2018-12-17 20:08:08 +08:00
|
|
|
/*
|
|
|
|
* Filters: Instructions themselves
|
|
|
|
*
|
|
|
|
* Copyright 1998 Pavel Machek <pavel@ucw.cz>
|
|
|
|
* Copyright 2018 Maria Matejka <mq@jmq.cz>
|
|
|
|
* Copyright 2018 CZ.NIC z.s.p.o.
|
|
|
|
*
|
|
|
|
* Can be freely distributed and used under the terms of the GNU GPL.
|
|
|
|
*
|
2019-03-06 22:01:10 +08:00
|
|
|
* Filter instructions. You shall define your instruction only here
|
|
|
|
* and nowhere else.
|
|
|
|
*
|
|
|
|
* Beware. This file is interpreted by M4 macros. These macros
|
|
|
|
* may be more stupid than you could imagine. If something strange
|
|
|
|
* happens after changing this file, compare the results before and
|
|
|
|
* after your change (see the Makefile to find out where the results are)
|
|
|
|
* and see what really happened.
|
|
|
|
*
|
|
|
|
* This file is not directly a C source code -> it is a generator input
|
|
|
|
* for several C sources; every instruction block gets expanded into many
|
|
|
|
* different places.
|
|
|
|
*
|
2019-07-01 19:13:06 +08:00
|
|
|
* All the arguments are processed literally; if you need an argument including comma,
|
|
|
|
* you have to quote it by [[ ... ]]
|
|
|
|
*
|
2019-03-06 22:01:10 +08:00
|
|
|
* What is the syntax here?
|
|
|
|
* m4_dnl INST(FI_NOP, in, out) { enum value, input args, output args
|
|
|
|
* m4_dnl ARG(num, type); argument, its id (in data fields) and type
|
|
|
|
* m4_dnl ARG_ANY(num); argument with no type check
|
|
|
|
* m4_dnl LINE(num, unused); this argument has to be converted to its own f_line
|
2019-06-28 17:08:48 +08:00
|
|
|
* m4_dnl SYMBOL; symbol handed from config
|
2019-03-06 22:01:10 +08:00
|
|
|
* m4_dnl STATIC_ATTR; static attribute definition
|
|
|
|
* m4_dnl DYNAMIC_ATTR; dynamic attribute definition
|
|
|
|
* m4_dnl RTC; route table config
|
|
|
|
* m4_dnl ACCESS_RTE; this instruction needs route
|
|
|
|
* m4_dnl ACCESS_EATTRS; this instruction needs extended attributes
|
2019-07-01 19:13:06 +08:00
|
|
|
*
|
|
|
|
* m4_dnl FID_MEMBER( custom instruction member
|
|
|
|
* m4_dnl C type, for storage in structs
|
2019-07-02 16:45:53 +08:00
|
|
|
* m4_dnl name, how the member is named
|
2019-07-01 20:12:05 +08:00
|
|
|
* m4_dnl comparator for same(), if different, this should be TRUE (CAVEAT)
|
2019-07-01 19:13:06 +08:00
|
|
|
* m4_dnl dump format string debug -> format string for bvsnprintf
|
|
|
|
* m4_dnl dump format args appropriate args
|
|
|
|
* m4_dnl )
|
|
|
|
*
|
2019-03-06 22:01:10 +08:00
|
|
|
* m4_dnl RESULT(type, union-field, value); putting this on value stack
|
2019-07-01 18:07:06 +08:00
|
|
|
* m4_dnl RESULT_VAL(value-struct); pass the struct f_val directly
|
|
|
|
* m4_dnl RESULT_VOID; return undef
|
2019-03-06 22:01:10 +08:00
|
|
|
* m4_dnl }
|
|
|
|
*
|
|
|
|
* Other code is just copied into the interpreter part.
|
|
|
|
*
|
|
|
|
* If you want to write something really special, see FI_CALL
|
|
|
|
* or FI_CONSTANT or whatever else to see how to use the FID_*
|
|
|
|
* macros.
|
2018-12-17 20:08:08 +08:00
|
|
|
*/
|
|
|
|
|
|
|
|
/* Binary operators */
|
2018-12-27 21:26:11 +08:00
|
|
|
INST(FI_ADD, 2, 1) {
|
|
|
|
ARG(1,T_INT);
|
|
|
|
ARG(2,T_INT);
|
2019-07-01 18:07:06 +08:00
|
|
|
RESULT(T_INT, i, v1.val.i + v2.val.i);
|
2018-12-27 21:26:11 +08:00
|
|
|
}
|
|
|
|
INST(FI_SUBTRACT, 2, 1) {
|
|
|
|
ARG(1,T_INT);
|
|
|
|
ARG(2,T_INT);
|
2019-07-01 18:07:06 +08:00
|
|
|
RESULT(T_INT, i, v1.val.i - v2.val.i);
|
2018-12-27 21:26:11 +08:00
|
|
|
}
|
|
|
|
INST(FI_MULTIPLY, 2, 1) {
|
|
|
|
ARG(1,T_INT);
|
|
|
|
ARG(2,T_INT);
|
2019-07-01 18:07:06 +08:00
|
|
|
RESULT(T_INT, i, v1.val.i * v2.val.i);
|
2018-12-27 21:26:11 +08:00
|
|
|
}
|
|
|
|
INST(FI_DIVIDE, 2, 1) {
|
|
|
|
ARG(1,T_INT);
|
|
|
|
ARG(2,T_INT);
|
|
|
|
if (v2.val.i == 0) runtime( "Mother told me not to divide by 0" );
|
2019-07-01 18:07:06 +08:00
|
|
|
RESULT(T_INT, i, v1.val.i / v2.val.i);
|
2018-12-27 21:26:11 +08:00
|
|
|
}
|
|
|
|
INST(FI_AND, 1, 1) {
|
|
|
|
ARG(1,T_BOOL);
|
2019-07-01 18:07:06 +08:00
|
|
|
if (v1.val.i)
|
2018-12-27 21:26:11 +08:00
|
|
|
LINE(2,0);
|
|
|
|
else
|
2019-07-01 18:07:06 +08:00
|
|
|
RESULT_VAL(v1);
|
2018-12-20 23:25:54 +08:00
|
|
|
}
|
2018-12-27 21:26:11 +08:00
|
|
|
INST(FI_OR, 1, 1) {
|
|
|
|
ARG(1,T_BOOL);
|
2019-07-01 18:07:06 +08:00
|
|
|
if (!v1.val.i)
|
2018-12-27 21:26:11 +08:00
|
|
|
LINE(2,0);
|
|
|
|
else
|
2019-07-01 18:07:06 +08:00
|
|
|
RESULT_VAL(v1);
|
2018-12-20 23:25:54 +08:00
|
|
|
}
|
2018-12-27 21:26:11 +08:00
|
|
|
INST(FI_PAIR_CONSTRUCT, 2, 1) {
|
2018-12-17 20:08:08 +08:00
|
|
|
ARG(1,T_INT);
|
|
|
|
ARG(2,T_INT);
|
2018-12-27 21:26:11 +08:00
|
|
|
uint u1 = v1.val.i;
|
|
|
|
uint u2 = v2.val.i;
|
2018-12-17 20:08:08 +08:00
|
|
|
if ((u1 > 0xFFFF) || (u2 > 0xFFFF))
|
|
|
|
runtime( "Can't operate with value out of bounds in pair constructor" );
|
2018-12-27 21:26:11 +08:00
|
|
|
RESULT(T_PAIR, i, (u1 << 16) | u2);
|
2018-12-20 23:25:54 +08:00
|
|
|
}
|
2018-12-27 21:26:11 +08:00
|
|
|
INST(FI_EC_CONSTRUCT, 2, 1) {
|
|
|
|
ARG_ANY(1);
|
|
|
|
ARG(2, T_INT);
|
2019-07-01 19:13:06 +08:00
|
|
|
|
2019-07-02 16:45:53 +08:00
|
|
|
FID_MEMBER(enum ec_subtype, ecs, f1->ecs != f2->ecs, ec subtype %s, ec_subtype_str(item->ecs));
|
2018-12-17 20:08:08 +08:00
|
|
|
|
2018-12-27 21:26:11 +08:00
|
|
|
int check, ipv4_used;
|
|
|
|
u32 key, val;
|
2018-12-17 20:08:08 +08:00
|
|
|
|
2018-12-27 21:26:11 +08:00
|
|
|
if (v1.type == T_INT) {
|
|
|
|
ipv4_used = 0; key = v1.val.i;
|
|
|
|
}
|
|
|
|
else if (v1.type == T_QUAD) {
|
|
|
|
ipv4_used = 1; key = v1.val.i;
|
|
|
|
}
|
|
|
|
/* IP->Quad implicit conversion */
|
|
|
|
else if (val_is_ip4(&v1)) {
|
|
|
|
ipv4_used = 1; key = ipa_to_u32(v1.val.ip);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
runtime("Argument 1 of instruction FI_EC_CONSTRUCT must be integer or IPv4 address, got 0x%02x");
|
2018-12-17 20:08:08 +08:00
|
|
|
|
2018-12-27 21:26:11 +08:00
|
|
|
val = v2.val.i;
|
2018-12-17 20:08:08 +08:00
|
|
|
|
2018-12-27 21:26:11 +08:00
|
|
|
if (ecs == EC_GENERIC) {
|
|
|
|
check = 0; RESULT(T_EC, ec, ec_generic(key, val));
|
|
|
|
}
|
|
|
|
else if (ipv4_used) {
|
|
|
|
check = 1; RESULT(T_EC, ec, ec_ip4(ecs, key, val));
|
2018-12-20 23:25:54 +08:00
|
|
|
}
|
2018-12-27 21:26:11 +08:00
|
|
|
else if (key < 0x10000) {
|
|
|
|
check = 0; RESULT(T_EC, ec, ec_as2(ecs, key, val));
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
check = 1; RESULT(T_EC, ec, ec_as4(ecs, key, val));
|
2018-12-17 20:08:08 +08:00
|
|
|
}
|
|
|
|
|
2018-12-27 21:26:11 +08:00
|
|
|
if (check && (val > 0xFFFF))
|
|
|
|
runtime("Value %u > %u out of bounds in EC constructor", val, 0xFFFF);
|
|
|
|
}
|
2018-12-17 20:08:08 +08:00
|
|
|
|
2018-12-27 21:26:11 +08:00
|
|
|
INST(FI_LC_CONSTRUCT, 3, 1) {
|
|
|
|
ARG(1, T_INT);
|
|
|
|
ARG(2, T_INT);
|
|
|
|
ARG(3, T_INT);
|
|
|
|
RESULT(T_LC, lc, [[(lcomm) { v1.val.i, v2.val.i, v3.val.i }]]);
|
|
|
|
}
|
2018-12-17 20:08:08 +08:00
|
|
|
|
2018-12-27 21:26:11 +08:00
|
|
|
INST(FI_PATHMASK_CONSTRUCT, 0, 1) {
|
|
|
|
ARG_ANY(1);
|
2019-07-02 16:45:53 +08:00
|
|
|
FID_MEMBER(uint, count, f1->count != f2->count, number of items %u, item->count);
|
2019-01-21 16:17:54 +08:00
|
|
|
|
2019-02-08 20:38:12 +08:00
|
|
|
FID_NEW_BODY
|
|
|
|
uint len = 0;
|
2019-07-02 16:45:53 +08:00
|
|
|
for (const struct f_inst *tt = f1; tt; tt = tt->next, len++);
|
2019-01-21 16:17:54 +08:00
|
|
|
|
2019-06-28 17:08:48 +08:00
|
|
|
whati->count = len;
|
2019-07-02 16:45:53 +08:00
|
|
|
struct f_inst **items;
|
|
|
|
if (constargs) {
|
|
|
|
items = alloca(len * sizeof(struct f_inst *));
|
|
|
|
for (uint i=0; f1; i++) {
|
|
|
|
items[i] = f1;
|
|
|
|
f1 = f1->next;
|
|
|
|
items[i]->next = 0;
|
|
|
|
}
|
|
|
|
whati->f1 = NULL;
|
|
|
|
}
|
2019-07-02 23:39:56 +08:00
|
|
|
FID_INTERPRET_BODY
|
2019-01-21 16:17:54 +08:00
|
|
|
|
2019-07-02 16:45:53 +08:00
|
|
|
FID_INTERPRET_EXEC
|
2019-05-30 03:03:52 +08:00
|
|
|
if (fstk->vcnt < whati->count) /* TODO: make this check systematic */
|
2019-02-16 06:59:44 +08:00
|
|
|
runtime("Construction of BGP path mask from %u elements must have at least that number of elements", whati->count);
|
2018-12-27 21:26:11 +08:00
|
|
|
|
2019-07-03 07:23:49 +08:00
|
|
|
#define pv fstk->vstk[fstk->vcnt - whati->count + i]
|
2019-07-02 16:45:53 +08:00
|
|
|
|
|
|
|
FID_INTERPRET_NEW
|
|
|
|
#define pv items[i]->i_FI_CONSTANT.val
|
|
|
|
|
|
|
|
FID_INTERPRET_BODY
|
|
|
|
struct f_path_mask *pm = falloc(sizeof(struct f_path_mask) + whati->count * sizeof(struct f_path_mask_item));
|
2019-02-16 06:59:44 +08:00
|
|
|
for (uint i=0; i<whati->count; i++) {
|
2018-12-27 21:26:11 +08:00
|
|
|
switch (pv.type) {
|
|
|
|
case T_PATH_MASK_ITEM:
|
|
|
|
pm->item[i] = pv.val.pmi;
|
|
|
|
break;
|
|
|
|
case T_INT:
|
|
|
|
pm->item[i] = (struct f_path_mask_item) {
|
|
|
|
.asn = pv.val.i,
|
|
|
|
.kind = PM_ASN,
|
|
|
|
};
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
runtime( "Error resolving path mask template: value not an integer" );
|
|
|
|
}
|
2018-12-17 20:08:08 +08:00
|
|
|
}
|
|
|
|
|
2019-07-02 16:45:53 +08:00
|
|
|
FID_INTERPRET_EXEC
|
|
|
|
fstk->vcnt -= whati->count;
|
2019-07-02 23:39:56 +08:00
|
|
|
FID_INTERPRET_BODY
|
2018-12-17 20:08:08 +08:00
|
|
|
|
2019-07-02 16:45:53 +08:00
|
|
|
pm->len = whati->count;
|
2018-12-27 21:26:11 +08:00
|
|
|
RESULT(T_PATH_MASK, path_mask, pm);
|
|
|
|
}
|
2018-12-17 20:08:08 +08:00
|
|
|
|
|
|
|
/* Relational operators */
|
|
|
|
|
2018-12-27 21:26:11 +08:00
|
|
|
INST(FI_NEQ, 2, 1) {
|
2018-12-20 21:05:32 +08:00
|
|
|
ARG_ANY(1);
|
|
|
|
ARG_ANY(2);
|
2018-12-27 21:26:11 +08:00
|
|
|
RESULT(T_BOOL, i, !val_same(&v1, &v2));
|
2018-12-20 23:25:54 +08:00
|
|
|
}
|
2018-12-17 20:08:08 +08:00
|
|
|
|
2018-12-27 21:26:11 +08:00
|
|
|
INST(FI_EQ, 2, 1) {
|
2018-12-20 21:05:32 +08:00
|
|
|
ARG_ANY(1);
|
|
|
|
ARG_ANY(2);
|
2018-12-27 21:26:11 +08:00
|
|
|
RESULT(T_BOOL, i, val_same(&v1, &v2));
|
2018-12-20 23:25:54 +08:00
|
|
|
}
|
2018-12-20 21:05:32 +08:00
|
|
|
|
2018-12-27 21:26:11 +08:00
|
|
|
INST(FI_LT, 2, 1) {
|
2018-12-20 21:05:32 +08:00
|
|
|
ARG_ANY(1);
|
|
|
|
ARG_ANY(2);
|
2018-12-27 21:26:11 +08:00
|
|
|
int i = val_compare(&v1, &v2);
|
2019-02-12 00:12:48 +08:00
|
|
|
if (i == F_CMP_ERROR)
|
2018-12-20 21:05:32 +08:00
|
|
|
runtime( "Can't compare values of incompatible types" );
|
2018-12-27 21:26:11 +08:00
|
|
|
RESULT(T_BOOL, i, (i == -1));
|
2018-12-20 23:25:54 +08:00
|
|
|
}
|
2018-12-17 20:08:08 +08:00
|
|
|
|
2018-12-27 21:26:11 +08:00
|
|
|
INST(FI_LTE, 2, 1) {
|
2018-12-20 21:05:32 +08:00
|
|
|
ARG_ANY(1);
|
|
|
|
ARG_ANY(2);
|
2018-12-27 21:26:11 +08:00
|
|
|
int i = val_compare(&v1, &v2);
|
2019-02-12 00:12:48 +08:00
|
|
|
if (i == F_CMP_ERROR)
|
2018-12-20 21:05:32 +08:00
|
|
|
runtime( "Can't compare values of incompatible types" );
|
2018-12-27 21:26:11 +08:00
|
|
|
RESULT(T_BOOL, i, (i != 1));
|
2018-12-20 23:25:54 +08:00
|
|
|
}
|
2018-12-17 20:08:08 +08:00
|
|
|
|
2018-12-27 21:26:11 +08:00
|
|
|
INST(FI_NOT, 1, 1) {
|
|
|
|
ARG(1,T_BOOL);
|
|
|
|
RESULT(T_BOOL, i, !v1.val.i);
|
2018-12-20 23:25:54 +08:00
|
|
|
}
|
2018-12-17 20:08:08 +08:00
|
|
|
|
2018-12-27 21:26:11 +08:00
|
|
|
INST(FI_MATCH, 2, 1) {
|
2018-12-17 20:08:08 +08:00
|
|
|
ARG_ANY(1);
|
|
|
|
ARG_ANY(2);
|
2018-12-27 21:26:11 +08:00
|
|
|
int i = val_in_range(&v1, &v2);
|
2019-02-12 00:12:48 +08:00
|
|
|
if (i == F_CMP_ERROR)
|
2018-12-17 20:08:08 +08:00
|
|
|
runtime( "~ applied on unknown type pair" );
|
2018-12-27 21:26:11 +08:00
|
|
|
RESULT(T_BOOL, i, !!i);
|
2018-12-20 23:25:54 +08:00
|
|
|
}
|
2018-12-17 20:08:08 +08:00
|
|
|
|
2018-12-27 21:26:11 +08:00
|
|
|
INST(FI_NOT_MATCH, 2, 1) {
|
2018-12-17 20:08:08 +08:00
|
|
|
ARG_ANY(1);
|
|
|
|
ARG_ANY(2);
|
2018-12-27 21:26:11 +08:00
|
|
|
int i = val_in_range(&v1, &v2);
|
2019-03-23 20:32:14 +08:00
|
|
|
if (i == F_CMP_ERROR)
|
2018-12-17 20:08:08 +08:00
|
|
|
runtime( "!~ applied on unknown type pair" );
|
2018-12-27 21:26:11 +08:00
|
|
|
RESULT(T_BOOL, i, !i);
|
2018-12-20 23:25:54 +08:00
|
|
|
}
|
2018-12-17 20:08:08 +08:00
|
|
|
|
2018-12-27 21:26:11 +08:00
|
|
|
INST(FI_DEFINED, 1, 1) {
|
2018-12-17 20:08:08 +08:00
|
|
|
ARG_ANY(1);
|
2018-12-27 21:26:11 +08:00
|
|
|
RESULT(T_BOOL, i, (v1.type != T_VOID) && !undef_value(v1));
|
2018-12-20 23:25:54 +08:00
|
|
|
}
|
2018-12-27 21:26:11 +08:00
|
|
|
|
|
|
|
INST(FI_TYPE, 1, 1) {
|
2018-12-17 20:08:08 +08:00
|
|
|
ARG_ANY(1); /* There may be more types supporting this operation */
|
|
|
|
switch (v1.type)
|
|
|
|
{
|
|
|
|
case T_NET:
|
2018-12-27 21:26:11 +08:00
|
|
|
RESULT(T_ENUM_NETTYPE, i, v1.val.net->type);
|
2018-12-17 20:08:08 +08:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
runtime( "Can't determine type of this item" );
|
|
|
|
}
|
2018-12-20 23:25:54 +08:00
|
|
|
}
|
2018-12-27 21:26:11 +08:00
|
|
|
|
|
|
|
INST(FI_IS_V4, 1, 1) {
|
2018-12-17 20:08:08 +08:00
|
|
|
ARG(1, T_IP);
|
2018-12-27 21:26:11 +08:00
|
|
|
RESULT(T_BOOL, i, ipa_is_ip4(v1.val.ip));
|
2018-12-20 23:25:54 +08:00
|
|
|
}
|
2018-12-17 20:08:08 +08:00
|
|
|
|
2018-12-27 21:26:11 +08:00
|
|
|
/* Set to indirect value prepared in v1 */
|
2019-05-22 00:33:37 +08:00
|
|
|
INST(FI_VAR_SET, 1, 0) {
|
2019-07-02 16:45:53 +08:00
|
|
|
NEVER_CONSTANT;
|
2019-06-28 17:08:48 +08:00
|
|
|
ARG_ANY(1);
|
|
|
|
SYMBOL;
|
2019-07-02 16:45:53 +08:00
|
|
|
|
2018-12-27 21:26:11 +08:00
|
|
|
if ((sym->class != (SYM_VARIABLE | v1.type)) && (v1.type != T_VOID))
|
2018-12-17 20:08:08 +08:00
|
|
|
{
|
|
|
|
/* IP->Quad implicit conversion */
|
2018-12-27 21:26:11 +08:00
|
|
|
if ((sym->class == (SYM_VARIABLE | T_QUAD)) && val_is_ip4(&v1))
|
2019-05-22 00:33:37 +08:00
|
|
|
v1 = (struct f_val) {
|
2018-12-27 21:26:11 +08:00
|
|
|
.type = T_QUAD,
|
|
|
|
.val.i = ipa_to_u32(v1.val.ip),
|
2019-05-22 00:33:37 +08:00
|
|
|
};
|
|
|
|
else
|
|
|
|
runtime( "Assigning to variable of incompatible type" );
|
2018-12-17 20:08:08 +08:00
|
|
|
}
|
2019-05-22 00:33:37 +08:00
|
|
|
|
2019-05-30 03:03:52 +08:00
|
|
|
fstk->vstk[curline.vbase + sym->offset] = v1;
|
2019-05-22 00:33:37 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
INST(FI_VAR_GET, 0, 1) {
|
2019-07-01 19:13:06 +08:00
|
|
|
SYMBOL;
|
2019-07-02 16:45:53 +08:00
|
|
|
NEVER_CONSTANT;
|
2019-07-01 18:07:06 +08:00
|
|
|
RESULT_VAL(fstk->vstk[curline.vbase + sym->offset]);
|
2018-12-20 23:25:54 +08:00
|
|
|
}
|
2018-12-17 20:08:08 +08:00
|
|
|
|
2018-12-20 21:55:40 +08:00
|
|
|
/* some constants have value in a[1], some in *a[0].p, strange. */
|
2018-12-27 21:26:11 +08:00
|
|
|
INST(FI_CONSTANT, 0, 1) { /* integer (or simple type) constant, string, set, or prefix_set */
|
2019-07-01 20:12:05 +08:00
|
|
|
FID_MEMBER(
|
|
|
|
struct f_val,
|
|
|
|
val,
|
|
|
|
[[ !val_same(&(f1->val), &(f2->val)) ]],
|
|
|
|
value %s,
|
|
|
|
val_dump(&(item->val))
|
|
|
|
);
|
2019-02-16 06:59:44 +08:00
|
|
|
|
2019-07-02 16:45:53 +08:00
|
|
|
RESULT_VAL(val);
|
2018-12-20 23:25:54 +08:00
|
|
|
}
|
2018-12-27 21:26:11 +08:00
|
|
|
INST(FI_CONDITION, 1, 0) {
|
|
|
|
ARG(1, T_BOOL);
|
2019-07-02 16:45:53 +08:00
|
|
|
if (v1.val.i)
|
2018-12-27 21:26:11 +08:00
|
|
|
LINE(2,0);
|
2018-12-20 21:34:35 +08:00
|
|
|
else
|
2018-12-27 21:26:11 +08:00
|
|
|
LINE(3,1);
|
2018-12-20 23:25:54 +08:00
|
|
|
}
|
2019-01-21 16:17:54 +08:00
|
|
|
|
2019-07-03 07:23:49 +08:00
|
|
|
INST(FI_PRINT, 0, 0) {
|
|
|
|
NEVER_CONSTANT;
|
2019-01-21 16:17:54 +08:00
|
|
|
ARG_ANY(1);
|
2019-07-03 07:23:49 +08:00
|
|
|
FID_MEMBER_IN(uint, count, f1->count != f2->count, number of items %u, item->count);
|
|
|
|
|
|
|
|
FID_NEW_BODY
|
|
|
|
uint len = 0;
|
|
|
|
for (const struct f_inst *tt = f1; tt; tt = tt->next, len++)
|
|
|
|
;
|
|
|
|
whati->count = len;
|
2019-01-21 16:17:54 +08:00
|
|
|
|
2019-07-02 23:39:56 +08:00
|
|
|
FID_INTERPRET_BODY
|
2018-12-27 21:26:11 +08:00
|
|
|
|
2019-07-03 07:23:49 +08:00
|
|
|
#define pv fstk->vstk[fstk->vcnt - whati->count + i]
|
|
|
|
if (whati->count)
|
|
|
|
for (uint i=0; i<whati->count; i++)
|
|
|
|
val_format(&(pv), &fs->buf);
|
|
|
|
#undef pv
|
|
|
|
|
|
|
|
fstk->vcnt -= whati->count;
|
|
|
|
}
|
|
|
|
|
|
|
|
INST(FI_DIE, 0, 0) {
|
|
|
|
NEVER_CONSTANT;
|
2019-07-02 16:45:53 +08:00
|
|
|
FID_MEMBER(enum filter_return, fret, f1->fret != f2->fret, %s, filter_return_str(item->fret));
|
2018-12-27 21:26:11 +08:00
|
|
|
|
2019-07-03 07:23:49 +08:00
|
|
|
if (fs->buf.start < fs->buf.pos)
|
2018-12-17 20:08:08 +08:00
|
|
|
log_commit(*L_INFO, &fs->buf);
|
|
|
|
|
2019-07-03 07:23:49 +08:00
|
|
|
switch (whati->fret) {
|
2018-12-17 20:08:08 +08:00
|
|
|
case F_QUITBIRD:
|
|
|
|
die( "Filter asked me to die" );
|
|
|
|
case F_ACCEPT:
|
|
|
|
/* Should take care about turning ACCEPT into MODIFY */
|
|
|
|
case F_ERROR:
|
|
|
|
case F_REJECT: /* FIXME (noncritical) Should print complete route along with reason to reject route */
|
2018-12-27 21:26:11 +08:00
|
|
|
return fret; /* We have to return now, no more processing. */
|
2018-12-17 20:08:08 +08:00
|
|
|
case F_NOP:
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
bug( "unknown return type: Can't happen");
|
|
|
|
}
|
2018-12-20 23:25:54 +08:00
|
|
|
}
|
2018-12-27 21:26:11 +08:00
|
|
|
|
|
|
|
INST(FI_RTA_GET, 0, 1) { /* rta access */
|
2018-12-17 20:08:08 +08:00
|
|
|
{
|
2018-12-27 21:26:11 +08:00
|
|
|
STATIC_ATTR;
|
2018-12-17 20:08:08 +08:00
|
|
|
ACCESS_RTE;
|
|
|
|
struct rta *rta = (*fs->rte)->attrs;
|
|
|
|
|
2018-12-27 21:26:11 +08:00
|
|
|
switch (sa.sa_code)
|
2018-12-17 20:08:08 +08:00
|
|
|
{
|
2018-12-27 21:26:11 +08:00
|
|
|
case SA_FROM: RESULT(sa.f_type, ip, rta->from); break;
|
|
|
|
case SA_GW: RESULT(sa.f_type, ip, rta->nh.gw); break;
|
|
|
|
case SA_NET: RESULT(sa.f_type, net, (*fs->rte)->net->n.addr); break;
|
|
|
|
case SA_PROTO: RESULT(sa.f_type, s, rta->src->proto->name); break;
|
|
|
|
case SA_SOURCE: RESULT(sa.f_type, i, rta->source); break;
|
|
|
|
case SA_SCOPE: RESULT(sa.f_type, i, rta->scope); break;
|
|
|
|
case SA_DEST: RESULT(sa.f_type, i, rta->dest); break;
|
|
|
|
case SA_IFNAME: RESULT(sa.f_type, s, rta->nh.iface ? rta->nh.iface->name : ""); break;
|
|
|
|
case SA_IFINDEX: RESULT(sa.f_type, i, rta->nh.iface ? rta->nh.iface->index : 0); break;
|
2018-12-17 20:08:08 +08:00
|
|
|
|
|
|
|
default:
|
2018-12-27 21:26:11 +08:00
|
|
|
bug("Invalid static attribute access (%u/%u)", sa.f_type, sa.sa_code);
|
2018-12-17 20:08:08 +08:00
|
|
|
}
|
|
|
|
}
|
2018-12-20 23:25:54 +08:00
|
|
|
}
|
2018-12-27 21:26:11 +08:00
|
|
|
|
2019-06-19 20:09:57 +08:00
|
|
|
INST(FI_RTA_SET, 1, 0) {
|
|
|
|
ACCESS_RTE;
|
|
|
|
ARG_ANY(1);
|
|
|
|
STATIC_ATTR;
|
|
|
|
if (sa.f_type != v1.type)
|
|
|
|
runtime( "Attempt to set static attribute to incompatible type" );
|
|
|
|
|
|
|
|
f_rta_cow(fs);
|
|
|
|
{
|
|
|
|
struct rta *rta = (*fs->rte)->attrs;
|
|
|
|
|
|
|
|
switch (sa.sa_code)
|
|
|
|
{
|
|
|
|
case SA_FROM:
|
|
|
|
rta->from = v1.val.ip;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case SA_GW:
|
|
|
|
{
|
|
|
|
ip_addr ip = v1.val.ip;
|
|
|
|
neighbor *n = neigh_find(rta->src->proto, ip, NULL, 0);
|
|
|
|
if (!n || (n->scope == SCOPE_HOST))
|
|
|
|
runtime( "Invalid gw address" );
|
|
|
|
|
|
|
|
rta->dest = RTD_UNICAST;
|
|
|
|
rta->nh.gw = ip;
|
|
|
|
rta->nh.iface = n->iface;
|
|
|
|
rta->nh.next = NULL;
|
|
|
|
rta->hostentry = NULL;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case SA_SCOPE:
|
|
|
|
rta->scope = v1.val.i;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case SA_DEST:
|
|
|
|
{
|
|
|
|
int i = v1.val.i;
|
|
|
|
if ((i != RTD_BLACKHOLE) && (i != RTD_UNREACHABLE) && (i != RTD_PROHIBIT))
|
|
|
|
runtime( "Destination can be changed only to blackhole, unreachable or prohibit" );
|
|
|
|
|
|
|
|
rta->dest = i;
|
|
|
|
rta->nh.gw = IPA_NONE;
|
|
|
|
rta->nh.iface = NULL;
|
|
|
|
rta->nh.next = NULL;
|
|
|
|
rta->hostentry = NULL;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case SA_IFNAME:
|
|
|
|
{
|
|
|
|
struct iface *ifa = if_find_by_name(v1.val.s);
|
|
|
|
if (!ifa)
|
|
|
|
runtime( "Invalid iface name" );
|
|
|
|
|
|
|
|
rta->dest = RTD_UNICAST;
|
|
|
|
rta->nh.gw = IPA_NONE;
|
|
|
|
rta->nh.iface = ifa;
|
|
|
|
rta->nh.next = NULL;
|
|
|
|
rta->hostentry = NULL;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
bug("Invalid static attribute access (%u/%u)", sa.f_type, sa.sa_code);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-12-27 21:26:11 +08:00
|
|
|
INST(FI_EA_GET, 0, 1) { /* Access to extended attributes */
|
|
|
|
DYNAMIC_ATTR;
|
2018-12-17 20:08:08 +08:00
|
|
|
ACCESS_RTE;
|
|
|
|
ACCESS_EATTRS;
|
|
|
|
{
|
2018-12-27 21:26:11 +08:00
|
|
|
eattr *e = ea_find(*fs->eattrs, da.ea_code);
|
2018-12-17 20:08:08 +08:00
|
|
|
|
|
|
|
if (!e) {
|
|
|
|
/* A special case: undefined as_path looks like empty as_path */
|
2018-12-27 21:26:11 +08:00
|
|
|
if (da.type == EAF_TYPE_AS_PATH) {
|
|
|
|
RESULT(T_PATH, ad, &null_adata);
|
2018-12-17 20:08:08 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* The same special case for int_set */
|
2018-12-27 21:26:11 +08:00
|
|
|
if (da.type == EAF_TYPE_INT_SET) {
|
|
|
|
RESULT(T_CLIST, ad, &null_adata);
|
2018-12-17 20:08:08 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* The same special case for ec_set */
|
2018-12-27 21:26:11 +08:00
|
|
|
if (da.type == EAF_TYPE_EC_SET) {
|
|
|
|
RESULT(T_ECLIST, ad, &null_adata);
|
2018-12-17 20:08:08 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* The same special case for lc_set */
|
2018-12-27 21:26:11 +08:00
|
|
|
if (da.type == EAF_TYPE_LC_SET) {
|
|
|
|
RESULT(T_LCLIST, ad, &null_adata);
|
2018-12-17 20:08:08 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Undefined value */
|
2019-07-01 18:07:06 +08:00
|
|
|
RESULT_VOID;
|
2018-12-17 20:08:08 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
switch (e->type & EAF_TYPE_MASK) {
|
|
|
|
case EAF_TYPE_INT:
|
2018-12-27 21:26:11 +08:00
|
|
|
RESULT(da.f_type, i, e->u.data);
|
2018-12-17 20:08:08 +08:00
|
|
|
break;
|
|
|
|
case EAF_TYPE_ROUTER_ID:
|
2018-12-27 21:26:11 +08:00
|
|
|
RESULT(T_QUAD, i, e->u.data);
|
2018-12-17 20:08:08 +08:00
|
|
|
break;
|
|
|
|
case EAF_TYPE_OPAQUE:
|
2018-12-27 21:26:11 +08:00
|
|
|
RESULT(T_ENUM_EMPTY, i, 0);
|
2018-12-17 20:08:08 +08:00
|
|
|
break;
|
|
|
|
case EAF_TYPE_IP_ADDRESS:
|
2018-12-27 21:26:11 +08:00
|
|
|
RESULT(T_IP, ip, *((ip_addr *) e->u.ptr->data));
|
2018-12-17 20:08:08 +08:00
|
|
|
break;
|
|
|
|
case EAF_TYPE_AS_PATH:
|
2018-12-27 21:26:11 +08:00
|
|
|
RESULT(T_PATH, ad, e->u.ptr);
|
2018-12-17 20:08:08 +08:00
|
|
|
break;
|
|
|
|
case EAF_TYPE_BITFIELD:
|
2018-12-27 21:26:11 +08:00
|
|
|
RESULT(T_BOOL, i, !!(e->u.data & (1u << da.bit)));
|
2018-12-17 20:08:08 +08:00
|
|
|
break;
|
|
|
|
case EAF_TYPE_INT_SET:
|
2018-12-27 21:26:11 +08:00
|
|
|
RESULT(T_CLIST, ad, e->u.ptr);
|
2018-12-17 20:08:08 +08:00
|
|
|
break;
|
|
|
|
case EAF_TYPE_EC_SET:
|
2018-12-27 21:26:11 +08:00
|
|
|
RESULT(T_ECLIST, ad, e->u.ptr);
|
2018-12-17 20:08:08 +08:00
|
|
|
break;
|
|
|
|
case EAF_TYPE_LC_SET:
|
2018-12-27 21:26:11 +08:00
|
|
|
RESULT(T_LCLIST, ad, e->u.ptr);
|
2018-12-17 20:08:08 +08:00
|
|
|
break;
|
|
|
|
case EAF_TYPE_UNDEF:
|
2019-07-01 18:07:06 +08:00
|
|
|
RESULT_VOID;
|
2018-12-17 20:08:08 +08:00
|
|
|
break;
|
|
|
|
default:
|
2018-12-27 21:26:11 +08:00
|
|
|
bug("Unknown dynamic attribute type");
|
2018-12-17 20:08:08 +08:00
|
|
|
}
|
|
|
|
}
|
2018-12-20 23:25:54 +08:00
|
|
|
}
|
2018-12-27 21:26:11 +08:00
|
|
|
|
2019-06-19 20:09:57 +08:00
|
|
|
INST(FI_EA_SET, 1, 0) {
|
|
|
|
ACCESS_RTE;
|
|
|
|
ACCESS_EATTRS;
|
|
|
|
ARG_ANY(1);
|
|
|
|
DYNAMIC_ATTR;
|
|
|
|
{
|
|
|
|
struct ea_list *l = lp_alloc(fs->pool, sizeof(struct ea_list) + sizeof(eattr));
|
|
|
|
|
|
|
|
l->next = NULL;
|
|
|
|
l->flags = EALF_SORTED;
|
|
|
|
l->count = 1;
|
|
|
|
l->attrs[0].id = da.ea_code;
|
|
|
|
l->attrs[0].flags = 0;
|
|
|
|
l->attrs[0].type = da.type | EAF_ORIGINATED | EAF_FRESH;
|
|
|
|
|
|
|
|
switch (da.type) {
|
|
|
|
case EAF_TYPE_INT:
|
|
|
|
if (v1.type != da.f_type)
|
|
|
|
runtime( "Setting int attribute to non-int value" );
|
|
|
|
l->attrs[0].u.data = v1.val.i;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case EAF_TYPE_ROUTER_ID:
|
|
|
|
/* IP->Quad implicit conversion */
|
|
|
|
if (val_is_ip4(&v1)) {
|
|
|
|
l->attrs[0].u.data = ipa_to_u32(v1.val.ip);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
/* T_INT for backward compatibility */
|
|
|
|
if ((v1.type != T_QUAD) && (v1.type != T_INT))
|
|
|
|
runtime( "Setting quad attribute to non-quad value" );
|
|
|
|
l->attrs[0].u.data = v1.val.i;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case EAF_TYPE_OPAQUE:
|
|
|
|
runtime( "Setting opaque attribute is not allowed" );
|
|
|
|
break;
|
|
|
|
case EAF_TYPE_IP_ADDRESS:
|
|
|
|
if (v1.type != T_IP)
|
|
|
|
runtime( "Setting ip attribute to non-ip value" );
|
|
|
|
int len = sizeof(ip_addr);
|
|
|
|
struct adata *ad = lp_alloc(fs->pool, sizeof(struct adata) + len);
|
|
|
|
ad->length = len;
|
|
|
|
(* (ip_addr *) ad->data) = v1.val.ip;
|
|
|
|
l->attrs[0].u.ptr = ad;
|
|
|
|
break;
|
|
|
|
case EAF_TYPE_AS_PATH:
|
|
|
|
if (v1.type != T_PATH)
|
|
|
|
runtime( "Setting path attribute to non-path value" );
|
|
|
|
l->attrs[0].u.ptr = v1.val.ad;
|
|
|
|
break;
|
|
|
|
case EAF_TYPE_BITFIELD:
|
|
|
|
if (v1.type != T_BOOL)
|
|
|
|
runtime( "Setting bit in bitfield attribute to non-bool value" );
|
|
|
|
{
|
|
|
|
/* First, we have to find the old value */
|
|
|
|
eattr *e = ea_find(*fs->eattrs, da.ea_code);
|
|
|
|
u32 data = e ? e->u.data : 0;
|
|
|
|
|
|
|
|
if (v1.val.i)
|
|
|
|
l->attrs[0].u.data = data | (1u << da.bit);
|
|
|
|
else
|
|
|
|
l->attrs[0].u.data = data & ~(1u << da.bit);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case EAF_TYPE_INT_SET:
|
|
|
|
if (v1.type != T_CLIST)
|
|
|
|
runtime( "Setting clist attribute to non-clist value" );
|
|
|
|
l->attrs[0].u.ptr = v1.val.ad;
|
|
|
|
break;
|
|
|
|
case EAF_TYPE_EC_SET:
|
|
|
|
if (v1.type != T_ECLIST)
|
|
|
|
runtime( "Setting eclist attribute to non-eclist value" );
|
|
|
|
l->attrs[0].u.ptr = v1.val.ad;
|
|
|
|
break;
|
|
|
|
case EAF_TYPE_LC_SET:
|
|
|
|
if (v1.type != T_LCLIST)
|
|
|
|
runtime( "Setting lclist attribute to non-lclist value" );
|
|
|
|
l->attrs[0].u.ptr = v1.val.ad;
|
|
|
|
break;
|
|
|
|
default: bug("Unknown type in e,S");
|
|
|
|
}
|
|
|
|
|
|
|
|
f_rta_cow(fs);
|
|
|
|
l->next = *fs->eattrs;
|
|
|
|
*fs->eattrs = l;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-01-21 16:17:54 +08:00
|
|
|
INST(FI_EA_UNSET, 0, 0) {
|
|
|
|
DYNAMIC_ATTR;
|
|
|
|
ACCESS_RTE;
|
|
|
|
ACCESS_EATTRS;
|
|
|
|
|
|
|
|
{
|
|
|
|
struct ea_list *l = lp_alloc(fs->pool, sizeof(struct ea_list) + sizeof(eattr));
|
|
|
|
|
|
|
|
l->next = NULL;
|
|
|
|
l->flags = EALF_SORTED;
|
|
|
|
l->count = 1;
|
|
|
|
l->attrs[0].id = da.ea_code;
|
|
|
|
l->attrs[0].flags = 0;
|
2019-03-18 19:54:40 +08:00
|
|
|
l->attrs[0].type = EAF_TYPE_UNDEF | EAF_ORIGINATED | EAF_FRESH;
|
2019-01-21 16:17:54 +08:00
|
|
|
l->attrs[0].u.data = 0;
|
|
|
|
|
|
|
|
f_rta_cow(fs);
|
|
|
|
l->next = *fs->eattrs;
|
|
|
|
*fs->eattrs = l;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-12-27 21:26:11 +08:00
|
|
|
INST(FI_PREF_GET, 0, 1) {
|
2018-12-17 20:08:08 +08:00
|
|
|
ACCESS_RTE;
|
2018-12-27 21:26:11 +08:00
|
|
|
RESULT(T_INT, i, (*fs->rte)->pref);
|
2018-12-20 23:25:54 +08:00
|
|
|
}
|
2018-12-27 21:26:11 +08:00
|
|
|
|
2019-06-19 20:09:57 +08:00
|
|
|
INST(FI_PREF_SET, 1, 0) {
|
|
|
|
ACCESS_RTE;
|
|
|
|
ARG(1,T_INT);
|
|
|
|
if (v1.val.i > 0xFFFF)
|
|
|
|
runtime( "Setting preference value out of bounds" );
|
|
|
|
f_rte_cow(fs);
|
|
|
|
(*fs->rte)->pref = v1.val.i;
|
|
|
|
}
|
|
|
|
|
2018-12-27 21:26:11 +08:00
|
|
|
INST(FI_LENGTH, 1, 1) { /* Get length of */
|
2018-12-17 20:08:08 +08:00
|
|
|
ARG_ANY(1);
|
|
|
|
switch(v1.type) {
|
2018-12-27 21:26:11 +08:00
|
|
|
case T_NET: RESULT(T_INT, i, net_pxlen(v1.val.net)); break;
|
|
|
|
case T_PATH: RESULT(T_INT, i, as_path_getlen(v1.val.ad)); break;
|
|
|
|
case T_CLIST: RESULT(T_INT, i, int_set_get_size(v1.val.ad)); break;
|
|
|
|
case T_ECLIST: RESULT(T_INT, i, ec_set_get_size(v1.val.ad)); break;
|
|
|
|
case T_LCLIST: RESULT(T_INT, i, lc_set_get_size(v1.val.ad)); break;
|
2018-12-17 20:08:08 +08:00
|
|
|
default: runtime( "Prefix, path, clist or eclist expected" );
|
|
|
|
}
|
2018-12-20 23:25:54 +08:00
|
|
|
}
|
2018-12-27 21:26:11 +08:00
|
|
|
|
|
|
|
INST(FI_SADR_SRC, 1, 1) { /* Get SADR src prefix */
|
2018-12-17 20:08:08 +08:00
|
|
|
ARG(1, T_NET);
|
|
|
|
if (!net_is_sadr(v1.val.net))
|
|
|
|
runtime( "SADR expected" );
|
|
|
|
|
2018-12-27 21:26:11 +08:00
|
|
|
net_addr_ip6_sadr *net = (void *) v1.val.net;
|
2019-07-02 16:45:53 +08:00
|
|
|
net_addr *src = falloc(sizeof(net_addr_ip6));
|
2018-12-27 21:26:11 +08:00
|
|
|
net_fill_ip6(src, net->src_prefix, net->src_pxlen);
|
2018-12-17 20:08:08 +08:00
|
|
|
|
2018-12-27 21:26:11 +08:00
|
|
|
RESULT(T_NET, net, src);
|
2018-12-20 23:25:54 +08:00
|
|
|
}
|
2018-12-27 21:26:11 +08:00
|
|
|
|
|
|
|
INST(FI_ROA_MAXLEN, 1, 1) { /* Get ROA max prefix length */
|
2018-12-17 20:08:08 +08:00
|
|
|
ARG(1, T_NET);
|
|
|
|
if (!net_is_roa(v1.val.net))
|
|
|
|
runtime( "ROA expected" );
|
|
|
|
|
2018-12-27 21:26:11 +08:00
|
|
|
RESULT(T_INT, i, (v1.val.net->type == NET_ROA4) ?
|
2018-12-17 20:08:08 +08:00
|
|
|
((net_addr_roa4 *) v1.val.net)->max_pxlen :
|
2018-12-27 21:26:11 +08:00
|
|
|
((net_addr_roa6 *) v1.val.net)->max_pxlen);
|
2018-12-20 23:25:54 +08:00
|
|
|
}
|
2018-12-27 21:26:11 +08:00
|
|
|
|
|
|
|
INST(FI_ROA_ASN, 1, 1) { /* Get ROA ASN */
|
2018-12-17 20:08:08 +08:00
|
|
|
ARG(1, T_NET);
|
|
|
|
if (!net_is_roa(v1.val.net))
|
|
|
|
runtime( "ROA expected" );
|
|
|
|
|
2018-12-27 21:26:11 +08:00
|
|
|
RESULT(T_INT, i, (v1.val.net->type == NET_ROA4) ?
|
2018-12-17 20:08:08 +08:00
|
|
|
((net_addr_roa4 *) v1.val.net)->asn :
|
2018-12-27 21:26:11 +08:00
|
|
|
((net_addr_roa6 *) v1.val.net)->asn);
|
2018-12-20 23:25:54 +08:00
|
|
|
}
|
2018-12-27 21:26:11 +08:00
|
|
|
|
|
|
|
INST(FI_IP, 1, 1) { /* Convert prefix to ... */
|
2018-12-17 20:08:08 +08:00
|
|
|
ARG(1, T_NET);
|
2018-12-27 21:26:11 +08:00
|
|
|
RESULT(T_IP, ip, net_prefix(v1.val.net));
|
2018-12-20 23:25:54 +08:00
|
|
|
}
|
2018-12-27 21:26:11 +08:00
|
|
|
|
|
|
|
INST(FI_ROUTE_DISTINGUISHER, 1, 1) {
|
2018-12-17 20:08:08 +08:00
|
|
|
ARG(1, T_NET);
|
|
|
|
if (!net_is_vpn(v1.val.net))
|
|
|
|
runtime( "VPN address expected" );
|
2018-12-27 21:26:11 +08:00
|
|
|
RESULT(T_RD, ec, net_rd(v1.val.net));
|
2018-12-20 23:25:54 +08:00
|
|
|
}
|
2018-12-17 20:08:08 +08:00
|
|
|
|
2018-12-27 21:26:11 +08:00
|
|
|
INST(FI_AS_PATH_FIRST, 1, 1) { /* Get first ASN from AS PATH */
|
|
|
|
ARG(1, T_PATH);
|
|
|
|
int as = 0;
|
2018-12-17 20:08:08 +08:00
|
|
|
as_path_get_first(v1.val.ad, &as);
|
2018-12-27 21:26:11 +08:00
|
|
|
RESULT(T_INT, i, as);
|
2018-12-20 23:25:54 +08:00
|
|
|
}
|
2018-12-17 20:08:08 +08:00
|
|
|
|
2018-12-27 21:26:11 +08:00
|
|
|
INST(FI_AS_PATH_LAST, 1, 1) { /* Get last ASN from AS PATH */
|
|
|
|
ARG(1, T_PATH);
|
|
|
|
int as = 0;
|
2018-12-17 20:08:08 +08:00
|
|
|
as_path_get_last(v1.val.ad, &as);
|
2018-12-27 21:26:11 +08:00
|
|
|
RESULT(T_INT, i, as);
|
2018-12-20 23:25:54 +08:00
|
|
|
}
|
2018-12-27 21:26:11 +08:00
|
|
|
|
|
|
|
INST(FI_AS_PATH_LAST_NAG, 1, 1) { /* Get last ASN from non-aggregated part of AS PATH */
|
2018-12-17 20:08:08 +08:00
|
|
|
ARG(1, T_PATH);
|
2018-12-27 21:26:11 +08:00
|
|
|
RESULT(T_INT, i, as_path_get_last_nonaggregated(v1.val.ad));
|
|
|
|
}
|
2018-12-17 20:08:08 +08:00
|
|
|
|
2019-06-19 20:09:57 +08:00
|
|
|
INST(FI_RETURN, 1, 1) {
|
2019-07-02 16:45:53 +08:00
|
|
|
NEVER_CONSTANT;
|
2019-06-19 20:09:57 +08:00
|
|
|
/* Acquire the return value */
|
|
|
|
ARG_ANY(1);
|
|
|
|
uint retpos = fstk->vcnt;
|
|
|
|
|
|
|
|
/* Drop every sub-block including ourselves */
|
|
|
|
while ((fstk->ecnt-- > 0) && !(fstk->estk[fstk->ecnt].emask & FE_RETURN))
|
|
|
|
;
|
|
|
|
|
|
|
|
/* Now we are at the caller frame; if no such, try to convert to accept/reject. */
|
|
|
|
if (!fstk->ecnt)
|
|
|
|
if (fstk->vstk[retpos].type == T_BOOL)
|
|
|
|
if (fstk->vstk[retpos].val.i)
|
|
|
|
|
|
|
|
return F_ACCEPT;
|
|
|
|
else
|
|
|
|
return F_REJECT;
|
|
|
|
else
|
|
|
|
runtime("Can't return non-bool from non-function");
|
|
|
|
|
|
|
|
/* Set the value stack position, overwriting the former implicit void */
|
|
|
|
fstk->vcnt = fstk->estk[fstk->ecnt].ventry - 1;
|
|
|
|
|
|
|
|
/* Copy the return value */
|
|
|
|
RESULT_VAL(fstk->vstk[retpos]);
|
|
|
|
}
|
|
|
|
|
2018-12-27 21:26:11 +08:00
|
|
|
INST(FI_CALL, 0, 1) {
|
2019-07-02 16:45:53 +08:00
|
|
|
NEVER_CONSTANT;
|
2019-05-22 00:33:37 +08:00
|
|
|
SYMBOL;
|
2019-02-08 20:38:12 +08:00
|
|
|
|
2019-05-22 00:33:37 +08:00
|
|
|
/* Push the body on stack */
|
|
|
|
LINEX(sym->function);
|
2019-02-16 06:59:44 +08:00
|
|
|
curline.emask |= FE_RETURN;
|
2019-05-22 00:33:37 +08:00
|
|
|
|
|
|
|
/* Before this instruction was called, there was the T_VOID
|
|
|
|
* automatic return value pushed on value stack and also
|
|
|
|
* sym->function->args function arguments. Setting the
|
|
|
|
* vbase to point to first argument. */
|
|
|
|
ASSERT(curline.ventry >= sym->function->args);
|
|
|
|
curline.ventry -= sym->function->args;
|
|
|
|
curline.vbase = curline.ventry;
|
|
|
|
|
|
|
|
/* Storage for local variables */
|
2019-05-30 03:03:52 +08:00
|
|
|
memset(&(fstk->vstk[fstk->vcnt]), 0, sizeof(struct f_val) * sym->function->vars);
|
|
|
|
fstk->vcnt += sym->function->vars;
|
2018-12-20 23:25:54 +08:00
|
|
|
}
|
2018-12-27 21:26:11 +08:00
|
|
|
|
|
|
|
INST(FI_DROP_RESULT, 1, 0) {
|
2019-07-02 16:45:53 +08:00
|
|
|
NEVER_CONSTANT;
|
2018-12-27 21:26:11 +08:00
|
|
|
ARG_ANY(1);
|
2018-12-20 23:25:54 +08:00
|
|
|
}
|
2018-12-27 21:26:11 +08:00
|
|
|
|
|
|
|
INST(FI_SWITCH, 1, 0) {
|
2018-12-17 20:08:08 +08:00
|
|
|
ARG_ANY(1);
|
2019-07-01 19:13:06 +08:00
|
|
|
|
2019-07-02 16:45:53 +08:00
|
|
|
FID_MEMBER(struct f_tree *, tree, [[!same_tree(f1->tree, f2->tree)]], tree %p, item->tree);
|
2019-07-01 19:13:06 +08:00
|
|
|
|
2019-02-18 21:57:15 +08:00
|
|
|
const struct f_tree *t = find_tree(tree, &v1);
|
|
|
|
if (!t) {
|
2018-12-27 21:26:11 +08:00
|
|
|
v1.type = T_VOID;
|
2019-02-18 21:57:15 +08:00
|
|
|
t = find_tree(tree, &v1);
|
|
|
|
if (!t) {
|
2018-12-27 21:26:11 +08:00
|
|
|
debug( "No else statement?\n");
|
2019-07-02 16:45:53 +08:00
|
|
|
FID_HIC(,break,return NULL);
|
2018-12-17 20:08:08 +08:00
|
|
|
}
|
|
|
|
}
|
2018-12-27 21:26:11 +08:00
|
|
|
/* It is actually possible to have t->data NULL */
|
|
|
|
|
2019-02-18 21:57:15 +08:00
|
|
|
LINEX(t->data);
|
2018-12-20 23:25:54 +08:00
|
|
|
}
|
2018-12-27 21:26:11 +08:00
|
|
|
|
|
|
|
INST(FI_IP_MASK, 2, 1) { /* IP.MASK(val) */
|
2018-12-17 20:08:08 +08:00
|
|
|
ARG(1, T_IP);
|
|
|
|
ARG(2, T_INT);
|
2018-12-27 21:26:11 +08:00
|
|
|
RESULT(T_IP, ip, [[ ipa_is_ip4(v1.val.ip) ?
|
2018-12-17 20:08:08 +08:00
|
|
|
ipa_from_ip4(ip4_and(ipa_to_ip4(v1.val.ip), ip4_mkmask(v2.val.i))) :
|
2018-12-27 21:26:11 +08:00
|
|
|
ipa_from_ip6(ip6_and(ipa_to_ip6(v1.val.ip), ip6_mkmask(v2.val.i))) ]]);
|
2018-12-20 23:25:54 +08:00
|
|
|
}
|
2018-12-17 20:08:08 +08:00
|
|
|
|
2018-12-27 21:26:11 +08:00
|
|
|
INST(FI_PATH_PREPEND, 2, 1) { /* Path prepend */
|
2018-12-17 20:08:08 +08:00
|
|
|
ARG(1, T_PATH);
|
|
|
|
ARG(2, T_INT);
|
2019-07-02 16:45:53 +08:00
|
|
|
RESULT(T_PATH, ad, [[ as_path_prepend(fpool, v1.val.ad, v2.val.i) ]]);
|
2018-12-27 21:26:11 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
INST(FI_CLIST_ADD, 2, 1) { /* (Extended) Community list add */
|
|
|
|
ARG_ANY(1);
|
|
|
|
ARG_ANY(2);
|
|
|
|
if (v1.type == T_PATH)
|
|
|
|
runtime("Can't add to path");
|
|
|
|
|
|
|
|
else if (v1.type == T_CLIST)
|
|
|
|
{
|
|
|
|
/* Community (or cluster) list */
|
|
|
|
struct f_val dummy;
|
|
|
|
|
|
|
|
if ((v2.type == T_PAIR) || (v2.type == T_QUAD))
|
2019-07-02 16:45:53 +08:00
|
|
|
RESULT(T_CLIST, ad, [[ int_set_add(fpool, v1.val.ad, v2.val.i) ]]);
|
2018-12-27 21:26:11 +08:00
|
|
|
/* IP->Quad implicit conversion */
|
|
|
|
else if (val_is_ip4(&v2))
|
2019-07-02 16:45:53 +08:00
|
|
|
RESULT(T_CLIST, ad, [[ int_set_add(fpool, v1.val.ad, ipa_to_u32(v2.val.ip)) ]]);
|
2018-12-27 21:26:11 +08:00
|
|
|
else if ((v2.type == T_SET) && clist_set_type(v2.val.t, &dummy))
|
|
|
|
runtime("Can't add set");
|
|
|
|
else if (v2.type == T_CLIST)
|
2019-07-02 16:45:53 +08:00
|
|
|
RESULT(T_CLIST, ad, [[ int_set_union(fpool, v1.val.ad, v2.val.ad) ]]);
|
2018-12-27 21:26:11 +08:00
|
|
|
else
|
|
|
|
runtime("Can't add non-pair");
|
|
|
|
}
|
2018-12-17 20:08:08 +08:00
|
|
|
|
2018-12-27 21:26:11 +08:00
|
|
|
else if (v1.type == T_ECLIST)
|
|
|
|
{
|
|
|
|
/* v2.val is either EC or EC-set */
|
|
|
|
if ((v2.type == T_SET) && eclist_set_type(v2.val.t))
|
|
|
|
runtime("Can't add set");
|
|
|
|
else if (v2.type == T_ECLIST)
|
2019-07-02 16:45:53 +08:00
|
|
|
RESULT(T_ECLIST, ad, [[ ec_set_union(fpool, v1.val.ad, v2.val.ad) ]]);
|
2018-12-27 21:26:11 +08:00
|
|
|
else if (v2.type != T_EC)
|
|
|
|
runtime("Can't add non-ec");
|
|
|
|
else
|
2019-07-02 16:45:53 +08:00
|
|
|
RESULT(T_ECLIST, ad, [[ ec_set_add(fpool, v1.val.ad, v2.val.ec) ]]);
|
2018-12-27 21:26:11 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
else if (v1.type == T_LCLIST)
|
|
|
|
{
|
|
|
|
/* v2.val is either LC or LC-set */
|
|
|
|
if ((v2.type == T_SET) && lclist_set_type(v2.val.t))
|
|
|
|
runtime("Can't add set");
|
|
|
|
else if (v2.type == T_LCLIST)
|
2019-07-02 16:45:53 +08:00
|
|
|
RESULT(T_LCLIST, ad, [[ lc_set_union(fpool, v1.val.ad, v2.val.ad) ]]);
|
2018-12-27 21:26:11 +08:00
|
|
|
else if (v2.type != T_LC)
|
|
|
|
runtime("Can't add non-lc");
|
|
|
|
else
|
2019-07-02 16:45:53 +08:00
|
|
|
RESULT(T_LCLIST, ad, [[ lc_set_add(fpool, v1.val.ad, v2.val.lc) ]]);
|
2018-12-27 21:26:11 +08:00
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
else
|
|
|
|
runtime("Can't add to non-[e|l]clist");
|
2018-12-20 23:25:54 +08:00
|
|
|
}
|
2018-12-17 20:08:08 +08:00
|
|
|
|
2018-12-27 21:26:11 +08:00
|
|
|
INST(FI_CLIST_DEL, 2, 1) { /* (Extended) Community list add or delete */
|
2018-12-17 20:08:08 +08:00
|
|
|
ARG_ANY(1);
|
|
|
|
ARG_ANY(2);
|
|
|
|
if (v1.type == T_PATH)
|
|
|
|
{
|
2018-12-27 21:26:11 +08:00
|
|
|
const struct f_tree *set = NULL;
|
2018-12-17 20:08:08 +08:00
|
|
|
u32 key = 0;
|
|
|
|
|
|
|
|
if (v2.type == T_INT)
|
|
|
|
key = v2.val.i;
|
|
|
|
else if ((v2.type == T_SET) && (v2.val.t->from.type == T_INT))
|
|
|
|
set = v2.val.t;
|
|
|
|
else
|
|
|
|
runtime("Can't delete non-integer (set)");
|
|
|
|
|
2019-07-02 16:45:53 +08:00
|
|
|
RESULT(T_PATH, ad, [[ as_path_filter(fpool, v1.val.ad, set, key, 0) ]]);
|
2018-12-17 20:08:08 +08:00
|
|
|
}
|
2018-12-27 21:26:11 +08:00
|
|
|
|
2018-12-17 20:08:08 +08:00
|
|
|
else if (v1.type == T_CLIST)
|
|
|
|
{
|
|
|
|
/* Community (or cluster) list */
|
|
|
|
struct f_val dummy;
|
|
|
|
|
|
|
|
if ((v2.type == T_PAIR) || (v2.type == T_QUAD))
|
2019-07-02 16:45:53 +08:00
|
|
|
RESULT(T_CLIST, ad, [[ int_set_del(fpool, v1.val.ad, v2.val.i) ]]);
|
2018-12-17 20:08:08 +08:00
|
|
|
/* IP->Quad implicit conversion */
|
2018-12-27 21:26:11 +08:00
|
|
|
else if (val_is_ip4(&v2))
|
2019-07-02 16:45:53 +08:00
|
|
|
RESULT(T_CLIST, ad, [[ int_set_del(fpool, v1.val.ad, ipa_to_u32(v2.val.ip)) ]]);
|
2018-12-27 21:26:11 +08:00
|
|
|
else if ((v2.type == T_SET) && clist_set_type(v2.val.t, &dummy) || (v2.type == T_CLIST))
|
2019-07-02 16:45:53 +08:00
|
|
|
RESULT(T_CLIST, ad, [[ clist_filter(fpool, v1.val.ad, &v2, 0) ]]);
|
2018-12-17 20:08:08 +08:00
|
|
|
else
|
2018-12-27 21:26:11 +08:00
|
|
|
runtime("Can't delete non-pair");
|
2018-12-17 20:08:08 +08:00
|
|
|
}
|
2018-12-27 21:26:11 +08:00
|
|
|
|
2018-12-17 20:08:08 +08:00
|
|
|
else if (v1.type == T_ECLIST)
|
|
|
|
{
|
|
|
|
/* v2.val is either EC or EC-set */
|
2018-12-27 21:26:11 +08:00
|
|
|
if ((v2.type == T_SET) && eclist_set_type(v2.val.t) || (v2.type == T_ECLIST))
|
2019-07-02 16:45:53 +08:00
|
|
|
RESULT(T_ECLIST, ad, [[ eclist_filter(fpool, v1.val.ad, &v2, 0) ]]);
|
2018-12-17 20:08:08 +08:00
|
|
|
else if (v2.type != T_EC)
|
2018-12-27 21:26:11 +08:00
|
|
|
runtime("Can't delete non-ec");
|
|
|
|
else
|
2019-07-02 16:45:53 +08:00
|
|
|
RESULT(T_ECLIST, ad, [[ ec_set_del(fpool, v1.val.ad, v2.val.ec) ]]);
|
2018-12-17 20:08:08 +08:00
|
|
|
}
|
2018-12-27 21:26:11 +08:00
|
|
|
|
2018-12-17 20:08:08 +08:00
|
|
|
else if (v1.type == T_LCLIST)
|
|
|
|
{
|
|
|
|
/* v2.val is either LC or LC-set */
|
2018-12-27 21:26:11 +08:00
|
|
|
if ((v2.type == T_SET) && lclist_set_type(v2.val.t) || (v2.type == T_LCLIST))
|
2019-07-02 16:45:53 +08:00
|
|
|
RESULT(T_LCLIST, ad, [[ lclist_filter(fpool, v1.val.ad, &v2, 0) ]]);
|
2018-12-17 20:08:08 +08:00
|
|
|
else if (v2.type != T_LC)
|
2018-12-27 21:26:11 +08:00
|
|
|
runtime("Can't delete non-lc");
|
|
|
|
else
|
2019-07-02 16:45:53 +08:00
|
|
|
RESULT(T_LCLIST, ad, [[ lc_set_del(fpool, v1.val.ad, v2.val.lc) ]]);
|
2018-12-27 21:26:11 +08:00
|
|
|
}
|
2018-12-17 20:08:08 +08:00
|
|
|
|
2018-12-27 21:26:11 +08:00
|
|
|
else
|
|
|
|
runtime("Can't delete in non-[e|l]clist");
|
|
|
|
}
|
2018-12-17 20:08:08 +08:00
|
|
|
|
2018-12-27 21:26:11 +08:00
|
|
|
INST(FI_CLIST_FILTER, 2, 1) { /* (Extended) Community list add or delete */
|
|
|
|
ARG_ANY(1);
|
|
|
|
ARG_ANY(2);
|
|
|
|
if (v1.type == T_PATH)
|
|
|
|
{
|
|
|
|
u32 key = 0;
|
2018-12-17 20:08:08 +08:00
|
|
|
|
2018-12-27 21:26:11 +08:00
|
|
|
if ((v2.type == T_SET) && (v2.val.t->from.type == T_INT))
|
2019-07-02 16:45:53 +08:00
|
|
|
RESULT(T_PATH, ad, [[ as_path_filter(fpool, v1.val.ad, v2.val.t, key, 1) ]]);
|
2018-12-27 21:26:11 +08:00
|
|
|
else
|
|
|
|
runtime("Can't filter integer");
|
2018-12-17 20:08:08 +08:00
|
|
|
}
|
|
|
|
|
2018-12-27 21:26:11 +08:00
|
|
|
else if (v1.type == T_CLIST)
|
|
|
|
{
|
|
|
|
/* Community (or cluster) list */
|
|
|
|
struct f_val dummy;
|
2018-12-17 20:08:08 +08:00
|
|
|
|
2018-12-27 21:26:11 +08:00
|
|
|
if ((v2.type == T_SET) && clist_set_type(v2.val.t, &dummy) || (v2.type == T_CLIST))
|
2019-07-02 16:45:53 +08:00
|
|
|
RESULT(T_CLIST, ad, [[ clist_filter(fpool, v1.val.ad, &v2, 1) ]]);
|
2018-12-27 21:26:11 +08:00
|
|
|
else
|
|
|
|
runtime("Can't filter pair");
|
|
|
|
}
|
|
|
|
|
|
|
|
else if (v1.type == T_ECLIST)
|
2018-12-17 20:08:08 +08:00
|
|
|
{
|
2018-12-27 21:26:11 +08:00
|
|
|
/* v2.val is either EC or EC-set */
|
|
|
|
if ((v2.type == T_SET) && eclist_set_type(v2.val.t) || (v2.type == T_ECLIST))
|
2019-07-02 16:45:53 +08:00
|
|
|
RESULT(T_ECLIST, ad, [[ eclist_filter(fpool, v1.val.ad, &v2, 1) ]]);
|
2018-12-27 21:26:11 +08:00
|
|
|
else
|
|
|
|
runtime("Can't filter ec");
|
|
|
|
}
|
2018-12-17 20:08:08 +08:00
|
|
|
|
2018-12-27 21:26:11 +08:00
|
|
|
else if (v1.type == T_LCLIST)
|
|
|
|
{
|
|
|
|
/* v2.val is either LC or LC-set */
|
|
|
|
if ((v2.type == T_SET) && lclist_set_type(v2.val.t) || (v2.type == T_LCLIST))
|
2019-07-02 16:45:53 +08:00
|
|
|
RESULT(T_LCLIST, ad, [[ lclist_filter(fpool, v1.val.ad, &v2, 1) ]]);
|
2018-12-27 21:26:11 +08:00
|
|
|
else
|
|
|
|
runtime("Can't filter lc");
|
2018-12-17 20:08:08 +08:00
|
|
|
}
|
2018-12-27 21:26:11 +08:00
|
|
|
|
2018-12-17 20:08:08 +08:00
|
|
|
else
|
2018-12-27 21:26:11 +08:00
|
|
|
runtime("Can't filter non-[e|l]clist");
|
|
|
|
}
|
2018-12-17 20:08:08 +08:00
|
|
|
|
2018-12-27 21:26:11 +08:00
|
|
|
INST(FI_ROA_CHECK_IMPLICIT, 0, 1) { /* ROA Check */
|
2019-07-02 16:45:53 +08:00
|
|
|
NEVER_CONSTANT;
|
2018-12-27 21:26:11 +08:00
|
|
|
RTC(1);
|
2019-07-02 16:45:53 +08:00
|
|
|
struct rtable *table = rtc->table;
|
2018-12-27 21:26:11 +08:00
|
|
|
ACCESS_RTE;
|
|
|
|
ACCESS_EATTRS;
|
|
|
|
const net_addr *net = (*fs->rte)->net->n.addr;
|
2018-12-17 20:08:08 +08:00
|
|
|
|
2018-12-27 21:26:11 +08:00
|
|
|
/* We ignore temporary attributes, probably not a problem here */
|
|
|
|
/* 0x02 is a value of BA_AS_PATH, we don't want to include BGP headers */
|
|
|
|
eattr *e = ea_find(*fs->eattrs, EA_CODE(PROTOCOL_BGP, 0x02));
|
2018-12-17 20:08:08 +08:00
|
|
|
|
2018-12-27 21:26:11 +08:00
|
|
|
if (!e || ((e->type & EAF_TYPE_MASK) != EAF_TYPE_AS_PATH))
|
|
|
|
runtime("Missing AS_PATH attribute");
|
|
|
|
|
|
|
|
u32 as = 0;
|
|
|
|
as_path_get_last(e->u.ptr, &as);
|
2018-12-17 20:08:08 +08:00
|
|
|
|
|
|
|
if (!table)
|
|
|
|
runtime("Missing ROA table");
|
|
|
|
|
|
|
|
if (table->addr_type != NET_ROA4 && table->addr_type != NET_ROA6)
|
|
|
|
runtime("Table type must be either ROA4 or ROA6");
|
|
|
|
|
2018-12-27 21:26:11 +08:00
|
|
|
if (table->addr_type != (net->type == NET_IP4 ? NET_ROA4 : NET_ROA6))
|
|
|
|
RESULT(T_ENUM_ROA, i, ROA_UNKNOWN); /* Prefix and table type mismatch */
|
|
|
|
else
|
|
|
|
RESULT(T_ENUM_ROA, i, [[ net_roa_check(table, net, as) ]]);
|
|
|
|
}
|
|
|
|
|
|
|
|
INST(FI_ROA_CHECK_EXPLICIT, 2, 1) { /* ROA Check */
|
2019-07-02 16:45:53 +08:00
|
|
|
NEVER_CONSTANT;
|
2018-12-27 21:26:11 +08:00
|
|
|
ARG(1, T_NET);
|
|
|
|
ARG(2, T_INT);
|
|
|
|
RTC(3);
|
2019-07-02 16:45:53 +08:00
|
|
|
struct rtable *table = rtc->table;
|
2018-12-27 21:26:11 +08:00
|
|
|
|
|
|
|
u32 as = v2.val.i;
|
|
|
|
|
|
|
|
if (!table)
|
|
|
|
runtime("Missing ROA table");
|
|
|
|
|
|
|
|
if (table->addr_type != NET_ROA4 && table->addr_type != NET_ROA6)
|
|
|
|
runtime("Table type must be either ROA4 or ROA6");
|
2018-12-17 20:08:08 +08:00
|
|
|
|
|
|
|
if (table->addr_type != (v1.val.net->type == NET_IP4 ? NET_ROA4 : NET_ROA6))
|
2018-12-27 21:26:11 +08:00
|
|
|
RESULT(T_ENUM_ROA, i, ROA_UNKNOWN); /* Prefix and table type mismatch */
|
2018-12-17 20:08:08 +08:00
|
|
|
else
|
2018-12-27 21:26:11 +08:00
|
|
|
RESULT(T_ENUM_ROA, i, [[ net_roa_check(table, v1.val.net, as) ]]);
|
2018-12-17 20:08:08 +08:00
|
|
|
|
2018-12-20 23:25:54 +08:00
|
|
|
}
|
2018-12-17 20:08:08 +08:00
|
|
|
|
2018-12-27 21:26:11 +08:00
|
|
|
INST(FI_FORMAT, 1, 0) { /* Format */
|
2018-12-17 20:08:08 +08:00
|
|
|
ARG_ANY(1);
|
2019-07-02 16:45:53 +08:00
|
|
|
RESULT(T_STRING, s, val_format_str(fpool, &v1));
|
2018-12-20 23:25:54 +08:00
|
|
|
}
|
2018-12-17 20:08:08 +08:00
|
|
|
|
2018-12-27 21:26:11 +08:00
|
|
|
INST(FI_ASSERT, 1, 0) { /* Birdtest Assert */
|
2019-07-02 16:45:53 +08:00
|
|
|
NEVER_CONSTANT;
|
2018-12-17 20:08:08 +08:00
|
|
|
ARG(1, T_BOOL);
|
2019-07-02 23:39:56 +08:00
|
|
|
|
|
|
|
FID_MEMBER(char *, s, [[strcmp(f1->s, f2->s)]], string %s, item->s);
|
2019-07-02 16:45:53 +08:00
|
|
|
|
|
|
|
ASSERT(s);
|
2019-07-01 19:13:06 +08:00
|
|
|
|
2019-01-30 21:03:47 +08:00
|
|
|
if (!bt_assert_hook)
|
|
|
|
runtime("No bt_assert hook registered, can't assert");
|
|
|
|
|
2019-07-02 16:45:53 +08:00
|
|
|
bt_assert_hook(v1.val.i, what);
|
2018-12-20 23:25:54 +08:00
|
|
|
}
|