Looks good to me:

Acked-by: Jarno Rajahalme <[email protected]>

> On Mar 15, 2017, at 4:01 PM, Joe Stringer <[email protected]> wrote:
> 
> From: Yi-Hung Wei <[email protected]>
> 
> vl_mff_map is introduced in commit 04f48a68c428 ("ofp-actions: Fix variable
> length meta-flow OXMs") to account variable length mf_field, and it is used
> to decode variable length mf_field in ofp_action. In this patch, vl_mff_map
> is further used to decode the variable length match field as well.
> 
> Signed-off-by: Yi-Hung Wei <[email protected]>
> Signed-off-by: Joe Stringer <[email protected]>
> ---
> include/openvswitch/ofp-util.h |  6 ++--
> lib/learning-switch.c          |  2 +-
> lib/nx-match.c                 | 46 ++++++++++++++++--------
> lib/nx-match.h                 |  7 ++--
> lib/ofp-print.c                |  4 +--
> lib/ofp-util.c                 | 80 +++++++++++++++++++++++++++++-------------
> ofproto/ofproto.c              | 11 +++---
> ovn/controller/pinctrl.c       |  2 +-
> tests/ofproto.at               | 15 +++++---
> utilities/ovs-ofctl.c          | 13 +++----
> 10 files changed, 123 insertions(+), 63 deletions(-)
> 
> diff --git a/include/openvswitch/ofp-util.h b/include/openvswitch/ofp-util.h
> index 0c3a10aa4264..e73a942a3e15 100644
> --- a/include/openvswitch/ofp-util.h
> +++ b/include/openvswitch/ofp-util.h
> @@ -222,7 +222,7 @@ void ofputil_match_to_ofp10_match(const struct match *, 
> struct ofp10_match *);
> 
> /* Work with ofp11_match. */
> enum ofperr ofputil_pull_ofp11_match(struct ofpbuf *, const struct tun_table 
> *,
> -                                     struct match *,
> +                                     const struct vl_mff_map *, struct match 
> *,
>                                      uint16_t *padded_match_len);
> enum ofperr ofputil_pull_ofp11_mask(struct ofpbuf *, struct match *,
>                                     struct mf_bitmap *bm);
> @@ -352,7 +352,7 @@ struct ofputil_flow_stats_request {
> 
> enum ofperr ofputil_decode_flow_stats_request(
>     struct ofputil_flow_stats_request *, const struct ofp_header *,
> -    const struct tun_table *);
> +    const struct tun_table *, const struct vl_mff_map *);
> struct ofpbuf *ofputil_encode_flow_stats_request(
>     const struct ofputil_flow_stats_request *, enum ofputil_protocol);
> 
> @@ -457,6 +457,7 @@ void ofputil_packet_in_destroy(struct ofputil_packet_in 
> *);
> 
> enum ofperr ofputil_decode_packet_in(const struct ofp_header *, bool loose,
>                                      const struct tun_table *,
> +                                     const struct vl_mff_map *,
>                                      struct ofputil_packet_in *,
>                                      size_t *total_len, uint32_t *buffer_id,
>                                      struct ofpbuf *continuation);
> @@ -509,6 +510,7 @@ struct ofpbuf *ofputil_encode_packet_in_private(
> enum ofperr ofputil_decode_packet_in_private(
>     const struct ofp_header *, bool loose,
>     const struct tun_table *,
> +    const struct vl_mff_map *,
>     struct ofputil_packet_in_private *,
>     size_t *total_len, uint32_t *buffer_id);
> 
> diff --git a/lib/learning-switch.c b/lib/learning-switch.c
> index bc757f46dd7a..77155d04fcc0 100644
> --- a/lib/learning-switch.c
> +++ b/lib/learning-switch.c
> @@ -523,7 +523,7 @@ process_packet_in(struct lswitch *sw, const struct 
> ofp_header *oh)
>     struct dp_packet pkt;
>     struct flow flow;
> 
> -    error = ofputil_decode_packet_in(oh, true, NULL, &pi, NULL,
> +    error = ofputil_decode_packet_in(oh, true, NULL, NULL, &pi, NULL,
>                                      &buffer_id, NULL);
>     if (error) {
>         VLOG_WARN_RL(&rl, "failed to decode packet-in: %s",
> diff --git a/lib/nx-match.c b/lib/nx-match.c
> index c258869eec80..124cb71eb7c8 100644
> --- a/lib/nx-match.c
> +++ b/lib/nx-match.c
> @@ -480,13 +480,14 @@ nx_pull_header(struct ofpbuf *b, const struct 
> vl_mff_map *vl_mff_map,
> 
> static enum ofperr
> nx_pull_match_entry(struct ofpbuf *b, bool allow_cookie,
> +                    const struct vl_mff_map *vl_mff_map,
>                     const struct mf_field **field,
>                     union mf_value *value, union mf_value *mask)
> {
>     enum ofperr error;
>     uint64_t header;
> 
> -    error = nx_pull_entry__(b, allow_cookie, NULL, &header, field, value,
> +    error = nx_pull_entry__(b, allow_cookie, vl_mff_map, &header, field, 
> value,
>                             mask);
>     if (error) {
>         return error;
> @@ -507,7 +508,8 @@ nx_pull_match_entry(struct ofpbuf *b, bool allow_cookie,
> static enum ofperr
> nx_pull_raw(const uint8_t *p, unsigned int match_len, bool strict,
>             struct match *match, ovs_be64 *cookie, ovs_be64 *cookie_mask,
> -            const struct tun_table *tun_table)
> +            const struct tun_table *tun_table,
> +            const struct vl_mff_map *vl_mff_map)
> {
>     ovs_assert((cookie != NULL) == (cookie_mask != NULL));
> 
> @@ -525,7 +527,8 @@ nx_pull_raw(const uint8_t *p, unsigned int match_len, 
> bool strict,
>         union mf_value mask;
>         enum ofperr error;
> 
> -        error = nx_pull_match_entry(&b, cookie != NULL, &field, &value, 
> &mask);
> +        error = nx_pull_match_entry(&b, cookie != NULL, vl_mff_map, &field,
> +                                    &value, &mask);
>         if (error) {
>             if (error == OFPERR_OFPBMC_BAD_FIELD && !strict) {
>                 continue;
> @@ -571,7 +574,8 @@ static enum ofperr
> nx_pull_match__(struct ofpbuf *b, unsigned int match_len, bool strict,
>                 struct match *match,
>                 ovs_be64 *cookie, ovs_be64 *cookie_mask,
> -                const struct tun_table *tun_table)
> +                const struct tun_table *tun_table,
> +                const struct vl_mff_map *vl_mff_map)
> {
>     uint8_t *p = NULL;
> 
> @@ -586,7 +590,7 @@ nx_pull_match__(struct ofpbuf *b, unsigned int match_len, 
> bool strict,
>     }
> 
>     return nx_pull_raw(p, match_len, strict, match, cookie, cookie_mask,
> -                       tun_table);
> +                       tun_table, vl_mff_map);
> }
> 
> /* Parses the nx_match formatted match description in 'b' with length
> @@ -594,16 +598,21 @@ nx_pull_match__(struct ofpbuf *b, unsigned int 
> match_len, bool strict,
>  * are valid pointers, then stores the cookie and mask in them if 'b' contains
>  * a "NXM_NX_COOKIE*" match.  Otherwise, stores 0 in both.
>  *
> + * 'vl_mff_map" is an optional parameter that is used to validate the length
> + * of variable length mf_fields in 'match'. If it is not provided, the
> + * default mf_fields with maximum length will be used.
> + *
>  * Fails with an error upon encountering an unknown NXM header.
>  *
>  * Returns 0 if successful, otherwise an OpenFlow error code. */
> enum ofperr
> nx_pull_match(struct ofpbuf *b, unsigned int match_len, struct match *match,
>               ovs_be64 *cookie, ovs_be64 *cookie_mask,
> -              const struct tun_table *tun_table)
> +              const struct tun_table *tun_table,
> +              const struct vl_mff_map *vl_mff_map)
> {
>     return nx_pull_match__(b, match_len, true, match, cookie, cookie_mask,
> -                           tun_table);
> +                           tun_table, vl_mff_map);
> }
> 
> /* Behaves the same as nx_pull_match(), but skips over unknown NXM headers,
> @@ -615,12 +624,13 @@ nx_pull_match_loose(struct ofpbuf *b, unsigned int 
> match_len,
>                     const struct tun_table *tun_table)
> {
>     return nx_pull_match__(b, match_len, false, match, cookie, cookie_mask,
> -                           tun_table);
> +                           tun_table, NULL);
> }
> 
> static enum ofperr
> oxm_pull_match__(struct ofpbuf *b, bool strict,
> -                 const struct tun_table *tun_table, struct match *match)
> +                 const struct tun_table *tun_table,
> +                 const struct vl_mff_map *vl_mff_map, struct match *match)
> {
>     struct ofp11_match_header *omh = b->data;
>     uint8_t *p;
> @@ -648,20 +658,24 @@ oxm_pull_match__(struct ofpbuf *b, bool strict,
>     }
> 
>     return nx_pull_raw(p + sizeof *omh, match_len - sizeof *omh,
> -                       strict, match, NULL, NULL, tun_table);
> +                       strict, match, NULL, NULL, tun_table, vl_mff_map);
> }
> 
> /* Parses the oxm formatted match description preceded by a struct
>  * ofp11_match_header in 'b'.  Stores the result in 'match'.
>  *
> + * 'vl_mff_map' is an optional parameter that is used to validate the length
> + * of variable length mf_fields in 'match'. If it is not provided, the
> + * default mf_fields with maximum length will be used.
> + *
>  * Fails with an error when encountering unknown OXM headers.
>  *
>  * Returns 0 if successful, otherwise an OpenFlow error code. */
> enum ofperr
> oxm_pull_match(struct ofpbuf *b, const struct tun_table *tun_table,
> -               struct match *match)
> +               const struct vl_mff_map *vl_mff_map, struct match *match)
> {
> -    return oxm_pull_match__(b, true, tun_table, match);
> +    return oxm_pull_match__(b, true, tun_table, vl_mff_map, match);
> }
> 
> /* Behaves the same as oxm_pull_match() with one exception.  Skips over 
> unknown
> @@ -670,7 +684,7 @@ enum ofperr
> oxm_pull_match_loose(struct ofpbuf *b, const struct tun_table *tun_table,
>                      struct match *match)
> {
> -    return oxm_pull_match__(b, false, tun_table, match);
> +    return oxm_pull_match__(b, false, tun_table, NULL, match);
> }
> 
> /* Parses the OXM match description in the 'oxm_len' bytes in 'oxm'.  Stores
> @@ -683,9 +697,11 @@ oxm_pull_match_loose(struct ofpbuf *b, const struct 
> tun_table *tun_table,
>  */
> enum ofperr
> oxm_decode_match(const void *oxm, size_t oxm_len, bool loose,
> -                 const struct tun_table *tun_table, struct match *match)
> +                 const struct tun_table *tun_table,
> +                 const struct vl_mff_map *vl_mff_map, struct match *match)
> {
> -    return nx_pull_raw(oxm, oxm_len, !loose, match, NULL, NULL, tun_table);
> +    return nx_pull_raw(oxm, oxm_len, !loose, match, NULL, NULL, tun_table,
> +                       vl_mff_map);
> }
> 
> /* Verify an array of OXM TLVs treating value of each TLV as a mask,
> diff --git a/lib/nx-match.h b/lib/nx-match.h
> index e103dd5fa74d..03e2b9db1a64 100644
> --- a/lib/nx-match.h
> +++ b/lib/nx-match.h
> @@ -52,17 +52,18 @@ char *mf_parse_subfield(struct mf_subfield *, const char 
> *s)
> enum ofperr nx_pull_match(struct ofpbuf *, unsigned int match_len,
>                           struct match *,
>                           ovs_be64 *cookie, ovs_be64 *cookie_mask,
> -                          const struct tun_table *);
> +                          const struct tun_table *, const struct vl_mff_map 
> *);
> enum ofperr nx_pull_match_loose(struct ofpbuf *, unsigned int match_len,
>                                 struct match *, ovs_be64 *cookie,
>                                 ovs_be64 *cookie_mask,
>                                 const struct tun_table *);
> enum ofperr oxm_pull_match(struct ofpbuf *, const struct tun_table *,
> -                           struct match *);
> +                           const struct vl_mff_map *, struct match *);
> enum ofperr oxm_pull_match_loose(struct ofpbuf *, const struct tun_table *,
>                                  struct match *);
> enum ofperr oxm_decode_match(const void *, size_t, bool,
> -                             const struct tun_table *, struct match *);
> +                             const struct tun_table *,
> +                             const struct vl_mff_map *, struct match *);
> enum ofperr oxm_pull_field_array(const void *, size_t fields_len,
>                                  struct field_array *);
> 
> diff --git a/lib/ofp-print.c b/lib/ofp-print.c
> index f7f7df26f5e1..80dbf6e16e86 100644
> --- a/lib/ofp-print.c
> +++ b/lib/ofp-print.c
> @@ -118,7 +118,7 @@ ofp_print_packet_in(struct ds *string, const struct 
> ofp_header *oh,
>     size_t total_len;
>     enum ofperr error;
> 
> -    error = ofputil_decode_packet_in_private(oh, true, NULL,
> +    error = ofputil_decode_packet_in_private(oh, true, NULL, NULL,
>                                              &pin, &total_len, &buffer_id);
>     if (error) {
>         ofp_print_error(string, error);
> @@ -1603,7 +1603,7 @@ ofp_print_flow_stats_request(struct ds *string, const 
> struct ofp_header *oh)
>     struct ofputil_flow_stats_request fsr;
>     enum ofperr error;
> 
> -    error = ofputil_decode_flow_stats_request(&fsr, oh, NULL);
> +    error = ofputil_decode_flow_stats_request(&fsr, oh, NULL, NULL);
>     if (error) {
>         ofp_print_error(string, error);
>         return;
> diff --git a/lib/ofp-util.c b/lib/ofp-util.c
> index d3153370f2e6..c48081fe3e7f 100644
> --- a/lib/ofp-util.c
> +++ b/lib/ofp-util.c
> @@ -278,6 +278,7 @@ ofputil_match_to_ofp10_match(const struct match *match,
> 
> enum ofperr
> ofputil_pull_ofp11_match(struct ofpbuf *buf, const struct tun_table 
> *tun_table,
> +                         const struct vl_mff_map *vl_mff_map,
>                          struct match *match, uint16_t *padded_match_len)
> {
>     struct ofp11_match_header *omh = buf->data;
> @@ -307,7 +308,7 @@ ofputil_pull_ofp11_match(struct ofpbuf *buf, const struct 
> tun_table *tun_table,
>         if (padded_match_len) {
>             *padded_match_len = ROUND_UP(match_len, 8);
>         }
> -        return oxm_pull_match(buf, tun_table, match);
> +        return oxm_pull_match(buf, tun_table, vl_mff_map, match);
> 
>     default:
>         return OFPERR_OFPBMC_BAD_TYPE;
> @@ -1585,7 +1586,8 @@ ofputil_decode_flow_mod(struct ofputil_flow_mod *fm,
> 
>         ofm = ofpbuf_pull(&b, sizeof *ofm);
> 
> -        error = ofputil_pull_ofp11_match(&b, tun_table, &fm->match, NULL);
> +        error = ofputil_pull_ofp11_match(&b, tun_table, vl_mff_map, 
> &fm->match,
> +                                         NULL);
>         if (error) {
>             return error;
>         }
> @@ -1681,7 +1683,7 @@ ofputil_decode_flow_mod(struct ofputil_flow_mod *fm,
>             nfm = ofpbuf_pull(&b, sizeof *nfm);
>             error = nx_pull_match(&b, ntohs(nfm->match_len),
>                                   &fm->match, &fm->cookie, &fm->cookie_mask,
> -                                  tun_table);
> +                                  tun_table, vl_mff_map);
>             if (error) {
>                 return error;
>             }
> @@ -2271,7 +2273,8 @@ ofputil_decode_ofpst10_flow_request(struct 
> ofputil_flow_stats_request *fsr,
> static enum ofperr
> ofputil_decode_ofpst11_flow_request(struct ofputil_flow_stats_request *fsr,
>                                     struct ofpbuf *b, bool aggregate,
> -                                    const struct tun_table *tun_table)
> +                                    const struct tun_table *tun_table,
> +                                    const struct vl_mff_map *vl_mff_map)
> {
>     const struct ofp11_flow_stats_request *ofsr;
>     enum ofperr error;
> @@ -2286,7 +2289,8 @@ ofputil_decode_ofpst11_flow_request(struct 
> ofputil_flow_stats_request *fsr,
>     fsr->out_group = ntohl(ofsr->out_group);
>     fsr->cookie = ofsr->cookie;
>     fsr->cookie_mask = ofsr->cookie_mask;
> -    error = ofputil_pull_ofp11_match(b, tun_table, &fsr->match, NULL);
> +    error = ofputil_pull_ofp11_match(b, tun_table, vl_mff_map, &fsr->match,
> +                                     NULL);
>     if (error) {
>         return error;
>     }
> @@ -2297,14 +2301,16 @@ ofputil_decode_ofpst11_flow_request(struct 
> ofputil_flow_stats_request *fsr,
> static enum ofperr
> ofputil_decode_nxst_flow_request(struct ofputil_flow_stats_request *fsr,
>                                  struct ofpbuf *b, bool aggregate,
> -                                 const struct tun_table *tun_table)
> +                                 const struct tun_table *tun_table,
> +                                 const struct vl_mff_map *vl_mff_map)
> {
>     const struct nx_flow_stats_request *nfsr;
>     enum ofperr error;
> 
>     nfsr = ofpbuf_pull(b, sizeof *nfsr);
>     error = nx_pull_match(b, ntohs(nfsr->match_len), &fsr->match,
> -                          &fsr->cookie, &fsr->cookie_mask, tun_table);
> +                          &fsr->cookie, &fsr->cookie_mask, tun_table,
> +                          vl_mff_map);
>     if (error) {
>         return error;
>     }
> @@ -2714,11 +2720,16 @@ ofputil_pull_queue_get_config_reply(struct ofpbuf 
> *msg,
> 
> /* Converts an OFPST_FLOW, OFPST_AGGREGATE, NXST_FLOW, or NXST_AGGREGATE
>  * request 'oh', into an abstract flow_stats_request in 'fsr'.  Returns 0 if
> - * successful, otherwise an OpenFlow error code. */
> + * successful, otherwise an OpenFlow error code.
> + *
> + * 'vl_mff_map' is an optional parameter that is used to validate the length
> + * of variable length mf_fields in 'match'. If it is not provided, the
> + * default mf_fields with maximum length will be used. */
> enum ofperr
> ofputil_decode_flow_stats_request(struct ofputil_flow_stats_request *fsr,
>                                   const struct ofp_header *oh,
> -                                  const struct tun_table *tun_table)
> +                                  const struct tun_table *tun_table,
> +                                  const struct vl_mff_map *vl_mff_map)
> {
>     struct ofpbuf b = ofpbuf_const_initializer(oh, ntohs(oh->length));
>     enum ofpraw raw = ofpraw_pull_assert(&b);
> @@ -2730,16 +2741,20 @@ ofputil_decode_flow_stats_request(struct 
> ofputil_flow_stats_request *fsr,
>         return ofputil_decode_ofpst10_flow_request(fsr, b.data, true);
> 
>     case OFPRAW_OFPST11_FLOW_REQUEST:
> -        return ofputil_decode_ofpst11_flow_request(fsr, &b, false, 
> tun_table);
> +        return ofputil_decode_ofpst11_flow_request(fsr, &b, false, tun_table,
> +                                                   vl_mff_map);
> 
>     case OFPRAW_OFPST11_AGGREGATE_REQUEST:
> -        return ofputil_decode_ofpst11_flow_request(fsr, &b, true, tun_table);
> +        return ofputil_decode_ofpst11_flow_request(fsr, &b, true, tun_table,
> +                                                   vl_mff_map);
> 
>     case OFPRAW_NXST_FLOW_REQUEST:
> -        return ofputil_decode_nxst_flow_request(fsr, &b, false, tun_table);
> +        return ofputil_decode_nxst_flow_request(fsr, &b, false, tun_table,
> +                                                vl_mff_map);
> 
>     case OFPRAW_NXST_AGGREGATE_REQUEST:
> -        return ofputil_decode_nxst_flow_request(fsr, &b, true, tun_table);
> +        return ofputil_decode_nxst_flow_request(fsr, &b, true, tun_table,
> +                                                vl_mff_map);
> 
>     default:
>         /* Hey, the caller lied. */
> @@ -2883,7 +2898,7 @@ ofputil_decode_flow_stats_reply(struct 
> ofputil_flow_stats *fs,
>             return EINVAL;
>         }
> 
> -        if (ofputil_pull_ofp11_match(msg, NULL, &fs->match,
> +        if (ofputil_pull_ofp11_match(msg, NULL, NULL, &fs->match,
>                                      &padded_match_len)) {
>             VLOG_WARN_RL(&bad_ofmsg_rl, "OFPST_FLOW reply bad match");
>             return EINVAL;
> @@ -2966,7 +2981,8 @@ ofputil_decode_flow_stats_reply(struct 
> ofputil_flow_stats *fs,
>                          "claims invalid length %"PRIuSIZE, match_len, 
> length);
>             return EINVAL;
>         }
> -        if (nx_pull_match(msg, match_len, &fs->match, NULL, NULL, NULL)) {
> +        if (nx_pull_match(msg, match_len, &fs->match, NULL, NULL, NULL,
> +                          NULL)) {
>             return EINVAL;
>         }
>         instructions_len = length - sizeof *nfs - ROUND_UP(match_len, 8);
> @@ -3185,7 +3201,7 @@ ofputil_decode_flow_removed(struct ofputil_flow_removed 
> *fr,
> 
>         ofr = ofpbuf_pull(&b, sizeof *ofr);
> 
> -        error = ofputil_pull_ofp11_match(&b, NULL, &fr->match, NULL);
> +        error = ofputil_pull_ofp11_match(&b, NULL, NULL, &fr->match, NULL);
>         if (error) {
>             return error;
>         }
> @@ -3222,7 +3238,7 @@ ofputil_decode_flow_removed(struct ofputil_flow_removed 
> *fr,
> 
>         nfr = ofpbuf_pull(&b, sizeof *nfr);
>         error = nx_pull_match(&b, ntohs(nfr->match_len), &fr->match, NULL,
> -                              NULL, NULL);
> +                              NULL, NULL, NULL);
>         if (error) {
>             return error;
>         }
> @@ -3344,6 +3360,7 @@ ofputil_encode_flow_removed(const struct 
> ofputil_flow_removed *fr,
> static enum ofperr
> decode_nx_packet_in2(const struct ofp_header *oh, bool loose,
>                      const struct tun_table *tun_table,
> +                     const struct vl_mff_map *vl_mff_map,
>                      struct ofputil_packet_in *pin,
>                      size_t *total_len, uint32_t *buffer_id,
>                      struct ofpbuf *continuation)
> @@ -3398,7 +3415,8 @@ decode_nx_packet_in2(const struct ofp_header *oh, bool 
> loose,
> 
>         case NXPINT_METADATA:
>             error = oxm_decode_match(payload.msg, ofpbuf_msgsize(&payload),
> -                                     loose, tun_table, &pin->flow_metadata);
> +                                     loose, tun_table, vl_mff_map,
> +                                     &pin->flow_metadata);
>             break;
> 
>         case NXPINT_USERDATA:
> @@ -3452,10 +3470,15 @@ decode_nx_packet_in2(const struct ofp_header *oh, 
> bool loose,
>  * it separately from the original OpenFlow message.  This is also true for
>  * 'pin->userdata' (which could also end up NULL if there is no userdata).
>  *
> + * 'vl_mff_map' is an optional parameter that is used to validate the length
> + * of variable length mf_fields in 'match'. If it is not provided, the
> + * default mf_fields with maximum length will be used.
> + *
>  * Returns 0 if successful, otherwise an OpenFlow error code. */
> enum ofperr
> ofputil_decode_packet_in(const struct ofp_header *oh, bool loose,
>                          const struct tun_table *tun_table,
> +                         const struct vl_mff_map *vl_mff_map,
>                          struct ofputil_packet_in *pin,
>                          size_t *total_lenp, uint32_t *buffer_idp,
>                          struct ofpbuf *continuation)
> @@ -3555,9 +3578,9 @@ ofputil_decode_packet_in(const struct ofp_header *oh, 
> bool loose,
>         pin->packet = b.data;
>         pin->packet_len = b.size;
>     } else if (raw == OFPRAW_NXT_PACKET_IN2 || raw == OFPRAW_NXT_RESUME) {
> -        enum ofperr error = decode_nx_packet_in2(oh, loose, tun_table, pin,
> -                                                 &total_len, &buffer_id,
> -                                                 continuation);
> +        enum ofperr error = decode_nx_packet_in2(oh, loose, tun_table,
> +                                                 vl_mff_map, pin, &total_len,
> +                                                 &buffer_id, continuation);
>         if (error) {
>             return error;
>         }
> @@ -4026,11 +4049,16 @@ parse_actions_property(struct ofpbuf *property, enum 
> ofp_version version,
>  * opaque to any process other than ovs-vswitchd, so this function should not
>  * be used outside ovs-vswitchd.
>  *
> + * 'vl_mff_map' is an optional parameter that is used to validate the length
> + * of variable length mf_fields in 'match'. If it is not provided, the
> + * default mf_fields with maximum length will be used.
> + *
>  * When successful, 'pin' contains some dynamically allocated data.  Call
>  * ofputil_packet_in_private_destroy() to free this data. */
> enum ofperr
> ofputil_decode_packet_in_private(const struct ofp_header *oh, bool loose,
>                                  const struct tun_table *tun_table,
> +                                 const struct vl_mff_map *vl_mff_map,
>                                  struct ofputil_packet_in_private *pin,
>                                  size_t *total_len, uint32_t *buffer_id)
> {
> @@ -4038,8 +4066,9 @@ ofputil_decode_packet_in_private(const struct 
> ofp_header *oh, bool loose,
> 
>     struct ofpbuf continuation;
>     enum ofperr error;
> -    error = ofputil_decode_packet_in(oh, loose, tun_table, &pin->public,
> -                                     total_len, buffer_id, &continuation);
> +    error = ofputil_decode_packet_in(oh, loose, tun_table, vl_mff_map,
> +                                     &pin->public, total_len, buffer_id,
> +                                     &continuation);
>     if (error) {
>         return error;
>     }
> @@ -6609,7 +6638,7 @@ ofputil_decode_flow_monitor_request(struct 
> ofputil_flow_monitor_request *rq,
>     rq->table_id = nfmr->table_id;
> 
>     return nx_pull_match(msg, ntohs(nfmr->match_len), &rq->match, NULL,
> -                         NULL, NULL);
> +                         NULL, NULL, NULL);
> }
> 
> void
> @@ -6717,7 +6746,8 @@ ofputil_decode_flow_update(struct ofputil_flow_update 
> *update,
>         update->cookie = nfuf->cookie;
>         update->priority = ntohs(nfuf->priority);
> 
> -        error = nx_pull_match(msg, match_len, &update->match, NULL, NULL, 
> NULL);
> +        error = nx_pull_match(msg, match_len, &update->match, NULL, NULL, 
> NULL,
> +                              NULL);
>         if (error) {
>             return error;
>         }
> diff --git a/ofproto/ofproto.c b/ofproto/ofproto.c
> index 9234b56250ab..04712004dc86 100644
> --- a/ofproto/ofproto.c
> +++ b/ofproto/ofproto.c
> @@ -3568,8 +3568,9 @@ handle_nxt_resume(struct ofconn *ofconn, const struct 
> ofp_header *oh)
>     enum ofperr error;
> 
>     error = ofputil_decode_packet_in_private(oh, false,
> -                                             ofproto_get_tun_tab(ofproto), 
> &pin,
> -                                             NULL, NULL);
> +                                             ofproto_get_tun_tab(ofproto),
> +                                             &ofproto->vl_mff_map, &pin, 
> NULL,
> +                                             NULL);
>     if (error) {
>         return error;
>     }
> @@ -4273,7 +4274,8 @@ handle_flow_stats_request(struct ofconn *ofconn,
>     enum ofperr error;
> 
>     error = ofputil_decode_flow_stats_request(&fsr, request,
> -                                              ofproto_get_tun_tab(ofproto));
> +                                              ofproto_get_tun_tab(ofproto),
> +                                              &ofproto->vl_mff_map);
>     if (error) {
>         return error;
>     }
> @@ -4438,7 +4440,8 @@ handle_aggregate_stats_request(struct ofconn *ofconn,
>     enum ofperr error;
> 
>     error = ofputil_decode_flow_stats_request(&request, oh,
> -                                              ofproto_get_tun_tab(ofproto));
> +                                              ofproto_get_tun_tab(ofproto),
> +                                              &ofproto->vl_mff_map);
>     if (error) {
>         return error;
>     }
> diff --git a/ovn/controller/pinctrl.c b/ovn/controller/pinctrl.c
> index 0cdbf87cfb11..0380c8481ecf 100644
> --- a/ovn/controller/pinctrl.c
> +++ b/ovn/controller/pinctrl.c
> @@ -665,7 +665,7 @@ process_packet_in(const struct ofp_header *msg)
> 
>     struct ofputil_packet_in pin;
>     struct ofpbuf continuation;
> -    enum ofperr error = ofputil_decode_packet_in(msg, true, NULL, &pin,
> +    enum ofperr error = ofputil_decode_packet_in(msg, true, NULL, NULL, &pin,
>                                                  NULL, NULL, &continuation);
> 
>     if (error) {
> diff --git a/tests/ofproto.at b/tests/ofproto.at
> index c899ec80c6cf..2136a2f6cb90 100644
> --- a/tests/ofproto.at
> +++ b/tests/ofproto.at
> @@ -5800,10 +5800,17 @@ AT_CHECK([strip_xids < stderr | sed '/FLOW_MOD/,$d'], 
> [0], [dnl
> OFPT_ERROR: OFPBAC_BAD_SET_LEN
> ])
> 
> -AT_CHECK([ovs-ofctl dump-flows br0], [0], [stdout])
> -AT_CHECK([sed -e 's/duration=[[0-9.]]*s/duration=?s/' -e 
> 's/idle_age=[[0-9]]*/idle_age=?/' stdout], [0], [dnl
> -NXST_FLOW reply (xid=0x4):
> - cookie=0x0, duration=?s, table=0, n_packets=0, n_bytes=0, idle_age=?, 
> in_port=1 actions=move:NXM_NX_TUN_METADATA0[[0..31]]->NXM_NX_REG0[[]]
> +dnl Check match field with tun_metadata
> +AT_CHECK([ovs-ofctl add-flow br0 "tun_metadata0=0x11223344 
> actions=output:2"], [0], [], [stderr])
> +AT_CHECK([ovs-ofctl add-flow br0 "tun_metadata1=0x11223344 
> actions=output:2"], [1], [], [stderr])
> +AT_CHECK([strip_xids < stderr | sed '/FLOW_MOD/,$d'], [0], [dnl
> +OFPT_ERROR: NXFMFC_INVALID_TLV_FIELD
> +])
> +
> +AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip], [0], [dnl)
> +NXST_FLOW reply:
> + in_port=1 actions=move:NXM_NX_TUN_METADATA0[[0..31]]->NXM_NX_REG0[[]]
> + tun_metadata0=0x11223344 actions=output:2
> ])
> 
> OVS_VSWITCHD_STOP(["/NXFMFC_INVALID_TLV_FIELD/d
> diff --git a/utilities/ovs-ofctl.c b/utilities/ovs-ofctl.c
> index 77332e0f8c16..426e2fbc6a1f 100644
> --- a/utilities/ovs-ofctl.c
> +++ b/utilities/ovs-ofctl.c
> @@ -1878,8 +1878,8 @@ monitor_vconn(struct vconn *vconn, bool 
> reply_to_echo_requests,
>                     struct ofputil_packet_in pin;
>                     struct ofpbuf continuation;
> 
> -                    error = ofputil_decode_packet_in(b->data, true, NULL, 
> &pin,
> -                                                     NULL, NULL,
> +                    error = ofputil_decode_packet_in(b->data, true, NULL, 
> NULL,
> +                                                     &pin, NULL, NULL,
>                                                      &continuation);
>                     if (error) {
>                         fprintf(stderr, "decoding packet-in failed: %s",
> @@ -3741,10 +3741,10 @@ ofctl_parse_nxm__(bool oxm, enum ofp_version version)
>         /* Convert nx_match to match. */
>         if (strict) {
>             if (oxm) {
> -                error = oxm_pull_match(&nx_match, NULL, &match);
> +                error = oxm_pull_match(&nx_match, NULL, NULL, &match);
>             } else {
>                 error = nx_pull_match(&nx_match, match_len, &match,
> -                                      &cookie, &cookie_mask, NULL);
> +                                      &cookie, &cookie_mask, NULL, NULL);
>             }
>         } else {
>             if (oxm) {
> @@ -4161,7 +4161,8 @@ ofctl_check_vlan(struct ovs_cmdl_context *ctx)
>     ofpbuf_init(&nxm, 0);
>     nxm_match_len = nx_put_match(&nxm, &match, htonll(0), htonll(0));
>     nxm_s = nx_match_to_string(nxm.data, nxm_match_len);
> -    error = nx_pull_match(&nxm, nxm_match_len, &nxm_match, NULL, NULL, NULL);
> +    error = nx_pull_match(&nxm, nxm_match_len, &nxm_match, NULL, NULL, NULL,
> +                          NULL);
>     printf("NXM: %s -> ", nxm_s);
>     if (error) {
>         printf("%s\n", ofperr_to_string(error));
> @@ -4177,7 +4178,7 @@ ofctl_check_vlan(struct ovs_cmdl_context *ctx)
>     ofpbuf_init(&nxm, 0);
>     nxm_match_len = oxm_put_match(&nxm, &match, OFP12_VERSION);
>     nxm_s = oxm_match_to_string(&nxm, nxm_match_len);
> -    error = oxm_pull_match(&nxm, NULL, &nxm_match);
> +    error = oxm_pull_match(&nxm, NULL, NULL, &nxm_match);
>     printf("OXM: %s -> ", nxm_s);
>     if (error) {
>         printf("%s\n", ofperr_to_string(error));
> -- 
> 2.11.1
> 

_______________________________________________
dev mailing list
[email protected]
https://mail.openvswitch.org/mailman/listinfo/ovs-dev

Reply via email to