Home
last modified time | relevance | path

Searched full:rule (Results 1 – 25 of 1243) sorted by relevance

12345678910>>...50

/freebsd/contrib/bmake/unit-tests/
H A Dvar-scope-local.exp1 Global: .ALLTARGETS = all target-rule.ext dir/subdir/target-rule.ext target-rule.ir-gen-from dir/subdir/target-rule-dir.ir-gen-from inference-rule.ir-to dir/subdir/inference-rule.ir-to inference-rule.ir-from dir/subdir/inference-rule.ir-from inference-rule-chain.ir-to dir/subdir/inference-rule
[all...]
/freebsd/contrib/tzdata/
H A Dzishrink.awk20 # Return a shortened rule name representing NAME,
36 # Rule names are not part of the tzdb API, so substitute shorter
45 rule["Arg"] = "A"
46 rule["Brazil"] = "B"
47 rule["Canada"] = "C"
48 rule["Denmark"] = "D"
49 rule["EU"] = "E"
50 rule["France"] = "F"
51 rule["GB-Eire"] = "G"
52 rule["Halifax"] = "H"
[all …]
H A Dafrica68 # Rule NAME FROM TO - IN ON AT SAVE LETTER/S
69 Rule Algeria 1916 only - Jun 14 23:00s 1:00 S
70 Rule Algeria 1916 1919 - Oct Sun>=1 23:00s 0 -
71 Rule Algeria 1917 only - Mar 24 23:00s 1:00 S
72 Rule Algeria 1918 only - Mar 9 23:00s 1:00 S
73 Rule Algeria 1919 only - Mar 1 23:00s 1:00 S
74 Rule Algeria 1920 only - Feb 14 23:00s 1:00 S
75 Rule Algeria 1920 only - Oct 23 23:00s 0 -
76 Rule Algeria 1921 only - Mar 14 23:00s 1:00 S
77 Rule Algeria 1921 only - Jun 21 23:00s 0 -
[all …]
H A Deurope389 # Rule NAME FROM TO - IN ON AT SAVE LETTER/S
391 Rule GB-Eire 1916 only - May 21 2:00s 1:00 BST
392 Rule GB-Eire 1916 only - Oct 1 2:00s 0 GMT
394 Rule GB-Eire 1917 only - Apr 8 2:00s 1:00 BST
395 Rule GB-Eire 1917 only - Sep 17 2:00s 0 GMT
397 Rule GB-Eire 1918 only - Mar 24 2:00s 1:00 BST
398 Rule GB-Eire 1918 only - Sep 30 2:00s 0 GMT
400 Rule GB-Eire 1919 only - Mar 30 2:00s 1:00 BST
401 Rule GB-Eire 1919 only - Sep 29 2:00s 0 GMT
403 Rule G
[all...]
H A Dasia70 # Rule NAME FROM TO - IN ON AT SAVE LETTER/S
71 Rule EUAsia 1981 max - Mar lastSun 1:00u 1:00 S
72 Rule EUAsia 1979 1995 - Sep lastSun 1:00u 0 -
73 Rule EUAsia 1996 max - Oct lastSun 1:00u 0 -
74 Rule E-EurAsia 1981 max - Mar lastSun 0:00 1:00 -
75 Rule E-EurAsia 1979 1995 - Sep lastSun 0:00 0 -
76 Rule E-EurAsia 1996 max - Oct lastSun 0:00 0 -
77 Rule RussiaAsia 1981 1984 - Apr 1 0:00 1:00 -
78 Rule RussiaAsia 1981 1983 - Oct 1 0:00 0 -
79 Rule RussiaAsi
[all...]
H A Dnorthamerica176 # Rule NAME FROM TO - IN ON AT SAVE LETTER/S
177 Rule US 1918 1919 - Mar lastSun 2:00 1:00 D
178 Rule US 1918 1919 - Oct lastSun 2:00 0 S
179 Rule US 1942 only - Feb 9 2:00 1:00 W # War
180 Rule US 1945 only - Aug 14 23:00u 1:00 P # Peace
181 Rule US 1945 only - Sep 30 2:00 0 S
182 Rule US 1967 2006 - Oct lastSun 2:00 0 S
183 Rule US 1967 1973 - Apr lastSun 2:00 1:00 D
184 Rule US 1974 only - Jan 6 2:00 1:00 D
185 Rule U
[all...]
H A Dsouthamerica51 # Rule NAME FROM TO - IN ON AT SAVE LETTER/S
52 Rule Arg 1930 only - Dec 1 0:00 1:00 -
53 Rule Arg 1931 only - Apr 1 0:00 0 -
54 Rule Arg 1931 only - Oct 15 0:00 1:00 -
55 Rule Arg 1932 1940 - Mar 1 0:00 0 -
56 Rule Arg 1932 1939 - Nov 1 0:00 1:00 -
57 Rule Arg 1940 only - Jul 1 0:00 1:00 -
58 Rule Arg 1941 only - Jun 15 0:00 0 -
59 Rule Arg 1941 only - Oct 15 0:00 1:00 -
60 Rule Ar
[all...]
H A Daustralasia16 # Rule NAME FROM TO - IN ON AT SAVE LETTER/S
17 Rule Aus 1917 only - Jan 1 2:00s 1:00 D
18 Rule Aus 1917 only - Mar lastSun 2:00s 0 S
19 Rule Aus 1942 only - Jan 1 2:00s 1:00 D
20 Rule Aus 1942 only - Mar lastSun 2:00s 0 S
21 Rule Aus 1942 only - Sep 27 2:00s 1:00 D
22 Rule Aus 1943 1944 - Mar lastSun 2:00s 0 S
23 Rule Aus 1943 only - Oct 3 2:00s 1:00 D
32 # Rule NAME FROM TO - IN ON AT SAVE LETTER/S
33 Rule A
[all...]
/freebsd/sys/kern/
H A Dkern_rctl.c124 * 'rctl_rule_link' connects a rule with every racct it's related to.
125 * For example, rule 'user:X:openfiles:deny=N/process' is linked
218 static int rctl_rule_fully_specified(const struct rctl_rule *rule);
219 static void rctl_rule_to_sbuf(struct sbuf *sb, const struct rctl_rule *rule);
331 rctl_proc_rule_to_racct(const struct proc *p, const struct rctl_rule *rule) in rctl_proc_rule_to_racct()
338 switch (rule->rr_per) { in rctl_proc_rule_to_racct()
348 panic("%s: unknown per %d", __func__, rule->rr_per); in rctl_proc_rule_to_racct()
354 * hitting 'rule'.
357 rctl_available_resource(const struct proc *p, const struct rctl_rule *rule) in rctl_available_resource()
365 racct = rctl_proc_rule_to_racct(p, rule); in rctl_available_resource()
330 rctl_proc_rule_to_racct(const struct proc * p,const struct rctl_rule * rule) rctl_proc_rule_to_racct() argument
356 rctl_available_resource(const struct proc * p,const struct rctl_rule * rule) rctl_available_resource() argument
380 struct rctl_rule *rule; rctl_throttle_decay() local
423 struct rctl_rule *rule; rctl_pcpu_available() local
497 struct rctl_rule *rule; rctl_enforce() local
699 struct rctl_rule *rule; rctl_get_limit() local
726 struct rctl_rule *rule; rctl_get_available() local
763 rctl_rule_matches(const struct rctl_rule * rule,const struct rctl_rule * filter) rctl_rule_matches() argument
881 rctl_racct_add_rule(struct racct * racct,struct rctl_rule * rule) rctl_racct_add_rule() argument
899 rctl_racct_add_rule_locked(struct racct * racct,struct rctl_rule * rule) rctl_racct_add_rule_locked() argument
947 rctl_rule_acquire_subject(struct rctl_rule * rule) rctl_rule_acquire_subject() argument
975 rctl_rule_release_subject(struct rctl_rule * rule) rctl_rule_release_subject() argument
1005 struct rctl_rule *rule; rctl_rule_alloc() local
1027 rctl_rule_duplicate(const struct rctl_rule * rule,int flags) rctl_rule_duplicate() argument
1052 rctl_rule_acquire(struct rctl_rule * rule) rctl_rule_acquire() argument
1064 struct rctl_rule *rule; rctl_rule_free() local
1080 rctl_rule_release(struct rctl_rule * rule) rctl_rule_release() argument
1100 rctl_rule_fully_specified(const struct rctl_rule * rule) rctl_rule_fully_specified() argument
1143 struct rctl_rule *rule; rctl_string_to_rule() local
1271 rctl_rule_add(struct rctl_rule * rule) rctl_rule_add() argument
1475 rctl_rule_to_sbuf(struct sbuf * sb,const struct rctl_rule * rule) rctl_rule_to_sbuf() argument
1875 struct rctl_rule *rule; sys_rctl_add_rule() local
2107 struct rctl_rule *rule; rctl_proc_fork() local
[all...]
/freebsd/contrib/libarchive/tar/
H A Dsubst.c55 struct subst_rule *rule; in add_substitution() local
66 rule = malloc(sizeof(*rule)); in add_substitution()
67 if (rule == NULL) in add_substitution()
69 rule->next = NULL; in add_substitution()
70 rule->result = NULL; in add_substitution()
73 subst->first_rule = rule; in add_substitution()
75 subst->last_rule->next = rule; in add_substitution()
76 subst->last_rule = rule; in add_substitution()
90 if ((r = regcomp(&rule->re, pattern, REG_BASIC)) != 0) { in add_substitution()
92 regerror(r, &rule->re, buf, sizeof(buf)); in add_substitution()
[all …]
/freebsd/sbin/devfs/
H A Ddevfs.858 most of the commands related to the rule subsystem must be preceded by the
59 .Cm rule
74 .Ss Rule Subsystem
77 rule subsystem provides a way for the administrator of a system to control
93 .Ss Rule Manipulation
94 Rule manipulation commands follow the
95 .Cm rule
97 The following flags are common to all of the rule manipulation commands:
109 .It Cm rule add Oo Ar rulenum Oc Ar rulespec
110 Add the rule describe
[all...]
/freebsd/sys/netpfil/pf/
H A Dpf_nv.c505 pf_nvrule_to_krule(const nvlist_t *nvl, struct pf_krule *rule) in pf_nvrule_to_krule() argument
511 PFNV_CHK(pf_nvuint32(nvl, "nr", &rule->nr)); in pf_nvrule_to_krule()
517 &rule->src); in pf_nvrule_to_krule()
525 &rule->dst)); in pf_nvrule_to_krule()
528 PFNV_CHK(pf_nvstring(nvl, "label", rule->label[0], in pf_nvrule_to_krule()
529 sizeof(rule->label[0]))); in pf_nvrule_to_krule()
540 ret = strlcpy(rule->label[i], strs[i], in pf_nvrule_to_krule()
541 sizeof(rule->label[0])); in pf_nvrule_to_krule()
542 if (ret >= sizeof(rule->label[0])) in pf_nvrule_to_krule()
547 PFNV_CHK(pf_nvuint32_opt(nvl, "ridentifier", &rule->ridentifier, 0)); in pf_nvrule_to_krule()
[all …]
H A Dpf_ioctl.c175 "Size of pf(4) rule tag hashtable");
209 "Make the default rule drop all packets.");
342 /* default rule should never be garbage collected */ in pfattach_vnet()
405 * scrub rule functionality is hopefully removed some day in future. in pfattach_vnet()
436 struct pf_krule *rule; in pf_get_kpool() local
452 rule = TAILQ_LAST(ruleset->rules[rs_num].active.ptr, in pf_get_kpool()
455 rule = TAILQ_FIRST(ruleset->rules[rs_num].active.ptr); in pf_get_kpool()
461 rule = TAILQ_LAST(ruleset->rules[rs_num].inactive.ptr, in pf_get_kpool()
464 rule = TAILQ_FIRST(ruleset->rules[rs_num].inactive.ptr); in pf_get_kpool()
467 while ((rule != NULL) && (rule->nr != rule_number)) in pf_get_kpool()
[all …]
/freebsd/sys/security/mac_bsdextended/
H A Dmac_bsdextended.c80 "BSD Extended MAC rule");
91 &rule_slots, 0, "Number of used rule slots");
105 * between the new mode (first rule matches) and the old functionality (all
111 "Disable/enable match first rule functionality");
114 ugidfw_rule_valid(struct mac_bsdextended_rule *rule) in ugidfw_rule_valid() argument
117 if ((rule->mbr_subject.mbs_flags | MBS_ALL_FLAGS) != MBS_ALL_FLAGS) in ugidfw_rule_valid()
119 if ((rule->mbr_subject.mbs_neg | MBS_ALL_FLAGS) != MBS_ALL_FLAGS) in ugidfw_rule_valid()
121 if ((rule->mbr_object.mbo_flags | MBO_ALL_FLAGS) != MBO_ALL_FLAGS) in ugidfw_rule_valid()
123 if ((rule->mbr_object.mbo_neg | MBO_ALL_FLAGS) != MBO_ALL_FLAGS) in ugidfw_rule_valid()
125 if (((rule->mbr_object.mbo_flags & MBO_TYPE_DEFINED) != 0) && in ugidfw_rule_valid()
[all …]
/freebsd/sys/net/
H A Ddummymbuf.c121 "QU", "Number of times a rule has been applied");
144 #define FEEDBACK_RULE(rule, msg) \ argument
147 (rule).syntax_len, (rule).syntax_begin \
150 #define FEEDBACK_PFIL(pfil_type, pfil_flags, ifp, rule, msg) \ argument
159 (rule).syntax_len, (rule).syntax_begin \
166 struct rule;
167 typedef struct mbuf * (*op_t)(struct mbuf *, struct rule *);
168 struct rule { struct
179 dmb_m_pull_head(struct mbuf * m,struct rule * rule) dmb_m_pull_head() argument
213 read_rule(const char ** cur,struct rule * rule,bool * eof) read_rule() argument
306 struct rule rule; validate_rules() local
330 struct rule rule; dmb_pfil_mbuf_chk() local
[all...]
/freebsd/sys/security/mac_portacl/
H A Dmac_portacl.c111 struct rule { struct
117 TAILQ_ENTRY(rule) r_entries; argument
126 * Text format for the rule string is that a rule consists of a
133 static TAILQ_HEAD(rulehead, rule) rule_head;
139 struct rule *rule; in toast_rules() local
141 while ((rule = TAILQ_FIRST(head)) != NULL) { in toast_rules()
142 TAILQ_REMOVE(head, rule, r_entries); in toast_rules()
143 free(rule, M_PORTACL); in toast_rules()
171 parse_rule_element(char *element, struct rule **rule) in parse_rule_element() argument
174 struct rule *new; in parse_rule_element()
[all …]
/freebsd/sys/security/mac_ipacl/
H A Dmac_ipacl.c118 bool subnet_apply; /* Apply rule on whole subnet. */
133 struct ip_rule *rule; in destroy_rules() local
135 while ((rule = TAILQ_FIRST(head)) != NULL) { in destroy_rules()
136 TAILQ_REMOVE(head, rule, r_entries); in destroy_rules()
137 free(rule, M_IPACL); in destroy_rules()
159 parse_rule_element(char *element, struct ip_rule *rule) in parse_rule_element() argument
171 rule->jid = strtol(tok, &p, 10); in parse_rule_element()
177 rule->allow = strtol(tok, &p, 10); in parse_rule_element()
184 strlcpy(rule->if_name, tok, strlen(tok) + 1); in parse_rule_element()
188 rule->af = (strcmp(tok, "AF_INET") == 0) ? AF_INET : in parse_rule_element()
[all …]
/freebsd/tests/sys/mac/ipacl/
H A Dipacl_test.sh71 rule="${jidA},1,${epairA}b,AF_INET,192.0.2.42/-1@"
72 rule="${rule}${jidB},1,${epairB}b,AF_INET,198.51.100.12/-1@"
73 rule="${rule}${jidB},1,,AF_INET,203.0.113.1/24@"
74 rule="${rule}${jidB},0,,AF_INET,203.0.113.9/-1"
75 sysctl security.mac.ipacl.rules="${rule}"
107 rule="${jidA},1,,AF_INET,198.18.0.0/15@"
108 rule="${rule}${jidA},0,,AF_INET,198.18.23.0/24@"
109 rule="${rule}${jidA},1,,AF_INET,198.18.23.1/-1@"
110 rule="${rule}${jidA},1,,AF_INET,198.51.100.0/24@"
111 rule="${rule}${jidA},0,,AF_INET,198.51.100.100/-1"
[all …]
/freebsd/usr.bin/rctl/
H A Drctl.c63 warnx("malformed rule '%s': unknown user '%s'", in parse_user()
70 warnx("malformed rule '%s': trailing characters " in parse_user()
91 warnx("malformed rule '%s': unknown group '%s'", in parse_group()
98 warnx("malformed rule '%s': trailing characters " in parse_group()
110 expand_amount(const char *rule, const char *unexpanded_rule) in expand_amount() argument
117 tofree = copy = strdup(rule); in expand_amount()
135 copy = strdup(rule); in expand_amount()
149 warnx("malformed rule '%s': invalid numeric value '%s'", in expand_amount()
175 expand_rule(const char *rule, bool resolve_ids) in expand_rule() argument
182 tofree = copy = strdup(rule); in expand_rule()
[all …]
/freebsd/tests/sys/netpfil/pf/ioctl/
H A Dvalidation.c804 struct pfioc_rule rule; in ATF_TC_BODY() local
808 memset(&rule, 0x42, sizeof(rule)); in ATF_TC_BODY()
810 rule.ticket = 0; in ATF_TC_BODY()
811 rule.pool_ticket = 0; in ATF_TC_BODY()
812 rule.anchor[0] = 0; in ATF_TC_BODY()
814 rule.rule.return_icmp = 0; in ATF_TC_BODY()
815 bzero(&rule.rule.src, sizeof(rule.rule.src)); in ATF_TC_BODY()
816 bzero(&rule.rule.dst, sizeof(rule.rule.dst)); in ATF_TC_BODY()
818 rule.rule.ifname[0] = 0; in ATF_TC_BODY()
819 rule.rule.action = 0; in ATF_TC_BODY()
[all …]
/freebsd/share/doc/psd/15.yacc/
H A Dss542 For example, the grammar rule
48 Unfortunately, this grammar rule does not
55 the rule allows this input to be structured as either
78 matches the right side of the grammar rule above.
81 the input by applying this rule;
82 after applying the rule;
85 left side of the rule).
97 it could defer the immediate application of the rule, and continue reading
102 It could then apply the rule to the rightmost three symbols, reducing them to
108 Now the rule can be reduced once more; the effect is to
[all …]
/freebsd/sys/dev/mlx5/mlx5_accel/
H A Dmlx5_ipsec_fs.c110 struct mlx5_flow_handle *rule; member
116 struct mlx5_flow_handle *rule; member
124 struct mlx5e_ipsec_rule kspi_bypass_rule; /*rule for IPSEC bypass*/
134 struct mlx5_flow_handle *rule; member
335 /* Create miss rule */ in ipsec_miss_create()
336 miss->rule = mlx5_add_flow_rules(ft, NULL, &flow_act, dest, 1); in ipsec_miss_create()
337 if (IS_ERR(miss->rule)) { in ipsec_miss_create()
339 err = PTR_ERR(miss->rule); in ipsec_miss_create()
526 struct mlx5_flow_handle *rule; in rx_add_rule() local
589 rule = mlx5_add_flow_rules(rx->ft.sa, spec, &flow_act, dest, 2); in rx_add_rule()
[all …]
/freebsd/lib/libugidfw/
H A Dugidfw.c62 bsde_rule_to_string(struct mac_bsdextended_rule *rule, char *buf, size_t buflen) in bsde_rule_to_string() argument
67 char *cur, type[sizeof(rule->mbr_object.mbo_type) * CHAR_BIT + 1]; in bsde_rule_to_string()
79 if (rule->mbr_subject.mbs_flags) { in bsde_rule_to_string()
80 if (rule->mbr_subject.mbs_neg == MBS_ALL_FLAGS) { in bsde_rule_to_string()
91 if (!notdone && (rule->mbr_subject.mbs_neg & MBO_UID_DEFINED)) { in bsde_rule_to_string()
98 if (rule->mbr_subject.mbs_flags & MBO_UID_DEFINED) { in bsde_rule_to_string()
99 pwd = getpwuid(rule->mbr_subject.mbs_uid_min); in bsde_rule_to_string()
109 rule->mbr_subject.mbs_uid_min); in bsde_rule_to_string()
115 if (rule->mbr_subject.mbs_uid_min != in bsde_rule_to_string()
116 rule->mbr_subject.mbs_uid_max) { in bsde_rule_to_string()
[all …]
/freebsd/contrib/elftoolchain/libdwarf/
H A Ddwarf_get_fde_info_for_reg3.332 .Nd retrieve register rule
53 retrieves a register rule from the register rule table associated with
54 a given FDE descriptor, given a program counter address and rule
63 should hold the column number of the register rule desired.
68 desired register rule row.
72 stores information about the register rule found into the locations
85 register rule found.
91 If there is an offset value associated with the register rule,
99 with the register rule.
101 If the register rule is of type
[all …]
/freebsd/sbin/ipf/ipf/
H A Dipf.59 For use as a firewall, there are two important rule types: those that block
21 Each rule must contain at least the following three components
64 firewall rule set or which packets should be blocked or allowed in.
67 .SS Filter rule keywords
68 The first word found in any filter rule describes what the eventual outcome
86 when IPFilter successfully matches a packet against a log rule a log
89 So if a packet first matched a block rule and then matched a log rule,
90 the status of the packet after the log rule is that it will still be
98 before the packet is dropped. Thus the count rule cannot be used as
112 with the rule.
[all …]

12345678910>>...50