diff options
author | Luiz Otavio O Souza <luiz@netgate.com> | 2016-01-28 05:56:09 -0600 |
---|---|---|
committer | Luiz Otavio O Souza <luiz@netgate.com> | 2016-01-28 05:56:09 -0600 |
commit | 5c82541da7e1c32c093de140d0c173418ee9c545 (patch) | |
tree | 62715df97fe66ca00111fcf838760d1326653264 /sbin | |
parent | 6d77218901c68616c2f97486c813b9a78c48046a (diff) | |
download | FreeBSD-src-5c82541da7e1c32c093de140d0c173418ee9c545.zip FreeBSD-src-5c82541da7e1c32c093de140d0c173418ee9c545.tar.gz |
Revert "Importing pfSense patch pf_static_tracker.diff"
This reverts commit 9068fb423dfecae0f8b611d4bc558dd6cb2e2bd7.
Diffstat (limited to 'sbin')
-rw-r--r-- | sbin/pfctl/parse.y | 15 | ||||
-rw-r--r-- | sbin/pfctl/pfctl.c | 7 | ||||
-rw-r--r-- | sbin/pfctl/pfctl_parser.c | 4 |
3 files changed, 1 insertions, 25 deletions
diff --git a/sbin/pfctl/parse.y b/sbin/pfctl/parse.y index b5577e2..1ee564f 100644 --- a/sbin/pfctl/parse.y +++ b/sbin/pfctl/parse.y @@ -234,7 +234,6 @@ struct filter_opts { u_int32_t tos; u_int32_t dscp; u_int32_t prob; - u_int32_t tracker; struct { int action; struct node_state_opt *options; @@ -264,7 +263,6 @@ struct filter_opts { struct antispoof_opts { char *label; - u_int32_t tracker; u_int rtableid; } antispoof_opts; @@ -463,7 +461,7 @@ int parseport(char *, struct range *r, int); %token RETURNRST RETURNICMP RETURNICMP6 PROTO INET INET6 ALL ANY ICMPTYPE %token ICMP6TYPE CODE KEEP MODULATE STATE PORT RDR NAT BINAT ARROW NODF %token MINTTL ERROR ALLOWOPTS FASTROUTE FILENAME ROUTETO DUPTO REPLYTO NO LABEL SCHEDULE -%token NOROUTE URPFFAILED FRAGMENT USER GROUP MAXMSS MAXIMUM TTL TOS DSCP DROP TABLE TRACKER +%token NOROUTE URPFFAILED FRAGMENT USER GROUP MAXMSS MAXIMUM TTL TOS DSCP DROP TABLE %token REASSEMBLE FRAGDROP FRAGCROP ANCHOR NATANCHOR RDRANCHOR BINATANCHOR %token SET OPTIMIZATION TIMEOUT LIMIT LOGINTERFACE BLOCKPOLICY RANDOMID %token REQUIREORDER SYNPROXY FINGERPRINTS NOSYNC DEBUG SKIP HOSTID @@ -1246,7 +1244,6 @@ antispoof : ANTISPOOF logquick antispoof_ifspc af antispoof_opts { if (rule_label(&r, $5.label)) YYERROR; r.rtableid = $5.rtableid; - r.cuid = $5.tracker; j = calloc(1, sizeof(struct node_if)); if (j == NULL) err(1, "antispoof: calloc"); @@ -1296,7 +1293,6 @@ antispoof : ANTISPOOF logquick antispoof_ifspc af antispoof_opts { r.logif = $2.logif; r.quick = $2.quick; r.af = $4; - r.cuid = $5.tracker; if (rule_label(&r, $5.label)) YYERROR; r.rtableid = $5.rtableid; @@ -1358,9 +1354,6 @@ antispoof_opt : label { } antispoof_opts.label = $1; } - | TRACKER number { - antispoof_opts.tracker = $2; - } | RTABLE NUMBER { if ($2 < 0 || $2 > rt_tableid_max()) { yyerror("invalid rtable id"); @@ -2070,8 +2063,6 @@ pfrule : action dir logquick interface route af proto fromto if (rule_schedule(&r, $9.schedule)) YYERROR; free($9.schedule); - if ($9.tracker) - r.cuid = $9.tracker; r.flags = $9.flags.b1; r.flagset = $9.flags.b2; if (($9.flags.b1 & $9.flags.b2) != $9.flags.b1) { @@ -2522,9 +2513,6 @@ filter_opt : USER uids { filter_opts.keep.action = $1.action; filter_opts.keep.options = $1.options; } - | TRACKER number { - filter_opts.tracker = $2; - } | FRAGMENT { filter_opts.fragment = 1; } @@ -5761,7 +5749,6 @@ lookup(char *s) { "timeout", TIMEOUT}, { "to", TO}, { "tos", TOS}, - { "tracker", TRACKER}, { "ttl", TTL}, { "upperlimit", UPPERLIMIT}, { "urpf-failed", URPFFAILED}, diff --git a/sbin/pfctl/pfctl.c b/sbin/pfctl/pfctl.c index d606b62b..3a93fa2 100644 --- a/sbin/pfctl/pfctl.c +++ b/sbin/pfctl/pfctl.c @@ -825,17 +825,10 @@ pfctl_print_rule_counters(struct pf_rule *rule, int opts) (unsigned long long)(rule->bytes[0] + rule->bytes[1]), (uintmax_t)rule->u_states_cur); if (!(opts & PF_OPT_DEBUG)) -#ifdef PF_USER_INFO printf(" [ Inserted: uid %u pid %u " "State Creations: %-6ju]\n", (unsigned)rule->cuid, (unsigned)rule->cpid, (uintmax_t)rule->u_states_tot); -#else - printf(" [ Inserted: pid %u " - "State Creations: %-6ju]\n", - (unsigned)rule->cpid, - (uintmax_t)rule->states_tot); -#endif } } diff --git a/sbin/pfctl/pfctl_parser.c b/sbin/pfctl/pfctl_parser.c index 5b03a93..b4fe20a 100644 --- a/sbin/pfctl/pfctl_parser.c +++ b/sbin/pfctl/pfctl_parser.c @@ -736,11 +736,7 @@ print_rule(struct pf_rule *r, const char *anchor_call, int verbose, int numeric) int i, opts; if (verbose) -#ifdef PF_USER_INFO printf("@%d ", r->nr); -#else - printf("@%d(%u) ", r->nr, r->cuid); -#endif if (r->action == PF_MATCH) printf("match"); else if (r->action > PF_NORDR) |