/freebsd/contrib/bmake/unit-tests/ |
H A D | var-scope-local.exp | 1 Global: .ALLTARGETS = all target-rule.ext dir/subdir/target-rule.ext target-rule.ir-gen-from dir/subdir/target-rule-dir.ir-gen-from inference-rule.ir-to dir/subdir/inference-rule.ir-to inference-rule.ir-from dir/subdir/inference-rule.ir-from inference-rule-chain.ir-to dir/subdir/inference-rule [all...] |
/freebsd/contrib/tzdata/ |
H A D | zishrink.awk | 20 # Return a shortened rule name representing NAME, 36 # Rule names are not part of the tzdb API, so substitute shorter 45 rule["Arg"] = "A" 46 rule["Brazil"] = "B" 47 rule["Canada"] = "C" 48 rule["Denmark"] = "D" 49 rule["EU"] = "E" 50 rule["France"] = "F" 51 rule["GB-Eire"] = "G" 52 rule["Halifax"] = "H" [all …]
|
H A D | africa | 68 # Rule NAME FROM TO - IN ON AT SAVE LETTER/S 69 Rule Algeria 1916 only - Jun 14 23:00s 1:00 S 70 Rule Algeria 1916 1919 - Oct Sun>=1 23:00s 0 - 71 Rule Algeria 1917 only - Mar 24 23:00s 1:00 S 72 Rule Algeria 1918 only - Mar 9 23:00s 1:00 S 73 Rule Algeria 1919 only - Mar 1 23:00s 1:00 S 74 Rule Algeria 1920 only - Feb 14 23:00s 1:00 S 75 Rule Algeria 1920 only - Oct 23 23:00s 0 - 76 Rule Algeria 1921 only - Mar 14 23:00s 1:00 S 77 Rule Algeria 1921 only - Jun 21 23:00s 0 - [all …]
|
H A D | europe | 389 # Rule NAME FROM TO - IN ON AT SAVE LETTER/S 391 Rule GB-Eire 1916 only - May 21 2:00s 1:00 BST 392 Rule GB-Eire 1916 only - Oct 1 2:00s 0 GMT 394 Rule GB-Eire 1917 only - Apr 8 2:00s 1:00 BST 395 Rule GB-Eire 1917 only - Sep 17 2:00s 0 GMT 397 Rule GB-Eire 1918 only - Mar 24 2:00s 1:00 BST 398 Rule GB-Eire 1918 only - Sep 30 2:00s 0 GMT 400 Rule GB-Eire 1919 only - Mar 30 2:00s 1:00 BST 401 Rule GB-Eire 1919 only - Sep 29 2:00s 0 GMT 403 Rule G [all...] |
H A D | asia | 70 # Rule NAME FROM TO - IN ON AT SAVE LETTER/S 71 Rule EUAsia 1981 max - Mar lastSun 1:00u 1:00 S 72 Rule EUAsia 1979 1995 - Sep lastSun 1:00u 0 - 73 Rule EUAsia 1996 max - Oct lastSun 1:00u 0 - 74 Rule E-EurAsia 1981 max - Mar lastSun 0:00 1:00 - 75 Rule E-EurAsia 1979 1995 - Sep lastSun 0:00 0 - 76 Rule E-EurAsia 1996 max - Oct lastSun 0:00 0 - 77 Rule RussiaAsia 1981 1984 - Apr 1 0:00 1:00 - 78 Rule RussiaAsia 1981 1983 - Oct 1 0:00 0 - 79 Rule RussiaAsi [all...] |
H A D | northamerica | 176 # Rule NAME FROM TO - IN ON AT SAVE LETTER/S 177 Rule US 1918 1919 - Mar lastSun 2:00 1:00 D 178 Rule US 1918 1919 - Oct lastSun 2:00 0 S 179 Rule US 1942 only - Feb 9 2:00 1:00 W # War 180 Rule US 1945 only - Aug 14 23:00u 1:00 P # Peace 181 Rule US 1945 only - Sep 30 2:00 0 S 182 Rule US 1967 2006 - Oct lastSun 2:00 0 S 183 Rule US 1967 1973 - Apr lastSun 2:00 1:00 D 184 Rule US 1974 only - Jan 6 2:00 1:00 D 185 Rule U [all...] |
H A D | southamerica | 51 # Rule NAME FROM TO - IN ON AT SAVE LETTER/S 52 Rule Arg 1930 only - Dec 1 0:00 1:00 - 53 Rule Arg 1931 only - Apr 1 0:00 0 - 54 Rule Arg 1931 only - Oct 15 0:00 1:00 - 55 Rule Arg 1932 1940 - Mar 1 0:00 0 - 56 Rule Arg 1932 1939 - Nov 1 0:00 1:00 - 57 Rule Arg 1940 only - Jul 1 0:00 1:00 - 58 Rule Arg 1941 only - Jun 15 0:00 0 - 59 Rule Arg 1941 only - Oct 15 0:00 1:00 - 60 Rule Ar [all...] |
H A D | australasia | 16 # Rule NAME FROM TO - IN ON AT SAVE LETTER/S 17 Rule Aus 1917 only - Jan 1 2:00s 1:00 D 18 Rule Aus 1917 only - Mar lastSun 2:00s 0 S 19 Rule Aus 1942 only - Jan 1 2:00s 1:00 D 20 Rule Aus 1942 only - Mar lastSun 2:00s 0 S 21 Rule Aus 1942 only - Sep 27 2:00s 1:00 D 22 Rule Aus 1943 1944 - Mar lastSun 2:00s 0 S 23 Rule Aus 1943 only - Oct 3 2:00s 1:00 D 32 # Rule NAME FROM TO - IN ON AT SAVE LETTER/S 33 Rule A [all...] |
/freebsd/sys/kern/ |
H A D | kern_rctl.c | 124 * 'rctl_rule_link' connects a rule with every racct it's related to. 125 * For example, rule 'user:X:openfiles:deny=N/process' is linked 218 static int rctl_rule_fully_specified(const struct rctl_rule *rule); 219 static void rctl_rule_to_sbuf(struct sbuf *sb, const struct rctl_rule *rule); 331 rctl_proc_rule_to_racct(const struct proc *p, const struct rctl_rule *rule) in rctl_proc_rule_to_racct() 338 switch (rule->rr_per) { in rctl_proc_rule_to_racct() 348 panic("%s: unknown per %d", __func__, rule->rr_per); in rctl_proc_rule_to_racct() 354 * hitting 'rule'. 357 rctl_available_resource(const struct proc *p, const struct rctl_rule *rule) in rctl_available_resource() 365 racct = rctl_proc_rule_to_racct(p, rule); in rctl_available_resource() 330 rctl_proc_rule_to_racct(const struct proc * p,const struct rctl_rule * rule) rctl_proc_rule_to_racct() argument 356 rctl_available_resource(const struct proc * p,const struct rctl_rule * rule) rctl_available_resource() argument 380 struct rctl_rule *rule; rctl_throttle_decay() local 423 struct rctl_rule *rule; rctl_pcpu_available() local 497 struct rctl_rule *rule; rctl_enforce() local 699 struct rctl_rule *rule; rctl_get_limit() local 726 struct rctl_rule *rule; rctl_get_available() local 763 rctl_rule_matches(const struct rctl_rule * rule,const struct rctl_rule * filter) rctl_rule_matches() argument 881 rctl_racct_add_rule(struct racct * racct,struct rctl_rule * rule) rctl_racct_add_rule() argument 899 rctl_racct_add_rule_locked(struct racct * racct,struct rctl_rule * rule) rctl_racct_add_rule_locked() argument 947 rctl_rule_acquire_subject(struct rctl_rule * rule) rctl_rule_acquire_subject() argument 975 rctl_rule_release_subject(struct rctl_rule * rule) rctl_rule_release_subject() argument 1005 struct rctl_rule *rule; rctl_rule_alloc() local 1027 rctl_rule_duplicate(const struct rctl_rule * rule,int flags) rctl_rule_duplicate() argument 1052 rctl_rule_acquire(struct rctl_rule * rule) rctl_rule_acquire() argument 1064 struct rctl_rule *rule; rctl_rule_free() local 1080 rctl_rule_release(struct rctl_rule * rule) rctl_rule_release() argument 1100 rctl_rule_fully_specified(const struct rctl_rule * rule) rctl_rule_fully_specified() argument 1143 struct rctl_rule *rule; rctl_string_to_rule() local 1271 rctl_rule_add(struct rctl_rule * rule) rctl_rule_add() argument 1475 rctl_rule_to_sbuf(struct sbuf * sb,const struct rctl_rule * rule) rctl_rule_to_sbuf() argument 1875 struct rctl_rule *rule; sys_rctl_add_rule() local 2107 struct rctl_rule *rule; rctl_proc_fork() local [all...] |
/freebsd/contrib/libarchive/tar/ |
H A D | subst.c | 55 struct subst_rule *rule; in add_substitution() local 66 rule = malloc(sizeof(*rule)); in add_substitution() 67 if (rule == NULL) in add_substitution() 69 rule->next = NULL; in add_substitution() 70 rule->result = NULL; in add_substitution() 73 subst->first_rule = rule; in add_substitution() 75 subst->last_rule->next = rule; in add_substitution() 76 subst->last_rule = rule; in add_substitution() 90 if ((r = regcomp(&rule->re, pattern, REG_BASIC)) != 0) { in add_substitution() 92 regerror(r, &rule->re, buf, sizeof(buf)); in add_substitution() [all …]
|
/freebsd/sbin/devfs/ |
H A D | devfs.8 | 58 most of the commands related to the rule subsystem must be preceded by the 59 .Cm rule 74 .Ss Rule Subsystem 77 rule subsystem provides a way for the administrator of a system to control 93 .Ss Rule Manipulation 94 Rule manipulation commands follow the 95 .Cm rule 97 The following flags are common to all of the rule manipulation commands: 109 .It Cm rule add Oo Ar rulenum Oc Ar rulespec 110 Add the rule describe [all...] |
/freebsd/sys/netpfil/pf/ |
H A D | pf_nv.c | 505 pf_nvrule_to_krule(const nvlist_t *nvl, struct pf_krule *rule) in pf_nvrule_to_krule() argument 511 PFNV_CHK(pf_nvuint32(nvl, "nr", &rule->nr)); in pf_nvrule_to_krule() 517 &rule->src); in pf_nvrule_to_krule() 525 &rule->dst)); in pf_nvrule_to_krule() 528 PFNV_CHK(pf_nvstring(nvl, "label", rule->label[0], in pf_nvrule_to_krule() 529 sizeof(rule->label[0]))); in pf_nvrule_to_krule() 540 ret = strlcpy(rule->label[i], strs[i], in pf_nvrule_to_krule() 541 sizeof(rule->label[0])); in pf_nvrule_to_krule() 542 if (ret >= sizeof(rule->label[0])) in pf_nvrule_to_krule() 547 PFNV_CHK(pf_nvuint32_opt(nvl, "ridentifier", &rule->ridentifier, 0)); in pf_nvrule_to_krule() [all …]
|
H A D | pf_ioctl.c | 175 "Size of pf(4) rule tag hashtable"); 209 "Make the default rule drop all packets."); 342 /* default rule should never be garbage collected */ in pfattach_vnet() 405 * scrub rule functionality is hopefully removed some day in future. in pfattach_vnet() 436 struct pf_krule *rule; in pf_get_kpool() local 452 rule = TAILQ_LAST(ruleset->rules[rs_num].active.ptr, in pf_get_kpool() 455 rule = TAILQ_FIRST(ruleset->rules[rs_num].active.ptr); in pf_get_kpool() 461 rule = TAILQ_LAST(ruleset->rules[rs_num].inactive.ptr, in pf_get_kpool() 464 rule = TAILQ_FIRST(ruleset->rules[rs_num].inactive.ptr); in pf_get_kpool() 467 while ((rule != NULL) && (rule->nr != rule_number)) in pf_get_kpool() [all …]
|
/freebsd/sys/security/mac_bsdextended/ |
H A D | mac_bsdextended.c | 80 "BSD Extended MAC rule"); 91 &rule_slots, 0, "Number of used rule slots"); 105 * between the new mode (first rule matches) and the old functionality (all 111 "Disable/enable match first rule functionality"); 114 ugidfw_rule_valid(struct mac_bsdextended_rule *rule) in ugidfw_rule_valid() argument 117 if ((rule->mbr_subject.mbs_flags | MBS_ALL_FLAGS) != MBS_ALL_FLAGS) in ugidfw_rule_valid() 119 if ((rule->mbr_subject.mbs_neg | MBS_ALL_FLAGS) != MBS_ALL_FLAGS) in ugidfw_rule_valid() 121 if ((rule->mbr_object.mbo_flags | MBO_ALL_FLAGS) != MBO_ALL_FLAGS) in ugidfw_rule_valid() 123 if ((rule->mbr_object.mbo_neg | MBO_ALL_FLAGS) != MBO_ALL_FLAGS) in ugidfw_rule_valid() 125 if (((rule->mbr_object.mbo_flags & MBO_TYPE_DEFINED) != 0) && in ugidfw_rule_valid() [all …]
|
/freebsd/sys/net/ |
H A D | dummymbuf.c | 121 "QU", "Number of times a rule has been applied"); 144 #define FEEDBACK_RULE(rule, msg) \ argument 147 (rule).syntax_len, (rule).syntax_begin \ 150 #define FEEDBACK_PFIL(pfil_type, pfil_flags, ifp, rule, msg) \ argument 159 (rule).syntax_len, (rule).syntax_begin \ 166 struct rule; 167 typedef struct mbuf * (*op_t)(struct mbuf *, struct rule *); 168 struct rule { struct 179 dmb_m_pull_head(struct mbuf * m,struct rule * rule) dmb_m_pull_head() argument 213 read_rule(const char ** cur,struct rule * rule,bool * eof) read_rule() argument 306 struct rule rule; validate_rules() local 330 struct rule rule; dmb_pfil_mbuf_chk() local [all...] |
/freebsd/sys/security/mac_portacl/ |
H A D | mac_portacl.c | 111 struct rule { struct 117 TAILQ_ENTRY(rule) r_entries; argument 126 * Text format for the rule string is that a rule consists of a 133 static TAILQ_HEAD(rulehead, rule) rule_head; 139 struct rule *rule; in toast_rules() local 141 while ((rule = TAILQ_FIRST(head)) != NULL) { in toast_rules() 142 TAILQ_REMOVE(head, rule, r_entries); in toast_rules() 143 free(rule, M_PORTACL); in toast_rules() 171 parse_rule_element(char *element, struct rule **rule) in parse_rule_element() argument 174 struct rule *new; in parse_rule_element() [all …]
|
/freebsd/sys/security/mac_ipacl/ |
H A D | mac_ipacl.c | 118 bool subnet_apply; /* Apply rule on whole subnet. */ 133 struct ip_rule *rule; in destroy_rules() local 135 while ((rule = TAILQ_FIRST(head)) != NULL) { in destroy_rules() 136 TAILQ_REMOVE(head, rule, r_entries); in destroy_rules() 137 free(rule, M_IPACL); in destroy_rules() 159 parse_rule_element(char *element, struct ip_rule *rule) in parse_rule_element() argument 171 rule->jid = strtol(tok, &p, 10); in parse_rule_element() 177 rule->allow = strtol(tok, &p, 10); in parse_rule_element() 184 strlcpy(rule->if_name, tok, strlen(tok) + 1); in parse_rule_element() 188 rule->af = (strcmp(tok, "AF_INET") == 0) ? AF_INET : in parse_rule_element() [all …]
|
/freebsd/tests/sys/mac/ipacl/ |
H A D | ipacl_test.sh | 71 rule="${jidA},1,${epairA}b,AF_INET,192.0.2.42/-1@" 72 rule="${rule}${jidB},1,${epairB}b,AF_INET,198.51.100.12/-1@" 73 rule="${rule}${jidB},1,,AF_INET,203.0.113.1/24@" 74 rule="${rule}${jidB},0,,AF_INET,203.0.113.9/-1" 75 sysctl security.mac.ipacl.rules="${rule}" 107 rule="${jidA},1,,AF_INET,198.18.0.0/15@" 108 rule="${rule}${jidA},0,,AF_INET,198.18.23.0/24@" 109 rule="${rule}${jidA},1,,AF_INET,198.18.23.1/-1@" 110 rule="${rule}${jidA},1,,AF_INET,198.51.100.0/24@" 111 rule="${rule}${jidA},0,,AF_INET,198.51.100.100/-1" [all …]
|
/freebsd/usr.bin/rctl/ |
H A D | rctl.c | 63 warnx("malformed rule '%s': unknown user '%s'", in parse_user() 70 warnx("malformed rule '%s': trailing characters " in parse_user() 91 warnx("malformed rule '%s': unknown group '%s'", in parse_group() 98 warnx("malformed rule '%s': trailing characters " in parse_group() 110 expand_amount(const char *rule, const char *unexpanded_rule) in expand_amount() argument 117 tofree = copy = strdup(rule); in expand_amount() 135 copy = strdup(rule); in expand_amount() 149 warnx("malformed rule '%s': invalid numeric value '%s'", in expand_amount() 175 expand_rule(const char *rule, bool resolve_ids) in expand_rule() argument 182 tofree = copy = strdup(rule); in expand_rule() [all …]
|
/freebsd/tests/sys/netpfil/pf/ioctl/ |
H A D | validation.c | 804 struct pfioc_rule rule; in ATF_TC_BODY() local 808 memset(&rule, 0x42, sizeof(rule)); in ATF_TC_BODY() 810 rule.ticket = 0; in ATF_TC_BODY() 811 rule.pool_ticket = 0; in ATF_TC_BODY() 812 rule.anchor[0] = 0; in ATF_TC_BODY() 814 rule.rule.return_icmp = 0; in ATF_TC_BODY() 815 bzero(&rule.rule.src, sizeof(rule.rule.src)); in ATF_TC_BODY() 816 bzero(&rule.rule.dst, sizeof(rule.rule.dst)); in ATF_TC_BODY() 818 rule.rule.ifname[0] = 0; in ATF_TC_BODY() 819 rule.rule.action = 0; in ATF_TC_BODY() [all …]
|
/freebsd/share/doc/psd/15.yacc/ |
H A D | ss5 | 42 For example, the grammar rule 48 Unfortunately, this grammar rule does not 55 the rule allows this input to be structured as either 78 matches the right side of the grammar rule above. 81 the input by applying this rule; 82 after applying the rule; 85 left side of the rule). 97 it could defer the immediate application of the rule, and continue reading 102 It could then apply the rule to the rightmost three symbols, reducing them to 108 Now the rule can be reduced once more; the effect is to [all …]
|
/freebsd/sys/dev/mlx5/mlx5_accel/ |
H A D | mlx5_ipsec_fs.c | 110 struct mlx5_flow_handle *rule; member 116 struct mlx5_flow_handle *rule; member 124 struct mlx5e_ipsec_rule kspi_bypass_rule; /*rule for IPSEC bypass*/ 134 struct mlx5_flow_handle *rule; member 335 /* Create miss rule */ in ipsec_miss_create() 336 miss->rule = mlx5_add_flow_rules(ft, NULL, &flow_act, dest, 1); in ipsec_miss_create() 337 if (IS_ERR(miss->rule)) { in ipsec_miss_create() 339 err = PTR_ERR(miss->rule); in ipsec_miss_create() 526 struct mlx5_flow_handle *rule; in rx_add_rule() local 589 rule = mlx5_add_flow_rules(rx->ft.sa, spec, &flow_act, dest, 2); in rx_add_rule() [all …]
|
/freebsd/lib/libugidfw/ |
H A D | ugidfw.c | 62 bsde_rule_to_string(struct mac_bsdextended_rule *rule, char *buf, size_t buflen) in bsde_rule_to_string() argument 67 char *cur, type[sizeof(rule->mbr_object.mbo_type) * CHAR_BIT + 1]; in bsde_rule_to_string() 79 if (rule->mbr_subject.mbs_flags) { in bsde_rule_to_string() 80 if (rule->mbr_subject.mbs_neg == MBS_ALL_FLAGS) { in bsde_rule_to_string() 91 if (!notdone && (rule->mbr_subject.mbs_neg & MBO_UID_DEFINED)) { in bsde_rule_to_string() 98 if (rule->mbr_subject.mbs_flags & MBO_UID_DEFINED) { in bsde_rule_to_string() 99 pwd = getpwuid(rule->mbr_subject.mbs_uid_min); in bsde_rule_to_string() 109 rule->mbr_subject.mbs_uid_min); in bsde_rule_to_string() 115 if (rule->mbr_subject.mbs_uid_min != in bsde_rule_to_string() 116 rule->mbr_subject.mbs_uid_max) { in bsde_rule_to_string() [all …]
|
/freebsd/contrib/elftoolchain/libdwarf/ |
H A D | dwarf_get_fde_info_for_reg3.3 | 32 .Nd retrieve register rule 53 retrieves a register rule from the register rule table associated with 54 a given FDE descriptor, given a program counter address and rule 63 should hold the column number of the register rule desired. 68 desired register rule row. 72 stores information about the register rule found into the locations 85 register rule found. 91 If there is an offset value associated with the register rule, 99 with the register rule. 101 If the register rule is of type [all …]
|
/freebsd/sbin/ipf/ipf/ |
H A D | ipf.5 | 9 For use as a firewall, there are two important rule types: those that block 21 Each rule must contain at least the following three components 64 firewall rule set or which packets should be blocked or allowed in. 67 .SS Filter rule keywords 68 The first word found in any filter rule describes what the eventual outcome 86 when IPFilter successfully matches a packet against a log rule a log 89 So if a packet first matched a block rule and then matched a log rule, 90 the status of the packet after the log rule is that it will still be 98 before the packet is dropped. Thus the count rule cannot be used as 112 with the rule. [all …]
|