			INDENT(depth, !(opts & PF_OPT_VERBOSE));
1497
1498			if (pfctl_get_rule_h(pfh, nr, ri.ticket, path,
1499			    nattype[i], &rule, anchor_call)) {
1500				warn("DIOCGETRULE");
1501				return (-1);
1502			}
1503			if (pfctl_get_pool(dev, &rule.rpool, nr,
1504			    ri.ticket, nattype[i], path) != 0)
1505				return (-1);
1506
1507			if (dotitle) {
1508				pfctl_print_title("TRANSLATION RULES:");
1509				dotitle = 0;
1510			}
1511			print_rule(&rule, anchor_call,
1512			    opts & PF_OPT_VERBOSE2, opts & PF_OPT_NUMERIC);
1513			if (anchor_call[0] &&
1514			    (((p = strrchr(anchor_call, '/')) ?
1515			      p[1] == '_' : anchor_call[0] == '_') ||
1516			     opts & PF_OPT_RECURSE)) {
1517				printf(" {\n");
1518				pfctl_print_rule_counters(&rule, opts);
1519				pfctl_show_nat(dev, npath, opts, anchor_call,
1520				    depth + 1, rule.anchor_wildcard);
1521				INDENT(depth, !(opts & PF_OPT_VERBOSE));
1522				printf("}\n");
1523			} else {
1524				printf("\n");
1525				pfctl_print_rule_counters(&rule, opts);
1526			}
1527		}
1528	}
1529	return (0);
1530}
1531
1532int
1533pfctl_show_src_nodes(int dev, int opts)
1534{
1535	struct pfioc_src_nodes psn;
1536	struct pf_src_node *p;
1537	char *inbuf = NULL, *newinbuf = NULL;
1538	unsigned int len = 0;
1539	int i;
1540
1541	memset(&psn, 0, sizeof(psn));
1542	for (;;) {
1543		psn.psn_len = len;
1544		if (len) {
1545			newinbuf = realloc(inbuf, len);
1546			if (newinbuf == NULL)
1547				err(1, "realloc");
1548			psn.psn_buf = inbuf = newinbuf;
1549		}
1550		if (ioctl(dev, DIOCGETSRCNODES, &psn) < 0) {
1551			warn("DIOCGETSRCNODES");
1552			free(inbuf);
1553			return (-1);
1554		}
1555		if (psn.psn_len + sizeof(struct pfioc_src_nodes) < len)
1556			break;
1557		if (len == 0 && psn.psn_len == 0)
1558			goto done;
1559		if (len == 0 && psn.psn_len != 0)
1560			len = psn.psn_len;
1561		if (psn.psn_len == 0)
1562			goto done;	/* no src_nodes */
1563		len *= 2;
1564	}
1565	p = psn.psn_src_nodes;
1566	if (psn.psn_len > 0 && (opts & PF_OPT_SHOWALL))
1567		pfctl_print_title("SOURCE TRACKING NODES:");
1568	for (i = 0; i < psn.psn_len; i += sizeof(*p)) {
1569		print_src_node(p, opts);
1570		p++;
1571	}
1572done:
1573	free(inbuf);
1574	return (0);
1575}
1576
1577struct pfctl_show_state_arg {
1578	int opts;
1579	int dotitle;
1580	const char *iface;
1581};
1582
1583static int
1584pfctl_show_state(struct pfctl_state *s, void *arg)
1585{
1586	struct pfctl_show_state_arg *a = (struct pfctl_show_state_arg *)arg;
1587
1588	if (a->dotitle) {
1589		pfctl_print_title("STATES:");
1590		a->dotitle = 0;
1591	}
1592	print_state(s, a->opts);
1593
1594	return (0);
1595}
1596
1597int
1598pfctl_show_states(int dev, const char *iface, int opts)
1599{
1600	struct pfctl_show_state_arg arg;
1601	struct pfctl_state_filter filter = {};
1602
1603	if (iface != NULL)
1604		strncpy(filter.ifname, iface, IFNAMSIZ);
1605
1606	arg.opts = opts;
1607	arg.dotitle = opts & PF_OPT_SHOWALL;
1608	arg.iface = iface;
1609
1610	if (pfctl_get_filtered_states_iter(&filter, pfctl_show_state, &arg))
1611		return (-1);
1612
1613	return (0);
1614}
1615
1616int
1617pfctl_show_status(int dev, int opts)
1618{
1619	struct pfctl_status	*status;
1620	struct pfctl_syncookies	cookies;
1621
1622	if ((status = pfctl_get_status_h(pfh)) == NULL) {
1623		warn("DIOCGETSTATUS");
1624		return (-1);
1625	}
1626	if (pfctl_get_syncookies(dev, &cookies)) {
1627		pfctl_free_status(status);
1628		warn("DIOCGETSYNCOOKIES");
1629		return (-1);
1630	}
1631	if (opts & PF_OPT_SHOWALL)
1632		pfctl_print_title("INFO:");
1633	print_status(status, &cookies, opts);
1634	pfctl_free_status(status);
1635	return (0);
1636}
1637
1638int
1639pfctl_show_running(int dev)
1640{
1641	struct pfctl_status *status;
1642	int running;
1643
1644	if ((status = pfctl_get_status_h(pfh)) == NULL) {
1645		warn("DIOCGETSTATUS");
1646		return (-1);
1647	}
1648
1649	running = status->running;
1650
1651	print_running(status);
1652	pfctl_free_status(status);
1653	return (!running);
1654}
1655
1656int
1657pfctl_show_timeouts(int dev, int opts)
1658{
1659	struct pfioc_tm pt;
1660	int i;
1661
1662	if (opts & PF_OPT_SHOWALL)
1663		pfctl_print_title("TIMEOUTS:");
1664	memset(&pt, 0, sizeof(pt));
1665	for (i = 0; pf_timeouts[i].name; i++) {
1666		pt.timeout = pf_timeouts[i].timeout;
1667		if (ioctl(dev, DIOCGETTIMEOUT, &pt))
1668			err(1, "DIOCGETTIMEOUT");
1669		printf("%-20s %10d", pf_timeouts[i].name, pt.seconds);
1670		if (pf_timeouts[i].timeout >= PFTM_ADAPTIVE_START &&
1671		    pf_timeouts[i].timeout <= PFTM_ADAPTIVE_END)
1672			printf(" states");
1673		else
1674			printf("s");
1675		printf("\n");
1676	}
1677	return (0);
1678
1679}
1680
1681int
1682pfctl_show_limits(int dev, int opts)
1683{
1684	struct pfioc_limit pl;
1685	int i;
1686
1687	if (opts & PF_OPT_SHOWALL)
1688		pfctl_print_title("LIMITS:");
1689	memset(&pl, 0, sizeof(pl));
1690	for (i = 0; pf_limits[i].name; i++) {
1691		pl.index = pf_limits[i].index;
1692		if (ioctl(dev, DIOCGETLIMIT, &pl))
1693			err(1, "DIOCGETLIMIT");
1694		printf("%-13s ", pf_limits[i].name);
1695		if (pl.limit == UINT_MAX)
1696			printf("unlimited\n");
1697		else
1698			printf("hard limit %8u\n", pl.limit);
1699	}
1700	return (0);
1701}
1702
1703void
1704pfctl_show_creators(int opts)
1705{
1706	int ret;
1707	uint32_t creators[16];
1708	size_t count = nitems(creators);
1709
1710	ret = pfctl_get_creatorids(pfh, creators, &count);
1711	if (ret != 0)
1712		errx(ret, "Failed to retrieve creators");
1713
1714	printf("Creator IDs:\n");
1715	for (size_t i = 0; i < count; i++)
1716		printf("%08x\n", creators[i]);
1717}
1718
1719/* callbacks for rule/nat/rdr/addr */
1720int
1721pfctl_add_pool(struct pfctl *pf, struct pfctl_pool *p, sa_family_t af)
1722{
1723	struct pf_pooladdr *pa;
1724
1725	if ((pf->opts & PF_OPT_NOACTION) == 0) {
1726		if (ioctl(pf->dev, DIOCBEGINADDRS, &pf->paddr))
1727			err(1, "DIOCBEGINADDRS");
1728	}
1729
1730	pf->paddr.af = af;
1731	TAILQ_FOREACH(pa, &p->list, entries) {
1732		memcpy(&pf->paddr.addr, pa, sizeof(struct pf_pooladdr));
1733		if ((pf->opts & PF_OPT_NOACTION) == 0) {
1734			if (ioctl(pf->dev, DIOCADDADDR, &pf->paddr))
1735				err(1, "DIOCADDADDR");
1736		}
1737	}
1738	return (0);
1739}
1740
1741int
1742pfctl_append_rule(struct pfctl *pf, struct pfctl_rule *r,
1743    const char *anchor_call)
1744{
1745	u_int8_t		rs_num;
1746	struct pfctl_rule	*rule;
1747	struct pfctl_ruleset	*rs;
1748	char 			*p;
1749
1750	rs_num = pf_get_ruleset_number(r->action);
1751	if (rs_num == PF_RULESET_MAX)
1752		errx(1, "Invalid rule type %d", r->action);
1753
1754	rs = &pf->anchor->ruleset;
1755
1756	if (anchor_call[0] && r->anchor == NULL) {
1757		/*
1758		 * Don't make non-brace anchors part of the main anchor pool.
1759		 */
1760		if ((r->anchor = calloc(1, sizeof(*r->anchor))) == NULL)
1761			err(1, "pfctl_append_rule: calloc");
1762
1763		pf_init_ruleset(&r->anchor->ruleset);
1764		r->anchor->ruleset.anchor = r->anchor;
1765		if (strlcpy(r->anchor->path, anchor_call,
1766		    sizeof(rule->anchor->path)) >= sizeof(rule->anchor->path))
1767			errx(1, "pfctl_append_rule: strlcpy");
1768		if ((p = strrchr(anchor_call, '/')) != NULL) {
1769			if (!strlen(p))
1770				err(1, "pfctl_append_rule: bad anchor name %s",
1771				    anchor_call);
1772		} else
1773			p = (char *)anchor_call;
1774		if (strlcpy(r->anchor->name, p,
1775		    sizeof(rule->anchor->name)) >= sizeof(rule->anchor->name))
1776			errx(1, "pfctl_append_rule: strlcpy");
1777	}
1778
1779	if ((rule = calloc(1, sizeof(*rule))) == NULL)
1780		err(1, "calloc");
1781	bcopy(r, rule, sizeof(*rule));
1782	TAILQ_INIT(&rule->rpool.list);
1783	pfctl_move_pool(&r->rpool, &rule->rpool);
1784
1785	TAILQ_INSERT_TAIL(rs->rules[rs_num].active.ptr, rule, entries);
1786	return (0);
1787}
1788
1789int
1790pfctl_append_eth_rule(struct pfctl *pf, struct pfctl_eth_rule *r,
1791    const char *anchor_call)
1792{
1793	struct pfctl_eth_rule		*rule;
1794	struct pfctl_eth_ruleset	*rs;
1795	char 				*p;
1796
1797	rs = &pf->eanchor->ruleset;
1798
1799	if (anchor_call[0] && r->anchor == NULL) {
1800		/*
1801		 * Don't make non-brace anchors part of the main anchor pool.
1802		 */
1803		if ((r->anchor = calloc(1, sizeof(*r->anchor))) == NULL)
1804			err(1, "pfctl_append_rule: calloc");
1805
1806		pf_init_eth_ruleset(&r->anchor->ruleset);
1807		r->anchor->ruleset.anchor = r->anchor;
1808		if (strlcpy(r->anchor->path, anchor_call,
1809		    sizeof(rule->anchor->path)) >= sizeof(rule->anchor->path))
1810			errx(1, "pfctl_append_rule: strlcpy");
1811		if ((p = strrchr(anchor_call, '/')) != NULL) {
1812			if (!strlen(p))
1813				err(1, "pfctl_append_eth_rule: bad anchor name %s",
1814				    anchor_call);
1815		} else
1816			p = (char *)anchor_call;
1817		if (strlcpy(r->anchor->name, p,
1818		    sizeof(rule->anchor->name)) >= sizeof(rule->anchor->name))
1819			errx(1, "pfctl_append_eth_rule: strlcpy");
1820	}
1821
1822	if ((rule = calloc(1, sizeof(*rule))) == NULL)
1823		err(1, "calloc");
1824	bcopy(r, rule, sizeof(*rule));
1825
1826	TAILQ_INSERT_TAIL(&rs->rules, rule, entries);
1827	return (0);
1828}
1829
1830int
1831pfctl_eth_ruleset_trans(struct pfctl *pf, char *path,
1832    struct pfctl_eth_anchor *a)
1833{
1834	int osize = pf->trans->pfrb_size;
1835
1836	if ((pf->loadopt & PFCTL_FLAG_ETH) != 0) {
1837		if (pfctl_add_trans(pf->trans, PF_RULESET_ETH, path))
1838			return (1);
1839	}
1840	if (pfctl_trans(pf->dev, pf->trans, DIOCXBEGIN, osize))
1841		return (5);
1842
1843	return (0);
1844}
1845
1846int
1847pfctl_ruleset_trans(struct pfctl *pf, char *path, struct pfctl_anchor *a, bool do_eth)
1848{
1849	int osize = pf->trans->pfrb_size;
1850
1851	if ((pf->loadopt & PFCTL_FLAG_ETH) != 0 && do_eth) {
1852		if (pfctl_add_trans(pf->trans, PF_RULESET_ETH, path))
1853			return (1);
1854	}
1855	if ((pf->loadopt & PFCTL_FLAG_NAT) != 0) {
1856		if (pfctl_add_trans(pf->trans, PF_RULESET_NAT, path) ||
1857		    pfctl_add_trans(pf->trans, PF_RULESET_BINAT, path) ||
1858		    pfctl_add_trans(pf->trans, PF_RULESET_RDR, path))
1859			return (1);
1860	}
1861	if (a == pf->astack[0] && ((altqsupport &&
1862	    (pf->loadopt & PFCTL_FLAG_ALTQ) != 0))) {
1863		if (pfctl_add_trans(pf->trans, PF_RULESET_ALTQ, path))
1864			return (2);
1865	}
1866	if ((pf->loadopt & PFCTL_FLAG_FILTER) != 0) {
1867		if (pfctl_add_trans(pf->trans, PF_RULESET_SCRUB, path) ||
1868		    pfctl_add_trans(pf->trans, PF_RULESET_FILTER, path))
1869			return (3);
1870	}
1871	if (pf->loadopt & PFCTL_FLAG_TABLE)
1872		if (pfctl_add_trans(pf->trans, PF_RULESET_TABLE, path))
1873			return (4);
1874	if (pfctl_trans(pf->dev, pf->trans, DIOCXBEGIN, osize))
1875		return (5);
1876
1877	return (0);
1878}
1879
1880int
1881pfctl_load_eth_ruleset(struct pfctl *pf, char *path,
1882    struct pfctl_eth_ruleset *rs, int depth)
1883{
1884	struct pfctl_eth_rule	*r;
1885	int	error, len = strlen(path);
1886	int	brace = 0;
1887
1888	pf->eanchor = rs->anchor;
1889	if (path[0])
1890		snprintf(&path[len], MAXPATHLEN - len, "/%s", pf->eanchor->name);
1891	else
1892		snprintf(&path[len], MAXPATHLEN - len, "%s", pf->eanchor->name);
1893
1894	if (depth) {
1895		if (TAILQ_FIRST(&rs->rules) != NULL) {
1896			brace++;
1897			if (pf->opts & PF_OPT_VERBOSE)
1898				printf(" {\n");
1899			if ((pf->opts & PF_OPT_NOACTION) == 0 &&
1900			    (error = pfctl_eth_ruleset_trans(pf,
1901			    path, rs->anchor))) {
1902				printf("pfctl_load_eth_rulesets: "
1903				    "pfctl_eth_ruleset_trans %d\n", error);
1904				goto error;
1905			}
1906		} else if (pf->opts & PF_OPT_VERBOSE)
1907			printf("\n");
1908	}
1909
1910	while ((r = TAILQ_FIRST(&rs->rules)) != NULL) {
1911		TAILQ_REMOVE(&rs->rules, r, entries);
1912
1913		error = pfctl_load_eth_rule(pf, path, r, depth);
1914		if (error)
1915			return (error);
1916
1917		if (r->anchor) {
1918			if ((error = pfctl_load_eth_ruleset(pf, path,
1919			    &r->anchor->ruleset, depth + 1)))
1920				return (error);
1921		} else if (pf->opts & PF_OPT_VERBOSE)
1922			printf("\n");
1923		free(r);
1924	}
1925	if (brace && pf->opts & PF_OPT_VERBOSE) {
1926		INDENT(depth - 1, (pf->opts & PF_OPT_VERBOSE));
1927		printf("}\n");
1928	}
1929	path[len] = '\0';
1930
1931	return (0);
1932error:
1933	path[len] = '\0';
1934	return (error);
1935}
1936
1937int
1938pfctl_load_eth_rule(struct pfctl *pf, char *path, struct pfctl_eth_rule *r,
1939    int depth)
1940{
1941	char			*name;
1942	char			anchor[PF_ANCHOR_NAME_SIZE];
1943	int			len = strlen(path);
1944
1945	if (strlcpy(anchor, path, sizeof(anchor)) >= sizeof(anchor))
1946		errx(1, "pfctl_load_eth_rule: strlcpy");
1947
1948	if (r->anchor) {
1949		if (r->anchor->match) {
1950			if (path[0])
1951				snprintf(&path[len], MAXPATHLEN - len,
1952				    "/%s", r->anchor->name);
1953			else
1954				snprintf(&path[len], MAXPATHLEN - len,
1955				    "%s", r->anchor->name);
1956			name = r->anchor->name;
1957		} else
1958			name = r->anchor->path;
1959	} else
1960		name = "";
1961
1962	if ((pf->opts & PF_OPT_NOACTION) == 0)
1963		if (pfctl_add_eth_rule(pf->dev, r, anchor, name,
1964		    pf->eth_ticket))
1965			err(1, "DIOCADDETHRULENV");
1966
1967	if (pf->opts & PF_OPT_VERBOSE) {
1968		INDENT(depth, !(pf->opts & PF_OPT_VERBOSE2));
1969		print_eth_rule(r, r->anchor ? r->anchor->name : "",
1970		    pf->opts & (PF_OPT_VERBOSE2 | PF_OPT_DEBUG));
1971	}
1972
1973	path[len] = '\0';
1974
1975	return (0);
1976}
1977
1978int
1979pfctl_load_ruleset(struct pfctl *pf, char *path, struct pfctl_ruleset *rs,
1980    int rs_num, int depth)
1981{
1982	struct pfctl_rule *r;
1983	int		error, len = strlen(path);
1984	int		brace = 0;
1985
1986	pf->anchor = rs->anchor;
1987
1988	if (path[0])
1989		snprintf(&path[len], MAXPATHLEN - len, "/%s", pf->anchor->name);
1990	else
1991		snprintf(&path[len], MAXPATHLEN - len, "%s", pf->anchor->name);
1992
1993	if (depth) {
1994		if (TAILQ_FIRST(rs->rules[rs_num].active.ptr) != NULL) {
1995			brace++;
1996			if (pf->opts & PF_OPT_VERBOSE)
1997				printf(" {\n");
1998			if ((pf->opts & PF_OPT_NOACTION) == 0 &&
1999			    (error = pfctl_ruleset_trans(pf,
2000			    path, rs->anchor, false))) {
2001				printf("pfctl_load_rulesets: "
2002				    "pfctl_ruleset_trans %d\n", error);
2003				goto error;
2004			}
2005		} else if (pf->opts & PF_OPT_VERBOSE)
2006			printf("\n");
2007
2008	}
2009
2010	if (pf->optimize && rs_num == PF_RULESET_FILTER)
2011		pfctl_optimize_ruleset(pf, rs);
2012
2013	while ((r = TAILQ_FIRST(rs->rules[rs_num].active.ptr)) != NULL) {
2014		TAILQ_REMOVE(rs->rules[rs_num].active.ptr, r, entries);
2015
2016		for (int i = 0; i < PF_RULE_MAX_LABEL_COUNT; i++)
2017			expand_label(r->label[i], PF_RULE_LABEL_SIZE, r);
2018		expand_label(r->tagname, PF_TAG_NAME_SIZE, r);
2019		expand_label(r->match_tagname, PF_TAG_NAME_SIZE, r);
2020
2021		if ((error = pfctl_load_rule(pf, path, r, depth)))
2022			goto error;
2023		if (r->anchor) {
2024			if ((error = pfctl_load_ruleset(pf, path,
2025			    &r->anchor->ruleset, rs_num, depth + 1)))
2026				goto error;
2027		} else if (pf->opts & PF_OPT_VERBOSE)
2028			printf("\n");
2029		free(r);
2030	}
2031	if (brace && pf->opts & PF_OPT_VERBOSE) {
2032		INDENT(depth - 1, (pf->opts & PF_OPT_VERBOSE));
2033		printf("}\n");
2034	}
2035	path[len] = '\0';
2036	return (0);
2037
2038 error:
2039	path[len] = '\0';
2040	return (error);
2041
2042}
2043
2044int
2045pfctl_load_rule(struct pfctl *pf, char *path, struct pfctl_rule *r, int depth)
2046{
2047	u_int8_t		rs_num = pf_get_ruleset_number(r->action);
2048	char			*name;
2049	u_int32_t		ticket;
2050	char			anchor[PF_ANCHOR_NAME_SIZE];
2051	int			len = strlen(path);
2052	int			error;
2053	bool			was_present;
2054
2055	/* set up anchor before adding to path for anchor_call */
2056	if ((pf->opts & PF_OPT_NOACTION) == 0)
2057		ticket = pfctl_get_ticket(pf->trans, rs_num, path);
2058	if (strlcpy(anchor, path, sizeof(anchor)) >= sizeof(anchor))
2059		errx(1, "pfctl_load_rule: strlcpy");
2060
2061	if (r->anchor) {
2062		if (r->anchor->match) {
2063			if (path[0])
2064				snprintf(&path[len], MAXPATHLEN - len,
2065				    "/%s", r->anchor->name);
2066			else
2067				snprintf(&path[len], MAXPATHLEN - len,
2068				    "%s", r->anchor->name);
2069			name = r->anchor->name;
2070		} else
2071			name = r->anchor->path;
2072	} else
2073		name = "";
2074
2075	was_present = false;
2076	if ((pf->opts & PF_OPT_NOACTION) == 0) {
2077		if (pfctl_add_pool(pf, &r->rpool, r->af))
2078			return (1);
2079		error = pfctl_add_rule_h(pf->h, r, anchor, name, ticket,
2080		    pf->paddr.ticket);
2081		switch (error) {
2082		case 0:
2083			/* things worked, do nothing */
2084			break;
2085		case EEXIST:
2086			/* an identical rule is already present */
2087			was_present = true;
2088			break;
2089		default:
2090			err(1, "DIOCADDRULENV");
2091		}
2092	}
2093
2094	if (pf->opts & PF_OPT_VERBOSE) {
2095		INDENT(depth, !(pf->opts & PF_OPT_VERBOSE2));
2096		print_rule(r, name,
2097		    pf->opts & PF_OPT_VERBOSE2,
2098		    pf->opts & PF_OPT_NUMERIC);
2099		if (was_present)
2100			printf(" -- rule was already present");
2101	}
2102	path[len] = '\0';
2103	pfctl_clear_pool(&r->rpool);
2104	return (0);
2105}
2106
2107int
2108pfctl_add_altq(struct pfctl *pf, struct pf_altq *a)
2109{
2110	if (altqsupport &&
2111	    (loadopt & PFCTL_FLAG_ALTQ) != 0) {
2112		memcpy(&pf->paltq->altq, a, sizeof(struct pf_altq));
2113		if ((pf->opts & PF_OPT_NOACTION) == 0) {
2114			if (ioctl(pf->dev, DIOCADDALTQ, pf->paltq)) {
2115				if (errno == ENXIO)
2116					errx(1, "qtype not configured");
2117				else if (errno == ENODEV)
2118					errx(1, "%s: driver does not support "
2119					    "altq", a->ifname);
2120				else
2121					err(1, "DIOCADDALTQ");
2122			}
2123		}
2124		pfaltq_store(&pf->paltq->altq);
2125	}
2126	return (0);
2127}
2128
2129int
2130pfctl_rules(int dev, char *filename, int opts, int optimize,
2131    char *anchorname, struct pfr_buffer *trans)
2132{
2133#define ERR(x) do { warn(x); goto _error; } while(0)
2134#define ERRX(x) do { warnx(x); goto _error; } while(0)
2135
2136	struct pfr_buffer	*t, buf;
2137	struct pfioc_altq	 pa;
2138	struct pfctl		 pf;
2139	struct pfctl_ruleset	*rs;
2140	struct pfctl_eth_ruleset	*ethrs;
2141	struct pfr_table	 trs;
2142	char			*path;
2143	int			 osize;
2144
2145	RB_INIT(&pf_anchors);
2146	memset(&pf_main_anchor, 0, sizeof(pf_main_anchor));
2147	pf_init_ruleset(&pf_main_anchor.ruleset);
2148	pf_main_anchor.ruleset.anchor = &pf_main_anchor;
2149
2150	memset(&pf_eth_main_anchor, 0, sizeof(pf_eth_main_anchor));
2151	pf_init_eth_ruleset(&pf_eth_main_anchor.ruleset);
2152	pf_eth_main_anchor.ruleset.anchor = &pf_eth_main_anchor;
2153
2154	if (trans == NULL) {
2155		bzero(&buf, sizeof(buf));
2156		buf.pfrb_type = PFRB_TRANS;
2157		t = &buf;
2158		osize = 0;
2159	} else {
2160		t = trans;
2161		osize = t->pfrb_size;
2162	}
2163
2164	memset(&pa, 0, sizeof(pa));
2165	pa.version = PFIOC_ALTQ_VERSION;
2166	memset(&pf, 0, sizeof(pf));
2167	memset(&trs, 0, sizeof(trs));
2168	if ((path = calloc(1, MAXPATHLEN)) == NULL)
2169		ERRX("pfctl_rules: calloc");
2170	if (strlcpy(trs.pfrt_anchor, anchorname,
2171	    sizeof(trs.pfrt_anchor)) >= sizeof(trs.pfrt_anchor))
2172		ERRX("pfctl_rules: strlcpy");
2173	pf.dev = dev;
2174	pf.h = pfh;
2175	pf.opts = opts;
2176	pf.optimize = optimize;
2177	pf.loadopt = loadopt;
2178
2179	/* non-brace anchor, create without resolving the path */
2180	if ((pf.anchor = calloc(1, sizeof(*pf.anchor))) == NULL)
2181		ERRX("pfctl_rules: calloc");
2182	rs = &pf.anchor->ruleset;
2183	pf_init_ruleset(rs);
2184	rs->anchor = pf.anchor;
2185	if (strlcpy(pf.anchor->path, anchorname,
2186	    sizeof(pf.anchor->path)) >= sizeof(pf.anchor->path))
2187		errx(1, "pfctl_rules: strlcpy");
2188	if (strlcpy(pf.anchor->name, anchorname,
2189	    sizeof(pf.anchor->name)) >= sizeof(pf.anchor->name))
2190		errx(1, "pfctl_rules: strlcpy");
2191
2192
2193	pf.astack[0] = pf.anchor;
2194	pf.asd = 0;
2195	if (anchorname[0])
2196		pf.loadopt &= ~PFCTL_FLAG_ALTQ;
2197	pf.paltq = &pa;
2198	pf.trans = t;
2199	pfctl_init_options(&pf);
2200
2201	/* Set up ethernet anchor */
2202	if ((pf.eanchor = calloc(1, sizeof(*pf.eanchor))) == NULL)
2203		ERRX("pfctl_rules: calloc");
2204
2205	if (strlcpy(pf.eanchor->path, anchorname,
2206	    sizeof(pf.eanchor->path)) >= sizeof(pf.eanchor->path))
2207		errx(1, "pfctl_rules: strlcpy");
2208	if (strlcpy(pf.eanchor->name, anchorname,
2209	    sizeof(pf.eanchor->name)) >= sizeof(pf.eanchor->name))
2210		errx(1, "pfctl_rules: strlcpy");
2211
2212	ethrs = &pf.eanchor->ruleset;
2213	pf_init_eth_ruleset(ethrs);
2214	ethrs->anchor = pf.eanchor;
2215	pf.eastack[0] = pf.eanchor;
2216
2217	if ((opts & PF_OPT_NOACTION) == 0) {
2218		/*
2219		 * XXX For the time being we need to open transactions for
2220		 * the main ruleset before parsing, because tables are still
2221		 * loaded at parse time.
2222		 */
2223		if (pfctl_ruleset_trans(&pf, anchorname, pf.anchor, true))
2224			ERRX("pfctl_rules");
2225		if (pf.loadopt & PFCTL_FLAG_ETH)
2226			pf.eth_ticket = pfctl_get_ticket(t, PF_RULESET_ETH, anchorname);
2227		if (altqsupport && (pf.loadopt & PFCTL_FLAG_ALTQ))
2228			pa.ticket =
2229			    pfctl_get_ticket(t, PF_RULESET_ALTQ, anchorname);
2230		if (pf.loadopt & PFCTL_FLAG_TABLE)
2231			pf.astack[0]->ruleset.tticket =
2232			    pfctl_get_ticket(t, PF_RULESET_TABLE, anchorname);
2233	}
2234
2235	if (parse_config(filename, &pf) < 0) {
2236		if ((opts & PF_OPT_NOACTION) == 0)
2237			ERRX("Syntax error in config file: "
2238			    "pf rules not loaded");
2239		else
2240			goto _error;
2241	}
2242	if (loadopt & PFCTL_FLAG_OPTION)
2243		pfctl_adjust_skip_ifaces(&pf);
2244
2245	if ((pf.loadopt & PFCTL_FLAG_FILTER &&
2246	    (pfctl_load_ruleset(&pf, path, rs, PF_RULESET_SCRUB, 0))) ||
2247	    (pf.loadopt & PFCTL_FLAG_ETH &&
2248	    (pfctl_load_eth_ruleset(&pf, path, ethrs, 0))) ||
2249	    (pf.loadopt & PFCTL_FLAG_NAT &&
2250	    (pfctl_load_ruleset(&pf, path, rs, PF_RULESET_NAT, 0) ||
2251	    pfctl_load_ruleset(&pf, path, rs, PF_RULESET_RDR, 0) ||
2252	    pfctl_load_ruleset(&pf, path, rs, PF_RULESET_BINAT, 0))) ||
2253	    (pf.loadopt & PFCTL_FLAG_FILTER &&
2254	    pfctl_load_ruleset(&pf, path, rs, PF_RULESET_FILTER, 0))) {
2255		if ((opts & PF_OPT_NOACTION) == 0)
2256			ERRX("Unable to load rules into kernel");
2257		else
2258			goto _error;
2259	}
2260
2261	if ((altqsupport && (pf.loadopt & PFCTL_FLAG_ALTQ) != 0))
2262		if (check_commit_altq(dev, opts) != 0)
2263			ERRX("errors in altq config");
2264
2265	/* process "load anchor" directives */
2266	if (!anchorname[0])
2267		if (pfctl_load_anchors(dev, &pf, t) == -1)
2268			ERRX("load anchors");
2269
2270	if (trans == NULL && (opts & PF_OPT_NOACTION) == 0) {
2271		if (!anchorname[0])
2272			if (pfctl_load_options(&pf))
2273				goto _error;
2274		if (pfctl_trans(dev, t, DIOCXCOMMIT, osize))
2275			ERR("DIOCXCOMMIT");
2276	}
2277	free(path);
2278	return (0);
2279
2280_error:
2281	if (trans == NULL) {	/* main ruleset */
2282		if ((opts & PF_OPT_NOACTION) == 0)
2283			if (pfctl_trans(dev, t, DIOCXROLLBACK, osize))
2284				err(1, "DIOCXROLLBACK");
2285		exit(1);
2286	} else {		/* sub ruleset */
2287		free(path);
2288		return (-1);
2289	}
2290
2291#undef ERR
2292#undef ERRX
2293}
2294
2295FILE *
2296pfctl_fopen(const char *name, const char *mode)
2297{
2298	struct stat	 st;
2299	FILE		*fp;
2300
2301	fp = fopen(name, mode);
2302	if (fp == NULL)
2303		return (NULL);
2304	if (fstat(fileno(fp), &st)) {
2305		fclose(fp);
2306		return (NULL);
2307	}
2308	if (S_ISDIR(st.st_mode)) {
2309		fclose(fp);
2310		errno = EISDIR;
2311		return (NULL);
2312	}
2313	return (fp);
2314}
2315
2316void
2317pfctl_init_options(struct pfctl *pf)
2318{
2319
2320	pf->timeout[PFTM_TCP_FIRST_PACKET] = PFTM_TCP_FIRST_PACKET_VAL;
2321	pf->timeout[PFTM_TCP_OPENING] = PFTM_TCP_OPENING_VAL;
2322	pf->timeout[PFTM_TCP_ESTABLISHED] = PFTM_TCP_ESTABLISHED_VAL;
2323	pf->timeout[PFTM_TCP_CLOSING] = PFTM_TCP_CLOSING_VAL;
2324	pf->timeout[PFTM_TCP_FIN_WAIT] = PFTM_TCP_FIN_WAIT_VAL;
2325	pf->timeout[PFTM_TCP_CLOSED] = PFTM_TCP_CLOSED_VAL;
2326	pf->timeout[PFTM_SCTP_FIRST_PACKET] = PFTM_TCP_FIRST_PACKET_VAL;
2327	pf->timeout[PFTM_SCTP_OPENING] = PFTM_TCP_OPENING_VAL;
2328	pf->timeout[PFTM_SCTP_ESTABLISHED] = PFTM_TCP_ESTABLISHED_VAL;
2329	pf->timeout[PFTM_SCTP_CLOSING] = PFTM_TCP_CLOSING_VAL;
2330	pf->timeout[PFTM_SCTP_CLOSED] = PFTM_TCP_CLOSED_VAL;
2331	pf->timeout[PFTM_UDP_FIRST_PACKET] = PFTM_UDP_FIRST_PACKET_VAL;
2332	pf->timeout[PFTM_UDP_SINGLE] = PFTM_UDP_SINGLE_VAL;
2333	pf->timeout[PFTM_UDP_MULTIPLE] = PFTM_UDP_MULTIPLE_VAL;
2334	pf->timeout[PFTM_ICMP_FIRST_PACKET] = PFTM_ICMP_FIRST_PACKET_VAL;
2335	pf->timeout[PFTM_ICMP_ERROR_REPLY] = PFTM_ICMP_ERROR_REPLY_VAL;
2336	pf->timeout[PFTM_OTHER_FIRST_PACKET] = PFTM_OTHER_FIRST_PACKET_VAL;
2337	pf->timeout[PFTM_OTHER_SINGLE] = PFTM_OTHER_SINGLE_VAL;
2338	pf->timeout[PFTM_OTHER_MULTIPLE] = PFTM_OTHER_MULTIPLE_VAL;
2339	pf->timeout[PFTM_FRAG] = PFTM_FRAG_VAL;
2340	pf->timeout[PFTM_INTERVAL] = PFTM_INTERVAL_VAL;
2341	pf->timeout[PFTM_SRC_NODE] = PFTM_SRC_NODE_VAL;
2342	pf->timeout[PFTM_TS_DIFF] = PFTM_TS_DIFF_VAL;
2343	pf->timeout[PFTM_ADAPTIVE_START] = PFSTATE_ADAPT_START;
2344	pf->timeout[PFTM_ADAPTIVE_END] = PFSTATE_ADAPT_END;
2345
2346	pf->limit[PF_LIMIT_STATES] = PFSTATE_HIWAT;
2347	pf->limit[PF_LIMIT_FRAGS] = PFFRAG_FRENT_HIWAT;
2348	pf->limit[PF_LIMIT_SRC_NODES] = PFSNODE_HIWAT;
2349	pf->limit[PF_LIMIT_TABLE_ENTRIES] = PFR_KENTRY_HIWAT;
2350
2351	pf->debug = PF_DEBUG_URGENT;
2352	pf->reassemble = 0;
2353
2354	pf->syncookies = false;
2355	pf->syncookieswat[0] = PF_SYNCOOKIES_LOWATPCT;
2356	pf->syncookieswat[1] = PF_SYNCOOKIES_HIWATPCT;
2357}
2358
2359int
2360pfctl_load_options(struct pfctl *pf)
2361{
2362	int i, error = 0;
2363
2364	if ((loadopt & PFCTL_FLAG_OPTION) == 0)
2365		return (0);
2366
2367	/* load limits */
2368	for (i = 0; i < PF_LIMIT_MAX; i++) {
2369		if ((pf->opts & PF_OPT_MERGE) && !pf->limit_set[i])
2370			continue;
2371		if (pfctl_load_limit(pf, i, pf->limit[i]))
2372			error = 1;
2373	}
2374
2375	/*
2376	 * If we've set the limit, but haven't explicitly set adaptive
2377	 * timeouts, do it now with a start of 60% and end of 120%.
2378	 */
2379	if (pf->limit_set[PF_LIMIT_STATES] &&
2380	    !pf->timeout_set[PFTM_ADAPTIVE_START] &&
2381	    !pf->timeout_set[PFTM_ADAPTIVE_END]) {
2382		pf->timeout[PFTM_ADAPTIVE_START] =
2383			(pf->limit[PF_LIMIT_STATES] / 10) * 6;
2384		pf->timeout_set[PFTM_ADAPTIVE_START] = 1;
2385		pf->timeout[PFTM_ADAPTIVE_END] =
2386			(pf->limit[PF_LIMIT_STATES] / 10) * 12;
2387		pf->timeout_set[PFTM_ADAPTIVE_END] = 1;
2388	}
2389
2390	/* load timeouts */
2391	for (i = 0; i < PFTM_MAX; i++) {
2392		if ((pf->opts & PF_OPT_MERGE) && !pf->timeout_set[i])
2393			continue;
2394		if (pfctl_load_timeout(pf, i, pf->timeout[i]))
2395			error = 1;
2396	}
2397
2398	/* load debug */
2399	if (!(pf->opts & PF_OPT_MERGE) || pf->debug_set)
2400		if (pfctl_load_debug(pf, pf->debug))
2401			error = 1;
2402
2403	/* load logif */
2404	if (!(pf->opts & PF_OPT_MERGE) || pf->ifname_set)
2405		if (pfctl_load_logif(pf, pf->ifname))
2406			error = 1;
2407
2408	/* load hostid */
2409	if (!(pf->opts & PF_OPT_MERGE) || pf->hostid_set)
2410		if (pfctl_load_hostid(pf, pf->hostid))
2411			error = 1;
2412
2413	/* load reassembly settings */
2414	if (!(pf->opts & PF_OPT_MERGE) || pf->reass_set)
2415		if (pfctl_load_reassembly(pf, pf->reassemble))
2416			error = 1;
2417
2418	/* load keepcounters */
2419	if (pfctl_set_keepcounters(pf->dev, pf->keep_counters))
2420		error = 1;
2421
2422	/* load syncookies settings */
2423	if (pfctl_load_syncookies(pf, pf->syncookies))
2424		error = 1;
2425
2426	return (error);
2427}
2428
2429int
2430pfctl_set_limit(struct pfctl *pf, const char *opt, unsigned int limit)
2431{
2432	int i;
2433
2434
2435	for (i = 0; pf_limits[i].name; i++) {
2436		if (strcasecmp(opt, pf_limits[i].name) == 0) {
2437			pf->limit[pf_limits[i].index] = limit;
2438			pf->limit_set[pf_limits[i].index] = 1;
2439			break;
2440		}
2441	}
2442	if (pf_limits[i].name == NULL) {
2443		warnx("Bad pool name.");
2444		return (1);
2445	}
2446
2447	if (pf->opts & PF_OPT_VERBOSE)
2448		printf("set limit %s %d\n", opt, limit);
2449
2450	return (0);
2451}
2452
2453int
2454pfctl_load_limit(struct pfctl *pf, unsigned int index, unsigned int limit)
2455{
2456	struct pfioc_limit pl;
2457
2458	memset(&pl, 0, sizeof(pl));
2459	pl.index = index;
2460	pl.limit = limit;
2461	if (ioctl(pf->dev, DIOCSETLIMIT, &pl)) {
2462		if (errno == EBUSY)
2463			warnx("Current pool size exceeds requested hard limit");
2464		else
2465			warnx("DIOCSETLIMIT");
2466		return (1);
2467	}
2468	return (0);
2469}
2470
2471int
2472pfctl_set_timeout(struct pfctl *pf, const char *opt, int seconds, int quiet)
2473{
2474	int i;
2475
2476	if ((loadopt & PFCTL_FLAG_OPTION) == 0)
2477		return (0);
2478
2479	for (i = 0; pf_timeouts[i].name; i++) {
2480		if (strcasecmp(opt, pf_timeouts[i].name) == 0) {
2481			pf->timeout[pf_timeouts[i].timeout] = seconds;
2482			pf->timeout_set[pf_timeouts[i].timeout] = 1;
2483			break;
2484		}
2485	}
2486
2487	if (pf_timeouts[i].name == NULL) {
2488		warnx("Bad timeout name.");
2489		return (1);
2490	}
2491
2492
2493	if (pf->opts & PF_OPT_VERBOSE && ! quiet)
2494		printf("set timeout %s %d\n", opt, seconds);
2495
2496	return (0);
2497}
2498
2499int
2500pfctl_load_timeout(struct pfctl *pf, unsigned int timeout, unsigned int seconds)
2501{
2502	struct pfioc_tm pt;
2503
2504	memset(&pt, 0, sizeof(pt));
2505	pt.timeout = timeout;
2506	pt.seconds = seconds;
2507	if (ioctl(pf->dev, DIOCSETTIMEOUT, &pt)) {
2508		warnx("DIOCSETTIMEOUT");
2509		return (1);
2510	}
2511	return (0);
2512}
2513
2514int
2515pfctl_set_reassembly(struct pfctl *pf, int on, int nodf)
2516{
2517	if ((loadopt & PFCTL_FLAG_OPTION) == 0)
2518		return (0);
2519
2520	pf->reass_set = 1;
2521	if (on) {
2522		pf->reassemble = PF_REASS_ENABLED;
2523		if (nodf)
2524			pf->reassemble |= PF_REASS_NODF;
2525	} else {
2526		pf->reassemble = 0;
2527	}
2528
2529	if (pf->opts & PF_OPT_VERBOSE)
2530		printf("set reassemble %s %s\n", on ? "yes" : "no",
2531		    nodf ? "no-df" : "");
2532
2533	return (0);
2534}
2535
2536int
2537pfctl_set_optimization(struct pfctl *pf, const char *opt)
2538{
2539	const struct pf_hint *hint;
2540	int i, r;
2541
2542	if ((loadopt & PFCTL_FLAG_OPTION) == 0)
2543		return (0);
2544
2545	for (i = 0; pf_hints[i].name; i++)
2546		if (strcasecmp(opt, pf_hints[i].name) == 0)
2547			break;
2548
2549	hint = pf_hints[i].hint;
2550	if (hint == NULL) {
2551		warnx("invalid state timeouts optimization");
2552		return (1);
2553	}
2554
2555	for (i = 0; hint[i].name; i++)
2556		if ((r = pfctl_set_timeout(pf, hint[i].name,
2557		    hint[i].timeout, 1)))
2558			return (r);
2559
2560	if (pf->opts & PF_OPT_VERBOSE)
2561		printf("set optimization %s\n", opt);
2562
2563	return (0);
2564}
2565
2566int
2567pfctl_set_logif(struct pfctl *pf, char *ifname)
2568{
2569
2570	if ((loadopt & PFCTL_FLAG_OPTION) == 0)
2571		return (0);
2572
2573	if (!strcmp(ifname, "none")) {
2574		free(pf->ifname);
2575		pf->ifname = NULL;
2576	} else {
2577		pf->ifname = strdup(ifname);
2578		if (!pf->ifname)
2579			errx(1, "pfctl_set_logif: strdup");
2580	}
2581	pf->ifname_set = 1;
2582
2583	if (pf->opts & PF_OPT_VERBOSE)
2584		printf("set loginterface %s\n", ifname);
2585
2586	return (0);
2587}
2588
2589int
2590pfctl_load_logif(struct pfctl *pf, char *ifname)
2591{
2592	if (ifname != NULL && strlen(ifname) >= IFNAMSIZ) {
2593		warnx("pfctl_load_logif: strlcpy");
2594		return (1);
2595	}
2596	return (pfctl_set_statusif(pfh, ifname ? ifname : ""));
2597}
2598
2599int
2600pfctl_set_hostid(struct pfctl *pf, u_int32_t hostid)
2601{
2602	if ((loadopt & PFCTL_FLAG_OPTION) == 0)
2603		return (0);
2604
2605	HTONL(hostid);
2606
2607	pf->hostid = hostid;
2608	pf->hostid_set = 1;
2609
2610	if (pf->opts & PF_OPT_VERBOSE)
2611		printf("set hostid 0x%08x\n", ntohl(hostid));
2612
2613	return (0);
2614}
2615
2616int
2617pfctl_load_hostid(struct pfctl *pf, u_int32_t hostid)
2618{
2619	if (ioctl(dev, DIOCSETHOSTID, &hostid)) {
2620		warnx("DIOCSETHOSTID");
2621		return (1);
2622	}
2623	return (0);
2624}
2625
2626int
2627pfctl_load_reassembly(struct pfctl *pf, u_int32_t reassembly)
2628{
2629	if (ioctl(dev, DIOCSETREASS, &reassembly)) {
2630		warnx("DIOCSETREASS");
2631		return (1);
2632	}
2633	return (0);
2634}
2635
2636int
2637pfctl_load_syncookies(struct pfctl *pf, u_int8_t val)
2638{
2639	struct pfctl_syncookies	cookies;
2640
2641	bzero(&cookies, sizeof(cookies));
2642
2643	cookies.mode = val;
2644	cookies.lowwater = pf->syncookieswat[0];
2645	cookies.highwater = pf->syncookieswat[1];
2646
2647	if (pfctl_set_syncookies(dev, &cookies)) {
2648		warnx("DIOCSETSYNCOOKIES");
2649		return (1);
2650	}
2651	return (0);
2652}
2653
2654int
2655pfctl_cfg_syncookies(struct pfctl *pf, uint8_t val, struct pfctl_watermarks *w)
2656{
2657	if (val != PF_SYNCOOKIES_ADAPTIVE && w != NULL) {
2658		warnx("syncookies start/end only apply to adaptive");
2659		return (1);
2660	}
2661	if (val == PF_SYNCOOKIES_ADAPTIVE && w != NULL) {
2662		if (!w->hi)
2663			w->hi = PF_SYNCOOKIES_HIWATPCT;
2664		if (!w->lo)
2665			w->lo = w->hi / 2;
2666		if (w->lo >= w->hi) {
2667			warnx("start must be higher than end");
2668			return (1);
2669		}
2670		pf->syncookieswat[0] = w->lo;
2671		pf->syncookieswat[1] = w->hi;
2672		pf->syncookieswat_set = 1;
2673	}
2674
2675	if (pf->opts & PF_OPT_VERBOSE) {
2676		if (val == PF_SYNCOOKIES_NEVER)
2677			printf("set syncookies never\n");
2678		else if (val == PF_SYNCOOKIES_ALWAYS)
2679			printf("set syncookies always\n");
2680		else if (val == PF_SYNCOOKIES_ADAPTIVE) {
2681			if (pf->syncookieswat_set)
2682				printf("set syncookies adaptive (start %u%%, "
2683				    "end %u%%)\n", pf->syncookieswat[1],
2684				    pf->syncookieswat[0]);
2685			else
2686				printf("set syncookies adaptive\n");
2687		} else {        /* cannot happen */
2688			warnx("king bula ate all syncookies");
2689			return (1);
2690		}
2691	}
2692
2693	pf->syncookies = val;
2694	return (0);
2695}
2696
2697int
2698pfctl_set_debug(struct pfctl *pf, char *d)
2699{
2700	u_int32_t	level;
2701
2702	if ((loadopt & PFCTL_FLAG_OPTION) == 0)
2703		return (0);
2704
2705	if (!strcmp(d, "none"))
2706		pf->debug = PF_DEBUG_NONE;
2707	else if (!strcmp(d, "urgent"))
2708		pf->debug = PF_DEBUG_URGENT;
2709	else if (!strcmp(d, "misc"))
2710		pf->debug = PF_DEBUG_MISC;
2711	else if (!strcmp(d, "loud"))
2712		pf->debug = PF_DEBUG_NOISY;
2713	else {
2714		warnx("unknown debug level \"%s\"", d);
2715		return (-1);
2716	}
2717
2718	pf->debug_set = 1;
2719	level = pf->debug;
2720
2721	if ((pf->opts & PF_OPT_NOACTION) == 0)
2722		if (ioctl(dev, DIOCSETDEBUG, &level))
2723			err(1, "DIOCSETDEBUG");
2724
2725	if (pf->opts & PF_OPT_VERBOSE)
2726		printf("set debug %s\n", d);
2727
2728	return (0);
2729}
2730
2731int
2732pfctl_load_debug(struct pfctl *pf, unsigned int level)
2733{
2734	if (ioctl(pf->dev, DIOCSETDEBUG, &level)) {
2735		warnx("DIOCSETDEBUG");
2736		return (1);
2737	}
2738	return (0);
2739}
2740
2741int
2742pfctl_set_interface_flags(struct pfctl *pf, char *ifname, int flags, int how)
2743{
2744	struct pfioc_iface	pi;
2745	struct node_host	*h = NULL, *n = NULL;
2746
2747	if ((loadopt & PFCTL_FLAG_OPTION) == 0)
2748		return (0);
2749
2750	bzero(&pi, sizeof(pi));
2751
2752	pi.pfiio_flags = flags;
2753
2754	/* Make sure our cache matches the kernel. If we set or clear the flag
2755	 * for a group this applies to all members. */
2756	h = ifa_grouplookup(ifname, 0);
2757	for (n = h; n != NULL; n = n->next)
2758		pfctl_set_interface_flags(pf, n->ifname, flags, how);
2759
2760	if (strlcpy(pi.pfiio_name, ifname, sizeof(pi.pfiio_name)) >=
2761	    sizeof(pi.pfiio_name))
2762		errx(1, "pfctl_set_interface_flags: strlcpy");
2763
2764	if ((pf->opts & PF_OPT_NOACTION) == 0) {
2765		if (how == 0) {
2766			if (ioctl(pf->dev, DIOCCLRIFFLAG, &pi))
2767				err(1, "DIOCCLRIFFLAG");
2768		} else {
2769			if (ioctl(pf->dev, DIOCSETIFFLAG, &pi))
2770				err(1, "DIOCSETIFFLAG");
2771			pfctl_check_skip_ifaces(ifname);
2772		}
2773	}
2774	return (0);
2775}
2776
2777void
2778pfctl_debug(int dev, u_int32_t level, int opts)
2779{
2780	if (ioctl(dev, DIOCSETDEBUG, &level))
2781		err(1, "DIOCSETDEBUG");
2782	if ((opts & PF_OPT_QUIET) == 0) {
2783		fprintf(stderr, "debug level set to '");
2784		switch (level) {
2785		case PF_DEBUG_NONE:
2786			fprintf(stderr, "none");
2787			break;
2788		case PF_DEBUG_URGENT:
2789			fprintf(stderr, "urgent");
2790			break;
2791		case PF_DEBUG_MISC:
2792			fprintf(stderr, "misc");
2793			break;
2794		case PF_DEBUG_NOISY:
2795			fprintf(stderr, "loud");
2796			break;
2797		default:
2798			fprintf(stderr, "<invalid>");
2799			break;
2800		}
2801		fprintf(stderr, "'\n");
2802	}
2803}
2804
2805int
2806pfctl_test_altqsupport(int dev, int opts)
2807{
2808	struct pfioc_altq pa;
2809
2810	pa.version = PFIOC_ALTQ_VERSION;
2811	if (ioctl(dev, DIOCGETALTQS, &pa)) {
2812		if (errno == ENODEV) {
2813			if (opts & PF_OPT_VERBOSE)
2814				fprintf(stderr, "No ALTQ support in kernel\n"
2815				    "ALTQ related functions disabled\n");
2816			return (0);
2817		} else
2818			err(1, "DIOCGETALTQS");
2819	}
2820	return (1);
2821}
2822
2823int
2824pfctl_show_anchors(int dev, int opts, char *anchorname)
2825{
2826	struct pfioc_ruleset	 pr;
2827	u_int32_t		 mnr, nr;
2828
2829	memset(&pr, 0, sizeof(pr));
2830	memcpy(pr.path, anchorname, sizeof(pr.path));
2831	if (ioctl(dev, DIOCGETRULESETS, &pr)) {
2832		if (errno == EINVAL)
2833			fprintf(stderr, "Anchor '%s' not found.\n",
2834			    anchorname);
2835		else
2836			err(1, "DIOCGETRULESETS");
2837		return (-1);
2838	}
2839	mnr = pr.nr;
2840	for (nr = 0; nr < mnr; ++nr) {
2841		char sub[MAXPATHLEN];
2842
2843		pr.nr = nr;
2844		if (ioctl(dev, DIOCGETRULESET, &pr))
2845			err(1, "DIOCGETRULESET");
2846		if (!strcmp(pr.name, PF_RESERVED_ANCHOR))
2847			continue;
2848		sub[0] = 0;
2849		if (pr.path[0]) {
2850			strlcat(sub, pr.path, sizeof(sub));
2851			strlcat(sub, "/", sizeof(sub));
2852		}
2853		strlcat(sub, pr.name, sizeof(sub));
2854		if (sub[0] != '_' || (opts & PF_OPT_VERBOSE))
2855			printf("  %s\n", sub);
2856		if ((opts & PF_OPT_VERBOSE) && pfctl_show_anchors(dev, opts, sub))
2857			return (-1);
2858	}
2859	return (0);
2860}
2861
2862int
2863pfctl_show_eth_anchors(int dev, int opts, char *anchorname)
2864{
2865	struct pfctl_eth_rulesets_info ri;
2866	struct pfctl_eth_ruleset_info rs;
2867	int ret;
2868
2869	if ((ret = pfctl_get_eth_rulesets_info(dev, &ri, anchorname)) != 0) {
2870		if (ret == ENOENT)
2871			fprintf(stderr, "Anchor '%s' not found.\n",
2872			    anchorname);
2873		else
2874			err(1, "DIOCGETETHRULESETS");
2875		return (-1);
2876	}
2877
2878	for (int nr = 0; nr < ri.nr; nr++) {
2879		char sub[MAXPATHLEN];
2880
2881		if (pfctl_get_eth_ruleset(dev, anchorname, nr, &rs) != 0)
2882			err(1, "DIOCGETETHRULESET");
2883
2884		if (!strcmp(rs.name, PF_RESERVED_ANCHOR))
2885			continue;
2886		sub[0] = 0;
2887		if (rs.path[0]) {
2888			strlcat(sub, rs.path, sizeof(sub));
2889			strlcat(sub, "/", sizeof(sub));
2890		}
2891		strlcat(sub, rs.name, sizeof(sub));
2892		if (sub[0] != '_' || (opts & PF_OPT_VERBOSE))
2893			printf("  %s\n", sub);
2894		if ((opts & PF_OPT_VERBOSE) && pfctl_show_eth_anchors(dev, opts, sub))
2895			return (-1);
2896	}
2897	return (0);
2898}
2899
2900const char *
2901pfctl_lookup_option(char *cmd, const char * const *list)
2902{
2903	if (cmd != NULL && *cmd)
2904		for (; *list; list++)
2905			if (!strncmp(cmd, *list, strlen(cmd)))
2906				return (*list);
2907	return (NULL);
2908}
2909
2910int
2911main(int argc, char *argv[])
2912{
2913	int	 error = 0;
2914	int	 ch;
2915	int	 mode = O_RDONLY;
2916	int	 opts = 0;
2917	int	 optimize = PF_OPTIMIZE_BASIC;
2918	char	 anchorname[MAXPATHLEN];
2919	char	*path;
2920
2921	if (argc < 2)
2922		usage();
2923
2924	while ((ch = getopt(argc, argv,
2925	    "a:AdD:eqf:F:ghi:k:K:mMnNOo:Pp:rRs:t:T:vx:z")) != -1) {
2926		switch (ch) {
2927		case 'a':
2928			anchoropt = optarg;
2929			break;
2930		case 'd':
2931			opts |= PF_OPT_DISABLE;
2932			mode = O_RDWR;
2933			break;
2934		case 'D':
2935			if (pfctl_cmdline_symset(optarg) < 0)
2936				warnx("could not parse macro definition %s",
2937				    optarg);
2938			break;
2939		case 'e':
2940			opts |= PF_OPT_ENABLE;
2941			mode = O_RDWR;
2942			break;
2943		case 'q':
2944			opts |= PF_OPT_QUIET;
2945			break;
2946		case 'F':
2947			clearopt = pfctl_lookup_option(optarg, clearopt_list);
2948			if (clearopt == NULL) {
2949				warnx("Unknown flush modifier '%s'", optarg);
2950				usage();
2951			}
2952			mode = O_RDWR;
2953			break;
2954		case 'i':
2955			ifaceopt = optarg;
2956			break;
2957		case 'k':
2958			if (state_killers >= 2) {
2959				warnx("can only specify -k twice");
2960				usage();
2961				/* NOTREACHED */
2962			}
2963			state_kill[state_killers++] = optarg;
2964			mode = O_RDWR;
2965			break;
2966		case 'K':
2967			if (src_node_killers >= 2) {
2968				warnx("can only specify -K twice");
2969				usage();
2970				/* NOTREACHED */
2971			}
2972			src_node_kill[src_node_killers++] = optarg;
2973			mode = O_RDWR;
2974			break;
2975		case 'm':
2976			opts |= PF_OPT_MERGE;
2977			break;
2978		case 'M':
2979			opts |= PF_OPT_KILLMATCH;
2980			break;
2981		case 'n':
2982			opts |= PF_OPT_NOACTION;
2983			break;
2984		case 'N':
2985			loadopt |= PFCTL_FLAG_NAT;
2986			break;
2987		case 'r':
2988			opts |= PF_OPT_USEDNS;
2989			break;
2990		case 'f':
2991			rulesopt = optarg;
2992			mode = O_RDWR;
2993			break;
2994		case 'g':
2995			opts |= PF_OPT_DEBUG;
2996			break;
2997		case 'A':
2998			loadopt |= PFCTL_FLAG_ALTQ;
2999			break;
3000		case 'R':
3001			loadopt |= PFCTL_FLAG_FILTER;
3002			break;
3003		case 'o':
3004			optiopt = pfctl_lookup_option(optarg, optiopt_list);
3005			if (optiopt == NULL) {
3006				warnx("Unknown optimization '%s'", optarg);
3007				usage();
3008			}
3009			opts |= PF_OPT_OPTIMIZE;
3010			break;
3011		case 'O':
3012			loadopt |= PFCTL_FLAG_OPTION;
3013			break;
3014		case 'p':
3015			pf_device = optarg;
3016			break;
3017		case 'P':
3018			opts |= PF_OPT_NUMERIC;
3019			break;
3020		case 's':
3021			showopt = pfctl_lookup_option(optarg, showopt_list);
3022			if (showopt == NULL) {
3023				warnx("Unknown show modifier '%s'", optarg);
3024				usage();
3025			}
3026			break;
3027		case 't':
3028			tableopt = optarg;
3029			break;
3030		case 'T':
3031			tblcmdopt = pfctl_lookup_option(optarg, tblcmdopt_list);
3032			if (tblcmdopt == NULL) {
3033				warnx("Unknown table command '%s'", optarg);
3034				usage();
3035			}
3036			break;
3037		case 'v':
3038			if (opts & PF_OPT_VERBOSE)
3039				opts |= PF_OPT_VERBOSE2;
3040			opts |= PF_OPT_VERBOSE;
3041			break;
3042		case 'x':
3043			debugopt = pfctl_lookup_option(optarg, debugopt_list);
3044			if (debugopt == NULL) {
3045				warnx("Unknown debug level '%s'", optarg);
3046				usage();
3047			}
3048			mode = O_RDWR;
3049			break;
3050		case 'z':
3051			opts |= PF_OPT_CLRRULECTRS;
3052			mode = O_RDWR;
3053			break;
3054		case 'h':
3055			/* FALLTHROUGH */
3056		default:
3057			usage();
3058			/* NOTREACHED */
3059		}
3060	}
3061
3062	if (tblcmdopt != NULL) {
3063		argc -= optind;
3064		argv += optind;
3065		ch = *tblcmdopt;
3066		if (ch == 'l') {
3067			loadopt |= PFCTL_FLAG_TABLE;
3068			tblcmdopt = NULL;
3069		} else
3070			mode = strchr("acdefkrz", ch) ? O_RDWR : O_RDONLY;
3071	} else if (argc != optind) {
3072		warnx("unknown command line argument: %s ...", argv[optind]);
3073		usage();
3074		/* NOTREACHED */
3075	}
3076	if (loadopt == 0)
3077		loadopt = ~0;
3078
3079	if ((path = calloc(1, MAXPATHLEN)) == NULL)
3080		errx(1, "pfctl: calloc");
3081	memset(anchorname, 0, sizeof(anchorname));
3082	if (anchoropt != NULL) {
3083		int len = strlen(anchoropt);
3084
3085		if (len >= 1 && anchoropt[len - 1] == '*') {
3086			if (len >= 2 && anchoropt[len - 2] == '/')
3087				anchoropt[len - 2] = '\0';
3088			else
3089				anchoropt[len - 1] = '\0';
3090			opts |= PF_OPT_RECURSE;
3091		}
3092		if (strlcpy(anchorname, anchoropt,
3093		    sizeof(anchorname)) >= sizeof(anchorname))
3094			errx(1, "anchor name '%s' too long",
3095			    anchoropt);
3096		loadopt &= PFCTL_FLAG_FILTER|PFCTL_FLAG_NAT|PFCTL_FLAG_TABLE|PFCTL_FLAG_ETH;
3097	}
3098
3099	if ((opts & PF_OPT_NOACTION) == 0) {
3100		dev = open(pf_device, mode);
3101		if (dev == -1)
3102			err(1, "%s", pf_device);
3103		altqsupport = pfctl_test_altqsupport(dev, opts);
3104	} else {
3105		dev = open(pf_device, O_RDONLY);
3106		if (dev >= 0)
3107			opts |= PF_OPT_DUMMYACTION;
3108		/* turn off options */
3109		opts &= ~ (PF_OPT_DISABLE | PF_OPT_ENABLE);
3110		clearopt = showopt = debugopt = NULL;
3111#if !defined(ENABLE_ALTQ)
3112		altqsupport = 0;
3113#else
3114		altqsupport = 1;
3115#endif
3116	}
3117	pfh = pfctl_open(pf_device);
3118	if (pfh == NULL)
3119		err(1, "Failed to open netlink");
3120
3121	if (opts & PF_OPT_DISABLE)
3122		if (pfctl_disable(dev, opts))
3123			error = 1;
3124
3125	if (showopt != NULL) {
3126		switch (*showopt) {
3127		case 'A':
3128			pfctl_show_anchors(dev, opts, anchorname);
3129			if (opts & PF_OPT_VERBOSE2)
3130				printf("Ethernet:\n");
3131			pfctl_show_eth_anchors(dev, opts, anchorname);
3132			break;
3133		case 'r':
3134			pfctl_load_fingerprints(dev, opts);
3135			pfctl_show_rules(dev, path, opts, PFCTL_SHOW_RULES,
3136			    anchorname, 0, 0);
3137			break;
3138		case 'l':
3139			pfctl_load_fingerprints(dev, opts);
3140			pfctl_show_rules(dev, path, opts, PFCTL_SHOW_LABELS,
3141			    anchorname, 0, 0);
3142			break;
3143		case 'n':
3144			pfctl_load_fingerprints(dev, opts);
3145			pfctl_show_nat(dev, path, opts, anchorname, 0, 0);
3146			break;
3147		case 'q':
3148			pfctl_show_altq(dev, ifaceopt, opts,
3149			    opts & PF_OPT_VERBOSE2);
3150			break;
3151		case 's':
3152			pfctl_show_states(dev, ifaceopt, opts);
3153			break;
3154		case 'S':
3155			pfctl_show_src_nodes(dev, opts);
3156			break;
3157		case 'i':
3158			pfctl_show_status(dev, opts);
3159			break;
3160		case 'R':
3161			error = pfctl_show_running(dev);
3162			break;
3163		case 't':
3164			pfctl_show_timeouts(dev, opts);
3165			break;
3166		case 'm':
3167			pfctl_show_limits(dev, opts);
3168			break;
3169		case 'e':
3170			pfctl_show_eth_rules(dev, path, opts, 0, anchorname, 0,
3171			    0);
3172			break;
3173		case 'a':
3174			opts |= PF_OPT_SHOWALL;
3175			pfctl_load_fingerprints(dev, opts);
3176
3177			pfctl_show_eth_rules(dev, path, opts, 0, anchorname, 0,
3178			    0);
3179
3180			pfctl_show_nat(dev, path, opts, anchorname, 0, 0);
3181			pfctl_show_rules(dev, path, opts, 0, anchorname, 0, 0);
3182			pfctl_show_altq(dev, ifaceopt, opts, 0);
3183			pfctl_show_states(dev, ifaceopt, opts);
3184			pfctl_show_src_nodes(dev, opts);
3185			pfctl_show_status(dev, opts);
3186			pfctl_show_rules(dev, path, opts, 1, anchorname, 0, 0);
3187			pfctl_show_timeouts(dev, opts);
3188			pfctl_show_limits(dev, opts);
3189			pfctl_show_tables(anchorname, opts);
3190			pfctl_show_fingerprints(opts);
3191			break;
3192		case 'T':
3193			pfctl_show_tables(anchorname, opts);
3194			break;
3195		case 'o':
3196			pfctl_load_fingerprints(dev, opts);
3197			pfctl_show_fingerprints(opts);
3198			break;
3199		case 'I':
3200			pfctl_show_ifaces(ifaceopt, opts);
3201			break;
3202		case 'c':
3203			pfctl_show_creators(opts);
3204			break;
3205		}
3206	}
3207
3208	if ((opts & PF_OPT_CLRRULECTRS) && showopt == NULL) {
3209		pfctl_show_eth_rules(dev, path, opts, PFCTL_SHOW_NOTHING,
3210		    anchorname, 0, 0);
3211		pfctl_show_rules(dev, path, opts, PFCTL_SHOW_NOTHING,
3212		    anchorname, 0, 0);
3213	}
3214
3215	if (clearopt != NULL) {
3216		if (anchorname[0] == '_' || strstr(anchorname, "/_") != NULL)
3217			errx(1, "anchor names beginning with '_' cannot "
3218			    "be modified from the command line");
3219
3220		switch (*clearopt) {
3221		case 'e':
3222			pfctl_flush_eth_rules(dev, opts, anchorname);
3223			break;
3224		case 'r':
3225			pfctl_flush_rules(dev, opts, anchorname);
3226			break;
3227		case 'n':
3228			pfctl_flush_nat(dev, opts, anchorname);
3229			break;
3230		case 'q':
3231			pfctl_clear_altq(dev, opts);
3232			break;
3233		case 's':
3234			pfctl_clear_iface_states(dev, ifaceopt, opts);
3235			break;
3236		case 'S':
3237			pfctl_clear_src_nodes(dev, opts);
3238			break;
3239		case 'i':
3240			pfctl_clear_stats(dev, opts);
3241			break;
3242		case 'a':
3243			pfctl_flush_eth_rules(dev, opts, anchorname);
3244			pfctl_flush_rules(dev, opts, anchorname);
3245			pfctl_flush_nat(dev, opts, anchorname);
3246			pfctl_clear_tables(anchorname, opts);
3247			if (!*anchorname) {
3248				pfctl_clear_altq(dev, opts);
3249				pfctl_clear_iface_states(dev, ifaceopt, opts);
3250				pfctl_clear_src_nodes(dev, opts);
3251				pfctl_clear_stats(dev, opts);
3252				pfctl_clear_fingerprints(dev, opts);
3253				pfctl_clear_interface_flags(dev, opts);
3254			}
3255			break;
3256		case 'o':
3257			pfctl_clear_fingerprints(dev, opts);
3258			break;
3259		case 'T':
3260			pfctl_clear_tables(anchorname, opts);
3261			break;
3262		}
3263	}
3264	if (state_killers) {
3265		if (!strcmp(state_kill[0], "label"))
3266			pfctl_label_kill_states(dev, ifaceopt, opts);
3267		else if (!strcmp(state_kill[0], "id"))
3268			pfctl_id_kill_states(dev, ifaceopt, opts);
3269		else if (!strcmp(state_kill[0], "gateway"))
3270			pfctl_gateway_kill_states(dev, ifaceopt, opts);
3271		else
3272			pfctl_net_kill_states(dev, ifaceopt, opts);
3273	}
3274
3275	if (src_node_killers)
3276		pfctl_kill_src_nodes(dev, ifaceopt, opts);
3277
3278	if (tblcmdopt != NULL) {
3279		error = pfctl_command_tables(argc, argv, tableopt,
3280		    tblcmdopt, rulesopt, anchorname, opts);
3281		rulesopt = NULL;
3282	}
3283	if (optiopt != NULL) {
3284		switch (*optiopt) {
3285		case 'n':
3286			optimize = 0;
3287			break;
3288		case 'b':
3289			optimize |= PF_OPTIMIZE_BASIC;
3290			break;
3291		case 'o':
3292		case 'p':
3293			optimize |= PF_OPTIMIZE_PROFILE;
3294			break;
3295		}
3296	}
3297
3298	if ((rulesopt != NULL) && (loadopt & PFCTL_FLAG_OPTION) &&
3299	    !anchorname[0] && !(opts & PF_OPT_NOACTION))
3300		if (pfctl_get_skip_ifaces())
3301			error = 1;
3302
3303	if (rulesopt != NULL && !(opts & (PF_OPT_MERGE|PF_OPT_NOACTION)) &&
3304	    !anchorname[0] && (loadopt & PFCTL_FLAG_OPTION))
3305		if (pfctl_file_fingerprints(dev, opts, PF_OSFP_FILE))
3306			error = 1;
3307
3308	if (rulesopt != NULL) {
3309		if (anchorname[0] == '_' || strstr(anchorname, "/_") != NULL)
3310			errx(1, "anchor names beginning with '_' cannot "
3311			    "be modified from the command line");
3312		if (pfctl_rules(dev, rulesopt, opts, optimize,
3313		    anchorname, NULL))
3314			error = 1;
3315		else if (!(opts & PF_OPT_NOACTION) &&
3316		    (loadopt & PFCTL_FLAG_TABLE))
3317			warn_namespace_collision(NULL);
3318	}
3319
3320	if (opts & PF_OPT_ENABLE)
3321		if (pfctl_enable(dev, opts))
3322			error = 1;
3323
3324	if (debugopt != NULL) {
3325		switch (*debugopt) {
3326		case 'n':
3327			pfctl_debug(dev, PF_DEBUG_NONE, opts);
3328			break;
3329		case 'u':
3330			pfctl_debug(dev, PF_DEBUG_URGENT, opts);
3331			break;
3332		case 'm':
3333			pfctl_debug(dev, PF_DEBUG_MISC, opts);
3334			break;
3335		case 'l':
3336			pfctl_debug(dev, PF_DEBUG_NOISY, opts);
3337			break;
3338		}
3339	}
3340
3341	exit(error);
3342}
3343