1 /* Copyright (c) 2008 The Board of Trustees of The Leland Stanford
4 * We are making the OpenFlow specification and associated documentation
5 * (Software) available for public use and benefit with the expectation
6 * that others will use, modify and enhance the Software and contribute
7 * those enhancements back to the community. However, since we would
8 * like to make the Software available for broadest use, with as few
9 * restrictions as possible permission is hereby granted, free of
10 * charge, to any person obtaining a copy of this Software to deal in
11 * the Software under the copyrights without restriction, including
12 * without limitation the rights to use, copy, modify, merge, publish,
13 * distribute, sublicense, and/or sell copies of the Software, and to
14 * permit persons to whom the Software is furnished to do so, subject to
15 * the following conditions:
17 * The above copyright notice and this permission notice shall be
18 * included in all copies or substantial portions of the Software.
20 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
21 * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
22 * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
23 * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
24 * BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
25 * ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
26 * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
29 * The name and trademarks of copyright holder(s) may NOT be used in
30 * advertising or publicity pertaining to the Software or any
31 * derivatives without specific, written prior permission.
35 #include "ofp-print.h"
40 #include <netinet/in.h>
48 #include "dynamic-string.h"
54 static void ofp_print_port_name(struct ds *string, uint16_t port);
55 static void ofp_print_match(struct ds *, const struct ofp_match *,
58 /* Returns a string that represents the contents of the Ethernet frame in the
59 * 'len' bytes starting at 'data' to 'stream' as output by tcpdump.
60 * 'total_len' specifies the full length of the Ethernet frame (of which 'len'
61 * bytes were captured).
63 * The caller must free the returned string.
65 * This starts and kills a tcpdump subprocess so it's quite expensive. */
67 ofp_packet_to_string(const void *data, size_t len, size_t total_len)
70 uint32_t magic_number; /* magic number */
71 uint16_t version_major; /* major version number */
72 uint16_t version_minor; /* minor version number */
73 int32_t thiszone; /* GMT to local correction */
74 uint32_t sigfigs; /* accuracy of timestamps */
75 uint32_t snaplen; /* max length of captured packets */
76 uint32_t network; /* data link type */
80 uint32_t ts_sec; /* timestamp seconds */
81 uint32_t ts_usec; /* timestamp microseconds */
82 uint32_t incl_len; /* number of octets of packet saved in file */
83 uint32_t orig_len; /* actual length of packet */
87 struct pcaprec_hdr prh;
89 struct ds ds = DS_EMPTY_INITIALIZER;
99 error(errno, "tmpfile");
100 return xstrdup("<error>");
103 /* The pcap reader is responsible for figuring out endianness based on the
104 * magic number, so the lack of htonX calls here is intentional. */
105 ph.magic_number = 0xa1b2c3d4;
106 ph.version_major = 2;
107 ph.version_minor = 4;
111 ph.network = 1; /* Ethernet */
116 prh.orig_len = total_len;
118 fwrite(&ph, 1, sizeof ph, pcap);
119 fwrite(&prh, 1, sizeof prh, pcap);
120 fwrite(data, 1, len, pcap);
124 error(errno, "error writing temporary file");
128 snprintf(command, sizeof command, "tcpdump -n -r /dev/fd/%d 2>/dev/null",
130 tcpdump = popen(command, "r");
133 error(errno, "exec(\"%s\")", command);
134 return xstrdup("<error>");
137 while ((c = getc(tcpdump)) != EOF) {
141 status = pclose(tcpdump);
142 if (WIFEXITED(status)) {
143 if (WEXITSTATUS(status))
144 error(0, "tcpdump exited with status %d", WEXITSTATUS(status));
145 } else if (WIFSIGNALED(status)) {
146 error(0, "tcpdump exited with signal %d", WTERMSIG(status));
151 /* Pretty-print the OFPT_PACKET_IN packet of 'len' bytes at 'oh' to 'stream'
152 * at the given 'verbosity' level. */
154 ofp_packet_in(struct ds *string, const void *oh, size_t len, int verbosity)
156 const struct ofp_packet_in *op = oh;
159 ds_put_format(string, " total_len=%"PRIu16" in_port=",
160 ntohs(op->total_len));
161 ofp_print_port_name(string, ntohs(op->in_port));
163 if (op->reason == OFPR_ACTION)
164 ds_put_cstr(string, " (via action)");
165 else if (op->reason != OFPR_NO_MATCH)
166 ds_put_format(string, " (***reason %"PRIu8"***)", op->reason);
168 data_len = len - offsetof(struct ofp_packet_in, data);
169 ds_put_format(string, " data_len=%zu", data_len);
170 if (htonl(op->buffer_id) == UINT32_MAX) {
171 ds_put_format(string, " (unbuffered)");
172 if (ntohs(op->total_len) != data_len)
173 ds_put_format(string, " (***total_len != data_len***)");
175 ds_put_format(string, " buffer=0x%08"PRIx32, ntohl(op->buffer_id));
176 if (ntohs(op->total_len) < data_len)
177 ds_put_format(string, " (***total_len < data_len***)");
179 ds_put_char(string, '\n');
183 struct buffer packet;
184 struct ofp_match match;
185 packet.data = (void *) op->data;
186 packet.size = data_len;
187 flow_extract(&packet, ntohs(op->in_port), &flow);
189 match.in_port = flow.in_port;
190 memcpy(match.dl_src, flow.dl_src, ETH_ADDR_LEN);
191 memcpy(match.dl_dst, flow.dl_dst, ETH_ADDR_LEN);
192 match.dl_vlan = flow.dl_vlan;
193 match.dl_type = flow.dl_type;
194 match.nw_proto = flow.nw_proto;
196 match.nw_src = flow.nw_src;
197 match.nw_dst = flow.nw_dst;
198 match.tp_src = flow.tp_src;
199 match.tp_dst = flow.tp_dst;
200 ofp_print_match(string, &match, verbosity);
201 ds_put_char(string, '\n');
204 char *packet = ofp_packet_to_string(op->data, data_len,
205 ntohs(op->total_len));
206 ds_put_cstr(string, packet);
211 static void ofp_print_port_name(struct ds *string, uint16_t port)
230 case OFPP_CONTROLLER:
240 ds_put_format(string, "%"PRIu16, port);
243 ds_put_cstr(string, name);
247 ofp_print_action(struct ds *string, const struct ofp_action *a)
249 switch (ntohs(a->type)) {
252 uint16_t port = ntohs(a->arg.output.port);
253 if (port < OFPP_MAX) {
254 ds_put_format(string, "output:%"PRIu16, port);
256 ofp_print_port_name(string, port);
257 if (port == OFPP_CONTROLLER) {
258 if (a->arg.output.max_len) {
259 ds_put_format(string, ":%"PRIu16,
260 ntohs(a->arg.output.max_len));
262 ds_put_cstr(string, ":all");
269 case OFPAT_SET_DL_VLAN:
270 ds_put_cstr(string, "mod_vlan:");
271 if (ntohs(a->arg.vlan_id) == OFP_VLAN_NONE) {
272 ds_put_cstr(string, "strip");
274 ds_put_format(string, "%"PRIu16, ntohs(a->arg.vlan_id));
278 case OFPAT_SET_DL_SRC:
279 ds_put_format(string, "mod_dl_src:"ETH_ADDR_FMT,
280 ETH_ADDR_ARGS(a->arg.dl_addr));
283 case OFPAT_SET_DL_DST:
284 ds_put_format(string, "mod_dl_dst:"ETH_ADDR_FMT,
285 ETH_ADDR_ARGS(a->arg.dl_addr));
288 case OFPAT_SET_NW_SRC:
289 ds_put_format(string, "mod_nw_src:"IP_FMT, IP_ARGS(&a->arg.nw_addr));
292 case OFPAT_SET_NW_DST:
293 ds_put_format(string, "mod_nw_dst:"IP_FMT, IP_ARGS(&a->arg.nw_addr));
296 case OFPAT_SET_TP_SRC:
297 ds_put_format(string, "mod_tp_src:%d", ntohs(a->arg.tp));
300 case OFPAT_SET_TP_DST:
301 ds_put_format(string, "mod_tp_dst:%d", ntohs(a->arg.tp));
305 ds_put_format(string, "(decoder %"PRIu16" not implemented)",
311 static void ofp_print_actions(struct ds *string,
312 const struct ofp_action actions[],
316 int n_actions = n_bytes / sizeof *actions;
318 ds_put_format(string, "action%s=", n_actions == 1 ? "" : "s");
319 for (i = 0; i < n_actions; i++) {
321 ds_put_cstr(string, ",");
323 ofp_print_action(string, &actions[i]);
325 if (n_bytes % sizeof *actions) {
327 ds_put_cstr(string, ",");
329 ds_put_cstr(string, ", ***trailing garbage***");
333 /* Pretty-print the OFPT_PACKET_OUT packet of 'len' bytes at 'oh' to 'string'
334 * at the given 'verbosity' level. */
335 static void ofp_packet_out(struct ds *string, const void *oh, size_t len,
338 const struct ofp_packet_out *opo = oh;
339 int n_actions = ntohs(opo->n_actions);
340 int act_len = n_actions * sizeof opo->actions[0];
342 ds_put_cstr(string, " in_port=");
343 ofp_print_port_name(string, ntohs(opo->in_port));
345 ds_put_format(string, " n_actions=%d ", n_actions);
346 if (act_len > (ntohs(opo->header.length) - sizeof *opo)) {
347 ds_put_format(string, "***packet too short for number of actions***\n");
350 ofp_print_actions(string, opo->actions, act_len);
352 if (ntohl(opo->buffer_id) == UINT32_MAX) {
353 int data_len = len - sizeof *opo - act_len;
354 ds_put_format(string, " data_len=%d", data_len);
355 if (verbosity > 0 && len > sizeof *opo) {
356 char *packet = ofp_packet_to_string(&opo->actions[n_actions],
358 ds_put_char(string, '\n');
359 ds_put_cstr(string, packet);
363 ds_put_format(string, " buffer=0x%08"PRIx32, ntohl(opo->buffer_id));
365 ds_put_char(string, '\n');
368 /* qsort comparison function. */
370 compare_ports(const void *a_, const void *b_)
372 const struct ofp_phy_port *a = a_;
373 const struct ofp_phy_port *b = b_;
374 uint16_t ap = ntohs(a->port_no);
375 uint16_t bp = ntohs(b->port_no);
377 return ap < bp ? -1 : ap > bp;
381 ofp_print_phy_port(struct ds *string, const struct ofp_phy_port *port)
383 uint8_t name[OFP_MAX_PORT_NAME_LEN];
386 memcpy(name, port->name, sizeof name);
387 for (j = 0; j < sizeof name - 1; j++) {
388 if (!isprint(name[j])) {
394 ds_put_char(string, ' ');
395 ofp_print_port_name(string, ntohs(port->port_no));
396 ds_put_format(string, "(%s): addr:"ETH_ADDR_FMT", speed:%d, flags:%#x, "
398 ETH_ADDR_ARGS(port->hw_addr), ntohl(port->speed),
399 ntohl(port->flags), ntohl(port->features));
402 /* Pretty-print the struct ofp_switch_features of 'len' bytes at 'oh' to
403 * 'string' at the given 'verbosity' level. */
405 ofp_print_switch_features(struct ds *string, const void *oh, size_t len,
408 const struct ofp_switch_features *osf = oh;
409 struct ofp_phy_port port_list[OFPP_MAX];
413 ds_put_format(string, "dp id:%"PRIx64"\n", ntohll(osf->datapath_id));
414 ds_put_format(string, "n_tables:%d, n_buffers:%d\n", osf->n_tables,
415 ntohl(osf->n_buffers));
416 ds_put_format(string, "features: capabilities:%#x, actions:%#x\n",
417 ntohl(osf->capabilities), ntohl(osf->actions));
419 if (ntohs(osf->header.length) >= sizeof *osf) {
420 len = MIN(len, ntohs(osf->header.length));
422 n_ports = (len - sizeof *osf) / sizeof *osf->ports;
424 memcpy(port_list, osf->ports, (len - sizeof *osf));
425 qsort(port_list, n_ports, sizeof port_list[0], compare_ports);
426 for (i = 0; i < n_ports; i++) {
427 ofp_print_phy_port(string, &port_list[i]);
431 /* Pretty-print the struct ofp_switch_config of 'len' bytes at 'oh' to 'string'
432 * at the given 'verbosity' level. */
434 ofp_print_switch_config(struct ds *string, const void *oh, size_t len,
437 const struct ofp_switch_config *osc = oh;
440 flags = ntohs(osc->flags);
441 if (flags & OFPC_SEND_FLOW_EXP) {
442 flags &= ~OFPC_SEND_FLOW_EXP;
443 ds_put_format(string, " (sending flow expirations)");
446 ds_put_format(string, " ***unknown flags 0x%04"PRIx16"***", flags);
449 ds_put_format(string, " miss_send_len=%"PRIu16"\n", ntohs(osc->miss_send_len));
452 static void print_wild(struct ds *string, const char *leader, int is_wild,
453 int verbosity, const char *format, ...)
454 __attribute__((format(printf, 5, 6)));
456 static void print_wild(struct ds *string, const char *leader, int is_wild,
457 int verbosity, const char *format, ...)
459 if (is_wild && verbosity < 2) {
462 ds_put_cstr(string, leader);
466 va_start(args, format);
467 ds_put_format_valist(string, format, args);
470 ds_put_char(string, '*');
472 ds_put_char(string, ',');
476 print_ip_netmask(struct ds *string, const char *leader, uint32_t ip,
477 uint32_t wild_bits, int verbosity)
479 if (wild_bits >= 32 && verbosity < 2) {
482 ds_put_cstr(string, leader);
483 if (wild_bits < 32) {
484 ds_put_format(string, IP_FMT, IP_ARGS(&ip));
486 ds_put_format(string, "/%d", 32 - wild_bits);
489 ds_put_char(string, '*');
491 ds_put_char(string, ',');
494 /* Pretty-print the ofp_match structure */
495 static void ofp_print_match(struct ds *f, const struct ofp_match *om,
498 uint32_t w = ntohl(om->wildcards);
499 bool skip_type = false;
500 bool skip_proto = false;
502 if (!(w & OFPFW_DL_TYPE)) {
504 if (om->dl_type == htons(ETH_TYPE_IP)) {
505 if (!(w & OFPFW_NW_PROTO)) {
507 if (om->nw_proto == IP_TYPE_ICMP) {
508 ds_put_cstr(f, "icmp,");
509 } else if (om->nw_proto == IP_TYPE_TCP) {
510 ds_put_cstr(f, "tcp,");
511 } else if (om->nw_proto == IP_TYPE_UDP) {
512 ds_put_cstr(f, "udp,");
514 ds_put_cstr(f, "ip,");
518 ds_put_cstr(f, "ip,");
520 } else if (om->dl_type == htons(ETH_TYPE_ARP)) {
521 ds_put_cstr(f, "arp,");
526 print_wild(f, "in_port=", w & OFPFW_IN_PORT, verbosity,
527 "%d", ntohs(om->in_port));
528 print_wild(f, "dl_vlan=", w & OFPFW_DL_VLAN, verbosity,
529 "0x%04x", ntohs(om->dl_vlan));
530 print_wild(f, "dl_src=", w & OFPFW_DL_SRC, verbosity,
531 ETH_ADDR_FMT, ETH_ADDR_ARGS(om->dl_src));
532 print_wild(f, "dl_dst=", w & OFPFW_DL_DST, verbosity,
533 ETH_ADDR_FMT, ETH_ADDR_ARGS(om->dl_dst));
535 print_wild(f, "dl_type=", w & OFPFW_DL_TYPE, verbosity,
536 "0x%04x", ntohs(om->dl_type));
538 print_ip_netmask(f, "nw_src=", om->nw_src,
539 (w & OFPFW_NW_SRC_MASK) >> OFPFW_NW_SRC_SHIFT, verbosity);
540 print_ip_netmask(f, "nw_dst=", om->nw_dst,
541 (w & OFPFW_NW_DST_MASK) >> OFPFW_NW_DST_SHIFT, verbosity);
543 print_wild(f, "nw_proto=", w & OFPFW_NW_PROTO, verbosity,
546 print_wild(f, "tp_src=", w & OFPFW_TP_SRC, verbosity,
547 "%d", ntohs(om->tp_src));
548 print_wild(f, "tp_dst=", w & OFPFW_TP_DST, verbosity,
549 "%d", ntohs(om->tp_dst));
552 /* Pretty-print the OFPT_FLOW_MOD packet of 'len' bytes at 'oh' to 'string'
553 * at the given 'verbosity' level. */
555 ofp_print_flow_mod(struct ds *string, const void *oh, size_t len,
558 const struct ofp_flow_mod *ofm = oh;
560 ofp_print_match(string, &ofm->match, verbosity);
561 ds_put_format(string, " cmd:%d idle:%d hard:%d pri:%d buf:%#x",
562 ntohs(ofm->command), ntohs(ofm->idle_timeout),
563 ntohs(ofm->hard_timeout),
564 ofm->match.wildcards ? ntohs(ofm->priority) : (uint16_t)-1,
565 ntohl(ofm->buffer_id));
566 ofp_print_actions(string, ofm->actions,
567 len - offsetof(struct ofp_flow_mod, actions));
568 ds_put_char(string, '\n');
571 /* Pretty-print the OFPT_FLOW_EXPIRED packet of 'len' bytes at 'oh' to 'string'
572 * at the given 'verbosity' level. */
574 ofp_print_flow_expired(struct ds *string, const void *oh, size_t len,
577 const struct ofp_flow_expired *ofe = oh;
579 ofp_print_match(string, &ofe->match, verbosity);
580 ds_put_cstr(string, " reason=");
581 switch (ofe->reason) {
582 case OFPER_IDLE_TIMEOUT:
583 ds_put_cstr(string, "idle");
585 case OFPER_HARD_TIMEOUT:
586 ds_put_cstr(string, "hard");
589 ds_put_format(string, "**%"PRIu8"**", ofe->reason);
592 ds_put_format(string,
593 " pri%"PRIu16" secs%"PRIu32" pkts%"PRIu64" bytes%"PRIu64"\n",
594 ofe->match.wildcards ? ntohs(ofe->priority) : (uint16_t)-1,
595 ntohl(ofe->duration), ntohll(ofe->packet_count),
596 ntohll(ofe->byte_count));
605 static const struct error_type error_types[] = {
606 #define ERROR_TYPE(TYPE) {TYPE, -1, #TYPE}
607 #define ERROR_CODE(TYPE, CODE) {TYPE, CODE, #CODE}
608 ERROR_TYPE(OFPET_HELLO_FAILED),
609 ERROR_CODE(OFPET_HELLO_FAILED, OFPHFC_INCOMPATIBLE),
611 ERROR_TYPE(OFPET_BAD_REQUEST),
612 ERROR_CODE(OFPET_BAD_REQUEST, OFPBRC_BAD_VERSION),
613 ERROR_CODE(OFPET_BAD_REQUEST, OFPBRC_BAD_TYPE),
614 ERROR_CODE(OFPET_BAD_REQUEST, OFPBRC_BAD_STAT),
615 ERROR_CODE(OFPET_BAD_REQUEST, OFPBRC_BAD_VERSION),
617 #define N_ERROR_TYPES ARRAY_SIZE(error_types)
620 lookup_error_type(int type)
622 const struct error_type *t;
624 for (t = error_types; t < &error_types[N_ERROR_TYPES]; t++) {
625 if (t->type == type && t->code == -1) {
633 lookup_error_code(int type, int code)
635 const struct error_type *t;
637 for (t = error_types; t < &error_types[N_ERROR_TYPES]; t++) {
638 if (t->type == type && t->code == code) {
645 /* Pretty-print the OFPT_ERROR packet of 'len' bytes at 'oh' to 'string'
646 * at the given 'verbosity' level. */
648 ofp_print_error_msg(struct ds *string, const void *oh, size_t len,
651 const struct ofp_error_msg *oem = oh;
652 int type = ntohs(oem->type);
653 int code = ntohs(oem->code);
656 ds_put_format(string, " type%d(%s) code%d(%s) payload:\n",
657 type, lookup_error_type(type),
658 code, lookup_error_code(type, code));
661 case OFPET_HELLO_FAILED:
662 ds_put_printable(string, (char *) oem->data, len - sizeof *oem);
665 case OFPET_BAD_REQUEST:
666 s = ofp_to_string(oem->data, len - sizeof *oem, 1);
667 ds_put_cstr(string, s);
672 ds_put_hex_dump(string, oem->data, len - sizeof *oem, 0, true);
677 /* Pretty-print the OFPT_PORT_STATUS packet of 'len' bytes at 'oh' to 'string'
678 * at the given 'verbosity' level. */
680 ofp_print_port_status(struct ds *string, const void *oh, size_t len,
683 const struct ofp_port_status *ops = oh;
685 if (ops->reason == OFPPR_ADD) {
686 ds_put_format(string, "add:");
687 } else if (ops->reason == OFPPR_DELETE) {
688 ds_put_format(string, "del:");
689 } else if (ops->reason == OFPPR_MOD) {
690 ds_put_format(string, "mod:");
692 ds_put_format(string, "err:");
695 ofp_print_phy_port(string, &ops->desc);
699 ofp_desc_stats_reply(struct ds *string, const void *body, size_t len,
702 const struct ofp_desc_stats *ods = body;
704 ds_put_format(string, "Manufacturer: %s\n", ods->mfr_desc);
705 ds_put_format(string, "Hardware: %s\n", ods->hw_desc);
706 ds_put_format(string, "Software: %s\n", ods->sw_desc);
707 ds_put_format(string, "Serial Num: %s\n", ods->serial_num);
711 ofp_flow_stats_request(struct ds *string, const void *oh, size_t len,
714 const struct ofp_flow_stats_request *fsr = oh;
716 if (fsr->table_id == 0xff) {
717 ds_put_format(string, " table_id=any, ");
719 ds_put_format(string, " table_id=%"PRIu8", ", fsr->table_id);
722 ofp_print_match(string, &fsr->match, verbosity);
726 ofp_flow_stats_reply(struct ds *string, const void *body_, size_t len,
729 const char *body = body_;
730 const char *pos = body;
732 const struct ofp_flow_stats *fs;
733 ptrdiff_t bytes_left = body + len - pos;
736 if (bytes_left < sizeof *fs) {
737 if (bytes_left != 0) {
738 ds_put_format(string, " ***%td leftover bytes at end***",
744 fs = (const void *) pos;
745 length = ntohs(fs->length);
746 if (length < sizeof *fs) {
747 ds_put_format(string, " ***length=%zu shorter than minimum %zu***",
750 } else if (length > bytes_left) {
751 ds_put_format(string,
752 " ***length=%zu but only %td bytes left***",
755 } else if ((length - sizeof *fs) % sizeof fs->actions[0]) {
756 ds_put_format(string,
757 " ***length=%zu has %zu bytes leftover in "
760 (length - sizeof *fs) % sizeof fs->actions[0]);
764 ds_put_format(string, " duration=%"PRIu32"s, ", ntohl(fs->duration));
765 ds_put_format(string, "table_id=%"PRIu8", ", fs->table_id);
766 ds_put_format(string, "priority=%"PRIu16", ",
767 fs->match.wildcards ? ntohs(fs->priority) : (uint16_t)-1);
768 ds_put_format(string, "n_packets=%"PRIu64", ",
769 ntohll(fs->packet_count));
770 ds_put_format(string, "n_bytes=%"PRIu64", ", ntohll(fs->byte_count));
771 ds_put_format(string, "idle_timeout=%"PRIu16",",
772 ntohs(fs->idle_timeout));
773 ds_put_format(string, "hard_timeout=%"PRIu16",",
774 ntohs(fs->hard_timeout));
775 ofp_print_match(string, &fs->match, verbosity);
776 ofp_print_actions(string, fs->actions, length - sizeof *fs);
777 ds_put_char(string, '\n');
784 ofp_aggregate_stats_request(struct ds *string, const void *oh, size_t len,
787 const struct ofp_aggregate_stats_request *asr = oh;
789 if (asr->table_id == 0xff) {
790 ds_put_format(string, " table_id=any, ");
792 ds_put_format(string, " table_id=%"PRIu8", ", asr->table_id);
795 ofp_print_match(string, &asr->match, verbosity);
799 ofp_aggregate_stats_reply(struct ds *string, const void *body_, size_t len,
802 const struct ofp_aggregate_stats_reply *asr = body_;
804 ds_put_format(string, " packet_count=%"PRIu64, ntohll(asr->packet_count));
805 ds_put_format(string, " byte_count=%"PRIu64, ntohll(asr->byte_count));
806 ds_put_format(string, " flow_count=%"PRIu32, ntohl(asr->flow_count));
809 static void print_port_stat(struct ds *string, const char *leader,
810 uint64_t stat, int more)
812 ds_put_cstr(string, leader);
814 ds_put_format(string, "%"PRIu64, stat);
816 ds_put_char(string, '?');
819 ds_put_cstr(string, ", ");
821 ds_put_cstr(string, "\n");
826 ofp_port_stats_reply(struct ds *string, const void *body, size_t len,
829 const struct ofp_port_stats *ps = body;
830 size_t n = len / sizeof *ps;
831 ds_put_format(string, " %zu ports\n", n);
837 ds_put_format(string, " port %2"PRIu16": ", ntohs(ps->port_no));
839 ds_put_cstr(string, "rx ");
840 print_port_stat(string, "pkts=", ntohll(ps->rx_packets), 1);
841 print_port_stat(string, "bytes=", ntohll(ps->rx_bytes), 1);
842 print_port_stat(string, "drop=", ntohll(ps->rx_dropped), 1);
843 print_port_stat(string, "errs=", ntohll(ps->rx_errors), 1);
844 print_port_stat(string, "frame=", ntohll(ps->rx_frame_err), 1);
845 print_port_stat(string, "over=", ntohll(ps->rx_over_err), 1);
846 print_port_stat(string, "crc=", ntohll(ps->rx_crc_err), 0);
848 ds_put_cstr(string, " tx ");
849 print_port_stat(string, "pkts=", ntohll(ps->tx_packets), 1);
850 print_port_stat(string, "bytes=", ntohll(ps->tx_bytes), 1);
851 print_port_stat(string, "drop=", ntohll(ps->tx_dropped), 1);
852 print_port_stat(string, "errs=", ntohll(ps->tx_errors), 1);
853 print_port_stat(string, "coll=", ntohll(ps->collisions), 0);
858 ofp_table_stats_reply(struct ds *string, const void *body, size_t len,
861 const struct ofp_table_stats *ts = body;
862 size_t n = len / sizeof *ts;
863 ds_put_format(string, " %zu tables\n", n);
869 char name[OFP_MAX_TABLE_NAME_LEN + 1];
870 strncpy(name, ts->name, sizeof name);
871 name[OFP_MAX_TABLE_NAME_LEN] = '\0';
873 ds_put_format(string, " %d: %-8s: ", ts->table_id, name);
874 ds_put_format(string, "wild=0x%05"PRIx32", ", ntohl(ts->wildcards));
875 ds_put_format(string, "max=%6"PRIu32", ", ntohl(ts->max_entries));
876 ds_put_format(string, "active=%6"PRIu32", ", ntohl(ts->active_count));
877 ds_put_format(string, "matched=%6"PRIu64"\n",
878 ntohll(ts->matched_count));
883 vendor_stat(struct ds *string, const void *body, size_t len,
884 int verbosity UNUSED)
886 ds_put_format(string, " vendor=%08"PRIx32, ntohl(*(uint32_t *) body));
887 ds_put_format(string, " %zu bytes additional data",
888 len - sizeof(uint32_t));
891 enum stats_direction {
897 print_stats(struct ds *string, int type, const void *body, size_t body_len,
898 int verbosity, enum stats_direction direction)
901 size_t min_body, max_body;
902 void (*printer)(struct ds *, const void *, size_t len, int verbosity);
907 struct stats_msg request;
908 struct stats_msg reply;
911 static const struct stats_type stats_types[] = {
915 { 0, SIZE_MAX, ofp_desc_stats_reply },
919 { sizeof(struct ofp_flow_stats_request),
920 sizeof(struct ofp_flow_stats_request),
921 ofp_flow_stats_request },
922 { 0, SIZE_MAX, ofp_flow_stats_reply },
924 [OFPST_AGGREGATE] = {
926 { sizeof(struct ofp_aggregate_stats_request),
927 sizeof(struct ofp_aggregate_stats_request),
928 ofp_aggregate_stats_request },
929 { sizeof(struct ofp_aggregate_stats_reply),
930 sizeof(struct ofp_aggregate_stats_reply),
931 ofp_aggregate_stats_reply },
936 { 0, SIZE_MAX, ofp_table_stats_reply },
941 { 0, SIZE_MAX, ofp_port_stats_reply },
945 { sizeof(uint32_t), SIZE_MAX, vendor_stat },
946 { sizeof(uint32_t), SIZE_MAX, vendor_stat },
950 const struct stats_type *s;
951 const struct stats_msg *m;
953 if (type >= ARRAY_SIZE(stats_types) || !stats_types[type].name) {
954 ds_put_format(string, " ***unknown type %d***", type);
957 s = &stats_types[type];
958 ds_put_format(string, " type=%d(%s)\n", type, s->name);
960 m = direction == REQUEST ? &s->request : &s->reply;
961 if (body_len < m->min_body || body_len > m->max_body) {
962 ds_put_format(string, " ***body_len=%zu not in %zu...%zu***",
963 body_len, m->min_body, m->max_body);
967 m->printer(string, body, body_len, verbosity);
972 ofp_stats_request(struct ds *string, const void *oh, size_t len, int verbosity)
974 const struct ofp_stats_request *srq = oh;
977 ds_put_format(string, " ***unknown flags 0x%04"PRIx16"***",
981 print_stats(string, ntohs(srq->type), srq->body,
982 len - offsetof(struct ofp_stats_request, body),
987 ofp_stats_reply(struct ds *string, const void *oh, size_t len, int verbosity)
989 const struct ofp_stats_reply *srp = oh;
991 ds_put_cstr(string, " flags=");
993 ds_put_cstr(string, "none");
995 uint16_t flags = ntohs(srp->flags);
996 if (flags & OFPSF_REPLY_MORE) {
997 ds_put_cstr(string, "[more]");
998 flags &= ~OFPSF_REPLY_MORE;
1001 ds_put_format(string, "[***unknown flags 0x%04"PRIx16"***]", flags);
1005 print_stats(string, ntohs(srp->type), srp->body,
1006 len - offsetof(struct ofp_stats_reply, body),
1011 ofp_echo(struct ds *string, const void *oh, size_t len, int verbosity)
1013 const struct ofp_header *hdr = oh;
1015 ds_put_format(string, " %zu bytes of payload\n", len - sizeof *hdr);
1016 if (verbosity > 1) {
1017 ds_put_hex_dump(string, hdr, len - sizeof *hdr, 0, true);
1021 struct openflow_packet {
1024 void (*printer)(struct ds *, const void *, size_t len, int verbosity);
1027 static const struct openflow_packet packets[] = {
1030 sizeof (struct ofp_header),
1033 [OFPT_FEATURES_REQUEST] = {
1035 sizeof (struct ofp_header),
1038 [OFPT_FEATURES_REPLY] = {
1040 sizeof (struct ofp_switch_features),
1041 ofp_print_switch_features,
1043 [OFPT_GET_CONFIG_REQUEST] = {
1044 "get_config_request",
1045 sizeof (struct ofp_header),
1048 [OFPT_GET_CONFIG_REPLY] = {
1050 sizeof (struct ofp_switch_config),
1051 ofp_print_switch_config,
1053 [OFPT_SET_CONFIG] = {
1055 sizeof (struct ofp_switch_config),
1056 ofp_print_switch_config,
1058 [OFPT_PACKET_IN] = {
1060 offsetof(struct ofp_packet_in, data),
1063 [OFPT_PACKET_OUT] = {
1065 sizeof (struct ofp_packet_out),
1070 sizeof (struct ofp_flow_mod),
1073 [OFPT_FLOW_EXPIRED] = {
1075 sizeof (struct ofp_flow_expired),
1076 ofp_print_flow_expired,
1080 sizeof (struct ofp_port_mod),
1083 [OFPT_PORT_STATUS] = {
1085 sizeof (struct ofp_port_status),
1086 ofp_print_port_status
1090 sizeof (struct ofp_error_msg),
1091 ofp_print_error_msg,
1093 [OFPT_STATS_REQUEST] = {
1095 sizeof (struct ofp_stats_request),
1098 [OFPT_STATS_REPLY] = {
1100 sizeof (struct ofp_stats_reply),
1103 [OFPT_ECHO_REQUEST] = {
1105 sizeof (struct ofp_header),
1108 [OFPT_ECHO_REPLY] = {
1110 sizeof (struct ofp_header),
1115 /* Composes and returns a string representing the OpenFlow packet of 'len'
1116 * bytes at 'oh' at the given 'verbosity' level. 0 is a minimal amount of
1117 * verbosity and higher numbers increase verbosity. The caller is responsible
1118 * for freeing the string. */
1120 ofp_to_string(const void *oh_, size_t len, int verbosity)
1122 struct ds string = DS_EMPTY_INITIALIZER;
1123 const struct ofp_header *oh = oh_;
1124 const struct openflow_packet *pkt;
1126 if (len < sizeof(struct ofp_header)) {
1127 ds_put_cstr(&string, "OpenFlow packet too short:\n");
1128 ds_put_hex_dump(&string, oh, len, 0, true);
1129 return ds_cstr(&string);
1130 } else if (oh->version != OFP_VERSION) {
1131 ds_put_format(&string, "Bad OpenFlow version %"PRIu8":\n", oh->version);
1132 ds_put_hex_dump(&string, oh, len, 0, true);
1133 return ds_cstr(&string);
1134 } else if (oh->type >= ARRAY_SIZE(packets) || !packets[oh->type].name) {
1135 ds_put_format(&string, "Unknown OpenFlow packet type %"PRIu8":\n",
1137 ds_put_hex_dump(&string, oh, len, 0, true);
1138 return ds_cstr(&string);
1141 pkt = &packets[oh->type];
1142 ds_put_format(&string, "%s (xid=0x%"PRIx32"):", pkt->name, oh->xid);
1144 if (ntohs(oh->length) > len)
1145 ds_put_format(&string, " (***truncated to %zu bytes from %"PRIu16"***)",
1146 len, ntohs(oh->length));
1147 else if (ntohs(oh->length) < len) {
1148 ds_put_format(&string, " (***only uses %"PRIu16" bytes out of %zu***)\n",
1149 ntohs(oh->length), len);
1150 len = ntohs(oh->length);
1153 if (len < pkt->min_size) {
1154 ds_put_format(&string, " (***length=%zu < min_size=%zu***)\n",
1155 len, pkt->min_size);
1156 } else if (!pkt->printer) {
1157 if (len > sizeof *oh) {
1158 ds_put_format(&string, " length=%"PRIu16" (decoder not implemented)\n",
1162 pkt->printer(&string, oh, len, verbosity);
1164 if (verbosity >= 3) {
1165 ds_put_hex_dump(&string, oh, len, 0, true);
1167 if (string.string[string.length - 1] != '\n') {
1168 ds_put_char(&string, '\n');
1170 return ds_cstr(&string);
1174 print_and_free(FILE *stream, char *string)
1176 fputs(string, stream);
1180 /* Pretty-print the OpenFlow packet of 'len' bytes at 'oh' to 'stream' at the
1181 * given 'verbosity' level. 0 is a minimal amount of verbosity and higher
1182 * numbers increase verbosity. */
1184 ofp_print(FILE *stream, const void *oh, size_t len, int verbosity)
1186 print_and_free(stream, ofp_to_string(oh, len, verbosity));
1189 /* Dumps the contents of the Ethernet frame in the 'len' bytes starting at
1190 * 'data' to 'stream' using tcpdump. 'total_len' specifies the full length of
1191 * the Ethernet frame (of which 'len' bytes were captured).
1193 * This starts and kills a tcpdump subprocess so it's quite expensive. */
1195 ofp_print_packet(FILE *stream, const void *data, size_t len, size_t total_len)
1197 print_and_free(stream, ofp_packet_to_string(data, len, total_len));