Home
last modified time | relevance | path

Searched full:rule (Results 1 – 25 of 1342) sorted by relevance

12345678910>>...54

/freebsd-src/contrib/bmake/unit-tests/
H A Dvar-scope-local.exp1rule.ext dir/subdir/target-rule.ext target-rule.ir-gen-from dir/subdir/target-rule-dir.ir-gen-from…
2rule.ext dir/subdir/target-rule.ext target-rule.ir-gen-from dir/subdir/target-rule-dir.ir-gen-from…
10 target-rule.ext: @ = <target-rule.ext>
11 target-rule.ext: % = <undefined>
12 target-rule.ext: ? = <>
13 target-rule.ext: < = <undefined>
14 target-rule.ext: * = <target-rule.ext>
15 dir/subdir/target-rule.ext: @ = <dir/subdir/target-rule.ext>
16 dir/subdir/target-rule.ext: % = <undefined>
17 dir/subdir/target-rule.ext: ? = <>
[all …]
/freebsd-src/contrib/tzdata/
H A Dzishrink.awk20 # Return a shortened rule name representing NAME,
36 # Rule names are not part of the tzdb API, so substitute shorter
45 rule["Arg"] = "A"
46 rule["Brazil"] = "B"
47 rule["Canada"] = "C"
48 rule["Denmark"] = "D"
49 rule["EU"] = "E"
50 rule["France"] = "F"
51 rule["GB-Eire"] = "G"
52 rule["Halifax"] = "H"
[all …]
H A Dafrica68 # Rule NAME FROM TO - IN ON AT SAVE LETTER/S
69 Rule Algeria 1916 only - Jun 14 23:00s 1:00 S
70 Rule Algeria 1916 1919 - Oct Sun>=1 23:00s 0 -
71 Rule Algeria 1917 only - Mar 24 23:00s 1:00 S
72 Rule Algeria 1918 only - Mar 9 23:00s 1:00 S
73 Rule Algeria 1919 only - Mar 1 23:00s 1:00 S
74 Rule Algeria 1920 only - Feb 14 23:00s 1:00 S
75 Rule Algeria 1920 only - Oct 23 23:00s 0 -
76 Rule Algeria 1921 only - Mar 14 23:00s 1:00 S
77 Rule Algeri
[all...]
H A Deurope389 # Rule NAME FROM TO - IN ON AT SAVE LETTER/S
391 Rule GB-Eire 1916 only - May 21 2:00s 1:00 BST
392 Rule GB-Eire 1916 only - Oct 1 2:00s 0 GMT
394 Rule GB-Eire 1917 only - Apr 8 2:00s 1:00 BST
395 Rule GB-Eire 1917 only - Sep 17 2:00s 0 GMT
397 Rule GB-Eire 1918 only - Mar 24 2:00s 1:00 BST
398 Rule GB-Eire 1918 only - Sep 30 2:00s 0 GMT
400 Rule GB-Eire 1919 only - Mar 30 2:00s 1:00 BST
401 Rule GB-Eire 1919 only - Sep 29 2:00s 0 GMT
403 Rule G
[all...]
H A Dasia70 # Rule NAME FROM TO - IN ON AT SAVE LETTER/S
71 Rule EUAsia 1981 max - Mar lastSun 1:00u 1:00 S
72 Rule EUAsia 1979 1995 - Sep lastSun 1:00u 0 -
73 Rule EUAsia 1996 max - Oct lastSun 1:00u 0 -
74 Rule E-EurAsia 1981 max - Mar lastSun 0:00 1:00 -
75 Rule E-EurAsia 1979 1995 - Sep lastSun 0:00 0 -
76 Rule E-EurAsia 1996 max - Oct lastSun 0:00 0 -
77 Rule RussiaAsia 1981 1984 - Apr 1 0:00 1:00 -
78 Rule RussiaAsia 1981 1983 - Oct 1 0:00 0 -
79 Rule RussiaAsi
[all...]
H A Dnorthamerica176 # Rule NAME FROM TO - IN ON AT SAVE LETTER/S
177 Rule US 1918 1919 - Mar lastSun 2:00 1:00 D
178 Rule US 1918 1919 - Oct lastSun 2:00 0 S
179 Rule US 1942 only - Feb 9 2:00 1:00 W # War
180 Rule US 1945 only - Aug 14 23:00u 1:00 P # Peace
181 Rule US 1945 only - Sep 30 2:00 0 S
182 Rule US 1967 2006 - Oct lastSun 2:00 0 S
183 Rule US 1967 1973 - Apr lastSun 2:00 1:00 D
184 Rule US 1974 only - Jan 6 2:00 1:00 D
185 Rule U
[all...]
H A Dsouthamerica51 # Rule NAME FROM TO - IN ON AT SAVE LETTER/S
52 Rule Arg 1930 only - Dec 1 0:00 1:00 -
53 Rule Arg 1931 only - Apr 1 0:00 0 -
54 Rule Arg 1931 only - Oct 15 0:00 1:00 -
55 Rule Arg 1932 1940 - Mar 1 0:00 0 -
56 Rule Arg 1932 1939 - Nov 1 0:00 1:00 -
57 Rule Arg 1940 only - Jul 1 0:00 1:00 -
58 Rule Arg 1941 only - Jun 15 0:00 0 -
59 Rule Arg 1941 only - Oct 15 0:00 1:00 -
60 Rule Ar
[all...]
H A Daustralasia16 # Rule NAME FROM TO - IN ON AT SAVE LETTER/S
17 Rule Aus 1917 only - Jan 1 2:00s 1:00 D
18 Rule Aus 1917 only - Mar lastSun 2:00s 0 S
19 Rule Aus 1942 only - Jan 1 2:00s 1:00 D
20 Rule Aus 1942 only - Mar lastSun 2:00s 0 S
21 Rule Aus 1942 only - Sep 27 2:00s 1:00 D
22 Rule Aus 1943 1944 - Mar lastSun 2:00s 0 S
23 Rule Aus 1943 only - Oct 3 2:00s 1:00 D
32 # Rule NAME FROM TO - IN ON AT SAVE LETTER/S
33 Rule A
[all...]
/freebsd-src/sys/kern/
H A Dkern_rctl.c124 * 'rctl_rule_link' connects a rule with every racct it's related to.
125 * For example, rule 'user:X:openfiles:deny=N/process' is linked
218 static int rctl_rule_fully_specified(const struct rctl_rule *rule);
219 static void rctl_rule_to_sbuf(struct sbuf *sb, const struct rctl_rule *rule);
331 rctl_proc_rule_to_racct(const struct proc *p, const struct rctl_rule *rule) in rctl_proc_rule_to_racct() argument
338 switch (rule->rr_per) { in rctl_proc_rule_to_racct()
348 panic("%s: unknown per %d", __func__, rule->rr_per); in rctl_proc_rule_to_racct()
354 * hitting 'rule'.
357 rctl_available_resource(const struct proc *p, const struct rctl_rule *rule) in rctl_available_resource() argument
365 racct = rctl_proc_rule_to_racct(p, rule); in rctl_available_resource()
[all …]
/freebsd-src/contrib/libarchive/tar/
H A Dsubst.c55 struct subst_rule *rule;
66 rule = malloc(sizeof(*rule)); in init_substitution()
67 if (rule == NULL) in init_substitution()
69 rule->next = NULL;
70 rule->result = NULL;
73 subst->first_rule = rule; in add_substitution() local
75 subst->last_rule->next = rule; in add_substitution()
76 subst->last_rule = rule; in add_substitution()
90 if ((r = regcomp(&rule in add_substitution()
224 struct subst_rule *rule; apply_substitution() local
332 struct subst_rule *rule; cleanup_substitution() local
[all...]
/freebsd-src/sbin/devfs/
H A Ddevfs.858 most of the commands related to the rule subsystem must be preceded by the
59 .Cm rule
74 .Ss Rule Subsystem
77 rule subsystem provides a way for the administrator of a system to control
93 .Ss Rule Manipulation
94 Rule manipulation commands follow the
95 .Cm rule
97 The following flags are common to all of the rule manipulation commands:
109 .It Cm rule add Oo Ar rulenum Oc Ar rulespec
110 Add the rule described by
[all …]
/freebsd-src/sys/netpfil/pf/
H A Dpf_nv.c505 pf_nvrule_to_krule(const nvlist_t *nvl, struct pf_krule *rule) in pf_nvrule_to_krule() argument
511 PFNV_CHK(pf_nvuint32(nvl, "nr", &rule->nr)); in pf_nvrule_to_krule()
517 &rule->src); in pf_nvrule_to_krule()
525 &rule->dst)); in pf_nvrule_to_krule()
528 PFNV_CHK(pf_nvstring(nvl, "label", rule->label[0], in pf_nvrule_to_krule()
529 sizeof(rule->label[0]))); in pf_nvrule_to_krule()
540 ret = strlcpy(rule->label[i], strs[i], in pf_nvrule_to_krule()
541 sizeof(rule->label[0])); in pf_nvrule_to_krule()
542 if (ret >= sizeof(rule->label[0])) in pf_nvrule_to_krule()
547 PFNV_CHK(pf_nvuint32_opt(nvl, "ridentifier", &rule in pf_nvrule_to_krule()
660 pf_divert_to_nvdivert(const struct pf_krule * rule) pf_divert_to_nvdivert() argument
684 pf_krule_to_nvrule(struct pf_krule * rule) pf_krule_to_nvrule() argument
[all...]
H A Dpf_ioctl.c176 "Size of pf(4) rule tag hashtable");
210 "Make the default rule drop all packets.");
343 /* default rule should never be garbage collected */ in pfattach_vnet()
405 * scrub rule functionality is hopefully removed some day in future. in pfattach_vnet()
436 struct pf_krule *rule; in pf_get_kpool()
452 rule = TAILQ_LAST(ruleset->rules[rs_num].active.ptr, in pf_get_kpool()
455 rule = TAILQ_FIRST(ruleset->rules[rs_num].active.ptr); in pf_get_kpool()
461 rule = TAILQ_LAST(ruleset->rules[rs_num].inactive.ptr, in pf_get_kpool()
464 rule = TAILQ_FIRST(ruleset->rules[rs_num].inactive.ptr); in pf_get_kpool()
467 while ((rule ! in pf_get_kpool()
438 struct pf_krule *rule; pf_get_kpool() local
511 pf_unlink_rule_locked(struct pf_krulequeue * rulequeue,struct pf_krule * rule) pf_unlink_rule_locked() argument
524 pf_unlink_rule(struct pf_krulequeue * rulequeue,struct pf_krule * rule) pf_unlink_rule() argument
535 pf_free_eth_rule(struct pf_keth_rule * rule) pf_free_eth_rule() argument
572 pf_free_rule(struct pf_krule * rule) pf_free_rule() argument
761 struct pf_keth_rule *rule, *tmp; pf_begin_eth() local
804 struct pf_keth_rule *rule, *tmp; pf_rollback_eth() local
1210 struct pf_krule *rule; pf_begin_rules() local
1240 struct pf_krule *rule; pf_rollback_rules() local
1300 pf_hash_rule_rolling(MD5_CTX * ctx,struct pf_krule * rule) pf_hash_rule_rolling() argument
1345 pf_hash_rule(struct pf_krule * rule) pf_hash_rule() argument
1365 struct pf_krule *rule, **old_array, *old_rule; pf_commit_rules() local
1454 struct pf_krule *rule; pf_setup_pfsync_matching() local
1822 struct pf_krule *rule; pf_krule_alloc() local
1832 pf_krule_free(struct pf_krule * rule) pf_krule_free() argument
1868 pf_krule_clear_counters(struct pf_krule * rule) pf_krule_clear_counters() argument
1917 pf_rule_to_krule(const struct pf_rule * rule,struct pf_krule * krule) pf_rule_to_krule() argument
2065 pf_ioctl_addrule(struct pf_krule * rule,uint32_t ticket,uint32_t pool_ticket,const char * anchor,const char * anchor_call,uid_t uid,pid_t pid) pf_ioctl_addrule() argument
2247 pf_label_match(const struct pf_krule * rule,const char * label) pf_label_match() argument
2770 struct pf_keth_rule *rule = NULL; pfioctl() local
2871 struct pf_keth_rule *rule = NULL, *tail = NULL; pfioctl() local
3182 struct pf_krule *rule = NULL; pfioctl() local
3243 struct pf_krule *rule; pfioctl() local
3276 struct pf_krule *rule; pfioctl() local
3967 struct pf_krule *rule; pfioctl() local
[all...]
/freebsd-src/sys/security/mac_bsdextended/
H A Dmac_bsdextended.c80 "BSD Extended MAC rule");
91 &rule_slots, 0, "Number of used rule slots");
105 * between the new mode (first rule matches) and the old functionality (all
111 "Disable/enable match first rule functionality");
114 ugidfw_rule_valid(struct mac_bsdextended_rule *rule)
117 if ((rule->mbr_subject.mbs_flags | MBS_ALL_FLAGS) != MBS_ALL_FLAGS) in ugidfw_rule_valid()
119 if ((rule->mbr_subject.mbs_neg | MBS_ALL_FLAGS) != MBS_ALL_FLAGS) in ugidfw_rule_valid()
121 if ((rule->mbr_object.mbo_flags | MBO_ALL_FLAGS) != MBO_ALL_FLAGS) in ugidfw_rule_valid()
123 if ((rule->mbr_object.mbo_neg | MBO_ALL_FLAGS) != MBO_ALL_FLAGS) in ugidfw_rule_valid()
125 if (((rule in ugidfw_rule_valid()
116 ugidfw_rule_valid(struct mac_bsdextended_rule * rule) ugidfw_rule_valid() argument
227 ugidfw_rulecheck(struct mac_bsdextended_rule * rule,struct ucred * cred,struct vnode * vp,struct vattr * vap,int acc_mode) ugidfw_rulecheck() argument
[all...]
/freebsd-src/sys/security/mac_portacl/
H A Dmac_portacl.c111 struct rule {
117 TAILQ_ENTRY(rule) r_entries;
126 * Text format for the rule string is that a rule consists of a
133 static TAILQ_HEAD(rulehead, rule) rule_head;
139 struct rule *rule; in toast_rules()
141 while ((rule = TAILQ_FIRST(head)) != NULL) { in toast_rules() local
142 TAILQ_REMOVE(head, rule, r_entries); in toast_rules()
143 free(rule, M_PORTAC in toast_rules()
113 struct rule { global() struct
119 r_protocolrule global() argument
173 parse_rule_element(char * element,struct rule ** rule) parse_rule_element() argument
381 struct rule *rule; rules_check() local
[all...]
/freebsd-src/sys/security/mac_ipacl/
H A Dmac_ipacl.c118 bool subnet_apply; /* Apply rule on whole subnet. */
133 struct ip_rule *rule; in destroy_rules()
135 while ((rule = TAILQ_FIRST(head)) != NULL) { in destroy_rules() local
136 TAILQ_REMOVE(head, rule, r_entries); in destroy_rules()
137 free(rule, M_IPACL); in destroy_rules()
159 parse_rule_element(char *element, struct ip_rule *rule)
171 rule->jid = strtol(tok, &p, 10); in parse_rule_element()
177 rule->allow = strtol(tok, &p, 10); in parse_rule_element()
184 strlcpy(rule->if_name, tok, strlen(tok) + 1); in parse_rule_element()
188 rule in parse_rule_element()
161 parse_rule_element(char * element,struct ip_rule * rule) parse_rule_element() argument
322 struct ip_rule *rule; rules_check() local
[all...]
/freebsd-src/tests/sys/mac/ipacl/
H A Dipacl_test.sh71 rule="${jidA},1,${epairA}b,AF_INET,192.0.2.42/-1@"
72 rule="${rule}${jidB},1,${epairB}b,AF_INET,198.51.100.12/-1@"
73 rule="${rule}${jidB},1,,AF_INET,203.0.113.1/24@"
74 rule="${rule}${jidB},0,,AF_INET,203.0.113.9/-1"
75 sysctl security.mac.ipacl.rules="${rule}"
107 rule="${jidA},1,,AF_INET,198.18.0.0/15@"
108 rule="${rule}${jidA},0,,AF_INET,198.18.23.0/24@"
109 rule="${rule}${jidA},1,,AF_INET,198.18.23.1/-1@"
110 rule="${rule}${jidA},1,,AF_INET,198.51.100.0/24@"
111 rule="${rule}${jidA},0,,AF_INET,198.51.100.100/-1"
[all …]
/freebsd-src/share/doc/psd/15.yacc/
H A Dss542 For example, the grammar rule
48 Unfortunately, this grammar rule does not
55 the rule allows this input to be structured as either
78 matches the right side of the grammar rule above.
81 the input by applying this rule;
82 after applying the rule;
85 left side of the rule).
97 it could defer the immediate application of the rule, and continue reading
102 It could then apply the rule to the rightmost three symbols, reducing them to
108 Now the rule can be reduced once more; the effect is to
[all …]
/freebsd-src/usr.bin/rctl/
H A Drctl.c63 warnx("malformed rule '%s': unknown user '%s'", in parse_user()
70 warnx("malformed rule '%s': trailing characters " in parse_user()
91 warnx("malformed rule '%s': unknown group '%s'", in parse_group()
98 warnx("malformed rule '%s': trailing characters " in parse_group()
110 expand_amount(const char *rule, const char *unexpanded_rule) in expand_amount() argument
117 tofree = copy = strdup(rule); in expand_amount()
135 copy = strdup(rule); in expand_amount()
149 warnx("malformed rule '%s': invalid numeric value '%s'", in expand_amount()
175 expand_rule(const char *rule, bool resolve_ids) in expand_rule() argument
182 tofree = copy = strdup(rule); in expand_rule()
[all …]
/freebsd-src/tests/sys/netpfil/pf/ioctl/
H A Dvalidation.c804 struct pfioc_rule rule; in ATF_TC_BODY() local
808 memset(&rule, 0x42, sizeof(rule)); in ATF_TC_BODY()
810 rule.ticket = 0; in ATF_TC_BODY()
811 rule.pool_ticket = 0; in ATF_TC_BODY()
812 rule.anchor[0] = 0; in ATF_TC_BODY()
814 rule.rule.return_icmp = 0; in ATF_TC_BODY()
815 bzero(&rule.rule.src, sizeof(rule.rule.src)); in ATF_TC_BODY()
816 bzero(&rule.rule.dst, sizeof(rule.rule.dst)); in ATF_TC_BODY()
818 rule.rule.ifname[0] = 0; in ATF_TC_BODY()
819 rule.rule.action = 0; in ATF_TC_BODY()
[all …]
/freebsd-src/contrib/elftoolchain/libdwarf/
H A Ddwarf_get_fde_info_for_reg3.332 .Nd retrieve register rule
53 retrieves a register rule from the register rule table associated with
54 a given FDE descriptor, given a program counter address and rule
63 should hold the column number of the register rule desired.
68 desired register rule row.
72 stores information about the register rule found into the locations
85 register rule found.
91 If there is an offset value associated with the register rule,
99 with the register rule.
101 If the register rule is of type
[all …]
/freebsd-src/lib/libugidfw/
H A Dugidfw.c62 bsde_rule_to_string(struct mac_bsdextended_rule *rule, char *buf, size_t buflen) in bsde_rule_to_string() argument
67 char *cur, type[sizeof(rule->mbr_object.mbo_type) * CHAR_BIT + 1]; in bsde_rule_to_string()
79 if (rule->mbr_subject.mbs_flags) { in bsde_rule_to_string()
80 if (rule->mbr_subject.mbs_neg == MBS_ALL_FLAGS) { in bsde_rule_to_string()
91 if (!notdone && (rule->mbr_subject.mbs_neg & MBO_UID_DEFINED)) { in bsde_rule_to_string()
98 if (rule->mbr_subject.mbs_flags & MBO_UID_DEFINED) { in bsde_rule_to_string()
99 pwd = getpwuid(rule->mbr_subject.mbs_uid_min); in bsde_rule_to_string()
109 rule->mbr_subject.mbs_uid_min); in bsde_rule_to_string()
115 if (rule->mbr_subject.mbs_uid_min != in bsde_rule_to_string()
116 rule->mbr_subject.mbs_uid_max) { in bsde_rule_to_string()
[all …]
/freebsd-src/share/man/man5/
H A Dpf.conf.557 Ethernet filtering provides rule-based blocking or passing of Ethernet packets.
62 Queueing provides rule-based bandwidth control.
67 Packet filtering provides rule-based blocking or passing of packets.
116 are relatively fast, making a single rule with tables much more efficient,
119 differ only in IP address (either created explicitly or automatically by rule
130 (see below for details on the various rule types).
176 when the last rule referring to it is flushed.
205 A filter rule is set up to block all traffic coming from addresses listed in
348 The adaptive timeout values can be defined both globally and for each rule.
349 When used on a per-rule basi
[all...]
/freebsd-src/sys/netpfil/ipfw/
H A Dip_fw_sockopt.c34 * Control socket and rule management routines for ipfw.
80 static int check_ipfw_rule1(struct ip_fw_rule *rule, int size,
82 static int check_ipfw_rule0(struct ip_fw_rule0 *rule, int size,
158 set_legacy_obj_kidx(struct ip_fw_chain *ch, struct ip_fw_rule0 *rule);
161 static int ref_rule_objects(struct ip_fw_chain *ch, struct ip_fw *rule,
165 static void unref_rule_objects(struct ip_fw_chain *chain, struct ip_fw *rule);
203 struct ip_fw *rule; in ipfw_alloc_rule() local
205 rule = malloc(rulesize, M_IPFW, M_WAITOK | M_ZERO); in ipfw_alloc_rule()
206 rule->cntr = uma_zalloc_pcpu(V_ipfw_cntr_zone, M_WAITOK | M_ZERO); in ipfw_alloc_rule()
207 rule->refcnt = 1; in ipfw_alloc_rule()
[all …]
/freebsd-src/sbin/ipf/ipf/
H A Dipf.59 For use as a firewall, there are two important rule types: those that block
21 Each rule must contain at least the following three components
64 firewall rule set or which packets should be blocked or allowed in.
67 .SS Filter rule keywords
68 The first word found in any filter rule describes what the eventual outcome
86 when IPFilter successfully matches a packet against a log rule a log
89 So if a packet first matched a block rule and then matched a log rule,
90 the status of the packet after the log rule is that it will still be
98 before the packet is dropped. Thus the count rule canno
[all...]

12345678910>>...54