]> The Tcpdump Group git mirrors - tcpdump/blobdiff - print-openflow-1.3.c
OpenFlow: Have a function for each message type.
[tcpdump] / print-openflow-1.3.c
index 93f6383cbca88650032644747e30bc2bc6c566a2..08fe7ca4e602d51c8e5889c2b6643afaf5f49800 100644 (file)
@@ -140,6 +140,14 @@ static const struct tok ofp_config_str[] = {
        { 0, NULL }
 };
 
+#define OFPTT_MAX 0xfeU
+#define OFPTT_ALL 0xffU
+static const struct tok ofptt_str[] = {
+       { OFPTT_MAX, "MAX" },
+       { OFPTT_ALL, "ALL" },
+       { 0, NULL },
+};
+
 #define OFPCML_MAX       0xffe5U
 #define OFPCML_NO_BUFFER 0xffffU
 static const struct tok ofpcml_str[] = {
@@ -162,6 +170,17 @@ static const struct tok ofppc_bm[] = {
 #define OFPPC_U (~(OFPPC_PORT_DOWN | OFPPC_NO_RECV | OFPPC_NO_FWD | \
                    OFPPC_NO_PACKET_IN))
 
+#define OFPPS_LINK_DOWN   (1U << 0)
+#define OFPPS_BLOCKED     (1U << 1)
+#define OFPPS_LIVE        (1U << 2)
+static const struct tok ofpps_bm[] = {
+       { OFPPS_LINK_DOWN, "LINK_DOWN" },
+       { OFPPS_BLOCKED,   "BLOCKED"   },
+       { OFPPS_LIVE,      "LIVE"      },
+       { 0, NULL }
+};
+#define OFPPS_U (~(OFPPS_LINK_DOWN | OFPPS_BLOCKED | OFPPS_LIVE))
+
 #define OFPPF_10MB_HD    (1U <<  0)
 #define OFPPF_10MB_FD    (1U <<  1)
 #define OFPPF_100MB_HD   (1U <<  2)
@@ -231,6 +250,18 @@ static const struct tok ofpp_str[] = {
        { 0, NULL }
 };
 
+#define OFPCR_ROLE_NOCHANGE 0U
+#define OFPCR_ROLE_EQUAL    1U
+#define OFPCR_ROLE_MASTER   2U
+#define OFPCR_ROLE_SLAVE    3U
+static const struct tok ofpcr_str[] = {
+       { OFPCR_ROLE_NOCHANGE, "NOCHANGE" },
+       { OFPCR_ROLE_EQUAL,    "EQUAL"    },
+       { OFPCR_ROLE_MASTER,   "MASTER"   },
+       { OFPCR_ROLE_SLAVE,    "SLAVE"    },
+       { 0, NULL }
+};
+
 #define OF_BIT_VER_1_0 (1U << (OF_VER_1_0 - 1))
 #define OF_BIT_VER_1_1 (1U << (OF_VER_1_1 - 1))
 #define OF_BIT_VER_1_2 (1U << (OF_VER_1_2 - 1))
@@ -249,6 +280,52 @@ static const struct tok ofverbm_str[] = {
 #define OF_BIT_VER_U (~(OF_BIT_VER_1_0 | OF_BIT_VER_1_1 | OF_BIT_VER_1_2 | \
                         OF_BIT_VER_1_3 | OF_BIT_VER_1_4 | OF_BIT_VER_1_5))
 
+#define OFPR_NO_MATCH    0U
+#define OFPR_ACTION      1U
+#define OFPR_INVALID_TTL 2U
+#if 0 /* for OFPT_PACKET_IN */
+static const struct tok ofpr_str[] = {
+       { OFPR_NO_MATCH,    "NO_MATCH"         },
+       { OFPR_ACTION,      "ACTION"           },
+       { OFPR_INVALID_TTL, "OFPR_INVALID_TTL" },
+       { 0, NULL }
+};
+#endif
+
+#define ASYNC_OFPR_NO_MATCH    (1U << OFPR_NO_MATCH   )
+#define ASYNC_OFPR_ACTION      (1U << OFPR_ACTION     )
+#define ASYNC_OFPR_INVALID_TTL (1U << OFPR_INVALID_TTL)
+static const struct tok async_ofpr_bm[] = {
+       { ASYNC_OFPR_NO_MATCH,    "NO_MATCH"    },
+       { ASYNC_OFPR_ACTION,      "ACTION"      },
+       { ASYNC_OFPR_INVALID_TTL, "INVALID_TTL" },
+       { 0, NULL }
+};
+#define ASYNC_OFPR_U (~(ASYNC_OFPR_NO_MATCH | ASYNC_OFPR_ACTION | \
+                        ASYNC_OFPR_INVALID_TTL))
+
+#define OFPPR_ADD    0U
+#define OFPPR_DELETE 1U
+#define OFPPR_MODIFY 2U
+static const struct tok ofppr_str[] = {
+       { OFPPR_ADD,    "ADD"    },
+       { OFPPR_DELETE, "DELETE" },
+       { OFPPR_MODIFY, "MODIFY" },
+       { 0, NULL }
+};
+
+#define ASYNC_OFPPR_ADD    (1U << OFPPR_ADD   )
+#define ASYNC_OFPPR_DELETE (1U << OFPPR_DELETE)
+#define ASYNC_OFPPR_MODIFY (1U << OFPPR_MODIFY)
+static const struct tok async_ofppr_bm[] = {
+       { ASYNC_OFPPR_ADD,    "ADD"    },
+       { ASYNC_OFPPR_DELETE, "DELETE" },
+       { ASYNC_OFPPR_MODIFY, "MODIFY" },
+       { 0, NULL }
+};
+#define ASYNC_OFPPR_U (~(ASYNC_OFPPR_ADD | ASYNC_OFPPR_DELETE | \
+                         ASYNC_OFPPR_MODIFY))
+
 #define OFPET_HELLO_FAILED           0U
 #define OFPET_BAD_REQUEST            1U
 #define OFPET_BAD_ACTION             2U
@@ -586,9 +663,16 @@ static const struct uint_tokary of13_ofpet2tokary[] = {
 #define OF_FEATURES_REPLY_FIXLEN              32U
 #define OF_PORT_MOD_FIXLEN                    40U
 #define OF_SWITCH_CONFIG_MSG_FIXLEN           12U
+#define OF_TABLE_MOD_FIXLEN                   16U
 #define OF_QUEUE_GET_CONFIG_REQUEST_FIXLEN    16U
+#define OF_ROLE_MSG_FIXLEN                    24U
+#define OF_ASYNC_MSG_FIXLEN                   32U
+#define OF_PORT_STATUS_FIXLEN                 80U
 #define OF_EXPERIMENTER_MSG_MINLEN            16U
 
+/* miscellaneous constants from [OF13] */
+#define OFP_MAX_PORT_NAME_LEN                 16U
+
 /* [OF13] Section A.1 */
 const char *
 of13_msgtype_str(const uint8_t type)
@@ -596,29 +680,87 @@ of13_msgtype_str(const uint8_t type)
        return tok2str(ofpt_str, "invalid (0x%02x)", type);
 }
 
+/* [OF13] Section 7.2.1 */
+static void
+of13_port_print(netdissect_options *ndo,
+                const u_char *cp)
+{
+       /* port_no */
+       ND_PRINT("\n\t  port_no %s",
+                tok2str(ofpp_str, "%u", GET_BE_U_4(cp)));
+       cp += 4;
+       /* pad */
+       cp += 4;
+       /* hw_addr */
+       ND_PRINT(", hw_addr %s", GET_ETHERADDR_STRING(cp));
+       cp += MAC_ADDR_LEN;
+       /* pad2 */
+       cp += 2;
+       /* name */
+       ND_PRINT(", name '");
+       (void)nd_print(ndo, cp, cp + OFP_MAX_PORT_NAME_LEN);
+       ND_PRINT("'");
+       cp += OFP_MAX_PORT_NAME_LEN;
+
+       if (ndo->ndo_vflag < 2) {
+               ND_TCHECK_LEN(cp, 32);
+               return;
+       }
+
+       /* config */
+       ND_PRINT("\n\t   config 0x%08x", GET_BE_U_4(cp));
+       of_bitmap_print(ndo, ofppc_bm, GET_BE_U_4(cp), OFPPC_U);
+       cp += 4;
+       /* state */
+       ND_PRINT("\n\t   state 0x%08x", GET_BE_U_4(cp));
+       of_bitmap_print(ndo, ofpps_bm, GET_BE_U_4(cp), OFPPS_U);;
+       cp += 4;
+       /* curr */
+       ND_PRINT("\n\t   curr 0x%08x", GET_BE_U_4(cp));
+       of_bitmap_print(ndo, ofppf_bm, GET_BE_U_4(cp), OFPPF_U);
+       cp += 4;
+       /* advertised */
+       ND_PRINT("\n\t   advertised 0x%08x", GET_BE_U_4(cp));
+       of_bitmap_print(ndo, ofppf_bm, GET_BE_U_4(cp), OFPPF_U);
+       cp += 4;
+       /* supported */
+       ND_PRINT("\n\t   supported 0x%08x", GET_BE_U_4(cp));
+       of_bitmap_print(ndo, ofppf_bm, GET_BE_U_4(cp), OFPPF_U);
+       cp += 4;
+       /* peer */
+       ND_PRINT("\n\t   peer 0x%08x", GET_BE_U_4(cp));
+       of_bitmap_print(ndo, ofppf_bm, GET_BE_U_4(cp), OFPPF_U);
+       cp += 4;
+       /* curr_speed */
+       ND_PRINT("\n\t   curr_speed %ukbps", GET_BE_U_4(cp));
+       cp += 4;
+       /* max_speed */
+       ND_PRINT("\n\t   max_speed %ukbps", GET_BE_U_4(cp));
+}
+
 /* [OF13] Section 7.3.1 */
 static void
 of13_features_reply_print(netdissect_options *ndo,
-                          const u_char *cp, u_int len)
+                          const u_char *cp)
 {
        /* datapath_id */
        ND_PRINT("\n\t dpid 0x%016" PRIx64, GET_BE_U_8(cp));
-       OF_FWD(8);
+       cp += 8;
        /* n_buffers */
        ND_PRINT(", n_buffers %u", GET_BE_U_4(cp));
-       OF_FWD(4);
+       cp += 4;
        /* n_tables */
        ND_PRINT(", n_tables %u", GET_U_1(cp));
-       OF_FWD(1);
+       cp += 1;
        /* auxiliary_id */
        ND_PRINT(", auxiliary_id %u", GET_U_1(cp));
-       OF_FWD(1);
+       cp += 1;
        /* pad */
-       OF_FWD(2);
+       cp += 2;
        /* capabilities */
        ND_PRINT("\n\t capabilities 0x%08x", GET_BE_U_4(cp));
        of_bitmap_print(ndo, ofp_capabilities_bm, GET_BE_U_4(cp), OFPCAP_U);
-       OF_FWD(4);
+       cp += 4;
        /* reserved */
        ND_TCHECK_4(cp);
 }
@@ -626,49 +768,123 @@ of13_features_reply_print(netdissect_options *ndo,
 /* [OF13] Section 7.3.2 */
 static void
 of13_switch_config_msg_print(netdissect_options *ndo,
-                         const u_char *cp, u_int len)
+                             const u_char *cp)
 {
        /* flags */
        ND_PRINT("\n\t flags %s",
                 tok2str(ofp_config_str, "invalid (0x%04x)", GET_BE_U_2(cp)));
-       OF_FWD(2);
+       cp += 2;
        /* miss_send_len */
        ND_PRINT(", miss_send_len %s",
                 tok2str(ofpcml_str, "%u", GET_BE_U_2(cp)));
 }
 
+/* [OF13] Section 7.3.3 */
+static void
+of13_table_mod_print(netdissect_options *ndo,
+                     const u_char *cp)
+{
+       /* table_id */
+       ND_PRINT("\n\t table_id %s", tok2str(ofptt_str, "%u", GET_U_1(cp)));
+       cp += 1;
+       /* pad */
+       cp += 3;
+       /* config */
+       ND_PRINT(", config 0x%08x", GET_BE_U_4(cp));
+}
+
+/* [OF13] Section 7.3.9 */
+static void
+of13_role_msg_print(netdissect_options *ndo,
+                    const u_char *cp)
+{
+       /* role */
+       ND_PRINT("\n\t role %s",
+                tok2str(ofpcr_str, "invalid (0x%08x)", GET_BE_U_4(cp)));
+       cp += 4;
+       /* pad */
+       cp += 4;
+       /* generation_id */
+       ND_PRINT(", generation_id 0x%016" PRIx64, GET_BE_U_8(cp));
+}
+
+/* [OF13] Section 7.3.10 */
+static void
+of13_async_msg_print(netdissect_options *ndo,
+                    const u_char *cp)
+{
+       /* packet_in_mask[0] */
+       ND_PRINT("\n\t packet_in_mask[EM] 0x%08x", GET_BE_U_4(cp));
+       of_bitmap_print(ndo, async_ofpr_bm, GET_BE_U_4(cp), ASYNC_OFPR_U);
+       cp += 4;
+       /* packet_in_mask[1] */
+       ND_PRINT("\n\t packet_in_mask[S] 0x%08x", GET_BE_U_4(cp));
+       of_bitmap_print(ndo, async_ofpr_bm, GET_BE_U_4(cp), ASYNC_OFPR_U);
+       cp += 4;
+       /* port_status_mask[0] */
+       ND_PRINT("\n\t port_status_mask[EM] 0x%08x", GET_BE_U_4(cp));
+       of_bitmap_print(ndo, async_ofppr_bm, GET_BE_U_4(cp), ASYNC_OFPPR_U);
+       cp += 4;
+       /* port_status_mask[1] */
+       ND_PRINT("\n\t port_status_mask[S] 0x%08x", GET_BE_U_4(cp));
+       of_bitmap_print(ndo, async_ofppr_bm, GET_BE_U_4(cp), ASYNC_OFPPR_U);
+       cp += 4;
+       /* flow_removed_mask[0] */
+       ND_PRINT("\n\t flow_removed_mask[EM] 0x%08x", GET_BE_U_4(cp));
+       of_bitmap_print(ndo, async_ofppr_bm, GET_BE_U_4(cp), ASYNC_OFPPR_U);
+       cp += 4;
+       /* flow_removed_mask[1] */
+       ND_PRINT("\n\t flow_removed_mask[S] 0x%08x", GET_BE_U_4(cp));
+       of_bitmap_print(ndo, async_ofppr_bm, GET_BE_U_4(cp), ASYNC_OFPPR_U);
+}
+
 /* [OF13] Section 7.3.4.3 */
 static void
 of13_port_mod_print(netdissect_options *ndo,
-                    const u_char *cp, u_int len)
+                    const u_char *cp)
 {
        /* port_no */
        ND_PRINT("\n\t port_no %s", tok2str(ofpp_str, "%u", GET_BE_U_4(cp)));
-       OF_FWD(4);
+       cp += 4;
        /* pad */
-       OF_FWD(4);
+       cp += 4;
        /* hw_addr */
        ND_PRINT(", hw_addr %s", GET_ETHERADDR_STRING(cp));
-       OF_FWD(MAC_ADDR_LEN);
+       cp += MAC_ADDR_LEN;
        /* pad2 */
-       OF_FWD(2);
+       cp += 2;
        /* config */
        ND_PRINT("\n\t  config 0x%08x", GET_BE_U_4(cp));
        of_bitmap_print(ndo, ofppc_bm, GET_BE_U_4(cp), OFPPC_U);
-       OF_FWD(4);
+       cp += 4;
        /* mask */
        ND_PRINT("\n\t  mask 0x%08x", GET_BE_U_4(cp));
        of_bitmap_print(ndo, ofppc_bm, GET_BE_U_4(cp), OFPPC_U);
-       OF_FWD(4);
+       cp += 4;
        /* advertise */
        ND_PRINT("\n\t  advertise 0x%08x", GET_BE_U_4(cp));
        of_bitmap_print(ndo, ofppf_bm, GET_BE_U_4(cp), OFPPF_U);
-       OF_FWD(4);
+       cp += 4;
        /* pad3 */
        /* Always the last field, check bounds. */
        ND_TCHECK_4(cp);
 }
 
+/* [OF13] Section 7.4.3 */
+static void
+of13_port_status_print(netdissect_options *ndo,
+                       const u_char *cp)
+{
+       /* reason */
+       ND_PRINT("\n\t reason %s",
+                tok2str(ofppr_str, "invalid (0x02x)", GET_U_1(cp)));
+       cp += 1;
+       /* pad */
+       cp += 7;
+       /* desc */
+       of13_port_print(ndo, cp);
+}
+
 /* [OF13] Section 7.5.1 */
 static void
 of13_hello_elements_print(netdissect_options *ndo,
@@ -742,6 +958,19 @@ of13_experimenter_message_print(netdissect_options *ndo,
        of_data_print(ndo, cp, len);
 }
 
+/* [OF13] Section A.3.6 */
+static void
+of13_queue_get_config_request_print(netdissect_options *ndo,
+                                    const u_char *cp)
+{
+       /* port */
+       ND_PRINT("\n\t port %s", tok2str(ofpp_str, "%u", GET_BE_U_4(cp)));
+       cp += 4;
+       /* pad */
+       /* Always the last field, check bounds. */
+       ND_TCHECK_4(cp);
+}
+
 /* [OF13] Section A.4.4 */
 static void
 of13_error_print(netdissect_options *ndo,
@@ -789,20 +1018,14 @@ of13_message_print(netdissect_options *ndo,
                        goto invalid;
                if (ndo->ndo_vflag < 1)
                        break;
-               of13_features_reply_print(ndo, cp, len);
+               of13_features_reply_print(ndo, cp);
                return;
        case OFPT_QUEUE_GET_CONFIG_REQUEST: /* [OF13] Section A.3.6 */
                if (len != OF_QUEUE_GET_CONFIG_REQUEST_FIXLEN - OF_HEADER_FIXLEN)
                        goto invalid;
                if (ndo->ndo_vflag < 1)
                        break;
-               /* port */
-               ND_PRINT("\n\t port %s",
-                        tok2str(ofpp_str, "%u", GET_BE_U_4(cp)));
-               OF_FWD(4);
-               /* pad */
-               /* Always the last field, check bounds. */
-               ND_TCHECK_4(cp);
+               of13_queue_get_config_request_print(ndo, cp);
                return;
        case OFPT_GET_CONFIG_REPLY: /* [OF13] Section 7.3.2 */
        case OFPT_SET_CONFIG: /* ibid */
@@ -810,14 +1033,44 @@ of13_message_print(netdissect_options *ndo,
                        goto invalid;
                if (ndo->ndo_vflag < 1)
                        break;
-               of13_switch_config_msg_print(ndo, cp, len);
+               of13_switch_config_msg_print(ndo, cp);
                return;
        case OFPT_PORT_MOD: /* [OF13] Section 7.3.4.3 */
                if (len != OF_PORT_MOD_FIXLEN - OF_HEADER_FIXLEN)
                        goto invalid;
                if (ndo->ndo_vflag < 1)
                        break;
-               of13_port_mod_print(ndo, cp, len);
+               of13_port_mod_print(ndo, cp);
+               return;
+       case OFPT_ROLE_REQUEST: /* [OF13] Section 7.3.9 */
+       case OFPT_ROLE_REPLY: /* ibid */
+               if (len != OF_ROLE_MSG_FIXLEN - OF_HEADER_FIXLEN)
+                       goto invalid;
+               if (ndo->ndo_vflag < 1)
+                       break;
+               of13_role_msg_print(ndo, cp);
+               return;
+       case OFPT_PORT_STATUS: /* [OF13] Section 7.4.3 */
+               if (len != OF_PORT_STATUS_FIXLEN - OF_HEADER_FIXLEN)
+                       goto invalid;
+               if (ndo->ndo_vflag < 1)
+                       break;
+               of13_port_status_print(ndo, cp);
+               return;
+       case OFPT_TABLE_MOD: /* [OF13] Section 7.3.3 */
+               if (len != OF_TABLE_MOD_FIXLEN - OF_HEADER_FIXLEN)
+                       goto invalid;
+               if (ndo->ndo_vflag < 1)
+                       break;
+               of13_table_mod_print(ndo, cp);
+               return;
+       case OFPT_SET_ASYNC: /* [OF13] Section 7.3.10 */
+       case OFPT_GET_ASYNC_REPLY: /* ibid */
+               if (len != OF_ASYNC_MSG_FIXLEN - OF_HEADER_FIXLEN)
+                       goto invalid;
+               if (ndo->ndo_vflag < 1)
+                       break;
+               of13_async_msg_print(ndo, cp);
                return;
 
        /* OpenFlow header and variable-size data. */