mirror of
https://gitlab.nic.cz/labs/bird.git
synced 2024-11-08 12:18:42 +00:00
Merge remote-tracking branch 'origin/master' into backport
This commit is contained in:
commit
2e5bfeb73a
@ -574,6 +574,8 @@ check_eof(void)
|
|||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static inline void cf_swap_soft_scope(void);
|
||||||
|
|
||||||
static struct symbol *
|
static struct symbol *
|
||||||
cf_new_symbol(const byte *c)
|
cf_new_symbol(const byte *c)
|
||||||
{
|
{
|
||||||
@ -583,6 +585,8 @@ cf_new_symbol(const byte *c)
|
|||||||
if (l > SYM_MAX_LEN)
|
if (l > SYM_MAX_LEN)
|
||||||
cf_error("Symbol too long");
|
cf_error("Symbol too long");
|
||||||
|
|
||||||
|
cf_swap_soft_scope();
|
||||||
|
|
||||||
s = cfg_allocz(sizeof(struct symbol) + l + 1);
|
s = cfg_allocz(sizeof(struct symbol) + l + 1);
|
||||||
*s = (struct symbol) { .scope = conf_this_scope, .class = SYM_VOID, };
|
*s = (struct symbol) { .scope = conf_this_scope, .class = SYM_VOID, };
|
||||||
strcpy(s->name, c);
|
strcpy(s->name, c);
|
||||||
@ -656,8 +660,8 @@ cf_localize_symbol(struct symbol *sym)
|
|||||||
return sym;
|
return sym;
|
||||||
|
|
||||||
/* If the scope is the current, it is already defined in this scope. */
|
/* If the scope is the current, it is already defined in this scope. */
|
||||||
if (sym->scope == conf_this_scope)
|
if (cf_symbol_is_local(sym))
|
||||||
cf_error("Symbol already defined");
|
cf_error("Symbol '%s' already defined", sym->name);
|
||||||
|
|
||||||
/* Not allocated here yet, doing it now. */
|
/* Not allocated here yet, doing it now. */
|
||||||
return cf_new_symbol(sym->name);
|
return cf_new_symbol(sym->name);
|
||||||
@ -787,12 +791,60 @@ cf_push_scope(struct symbol *sym)
|
|||||||
void
|
void
|
||||||
cf_pop_scope(void)
|
cf_pop_scope(void)
|
||||||
{
|
{
|
||||||
|
ASSERT(!conf_this_scope->soft_scopes);
|
||||||
|
|
||||||
conf_this_scope->active = 0;
|
conf_this_scope->active = 0;
|
||||||
conf_this_scope = conf_this_scope->next;
|
conf_this_scope = conf_this_scope->next;
|
||||||
|
|
||||||
ASSERT(conf_this_scope);
|
ASSERT(conf_this_scope);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* cf_push_soft_scope - enter new soft scope
|
||||||
|
*
|
||||||
|
* If we want to enter a new anonymous scope that most likely will not contain
|
||||||
|
* any symbols, we can use cf_push_soft_scope() insteas of cf_push_scope().
|
||||||
|
* Such scope will be converted to a regular scope on first use.
|
||||||
|
*/
|
||||||
|
void
|
||||||
|
cf_push_soft_scope(void)
|
||||||
|
{
|
||||||
|
if (conf_this_scope->soft_scopes < 0xfe)
|
||||||
|
conf_this_scope->soft_scopes++;
|
||||||
|
else
|
||||||
|
cf_push_scope(NULL);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* cf_pop_soft_scope - leave a soft scope
|
||||||
|
*
|
||||||
|
* Leave a soft scope entered by cf_push_soft_scope().
|
||||||
|
*/
|
||||||
|
void
|
||||||
|
cf_pop_soft_scope(void)
|
||||||
|
{
|
||||||
|
if (conf_this_scope->soft_scopes)
|
||||||
|
conf_this_scope->soft_scopes--;
|
||||||
|
else
|
||||||
|
cf_pop_scope();
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* cf_swap_soft_scope - convert soft scope to regular scope
|
||||||
|
*
|
||||||
|
* Soft scopes cannot hold symbols, so they must be converted to regular scopes
|
||||||
|
* on first use. It is done automatically by cf_new_symbol().
|
||||||
|
*/
|
||||||
|
static inline void
|
||||||
|
cf_swap_soft_scope(void)
|
||||||
|
{
|
||||||
|
if (conf_this_scope->soft_scopes)
|
||||||
|
{
|
||||||
|
conf_this_scope->soft_scopes--;
|
||||||
|
cf_push_scope(NULL);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* cf_symbol_class_name - get name of a symbol class
|
* cf_symbol_class_name - get name of a symbol class
|
||||||
* @sym: symbol
|
* @sym: symbol
|
||||||
|
@ -134,7 +134,8 @@ struct sym_scope {
|
|||||||
struct sym_scope *next; /* Next on scope stack */
|
struct sym_scope *next; /* Next on scope stack */
|
||||||
struct symbol *name; /* Name of this scope */
|
struct symbol *name; /* Name of this scope */
|
||||||
uint slots; /* Variable slots */
|
uint slots; /* Variable slots */
|
||||||
int active; /* Currently entered */
|
byte active; /* Currently entered */
|
||||||
|
byte soft_scopes; /* Number of soft scopes above */
|
||||||
};
|
};
|
||||||
|
|
||||||
struct bytestring {
|
struct bytestring {
|
||||||
@ -191,6 +192,9 @@ struct symbol *cf_get_symbol(const byte *c);
|
|||||||
struct symbol *cf_default_name(char *template, int *counter);
|
struct symbol *cf_default_name(char *template, int *counter);
|
||||||
struct symbol *cf_localize_symbol(struct symbol *sym);
|
struct symbol *cf_localize_symbol(struct symbol *sym);
|
||||||
|
|
||||||
|
static inline int cf_symbol_is_local(struct symbol *sym)
|
||||||
|
{ return (sym->scope == conf_this_scope) && !conf_this_scope->soft_scopes; }
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* cf_define_symbol - define meaning of a symbol
|
* cf_define_symbol - define meaning of a symbol
|
||||||
* @sym: symbol to be defined
|
* @sym: symbol to be defined
|
||||||
@ -214,6 +218,9 @@ struct symbol *cf_localize_symbol(struct symbol *sym);
|
|||||||
|
|
||||||
void cf_push_scope(struct symbol *);
|
void cf_push_scope(struct symbol *);
|
||||||
void cf_pop_scope(void);
|
void cf_pop_scope(void);
|
||||||
|
void cf_push_soft_scope(void);
|
||||||
|
void cf_pop_soft_scope(void);
|
||||||
|
|
||||||
char *cf_symbol_class_name(struct symbol *sym);
|
char *cf_symbol_class_name(struct symbol *sym);
|
||||||
|
|
||||||
/* Parser */
|
/* Parser */
|
||||||
|
@ -75,6 +75,7 @@ CF_DECLS
|
|||||||
struct f_static_attr fsa;
|
struct f_static_attr fsa;
|
||||||
struct f_lval flv;
|
struct f_lval flv;
|
||||||
struct f_line *fl;
|
struct f_line *fl;
|
||||||
|
struct f_arg *fa;
|
||||||
const struct filter *f;
|
const struct filter *f;
|
||||||
struct f_tree *e;
|
struct f_tree *e;
|
||||||
struct f_trie *trie;
|
struct f_trie *trie;
|
||||||
@ -152,14 +153,14 @@ conf: definition ;
|
|||||||
definition:
|
definition:
|
||||||
DEFINE symbol '=' term ';' {
|
DEFINE symbol '=' term ';' {
|
||||||
struct f_val *val = cfg_allocz(sizeof(struct f_val));
|
struct f_val *val = cfg_allocz(sizeof(struct f_val));
|
||||||
if (f_eval(f_linearize($4), cfg_mem, val) > F_RETURN) cf_error("Runtime error");
|
if (f_eval(f_linearize($4, 1), cfg_mem, val) > F_RETURN) cf_error("Runtime error");
|
||||||
cf_define_symbol($2, SYM_CONSTANT | val->type, val, val);
|
cf_define_symbol($2, SYM_CONSTANT | val->type, val, val);
|
||||||
}
|
}
|
||||||
;
|
;
|
||||||
|
|
||||||
expr:
|
expr:
|
||||||
NUM
|
NUM
|
||||||
| '(' term ')' { $$ = f_eval_int(f_linearize($2)); }
|
| '(' term ')' { $$ = f_eval_int(f_linearize($2, 1)); }
|
||||||
| CF_SYM_KNOWN {
|
| CF_SYM_KNOWN {
|
||||||
if ($1->class != (SYM_CONSTANT | T_INT)) cf_error("Number constant expected");
|
if ($1->class != (SYM_CONSTANT | T_INT)) cf_error("Number constant expected");
|
||||||
$$ = SYM_VAL($1).i; }
|
$$ = SYM_VAL($1).i; }
|
||||||
|
@ -1260,8 +1260,8 @@ this:
|
|||||||
|
|
||||||
<code>
|
<code>
|
||||||
filter not_too_far
|
filter not_too_far
|
||||||
int var;
|
|
||||||
{
|
{
|
||||||
|
int var;
|
||||||
if defined( rip_metric ) then
|
if defined( rip_metric ) then
|
||||||
var = rip_metric;
|
var = rip_metric;
|
||||||
else {
|
else {
|
||||||
@ -1290,9 +1290,9 @@ local variables. Recursion is not allowed. Function definitions look like this:
|
|||||||
|
|
||||||
<code>
|
<code>
|
||||||
function name ()
|
function name ()
|
||||||
int local_variable;
|
|
||||||
{
|
{
|
||||||
local_variable = 5;
|
int local_variable;
|
||||||
|
int another_variable = 5;
|
||||||
}
|
}
|
||||||
|
|
||||||
function with_parameters (int parameter)
|
function with_parameters (int parameter)
|
||||||
@ -1301,16 +1301,19 @@ function with_parameters (int parameter)
|
|||||||
}
|
}
|
||||||
</code>
|
</code>
|
||||||
|
|
||||||
<p>Unlike in C, variables are declared after the <cf/function/ line, but before
|
<p>Like in C programming language, variables are declared inside function body,
|
||||||
the first <cf/{/. You can't declare variables in nested blocks. Functions are
|
either at the beginning, or mixed with other statements. Declarations may
|
||||||
called like in C: <cf>name(); with_parameters(5);</cf>. Function may return
|
contain initialization. You can also declare variables in nested blocks, such
|
||||||
values using the <cf>return <m/[expr]/</cf> command. Returning a value exits
|
variables have scope restricted to such block. There is a deprecated syntax to
|
||||||
from current function (this is similar to C).
|
declare variables after the <cf/function/ line, but before the first <cf/{/.
|
||||||
|
Functions are called like in C: <cf>name(); with_parameters(5);</cf>. Function
|
||||||
|
may return values using the <cf>return <m/[expr]/</cf> command. Returning a
|
||||||
|
value exits from current function (this is similar to C).
|
||||||
|
|
||||||
<p>Filters are defined in a way similar to functions except they can't have
|
<p>Filters are defined in a way similar to functions except they cannot have
|
||||||
explicit parameters. They get a route table entry as an implicit parameter, it
|
explicit parameters. They get a route table entry as an implicit parameter, it
|
||||||
is also passed automatically to any functions called. The filter must terminate
|
is also passed automatically to any functions called. The filter must terminate
|
||||||
with either <cf/accept/ or <cf/reject/ statement. If there's a runtime error in
|
with either <cf/accept/ or <cf/reject/ statement. If there is a runtime error in
|
||||||
filter, the route is rejected.
|
filter, the route is rejected.
|
||||||
|
|
||||||
<p>A nice trick to debug filters is to use <cf>show route filter <m/name/</cf>
|
<p>A nice trick to debug filters is to use <cf>show route filter <m/name/</cf>
|
||||||
@ -1680,7 +1683,8 @@ prefix and an ASN as arguments.
|
|||||||
<sect>Control structures
|
<sect>Control structures
|
||||||
<label id="control-structures">
|
<label id="control-structures">
|
||||||
|
|
||||||
<p>Filters support two control structures: conditions and case switches.
|
<p>Filters support several control structures: conditions, for loops and case
|
||||||
|
switches.
|
||||||
|
|
||||||
<p>Syntax of a condition is: <cf>if <M>boolean expression</M> then <m/commandT/;
|
<p>Syntax of a condition is: <cf>if <M>boolean expression</M> then <m/commandT/;
|
||||||
else <m/commandF/;</cf> and you can use <cf>{ <m/command1/; <m/command2/;
|
else <m/commandF/;</cf> and you can use <cf>{ <m/command1/; <m/command2/;
|
||||||
@ -1688,6 +1692,14 @@ else <m/commandF/;</cf> and you can use <cf>{ <m/command1/; <m/command2/;
|
|||||||
omitted. If the <cf><m>boolean expression</m></cf> is true, <m/commandT/ is
|
omitted. If the <cf><m>boolean expression</m></cf> is true, <m/commandT/ is
|
||||||
executed, otherwise <m/commandF/ is executed.
|
executed, otherwise <m/commandF/ is executed.
|
||||||
|
|
||||||
|
<p>For loops allow to iterate over elements in compound data like BGP paths or
|
||||||
|
community lists. The syntax is: <cf>for [ <m/type/ ] <m/variable/ in <m/expr/
|
||||||
|
do <m/command/;</cf> and you can also use compound command like in conditions.
|
||||||
|
The expression is evaluated to a compound data, then for each element from such
|
||||||
|
data the command is executed with the item assigned to the variable. A variable
|
||||||
|
may be an existing one (when just name is used) or a locally defined (when type
|
||||||
|
and name is used). In both cases, it must have the same type as elements.
|
||||||
|
|
||||||
<p>The <cf>case</cf> is similar to case from Pascal. Syntax is <cf>case
|
<p>The <cf>case</cf> is similar to case from Pascal. Syntax is <cf>case
|
||||||
<m/expr/ { else: | <m/num_or_prefix [ .. num_or_prefix]/: <m/statement/ ; [
|
<m/expr/ { else: | <m/num_or_prefix [ .. num_or_prefix]/: <m/statement/ ; [
|
||||||
... ] }</cf>. The expression after <cf>case</cf> can be of any type which can be
|
... ] }</cf>. The expression after <cf>case</cf> can be of any type which can be
|
||||||
@ -1700,16 +1712,21 @@ neither of the <cf/:/ clauses, the statements after <cf/else:/ are executed.
|
|||||||
<p>Here is example that uses <cf/if/ and <cf/case/ structures:
|
<p>Here is example that uses <cf/if/ and <cf/case/ structures:
|
||||||
|
|
||||||
<code>
|
<code>
|
||||||
|
if 1234 = i then printn "."; else {
|
||||||
|
print "not 1234";
|
||||||
|
print "You need {} around multiple commands";
|
||||||
|
}
|
||||||
|
|
||||||
|
for int asn in bgp_path do {
|
||||||
|
printn "ASN: ", asn;
|
||||||
|
if asn < 65536 then print " (2B)"; else print " (4B)";
|
||||||
|
}
|
||||||
|
|
||||||
case arg1 {
|
case arg1 {
|
||||||
2: print "two"; print "I can do more commands without {}";
|
2: print "two"; print "I can do more commands without {}";
|
||||||
3 .. 5: print "three to five";
|
3 .. 5: print "three to five";
|
||||||
else: print "something else";
|
else: print "something else";
|
||||||
}
|
}
|
||||||
|
|
||||||
if 1234 = i then printn "."; else {
|
|
||||||
print "not 1234";
|
|
||||||
print "You need {} around multiple commands";
|
|
||||||
}
|
|
||||||
</code>
|
</code>
|
||||||
|
|
||||||
|
|
||||||
|
170
filter/config.Y
170
filter/config.Y
@ -22,6 +22,36 @@ static inline u32 pair_b(u32 p) { return p & 0xFFFF; }
|
|||||||
#define f_generate_complex(fi_code, da, arg) \
|
#define f_generate_complex(fi_code, da, arg) \
|
||||||
f_new_inst(FI_EA_SET, f_new_inst(fi_code, f_new_inst(FI_EA_GET, da), arg), da)
|
f_new_inst(FI_EA_SET, f_new_inst(fi_code, f_new_inst(FI_EA_GET, da), arg), da)
|
||||||
|
|
||||||
|
static int
|
||||||
|
f_new_var(struct sym_scope *s)
|
||||||
|
{
|
||||||
|
/*
|
||||||
|
* - A variable is an offset on vstack from vbase.
|
||||||
|
* - Vbase is set on filter start / function call.
|
||||||
|
* - Scopes contain anonymous scopes (blocks) inside filter/function scope
|
||||||
|
* - Each scope knows number of vars in that scope
|
||||||
|
* - Offset is therefore a sum of 'slots' up to named scope
|
||||||
|
* - New variables are added on top of vstk, so intermediate values cannot
|
||||||
|
* be there during FI_VAR_INIT. I.e. no 'var' inside 'term'.
|
||||||
|
* - Also, each f_line must always have its scope, otherwise a variable may
|
||||||
|
* be defined but not initialized if relevant f_line is not executed.
|
||||||
|
*/
|
||||||
|
|
||||||
|
int offset = s->slots++;
|
||||||
|
|
||||||
|
while (!s->name)
|
||||||
|
{
|
||||||
|
s = s->next;
|
||||||
|
ASSERT(s);
|
||||||
|
offset += s->slots;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (offset >= 0xff)
|
||||||
|
cf_error("Too many variables, at most 255 allowed");
|
||||||
|
|
||||||
|
return offset;
|
||||||
|
}
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Sets and their items are during parsing handled as lists, linked
|
* Sets and their items are during parsing handled as lists, linked
|
||||||
* through left ptr. The first item in a list also contains a pointer
|
* through left ptr. The first item in a list also contains a pointer
|
||||||
@ -273,6 +303,7 @@ CF_KEYWORDS(FUNCTION, PRINT, PRINTN, UNSET, RETURN,
|
|||||||
INT, BOOL, IP, TYPE, PREFIX, RD, PAIR, QUAD, EC, LC,
|
INT, BOOL, IP, TYPE, PREFIX, RD, PAIR, QUAD, EC, LC,
|
||||||
SET, STRING, BGPMASK, BGPPATH, CLIST, ECLIST, LCLIST,
|
SET, STRING, BGPMASK, BGPPATH, CLIST, ECLIST, LCLIST,
|
||||||
IF, THEN, ELSE, CASE,
|
IF, THEN, ELSE, CASE,
|
||||||
|
FOR, IN, DO,
|
||||||
TRUE, FALSE, RT, RO, UNKNOWN, GENERIC,
|
TRUE, FALSE, RT, RO, UNKNOWN, GENERIC,
|
||||||
FROM, GW, NET, MASK, PROTO, SOURCE, SCOPE, DEST, IFNAME, IFINDEX, WEIGHT, GW_MPLS,
|
FROM, GW, NET, MASK, PROTO, SOURCE, SCOPE, DEST, IFNAME, IFINDEX, WEIGHT, GW_MPLS,
|
||||||
PREFERENCE,
|
PREFERENCE,
|
||||||
@ -292,13 +323,14 @@ CF_KEYWORDS(FUNCTION, PRINT, PRINTN, UNSET, RETURN,
|
|||||||
%nonassoc ELSE
|
%nonassoc ELSE
|
||||||
|
|
||||||
%type <xp> cmds_int cmd_prep
|
%type <xp> cmds_int cmd_prep
|
||||||
%type <x> term block cmd cmds constant constructor print_list var_list function_call symbol_value bgp_path_expr bgp_path bgp_path_tail
|
%type <x> term cmd cmd_var cmds cmds_scoped constant constructor print_list var var_init var_list function_call symbol_value bgp_path_expr bgp_path bgp_path_tail
|
||||||
%type <fda> dynamic_attr
|
%type <fda> dynamic_attr
|
||||||
%type <fsa> static_attr
|
%type <fsa> static_attr
|
||||||
%type <f> filter where_filter
|
%type <f> filter where_filter
|
||||||
%type <fl> filter_body function_body
|
%type <fl> filter_body function_body
|
||||||
%type <flv> lvalue
|
%type <flv> lvalue
|
||||||
%type <i> type function_args function_vars
|
%type <i> type function_vars
|
||||||
|
%type <fa> function_argsn function_args
|
||||||
%type <ecs> ec_kind
|
%type <ecs> ec_kind
|
||||||
%type <fret> break_command
|
%type <fret> break_command
|
||||||
%type <i32> cnum
|
%type <i32> cnum
|
||||||
@ -307,6 +339,7 @@ CF_KEYWORDS(FUNCTION, PRINT, PRINTN, UNSET, RETURN,
|
|||||||
%type <v> set_atom switch_atom fipa
|
%type <v> set_atom switch_atom fipa
|
||||||
%type <px> fprefix
|
%type <px> fprefix
|
||||||
%type <t> get_cf_position
|
%type <t> get_cf_position
|
||||||
|
%type <s> for_var
|
||||||
|
|
||||||
CF_GRAMMAR
|
CF_GRAMMAR
|
||||||
|
|
||||||
@ -330,7 +363,7 @@ filter_def:
|
|||||||
|
|
||||||
conf: filter_eval ;
|
conf: filter_eval ;
|
||||||
filter_eval:
|
filter_eval:
|
||||||
EVAL term { f_eval_int(f_linearize($2)); }
|
EVAL term { f_eval_int(f_linearize($2, 1)); }
|
||||||
;
|
;
|
||||||
|
|
||||||
conf: custom_attr ;
|
conf: custom_attr ;
|
||||||
@ -405,25 +438,28 @@ type:
|
|||||||
;
|
;
|
||||||
|
|
||||||
function_argsn:
|
function_argsn:
|
||||||
/* EMPTY */
|
/* EMPTY */ { $$ = NULL; }
|
||||||
| function_argsn type symbol ';' {
|
| function_argsn type symbol ';' {
|
||||||
if ($3->scope->slots >= 0xfe) cf_error("Too many declarations, at most 255 allowed");
|
if ($3->scope->slots >= 0xfe) cf_error("Too many declarations, at most 255 allowed");
|
||||||
cf_define_symbol($3, SYM_VARIABLE | $2, offset, $3->scope->slots++);
|
$$ = cfg_alloc(sizeof(struct f_arg));
|
||||||
|
$$->arg = cf_define_symbol($3, SYM_VARIABLE | $2, offset, sym_->scope->slots++);
|
||||||
|
$$->next = $1;
|
||||||
}
|
}
|
||||||
;
|
;
|
||||||
|
|
||||||
function_args:
|
function_args:
|
||||||
'(' ')' { $$ = 0; }
|
'(' ')' { $$ = NULL; }
|
||||||
| '(' function_argsn type symbol ')' {
|
| '(' function_argsn type symbol ')' {
|
||||||
cf_define_symbol($4, SYM_VARIABLE | $3, offset, $4->scope->slots++);
|
$$ = cfg_alloc(sizeof(struct f_arg));
|
||||||
$$ = $4->scope->slots;
|
$$->arg = cf_define_symbol($4, SYM_VARIABLE | $3, offset, sym_->scope->slots++);
|
||||||
|
$$->next = $2;
|
||||||
}
|
}
|
||||||
;
|
;
|
||||||
|
|
||||||
function_vars:
|
function_vars:
|
||||||
/* EMPTY */ { $$ = 0; }
|
/* EMPTY */ { $$ = 0; }
|
||||||
| function_vars type symbol ';' {
|
| function_vars type symbol ';' {
|
||||||
cf_define_symbol($3, SYM_VARIABLE | $2, offset, $3->scope->slots++);
|
cf_define_symbol($3, SYM_VARIABLE | $2, offset, f_new_var(sym_->scope));
|
||||||
$$ = $1 + 1;
|
$$ = $1 + 1;
|
||||||
}
|
}
|
||||||
;
|
;
|
||||||
@ -451,20 +487,35 @@ where_filter:
|
|||||||
|
|
||||||
function_body:
|
function_body:
|
||||||
function_vars '{' cmds '}' {
|
function_vars '{' cmds '}' {
|
||||||
$$ = f_linearize($3);
|
$$ = f_linearize($3, 0);
|
||||||
$$->vars = $1;
|
$$->vars = $1;
|
||||||
}
|
}
|
||||||
;
|
;
|
||||||
|
|
||||||
conf: function_def ;
|
conf: function_def ;
|
||||||
function_def:
|
function_def:
|
||||||
FUNCTION symbol { DBG( "Beginning of function %s\n", $2->name );
|
FUNCTION symbol {
|
||||||
|
DBG( "Beginning of function %s\n", $2->name );
|
||||||
$2 = cf_define_symbol($2, SYM_FUNCTION, function, NULL);
|
$2 = cf_define_symbol($2, SYM_FUNCTION, function, NULL);
|
||||||
cf_push_scope($2);
|
cf_push_scope($2);
|
||||||
} function_args function_body {
|
} function_args {
|
||||||
DBG("Definition of function %s with %u args and %u local vars.\n", $2->name, $4, $5->vars);
|
/* Make dummy f_line for storing function prototype */
|
||||||
$5->args = $4;
|
struct f_line *dummy = cfg_allocz(sizeof(struct f_line));
|
||||||
$2->function = $5;
|
$2->function = dummy;
|
||||||
|
|
||||||
|
/* Revert the args */
|
||||||
|
while ($4) {
|
||||||
|
struct f_arg *tmp = $4;
|
||||||
|
$4 = $4->next;
|
||||||
|
|
||||||
|
tmp->next = dummy->arg_list;
|
||||||
|
dummy->arg_list = tmp;
|
||||||
|
dummy->args++;
|
||||||
|
}
|
||||||
|
} function_body {
|
||||||
|
$6->args = $2->function->args;
|
||||||
|
$6->arg_list = $2->function->arg_list;
|
||||||
|
$2->function = $6;
|
||||||
cf_pop_scope();
|
cf_pop_scope();
|
||||||
}
|
}
|
||||||
;
|
;
|
||||||
@ -475,7 +526,11 @@ cmds: /* EMPTY */ { $$ = NULL; }
|
|||||||
| cmds_int { $$ = $1.begin; }
|
| cmds_int { $$ = $1.begin; }
|
||||||
;
|
;
|
||||||
|
|
||||||
cmd_prep: cmd {
|
cmds_scoped: { cf_push_soft_scope(); } cmds { cf_pop_soft_scope(); $$ = $2; } ;
|
||||||
|
|
||||||
|
cmd_var: var | cmd ;
|
||||||
|
|
||||||
|
cmd_prep: cmd_var {
|
||||||
$$.begin = $$.end = $1;
|
$$.begin = $$.end = $1;
|
||||||
if ($1)
|
if ($1)
|
||||||
while ($$.end->next)
|
while ($$.end->next)
|
||||||
@ -497,15 +552,6 @@ cmds_int: cmd_prep
|
|||||||
}
|
}
|
||||||
;
|
;
|
||||||
|
|
||||||
block:
|
|
||||||
cmd {
|
|
||||||
$$=$1;
|
|
||||||
}
|
|
||||||
| '{' cmds '}' {
|
|
||||||
$$=$2;
|
|
||||||
}
|
|
||||||
;
|
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Complex types, their bison value is struct f_val
|
* Complex types, their bison value is struct f_val
|
||||||
*/
|
*/
|
||||||
@ -529,7 +575,7 @@ set_atom:
|
|||||||
| VPN_RD { $$.type = T_RD; $$.val.ec = $1; }
|
| VPN_RD { $$.type = T_RD; $$.val.ec = $1; }
|
||||||
| ENUM { $$.type = pair_a($1); $$.val.i = pair_b($1); }
|
| ENUM { $$.type = pair_a($1); $$.val.i = pair_b($1); }
|
||||||
| '(' term ')' {
|
| '(' term ')' {
|
||||||
if (f_eval(f_linearize($2), cfg_mem, &($$)) > F_RETURN) cf_error("Runtime error");
|
if (f_eval(f_linearize($2, 1), cfg_mem, &($$)) > F_RETURN) cf_error("Runtime error");
|
||||||
if (!f_valid_set_type($$.type)) cf_error("Set-incompatible type");
|
if (!f_valid_set_type($$.type)) cf_error("Set-incompatible type");
|
||||||
}
|
}
|
||||||
| CF_SYM_KNOWN {
|
| CF_SYM_KNOWN {
|
||||||
@ -541,13 +587,13 @@ set_atom:
|
|||||||
|
|
||||||
switch_atom:
|
switch_atom:
|
||||||
NUM { $$.type = T_INT; $$.val.i = $1; }
|
NUM { $$.type = T_INT; $$.val.i = $1; }
|
||||||
| '(' term ')' { $$.type = T_INT; $$.val.i = f_eval_int(f_linearize($2)); }
|
| '(' term ')' { $$.type = T_INT; $$.val.i = f_eval_int(f_linearize($2, 1)); }
|
||||||
| fipa { $$ = $1; }
|
| fipa { $$ = $1; }
|
||||||
| ENUM { $$.type = pair_a($1); $$.val.i = pair_b($1); }
|
| ENUM { $$.type = pair_a($1); $$.val.i = pair_b($1); }
|
||||||
;
|
;
|
||||||
|
|
||||||
cnum:
|
cnum:
|
||||||
term { $$ = f_eval_int(f_linearize($1)); }
|
term { $$ = f_eval_int(f_linearize($1, 1)); }
|
||||||
|
|
||||||
pair_item:
|
pair_item:
|
||||||
'(' cnum ',' cnum ')' { $$ = f_new_pair_item($2, $2, $4, $4); }
|
'(' cnum ',' cnum ')' { $$ = f_new_pair_item($2, $2, $4, $4); }
|
||||||
@ -631,19 +677,19 @@ fprefix_set:
|
|||||||
;
|
;
|
||||||
|
|
||||||
switch_body: /* EMPTY */ { $$ = NULL; }
|
switch_body: /* EMPTY */ { $$ = NULL; }
|
||||||
| switch_body switch_items ':' cmds {
|
| switch_body switch_items ':' cmds_scoped {
|
||||||
/* Fill data fields */
|
/* Fill data fields */
|
||||||
struct f_tree *t;
|
struct f_tree *t;
|
||||||
struct f_line *line = f_linearize($4);
|
struct f_line *line = f_linearize($4, 0);
|
||||||
for (t = $2; t; t = t->left)
|
for (t = $2; t; t = t->left)
|
||||||
t->data = line;
|
t->data = line;
|
||||||
$$ = f_merge_items($1, $2);
|
$$ = f_merge_items($1, $2);
|
||||||
}
|
}
|
||||||
| switch_body ELSECOL cmds {
|
| switch_body ELSECOL cmds_scoped {
|
||||||
struct f_tree *t = f_new_tree();
|
struct f_tree *t = f_new_tree();
|
||||||
t->from.type = t->to.type = T_VOID;
|
t->from.type = t->to.type = T_VOID;
|
||||||
t->right = t;
|
t->right = t;
|
||||||
t->data = f_linearize($3);
|
t->data = f_linearize($3, 0);
|
||||||
$$ = f_merge_items($1, t);
|
$$ = f_merge_items($1, t);
|
||||||
}
|
}
|
||||||
;
|
;
|
||||||
@ -660,6 +706,7 @@ bgp_path:
|
|||||||
bgp_path_tail:
|
bgp_path_tail:
|
||||||
NUM bgp_path_tail { $$ = f_new_inst(FI_CONSTANT, (struct f_val) { .type = T_PATH_MASK_ITEM, .val.pmi = { .asn = $1, .kind = PM_ASN, }, }); $$->next = $2; }
|
NUM bgp_path_tail { $$ = f_new_inst(FI_CONSTANT, (struct f_val) { .type = T_PATH_MASK_ITEM, .val.pmi = { .asn = $1, .kind = PM_ASN, }, }); $$->next = $2; }
|
||||||
| NUM DDOT NUM bgp_path_tail { $$ = f_new_inst(FI_CONSTANT, (struct f_val) { .type = T_PATH_MASK_ITEM, .val.pmi = { .from = $1, .to = $3, .kind = PM_ASN_RANGE }, }); $$->next = $4; }
|
| NUM DDOT NUM bgp_path_tail { $$ = f_new_inst(FI_CONSTANT, (struct f_val) { .type = T_PATH_MASK_ITEM, .val.pmi = { .from = $1, .to = $3, .kind = PM_ASN_RANGE }, }); $$->next = $4; }
|
||||||
|
| '[' ']' bgp_path_tail { $$ = f_new_inst(FI_CONSTANT, (struct f_val) { .type = T_PATH_MASK_ITEM, .val.pmi = { .set = NULL, .kind = PM_ASN_SET }, }); $$->next = $3; }
|
||||||
| '[' set_items ']' bgp_path_tail {
|
| '[' set_items ']' bgp_path_tail {
|
||||||
if ($2->from.type != T_INT) cf_error("Only integer sets allowed in path mask");
|
if ($2->from.type != T_INT) cf_error("Only integer sets allowed in path mask");
|
||||||
$$ = f_new_inst(FI_CONSTANT, (struct f_val) { .type = T_PATH_MASK_ITEM, .val.pmi = { .set = build_tree($2), .kind = PM_ASN_SET }, }); $$->next = $4;
|
$$ = f_new_inst(FI_CONSTANT, (struct f_val) { .type = T_PATH_MASK_ITEM, .val.pmi = { .set = build_tree($2), .kind = PM_ASN_SET }, }); $$->next = $4;
|
||||||
@ -679,6 +726,7 @@ constant:
|
|||||||
| fipa { $$ = f_new_inst(FI_CONSTANT, $1); }
|
| fipa { $$ = f_new_inst(FI_CONSTANT, $1); }
|
||||||
| VPN_RD { $$ = f_new_inst(FI_CONSTANT, (struct f_val) { .type = T_RD, .val.ec = $1, }); }
|
| VPN_RD { $$ = f_new_inst(FI_CONSTANT, (struct f_val) { .type = T_RD, .val.ec = $1, }); }
|
||||||
| net_ { $$ = f_new_inst(FI_CONSTANT, (struct f_val) { .type = T_NET, .val.net = $1, }); }
|
| net_ { $$ = f_new_inst(FI_CONSTANT, (struct f_val) { .type = T_NET, .val.net = $1, }); }
|
||||||
|
| '[' ']' { $$ = f_new_inst(FI_CONSTANT, (struct f_val) { .type = T_SET, .val.t = NULL, }); }
|
||||||
| '[' set_items ']' {
|
| '[' set_items ']' {
|
||||||
DBG( "We've got a set here..." );
|
DBG( "We've got a set here..." );
|
||||||
$$ = f_new_inst(FI_CONSTANT, (struct f_val) { .type = T_SET, .val.t = build_tree($2), });
|
$$ = f_new_inst(FI_CONSTANT, (struct f_val) { .type = T_SET, .val.t = build_tree($2), });
|
||||||
@ -702,27 +750,22 @@ var_list: /* EMPTY */ { $$ = NULL; }
|
|||||||
| var_list ',' term { $$ = $3; $$->next = $1; }
|
| var_list ',' term { $$ = $3; $$->next = $1; }
|
||||||
|
|
||||||
function_call:
|
function_call:
|
||||||
CF_SYM_KNOWN '(' var_list ')' {
|
CF_SYM_KNOWN '(' var_list ')'
|
||||||
|
{
|
||||||
if ($1->class != SYM_FUNCTION)
|
if ($1->class != SYM_FUNCTION)
|
||||||
cf_error("You can't call something which is not a function. Really.");
|
cf_error("You can't call something which is not a function. Really.");
|
||||||
|
|
||||||
struct f_inst *fc = f_new_inst(FI_CALL, $1);
|
/* Revert the var_list */
|
||||||
uint args = 0;
|
struct f_inst *args = NULL;
|
||||||
while ($3) {
|
while ($3) {
|
||||||
args++;
|
struct f_inst *tmp = $3;
|
||||||
struct f_inst *tmp = $3->next;
|
$3 = $3->next;
|
||||||
$3->next = fc;
|
|
||||||
|
|
||||||
fc = $3;
|
tmp->next = args;
|
||||||
$3 = tmp;
|
args = tmp;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (args != $1->function->args)
|
$$ = f_new_inst(FI_CALL, args, $1);
|
||||||
cf_error("Function call '%s' got %u arguments, need %u arguments.",
|
|
||||||
$1->name, args, $1->function->args);
|
|
||||||
|
|
||||||
$$ = f_new_inst(FI_CONSTANT, (struct f_val) { .type = T_VOID });
|
|
||||||
$$->next = fc;
|
|
||||||
}
|
}
|
||||||
;
|
;
|
||||||
|
|
||||||
@ -848,13 +891,44 @@ print_list: /* EMPTY */ { $$ = NULL; }
|
|||||||
}
|
}
|
||||||
;
|
;
|
||||||
|
|
||||||
|
var_init:
|
||||||
|
/* empty */ { $$ = f_new_inst(FI_CONSTANT, (struct f_val) { }); }
|
||||||
|
| '=' term { $$ = $2; }
|
||||||
|
;
|
||||||
|
|
||||||
|
var:
|
||||||
|
type symbol var_init ';' {
|
||||||
|
struct symbol *sym = cf_define_symbol($2, SYM_VARIABLE | $1, offset, f_new_var(sym_->scope));
|
||||||
|
$$ = f_new_inst(FI_VAR_INIT, $3, sym);
|
||||||
|
}
|
||||||
|
|
||||||
|
for_var:
|
||||||
|
type symbol { $$ = cf_define_symbol($2, SYM_VARIABLE | $1, offset, f_new_var(sym_->scope)); }
|
||||||
|
| CF_SYM_KNOWN { $$ = $1; cf_assert_symbol($1, SYM_VARIABLE); }
|
||||||
|
;
|
||||||
|
|
||||||
cmd:
|
cmd:
|
||||||
IF term THEN block {
|
'{' cmds_scoped '}' {
|
||||||
|
$$ = $2;
|
||||||
|
}
|
||||||
|
| IF term THEN cmd {
|
||||||
$$ = f_new_inst(FI_CONDITION, $2, $4, NULL);
|
$$ = f_new_inst(FI_CONDITION, $2, $4, NULL);
|
||||||
}
|
}
|
||||||
| IF term THEN block ELSE block {
|
| IF term THEN cmd ELSE cmd {
|
||||||
$$ = f_new_inst(FI_CONDITION, $2, $4, $6);
|
$$ = f_new_inst(FI_CONDITION, $2, $4, $6);
|
||||||
}
|
}
|
||||||
|
| FOR {
|
||||||
|
/* Reserve space for walk data on stack */
|
||||||
|
cf_push_scope(NULL);
|
||||||
|
conf_this_scope->slots += 2;
|
||||||
|
} for_var IN
|
||||||
|
/* Parse term in the parent scope */
|
||||||
|
{ conf_this_scope->active = 0; } term { conf_this_scope->active = 1; }
|
||||||
|
DO cmd {
|
||||||
|
cf_pop_scope();
|
||||||
|
$$ = f_new_inst(FI_FOR_INIT, $6, $3);
|
||||||
|
$$->next = f_new_inst(FI_FOR_NEXT, $3, $9);
|
||||||
|
}
|
||||||
| CF_SYM_KNOWN '=' term ';' {
|
| CF_SYM_KNOWN '=' term ';' {
|
||||||
switch ($1->class) {
|
switch ($1->class) {
|
||||||
case SYM_VARIABLE_RANGE:
|
case SYM_VARIABLE_RANGE:
|
||||||
|
@ -72,6 +72,7 @@ enum f_type
|
|||||||
f_type_element_type(enum f_type t)
|
f_type_element_type(enum f_type t)
|
||||||
{
|
{
|
||||||
switch(t) {
|
switch(t) {
|
||||||
|
case T_PATH: return T_INT;
|
||||||
case T_CLIST: return T_PAIR;
|
case T_CLIST: return T_PAIR;
|
||||||
case T_ECLIST: return T_EC;
|
case T_ECLIST: return T_EC;
|
||||||
case T_LCLIST: return T_LC;
|
case T_LCLIST: return T_LC;
|
||||||
@ -79,6 +80,8 @@ f_type_element_type(enum f_type t)
|
|||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
||||||
|
const struct f_trie f_const_empty_trie = { .ipv4 = -1, };
|
||||||
|
|
||||||
const struct f_val f_const_empty_path = {
|
const struct f_val f_const_empty_path = {
|
||||||
.type = T_PATH,
|
.type = T_PATH,
|
||||||
.val.ad = &null_adata,
|
.val.ad = &null_adata,
|
||||||
@ -91,6 +94,9 @@ const struct f_val f_const_empty_path = {
|
|||||||
}, f_const_empty_lclist = {
|
}, f_const_empty_lclist = {
|
||||||
.type = T_LCLIST,
|
.type = T_LCLIST,
|
||||||
.val.ad = &null_adata,
|
.val.ad = &null_adata,
|
||||||
|
}, f_const_empty_prefix_set = {
|
||||||
|
.type = T_PREFIX_SET,
|
||||||
|
.val.ti = &f_const_empty_trie,
|
||||||
};
|
};
|
||||||
|
|
||||||
static struct adata *
|
static struct adata *
|
||||||
@ -187,7 +193,7 @@ val_compare(const struct f_val *v1, const struct f_val *v2)
|
|||||||
if (val_is_ip4(v1) && (v2->type == T_QUAD))
|
if (val_is_ip4(v1) && (v2->type == T_QUAD))
|
||||||
return uint_cmp(ipa_to_u32(v1->val.ip), v2->val.i);
|
return uint_cmp(ipa_to_u32(v1->val.ip), v2->val.i);
|
||||||
|
|
||||||
debug( "Types do not match in val_compare\n" );
|
DBG( "Types do not match in val_compare\n" );
|
||||||
return F_CMP_ERROR;
|
return F_CMP_ERROR;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -301,6 +307,12 @@ val_same(const struct f_val *v1, const struct f_val *v2)
|
|||||||
int
|
int
|
||||||
clist_set_type(const struct f_tree *set, struct f_val *v)
|
clist_set_type(const struct f_tree *set, struct f_val *v)
|
||||||
{
|
{
|
||||||
|
if (!set)
|
||||||
|
{
|
||||||
|
v->type = T_VOID;
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
|
||||||
switch (set->from.type)
|
switch (set->from.type)
|
||||||
{
|
{
|
||||||
case T_PAIR:
|
case T_PAIR:
|
||||||
@ -537,6 +549,9 @@ val_in_range(const struct f_val *v1, const struct f_val *v2)
|
|||||||
if (v2->type != T_SET)
|
if (v2->type != T_SET)
|
||||||
return F_CMP_ERROR;
|
return F_CMP_ERROR;
|
||||||
|
|
||||||
|
if (!v2->val.t)
|
||||||
|
return 0;
|
||||||
|
|
||||||
/* With integrated Quad<->IP implicit conversion */
|
/* With integrated Quad<->IP implicit conversion */
|
||||||
if ((v1->type == v2->val.t->from.type) ||
|
if ((v1->type == v2->val.t->from.type) ||
|
||||||
((v1->type == T_QUAD) && val_is_ip4(&(v2->val.t->from)) && val_is_ip4(&(v2->val.t->to))))
|
((v1->type == T_QUAD) && val_is_ip4(&(v2->val.t->from)) && val_is_ip4(&(v2->val.t->to))))
|
||||||
|
@ -280,9 +280,11 @@ int val_in_range(const struct f_val *v1, const struct f_val *v2);
|
|||||||
|
|
||||||
int clist_set_type(const struct f_tree *set, struct f_val *v);
|
int clist_set_type(const struct f_tree *set, struct f_val *v);
|
||||||
static inline int eclist_set_type(const struct f_tree *set)
|
static inline int eclist_set_type(const struct f_tree *set)
|
||||||
{ return set->from.type == T_EC; }
|
{ return !set || set->from.type == T_EC; }
|
||||||
static inline int lclist_set_type(const struct f_tree *set)
|
static inline int lclist_set_type(const struct f_tree *set)
|
||||||
{ return set->from.type == T_LC; }
|
{ return !set || set->from.type == T_LC; }
|
||||||
|
static inline int path_set_type(const struct f_tree *set)
|
||||||
|
{ return !set || set->from.type == T_INT; }
|
||||||
|
|
||||||
const struct adata *clist_filter(struct linpool *pool, const struct adata *list, const struct f_val *set, int pos);
|
const struct adata *clist_filter(struct linpool *pool, const struct adata *list, const struct f_val *set, int pos);
|
||||||
const struct adata *eclist_filter(struct linpool *pool, const struct adata *list, const struct f_val *set, int pos);
|
const struct adata *eclist_filter(struct linpool *pool, const struct adata *list, const struct f_val *set, int pos);
|
||||||
@ -298,7 +300,7 @@ undef_value(struct f_val v)
|
|||||||
(v.val.ad == &null_adata);
|
(v.val.ad == &null_adata);
|
||||||
}
|
}
|
||||||
|
|
||||||
extern const struct f_val f_const_empty_path, f_const_empty_clist, f_const_empty_eclist, f_const_empty_lclist;
|
extern const struct f_val f_const_empty_path, f_const_empty_clist, f_const_empty_eclist, f_const_empty_lclist, f_const_empty_prefix_set;
|
||||||
|
|
||||||
enum filter_return f_eval(const struct f_line *expr, struct linpool *tmp_pool, struct f_val *pres);
|
enum filter_return f_eval(const struct f_line *expr, struct linpool *tmp_pool, struct f_val *pres);
|
||||||
|
|
||||||
|
@ -191,6 +191,12 @@ if (f$1->type && f$2->type && (f$1->type != f$2->type) &&
|
|||||||
cf_error("Arguments $1 and $2 of %s must be of the same type", f_instruction_name(what->fi_code));
|
cf_error("Arguments $1 and $2 of %s must be of the same type", f_instruction_name(what->fi_code));
|
||||||
FID_INTERPRET_BODY()')
|
FID_INTERPRET_BODY()')
|
||||||
|
|
||||||
|
m4_define(ARG_PREFER_SAME_TYPE, `
|
||||||
|
FID_NEW_BODY()m4_dnl
|
||||||
|
if (f$1->type && f$2->type && (f$1->type != f$2->type))
|
||||||
|
(void) (f_const_promotion(f$2, f$1->type) || f_const_promotion(f$1, f$2->type));
|
||||||
|
FID_INTERPRET_BODY()')
|
||||||
|
|
||||||
# Executing another filter line. This replaces the recursion
|
# Executing another filter line. This replaces the recursion
|
||||||
# that was needed in the former implementation.
|
# that was needed in the former implementation.
|
||||||
m4_define(LINEX, `FID_INTERPRET_EXEC()LINEX_($1)FID_INTERPRET_NEW()return $1 FID_INTERPRET_BODY()')
|
m4_define(LINEX, `FID_INTERPRET_EXEC()LINEX_($1)FID_INTERPRET_NEW()return $1 FID_INTERPRET_BODY()')
|
||||||
@ -216,7 +222,7 @@ whati->f$1 = f$1;
|
|||||||
FID_DUMP_BODY()m4_dnl
|
FID_DUMP_BODY()m4_dnl
|
||||||
f_dump_line(item->fl$1, indent + 1);
|
f_dump_line(item->fl$1, indent + 1);
|
||||||
FID_LINEARIZE_BODY()m4_dnl
|
FID_LINEARIZE_BODY()m4_dnl
|
||||||
item->fl$1 = f_linearize(whati->f$1);
|
item->fl$1 = f_linearize(whati->f$1, $2);
|
||||||
FID_SAME_BODY()m4_dnl
|
FID_SAME_BODY()m4_dnl
|
||||||
if (!f_same(f1->fl$1, f2->fl$1)) return 0;
|
if (!f_same(f1->fl$1, f2->fl$1)) return 0;
|
||||||
FID_ITERATE_BODY()m4_dnl
|
FID_ITERATE_BODY()m4_dnl
|
||||||
@ -244,9 +250,13 @@ m4_define(ERROR,
|
|||||||
# This macro specifies result type and makes there are no conflicting definitions
|
# This macro specifies result type and makes there are no conflicting definitions
|
||||||
m4_define(RESULT_TYPE,
|
m4_define(RESULT_TYPE,
|
||||||
`m4_ifdef([[INST_RESULT_TYPE]],
|
`m4_ifdef([[INST_RESULT_TYPE]],
|
||||||
[[m4_ifelse(INST_RESULT_TYPE,$1,,[[ERROR([[Multiple type definitons]])]])]],
|
[[m4_ifelse(INST_RESULT_TYPE,$1,,[[ERROR([[Multiple type definitions in]] INST_NAME)]])]],
|
||||||
[[m4_define(INST_RESULT_TYPE,$1) RESULT_TYPE_($1)]])')
|
[[m4_define(INST_RESULT_TYPE,$1) RESULT_TYPE_($1)]])')
|
||||||
|
|
||||||
|
m4_define(RESULT_TYPE_CHECK,
|
||||||
|
`m4_ifelse(INST_OUTVAL,0,,
|
||||||
|
[[m4_ifdef([[INST_RESULT_TYPE]],,[[ERROR([[Missing type definition in]] INST_NAME)]])]])')
|
||||||
|
|
||||||
m4_define(RESULT_TYPE_, `
|
m4_define(RESULT_TYPE_, `
|
||||||
FID_NEW_BODY()m4_dnl
|
FID_NEW_BODY()m4_dnl
|
||||||
what->type = $1;
|
what->type = $1;
|
||||||
@ -300,6 +310,7 @@ m4_define(FID_ITERATE, `FID_ZONE(10, Iteration)')
|
|||||||
|
|
||||||
# This macro does all the code wrapping. See inline comments.
|
# This macro does all the code wrapping. See inline comments.
|
||||||
m4_define(INST_FLUSH, `m4_ifdef([[INST_NAME]], [[
|
m4_define(INST_FLUSH, `m4_ifdef([[INST_NAME]], [[
|
||||||
|
RESULT_TYPE_CHECK()m4_dnl Check for defined RESULT_TYPE()
|
||||||
FID_ENUM()m4_dnl Contents of enum fi_code { ... }
|
FID_ENUM()m4_dnl Contents of enum fi_code { ... }
|
||||||
INST_NAME(),
|
INST_NAME(),
|
||||||
FID_ENUM_STR()m4_dnl Contents of const char * indexed by enum fi_code
|
FID_ENUM_STR()m4_dnl Contents of const char * indexed by enum fi_code
|
||||||
@ -375,6 +386,7 @@ case INST_NAME(): {
|
|||||||
#undef whati
|
#undef whati
|
||||||
#undef item
|
#undef item
|
||||||
dest->items[pos].fi_code = what->fi_code;
|
dest->items[pos].fi_code = what->fi_code;
|
||||||
|
dest->items[pos].flags = what->flags;
|
||||||
dest->items[pos].lineno = what->lineno;
|
dest->items[pos].lineno = what->lineno;
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
@ -402,6 +414,7 @@ m4_define(INST, `m4_dnl This macro is called on beginning of each instruction
|
|||||||
INST_FLUSH()m4_dnl First, old data is flushed
|
INST_FLUSH()m4_dnl First, old data is flushed
|
||||||
m4_define([[INST_NAME]], [[$1]])m4_dnl Then we store instruction name,
|
m4_define([[INST_NAME]], [[$1]])m4_dnl Then we store instruction name,
|
||||||
m4_define([[INST_INVAL]], [[$2]])m4_dnl instruction input value count,
|
m4_define([[INST_INVAL]], [[$2]])m4_dnl instruction input value count,
|
||||||
|
m4_define([[INST_OUTVAL]], [[$3]])m4_dnl instruction output value count,
|
||||||
m4_undefine([[INST_NEVER_CONSTANT]])m4_dnl reset NEVER_CONSTANT trigger,
|
m4_undefine([[INST_NEVER_CONSTANT]])m4_dnl reset NEVER_CONSTANT trigger,
|
||||||
m4_undefine([[INST_RESULT_TYPE]])m4_dnl and reset RESULT_TYPE value.
|
m4_undefine([[INST_RESULT_TYPE]])m4_dnl and reset RESULT_TYPE value.
|
||||||
FID_INTERPRET_BODY()m4_dnl By default, every code is interpreter code.
|
FID_INTERPRET_BODY()m4_dnl By default, every code is interpreter code.
|
||||||
@ -505,6 +518,11 @@ f_const_promotion(struct f_inst *arg, enum f_type want)
|
|||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
else if ((c->type == T_SET) && (!c->val.t) && (want == T_PREFIX_SET)) {
|
||||||
|
*c = f_const_empty_prefix_set;
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -560,7 +578,7 @@ FID_WR_PUT(8)
|
|||||||
}
|
}
|
||||||
|
|
||||||
struct f_line *
|
struct f_line *
|
||||||
f_linearize_concat(const struct f_inst * const inst[], uint count)
|
f_linearize_concat(const struct f_inst * const inst[], uint count, uint results)
|
||||||
{
|
{
|
||||||
uint len = 0;
|
uint len = 0;
|
||||||
for (uint i=0; i<count; i++)
|
for (uint i=0; i<count; i++)
|
||||||
@ -572,6 +590,8 @@ f_linearize_concat(const struct f_inst * const inst[], uint count)
|
|||||||
for (uint i=0; i<count; i++)
|
for (uint i=0; i<count; i++)
|
||||||
out->len = linearize(out, inst[i], out->len);
|
out->len = linearize(out, inst[i], out->len);
|
||||||
|
|
||||||
|
out->results = results;
|
||||||
|
|
||||||
#ifdef LOCAL_DEBUG
|
#ifdef LOCAL_DEBUG
|
||||||
f_dump_line(out, 0);
|
f_dump_line(out, 0);
|
||||||
#endif
|
#endif
|
||||||
@ -640,6 +660,7 @@ FID_WR_PUT(4)m4_dnl
|
|||||||
struct f_inst {
|
struct f_inst {
|
||||||
struct f_inst *next; /* Next instruction */
|
struct f_inst *next; /* Next instruction */
|
||||||
enum f_instruction_code fi_code; /* Instruction code */
|
enum f_instruction_code fi_code; /* Instruction code */
|
||||||
|
enum f_instruction_flags flags; /* Flags, instruction-specific */
|
||||||
enum f_type type; /* Type of returned value, if known */
|
enum f_type type; /* Type of returned value, if known */
|
||||||
int size; /* How many instructions are underneath */
|
int size; /* How many instructions are underneath */
|
||||||
int lineno; /* Line number */
|
int lineno; /* Line number */
|
||||||
|
243
filter/f-inst.c
243
filter/f-inst.c
@ -62,8 +62,9 @@
|
|||||||
* m4_dnl INST(FI_NOP, in, out) { enum value, input args, output args
|
* m4_dnl INST(FI_NOP, in, out) { enum value, input args, output args
|
||||||
* m4_dnl ARG(num, type); argument, its id (in data fields) and type accessible by v1, v2, v3
|
* m4_dnl ARG(num, type); argument, its id (in data fields) and type accessible by v1, v2, v3
|
||||||
* m4_dnl ARG_ANY(num); argument with no type check accessible by v1, v2, v3
|
* m4_dnl ARG_ANY(num); argument with no type check accessible by v1, v2, v3
|
||||||
|
* m4_dnl ARG_TYPE(num, type); just declare the type of argument
|
||||||
* m4_dnl VARARG; variable-length argument list; accessible by vv(i) and whati->varcount
|
* m4_dnl VARARG; variable-length argument list; accessible by vv(i) and whati->varcount
|
||||||
* m4_dnl LINE(num, unused); this argument has to be converted to its own f_line
|
* m4_dnl LINE(num, out); this argument has to be converted to its own f_line
|
||||||
* m4_dnl SYMBOL; symbol handed from config
|
* m4_dnl SYMBOL; symbol handed from config
|
||||||
* m4_dnl STATIC_ATTR; static attribute definition
|
* m4_dnl STATIC_ATTR; static attribute definition
|
||||||
* m4_dnl DYNAMIC_ATTR; dynamic attribute definition
|
* m4_dnl DYNAMIC_ATTR; dynamic attribute definition
|
||||||
@ -80,10 +81,17 @@
|
|||||||
* m4_dnl )
|
* m4_dnl )
|
||||||
*
|
*
|
||||||
* m4_dnl RESULT(type, union-field, value); putting this on value stack
|
* m4_dnl RESULT(type, union-field, value); putting this on value stack
|
||||||
|
* m4_dnl RESULT_(type, union-field, value); like RESULT(), but do not declare the type
|
||||||
* m4_dnl RESULT_VAL(value-struct); pass the struct f_val directly
|
* m4_dnl RESULT_VAL(value-struct); pass the struct f_val directly
|
||||||
|
* m4_dnl RESULT_TYPE(type); just declare the type of result value
|
||||||
* m4_dnl RESULT_VOID; return undef
|
* m4_dnl RESULT_VOID; return undef
|
||||||
* m4_dnl }
|
* m4_dnl }
|
||||||
*
|
*
|
||||||
|
* Note that runtime arguments m4_dnl (ARG*, VARARG) must be defined before
|
||||||
|
* parse-time arguments m4_dnl (LINE, SYMBOL, ...). During linearization,
|
||||||
|
* first ones move position in f_line by linearizing arguments first, while
|
||||||
|
* second ones store data to the current position.
|
||||||
|
*
|
||||||
* Also note that the { ... } blocks are not respected by M4 at all.
|
* Also note that the { ... } blocks are not respected by M4 at all.
|
||||||
* If you get weird unmatched-brace-pair errors, check what it generated and why.
|
* If you get weird unmatched-brace-pair errors, check what it generated and why.
|
||||||
* What is really considered as one instruction is not the { ... } block
|
* What is really considered as one instruction is not the { ... } block
|
||||||
@ -91,6 +99,24 @@
|
|||||||
*
|
*
|
||||||
* Other code is just copied into the interpreter part.
|
* Other code is just copied into the interpreter part.
|
||||||
*
|
*
|
||||||
|
* The filter language uses a simple type system, where values have types
|
||||||
|
* (constants T_*) and also terms (instructions) are statically typed. Our
|
||||||
|
* static typing is partial (some terms do not declare types of arguments
|
||||||
|
* or results), therefore it can detect most but not all type errors and
|
||||||
|
* therefore we still have runtime type checks.
|
||||||
|
*
|
||||||
|
* m4_dnl Types of arguments are declared by macros ARG() and ARG_TYPE(),
|
||||||
|
* m4_dnl types of results are declared by RESULT() and RESULT_TYPE().
|
||||||
|
* m4_dnl Macros ARG_ANY(), RESULT_() and RESULT_VAL() do not declare types
|
||||||
|
* m4_dnl themselves, but can be combined with ARG_TYPE() / RESULT_TYPE().
|
||||||
|
*
|
||||||
|
* m4_dnl Note that types should be declared only once. If there are
|
||||||
|
* m4_dnl multiple RESULT() macros in an instruction definition, they must
|
||||||
|
* m4_dnl use the exact same expression for type, or they should be replaced
|
||||||
|
* m4_dnl by multiple RESULT_() macros and a common RESULT_TYPE() macro.
|
||||||
|
* m4_dnl See e.g. FI_EA_GET or FI_MIN instructions.
|
||||||
|
*
|
||||||
|
*
|
||||||
* If you are satisfied with this, you don't need to read the following
|
* If you are satisfied with this, you don't need to read the following
|
||||||
* detailed description of what is really done with the instruction definitions.
|
* detailed description of what is really done with the instruction definitions.
|
||||||
*
|
*
|
||||||
@ -216,6 +242,37 @@
|
|||||||
*
|
*
|
||||||
* m4_dnl If you are stymied, see FI_CALL or FI_CONSTANT or just search for
|
* m4_dnl If you are stymied, see FI_CALL or FI_CONSTANT or just search for
|
||||||
* m4_dnl the mentioned macros in this file to see what is happening there in wild.
|
* m4_dnl the mentioned macros in this file to see what is happening there in wild.
|
||||||
|
*
|
||||||
|
*
|
||||||
|
* A note about soundness of the type system:
|
||||||
|
*
|
||||||
|
* A type system is sound when types of expressions are consistent with
|
||||||
|
* types of values resulting from evaluation of such expressions. Untyped
|
||||||
|
* expressions are ok, but badly typed expressions are not sound. So is
|
||||||
|
* the type system of BIRD filtering code sound? There are some points:
|
||||||
|
*
|
||||||
|
* All cases of (one) m4_dnl RESULT() macro are obviously ok, as the macro
|
||||||
|
* both declares a type and returns a value. One have to check instructions
|
||||||
|
* that use m4_dnl RESULT_TYPE() macro. There are two issues:
|
||||||
|
*
|
||||||
|
* FI_AND, FI_OR - second argument is statically checked to be T_BOOL and
|
||||||
|
* passed as result without dynamic typecheck, declared to be T_BOOL. If
|
||||||
|
* an untyped non-bool expression is used as a second argument, then
|
||||||
|
* the mismatched type is returned.
|
||||||
|
*
|
||||||
|
* FI_VAR_GET - soundness depends on consistency of declared symbol types
|
||||||
|
* and stored values. This is maintained when values are stored by
|
||||||
|
* FI_VAR_SET, but when they are stored by FI_CALL, only static checking is
|
||||||
|
* used, so when an untyped expression returning mismatched value is used
|
||||||
|
* as a function argument, then inconsistent value is stored and subsequent
|
||||||
|
* FI_VAR_GET would be unsound.
|
||||||
|
*
|
||||||
|
* Both of these issues are inconsequential, as mismatched values from
|
||||||
|
* unsound expressions will be caught by dynamic typechecks like mismatched
|
||||||
|
* values from untyped expressions.
|
||||||
|
*
|
||||||
|
* Also note that FI_CALL is the only expression without properly declared
|
||||||
|
* result type.
|
||||||
*/
|
*/
|
||||||
|
|
||||||
/* Binary operators */
|
/* Binary operators */
|
||||||
@ -246,7 +303,7 @@
|
|||||||
RESULT_TYPE(T_BOOL);
|
RESULT_TYPE(T_BOOL);
|
||||||
|
|
||||||
if (v1.val.i)
|
if (v1.val.i)
|
||||||
LINE(2,0);
|
LINE(2,1);
|
||||||
else
|
else
|
||||||
RESULT_VAL(v1);
|
RESULT_VAL(v1);
|
||||||
}
|
}
|
||||||
@ -256,7 +313,7 @@
|
|||||||
RESULT_TYPE(T_BOOL);
|
RESULT_TYPE(T_BOOL);
|
||||||
|
|
||||||
if (!v1.val.i)
|
if (!v1.val.i)
|
||||||
LINE(2,0);
|
LINE(2,1);
|
||||||
else
|
else
|
||||||
RESULT_VAL(v1);
|
RESULT_VAL(v1);
|
||||||
}
|
}
|
||||||
@ -349,7 +406,7 @@
|
|||||||
break;
|
break;
|
||||||
|
|
||||||
case T_SET:
|
case T_SET:
|
||||||
if (vv(i).val.t->from.type != T_INT)
|
if (!path_set_type(vv(i).val.t))
|
||||||
runtime("Only integer sets allowed in path mask");
|
runtime("Only integer sets allowed in path mask");
|
||||||
|
|
||||||
pm->item[i] = (struct f_path_mask_item) {
|
pm->item[i] = (struct f_path_mask_item) {
|
||||||
@ -371,12 +428,14 @@
|
|||||||
INST(FI_NEQ, 2, 1) {
|
INST(FI_NEQ, 2, 1) {
|
||||||
ARG_ANY(1);
|
ARG_ANY(1);
|
||||||
ARG_ANY(2);
|
ARG_ANY(2);
|
||||||
|
ARG_PREFER_SAME_TYPE(1, 2);
|
||||||
RESULT(T_BOOL, i, !val_same(&v1, &v2));
|
RESULT(T_BOOL, i, !val_same(&v1, &v2));
|
||||||
}
|
}
|
||||||
|
|
||||||
INST(FI_EQ, 2, 1) {
|
INST(FI_EQ, 2, 1) {
|
||||||
ARG_ANY(1);
|
ARG_ANY(1);
|
||||||
ARG_ANY(2);
|
ARG_ANY(2);
|
||||||
|
ARG_PREFER_SAME_TYPE(1, 2);
|
||||||
RESULT(T_BOOL, i, val_same(&v1, &v2));
|
RESULT(T_BOOL, i, val_same(&v1, &v2));
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -447,6 +506,18 @@
|
|||||||
RESULT(T_BOOL, i, ipa_is_ip4(v1.val.ip));
|
RESULT(T_BOOL, i, ipa_is_ip4(v1.val.ip));
|
||||||
}
|
}
|
||||||
|
|
||||||
|
INST(FI_VAR_INIT, 1, 0) {
|
||||||
|
NEVER_CONSTANT;
|
||||||
|
ARG_ANY(1);
|
||||||
|
SYMBOL;
|
||||||
|
ARG_TYPE(1, sym->class & 0xff);
|
||||||
|
|
||||||
|
/* New variable is always the last on stack */
|
||||||
|
uint pos = curline.vbase + sym->offset;
|
||||||
|
fstk->vstk[pos] = v1;
|
||||||
|
fstk->vcnt = pos + 1;
|
||||||
|
}
|
||||||
|
|
||||||
/* Set to indirect value prepared in v1 */
|
/* Set to indirect value prepared in v1 */
|
||||||
INST(FI_VAR_SET, 1, 0) {
|
INST(FI_VAR_SET, 1, 0) {
|
||||||
NEVER_CONSTANT;
|
NEVER_CONSTANT;
|
||||||
@ -477,12 +548,100 @@
|
|||||||
RESULT_VAL(val);
|
RESULT_VAL(val);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
INST(FI_FOR_INIT, 1, 0) {
|
||||||
|
NEVER_CONSTANT;
|
||||||
|
ARG_ANY(1);
|
||||||
|
SYMBOL;
|
||||||
|
|
||||||
|
FID_NEW_BODY()
|
||||||
|
ASSERT((sym->class & ~0xff) == SYM_VARIABLE);
|
||||||
|
|
||||||
|
/* Static type check */
|
||||||
|
if (f1->type)
|
||||||
|
{
|
||||||
|
enum f_type t_var = (sym->class & 0xff);
|
||||||
|
enum f_type t_arg = f_type_element_type(f1->type);
|
||||||
|
if (!t_arg)
|
||||||
|
cf_error("Value of expression in FOR must be iterable, got %s",
|
||||||
|
f_type_name(f1->type));
|
||||||
|
if (t_var != t_arg)
|
||||||
|
cf_error("Loop variable '%s' in FOR must be %s, is %s",
|
||||||
|
sym->name, f_type_name(t_arg), f_type_name(t_var));
|
||||||
|
}
|
||||||
|
|
||||||
|
FID_INTERPRET_BODY()
|
||||||
|
|
||||||
|
/* Dynamic type check */
|
||||||
|
if ((sym->class & 0xff) != f_type_element_type(v1.type))
|
||||||
|
runtime("Mismatched argument and variable type");
|
||||||
|
|
||||||
|
/* Setup the index */
|
||||||
|
v2 = (struct f_val) { .type = T_INT, .val.i = 0 };
|
||||||
|
|
||||||
|
/* Keep v1 and v2 on the stack */
|
||||||
|
fstk->vcnt += 2;
|
||||||
|
}
|
||||||
|
|
||||||
|
INST(FI_FOR_NEXT, 2, 0) {
|
||||||
|
NEVER_CONSTANT;
|
||||||
|
SYMBOL;
|
||||||
|
|
||||||
|
/* Type checks are done in FI_FOR_INIT */
|
||||||
|
|
||||||
|
/* Loop variable */
|
||||||
|
struct f_val *var = &fstk->vstk[curline.vbase + sym->offset];
|
||||||
|
int step = 0;
|
||||||
|
|
||||||
|
switch(v1.type)
|
||||||
|
{
|
||||||
|
case T_PATH:
|
||||||
|
var->type = T_INT;
|
||||||
|
step = as_path_walk(v1.val.ad, &v2.val.i, &var->val.i);
|
||||||
|
break;
|
||||||
|
|
||||||
|
case T_CLIST:
|
||||||
|
var->type = T_PAIR;
|
||||||
|
step = int_set_walk(v1.val.ad, &v2.val.i, &var->val.i);
|
||||||
|
break;
|
||||||
|
|
||||||
|
case T_ECLIST:
|
||||||
|
var->type = T_EC;
|
||||||
|
step = ec_set_walk(v1.val.ad, &v2.val.i, &var->val.ec);
|
||||||
|
break;
|
||||||
|
|
||||||
|
case T_LCLIST:
|
||||||
|
var->type = T_LC;
|
||||||
|
step = lc_set_walk(v1.val.ad, &v2.val.i, &var->val.lc);
|
||||||
|
break;
|
||||||
|
|
||||||
|
default:
|
||||||
|
runtime( "Clist or lclist expected" );
|
||||||
|
}
|
||||||
|
|
||||||
|
if (step)
|
||||||
|
{
|
||||||
|
/* Keep v1 and v2 on the stack */
|
||||||
|
fstk->vcnt += 2;
|
||||||
|
|
||||||
|
/* Repeat this instruction */
|
||||||
|
curline.pos--;
|
||||||
|
|
||||||
|
/* Execute the loop body */
|
||||||
|
LINE(1, 0);
|
||||||
|
|
||||||
|
/* Space for loop variable, may be unused */
|
||||||
|
fstk->vcnt += 1;
|
||||||
|
}
|
||||||
|
else
|
||||||
|
var->type = T_VOID;
|
||||||
|
}
|
||||||
|
|
||||||
INST(FI_CONDITION, 1, 0) {
|
INST(FI_CONDITION, 1, 0) {
|
||||||
ARG(1, T_BOOL);
|
ARG(1, T_BOOL);
|
||||||
if (v1.val.i)
|
if (v1.val.i)
|
||||||
LINE(2,0);
|
LINE(2,0);
|
||||||
else
|
else
|
||||||
LINE(3,1);
|
LINE(3,0);
|
||||||
}
|
}
|
||||||
|
|
||||||
INST(FI_PRINT, 0, 0) {
|
INST(FI_PRINT, 0, 0) {
|
||||||
@ -961,7 +1120,7 @@
|
|||||||
RESULT(T_INT, i, v1.val.lc.ldp2);
|
RESULT(T_INT, i, v1.val.lc.ldp2);
|
||||||
}
|
}
|
||||||
|
|
||||||
INST(FI_MIN, 1, 1) { /* Get minimum element from set */
|
INST(FI_MIN, 1, 1) { /* Get minimum element from list */
|
||||||
ARG_ANY(1);
|
ARG_ANY(1);
|
||||||
RESULT_TYPE(f_type_element_type(v1.type));
|
RESULT_TYPE(f_type_element_type(v1.type));
|
||||||
switch(v1.type)
|
switch(v1.type)
|
||||||
@ -995,7 +1154,7 @@
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
INST(FI_MAX, 1, 1) { /* Get maximum element from set */
|
INST(FI_MAX, 1, 1) { /* Get maximum element from list */
|
||||||
ARG_ANY(1);
|
ARG_ANY(1);
|
||||||
RESULT_TYPE(f_type_element_type(v1.type));
|
RESULT_TYPE(f_type_element_type(v1.type));
|
||||||
switch(v1.type)
|
switch(v1.type)
|
||||||
@ -1029,7 +1188,7 @@
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
INST(FI_RETURN, 1, 1) {
|
INST(FI_RETURN, 1, 0) {
|
||||||
NEVER_CONSTANT;
|
NEVER_CONSTANT;
|
||||||
/* Acquire the return value */
|
/* Acquire the return value */
|
||||||
ARG_ANY(1);
|
ARG_ANY(1);
|
||||||
@ -1057,28 +1216,59 @@
|
|||||||
|
|
||||||
INST(FI_CALL, 0, 1) {
|
INST(FI_CALL, 0, 1) {
|
||||||
NEVER_CONSTANT;
|
NEVER_CONSTANT;
|
||||||
|
VARARG;
|
||||||
SYMBOL;
|
SYMBOL;
|
||||||
|
|
||||||
|
/* Fake result type declaration */
|
||||||
|
RESULT_TYPE(T_VOID);
|
||||||
|
|
||||||
|
FID_NEW_BODY()
|
||||||
|
ASSERT(sym->class == SYM_FUNCTION);
|
||||||
|
|
||||||
|
if (whati->varcount != sym->function->args)
|
||||||
|
cf_error("Function '%s' expects %u arguments, got %u arguments",
|
||||||
|
sym->name, sym->function->args, whati->varcount);
|
||||||
|
|
||||||
|
/* Typecheck individual arguments */
|
||||||
|
struct f_inst *a = fvar;
|
||||||
|
struct f_arg *b = sym->function->arg_list;
|
||||||
|
for (uint i = 1; a && b; a = a->next, b = b->next, i++)
|
||||||
|
{
|
||||||
|
enum f_type b_type = b->arg->class & 0xff;
|
||||||
|
|
||||||
|
if (a->type && (a->type != b_type) && !f_const_promotion(a, b_type))
|
||||||
|
cf_error("Argument %u of '%s' must be %s, got %s",
|
||||||
|
i, sym->name, f_type_name(b_type), f_type_name(a->type));
|
||||||
|
}
|
||||||
|
ASSERT(!a && !b);
|
||||||
|
|
||||||
|
/* Add implicit void slot for the return value */
|
||||||
|
struct f_inst *tmp = f_new_inst(FI_CONSTANT, (struct f_val) { .type = T_VOID });
|
||||||
|
tmp->next = whati->fvar;
|
||||||
|
whati->fvar = tmp;
|
||||||
|
what->size += tmp->size;
|
||||||
|
|
||||||
|
/* Mark recursive calls, they have dummy f_line */
|
||||||
|
if (!sym->function->len)
|
||||||
|
what->flags |= FIF_RECURSIVE;
|
||||||
|
|
||||||
FID_SAME_BODY()
|
FID_SAME_BODY()
|
||||||
if (!(f1->sym->flags & SYM_FLAG_SAME))
|
if (!(f1->sym->flags & SYM_FLAG_SAME) && !(f1_->flags & FIF_RECURSIVE))
|
||||||
return 0;
|
return 0;
|
||||||
|
|
||||||
FID_ITERATE_BODY()
|
FID_ITERATE_BODY()
|
||||||
|
if (!(what->flags & FIF_RECURSIVE))
|
||||||
BUFFER_PUSH(fit->lines) = whati->sym->function;
|
BUFFER_PUSH(fit->lines) = whati->sym->function;
|
||||||
|
|
||||||
FID_INTERPRET_BODY()
|
FID_INTERPRET_BODY()
|
||||||
|
|
||||||
/* Push the body on stack */
|
/* Push the body on stack */
|
||||||
LINEX(sym->function);
|
LINEX(sym->function);
|
||||||
|
curline.vbase = curline.ventry;
|
||||||
curline.emask |= FE_RETURN;
|
curline.emask |= FE_RETURN;
|
||||||
|
|
||||||
/* Before this instruction was called, there was the T_VOID
|
/* Arguments on stack */
|
||||||
* automatic return value pushed on value stack and also
|
fstk->vcnt += sym->function->args;
|
||||||
* sym->function->args function arguments. Setting the
|
|
||||||
* vbase to point to first argument. */
|
|
||||||
ASSERT(curline.ventry >= sym->function->args);
|
|
||||||
curline.ventry -= sym->function->args;
|
|
||||||
curline.vbase = curline.ventry;
|
|
||||||
|
|
||||||
/* Storage for local variables */
|
/* Storage for local variables */
|
||||||
f_vcnt_check_overflow(sym->function->vars);
|
f_vcnt_check_overflow(sym->function->vars);
|
||||||
@ -1192,17 +1382,10 @@
|
|||||||
|
|
||||||
if (v1.type == T_PATH)
|
if (v1.type == T_PATH)
|
||||||
{
|
{
|
||||||
const struct f_tree *set = NULL;
|
if ((v2.type == T_SET) && path_set_type(v2.val.t) || (v2.type == T_INT))
|
||||||
u32 key = 0;
|
RESULT_(T_PATH, ad, [[ as_path_filter(fpool, v1.val.ad, &v2, 0) ]]);
|
||||||
|
|
||||||
if (v2.type == T_INT)
|
|
||||||
key = v2.val.i;
|
|
||||||
else if ((v2.type == T_SET) && (v2.val.t->from.type == T_INT))
|
|
||||||
set = v2.val.t;
|
|
||||||
else
|
else
|
||||||
runtime("Can't delete non-integer (set)");
|
runtime("Can't delete non-integer (set)");
|
||||||
|
|
||||||
RESULT_(T_PATH, ad, [[ as_path_filter(fpool, v1.val.ad, set, key, 0) ]]);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
else if (v1.type == T_CLIST)
|
else if (v1.type == T_CLIST)
|
||||||
@ -1254,10 +1437,8 @@
|
|||||||
|
|
||||||
if (v1.type == T_PATH)
|
if (v1.type == T_PATH)
|
||||||
{
|
{
|
||||||
u32 key = 0;
|
if ((v2.type == T_SET) && path_set_type(v2.val.t))
|
||||||
|
RESULT_(T_PATH, ad, [[ as_path_filter(fpool, v1.val.ad, &v2, 1) ]]);
|
||||||
if ((v2.type == T_SET) && (v2.val.t->from.type == T_INT))
|
|
||||||
RESULT_(T_PATH, ad, [[ as_path_filter(fpool, v1.val.ad, v2.val.t, key, 1) ]]);
|
|
||||||
else
|
else
|
||||||
runtime("Can't filter integer");
|
runtime("Can't filter integer");
|
||||||
}
|
}
|
||||||
@ -1347,7 +1528,7 @@
|
|||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
INST(FI_FORMAT, 1, 0) { /* Format */
|
INST(FI_FORMAT, 1, 1) { /* Format */
|
||||||
ARG_ANY(1);
|
ARG_ANY(1);
|
||||||
RESULT(T_STRING, s, val_format_str(fpool, &v1));
|
RESULT(T_STRING, s, val_format_str(fpool, &v1));
|
||||||
}
|
}
|
||||||
|
@ -22,7 +22,7 @@
|
|||||||
|
|
||||||
/* Flags for instructions */
|
/* Flags for instructions */
|
||||||
enum f_instruction_flags {
|
enum f_instruction_flags {
|
||||||
FIF_PRINTED = 1, /* FI_PRINT_AND_DIE: message put in buffer */
|
FIF_RECURSIVE = 1, /* FI_CALL: function is directly recursive */
|
||||||
} PACKED;
|
} PACKED;
|
||||||
|
|
||||||
/* Include generated filter instruction declarations */
|
/* Include generated filter instruction declarations */
|
||||||
@ -35,19 +35,26 @@ const char *f_instruction_name_(enum f_instruction_code fi);
|
|||||||
static inline const char *f_instruction_name(enum f_instruction_code fi)
|
static inline const char *f_instruction_name(enum f_instruction_code fi)
|
||||||
{ return f_instruction_name_(fi) + 3; }
|
{ return f_instruction_name_(fi) + 3; }
|
||||||
|
|
||||||
|
struct f_arg {
|
||||||
|
struct symbol *arg;
|
||||||
|
struct f_arg *next;
|
||||||
|
};
|
||||||
|
|
||||||
/* Filter structures for execution */
|
/* Filter structures for execution */
|
||||||
/* Line of instructions to be unconditionally executed one after another */
|
/* Line of instructions to be unconditionally executed one after another */
|
||||||
struct f_line {
|
struct f_line {
|
||||||
uint len; /* Line length */
|
uint len; /* Line length */
|
||||||
u8 args; /* Function: Args required */
|
u8 args; /* Function: Args required */
|
||||||
u8 vars;
|
u8 vars;
|
||||||
|
u8 results; /* Results left on stack: cmd -> 0, term -> 1 */
|
||||||
|
struct f_arg *arg_list;
|
||||||
struct f_line_item items[0]; /* The items themselves */
|
struct f_line_item items[0]; /* The items themselves */
|
||||||
};
|
};
|
||||||
|
|
||||||
/* Convert the f_inst infix tree to the f_line structures */
|
/* Convert the f_inst infix tree to the f_line structures */
|
||||||
struct f_line *f_linearize_concat(const struct f_inst * const inst[], uint count);
|
struct f_line *f_linearize_concat(const struct f_inst * const inst[], uint count, uint results);
|
||||||
static inline struct f_line *f_linearize(const struct f_inst *root)
|
static inline struct f_line *f_linearize(const struct f_inst *root, uint results)
|
||||||
{ return f_linearize_concat(&root, 1); }
|
{ return f_linearize_concat(&root, 1, results); }
|
||||||
|
|
||||||
void f_dump_line(const struct f_line *, uint indent);
|
void f_dump_line(const struct f_line *, uint indent);
|
||||||
|
|
||||||
|
@ -37,7 +37,7 @@ struct filter *f_new_where(struct f_inst *where)
|
|||||||
f_new_inst(FI_DIE, F_REJECT));
|
f_new_inst(FI_DIE, F_REJECT));
|
||||||
|
|
||||||
struct filter *f = cfg_allocz(sizeof(struct filter));
|
struct filter *f = cfg_allocz(sizeof(struct filter));
|
||||||
f->root = f_linearize(cond);
|
f->root = f_linearize(cond, 0);
|
||||||
return f;
|
return f;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -220,8 +220,7 @@ interpret(struct filter_state *fs, const struct f_line *line, struct f_val *val)
|
|||||||
}
|
}
|
||||||
|
|
||||||
/* End of current line. Drop local variables before exiting. */
|
/* End of current line. Drop local variables before exiting. */
|
||||||
fstk->vcnt -= curline.line->vars;
|
fstk->vcnt = curline.ventry + curline.line->results;
|
||||||
fstk->vcnt -= curline.line->args;
|
|
||||||
fstk->ecnt--;
|
fstk->ecnt--;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
210
filter/test.conf
210
filter/test.conf
@ -44,9 +44,8 @@ bt_test_same(onef, twof, 0);
|
|||||||
*/
|
*/
|
||||||
|
|
||||||
function t_bool()
|
function t_bool()
|
||||||
bool b;
|
|
||||||
{
|
{
|
||||||
b = true;
|
bool b = true;
|
||||||
bt_assert(b);
|
bt_assert(b);
|
||||||
bt_assert(!!b);
|
bt_assert(!!b);
|
||||||
|
|
||||||
@ -82,12 +81,11 @@ define xyzzy = (120+10);
|
|||||||
define '1a-a1' = (xyzzy-100);
|
define '1a-a1' = (xyzzy-100);
|
||||||
|
|
||||||
function t_int()
|
function t_int()
|
||||||
int i;
|
|
||||||
{
|
{
|
||||||
bt_assert(xyzzy = 130);
|
bt_assert(xyzzy = 130);
|
||||||
bt_assert('1a-a1' = 30);
|
bt_assert('1a-a1' = 30);
|
||||||
|
|
||||||
i = four;
|
int i = four;
|
||||||
i = 12*100 + 60/2 + i;
|
i = 12*100 + 60/2 + i;
|
||||||
i = (i + 0);
|
i = (i + 0);
|
||||||
bt_assert(i = 1234);
|
bt_assert(i = 1234);
|
||||||
@ -128,14 +126,19 @@ define is2 = [(17+2), 17, 15, 11, 8, 5, 3, 2];
|
|||||||
define is3 = [5, 17, 2, 11, 8, 15, 3, 19];
|
define is3 = [5, 17, 2, 11, 8, 15, 3, 19];
|
||||||
|
|
||||||
function t_int_set()
|
function t_int_set()
|
||||||
int set is;
|
|
||||||
{
|
{
|
||||||
|
int set is = [];
|
||||||
|
bt_assert(is = []);
|
||||||
|
bt_assert(0 !~ is);
|
||||||
|
|
||||||
bt_assert(1 ~ [1,2,3]);
|
bt_assert(1 ~ [1,2,3]);
|
||||||
bt_assert(5 ~ [1..20]);
|
bt_assert(5 ~ [1..20]);
|
||||||
bt_assert(2 ~ [ 1, 2, 3 ]);
|
bt_assert(2 ~ [ 1, 2, 3 ]);
|
||||||
bt_assert(5 ~ [ 4 .. 7 ]);
|
bt_assert(5 ~ [ 4 .. 7 ]);
|
||||||
bt_assert(1 !~ [ 2, 3, 4 ]);
|
bt_assert(1 !~ [ 2, 3, 4 ]);
|
||||||
bt_assert(999 !~ [ 666, 333 ]);
|
bt_assert(999 !~ [ 666, 333 ]);
|
||||||
|
bt_assert(1 !~ []);
|
||||||
|
bt_assert(1 !~ is);
|
||||||
|
|
||||||
is = [ 2, 3, 4, 7..11 ];
|
is = [ 2, 3, 4, 7..11 ];
|
||||||
bt_assert(10 ~ is);
|
bt_assert(10 ~ is);
|
||||||
@ -170,6 +173,7 @@ int set is;
|
|||||||
bt_assert([1,4..10,20] = [1,4..10,20]);
|
bt_assert([1,4..10,20] = [1,4..10,20]);
|
||||||
|
|
||||||
bt_assert(format([ 1, 2, 1, 1, 1, 3, 4, 1, 1, 1, 5 ]) = "[1, 1, 1, 1, 1, 1, 1, 2, 3, 4, 5]");
|
bt_assert(format([ 1, 2, 1, 1, 1, 3, 4, 1, 1, 1, 5 ]) = "[1, 1, 1, 1, 1, 1, 1, 2, 3, 4, 5]");
|
||||||
|
bt_assert(format([]) = "[]");
|
||||||
}
|
}
|
||||||
|
|
||||||
bt_test_suite(t_int_set, "Testing sets of integers");
|
bt_test_suite(t_int_set, "Testing sets of integers");
|
||||||
@ -183,9 +187,8 @@ bt_test_suite(t_int_set, "Testing sets of integers");
|
|||||||
*/
|
*/
|
||||||
|
|
||||||
function t_string()
|
function t_string()
|
||||||
string st;
|
|
||||||
{
|
{
|
||||||
st = "Hello";
|
string st = "Hello";
|
||||||
bt_assert(format(st) = "Hello");
|
bt_assert(format(st) = "Hello");
|
||||||
bt_assert(st ~ "Hell*");
|
bt_assert(st ~ "Hell*");
|
||||||
bt_assert(st ~ "?ello");
|
bt_assert(st ~ "?ello");
|
||||||
@ -210,9 +213,8 @@ function 'mkpair-a'(int a)
|
|||||||
}
|
}
|
||||||
|
|
||||||
function t_pair()
|
function t_pair()
|
||||||
pair pp;
|
|
||||||
{
|
{
|
||||||
pp = (1, 2);
|
pair pp = (1, 2);
|
||||||
bt_assert(format(pp) = "(1,2)");
|
bt_assert(format(pp) = "(1,2)");
|
||||||
bt_assert((1,2) = pp);
|
bt_assert((1,2) = pp);
|
||||||
bt_assert((1,1+1) = pp);
|
bt_assert((1,1+1) = pp);
|
||||||
@ -233,10 +235,11 @@ bt_test_suite(t_pair, "Testing pairs");
|
|||||||
*/
|
*/
|
||||||
|
|
||||||
function t_pair_set()
|
function t_pair_set()
|
||||||
pair pp;
|
|
||||||
pair set ps;
|
|
||||||
{
|
{
|
||||||
pp = (1, 2);
|
pair pp = (1, 2);
|
||||||
|
pair set ps = [];
|
||||||
|
bt_assert(pp !~ ps);
|
||||||
|
|
||||||
ps = [(1,(one+one)), (3,4)..(4,8), (5,*), (6,3..6)];
|
ps = [(1,(one+one)), (3,4)..(4,8), (5,*), (6,3..6)];
|
||||||
bt_assert(format(ps) = "[(1,2), (3,4)..(4,8), (5,0)..(5,65535), (6,3)..(6,6)]");
|
bt_assert(format(ps) = "[(1,2), (3,4)..(4,8), (5,0)..(5,65535), (6,3)..(6,6)]");
|
||||||
bt_assert(pp ~ ps);
|
bt_assert(pp ~ ps);
|
||||||
@ -253,6 +256,7 @@ pair set ps;
|
|||||||
bt_assert((6,6+one) !~ ps);
|
bt_assert((6,6+one) !~ ps);
|
||||||
bt_assert(((one+6),2) !~ ps);
|
bt_assert(((one+6),2) !~ ps);
|
||||||
bt_assert((1,1) !~ ps);
|
bt_assert((1,1) !~ ps);
|
||||||
|
bt_assert(pp !~ []);
|
||||||
|
|
||||||
ps = [(20..150, 200..300), (50100..50200, 1000..50000), (*, 5+5)];
|
ps = [(20..150, 200..300), (50100..50200, 1000..50000), (*, 5+5)];
|
||||||
bt_assert((100,200) ~ ps);
|
bt_assert((100,200) ~ ps);
|
||||||
@ -304,6 +308,7 @@ quad qq;
|
|||||||
qq = 1.2.3.4;
|
qq = 1.2.3.4;
|
||||||
bt_assert(qq ~ [1.2.3.4, 5.6.7.8]);
|
bt_assert(qq ~ [1.2.3.4, 5.6.7.8]);
|
||||||
bt_assert(qq !~ [1.2.1.1, 1.2.3.5]);
|
bt_assert(qq !~ [1.2.1.1, 1.2.3.5]);
|
||||||
|
bt_assert(qq !~ []);
|
||||||
}
|
}
|
||||||
|
|
||||||
bt_test_suite(t_quad_set, "Testing sets of quads");
|
bt_test_suite(t_quad_set, "Testing sets of quads");
|
||||||
@ -384,6 +389,7 @@ ip set ips;
|
|||||||
|
|
||||||
bt_assert(1.2.3.4 !~ [ 1.2.3.3, 1.2.3.5 ]);
|
bt_assert(1.2.3.4 !~ [ 1.2.3.3, 1.2.3.5 ]);
|
||||||
bt_assert(1.2.3.4 ~ [ 1.2.3.3..1.2.3.5 ]);
|
bt_assert(1.2.3.4 ~ [ 1.2.3.3..1.2.3.5 ]);
|
||||||
|
bt_assert(1.2.3.4 !~ []);
|
||||||
}
|
}
|
||||||
|
|
||||||
bt_test_suite(t_ip_set, "Testing sets of ip address");
|
bt_test_suite(t_ip_set, "Testing sets of ip address");
|
||||||
@ -472,13 +478,34 @@ function test_pxset(prefix set pxs)
|
|||||||
bt_assert(1.0.0.0/8 ~ [ 1.0.0.0/8+ ]);
|
bt_assert(1.0.0.0/8 ~ [ 1.0.0.0/8+ ]);
|
||||||
bt_assert(1.0.0.0/9 !~ [ 1.0.0.0/8- ]);
|
bt_assert(1.0.0.0/9 !~ [ 1.0.0.0/8- ]);
|
||||||
bt_assert(1.2.0.0/17 !~ [ 1.0.0.0/8{ 15 , 16 } ]);
|
bt_assert(1.2.0.0/17 !~ [ 1.0.0.0/8{ 15 , 16 } ]);
|
||||||
|
bt_assert(net10 !~ []);
|
||||||
|
|
||||||
bt_assert([ 10.0.0.0/8{ 15 , 17 } ] = [ 10.0.0.0/8{ 15 , 17 } ]);
|
bt_assert([ 10.0.0.0/8{ 15 , 17 } ] = [ 10.0.0.0/8{ 15 , 17 } ]);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
function test_empty_pxset(prefix set pxs)
|
||||||
|
int set s0;
|
||||||
|
prefix set s1;
|
||||||
|
{
|
||||||
|
s0 = [];
|
||||||
|
s1 = [];
|
||||||
|
bt_assert(pxs != s0);
|
||||||
|
bt_assert(pxs = s1);
|
||||||
|
bt_assert(pxs = []);
|
||||||
|
}
|
||||||
|
|
||||||
function t_prefix_set()
|
function t_prefix_set()
|
||||||
prefix set pxs;
|
prefix set pxs;
|
||||||
{
|
{
|
||||||
|
pxs = [];
|
||||||
|
bt_assert(format(pxs) = "[]");
|
||||||
|
bt_assert(pxs = []);
|
||||||
|
bt_assert(1.2.0.0/16 !~ []);
|
||||||
|
bt_assert(1.2.0.0/16 !~ pxs);
|
||||||
|
|
||||||
|
test_empty_pxset([]);
|
||||||
|
test_empty_pxset(pxs);
|
||||||
|
|
||||||
pxs = [ 1.2.0.0/16, 1.4.0.0/16+, 44.66.88.64/30{24,28}, 12.34.56.0/24{8,16} ];
|
pxs = [ 1.2.0.0/16, 1.4.0.0/16+, 44.66.88.64/30{24,28}, 12.34.56.0/24{8,16} ];
|
||||||
bt_assert(format(pxs) = "[1.2.0.0/16{0.1.0.0}, 1.4.0.0/16{0.1.255.255}, 12.34.0.0/16{1.255.0.0}, 44.66.88.64/28{0.0.1.240}]");
|
bt_assert(format(pxs) = "[1.2.0.0/16{0.1.0.0}, 1.4.0.0/16{0.1.255.255}, 12.34.0.0/16{1.255.0.0}, 44.66.88.64/28{0.0.1.240}]");
|
||||||
|
|
||||||
@ -563,6 +590,12 @@ bt_test_suite(t_prefix6, "Testing prefix IPv6");
|
|||||||
function t_prefix6_set()
|
function t_prefix6_set()
|
||||||
prefix set pxs;
|
prefix set pxs;
|
||||||
{
|
{
|
||||||
|
pxs = [];
|
||||||
|
bt_assert(format(pxs) = "[]");
|
||||||
|
bt_assert(pxs = []);
|
||||||
|
bt_assert(12::34/128 !~ []);
|
||||||
|
bt_assert(12::34/128 !~ pxs);
|
||||||
|
|
||||||
bt_assert(1180::/16 ~ [ 1100::/8{15, 17} ]);
|
bt_assert(1180::/16 ~ [ 1100::/8{15, 17} ]);
|
||||||
bt_assert(12::34 = 12::34);
|
bt_assert(12::34 = 12::34);
|
||||||
bt_assert(12::34 ~ [ 12::33..12::35 ]);
|
bt_assert(12::34 ~ [ 12::33..12::35 ]);
|
||||||
@ -680,6 +713,7 @@ int set set12;
|
|||||||
bt_assert(3 ~ p2);
|
bt_assert(3 ~ p2);
|
||||||
bt_assert(p2 ~ [2, 10..20]);
|
bt_assert(p2 ~ [2, 10..20]);
|
||||||
bt_assert(p2 ~ [4, 10..20]);
|
bt_assert(p2 ~ [4, 10..20]);
|
||||||
|
bt_assert(p2 !~ []);
|
||||||
|
|
||||||
p2 = prepend(p2, 5);
|
p2 = prepend(p2, 5);
|
||||||
bt_assert(p2 !~ pm1);
|
bt_assert(p2 !~ pm1);
|
||||||
@ -690,6 +724,8 @@ int set set12;
|
|||||||
bt_assert(p2 ~ [= 5 [2, 4, 6] 3 [1..2] 1 =]);
|
bt_assert(p2 ~ [= 5 [2, 4, 6] 3 [1..2] 1 =]);
|
||||||
bt_assert(p2 ~ [= 5 set35 3 set12 set12 =]);
|
bt_assert(p2 ~ [= 5 set35 3 set12 set12 =]);
|
||||||
bt_assert(p2 ~ mkpath(5, 4));
|
bt_assert(p2 ~ mkpath(5, 4));
|
||||||
|
bt_assert(p2 ~ [= * [3] * =]);
|
||||||
|
bt_assert(p2 !~ [= * [] * =]);
|
||||||
|
|
||||||
bt_assert(p2.len = 5);
|
bt_assert(p2.len = 5);
|
||||||
bt_assert(p2.first = 5);
|
bt_assert(p2.first = 5);
|
||||||
@ -698,6 +734,10 @@ int set set12;
|
|||||||
bt_assert(p2.len = 5);
|
bt_assert(p2.len = 5);
|
||||||
bt_assert(delete(p2, 3) = prepend(prepend(prepend(prepend(+empty+, 1), 2), 4), 5));
|
bt_assert(delete(p2, 3) = prepend(prepend(prepend(prepend(+empty+, 1), 2), 4), 5));
|
||||||
bt_assert(filter(p2, [1..3]) = prepend(prepend(prepend(+empty+, 1), 2), 3));
|
bt_assert(filter(p2, [1..3]) = prepend(prepend(prepend(+empty+, 1), 2), 3));
|
||||||
|
bt_assert(delete(p2, []) = p2);
|
||||||
|
bt_assert(filter(p2, []) = +empty+);
|
||||||
|
bt_assert(delete(prepend(prepend(+empty+, 0), 1), []) = prepend(prepend(+empty+, 0), 1));
|
||||||
|
bt_assert(filter(prepend(prepend(+empty+, 0), 1), []) = +empty+);
|
||||||
|
|
||||||
p2 = prepend( + empty +, 5 );
|
p2 = prepend( + empty +, 5 );
|
||||||
p2 = prepend( p2, 4 );
|
p2 = prepend( p2, 4 );
|
||||||
@ -717,6 +757,15 @@ int set set12;
|
|||||||
bt_assert(delete(p2, [4..5]) = prepend(prepend(prepend(prepend(+empty+, 3), 3), 2), 1));
|
bt_assert(delete(p2, [4..5]) = prepend(prepend(prepend(prepend(+empty+, 3), 3), 2), 1));
|
||||||
|
|
||||||
bt_assert(format([= 1 2+ 3 =]) = "[= 1 2 + 3 =]");
|
bt_assert(format([= 1 2+ 3 =]) = "[= 1 2 + 3 =]");
|
||||||
|
|
||||||
|
# iteration over path
|
||||||
|
int x = 0;
|
||||||
|
int y = 0;
|
||||||
|
for int i in p2 do {
|
||||||
|
x = x + i;
|
||||||
|
y = y + x;
|
||||||
|
}
|
||||||
|
bt_assert(x = 18 && y = 50);
|
||||||
}
|
}
|
||||||
|
|
||||||
bt_test_suite(t_path, "Testing paths");
|
bt_test_suite(t_path, "Testing paths");
|
||||||
@ -758,6 +807,7 @@ clist r;
|
|||||||
bt_assert(l ~ [(2,2..3)]);
|
bt_assert(l ~ [(2,2..3)]);
|
||||||
bt_assert(l ~ [(1,1..2)]);
|
bt_assert(l ~ [(1,1..2)]);
|
||||||
bt_assert(l ~ [(1,1)..(1,2)]);
|
bt_assert(l ~ [(1,1)..(1,2)]);
|
||||||
|
bt_assert(l !~ []);
|
||||||
|
|
||||||
l = add(l, (2,5));
|
l = add(l, (2,5));
|
||||||
l = add(l, (5,one));
|
l = add(l, (5,one));
|
||||||
@ -795,6 +845,9 @@ clist r;
|
|||||||
bt_assert(l !~ [(*,(one+6))]);
|
bt_assert(l !~ [(*,(one+6))]);
|
||||||
bt_assert(l !~ [(*, (one+one+one))]);
|
bt_assert(l !~ [(*, (one+one+one))]);
|
||||||
|
|
||||||
|
bt_assert(delete(l, []) = l);
|
||||||
|
bt_assert(filter(l, []) = -empty-);
|
||||||
|
|
||||||
l = delete(l, [(*,(one+onef(3)))]);
|
l = delete(l, [(*,(one+onef(3)))]);
|
||||||
l = delete(l, [(*,(4+one))]);
|
l = delete(l, [(*,(4+one))]);
|
||||||
bt_assert(l = add(-empty-, (3,1)));
|
bt_assert(l = add(-empty-, (3,1)));
|
||||||
@ -839,6 +892,12 @@ clist r;
|
|||||||
bt_assert(format(r) = "(clist (2,1) (1,3) (2,2) (3,1) (2,3))");
|
bt_assert(format(r) = "(clist (2,1) (1,3) (2,2) (3,1) (2,3))");
|
||||||
bt_assert(r.min = (1,3));
|
bt_assert(r.min = (1,3));
|
||||||
bt_assert(r.max = (3,1));
|
bt_assert(r.max = (3,1));
|
||||||
|
|
||||||
|
# iteration over clist
|
||||||
|
int x = 0;
|
||||||
|
for pair c in r do
|
||||||
|
x = x + c.asn * c.asn * c.data;
|
||||||
|
bt_assert(x = 36);
|
||||||
}
|
}
|
||||||
|
|
||||||
bt_test_suite(t_clist, "Testing lists of communities");
|
bt_test_suite(t_clist, "Testing lists of communities");
|
||||||
@ -912,11 +971,15 @@ eclist r;
|
|||||||
bt_assert((ro, 10.20.30.40, 100) !~ el);
|
bt_assert((ro, 10.20.30.40, 100) !~ el);
|
||||||
bt_assert(el !~ [(rt, 10, 35..40)]);
|
bt_assert(el !~ [(rt, 10, 35..40)]);
|
||||||
bt_assert(el !~ [(ro, 10, *)]);
|
bt_assert(el !~ [(ro, 10, *)]);
|
||||||
|
bt_assert(el !~ []);
|
||||||
|
|
||||||
el = add(el, (rt, 10, 40));
|
el = add(el, (rt, 10, 40));
|
||||||
el2 = filter(el, [(rt, 10, 20..40)] );
|
el2 = filter(el, [(rt, 10, 20..40)] );
|
||||||
el2 = add(el2, (rt, 10, 50));
|
el2 = add(el2, (rt, 10, 50));
|
||||||
|
|
||||||
|
bt_assert(delete(el, []) = el);
|
||||||
|
bt_assert(filter(el, []) = --empty--);
|
||||||
|
|
||||||
# eclist A (1,30,40)
|
# eclist A (1,30,40)
|
||||||
bt_assert(el = add(add(add(--empty--, (rt, 10, 1)), (rt, 10, 30)), (rt, 10, 40)));
|
bt_assert(el = add(add(add(--empty--, (rt, 10, 1)), (rt, 10, 30)), (rt, 10, 40)));
|
||||||
bt_assert(format(el) = "(eclist (rt, 10, 1) (rt, 10, 30) (rt, 10, 40))");
|
bt_assert(format(el) = "(eclist (rt, 10, 1) (rt, 10, 30) (rt, 10, 40))");
|
||||||
@ -950,6 +1013,13 @@ eclist r;
|
|||||||
bt_assert(format(r) = "(eclist (rt, 2, 1) (rt, 1, 3) (rt, 2, 2) (rt, 3, 1) (rt, 2, 3))");
|
bt_assert(format(r) = "(eclist (rt, 2, 1) (rt, 1, 3) (rt, 2, 2) (rt, 3, 1) (rt, 2, 3))");
|
||||||
bt_assert(r.min = (rt, 1, 3));
|
bt_assert(r.min = (rt, 1, 3));
|
||||||
bt_assert(r.max = (rt, 3, 1));
|
bt_assert(r.max = (rt, 3, 1));
|
||||||
|
|
||||||
|
# iteration over eclist
|
||||||
|
int x = 0;
|
||||||
|
for ec c in r do
|
||||||
|
if c > (rt, 2, 0) && c < (rt, 3, 0) then
|
||||||
|
x = x + 1;
|
||||||
|
bt_assert(x = 3);
|
||||||
}
|
}
|
||||||
|
|
||||||
bt_test_suite(t_eclist, "Testing lists of extended communities");
|
bt_test_suite(t_eclist, "Testing lists of extended communities");
|
||||||
@ -1034,6 +1104,9 @@ lclist r;
|
|||||||
ll2 = add(ll2, (30, 30, 30));
|
ll2 = add(ll2, (30, 30, 30));
|
||||||
ll2 = add(ll2, (40, 40, 40));
|
ll2 = add(ll2, (40, 40, 40));
|
||||||
|
|
||||||
|
bt_assert(delete(ll, []) = ll);
|
||||||
|
bt_assert(filter(ll, []) = ---empty---);
|
||||||
|
|
||||||
# lclist A (10, 20, 30)
|
# lclist A (10, 20, 30)
|
||||||
bt_assert(format(ll) = "(lclist (10, 10, 10) (20, 20, 20) (30, 30, 30))");
|
bt_assert(format(ll) = "(lclist (10, 10, 10) (20, 20, 20) (30, 30, 30))");
|
||||||
|
|
||||||
@ -1065,6 +1138,19 @@ lclist r;
|
|||||||
bt_assert(format(r) = "(lclist (2, 3, 3) (1, 2, 3) (2, 3, 1) (3, 1, 2) (2, 1, 3))");
|
bt_assert(format(r) = "(lclist (2, 3, 3) (1, 2, 3) (2, 3, 1) (3, 1, 2) (2, 1, 3))");
|
||||||
bt_assert(r.min = (1, 2, 3));
|
bt_assert(r.min = (1, 2, 3));
|
||||||
bt_assert(r.max = (3, 1, 2));
|
bt_assert(r.max = (3, 1, 2));
|
||||||
|
|
||||||
|
# iteration over lclist
|
||||||
|
int x = 0;
|
||||||
|
int y = 0;
|
||||||
|
lc mx = (0, 0, 0);
|
||||||
|
for lc c in r do {
|
||||||
|
int asn2 = c.asn * c.asn;
|
||||||
|
x = x + asn2 * c.data1;
|
||||||
|
y = y + asn2 * c.data2;
|
||||||
|
if c > mx then mx = c;
|
||||||
|
}
|
||||||
|
bt_assert(x = 39 && y = 49);
|
||||||
|
bt_assert(mx = r.max);
|
||||||
}
|
}
|
||||||
|
|
||||||
bt_test_suite(t_lclist, "Testing lists of large communities");
|
bt_test_suite(t_lclist, "Testing lists of large communities");
|
||||||
@ -1093,6 +1179,7 @@ lc set lls;
|
|||||||
bt_assert(ll !~ [(5,10,15), (10,21,30)]);
|
bt_assert(ll !~ [(5,10,15), (10,21,30)]);
|
||||||
bt_assert(ll !~ [(10,21..25,*)]);
|
bt_assert(ll !~ [(10,21..25,*)]);
|
||||||
bt_assert(ll !~ [(11, *, *)]);
|
bt_assert(ll !~ [(11, *, *)]);
|
||||||
|
bt_assert(ll !~ []);
|
||||||
|
|
||||||
lls = [(10, 10, 10), (20, 20, 15..25), (30, 30, *), (40, 35..45, *), (50, *, *), (55..65, *, *)];
|
lls = [(10, 10, 10), (20, 20, 15..25), (30, 30, *), (40, 35..45, *), (50, *, *), (55..65, *, *)];
|
||||||
bt_assert(format(lls) = "[(10, 10, 10), (20, 20, 15)..(20, 20, 25), (30, 30, 0)..(30, 30, 4294967295), (40, 35, 0)..(40, 45, 4294967295), (50, 0, 0)..(50, 4294967295, 4294967295), (55, 0, 0)..(65, 4294967295, 4294967295)]");
|
bt_assert(format(lls) = "[(10, 10, 10), (20, 20, 15)..(20, 20, 25), (30, 30, 0)..(30, 30, 4294967295), (40, 35, 0)..(40, 45, 4294967295), (50, 0, 0)..(50, 4294967295, 4294967295), (55, 0, 0)..(65, 4294967295, 4294967295)]");
|
||||||
@ -1149,6 +1236,10 @@ bt_test_suite(t_rd, "Testing route distinguishers");
|
|||||||
function t_rd_set()
|
function t_rd_set()
|
||||||
rd set rds;
|
rd set rds;
|
||||||
{
|
{
|
||||||
|
rds = [];
|
||||||
|
bt_assert(rds = []);
|
||||||
|
bt_assert(10:20 !~ rds);
|
||||||
|
|
||||||
rds = [10:20, 100000:100..100000:200];
|
rds = [10:20, 100000:100..100000:200];
|
||||||
bt_assert(format(rds) = "[10:20, 100000:100..100000:200]");
|
bt_assert(format(rds) = "[10:20, 100000:100..100000:200]");
|
||||||
|
|
||||||
@ -1159,6 +1250,7 @@ rd set rds;
|
|||||||
bt_assert(100000:128 ~ rds);
|
bt_assert(100000:128 ~ rds);
|
||||||
bt_assert(100000:200 ~ rds);
|
bt_assert(100000:200 ~ rds);
|
||||||
bt_assert(100010:150 !~ rds);
|
bt_assert(100010:150 !~ rds);
|
||||||
|
bt_assert(100010:150 !~ []);
|
||||||
}
|
}
|
||||||
|
|
||||||
bt_test_suite(t_rd_set, "Testing sets of route distinguishers");
|
bt_test_suite(t_rd_set, "Testing sets of route distinguishers");
|
||||||
@ -1225,7 +1317,85 @@ function fifteen()
|
|||||||
return 15;
|
return 15;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
function local_vars(int j)
|
||||||
|
{
|
||||||
|
int k = 10;
|
||||||
|
bt_assert(j = 5 && k = 10);
|
||||||
|
{
|
||||||
|
int j = 15;
|
||||||
|
k = 20;
|
||||||
|
bt_assert(j = 15 && k = 20);
|
||||||
|
}
|
||||||
|
bt_assert(j = 5 && k = 20);
|
||||||
|
|
||||||
|
if j < 10 then
|
||||||
|
{
|
||||||
|
int j = 25;
|
||||||
|
string k = "hello";
|
||||||
|
bt_assert(j = 25 && k = "hello");
|
||||||
|
}
|
||||||
|
bt_assert(j = 5 && k = 20);
|
||||||
|
|
||||||
|
int m = 100;
|
||||||
|
{
|
||||||
|
j = 35;
|
||||||
|
int k = 40;
|
||||||
|
bt_assert(j = 35 && k = 40 && m = 100);
|
||||||
|
}
|
||||||
|
bt_assert(j = 35 && k = 20 && m = 100);
|
||||||
|
}
|
||||||
|
|
||||||
|
function factorial(int x)
|
||||||
|
{
|
||||||
|
if x = 0 then return 0;
|
||||||
|
if x = 1 then return 1;
|
||||||
|
else return x * factorial(x - 1);
|
||||||
|
}
|
||||||
|
|
||||||
|
function fibonacci(int x)
|
||||||
|
{
|
||||||
|
if x = 0 then return 0;
|
||||||
|
if x = 1 then return 1;
|
||||||
|
else return fibonacci(x - 1) + fibonacci(x - 2);
|
||||||
|
}
|
||||||
|
|
||||||
|
function hanoi_init(int a; int b)
|
||||||
|
{
|
||||||
|
if b = 0
|
||||||
|
then return +empty+;
|
||||||
|
else return prepend(hanoi_init(a + 1, b - 1), a);
|
||||||
|
}
|
||||||
|
|
||||||
|
function hanoi_solve(int n; bgppath h_src; bgppath h_dst; bgppath h_aux; bool x; bool y)
|
||||||
|
{
|
||||||
|
# x -> return src or dst
|
||||||
|
# y -> print state
|
||||||
|
|
||||||
|
if n = 0 then { if x then return h_src; else return h_dst; }
|
||||||
|
|
||||||
|
bgppath tmp1 = hanoi_solve(n - 1, h_src, h_aux, h_dst, true, y);
|
||||||
|
bgppath tmp2 = hanoi_solve(n - 1, h_src, h_aux, h_dst, false, false);
|
||||||
|
h_src = tmp1;
|
||||||
|
h_aux = tmp2;
|
||||||
|
|
||||||
|
int v = h_src.first;
|
||||||
|
# bt_assert(h_dst = +empty+ || v < h_dst.first);
|
||||||
|
h_src = delete(h_src, v);
|
||||||
|
h_dst = prepend(h_dst, v);
|
||||||
|
|
||||||
|
if y then
|
||||||
|
print "move: ", v, " src: ", h_src, " dst:", h_dst, " aux:", h_aux;
|
||||||
|
|
||||||
|
tmp1 = hanoi_solve(n - 1, h_aux, h_dst, h_src, true, y);
|
||||||
|
tmp2 = hanoi_solve(n - 1, h_aux, h_dst, h_src, false, false);
|
||||||
|
h_aux = tmp1;
|
||||||
|
h_dst = tmp2;
|
||||||
|
|
||||||
|
if x then return h_src; else return h_dst;
|
||||||
|
}
|
||||||
|
|
||||||
function t_call_function()
|
function t_call_function()
|
||||||
|
bgppath h_src;
|
||||||
{
|
{
|
||||||
bt_assert(fifteen() = 15);
|
bt_assert(fifteen() = 15);
|
||||||
|
|
||||||
@ -1237,6 +1407,17 @@ function t_call_function()
|
|||||||
bt_assert(callme(4, 4) = 16);
|
bt_assert(callme(4, 4) = 16);
|
||||||
bt_assert(callme(7, 2) = 14);
|
bt_assert(callme(7, 2) = 14);
|
||||||
bt_assert(callmeagain(1, 2, 3) = 6);
|
bt_assert(callmeagain(1, 2, 3) = 6);
|
||||||
|
local_vars(5);
|
||||||
|
|
||||||
|
bt_assert(factorial(5) = 120);
|
||||||
|
bt_assert(factorial(10) = 3628800);
|
||||||
|
|
||||||
|
bt_assert(fibonacci(10) = 55);
|
||||||
|
bt_assert(fibonacci(20) = 6765);
|
||||||
|
|
||||||
|
h_src = hanoi_init(1, 6);
|
||||||
|
bt_assert(format(h_src) = "(path 1 2 3 4 5 6)");
|
||||||
|
bt_assert(hanoi_solve(6, h_src, +empty+, +empty+, false, false) = h_src);
|
||||||
}
|
}
|
||||||
|
|
||||||
bt_test_suite(t_call_function, "Testing calling functions");
|
bt_test_suite(t_call_function, "Testing calling functions");
|
||||||
@ -1433,13 +1614,16 @@ filter vpn_filter
|
|||||||
bt_assert(net.type != NET_IP6);
|
bt_assert(net.type != NET_IP6);
|
||||||
bt_assert(net.rd = 0:1:2);
|
bt_assert(net.rd = 0:1:2);
|
||||||
|
|
||||||
|
bool b = false;
|
||||||
case (net.type) {
|
case (net.type) {
|
||||||
NET_IP4: print "IPV4";
|
NET_IP4: print "IPV4";
|
||||||
NET_IP6: print "IPV6";
|
NET_IP6: print "IPV6";
|
||||||
|
else: b = true;
|
||||||
}
|
}
|
||||||
|
bt_assert(b);
|
||||||
|
|
||||||
bt_check_assign(from, 10.20.30.40);
|
bt_check_assign(from, 10.20.30.40);
|
||||||
bt_check_assign(gw, 55.55.55.44);
|
# bt_check_assign(gw, 55.55.55.44);
|
||||||
|
|
||||||
bgp_community.add((3,5));
|
bgp_community.add((3,5));
|
||||||
bgp_ext_community.add((ro, 135, 999));
|
bgp_ext_community.add((ro, 135, 999));
|
||||||
|
@ -602,8 +602,10 @@ as_path_match_set(const struct adata *path, const struct f_tree *set)
|
|||||||
}
|
}
|
||||||
|
|
||||||
const struct adata *
|
const struct adata *
|
||||||
as_path_filter(struct linpool *pool, const struct adata *path, const struct f_tree *set, u32 key, int pos)
|
as_path_filter(struct linpool *pool, const struct adata *path, const struct f_val *set, int pos)
|
||||||
{
|
{
|
||||||
|
ASSERT((set->type == T_SET) || (set->type == T_INT));
|
||||||
|
|
||||||
if (!path)
|
if (!path)
|
||||||
return NULL;
|
return NULL;
|
||||||
|
|
||||||
@ -629,13 +631,13 @@ as_path_filter(struct linpool *pool, const struct adata *path, const struct f_tr
|
|||||||
u32 as = get_as(p);
|
u32 as = get_as(p);
|
||||||
int match;
|
int match;
|
||||||
|
|
||||||
if (set)
|
if (set->type == T_SET)
|
||||||
{
|
{
|
||||||
struct f_val v = { .type = T_INT, .val.i = as};
|
struct f_val v = { .type = T_INT, .val.i = as};
|
||||||
match = !!find_tree(set, &v);
|
match = !!find_tree(set->val.t, &v);
|
||||||
}
|
}
|
||||||
else
|
else /* T_INT */
|
||||||
match = (as == key);
|
match = (as == set->val.i);
|
||||||
|
|
||||||
if (match == pos)
|
if (match == pos)
|
||||||
{
|
{
|
||||||
@ -667,6 +669,35 @@ as_path_filter(struct linpool *pool, const struct adata *path, const struct f_tr
|
|||||||
return res;
|
return res;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
int
|
||||||
|
as_path_walk(const struct adata *path, uint *pos, uint *val)
|
||||||
|
{
|
||||||
|
if (!path)
|
||||||
|
return 0;
|
||||||
|
|
||||||
|
const u8 *p = path->data;
|
||||||
|
const u8 *q = p + path->length;
|
||||||
|
uint n, x = *pos;
|
||||||
|
|
||||||
|
while (p < q)
|
||||||
|
{
|
||||||
|
n = p[1];
|
||||||
|
p += 2;
|
||||||
|
|
||||||
|
if (x < n)
|
||||||
|
{
|
||||||
|
*val = get_as(p + x * BS);
|
||||||
|
*pos += 1;
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
|
||||||
|
p += n * BS;
|
||||||
|
x -= n;
|
||||||
|
}
|
||||||
|
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
struct pm_pos
|
struct pm_pos
|
||||||
{
|
{
|
||||||
|
@ -12,6 +12,7 @@
|
|||||||
#include "nest/route.h"
|
#include "nest/route.h"
|
||||||
#include "nest/attrs.h"
|
#include "nest/attrs.h"
|
||||||
#include "lib/resource.h"
|
#include "lib/resource.h"
|
||||||
|
#include "filter/data.h"
|
||||||
|
|
||||||
#define TESTS_NUM 30
|
#define TESTS_NUM 30
|
||||||
#define AS_PATH_LENGTH 1000
|
#define AS_PATH_LENGTH 1000
|
||||||
@ -127,8 +128,9 @@ t_path_include(void)
|
|||||||
int counts_of_contains = count_asn_in_array(as_nums, as_nums[i]);
|
int counts_of_contains = count_asn_in_array(as_nums, as_nums[i]);
|
||||||
bt_assert_msg(as_path_contains(as_path, as_nums[i], counts_of_contains), "AS Path should contains %d-times number %d", counts_of_contains, as_nums[i]);
|
bt_assert_msg(as_path_contains(as_path, as_nums[i], counts_of_contains), "AS Path should contains %d-times number %d", counts_of_contains, as_nums[i]);
|
||||||
|
|
||||||
bt_assert(as_path_filter(tmp_linpool, as_path, NULL, as_nums[i], 0) != NULL);
|
struct f_val v = { .type = T_INT, .val.i = as_nums[i] };
|
||||||
bt_assert(as_path_filter(tmp_linpool, as_path, NULL, as_nums[i], 1) != NULL);
|
bt_assert(as_path_filter(tmp_linpool, as_path, &v, 0) != NULL);
|
||||||
|
bt_assert(as_path_filter(tmp_linpool, as_path, &v, 1) != NULL);
|
||||||
}
|
}
|
||||||
|
|
||||||
for (i = 0; i < 10000; i++)
|
for (i = 0; i < 10000; i++)
|
||||||
|
48
nest/a-set.c
48
nest/a-set.c
@ -693,3 +693,51 @@ lc_set_max(const struct adata *list, lcomm *val)
|
|||||||
*val = (lcomm) { res[0], res[1], res[2] };
|
*val = (lcomm) { res[0], res[1], res[2] };
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
int
|
||||||
|
int_set_walk(const struct adata *list, uint *pos, uint *val)
|
||||||
|
{
|
||||||
|
if (!list)
|
||||||
|
return 0;
|
||||||
|
|
||||||
|
if (*pos >= (uint) int_set_get_size(list))
|
||||||
|
return 0;
|
||||||
|
|
||||||
|
u32 *res = int_set_get_data(list) + *pos;
|
||||||
|
*val = *res;
|
||||||
|
*pos += 1;
|
||||||
|
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
|
||||||
|
int
|
||||||
|
ec_set_walk(const struct adata *list, uint *pos, u64 *val)
|
||||||
|
{
|
||||||
|
if (!list)
|
||||||
|
return 0;
|
||||||
|
|
||||||
|
if (*pos >= (uint) int_set_get_size(list))
|
||||||
|
return 0;
|
||||||
|
|
||||||
|
u32 *res = int_set_get_data(list) + *pos;
|
||||||
|
*val = ec_generic(res[0], res[1]);
|
||||||
|
*pos += 2;
|
||||||
|
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
|
||||||
|
int
|
||||||
|
lc_set_walk(const struct adata *list, uint *pos, lcomm *val)
|
||||||
|
{
|
||||||
|
if (!list)
|
||||||
|
return 0;
|
||||||
|
|
||||||
|
if (*pos >= (uint) int_set_get_size(list))
|
||||||
|
return 0;
|
||||||
|
|
||||||
|
u32 *res = int_set_get_data(list) + *pos;
|
||||||
|
*val = (lcomm) { res[0], res[1], res[2] };
|
||||||
|
*pos += 3;
|
||||||
|
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
@ -28,6 +28,7 @@
|
|||||||
* to 16bit slot (like in 16bit AS_PATH). See RFC 4893 for details
|
* to 16bit slot (like in 16bit AS_PATH). See RFC 4893 for details
|
||||||
*/
|
*/
|
||||||
|
|
||||||
|
struct f_val;
|
||||||
struct f_tree;
|
struct f_tree;
|
||||||
|
|
||||||
int as_path_valid(byte *data, uint len, int bs, int sets, int confed, char *err, uint elen);
|
int as_path_valid(byte *data, uint len, int bs, int sets, int confed, char *err, uint elen);
|
||||||
@ -49,7 +50,8 @@ int as_path_get_last(const struct adata *path, u32 *last_as);
|
|||||||
u32 as_path_get_last_nonaggregated(const struct adata *path);
|
u32 as_path_get_last_nonaggregated(const struct adata *path);
|
||||||
int as_path_contains(const struct adata *path, u32 as, int min);
|
int as_path_contains(const struct adata *path, u32 as, int min);
|
||||||
int as_path_match_set(const struct adata *path, const struct f_tree *set);
|
int as_path_match_set(const struct adata *path, const struct f_tree *set);
|
||||||
const struct adata *as_path_filter(struct linpool *pool, const struct adata *path, const struct f_tree *set, u32 key, int pos);
|
const struct adata *as_path_filter(struct linpool *pool, const struct adata *path, const struct f_val *set, int pos);
|
||||||
|
int as_path_walk(const struct adata *path, uint *pos, uint *val);
|
||||||
|
|
||||||
static inline struct adata *as_path_prepend(struct linpool *pool, const struct adata *path, u32 as)
|
static inline struct adata *as_path_prepend(struct linpool *pool, const struct adata *path, u32 as)
|
||||||
{ return as_path_prepend2(pool, path, AS_PATH_SEQUENCE, as); }
|
{ return as_path_prepend2(pool, path, AS_PATH_SEQUENCE, as); }
|
||||||
@ -224,6 +226,9 @@ int lc_set_min(const struct adata *list, lcomm *val);
|
|||||||
int int_set_max(const struct adata *list, u32 *val);
|
int int_set_max(const struct adata *list, u32 *val);
|
||||||
int ec_set_max(const struct adata *list, u64 *val);
|
int ec_set_max(const struct adata *list, u64 *val);
|
||||||
int lc_set_max(const struct adata *list, lcomm *val);
|
int lc_set_max(const struct adata *list, lcomm *val);
|
||||||
|
int int_set_walk(const struct adata *list, uint *pos, u32 *val);
|
||||||
|
int ec_set_walk(const struct adata *list, uint *pos, u64 *val);
|
||||||
|
int lc_set_walk(const struct adata *list, uint *pos, lcomm *val);
|
||||||
|
|
||||||
void ec_set_sort_x(struct adata *set); /* Sort in place */
|
void ec_set_sort_x(struct adata *set); /* Sort in place */
|
||||||
|
|
||||||
|
@ -165,7 +165,7 @@ rtrid:
|
|||||||
|
|
||||||
idval:
|
idval:
|
||||||
NUM { $$ = $1; }
|
NUM { $$ = $1; }
|
||||||
| '(' term ')' { $$ = f_eval_int(f_linearize($2)); }
|
| '(' term ')' { $$ = f_eval_int(f_linearize($2, 1)); }
|
||||||
| IP4 { $$ = ip4_to_u32($1); }
|
| IP4 { $$ = ip4_to_u32($1); }
|
||||||
| CF_SYM_KNOWN {
|
| CF_SYM_KNOWN {
|
||||||
if ($1->class == (SYM_CONSTANT | T_INT) || $1->class == (SYM_CONSTANT | T_QUAD))
|
if ($1->class == (SYM_CONSTANT | T_INT) || $1->class == (SYM_CONSTANT | T_QUAD))
|
||||||
@ -860,7 +860,7 @@ CF_CLI(DUMP FILTER ALL,,, [[Dump all filters in linearized form]])
|
|||||||
{ filters_dump_all(); cli_msg(0, ""); } ;
|
{ filters_dump_all(); cli_msg(0, ""); } ;
|
||||||
|
|
||||||
CF_CLI(EVAL, term, <expr>, [[Evaluate an expression]])
|
CF_CLI(EVAL, term, <expr>, [[Evaluate an expression]])
|
||||||
{ cmd_eval(f_linearize($2)); } ;
|
{ cmd_eval(f_linearize($2, 1)); } ;
|
||||||
|
|
||||||
CF_CLI_HELP(ECHO, ..., [[Control echoing of log messages]])
|
CF_CLI_HELP(ECHO, ..., [[Control echoing of log messages]])
|
||||||
CF_CLI(ECHO, echo_mask echo_size, (all | off | { debug|trace|info|remote|warning|error|auth [, ...] }) [<buffer-size>], [[Control echoing of log messages]]) {
|
CF_CLI(ECHO, echo_mask echo_size, (all | off | { debug|trace|info|remote|warning|error|auth [, ...] }) [<buffer-size>], [[Control echoing of log messages]]) {
|
||||||
|
@ -40,7 +40,7 @@ static_route_finish(void)
|
|||||||
if (net_type_match(this_srt->net, NB_DEST) == !this_srt->dest)
|
if (net_type_match(this_srt->net, NB_DEST) == !this_srt->dest)
|
||||||
cf_error("Unexpected or missing nexthop/type");
|
cf_error("Unexpected or missing nexthop/type");
|
||||||
|
|
||||||
this_srt->cmds = f_linearize(this_srt_cmds);
|
this_srt->cmds = f_linearize(this_srt_cmds, 0);
|
||||||
}
|
}
|
||||||
|
|
||||||
CF_DECLS
|
CF_DECLS
|
||||||
|
@ -116,7 +116,7 @@ add_num_const(char *name, int val, const char *file, const uint line)
|
|||||||
struct f_val *v = cfg_alloc(sizeof(struct f_val));
|
struct f_val *v = cfg_alloc(sizeof(struct f_val));
|
||||||
*v = (struct f_val) { .type = T_INT, .val.i = val };
|
*v = (struct f_val) { .type = T_INT, .val.i = val };
|
||||||
struct symbol *sym = cf_get_symbol(name);
|
struct symbol *sym = cf_get_symbol(name);
|
||||||
if (sym->class && (sym->scope == conf_this_scope))
|
if (sym->class && cf_symbol_is_local(sym))
|
||||||
cf_error("Error reading value for %s from %s:%d: already defined", name, file, line);
|
cf_error("Error reading value for %s from %s:%d: already defined", name, file, line);
|
||||||
|
|
||||||
cf_define_symbol(sym, SYM_CONSTANT | T_INT, val, v);
|
cf_define_symbol(sym, SYM_CONSTANT | T_INT, val, v);
|
||||||
|
Loading…
Reference in New Issue
Block a user