1 /* Copyright (c) 2008 The Board of Trustees of The Leland Stanford
4 * We are making the OpenFlow specification and associated documentation
5 * (Software) available for public use and benefit with the expectation
6 * that others will use, modify and enhance the Software and contribute
7 * those enhancements back to the community. However, since we would
8 * like to make the Software available for broadest use, with as few
9 * restrictions as possible permission is hereby granted, free of
10 * charge, to any person obtaining a copy of this Software to deal in
11 * the Software under the copyrights without restriction, including
12 * without limitation the rights to use, copy, modify, merge, publish,
13 * distribute, sublicense, and/or sell copies of the Software, and to
14 * permit persons to whom the Software is furnished to do so, subject to
15 * the following conditions:
17 * The above copyright notice and this permission notice shall be
18 * included in all copies or substantial portions of the Software.
20 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
21 * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
22 * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
23 * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
24 * BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
25 * ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
26 * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
29 * The name and trademarks of copyright holder(s) may NOT be used in
30 * advertising or publicity pertaining to the Software or any
31 * derivatives without specific, written prior permission.
35 #include "ofp-print.h"
40 #include <netinet/in.h>
48 #include "dynamic-string.h"
54 static void ofp_print_port_name(struct ds *string, uint16_t port);
55 static void ofp_print_match(struct ds *, const struct ofp_match *,
58 /* Returns a string that represents the contents of the Ethernet frame in the
59 * 'len' bytes starting at 'data' to 'stream' as output by tcpdump.
60 * 'total_len' specifies the full length of the Ethernet frame (of which 'len'
61 * bytes were captured).
63 * The caller must free the returned string.
65 * This starts and kills a tcpdump subprocess so it's quite expensive. */
67 ofp_packet_to_string(const void *data, size_t len, size_t total_len)
70 uint32_t magic_number; /* magic number */
71 uint16_t version_major; /* major version number */
72 uint16_t version_minor; /* minor version number */
73 int32_t thiszone; /* GMT to local correction */
74 uint32_t sigfigs; /* accuracy of timestamps */
75 uint32_t snaplen; /* max length of captured packets */
76 uint32_t network; /* data link type */
80 uint32_t ts_sec; /* timestamp seconds */
81 uint32_t ts_usec; /* timestamp microseconds */
82 uint32_t incl_len; /* number of octets of packet saved in file */
83 uint32_t orig_len; /* actual length of packet */
87 struct pcaprec_hdr prh;
89 struct ds ds = DS_EMPTY_INITIALIZER;
99 error(errno, "tmpfile");
100 return xstrdup("<error>");
103 /* The pcap reader is responsible for figuring out endianness based on the
104 * magic number, so the lack of htonX calls here is intentional. */
105 ph.magic_number = 0xa1b2c3d4;
106 ph.version_major = 2;
107 ph.version_minor = 4;
111 ph.network = 1; /* Ethernet */
116 prh.orig_len = total_len;
118 fwrite(&ph, 1, sizeof ph, pcap);
119 fwrite(&prh, 1, sizeof prh, pcap);
120 fwrite(data, 1, len, pcap);
124 error(errno, "error writing temporary file");
128 snprintf(command, sizeof command, "tcpdump -n -r /dev/fd/%d 2>/dev/null",
130 tcpdump = popen(command, "r");
133 error(errno, "exec(\"%s\")", command);
134 return xstrdup("<error>");
137 while ((c = getc(tcpdump)) != EOF) {
141 status = pclose(tcpdump);
142 if (WIFEXITED(status)) {
143 if (WEXITSTATUS(status))
144 error(0, "tcpdump exited with status %d", WEXITSTATUS(status));
145 } else if (WIFSIGNALED(status)) {
146 error(0, "tcpdump exited with signal %d", WTERMSIG(status));
151 /* Pretty-print the OFPT_PACKET_IN packet of 'len' bytes at 'oh' to 'stream'
152 * at the given 'verbosity' level. */
154 ofp_packet_in(struct ds *string, const void *oh, size_t len, int verbosity)
156 const struct ofp_packet_in *op = oh;
159 ds_put_format(string, " total_len=%"PRIu16" in_port=",
160 ntohs(op->total_len));
161 ofp_print_port_name(string, ntohs(op->in_port));
163 if (op->reason == OFPR_ACTION)
164 ds_put_cstr(string, " (via action)");
165 else if (op->reason != OFPR_NO_MATCH)
166 ds_put_format(string, " (***reason %"PRIu8"***)", op->reason);
168 data_len = len - offsetof(struct ofp_packet_in, data);
169 ds_put_format(string, " data_len=%zu", data_len);
170 if (htonl(op->buffer_id) == UINT32_MAX) {
171 ds_put_format(string, " (unbuffered)");
172 if (ntohs(op->total_len) != data_len)
173 ds_put_format(string, " (***total_len != data_len***)");
175 ds_put_format(string, " buffer=0x%08"PRIx32, ntohl(op->buffer_id));
176 if (ntohs(op->total_len) < data_len)
177 ds_put_format(string, " (***total_len < data_len***)");
179 ds_put_char(string, '\n');
183 struct buffer packet;
184 struct ofp_match match;
185 packet.data = (void *) op->data;
186 packet.size = data_len;
187 flow_extract(&packet, ntohs(op->in_port), &flow);
189 match.in_port = flow.in_port;
190 memcpy(match.dl_src, flow.dl_src, ETH_ADDR_LEN);
191 memcpy(match.dl_dst, flow.dl_dst, ETH_ADDR_LEN);
192 match.dl_vlan = flow.dl_vlan;
193 match.dl_type = flow.dl_type;
194 match.nw_proto = flow.nw_proto;
196 match.nw_src = flow.nw_src;
197 match.nw_dst = flow.nw_dst;
198 match.tp_src = flow.tp_src;
199 match.tp_dst = flow.tp_dst;
200 ofp_print_match(string, &match, verbosity);
201 ds_put_char(string, '\n');
204 char *packet = ofp_packet_to_string(op->data, data_len,
205 ntohs(op->total_len));
206 ds_put_cstr(string, packet);
211 static void ofp_print_port_name(struct ds *string, uint16_t port)
230 case OFPP_CONTROLLER:
240 ds_put_format(string, "%"PRIu16, port);
243 ds_put_cstr(string, name);
247 ofp_print_action(struct ds *string, const struct ofp_action *a)
249 switch (ntohs(a->type)) {
252 uint16_t port = ntohs(a->arg.output.port);
253 if (port < OFPP_MAX) {
254 ds_put_format(string, "output:%"PRIu16, port);
256 ofp_print_port_name(string, port);
257 if (port == OFPP_CONTROLLER) {
258 if (a->arg.output.max_len) {
259 ds_put_format(string, ":%"PRIu16,
260 ntohs(a->arg.output.max_len));
262 ds_put_cstr(string, ":all");
269 case OFPAT_SET_DL_VLAN:
270 ds_put_cstr(string, "mod_vlan:");
271 if (ntohs(a->arg.vlan_id) == OFP_VLAN_NONE) {
272 ds_put_cstr(string, "strip");
274 ds_put_format(string, "%"PRIu16, ntohs(a->arg.vlan_id));
278 case OFPAT_SET_DL_SRC:
279 ds_put_format(string, "mod_dl_src:"ETH_ADDR_FMT,
280 ETH_ADDR_ARGS(a->arg.dl_addr));
283 case OFPAT_SET_DL_DST:
284 ds_put_format(string, "mod_dl_dst:"ETH_ADDR_FMT,
285 ETH_ADDR_ARGS(a->arg.dl_addr));
288 case OFPAT_SET_NW_SRC:
289 ds_put_format(string, "mod_nw_src:"IP_FMT, IP_ARGS(&a->arg.nw_addr));
292 case OFPAT_SET_NW_DST:
293 ds_put_format(string, "mod_nw_dst:"IP_FMT, IP_ARGS(&a->arg.nw_addr));
296 case OFPAT_SET_TP_SRC:
297 ds_put_format(string, "mod_tp_src:%d", ntohs(a->arg.tp));
300 case OFPAT_SET_TP_DST:
301 ds_put_format(string, "mod_tp_dst:%d", ntohs(a->arg.tp));
305 ds_put_format(string, "(decoder %"PRIu16" not implemented)",
311 static void ofp_print_actions(struct ds *string,
312 const struct ofp_action actions[],
316 int n_actions = n_bytes / sizeof *actions;
318 ds_put_format(string, "action%s=", n_actions == 1 ? "" : "s");
319 for (i = 0; i < n_actions; i++) {
321 ds_put_cstr(string, ",");
323 ofp_print_action(string, &actions[i]);
325 if (n_bytes % sizeof *actions) {
327 ds_put_cstr(string, ",");
329 ds_put_cstr(string, ", ***trailing garbage***");
333 /* Pretty-print the OFPT_PACKET_OUT packet of 'len' bytes at 'oh' to 'string'
334 * at the given 'verbosity' level. */
335 static void ofp_packet_out(struct ds *string, const void *oh, size_t len,
338 const struct ofp_packet_out *opo = oh;
339 int n_actions = ntohs(opo->n_actions);
340 int act_len = n_actions * sizeof opo->actions[0];
342 ds_put_cstr(string, " in_port=");
343 ofp_print_port_name(string, ntohs(opo->in_port));
345 ds_put_format(string, " n_actions=%d ", n_actions);
346 if (act_len > (ntohs(opo->header.length) - sizeof *opo)) {
347 ds_put_format(string, "***packet too short for number of actions***\n");
350 ofp_print_actions(string, opo->actions, act_len);
352 if (ntohl(opo->buffer_id) == UINT32_MAX) {
353 int data_len = len - sizeof *opo - act_len;
354 ds_put_format(string, " data_len=%d", data_len);
355 if (verbosity > 0 && len > sizeof *opo) {
356 char *packet = ofp_packet_to_string(&opo->actions[n_actions],
358 ds_put_char(string, '\n');
359 ds_put_cstr(string, packet);
363 ds_put_format(string, " buffer=0x%08"PRIx32, ntohl(opo->buffer_id));
365 ds_put_char(string, '\n');
368 /* qsort comparison function. */
370 compare_ports(const void *a_, const void *b_)
372 const struct ofp_phy_port *a = a_;
373 const struct ofp_phy_port *b = b_;
374 uint16_t ap = ntohs(a->port_no);
375 uint16_t bp = ntohs(b->port_no);
377 return ap < bp ? -1 : ap > bp;
381 ofp_print_phy_port(struct ds *string, const struct ofp_phy_port *port)
383 uint8_t name[OFP_MAX_PORT_NAME_LEN];
386 memcpy(name, port->name, sizeof name);
387 for (j = 0; j < sizeof name - 1; j++) {
388 if (!isprint(name[j])) {
394 ds_put_char(string, ' ');
395 ofp_print_port_name(string, ntohs(port->port_no));
396 ds_put_format(string, "(%s): addr:"ETH_ADDR_FMT", speed:%d, flags:%#x, "
398 ETH_ADDR_ARGS(port->hw_addr), ntohl(port->speed),
399 ntohl(port->flags), ntohl(port->features));
402 /* Pretty-print the struct ofp_switch_features of 'len' bytes at 'oh' to
403 * 'string' at the given 'verbosity' level. */
405 ofp_print_switch_features(struct ds *string, const void *oh, size_t len,
408 const struct ofp_switch_features *osf = oh;
409 struct ofp_phy_port port_list[OFPP_MAX];
413 ds_put_format(string, "dp id:%"PRIx64"\n", ntohll(osf->datapath_id));
414 ds_put_format(string, "tables: exact:%d, compressed:%d, general:%d\n",
416 ntohl(osf->n_compression), ntohl(osf->n_general));
417 ds_put_format(string, "buffers: size:%d, number:%d\n",
418 ntohl(osf->buffer_mb), ntohl(osf->n_buffers));
419 ds_put_format(string, "features: capabilities:%#x, actions:%#x\n",
420 ntohl(osf->capabilities), ntohl(osf->actions));
422 if (ntohs(osf->header.length) >= sizeof *osf) {
423 len = MIN(len, ntohs(osf->header.length));
425 n_ports = (len - sizeof *osf) / sizeof *osf->ports;
427 memcpy(port_list, osf->ports, (len - sizeof *osf));
428 qsort(port_list, n_ports, sizeof port_list[0], compare_ports);
429 for (i = 0; i < n_ports; i++) {
430 ofp_print_phy_port(string, &port_list[i]);
434 /* Pretty-print the struct ofp_switch_config of 'len' bytes at 'oh' to 'string'
435 * at the given 'verbosity' level. */
437 ofp_print_switch_config(struct ds *string, const void *oh, size_t len,
440 const struct ofp_switch_config *osc = oh;
443 flags = ntohs(osc->flags);
444 if (flags & OFPC_SEND_FLOW_EXP) {
445 flags &= ~OFPC_SEND_FLOW_EXP;
446 ds_put_format(string, " (sending flow expirations)");
449 ds_put_format(string, " ***unknown flags 0x%04"PRIx16"***", flags);
452 ds_put_format(string, " miss_send_len=%"PRIu16"\n", ntohs(osc->miss_send_len));
455 static void print_wild(struct ds *string, const char *leader, int is_wild,
456 int verbosity, const char *format, ...)
457 __attribute__((format(printf, 5, 6)));
459 static void print_wild(struct ds *string, const char *leader, int is_wild,
460 int verbosity, const char *format, ...)
462 if (is_wild && verbosity < 2) {
465 ds_put_cstr(string, leader);
469 va_start(args, format);
470 ds_put_format_valist(string, format, args);
473 ds_put_char(string, '*');
475 ds_put_char(string, ',');
479 print_ip_netmask(struct ds *string, const char *leader, uint32_t ip,
480 uint32_t wild_bits, int verbosity)
482 if (wild_bits >= 32 && verbosity < 2) {
485 ds_put_cstr(string, leader);
486 if (wild_bits < 32) {
487 ds_put_format(string, IP_FMT, IP_ARGS(&ip));
489 ds_put_format(string, "/%d", 32 - wild_bits);
492 ds_put_char(string, '*');
494 ds_put_char(string, ',');
497 /* Pretty-print the ofp_match structure */
498 static void ofp_print_match(struct ds *f, const struct ofp_match *om,
501 uint32_t w = ntohl(om->wildcards);
502 bool skip_type = false;
503 bool skip_proto = false;
505 if (!(w & OFPFW_DL_TYPE)) {
507 if (om->dl_type == htons(ETH_TYPE_IP)) {
508 if (!(w & OFPFW_NW_PROTO)) {
510 if (om->nw_proto == IP_TYPE_ICMP) {
511 ds_put_cstr(f, "icmp,");
512 } else if (om->nw_proto == IP_TYPE_TCP) {
513 ds_put_cstr(f, "tcp,");
514 } else if (om->nw_proto == IP_TYPE_UDP) {
515 ds_put_cstr(f, "udp,");
517 ds_put_cstr(f, "ip,");
521 ds_put_cstr(f, "ip,");
523 } else if (om->dl_type == htons(ETH_TYPE_ARP)) {
524 ds_put_cstr(f, "arp,");
529 print_wild(f, "in_port=", w & OFPFW_IN_PORT, verbosity,
530 "%d", ntohs(om->in_port));
531 print_wild(f, "dl_vlan=", w & OFPFW_DL_VLAN, verbosity,
532 "0x%04x", ntohs(om->dl_vlan));
533 print_wild(f, "dl_src=", w & OFPFW_DL_SRC, verbosity,
534 ETH_ADDR_FMT, ETH_ADDR_ARGS(om->dl_src));
535 print_wild(f, "dl_dst=", w & OFPFW_DL_DST, verbosity,
536 ETH_ADDR_FMT, ETH_ADDR_ARGS(om->dl_dst));
538 print_wild(f, "dl_type=", w & OFPFW_DL_TYPE, verbosity,
539 "0x%04x", ntohs(om->dl_type));
541 print_ip_netmask(f, "nw_src=", om->nw_src,
542 (w & OFPFW_NW_SRC_MASK) >> OFPFW_NW_SRC_SHIFT, verbosity);
543 print_ip_netmask(f, "nw_dst=", om->nw_dst,
544 (w & OFPFW_NW_DST_MASK) >> OFPFW_NW_DST_SHIFT, verbosity);
546 print_wild(f, "nw_proto=", w & OFPFW_NW_PROTO, verbosity,
549 print_wild(f, "tp_src=", w & OFPFW_TP_SRC, verbosity,
550 "%d", ntohs(om->tp_src));
551 print_wild(f, "tp_dst=", w & OFPFW_TP_DST, verbosity,
552 "%d", ntohs(om->tp_dst));
555 /* Pretty-print the OFPT_FLOW_MOD packet of 'len' bytes at 'oh' to 'string'
556 * at the given 'verbosity' level. */
558 ofp_print_flow_mod(struct ds *string, const void *oh, size_t len,
561 const struct ofp_flow_mod *ofm = oh;
563 ofp_print_match(string, &ofm->match, verbosity);
564 ds_put_format(string, " cmd:%d idle:%d hard:%d pri:%d buf:%#x",
565 ntohs(ofm->command), ntohs(ofm->idle_timeout),
566 ntohs(ofm->hard_timeout),
567 ofm->match.wildcards ? ntohs(ofm->priority) : (uint16_t)-1,
568 ntohl(ofm->buffer_id));
569 ofp_print_actions(string, ofm->actions,
570 len - offsetof(struct ofp_flow_mod, actions));
571 ds_put_char(string, '\n');
574 /* Pretty-print the OFPT_FLOW_EXPIRED packet of 'len' bytes at 'oh' to 'string'
575 * at the given 'verbosity' level. */
577 ofp_print_flow_expired(struct ds *string, const void *oh, size_t len,
580 const struct ofp_flow_expired *ofe = oh;
582 ofp_print_match(string, &ofe->match, verbosity);
583 ds_put_cstr(string, " reason=");
584 switch (ofe->reason) {
585 case OFPER_IDLE_TIMEOUT:
586 ds_put_cstr(string, "idle");
588 case OFPER_HARD_TIMEOUT:
589 ds_put_cstr(string, "hard");
592 ds_put_format(string, "**%"PRIu8"**", ofe->reason);
595 ds_put_format(string,
596 " pri%"PRIu16" secs%"PRIu32" pkts%"PRIu64" bytes%"PRIu64"\n",
597 ofe->match.wildcards ? ntohs(ofe->priority) : (uint16_t)-1,
598 ntohl(ofe->duration), ntohll(ofe->packet_count),
599 ntohll(ofe->byte_count));
602 /* Pretty-print the OFPT_ERROR_MSG packet of 'len' bytes at 'oh' to 'string'
603 * at the given 'verbosity' level. */
605 ofp_print_error_msg(struct ds *string, const void *oh, size_t len,
608 const struct ofp_error_msg *oem = oh;
610 ds_put_format(string,
611 " type%d code%d\n", ntohs(oem->type), ntohs(oem->code));
614 /* Pretty-print the OFPT_PORT_STATUS packet of 'len' bytes at 'oh' to 'string'
615 * at the given 'verbosity' level. */
617 ofp_print_port_status(struct ds *string, const void *oh, size_t len,
620 const struct ofp_port_status *ops = oh;
622 if (ops->reason == OFPPR_ADD) {
623 ds_put_format(string, "add:");
624 } else if (ops->reason == OFPPR_DELETE) {
625 ds_put_format(string, "del:");
626 } else if (ops->reason == OFPPR_MOD) {
627 ds_put_format(string, "mod:");
629 ds_put_format(string, "err:");
632 ofp_print_phy_port(string, &ops->desc);
636 ofp_version_stats_reply(struct ds *string, const void *body, size_t len,
639 const struct ofp_version_stats *vs = body;
641 ds_put_format(string, "Manufacturer: %s\n", vs->mfr_desc);
642 ds_put_format(string, "Hardware: %s\n", vs->hw_desc);
643 ds_put_format(string, "Software: %s\n", vs->sw_desc);
647 ofp_flow_stats_request(struct ds *string, const void *oh, size_t len,
650 const struct ofp_flow_stats_request *fsr = oh;
652 if (fsr->table_id == 0xff) {
653 ds_put_format(string, " table_id=any, ");
655 ds_put_format(string, " table_id=%"PRIu8", ", fsr->table_id);
658 ofp_print_match(string, &fsr->match, verbosity);
662 ofp_flow_stats_reply(struct ds *string, const void *body_, size_t len,
665 const char *body = body_;
666 const char *pos = body;
668 const struct ofp_flow_stats *fs;
669 ptrdiff_t bytes_left = body + len - pos;
672 if (bytes_left < sizeof *fs) {
673 if (bytes_left != 0) {
674 ds_put_format(string, " ***%td leftover bytes at end***",
680 fs = (const void *) pos;
681 length = ntohs(fs->length);
682 if (length < sizeof *fs) {
683 ds_put_format(string, " ***length=%zu shorter than minimum %zu***",
686 } else if (length > bytes_left) {
687 ds_put_format(string,
688 " ***length=%zu but only %td bytes left***",
691 } else if ((length - sizeof *fs) % sizeof fs->actions[0]) {
692 ds_put_format(string,
693 " ***length=%zu has %zu bytes leftover in "
696 (length - sizeof *fs) % sizeof fs->actions[0]);
700 ds_put_format(string, " duration=%"PRIu32"s, ", ntohl(fs->duration));
701 ds_put_format(string, "table_id=%"PRIu8", ", fs->table_id);
702 ds_put_format(string, "priority=%"PRIu16", ",
703 fs->match.wildcards ? ntohs(fs->priority) : (uint16_t)-1);
704 ds_put_format(string, "n_packets=%"PRIu64", ",
705 ntohll(fs->packet_count));
706 ds_put_format(string, "n_bytes=%"PRIu64", ", ntohll(fs->byte_count));
707 ds_put_format(string, "idle_timeout=%"PRIu16",",
708 ntohs(fs->idle_timeout));
709 ds_put_format(string, "hard_timeout=%"PRIu16",",
710 ntohs(fs->hard_timeout));
711 ofp_print_match(string, &fs->match, verbosity);
712 ofp_print_actions(string, fs->actions, length - sizeof *fs);
713 ds_put_char(string, '\n');
720 ofp_aggregate_stats_request(struct ds *string, const void *oh, size_t len,
723 const struct ofp_aggregate_stats_request *asr = oh;
725 if (asr->table_id == 0xff) {
726 ds_put_format(string, " table_id=any, ");
728 ds_put_format(string, " table_id=%"PRIu8", ", asr->table_id);
731 ofp_print_match(string, &asr->match, verbosity);
735 ofp_aggregate_stats_reply(struct ds *string, const void *body_, size_t len,
738 const struct ofp_aggregate_stats_reply *asr = body_;
740 ds_put_format(string, " packet_count=%"PRIu64, ntohll(asr->packet_count));
741 ds_put_format(string, " byte_count=%"PRIu64, ntohll(asr->byte_count));
742 ds_put_format(string, " flow_count=%"PRIu32, ntohl(asr->flow_count));
745 static void print_port_stat(struct ds *string, const char *leader,
746 uint64_t stat, int more)
748 ds_put_cstr(string, leader);
750 ds_put_format(string, "%"PRIu64, stat);
752 ds_put_char(string, '?');
755 ds_put_cstr(string, ", ");
757 ds_put_cstr(string, "\n");
762 ofp_port_stats_reply(struct ds *string, const void *body, size_t len,
765 const struct ofp_port_stats *ps = body;
766 size_t n = len / sizeof *ps;
767 ds_put_format(string, " %zu ports\n", n);
773 ds_put_format(string, " port %2"PRIu16": ", ntohs(ps->port_no));
775 ds_put_cstr(string, "rx ");
776 print_port_stat(string, "pkts=", ntohll(ps->rx_packets), 1);
777 print_port_stat(string, "bytes=", ntohll(ps->rx_bytes), 1);
778 print_port_stat(string, "drop=", ntohll(ps->rx_dropped), 1);
779 print_port_stat(string, "errs=", ntohll(ps->rx_errors), 1);
780 print_port_stat(string, "frame=", ntohll(ps->rx_frame_err), 1);
781 print_port_stat(string, "over=", ntohll(ps->rx_over_err), 1);
782 print_port_stat(string, "crc=", ntohll(ps->rx_crc_err), 0);
784 ds_put_cstr(string, " tx ");
785 print_port_stat(string, "pkts=", ntohll(ps->tx_packets), 1);
786 print_port_stat(string, "bytes=", ntohll(ps->tx_bytes), 1);
787 print_port_stat(string, "drop=", ntohll(ps->tx_dropped), 1);
788 print_port_stat(string, "errs=", ntohll(ps->tx_errors), 1);
789 print_port_stat(string, "coll=", ntohll(ps->collisions), 0);
794 ofp_table_stats_reply(struct ds *string, const void *body, size_t len,
797 const struct ofp_table_stats *ts = body;
798 size_t n = len / sizeof *ts;
799 ds_put_format(string, " %zu tables\n", n);
805 char name[OFP_MAX_TABLE_NAME_LEN + 1];
806 strncpy(name, ts->name, sizeof name);
807 name[OFP_MAX_TABLE_NAME_LEN] = '\0';
809 ds_put_format(string, " table %"PRIu8": ", ts->table_id);
810 ds_put_format(string, "name %-8s, ", name);
811 ds_put_format(string, "max %6"PRIu32", ", ntohl(ts->max_entries));
812 ds_put_format(string, "active %6"PRIu32", ", ntohl(ts->active_count));
813 ds_put_format(string, "matched %6"PRIu64"\n",
814 ntohll(ts->matched_count));
819 switch_status_reply(struct ds *string, const void *body, size_t len,
820 int verbosity UNUSED)
822 char *save_ptr = NULL;
825 s = xmemdup0(body, len);
826 for (line = strtok_r(s, "\n\n", &save_ptr); line != NULL;
827 line = strtok_r(NULL, "\n\n", &save_ptr)) {
828 ds_put_printable(string, line, strlen(line));
829 ds_put_char(string, '\n');
834 enum stats_direction {
840 print_stats(struct ds *string, int type, const void *body, size_t body_len,
841 int verbosity, enum stats_direction direction)
844 size_t min_body, max_body;
845 void (*printer)(struct ds *, const void *, size_t len, int verbosity);
850 struct stats_msg request;
851 struct stats_msg reply;
854 static const struct stats_type stats_types[] = {
858 { 0, SIZE_MAX, ofp_version_stats_reply },
862 { sizeof(struct ofp_flow_stats_request),
863 sizeof(struct ofp_flow_stats_request),
864 ofp_flow_stats_request },
865 { 0, SIZE_MAX, ofp_flow_stats_reply },
867 [OFPST_AGGREGATE] = {
869 { sizeof(struct ofp_aggregate_stats_request),
870 sizeof(struct ofp_aggregate_stats_request),
871 ofp_aggregate_stats_request },
872 { sizeof(struct ofp_aggregate_stats_reply),
873 sizeof(struct ofp_aggregate_stats_reply),
874 ofp_aggregate_stats_reply },
879 { 0, SIZE_MAX, ofp_table_stats_reply },
884 { 0, SIZE_MAX, ofp_port_stats_reply },
889 { 0, SIZE_MAX, switch_status_reply },
893 const struct stats_type *s;
894 const struct stats_msg *m;
896 if (type >= ARRAY_SIZE(stats_types) || !stats_types[type].name) {
897 ds_put_format(string, " ***unknown type %d***", type);
900 s = &stats_types[type];
901 ds_put_format(string, " type=%d(%s)\n", type, s->name);
903 m = direction == REQUEST ? &s->request : &s->reply;
904 if (body_len < m->min_body || body_len > m->max_body) {
905 ds_put_format(string, " ***body_len=%zu not in %zu...%zu***",
906 body_len, m->min_body, m->max_body);
910 m->printer(string, body, body_len, verbosity);
915 ofp_stats_request(struct ds *string, const void *oh, size_t len, int verbosity)
917 const struct ofp_stats_request *srq = oh;
920 ds_put_format(string, " ***unknown flags 0x%04"PRIx16"***",
924 print_stats(string, ntohs(srq->type), srq->body,
925 len - offsetof(struct ofp_stats_request, body),
930 ofp_stats_reply(struct ds *string, const void *oh, size_t len, int verbosity)
932 const struct ofp_stats_reply *srp = oh;
934 ds_put_cstr(string, " flags=");
936 ds_put_cstr(string, "none");
938 uint16_t flags = ntohs(srp->flags);
939 if (flags & OFPSF_REPLY_MORE) {
940 ds_put_cstr(string, "[more]");
941 flags &= ~OFPSF_REPLY_MORE;
944 ds_put_format(string, "[***unknown flags 0x%04"PRIx16"***]", flags);
948 print_stats(string, ntohs(srp->type), srp->body,
949 len - offsetof(struct ofp_stats_reply, body),
954 ofp_echo(struct ds *string, const void *oh, size_t len, int verbosity)
956 const struct ofp_header *hdr = oh;
958 ds_put_format(string, " %zu bytes of payload\n", len - sizeof *hdr);
960 ds_put_hex_dump(string, hdr, len - sizeof *hdr, 0, true);
964 struct openflow_packet {
967 void (*printer)(struct ds *, const void *, size_t len, int verbosity);
970 static const struct openflow_packet packets[] = {
971 [OFPT_FEATURES_REQUEST] = {
973 sizeof (struct ofp_header),
976 [OFPT_FEATURES_REPLY] = {
978 sizeof (struct ofp_switch_features),
979 ofp_print_switch_features,
981 [OFPT_GET_CONFIG_REQUEST] = {
982 "get_config_request",
983 sizeof (struct ofp_header),
986 [OFPT_GET_CONFIG_REPLY] = {
988 sizeof (struct ofp_switch_config),
989 ofp_print_switch_config,
991 [OFPT_SET_CONFIG] = {
993 sizeof (struct ofp_switch_config),
994 ofp_print_switch_config,
998 offsetof(struct ofp_packet_in, data),
1001 [OFPT_PACKET_OUT] = {
1003 sizeof (struct ofp_packet_out),
1008 sizeof (struct ofp_flow_mod),
1011 [OFPT_FLOW_EXPIRED] = {
1013 sizeof (struct ofp_flow_expired),
1014 ofp_print_flow_expired,
1018 sizeof (struct ofp_port_mod),
1021 [OFPT_PORT_STATUS] = {
1023 sizeof (struct ofp_port_status),
1024 ofp_print_port_status
1026 [OFPT_ERROR_MSG] = {
1028 sizeof (struct ofp_error_msg),
1029 ofp_print_error_msg,
1031 [OFPT_STATS_REQUEST] = {
1033 sizeof (struct ofp_stats_request),
1036 [OFPT_STATS_REPLY] = {
1038 sizeof (struct ofp_stats_reply),
1041 [OFPT_ECHO_REQUEST] = {
1043 sizeof (struct ofp_header),
1046 [OFPT_ECHO_REPLY] = {
1048 sizeof (struct ofp_header),
1053 /* Composes and returns a string representing the OpenFlow packet of 'len'
1054 * bytes at 'oh' at the given 'verbosity' level. 0 is a minimal amount of
1055 * verbosity and higher numbers increase verbosity. The caller is responsible
1056 * for freeing the string. */
1058 ofp_to_string(const void *oh_, size_t len, int verbosity)
1060 struct ds string = DS_EMPTY_INITIALIZER;
1061 const struct ofp_header *oh = oh_;
1062 const struct openflow_packet *pkt;
1064 if (len < sizeof(struct ofp_header)) {
1065 ds_put_cstr(&string, "OpenFlow packet too short:\n");
1066 ds_put_hex_dump(&string, oh, len, 0, true);
1067 return ds_cstr(&string);
1068 } else if (oh->version != OFP_VERSION) {
1069 ds_put_format(&string, "Bad OpenFlow version %"PRIu8":\n", oh->version);
1070 ds_put_hex_dump(&string, oh, len, 0, true);
1071 return ds_cstr(&string);
1072 } else if (oh->type >= ARRAY_SIZE(packets) || !packets[oh->type].name) {
1073 ds_put_format(&string, "Unknown OpenFlow packet type %"PRIu8":\n",
1075 ds_put_hex_dump(&string, oh, len, 0, true);
1076 return ds_cstr(&string);
1079 pkt = &packets[oh->type];
1080 ds_put_format(&string, "%s (xid=0x%"PRIx32"):", pkt->name, oh->xid);
1082 if (ntohs(oh->length) > len)
1083 ds_put_format(&string, " (***truncated to %zu bytes from %"PRIu16"***)",
1084 len, ntohs(oh->length));
1085 else if (ntohs(oh->length) < len) {
1086 ds_put_format(&string, " (***only uses %"PRIu16" bytes out of %zu***)\n",
1087 ntohs(oh->length), len);
1088 len = ntohs(oh->length);
1091 if (len < pkt->min_size) {
1092 ds_put_format(&string, " (***length=%zu < min_size=%zu***)\n",
1093 len, pkt->min_size);
1094 } else if (!pkt->printer) {
1095 if (len > sizeof *oh) {
1096 ds_put_format(&string, " length=%"PRIu16" (decoder not implemented)\n",
1100 pkt->printer(&string, oh, len, verbosity);
1102 if (verbosity >= 3) {
1103 ds_put_hex_dump(&string, oh, len, 0, true);
1105 if (string.string[string.length - 1] != '\n') {
1106 ds_put_char(&string, '\n');
1108 return ds_cstr(&string);
1112 print_and_free(FILE *stream, char *string)
1114 fputs(string, stream);
1118 /* Pretty-print the OpenFlow packet of 'len' bytes at 'oh' to 'stream' at the
1119 * given 'verbosity' level. 0 is a minimal amount of verbosity and higher
1120 * numbers increase verbosity. */
1122 ofp_print(FILE *stream, const void *oh, size_t len, int verbosity)
1124 print_and_free(stream, ofp_to_string(oh, len, verbosity));
1127 /* Dumps the contents of the Ethernet frame in the 'len' bytes starting at
1128 * 'data' to 'stream' using tcpdump. 'total_len' specifies the full length of
1129 * the Ethernet frame (of which 'len' bytes were captured).
1131 * This starts and kills a tcpdump subprocess so it's quite expensive. */
1133 ofp_print_packet(FILE *stream, const void *data, size_t len, size_t total_len)
1135 print_and_free(stream, ofp_packet_to_string(data, len, total_len));