/freebsd-src/contrib/bmake/unit-tests/ |
H A D | var-scope-local.exp | 1 …rule.ext dir/subdir/target-rule.ext target-rule.ir-gen-from dir/subdir/target-rule-dir.ir-gen-from… 2 …rule.ext dir/subdir/target-rule.ext target-rule.ir-gen-from dir/subdir/target-rule-dir.ir-gen-from… 10 target-rule.ext: @ = <target-rule.ext> 11 target-rule.ext: % = <undefined> 12 target-rule.ext: ? = <> 13 target-rule.ext: < = <undefined> 14 target-rule.ext: * = <target-rule.ext> 15 dir/subdir/target-rule.ext: @ = <dir/subdir/target-rule.ext> 16 dir/subdir/target-rule.ext: % = <undefined> 17 dir/subdir/target-rule.ext: ? = <> [all …]
|
/freebsd-src/contrib/tzdata/ |
H A D | zishrink.awk | 20 # Return a shortened rule name representing NAME, 36 # Rule names are not part of the tzdb API, so substitute shorter 45 rule["Arg"] = "A" 46 rule["Brazil"] = "B" 47 rule["Canada"] = "C" 48 rule["Denmark"] = "D" 49 rule["EU"] = "E" 50 rule["France"] = "F" 51 rule["GB-Eire"] = "G" 52 rule["Halifax"] = "H" [all …]
|
H A D | africa | 68 # Rule NAME FROM TO - IN ON AT SAVE LETTER/S 69 Rule Algeria 1916 only - Jun 14 23:00s 1:00 S 70 Rule Algeria 1916 1919 - Oct Sun>=1 23:00s 0 - 71 Rule Algeria 1917 only - Mar 24 23:00s 1:00 S 72 Rule Algeria 1918 only - Mar 9 23:00s 1:00 S 73 Rule Algeria 1919 only - Mar 1 23:00s 1:00 S 74 Rule Algeria 1920 only - Feb 14 23:00s 1:00 S 75 Rule Algeria 1920 only - Oct 23 23:00s 0 - 76 Rule Algeria 1921 only - Mar 14 23:00s 1:00 S 77 Rule Algeri [all...] |
H A D | europe | 389 # Rule NAME FROM TO - IN ON AT SAVE LETTER/S 391 Rule GB-Eire 1916 only - May 21 2:00s 1:00 BST 392 Rule GB-Eire 1916 only - Oct 1 2:00s 0 GMT 394 Rule GB-Eire 1917 only - Apr 8 2:00s 1:00 BST 395 Rule GB-Eire 1917 only - Sep 17 2:00s 0 GMT 397 Rule GB-Eire 1918 only - Mar 24 2:00s 1:00 BST 398 Rule GB-Eire 1918 only - Sep 30 2:00s 0 GMT 400 Rule GB-Eire 1919 only - Mar 30 2:00s 1:00 BST 401 Rule GB-Eire 1919 only - Sep 29 2:00s 0 GMT 403 Rule G [all...] |
H A D | asia | 70 # Rule NAME FROM TO - IN ON AT SAVE LETTER/S 71 Rule EUAsia 1981 max - Mar lastSun 1:00u 1:00 S 72 Rule EUAsia 1979 1995 - Sep lastSun 1:00u 0 - 73 Rule EUAsia 1996 max - Oct lastSun 1:00u 0 - 74 Rule E-EurAsia 1981 max - Mar lastSun 0:00 1:00 - 75 Rule E-EurAsia 1979 1995 - Sep lastSun 0:00 0 - 76 Rule E-EurAsia 1996 max - Oct lastSun 0:00 0 - 77 Rule RussiaAsia 1981 1984 - Apr 1 0:00 1:00 - 78 Rule RussiaAsia 1981 1983 - Oct 1 0:00 0 - 79 Rule RussiaAsi [all...] |
H A D | northamerica | 176 # Rule NAME FROM TO - IN ON AT SAVE LETTER/S 177 Rule US 1918 1919 - Mar lastSun 2:00 1:00 D 178 Rule US 1918 1919 - Oct lastSun 2:00 0 S 179 Rule US 1942 only - Feb 9 2:00 1:00 W # War 180 Rule US 1945 only - Aug 14 23:00u 1:00 P # Peace 181 Rule US 1945 only - Sep 30 2:00 0 S 182 Rule US 1967 2006 - Oct lastSun 2:00 0 S 183 Rule US 1967 1973 - Apr lastSun 2:00 1:00 D 184 Rule US 1974 only - Jan 6 2:00 1:00 D 185 Rule U [all...] |
H A D | southamerica | 51 # Rule NAME FROM TO - IN ON AT SAVE LETTER/S 52 Rule Arg 1930 only - Dec 1 0:00 1:00 - 53 Rule Arg 1931 only - Apr 1 0:00 0 - 54 Rule Arg 1931 only - Oct 15 0:00 1:00 - 55 Rule Arg 1932 1940 - Mar 1 0:00 0 - 56 Rule Arg 1932 1939 - Nov 1 0:00 1:00 - 57 Rule Arg 1940 only - Jul 1 0:00 1:00 - 58 Rule Arg 1941 only - Jun 15 0:00 0 - 59 Rule Arg 1941 only - Oct 15 0:00 1:00 - 60 Rule Ar [all...] |
H A D | australasia | 16 # Rule NAME FROM TO - IN ON AT SAVE LETTER/S 17 Rule Aus 1917 only - Jan 1 2:00s 1:00 D 18 Rule Aus 1917 only - Mar lastSun 2:00s 0 S 19 Rule Aus 1942 only - Jan 1 2:00s 1:00 D 20 Rule Aus 1942 only - Mar lastSun 2:00s 0 S 21 Rule Aus 1942 only - Sep 27 2:00s 1:00 D 22 Rule Aus 1943 1944 - Mar lastSun 2:00s 0 S 23 Rule Aus 1943 only - Oct 3 2:00s 1:00 D 32 # Rule NAME FROM TO - IN ON AT SAVE LETTER/S 33 Rule A [all...] |
/freebsd-src/sys/kern/ |
H A D | kern_rctl.c | 124 * 'rctl_rule_link' connects a rule with every racct it's related to. 125 * For example, rule 'user:X:openfiles:deny=N/process' is linked 218 static int rctl_rule_fully_specified(const struct rctl_rule *rule); 219 static void rctl_rule_to_sbuf(struct sbuf *sb, const struct rctl_rule *rule); 331 rctl_proc_rule_to_racct(const struct proc *p, const struct rctl_rule *rule) in rctl_proc_rule_to_racct() argument 338 switch (rule->rr_per) { in rctl_proc_rule_to_racct() 348 panic("%s: unknown per %d", __func__, rule->rr_per); in rctl_proc_rule_to_racct() 354 * hitting 'rule'. 357 rctl_available_resource(const struct proc *p, const struct rctl_rule *rule) in rctl_available_resource() argument 365 racct = rctl_proc_rule_to_racct(p, rule); in rctl_available_resource() [all …]
|
/freebsd-src/contrib/libarchive/tar/ |
H A D | subst.c | 55 struct subst_rule *rule; 66 rule = malloc(sizeof(*rule)); in init_substitution() 67 if (rule == NULL) in init_substitution() 69 rule->next = NULL; 70 rule->result = NULL; 73 subst->first_rule = rule; in add_substitution() local 75 subst->last_rule->next = rule; in add_substitution() 76 subst->last_rule = rule; in add_substitution() 90 if ((r = regcomp(&rule in add_substitution() 224 struct subst_rule *rule; apply_substitution() local 332 struct subst_rule *rule; cleanup_substitution() local [all...] |
/freebsd-src/sbin/devfs/ |
H A D | devfs.8 | 58 most of the commands related to the rule subsystem must be preceded by the 59 .Cm rule 74 .Ss Rule Subsystem 77 rule subsystem provides a way for the administrator of a system to control 93 .Ss Rule Manipulation 94 Rule manipulation commands follow the 95 .Cm rule 97 The following flags are common to all of the rule manipulation commands: 109 .It Cm rule add Oo Ar rulenum Oc Ar rulespec 110 Add the rule described by [all …]
|
/freebsd-src/sys/netpfil/pf/ |
H A D | pf_nv.c | 505 pf_nvrule_to_krule(const nvlist_t *nvl, struct pf_krule *rule) in pf_nvrule_to_krule() argument 511 PFNV_CHK(pf_nvuint32(nvl, "nr", &rule->nr)); in pf_nvrule_to_krule() 517 &rule->src); in pf_nvrule_to_krule() 525 &rule->dst)); in pf_nvrule_to_krule() 528 PFNV_CHK(pf_nvstring(nvl, "label", rule->label[0], in pf_nvrule_to_krule() 529 sizeof(rule->label[0]))); in pf_nvrule_to_krule() 540 ret = strlcpy(rule->label[i], strs[i], in pf_nvrule_to_krule() 541 sizeof(rule->label[0])); in pf_nvrule_to_krule() 542 if (ret >= sizeof(rule->label[0])) in pf_nvrule_to_krule() 547 PFNV_CHK(pf_nvuint32_opt(nvl, "ridentifier", &rule in pf_nvrule_to_krule() 660 pf_divert_to_nvdivert(const struct pf_krule * rule) pf_divert_to_nvdivert() argument 684 pf_krule_to_nvrule(struct pf_krule * rule) pf_krule_to_nvrule() argument [all...] |
H A D | pf_ioctl.c | 176 "Size of pf(4) rule tag hashtable"); 210 "Make the default rule drop all packets."); 343 /* default rule should never be garbage collected */ in pfattach_vnet() 405 * scrub rule functionality is hopefully removed some day in future. in pfattach_vnet() 436 struct pf_krule *rule; in pf_get_kpool() 452 rule = TAILQ_LAST(ruleset->rules[rs_num].active.ptr, in pf_get_kpool() 455 rule = TAILQ_FIRST(ruleset->rules[rs_num].active.ptr); in pf_get_kpool() 461 rule = TAILQ_LAST(ruleset->rules[rs_num].inactive.ptr, in pf_get_kpool() 464 rule = TAILQ_FIRST(ruleset->rules[rs_num].inactive.ptr); in pf_get_kpool() 467 while ((rule ! in pf_get_kpool() 438 struct pf_krule *rule; pf_get_kpool() local 511 pf_unlink_rule_locked(struct pf_krulequeue * rulequeue,struct pf_krule * rule) pf_unlink_rule_locked() argument 524 pf_unlink_rule(struct pf_krulequeue * rulequeue,struct pf_krule * rule) pf_unlink_rule() argument 535 pf_free_eth_rule(struct pf_keth_rule * rule) pf_free_eth_rule() argument 572 pf_free_rule(struct pf_krule * rule) pf_free_rule() argument 761 struct pf_keth_rule *rule, *tmp; pf_begin_eth() local 804 struct pf_keth_rule *rule, *tmp; pf_rollback_eth() local 1210 struct pf_krule *rule; pf_begin_rules() local 1240 struct pf_krule *rule; pf_rollback_rules() local 1300 pf_hash_rule_rolling(MD5_CTX * ctx,struct pf_krule * rule) pf_hash_rule_rolling() argument 1345 pf_hash_rule(struct pf_krule * rule) pf_hash_rule() argument 1365 struct pf_krule *rule, **old_array, *old_rule; pf_commit_rules() local 1454 struct pf_krule *rule; pf_setup_pfsync_matching() local 1822 struct pf_krule *rule; pf_krule_alloc() local 1832 pf_krule_free(struct pf_krule * rule) pf_krule_free() argument 1868 pf_krule_clear_counters(struct pf_krule * rule) pf_krule_clear_counters() argument 1917 pf_rule_to_krule(const struct pf_rule * rule,struct pf_krule * krule) pf_rule_to_krule() argument 2065 pf_ioctl_addrule(struct pf_krule * rule,uint32_t ticket,uint32_t pool_ticket,const char * anchor,const char * anchor_call,uid_t uid,pid_t pid) pf_ioctl_addrule() argument 2247 pf_label_match(const struct pf_krule * rule,const char * label) pf_label_match() argument 2770 struct pf_keth_rule *rule = NULL; pfioctl() local 2871 struct pf_keth_rule *rule = NULL, *tail = NULL; pfioctl() local 3182 struct pf_krule *rule = NULL; pfioctl() local 3243 struct pf_krule *rule; pfioctl() local 3276 struct pf_krule *rule; pfioctl() local 3967 struct pf_krule *rule; pfioctl() local [all...] |
/freebsd-src/sys/security/mac_bsdextended/ |
H A D | mac_bsdextended.c | 80 "BSD Extended MAC rule"); 91 &rule_slots, 0, "Number of used rule slots"); 105 * between the new mode (first rule matches) and the old functionality (all 111 "Disable/enable match first rule functionality"); 114 ugidfw_rule_valid(struct mac_bsdextended_rule *rule) 117 if ((rule->mbr_subject.mbs_flags | MBS_ALL_FLAGS) != MBS_ALL_FLAGS) in ugidfw_rule_valid() 119 if ((rule->mbr_subject.mbs_neg | MBS_ALL_FLAGS) != MBS_ALL_FLAGS) in ugidfw_rule_valid() 121 if ((rule->mbr_object.mbo_flags | MBO_ALL_FLAGS) != MBO_ALL_FLAGS) in ugidfw_rule_valid() 123 if ((rule->mbr_object.mbo_neg | MBO_ALL_FLAGS) != MBO_ALL_FLAGS) in ugidfw_rule_valid() 125 if (((rule in ugidfw_rule_valid() 116 ugidfw_rule_valid(struct mac_bsdextended_rule * rule) ugidfw_rule_valid() argument 227 ugidfw_rulecheck(struct mac_bsdextended_rule * rule,struct ucred * cred,struct vnode * vp,struct vattr * vap,int acc_mode) ugidfw_rulecheck() argument [all...] |
/freebsd-src/sys/security/mac_portacl/ |
H A D | mac_portacl.c | 111 struct rule { 117 TAILQ_ENTRY(rule) r_entries; 126 * Text format for the rule string is that a rule consists of a 133 static TAILQ_HEAD(rulehead, rule) rule_head; 139 struct rule *rule; in toast_rules() 141 while ((rule = TAILQ_FIRST(head)) != NULL) { in toast_rules() local 142 TAILQ_REMOVE(head, rule, r_entries); in toast_rules() 143 free(rule, M_PORTAC in toast_rules() 113 struct rule { global() struct 119 r_protocolrule global() argument 173 parse_rule_element(char * element,struct rule ** rule) parse_rule_element() argument 381 struct rule *rule; rules_check() local [all...] |
/freebsd-src/sys/security/mac_ipacl/ |
H A D | mac_ipacl.c | 118 bool subnet_apply; /* Apply rule on whole subnet. */ 133 struct ip_rule *rule; in destroy_rules() 135 while ((rule = TAILQ_FIRST(head)) != NULL) { in destroy_rules() local 136 TAILQ_REMOVE(head, rule, r_entries); in destroy_rules() 137 free(rule, M_IPACL); in destroy_rules() 159 parse_rule_element(char *element, struct ip_rule *rule) 171 rule->jid = strtol(tok, &p, 10); in parse_rule_element() 177 rule->allow = strtol(tok, &p, 10); in parse_rule_element() 184 strlcpy(rule->if_name, tok, strlen(tok) + 1); in parse_rule_element() 188 rule in parse_rule_element() 161 parse_rule_element(char * element,struct ip_rule * rule) parse_rule_element() argument 322 struct ip_rule *rule; rules_check() local [all...] |
/freebsd-src/tests/sys/mac/ipacl/ |
H A D | ipacl_test.sh | 71 rule="${jidA},1,${epairA}b,AF_INET,192.0.2.42/-1@" 72 rule="${rule}${jidB},1,${epairB}b,AF_INET,198.51.100.12/-1@" 73 rule="${rule}${jidB},1,,AF_INET,203.0.113.1/24@" 74 rule="${rule}${jidB},0,,AF_INET,203.0.113.9/-1" 75 sysctl security.mac.ipacl.rules="${rule}" 107 rule="${jidA},1,,AF_INET,198.18.0.0/15@" 108 rule="${rule}${jidA},0,,AF_INET,198.18.23.0/24@" 109 rule="${rule}${jidA},1,,AF_INET,198.18.23.1/-1@" 110 rule="${rule}${jidA},1,,AF_INET,198.51.100.0/24@" 111 rule="${rule}${jidA},0,,AF_INET,198.51.100.100/-1" [all …]
|
/freebsd-src/share/doc/psd/15.yacc/ |
H A D | ss5 | 42 For example, the grammar rule 48 Unfortunately, this grammar rule does not 55 the rule allows this input to be structured as either 78 matches the right side of the grammar rule above. 81 the input by applying this rule; 82 after applying the rule; 85 left side of the rule). 97 it could defer the immediate application of the rule, and continue reading 102 It could then apply the rule to the rightmost three symbols, reducing them to 108 Now the rule can be reduced once more; the effect is to [all …]
|
/freebsd-src/usr.bin/rctl/ |
H A D | rctl.c | 63 warnx("malformed rule '%s': unknown user '%s'", in parse_user() 70 warnx("malformed rule '%s': trailing characters " in parse_user() 91 warnx("malformed rule '%s': unknown group '%s'", in parse_group() 98 warnx("malformed rule '%s': trailing characters " in parse_group() 110 expand_amount(const char *rule, const char *unexpanded_rule) in expand_amount() argument 117 tofree = copy = strdup(rule); in expand_amount() 135 copy = strdup(rule); in expand_amount() 149 warnx("malformed rule '%s': invalid numeric value '%s'", in expand_amount() 175 expand_rule(const char *rule, bool resolve_ids) in expand_rule() argument 182 tofree = copy = strdup(rule); in expand_rule() [all …]
|
/freebsd-src/tests/sys/netpfil/pf/ioctl/ |
H A D | validation.c | 804 struct pfioc_rule rule; in ATF_TC_BODY() local 808 memset(&rule, 0x42, sizeof(rule)); in ATF_TC_BODY() 810 rule.ticket = 0; in ATF_TC_BODY() 811 rule.pool_ticket = 0; in ATF_TC_BODY() 812 rule.anchor[0] = 0; in ATF_TC_BODY() 814 rule.rule.return_icmp = 0; in ATF_TC_BODY() 815 bzero(&rule.rule.src, sizeof(rule.rule.src)); in ATF_TC_BODY() 816 bzero(&rule.rule.dst, sizeof(rule.rule.dst)); in ATF_TC_BODY() 818 rule.rule.ifname[0] = 0; in ATF_TC_BODY() 819 rule.rule.action = 0; in ATF_TC_BODY() [all …]
|
/freebsd-src/contrib/elftoolchain/libdwarf/ |
H A D | dwarf_get_fde_info_for_reg3.3 | 32 .Nd retrieve register rule 53 retrieves a register rule from the register rule table associated with 54 a given FDE descriptor, given a program counter address and rule 63 should hold the column number of the register rule desired. 68 desired register rule row. 72 stores information about the register rule found into the locations 85 register rule found. 91 If there is an offset value associated with the register rule, 99 with the register rule. 101 If the register rule is of type [all …]
|
/freebsd-src/lib/libugidfw/ |
H A D | ugidfw.c | 62 bsde_rule_to_string(struct mac_bsdextended_rule *rule, char *buf, size_t buflen) in bsde_rule_to_string() argument 67 char *cur, type[sizeof(rule->mbr_object.mbo_type) * CHAR_BIT + 1]; in bsde_rule_to_string() 79 if (rule->mbr_subject.mbs_flags) { in bsde_rule_to_string() 80 if (rule->mbr_subject.mbs_neg == MBS_ALL_FLAGS) { in bsde_rule_to_string() 91 if (!notdone && (rule->mbr_subject.mbs_neg & MBO_UID_DEFINED)) { in bsde_rule_to_string() 98 if (rule->mbr_subject.mbs_flags & MBO_UID_DEFINED) { in bsde_rule_to_string() 99 pwd = getpwuid(rule->mbr_subject.mbs_uid_min); in bsde_rule_to_string() 109 rule->mbr_subject.mbs_uid_min); in bsde_rule_to_string() 115 if (rule->mbr_subject.mbs_uid_min != in bsde_rule_to_string() 116 rule->mbr_subject.mbs_uid_max) { in bsde_rule_to_string() [all …]
|
/freebsd-src/share/man/man5/ |
H A D | pf.conf.5 | 57 Ethernet filtering provides rule-based blocking or passing of Ethernet packets. 62 Queueing provides rule-based bandwidth control. 67 Packet filtering provides rule-based blocking or passing of packets. 116 are relatively fast, making a single rule with tables much more efficient, 119 differ only in IP address (either created explicitly or automatically by rule 130 (see below for details on the various rule types). 176 when the last rule referring to it is flushed. 205 A filter rule is set up to block all traffic coming from addresses listed in 348 The adaptive timeout values can be defined both globally and for each rule. 349 When used on a per-rule basi [all...] |
/freebsd-src/sys/netpfil/ipfw/ |
H A D | ip_fw_sockopt.c | 34 * Control socket and rule management routines for ipfw. 80 static int check_ipfw_rule1(struct ip_fw_rule *rule, int size, 82 static int check_ipfw_rule0(struct ip_fw_rule0 *rule, int size, 158 set_legacy_obj_kidx(struct ip_fw_chain *ch, struct ip_fw_rule0 *rule); 161 static int ref_rule_objects(struct ip_fw_chain *ch, struct ip_fw *rule, 165 static void unref_rule_objects(struct ip_fw_chain *chain, struct ip_fw *rule); 203 struct ip_fw *rule; in ipfw_alloc_rule() local 205 rule = malloc(rulesize, M_IPFW, M_WAITOK | M_ZERO); in ipfw_alloc_rule() 206 rule->cntr = uma_zalloc_pcpu(V_ipfw_cntr_zone, M_WAITOK | M_ZERO); in ipfw_alloc_rule() 207 rule->refcnt = 1; in ipfw_alloc_rule() [all …]
|
/freebsd-src/sbin/ipf/ipf/ |
H A D | ipf.5 | 9 For use as a firewall, there are two important rule types: those that block 21 Each rule must contain at least the following three components 64 firewall rule set or which packets should be blocked or allowed in. 67 .SS Filter rule keywords 68 The first word found in any filter rule describes what the eventual outcome 86 when IPFilter successfully matches a packet against a log rule a log 89 So if a packet first matched a block rule and then matched a log rule, 90 the status of the packet after the log rule is that it will still be 98 before the packet is dropped. Thus the count rule canno [all...] |