Dan Talayco | b66b112 | 2010-02-10 22:38:49 -0800 | [diff] [blame] | 1 | """ |
| 2 | OpenFlow message parsing functions |
| 3 | """ |
| 4 | |
| 5 | import sys |
Dan Talayco | 235d7cb | 2010-03-12 10:03:18 -0800 | [diff] [blame] | 6 | import logging |
Dan Talayco | f75360a | 2010-02-05 22:22:54 -0800 | [diff] [blame] | 7 | from message import * |
| 8 | from error import * |
| 9 | from action import * |
| 10 | from action_list import action_list |
Dan Talayco | b66b112 | 2010-02-10 22:38:49 -0800 | [diff] [blame] | 11 | from cstruct import * |
| 12 | try: |
Dan Talayco | 958f3b9 | 2010-03-12 21:58:57 -0800 | [diff] [blame^] | 13 | import scapy.all as scapy |
Dan Talayco | b66b112 | 2010-02-10 22:38:49 -0800 | [diff] [blame] | 14 | except: |
Dan Talayco | d2ca103 | 2010-03-10 14:40:26 -0800 | [diff] [blame] | 15 | try: |
Dan Talayco | 958f3b9 | 2010-03-12 21:58:57 -0800 | [diff] [blame^] | 16 | import scapy as scapy |
Dan Talayco | d2ca103 | 2010-03-10 14:40:26 -0800 | [diff] [blame] | 17 | except: |
| 18 | sys.exit("Need to install scapy for packet parsing") |
Dan Talayco | f75360a | 2010-02-05 22:22:54 -0800 | [diff] [blame] | 19 | |
| 20 | """ |
| 21 | of_message.py |
| 22 | Contains wrapper functions and classes for the of_message namespace |
| 23 | that are generated by hand. It includes the rest of the wrapper |
| 24 | function information into the of_message namespace |
| 25 | """ |
| 26 | |
Dan Talayco | 4837010 | 2010-03-03 15:17:33 -0800 | [diff] [blame] | 27 | parse_logger = logging.getLogger("parse") |
| 28 | #parse_logger.setLevel(logging.DEBUG) |
Dan Talayco | 08d9dfe | 2010-02-12 23:02:11 -0800 | [diff] [blame] | 29 | |
Dan Talayco | f75360a | 2010-02-05 22:22:54 -0800 | [diff] [blame] | 30 | # These message types are subclassed |
| 31 | msg_type_subclassed = [ |
| 32 | OFPT_STATS_REQUEST, |
| 33 | OFPT_STATS_REPLY, |
| 34 | OFPT_ERROR |
| 35 | ] |
| 36 | |
| 37 | # Maps from sub-types to classes |
| 38 | stats_reply_to_class_map = { |
| 39 | OFPST_DESC : desc_stats_reply, |
| 40 | OFPST_AGGREGATE : aggregate_stats_reply, |
| 41 | OFPST_FLOW : flow_stats_reply, |
| 42 | OFPST_TABLE : table_stats_reply, |
| 43 | OFPST_PORT : port_stats_reply, |
| 44 | OFPST_QUEUE : queue_stats_reply |
| 45 | } |
| 46 | |
| 47 | stats_request_to_class_map = { |
| 48 | OFPST_DESC : desc_stats_request, |
| 49 | OFPST_AGGREGATE : aggregate_stats_request, |
| 50 | OFPST_FLOW : flow_stats_request, |
| 51 | OFPST_TABLE : table_stats_request, |
| 52 | OFPST_PORT : port_stats_request, |
| 53 | OFPST_QUEUE : queue_stats_request |
| 54 | } |
| 55 | |
| 56 | error_to_class_map = { |
| 57 | OFPET_HELLO_FAILED : hello_failed_error_msg, |
| 58 | OFPET_BAD_REQUEST : bad_request_error_msg, |
| 59 | OFPET_BAD_ACTION : bad_action_error_msg, |
| 60 | OFPET_FLOW_MOD_FAILED : flow_mod_failed_error_msg, |
| 61 | OFPET_PORT_MOD_FAILED : port_mod_failed_error_msg, |
| 62 | OFPET_QUEUE_OP_FAILED : queue_op_failed_error_msg |
| 63 | } |
| 64 | |
| 65 | # Map from header type value to the underlieing message class |
| 66 | msg_type_to_class_map = { |
| 67 | OFPT_HELLO : hello, |
| 68 | OFPT_ERROR : error, |
| 69 | OFPT_ECHO_REQUEST : echo_request, |
| 70 | OFPT_ECHO_REPLY : echo_reply, |
| 71 | OFPT_VENDOR : vendor, |
| 72 | OFPT_FEATURES_REQUEST : features_request, |
| 73 | OFPT_FEATURES_REPLY : features_reply, |
| 74 | OFPT_GET_CONFIG_REQUEST : get_config_request, |
| 75 | OFPT_GET_CONFIG_REPLY : get_config_reply, |
| 76 | OFPT_SET_CONFIG : set_config, |
| 77 | OFPT_PACKET_IN : packet_in, |
| 78 | OFPT_FLOW_REMOVED : flow_removed, |
| 79 | OFPT_PORT_STATUS : port_status, |
| 80 | OFPT_PACKET_OUT : packet_out, |
| 81 | OFPT_FLOW_MOD : flow_mod, |
| 82 | OFPT_PORT_MOD : port_mod, |
| 83 | OFPT_STATS_REQUEST : stats_request, |
| 84 | OFPT_STATS_REPLY : stats_reply, |
| 85 | OFPT_BARRIER_REQUEST : barrier_request, |
| 86 | OFPT_BARRIER_REPLY : barrier_reply, |
| 87 | OFPT_QUEUE_GET_CONFIG_REQUEST : queue_get_config_request, |
| 88 | OFPT_QUEUE_GET_CONFIG_REPLY : queue_get_config_reply |
| 89 | } |
| 90 | |
| 91 | def _of_message_to_object(binary_string): |
| 92 | """ |
| 93 | Map a binary string to the corresponding class. |
| 94 | |
| 95 | Appropriately resolves subclasses |
| 96 | """ |
| 97 | hdr = ofp_header() |
| 98 | hdr.unpack(binary_string) |
| 99 | # FIXME: Add error detection |
| 100 | if not hdr.type in msg_type_subclassed: |
| 101 | return msg_type_to_class_map[hdr.type]() |
| 102 | if hdr.type == OFPT_STATS_REQUEST: |
Dan Talayco | b9cb548 | 2010-02-09 15:23:12 -0800 | [diff] [blame] | 103 | sub_hdr = ofp_stats_request() |
Dan Talayco | b66b112 | 2010-02-10 22:38:49 -0800 | [diff] [blame] | 104 | sub_hdr.unpack(binary_string[OFP_HEADER_BYTES:]) |
| 105 | try: |
| 106 | obj = stats_request_to_class_map[sub_hdr.type]() |
| 107 | except KeyError: |
| 108 | obj = None |
| 109 | return obj |
Dan Talayco | f75360a | 2010-02-05 22:22:54 -0800 | [diff] [blame] | 110 | elif hdr.type == OFPT_STATS_REPLY: |
Dan Talayco | b9cb548 | 2010-02-09 15:23:12 -0800 | [diff] [blame] | 111 | sub_hdr = ofp_stats_reply() |
Dan Talayco | b66b112 | 2010-02-10 22:38:49 -0800 | [diff] [blame] | 112 | sub_hdr.unpack(binary_string[OFP_HEADER_BYTES:]) |
| 113 | try: |
| 114 | obj = stats_reply_to_class_map[sub_hdr.type]() |
| 115 | except KeyError: |
| 116 | obj = None |
| 117 | return obj |
Dan Talayco | b9cb548 | 2010-02-09 15:23:12 -0800 | [diff] [blame] | 118 | elif hdr.type == OFPT_ERROR: |
| 119 | sub_hdr = ofp_error_msg() |
Dan Talayco | b66b112 | 2010-02-10 22:38:49 -0800 | [diff] [blame] | 120 | sub_hdr.unpack(binary_string[OFP_HEADER_BYTES:]) |
Dan Talayco | b9cb548 | 2010-02-09 15:23:12 -0800 | [diff] [blame] | 121 | return error_to_class_map[sub_hdr.type]() |
Dan Talayco | f75360a | 2010-02-05 22:22:54 -0800 | [diff] [blame] | 122 | else: |
Dan Talayco | 4837010 | 2010-03-03 15:17:33 -0800 | [diff] [blame] | 123 | parse_logger.error("Cannot parse pkt to message") |
Dan Talayco | f75360a | 2010-02-05 22:22:54 -0800 | [diff] [blame] | 124 | return None |
| 125 | |
| 126 | def of_message_parse(binary_string, raw=False): |
| 127 | """ |
| 128 | Parse an OpenFlow packet |
| 129 | |
| 130 | Parses a raw OpenFlow packet into a Python class, with class |
| 131 | members fully populated. |
| 132 | |
| 133 | @param binary_string The packet (string) to be parsed |
Dan Talayco | f75360a | 2010-02-05 22:22:54 -0800 | [diff] [blame] | 134 | @param raw If true, interpret the packet as an L2 packet. Not |
| 135 | yet supported. |
Dan Talayco | f75360a | 2010-02-05 22:22:54 -0800 | [diff] [blame] | 136 | @return An object of some message class or None if fails |
Dan Talayco | 08d9dfe | 2010-02-12 23:02:11 -0800 | [diff] [blame] | 137 | Note that any data beyond that parsed is not returned |
Dan Talayco | f75360a | 2010-02-05 22:22:54 -0800 | [diff] [blame] | 138 | |
| 139 | """ |
| 140 | |
| 141 | if raw: |
Dan Talayco | 4837010 | 2010-03-03 15:17:33 -0800 | [diff] [blame] | 142 | parse_logger.error("raw packet message parsing not supported") |
Dan Talayco | f75360a | 2010-02-05 22:22:54 -0800 | [diff] [blame] | 143 | return None |
| 144 | |
| 145 | obj = _of_message_to_object(binary_string) |
Dan Talayco | b66b112 | 2010-02-10 22:38:49 -0800 | [diff] [blame] | 146 | if obj: |
Dan Talayco | f75360a | 2010-02-05 22:22:54 -0800 | [diff] [blame] | 147 | obj.unpack(binary_string) |
| 148 | return obj |
| 149 | |
Dan Talayco | b9cb548 | 2010-02-09 15:23:12 -0800 | [diff] [blame] | 150 | |
| 151 | def of_header_parse(binary_string, raw=False): |
| 152 | """ |
| 153 | Parse only the header from an OpenFlow packet |
| 154 | |
| 155 | Parses the header from a raw OpenFlow packet into a |
| 156 | an ofp_header Python class. |
| 157 | |
| 158 | @param binary_string The packet (string) to be parsed |
| 159 | @param raw If true, interpret the packet as an L2 packet. Not |
| 160 | yet supported. |
| 161 | @return An ofp_header object |
| 162 | |
| 163 | """ |
| 164 | |
| 165 | if raw: |
Dan Talayco | 4837010 | 2010-03-03 15:17:33 -0800 | [diff] [blame] | 166 | parse_logger.error("raw packet message parsing not supported") |
Dan Talayco | b9cb548 | 2010-02-09 15:23:12 -0800 | [diff] [blame] | 167 | return None |
| 168 | |
| 169 | hdr = ofp_header() |
| 170 | hdr.unpack(binary_string) |
| 171 | |
| 172 | return hdr |
| 173 | |
Dan Talayco | b66b112 | 2010-02-10 22:38:49 -0800 | [diff] [blame] | 174 | map_wc_field_to_match_member = { |
| 175 | 'OFPFW_DL_VLAN' : 'dl_vlan', |
| 176 | 'OFPFW_DL_SRC' : 'dl_src', |
| 177 | 'OFPFW_DL_DST' : 'dl_dst', |
| 178 | 'OFPFW_DL_TYPE' : 'dl_type', |
| 179 | 'OFPFW_NW_PROTO' : 'nw_proto', |
| 180 | 'OFPFW_TP_SRC' : 'tp_src', |
| 181 | 'OFPFW_TP_DST' : 'tp_dst', |
| 182 | 'OFPFW_NW_SRC_SHIFT' : 'nw_src_shift', |
| 183 | 'OFPFW_NW_SRC_BITS' : 'nw_src_bits', |
| 184 | 'OFPFW_NW_SRC_MASK' : 'nw_src_mask', |
| 185 | 'OFPFW_NW_SRC_ALL' : 'nw_src_all', |
| 186 | 'OFPFW_NW_DST_SHIFT' : 'nw_dst_shift', |
| 187 | 'OFPFW_NW_DST_BITS' : 'nw_dst_bits', |
| 188 | 'OFPFW_NW_DST_MASK' : 'nw_dst_mask', |
| 189 | 'OFPFW_NW_DST_ALL' : 'nw_dst_all', |
| 190 | 'OFPFW_DL_VLAN_PCP' : 'dl_vlan_pcp', |
| 191 | 'OFPFW_NW_TOS' : 'nw_tos' |
| 192 | } |
| 193 | |
| 194 | |
| 195 | def parse_mac(mac_str): |
Dan Talayco | b9cb548 | 2010-02-09 15:23:12 -0800 | [diff] [blame] | 196 | """ |
Dan Talayco | b66b112 | 2010-02-10 22:38:49 -0800 | [diff] [blame] | 197 | Parse a MAC address |
| 198 | |
| 199 | Parse a MAC address ':' separated string of hex digits to an |
| 200 | array of integer values. '00:d0:05:5d:24:00' => [0, 208, 5, 93, 36, 0] |
| 201 | @param mac_str The string to convert |
| 202 | @return Array of 6 integer values |
| 203 | """ |
| 204 | return map(lambda val:eval("0x" + val), mac_str.split(":")) |
| 205 | |
| 206 | def parse_ip(ip_str): |
| 207 | """ |
| 208 | Parse an IP address |
| 209 | |
| 210 | Parse an IP address '.' separated string of decimal digits to an |
| 211 | host ordered integer. '172.24.74.77' => |
| 212 | @param ip_str The string to convert |
| 213 | @return Integer value |
| 214 | """ |
| 215 | array = map(lambda val:eval(val),ip_str.split(".")) |
| 216 | val = 0 |
| 217 | for a in array: |
| 218 | val <<= 8 |
| 219 | val += a |
| 220 | return val |
| 221 | |
| 222 | def packet_type_classify(ether): |
| 223 | try: |
Dan Talayco | 958f3b9 | 2010-03-12 21:58:57 -0800 | [diff] [blame^] | 224 | dot1q = ether[scapy.Dot1Q] |
Dan Talayco | b66b112 | 2010-02-10 22:38:49 -0800 | [diff] [blame] | 225 | except: |
| 226 | dot1q = None |
Dan Talayco | 08d9dfe | 2010-02-12 23:02:11 -0800 | [diff] [blame] | 227 | |
Dan Talayco | b66b112 | 2010-02-10 22:38:49 -0800 | [diff] [blame] | 228 | try: |
Dan Talayco | 958f3b9 | 2010-03-12 21:58:57 -0800 | [diff] [blame^] | 229 | ip = ether[scapy.IP] |
Dan Talayco | b66b112 | 2010-02-10 22:38:49 -0800 | [diff] [blame] | 230 | except: |
| 231 | ip = None |
Dan Talayco | 08d9dfe | 2010-02-12 23:02:11 -0800 | [diff] [blame] | 232 | |
Dan Talayco | b66b112 | 2010-02-10 22:38:49 -0800 | [diff] [blame] | 233 | try: |
Dan Talayco | 958f3b9 | 2010-03-12 21:58:57 -0800 | [diff] [blame^] | 234 | tcp = ether[scapy.TCP] |
Dan Talayco | b66b112 | 2010-02-10 22:38:49 -0800 | [diff] [blame] | 235 | except: |
| 236 | tcp = None |
Dan Talayco | 08d9dfe | 2010-02-12 23:02:11 -0800 | [diff] [blame] | 237 | |
Dan Talayco | b66b112 | 2010-02-10 22:38:49 -0800 | [diff] [blame] | 238 | try: |
Dan Talayco | 958f3b9 | 2010-03-12 21:58:57 -0800 | [diff] [blame^] | 239 | udp = ether[scapy.UDP] |
Dan Talayco | b66b112 | 2010-02-10 22:38:49 -0800 | [diff] [blame] | 240 | except: |
| 241 | udp = None |
| 242 | |
| 243 | # @todo arp and icmp are not yet supported |
| 244 | icmp = arp = None |
| 245 | return (dot1q, ip, tcp, udp, icmp, arp) |
| 246 | |
| 247 | def packet_to_flow_match(packet, pkt_format="L2"): |
| 248 | """ |
| 249 | Create a flow match that matches packet with the given wildcards |
Dan Talayco | b9cb548 | 2010-02-09 15:23:12 -0800 | [diff] [blame] | 250 | |
| 251 | @param packet The packet to use as a flow template |
Dan Talayco | a3b2018 | 2010-02-10 22:49:34 -0800 | [diff] [blame] | 252 | @param pkt_format Currently only L2 is supported. Will indicate the |
| 253 | overall packet type for parsing |
Dan Talayco | b66b112 | 2010-02-10 22:38:49 -0800 | [diff] [blame] | 254 | @return An ofp_match object if successful. None if format is not |
| 255 | recognized. The wildcards of the match will be cleared for the |
| 256 | values extracted from the packet. |
| 257 | |
Dan Talayco | a3b2018 | 2010-02-10 22:49:34 -0800 | [diff] [blame] | 258 | @todo check min length of packet |
| 259 | @todo Check if packet is other than L2 format |
| 260 | @todo Implement ICMP and ARP fields |
Dan Talayco | b9cb548 | 2010-02-09 15:23:12 -0800 | [diff] [blame] | 261 | """ |
| 262 | |
Dan Talayco | b66b112 | 2010-02-10 22:38:49 -0800 | [diff] [blame] | 263 | #@todo check min length of packet |
Dan Talayco | b66b112 | 2010-02-10 22:38:49 -0800 | [diff] [blame] | 264 | if pkt_format.upper() != "L2": |
Dan Talayco | 4837010 | 2010-03-03 15:17:33 -0800 | [diff] [blame] | 265 | parse_logger.error("Only L2 supported for packet_to_flow") |
Dan Talayco | b66b112 | 2010-02-10 22:38:49 -0800 | [diff] [blame] | 266 | return None |
| 267 | |
Dan Talayco | cb6b5d7 | 2010-03-10 13:59:33 -0800 | [diff] [blame] | 268 | if type(packet) == type(""): |
Dan Talayco | 958f3b9 | 2010-03-12 21:58:57 -0800 | [diff] [blame^] | 269 | ether = scapy.Ether(packet) |
Dan Talayco | cb6b5d7 | 2010-03-10 13:59:33 -0800 | [diff] [blame] | 270 | else: |
| 271 | ether = packet |
| 272 | |
Dan Talayco | b66b112 | 2010-02-10 22:38:49 -0800 | [diff] [blame] | 273 | # For now, assume ether IP packet and ignore wildcards |
Dan Talayco | cb6b5d7 | 2010-03-10 13:59:33 -0800 | [diff] [blame] | 274 | try: |
| 275 | (dot1q, ip, tcp, udp, icmp, arp) = packet_type_classify(ether) |
| 276 | except: |
| 277 | parse_logger.error("packet_to_flow_match: Classify error") |
| 278 | return None |
Dan Talayco | b66b112 | 2010-02-10 22:38:49 -0800 | [diff] [blame] | 279 | |
| 280 | match = ofp_match() |
| 281 | match.wildcards = OFPFW_ALL |
| 282 | #@todo Check if packet is other than L2 format |
| 283 | match.dl_dst = parse_mac(ether.dst) |
| 284 | match.wildcards &= ~OFPFW_DL_DST |
| 285 | match.dl_src = parse_mac(ether.src) |
| 286 | match.wildcards &= ~OFPFW_DL_SRC |
| 287 | match.dl_type = ether.type |
| 288 | match.wildcards &= ~OFPFW_DL_TYPE |
| 289 | |
| 290 | if dot1q: |
| 291 | match.dl_vlan = dot1q.vlan |
| 292 | match.wildcards &= ~OFPFW_DL_VLAN |
| 293 | match.dl_vlan_pcp = dot1q.prio |
| 294 | match.wildcards &= ~OFPFW_DL_VLAN_PCP |
| 295 | |
| 296 | if ip: |
| 297 | match.nw_src = parse_ip(ip.src) |
| 298 | match.wildcards &= ~OFPFW_NW_SRC_MASK |
| 299 | match.nw_dst = parse_ip(ip.dst) |
| 300 | match.wildcards &= ~OFPFW_NW_DST_MASK |
| 301 | match.nw_tos = ip.tos |
| 302 | match.wildcards &= ~OFPFW_NW_TOS |
| 303 | |
| 304 | if tcp: |
| 305 | match.tp_src = tcp.sport |
| 306 | match.wildcards &= ~OFPFW_TP_SRC |
| 307 | match.tp_dst = tcp.dport |
| 308 | match.wildcards &= ~OFPFW_TP_DST |
| 309 | |
| 310 | #@todo Implement ICMP and ARP fields |
| 311 | |
| 312 | return match |