X-Git-Url: http://git.onelab.eu/?a=blobdiff_plain;f=lib%2Fofp-util.c;h=d17811348bc0673dd9a0f29b20a26ddea9f3464a;hb=6d308b28c023e864925b1a6775b3b91d215e89bf;hp=dae6e78036d1cf5030174d42a350edfcd23b7b56;hpb=5deff5aa263a72a99141e95e50821f77bc687f15;p=sliver-openvswitch.git diff --git a/lib/ofp-util.c b/lib/ofp-util.c index dae6e7803..d17811348 100644 --- a/lib/ofp-util.c +++ b/lib/ofp-util.c @@ -85,7 +85,7 @@ ofputil_netmask_to_wcbits(ovs_be32 netmask) void ofputil_wildcard_from_ofpfw10(uint32_t ofpfw, struct flow_wildcards *wc) { - BUILD_ASSERT_DECL(FLOW_WC_SEQ == 24); + BUILD_ASSERT_DECL(FLOW_WC_SEQ == 26); /* Initialize most of wc. */ flow_wildcards_init_catchall(wc); @@ -265,10 +265,10 @@ enum ofperr ofputil_pull_ofp11_match(struct ofpbuf *buf, struct match *match, uint16_t *padded_match_len) { - struct ofp11_match_header *omh = buf->data; + struct ofp11_match_header *omh = ofpbuf_data(buf); uint16_t match_len; - if (buf->size < sizeof *omh) { + if (ofpbuf_size(buf) < sizeof *omh) { return OFPERR_OFPBMC_BAD_LEN; } @@ -278,7 +278,7 @@ ofputil_pull_ofp11_match(struct ofpbuf *buf, struct match *match, case OFPMT_STANDARD: { struct ofp11_match *om; - if (match_len != sizeof *om || buf->size < sizeof *om) { + if (match_len != sizeof *om || ofpbuf_size(buf) < sizeof *om) { return OFPERR_OFPBMC_BAD_LEN; } om = ofpbuf_pull(buf, sizeof *om); @@ -1234,15 +1234,15 @@ ofputil_decode_hello(const struct ofp_header *oh, uint32_t *allowed_versions) ofpbuf_pull(&msg, sizeof *oh); *allowed_versions = version_bitmap_from_version(oh->version); - while (msg.size) { + while (ofpbuf_size(&msg)) { const struct ofp_hello_elem_header *oheh; unsigned int len; - if (msg.size < sizeof *oheh) { + if (ofpbuf_size(&msg) < sizeof *oheh) { return false; } - oheh = msg.data; + oheh = ofpbuf_data(&msg); len = ntohs(oheh->length); if (len < sizeof *oheh || !ofpbuf_try_pull(&msg, ROUND_UP(len, 8))) { return false; @@ -1543,7 +1543,7 @@ ofputil_decode_flow_mod(struct ofputil_flow_mod *fm, return error; } - error = ofpacts_pull_openflow_instructions(&b, b.size, oh->version, + error = ofpacts_pull_openflow_instructions(&b, ofpbuf_size(&b), oh->version, ofpacts); if (error) { return error; @@ -1610,7 +1610,7 @@ ofputil_decode_flow_mod(struct ofputil_flow_mod *fm, ofputil_normalize_match(&fm->match); /* Now get the actions. */ - error = ofpacts_pull_openflow_actions(&b, b.size, oh->version, + error = ofpacts_pull_openflow_actions(&b, ofpbuf_size(&b), oh->version, ofpacts); if (error) { return error; @@ -1644,7 +1644,7 @@ ofputil_decode_flow_mod(struct ofputil_flow_mod *fm, if (error) { return error; } - error = ofpacts_pull_openflow_actions(&b, b.size, oh->version, + error = ofpacts_pull_openflow_actions(&b, ofpbuf_size(&b), oh->version, ofpacts); if (error) { return error; @@ -1679,8 +1679,8 @@ ofputil_decode_flow_mod(struct ofputil_flow_mod *fm, } } - fm->ofpacts = ofpacts->data; - fm->ofpacts_len = ofpacts->size; + fm->ofpacts = ofpbuf_data(ofpacts); + fm->ofpacts_len = ofpbuf_size(ofpacts); error = ofputil_decode_flow_mod_flags(raw_flags, fm->command, oh->version, &fm->flags); @@ -1778,9 +1778,9 @@ ofputil_decode_meter_mod(const struct ofp_header *oh, mm->meter.flags & OFPMF13_PKTPS) { return OFPERR_OFPMMFC_BAD_FLAGS; } - mm->meter.bands = bands->data; + mm->meter.bands = ofpbuf_data(bands); - error = ofputil_pull_bands(&b, b.size, &mm->meter.n_bands, bands); + error = ofputil_pull_bands(&b, ofpbuf_size(&b), &mm->meter.n_bands, bands); if (error) { return error; } @@ -1856,14 +1856,14 @@ ofputil_append_meter_config(struct list *replies, const struct ofputil_meter_config *mc) { struct ofpbuf *msg = ofpbuf_from_list(list_back(replies)); - size_t start_ofs = msg->size; + size_t start_ofs = ofpbuf_size(msg); struct ofp13_meter_config *reply = ofpbuf_put_uninit(msg, sizeof *reply); reply->flags = htons(mc->flags); reply->meter_id = htonl(mc->meter_id); ofputil_put_bands(mc->n_bands, mc->bands, msg); - reply->length = htons(msg->size - start_ofs); + reply->length = htons(ofpbuf_size(msg) - start_ofs); ofpmp_postappend(replies, start_ofs); } @@ -1918,19 +1918,19 @@ ofputil_decode_meter_config(struct ofpbuf *msg, enum ofperr err; /* Pull OpenFlow headers for the first call. */ - if (!msg->l2) { + if (!msg->frame) { ofpraw_pull_assert(msg); } - if (!msg->size) { + if (!ofpbuf_size(msg)) { return EOF; } omc = ofpbuf_try_pull(msg, sizeof *omc); if (!omc) { VLOG_WARN_RL(&bad_ofmsg_rl, - "OFPMP_METER_CONFIG reply has %"PRIuSIZE" leftover bytes at end", - msg->size); + "OFPMP_METER_CONFIG reply has %"PRIu32" leftover bytes at end", + ofpbuf_size(msg)); return OFPERR_OFPBRC_BAD_LEN; } @@ -1942,7 +1942,7 @@ ofputil_decode_meter_config(struct ofpbuf *msg, } mc->meter_id = ntohl(omc->meter_id); mc->flags = ntohs(omc->flags); - mc->bands = bands->data; + mc->bands = ofpbuf_data(bands); return 0; } @@ -1994,19 +1994,19 @@ ofputil_decode_meter_stats(struct ofpbuf *msg, enum ofperr err; /* Pull OpenFlow headers for the first call. */ - if (!msg->l2) { + if (!msg->frame) { ofpraw_pull_assert(msg); } - if (!msg->size) { + if (!ofpbuf_size(msg)) { return EOF; } oms = ofpbuf_try_pull(msg, sizeof *oms); if (!oms) { VLOG_WARN_RL(&bad_ofmsg_rl, - "OFPMP_METER reply has %"PRIuSIZE" leftover bytes at end", - msg->size); + "OFPMP_METER reply has %"PRIu32" leftover bytes at end", + ofpbuf_size(msg)); return OFPERR_OFPBRC_BAD_LEN; } @@ -2022,7 +2022,7 @@ ofputil_decode_meter_stats(struct ofpbuf *msg, ms->byte_in_count = ntohll(oms->byte_in_count); ms->duration_sec = ntohl(oms->duration_sec); ms->duration_nsec = ntohl(oms->duration_nsec); - ms->bands = bands->data; + ms->bands = ofpbuf_data(bands); return 0; } @@ -2176,7 +2176,7 @@ ofputil_encode_flow_mod(const struct ofputil_flow_mod *fm, nfm->command = ofputil_tid_command(fm, protocol); nfm->cookie = fm->new_cookie; match_len = nx_put_match(msg, &fm->match, fm->cookie, fm->cookie_mask); - nfm = msg->l3; + nfm = ofpbuf_l3(msg); nfm->idle_timeout = htons(fm->idle_timeout); nfm->hard_timeout = htons(fm->hard_timeout); nfm->priority = htons(fm->priority); @@ -2250,7 +2250,7 @@ ofputil_decode_nxst_flow_request(struct ofputil_flow_stats_request *fsr, if (error) { return error; } - if (b->size) { + if (ofpbuf_size(b)) { return OFPERR_OFPBRC_BAD_LEN; } @@ -2306,12 +2306,12 @@ ofputil_decode_queue_get_config_request(const struct ofp_header *oh, switch ((int) raw) { case OFPRAW_OFPT10_QUEUE_GET_CONFIG_REQUEST: - qgcr10 = b.data; + qgcr10 = ofpbuf_data(&b); *port = u16_to_ofp(ntohs(qgcr10->port)); return 0; case OFPRAW_OFPT11_QUEUE_GET_CONFIG_REQUEST: - qgcr11 = b.data; + qgcr11 = ofpbuf_data(&b); return ofputil_port_from_ofp11(qgcr11->port, port); } @@ -2380,36 +2380,36 @@ void ofputil_append_queue_get_config_reply(struct ofpbuf *reply, const struct ofputil_queue_config *oqc) { - const struct ofp_header *oh = reply->data; + const struct ofp_header *oh = ofpbuf_data(reply); size_t start_ofs, len_ofs; ovs_be16 *len; - start_ofs = reply->size; + start_ofs = ofpbuf_size(reply); if (oh->version < OFP12_VERSION) { struct ofp10_packet_queue *opq10; opq10 = ofpbuf_put_zeros(reply, sizeof *opq10); opq10->queue_id = htonl(oqc->queue_id); - len_ofs = (char *) &opq10->len - (char *) reply->data; + len_ofs = (char *) &opq10->len - (char *) ofpbuf_data(reply); } else { struct ofp11_queue_get_config_reply *qgcr11; struct ofp12_packet_queue *opq12; ovs_be32 port; - qgcr11 = reply->l3; + qgcr11 = ofpbuf_l3(reply); port = qgcr11->port; opq12 = ofpbuf_put_zeros(reply, sizeof *opq12); opq12->port = port; opq12->queue_id = htonl(oqc->queue_id); - len_ofs = (char *) &opq12->len - (char *) reply->data; + len_ofs = (char *) &opq12->len - (char *) ofpbuf_data(reply); } put_queue_rate(reply, OFPQT_MIN_RATE, oqc->min_rate); put_queue_rate(reply, OFPQT_MAX_RATE, oqc->max_rate); len = ofpbuf_at(reply, len_ofs, sizeof *len); - *len = htons(reply->size - start_ofs); + *len = htons(ofpbuf_size(reply) - start_ofs); } /* Decodes the initial part of an OFPT_QUEUE_GET_CONFIG_REPLY from 'reply' and @@ -2468,14 +2468,14 @@ ofputil_pull_queue_get_config_reply(struct ofpbuf *reply, unsigned int opq_len; unsigned int len; - if (!reply->size) { + if (!ofpbuf_size(reply)) { return EOF; } queue->min_rate = UINT16_MAX; queue->max_rate = UINT16_MAX; - oh = reply->l2; + oh = reply->frame; if (oh->version < OFP12_VERSION) { const struct ofp10_packet_queue *opq10; @@ -2498,7 +2498,7 @@ ofputil_pull_queue_get_config_reply(struct ofpbuf *reply, opq_len = sizeof *opq12; } - if (len < opq_len || len > reply->size + opq_len || len % 8) { + if (len < opq_len || len > ofpbuf_size(reply) + opq_len || len % 8) { return OFPERR_OFPBRC_BAD_LEN; } len -= opq_len; @@ -2511,7 +2511,7 @@ ofputil_pull_queue_get_config_reply(struct ofpbuf *reply, hdr = ofpbuf_at_assert(reply, 0, sizeof *hdr); prop_len = ntohs(hdr->len); - if (prop_len < sizeof *hdr || prop_len > reply->size || prop_len % 8) { + if (prop_len < sizeof *hdr || prop_len > ofpbuf_size(reply) || prop_len % 8) { return OFPERR_OFPBRC_BAD_LEN; } @@ -2553,10 +2553,10 @@ ofputil_decode_flow_stats_request(struct ofputil_flow_stats_request *fsr, raw = ofpraw_pull_assert(&b); switch ((int) raw) { case OFPRAW_OFPST10_FLOW_REQUEST: - return ofputil_decode_ofpst10_flow_request(fsr, b.data, false); + return ofputil_decode_ofpst10_flow_request(fsr, ofpbuf_data(&b), false); case OFPRAW_OFPST10_AGGREGATE_REQUEST: - return ofputil_decode_ofpst10_flow_request(fsr, b.data, true); + return ofputil_decode_ofpst10_flow_request(fsr, ofpbuf_data(&b), true); case OFPRAW_OFPST11_FLOW_REQUEST: return ofputil_decode_ofpst11_flow_request(fsr, &b, false); @@ -2636,7 +2636,7 @@ ofputil_encode_flow_stats_request(const struct ofputil_flow_stats_request *fsr, match_len = nx_put_match(msg, &fsr->match, fsr->cookie, fsr->cookie_mask); - nfsr = msg->l3; + nfsr = ofpbuf_l3(msg); nfsr->out_port = htons(ofp_to_u16(fsr->out_port)); nfsr->match_len = htons(match_len); nfsr->table_id = fsr->table_id; @@ -2680,15 +2680,15 @@ ofputil_decode_flow_stats_reply(struct ofputil_flow_stats *fs, enum ofperr error; enum ofpraw raw; - error = (msg->l2 - ? ofpraw_decode(&raw, msg->l2) + error = (msg->frame + ? ofpraw_decode(&raw, msg->frame) : ofpraw_pull(&raw, msg)); if (error) { return error; } - oh = msg->l2; + oh = msg->frame; - if (!msg->size) { + if (!ofpbuf_size(msg)) { return EOF; } else if (raw == OFPRAW_OFPST11_FLOW_REPLY || raw == OFPRAW_OFPST13_FLOW_REPLY) { @@ -2698,8 +2698,8 @@ ofputil_decode_flow_stats_reply(struct ofputil_flow_stats *fs, ofs = ofpbuf_try_pull(msg, sizeof *ofs); if (!ofs) { - VLOG_WARN_RL(&bad_ofmsg_rl, "OFPST_FLOW reply has %"PRIuSIZE" leftover " - "bytes at end", msg->size); + VLOG_WARN_RL(&bad_ofmsg_rl, "OFPST_FLOW reply has %"PRIu32" leftover " + "bytes at end", ofpbuf_size(msg)); return EINVAL; } @@ -2748,8 +2748,8 @@ ofputil_decode_flow_stats_reply(struct ofputil_flow_stats *fs, ofs = ofpbuf_try_pull(msg, sizeof *ofs); if (!ofs) { - VLOG_WARN_RL(&bad_ofmsg_rl, "OFPST_FLOW reply has %"PRIuSIZE" leftover " - "bytes at end", msg->size); + VLOG_WARN_RL(&bad_ofmsg_rl, "OFPST_FLOW reply has %"PRIu32" leftover " + "bytes at end", ofpbuf_size(msg)); return EINVAL; } @@ -2784,8 +2784,8 @@ ofputil_decode_flow_stats_reply(struct ofputil_flow_stats *fs, nfs = ofpbuf_try_pull(msg, sizeof *nfs); if (!nfs) { - VLOG_WARN_RL(&bad_ofmsg_rl, "NXST_FLOW reply has %"PRIuSIZE" leftover " - "bytes at end", msg->size); + VLOG_WARN_RL(&bad_ofmsg_rl, "NXST_FLOW reply has %"PRIu32" leftover " + "bytes at end", ofpbuf_size(msg)); return EINVAL; } @@ -2830,8 +2830,8 @@ ofputil_decode_flow_stats_reply(struct ofputil_flow_stats *fs, OVS_NOT_REACHED(); } - fs->ofpacts = ofpacts->data; - fs->ofpacts_len = ofpacts->size; + fs->ofpacts = ofpbuf_data(ofpacts); + fs->ofpacts_len = ofpbuf_size(ofpacts); return 0; } @@ -2854,11 +2854,11 @@ ofputil_append_flow_stats_reply(const struct ofputil_flow_stats *fs, struct list *replies) { struct ofpbuf *reply = ofpbuf_from_list(list_back(replies)); - size_t start_ofs = reply->size; + size_t start_ofs = ofpbuf_size(reply); enum ofpraw raw; - enum ofp_version version = ((struct ofp_header *)reply->data)->version; + enum ofp_version version = ((struct ofp_header *)ofpbuf_data(reply))->version; - ofpraw_decode_partial(&raw, reply->data, reply->size); + ofpraw_decode_partial(&raw, ofpbuf_data(reply), ofpbuf_size(reply)); if (raw == OFPRAW_OFPST11_FLOW_REPLY || raw == OFPRAW_OFPST13_FLOW_REPLY) { struct ofp11_flow_stats *ofs; @@ -2868,7 +2868,7 @@ ofputil_append_flow_stats_reply(const struct ofputil_flow_stats *fs, version); ofs = ofpbuf_at_assert(reply, start_ofs, sizeof *ofs); - ofs->length = htons(reply->size - start_ofs); + ofs->length = htons(ofpbuf_size(reply) - start_ofs); ofs->table_id = fs->table_id; ofs->pad = 0; ofs->duration_sec = htonl(fs->duration_sec); @@ -2892,7 +2892,7 @@ ofputil_append_flow_stats_reply(const struct ofputil_flow_stats *fs, ofpacts_put_openflow_actions(fs->ofpacts, fs->ofpacts_len, reply, version); ofs = ofpbuf_at_assert(reply, start_ofs, sizeof *ofs); - ofs->length = htons(reply->size - start_ofs); + ofs->length = htons(ofpbuf_size(reply) - start_ofs); ofs->table_id = fs->table_id; ofs->pad = 0; ofputil_match_to_ofp10_match(&fs->match, &ofs->match); @@ -2916,7 +2916,7 @@ ofputil_append_flow_stats_reply(const struct ofputil_flow_stats *fs, ofpacts_put_openflow_actions(fs->ofpacts, fs->ofpacts_len, reply, version); nfs = ofpbuf_at_assert(reply, start_ofs, sizeof *nfs); - nfs->length = htons(reply->size - start_ofs); + nfs->length = htons(ofpbuf_size(reply) - start_ofs); nfs->table_id = fs->table_id; nfs->pad = 0; nfs->duration_sec = htonl(fs->duration_sec); @@ -2982,7 +2982,7 @@ ofputil_decode_aggregate_stats_reply(struct ofputil_aggregate_stats *stats, ofpbuf_use_const(&msg, reply, ntohs(reply->length)); ofpraw_pull_assert(&msg); - asr = msg.l3; + asr = ofpbuf_l3(&msg); stats->packet_count = ntohll(get_32aligned_be64(&asr->packet_count)); stats->byte_count = ntohll(get_32aligned_be64(&asr->byte_count)); stats->flow_count = ntohl(asr->flow_count); @@ -3049,7 +3049,7 @@ ofputil_decode_flow_removed(struct ofputil_flow_removed *fr, if (error) { return error; } - if (b.size) { + if (ofpbuf_size(&b)) { return OFPERR_OFPBRC_BAD_LEN; } @@ -3134,7 +3134,7 @@ ofputil_encode_flow_removed(const struct ofputil_flow_removed *fr, nfr = ofpbuf_put_zeros(msg, sizeof *nfr); match_len = nx_put_match(msg, &fr->match, 0, 0); - nfr = msg->l3; + nfr = ofpbuf_l3(msg); nfr->cookie = fr->cookie; nfr->priority = htons(fr->priority); nfr->reason = fr->reason; @@ -3159,8 +3159,8 @@ static void ofputil_decode_packet_in_finish(struct ofputil_packet_in *pin, struct match *match, struct ofpbuf *b) { - pin->packet = b->data; - pin->packet_len = b->size; + pin->packet = ofpbuf_data(b); + pin->packet_len = ofpbuf_size(b); pin->fmd.in_port = match->flow.in_port.ofp_port; pin->fmd.tun_id = match->flow.tunnel.tun_id; @@ -3221,7 +3221,7 @@ ofputil_decode_packet_in(struct ofputil_packet_in *pin, opi = ofpbuf_pull(&b, offsetof(struct ofp10_packet_in, data)); pin->packet = opi->data; - pin->packet_len = b.size; + pin->packet_len = ofpbuf_size(&b); pin->fmd.in_port = u16_to_ofp(ntohs(opi->in_port)); pin->reason = opi->reason; @@ -3233,8 +3233,8 @@ ofputil_decode_packet_in(struct ofputil_packet_in *pin, opi = ofpbuf_pull(&b, sizeof *opi); - pin->packet = b.data; - pin->packet_len = b.size; + pin->packet = ofpbuf_data(&b); + pin->packet_len = ofpbuf_size(&b); pin->buffer_id = ntohl(opi->buffer_id); error = ofputil_port_from_ofp11(opi->in_port, &pin->fmd.in_port); @@ -3346,7 +3346,7 @@ ofputil_encode_nx_packet_in(const struct ofputil_packet_in *pin) ofpbuf_put_zeros(packet, 2); ofpbuf_put(packet, pin->packet, pin->packet_len); - npi = packet->l3; + npi = ofpbuf_l3(packet); npi->buffer_id = htonl(pin->buffer_id); npi->total_len = htons(pin->total_len); npi->reason = pin->reason; @@ -3410,7 +3410,7 @@ ofputil_encode_ofp12_packet_in(const struct ofputil_packet_in *pin, ofpbuf_put_zeros(packet, 2); ofpbuf_put(packet, pin->packet, pin->packet_len); - opi = packet->l3; + opi = ofpbuf_l3(packet); opi->pi.buffer_id = htonl(pin->buffer_id); opi->pi.total_len = htons(pin->total_len); opi->pi.reason = pin->reason; @@ -3559,12 +3559,12 @@ ofputil_decode_packet_out(struct ofputil_packet_out *po, return OFPERR_OFPBRC_BAD_PORT; } - po->ofpacts = ofpacts->data; - po->ofpacts_len = ofpacts->size; + po->ofpacts = ofpbuf_data(ofpacts); + po->ofpacts_len = ofpbuf_size(ofpacts); if (po->buffer_id == UINT32_MAX) { - po->packet = b.data; - po->packet_len = b.size; + po->packet = ofpbuf_data(&b); + po->packet_len = ofpbuf_size(&b); } else { po->packet = NULL; po->packet_len = 0; @@ -3750,7 +3750,7 @@ ofputil_put_phy_port(enum ofp_version ofp_version, switch (ofp_version) { case OFP10_VERSION: { struct ofp10_phy_port *opp; - if (b->size + sizeof *opp <= UINT16_MAX) { + if (ofpbuf_size(b) + sizeof *opp <= UINT16_MAX) { opp = ofpbuf_put_uninit(b, sizeof *opp); ofputil_encode_ofp10_phy_port(pp, opp); } @@ -3761,7 +3761,7 @@ ofputil_put_phy_port(enum ofp_version ofp_version, case OFP12_VERSION: case OFP13_VERSION: { struct ofp11_port *op; - if (b->size + sizeof *op <= UINT16_MAX) { + if (ofpbuf_size(b) + sizeof *op <= UINT16_MAX) { op = ofpbuf_put_uninit(b, sizeof *op); ofputil_encode_ofp11_port(pp, op); } @@ -3902,7 +3902,7 @@ ofputil_decode_switch_features(const struct ofp_header *oh, features->capabilities = ntohl(osf->capabilities) & ofputil_capabilities_mask(oh->version); - if (b->size % ofputil_get_phy_port_size(oh->version)) { + if (ofpbuf_size(b) % ofputil_get_phy_port_size(oh->version)) { return OFPERR_OFPBRC_BAD_LEN; } @@ -3945,12 +3945,12 @@ max_ports_in_features(const struct ofp_header *oh) bool ofputil_switch_features_ports_trunc(struct ofpbuf *b) { - struct ofp_header *oh = b->data; + struct ofp_header *oh = ofpbuf_data(b); if (max_ports_in_features(oh)) { /* Remove all the ports. */ - b->size = (sizeof(struct ofp_header) - + sizeof(struct ofp_switch_features)); + ofpbuf_set_size(b, (sizeof(struct ofp_header) + + sizeof(struct ofp_switch_features))); ofpmsg_update_length(b); return true; @@ -4043,7 +4043,7 @@ void ofputil_put_switch_features_port(const struct ofputil_phy_port *pp, struct ofpbuf *b) { - const struct ofp_header *oh = b->data; + const struct ofp_header *oh = ofpbuf_data(b); if (oh->version < OFP13_VERSION) { ofputil_put_phy_port(oh->version, pp, b); @@ -4130,7 +4130,7 @@ ofputil_decode_port_mod(const struct ofp_header *oh, raw = ofpraw_pull_assert(&b); if (raw == OFPRAW_OFPT10_PORT_MOD) { - const struct ofp10_port_mod *opm = b.data; + const struct ofp10_port_mod *opm = ofpbuf_data(&b); pm->port_no = u16_to_ofp(ntohs(opm->port_no)); memcpy(pm->hw_addr, opm->hw_addr, ETH_ADDR_LEN); @@ -4138,7 +4138,7 @@ ofputil_decode_port_mod(const struct ofp_header *oh, pm->mask = ntohl(opm->mask) & OFPPC10_ALL; pm->advertise = netdev_port_features_from_ofp10(opm->advertise); } else if (raw == OFPRAW_OFPT11_PORT_MOD) { - const struct ofp11_port_mod *opm = b.data; + const struct ofp11_port_mod *opm = ofpbuf_data(&b); enum ofperr error; error = ofputil_port_from_ofp11(opm->port_no, &pm->port_no); @@ -4218,19 +4218,19 @@ ofputil_pull_property(struct ofpbuf *msg, struct ofpbuf *payload, struct ofp_prop_header *oph; unsigned int len; - if (msg->size < sizeof *oph) { + if (ofpbuf_size(msg) < sizeof *oph) { return OFPERR_OFPTFFC_BAD_LEN; } - oph = msg->data; + oph = ofpbuf_data(msg); len = ntohs(oph->len); - if (len < sizeof *oph || ROUND_UP(len, 8) > msg->size) { + if (len < sizeof *oph || ROUND_UP(len, 8) > ofpbuf_size(msg)) { return OFPERR_OFPTFFC_BAD_LEN; } *typep = ntohs(oph->type); if (payload) { - ofpbuf_use_const(payload, msg->data, len); + ofpbuf_use_const(payload, ofpbuf_data(msg), len); ofpbuf_pull(payload, sizeof *oph); } ofpbuf_pull(msg, ROUND_UP(len, 8)); @@ -4256,7 +4256,7 @@ parse_table_ids(struct ofpbuf *payload, uint32_t *ids) uint16_t type; *ids = 0; - while (payload->size > 0) { + while (ofpbuf_size(payload) > 0) { enum ofperr error = ofputil_pull_property(payload, NULL, &type); if (error) { return error; @@ -4272,7 +4272,7 @@ static enum ofperr parse_instruction_ids(struct ofpbuf *payload, bool loose, uint32_t *insts) { *insts = 0; - while (payload->size > 0) { + while (ofpbuf_size(payload) > 0) { enum ovs_instruction_type inst; enum ofperr error; uint16_t ofpit; @@ -4299,8 +4299,8 @@ parse_table_features_next_table(struct ofpbuf *payload, size_t i; memset(next_tables, 0, bitmap_n_bytes(255)); - for (i = 0; i < payload->size; i++) { - uint8_t id = ((const uint8_t *) payload->data)[i]; + for (i = 0; i < ofpbuf_size(payload); i++) { + uint8_t id = ((const uint8_t *) ofpbuf_data(payload))[i]; if (id >= 255) { return OFPERR_OFPTFFC_BAD_ARGUMENT; } @@ -4348,7 +4348,7 @@ parse_oxms(struct ofpbuf *payload, bool loose, uint64_t exact, masked; exact = masked = 0; - while (payload->size > 0) { + while (ofpbuf_size(payload) > 0) { const struct mf_field *field; enum ofperr error; bool hasmask; @@ -4400,22 +4400,21 @@ ofputil_decode_table_features(struct ofpbuf *msg, struct ofp13_table_features *otf; unsigned int len; - if (!msg->l2) { - msg->l2 = msg->data; + if (!msg->frame) { ofpraw_pull_assert(msg); } - if (!msg->size) { + if (!ofpbuf_size(msg)) { return EOF; } - if (msg->size < sizeof *otf) { + if (ofpbuf_size(msg) < sizeof *otf) { return OFPERR_OFPTFFC_BAD_LEN; } - otf = msg->data; + otf = ofpbuf_data(msg); len = ntohs(otf->length); - if (len < sizeof *otf || len % 8 || len > msg->size) { + if (len < sizeof *otf || len % 8 || len > ofpbuf_size(msg)) { return OFPERR_OFPTFFC_BAD_LEN; } ofpbuf_pull(msg, sizeof *otf); @@ -4431,7 +4430,7 @@ ofputil_decode_table_features(struct ofpbuf *msg, tf->config = ntohl(otf->config); tf->max_entries = ntohl(otf->max_entries); - while (msg->size > 0) { + while (ofpbuf_size(msg) > 0) { struct ofpbuf payload; enum ofperr error; uint16_t type; @@ -4564,7 +4563,7 @@ ofputil_decode_table_mod(const struct ofp_header *oh, raw = ofpraw_pull_assert(&b); if (raw == OFPRAW_OFPT11_TABLE_MOD) { - const struct ofp11_table_mod *otm = b.data; + const struct ofp11_table_mod *otm = ofpbuf_data(&b); pm->table_id = otm->table_id; pm->config = ntohl(otm->config); @@ -4629,7 +4628,7 @@ ofputil_decode_role_message(const struct ofp_header *oh, if (raw == OFPRAW_OFPT12_ROLE_REQUEST || raw == OFPRAW_OFPT12_ROLE_REPLY) { - const struct ofp12_role_request *orr = b.l3; + const struct ofp12_role_request *orr = ofpbuf_l3(&b); if (orr->role != htonl(OFPCR12_ROLE_NOCHANGE) && orr->role != htonl(OFPCR12_ROLE_EQUAL) && @@ -4650,7 +4649,7 @@ ofputil_decode_role_message(const struct ofp_header *oh, } } else if (raw == OFPRAW_NXT_ROLE_REQUEST || raw == OFPRAW_NXT_ROLE_REPLY) { - const struct nx_role_request *nrr = b.l3; + const struct nx_role_request *nrr = ofpbuf_l3(&b); BUILD_ASSERT(NX_ROLE_OTHER + 1 == OFPCR12_ROLE_EQUAL); BUILD_ASSERT(NX_ROLE_MASTER + 1 == OFPCR12_ROLE_MASTER); @@ -4739,7 +4738,7 @@ ofputil_decode_role_status(const struct ofp_header *oh, raw = ofpraw_pull_assert(&b); ovs_assert(raw == OFPRAW_OFPT14_ROLE_STATUS); - r = b.l3; + r = ofpbuf_l3(&b); if (r->role != htonl(OFPCR12_ROLE_NOCHANGE) && r->role != htonl(OFPCR12_ROLE_EQUAL) && r->role != htonl(OFPCR12_ROLE_MASTER) && @@ -4942,19 +4941,18 @@ ofputil_decode_flow_monitor_request(struct ofputil_flow_monitor_request *rq, struct nx_flow_monitor_request *nfmr; uint16_t flags; - if (!msg->l2) { - msg->l2 = msg->data; + if (!msg->frame) { ofpraw_pull_assert(msg); } - if (!msg->size) { + if (!ofpbuf_size(msg)) { return EOF; } nfmr = ofpbuf_try_pull(msg, sizeof *nfmr); if (!nfmr) { - VLOG_WARN_RL(&bad_ofmsg_rl, "NXST_FLOW_MONITOR request has %"PRIuSIZE" " - "leftover bytes at end", msg->size); + VLOG_WARN_RL(&bad_ofmsg_rl, "NXST_FLOW_MONITOR request has %"PRIu32" " + "leftover bytes at end", ofpbuf_size(msg)); return OFPERR_OFPBRC_BAD_LEN; } @@ -4987,11 +4985,11 @@ ofputil_append_flow_monitor_request( size_t start_ofs; int match_len; - if (!msg->size) { + if (!ofpbuf_size(msg)) { ofpraw_put(OFPRAW_NXST_FLOW_MONITOR_REQUEST, OFP10_VERSION, msg); } - start_ofs = msg->size; + start_ofs = ofpbuf_size(msg); ofpbuf_put_zeros(msg, sizeof *nfmr); match_len = nx_put_match(msg, &rq->match, htonll(0), htonll(0)); @@ -5027,25 +5025,24 @@ ofputil_decode_flow_update(struct ofputil_flow_update *update, unsigned int length; struct ofp_header *oh; - if (!msg->l2) { - msg->l2 = msg->data; + if (!msg->frame) { ofpraw_pull_assert(msg); } - if (!msg->size) { + if (!ofpbuf_size(msg)) { return EOF; } - if (msg->size < sizeof(struct nx_flow_update_header)) { + if (ofpbuf_size(msg) < sizeof(struct nx_flow_update_header)) { goto bad_len; } - oh = msg->l2; + oh = msg->frame; - nfuh = msg->data; + nfuh = ofpbuf_data(msg); update->event = ntohs(nfuh->event); length = ntohs(nfuh->length); - if (length > msg->size || length % 8) { + if (length > ofpbuf_size(msg) || length % 8) { goto bad_len; } @@ -5096,8 +5093,8 @@ ofputil_decode_flow_update(struct ofputil_flow_update *update, return error; } - update->ofpacts = ofpacts->data; - update->ofpacts_len = ofpacts->size; + update->ofpacts = ofpbuf_data(ofpacts); + update->ofpacts_len = ofpbuf_size(ofpacts); return 0; } else { VLOG_WARN_RL(&bad_ofmsg_rl, @@ -5107,8 +5104,8 @@ ofputil_decode_flow_update(struct ofputil_flow_update *update, } bad_len: - VLOG_WARN_RL(&bad_ofmsg_rl, "NXST_FLOW_MONITOR reply has %"PRIuSIZE" " - "leftover bytes at end", msg->size); + VLOG_WARN_RL(&bad_ofmsg_rl, "NXST_FLOW_MONITOR reply has %"PRIu32" " + "leftover bytes at end", ofpbuf_size(msg)); return OFPERR_OFPBRC_BAD_LEN; } @@ -5154,8 +5151,8 @@ ofputil_append_flow_update(const struct ofputil_flow_update *update, enum ofp_version version; msg = ofpbuf_from_list(list_back(replies)); - start_ofs = msg->size; - version = ((struct ofp_header *)msg->l2)->version; + start_ofs = ofpbuf_size(msg); + version = ((struct ofp_header *)msg->frame)->version; if (update->event == NXFME_ABBREV) { struct nx_flow_update_abbrev *nfua; @@ -5181,7 +5178,7 @@ ofputil_append_flow_update(const struct ofputil_flow_update *update, } nfuh = ofpbuf_at_assert(msg, start_ofs, sizeof *nfuh); - nfuh->length = htons(msg->size - start_ofs); + nfuh->length = htons(ofpbuf_size(msg) - start_ofs); nfuh->event = htons(update->event); ofpmp_postappend(replies, start_ofs); @@ -5207,14 +5204,14 @@ ofputil_encode_packet_out(const struct ofputil_packet_out *po, msg = ofpraw_alloc(OFPRAW_OFPT10_PACKET_OUT, OFP10_VERSION, size); ofpbuf_put_zeros(msg, sizeof *opo); - actions_ofs = msg->size; + actions_ofs = ofpbuf_size(msg); ofpacts_put_openflow_actions(po->ofpacts, po->ofpacts_len, msg, ofp_version); - opo = msg->l3; + opo = ofpbuf_l3(msg); opo->buffer_id = htonl(po->buffer_id); opo->in_port = htons(ofp_to_u16(po->in_port)); - opo->actions_len = htons(msg->size - actions_ofs); + opo->actions_len = htons(ofpbuf_size(msg) - actions_ofs); break; } @@ -5229,7 +5226,7 @@ ofputil_encode_packet_out(const struct ofputil_packet_out *po, ofpbuf_put_zeros(msg, sizeof *opo); len = ofpacts_put_openflow_actions(po->ofpacts, po->ofpacts_len, msg, ofp_version); - opo = msg->l3; + opo = ofpbuf_l3(msg); opo->buffer_id = htonl(po->buffer_id); opo->in_port = ofputil_port_to_ofp11(po->in_port); opo->actions_len = htons(len); @@ -5268,8 +5265,8 @@ make_echo_reply(const struct ofp_header *rq) ofpbuf_use_const(&rq_buf, rq, ntohs(rq->length)); ofpraw_pull_assert(&rq_buf); - reply = ofpraw_alloc_reply(OFPRAW_OFPT_ECHO_REPLY, rq, rq_buf.size); - ofpbuf_put(reply, rq_buf.data, rq_buf.size); + reply = ofpraw_alloc_reply(OFPRAW_OFPT_ECHO_REPLY, rq, ofpbuf_size(&rq_buf)); + ofpbuf_put(reply, ofpbuf_data(&rq_buf), ofpbuf_size(&rq_buf)); return reply; } @@ -5397,8 +5394,12 @@ ofputil_port_to_ofp11(ofp_port_t ofp10_port) bool ofputil_port_from_string(const char *s, ofp_port_t *portp) { - uint32_t port32; + unsigned int port32; /* int is at least 32 bits wide. */ + if (*s == '-') { + VLOG_WARN("Negative value %s is not a valid port number.", s); + return false; + } *portp = 0; if (str_to_uint(s, 10, &port32)) { if (port32 < ofp_to_u16(OFPP_MAX)) { @@ -5572,7 +5573,7 @@ ofputil_pull_phy_port(enum ofp_version ofp_version, struct ofpbuf *b, * 'ofp_version', returns the number of elements. */ size_t ofputil_count_phy_ports(uint8_t ofp_version, struct ofpbuf *b) { - return b->size / ofputil_get_phy_port_size(ofp_version); + return ofpbuf_size(b) / ofputil_get_phy_port_size(ofp_version); } /* ofp-util.def lists the mapping from names to action. */ @@ -5982,7 +5983,7 @@ ofputil_append_port_stat(struct list *replies, const struct ofputil_port_stats *ops) { struct ofpbuf *msg = ofpbuf_from_list(list_back(replies)); - struct ofp_header *oh = msg->data; + struct ofp_header *oh = ofpbuf_data(msg); switch ((enum ofp_version)oh->version) { case OFP13_VERSION: { @@ -6107,7 +6108,7 @@ ofputil_count_port_stats(const struct ofp_header *oh) ofpbuf_use_const(&b, oh, ntohs(oh->length)); ofpraw_pull_assert(&b); - return b.size / ofputil_get_port_stats_size(oh->version); + return ofpbuf_size(&b) / ofputil_get_port_stats_size(oh->version); } /* Converts an OFPST_PORT_STATS reply in 'msg' into an abstract @@ -6126,14 +6127,14 @@ ofputil_decode_port_stats(struct ofputil_port_stats *ps, struct ofpbuf *msg) enum ofperr error; enum ofpraw raw; - error = (msg->l2 - ? ofpraw_decode(&raw, msg->l2) + error = (msg->frame + ? ofpraw_decode(&raw, msg->frame) : ofpraw_pull(&raw, msg)); if (error) { return error; } - if (!msg->size) { + if (!ofpbuf_size(msg)) { return EOF; } else if (raw == OFPRAW_OFPST13_PORT_REPLY) { const struct ofp13_port_stats *ps13; @@ -6164,8 +6165,8 @@ ofputil_decode_port_stats(struct ofputil_port_stats *ps, struct ofpbuf *msg) } bad_len: - VLOG_WARN_RL(&bad_ofmsg_rl, "OFPST_PORT reply has %"PRIuSIZE" leftover " - "bytes at end", msg->size); + VLOG_WARN_RL(&bad_ofmsg_rl, "OFPST_PORT reply has %"PRIu32" leftover " + "bytes at end", ofpbuf_size(msg)); return OFPERR_OFPBRC_BAD_LEN; } @@ -6272,78 +6273,81 @@ ofputil_encode_group_desc_request(enum ofp_version ofp_version) return request; } -static void * -ofputil_group_stats_to_ofp11(const struct ofputil_group_stats *ogs, - size_t base_len, struct list *replies) +static void +ofputil_group_stats_to_ofp11__(const struct ofputil_group_stats *gs, + struct ofp11_group_stats *gs11, size_t length, + struct ofp11_bucket_counter bucket_cnts[]) { - struct ofp11_bucket_counter *bc11; - struct ofp11_group_stats *gs11; - size_t length; int i; - length = base_len + sizeof(struct ofp11_bucket_counter) * ogs->n_buckets; - - gs11 = ofpmp_append(replies, length); - memset(gs11, 0, base_len); + memset(gs11, 0, length); gs11->length = htons(length); - gs11->group_id = htonl(ogs->group_id); - gs11->ref_count = htonl(ogs->ref_count); - gs11->packet_count = htonll(ogs->packet_count); - gs11->byte_count = htonll(ogs->byte_count); + gs11->group_id = htonl(gs->group_id); + gs11->ref_count = htonl(gs->ref_count); + gs11->packet_count = htonll(gs->packet_count); + gs11->byte_count = htonll(gs->byte_count); - bc11 = (void *) (((uint8_t *) gs11) + base_len); - for (i = 0; i < ogs->n_buckets; i++) { - const struct bucket_counter *obc = &ogs->bucket_stats[i]; - - bc11[i].packet_count = htonll(obc->packet_count); - bc11[i].byte_count = htonll(obc->byte_count); + for (i = 0; i < gs->n_buckets; i++) { + bucket_cnts[i].packet_count = htonll(gs->bucket_stats[i].packet_count); + bucket_cnts[i].byte_count = htonll(gs->bucket_stats[i].byte_count); } - - return gs11; } static void -ofputil_append_of13_group_stats(const struct ofputil_group_stats *ogs, - struct list *replies) +ofputil_group_stats_to_ofp11(const struct ofputil_group_stats *gs, + struct ofp11_group_stats *gs11, size_t length) { - struct ofp13_group_stats *gs13; + ofputil_group_stats_to_ofp11__(gs, gs11, length, gs11->bucket_stats); +} - gs13 = ofputil_group_stats_to_ofp11(ogs, sizeof *gs13, replies); - gs13->duration_sec = htonl(ogs->duration_sec); - gs13->duration_nsec = htonl(ogs->duration_nsec); +static void +ofputil_group_stats_to_ofp13(const struct ofputil_group_stats *gs, + struct ofp13_group_stats *gs13, size_t length) +{ + ofputil_group_stats_to_ofp11__(gs, &gs13->gs, length, gs13->bucket_stats); + gs13->duration_sec = htonl(gs->duration_sec); + gs13->duration_nsec = htonl(gs->duration_nsec); } -/* Encodes 'ogs' properly for the format of the list of group statistics +/* Encodes 'gs' properly for the format of the list of group statistics * replies already begun in 'replies' and appends it to the list. 'replies' * must have originally been initialized with ofpmp_init(). */ void ofputil_append_group_stats(struct list *replies, - const struct ofputil_group_stats *ogs) + const struct ofputil_group_stats *gs) { struct ofpbuf *msg = ofpbuf_from_list(list_back(replies)); - struct ofp_header *oh = msg->data; + struct ofp_header *oh = ofpbuf_data(msg); + size_t length; - switch ((enum ofp_version)oh->version) { + switch ((enum ofp_version) oh->version) { case OFP11_VERSION: - case OFP12_VERSION: - ofputil_group_stats_to_ofp11(ogs, sizeof(struct ofp11_group_stats), - replies); - break; + case OFP12_VERSION:{ + struct ofp11_group_stats *reply; + + length = gs->n_buckets * sizeof reply->bucket_stats[0] + + sizeof *reply; + reply = ofpmp_append(replies, length); + ofputil_group_stats_to_ofp11(gs, reply, length); + break; + } case OFP13_VERSION: - ofputil_append_of13_group_stats(ogs, replies); - break; + case OFP14_VERSION:{ + struct ofp13_group_stats *reply; - case OFP14_VERSION: - OVS_NOT_REACHED(); - break; + length = gs->n_buckets * sizeof reply->bucket_stats[0] + + sizeof *reply; + reply = ofpmp_append(replies, length); + ofputil_group_stats_to_ofp13(gs, reply, length); + break; + } case OFP10_VERSION: default: OVS_NOT_REACHED(); } } - /* Returns an OpenFlow group features request for OpenFlow version * 'ofp_version'. */ struct ofpbuf * @@ -6451,14 +6455,14 @@ ofputil_decode_group_stats_reply(struct ofpbuf *msg, size_t i; gs->bucket_stats = NULL; - error = (msg->l2 - ? ofpraw_decode(&raw, msg->l2) + error = (msg->frame + ? ofpraw_decode(&raw, msg->frame) : ofpraw_pull(&raw, msg)); if (error) { return error; } - if (!msg->size) { + if (!ofpbuf_size(msg)) { return EOF; } @@ -6483,8 +6487,8 @@ ofputil_decode_group_stats_reply(struct ofpbuf *msg, } if (!ogs11) { - VLOG_WARN_RL(&bad_ofmsg_rl, "%s reply has %"PRIuSIZE" leftover bytes at end", - ofpraw_get_name(raw), msg->size); + VLOG_WARN_RL(&bad_ofmsg_rl, "%s reply has %"PRIu32" leftover bytes at end", + ofpraw_get_name(raw), ofpbuf_size(msg)); return OFPERR_OFPBRC_BAD_LEN; } length = ntohs(ogs11->length); @@ -6502,8 +6506,8 @@ ofputil_decode_group_stats_reply(struct ofpbuf *msg, gs->n_buckets = (length - base_len) / sizeof *obc; obc = ofpbuf_try_pull(msg, gs->n_buckets * sizeof *obc); if (!obc) { - VLOG_WARN_RL(&bad_ofmsg_rl, "%s reply has %"PRIuSIZE" leftover bytes at end", - ofpraw_get_name(raw), msg->size); + VLOG_WARN_RL(&bad_ofmsg_rl, "%s reply has %"PRIu32" leftover bytes at end", + ofpraw_get_name(raw), ofpbuf_size(msg)); return OFPERR_OFPBRC_BAD_LEN; } @@ -6528,26 +6532,26 @@ ofputil_append_group_desc_reply(const struct ofputil_group_desc *gds, struct ofp11_group_desc_stats *ogds; struct ofputil_bucket *bucket; size_t start_ogds; - enum ofp_version version = ((struct ofp_header *)reply->data)->version; + enum ofp_version version = ((struct ofp_header *)ofpbuf_data(reply))->version; - start_ogds = reply->size; + start_ogds = ofpbuf_size(reply); ofpbuf_put_zeros(reply, sizeof *ogds); LIST_FOR_EACH (bucket, list_node, buckets) { struct ofp11_bucket *ob; size_t start_ob; - start_ob = reply->size; + start_ob = ofpbuf_size(reply); ofpbuf_put_zeros(reply, sizeof *ob); ofpacts_put_openflow_actions(bucket->ofpacts, bucket->ofpacts_len, reply, version); ob = ofpbuf_at_assert(reply, start_ob, sizeof *ob); - ob->len = htons(reply->size - start_ob); + ob->len = htons(ofpbuf_size(reply) - start_ob); ob->weight = htons(bucket->weight); ob->watch_port = ofputil_port_to_ofp11(bucket->watch_port); ob->watch_group = htonl(bucket->watch_group); } ogds = ofpbuf_at_assert(reply, start_ogds, sizeof *ogds); - ogds->length = htons(reply->size - start_ogds); + ogds->length = htons(ofpbuf_size(reply) - start_ogds); ogds->type = gds->type; ogds->group_id = htonl(gds->group_id); @@ -6607,7 +6611,7 @@ ofputil_pull_buckets(struct ofpbuf *msg, size_t buckets_length, } bucket->watch_group = ntohl(ob->watch_group); bucket->ofpacts = ofpbuf_steal_data(&ofpacts); - bucket->ofpacts_len = ofpacts.size; + bucket->ofpacts_len = ofpbuf_size(&ofpacts); list_push_back(buckets, &bucket->list_node); } @@ -6631,25 +6635,25 @@ ofputil_decode_group_desc_reply(struct ofputil_group_desc *gd, struct ofp11_group_desc_stats *ogds; size_t length; - if (!msg->l2) { + if (!msg->frame) { ofpraw_pull_assert(msg); } - if (!msg->size) { + if (!ofpbuf_size(msg)) { return EOF; } ogds = ofpbuf_try_pull(msg, sizeof *ogds); if (!ogds) { - VLOG_WARN_RL(&bad_ofmsg_rl, "OFPST11_GROUP_DESC reply has %"PRIuSIZE" " - "leftover bytes at end", msg->size); + VLOG_WARN_RL(&bad_ofmsg_rl, "OFPST11_GROUP_DESC reply has %"PRIu32" " + "leftover bytes at end", ofpbuf_size(msg)); return OFPERR_OFPBRC_BAD_LEN; } gd->type = ogds->type; gd->group_id = ntohl(ogds->group_id); length = ntohs(ogds->length); - if (length < sizeof *ogds || length - sizeof *ogds > msg->size) { + if (length < sizeof *ogds || length - sizeof *ogds > ofpbuf_size(msg)) { VLOG_WARN_RL(&bad_ofmsg_rl, "OFPST11_GROUP_DESC reply claims invalid " "length %"PRIuSIZE, length); return OFPERR_OFPBRC_BAD_LEN; @@ -6691,11 +6695,11 @@ ofputil_encode_group_mod(enum ofp_version ofp_version, case OFP13_VERSION: case OFP14_VERSION: b = ofpraw_alloc(OFPRAW_OFPT11_GROUP_MOD, ofp_version, 0); - start_ogm = b->size; + start_ogm = ofpbuf_size(b); ofpbuf_put_zeros(b, sizeof *ogm); LIST_FOR_EACH (bucket, list_node, &gm->buckets) { - start_bucket = b->size; + start_bucket = ofpbuf_size(b); ofpbuf_put_zeros(b, sizeof *ob); if (bucket->ofpacts && bucket->ofpacts_len) { ofpacts_put_openflow_actions(bucket->ofpacts, @@ -6703,7 +6707,7 @@ ofputil_encode_group_mod(enum ofp_version ofp_version, ofp_version); } ob = ofpbuf_at_assert(b, start_bucket, sizeof *ob); - ob->len = htons(b->size - start_bucket);; + ob->len = htons(ofpbuf_size(b) - start_bucket);; ob->weight = htons(bucket->weight); ob->watch_port = ofputil_port_to_ofp11(bucket->watch_port); ob->watch_group = htonl(bucket->watch_group); @@ -6741,7 +6745,7 @@ ofputil_decode_group_mod(const struct ofp_header *oh, gm->type = ogm->type; gm->group_id = ntohl(ogm->group_id); - err = ofputil_pull_buckets(&msg, msg.size, oh->version, &gm->buckets); + err = ofputil_pull_buckets(&msg, ofpbuf_size(&msg), oh->version, &gm->buckets); if (err) { return err; } @@ -6868,7 +6872,7 @@ ofputil_count_queue_stats(const struct ofp_header *oh) ofpbuf_use_const(&b, oh, ntohs(oh->length)); ofpraw_pull_assert(&b); - return b.size / ofputil_get_queue_stats_size(oh->version); + return ofpbuf_size(&b) / ofputil_get_queue_stats_size(oh->version); } static enum ofperr @@ -6934,14 +6938,14 @@ ofputil_decode_queue_stats(struct ofputil_queue_stats *qs, struct ofpbuf *msg) enum ofperr error; enum ofpraw raw; - error = (msg->l2 - ? ofpraw_decode(&raw, msg->l2) + error = (msg->frame + ? ofpraw_decode(&raw, msg->frame) : ofpraw_pull(&raw, msg)); if (error) { return error; } - if (!msg->size) { + if (!ofpbuf_size(msg)) { return EOF; } else if (raw == OFPRAW_OFPST13_QUEUE_REPLY) { const struct ofp13_queue_stats *qs13; @@ -6972,8 +6976,8 @@ ofputil_decode_queue_stats(struct ofputil_queue_stats *qs, struct ofpbuf *msg) } bad_len: - VLOG_WARN_RL(&bad_ofmsg_rl, "OFPST_QUEUE reply has %"PRIuSIZE" leftover " - "bytes at end", msg->size); + VLOG_WARN_RL(&bad_ofmsg_rl, "OFPST_QUEUE reply has %"PRIu32" leftover " + "bytes at end", ofpbuf_size(msg)); return OFPERR_OFPBRC_BAD_LEN; } @@ -7020,7 +7024,7 @@ ofputil_append_queue_stat(struct list *replies, const struct ofputil_queue_stats *oqs) { struct ofpbuf *msg = ofpbuf_from_list(list_back(replies)); - struct ofp_header *oh = msg->data; + struct ofp_header *oh = ofpbuf_data(msg); switch ((enum ofp_version)oh->version) { case OFP13_VERSION: { @@ -7050,3 +7054,83 @@ ofputil_append_queue_stat(struct list *replies, OVS_NOT_REACHED(); } } + +enum ofperr +ofputil_decode_bundle_ctrl(const struct ofp_header *oh, + struct ofputil_bundle_ctrl_msg *msg) +{ + struct ofpbuf b; + enum ofpraw raw; + const struct ofp14_bundle_ctrl_msg *m; + + ofpbuf_use_const(&b, oh, ntohs(oh->length)); + raw = ofpraw_pull_assert(&b); + ovs_assert(raw == OFPRAW_OFPT14_BUNDLE_CONTROL); + + m = ofpbuf_l3(&b); + msg->bundle_id = ntohl(m->bundle_id); + msg->type = ntohs(m->type); + msg->flags = ntohs(m->flags); + + return 0; +} + +struct ofpbuf * +ofputil_encode_bundle_ctrl_reply(const struct ofp_header *oh, + struct ofputil_bundle_ctrl_msg *msg) +{ + struct ofpbuf *buf; + struct ofp14_bundle_ctrl_msg *m; + + buf = ofpraw_alloc_reply(OFPRAW_OFPT14_BUNDLE_CONTROL, oh, 0); + m = ofpbuf_put_zeros(buf, sizeof *m); + + m->bundle_id = htonl(msg->bundle_id); + m->type = htons(msg->type); + m->flags = htons(msg->flags); + + return buf; +} + +enum ofperr +ofputil_decode_bundle_add(const struct ofp_header *oh, + struct ofputil_bundle_add_msg *msg) +{ + const struct ofp14_bundle_ctrl_msg *m; + struct ofpbuf b; + enum ofpraw raw; + size_t inner_len; + + ofpbuf_use_const(&b, oh, ntohs(oh->length)); + raw = ofpraw_pull_assert(&b); + ovs_assert(raw == OFPRAW_OFPT14_BUNDLE_ADD_MESSAGE); + + m = ofpbuf_pull(&b, sizeof *m); + msg->bundle_id = ntohl(m->bundle_id); + msg->flags = ntohs(m->flags); + + msg->msg = ofpbuf_data(&b); + inner_len = ntohs(msg->msg->length); + if (inner_len < sizeof(struct ofp_header) || inner_len > ofpbuf_size(&b)) { + return OFPERR_OFPBFC_MSG_BAD_LEN; + } + + return 0; +} + +struct ofpbuf * +ofputil_encode_bundle_add(enum ofp_version ofp_version, + struct ofputil_bundle_add_msg *msg) +{ + struct ofpbuf *request; + struct ofp14_bundle_ctrl_msg *m; + + request = ofpraw_alloc(OFPRAW_OFPT14_BUNDLE_ADD_MESSAGE, ofp_version, 0); + m = ofpbuf_put_zeros(request, sizeof *m); + + m->bundle_id = htonl(msg->bundle_id); + m->flags = htons(msg->flags); + ofpbuf_put(request, msg->msg, ntohs(msg->msg->length)); + + return request; +}