1999-04-07 12:11:08 +00:00
|
|
|
/*
|
|
|
|
* Filters: utility functions
|
|
|
|
*
|
|
|
|
* Copyright 1998 Pavel Machek <pavel@ucw.cz>
|
|
|
|
*
|
|
|
|
* Can be freely distributed and used under the terms of the GNU GPL.
|
1999-08-20 09:59:39 +00:00
|
|
|
*
|
1999-04-07 12:11:08 +00:00
|
|
|
*/
|
|
|
|
|
2000-04-30 18:47:48 +00:00
|
|
|
/**
|
|
|
|
* DOC: Filters
|
|
|
|
*
|
2000-06-08 12:37:21 +00:00
|
|
|
* You can find sources of the filter language in |filter/|
|
|
|
|
* directory. File |filter/config.Y| contains filter grammar and basically translates
|
|
|
|
* the source from user into a tree of &f_inst structures. These trees are
|
|
|
|
* later interpreted using code in |filter/filter.c|.
|
2000-05-30 10:13:32 +00:00
|
|
|
*
|
2000-06-08 12:37:21 +00:00
|
|
|
* A filter is represented by a tree of &f_inst structures, one structure per
|
|
|
|
* "instruction". Each &f_inst contains @code, @aux value which is
|
|
|
|
* usually the data type this instruction operates on and two generic
|
2018-12-20 13:55:40 +00:00
|
|
|
* arguments (@a[0], @a[1]). Some instructions contain pointer(s) to other
|
|
|
|
* instructions in their (@a[0], @a[1]) fields.
|
2000-04-30 18:47:48 +00:00
|
|
|
*
|
2000-06-08 12:37:21 +00:00
|
|
|
* Filters use a &f_val structure for their data. Each &f_val
|
|
|
|
* contains type and value (types are constants prefixed with %T_). Few
|
|
|
|
* of the types are special; %T_RETURN can be or-ed with a type to indicate
|
|
|
|
* that return from a function or from the whole filter should be
|
|
|
|
* forced. Important thing about &f_val's is that they may be copied
|
|
|
|
* with a simple |=|. That's fine for all currently defined types: strings
|
2000-04-30 18:47:48 +00:00
|
|
|
* are read-only (and therefore okay), paths are copied for each
|
2000-06-05 17:13:36 +00:00
|
|
|
* operation (okay too).
|
|
|
|
*/
|
2000-04-30 18:47:48 +00:00
|
|
|
|
2000-05-04 20:52:28 +00:00
|
|
|
#undef LOCAL_DEBUG
|
2000-03-12 21:01:38 +00:00
|
|
|
|
1999-04-07 12:11:08 +00:00
|
|
|
#include "nest/bird.h"
|
|
|
|
#include "lib/lists.h"
|
|
|
|
#include "lib/resource.h"
|
|
|
|
#include "lib/socket.h"
|
1999-04-12 19:58:18 +00:00
|
|
|
#include "lib/string.h"
|
2000-04-10 15:07:43 +00:00
|
|
|
#include "lib/unaligned.h"
|
2016-01-20 14:38:37 +00:00
|
|
|
#include "lib/net.h"
|
|
|
|
#include "lib/ip.h"
|
1999-04-07 12:11:08 +00:00
|
|
|
#include "nest/route.h"
|
|
|
|
#include "nest/protocol.h"
|
|
|
|
#include "nest/iface.h"
|
2000-04-17 11:20:00 +00:00
|
|
|
#include "nest/attrs.h"
|
1999-04-07 12:11:08 +00:00
|
|
|
#include "conf/conf.h"
|
|
|
|
#include "filter/filter.h"
|
2019-01-21 08:17:54 +00:00
|
|
|
#include "filter/f-inst-struct.h"
|
1999-04-07 12:11:08 +00:00
|
|
|
|
1999-04-12 19:58:18 +00:00
|
|
|
#define CMP_ERROR 999
|
|
|
|
|
2018-02-27 14:39:39 +00:00
|
|
|
/* Internal filter state, to be allocated on stack when executing filters */
|
|
|
|
struct filter_state {
|
|
|
|
struct rte **rte;
|
|
|
|
struct rta *old_rta;
|
|
|
|
struct ea_list **eattrs;
|
|
|
|
struct linpool *pool;
|
|
|
|
struct buffer buf;
|
|
|
|
int flags;
|
|
|
|
};
|
|
|
|
|
2018-12-27 13:26:11 +00:00
|
|
|
void (*bt_assert_hook)(int result, const struct f_line_item *assert);
|
2018-01-03 14:44:05 +00:00
|
|
|
|
|
|
|
/* Special undef value for paths and clists */
|
|
|
|
static inline int
|
|
|
|
undef_value(struct f_val v)
|
|
|
|
{
|
|
|
|
return ((v.type == T_PATH) || (v.type == T_CLIST) ||
|
|
|
|
(v.type == T_ECLIST) || (v.type == T_LCLIST)) &&
|
2018-12-27 13:26:11 +00:00
|
|
|
(v.val.ad == &null_adata);
|
2018-01-03 14:44:05 +00:00
|
|
|
}
|
|
|
|
|
2018-12-27 13:26:11 +00:00
|
|
|
const struct f_val f_const_empty_path = {
|
|
|
|
.type = T_PATH,
|
|
|
|
.val.ad = &null_adata,
|
|
|
|
}, f_const_empty_clist = {
|
|
|
|
.type = T_CLIST,
|
|
|
|
.val.ad = &null_adata,
|
|
|
|
}, f_const_empty_eclist = {
|
|
|
|
.type = T_ECLIST,
|
|
|
|
.val.ad = &null_adata,
|
|
|
|
}, f_const_empty_lclist = {
|
|
|
|
.type = T_LCLIST,
|
|
|
|
.val.ad = &null_adata,
|
|
|
|
};
|
|
|
|
|
2004-06-05 09:58:23 +00:00
|
|
|
static struct adata *
|
2011-08-12 19:03:43 +00:00
|
|
|
adata_empty(struct linpool *pool, int l)
|
2000-05-25 15:20:40 +00:00
|
|
|
{
|
2011-08-12 19:03:43 +00:00
|
|
|
struct adata *res = lp_alloc(pool, sizeof(struct adata) + l);
|
|
|
|
res->length = l;
|
2000-05-25 15:20:40 +00:00
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2008-10-26 21:36:08 +00:00
|
|
|
static void
|
2018-12-27 13:26:11 +00:00
|
|
|
pm_format(const struct f_path_mask *p, buffer *buf)
|
2008-10-26 21:36:08 +00:00
|
|
|
{
|
2013-10-05 18:12:28 +00:00
|
|
|
buffer_puts(buf, "[= ");
|
2008-10-26 21:36:08 +00:00
|
|
|
|
2018-12-27 13:26:11 +00:00
|
|
|
for (uint i=0; i<p->len; i++)
|
2013-10-05 18:12:28 +00:00
|
|
|
{
|
2018-12-27 13:26:11 +00:00
|
|
|
switch(p->item[i].kind)
|
2008-10-26 21:36:08 +00:00
|
|
|
{
|
2013-10-05 18:12:28 +00:00
|
|
|
case PM_ASN:
|
2018-12-27 13:26:11 +00:00
|
|
|
buffer_print(buf, "%u ", p->item[i].asn);
|
2013-10-05 18:12:28 +00:00
|
|
|
break;
|
2009-06-01 17:32:41 +00:00
|
|
|
|
2013-10-05 18:12:28 +00:00
|
|
|
case PM_QUESTION:
|
|
|
|
buffer_puts(buf, "? ");
|
|
|
|
break;
|
2009-06-01 17:32:41 +00:00
|
|
|
|
2013-10-05 18:12:28 +00:00
|
|
|
case PM_ASTERISK:
|
|
|
|
buffer_puts(buf, "* ");
|
|
|
|
break;
|
2008-10-26 21:36:08 +00:00
|
|
|
|
2016-06-08 14:22:44 +00:00
|
|
|
case PM_ASN_RANGE:
|
2018-12-27 13:26:11 +00:00
|
|
|
buffer_print(buf, "%u..%u ", p->item[i].from, p->item[i].to);
|
2016-06-08 14:22:44 +00:00
|
|
|
break;
|
|
|
|
|
2013-10-05 18:12:28 +00:00
|
|
|
case PM_ASN_EXPR:
|
2018-02-28 15:57:50 +00:00
|
|
|
ASSERT(0);
|
2008-10-26 21:36:08 +00:00
|
|
|
}
|
|
|
|
|
2013-10-05 18:12:28 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
buffer_puts(buf, "=]");
|
2008-10-26 21:36:08 +00:00
|
|
|
}
|
|
|
|
|
2018-12-27 13:26:11 +00:00
|
|
|
static inline int val_is_ip4(const struct f_val *v)
|
|
|
|
{ return (v->type == T_IP) && ipa_is_ip4(v->val.ip); }
|
2011-08-12 19:03:43 +00:00
|
|
|
|
2016-10-01 10:50:29 +00:00
|
|
|
static inline int
|
|
|
|
lcomm_cmp(lcomm v1, lcomm v2)
|
|
|
|
{
|
|
|
|
if (v1.asn != v2.asn)
|
|
|
|
return (v1.asn > v2.asn) ? 1 : -1;
|
|
|
|
if (v1.ldp1 != v2.ldp1)
|
|
|
|
return (v1.ldp1 > v2.ldp1) ? 1 : -1;
|
|
|
|
if (v1.ldp2 != v2.ldp2)
|
|
|
|
return (v1.ldp2 > v2.ldp2) ? 1 : -1;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2000-06-07 14:16:11 +00:00
|
|
|
/**
|
2000-06-07 14:45:55 +00:00
|
|
|
* val_compare - compare two values
|
2000-06-07 14:16:11 +00:00
|
|
|
* @v1: first value
|
|
|
|
* @v2: second value
|
|
|
|
*
|
2013-10-02 12:41:37 +00:00
|
|
|
* Compares two values and returns -1, 0, 1 on <, =, > or CMP_ERROR on
|
|
|
|
* error. Tree module relies on this giving consistent results so
|
|
|
|
* that it can be used for building balanced trees.
|
2000-06-05 12:52:57 +00:00
|
|
|
*/
|
1999-04-12 19:58:18 +00:00
|
|
|
int
|
2018-12-27 13:26:11 +00:00
|
|
|
val_compare(const struct f_val *v1, const struct f_val *v2)
|
1999-04-12 19:58:18 +00:00
|
|
|
{
|
2018-12-27 13:26:11 +00:00
|
|
|
if (v1->type != v2->type) {
|
|
|
|
if (v1->type == T_VOID) /* Hack for else */
|
2013-10-02 10:10:09 +00:00
|
|
|
return -1;
|
2018-12-27 13:26:11 +00:00
|
|
|
if (v2->type == T_VOID)
|
2013-10-02 10:10:09 +00:00
|
|
|
return 1;
|
|
|
|
|
2010-03-29 17:29:03 +00:00
|
|
|
/* IP->Quad implicit conversion */
|
2018-12-27 13:26:11 +00:00
|
|
|
if ((v1->type == T_QUAD) && val_is_ip4(v2))
|
|
|
|
return uint_cmp(v1->val.i, ipa_to_u32(v2->val.ip));
|
|
|
|
if (val_is_ip4(v1) && (v2->type == T_QUAD))
|
|
|
|
return uint_cmp(ipa_to_u32(v1->val.ip), v2->val.i);
|
2010-03-29 17:29:03 +00:00
|
|
|
|
2000-04-26 09:30:12 +00:00
|
|
|
debug( "Types do not match in val_compare\n" );
|
1999-09-29 14:24:58 +00:00
|
|
|
return CMP_ERROR;
|
2000-04-26 09:30:12 +00:00
|
|
|
}
|
2013-10-02 12:41:37 +00:00
|
|
|
|
2018-12-27 13:26:11 +00:00
|
|
|
switch (v1->type) {
|
2013-10-02 12:41:37 +00:00
|
|
|
case T_VOID:
|
|
|
|
return 0;
|
1999-11-10 12:44:07 +00:00
|
|
|
case T_ENUM:
|
2009-05-28 11:37:04 +00:00
|
|
|
case T_INT:
|
|
|
|
case T_BOOL:
|
1999-10-12 06:27:42 +00:00
|
|
|
case T_PAIR:
|
2010-03-29 17:29:03 +00:00
|
|
|
case T_QUAD:
|
2018-12-27 13:26:11 +00:00
|
|
|
return uint_cmp(v1->val.i, v2->val.i);
|
2011-08-12 19:03:43 +00:00
|
|
|
case T_EC:
|
2017-03-13 12:50:32 +00:00
|
|
|
case T_RD:
|
2018-12-27 13:26:11 +00:00
|
|
|
return u64_cmp(v1->val.ec, v2->val.ec);
|
2016-10-01 10:50:29 +00:00
|
|
|
case T_LC:
|
2018-12-27 13:26:11 +00:00
|
|
|
return lcomm_cmp(v1->val.lc, v2->val.lc);
|
1999-04-13 11:40:04 +00:00
|
|
|
case T_IP:
|
2018-12-27 13:26:11 +00:00
|
|
|
return ipa_compare(v1->val.ip, v2->val.ip);
|
2015-12-16 09:25:12 +00:00
|
|
|
case T_NET:
|
2018-12-27 13:26:11 +00:00
|
|
|
return net_compare(v1->val.net, v2->val.net);
|
2008-11-14 13:50:37 +00:00
|
|
|
case T_STRING:
|
2018-12-27 13:26:11 +00:00
|
|
|
return strcmp(v1->val.s, v2->val.s);
|
2000-03-30 08:50:30 +00:00
|
|
|
default:
|
|
|
|
return CMP_ERROR;
|
1999-04-12 19:58:18 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-10-02 12:41:37 +00:00
|
|
|
static int
|
2018-12-27 13:26:11 +00:00
|
|
|
pm_same(const struct f_path_mask *m1, const struct f_path_mask *m2)
|
2010-02-17 20:53:07 +00:00
|
|
|
{
|
2018-12-27 13:26:11 +00:00
|
|
|
if (m1->len != m2->len)
|
|
|
|
|
|
|
|
for (uint i=0; i<m1->len; i++)
|
2013-10-02 12:41:37 +00:00
|
|
|
{
|
2018-12-27 13:26:11 +00:00
|
|
|
if (m1->item[i].kind != m2->item[i].kind)
|
2013-10-02 12:41:37 +00:00
|
|
|
return 0;
|
|
|
|
|
2018-12-27 13:26:11 +00:00
|
|
|
switch (m1->item[i].kind) {
|
|
|
|
case PM_ASN:
|
|
|
|
if (m1->item[i].asn != m2->item[i].asn)
|
|
|
|
return 0;
|
|
|
|
break;
|
|
|
|
case PM_ASN_EXPR:
|
|
|
|
if (!f_same(m1->item[i].expr, m2->item[i].expr))
|
|
|
|
return 0;
|
|
|
|
break;
|
|
|
|
case PM_ASN_RANGE:
|
|
|
|
if (m1->item[i].from != m2->item[i].from)
|
|
|
|
return 0;
|
|
|
|
if (m1->item[i].to != m2->item[i].to)
|
|
|
|
return 0;
|
|
|
|
break;
|
2016-06-08 22:30:41 +00:00
|
|
|
}
|
2013-10-02 12:41:37 +00:00
|
|
|
}
|
|
|
|
|
2018-12-27 13:26:11 +00:00
|
|
|
return 1;
|
2013-10-02 12:41:37 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* val_same - compare two values
|
|
|
|
* @v1: first value
|
|
|
|
* @v2: second value
|
|
|
|
*
|
|
|
|
* Compares two values and returns 1 if they are same and 0 if not.
|
|
|
|
* Comparison of values of different types is valid and returns 0.
|
|
|
|
*/
|
|
|
|
int
|
2018-12-27 13:26:11 +00:00
|
|
|
val_same(const struct f_val *v1, const struct f_val *v2)
|
2010-02-17 20:53:07 +00:00
|
|
|
{
|
2013-10-02 12:41:37 +00:00
|
|
|
int rc;
|
|
|
|
|
|
|
|
rc = val_compare(v1, v2);
|
|
|
|
if (rc != CMP_ERROR)
|
|
|
|
return !rc;
|
|
|
|
|
2018-12-27 13:26:11 +00:00
|
|
|
if (v1->type != v2->type)
|
2013-10-02 12:41:37 +00:00
|
|
|
return 0;
|
|
|
|
|
2018-12-27 13:26:11 +00:00
|
|
|
switch (v1->type) {
|
2013-10-02 12:41:37 +00:00
|
|
|
case T_PATH_MASK:
|
2018-12-27 13:26:11 +00:00
|
|
|
return pm_same(v1->val.path_mask, v2->val.path_mask);
|
2013-10-02 12:41:37 +00:00
|
|
|
case T_PATH:
|
|
|
|
case T_CLIST:
|
|
|
|
case T_ECLIST:
|
2016-10-01 10:50:29 +00:00
|
|
|
case T_LCLIST:
|
2018-12-27 13:26:11 +00:00
|
|
|
return adata_same(v1->val.ad, v2->val.ad);
|
2013-10-02 12:41:37 +00:00
|
|
|
case T_SET:
|
2018-12-27 13:26:11 +00:00
|
|
|
return same_tree(v1->val.t, v2->val.t);
|
2013-10-02 12:41:37 +00:00
|
|
|
case T_PREFIX_SET:
|
2018-12-27 13:26:11 +00:00
|
|
|
return trie_same(v1->val.ti, v2->val.ti);
|
2013-10-02 12:41:37 +00:00
|
|
|
default:
|
2018-12-27 13:26:11 +00:00
|
|
|
bug("Invalid type in val_same(): %x", v1->type);
|
2013-10-02 12:41:37 +00:00
|
|
|
}
|
2010-02-17 20:53:07 +00:00
|
|
|
}
|
2009-03-31 10:55:57 +00:00
|
|
|
|
2010-05-22 20:47:24 +00:00
|
|
|
static int
|
2018-12-27 13:26:11 +00:00
|
|
|
clist_set_type(const struct f_tree *set, struct f_val *v)
|
2010-05-22 20:47:24 +00:00
|
|
|
{
|
2015-12-20 20:43:00 +00:00
|
|
|
switch (set->from.type)
|
|
|
|
{
|
2010-05-22 20:47:24 +00:00
|
|
|
case T_PAIR:
|
|
|
|
v->type = T_PAIR;
|
|
|
|
return 1;
|
2015-12-20 20:43:00 +00:00
|
|
|
|
2010-05-22 20:47:24 +00:00
|
|
|
case T_QUAD:
|
|
|
|
v->type = T_QUAD;
|
|
|
|
return 1;
|
2015-12-20 20:43:00 +00:00
|
|
|
|
|
|
|
case T_IP:
|
2018-12-27 13:26:11 +00:00
|
|
|
if (val_is_ip4(&(set->from)) && val_is_ip4(&(set->to)))
|
2015-12-20 20:43:00 +00:00
|
|
|
{
|
|
|
|
v->type = T_QUAD;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
/* Fall through */
|
2010-05-22 20:47:24 +00:00
|
|
|
default:
|
|
|
|
v->type = T_VOID;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-08-12 19:03:43 +00:00
|
|
|
static inline int
|
2018-12-27 13:26:11 +00:00
|
|
|
eclist_set_type(const struct f_tree *set)
|
2011-08-12 19:03:43 +00:00
|
|
|
{ return set->from.type == T_EC; }
|
|
|
|
|
2016-10-01 10:50:29 +00:00
|
|
|
static inline int
|
2018-12-27 13:26:11 +00:00
|
|
|
lclist_set_type(const struct f_tree *set)
|
2016-10-01 10:50:29 +00:00
|
|
|
{ return set->from.type == T_LC; }
|
|
|
|
|
2010-05-22 20:47:24 +00:00
|
|
|
static int
|
2018-12-27 13:26:11 +00:00
|
|
|
clist_match_set(const struct adata *clist, const struct f_tree *set)
|
2010-05-22 20:47:24 +00:00
|
|
|
{
|
|
|
|
if (!clist)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
struct f_val v;
|
|
|
|
if (!clist_set_type(set, &v))
|
|
|
|
return CMP_ERROR;
|
|
|
|
|
|
|
|
u32 *l = (u32 *) clist->data;
|
|
|
|
u32 *end = l + clist->length/4;
|
2011-08-12 19:03:43 +00:00
|
|
|
|
2010-05-22 20:47:24 +00:00
|
|
|
while (l < end) {
|
|
|
|
v.val.i = *l++;
|
2018-12-27 13:26:11 +00:00
|
|
|
if (find_tree(set, &v))
|
2010-05-22 20:47:24 +00:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2011-08-12 19:03:43 +00:00
|
|
|
static int
|
2018-12-27 13:26:11 +00:00
|
|
|
eclist_match_set(const struct adata *list, const struct f_tree *set)
|
2011-08-12 19:03:43 +00:00
|
|
|
{
|
|
|
|
if (!list)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
if (!eclist_set_type(set))
|
|
|
|
return CMP_ERROR;
|
|
|
|
|
|
|
|
struct f_val v;
|
|
|
|
u32 *l = int_set_get_data(list);
|
|
|
|
int len = int_set_get_size(list);
|
|
|
|
int i;
|
|
|
|
|
|
|
|
v.type = T_EC;
|
|
|
|
for (i = 0; i < len; i += 2) {
|
|
|
|
v.val.ec = ec_get(l, i);
|
2018-12-27 13:26:11 +00:00
|
|
|
if (find_tree(set, &v))
|
2011-08-12 19:03:43 +00:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2016-10-01 10:50:29 +00:00
|
|
|
static int
|
2018-12-27 13:26:11 +00:00
|
|
|
lclist_match_set(const struct adata *list, const struct f_tree *set)
|
2016-10-01 10:50:29 +00:00
|
|
|
{
|
|
|
|
if (!list)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
if (!lclist_set_type(set))
|
|
|
|
return CMP_ERROR;
|
|
|
|
|
|
|
|
struct f_val v;
|
|
|
|
u32 *l = int_set_get_data(list);
|
|
|
|
int len = int_set_get_size(list);
|
|
|
|
int i;
|
|
|
|
|
|
|
|
v.type = T_LC;
|
|
|
|
for (i = 0; i < len; i += 3) {
|
|
|
|
v.val.lc = lc_get(l, i);
|
2018-12-27 13:26:11 +00:00
|
|
|
if (find_tree(set, &v))
|
2016-10-01 10:50:29 +00:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2018-12-27 13:26:11 +00:00
|
|
|
static const struct adata *
|
|
|
|
clist_filter(struct linpool *pool, const struct adata *list, const struct f_val *set, int pos)
|
2010-05-22 20:47:24 +00:00
|
|
|
{
|
2012-03-15 19:42:29 +00:00
|
|
|
if (!list)
|
2010-05-22 20:47:24 +00:00
|
|
|
return NULL;
|
|
|
|
|
2018-12-27 13:26:11 +00:00
|
|
|
int tree = (set->type == T_SET); /* 1 -> set is T_SET, 0 -> set is T_CLIST */
|
2010-05-22 20:47:24 +00:00
|
|
|
struct f_val v;
|
2012-03-15 19:42:29 +00:00
|
|
|
if (tree)
|
2018-12-27 13:26:11 +00:00
|
|
|
clist_set_type(set->val.t, &v);
|
2012-03-15 19:42:29 +00:00
|
|
|
else
|
|
|
|
v.type = T_PAIR;
|
2010-05-22 20:47:24 +00:00
|
|
|
|
2012-03-15 19:42:29 +00:00
|
|
|
int len = int_set_get_size(list);
|
|
|
|
u32 *l = int_set_get_data(list);
|
|
|
|
u32 tmp[len];
|
2010-05-22 20:47:24 +00:00
|
|
|
u32 *k = tmp;
|
2012-03-15 19:42:29 +00:00
|
|
|
u32 *end = l + len;
|
2010-05-22 20:47:24 +00:00
|
|
|
|
|
|
|
while (l < end) {
|
|
|
|
v.val.i = *l++;
|
2012-03-15 19:42:29 +00:00
|
|
|
/* pos && member(val, set) || !pos && !member(val, set), member() depends on tree */
|
2018-12-27 13:26:11 +00:00
|
|
|
if ((tree ? !!find_tree(set->val.t, &v) : int_set_contains(set->val.ad, v.val.i)) == pos)
|
2010-05-22 20:47:24 +00:00
|
|
|
*k++ = v.val.i;
|
|
|
|
}
|
|
|
|
|
2016-10-14 13:37:04 +00:00
|
|
|
uint nl = (k - tmp) * sizeof(u32);
|
2012-03-15 19:42:29 +00:00
|
|
|
if (nl == list->length)
|
|
|
|
return list;
|
2010-05-22 20:47:24 +00:00
|
|
|
|
2011-08-12 19:03:43 +00:00
|
|
|
struct adata *res = adata_empty(pool, nl);
|
|
|
|
memcpy(res->data, tmp, nl);
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2018-12-27 13:26:11 +00:00
|
|
|
static const struct adata *
|
|
|
|
eclist_filter(struct linpool *pool, const struct adata *list, const struct f_val *set, int pos)
|
2011-08-12 19:03:43 +00:00
|
|
|
{
|
|
|
|
if (!list)
|
|
|
|
return NULL;
|
|
|
|
|
2018-12-27 13:26:11 +00:00
|
|
|
int tree = (set->type == T_SET); /* 1 -> set is T_SET, 0 -> set is T_CLIST */
|
2011-08-12 19:03:43 +00:00
|
|
|
struct f_val v;
|
|
|
|
|
|
|
|
int len = int_set_get_size(list);
|
|
|
|
u32 *l = int_set_get_data(list);
|
|
|
|
u32 tmp[len];
|
|
|
|
u32 *k = tmp;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
v.type = T_EC;
|
|
|
|
for (i = 0; i < len; i += 2) {
|
|
|
|
v.val.ec = ec_get(l, i);
|
2012-03-15 19:42:29 +00:00
|
|
|
/* pos && member(val, set) || !pos && !member(val, set), member() depends on tree */
|
2018-12-27 13:26:11 +00:00
|
|
|
if ((tree ? !!find_tree(set->val.t, &v) : ec_set_contains(set->val.ad, v.val.ec)) == pos) {
|
2011-08-12 19:03:43 +00:00
|
|
|
*k++ = l[i];
|
|
|
|
*k++ = l[i+1];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-10-14 13:37:04 +00:00
|
|
|
uint nl = (k - tmp) * sizeof(u32);
|
2011-08-12 19:03:43 +00:00
|
|
|
if (nl == list->length)
|
|
|
|
return list;
|
|
|
|
|
|
|
|
struct adata *res = adata_empty(pool, nl);
|
2010-05-22 20:47:24 +00:00
|
|
|
memcpy(res->data, tmp, nl);
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2018-12-27 13:26:11 +00:00
|
|
|
static const struct adata *
|
|
|
|
lclist_filter(struct linpool *pool, const struct adata *list, const struct f_val *set, int pos)
|
2016-10-01 10:50:29 +00:00
|
|
|
{
|
|
|
|
if (!list)
|
|
|
|
return NULL;
|
|
|
|
|
2018-12-27 13:26:11 +00:00
|
|
|
int tree = (set->type == T_SET); /* 1 -> set is T_SET, 0 -> set is T_CLIST */
|
2016-10-01 10:50:29 +00:00
|
|
|
struct f_val v;
|
|
|
|
|
|
|
|
int len = int_set_get_size(list);
|
|
|
|
u32 *l = int_set_get_data(list);
|
|
|
|
u32 tmp[len];
|
|
|
|
u32 *k = tmp;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
v.type = T_LC;
|
|
|
|
for (i = 0; i < len; i += 3) {
|
|
|
|
v.val.lc = lc_get(l, i);
|
|
|
|
/* pos && member(val, set) || !pos && !member(val, set), member() depends on tree */
|
2018-12-27 13:26:11 +00:00
|
|
|
if ((tree ? !!find_tree(set->val.t, &v) : lc_set_contains(set->val.ad, v.val.lc)) == pos)
|
2016-10-01 10:50:29 +00:00
|
|
|
k = lc_copy(k, l+i);
|
|
|
|
}
|
|
|
|
|
2016-10-14 13:37:04 +00:00
|
|
|
uint nl = (k - tmp) * sizeof(u32);
|
2011-08-12 19:03:43 +00:00
|
|
|
if (nl == list->length)
|
|
|
|
return list;
|
|
|
|
|
|
|
|
struct adata *res = adata_empty(pool, nl);
|
2010-05-22 20:47:24 +00:00
|
|
|
memcpy(res->data, tmp, nl);
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2000-06-07 14:16:11 +00:00
|
|
|
/**
|
2000-06-07 14:45:55 +00:00
|
|
|
* val_in_range - implement |~| operator
|
2000-06-07 14:16:11 +00:00
|
|
|
* @v1: element
|
|
|
|
* @v2: set
|
|
|
|
*
|
2013-10-02 09:42:46 +00:00
|
|
|
* Checks if @v1 is element (|~| operator) of @v2.
|
2000-06-05 12:52:57 +00:00
|
|
|
*/
|
2004-06-05 09:58:23 +00:00
|
|
|
static int
|
2018-12-27 13:26:11 +00:00
|
|
|
val_in_range(const struct f_val *v1, const struct f_val *v2)
|
1999-09-29 14:24:58 +00:00
|
|
|
{
|
2018-12-27 13:26:11 +00:00
|
|
|
if ((v1->type == T_PATH) && (v2->type == T_PATH_MASK))
|
|
|
|
return as_path_match(v1->val.ad, v2->val.path_mask);
|
1999-11-03 22:23:01 +00:00
|
|
|
|
2018-12-27 13:26:11 +00:00
|
|
|
if ((v1->type == T_INT) && (v2->type == T_PATH))
|
|
|
|
return as_path_contains(v2->val.ad, v1->val.i, 1);
|
1999-11-03 22:23:01 +00:00
|
|
|
|
2018-12-27 13:26:11 +00:00
|
|
|
if (((v1->type == T_PAIR) || (v1->type == T_QUAD)) && (v2->type == T_CLIST))
|
|
|
|
return int_set_contains(v2->val.ad, v1->val.i);
|
2013-10-02 09:42:46 +00:00
|
|
|
/* IP->Quad implicit conversion */
|
2018-12-27 13:26:11 +00:00
|
|
|
if (val_is_ip4(v1) && (v2->type == T_CLIST))
|
|
|
|
return int_set_contains(v2->val.ad, ipa_to_u32(v1->val.ip));
|
2009-03-31 10:55:57 +00:00
|
|
|
|
2018-12-27 13:26:11 +00:00
|
|
|
if ((v1->type == T_EC) && (v2->type == T_ECLIST))
|
|
|
|
return ec_set_contains(v2->val.ad, v1->val.ec);
|
2010-05-22 20:47:24 +00:00
|
|
|
|
2018-12-27 13:26:11 +00:00
|
|
|
if ((v1->type == T_LC) && (v2->type == T_LCLIST))
|
|
|
|
return lc_set_contains(v2->val.ad, v1->val.lc);
|
2016-10-01 10:50:29 +00:00
|
|
|
|
2018-12-27 13:26:11 +00:00
|
|
|
if ((v1->type == T_STRING) && (v2->type == T_STRING))
|
|
|
|
return patmatch(v2->val.s, v1->val.s);
|
2011-08-12 19:03:43 +00:00
|
|
|
|
2018-12-27 13:26:11 +00:00
|
|
|
if ((v1->type == T_IP) && (v2->type == T_NET))
|
|
|
|
return ipa_in_netX(v1->val.ip, v2->val.net);
|
1999-09-29 14:24:58 +00:00
|
|
|
|
2018-12-27 13:26:11 +00:00
|
|
|
if ((v1->type == T_NET) && (v2->type == T_NET))
|
|
|
|
return net_in_netX(v1->val.net, v2->val.net);
|
2010-09-20 11:01:01 +00:00
|
|
|
|
2018-12-27 13:26:11 +00:00
|
|
|
if ((v1->type == T_NET) && (v2->type == T_PREFIX_SET))
|
|
|
|
return trie_match_net(v2->val.ti, v1->val.net);
|
2010-09-20 11:01:01 +00:00
|
|
|
|
2018-12-27 13:26:11 +00:00
|
|
|
if (v2->type != T_SET)
|
2013-10-02 09:42:46 +00:00
|
|
|
return CMP_ERROR;
|
2010-09-20 11:01:01 +00:00
|
|
|
|
2013-10-02 09:42:46 +00:00
|
|
|
/* With integrated Quad<->IP implicit conversion */
|
2018-12-27 13:26:11 +00:00
|
|
|
if ((v1->type == v2->val.t->from.type) ||
|
|
|
|
((v1->type == T_QUAD) && val_is_ip4(&(v2->val.t->from)) && val_is_ip4(&(v2->val.t->to))))
|
|
|
|
return !!find_tree(v2->val.t, v1);
|
2010-09-20 11:01:01 +00:00
|
|
|
|
2018-12-27 13:26:11 +00:00
|
|
|
if (v1->type == T_CLIST)
|
|
|
|
return clist_match_set(v1->val.ad, v2->val.t);
|
2010-09-20 11:01:01 +00:00
|
|
|
|
2018-12-27 13:26:11 +00:00
|
|
|
if (v1->type == T_ECLIST)
|
|
|
|
return eclist_match_set(v1->val.ad, v2->val.t);
|
2011-08-12 19:03:43 +00:00
|
|
|
|
2018-12-27 13:26:11 +00:00
|
|
|
if (v1->type == T_LCLIST)
|
|
|
|
return lclist_match_set(v1->val.ad, v2->val.t);
|
2016-10-01 10:50:29 +00:00
|
|
|
|
2018-12-27 13:26:11 +00:00
|
|
|
if (v1->type == T_PATH)
|
|
|
|
return as_path_match_set(v1->val.ad, v2->val.t);
|
2013-07-09 21:27:10 +00:00
|
|
|
|
1999-09-29 14:24:58 +00:00
|
|
|
return CMP_ERROR;
|
1999-04-12 19:58:18 +00:00
|
|
|
}
|
|
|
|
|
2000-06-05 17:13:36 +00:00
|
|
|
/*
|
2013-10-05 18:12:28 +00:00
|
|
|
* val_format - format filter value
|
2000-06-05 12:52:57 +00:00
|
|
|
*/
|
2013-07-25 11:15:32 +00:00
|
|
|
void
|
2018-12-27 13:26:11 +00:00
|
|
|
val_format(const struct f_val *v, buffer *buf)
|
1999-04-12 19:58:18 +00:00
|
|
|
{
|
2000-04-17 10:54:01 +00:00
|
|
|
char buf2[1024];
|
2018-12-27 13:26:11 +00:00
|
|
|
switch (v->type)
|
2013-10-05 18:12:28 +00:00
|
|
|
{
|
|
|
|
case T_VOID: buffer_puts(buf, "(void)"); return;
|
2018-12-27 13:26:11 +00:00
|
|
|
case T_BOOL: buffer_puts(buf, v->val.i ? "TRUE" : "FALSE"); return;
|
|
|
|
case T_INT: buffer_print(buf, "%u", v->val.i); return;
|
|
|
|
case T_STRING: buffer_print(buf, "%s", v->val.s); return;
|
|
|
|
case T_IP: buffer_print(buf, "%I", v->val.ip); return;
|
|
|
|
case T_NET: buffer_print(buf, "%N", v->val.net); return;
|
|
|
|
case T_PAIR: buffer_print(buf, "(%u,%u)", v->val.i >> 16, v->val.i & 0xffff); return;
|
|
|
|
case T_QUAD: buffer_print(buf, "%R", v->val.i); return;
|
|
|
|
case T_EC: ec_format(buf2, v->val.ec); buffer_print(buf, "%s", buf2); return;
|
|
|
|
case T_LC: lc_format(buf2, v->val.lc); buffer_print(buf, "%s", buf2); return;
|
|
|
|
case T_RD: rd_format(v->val.ec, buf2, 1024); buffer_print(buf, "%s", buf2); return;
|
|
|
|
case T_PREFIX_SET: trie_format(v->val.ti, buf); return;
|
|
|
|
case T_SET: tree_format(v->val.t, buf); return;
|
|
|
|
case T_ENUM: buffer_print(buf, "(enum %x)%u", v->type, v->val.i); return;
|
|
|
|
case T_PATH: as_path_format(v->val.ad, buf2, 1000); buffer_print(buf, "(path %s)", buf2); return;
|
|
|
|
case T_CLIST: int_set_format(v->val.ad, 1, -1, buf2, 1000); buffer_print(buf, "(clist %s)", buf2); return;
|
|
|
|
case T_ECLIST: ec_set_format(v->val.ad, -1, buf2, 1000); buffer_print(buf, "(eclist %s)", buf2); return;
|
|
|
|
case T_LCLIST: lc_set_format(v->val.ad, -1, buf2, 1000); buffer_print(buf, "(lclist %s)", buf2); return;
|
|
|
|
case T_PATH_MASK: pm_format(v->val.path_mask, buf); return;
|
|
|
|
default: buffer_print(buf, "[unknown type %x]", v->type); return;
|
1999-04-12 19:58:18 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
1999-04-19 18:41:56 +00:00
|
|
|
|
2018-02-27 14:39:39 +00:00
|
|
|
static inline void f_cache_eattrs(struct filter_state *fs)
|
2018-05-29 10:08:12 +00:00
|
|
|
{
|
2018-02-27 14:39:39 +00:00
|
|
|
fs->eattrs = &((*fs->rte)->attrs->eattrs);
|
2018-05-29 10:08:12 +00:00
|
|
|
}
|
|
|
|
|
2018-02-27 14:39:39 +00:00
|
|
|
static inline void f_rte_cow(struct filter_state *fs)
|
2012-01-02 23:42:25 +00:00
|
|
|
{
|
2018-02-27 14:39:39 +00:00
|
|
|
if (!((*fs->rte)->flags & REF_COW))
|
2018-05-29 10:08:12 +00:00
|
|
|
return;
|
|
|
|
|
2018-02-27 14:39:39 +00:00
|
|
|
*fs->rte = rte_cow(*fs->rte);
|
2012-01-02 23:42:25 +00:00
|
|
|
}
|
|
|
|
|
2000-06-05 17:13:36 +00:00
|
|
|
/*
|
2000-06-05 12:52:57 +00:00
|
|
|
* rta_cow - prepare rta for modification by filter
|
|
|
|
*/
|
2004-06-05 09:58:23 +00:00
|
|
|
static void
|
2018-02-27 14:39:39 +00:00
|
|
|
f_rta_cow(struct filter_state *fs)
|
2000-05-30 10:42:39 +00:00
|
|
|
{
|
2018-02-27 14:39:39 +00:00
|
|
|
if (!rta_is_cached((*fs->rte)->attrs))
|
2015-06-08 00:20:43 +00:00
|
|
|
return;
|
|
|
|
|
|
|
|
/* Prepare to modify rte */
|
2018-02-27 14:39:39 +00:00
|
|
|
f_rte_cow(fs);
|
2015-06-08 00:20:43 +00:00
|
|
|
|
|
|
|
/* Store old rta to free it later, it stores reference from rte_cow() */
|
2018-02-27 14:39:39 +00:00
|
|
|
fs->old_rta = (*fs->rte)->attrs;
|
2015-06-08 00:20:43 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Get shallow copy of rta. Fields eattrs and nexthops of rta are shared
|
2018-02-27 14:39:39 +00:00
|
|
|
* with fs->old_rta (they will be copied when the cached rta will be obtained
|
2015-06-08 00:20:43 +00:00
|
|
|
* at the end of f_run()), also the lock of hostentry is inherited (we
|
|
|
|
* suppose hostentry is not changed by filters).
|
|
|
|
*/
|
2018-02-27 14:39:39 +00:00
|
|
|
(*fs->rte)->attrs = rta_do_cow((*fs->rte)->attrs, fs->pool);
|
2018-05-29 10:08:12 +00:00
|
|
|
|
|
|
|
/* Re-cache the ea_list */
|
2018-02-27 14:39:39 +00:00
|
|
|
f_cache_eattrs(fs);
|
2000-05-30 10:42:39 +00:00
|
|
|
}
|
|
|
|
|
2016-11-16 11:15:43 +00:00
|
|
|
static char *
|
2018-12-27 13:26:11 +00:00
|
|
|
val_format_str(struct filter_state *fs, struct f_val *v) {
|
2016-11-16 11:15:43 +00:00
|
|
|
buffer b;
|
|
|
|
LOG_BUFFER_INIT(b);
|
|
|
|
val_format(v, &b);
|
2018-02-27 14:39:39 +00:00
|
|
|
return lp_strdup(fs->pool, b.start);
|
2016-11-16 11:15:43 +00:00
|
|
|
}
|
|
|
|
|
2014-10-02 09:41:34 +00:00
|
|
|
static struct tbf rl_runtime_err = TBF_DEFAULT_LOG_LIMITS;
|
2009-02-26 13:23:54 +00:00
|
|
|
|
2018-12-27 13:26:11 +00:00
|
|
|
static uint
|
2019-01-21 08:17:54 +00:00
|
|
|
inst_line_size(const struct f_inst *what_)
|
2018-12-27 13:26:11 +00:00
|
|
|
{
|
|
|
|
uint cnt = 0;
|
2019-01-21 08:17:54 +00:00
|
|
|
for ( ; what_; what_ = what_->next) {
|
|
|
|
switch (what_->fi_code) {
|
2018-12-27 13:26:11 +00:00
|
|
|
#include "filter/f-inst-line-size.c"
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return cnt;
|
|
|
|
}
|
|
|
|
|
|
|
|
#define INDENT (((const char *) f_dump_line_indent_str) + sizeof(f_dump_line_indent_str) - (indent) - 1)
|
|
|
|
static const char f_dump_line_indent_str[] = " ";
|
|
|
|
|
|
|
|
static char val_dump_buffer[1024];
|
|
|
|
|
|
|
|
static const char *
|
|
|
|
val_dump(const struct f_val *v) {
|
|
|
|
static buffer b = {
|
|
|
|
.start = val_dump_buffer,
|
|
|
|
.end = val_dump_buffer + 1024,
|
|
|
|
};
|
|
|
|
b.pos = b.start;
|
|
|
|
val_format(v, &b);
|
|
|
|
return val_dump_buffer;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void f_dump_line(const struct f_line *dest, int indent);
|
|
|
|
|
|
|
|
static void
|
|
|
|
f_dump_line_item(const struct f_line_item *item, int indent)
|
|
|
|
{
|
|
|
|
debug("%sInstruction %s at line %u\n", INDENT, f_instruction_name(item->fi_code), item->lineno);
|
|
|
|
switch (item->fi_code) {
|
|
|
|
#include "filter/f-inst-dump.c"
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
f_dump_line(const struct f_line *dest, int indent)
|
|
|
|
{
|
|
|
|
if (!dest) {
|
|
|
|
debug("%sNo filter line (NULL)\n", INDENT);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
debug("%sFilter line %p (len=%u)\n", INDENT, dest, dest->len);
|
|
|
|
for (uint i=0; i<dest->len; i++)
|
|
|
|
f_dump_line_item(&dest->items[i], indent+1);
|
|
|
|
debug("%sFilter line %p dump done\n", INDENT, dest);
|
|
|
|
#undef INDENT
|
|
|
|
}
|
|
|
|
|
|
|
|
static uint
|
2019-01-21 08:17:54 +00:00
|
|
|
postfixify(struct f_line *dest, const struct f_inst *what_, uint pos)
|
2018-12-27 13:26:11 +00:00
|
|
|
{
|
2019-01-21 08:17:54 +00:00
|
|
|
for ( ; what_; what_ = what_->next) {
|
|
|
|
switch (what_->fi_code) {
|
2018-12-27 13:26:11 +00:00
|
|
|
#include "filter/f-inst-postfixify.c"
|
|
|
|
}
|
|
|
|
pos++;
|
|
|
|
}
|
|
|
|
return pos;
|
|
|
|
}
|
|
|
|
|
|
|
|
struct f_line *
|
2019-01-21 08:17:54 +00:00
|
|
|
f_postfixify_concat(const struct f_inst * const inst[], uint count)
|
2018-12-27 13:26:11 +00:00
|
|
|
{
|
|
|
|
uint len = 0;
|
2019-01-21 08:17:54 +00:00
|
|
|
for (uint i=0; i<count; i++)
|
|
|
|
len += inst_line_size(inst[i]);
|
2018-12-27 13:26:11 +00:00
|
|
|
|
|
|
|
struct f_line *out = cfg_allocz(sizeof(struct f_line) + sizeof(struct f_line_item)*len);
|
|
|
|
|
2019-01-21 08:17:54 +00:00
|
|
|
for (uint i=0; i<count; i++)
|
|
|
|
out->len = postfixify(out, inst[i], out->len);
|
2018-12-27 13:26:11 +00:00
|
|
|
|
2019-02-06 13:41:39 +00:00
|
|
|
#if DEBUGGING
|
2018-12-27 13:26:11 +00:00
|
|
|
f_dump_line(out, 0);
|
2019-02-06 13:41:39 +00:00
|
|
|
#endif
|
2018-12-27 13:26:11 +00:00
|
|
|
return out;
|
|
|
|
}
|
|
|
|
|
2000-06-05 12:52:57 +00:00
|
|
|
/**
|
|
|
|
* interpret
|
2018-02-27 14:39:39 +00:00
|
|
|
* @fs: filter state
|
2000-06-07 12:29:08 +00:00
|
|
|
* @what: filter to interpret
|
2000-06-05 12:52:57 +00:00
|
|
|
*
|
2000-06-05 17:13:36 +00:00
|
|
|
* Interpret given tree of filter instructions. This is core function
|
2000-06-05 12:52:57 +00:00
|
|
|
* of filter system and does all the hard work.
|
2000-06-07 13:54:06 +00:00
|
|
|
*
|
|
|
|
* Each instruction has 4 fields: code (which is instruction code),
|
|
|
|
* aux (which is extension to instruction code, typically type),
|
|
|
|
* arg1 and arg2 - arguments. Depending on instruction, arguments
|
2015-05-09 16:50:15 +00:00
|
|
|
* are either integers, or pointers to instruction trees. Common
|
2000-06-07 13:54:06 +00:00
|
|
|
* instructions like +, that have two expressions as arguments use
|
|
|
|
* TWOARGS macro to get both of them evaluated.
|
2000-06-05 12:52:57 +00:00
|
|
|
*/
|
2018-12-17 12:51:11 +00:00
|
|
|
static enum filter_return
|
2018-12-27 13:26:11 +00:00
|
|
|
interpret(struct filter_state *fs, const struct f_line *line, struct f_val *val)
|
1999-04-07 12:11:08 +00:00
|
|
|
{
|
2018-12-27 13:26:11 +00:00
|
|
|
struct f_val_stack vstk;
|
|
|
|
vstk.cnt = 0;
|
1999-04-07 12:11:08 +00:00
|
|
|
|
2018-12-27 13:26:11 +00:00
|
|
|
struct f_exec_stack estk;
|
|
|
|
estk.cnt = 1;
|
|
|
|
estk.item[0].line = line;
|
|
|
|
estk.item[0].pos = 0;
|
2018-12-17 14:00:01 +00:00
|
|
|
|
2018-12-27 13:26:11 +00:00
|
|
|
#define curline estk.item[estk.cnt-1]
|
|
|
|
|
|
|
|
while (estk.cnt > 0) {
|
|
|
|
while (curline.pos < curline.line->len) {
|
|
|
|
const struct f_line_item *what = &(curline.line->items[curline.pos++]);
|
2018-12-17 12:51:11 +00:00
|
|
|
|
2018-12-27 13:26:11 +00:00
|
|
|
|
|
|
|
switch (what->fi_code) {
|
|
|
|
#define res vstk.val[vstk.cnt]
|
|
|
|
#define v1 vstk.val[vstk.cnt]
|
|
|
|
#define v2 vstk.val[vstk.cnt + 1]
|
|
|
|
#define v3 vstk.val[vstk.cnt + 2]
|
2018-12-17 12:51:11 +00:00
|
|
|
|
2018-12-17 11:48:33 +00:00
|
|
|
#define runtime(fmt, ...) do { \
|
2018-12-18 16:10:05 +00:00
|
|
|
if (!(fs->flags & FF_SILENT)) \
|
|
|
|
log_rl(&rl_runtime_err, L_ERR "filters, line %d: " fmt, what->lineno, ##__VA_ARGS__); \
|
|
|
|
return F_ERROR; \
|
|
|
|
} while(0)
|
2018-12-17 11:48:33 +00:00
|
|
|
|
2018-12-18 16:10:05 +00:00
|
|
|
#define ACCESS_RTE do { if (!fs->rte) runtime("No route to access"); } while (0)
|
|
|
|
#define ACCESS_EATTRS do { if (!fs->eattrs) f_cache_eattrs(fs); } while (0)
|
2018-12-17 11:48:33 +00:00
|
|
|
|
2018-12-20 15:25:54 +00:00
|
|
|
#include "filter/f-inst-interpret.c"
|
2018-12-17 12:51:11 +00:00
|
|
|
#undef res
|
2018-12-27 13:26:11 +00:00
|
|
|
#undef v1
|
|
|
|
#undef v2
|
|
|
|
#undef v3
|
2018-12-17 11:48:33 +00:00
|
|
|
#undef runtime
|
|
|
|
#undef ACCESS_RTE
|
|
|
|
#undef ACCESS_EATTRS
|
2018-12-27 13:26:11 +00:00
|
|
|
}
|
2018-12-18 16:10:05 +00:00
|
|
|
}
|
2018-12-27 13:26:11 +00:00
|
|
|
estk.cnt--;
|
2018-12-18 16:10:05 +00:00
|
|
|
}
|
1999-04-07 12:11:08 +00:00
|
|
|
|
2018-12-27 13:26:11 +00:00
|
|
|
switch (vstk.cnt) {
|
|
|
|
case 0:
|
|
|
|
if (val) {
|
|
|
|
log_rl(&rl_runtime_err, L_ERR "filters: No value left on stack");
|
|
|
|
return F_ERROR;
|
|
|
|
}
|
|
|
|
return F_NOP;
|
|
|
|
case 1:
|
|
|
|
if (val) {
|
|
|
|
*val = vstk.val[0];
|
|
|
|
return F_NOP;
|
|
|
|
}
|
|
|
|
/* fallthrough */
|
|
|
|
default:
|
|
|
|
log_rl(&rl_runtime_err, L_ERR "Too many items left on stack: %u", vstk.cnt);
|
|
|
|
return F_ERROR;
|
|
|
|
}
|
|
|
|
}
|
2018-04-30 14:06:53 +00:00
|
|
|
|
2000-01-31 17:44:22 +00:00
|
|
|
|
2000-06-05 17:13:36 +00:00
|
|
|
/*
|
2018-12-27 13:26:11 +00:00
|
|
|
* f_same - function that does real comparing of instruction trees, you should call filter_same from outside
|
2000-06-05 12:52:57 +00:00
|
|
|
*/
|
2000-01-31 17:44:22 +00:00
|
|
|
int
|
2018-12-27 13:26:11 +00:00
|
|
|
f_same(const struct f_line *fl1, const struct f_line *fl2)
|
2000-01-31 17:44:22 +00:00
|
|
|
{
|
2018-12-27 13:26:11 +00:00
|
|
|
if ((!fl1) && (!fl2))
|
2000-03-02 22:23:18 +00:00
|
|
|
return 1;
|
2018-12-27 13:26:11 +00:00
|
|
|
if ((!fl1) || (!fl2))
|
2000-01-31 17:44:22 +00:00
|
|
|
return 0;
|
2018-12-27 13:26:11 +00:00
|
|
|
if (fl1->len != fl2->len)
|
2000-01-31 17:44:22 +00:00
|
|
|
return 0;
|
2018-12-27 13:26:11 +00:00
|
|
|
for (uint i=0; i<fl1->len; i++) {
|
|
|
|
#define f1 (&(fl1->items[i]))
|
|
|
|
#define f2 (&(fl2->items[i]))
|
|
|
|
if (f1->fi_code != f2->fi_code)
|
|
|
|
return 0;
|
|
|
|
if (f1->flags != f2->flags)
|
|
|
|
return 0;
|
2000-01-31 17:44:22 +00:00
|
|
|
|
2018-12-27 13:26:11 +00:00
|
|
|
switch(f1->fi_code) {
|
|
|
|
#include "filter/f-inst-same.c"
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
#if 0
|
2018-03-13 11:08:37 +00:00
|
|
|
case FI_ADD: /* fall through */
|
2017-10-19 10:39:44 +00:00
|
|
|
case FI_SUBTRACT:
|
|
|
|
case FI_MULTIPLY:
|
|
|
|
case FI_DIVIDE:
|
|
|
|
case FI_OR:
|
|
|
|
case FI_AND:
|
|
|
|
case FI_PAIR_CONSTRUCT:
|
|
|
|
case FI_EC_CONSTRUCT:
|
|
|
|
case FI_NEQ:
|
|
|
|
case FI_EQ:
|
|
|
|
case FI_LT:
|
|
|
|
case FI_LTE: TWOARGS; break;
|
|
|
|
|
2018-12-20 13:55:40 +00:00
|
|
|
case FI_PATHMASK_CONSTRUCT: if (!pm_same(f1->a[0].p, f2->a[0].p)) return 0; break;
|
2018-02-28 15:57:50 +00:00
|
|
|
|
2017-10-19 10:39:44 +00:00
|
|
|
case FI_NOT: ONEARG; break;
|
|
|
|
case FI_NOT_MATCH:
|
|
|
|
case FI_MATCH: TWOARGS; break;
|
|
|
|
case FI_DEFINED: ONEARG; break;
|
2018-03-13 15:51:04 +00:00
|
|
|
case FI_TYPE: ONEARG; break;
|
2017-10-19 10:39:44 +00:00
|
|
|
|
|
|
|
case FI_LC_CONSTRUCT:
|
2018-04-30 11:29:05 +00:00
|
|
|
THREEARGS;
|
2016-10-01 10:50:29 +00:00
|
|
|
break;
|
|
|
|
|
2017-10-19 10:39:44 +00:00
|
|
|
case FI_SET:
|
2018-04-30 14:06:53 +00:00
|
|
|
ARG(2);
|
2000-01-31 17:44:22 +00:00
|
|
|
{
|
|
|
|
struct symbol *s1, *s2;
|
2018-12-20 13:55:40 +00:00
|
|
|
s1 = f1->a[0].p;
|
|
|
|
s2 = f2->a[0].p;
|
2000-01-31 17:44:22 +00:00
|
|
|
if (strcmp(s1->name, s2->name))
|
|
|
|
return 0;
|
|
|
|
if (s1->class != s2->class)
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
2017-10-19 10:39:44 +00:00
|
|
|
case FI_CONSTANT:
|
2009-03-31 10:55:57 +00:00
|
|
|
switch (f1->aux) {
|
|
|
|
|
|
|
|
case T_PREFIX_SET:
|
2018-12-20 13:55:40 +00:00
|
|
|
if (!trie_same(f1->a[1].p, f2->a[1].p))
|
2009-03-31 10:55:57 +00:00
|
|
|
return 0;
|
2009-05-29 21:08:28 +00:00
|
|
|
break;
|
2009-03-31 10:55:57 +00:00
|
|
|
|
|
|
|
case T_SET:
|
2018-12-20 13:55:40 +00:00
|
|
|
if (!same_tree(f1->a[1].p, f2->a[1].p))
|
2000-06-08 16:57:41 +00:00
|
|
|
return 0;
|
2009-05-29 21:08:28 +00:00
|
|
|
break;
|
2009-03-31 10:55:57 +00:00
|
|
|
|
2000-06-08 16:57:41 +00:00
|
|
|
case T_STRING:
|
2018-12-20 13:55:40 +00:00
|
|
|
if (strcmp(f1->a[1].p, f2->a[1].p))
|
2000-06-08 16:57:41 +00:00
|
|
|
return 0;
|
|
|
|
break;
|
2009-03-31 10:55:57 +00:00
|
|
|
|
2000-06-08 16:57:41 +00:00
|
|
|
default:
|
|
|
|
A2_SAME;
|
|
|
|
}
|
|
|
|
break;
|
2013-09-10 10:58:24 +00:00
|
|
|
|
2017-10-19 10:39:44 +00:00
|
|
|
case FI_CONSTANT_INDIRECT:
|
2018-12-20 13:55:40 +00:00
|
|
|
if (!val_same(* (struct f_val *) f1->a[0].p, * (struct f_val *) f2->a[0].p))
|
2000-01-31 17:44:22 +00:00
|
|
|
return 0;
|
|
|
|
break;
|
2013-10-02 12:41:37 +00:00
|
|
|
|
2017-10-19 10:39:44 +00:00
|
|
|
case FI_VARIABLE:
|
2018-12-20 13:55:40 +00:00
|
|
|
if (strcmp((char *) f1->a[1].p, (char *) f2->a[1].p))
|
2009-05-29 21:08:28 +00:00
|
|
|
return 0;
|
|
|
|
break;
|
2017-10-19 10:39:44 +00:00
|
|
|
case FI_PRINT: case FI_LENGTH: ONEARG; break;
|
2018-12-20 13:34:35 +00:00
|
|
|
case FI_CONDITION: THREEARGS; break;
|
2017-10-19 10:39:44 +00:00
|
|
|
case FI_NOP: case FI_EMPTY: break;
|
|
|
|
case FI_PRINT_AND_DIE: ONEARG; A2_SAME; break;
|
|
|
|
case FI_PREF_GET:
|
|
|
|
case FI_RTA_GET: A2_SAME; break;
|
|
|
|
case FI_EA_GET: A2_SAME; break;
|
|
|
|
case FI_PREF_SET:
|
|
|
|
case FI_RTA_SET:
|
|
|
|
case FI_EA_SET: ONEARG; A2_SAME; break;
|
|
|
|
|
|
|
|
case FI_RETURN: ONEARG; break;
|
2018-04-27 12:38:41 +00:00
|
|
|
case FI_ROA_MAXLEN: ONEARG; break;
|
|
|
|
case FI_ROA_ASN: ONEARG; break;
|
2018-05-16 09:19:29 +00:00
|
|
|
case FI_SADR_SRC: ONEARG; break;
|
2017-10-19 10:39:44 +00:00
|
|
|
case FI_IP: ONEARG; break;
|
2018-04-27 12:38:41 +00:00
|
|
|
case FI_IS_V4: ONEARG; break;
|
2018-03-13 15:51:04 +00:00
|
|
|
case FI_ROUTE_DISTINGUISHER: ONEARG; break;
|
2017-10-19 10:39:44 +00:00
|
|
|
case FI_CALL: /* Call rewriting trickery to avoid exponential behaviour */
|
2015-05-09 16:50:15 +00:00
|
|
|
ONEARG;
|
2018-12-20 13:55:40 +00:00
|
|
|
if (!i_same(f1->a[1].p, f2->a[1].p))
|
2015-05-09 16:50:15 +00:00
|
|
|
return 0;
|
2018-12-20 13:55:40 +00:00
|
|
|
f2->a[1].p = f1->a[1].p;
|
2000-03-02 22:23:18 +00:00
|
|
|
break;
|
2017-10-19 10:39:44 +00:00
|
|
|
case FI_CLEAR_LOCAL_VARS: break; /* internal instruction */
|
2018-12-20 13:55:40 +00:00
|
|
|
case FI_SWITCH: ONEARG; if (!same_tree(f1->a[1].p, f2->a[1].p)) return 0; break;
|
2017-10-19 10:39:44 +00:00
|
|
|
case FI_IP_MASK: TWOARGS; break;
|
|
|
|
case FI_PATH_PREPEND: TWOARGS; break;
|
|
|
|
case FI_CLIST_ADD_DEL: TWOARGS; break;
|
|
|
|
case FI_AS_PATH_FIRST:
|
|
|
|
case FI_AS_PATH_LAST:
|
|
|
|
case FI_AS_PATH_LAST_NAG: ONEARG; break;
|
|
|
|
case FI_ROA_CHECK:
|
2012-03-18 16:32:30 +00:00
|
|
|
TWOARGS;
|
2018-12-20 15:07:59 +00:00
|
|
|
/* FIXME: ROA check results may change anyway */
|
|
|
|
if (strcmp(f1->a[2].rtc->name,
|
|
|
|
f2->a[2].rtc->name))
|
2012-03-18 16:32:30 +00:00
|
|
|
return 0;
|
|
|
|
break;
|
2018-04-27 12:38:41 +00:00
|
|
|
case FI_FORMAT: ONEARG; break;
|
|
|
|
case FI_ASSERT: ONEARG; break;
|
2000-01-31 17:44:22 +00:00
|
|
|
default:
|
2017-10-19 10:39:44 +00:00
|
|
|
bug( "Unknown instruction %d in same (%c)", f1->fi_code, f1->fi_code & 0xff);
|
2018-12-27 13:26:11 +00:00
|
|
|
#endif
|
2000-01-31 17:44:22 +00:00
|
|
|
|
2000-04-28 09:48:28 +00:00
|
|
|
/**
|
2012-01-02 23:42:25 +00:00
|
|
|
* f_run - run a filter for a route
|
|
|
|
* @filter: filter to run
|
|
|
|
* @rte: route being filtered, may be modified
|
2000-04-28 09:48:28 +00:00
|
|
|
* @tmp_pool: all filter allocations go from this pool
|
2000-06-05 17:13:36 +00:00
|
|
|
* @flags: flags
|
2012-01-02 23:42:25 +00:00
|
|
|
*
|
|
|
|
* If filter needs to modify the route, there are several
|
|
|
|
* posibilities. @rte might be read-only (with REF_COW flag), in that
|
|
|
|
* case rw copy is obtained by rte_cow() and @rte is replaced. If
|
|
|
|
* @rte is originally rw, it may be directly modified (and it is never
|
|
|
|
* copied).
|
|
|
|
*
|
|
|
|
* The returned rte may reuse the (possibly cached, cloned) rta, or
|
|
|
|
* (if rta was modificied) contains a modified uncached rta, which
|
|
|
|
* uses parts allocated from @tmp_pool and parts shared from original
|
|
|
|
* rta. There is one exception - if @rte is rw but contains a cached
|
|
|
|
* rta and that is modified, rta in returned rte is also cached.
|
|
|
|
*
|
|
|
|
* Ownership of cached rtas is consistent with rte, i.e.
|
|
|
|
* if a new rte is returned, it has its own clone of cached rta
|
|
|
|
* (and cached rta of read-only source rte is intact), if rte is
|
|
|
|
* modified in place, old cached rta is possibly freed.
|
2000-04-28 09:48:28 +00:00
|
|
|
*/
|
2018-12-17 12:51:11 +00:00
|
|
|
enum filter_return
|
2018-12-27 13:26:11 +00:00
|
|
|
f_run(const struct filter *filter, struct rte **rte, struct linpool *tmp_pool, int flags)
|
1999-04-07 12:11:08 +00:00
|
|
|
{
|
2013-02-08 22:58:27 +00:00
|
|
|
if (filter == FILTER_ACCEPT)
|
|
|
|
return F_ACCEPT;
|
|
|
|
|
|
|
|
if (filter == FILTER_REJECT)
|
|
|
|
return F_REJECT;
|
|
|
|
|
2012-01-02 23:42:25 +00:00
|
|
|
int rte_cow = ((*rte)->flags & REF_COW);
|
2000-03-12 21:01:38 +00:00
|
|
|
DBG( "Running filter `%s'...", filter->name );
|
1999-04-07 12:11:08 +00:00
|
|
|
|
2018-02-27 14:39:39 +00:00
|
|
|
struct filter_state fs = {
|
|
|
|
.rte = rte,
|
|
|
|
.pool = tmp_pool,
|
|
|
|
.flags = flags,
|
|
|
|
};
|
2010-09-20 11:01:01 +00:00
|
|
|
|
2018-02-27 14:39:39 +00:00
|
|
|
LOG_BUFFER_INIT(fs.buf);
|
2013-10-05 18:12:28 +00:00
|
|
|
|
2018-12-27 13:26:11 +00:00
|
|
|
enum filter_return fret = interpret(&fs, filter->root, NULL);
|
2012-01-02 23:42:25 +00:00
|
|
|
|
2018-02-27 14:39:39 +00:00
|
|
|
if (fs.old_rta) {
|
2012-01-02 23:42:25 +00:00
|
|
|
/*
|
2018-02-27 14:39:39 +00:00
|
|
|
* Cached rta was modified and fs->rte contains now an uncached one,
|
2012-01-02 23:42:25 +00:00
|
|
|
* sharing some part with the cached one. The cached rta should
|
2018-02-27 14:39:39 +00:00
|
|
|
* be freed (if rte was originally COW, fs->old_rta is a clone
|
2012-01-02 23:42:25 +00:00
|
|
|
* obtained during rte_cow()).
|
|
|
|
*
|
|
|
|
* This also implements the exception mentioned in f_run()
|
|
|
|
* description. The reason for this is that rta reuses parts of
|
2018-02-27 14:39:39 +00:00
|
|
|
* fs->old_rta, and these may be freed during rta_free(fs->old_rta).
|
2012-01-02 23:42:25 +00:00
|
|
|
* This is not the problem if rte was COW, because original rte
|
|
|
|
* also holds the same rta.
|
|
|
|
*/
|
|
|
|
if (!rte_cow)
|
2018-02-27 14:39:39 +00:00
|
|
|
(*fs.rte)->attrs = rta_lookup((*fs.rte)->attrs);
|
2012-01-02 23:42:25 +00:00
|
|
|
|
2018-02-27 14:39:39 +00:00
|
|
|
rta_free(fs.old_rta);
|
2012-01-02 23:42:25 +00:00
|
|
|
}
|
|
|
|
|
2010-09-20 11:01:01 +00:00
|
|
|
|
2018-12-17 12:51:11 +00:00
|
|
|
if (fret < F_ACCEPT) {
|
2018-02-27 14:39:39 +00:00
|
|
|
if (!(fs.flags & FF_SILENT))
|
2018-01-16 15:20:01 +00:00
|
|
|
log_rl(&rl_runtime_err, L_ERR "Filter %s did not return accept nor reject. Make up your mind", filter->name);
|
1999-04-07 12:11:08 +00:00
|
|
|
return F_ERROR;
|
2000-05-31 21:50:13 +00:00
|
|
|
}
|
2013-11-23 23:17:02 +00:00
|
|
|
DBG( "done (%u)\n", res.val.i );
|
2018-12-17 12:51:11 +00:00
|
|
|
return fret;
|
1999-04-07 12:11:08 +00:00
|
|
|
}
|
|
|
|
|
2015-07-20 09:12:02 +00:00
|
|
|
/* TODO: perhaps we could integrate f_eval(), f_eval_rte() and f_run() */
|
|
|
|
|
2018-12-17 12:51:11 +00:00
|
|
|
enum filter_return
|
2018-12-27 13:26:11 +00:00
|
|
|
f_eval_rte(const struct f_line *expr, struct rte **rte, struct linpool *tmp_pool)
|
2015-07-20 09:12:02 +00:00
|
|
|
{
|
|
|
|
|
2018-02-27 14:39:39 +00:00
|
|
|
struct filter_state fs = {
|
|
|
|
.rte = rte,
|
|
|
|
.pool = tmp_pool,
|
|
|
|
};
|
2015-07-20 09:12:02 +00:00
|
|
|
|
2018-02-27 14:39:39 +00:00
|
|
|
LOG_BUFFER_INIT(fs.buf);
|
2015-07-20 09:12:02 +00:00
|
|
|
|
|
|
|
/* Note that in this function we assume that rte->attrs is private / uncached */
|
2018-12-27 13:26:11 +00:00
|
|
|
return interpret(&fs, expr, NULL);
|
2015-07-20 09:12:02 +00:00
|
|
|
}
|
|
|
|
|
2018-12-17 12:51:11 +00:00
|
|
|
enum filter_return
|
2018-12-27 13:26:11 +00:00
|
|
|
f_eval(const struct f_line *expr, struct linpool *tmp_pool, struct f_val *pres)
|
2000-05-15 10:49:38 +00:00
|
|
|
{
|
2018-02-27 14:39:39 +00:00
|
|
|
struct filter_state fs = {
|
|
|
|
.pool = tmp_pool,
|
|
|
|
};
|
2010-09-20 11:01:01 +00:00
|
|
|
|
2018-02-27 14:39:39 +00:00
|
|
|
LOG_BUFFER_INIT(fs.buf);
|
2013-10-05 18:12:28 +00:00
|
|
|
|
2018-12-27 13:26:11 +00:00
|
|
|
enum filter_return fret = interpret(&fs, expr, pres);
|
2018-12-17 14:00:01 +00:00
|
|
|
return fret;
|
2013-07-25 11:15:32 +00:00
|
|
|
}
|
2010-09-20 11:01:01 +00:00
|
|
|
|
2013-11-23 23:17:02 +00:00
|
|
|
uint
|
2018-12-27 13:26:11 +00:00
|
|
|
f_eval_int(const struct f_line *expr)
|
2013-07-25 11:15:32 +00:00
|
|
|
{
|
|
|
|
/* Called independently in parse-time to eval expressions */
|
2018-12-17 14:00:01 +00:00
|
|
|
struct filter_state fs = {
|
|
|
|
.pool = cfg_mem,
|
|
|
|
};
|
|
|
|
|
2018-12-27 13:26:11 +00:00
|
|
|
struct f_val val;
|
|
|
|
|
2018-12-17 14:00:01 +00:00
|
|
|
LOG_BUFFER_INIT(fs.buf);
|
|
|
|
|
2018-12-27 13:26:11 +00:00
|
|
|
if (interpret(&fs, expr, &val) > F_RETURN)
|
2018-12-17 12:51:11 +00:00
|
|
|
cf_error("Runtime error while evaluating expression");
|
2010-09-20 11:01:01 +00:00
|
|
|
|
2018-12-27 13:26:11 +00:00
|
|
|
if (val.type != T_INT)
|
2000-05-16 22:37:53 +00:00
|
|
|
cf_error("Integer expression expected");
|
2013-07-25 11:15:32 +00:00
|
|
|
|
2018-12-27 13:26:11 +00:00
|
|
|
return val.val.i;
|
2000-05-16 22:37:53 +00:00
|
|
|
}
|
2000-05-15 10:49:38 +00:00
|
|
|
|
2000-04-28 09:48:28 +00:00
|
|
|
/**
|
|
|
|
* filter_same - compare two filters
|
|
|
|
* @new: first filter to be compared
|
|
|
|
* @old: second filter to be compared, notice that this filter is
|
|
|
|
* damaged while comparing.
|
|
|
|
*
|
|
|
|
* Returns 1 in case filters are same, otherwise 0. If there are
|
|
|
|
* underlying bugs, it will rather say 0 on same filters than say
|
|
|
|
* 1 on different.
|
|
|
|
*/
|
2000-01-16 17:49:32 +00:00
|
|
|
int
|
|
|
|
filter_same(struct filter *new, struct filter *old)
|
|
|
|
{
|
2000-03-12 22:40:07 +00:00
|
|
|
if (old == new) /* Handle FILTER_ACCEPT and FILTER_REJECT */
|
|
|
|
return 1;
|
|
|
|
if (old == FILTER_ACCEPT || old == FILTER_REJECT ||
|
|
|
|
new == FILTER_ACCEPT || new == FILTER_REJECT)
|
|
|
|
return 0;
|
2018-12-27 13:26:11 +00:00
|
|
|
return f_same(new->root, old->root);
|
2000-01-16 17:49:32 +00:00
|
|
|
}
|