Fortinet white logo
Fortinet white logo

CLI Reference

diagnose debug urlfilter

diagnose debug urlfilter

Use these commands to manage the URL filters:

diagnose debug urlfilter src-addr <IP_address>   Enable debugging messages for the specified source IP address.
diagnose debug urlfilter test-url   Display the results for a filter for the specified URL.
diagnose debug urlfilter valgrind status   Show the status of the Valgrind analysis.
diagnose debug urlfilter valgrind enable   Force the daemon to restart.
diagnose debug urlfilter valgrind memcheck   Force the daemon to restart.
diagnose debug urlfilter valgrind disable   Force the daemon to restart.
diagnose debug urlfilter valgrind log {clear | show}   Delete or display the Valgrind analysis logs.

Example output

This is sample output of the diagnose debug urlfilter valgrind enable command:

# diagnose debug urlfilter valgrind enable

Restarting urlfilter daemon.

This is sample output of the diagnose debug urlfilter valgrind status command:

# diagnose debug urlfilter valgrind status

valgrind enabled

This is sample output of the diagnose debug urlfilter valgrind memcheck command:

# diagnose debug urlfilter valgrind memcheck

Restarting urlfilter daemon.

This is sample output of the diagnose debug urlfilter valgrind log show command:

# diagnose debug urlfilter valgrind log show

==4412== Memcheck, a memory error detector

==4412== Copyright (C) 2002-2017, and GNU GPL'd, by Julian Seward et al.

==4412== Using Valgrind-3.13.0 and LibVEX; rerun with -h for copyright info

==4412== Command: /bin/urlfilter

==4412==

==4412== Warning: noted but unhandled ioctl 0x89e5 with no size/direction hints.

==4412== This could cause spurious value errors to appear.

==4412== See README_MISSING_SYSCALL_OR_IOCTL for guidance on writing a proper wrapper.

==4412== Syscall param epoll_pwait(sigmask) points to unaddressable byte(s)

==4412== at 0x5886DF0: epoll_pwait (in /lib/libc.so.6)

==4412== by 0x10413AC: ??? (in /bin/init)

==4412== by 0xAFF3EE: ??? (in /bin/init)

==4412== by 0x4287AF: ??? (in /bin/init)

==4412== by 0x42E33B: ??? (in /bin/init)

==4412== by 0x57B2EA9: (below main) (in /lib/libc.so.6)

==4412== Address 0x0 is not stack'd, malloc'd or (recently) free'd

==4412==

==4412==

==4412== HEAP SUMMARY:

==4412== in use at exit: 56,513 bytes in 62 blocks

==4412== total heap usage: 517 allocs, 455 frees, 4,536,080 bytes allocated

==4412==

==4412== LEAK SUMMARY:

==4412== definitely lost: 0 bytes in 0 blocks

==4412== indirectly lost: 0 bytes in 0 blocks

==4412== possibly lost: 7,184 bytes in 4 blocks

==4412== still reachable: 49,329 bytes in 58 blocks

==4412== suppressed: 0 bytes in 0 blocks

==4412== Rerun with --leak-check=full to see details of leaked memory

==4412==

==4412== For counts of detected and suppressed errors, rerun with: -v

==4412== ERROR SUMMARY: 114 errors from 1 contexts (suppressed: 0 from 0)

==4417== Memcheck, a memory error detector

==4417== Copyright (C) 2002-2017, and GNU GPL'd, by Julian Seward et al.

==4417== Using Valgrind-3.13.0 and LibVEX; rerun with -h for copyright info

==4417== Command: /bin/urlfilter

==4417==

==4417== Warning: noted but unhandled ioctl 0x89e5 with no size/direction hints.

==4417== This could cause spurious value errors to appear.

==4417== See README_MISSING_SYSCALL_OR_IOCTL for guidance on writing a proper wrapper.

==4417== Syscall param epoll_pwait(sigmask) points to unaddressable byte(s)

==4417== at 0x5886DF0: epoll_pwait (in /lib/libc.so.6)

==4417== by 0x10413AC: ??? (in /bin/init)

==4417== by 0xAFF3EE: ??? (in /bin/init)

==4417== by 0x4287AF: ??? (in /bin/init)

==4417== by 0x42E33B: ??? (in /bin/init)

==4417== by 0x57B2EA9: (below main) (in /lib/libc.so.6)

==4417== Address 0x0 is not stack'd, malloc'd or (recently) free'd

==4417==

diagnose debug urlfilter

diagnose debug urlfilter

Use these commands to manage the URL filters:

diagnose debug urlfilter src-addr <IP_address>   Enable debugging messages for the specified source IP address.
diagnose debug urlfilter test-url   Display the results for a filter for the specified URL.
diagnose debug urlfilter valgrind status   Show the status of the Valgrind analysis.
diagnose debug urlfilter valgrind enable   Force the daemon to restart.
diagnose debug urlfilter valgrind memcheck   Force the daemon to restart.
diagnose debug urlfilter valgrind disable   Force the daemon to restart.
diagnose debug urlfilter valgrind log {clear | show}   Delete or display the Valgrind analysis logs.

Example output

This is sample output of the diagnose debug urlfilter valgrind enable command:

# diagnose debug urlfilter valgrind enable

Restarting urlfilter daemon.

This is sample output of the diagnose debug urlfilter valgrind status command:

# diagnose debug urlfilter valgrind status

valgrind enabled

This is sample output of the diagnose debug urlfilter valgrind memcheck command:

# diagnose debug urlfilter valgrind memcheck

Restarting urlfilter daemon.

This is sample output of the diagnose debug urlfilter valgrind log show command:

# diagnose debug urlfilter valgrind log show

==4412== Memcheck, a memory error detector

==4412== Copyright (C) 2002-2017, and GNU GPL'd, by Julian Seward et al.

==4412== Using Valgrind-3.13.0 and LibVEX; rerun with -h for copyright info

==4412== Command: /bin/urlfilter

==4412==

==4412== Warning: noted but unhandled ioctl 0x89e5 with no size/direction hints.

==4412== This could cause spurious value errors to appear.

==4412== See README_MISSING_SYSCALL_OR_IOCTL for guidance on writing a proper wrapper.

==4412== Syscall param epoll_pwait(sigmask) points to unaddressable byte(s)

==4412== at 0x5886DF0: epoll_pwait (in /lib/libc.so.6)

==4412== by 0x10413AC: ??? (in /bin/init)

==4412== by 0xAFF3EE: ??? (in /bin/init)

==4412== by 0x4287AF: ??? (in /bin/init)

==4412== by 0x42E33B: ??? (in /bin/init)

==4412== by 0x57B2EA9: (below main) (in /lib/libc.so.6)

==4412== Address 0x0 is not stack'd, malloc'd or (recently) free'd

==4412==

==4412==

==4412== HEAP SUMMARY:

==4412== in use at exit: 56,513 bytes in 62 blocks

==4412== total heap usage: 517 allocs, 455 frees, 4,536,080 bytes allocated

==4412==

==4412== LEAK SUMMARY:

==4412== definitely lost: 0 bytes in 0 blocks

==4412== indirectly lost: 0 bytes in 0 blocks

==4412== possibly lost: 7,184 bytes in 4 blocks

==4412== still reachable: 49,329 bytes in 58 blocks

==4412== suppressed: 0 bytes in 0 blocks

==4412== Rerun with --leak-check=full to see details of leaked memory

==4412==

==4412== For counts of detected and suppressed errors, rerun with: -v

==4412== ERROR SUMMARY: 114 errors from 1 contexts (suppressed: 0 from 0)

==4417== Memcheck, a memory error detector

==4417== Copyright (C) 2002-2017, and GNU GPL'd, by Julian Seward et al.

==4417== Using Valgrind-3.13.0 and LibVEX; rerun with -h for copyright info

==4417== Command: /bin/urlfilter

==4417==

==4417== Warning: noted but unhandled ioctl 0x89e5 with no size/direction hints.

==4417== This could cause spurious value errors to appear.

==4417== See README_MISSING_SYSCALL_OR_IOCTL for guidance on writing a proper wrapper.

==4417== Syscall param epoll_pwait(sigmask) points to unaddressable byte(s)

==4417== at 0x5886DF0: epoll_pwait (in /lib/libc.so.6)

==4417== by 0x10413AC: ??? (in /bin/init)

==4417== by 0xAFF3EE: ??? (in /bin/init)

==4417== by 0x4287AF: ??? (in /bin/init)

==4417== by 0x42E33B: ??? (in /bin/init)

==4417== by 0x57B2EA9: (below main) (in /lib/libc.so.6)

==4417== Address 0x0 is not stack'd, malloc'd or (recently) free'd

==4417==