Filter: Minor cleanups

This commit is contained in:
Ondrej Zajicek (work) 2019-07-10 16:46:31 +02:00
parent b2a4feeb4c
commit bfa15a642f
2 changed files with 33 additions and 23 deletions

View file

@ -91,6 +91,7 @@
else else
RESULT_VAL(v1); RESULT_VAL(v1);
} }
INST(FI_PAIR_CONSTRUCT, 2, 1) { INST(FI_PAIR_CONSTRUCT, 2, 1) {
ARG(1,T_INT); ARG(1,T_INT);
ARG(2,T_INT); ARG(2,T_INT);
@ -100,6 +101,7 @@
runtime( "Can't operate with value out of bounds in pair constructor" ); runtime( "Can't operate with value out of bounds in pair constructor" );
RESULT(T_PAIR, i, (u1 << 16) | u2); RESULT(T_PAIR, i, (u1 << 16) | u2);
} }
INST(FI_EC_CONSTRUCT, 2, 1) { INST(FI_EC_CONSTRUCT, 2, 1) {
ARG_ANY(1); ARG_ANY(1);
ARG(2, T_INT); ARG(2, T_INT);
@ -120,7 +122,7 @@
ipv4_used = 1; key = ipa_to_u32(v1.val.ip); ipv4_used = 1; key = ipa_to_u32(v1.val.ip);
} }
else else
runtime("Argument 1 of instruction FI_EC_CONSTRUCT must be integer or IPv4 address, got 0x%02x"); runtime("Argument 1 of EC constructor must be integer or IPv4 address, got 0x%02x", v1.type);
val = v2.val.i; val = v2.val.i;
@ -173,21 +175,21 @@
if (fstk->vcnt < whati->count) /* TODO: make this check systematic */ if (fstk->vcnt < whati->count) /* TODO: make this check systematic */
runtime("Construction of BGP path mask from %u elements must have at least that number of elements", whati->count); runtime("Construction of BGP path mask from %u elements must have at least that number of elements", whati->count);
#define pv fstk->vstk[fstk->vcnt - whati->count + i] #define pv(i) fstk->vstk[fstk->vcnt - whati->count + (i)]
FID_INTERPRET_NEW FID_INTERPRET_NEW
#define pv items[i]->i_FI_CONSTANT.val #define pv(i) items[i]->i_FI_CONSTANT.val
FID_INTERPRET_BODY FID_INTERPRET_BODY
struct f_path_mask *pm = falloc(sizeof(struct f_path_mask) + whati->count * sizeof(struct f_path_mask_item)); struct f_path_mask *pm = falloc(sizeof(struct f_path_mask) + whati->count * sizeof(struct f_path_mask_item));
for (uint i=0; i<whati->count; i++) { for (uint i=0; i<whati->count; i++) {
switch (pv.type) { switch (pv(i).type) {
case T_PATH_MASK_ITEM: case T_PATH_MASK_ITEM:
pm->item[i] = pv.val.pmi; pm->item[i] = pv(i).val.pmi;
break; break;
case T_INT: case T_INT:
pm->item[i] = (struct f_path_mask_item) { pm->item[i] = (struct f_path_mask_item) {
.asn = pv.val.i, .asn = pv(i).val.i,
.kind = PM_ASN, .kind = PM_ASN,
}; };
break; break;
@ -195,6 +197,7 @@
runtime( "Error resolving path mask template: value not an integer" ); runtime( "Error resolving path mask template: value not an integer" );
} }
} }
#undef pv
FID_INTERPRET_EXEC FID_INTERPRET_EXEC
fstk->vcnt -= whati->count; fstk->vcnt -= whati->count;
@ -308,8 +311,7 @@
RESULT_VAL(fstk->vstk[curline.vbase + sym->offset]); RESULT_VAL(fstk->vstk[curline.vbase + sym->offset]);
} }
/* some constants have value in a[1], some in *a[0].p, strange. */ INST(FI_CONSTANT, 0, 1) {
INST(FI_CONSTANT, 0, 1) { /* integer (or simple type) constant, string, set, or prefix_set */
FID_MEMBER( FID_MEMBER(
struct f_val, struct f_val,
val, val,
@ -320,6 +322,7 @@
RESULT_VAL(val); RESULT_VAL(val);
} }
INST(FI_CONDITION, 1, 0) { INST(FI_CONDITION, 1, 0) {
ARG(1, T_BOOL); ARG(1, T_BOOL);
if (v1.val.i) if (v1.val.i)
@ -341,10 +344,10 @@
FID_INTERPRET_BODY FID_INTERPRET_BODY
#define pv fstk->vstk[fstk->vcnt - whati->count + i] #define pv(i) fstk->vstk[fstk->vcnt - whati->count + (i)]
if (whati->count) if (whati->count)
for (uint i=0; i<whati->count; i++) for (uint i=0; i<whati->count; i++)
val_format(&(pv), &fs->buf); val_format(&(pv(i)), &fs->buf);
#undef pv #undef pv
fstk->vcnt -= whati->count; fstk->vcnt -= whati->count;
@ -372,7 +375,7 @@
} }
} }
INST(FI_RTA_GET, 0, 1) { /* rta access */ INST(FI_RTA_GET, 0, 1) {
{ {
STATIC_ATTR; STATIC_ATTR;
ACCESS_RTE; ACCESS_RTE;
@ -577,6 +580,7 @@
case EAF_TYPE_OPAQUE: case EAF_TYPE_OPAQUE:
runtime( "Setting opaque attribute is not allowed" ); runtime( "Setting opaque attribute is not allowed" );
break; break;
case EAF_TYPE_IP_ADDRESS: case EAF_TYPE_IP_ADDRESS:
if (v1.type != T_IP) if (v1.type != T_IP)
runtime( "Setting ip attribute to non-ip value" ); runtime( "Setting ip attribute to non-ip value" );
@ -586,11 +590,13 @@
(* (ip_addr *) ad->data) = v1.val.ip; (* (ip_addr *) ad->data) = v1.val.ip;
l->attrs[0].u.ptr = ad; l->attrs[0].u.ptr = ad;
break; break;
case EAF_TYPE_AS_PATH: case EAF_TYPE_AS_PATH:
if (v1.type != T_PATH) if (v1.type != T_PATH)
runtime( "Setting path attribute to non-path value" ); runtime( "Setting path attribute to non-path value" );
l->attrs[0].u.ptr = v1.val.ad; l->attrs[0].u.ptr = v1.val.ad;
break; break;
case EAF_TYPE_BITFIELD: case EAF_TYPE_BITFIELD:
if (v1.type != T_BOOL) if (v1.type != T_BOOL)
runtime( "Setting bit in bitfield attribute to non-bool value" ); runtime( "Setting bit in bitfield attribute to non-bool value" );
@ -605,22 +611,27 @@
l->attrs[0].u.data = data & ~(1u << da.bit); l->attrs[0].u.data = data & ~(1u << da.bit);
} }
break; break;
case EAF_TYPE_INT_SET: case EAF_TYPE_INT_SET:
if (v1.type != T_CLIST) if (v1.type != T_CLIST)
runtime( "Setting clist attribute to non-clist value" ); runtime( "Setting clist attribute to non-clist value" );
l->attrs[0].u.ptr = v1.val.ad; l->attrs[0].u.ptr = v1.val.ad;
break; break;
case EAF_TYPE_EC_SET: case EAF_TYPE_EC_SET:
if (v1.type != T_ECLIST) if (v1.type != T_ECLIST)
runtime( "Setting eclist attribute to non-eclist value" ); runtime( "Setting eclist attribute to non-eclist value" );
l->attrs[0].u.ptr = v1.val.ad; l->attrs[0].u.ptr = v1.val.ad;
break; break;
case EAF_TYPE_LC_SET: case EAF_TYPE_LC_SET:
if (v1.type != T_LCLIST) if (v1.type != T_LCLIST)
runtime( "Setting lclist attribute to non-lclist value" ); runtime( "Setting lclist attribute to non-lclist value" );
l->attrs[0].u.ptr = v1.val.ad; l->attrs[0].u.ptr = v1.val.ad;
break; break;
default: bug("Unknown type in e,S");
default:
bug("Unknown dynamic attribute type");
} }
f_rta_cow(fs); f_rta_cow(fs);
@ -754,7 +765,6 @@
if (!fstk->ecnt) if (!fstk->ecnt)
if (fstk->vstk[retpos].type == T_BOOL) if (fstk->vstk[retpos].type == T_BOOL)
if (fstk->vstk[retpos].val.i) if (fstk->vstk[retpos].val.i)
return F_ACCEPT; return F_ACCEPT;
else else
return F_REJECT; return F_REJECT;

View file

@ -335,7 +335,7 @@ f_run(const struct filter *filter, struct rte **rte, struct linpool *tmp_pool, i
} }
/** /**
* f_eval_rte run a filter line for an uncached route * f_eval_rte - run a filter line for an uncached route
* @expr: filter line to run * @expr: filter line to run
* @rte: route being filtered, may be modified * @rte: route being filtered, may be modified
* @tmp_pool: all filter allocations go from this pool * @tmp_pool: all filter allocations go from this pool
@ -364,7 +364,7 @@ f_eval_rte(const struct f_line *expr, struct rte **rte, struct linpool *tmp_pool
} }
/* /*
* f_eval get a value of a term * f_eval - get a value of a term
* @expr: filter line containing the term * @expr: filter line containing the term
* @tmp_pool: long data may get allocated from this pool * @tmp_pool: long data may get allocated from this pool
* @pres: here the output will be stored * @pres: here the output will be stored
@ -383,7 +383,7 @@ f_eval(const struct f_line *expr, struct linpool *tmp_pool, struct f_val *pres)
} }
/* /*
* f_eval_int get an integer value of a term * f_eval_int - get an integer value of a term
* Called internally from the config parser, uses its internal memory pool * Called internally from the config parser, uses its internal memory pool
* for allocations. Do not call in other cases. * for allocations. Do not call in other cases.
*/ */
@ -409,7 +409,7 @@ f_eval_int(const struct f_line *expr)
} }
/* /*
* f_eval_buf get a value of a term and print it to the supplied buffer * f_eval_buf - get a value of a term and print it to the supplied buffer
*/ */
enum filter_return enum filter_return
f_eval_buf(const struct f_line *expr, struct linpool *tmp_pool, buffer *buf) f_eval_buf(const struct f_line *expr, struct linpool *tmp_pool, buffer *buf)