]> git.ipfire.org Git - thirdparty/bird.git/blame - filter/f-inst.c
Filter: fixed omitted overflow check in EC constructor
[thirdparty/bird.git] / filter / f-inst.c
CommitLineData
f62a369f
JMM
1/*
2 * Filters: Instructions themselves
3 *
4 * Copyright 1998 Pavel Machek <pavel@ucw.cz>
5 * Copyright 2018 Maria Matejka <mq@jmq.cz>
6 * Copyright 2018 CZ.NIC z.s.p.o.
7 *
8 * Can be freely distributed and used under the terms of the GNU GPL.
9 *
0da06b71
MM
10 * The filter code goes through several phases:
11 *
12 * 1 Parsing
13 * Flex- and Bison-generated parser decodes the human-readable data into
14 * a struct f_inst tree. This is an infix tree that was interpreted by
15 * depth-first search execution in previous versions of the interpreter.
16 * All instructions have their constructor: f_new_inst(FI_EXAMPLE, ...)
17 * translates into f_new_inst_FI_EXAMPLE(...) and the types are checked in
18 * compile time. If the result of the instruction is always the same,
19 * it's reduced to FI_CONSTANT directly in constructor. This phase also
20 * counts how many instructions are underlying in means of f_line_item
21 * fields to know how much we have to allocate in the next phase.
22 *
23 * 2 Linearize before interpreting
24 * The infix tree is always interpreted in the same order. Therefore we
25 * sort the instructions one after another into struct f_line. Results
26 * and arguments of these instructions are implicitly put on a value
27 * stack; e.g. the + operation just takes two arguments from the value
28 * stack and puts the result on there.
29 *
30 * 3 Interpret
31 * The given line is put on a custom execution stack. If needed (FI_CALL,
32 * FI_SWITCH, FI_AND, FI_OR, FI_CONDITION, ...), another line is put on top
33 * of the stack; when that line finishes, the execution continues on the
34 * older lines on the stack where it stopped before.
35 *
36 * 4 Same
37 * On config reload, the filters have to be compared whether channel
38 * reload is needed or not. The comparison is done by comparing the
39 * struct f_line's recursively.
40 *
41 * The main purpose of this rework was to improve filter performance
42 * by making the interpreter non-recursive.
43 *
44 * The other outcome is concentration of instruction definitions to
45 * one place -- right here. You shall define your instruction only here
e1ac6f1e
MM
46 * and nowhere else.
47 *
48 * Beware. This file is interpreted by M4 macros. These macros
49 * may be more stupid than you could imagine. If something strange
50 * happens after changing this file, compare the results before and
51 * after your change (see the Makefile to find out where the results are)
52 * and see what really happened.
53 *
54 * This file is not directly a C source code -> it is a generator input
55 * for several C sources; every instruction block gets expanded into many
56 * different places.
57 *
26bfe59f
MM
58 * All the arguments are processed literally; if you need an argument including comma,
59 * you have to quote it by [[ ... ]]
60 *
e1ac6f1e
MM
61 * What is the syntax here?
62 * m4_dnl INST(FI_NOP, in, out) { enum value, input args, output args
c0999a14
MM
63 * m4_dnl ARG(num, type); argument, its id (in data fields) and type accessible by v1, v2, v3
64 * m4_dnl ARG_ANY(num); argument with no type check accessible by v1, v2, v3
65 * m4_dnl VARARG; variable-length argument list; accessible by vv(i) and whati->varcount
e1ac6f1e 66 * m4_dnl LINE(num, unused); this argument has to be converted to its own f_line
63f49457 67 * m4_dnl SYMBOL; symbol handed from config
e1ac6f1e
MM
68 * m4_dnl STATIC_ATTR; static attribute definition
69 * m4_dnl DYNAMIC_ATTR; dynamic attribute definition
70 * m4_dnl RTC; route table config
e1ac6f1e
MM
71 * m4_dnl ACCESS_RTE; this instruction needs route
72 * m4_dnl ACCESS_EATTRS; this instruction needs extended attributes
26bfe59f
MM
73 *
74 * m4_dnl FID_MEMBER( custom instruction member
75 * m4_dnl C type, for storage in structs
b40c0f02 76 * m4_dnl name, how the member is named
30667d50 77 * m4_dnl comparator for same(), if different, this should be TRUE (CAVEAT)
26bfe59f
MM
78 * m4_dnl dump format string debug -> format string for bvsnprintf
79 * m4_dnl dump format args appropriate args
26bfe59f
MM
80 * m4_dnl )
81 *
e1ac6f1e 82 * m4_dnl RESULT(type, union-field, value); putting this on value stack
f74d1976
MM
83 * m4_dnl RESULT_VAL(value-struct); pass the struct f_val directly
84 * m4_dnl RESULT_VOID; return undef
e1ac6f1e
MM
85 * m4_dnl }
86 *
0da06b71
MM
87 * Also note that the { ... } blocks are not respected by M4 at all.
88 * If you get weird unmatched-brace-pair errors, check what it generated and why.
89 * What is really considered as one instruction is not the { ... } block
90 * after m4_dnl INST() but all the code between them.
91 *
e1ac6f1e
MM
92 * Other code is just copied into the interpreter part.
93 *
0da06b71
MM
94 * If you are satisfied with this, you don't need to read the following
95 * detailed description of what is really done with the instruction definitions.
96 *
97 * m4_dnl Now let's look under the cover. The code between each INST()
98 * m4_dnl is copied to several places, namely these (numbered by the M4 diversions
99 * m4_dnl used in filter/decl.m4):
100 *
101 * m4_dnl (102) struct f_inst *f_new_inst(FI_EXAMPLE [[ put it here ]])
102 * m4_dnl {
103 * m4_dnl ... (common code)
104 * m4_dnl (103) [[ put it here ]]
105 * m4_dnl ...
106 * m4_dnl if (all arguments are constant)
26194bd6 107 * m4_dnl (108) [[ put it here ]]
0da06b71
MM
108 * m4_dnl }
109 * m4_dnl For writing directly to constructor argument list, use FID_NEW_ARGS.
110 * m4_dnl For computing something in constructor (103), use FID_NEW_BODY.
111 * m4_dnl For constant pre-interpretation (108), see below at FID_INTERPRET_BODY.
112 *
113 * m4_dnl struct f_inst {
114 * m4_dnl ... (common fields)
115 * m4_dnl union {
116 * m4_dnl struct {
117 * m4_dnl (101) [[ put it here ]]
118 * m4_dnl } i_FI_EXAMPLE;
119 * m4_dnl ...
120 * m4_dnl };
121 * m4_dnl };
122 * m4_dnl This structure is returned from constructor.
123 * m4_dnl For writing directly to this structure, use FID_STRUCT_IN.
124 *
125 * m4_dnl linearize(struct f_line *dest, const struct f_inst *what, uint pos) {
126 * m4_dnl ...
127 * m4_dnl switch (what->fi_code) {
128 * m4_dnl case FI_EXAMPLE:
129 * m4_dnl (105) [[ put it here ]]
130 * m4_dnl break;
131 * m4_dnl }
132 * m4_dnl }
133 * m4_dnl This is called when translating from struct f_inst to struct f_line_item.
134 * m4_dnl For accessing your custom instruction data, use following macros:
135 * m4_dnl whati -> for accessing (struct f_inst).i_FI_EXAMPLE
136 * m4_dnl item -> for accessing (struct f_line)[pos].i_FI_EXAMPLE
137 * m4_dnl For writing directly here, use FID_LINEARIZE_BODY.
138 *
139 * m4_dnl (107) struct f_line_item {
140 * m4_dnl ... (common fields)
141 * m4_dnl union {
142 * m4_dnl struct {
143 * m4_dnl (101) [[ put it here ]]
144 * m4_dnl } i_FI_EXAMPLE;
145 * m4_dnl ...
146 * m4_dnl };
147 * m4_dnl };
148 * m4_dnl The same as FID_STRUCT_IN (101) but for the other structure.
149 * m4_dnl This structure is returned from the linearizer (105).
150 * m4_dnl For writing directly to this structure, use FID_LINE_IN.
151 *
152 * m4_dnl f_dump_line_item_FI_EXAMPLE(const struct f_line_item *item, const int indent)
153 * m4_dnl {
154 * m4_dnl (104) [[ put it here ]]
155 * m4_dnl }
156 * m4_dnl This code dumps the instruction on debug. Note that the argument
157 * m4_dnl is the linearized instruction; if the instruction has arguments,
158 * m4_dnl their code has already been linearized and their value is taken
159 * m4_dnl from the value stack.
160 * m4_dnl For writing directly here, use FID_DUMP_BODY.
161 *
162 * m4_dnl f_same(...)
163 * m4_dnl {
164 * m4_dnl switch (f1_->fi_code) {
165 * m4_dnl case FI_EXAMPLE:
166 * m4_dnl (106) [[ put it here ]]
167 * m4_dnl break;
168 * m4_dnl }
169 * m4_dnl }
170 * m4_dnl This code compares the two given instrucions (f1_ and f2_)
171 * m4_dnl on reconfigure. For accessing your custom instruction data,
172 * m4_dnl use macros f1 and f2.
173 * m4_dnl For writing directly here, use FID_SAME_BODY.
174 *
175 * m4_dnl interpret(...)
176 * m4_dnl {
177 * m4_dnl switch (what->fi_code) {
178 * m4_dnl case FI_EXAMPLE:
179 * m4_dnl (108) [[ put it here ]]
180 * m4_dnl break;
181 * m4_dnl }
182 * m4_dnl }
183 * m4_dnl This code executes the instruction. Every pre-defined macro
184 * m4_dnl resets the output here. For setting it explicitly,
185 * m4_dnl use FID_INTERPRET_BODY.
186 * m4_dnl This code is put on two places; one is the interpreter, the other
187 * m4_dnl is instruction constructor. If you need to distinguish between
188 * m4_dnl these two, use FID_INTERPRET_EXEC or FID_INTERPRET_NEW respectively.
189 * m4_dnl To address the difference between interpreter and constructor
190 * m4_dnl environments, there are several convenience macros defined:
191 * m4_dnl runtime() -> for spitting out runtime error like division by zero
192 * m4_dnl RESULT(...) -> declare result; may overwrite arguments
193 * m4_dnl v1, v2, v3 -> positional arguments, may be overwritten by RESULT()
194 * m4_dnl falloc(size) -> allocate memory from the appropriate linpool
195 * m4_dnl fpool -> the current linpool
196 * m4_dnl NEVER_CONSTANT-> don't generate pre-interpretation code at all
197 * m4_dnl ACCESS_RTE -> check that route is available, also NEVER_CONSTANT
198 * m4_dnl ACCESS_EATTRS -> pre-cache the eattrs; use only with ACCESS_RTE
199 * m4_dnl f_rta_cow(fs) -> function to call before any change to route should be done
200 *
201 * m4_dnl If you are stymied, see FI_CALL or FI_CONSTANT or just search for
202 * m4_dnl the mentioned macros in this file to see what is happening there in wild.
f62a369f
JMM
203 */
204
205/* Binary operators */
4c553c5a
MM
206 INST(FI_ADD, 2, 1) {
207 ARG(1,T_INT);
208 ARG(2,T_INT);
f74d1976 209 RESULT(T_INT, i, v1.val.i + v2.val.i);
4c553c5a
MM
210 }
211 INST(FI_SUBTRACT, 2, 1) {
212 ARG(1,T_INT);
213 ARG(2,T_INT);
f74d1976 214 RESULT(T_INT, i, v1.val.i - v2.val.i);
4c553c5a
MM
215 }
216 INST(FI_MULTIPLY, 2, 1) {
217 ARG(1,T_INT);
218 ARG(2,T_INT);
f74d1976 219 RESULT(T_INT, i, v1.val.i * v2.val.i);
4c553c5a
MM
220 }
221 INST(FI_DIVIDE, 2, 1) {
222 ARG(1,T_INT);
223 ARG(2,T_INT);
224 if (v2.val.i == 0) runtime( "Mother told me not to divide by 0" );
f74d1976 225 RESULT(T_INT, i, v1.val.i / v2.val.i);
4c553c5a
MM
226 }
227 INST(FI_AND, 1, 1) {
228 ARG(1,T_BOOL);
ef8c4574 229 ARG_TYPE_STATIC(2,T_BOOL);
10c4cd96
OZ
230 RESULT_TYPE(T_BOOL);
231
f74d1976 232 if (v1.val.i)
4c553c5a
MM
233 LINE(2,0);
234 else
f74d1976 235 RESULT_VAL(v1);
967b88d9 236 }
4c553c5a
MM
237 INST(FI_OR, 1, 1) {
238 ARG(1,T_BOOL);
ef8c4574 239 ARG_TYPE_STATIC(2,T_BOOL);
10c4cd96
OZ
240 RESULT_TYPE(T_BOOL);
241
f74d1976 242 if (!v1.val.i)
4c553c5a
MM
243 LINE(2,0);
244 else
f74d1976 245 RESULT_VAL(v1);
967b88d9 246 }
bfa15a64 247
4c553c5a 248 INST(FI_PAIR_CONSTRUCT, 2, 1) {
f62a369f
JMM
249 ARG(1,T_INT);
250 ARG(2,T_INT);
4c553c5a
MM
251 uint u1 = v1.val.i;
252 uint u2 = v2.val.i;
f62a369f
JMM
253 if ((u1 > 0xFFFF) || (u2 > 0xFFFF))
254 runtime( "Can't operate with value out of bounds in pair constructor" );
4c553c5a 255 RESULT(T_PAIR, i, (u1 << 16) | u2);
967b88d9 256 }
bfa15a64 257
4c553c5a
MM
258 INST(FI_EC_CONSTRUCT, 2, 1) {
259 ARG_ANY(1);
260 ARG(2, T_INT);
26bfe59f 261
f634adc7 262 FID_MEMBER(enum ec_subtype, ecs, f1->ecs != f2->ecs, "ec subtype %s", ec_subtype_str(item->ecs));
f62a369f 263
124d860f 264 int ipv4_used;
4c553c5a 265 u32 key, val;
f62a369f 266
4c553c5a
MM
267 if (v1.type == T_INT) {
268 ipv4_used = 0; key = v1.val.i;
269 }
270 else if (v1.type == T_QUAD) {
271 ipv4_used = 1; key = v1.val.i;
272 }
273 /* IP->Quad implicit conversion */
274 else if (val_is_ip4(&v1)) {
275 ipv4_used = 1; key = ipa_to_u32(v1.val.ip);
276 }
277 else
bfa15a64 278 runtime("Argument 1 of EC constructor must be integer or IPv4 address, got 0x%02x", v1.type);
f62a369f 279
4c553c5a 280 val = v2.val.i;
f62a369f 281
124d860f
MM
282 if (ecs == EC_GENERIC)
283 RESULT(T_EC, ec, ec_generic(key, val));
284 else if (ipv4_used)
285 if (val <= 0xFFFF)
286 RESULT(T_EC, ec, ec_ip4(ecs, key, val));
287 else
288 runtime("4-byte value %u can't be used with IP-address key in extended community", val);
289 else if (key < 0x10000)
290 RESULT(T_EC, ec, ec_as2(ecs, key, val));
291 else
292 if (val <= 0xFFFF)
293 RESULT(T_EC, ec, ec_as4(ecs, key, val));
294 else
295 runtime("4-byte value %u can't be used with 4-byte ASN in extended community", val);
4c553c5a 296 }
f62a369f 297
4c553c5a
MM
298 INST(FI_LC_CONSTRUCT, 3, 1) {
299 ARG(1, T_INT);
300 ARG(2, T_INT);
301 ARG(3, T_INT);
302 RESULT(T_LC, lc, [[(lcomm) { v1.val.i, v2.val.i, v3.val.i }]]);
303 }
f62a369f 304
4c553c5a 305 INST(FI_PATHMASK_CONSTRUCT, 0, 1) {
c0999a14 306 VARARG;
4c553c5a 307
c0999a14
MM
308 struct f_path_mask *pm = falloc(sizeof(struct f_path_mask) + whati->varcount * sizeof(struct f_path_mask_item));
309 pm->len = whati->varcount;
b40c0f02 310
c0999a14
MM
311 for (uint i=0; i<whati->varcount; i++) {
312 switch (vv(i).type) {
4c553c5a 313 case T_PATH_MASK_ITEM:
c0999a14 314 pm->item[i] = vv(i).val.pmi;
4c553c5a 315 break;
9f3e0983 316
4c553c5a
MM
317 case T_INT:
318 pm->item[i] = (struct f_path_mask_item) {
c0999a14 319 .asn = vv(i).val.i,
4c553c5a
MM
320 .kind = PM_ASN,
321 };
322 break;
9f3e0983
OZ
323
324 case T_SET:
325 if (vv(i).val.t->from.type != T_INT)
326 runtime("Only integer sets allowed in path mask");
327
328 pm->item[i] = (struct f_path_mask_item) {
329 .set = vv(i).val.t,
330 .kind = PM_ASN_SET,
331 };
332 break;
333
4c553c5a
MM
334 default:
335 runtime( "Error resolving path mask template: value not an integer" );
336 }
f62a369f 337 }
f62a369f 338
4c553c5a
MM
339 RESULT(T_PATH_MASK, path_mask, pm);
340 }
f62a369f
JMM
341
342/* Relational operators */
343
4c553c5a 344 INST(FI_NEQ, 2, 1) {
c5774939
MM
345 ARG_ANY(1);
346 ARG_ANY(2);
4c553c5a 347 RESULT(T_BOOL, i, !val_same(&v1, &v2));
967b88d9 348 }
f62a369f 349
4c553c5a 350 INST(FI_EQ, 2, 1) {
c5774939
MM
351 ARG_ANY(1);
352 ARG_ANY(2);
4c553c5a 353 RESULT(T_BOOL, i, val_same(&v1, &v2));
967b88d9 354 }
c5774939 355
4c553c5a 356 INST(FI_LT, 2, 1) {
c5774939
MM
357 ARG_ANY(1);
358 ARG_ANY(2);
10c4cd96
OZ
359 ARG_SAME_TYPE(1, 2);
360
4c553c5a 361 int i = val_compare(&v1, &v2);
52893045 362 if (i == F_CMP_ERROR)
c5774939 363 runtime( "Can't compare values of incompatible types" );
4c553c5a 364 RESULT(T_BOOL, i, (i == -1));
967b88d9 365 }
f62a369f 366
4c553c5a 367 INST(FI_LTE, 2, 1) {
c5774939
MM
368 ARG_ANY(1);
369 ARG_ANY(2);
10c4cd96
OZ
370 ARG_SAME_TYPE(1, 2);
371
4c553c5a 372 int i = val_compare(&v1, &v2);
52893045 373 if (i == F_CMP_ERROR)
c5774939 374 runtime( "Can't compare values of incompatible types" );
4c553c5a 375 RESULT(T_BOOL, i, (i != 1));
967b88d9 376 }
f62a369f 377
4c553c5a
MM
378 INST(FI_NOT, 1, 1) {
379 ARG(1,T_BOOL);
380 RESULT(T_BOOL, i, !v1.val.i);
967b88d9 381 }
f62a369f 382
4c553c5a 383 INST(FI_MATCH, 2, 1) {
f62a369f
JMM
384 ARG_ANY(1);
385 ARG_ANY(2);
4c553c5a 386 int i = val_in_range(&v1, &v2);
52893045 387 if (i == F_CMP_ERROR)
f62a369f 388 runtime( "~ applied on unknown type pair" );
4c553c5a 389 RESULT(T_BOOL, i, !!i);
967b88d9 390 }
f62a369f 391
4c553c5a 392 INST(FI_NOT_MATCH, 2, 1) {
f62a369f
JMM
393 ARG_ANY(1);
394 ARG_ANY(2);
4c553c5a 395 int i = val_in_range(&v1, &v2);
fe503c7c 396 if (i == F_CMP_ERROR)
f62a369f 397 runtime( "!~ applied on unknown type pair" );
4c553c5a 398 RESULT(T_BOOL, i, !i);
967b88d9 399 }
f62a369f 400
4c553c5a 401 INST(FI_DEFINED, 1, 1) {
f62a369f 402 ARG_ANY(1);
4c553c5a 403 RESULT(T_BOOL, i, (v1.type != T_VOID) && !undef_value(v1));
967b88d9 404 }
4c553c5a
MM
405
406 INST(FI_TYPE, 1, 1) {
f62a369f
JMM
407 ARG_ANY(1); /* There may be more types supporting this operation */
408 switch (v1.type)
409 {
410 case T_NET:
4c553c5a 411 RESULT(T_ENUM_NETTYPE, i, v1.val.net->type);
f62a369f
JMM
412 break;
413 default:
414 runtime( "Can't determine type of this item" );
415 }
967b88d9 416 }
4c553c5a
MM
417
418 INST(FI_IS_V4, 1, 1) {
f62a369f 419 ARG(1, T_IP);
4c553c5a 420 RESULT(T_BOOL, i, ipa_is_ip4(v1.val.ip));
967b88d9 421 }
f62a369f 422
4c553c5a 423 /* Set to indirect value prepared in v1 */
96d757c1 424 INST(FI_VAR_SET, 1, 0) {
b40c0f02 425 NEVER_CONSTANT;
63f49457
MM
426 ARG_ANY(1);
427 SYMBOL;
26194bd6 428 ARG_TYPE(1, sym->class & 0xff);
96d757c1 429
1757a6fc 430 fstk->vstk[curline.vbase + sym->offset] = v1;
96d757c1
JMM
431 }
432
433 INST(FI_VAR_GET, 0, 1) {
26bfe59f 434 SYMBOL;
b40c0f02 435 NEVER_CONSTANT;
6fbcd891 436 RESULT_TYPE(sym->class & 0xff);
f74d1976 437 RESULT_VAL(fstk->vstk[curline.vbase + sym->offset]);
967b88d9 438 }
f62a369f 439
bfa15a64 440 INST(FI_CONSTANT, 0, 1) {
30667d50
MM
441 FID_MEMBER(
442 struct f_val,
443 val,
30667d50 444 [[ !val_same(&(f1->val), &(f2->val)) ]],
f634adc7 445 "value %s",
30667d50
MM
446 val_dump(&(item->val))
447 );
ea4f55e3 448
6fbcd891 449 RESULT_TYPE(val.type);
b40c0f02 450 RESULT_VAL(val);
967b88d9 451 }
bfa15a64 452
4c553c5a
MM
453 INST(FI_CONDITION, 1, 0) {
454 ARG(1, T_BOOL);
b40c0f02 455 if (v1.val.i)
4c553c5a 456 LINE(2,0);
224b77d4 457 else
4c553c5a 458 LINE(3,1);
967b88d9 459 }
9b46748d 460
0206c070
MM
461 INST(FI_PRINT, 0, 0) {
462 NEVER_CONSTANT;
c0999a14 463 VARARG;
0206c070 464
c0999a14
MM
465 if (whati->varcount && !(fs->flags & FF_SILENT))
466 for (uint i=0; i<whati->varcount; i++)
467 val_format(&(vv(i)), &fs->buf);
0206c070
MM
468 }
469
efd7c87b
MM
470 INST(FI_FLUSH, 0, 0) {
471 NEVER_CONSTANT;
472 if (!(fs->flags & FF_SILENT))
473 /* After log_commit, the buffer is reset */
474 log_commit(*L_INFO, &fs->buf);
475 }
476
0206c070
MM
477 INST(FI_DIE, 0, 0) {
478 NEVER_CONSTANT;
f634adc7 479 FID_MEMBER(enum filter_return, fret, f1->fret != f2->fret, "%s", filter_return_str(item->fret));
4c553c5a 480
0206c070 481 switch (whati->fret) {
f62a369f
JMM
482 case F_QUITBIRD:
483 die( "Filter asked me to die" );
efd7c87b 484 case F_ACCEPT: /* Should take care about turning ACCEPT into MODIFY */
f62a369f 485 case F_ERROR:
efd7c87b 486 case F_REJECT: /* Maybe print complete route along with reason to reject route? */
4c553c5a 487 return fret; /* We have to return now, no more processing. */
f62a369f
JMM
488 default:
489 bug( "unknown return type: Can't happen");
490 }
967b88d9 491 }
bfa15a64
OZ
492
493 INST(FI_RTA_GET, 0, 1) {
f62a369f 494 {
4c553c5a 495 STATIC_ATTR;
f62a369f
JMM
496 ACCESS_RTE;
497 struct rta *rta = (*fs->rte)->attrs;
f62a369f 498
4c553c5a 499 switch (sa.sa_code)
f62a369f 500 {
4c553c5a
MM
501 case SA_FROM: RESULT(sa.f_type, ip, rta->from); break;
502 case SA_GW: RESULT(sa.f_type, ip, rta->nh.gw); break;
503 case SA_NET: RESULT(sa.f_type, net, (*fs->rte)->net->n.addr); break;
504 case SA_PROTO: RESULT(sa.f_type, s, rta->src->proto->name); break;
505 case SA_SOURCE: RESULT(sa.f_type, i, rta->source); break;
506 case SA_SCOPE: RESULT(sa.f_type, i, rta->scope); break;
507 case SA_DEST: RESULT(sa.f_type, i, rta->dest); break;
508 case SA_IFNAME: RESULT(sa.f_type, s, rta->nh.iface ? rta->nh.iface->name : ""); break;
509 case SA_IFINDEX: RESULT(sa.f_type, i, rta->nh.iface ? rta->nh.iface->index : 0); break;
f62a369f
JMM
510
511 default:
4c553c5a 512 bug("Invalid static attribute access (%u/%u)", sa.f_type, sa.sa_code);
f62a369f
JMM
513 }
514 }
967b88d9 515 }
4c553c5a 516
a84b8b6e
MM
517 INST(FI_RTA_SET, 1, 0) {
518 ACCESS_RTE;
519 ARG_ANY(1);
520 STATIC_ATTR;
26194bd6 521 ARG_TYPE(1, sa.f_type);
a84b8b6e
MM
522
523 f_rta_cow(fs);
524 {
525 struct rta *rta = (*fs->rte)->attrs;
526
527 switch (sa.sa_code)
528 {
529 case SA_FROM:
530 rta->from = v1.val.ip;
531 break;
532
533 case SA_GW:
534 {
535 ip_addr ip = v1.val.ip;
536 neighbor *n = neigh_find(rta->src->proto, ip, NULL, 0);
537 if (!n || (n->scope == SCOPE_HOST))
538 runtime( "Invalid gw address" );
539
540 rta->dest = RTD_UNICAST;
541 rta->nh.gw = ip;
542 rta->nh.iface = n->iface;
543 rta->nh.next = NULL;
544 rta->hostentry = NULL;
545 }
546 break;
547
548 case SA_SCOPE:
549 rta->scope = v1.val.i;
550 break;
551
552 case SA_DEST:
553 {
554 int i = v1.val.i;
555 if ((i != RTD_BLACKHOLE) && (i != RTD_UNREACHABLE) && (i != RTD_PROHIBIT))
556 runtime( "Destination can be changed only to blackhole, unreachable or prohibit" );
557
558 rta->dest = i;
559 rta->nh.gw = IPA_NONE;
560 rta->nh.iface = NULL;
561 rta->nh.next = NULL;
562 rta->hostentry = NULL;
563 }
564 break;
565
566 case SA_IFNAME:
567 {
568 struct iface *ifa = if_find_by_name(v1.val.s);
569 if (!ifa)
570 runtime( "Invalid iface name" );
571
572 rta->dest = RTD_UNICAST;
573 rta->nh.gw = IPA_NONE;
574 rta->nh.iface = ifa;
575 rta->nh.next = NULL;
576 rta->hostentry = NULL;
577 }
578 break;
579
580 default:
581 bug("Invalid static attribute access (%u/%u)", sa.f_type, sa.sa_code);
582 }
583 }
584 }
585
4c553c5a
MM
586 INST(FI_EA_GET, 0, 1) { /* Access to extended attributes */
587 DYNAMIC_ATTR;
f62a369f
JMM
588 ACCESS_RTE;
589 ACCESS_EATTRS;
6fbcd891 590 RESULT_TYPE(da.f_type);
f62a369f 591 {
4c553c5a 592 eattr *e = ea_find(*fs->eattrs, da.ea_code);
f62a369f
JMM
593
594 if (!e) {
595 /* A special case: undefined as_path looks like empty as_path */
4c553c5a 596 if (da.type == EAF_TYPE_AS_PATH) {
6fbcd891 597 RESULT_(T_PATH, ad, &null_adata);
f62a369f
JMM
598 break;
599 }
600
601 /* The same special case for int_set */
4c553c5a 602 if (da.type == EAF_TYPE_INT_SET) {
6fbcd891 603 RESULT_(T_CLIST, ad, &null_adata);
f62a369f
JMM
604 break;
605 }
606
607 /* The same special case for ec_set */
4c553c5a 608 if (da.type == EAF_TYPE_EC_SET) {
6fbcd891 609 RESULT_(T_ECLIST, ad, &null_adata);
f62a369f
JMM
610 break;
611 }
612
613 /* The same special case for lc_set */
4c553c5a 614 if (da.type == EAF_TYPE_LC_SET) {
6fbcd891 615 RESULT_(T_LCLIST, ad, &null_adata);
f62a369f
JMM
616 break;
617 }
618
619 /* Undefined value */
f74d1976 620 RESULT_VOID;
f62a369f
JMM
621 break;
622 }
623
624 switch (e->type & EAF_TYPE_MASK) {
625 case EAF_TYPE_INT:
6fbcd891 626 RESULT_(da.f_type, i, e->u.data);
f62a369f
JMM
627 break;
628 case EAF_TYPE_ROUTER_ID:
6fbcd891 629 RESULT_(T_QUAD, i, e->u.data);
f62a369f
JMM
630 break;
631 case EAF_TYPE_OPAQUE:
6fbcd891 632 RESULT_(T_ENUM_EMPTY, i, 0);
f62a369f
JMM
633 break;
634 case EAF_TYPE_IP_ADDRESS:
6fbcd891 635 RESULT_(T_IP, ip, *((ip_addr *) e->u.ptr->data));
f62a369f
JMM
636 break;
637 case EAF_TYPE_AS_PATH:
6fbcd891 638 RESULT_(T_PATH, ad, e->u.ptr);
f62a369f
JMM
639 break;
640 case EAF_TYPE_BITFIELD:
6fbcd891 641 RESULT_(T_BOOL, i, !!(e->u.data & (1u << da.bit)));
f62a369f
JMM
642 break;
643 case EAF_TYPE_INT_SET:
6fbcd891 644 RESULT_(T_CLIST, ad, e->u.ptr);
f62a369f
JMM
645 break;
646 case EAF_TYPE_EC_SET:
6fbcd891 647 RESULT_(T_ECLIST, ad, e->u.ptr);
f62a369f
JMM
648 break;
649 case EAF_TYPE_LC_SET:
6fbcd891 650 RESULT_(T_LCLIST, ad, e->u.ptr);
f62a369f
JMM
651 break;
652 case EAF_TYPE_UNDEF:
f74d1976 653 RESULT_VOID;
f62a369f
JMM
654 break;
655 default:
4c553c5a 656 bug("Unknown dynamic attribute type");
f62a369f
JMM
657 }
658 }
967b88d9 659 }
4c553c5a 660
a84b8b6e
MM
661 INST(FI_EA_SET, 1, 0) {
662 ACCESS_RTE;
663 ACCESS_EATTRS;
664 ARG_ANY(1);
665 DYNAMIC_ATTR;
26194bd6 666 ARG_TYPE(1, da.f_type);
a84b8b6e
MM
667 {
668 struct ea_list *l = lp_alloc(fs->pool, sizeof(struct ea_list) + sizeof(eattr));
669
670 l->next = NULL;
671 l->flags = EALF_SORTED;
672 l->count = 1;
673 l->attrs[0].id = da.ea_code;
674 l->attrs[0].flags = 0;
675 l->attrs[0].type = da.type | EAF_ORIGINATED | EAF_FRESH;
676
677 switch (da.type) {
678 case EAF_TYPE_INT:
a84b8b6e 679 case EAF_TYPE_ROUTER_ID:
a84b8b6e
MM
680 l->attrs[0].u.data = v1.val.i;
681 break;
682
683 case EAF_TYPE_OPAQUE:
684 runtime( "Setting opaque attribute is not allowed" );
685 break;
bfa15a64 686
26194bd6 687 case EAF_TYPE_IP_ADDRESS:;
a84b8b6e
MM
688 int len = sizeof(ip_addr);
689 struct adata *ad = lp_alloc(fs->pool, sizeof(struct adata) + len);
690 ad->length = len;
691 (* (ip_addr *) ad->data) = v1.val.ip;
692 l->attrs[0].u.ptr = ad;
693 break;
bfa15a64 694
a84b8b6e 695 case EAF_TYPE_AS_PATH:
26194bd6
OZ
696 case EAF_TYPE_INT_SET:
697 case EAF_TYPE_EC_SET:
698 case EAF_TYPE_LC_SET:
a84b8b6e
MM
699 l->attrs[0].u.ptr = v1.val.ad;
700 break;
bfa15a64 701
a84b8b6e 702 case EAF_TYPE_BITFIELD:
a84b8b6e
MM
703 {
704 /* First, we have to find the old value */
705 eattr *e = ea_find(*fs->eattrs, da.ea_code);
706 u32 data = e ? e->u.data : 0;
707
708 if (v1.val.i)
709 l->attrs[0].u.data = data | (1u << da.bit);
710 else
711 l->attrs[0].u.data = data & ~(1u << da.bit);
712 }
713 break;
bfa15a64 714
bfa15a64
OZ
715 default:
716 bug("Unknown dynamic attribute type");
a84b8b6e
MM
717 }
718
719 f_rta_cow(fs);
720 l->next = *fs->eattrs;
721 *fs->eattrs = l;
722 }
723 }
724
9b46748d
MM
725 INST(FI_EA_UNSET, 0, 0) {
726 DYNAMIC_ATTR;
727 ACCESS_RTE;
728 ACCESS_EATTRS;
729
730 {
731 struct ea_list *l = lp_alloc(fs->pool, sizeof(struct ea_list) + sizeof(eattr));
732
733 l->next = NULL;
734 l->flags = EALF_SORTED;
735 l->count = 1;
736 l->attrs[0].id = da.ea_code;
737 l->attrs[0].flags = 0;
8d65add6 738 l->attrs[0].type = EAF_TYPE_UNDEF | EAF_ORIGINATED | EAF_FRESH;
9b46748d
MM
739 l->attrs[0].u.data = 0;
740
741 f_rta_cow(fs);
742 l->next = *fs->eattrs;
743 *fs->eattrs = l;
744 }
745 }
746
4c553c5a 747 INST(FI_PREF_GET, 0, 1) {
f62a369f 748 ACCESS_RTE;
4c553c5a 749 RESULT(T_INT, i, (*fs->rte)->pref);
967b88d9 750 }
4c553c5a 751
a84b8b6e
MM
752 INST(FI_PREF_SET, 1, 0) {
753 ACCESS_RTE;
754 ARG(1,T_INT);
755 if (v1.val.i > 0xFFFF)
756 runtime( "Setting preference value out of bounds" );
757 f_rte_cow(fs);
758 (*fs->rte)->pref = v1.val.i;
759 }
760
4c553c5a 761 INST(FI_LENGTH, 1, 1) { /* Get length of */
f62a369f 762 ARG_ANY(1);
f62a369f 763 switch(v1.type) {
4c553c5a
MM
764 case T_NET: RESULT(T_INT, i, net_pxlen(v1.val.net)); break;
765 case T_PATH: RESULT(T_INT, i, as_path_getlen(v1.val.ad)); break;
766 case T_CLIST: RESULT(T_INT, i, int_set_get_size(v1.val.ad)); break;
767 case T_ECLIST: RESULT(T_INT, i, ec_set_get_size(v1.val.ad)); break;
768 case T_LCLIST: RESULT(T_INT, i, lc_set_get_size(v1.val.ad)); break;
f62a369f
JMM
769 default: runtime( "Prefix, path, clist or eclist expected" );
770 }
967b88d9 771 }
4c553c5a 772
ff2ca10c 773 INST(FI_NET_SRC, 1, 1) { /* Get src prefix */
f62a369f 774 ARG(1, T_NET);
f62a369f 775
ff2ca10c 776 net_addr_union *net = (void *) v1.val.net;
b40c0f02 777 net_addr *src = falloc(sizeof(net_addr_ip6));
ff2ca10c
OZ
778 const byte *part;
779
780 switch(v1.val.net->type) {
781 case NET_FLOW4:
782 part = flow4_get_part(&net->flow4, FLOW_TYPE_SRC_PREFIX);
783 if (part)
784 net_fill_ip4(src, flow_read_ip4_part(part), flow_read_pxlen(part));
785 else
786 net_fill_ip4(src, IP4_NONE, 0);
787 break;
788
789 case NET_FLOW6:
790 part = flow6_get_part(&net->flow6, FLOW_TYPE_SRC_PREFIX);
791 if (part)
792 net_fill_ip6(src, flow_read_ip6_part(part), flow_read_pxlen(part));
793 else
794 net_fill_ip6(src, IP6_NONE, 0);
795 break;
796
797 case NET_IP6_SADR:
798 net_fill_ip6(src, net->ip6_sadr.src_prefix, net->ip6_sadr.src_pxlen);
799 break;
800
801 default:
802 runtime( "Flow or SADR expected" );
803 }
f62a369f 804
4c553c5a 805 RESULT(T_NET, net, src);
967b88d9 806 }
4c553c5a 807
ff2ca10c
OZ
808 INST(FI_NET_DST, 1, 1) { /* Get dst prefix */
809 ARG(1, T_NET);
810
811 net_addr_union *net = (void *) v1.val.net;
812 net_addr *dst = falloc(sizeof(net_addr_ip6));
813 const byte *part;
814
815 switch(v1.val.net->type) {
816 case NET_FLOW4:
817 part = flow4_get_part(&net->flow4, FLOW_TYPE_DST_PREFIX);
818 if (part)
819 net_fill_ip4(dst, flow_read_ip4_part(part), flow_read_pxlen(part));
820 else
821 net_fill_ip4(dst, IP4_NONE, 0);
822 break;
823
824 case NET_FLOW6:
825 part = flow6_get_part(&net->flow6, FLOW_TYPE_DST_PREFIX);
826 if (part)
827 net_fill_ip6(dst, flow_read_ip6_part(part), flow_read_pxlen(part));
828 else
829 net_fill_ip6(dst, IP6_NONE, 0);
830 break;
831
832 case NET_IP6_SADR:
833 net_fill_ip6(dst, net->ip6_sadr.dst_prefix, net->ip6_sadr.dst_pxlen);
834 break;
835
836 default:
837 runtime( "Flow or SADR expected" );
838 }
839
840 RESULT(T_NET, net, dst);
841 }
842
4c553c5a 843 INST(FI_ROA_MAXLEN, 1, 1) { /* Get ROA max prefix length */
f62a369f
JMM
844 ARG(1, T_NET);
845 if (!net_is_roa(v1.val.net))
846 runtime( "ROA expected" );
847
4c553c5a 848 RESULT(T_INT, i, (v1.val.net->type == NET_ROA4) ?
f62a369f 849 ((net_addr_roa4 *) v1.val.net)->max_pxlen :
4c553c5a 850 ((net_addr_roa6 *) v1.val.net)->max_pxlen);
967b88d9 851 }
4c553c5a
MM
852
853 INST(FI_ROA_ASN, 1, 1) { /* Get ROA ASN */
f62a369f
JMM
854 ARG(1, T_NET);
855 if (!net_is_roa(v1.val.net))
856 runtime( "ROA expected" );
857
4c553c5a 858 RESULT(T_INT, i, (v1.val.net->type == NET_ROA4) ?
f62a369f 859 ((net_addr_roa4 *) v1.val.net)->asn :
4c553c5a 860 ((net_addr_roa6 *) v1.val.net)->asn);
967b88d9 861 }
4c553c5a
MM
862
863 INST(FI_IP, 1, 1) { /* Convert prefix to ... */
f62a369f 864 ARG(1, T_NET);
4c553c5a 865 RESULT(T_IP, ip, net_prefix(v1.val.net));
967b88d9 866 }
4c553c5a
MM
867
868 INST(FI_ROUTE_DISTINGUISHER, 1, 1) {
f62a369f 869 ARG(1, T_NET);
f62a369f
JMM
870 if (!net_is_vpn(v1.val.net))
871 runtime( "VPN address expected" );
4c553c5a 872 RESULT(T_RD, ec, net_rd(v1.val.net));
967b88d9 873 }
f62a369f 874
4c553c5a
MM
875 INST(FI_AS_PATH_FIRST, 1, 1) { /* Get first ASN from AS PATH */
876 ARG(1, T_PATH);
10c4cd96 877 u32 as = 0;
f62a369f 878 as_path_get_first(v1.val.ad, &as);
4c553c5a 879 RESULT(T_INT, i, as);
967b88d9 880 }
f62a369f 881
bfa15a64 882 INST(FI_AS_PATH_LAST, 1, 1) { /* Get last ASN from AS PATH */
4c553c5a 883 ARG(1, T_PATH);
10c4cd96 884 u32 as = 0;
f62a369f 885 as_path_get_last(v1.val.ad, &as);
4c553c5a 886 RESULT(T_INT, i, as);
967b88d9 887 }
4c553c5a
MM
888
889 INST(FI_AS_PATH_LAST_NAG, 1, 1) { /* Get last ASN from non-aggregated part of AS PATH */
f62a369f 890 ARG(1, T_PATH);
4c553c5a
MM
891 RESULT(T_INT, i, as_path_get_last_nonaggregated(v1.val.ad));
892 }
f62a369f 893
a84b8b6e 894 INST(FI_RETURN, 1, 1) {
b40c0f02 895 NEVER_CONSTANT;
a84b8b6e
MM
896 /* Acquire the return value */
897 ARG_ANY(1);
898 uint retpos = fstk->vcnt;
899
900 /* Drop every sub-block including ourselves */
901 while ((fstk->ecnt-- > 0) && !(fstk->estk[fstk->ecnt].emask & FE_RETURN))
902 ;
903
904 /* Now we are at the caller frame; if no such, try to convert to accept/reject. */
905 if (!fstk->ecnt)
906 if (fstk->vstk[retpos].type == T_BOOL)
907 if (fstk->vstk[retpos].val.i)
a84b8b6e
MM
908 return F_ACCEPT;
909 else
910 return F_REJECT;
911 else
912 runtime("Can't return non-bool from non-function");
913
914 /* Set the value stack position, overwriting the former implicit void */
915 fstk->vcnt = fstk->estk[fstk->ecnt].ventry - 1;
916
917 /* Copy the return value */
918 RESULT_VAL(fstk->vstk[retpos]);
919 }
920
4c553c5a 921 INST(FI_CALL, 0, 1) {
b40c0f02 922 NEVER_CONSTANT;
96d757c1 923 SYMBOL;
4f082dfa 924
3f477ccb 925 FID_SAME_BODY()
dfb3eb77 926 if (!(f1->sym->flags & SYM_FLAG_SAME))
3f477ccb
MM
927 return 0;
928 FID_INTERPRET_BODY()
929
96d757c1
JMM
930 /* Push the body on stack */
931 LINEX(sym->function);
ea4f55e3 932 curline.emask |= FE_RETURN;
bfa15a64 933
96d757c1
JMM
934 /* Before this instruction was called, there was the T_VOID
935 * automatic return value pushed on value stack and also
936 * sym->function->args function arguments. Setting the
937 * vbase to point to first argument. */
938 ASSERT(curline.ventry >= sym->function->args);
939 curline.ventry -= sym->function->args;
940 curline.vbase = curline.ventry;
941
942 /* Storage for local variables */
1757a6fc
MM
943 memset(&(fstk->vstk[fstk->vcnt]), 0, sizeof(struct f_val) * sym->function->vars);
944 fstk->vcnt += sym->function->vars;
967b88d9 945 }
4c553c5a
MM
946
947 INST(FI_DROP_RESULT, 1, 0) {
b40c0f02 948 NEVER_CONSTANT;
4c553c5a 949 ARG_ANY(1);
967b88d9 950 }
4c553c5a 951
4c553c5a 952 INST(FI_SWITCH, 1, 0) {
f62a369f 953 ARG_ANY(1);
26bfe59f 954
f634adc7 955 FID_MEMBER(struct f_tree *, tree, [[!same_tree(f1->tree, f2->tree)]], "tree %p", item->tree);
26bfe59f 956
32793ab6
MM
957 const struct f_tree *t = find_tree(tree, &v1);
958 if (!t) {
4c553c5a 959 v1.type = T_VOID;
32793ab6
MM
960 t = find_tree(tree, &v1);
961 if (!t) {
4c553c5a 962 debug( "No else statement?\n");
b40c0f02 963 FID_HIC(,break,return NULL);
f62a369f 964 }
f62a369f 965 }
4c553c5a
MM
966 /* It is actually possible to have t->data NULL */
967
32793ab6 968 LINEX(t->data);
967b88d9 969 }
4c553c5a
MM
970
971 INST(FI_IP_MASK, 2, 1) { /* IP.MASK(val) */
f62a369f
JMM
972 ARG(1, T_IP);
973 ARG(2, T_INT);
4c553c5a 974 RESULT(T_IP, ip, [[ ipa_is_ip4(v1.val.ip) ?
f62a369f 975 ipa_from_ip4(ip4_and(ipa_to_ip4(v1.val.ip), ip4_mkmask(v2.val.i))) :
4c553c5a 976 ipa_from_ip6(ip6_and(ipa_to_ip6(v1.val.ip), ip6_mkmask(v2.val.i))) ]]);
967b88d9 977 }
f62a369f 978
4c553c5a 979 INST(FI_PATH_PREPEND, 2, 1) { /* Path prepend */
f62a369f
JMM
980 ARG(1, T_PATH);
981 ARG(2, T_INT);
b40c0f02 982 RESULT(T_PATH, ad, [[ as_path_prepend(fpool, v1.val.ad, v2.val.i) ]]);
4c553c5a
MM
983 }
984
985 INST(FI_CLIST_ADD, 2, 1) { /* (Extended) Community list add */
986 ARG_ANY(1);
987 ARG_ANY(2);
6fbcd891
OZ
988 RESULT_TYPE(f1->type);
989
4c553c5a
MM
990 if (v1.type == T_PATH)
991 runtime("Can't add to path");
992
993 else if (v1.type == T_CLIST)
994 {
995 /* Community (or cluster) list */
996 struct f_val dummy;
997
998 if ((v2.type == T_PAIR) || (v2.type == T_QUAD))
6fbcd891 999 RESULT_(T_CLIST, ad, [[ int_set_add(fpool, v1.val.ad, v2.val.i) ]]);
4c553c5a
MM
1000 /* IP->Quad implicit conversion */
1001 else if (val_is_ip4(&v2))
6fbcd891 1002 RESULT_(T_CLIST, ad, [[ int_set_add(fpool, v1.val.ad, ipa_to_u32(v2.val.ip)) ]]);
4c553c5a
MM
1003 else if ((v2.type == T_SET) && clist_set_type(v2.val.t, &dummy))
1004 runtime("Can't add set");
1005 else if (v2.type == T_CLIST)
6fbcd891 1006 RESULT_(T_CLIST, ad, [[ int_set_union(fpool, v1.val.ad, v2.val.ad) ]]);
4c553c5a
MM
1007 else
1008 runtime("Can't add non-pair");
1009 }
f62a369f 1010
4c553c5a
MM
1011 else if (v1.type == T_ECLIST)
1012 {
1013 /* v2.val is either EC or EC-set */
1014 if ((v2.type == T_SET) && eclist_set_type(v2.val.t))
1015 runtime("Can't add set");
1016 else if (v2.type == T_ECLIST)
6fbcd891 1017 RESULT_(T_ECLIST, ad, [[ ec_set_union(fpool, v1.val.ad, v2.val.ad) ]]);
4c553c5a
MM
1018 else if (v2.type != T_EC)
1019 runtime("Can't add non-ec");
1020 else
6fbcd891 1021 RESULT_(T_ECLIST, ad, [[ ec_set_add(fpool, v1.val.ad, v2.val.ec) ]]);
4c553c5a
MM
1022 }
1023
1024 else if (v1.type == T_LCLIST)
1025 {
1026 /* v2.val is either LC or LC-set */
1027 if ((v2.type == T_SET) && lclist_set_type(v2.val.t))
1028 runtime("Can't add set");
1029 else if (v2.type == T_LCLIST)
6fbcd891 1030 RESULT_(T_LCLIST, ad, [[ lc_set_union(fpool, v1.val.ad, v2.val.ad) ]]);
4c553c5a
MM
1031 else if (v2.type != T_LC)
1032 runtime("Can't add non-lc");
1033 else
6fbcd891 1034 RESULT_(T_LCLIST, ad, [[ lc_set_add(fpool, v1.val.ad, v2.val.lc) ]]);
4c553c5a
MM
1035
1036 }
1037
1038 else
1039 runtime("Can't add to non-[e|l]clist");
967b88d9 1040 }
f62a369f 1041
4c553c5a 1042 INST(FI_CLIST_DEL, 2, 1) { /* (Extended) Community list add or delete */
f62a369f
JMM
1043 ARG_ANY(1);
1044 ARG_ANY(2);
6fbcd891
OZ
1045 RESULT_TYPE(f1->type);
1046
f62a369f
JMM
1047 if (v1.type == T_PATH)
1048 {
4c553c5a 1049 const struct f_tree *set = NULL;
f62a369f 1050 u32 key = 0;
f62a369f
JMM
1051
1052 if (v2.type == T_INT)
1053 key = v2.val.i;
1054 else if ((v2.type == T_SET) && (v2.val.t->from.type == T_INT))
1055 set = v2.val.t;
1056 else
1057 runtime("Can't delete non-integer (set)");
1058
6fbcd891 1059 RESULT_(T_PATH, ad, [[ as_path_filter(fpool, v1.val.ad, set, key, 0) ]]);
f62a369f 1060 }
4c553c5a 1061
f62a369f
JMM
1062 else if (v1.type == T_CLIST)
1063 {
1064 /* Community (or cluster) list */
1065 struct f_val dummy;
f62a369f
JMM
1066
1067 if ((v2.type == T_PAIR) || (v2.type == T_QUAD))
6fbcd891 1068 RESULT_(T_CLIST, ad, [[ int_set_del(fpool, v1.val.ad, v2.val.i) ]]);
f62a369f 1069 /* IP->Quad implicit conversion */
4c553c5a 1070 else if (val_is_ip4(&v2))
6fbcd891 1071 RESULT_(T_CLIST, ad, [[ int_set_del(fpool, v1.val.ad, ipa_to_u32(v2.val.ip)) ]]);
4c553c5a 1072 else if ((v2.type == T_SET) && clist_set_type(v2.val.t, &dummy) || (v2.type == T_CLIST))
6fbcd891 1073 RESULT_(T_CLIST, ad, [[ clist_filter(fpool, v1.val.ad, &v2, 0) ]]);
f62a369f 1074 else
4c553c5a 1075 runtime("Can't delete non-pair");
f62a369f 1076 }
4c553c5a 1077
f62a369f
JMM
1078 else if (v1.type == T_ECLIST)
1079 {
f62a369f 1080 /* v2.val is either EC or EC-set */
4c553c5a 1081 if ((v2.type == T_SET) && eclist_set_type(v2.val.t) || (v2.type == T_ECLIST))
6fbcd891 1082 RESULT_(T_ECLIST, ad, [[ eclist_filter(fpool, v1.val.ad, &v2, 0) ]]);
f62a369f 1083 else if (v2.type != T_EC)
4c553c5a
MM
1084 runtime("Can't delete non-ec");
1085 else
6fbcd891 1086 RESULT_(T_ECLIST, ad, [[ ec_set_del(fpool, v1.val.ad, v2.val.ec) ]]);
f62a369f 1087 }
4c553c5a 1088
f62a369f
JMM
1089 else if (v1.type == T_LCLIST)
1090 {
f62a369f 1091 /* v2.val is either LC or LC-set */
4c553c5a 1092 if ((v2.type == T_SET) && lclist_set_type(v2.val.t) || (v2.type == T_LCLIST))
6fbcd891 1093 RESULT_(T_LCLIST, ad, [[ lclist_filter(fpool, v1.val.ad, &v2, 0) ]]);
f62a369f 1094 else if (v2.type != T_LC)
4c553c5a
MM
1095 runtime("Can't delete non-lc");
1096 else
6fbcd891 1097 RESULT_(T_LCLIST, ad, [[ lc_set_del(fpool, v1.val.ad, v2.val.lc) ]]);
4c553c5a 1098 }
f62a369f 1099
4c553c5a
MM
1100 else
1101 runtime("Can't delete in non-[e|l]clist");
1102 }
f62a369f 1103
4c553c5a
MM
1104 INST(FI_CLIST_FILTER, 2, 1) { /* (Extended) Community list add or delete */
1105 ARG_ANY(1);
1106 ARG_ANY(2);
6fbcd891
OZ
1107 RESULT_TYPE(f1->type);
1108
4c553c5a
MM
1109 if (v1.type == T_PATH)
1110 {
1111 u32 key = 0;
f62a369f 1112
4c553c5a 1113 if ((v2.type == T_SET) && (v2.val.t->from.type == T_INT))
6fbcd891 1114 RESULT_(T_PATH, ad, [[ as_path_filter(fpool, v1.val.ad, v2.val.t, key, 1) ]]);
4c553c5a
MM
1115 else
1116 runtime("Can't filter integer");
f62a369f 1117 }
f62a369f 1118
4c553c5a
MM
1119 else if (v1.type == T_CLIST)
1120 {
1121 /* Community (or cluster) list */
1122 struct f_val dummy;
f62a369f 1123
4c553c5a 1124 if ((v2.type == T_SET) && clist_set_type(v2.val.t, &dummy) || (v2.type == T_CLIST))
6fbcd891 1125 RESULT_(T_CLIST, ad, [[ clist_filter(fpool, v1.val.ad, &v2, 1) ]]);
4c553c5a
MM
1126 else
1127 runtime("Can't filter pair");
1128 }
1129
1130 else if (v1.type == T_ECLIST)
f62a369f 1131 {
4c553c5a
MM
1132 /* v2.val is either EC or EC-set */
1133 if ((v2.type == T_SET) && eclist_set_type(v2.val.t) || (v2.type == T_ECLIST))
6fbcd891 1134 RESULT_(T_ECLIST, ad, [[ eclist_filter(fpool, v1.val.ad, &v2, 1) ]]);
4c553c5a
MM
1135 else
1136 runtime("Can't filter ec");
1137 }
f62a369f 1138
4c553c5a
MM
1139 else if (v1.type == T_LCLIST)
1140 {
1141 /* v2.val is either LC or LC-set */
1142 if ((v2.type == T_SET) && lclist_set_type(v2.val.t) || (v2.type == T_LCLIST))
6fbcd891 1143 RESULT_(T_LCLIST, ad, [[ lclist_filter(fpool, v1.val.ad, &v2, 1) ]]);
4c553c5a
MM
1144 else
1145 runtime("Can't filter lc");
f62a369f 1146 }
4c553c5a 1147
f62a369f 1148 else
4c553c5a
MM
1149 runtime("Can't filter non-[e|l]clist");
1150 }
f62a369f 1151
4c553c5a 1152 INST(FI_ROA_CHECK_IMPLICIT, 0, 1) { /* ROA Check */
b40c0f02 1153 NEVER_CONSTANT;
4c553c5a 1154 RTC(1);
b40c0f02 1155 struct rtable *table = rtc->table;
4c553c5a
MM
1156 ACCESS_RTE;
1157 ACCESS_EATTRS;
1158 const net_addr *net = (*fs->rte)->net->n.addr;
f62a369f 1159
4c553c5a
MM
1160 /* We ignore temporary attributes, probably not a problem here */
1161 /* 0x02 is a value of BA_AS_PATH, we don't want to include BGP headers */
1162 eattr *e = ea_find(*fs->eattrs, EA_CODE(PROTOCOL_BGP, 0x02));
f62a369f 1163
4c553c5a
MM
1164 if (!e || ((e->type & EAF_TYPE_MASK) != EAF_TYPE_AS_PATH))
1165 runtime("Missing AS_PATH attribute");
1166
1167 u32 as = 0;
1168 as_path_get_last(e->u.ptr, &as);
f62a369f 1169
f62a369f
JMM
1170 if (!table)
1171 runtime("Missing ROA table");
1172
1173 if (table->addr_type != NET_ROA4 && table->addr_type != NET_ROA6)
1174 runtime("Table type must be either ROA4 or ROA6");
1175
4c553c5a
MM
1176 if (table->addr_type != (net->type == NET_IP4 ? NET_ROA4 : NET_ROA6))
1177 RESULT(T_ENUM_ROA, i, ROA_UNKNOWN); /* Prefix and table type mismatch */
1178 else
1179 RESULT(T_ENUM_ROA, i, [[ net_roa_check(table, net, as) ]]);
1180 }
1181
1182 INST(FI_ROA_CHECK_EXPLICIT, 2, 1) { /* ROA Check */
b40c0f02 1183 NEVER_CONSTANT;
4c553c5a
MM
1184 ARG(1, T_NET);
1185 ARG(2, T_INT);
1186 RTC(3);
b40c0f02 1187 struct rtable *table = rtc->table;
4c553c5a
MM
1188
1189 u32 as = v2.val.i;
1190
1191 if (!table)
1192 runtime("Missing ROA table");
1193
1194 if (table->addr_type != NET_ROA4 && table->addr_type != NET_ROA6)
1195 runtime("Table type must be either ROA4 or ROA6");
f62a369f
JMM
1196
1197 if (table->addr_type != (v1.val.net->type == NET_IP4 ? NET_ROA4 : NET_ROA6))
4c553c5a 1198 RESULT(T_ENUM_ROA, i, ROA_UNKNOWN); /* Prefix and table type mismatch */
f62a369f 1199 else
4c553c5a 1200 RESULT(T_ENUM_ROA, i, [[ net_roa_check(table, v1.val.net, as) ]]);
f62a369f 1201
967b88d9 1202 }
f62a369f 1203
4c553c5a 1204 INST(FI_FORMAT, 1, 0) { /* Format */
f62a369f 1205 ARG_ANY(1);
b40c0f02 1206 RESULT(T_STRING, s, val_format_str(fpool, &v1));
967b88d9 1207 }
f62a369f 1208
4c553c5a 1209 INST(FI_ASSERT, 1, 0) { /* Birdtest Assert */
b40c0f02 1210 NEVER_CONSTANT;
f62a369f 1211 ARG(1, T_BOOL);
550a6488 1212
f634adc7 1213 FID_MEMBER(char *, s, [[strcmp(f1->s, f2->s)]], "string %s", item->s);
b40c0f02
MM
1214
1215 ASSERT(s);
26bfe59f 1216
c0e958e0
MM
1217 if (!bt_assert_hook)
1218 runtime("No bt_assert hook registered, can't assert");
1219
b40c0f02 1220 bt_assert_hook(v1.val.i, what);
967b88d9 1221 }