1999-04-07 20:11:08 +08:00
|
|
|
/*
|
|
|
|
* Filters: utility functions
|
|
|
|
*
|
|
|
|
* Copyright 1998 Pavel Machek <pavel@ucw.cz>
|
|
|
|
*
|
|
|
|
* Can be freely distributed and used under the terms of the GNU GPL.
|
1999-08-20 17:59:39 +08:00
|
|
|
*
|
1999-04-07 20:11:08 +08:00
|
|
|
*/
|
|
|
|
|
2000-05-01 02:47:48 +08:00
|
|
|
/**
|
|
|
|
* DOC: Filters
|
|
|
|
*
|
2000-06-08 20:37:21 +08:00
|
|
|
* You can find sources of the filter language in |filter/|
|
|
|
|
* directory. File |filter/config.Y| contains filter grammar and basically translates
|
|
|
|
* the source from user into a tree of &f_inst structures. These trees are
|
|
|
|
* later interpreted using code in |filter/filter.c|.
|
2000-05-30 18:13:32 +08:00
|
|
|
*
|
2000-06-08 20:37:21 +08:00
|
|
|
* A filter is represented by a tree of &f_inst structures, one structure per
|
|
|
|
* "instruction". Each &f_inst contains @code, @aux value which is
|
|
|
|
* usually the data type this instruction operates on and two generic
|
|
|
|
* arguments (@a1, @a2). Some instructions contain pointer(s) to other
|
|
|
|
* instructions in their (@a1, @a2) fields.
|
2000-05-01 02:47:48 +08:00
|
|
|
*
|
2000-06-08 20:37:21 +08:00
|
|
|
* Filters use a &f_val structure for their data. Each &f_val
|
|
|
|
* contains type and value (types are constants prefixed with %T_). Few
|
|
|
|
* of the types are special; %T_RETURN can be or-ed with a type to indicate
|
|
|
|
* that return from a function or from the whole filter should be
|
|
|
|
* forced. Important thing about &f_val's is that they may be copied
|
|
|
|
* with a simple |=|. That's fine for all currently defined types: strings
|
2000-05-01 02:47:48 +08:00
|
|
|
* are read-only (and therefore okay), paths are copied for each
|
2000-06-06 01:13:36 +08:00
|
|
|
* operation (okay too).
|
|
|
|
*/
|
2000-05-01 02:47:48 +08:00
|
|
|
|
2000-05-05 04:52:28 +08:00
|
|
|
#undef LOCAL_DEBUG
|
2000-03-13 05:01:38 +08:00
|
|
|
|
1999-04-07 20:11:08 +08:00
|
|
|
#include "nest/bird.h"
|
|
|
|
#include "lib/lists.h"
|
|
|
|
#include "lib/resource.h"
|
|
|
|
#include "lib/socket.h"
|
1999-04-13 03:58:18 +08:00
|
|
|
#include "lib/string.h"
|
2000-04-10 23:07:43 +08:00
|
|
|
#include "lib/unaligned.h"
|
2016-01-20 22:38:37 +08:00
|
|
|
#include "lib/net.h"
|
|
|
|
#include "lib/ip.h"
|
1999-04-07 20:11:08 +08:00
|
|
|
#include "nest/route.h"
|
|
|
|
#include "nest/protocol.h"
|
|
|
|
#include "nest/iface.h"
|
2000-04-17 19:20:00 +08:00
|
|
|
#include "nest/attrs.h"
|
1999-04-07 20:11:08 +08:00
|
|
|
#include "conf/conf.h"
|
|
|
|
#include "filter/filter.h"
|
|
|
|
|
2000-02-25 19:15:26 +08:00
|
|
|
#define P(a,b) ((a<<8) | b)
|
|
|
|
|
1999-04-13 03:58:18 +08:00
|
|
|
#define CMP_ERROR 999
|
|
|
|
|
2004-06-05 17:58:23 +08:00
|
|
|
static struct adata *
|
2011-08-13 03:03:43 +08:00
|
|
|
adata_empty(struct linpool *pool, int l)
|
2000-05-25 23:20:40 +08:00
|
|
|
{
|
2011-08-13 03:03:43 +08:00
|
|
|
struct adata *res = lp_alloc(pool, sizeof(struct adata) + l);
|
|
|
|
res->length = l;
|
2000-05-25 23:20:40 +08:00
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2008-10-27 05:36:08 +08:00
|
|
|
static void
|
2013-10-06 02:12:28 +08:00
|
|
|
pm_format(struct f_path_mask *p, buffer *buf)
|
2008-10-27 05:36:08 +08:00
|
|
|
{
|
2013-10-06 02:12:28 +08:00
|
|
|
buffer_puts(buf, "[= ");
|
2008-10-27 05:36:08 +08:00
|
|
|
|
|
|
|
while (p)
|
2013-10-06 02:12:28 +08:00
|
|
|
{
|
|
|
|
switch(p->kind)
|
2008-10-27 05:36:08 +08:00
|
|
|
{
|
2013-10-06 02:12:28 +08:00
|
|
|
case PM_ASN:
|
|
|
|
buffer_print(buf, "%u ", p->val);
|
|
|
|
break;
|
2009-06-02 01:32:41 +08:00
|
|
|
|
2013-10-06 02:12:28 +08:00
|
|
|
case PM_QUESTION:
|
|
|
|
buffer_puts(buf, "? ");
|
|
|
|
break;
|
2009-06-02 01:32:41 +08:00
|
|
|
|
2013-10-06 02:12:28 +08:00
|
|
|
case PM_ASTERISK:
|
|
|
|
buffer_puts(buf, "* ");
|
|
|
|
break;
|
2008-10-27 05:36:08 +08:00
|
|
|
|
2013-10-06 02:12:28 +08:00
|
|
|
case PM_ASN_EXPR:
|
|
|
|
buffer_print(buf, "%u ", f_eval_asn((struct f_inst *) p->val));
|
|
|
|
break;
|
2008-10-27 05:36:08 +08:00
|
|
|
}
|
|
|
|
|
2013-10-06 02:12:28 +08:00
|
|
|
p = p->next;
|
|
|
|
}
|
|
|
|
|
|
|
|
buffer_puts(buf, "=]");
|
2008-10-27 05:36:08 +08:00
|
|
|
}
|
|
|
|
|
2015-12-16 17:25:12 +08:00
|
|
|
static inline int val_is_ip4(const struct f_val v)
|
|
|
|
{ return (v.type == T_IP) && ipa_is_ip4(v.val.ip); }
|
2011-08-13 03:03:43 +08:00
|
|
|
|
2000-06-07 22:16:11 +08:00
|
|
|
/**
|
2000-06-07 22:45:55 +08:00
|
|
|
* val_compare - compare two values
|
2000-06-07 22:16:11 +08:00
|
|
|
* @v1: first value
|
|
|
|
* @v2: second value
|
|
|
|
*
|
2013-10-02 20:41:37 +08:00
|
|
|
* Compares two values and returns -1, 0, 1 on <, =, > or CMP_ERROR on
|
|
|
|
* error. Tree module relies on this giving consistent results so
|
|
|
|
* that it can be used for building balanced trees.
|
2000-06-05 20:52:57 +08:00
|
|
|
*/
|
1999-04-13 03:58:18 +08:00
|
|
|
int
|
|
|
|
val_compare(struct f_val v1, struct f_val v2)
|
|
|
|
{
|
2000-04-26 17:30:12 +08:00
|
|
|
if (v1.type != v2.type) {
|
2013-10-02 18:10:09 +08:00
|
|
|
if (v1.type == T_VOID) /* Hack for else */
|
|
|
|
return -1;
|
|
|
|
if (v2.type == T_VOID)
|
|
|
|
return 1;
|
|
|
|
|
2010-03-30 01:29:03 +08:00
|
|
|
/* IP->Quad implicit conversion */
|
2015-12-16 17:25:12 +08:00
|
|
|
if ((v1.type == T_QUAD) && val_is_ip4(v2))
|
|
|
|
return uint_cmp(v1.val.i, ipa_to_u32(v2.val.ip));
|
|
|
|
if (val_is_ip4(v1) && (v2.type == T_QUAD))
|
|
|
|
return uint_cmp(ipa_to_u32(v1.val.ip), v2.val.i);
|
2010-03-30 01:29:03 +08:00
|
|
|
|
2000-04-26 17:30:12 +08:00
|
|
|
debug( "Types do not match in val_compare\n" );
|
1999-09-29 22:24:58 +08:00
|
|
|
return CMP_ERROR;
|
2000-04-26 17:30:12 +08:00
|
|
|
}
|
2013-10-02 20:41:37 +08:00
|
|
|
|
1999-04-13 03:58:18 +08:00
|
|
|
switch (v1.type) {
|
2013-10-02 20:41:37 +08:00
|
|
|
case T_VOID:
|
|
|
|
return 0;
|
1999-11-10 20:44:07 +08:00
|
|
|
case T_ENUM:
|
2009-05-28 19:37:04 +08:00
|
|
|
case T_INT:
|
|
|
|
case T_BOOL:
|
1999-10-12 14:27:42 +08:00
|
|
|
case T_PAIR:
|
2010-03-30 01:29:03 +08:00
|
|
|
case T_QUAD:
|
2010-09-15 08:01:23 +08:00
|
|
|
return uint_cmp(v1.val.i, v2.val.i);
|
2011-08-13 03:03:43 +08:00
|
|
|
case T_EC:
|
|
|
|
return u64_cmp(v1.val.ec, v2.val.ec);
|
1999-04-13 19:40:04 +08:00
|
|
|
case T_IP:
|
2015-12-16 17:25:12 +08:00
|
|
|
return ipa_compare(v1.val.ip, v2.val.ip);
|
|
|
|
case T_NET:
|
|
|
|
return net_compare(v1.val.net, v2.val.net);
|
2008-11-14 21:50:37 +08:00
|
|
|
case T_STRING:
|
|
|
|
return strcmp(v1.val.s, v2.val.s);
|
2000-03-30 16:50:30 +08:00
|
|
|
default:
|
|
|
|
return CMP_ERROR;
|
1999-04-13 03:58:18 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-10-02 20:41:37 +08:00
|
|
|
static int
|
|
|
|
pm_path_same(struct f_path_mask *m1, struct f_path_mask *m2)
|
2010-02-18 04:53:07 +08:00
|
|
|
{
|
2013-10-02 20:41:37 +08:00
|
|
|
while (m1 && m2)
|
|
|
|
{
|
|
|
|
if ((m1->kind != m2->kind) || (m1->val != m2->val))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
m1 = m1->next;
|
|
|
|
m2 = m2->next;
|
|
|
|
}
|
|
|
|
|
|
|
|
return !m1 && !m2;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* val_same - compare two values
|
|
|
|
* @v1: first value
|
|
|
|
* @v2: second value
|
|
|
|
*
|
|
|
|
* Compares two values and returns 1 if they are same and 0 if not.
|
|
|
|
* Comparison of values of different types is valid and returns 0.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
val_same(struct f_val v1, struct f_val v2)
|
2010-02-18 04:53:07 +08:00
|
|
|
{
|
2013-10-02 20:41:37 +08:00
|
|
|
int rc;
|
|
|
|
|
|
|
|
rc = val_compare(v1, v2);
|
|
|
|
if (rc != CMP_ERROR)
|
|
|
|
return !rc;
|
|
|
|
|
|
|
|
if (v1.type != v2.type)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
switch (v1.type) {
|
|
|
|
case T_PATH_MASK:
|
|
|
|
return pm_path_same(v1.val.path_mask, v2.val.path_mask);
|
|
|
|
case T_PATH:
|
|
|
|
case T_CLIST:
|
|
|
|
case T_ECLIST:
|
|
|
|
return adata_same(v1.val.ad, v2.val.ad);
|
|
|
|
case T_SET:
|
|
|
|
return same_tree(v1.val.t, v2.val.t);
|
|
|
|
case T_PREFIX_SET:
|
|
|
|
return trie_same(v1.val.ti, v2.val.ti);
|
|
|
|
default:
|
|
|
|
bug("Invalid type in val_same(): %x", v1.type);
|
|
|
|
}
|
2010-02-18 04:53:07 +08:00
|
|
|
}
|
2009-03-31 18:55:57 +08:00
|
|
|
|
2010-05-23 04:47:24 +08:00
|
|
|
static int
|
|
|
|
clist_set_type(struct f_tree *set, struct f_val *v)
|
|
|
|
{
|
2015-12-21 04:43:00 +08:00
|
|
|
switch (set->from.type)
|
|
|
|
{
|
2010-05-23 04:47:24 +08:00
|
|
|
case T_PAIR:
|
|
|
|
v->type = T_PAIR;
|
|
|
|
return 1;
|
2015-12-21 04:43:00 +08:00
|
|
|
|
2010-05-23 04:47:24 +08:00
|
|
|
case T_QUAD:
|
|
|
|
v->type = T_QUAD;
|
|
|
|
return 1;
|
2015-12-21 04:43:00 +08:00
|
|
|
|
|
|
|
case T_IP:
|
|
|
|
if (val_is_ip4(set->from) && val_is_ip4(set->to))
|
|
|
|
{
|
|
|
|
v->type = T_QUAD;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
/* Fall through */
|
2010-05-23 04:47:24 +08:00
|
|
|
default:
|
|
|
|
v->type = T_VOID;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-08-13 03:03:43 +08:00
|
|
|
static inline int
|
|
|
|
eclist_set_type(struct f_tree *set)
|
|
|
|
{ return set->from.type == T_EC; }
|
|
|
|
|
2010-05-23 04:47:24 +08:00
|
|
|
static int
|
|
|
|
clist_match_set(struct adata *clist, struct f_tree *set)
|
|
|
|
{
|
|
|
|
if (!clist)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
struct f_val v;
|
|
|
|
if (!clist_set_type(set, &v))
|
|
|
|
return CMP_ERROR;
|
|
|
|
|
|
|
|
u32 *l = (u32 *) clist->data;
|
|
|
|
u32 *end = l + clist->length/4;
|
2011-08-13 03:03:43 +08:00
|
|
|
|
2010-05-23 04:47:24 +08:00
|
|
|
while (l < end) {
|
|
|
|
v.val.i = *l++;
|
|
|
|
if (find_tree(set, v))
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2011-08-13 03:03:43 +08:00
|
|
|
static int
|
|
|
|
eclist_match_set(struct adata *list, struct f_tree *set)
|
|
|
|
{
|
|
|
|
if (!list)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
if (!eclist_set_type(set))
|
|
|
|
return CMP_ERROR;
|
|
|
|
|
|
|
|
struct f_val v;
|
|
|
|
u32 *l = int_set_get_data(list);
|
|
|
|
int len = int_set_get_size(list);
|
|
|
|
int i;
|
|
|
|
|
|
|
|
v.type = T_EC;
|
|
|
|
for (i = 0; i < len; i += 2) {
|
|
|
|
v.val.ec = ec_get(l, i);
|
|
|
|
if (find_tree(set, v))
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2010-05-23 04:47:24 +08:00
|
|
|
static struct adata *
|
2012-03-16 03:42:29 +08:00
|
|
|
clist_filter(struct linpool *pool, struct adata *list, struct f_val set, int pos)
|
2010-05-23 04:47:24 +08:00
|
|
|
{
|
2012-03-16 03:42:29 +08:00
|
|
|
if (!list)
|
2010-05-23 04:47:24 +08:00
|
|
|
return NULL;
|
|
|
|
|
2012-03-16 03:42:29 +08:00
|
|
|
int tree = (set.type == T_SET); /* 1 -> set is T_SET, 0 -> set is T_CLIST */
|
2010-05-23 04:47:24 +08:00
|
|
|
struct f_val v;
|
2012-03-16 03:42:29 +08:00
|
|
|
if (tree)
|
|
|
|
clist_set_type(set.val.t, &v);
|
|
|
|
else
|
|
|
|
v.type = T_PAIR;
|
2010-05-23 04:47:24 +08:00
|
|
|
|
2012-03-16 03:42:29 +08:00
|
|
|
int len = int_set_get_size(list);
|
|
|
|
u32 *l = int_set_get_data(list);
|
|
|
|
u32 tmp[len];
|
2010-05-23 04:47:24 +08:00
|
|
|
u32 *k = tmp;
|
2012-03-16 03:42:29 +08:00
|
|
|
u32 *end = l + len;
|
2010-05-23 04:47:24 +08:00
|
|
|
|
|
|
|
while (l < end) {
|
|
|
|
v.val.i = *l++;
|
2012-03-16 03:42:29 +08:00
|
|
|
/* pos && member(val, set) || !pos && !member(val, set), member() depends on tree */
|
|
|
|
if ((tree ? !!find_tree(set.val.t, v) : int_set_contains(set.val.ad, v.val.i)) == pos)
|
2010-05-23 04:47:24 +08:00
|
|
|
*k++ = v.val.i;
|
|
|
|
}
|
|
|
|
|
|
|
|
int nl = (k - tmp) * 4;
|
2012-03-16 03:42:29 +08:00
|
|
|
if (nl == list->length)
|
|
|
|
return list;
|
2010-05-23 04:47:24 +08:00
|
|
|
|
2011-08-13 03:03:43 +08:00
|
|
|
struct adata *res = adata_empty(pool, nl);
|
|
|
|
memcpy(res->data, tmp, nl);
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct adata *
|
2012-03-16 03:42:29 +08:00
|
|
|
eclist_filter(struct linpool *pool, struct adata *list, struct f_val set, int pos)
|
2011-08-13 03:03:43 +08:00
|
|
|
{
|
|
|
|
if (!list)
|
|
|
|
return NULL;
|
|
|
|
|
2012-03-16 03:42:29 +08:00
|
|
|
int tree = (set.type == T_SET); /* 1 -> set is T_SET, 0 -> set is T_CLIST */
|
2011-08-13 03:03:43 +08:00
|
|
|
struct f_val v;
|
|
|
|
|
|
|
|
int len = int_set_get_size(list);
|
|
|
|
u32 *l = int_set_get_data(list);
|
|
|
|
u32 tmp[len];
|
|
|
|
u32 *k = tmp;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
v.type = T_EC;
|
|
|
|
for (i = 0; i < len; i += 2) {
|
|
|
|
v.val.ec = ec_get(l, i);
|
2012-03-16 03:42:29 +08:00
|
|
|
/* pos && member(val, set) || !pos && !member(val, set), member() depends on tree */
|
|
|
|
if ((tree ? !!find_tree(set.val.t, v) : ec_set_contains(set.val.ad, v.val.ec)) == pos) {
|
2011-08-13 03:03:43 +08:00
|
|
|
*k++ = l[i];
|
|
|
|
*k++ = l[i+1];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
int nl = (k - tmp) * 4;
|
|
|
|
if (nl == list->length)
|
|
|
|
return list;
|
|
|
|
|
|
|
|
struct adata *res = adata_empty(pool, nl);
|
2010-05-23 04:47:24 +08:00
|
|
|
memcpy(res->data, tmp, nl);
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2000-06-07 22:16:11 +08:00
|
|
|
/**
|
2000-06-07 22:45:55 +08:00
|
|
|
* val_in_range - implement |~| operator
|
2000-06-07 22:16:11 +08:00
|
|
|
* @v1: element
|
|
|
|
* @v2: set
|
|
|
|
*
|
2013-10-02 17:42:46 +08:00
|
|
|
* Checks if @v1 is element (|~| operator) of @v2.
|
2000-06-05 20:52:57 +08:00
|
|
|
*/
|
2004-06-05 17:58:23 +08:00
|
|
|
static int
|
1999-09-29 22:24:58 +08:00
|
|
|
val_in_range(struct f_val v1, struct f_val v2)
|
|
|
|
{
|
2013-10-02 17:42:46 +08:00
|
|
|
if ((v1.type == T_PATH) && (v2.type == T_PATH_MASK))
|
|
|
|
return as_path_match(v1.val.ad, v2.val.path_mask);
|
1999-11-04 06:23:01 +08:00
|
|
|
|
2013-10-02 17:42:46 +08:00
|
|
|
if ((v1.type == T_INT) && (v2.type == T_PATH))
|
2013-10-21 20:58:32 +08:00
|
|
|
return as_path_contains(v2.val.ad, v1.val.i, 1);
|
1999-11-04 06:23:01 +08:00
|
|
|
|
2013-10-02 17:42:46 +08:00
|
|
|
if (((v1.type == T_PAIR) || (v1.type == T_QUAD)) && (v2.type == T_CLIST))
|
|
|
|
return int_set_contains(v2.val.ad, v1.val.i);
|
2015-12-21 04:43:00 +08:00
|
|
|
|
2013-10-02 17:42:46 +08:00
|
|
|
/* IP->Quad implicit conversion */
|
2015-12-16 17:25:12 +08:00
|
|
|
if (val_is_ip4(v1) && (v2.type == T_CLIST))
|
|
|
|
return int_set_contains(v2.val.ad, ipa_to_u32(v1.val.ip));
|
2009-03-31 18:55:57 +08:00
|
|
|
|
2013-10-02 17:42:46 +08:00
|
|
|
if ((v1.type == T_EC) && (v2.type == T_ECLIST))
|
|
|
|
return ec_set_contains(v2.val.ad, v1.val.ec);
|
2010-05-23 04:47:24 +08:00
|
|
|
|
2013-10-02 17:42:46 +08:00
|
|
|
if ((v1.type == T_STRING) && (v2.type == T_STRING))
|
|
|
|
return patmatch(v2.val.s, v1.val.s);
|
2011-08-13 03:03:43 +08:00
|
|
|
|
2015-12-16 17:25:12 +08:00
|
|
|
if ((v1.type == T_IP) && (v2.type == T_NET))
|
|
|
|
return ipa_in_netX(v1.val.ip, v2.val.net);
|
1999-09-29 22:24:58 +08:00
|
|
|
|
2015-12-16 17:25:12 +08:00
|
|
|
if ((v1.type == T_NET) && (v2.type == T_NET))
|
|
|
|
return net_in_netX(v1.val.net, v2.val.net);
|
2010-09-20 19:01:01 +08:00
|
|
|
|
2015-12-16 17:25:12 +08:00
|
|
|
if ((v1.type == T_NET) && (v2.type == T_PREFIX_SET))
|
|
|
|
return trie_match_net(v2.val.ti, v1.val.net);
|
2010-09-20 19:01:01 +08:00
|
|
|
|
2013-10-02 17:42:46 +08:00
|
|
|
if (v2.type != T_SET)
|
|
|
|
return CMP_ERROR;
|
2010-09-20 19:01:01 +08:00
|
|
|
|
2013-10-02 17:42:46 +08:00
|
|
|
/* With integrated Quad<->IP implicit conversion */
|
|
|
|
if ((v1.type == v2.val.t->from.type) ||
|
2015-12-21 04:43:00 +08:00
|
|
|
((v1.type == T_QUAD) && val_is_ip4(v2.val.t->from) && val_is_ip4(v2.val.t->to)))
|
2013-10-02 17:42:46 +08:00
|
|
|
return !!find_tree(v2.val.t, v1);
|
2010-09-20 19:01:01 +08:00
|
|
|
|
2013-10-02 17:42:46 +08:00
|
|
|
if (v1.type == T_CLIST)
|
2010-05-23 04:47:24 +08:00
|
|
|
return clist_match_set(v1.val.ad, v2.val.t);
|
2010-09-20 19:01:01 +08:00
|
|
|
|
2013-10-02 17:42:46 +08:00
|
|
|
if (v1.type == T_ECLIST)
|
2011-08-13 03:03:43 +08:00
|
|
|
return eclist_match_set(v1.val.ad, v2.val.t);
|
|
|
|
|
2013-10-02 17:42:46 +08:00
|
|
|
if (v1.type == T_PATH)
|
2013-07-10 05:27:10 +08:00
|
|
|
return as_path_match_set(v1.val.ad, v2.val.t);
|
|
|
|
|
1999-09-29 22:24:58 +08:00
|
|
|
return CMP_ERROR;
|
1999-04-13 03:58:18 +08:00
|
|
|
}
|
|
|
|
|
2000-06-06 01:13:36 +08:00
|
|
|
/*
|
2013-10-06 02:12:28 +08:00
|
|
|
* val_format - format filter value
|
2000-06-05 20:52:57 +08:00
|
|
|
*/
|
2013-07-25 19:15:32 +08:00
|
|
|
void
|
2013-10-06 02:12:28 +08:00
|
|
|
val_format(struct f_val v, buffer *buf)
|
1999-04-13 03:58:18 +08:00
|
|
|
{
|
2000-04-17 18:54:01 +08:00
|
|
|
char buf2[1024];
|
2013-10-06 02:12:28 +08:00
|
|
|
switch (v.type)
|
|
|
|
{
|
|
|
|
case T_VOID: buffer_puts(buf, "(void)"); return;
|
|
|
|
case T_BOOL: buffer_puts(buf, v.val.i ? "TRUE" : "FALSE"); return;
|
2013-11-24 07:17:02 +08:00
|
|
|
case T_INT: buffer_print(buf, "%u", v.val.i); return;
|
2013-10-06 02:12:28 +08:00
|
|
|
case T_STRING: buffer_print(buf, "%s", v.val.s); return;
|
2015-12-16 17:25:12 +08:00
|
|
|
case T_IP: buffer_print(buf, "%I", v.val.ip); return;
|
|
|
|
case T_NET: buffer_print(buf, "%N", v.val.net); return;
|
2013-11-24 07:17:02 +08:00
|
|
|
case T_PAIR: buffer_print(buf, "(%u,%u)", v.val.i >> 16, v.val.i & 0xffff); return;
|
2013-10-06 02:12:28 +08:00
|
|
|
case T_QUAD: buffer_print(buf, "%R", v.val.i); return;
|
|
|
|
case T_EC: ec_format(buf2, v.val.ec); buffer_print(buf, "%s", buf2); return;
|
|
|
|
case T_PREFIX_SET: trie_format(v.val.ti, buf); return;
|
|
|
|
case T_SET: tree_format(v.val.t, buf); return;
|
2013-11-24 07:17:02 +08:00
|
|
|
case T_ENUM: buffer_print(buf, "(enum %x)%u", v.type, v.val.i); return;
|
2013-10-06 02:12:28 +08:00
|
|
|
case T_PATH: as_path_format(v.val.ad, buf2, 1000); buffer_print(buf, "(path %s)", buf2); return;
|
|
|
|
case T_CLIST: int_set_format(v.val.ad, 1, -1, buf2, 1000); buffer_print(buf, "(clist %s)", buf2); return;
|
|
|
|
case T_ECLIST: ec_set_format(v.val.ad, -1, buf2, 1000); buffer_print(buf, "(eclist %s)", buf2); return;
|
|
|
|
case T_PATH_MASK: pm_format(v.val.path_mask, buf); return;
|
|
|
|
default: buffer_print(buf, "[unknown type %x]", v.type); return;
|
1999-04-13 03:58:18 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-01-03 07:42:25 +08:00
|
|
|
static struct rte **f_rte;
|
|
|
|
static struct rta *f_old_rta;
|
2000-03-01 22:31:31 +08:00
|
|
|
static struct ea_list **f_tmp_attrs;
|
2012-01-03 07:42:25 +08:00
|
|
|
static struct linpool *f_pool;
|
2013-10-06 02:12:28 +08:00
|
|
|
static struct buffer f_buf;
|
2000-03-29 17:02:00 +08:00
|
|
|
static int f_flags;
|
1999-04-20 02:41:56 +08:00
|
|
|
|
2012-01-03 07:42:25 +08:00
|
|
|
static inline void f_rte_cow(void)
|
|
|
|
{
|
2015-05-10 00:50:15 +08:00
|
|
|
*f_rte = rte_cow(*f_rte);
|
2012-01-03 07:42:25 +08:00
|
|
|
}
|
|
|
|
|
2000-06-06 01:13:36 +08:00
|
|
|
/*
|
2000-06-05 20:52:57 +08:00
|
|
|
* rta_cow - prepare rta for modification by filter
|
|
|
|
*/
|
2004-06-05 17:58:23 +08:00
|
|
|
static void
|
2012-01-03 07:42:25 +08:00
|
|
|
f_rta_cow(void)
|
2000-05-30 18:42:39 +08:00
|
|
|
{
|
2015-06-08 08:20:43 +08:00
|
|
|
if (!rta_is_cached((*f_rte)->attrs))
|
|
|
|
return;
|
|
|
|
|
|
|
|
/* Prepare to modify rte */
|
|
|
|
f_rte_cow();
|
|
|
|
|
|
|
|
/* Store old rta to free it later, it stores reference from rte_cow() */
|
|
|
|
f_old_rta = (*f_rte)->attrs;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Get shallow copy of rta. Fields eattrs and nexthops of rta are shared
|
|
|
|
* with f_old_rta (they will be copied when the cached rta will be obtained
|
|
|
|
* at the end of f_run()), also the lock of hostentry is inherited (we
|
|
|
|
* suppose hostentry is not changed by filters).
|
|
|
|
*/
|
|
|
|
(*f_rte)->attrs = rta_do_cow((*f_rte)->attrs, f_pool);
|
2000-05-30 18:42:39 +08:00
|
|
|
}
|
|
|
|
|
2014-10-02 17:41:34 +08:00
|
|
|
static struct tbf rl_runtime_err = TBF_DEFAULT_LOG_LIMITS;
|
2009-02-26 21:23:54 +08:00
|
|
|
|
2000-02-01 01:44:22 +08:00
|
|
|
#define runtime(x) do { \
|
2009-02-26 21:23:54 +08:00
|
|
|
log_rl(&rl_runtime_err, L_ERR "filters, line %d: %s", what->lineno, x); \
|
2000-02-01 01:44:22 +08:00
|
|
|
res.type = T_RETURN; \
|
|
|
|
res.val.i = F_ERROR; \
|
|
|
|
return res; \
|
|
|
|
} while(0)
|
|
|
|
|
|
|
|
#define ARG(x,y) \
|
|
|
|
x = interpret(what->y); \
|
2000-02-25 19:15:26 +08:00
|
|
|
if (x.type & T_RETURN) \
|
2000-02-01 01:44:22 +08:00
|
|
|
return x;
|
|
|
|
|
|
|
|
#define ONEARG ARG(v1, a1.p)
|
|
|
|
#define TWOARGS ARG(v1, a1.p) \
|
|
|
|
ARG(v2, a2.p)
|
|
|
|
#define TWOARGS_C TWOARGS \
|
|
|
|
if (v1.type != v2.type) \
|
2000-06-08 16:24:32 +08:00
|
|
|
runtime( "Can't operate with values of incompatible types" );
|
2013-07-25 19:15:32 +08:00
|
|
|
#define ACCESS_RTE \
|
|
|
|
do { if (!f_rte) runtime("No route to access"); } while (0)
|
1999-09-29 22:24:58 +08:00
|
|
|
|
2015-05-10 00:50:15 +08:00
|
|
|
#define BITFIELD_MASK(what) \
|
|
|
|
(1u << (what->a2.i >> 24))
|
|
|
|
|
2000-06-05 20:52:57 +08:00
|
|
|
/**
|
|
|
|
* interpret
|
2000-06-07 20:29:08 +08:00
|
|
|
* @what: filter to interpret
|
2000-06-05 20:52:57 +08:00
|
|
|
*
|
2000-06-06 01:13:36 +08:00
|
|
|
* Interpret given tree of filter instructions. This is core function
|
2000-06-05 20:52:57 +08:00
|
|
|
* of filter system and does all the hard work.
|
2000-06-07 21:54:06 +08:00
|
|
|
*
|
|
|
|
* Each instruction has 4 fields: code (which is instruction code),
|
|
|
|
* aux (which is extension to instruction code, typically type),
|
|
|
|
* arg1 and arg2 - arguments. Depending on instruction, arguments
|
2015-05-10 00:50:15 +08:00
|
|
|
* are either integers, or pointers to instruction trees. Common
|
2000-06-07 21:54:06 +08:00
|
|
|
* instructions like +, that have two expressions as arguments use
|
|
|
|
* TWOARGS macro to get both of them evaluated.
|
|
|
|
*
|
|
|
|
* &f_val structures are copied around, so there are no problems with
|
|
|
|
* memory managment.
|
2000-06-05 20:52:57 +08:00
|
|
|
*/
|
1999-04-07 20:11:08 +08:00
|
|
|
static struct f_val
|
|
|
|
interpret(struct f_inst *what)
|
|
|
|
{
|
|
|
|
struct symbol *sym;
|
2010-03-30 01:29:03 +08:00
|
|
|
struct f_val v1, v2, res, *vp;
|
2009-06-02 01:32:41 +08:00
|
|
|
unsigned u1, u2;
|
2004-06-01 04:57:38 +08:00
|
|
|
int i;
|
2009-10-08 22:23:24 +08:00
|
|
|
u32 as;
|
1999-04-07 20:11:08 +08:00
|
|
|
|
|
|
|
res.type = T_VOID;
|
|
|
|
if (!what)
|
|
|
|
return res;
|
|
|
|
|
|
|
|
switch(what->code) {
|
|
|
|
case ',':
|
|
|
|
TWOARGS;
|
|
|
|
break;
|
|
|
|
|
|
|
|
/* Binary operators */
|
|
|
|
case '+':
|
|
|
|
TWOARGS_C;
|
|
|
|
switch (res.type = v1.type) {
|
2000-06-08 16:24:32 +08:00
|
|
|
case T_VOID: runtime( "Can't operate with values of type void" );
|
1999-04-07 20:11:08 +08:00
|
|
|
case T_INT: res.val.i = v1.val.i + v2.val.i; break;
|
|
|
|
default: runtime( "Usage of unknown type" );
|
|
|
|
}
|
|
|
|
break;
|
2000-05-17 20:14:05 +08:00
|
|
|
case '-':
|
|
|
|
TWOARGS_C;
|
|
|
|
switch (res.type = v1.type) {
|
2000-06-08 16:24:32 +08:00
|
|
|
case T_VOID: runtime( "Can't operate with values of type void" );
|
2000-05-17 20:14:05 +08:00
|
|
|
case T_INT: res.val.i = v1.val.i - v2.val.i; break;
|
|
|
|
default: runtime( "Usage of unknown type" );
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case '*':
|
|
|
|
TWOARGS_C;
|
|
|
|
switch (res.type = v1.type) {
|
2000-06-08 16:24:32 +08:00
|
|
|
case T_VOID: runtime( "Can't operate with values of type void" );
|
2000-05-17 20:14:05 +08:00
|
|
|
case T_INT: res.val.i = v1.val.i * v2.val.i; break;
|
|
|
|
default: runtime( "Usage of unknown type" );
|
|
|
|
}
|
|
|
|
break;
|
1999-04-07 20:11:08 +08:00
|
|
|
case '/':
|
|
|
|
TWOARGS_C;
|
|
|
|
switch (res.type = v1.type) {
|
2000-06-08 16:24:32 +08:00
|
|
|
case T_VOID: runtime( "Can't operate with values of type void" );
|
2000-06-02 16:01:12 +08:00
|
|
|
case T_INT: if (v2.val.i == 0) runtime( "Mother told me not to divide by 0" );
|
|
|
|
res.val.i = v1.val.i / v2.val.i; break;
|
1999-04-07 20:11:08 +08:00
|
|
|
default: runtime( "Usage of unknown type" );
|
|
|
|
}
|
|
|
|
break;
|
2015-05-10 00:50:15 +08:00
|
|
|
|
2000-06-01 16:43:29 +08:00
|
|
|
case '&':
|
|
|
|
case '|':
|
2011-03-23 20:40:46 +08:00
|
|
|
ARG(v1, a1.p);
|
|
|
|
if (v1.type != T_BOOL)
|
|
|
|
runtime( "Can't do boolean operation on non-booleans" );
|
|
|
|
if (v1.val.i == (what->code == '|')) {
|
|
|
|
res.type = T_BOOL;
|
|
|
|
res.val.i = v1.val.i;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
ARG(v2, a2.p);
|
|
|
|
if (v2.type != T_BOOL)
|
|
|
|
runtime( "Can't do boolean operation on non-booleans" );
|
|
|
|
res.type = T_BOOL;
|
|
|
|
res.val.i = v2.val.i;
|
2000-06-01 16:43:29 +08:00
|
|
|
break;
|
1999-04-07 20:11:08 +08:00
|
|
|
|
2009-06-02 01:32:41 +08:00
|
|
|
case P('m','p'):
|
2011-08-13 03:03:43 +08:00
|
|
|
TWOARGS;
|
2009-06-02 01:32:41 +08:00
|
|
|
if ((v1.type != T_INT) || (v2.type != T_INT))
|
|
|
|
runtime( "Can't operate with value of non-integer type in pair constructor" );
|
|
|
|
u1 = v1.val.i;
|
|
|
|
u2 = v2.val.i;
|
|
|
|
if ((u1 > 0xFFFF) || (u2 > 0xFFFF))
|
|
|
|
runtime( "Can't operate with value out of bounds in pair constructor" );
|
|
|
|
res.val.i = (u1 << 16) | u2;
|
|
|
|
res.type = T_PAIR;
|
|
|
|
break;
|
|
|
|
|
2011-08-13 03:03:43 +08:00
|
|
|
case P('m','c'):
|
|
|
|
{
|
|
|
|
TWOARGS;
|
|
|
|
|
|
|
|
int check, ipv4_used;
|
|
|
|
u32 key, val;
|
|
|
|
|
|
|
|
if (v1.type == T_INT) {
|
|
|
|
ipv4_used = 0; key = v1.val.i;
|
2015-05-10 00:50:15 +08:00
|
|
|
}
|
2011-08-13 03:03:43 +08:00
|
|
|
else if (v1.type == T_QUAD) {
|
|
|
|
ipv4_used = 1; key = v1.val.i;
|
|
|
|
}
|
|
|
|
/* IP->Quad implicit conversion */
|
2015-12-16 17:25:12 +08:00
|
|
|
else if (val_is_ip4(v1)) {
|
|
|
|
ipv4_used = 1; key = ipa_to_u32(v1.val.ip);
|
2011-08-13 03:03:43 +08:00
|
|
|
}
|
|
|
|
else
|
|
|
|
runtime("Can't operate with key of non-integer/IPv4 type in EC constructor");
|
|
|
|
|
|
|
|
if (v2.type != T_INT)
|
|
|
|
runtime("Can't operate with value of non-integer type in EC constructor");
|
|
|
|
val = v2.val.i;
|
|
|
|
|
|
|
|
res.type = T_EC;
|
|
|
|
|
|
|
|
if (what->aux == EC_GENERIC) {
|
|
|
|
check = 0; res.val.ec = ec_generic(key, val);
|
|
|
|
}
|
|
|
|
else if (ipv4_used) {
|
|
|
|
check = 1; res.val.ec = ec_ip4(what->aux, key, val);
|
|
|
|
}
|
|
|
|
else if (key < 0x10000) {
|
|
|
|
check = 0; res.val.ec = ec_as2(what->aux, key, val);
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
check = 1; res.val.ec = ec_as4(what->aux, key, val);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (check && (val > 0xFFFF))
|
|
|
|
runtime("Can't operate with value out of bounds in EC constructor");
|
|
|
|
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
1999-04-07 20:11:08 +08:00
|
|
|
/* Relational operators */
|
1999-04-13 03:58:18 +08:00
|
|
|
|
|
|
|
#define COMPARE(x) \
|
2010-03-30 01:29:03 +08:00
|
|
|
TWOARGS; \
|
1999-04-13 03:58:18 +08:00
|
|
|
i = val_compare(v1, v2); \
|
|
|
|
if (i==CMP_ERROR) \
|
2010-03-30 01:29:03 +08:00
|
|
|
runtime( "Can't compare values of incompatible types" ); \
|
|
|
|
res.type = T_BOOL; \
|
1999-04-13 03:58:18 +08:00
|
|
|
res.val.i = (x); \
|
1999-04-07 20:11:08 +08:00
|
|
|
break;
|
1999-04-13 03:58:18 +08:00
|
|
|
|
2013-10-02 20:41:37 +08:00
|
|
|
#define SAME(x) \
|
|
|
|
TWOARGS; \
|
|
|
|
i = val_same(v1, v2); \
|
|
|
|
res.type = T_BOOL; \
|
|
|
|
res.val.i = (x); \
|
|
|
|
break;
|
|
|
|
|
|
|
|
case P('!','='): SAME(!i);
|
|
|
|
case P('=','='): SAME(i);
|
1999-04-13 03:58:18 +08:00
|
|
|
case '<': COMPARE(i==-1);
|
2000-02-25 19:15:26 +08:00
|
|
|
case P('<','='): COMPARE(i!=1);
|
1999-04-13 03:58:18 +08:00
|
|
|
|
2000-03-09 22:47:43 +08:00
|
|
|
case '!':
|
|
|
|
ONEARG;
|
|
|
|
if (v1.type != T_BOOL)
|
2000-06-08 16:24:32 +08:00
|
|
|
runtime( "Not applied to non-boolean" );
|
2000-03-09 22:47:43 +08:00
|
|
|
res = v1;
|
|
|
|
res.val.i = !res.val.i;
|
|
|
|
break;
|
|
|
|
|
1999-04-13 03:58:18 +08:00
|
|
|
case '~':
|
|
|
|
TWOARGS;
|
1999-04-07 20:11:08 +08:00
|
|
|
res.type = T_BOOL;
|
1999-09-29 22:24:58 +08:00
|
|
|
res.val.i = val_in_range(v1, v2);
|
|
|
|
if (res.val.i == CMP_ERROR)
|
|
|
|
runtime( "~ applied on unknown type pair" );
|
2011-03-23 20:40:46 +08:00
|
|
|
res.val.i = !!res.val.i;
|
1999-04-07 20:11:08 +08:00
|
|
|
break;
|
2000-02-25 19:15:26 +08:00
|
|
|
case P('d','e'):
|
1999-11-10 20:44:07 +08:00
|
|
|
ONEARG;
|
|
|
|
res.type = T_BOOL;
|
|
|
|
res.val.i = (v1.type != T_VOID);
|
|
|
|
break;
|
1999-04-07 20:11:08 +08:00
|
|
|
|
1999-10-12 14:27:42 +08:00
|
|
|
/* Set to indirect value, a1 = variable, a2 = value */
|
1999-04-07 20:11:08 +08:00
|
|
|
case 's':
|
1999-04-10 17:45:08 +08:00
|
|
|
ARG(v2, a2.p);
|
|
|
|
sym = what->a1.p;
|
2010-03-30 01:29:03 +08:00
|
|
|
vp = sym->def;
|
2015-12-21 04:43:00 +08:00
|
|
|
if ((sym->class != (SYM_VARIABLE | v2.type)) && (v2.type != T_VOID))
|
|
|
|
{
|
2010-03-30 01:29:03 +08:00
|
|
|
/* IP->Quad implicit conversion */
|
2015-12-16 17:25:12 +08:00
|
|
|
if ((sym->class == (SYM_VARIABLE | T_QUAD)) && val_is_ip4(v2))
|
|
|
|
{
|
2010-03-30 01:29:03 +08:00
|
|
|
vp->type = T_QUAD;
|
2015-12-16 17:25:12 +08:00
|
|
|
vp->val.i = ipa_to_u32(v2.val.ip);
|
2010-03-30 01:29:03 +08:00
|
|
|
break;
|
|
|
|
}
|
2010-03-19 16:41:18 +08:00
|
|
|
runtime( "Assigning to variable of incompatible type" );
|
2010-03-30 01:29:03 +08:00
|
|
|
}
|
2015-05-10 00:50:15 +08:00
|
|
|
*vp = v2;
|
1999-04-07 20:11:08 +08:00
|
|
|
break;
|
|
|
|
|
2008-12-25 18:55:27 +08:00
|
|
|
/* some constants have value in a2, some in *a1.p, strange. */
|
2009-03-31 18:55:57 +08:00
|
|
|
case 'c': /* integer (or simple type) constant, string, set, or prefix_set */
|
1999-11-18 22:01:36 +08:00
|
|
|
res.type = what->aux;
|
2008-12-25 18:55:27 +08:00
|
|
|
|
2009-03-31 18:55:57 +08:00
|
|
|
if (res.type == T_PREFIX_SET)
|
|
|
|
res.val.ti = what->a2.p;
|
|
|
|
else if (res.type == T_SET)
|
2008-12-25 18:55:27 +08:00
|
|
|
res.val.t = what->a2.p;
|
|
|
|
else if (res.type == T_STRING)
|
|
|
|
res.val.s = what->a2.p;
|
|
|
|
else
|
|
|
|
res.val.i = what->a2.i;
|
1999-04-07 20:11:08 +08:00
|
|
|
break;
|
2009-05-30 05:08:28 +08:00
|
|
|
case 'V':
|
1999-04-13 03:58:18 +08:00
|
|
|
case 'C':
|
|
|
|
res = * ((struct f_val *) what->a1.p);
|
|
|
|
break;
|
1999-04-07 20:11:08 +08:00
|
|
|
case 'p':
|
|
|
|
ONEARG;
|
2013-10-06 02:12:28 +08:00
|
|
|
val_format(v1, &f_buf);
|
1999-04-07 20:11:08 +08:00
|
|
|
break;
|
|
|
|
case '?': /* ? has really strange error value, so we can implement if ... else nicely :-) */
|
|
|
|
ONEARG;
|
|
|
|
if (v1.type != T_BOOL)
|
2000-06-05 23:41:29 +08:00
|
|
|
runtime( "If requires boolean expression" );
|
1999-04-07 20:11:08 +08:00
|
|
|
if (v1.val.i) {
|
1999-04-10 17:45:08 +08:00
|
|
|
ARG(res,a2.p);
|
1999-04-07 20:11:08 +08:00
|
|
|
res.val.i = 0;
|
|
|
|
} else res.val.i = 1;
|
|
|
|
res.type = T_BOOL;
|
|
|
|
break;
|
|
|
|
case '0':
|
2000-04-01 07:35:59 +08:00
|
|
|
debug( "No operation\n" );
|
1999-04-07 20:11:08 +08:00
|
|
|
break;
|
2000-02-25 19:15:26 +08:00
|
|
|
case P('p',','):
|
1999-04-07 20:11:08 +08:00
|
|
|
ONEARG;
|
2000-04-01 17:15:55 +08:00
|
|
|
if (what->a2.i == F_NOP || (what->a2.i != F_NONL && what->a1.p))
|
2013-10-06 02:12:28 +08:00
|
|
|
log_commit(*L_INFO, &f_buf);
|
1999-04-07 20:11:08 +08:00
|
|
|
|
1999-04-10 17:45:08 +08:00
|
|
|
switch (what->a2.i) {
|
1999-04-07 20:11:08 +08:00
|
|
|
case F_QUITBIRD:
|
|
|
|
die( "Filter asked me to die" );
|
|
|
|
case F_ACCEPT:
|
|
|
|
/* Should take care about turning ACCEPT into MODIFY */
|
|
|
|
case F_ERROR:
|
1999-12-01 23:07:06 +08:00
|
|
|
case F_REJECT: /* FIXME (noncritical) Should print complete route along with reason to reject route */
|
1999-04-07 20:11:08 +08:00
|
|
|
res.type = T_RETURN;
|
1999-12-01 23:07:06 +08:00
|
|
|
res.val.i = what->a2.i;
|
1999-12-01 20:54:23 +08:00
|
|
|
return res; /* We have to return now, no more processing. */
|
1999-10-12 14:27:42 +08:00
|
|
|
case F_NONL:
|
1999-04-07 20:11:08 +08:00
|
|
|
case F_NOP:
|
|
|
|
break;
|
|
|
|
default:
|
2000-06-08 16:24:32 +08:00
|
|
|
bug( "unknown return type: Can't happen");
|
1999-04-07 20:11:08 +08:00
|
|
|
}
|
|
|
|
break;
|
1999-04-20 02:41:56 +08:00
|
|
|
case 'a': /* rta access */
|
|
|
|
{
|
2013-07-25 19:15:32 +08:00
|
|
|
ACCESS_RTE;
|
1999-04-20 02:41:56 +08:00
|
|
|
struct rta *rta = (*f_rte)->attrs;
|
1999-11-18 22:01:36 +08:00
|
|
|
res.type = what->aux;
|
2013-09-27 04:08:21 +08:00
|
|
|
|
|
|
|
switch (what->a2.i)
|
|
|
|
{
|
2015-12-16 17:25:12 +08:00
|
|
|
case SA_FROM: res.val.ip = rta->from; break;
|
|
|
|
case SA_GW: res.val.ip = rta->gw; break;
|
|
|
|
case SA_NET: res.val.net = (*f_rte)->net->n.addr; break;
|
2013-11-23 18:50:34 +08:00
|
|
|
case SA_PROTO: res.val.s = rta->src->proto->name; break;
|
2013-09-27 04:08:21 +08:00
|
|
|
case SA_SOURCE: res.val.i = rta->source; break;
|
|
|
|
case SA_SCOPE: res.val.i = rta->scope; break;
|
|
|
|
case SA_CAST: res.val.i = rta->cast; break;
|
|
|
|
case SA_DEST: res.val.i = rta->dest; break;
|
|
|
|
case SA_IFNAME: res.val.s = rta->iface ? rta->iface->name : ""; break;
|
|
|
|
case SA_IFINDEX: res.val.i = rta->iface ? rta->iface->index : 0; break;
|
|
|
|
|
1999-04-20 02:41:56 +08:00
|
|
|
default:
|
2013-09-27 04:08:21 +08:00
|
|
|
bug("Invalid static attribute access (%x)", res.type);
|
1999-04-20 02:41:56 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
2000-05-30 19:07:22 +08:00
|
|
|
case P('a','S'):
|
2013-07-25 19:15:32 +08:00
|
|
|
ACCESS_RTE;
|
2000-05-30 19:07:22 +08:00
|
|
|
ONEARG;
|
|
|
|
if (what->aux != v1.type)
|
2000-06-05 23:41:29 +08:00
|
|
|
runtime( "Attempt to set static attribute to incompatible type" );
|
2013-09-27 04:08:21 +08:00
|
|
|
|
2012-01-03 07:42:25 +08:00
|
|
|
f_rta_cow();
|
2000-05-30 19:07:22 +08:00
|
|
|
{
|
|
|
|
struct rta *rta = (*f_rte)->attrs;
|
2012-04-29 07:35:52 +08:00
|
|
|
|
2013-09-27 04:08:21 +08:00
|
|
|
switch (what->a2.i)
|
|
|
|
{
|
|
|
|
case SA_FROM:
|
2015-12-16 17:25:12 +08:00
|
|
|
rta->from = v1.val.ip;
|
2000-05-30 19:07:22 +08:00
|
|
|
break;
|
2012-04-29 07:35:52 +08:00
|
|
|
|
2013-09-27 04:08:21 +08:00
|
|
|
case SA_GW:
|
2013-08-14 02:25:05 +08:00
|
|
|
{
|
2015-12-16 17:25:12 +08:00
|
|
|
ip_addr ip = v1.val.ip;
|
2013-11-23 18:50:34 +08:00
|
|
|
neighbor *n = neigh_find(rta->src->proto, &ip, 0);
|
2013-08-14 02:25:05 +08:00
|
|
|
if (!n || (n->scope == SCOPE_HOST))
|
|
|
|
runtime( "Invalid gw address" );
|
|
|
|
|
|
|
|
rta->dest = RTD_ROUTER;
|
|
|
|
rta->gw = ip;
|
|
|
|
rta->iface = n->iface;
|
|
|
|
rta->nexthops = NULL;
|
|
|
|
rta->hostentry = NULL;
|
|
|
|
}
|
2000-05-30 19:07:22 +08:00
|
|
|
break;
|
2012-04-29 07:35:52 +08:00
|
|
|
|
2013-09-27 04:08:21 +08:00
|
|
|
case SA_SCOPE:
|
2012-04-29 07:35:52 +08:00
|
|
|
rta->scope = v1.val.i;
|
|
|
|
break;
|
|
|
|
|
2013-09-27 04:08:21 +08:00
|
|
|
case SA_DEST:
|
2012-04-29 07:35:52 +08:00
|
|
|
i = v1.val.i;
|
|
|
|
if ((i != RTD_BLACKHOLE) && (i != RTD_UNREACHABLE) && (i != RTD_PROHIBIT))
|
|
|
|
runtime( "Destination can be changed only to blackhole, unreachable or prohibit" );
|
2013-08-14 02:25:05 +08:00
|
|
|
|
2012-04-29 07:35:52 +08:00
|
|
|
rta->dest = i;
|
|
|
|
rta->gw = IPA_NONE;
|
|
|
|
rta->iface = NULL;
|
|
|
|
rta->nexthops = NULL;
|
2013-08-14 02:25:05 +08:00
|
|
|
rta->hostentry = NULL;
|
2012-04-29 07:35:52 +08:00
|
|
|
break;
|
|
|
|
|
2000-05-30 19:07:22 +08:00
|
|
|
default:
|
2013-09-27 04:08:21 +08:00
|
|
|
bug("Invalid static attribute access (%x)", res.type);
|
2000-05-30 19:07:22 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
2000-02-25 19:15:26 +08:00
|
|
|
case P('e','a'): /* Access to extended attributes */
|
2013-07-25 19:15:32 +08:00
|
|
|
ACCESS_RTE;
|
1999-11-04 21:33:30 +08:00
|
|
|
{
|
2000-03-29 17:02:00 +08:00
|
|
|
eattr *e = NULL;
|
2015-05-10 00:50:15 +08:00
|
|
|
u16 code = what->a2.i;
|
|
|
|
|
2000-03-30 16:50:30 +08:00
|
|
|
if (!(f_flags & FF_FORCE_TMPATTR))
|
2015-05-10 00:50:15 +08:00
|
|
|
e = ea_find((*f_rte)->attrs->eattrs, code);
|
|
|
|
if (!e)
|
|
|
|
e = ea_find((*f_tmp_attrs), code);
|
2000-03-30 16:50:30 +08:00
|
|
|
if ((!e) && (f_flags & FF_FORCE_TMPATTR))
|
2015-05-10 00:50:15 +08:00
|
|
|
e = ea_find((*f_rte)->attrs->eattrs, code);
|
2010-03-15 07:34:44 +08:00
|
|
|
|
|
|
|
if (!e) {
|
2010-04-08 23:47:14 +08:00
|
|
|
/* A special case: undefined int_set looks like empty int_set */
|
|
|
|
if ((what->aux & EAF_TYPE_MASK) == EAF_TYPE_INT_SET) {
|
|
|
|
res.type = T_CLIST;
|
2011-08-13 03:03:43 +08:00
|
|
|
res.val.ad = adata_empty(f_pool, 0);
|
|
|
|
break;
|
|
|
|
}
|
2015-05-10 00:50:15 +08:00
|
|
|
|
2011-08-13 03:03:43 +08:00
|
|
|
/* The same special case for ec_set */
|
2015-05-10 00:50:15 +08:00
|
|
|
if ((what->aux & EAF_TYPE_MASK) == EAF_TYPE_EC_SET) {
|
2011-08-13 03:03:43 +08:00
|
|
|
res.type = T_ECLIST;
|
|
|
|
res.val.ad = adata_empty(f_pool, 0);
|
2010-04-08 23:47:14 +08:00
|
|
|
break;
|
|
|
|
}
|
2011-08-13 03:03:43 +08:00
|
|
|
|
2010-03-15 07:34:44 +08:00
|
|
|
/* Undefined value */
|
|
|
|
res.type = T_VOID;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
switch (what->aux & EAF_TYPE_MASK) {
|
|
|
|
case EAF_TYPE_INT:
|
2000-04-17 22:12:02 +08:00
|
|
|
res.type = T_INT;
|
1999-11-04 21:33:30 +08:00
|
|
|
res.val.i = e->u.data;
|
|
|
|
break;
|
2010-03-30 01:29:03 +08:00
|
|
|
case EAF_TYPE_ROUTER_ID:
|
|
|
|
res.type = T_QUAD;
|
|
|
|
res.val.i = e->u.data;
|
|
|
|
break;
|
2010-03-15 07:34:44 +08:00
|
|
|
case EAF_TYPE_OPAQUE:
|
|
|
|
res.type = T_ENUM_EMPTY;
|
|
|
|
res.val.i = 0;
|
|
|
|
break;
|
2008-12-26 00:49:57 +08:00
|
|
|
case EAF_TYPE_IP_ADDRESS:
|
|
|
|
res.type = T_IP;
|
|
|
|
struct adata * ad = e->u.ptr;
|
2015-12-16 17:25:12 +08:00
|
|
|
res.val.ip = * (ip_addr *) ad->data;
|
2008-12-26 00:49:57 +08:00
|
|
|
break;
|
2000-04-17 22:12:02 +08:00
|
|
|
case EAF_TYPE_AS_PATH:
|
|
|
|
res.type = T_PATH;
|
|
|
|
res.val.ad = e->u.ptr;
|
|
|
|
break;
|
2015-05-10 00:50:15 +08:00
|
|
|
case EAF_TYPE_BITFIELD:
|
|
|
|
res.type = T_BOOL;
|
|
|
|
res.val.i = !!(e->u.data & BITFIELD_MASK(what));
|
|
|
|
break;
|
2000-04-17 22:12:02 +08:00
|
|
|
case EAF_TYPE_INT_SET:
|
|
|
|
res.type = T_CLIST;
|
2000-04-12 21:31:39 +08:00
|
|
|
res.val.ad = e->u.ptr;
|
|
|
|
break;
|
2011-08-13 03:03:43 +08:00
|
|
|
case EAF_TYPE_EC_SET:
|
|
|
|
res.type = T_ECLIST;
|
|
|
|
res.val.ad = e->u.ptr;
|
|
|
|
break;
|
2010-03-15 07:34:44 +08:00
|
|
|
case EAF_TYPE_UNDEF:
|
|
|
|
res.type = T_VOID;
|
|
|
|
break;
|
2000-04-12 21:55:53 +08:00
|
|
|
default:
|
2000-05-25 23:20:40 +08:00
|
|
|
bug("Unknown type in e,a");
|
1999-11-04 21:33:30 +08:00
|
|
|
}
|
|
|
|
}
|
1999-11-04 06:23:01 +08:00
|
|
|
break;
|
2000-02-25 19:15:26 +08:00
|
|
|
case P('e','S'):
|
2013-07-25 19:15:32 +08:00
|
|
|
ACCESS_RTE;
|
1999-11-18 22:29:10 +08:00
|
|
|
ONEARG;
|
|
|
|
{
|
|
|
|
struct ea_list *l = lp_alloc(f_pool, sizeof(struct ea_list) + sizeof(eattr));
|
2015-05-10 00:50:15 +08:00
|
|
|
u16 code = what->a2.i;
|
1999-11-18 22:29:10 +08:00
|
|
|
|
|
|
|
l->next = NULL;
|
|
|
|
l->flags = EALF_SORTED;
|
|
|
|
l->count = 1;
|
2015-05-10 00:50:15 +08:00
|
|
|
l->attrs[0].id = code;
|
2000-04-17 19:52:32 +08:00
|
|
|
l->attrs[0].flags = 0;
|
|
|
|
l->attrs[0].type = what->aux | EAF_ORIGINATED;
|
2015-05-10 00:50:15 +08:00
|
|
|
|
2000-03-01 22:31:31 +08:00
|
|
|
switch (what->aux & EAF_TYPE_MASK) {
|
|
|
|
case EAF_TYPE_INT:
|
|
|
|
if (v1.type != T_INT)
|
|
|
|
runtime( "Setting int attribute to non-int value" );
|
1999-11-18 22:29:10 +08:00
|
|
|
l->attrs[0].u.data = v1.val.i;
|
|
|
|
break;
|
2012-11-27 08:25:47 +08:00
|
|
|
|
|
|
|
case EAF_TYPE_ROUTER_ID:
|
|
|
|
/* IP->Quad implicit conversion */
|
2015-12-16 17:25:12 +08:00
|
|
|
if (val_is_ip4(v1)) {
|
|
|
|
l->attrs[0].u.data = ipa_to_u32(v1.val.ip);
|
2012-11-27 08:25:47 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
/* T_INT for backward compatibility */
|
|
|
|
if ((v1.type != T_QUAD) && (v1.type != T_INT))
|
|
|
|
runtime( "Setting quad attribute to non-quad value" );
|
|
|
|
l->attrs[0].u.data = v1.val.i;
|
|
|
|
break;
|
|
|
|
|
2010-03-15 07:34:44 +08:00
|
|
|
case EAF_TYPE_OPAQUE:
|
|
|
|
runtime( "Setting opaque attribute is not allowed" );
|
|
|
|
break;
|
2008-12-26 00:49:57 +08:00
|
|
|
case EAF_TYPE_IP_ADDRESS:
|
|
|
|
if (v1.type != T_IP)
|
|
|
|
runtime( "Setting ip attribute to non-ip value" );
|
|
|
|
int len = sizeof(ip_addr);
|
|
|
|
struct adata *ad = lp_alloc(f_pool, sizeof(struct adata) + len);
|
|
|
|
ad->length = len;
|
2015-12-16 17:25:12 +08:00
|
|
|
(* (ip_addr *) ad->data) = v1.val.ip;
|
2009-09-18 19:59:04 +08:00
|
|
|
l->attrs[0].u.ptr = ad;
|
2008-12-26 00:49:57 +08:00
|
|
|
break;
|
2000-04-12 21:31:39 +08:00
|
|
|
case EAF_TYPE_AS_PATH:
|
|
|
|
if (v1.type != T_PATH)
|
|
|
|
runtime( "Setting path attribute to non-path value" );
|
|
|
|
l->attrs[0].u.ptr = v1.val.ad;
|
|
|
|
break;
|
2015-05-10 00:50:15 +08:00
|
|
|
case EAF_TYPE_BITFIELD:
|
|
|
|
if (v1.type != T_BOOL)
|
|
|
|
runtime( "Setting bit in bitfield attribute to non-bool value" );
|
|
|
|
{
|
|
|
|
/* First, we have to find the old value */
|
|
|
|
eattr *e = NULL;
|
|
|
|
if (!(f_flags & FF_FORCE_TMPATTR))
|
|
|
|
e = ea_find((*f_rte)->attrs->eattrs, code);
|
|
|
|
if (!e)
|
|
|
|
e = ea_find((*f_tmp_attrs), code);
|
|
|
|
if ((!e) && (f_flags & FF_FORCE_TMPATTR))
|
|
|
|
e = ea_find((*f_rte)->attrs->eattrs, code);
|
|
|
|
u32 data = e ? e->u.data : 0;
|
|
|
|
|
|
|
|
if (v1.val.i)
|
|
|
|
l->attrs[0].u.data = data | BITFIELD_MASK(what);
|
|
|
|
else
|
|
|
|
l->attrs[0].u.data = data & ~BITFIELD_MASK(what);;
|
|
|
|
}
|
|
|
|
break;
|
2000-04-17 20:38:24 +08:00
|
|
|
case EAF_TYPE_INT_SET:
|
|
|
|
if (v1.type != T_CLIST)
|
2011-08-13 03:03:43 +08:00
|
|
|
runtime( "Setting clist attribute to non-clist value" );
|
|
|
|
l->attrs[0].u.ptr = v1.val.ad;
|
|
|
|
break;
|
|
|
|
case EAF_TYPE_EC_SET:
|
|
|
|
if (v1.type != T_ECLIST)
|
|
|
|
runtime( "Setting eclist attribute to non-eclist value" );
|
2000-04-17 20:38:24 +08:00
|
|
|
l->attrs[0].u.ptr = v1.val.ad;
|
|
|
|
break;
|
2000-03-01 22:31:31 +08:00
|
|
|
case EAF_TYPE_UNDEF:
|
|
|
|
if (v1.type != T_VOID)
|
|
|
|
runtime( "Setting void attribute to non-void value" );
|
1999-11-24 20:04:32 +08:00
|
|
|
l->attrs[0].u.data = 0;
|
|
|
|
break;
|
2000-04-17 22:12:02 +08:00
|
|
|
default: bug("Unknown type in e,S");
|
1999-11-18 22:29:10 +08:00
|
|
|
}
|
2000-03-01 22:31:31 +08:00
|
|
|
|
2000-03-30 16:50:30 +08:00
|
|
|
if (!(what->aux & EAF_TEMP) && (!(f_flags & FF_FORCE_TMPATTR))) {
|
2012-01-03 07:42:25 +08:00
|
|
|
f_rta_cow();
|
2009-09-18 07:11:09 +08:00
|
|
|
l->next = (*f_rte)->attrs->eattrs;
|
|
|
|
(*f_rte)->attrs->eattrs = l;
|
2000-03-01 22:31:31 +08:00
|
|
|
} else {
|
|
|
|
l->next = (*f_tmp_attrs);
|
|
|
|
(*f_tmp_attrs) = l;
|
|
|
|
}
|
1999-11-18 22:29:10 +08:00
|
|
|
}
|
|
|
|
break;
|
2000-05-30 19:07:22 +08:00
|
|
|
case 'P':
|
2013-07-25 19:15:32 +08:00
|
|
|
ACCESS_RTE;
|
2000-05-30 19:07:22 +08:00
|
|
|
res.type = T_INT;
|
|
|
|
res.val.i = (*f_rte)->pref;
|
|
|
|
break;
|
|
|
|
case P('P','S'):
|
2013-07-25 19:15:32 +08:00
|
|
|
ACCESS_RTE;
|
2000-05-30 19:07:22 +08:00
|
|
|
ONEARG;
|
|
|
|
if (v1.type != T_INT)
|
2000-06-08 16:24:32 +08:00
|
|
|
runtime( "Can't set preference to non-integer" );
|
2014-12-03 17:32:26 +08:00
|
|
|
if (v1.val.i > 0xFFFF)
|
2009-09-17 19:35:37 +08:00
|
|
|
runtime( "Setting preference value out of bounds" );
|
2012-01-03 07:42:25 +08:00
|
|
|
f_rte_cow();
|
2000-05-30 19:07:22 +08:00
|
|
|
(*f_rte)->pref = v1.val.i;
|
|
|
|
break;
|
2000-04-17 19:06:39 +08:00
|
|
|
case 'L': /* Get length of */
|
|
|
|
ONEARG;
|
|
|
|
res.type = T_INT;
|
|
|
|
switch(v1.type) {
|
2015-12-16 17:25:12 +08:00
|
|
|
case T_NET: res.val.i = net_pxlen(v1.val.net); break;
|
2000-04-17 19:06:39 +08:00
|
|
|
case T_PATH: res.val.i = as_path_getlen(v1.val.ad); break;
|
2013-10-02 20:57:29 +08:00
|
|
|
case T_CLIST: res.val.i = int_set_get_size(v1.val.ad); break;
|
|
|
|
case T_ECLIST: res.val.i = ec_set_get_size(v1.val.ad); break;
|
|
|
|
default: runtime( "Prefix, path, clist or eclist expected" );
|
2000-04-17 19:06:39 +08:00
|
|
|
}
|
|
|
|
break;
|
2016-06-29 18:21:43 +08:00
|
|
|
case P('R','m'): /* Get ROA max prefix length */
|
|
|
|
ONEARG;
|
|
|
|
if (v1.type != T_NET || !net_is_roa(v1.val.net))
|
|
|
|
runtime( "ROA expected" );
|
|
|
|
|
|
|
|
res.type = T_INT;
|
|
|
|
res.val.i = (v1.val.net->type == NET_ROA4) ?
|
|
|
|
((net_addr_roa4 *) v1.val.net)->max_pxlen :
|
|
|
|
((net_addr_roa6 *) v1.val.net)->max_pxlen;
|
|
|
|
break;
|
2016-06-29 18:08:28 +08:00
|
|
|
case P('R','a'): /* Get ROA ASN */
|
|
|
|
ONEARG;
|
|
|
|
if (v1.type != T_NET || !net_is_roa(v1.val.net))
|
|
|
|
runtime( "ROA expected" );
|
|
|
|
|
|
|
|
res.type = T_INT;
|
|
|
|
res.val.i = (v1.val.net->type == NET_ROA4) ?
|
|
|
|
((net_addr_roa4 *) v1.val.net)->asn :
|
|
|
|
((net_addr_roa6 *) v1.val.net)->asn;
|
|
|
|
break;
|
2000-02-25 19:15:26 +08:00
|
|
|
case P('c','p'): /* Convert prefix to ... */
|
1999-04-20 02:41:56 +08:00
|
|
|
ONEARG;
|
2015-12-16 17:25:12 +08:00
|
|
|
if (v1.type != T_NET)
|
2000-06-08 16:24:32 +08:00
|
|
|
runtime( "Prefix expected" );
|
2015-12-16 17:25:12 +08:00
|
|
|
res.type = T_IP;
|
|
|
|
res.val.ip = net_prefix(v1.val.net);
|
1999-04-20 02:41:56 +08:00
|
|
|
break;
|
2009-10-08 22:23:24 +08:00
|
|
|
case P('a','f'): /* Get first ASN from AS PATH */
|
|
|
|
ONEARG;
|
|
|
|
if (v1.type != T_PATH)
|
2009-11-15 21:24:20 +08:00
|
|
|
runtime( "AS path expected" );
|
2009-10-08 22:23:24 +08:00
|
|
|
|
|
|
|
as = 0;
|
2009-10-13 02:44:58 +08:00
|
|
|
as_path_get_first(v1.val.ad, &as);
|
2009-10-08 22:23:24 +08:00
|
|
|
res.type = T_INT;
|
|
|
|
res.val.i = as;
|
|
|
|
break;
|
|
|
|
case P('a','l'): /* Get last ASN from AS PATH */
|
|
|
|
ONEARG;
|
|
|
|
if (v1.type != T_PATH)
|
|
|
|
runtime( "AS path expected" );
|
|
|
|
|
|
|
|
as = 0;
|
2009-10-13 02:44:58 +08:00
|
|
|
as_path_get_last(v1.val.ad, &as);
|
2009-10-08 22:23:24 +08:00
|
|
|
res.type = T_INT;
|
|
|
|
res.val.i = as;
|
|
|
|
break;
|
2016-02-17 00:33:58 +08:00
|
|
|
case P('a','L'): /* Get last ASN from non-aggregated part of AS PATH */
|
|
|
|
ONEARG;
|
|
|
|
if (v1.type != T_PATH)
|
|
|
|
runtime( "AS path expected" );
|
|
|
|
|
|
|
|
res.type = T_INT;
|
|
|
|
res.val.i = as_path_get_last_nonaggregated(v1.val.ad);
|
|
|
|
break;
|
2000-02-25 19:15:26 +08:00
|
|
|
case 'r':
|
|
|
|
ONEARG;
|
|
|
|
res = v1;
|
|
|
|
res.type |= T_RETURN;
|
2008-11-17 05:16:04 +08:00
|
|
|
return res;
|
2000-02-25 19:15:26 +08:00
|
|
|
case P('c','a'): /* CALL: this is special: if T_RETURN and returning some value, mask it out */
|
1999-07-01 17:11:21 +08:00
|
|
|
ONEARG;
|
|
|
|
res = interpret(what->a2.p);
|
2000-02-25 19:15:26 +08:00
|
|
|
if (res.type == T_RETURN)
|
|
|
|
return res;
|
2015-05-10 00:50:15 +08:00
|
|
|
res.type &= ~T_RETURN;
|
1999-07-01 17:11:21 +08:00
|
|
|
break;
|
2010-03-19 16:41:18 +08:00
|
|
|
case P('c','v'): /* Clear local variables */
|
|
|
|
for (sym = what->a1.p; sym != NULL; sym = sym->aux2)
|
|
|
|
((struct f_val *) sym->def)->type = T_VOID;
|
|
|
|
break;
|
2000-02-25 19:15:26 +08:00
|
|
|
case P('S','W'):
|
1999-09-29 22:24:58 +08:00
|
|
|
ONEARG;
|
1999-10-29 05:03:36 +08:00
|
|
|
{
|
|
|
|
struct f_tree *t = find_tree(what->a2.p, v1);
|
|
|
|
if (!t) {
|
|
|
|
v1.type = T_VOID;
|
|
|
|
t = find_tree(what->a2.p, v1);
|
|
|
|
if (!t) {
|
2000-05-25 23:20:40 +08:00
|
|
|
debug( "No else statement?\n");
|
1999-10-29 05:03:36 +08:00
|
|
|
break;
|
|
|
|
}
|
2015-05-10 00:50:15 +08:00
|
|
|
}
|
2000-06-01 16:34:30 +08:00
|
|
|
/* It is actually possible to have t->data NULL */
|
2008-11-17 05:16:04 +08:00
|
|
|
|
|
|
|
res = interpret(t->data);
|
|
|
|
if (res.type & T_RETURN)
|
|
|
|
return res;
|
1999-10-29 05:03:36 +08:00
|
|
|
}
|
1999-09-29 22:24:58 +08:00
|
|
|
break;
|
2000-02-25 19:15:26 +08:00
|
|
|
case P('i','M'): /* IP.MASK(val) */
|
1999-11-10 20:44:07 +08:00
|
|
|
TWOARGS;
|
|
|
|
if (v2.type != T_INT)
|
2000-06-08 16:24:32 +08:00
|
|
|
runtime( "Integer expected");
|
1999-11-10 20:44:07 +08:00
|
|
|
if (v1.type != T_IP)
|
2000-06-08 16:24:32 +08:00
|
|
|
runtime( "You can mask only IP addresses" );
|
2015-12-22 00:17:21 +08:00
|
|
|
|
|
|
|
res.type = T_IP;
|
|
|
|
res.val.ip = ipa_is_ip4(v1.val.ip) ?
|
|
|
|
ipa_from_ip4(ip4_and(ipa_to_ip4(v1.val.ip), ip4_mkmask(v2.val.i))) :
|
|
|
|
ipa_from_ip6(ip6_and(ipa_to_ip6(v1.val.ip), ip6_mkmask(v2.val.i)));
|
1999-10-12 14:27:42 +08:00
|
|
|
break;
|
2000-04-17 18:16:47 +08:00
|
|
|
|
|
|
|
case 'E': /* Create empty attribute */
|
|
|
|
res.type = what->aux;
|
2011-08-13 03:03:43 +08:00
|
|
|
res.val.ad = adata_empty(f_pool, 0);
|
2000-04-17 18:16:47 +08:00
|
|
|
break;
|
|
|
|
case P('A','p'): /* Path prepend */
|
|
|
|
TWOARGS;
|
|
|
|
if (v1.type != T_PATH)
|
|
|
|
runtime("Can't prepend to non-path");
|
|
|
|
if (v2.type != T_INT)
|
|
|
|
runtime("Can't prepend non-integer");
|
|
|
|
|
|
|
|
res.type = T_PATH;
|
|
|
|
res.val.ad = as_path_prepend(f_pool, v1.val.ad, v2.val.i);
|
|
|
|
break;
|
|
|
|
|
2011-08-13 03:03:43 +08:00
|
|
|
case P('C','a'): /* (Extended) Community list add or delete */
|
2000-04-17 19:34:38 +08:00
|
|
|
TWOARGS;
|
2013-08-15 07:06:47 +08:00
|
|
|
if (v1.type == T_PATH)
|
|
|
|
{
|
|
|
|
struct f_tree *set = NULL;
|
|
|
|
u32 key = 0;
|
|
|
|
int pos;
|
|
|
|
|
|
|
|
if (v2.type == T_INT)
|
|
|
|
key = v2.val.i;
|
|
|
|
else if ((v2.type == T_SET) && (v2.val.t->from.type == T_INT))
|
|
|
|
set = v2.val.t;
|
|
|
|
else
|
|
|
|
runtime("Can't delete non-integer (set)");
|
|
|
|
|
|
|
|
switch (what->aux)
|
|
|
|
{
|
|
|
|
case 'a': runtime("Can't add to path");
|
|
|
|
case 'd': pos = 0; break;
|
|
|
|
case 'f': pos = 1; break;
|
|
|
|
default: bug("unknown Ca operation");
|
|
|
|
}
|
|
|
|
|
|
|
|
if (pos && !set)
|
|
|
|
runtime("Can't filter integer");
|
|
|
|
|
|
|
|
res.type = T_PATH;
|
|
|
|
res.val.ad = as_path_filter(f_pool, v1.val.ad, set, key, pos);
|
|
|
|
}
|
|
|
|
else if (v1.type == T_CLIST)
|
2011-08-13 03:03:43 +08:00
|
|
|
{
|
|
|
|
/* Community (or cluster) list */
|
|
|
|
struct f_val dummy;
|
|
|
|
int arg_set = 0;
|
2013-11-24 07:17:02 +08:00
|
|
|
uint n = 0;
|
2010-09-12 02:14:53 +08:00
|
|
|
|
2011-08-13 03:03:43 +08:00
|
|
|
if ((v2.type == T_PAIR) || (v2.type == T_QUAD))
|
2013-11-24 07:17:02 +08:00
|
|
|
n = v2.val.i;
|
2011-08-13 03:03:43 +08:00
|
|
|
/* IP->Quad implicit conversion */
|
2015-12-21 04:43:00 +08:00
|
|
|
else if (val_is_ip4(v2))
|
2015-12-16 17:25:12 +08:00
|
|
|
n = ipa_to_u32(v2.val.ip);
|
2011-08-13 03:03:43 +08:00
|
|
|
else if ((v2.type == T_SET) && clist_set_type(v2.val.t, &dummy))
|
|
|
|
arg_set = 1;
|
2012-03-16 03:42:29 +08:00
|
|
|
else if (v2.type == T_CLIST)
|
|
|
|
arg_set = 2;
|
2011-08-13 03:03:43 +08:00
|
|
|
else
|
|
|
|
runtime("Can't add/delete non-pair");
|
|
|
|
|
|
|
|
res.type = T_CLIST;
|
|
|
|
switch (what->aux)
|
|
|
|
{
|
|
|
|
case 'a':
|
2012-03-16 03:42:29 +08:00
|
|
|
if (arg_set == 1)
|
2011-08-13 03:03:43 +08:00
|
|
|
runtime("Can't add set");
|
2012-03-16 03:42:29 +08:00
|
|
|
else if (!arg_set)
|
2013-11-24 07:17:02 +08:00
|
|
|
res.val.ad = int_set_add(f_pool, v1.val.ad, n);
|
2015-05-10 00:50:15 +08:00
|
|
|
else
|
2012-03-16 03:42:29 +08:00
|
|
|
res.val.ad = int_set_union(f_pool, v1.val.ad, v2.val.ad);
|
2011-08-13 03:03:43 +08:00
|
|
|
break;
|
2015-05-10 00:50:15 +08:00
|
|
|
|
2011-08-13 03:03:43 +08:00
|
|
|
case 'd':
|
|
|
|
if (!arg_set)
|
2013-11-24 07:17:02 +08:00
|
|
|
res.val.ad = int_set_del(f_pool, v1.val.ad, n);
|
2011-08-13 03:03:43 +08:00
|
|
|
else
|
2012-03-16 03:42:29 +08:00
|
|
|
res.val.ad = clist_filter(f_pool, v1.val.ad, v2, 0);
|
2011-08-13 03:03:43 +08:00
|
|
|
break;
|
2000-04-17 19:34:38 +08:00
|
|
|
|
2011-08-13 03:03:43 +08:00
|
|
|
case 'f':
|
|
|
|
if (!arg_set)
|
|
|
|
runtime("Can't filter pair");
|
2012-03-16 03:42:29 +08:00
|
|
|
res.val.ad = clist_filter(f_pool, v1.val.ad, v2, 1);
|
2011-08-13 03:03:43 +08:00
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
bug("unknown Ca operation");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else if (v1.type == T_ECLIST)
|
2011-06-26 23:09:24 +08:00
|
|
|
{
|
2011-08-13 03:03:43 +08:00
|
|
|
/* Extended community list */
|
|
|
|
int arg_set = 0;
|
2015-05-10 00:50:15 +08:00
|
|
|
|
2011-08-13 03:03:43 +08:00
|
|
|
/* v2.val is either EC or EC-set */
|
|
|
|
if ((v2.type == T_SET) && eclist_set_type(v2.val.t))
|
|
|
|
arg_set = 1;
|
2012-03-16 03:42:29 +08:00
|
|
|
else if (v2.type == T_ECLIST)
|
|
|
|
arg_set = 2;
|
2011-08-13 03:03:43 +08:00
|
|
|
else if (v2.type != T_EC)
|
|
|
|
runtime("Can't add/delete non-pair");
|
|
|
|
|
|
|
|
res.type = T_ECLIST;
|
|
|
|
switch (what->aux)
|
|
|
|
{
|
|
|
|
case 'a':
|
2012-03-16 03:42:29 +08:00
|
|
|
if (arg_set == 1)
|
2011-08-13 03:03:43 +08:00
|
|
|
runtime("Can't add set");
|
2012-03-16 03:42:29 +08:00
|
|
|
else if (!arg_set)
|
|
|
|
res.val.ad = ec_set_add(f_pool, v1.val.ad, v2.val.ec);
|
2015-05-10 00:50:15 +08:00
|
|
|
else
|
2012-03-16 03:42:29 +08:00
|
|
|
res.val.ad = ec_set_union(f_pool, v1.val.ad, v2.val.ad);
|
2011-08-13 03:03:43 +08:00
|
|
|
break;
|
2015-05-10 00:50:15 +08:00
|
|
|
|
2011-08-13 03:03:43 +08:00
|
|
|
case 'd':
|
|
|
|
if (!arg_set)
|
|
|
|
res.val.ad = ec_set_del(f_pool, v1.val.ad, v2.val.ec);
|
|
|
|
else
|
2012-03-16 03:42:29 +08:00
|
|
|
res.val.ad = eclist_filter(f_pool, v1.val.ad, v2, 0);
|
2011-08-13 03:03:43 +08:00
|
|
|
break;
|
2011-06-26 23:09:24 +08:00
|
|
|
|
2011-08-13 03:03:43 +08:00
|
|
|
case 'f':
|
|
|
|
if (!arg_set)
|
|
|
|
runtime("Can't filter ec");
|
2012-03-16 03:42:29 +08:00
|
|
|
res.val.ad = eclist_filter(f_pool, v1.val.ad, v2, 1);
|
2011-08-13 03:03:43 +08:00
|
|
|
break;
|
2011-06-26 23:09:24 +08:00
|
|
|
|
2011-08-13 03:03:43 +08:00
|
|
|
default:
|
|
|
|
bug("unknown Ca operation");
|
|
|
|
}
|
2000-04-17 19:34:38 +08:00
|
|
|
}
|
2011-08-13 03:03:43 +08:00
|
|
|
else
|
|
|
|
runtime("Can't add/delete to non-(e)clist");
|
|
|
|
|
2000-04-17 19:34:38 +08:00
|
|
|
break;
|
|
|
|
|
2016-01-20 22:38:37 +08:00
|
|
|
|
2012-03-19 00:32:30 +08:00
|
|
|
case P('R','C'): /* ROA Check */
|
|
|
|
if (what->arg1)
|
|
|
|
{
|
|
|
|
TWOARGS;
|
2015-12-16 17:25:12 +08:00
|
|
|
if ((v1.type != T_NET) || (v2.type != T_INT))
|
2012-03-19 00:32:30 +08:00
|
|
|
runtime("Invalid argument to roa_check()");
|
|
|
|
|
|
|
|
as = v2.val.i;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2013-07-25 19:15:32 +08:00
|
|
|
ACCESS_RTE;
|
2015-12-16 17:25:12 +08:00
|
|
|
v1.val.net = (*f_rte)->net->n.addr;
|
2012-03-19 00:32:30 +08:00
|
|
|
|
|
|
|
/* We ignore temporary attributes, probably not a problem here */
|
|
|
|
/* 0x02 is a value of BA_AS_PATH, we don't want to include BGP headers */
|
|
|
|
eattr *e = ea_find((*f_rte)->attrs->eattrs, EA_CODE(EAP_BGP, 0x02));
|
|
|
|
|
|
|
|
if (!e || e->type != EAF_TYPE_AS_PATH)
|
|
|
|
runtime("Missing AS_PATH attribute");
|
|
|
|
|
|
|
|
as_path_get_last(e->u.ptr, &as);
|
|
|
|
}
|
|
|
|
|
2016-01-20 22:38:37 +08:00
|
|
|
struct rtable *table = ((struct f_inst_roa_check *) what)->rtc->table;
|
2016-05-12 22:04:47 +08:00
|
|
|
if (!table)
|
2012-03-19 00:32:30 +08:00
|
|
|
runtime("Missing ROA table");
|
|
|
|
|
2015-09-17 23:15:30 +08:00
|
|
|
if (table->addr_type != NET_ROA4 && table->addr_type != NET_ROA6)
|
|
|
|
runtime("Table type must be either ROA4 or ROA6");
|
2016-05-12 22:04:47 +08:00
|
|
|
|
2012-03-19 00:32:30 +08:00
|
|
|
res.type = T_ENUM_ROA;
|
2015-09-17 23:15:30 +08:00
|
|
|
|
|
|
|
if (table->addr_type != (v1.val.net->type == NET_IP4 ? NET_ROA4 : NET_ROA6))
|
|
|
|
res.val.i = ROA_UNKNOWN; /* Prefix and table type mismatch */
|
|
|
|
else
|
|
|
|
res.val.i = net_roa_check(table, v1.val.net, as);
|
2016-01-20 22:38:37 +08:00
|
|
|
|
2012-03-19 00:32:30 +08:00
|
|
|
break;
|
2016-01-20 22:38:37 +08:00
|
|
|
|
2012-03-19 00:32:30 +08:00
|
|
|
|
1999-04-07 20:11:08 +08:00
|
|
|
default:
|
|
|
|
bug( "Unknown instruction %d (%c)", what->code, what->code & 0xff);
|
|
|
|
}
|
|
|
|
if (what->next)
|
|
|
|
return interpret(what->next);
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2000-02-25 19:15:26 +08:00
|
|
|
#undef ARG
|
2000-02-01 01:44:22 +08:00
|
|
|
#define ARG(x,y) \
|
|
|
|
if (!i_same(f1->y, f2->y)) \
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
#define ONEARG ARG(v1, a1.p)
|
|
|
|
#define TWOARGS ARG(v1, a1.p) \
|
|
|
|
ARG(v2, a2.p)
|
|
|
|
|
|
|
|
#define A2_SAME if (f1->a2.i != f2->a2.i) return 0;
|
|
|
|
|
2000-06-06 01:13:36 +08:00
|
|
|
/*
|
2000-06-05 20:52:57 +08:00
|
|
|
* i_same - function that does real comparing of instruction trees, you should call filter_same from outside
|
|
|
|
*/
|
2000-02-01 01:44:22 +08:00
|
|
|
int
|
|
|
|
i_same(struct f_inst *f1, struct f_inst *f2)
|
|
|
|
{
|
|
|
|
if ((!!f1) != (!!f2))
|
|
|
|
return 0;
|
2000-03-03 06:23:18 +08:00
|
|
|
if (!f1)
|
|
|
|
return 1;
|
2000-02-01 01:44:22 +08:00
|
|
|
if (f1->aux != f2->aux)
|
|
|
|
return 0;
|
|
|
|
if (f1->code != f2->code)
|
|
|
|
return 0;
|
2000-03-03 06:23:18 +08:00
|
|
|
if (f1 == f2) /* It looks strange, but it is possible with call rewriting trickery */
|
|
|
|
return 1;
|
2000-02-01 01:44:22 +08:00
|
|
|
|
|
|
|
switch(f1->code) {
|
|
|
|
case ',': /* fall through */
|
|
|
|
case '+':
|
2000-05-17 20:14:05 +08:00
|
|
|
case '-':
|
|
|
|
case '*':
|
2000-02-01 01:44:22 +08:00
|
|
|
case '/':
|
2000-06-01 16:43:29 +08:00
|
|
|
case '|':
|
|
|
|
case '&':
|
2009-06-02 01:32:41 +08:00
|
|
|
case P('m','p'):
|
2011-09-18 19:52:50 +08:00
|
|
|
case P('m','c'):
|
2000-02-25 19:15:26 +08:00
|
|
|
case P('!','='):
|
|
|
|
case P('=','='):
|
2000-02-01 01:44:22 +08:00
|
|
|
case '<':
|
2000-02-25 19:15:26 +08:00
|
|
|
case P('<','='): TWOARGS; break;
|
2000-02-01 01:44:22 +08:00
|
|
|
|
2000-03-09 22:47:43 +08:00
|
|
|
case '!': ONEARG; break;
|
2000-02-01 01:44:22 +08:00
|
|
|
case '~': TWOARGS; break;
|
2000-02-25 19:15:26 +08:00
|
|
|
case P('d','e'): ONEARG; break;
|
2000-02-01 01:44:22 +08:00
|
|
|
|
|
|
|
case 's':
|
|
|
|
ARG(v2, a2.p);
|
|
|
|
{
|
|
|
|
struct symbol *s1, *s2;
|
|
|
|
s1 = f1->a1.p;
|
|
|
|
s2 = f2->a1.p;
|
|
|
|
if (strcmp(s1->name, s2->name))
|
|
|
|
return 0;
|
|
|
|
if (s1->class != s2->class)
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
2015-05-10 00:50:15 +08:00
|
|
|
case 'c':
|
2009-03-31 18:55:57 +08:00
|
|
|
switch (f1->aux) {
|
|
|
|
|
|
|
|
case T_PREFIX_SET:
|
|
|
|
if (!trie_same(f1->a2.p, f2->a2.p))
|
|
|
|
return 0;
|
2009-05-30 05:08:28 +08:00
|
|
|
break;
|
2009-03-31 18:55:57 +08:00
|
|
|
|
|
|
|
case T_SET:
|
2000-06-09 00:57:41 +08:00
|
|
|
if (!same_tree(f1->a2.p, f2->a2.p))
|
|
|
|
return 0;
|
2009-05-30 05:08:28 +08:00
|
|
|
break;
|
2009-03-31 18:55:57 +08:00
|
|
|
|
2000-06-09 00:57:41 +08:00
|
|
|
case T_STRING:
|
|
|
|
if (strcmp(f1->a2.p, f2->a2.p))
|
|
|
|
return 0;
|
|
|
|
break;
|
2009-03-31 18:55:57 +08:00
|
|
|
|
2000-06-09 00:57:41 +08:00
|
|
|
default:
|
|
|
|
A2_SAME;
|
|
|
|
}
|
|
|
|
break;
|
2013-09-10 18:58:24 +08:00
|
|
|
|
2013-10-02 20:41:37 +08:00
|
|
|
case 'C':
|
|
|
|
if (!val_same(* (struct f_val *) f1->a1.p, * (struct f_val *) f2->a1.p))
|
2000-02-01 01:44:22 +08:00
|
|
|
return 0;
|
|
|
|
break;
|
2013-10-02 20:41:37 +08:00
|
|
|
|
2015-05-10 00:50:15 +08:00
|
|
|
case 'V':
|
2009-05-30 05:08:28 +08:00
|
|
|
if (strcmp((char *) f1->a2.p, (char *) f2->a2.p))
|
|
|
|
return 0;
|
|
|
|
break;
|
2000-04-17 19:06:39 +08:00
|
|
|
case 'p': case 'L': ONEARG; break;
|
2000-02-01 01:44:22 +08:00
|
|
|
case '?': TWOARGS; break;
|
2000-04-17 18:16:47 +08:00
|
|
|
case '0': case 'E': break;
|
2000-02-25 19:15:26 +08:00
|
|
|
case P('p',','): ONEARG; A2_SAME; break;
|
2000-05-30 19:07:22 +08:00
|
|
|
case 'P':
|
2000-02-01 01:44:22 +08:00
|
|
|
case 'a': A2_SAME; break;
|
2000-02-25 19:15:26 +08:00
|
|
|
case P('e','a'): A2_SAME; break;
|
2000-05-30 19:07:22 +08:00
|
|
|
case P('P','S'):
|
|
|
|
case P('a','S'):
|
2000-02-25 19:15:26 +08:00
|
|
|
case P('e','S'): ONEARG; A2_SAME; break;
|
2000-02-01 01:44:22 +08:00
|
|
|
|
2000-02-25 19:15:26 +08:00
|
|
|
case 'r': ONEARG; break;
|
|
|
|
case P('c','p'): ONEARG; break;
|
2000-03-03 06:23:18 +08:00
|
|
|
case P('c','a'): /* Call rewriting trickery to avoid exponential behaviour */
|
2015-05-10 00:50:15 +08:00
|
|
|
ONEARG;
|
2000-03-03 06:23:18 +08:00
|
|
|
if (!i_same(f1->a2.p, f2->a2.p))
|
2015-05-10 00:50:15 +08:00
|
|
|
return 0;
|
2000-03-03 06:23:18 +08:00
|
|
|
f2->a2.p = f1->a2.p;
|
|
|
|
break;
|
2015-05-10 00:50:15 +08:00
|
|
|
case P('c','v'): break; /* internal instruction */
|
2000-02-25 19:15:26 +08:00
|
|
|
case P('S','W'): ONEARG; if (!same_tree(f1->a2.p, f2->a2.p)) return 0; break;
|
|
|
|
case P('i','M'): TWOARGS; break;
|
2000-04-17 18:16:47 +08:00
|
|
|
case P('A','p'): TWOARGS; break;
|
2000-04-17 19:34:38 +08:00
|
|
|
case P('C','a'): TWOARGS; break;
|
2009-11-15 21:24:20 +08:00
|
|
|
case P('a','f'):
|
|
|
|
case P('a','l'): ONEARG; break;
|
2015-12-16 22:30:44 +08:00
|
|
|
#if 0
|
2012-03-19 00:32:30 +08:00
|
|
|
case P('R','C'):
|
|
|
|
TWOARGS;
|
|
|
|
/* Does not really make sense - ROA check resuls may change anyway */
|
2015-05-10 00:50:15 +08:00
|
|
|
if (strcmp(((struct f_inst_roa_check *) f1)->rtc->name,
|
2012-03-19 00:32:30 +08:00
|
|
|
((struct f_inst_roa_check *) f2)->rtc->name))
|
|
|
|
return 0;
|
|
|
|
break;
|
2015-12-16 22:30:44 +08:00
|
|
|
#endif
|
2000-02-01 01:44:22 +08:00
|
|
|
default:
|
|
|
|
bug( "Unknown instruction %d in same (%c)", f1->code, f1->code & 0xff);
|
|
|
|
}
|
|
|
|
return i_same(f1->next, f2->next);
|
|
|
|
}
|
|
|
|
|
2000-04-28 17:48:28 +08:00
|
|
|
/**
|
2012-01-03 07:42:25 +08:00
|
|
|
* f_run - run a filter for a route
|
|
|
|
* @filter: filter to run
|
|
|
|
* @rte: route being filtered, may be modified
|
|
|
|
* @tmp_attrs: temporary attributes, prepared by caller or generated by f_run()
|
2000-04-28 17:48:28 +08:00
|
|
|
* @tmp_pool: all filter allocations go from this pool
|
2000-06-06 01:13:36 +08:00
|
|
|
* @flags: flags
|
2012-01-03 07:42:25 +08:00
|
|
|
*
|
|
|
|
* If filter needs to modify the route, there are several
|
|
|
|
* posibilities. @rte might be read-only (with REF_COW flag), in that
|
|
|
|
* case rw copy is obtained by rte_cow() and @rte is replaced. If
|
|
|
|
* @rte is originally rw, it may be directly modified (and it is never
|
|
|
|
* copied).
|
|
|
|
*
|
|
|
|
* The returned rte may reuse the (possibly cached, cloned) rta, or
|
|
|
|
* (if rta was modificied) contains a modified uncached rta, which
|
|
|
|
* uses parts allocated from @tmp_pool and parts shared from original
|
|
|
|
* rta. There is one exception - if @rte is rw but contains a cached
|
|
|
|
* rta and that is modified, rta in returned rte is also cached.
|
|
|
|
*
|
|
|
|
* Ownership of cached rtas is consistent with rte, i.e.
|
|
|
|
* if a new rte is returned, it has its own clone of cached rta
|
|
|
|
* (and cached rta of read-only source rte is intact), if rte is
|
|
|
|
* modified in place, old cached rta is possibly freed.
|
2000-04-28 17:48:28 +08:00
|
|
|
*/
|
1999-04-07 20:11:08 +08:00
|
|
|
int
|
2000-03-29 17:02:00 +08:00
|
|
|
f_run(struct filter *filter, struct rte **rte, struct ea_list **tmp_attrs, struct linpool *tmp_pool, int flags)
|
1999-04-07 20:11:08 +08:00
|
|
|
{
|
2013-02-09 06:58:27 +08:00
|
|
|
if (filter == FILTER_ACCEPT)
|
|
|
|
return F_ACCEPT;
|
|
|
|
|
|
|
|
if (filter == FILTER_REJECT)
|
|
|
|
return F_REJECT;
|
|
|
|
|
2012-01-03 07:42:25 +08:00
|
|
|
int rte_cow = ((*rte)->flags & REF_COW);
|
2000-03-13 05:01:38 +08:00
|
|
|
DBG( "Running filter `%s'...", filter->name );
|
1999-04-07 20:11:08 +08:00
|
|
|
|
1999-04-20 02:41:56 +08:00
|
|
|
f_rte = rte;
|
2012-01-03 07:42:25 +08:00
|
|
|
f_old_rta = NULL;
|
|
|
|
f_tmp_attrs = tmp_attrs;
|
1999-11-18 22:29:10 +08:00
|
|
|
f_pool = tmp_pool;
|
2012-01-03 07:42:25 +08:00
|
|
|
f_flags = flags;
|
2010-09-20 19:01:01 +08:00
|
|
|
|
2013-10-06 02:12:28 +08:00
|
|
|
LOG_BUFFER_INIT(f_buf);
|
|
|
|
|
2012-01-03 07:42:25 +08:00
|
|
|
struct f_val res = interpret(filter->root);
|
|
|
|
|
|
|
|
if (f_old_rta) {
|
|
|
|
/*
|
|
|
|
* Cached rta was modified and f_rte contains now an uncached one,
|
|
|
|
* sharing some part with the cached one. The cached rta should
|
|
|
|
* be freed (if rte was originally COW, f_old_rta is a clone
|
|
|
|
* obtained during rte_cow()).
|
|
|
|
*
|
|
|
|
* This also implements the exception mentioned in f_run()
|
|
|
|
* description. The reason for this is that rta reuses parts of
|
|
|
|
* f_old_rta, and these may be freed during rta_free(f_old_rta).
|
|
|
|
* This is not the problem if rte was COW, because original rte
|
|
|
|
* also holds the same rta.
|
|
|
|
*/
|
|
|
|
if (!rte_cow)
|
|
|
|
(*f_rte)->attrs = rta_lookup((*f_rte)->attrs);
|
|
|
|
|
|
|
|
rta_free(f_old_rta);
|
|
|
|
}
|
|
|
|
|
2010-09-20 19:01:01 +08:00
|
|
|
|
2000-06-01 05:50:13 +08:00
|
|
|
if (res.type != T_RETURN) {
|
2014-10-02 17:41:34 +08:00
|
|
|
log_rl(&rl_runtime_err, L_ERR "Filter %s did not return accept nor reject. Make up your mind", filter->name);
|
1999-04-07 20:11:08 +08:00
|
|
|
return F_ERROR;
|
2000-06-01 05:50:13 +08:00
|
|
|
}
|
2013-11-24 07:17:02 +08:00
|
|
|
DBG( "done (%u)\n", res.val.i );
|
1999-04-07 20:11:08 +08:00
|
|
|
return res.val.i;
|
|
|
|
}
|
|
|
|
|
2015-07-20 17:12:02 +08:00
|
|
|
/* TODO: perhaps we could integrate f_eval(), f_eval_rte() and f_run() */
|
|
|
|
|
|
|
|
struct f_val
|
|
|
|
f_eval_rte(struct f_inst *expr, struct rte **rte, struct linpool *tmp_pool)
|
|
|
|
{
|
|
|
|
struct ea_list *tmp_attrs = NULL;
|
|
|
|
|
|
|
|
f_rte = rte;
|
|
|
|
f_old_rta = NULL;
|
|
|
|
f_tmp_attrs = &tmp_attrs;
|
|
|
|
f_pool = tmp_pool;
|
|
|
|
f_flags = 0;
|
|
|
|
|
|
|
|
LOG_BUFFER_INIT(f_buf);
|
|
|
|
|
|
|
|
/* Note that in this function we assume that rte->attrs is private / uncached */
|
|
|
|
struct f_val res = interpret(expr);
|
|
|
|
|
|
|
|
/* Hack to include EAF_TEMP attributes to the main list */
|
|
|
|
(*rte)->attrs->eattrs = ea_append(tmp_attrs, (*rte)->attrs->eattrs);
|
|
|
|
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2013-07-25 19:15:32 +08:00
|
|
|
struct f_val
|
|
|
|
f_eval(struct f_inst *expr, struct linpool *tmp_pool)
|
2000-05-15 18:49:38 +08:00
|
|
|
{
|
2000-05-17 06:37:53 +08:00
|
|
|
f_flags = 0;
|
|
|
|
f_tmp_attrs = NULL;
|
|
|
|
f_rte = NULL;
|
2013-07-25 19:15:32 +08:00
|
|
|
f_pool = tmp_pool;
|
2010-09-20 19:01:01 +08:00
|
|
|
|
2013-10-06 02:12:28 +08:00
|
|
|
LOG_BUFFER_INIT(f_buf);
|
|
|
|
|
2013-07-25 19:15:32 +08:00
|
|
|
return interpret(expr);
|
|
|
|
}
|
2010-09-20 19:01:01 +08:00
|
|
|
|
2013-11-24 07:17:02 +08:00
|
|
|
uint
|
2013-07-25 19:15:32 +08:00
|
|
|
f_eval_int(struct f_inst *expr)
|
|
|
|
{
|
|
|
|
/* Called independently in parse-time to eval expressions */
|
|
|
|
struct f_val res = f_eval(expr, cfg_mem);
|
2010-09-20 19:01:01 +08:00
|
|
|
|
2000-05-17 06:37:53 +08:00
|
|
|
if (res.type != T_INT)
|
|
|
|
cf_error("Integer expression expected");
|
2013-07-25 19:15:32 +08:00
|
|
|
|
2000-05-17 06:37:53 +08:00
|
|
|
return res.val.i;
|
|
|
|
}
|
2000-05-15 18:49:38 +08:00
|
|
|
|
2009-06-02 01:32:41 +08:00
|
|
|
u32
|
|
|
|
f_eval_asn(struct f_inst *expr)
|
|
|
|
{
|
2010-09-20 19:01:01 +08:00
|
|
|
/* Called as a part of another interpret call, therefore no log_reset() */
|
2009-06-02 01:32:41 +08:00
|
|
|
struct f_val res = interpret(expr);
|
2010-10-09 07:00:53 +08:00
|
|
|
return (res.type == T_INT) ? res.val.i : 0;
|
2009-06-02 01:32:41 +08:00
|
|
|
}
|
|
|
|
|
2000-04-28 17:48:28 +08:00
|
|
|
/**
|
|
|
|
* filter_same - compare two filters
|
|
|
|
* @new: first filter to be compared
|
|
|
|
* @old: second filter to be compared, notice that this filter is
|
|
|
|
* damaged while comparing.
|
|
|
|
*
|
|
|
|
* Returns 1 in case filters are same, otherwise 0. If there are
|
|
|
|
* underlying bugs, it will rather say 0 on same filters than say
|
|
|
|
* 1 on different.
|
|
|
|
*/
|
2000-01-17 01:49:32 +08:00
|
|
|
int
|
|
|
|
filter_same(struct filter *new, struct filter *old)
|
|
|
|
{
|
2000-03-13 06:40:07 +08:00
|
|
|
if (old == new) /* Handle FILTER_ACCEPT and FILTER_REJECT */
|
|
|
|
return 1;
|
|
|
|
if (old == FILTER_ACCEPT || old == FILTER_REJECT ||
|
|
|
|
new == FILTER_ACCEPT || new == FILTER_REJECT)
|
|
|
|
return 0;
|
2000-02-01 01:44:22 +08:00
|
|
|
return i_same(new->root, old->root);
|
2000-01-17 01:49:32 +08:00
|
|
|
}
|