Author: trasz
Date: Wed Mar 30 18:27:52 2011
New Revision: 220166
URL: http://svn.freebsd.org/changeset/base/220166

Log:
  Add rctl(8), the utility to manage rctl rules.
  
  Sponsored by: The FreeBSD Foundation
  Reviewed by:  kib (earlier version)

Added:
  head/usr.bin/rctl/
  head/usr.bin/rctl/Makefile   (contents, props changed)
  head/usr.bin/rctl/rctl.8   (contents, props changed)
  head/usr.bin/rctl/rctl.c   (contents, props changed)
Modified:
  head/usr.bin/Makefile

Modified: head/usr.bin/Makefile
==============================================================================
--- head/usr.bin/Makefile       Wed Mar 30 18:08:31 2011        (r220165)
+++ head/usr.bin/Makefile       Wed Mar 30 18:27:52 2011        (r220166)
@@ -126,6 +126,7 @@ SUBDIR=     alias \
        printenv \
        printf \
        procstat \
+       rctl \
        renice \
        rev \
        revoke \

Added: head/usr.bin/rctl/Makefile
==============================================================================
--- /dev/null   00:00:00 1970   (empty, because file is newly added)
+++ head/usr.bin/rctl/Makefile  Wed Mar 30 18:27:52 2011        (r220166)
@@ -0,0 +1,11 @@
+# $FreeBSD$
+
+PROG=   rctl
+MAN=   rctl.8
+
+DPADD= ${LIBUTIL}
+LDADD= -lutil
+
+WARNS?=        6
+
+.include <bsd.prog.mk>

Added: head/usr.bin/rctl/rctl.8
==============================================================================
--- /dev/null   00:00:00 1970   (empty, because file is newly added)
+++ head/usr.bin/rctl/rctl.8    Wed Mar 30 18:27:52 2011        (r220166)
@@ -0,0 +1,200 @@
+.\"-
+.\" Copyright (c) 2009 Edward Tomasz Napierala
+.\" All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\"    notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\"    notice, this list of conditions and the following disclaimer in the
+.\"    documentation and/or other materials provided with the distribution.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR THE VOICES IN HIS HEAD BE
+.\" LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
+.\" CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+.\" SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
+.\" INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
+.\" CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
+.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
+.\" POSSIBILITY OF SUCH DAMAGE.
+.\"
+.\" $FreeBSD$
+.\"
+.Dd February 13, 2011
+.Dt RCTL 8
+.Os
+.Sh NAME
+.Nm rctl
+.Nd display and update resource limits database
+.Sh SYNOPSIS
+.Nm
+.Op Fl h
+.Op Fl n
+.Op Ar filter
+.Nm
+.Fl a
+.Op Ar rule
+.Nm
+.Op Fl h
+.Op Fl n
+.Fl l
+.Op Ar filter
+.Nm
+.Fl r
+.Op Ar filter
+.Nm
+.Op Fl h
+.Fl u
+.Op Ar filter
+.Sh DESCRIPTION
+When called without options, the
+.Nm
+command writes currently defined RCTL rules to standard output.
+.Pp
+If a
+.Ar filter
+argument is specified, only rules matching the filter are displayed.
+The options are as follows:
+.Bl -tag -width indent
+.It Fl a Ar rule
+Add
+.Ar rule
+to the RCTL database.
+.It Fl l Ar filter
+Display rules applicable to the process defined by
+.Ar filter .
+.It Fl r Ar filter
+Remove rules matching
+.Ar filter
+from the RCTL database.
+.It Fl u Ar filter
+Display resource usage for a subject (process, user, login class
+or jail) matching the
+.Ar filter .
+.It Fl h
+"Human-readable" output.
+Use unit suffixes: Byte, Kilobyte, Megabyte,
+Gigabyte, Terabyte and Petabyte.
+.It Fl n
+Display user IDs numerically rather than converting them to a user name.
+.Pp
+.Sh RULE SYNTAX
+Syntax for a rule is subject:subject-id:resource:action=amount/per.
+.Pp
+Subject defines the kind of entity the rule applies to.
+It can be either process, user, login class, or jail.
+.Pp
+Subject ID identifies the subject.  It can be user name,
+numerical user ID, login class name, jail name, or numerical jail ID.
+.Pp
+Resource identifies the resource the rule controls.
+.Pp
+Action defines what will happen when a process exceeds the allowed amount.
+.Pp
+Amount defines how much of the resource a process can use before
+the defined action triggers.
+.Pp
+The per field defines what entity the amount gets accounted for.
+For example, rule "loginclass:users:vmem:deny=100M/process" means
+that each process of any user belonging to login class "users" may allocate
+up to 100MB of virtual memory.
+Rule "loginclass:users:vmem:deny=100M/user" would mean that for each
+user belonging to the login class "users", the sum of virtual memory allocated
+by all the processes of a that user will not exceed 100MB.
+Rule "loginclass:users:vmem:deny=100M/loginclass" would mean that the sum of
+virtual memory allocated by all processes of all users belonging to that login
+class will not exceed 100MB.
+.Pp
+Valid rule has all those fields specified, except for the per, which defaults
+to the value of subject.
+.Pp
+A filter is a rule for which one of more fields other than per is left empty.
+For example, a filter that matches every rule could be written as ":::=/",
+or, in short, ":".
+A filter that matches all the login classes would be "loginclass:".
+A filter that matches all defined rules for nproc resource would be
+"::nproc".
+.Pp
+.Sh RESOURCES
+.Bl -column -offset 3n "msgqqueued"
+.It cpu                CPU time, in milliseconds
+.It fsize      maximum file size, in bytes
+.It data       data size, in bytes
+.It stack      stack size, in bytes
+.It core       core dump size, in bytes
+.It rss                resident set size, in bytes
+.It memlock    locked memory, in bytes
+.It nproc      number of processes
+.It nofile     file descriptor table size
+.It sbsize     memory consumed by socket buffers, in bytes
+.It vmem       address space limit, in bytes
+.It npts       number of PTYs
+.It swap       swap usage, in bytes
+.It nthr       number of threads
+.It msgqqueued number of queued SysV messages
+.It msgqsize   SysV message queue size, in bytes
+.It nmsgq      number of SysV message queues
+.It nsem       number of SysV semaphores
+.It nsemop     number of SysV semaphores modified in a single semop(2) call
+.It nshm       number of SysV shared memory segments
+.It shmsize    SysV shared memory size, in bytes
+.It wallclock  wallclock time, in milliseconds
+.It pctcpu     %cpu time
+.El
+.Pp
+.Sh ACTIONS
+.Bl -column -offset 3n "msgqqueued"
+.It deny       deny the allocation; not supported for cpu and wallclock
+.It log                log a warning to the console
+.It devctl     send notification to
+.Xr devd 8
+.It sig*       e.g. sigterm; send a signal to the offending process
+.El
+.Pp
+See
+.Xr signal 3
+for a list of supported signals.
+.Pp
+Not all actions are supported for all resources.
+Attempt to add rule with action not supported by a given resouce will result
+in error.
+.Pp
+Note that limiting RSS may kill the machine due to thrashing.
+.Pp
+.Sh EXIT STATUS
+.Ex -std
+.Sh EXAMPLES
+.Dl rctl -a user:joe:vmem:deny=1g
+.Pp
+Prevent user "joe" from allocating more than 1GB of virtual memory.
+.Pp
+.Dl rctl -r :
+.Pp
+Remove all RCTL rules.
+.Pp
+.Dl rctl -hu jail:5
+.Pp
+Display resource usage information for jail with JID 5.
+.Pp
+.Dl rctl -l process:512
+.Pp
+Display all the rules applicable to process with PID 512.
+.Sh SEE ALSO
+.Xr jailstat 8 ,
+.Xr userstat 8
+.Sh HISTORY
+The
+.Nm
+command appeared in
+.Fx 9.0.
+.Sh AUTHORS
+.An -nosplit
+The
+.Nm
+command was written by
+.An Edward Tomasz Napierala Aq tr...@freebsd.org .

Added: head/usr.bin/rctl/rctl.c
==============================================================================
--- /dev/null   00:00:00 1970   (empty, because file is newly added)
+++ head/usr.bin/rctl/rctl.c    Wed Mar 30 18:27:52 2011        (r220166)
@@ -0,0 +1,539 @@
+/*-
+ * Copyright (c) 2010 The FreeBSD Foundation
+ * All rights reserved.
+ *
+ * This software was developed by Edward Tomasz Napierala under sponsorship
+ * from the FreeBSD Foundation.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ * 1. Redistributions of source code must retain the above copyright
+ *    notice, this list of conditions and the following disclaimer.
+ * 2. Redistributions in binary form must reproduce the above copyright
+ *    notice, this list of conditions and the following disclaimer in the
+ *    documentation and/or other materials provided with the distribution.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+ * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
+ * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+ * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+ * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+ * SUCH DAMAGE.
+ *
+ * $FreeBSD$
+ */
+
+#include <sys/cdefs.h>
+__FBSDID("$FreeBSD$");
+
+#include <sys/types.h>
+#include <sys/rctl.h>
+#include <assert.h>
+#include <ctype.h>
+#include <err.h>
+#include <errno.h>
+#include <getopt.h>
+#include <grp.h>
+#include <libutil.h>
+#include <pwd.h>
+#include <stdint.h>
+#include <stdio.h>
+#include <stdlib.h>
+#include <string.h>
+
+#define        RCTL_DEFAULT_BUFSIZE    4096
+
+static id_t
+parse_user(const char *s)
+{
+       id_t id;
+       char *end;
+       struct passwd *pwd;
+
+       pwd = getpwnam(s);
+       if (pwd != NULL)
+               return (pwd->pw_uid);
+
+       if (!isnumber(s[0]))
+               errx(1, "uknown user '%s'", s);
+
+       id = strtod(s, &end);
+       if ((size_t)(end - s) != strlen(s))
+               errx(1, "trailing characters after numerical id");
+
+       return (id);
+}
+
+static id_t
+parse_group(const char *s)
+{
+       id_t id;
+       char *end;
+       struct group *grp;
+
+       grp = getgrnam(s);
+       if (grp != NULL)
+               return (grp->gr_gid);
+
+       if (!isnumber(s[0]))
+               errx(1, "uknown group '%s'", s);
+
+       id = strtod(s, &end);
+       if ((size_t)(end - s) != strlen(s))
+               errx(1, "trailing characters after numerical id");
+
+       return (id);
+}
+
+/*
+ * This routine replaces user/group name with numeric id.
+ */
+static char *
+resolve_ids(char *rule)
+{
+       id_t id;
+       const char *subject, *textid, *rest;
+       char *resolved;
+
+       subject = strsep(&rule, ":");
+       textid = strsep(&rule, ":");
+       if (textid == NULL)
+               errx(1, "error in rule specification -- no subject");
+       if (rule != NULL)
+               rest = rule;
+       else
+               rest = "";
+
+       if (strcasecmp(subject, "u") == 0)
+               subject = "user";
+       else if (strcasecmp(subject, "g") == 0)
+               subject = "group";
+       else if (strcasecmp(subject, "p") == 0)
+               subject = "process";
+       else if (strcasecmp(subject, "l") == 0 ||
+           strcasecmp(subject, "c") == 0 ||
+           strcasecmp(subject, "class") == 0)
+               subject = "loginclass";
+       else if (strcasecmp(subject, "j") == 0)
+               subject = "jail";
+
+       if (strcasecmp(subject, "user") == 0 && strlen(textid) > 0) {
+               id = parse_user(textid);
+               asprintf(&resolved, "%s:%d:%s", subject, (int)id, rest);
+       } else if (strcasecmp(subject, "group") == 0 && strlen(textid) > 0) {
+               id = parse_group(textid);
+               asprintf(&resolved, "%s:%d:%s", subject, (int)id, rest);
+       } else
+               asprintf(&resolved, "%s:%s:%s", subject, textid, rest);
+
+       if (resolved == NULL)
+               err(1, "asprintf");
+
+       return (resolved);
+}
+
+/*
+ * This routine replaces "human-readable" number with its expanded form.
+ */
+static char *
+expand_amount(char *rule)
+{
+       uint64_t num;
+       const char *subject, *subject_id, *resource, *action, *amount, *per;
+       char *copy, *expanded;
+
+       copy = strdup(rule);
+       if (copy == NULL)
+               err(1, "strdup");
+
+       subject = strsep(&copy, ":");
+       subject_id = strsep(&copy, ":");
+       resource = strsep(&copy, ":");
+       action = strsep(&copy, "=/");
+       amount = strsep(&copy, "/");
+       per = copy;
+
+       if (amount == NULL || strlen(amount) == 0) {
+               free(copy);
+               return (rule);
+       }
+
+       assert(subject != NULL);
+       assert(subject_id != NULL);
+       assert(resource != NULL);
+       assert(action != NULL);
+
+       if (expand_number(amount, &num))
+               err(1, "expand_number");
+
+       if (per == NULL)
+               asprintf(&expanded, "%s:%s:%s:%s=%ju", subject, subject_id,
+                   resource, action, (uintmax_t)num);
+       else
+               asprintf(&expanded, "%s:%s:%s:%s=%ju/%s", subject, subject_id,
+                   resource, action, (uintmax_t)num, per);
+
+       if (expanded == NULL)
+               err(1, "asprintf");
+
+       return (expanded);
+}
+
+static char *
+humanize_ids(char *rule)
+{
+       id_t id;
+       struct passwd *pwd;
+       struct group *grp;
+       const char *subject, *textid, *rest;
+       char *humanized;
+
+       subject = strsep(&rule, ":");
+       textid = strsep(&rule, ":");
+       if (textid == NULL)
+               errx(1, "rule passed from the kernel didn't contain subject");
+       if (rule != NULL)
+               rest = rule;
+       else
+               rest = "";
+
+       /* Replace numerical user and group ids with names. */
+       if (strcasecmp(subject, "user") == 0) {
+               id = parse_user(textid);
+               pwd = getpwuid(id);
+               if (pwd != NULL)
+                       textid = pwd->pw_name;
+       } else if (strcasecmp(subject, "group") == 0) {
+               id = parse_group(textid);
+               grp = getgrgid(id);
+               if (grp != NULL)
+                       textid = grp->gr_name;
+       }
+
+       asprintf(&humanized, "%s:%s:%s", subject, textid, rest);
+
+       if (humanized == NULL)
+               err(1, "asprintf");
+
+       return (humanized);
+}
+
+static int
+str2int64(const char *str, int64_t *value)
+{
+       char *end;
+
+       if (str == NULL)
+               return (EINVAL);
+
+       *value = strtoul(str, &end, 10);
+       if ((size_t)(end - str) != strlen(str))
+               return (EINVAL);
+
+       return (0);
+}
+
+static char *
+humanize_amount(char *rule)
+{
+       int64_t num;
+       const char *subject, *subject_id, *resource, *action, *amount, *per;
+       char *copy, *humanized, buf[6];
+
+       copy = strdup(rule);
+       if (copy == NULL)
+               err(1, "strdup");
+
+       subject = strsep(&copy, ":");
+       subject_id = strsep(&copy, ":");
+       resource = strsep(&copy, ":");
+       action = strsep(&copy, "=/");
+       amount = strsep(&copy, "/");
+       per = copy;
+
+       if (amount == NULL || strlen(amount) == 0 ||
+           str2int64(amount, &num) != 0) {
+               free(copy);
+               return (rule);
+       }
+
+       assert(subject != NULL);
+       assert(subject_id != NULL);
+       assert(resource != NULL);
+       assert(action != NULL);
+
+       if (humanize_number(buf, sizeof(buf), num, "", HN_AUTOSCALE,
+           HN_DECIMAL | HN_NOSPACE) == -1)
+               err(1, "humanize_number");
+
+       if (per == NULL)
+               asprintf(&humanized, "%s:%s:%s:%s=%s", subject, subject_id,
+                   resource, action, buf);
+       else
+               asprintf(&humanized, "%s:%s:%s:%s=%s/%s", subject, subject_id,
+                   resource, action, buf, per);
+
+       if (humanized == NULL)
+               err(1, "asprintf");
+
+       return (humanized);
+}
+
+/*
+ * Print rules, one per line.
+ */
+static void
+print_rules(char *rules, int hflag, int nflag)
+{
+       char *rule;
+
+       while ((rule = strsep(&rules, ",")) != NULL) {
+               if (rule[0] == '\0')
+                       break; /* XXX */
+               if (nflag == 0)
+                       rule = humanize_ids(rule);
+               if (hflag)
+                       rule = humanize_amount(rule);
+               printf("%s\n", rule);
+       }
+}
+
+static void
+add_rule(char *rule)
+{
+       int error;
+
+       error = rctl_add_rule(rule, strlen(rule) + 1, NULL, 0);
+       if (error != 0)
+               err(1, "rctl_add_rule");
+       free(rule);
+}
+
+static void
+show_limits(char *filter, int hflag, int nflag)
+{
+       int error;
+       char *outbuf = NULL;
+       size_t outbuflen = RCTL_DEFAULT_BUFSIZE / 4;
+
+       do {
+               outbuflen *= 4;
+               outbuf = realloc(outbuf, outbuflen);
+               if (outbuf == NULL)
+                       err(1, "realloc");
+
+               error = rctl_get_limits(filter, strlen(filter) + 1, outbuf,
+                   outbuflen);
+               if (error && errno != ERANGE)
+                       err(1, "rctl_get_limits");
+       } while (error && errno == ERANGE);
+
+       print_rules(outbuf, hflag, nflag);
+       free(filter);
+       free(outbuf);
+}
+
+static void
+remove_rule(char *filter)
+{
+       int error;
+
+       error = rctl_remove_rule(filter, strlen(filter) + 1, NULL, 0);
+       if (error != 0)
+               err(1, "rctl_remove_rule");
+       free(filter);
+}
+
+static char *
+humanize_usage_amount(char *usage)
+{
+       int64_t num;
+       const char *resource, *amount;
+       char *copy, *humanized, buf[6];
+
+       copy = strdup(usage);
+       if (copy == NULL)
+               err(1, "strdup");
+
+       resource = strsep(&copy, "=");
+       amount = copy;
+
+       assert(resource != NULL);
+       assert(amount != NULL);
+
+       if (str2int64(amount, &num) != 0 || 
+           humanize_number(buf, sizeof(buf), num, "", HN_AUTOSCALE,
+           HN_DECIMAL | HN_NOSPACE) == -1) {
+               free(copy);
+               return (usage);
+       }
+
+       asprintf(&humanized, "%s=%s", resource, buf);
+       if (humanized == NULL)
+               err(1, "asprintf");
+
+       return (humanized);
+}
+
+/*
+ * Query the kernel about a resource usage and print it out.
+ */
+static void
+show_usage(char *filter, int hflag)
+{
+       int error;
+       char *outbuf = NULL, *tmp;
+       size_t outbuflen = RCTL_DEFAULT_BUFSIZE / 4;
+
+       do {
+               outbuflen *= 4;
+               outbuf = realloc(outbuf, outbuflen);
+               if (outbuf == NULL)
+                       err(1, "realloc");
+
+               error = rctl_get_racct(filter, strlen(filter) + 1, outbuf,
+                   outbuflen);
+               if (error && errno != ERANGE)
+                       err(1, "rctl_get_racct");
+       } while (error && errno == ERANGE);
+
+       while ((tmp = strsep(&outbuf, ",")) != NULL) {
+               if (tmp[0] == '\0')
+                       break; /* XXX */
+
+               if (hflag)
+                       tmp = humanize_usage_amount(tmp);
+
+               printf("%s\n", tmp);
+       }
+
+       free(filter);
+       free(outbuf);
+}
+
+/*
+ * Query the kernel about resource limit rules and print them out.
+ */
+static void
+show_rules(char *filter, int hflag, int nflag)
+{
+       int error;
+       char *outbuf = NULL;
+       size_t filterlen, outbuflen = RCTL_DEFAULT_BUFSIZE / 4;
+
+       if (filter != NULL)
+               filterlen = strlen(filter) + 1;
+       else
+               filterlen = 0;
+
+       do {
+               outbuflen *= 4;
+               outbuf = realloc(outbuf, outbuflen);
+               if (outbuf == NULL)
+                       err(1, "realloc");
+
+               error = rctl_get_rules(filter, filterlen, outbuf, outbuflen);
+               if (error && errno != ERANGE)
+                       err(1, "rctl_get_rules");
+       } while (error && errno == ERANGE);
+
+       print_rules(outbuf, hflag, nflag);
+       free(outbuf);
+}
+
+static void
+usage(void)
+{
+
+       fprintf(stderr, "usage: rctl [ -h ] [-a rule | -l filter | -r filter "
+           "| -u filter | filter]\n");
+       exit(1);
+}
+
+int
+main(int argc __unused, char **argv __unused)
+{
+       int ch, aflag = 0, hflag = 0, nflag = 0, lflag = 0, rflag = 0,
+           uflag = 0;
+       char *rule = NULL;
+
+       while ((ch = getopt(argc, argv, "a:hl:nr:u:")) != -1) {
+               switch (ch) {
+               case 'a':
+                       aflag = 1;
+                       rule = strdup(optarg);
+                       break;
+               case 'h':
+                       hflag = 1;
+                       break;
+               case 'l':
+                       lflag = 1;
+                       rule = strdup(optarg);
+                       break;
+               case 'n':
+                       nflag = 1;
+                       break;
+               case 'r':
+                       rflag = 1;
+                       rule = strdup(optarg);
+                       break;
+               case 'u':
+                       uflag = 1;
+                       rule = strdup(optarg);
+                       break;
+
+               case '?':
+               default:
+                       usage();
+               }
+       }
+
+       argc -= optind;
+       argv += optind;
+
+       if (argc > 1)
+               usage();
+
+       if (rule == NULL) {
+               if (argc == 1)
+                       rule = strdup(argv[0]);
+               else
+                       rule = strdup("::");
+       }
+
+       if (aflag + lflag + rflag + uflag + argc > 1)
+               errx(1, "only one flag or argument may be specified "
+                   "at the same time");
+
+       rule = resolve_ids(rule);
+       rule = expand_amount(rule);
+
+       if (aflag) {
+               add_rule(rule);
+               return (0);
+       }
+
+       if (lflag) {
+               show_limits(rule, hflag, nflag);
+               return (0);
+       }
+
+       if (rflag) {
+               remove_rule(rule);
+               return (0);
+       }
+
+       if (uflag) {
+               show_usage(rule, hflag);
+               return (0);
+       }
+
+       show_rules(rule, hflag, nflag);
+       return (0);
+}
_______________________________________________
svn-src-all@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/svn-src-all
To unsubscribe, send any mail to "svn-src-all-unsubscr...@freebsd.org"

Reply via email to