1 /*
2  * Copyright (c) 1998-2007 The TCPDUMP project
3  *
4  * Redistribution and use in source and binary forms, with or without
5  * modification, are permitted provided that: (1) source code
6  * distributions retain the above copyright notice and this paragraph
7  * in its entirety, and (2) distributions including binary code include
8  * the above copyright notice and this paragraph in its entirety in
9  * the documentation or other materials provided with the distribution.
10  * THIS SOFTWARE IS PROVIDED ``AS IS'' AND
11  * WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT
12  * LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
13  * FOR A PARTICULAR PURPOSE.
14  *
15  * The SFLOW protocol as per http://www.sflow.org/developers/specifications.php
16  *
17  * Original code by Carles Kishimoto <carles.kishimoto@gmail.com>
18  *
19  * Expansion and refactoring by Rick Jones <rick.jones2@hp.com>
20  */
21 
22 #define NETDISSECT_REWORKED
23 #ifdef HAVE_CONFIG_H
24 #include "config.h"
25 #endif
26 
27 #include <tcpdump-stdinc.h>
28 
29 #include "interface.h"
30 #include "extract.h"
31 #include "addrtoname.h"
32 
33 /*
34  * sFlow datagram
35  *
36  * 0                   1                   2                   3
37  * 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
38  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
39  * |                     Sflow version (2,4,5)                     |
40  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
41  * |               IP version (1 for IPv4 | 2 for IPv6)            |
42  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
43  * |                     IP Address AGENT (4 or 16 bytes)          |
44  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
45  * |                          Sub agent ID                         |
46  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
47  * |                      Datagram sequence number                 |
48  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
49  * |                      Switch uptime in ms                      |
50  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
51  * |                    num samples in datagram                    |
52  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
53  *
54  */
55 
56 struct sflow_datagram_t {
57     uint8_t 	version[4];
58     uint8_t 	ip_version[4];
59     uint8_t 	agent[4];
60     uint8_t 	agent_id[4];
61     uint8_t 	seqnum[4];
62     uint8_t 	uptime[4];
63     uint8_t 	samples[4];
64 };
65 
66 struct sflow_sample_header {
67     uint8_t	format[4];
68     uint8_t	len[4];
69 };
70 
71 #define		SFLOW_FLOW_SAMPLE		1
72 #define		SFLOW_COUNTER_SAMPLE		2
73 #define		SFLOW_EXPANDED_FLOW_SAMPLE	3
74 #define		SFLOW_EXPANDED_COUNTER_SAMPLE	4
75 
76 static const struct tok sflow_format_values[] = {
77     { SFLOW_FLOW_SAMPLE, "flow sample" },
78     { SFLOW_COUNTER_SAMPLE, "counter sample" },
79     { SFLOW_EXPANDED_FLOW_SAMPLE, "expanded flow sample" },
80     { SFLOW_EXPANDED_COUNTER_SAMPLE, "expanded counter sample" },
81     { 0, NULL}
82 };
83 
84 struct sflow_flow_sample_t {
85     uint8_t    seqnum[4];
86     uint8_t    typesource[4];
87     uint8_t    rate[4];
88     uint8_t    pool[4];
89     uint8_t    drops[4];
90     uint8_t    in_interface[4];
91     uint8_t    out_interface[4];
92     uint8_t    records[4];
93 
94 };
95 
96 struct sflow_expanded_flow_sample_t {
97     uint8_t    seqnum[4];
98     uint8_t    type[4];
99     uint8_t    index[4];
100     uint8_t    rate[4];
101     uint8_t    pool[4];
102     uint8_t    drops[4];
103     uint8_t    in_interface_format[4];
104     uint8_t    in_interface_value[4];
105     uint8_t    out_interface_format[4];
106     uint8_t    out_interface_value[4];
107     uint8_t    records[4];
108 };
109 
110 #define 	SFLOW_FLOW_RAW_PACKET			1
111 #define 	SFLOW_FLOW_ETHERNET_FRAME		2
112 #define 	SFLOW_FLOW_IPV4_DATA			3
113 #define 	SFLOW_FLOW_IPV6_DATA			4
114 #define 	SFLOW_FLOW_EXTENDED_SWITCH_DATA		1001
115 #define 	SFLOW_FLOW_EXTENDED_ROUTER_DATA		1002
116 #define 	SFLOW_FLOW_EXTENDED_GATEWAY_DATA 	1003
117 #define 	SFLOW_FLOW_EXTENDED_USER_DATA		1004
118 #define 	SFLOW_FLOW_EXTENDED_URL_DATA		1005
119 #define 	SFLOW_FLOW_EXTENDED_MPLS_DATA		1006
120 #define 	SFLOW_FLOW_EXTENDED_NAT_DATA		1007
121 #define 	SFLOW_FLOW_EXTENDED_MPLS_TUNNEL		1008
122 #define 	SFLOW_FLOW_EXTENDED_MPLS_VC		1009
123 #define 	SFLOW_FLOW_EXTENDED_MPLS_FEC		1010
124 #define 	SFLOW_FLOW_EXTENDED_MPLS_LVP_FEC	1011
125 #define 	SFLOW_FLOW_EXTENDED_VLAN_TUNNEL		1012
126 
127 static const struct tok sflow_flow_type_values[] = {
128     { SFLOW_FLOW_RAW_PACKET, "Raw packet"},
129     { SFLOW_FLOW_ETHERNET_FRAME, "Ethernet frame"},
130     { SFLOW_FLOW_IPV4_DATA, "IPv4 Data"},
131     { SFLOW_FLOW_IPV6_DATA, "IPv6 Data"},
132     { SFLOW_FLOW_EXTENDED_SWITCH_DATA, "Extended Switch data"},
133     { SFLOW_FLOW_EXTENDED_ROUTER_DATA, "Extended Router data"},
134     { SFLOW_FLOW_EXTENDED_GATEWAY_DATA, "Extended Gateway data"},
135     { SFLOW_FLOW_EXTENDED_USER_DATA, "Extended User data"},
136     { SFLOW_FLOW_EXTENDED_URL_DATA, "Extended URL data"},
137     { SFLOW_FLOW_EXTENDED_MPLS_DATA, "Extended MPLS data"},
138     { SFLOW_FLOW_EXTENDED_NAT_DATA, "Extended NAT data"},
139     { SFLOW_FLOW_EXTENDED_MPLS_TUNNEL, "Extended MPLS tunnel"},
140     { SFLOW_FLOW_EXTENDED_MPLS_VC, "Extended MPLS VC"},
141     { SFLOW_FLOW_EXTENDED_MPLS_FEC, "Extended MPLS FEC"},
142     { SFLOW_FLOW_EXTENDED_MPLS_LVP_FEC, "Extended MPLS LVP FEC"},
143     { SFLOW_FLOW_EXTENDED_VLAN_TUNNEL, "Extended VLAN Tunnel"},
144     { 0, NULL}
145 };
146 
147 #define		SFLOW_HEADER_PROTOCOL_ETHERNET	1
148 #define		SFLOW_HEADER_PROTOCOL_IPV4	11
149 #define		SFLOW_HEADER_PROTOCOL_IPV6	12
150 
151 static const struct tok sflow_flow_raw_protocol_values[] = {
152     { SFLOW_HEADER_PROTOCOL_ETHERNET, "Ethernet"},
153     { SFLOW_HEADER_PROTOCOL_IPV4, "IPv4"},
154     { SFLOW_HEADER_PROTOCOL_IPV6, "IPv6"},
155     { 0, NULL}
156 };
157 
158 struct sflow_expanded_flow_raw_t {
159     uint8_t    protocol[4];
160     uint8_t    length[4];
161     uint8_t    stripped_bytes[4];
162     uint8_t    header_size[4];
163 };
164 
165 struct sflow_ethernet_frame_t {
166     uint8_t length[4];
167     uint8_t src_mac[8];
168     uint8_t dst_mac[8];
169     uint8_t type[4];
170 };
171 
172 struct sflow_extended_switch_data_t {
173     uint8_t src_vlan[4];
174     uint8_t src_pri[4];
175     uint8_t dst_vlan[4];
176     uint8_t dst_pri[4];
177 };
178 
179 struct sflow_counter_record_t {
180     uint8_t    format[4];
181     uint8_t    length[4];
182 };
183 
184 struct sflow_flow_record_t {
185     uint8_t    format[4];
186     uint8_t    length[4];
187 };
188 
189 struct sflow_counter_sample_t {
190     uint8_t    seqnum[4];
191     uint8_t    typesource[4];
192     uint8_t    records[4];
193 };
194 
195 struct sflow_expanded_counter_sample_t {
196     uint8_t    seqnum[4];
197     uint8_t    type[4];
198     uint8_t    index[4];
199     uint8_t    records[4];
200 };
201 
202 #define         SFLOW_COUNTER_GENERIC           1
203 #define         SFLOW_COUNTER_ETHERNET          2
204 #define         SFLOW_COUNTER_TOKEN_RING        3
205 #define         SFLOW_COUNTER_BASEVG            4
206 #define         SFLOW_COUNTER_VLAN              5
207 #define         SFLOW_COUNTER_PROCESSOR         1001
208 
209 static const struct tok sflow_counter_type_values[] = {
210     { SFLOW_COUNTER_GENERIC, "Generic counter"},
211     { SFLOW_COUNTER_ETHERNET, "Ethernet counter"},
212     { SFLOW_COUNTER_TOKEN_RING, "Token ring counter"},
213     { SFLOW_COUNTER_BASEVG, "100 BaseVG counter"},
214     { SFLOW_COUNTER_VLAN, "Vlan counter"},
215     { SFLOW_COUNTER_PROCESSOR, "Processor counter"},
216     { 0, NULL}
217 };
218 
219 #define		SFLOW_IFACE_DIRECTION_UNKNOWN		0
220 #define		SFLOW_IFACE_DIRECTION_FULLDUPLEX	1
221 #define		SFLOW_IFACE_DIRECTION_HALFDUPLEX	2
222 #define		SFLOW_IFACE_DIRECTION_IN		3
223 #define		SFLOW_IFACE_DIRECTION_OUT		4
224 
225 static const struct tok sflow_iface_direction_values[] = {
226     { SFLOW_IFACE_DIRECTION_UNKNOWN, "unknown"},
227     { SFLOW_IFACE_DIRECTION_FULLDUPLEX, "full-duplex"},
228     { SFLOW_IFACE_DIRECTION_HALFDUPLEX, "half-duplex"},
229     { SFLOW_IFACE_DIRECTION_IN, "in"},
230     { SFLOW_IFACE_DIRECTION_OUT, "out"},
231     { 0, NULL}
232 };
233 
234 struct sflow_generic_counter_t {
235     uint8_t    ifindex[4];
236     uint8_t    iftype[4];
237     uint8_t    ifspeed[8];
238     uint8_t    ifdirection[4];
239     uint8_t    ifstatus[4];
240     uint8_t    ifinoctets[8];
241     uint8_t    ifinunicastpkts[4];
242     uint8_t    ifinmulticastpkts[4];
243     uint8_t    ifinbroadcastpkts[4];
244     uint8_t    ifindiscards[4];
245     uint8_t    ifinerrors[4];
246     uint8_t    ifinunkownprotos[4];
247     uint8_t    ifoutoctets[8];
248     uint8_t    ifoutunicastpkts[4];
249     uint8_t    ifoutmulticastpkts[4];
250     uint8_t    ifoutbroadcastpkts[4];
251     uint8_t    ifoutdiscards[4];
252     uint8_t    ifouterrors[4];
253     uint8_t    ifpromiscmode[4];
254 };
255 
256 struct sflow_ethernet_counter_t {
257     uint8_t    alignerrors[4];
258     uint8_t    fcserrors[4];
259     uint8_t    single_collision_frames[4];
260     uint8_t    multiple_collision_frames[4];
261     uint8_t    test_errors[4];
262     uint8_t    deferred_transmissions[4];
263     uint8_t    late_collisions[4];
264     uint8_t    excessive_collisions[4];
265     uint8_t    mac_transmit_errors[4];
266     uint8_t    carrier_sense_errors[4];
267     uint8_t    frame_too_longs[4];
268     uint8_t    mac_receive_errors[4];
269     uint8_t    symbol_errors[4];
270 };
271 
272 struct sflow_100basevg_counter_t {
273     uint8_t    in_highpriority_frames[4];
274     uint8_t    in_highpriority_octets[8];
275     uint8_t    in_normpriority_frames[4];
276     uint8_t    in_normpriority_octets[8];
277     uint8_t    in_ipmerrors[4];
278     uint8_t    in_oversized[4];
279     uint8_t    in_data_errors[4];
280     uint8_t    in_null_addressed_frames[4];
281     uint8_t    out_highpriority_frames[4];
282     uint8_t    out_highpriority_octets[8];
283     uint8_t    transitioninto_frames[4];
284     uint8_t    hc_in_highpriority_octets[8];
285     uint8_t    hc_in_normpriority_octets[8];
286     uint8_t    hc_out_highpriority_octets[8];
287 };
288 
289 struct sflow_vlan_counter_t {
290     uint8_t    vlan_id[4];
291     uint8_t    octets[8];
292     uint8_t    unicast_pkt[4];
293     uint8_t    multicast_pkt[4];
294     uint8_t    broadcast_pkt[4];
295     uint8_t    discards[4];
296 };
297 
298 static int
print_sflow_counter_generic(netdissect_options * ndo,const u_char * pointer,u_int len)299 print_sflow_counter_generic(netdissect_options *ndo,
300                             const u_char *pointer, u_int len)
301 {
302     const struct sflow_generic_counter_t *sflow_gen_counter;
303 
304     if (len < sizeof(struct sflow_generic_counter_t))
305 	return 1;
306 
307 
308     sflow_gen_counter = (const struct sflow_generic_counter_t *)pointer;
309     ND_PRINT((ndo, "\n\t      ifindex %u, iftype %u, ifspeed %" PRIu64 ", ifdirection %u (%s)",
310 	   EXTRACT_32BITS(sflow_gen_counter->ifindex),
311 	   EXTRACT_32BITS(sflow_gen_counter->iftype),
312 	   EXTRACT_64BITS(sflow_gen_counter->ifspeed),
313 	   EXTRACT_32BITS(sflow_gen_counter->ifdirection),
314 	   tok2str(sflow_iface_direction_values, "Unknown",
315 	   EXTRACT_32BITS(sflow_gen_counter->ifdirection))));
316     ND_PRINT((ndo, "\n\t      ifstatus %u, adminstatus: %s, operstatus: %s",
317 	   EXTRACT_32BITS(sflow_gen_counter->ifstatus),
318 	   EXTRACT_32BITS(sflow_gen_counter->ifstatus)&1 ? "up" : "down",
319 	   (EXTRACT_32BITS(sflow_gen_counter->ifstatus)>>1)&1 ? "up" : "down"));
320     ND_PRINT((ndo, "\n\t      In octets %" PRIu64
321 	   ", unicast pkts %u, multicast pkts %u, broadcast pkts %u, discards %u",
322 	   EXTRACT_64BITS(sflow_gen_counter->ifinoctets),
323 	   EXTRACT_32BITS(sflow_gen_counter->ifinunicastpkts),
324 	   EXTRACT_32BITS(sflow_gen_counter->ifinmulticastpkts),
325 	   EXTRACT_32BITS(sflow_gen_counter->ifinbroadcastpkts),
326 	   EXTRACT_32BITS(sflow_gen_counter->ifindiscards)));
327     ND_PRINT((ndo, "\n\t      In errors %u, unknown protos %u",
328 	   EXTRACT_32BITS(sflow_gen_counter->ifinerrors),
329 	   EXTRACT_32BITS(sflow_gen_counter->ifinunkownprotos)));
330     ND_PRINT((ndo, "\n\t      Out octets %" PRIu64
331 	   ", unicast pkts %u, multicast pkts %u, broadcast pkts %u, discards %u",
332 	   EXTRACT_64BITS(sflow_gen_counter->ifoutoctets),
333 	   EXTRACT_32BITS(sflow_gen_counter->ifoutunicastpkts),
334 	   EXTRACT_32BITS(sflow_gen_counter->ifoutmulticastpkts),
335 	   EXTRACT_32BITS(sflow_gen_counter->ifoutbroadcastpkts),
336 	   EXTRACT_32BITS(sflow_gen_counter->ifoutdiscards)));
337     ND_PRINT((ndo, "\n\t      Out errors %u, promisc mode %u",
338 	   EXTRACT_32BITS(sflow_gen_counter->ifouterrors),
339 	   EXTRACT_32BITS(sflow_gen_counter->ifpromiscmode)));
340 
341     return 0;
342 }
343 
344 static int
print_sflow_counter_ethernet(netdissect_options * ndo,const u_char * pointer,u_int len)345 print_sflow_counter_ethernet(netdissect_options *ndo,
346                              const u_char *pointer, u_int len)
347 {
348     const struct sflow_ethernet_counter_t *sflow_eth_counter;
349 
350     if (len < sizeof(struct sflow_ethernet_counter_t))
351 	return 1;
352 
353     sflow_eth_counter = (const struct sflow_ethernet_counter_t *)pointer;
354     ND_PRINT((ndo, "\n\t      align errors %u, fcs errors %u, single collision %u, multiple collision %u, test error %u",
355 	   EXTRACT_32BITS(sflow_eth_counter->alignerrors),
356 	   EXTRACT_32BITS(sflow_eth_counter->fcserrors),
357 	   EXTRACT_32BITS(sflow_eth_counter->single_collision_frames),
358 	   EXTRACT_32BITS(sflow_eth_counter->multiple_collision_frames),
359 	   EXTRACT_32BITS(sflow_eth_counter->test_errors)));
360     ND_PRINT((ndo, "\n\t      deferred %u, late collision %u, excessive collision %u, mac trans error %u",
361 	   EXTRACT_32BITS(sflow_eth_counter->deferred_transmissions),
362 	   EXTRACT_32BITS(sflow_eth_counter->late_collisions),
363 	   EXTRACT_32BITS(sflow_eth_counter->excessive_collisions),
364 	   EXTRACT_32BITS(sflow_eth_counter->mac_transmit_errors)));
365     ND_PRINT((ndo, "\n\t      carrier error %u, frames too long %u, mac receive errors %u, symbol errors %u",
366 	   EXTRACT_32BITS(sflow_eth_counter->carrier_sense_errors),
367 	   EXTRACT_32BITS(sflow_eth_counter->frame_too_longs),
368 	   EXTRACT_32BITS(sflow_eth_counter->mac_receive_errors),
369 	   EXTRACT_32BITS(sflow_eth_counter->symbol_errors)));
370 
371     return 0;
372 }
373 
374 static int
print_sflow_counter_token_ring(netdissect_options * ndo _U_,const u_char * pointer _U_,u_int len _U_)375 print_sflow_counter_token_ring(netdissect_options *ndo _U_,
376                                const u_char *pointer _U_, u_int len _U_)
377 {
378     return 0;
379 }
380 
381 static int
print_sflow_counter_basevg(netdissect_options * ndo,const u_char * pointer,u_int len)382 print_sflow_counter_basevg(netdissect_options *ndo,
383                            const u_char *pointer, u_int len)
384 {
385     const struct sflow_100basevg_counter_t *sflow_100basevg_counter;
386 
387     if (len < sizeof(struct sflow_100basevg_counter_t))
388 	return 1;
389 
390     sflow_100basevg_counter = (const struct sflow_100basevg_counter_t *)pointer;
391     ND_PRINT((ndo, "\n\t      in high prio frames %u, in high prio octets %" PRIu64,
392 	   EXTRACT_32BITS(sflow_100basevg_counter->in_highpriority_frames),
393 	   EXTRACT_64BITS(sflow_100basevg_counter->in_highpriority_octets)));
394     ND_PRINT((ndo, "\n\t      in norm prio frames %u, in norm prio octets %" PRIu64,
395 	   EXTRACT_32BITS(sflow_100basevg_counter->in_normpriority_frames),
396 	   EXTRACT_64BITS(sflow_100basevg_counter->in_normpriority_octets)));
397     ND_PRINT((ndo, "\n\t      in ipm errors %u, oversized %u, in data errors %u, null addressed frames %u",
398 	   EXTRACT_32BITS(sflow_100basevg_counter->in_ipmerrors),
399 	   EXTRACT_32BITS(sflow_100basevg_counter->in_oversized),
400 	   EXTRACT_32BITS(sflow_100basevg_counter->in_data_errors),
401 	   EXTRACT_32BITS(sflow_100basevg_counter->in_null_addressed_frames)));
402     ND_PRINT((ndo, "\n\t      out high prio frames %u, out high prio octets %" PRIu64
403 	   ", trans into frames %u",
404 	   EXTRACT_32BITS(sflow_100basevg_counter->out_highpriority_frames),
405 	   EXTRACT_64BITS(sflow_100basevg_counter->out_highpriority_octets),
406 	   EXTRACT_32BITS(sflow_100basevg_counter->transitioninto_frames)));
407     ND_PRINT((ndo, "\n\t      in hc high prio octets %" PRIu64
408 	   ", in hc norm prio octets %" PRIu64
409 	   ", out hc high prio octets %" PRIu64,
410 	   EXTRACT_64BITS(sflow_100basevg_counter->hc_in_highpriority_octets),
411 	   EXTRACT_64BITS(sflow_100basevg_counter->hc_in_normpriority_octets),
412 	   EXTRACT_64BITS(sflow_100basevg_counter->hc_out_highpriority_octets)));
413 
414     return 0;
415 }
416 
417 static int
print_sflow_counter_vlan(netdissect_options * ndo,const u_char * pointer,u_int len)418 print_sflow_counter_vlan(netdissect_options *ndo,
419                          const u_char *pointer, u_int len)
420 {
421     const struct sflow_vlan_counter_t *sflow_vlan_counter;
422 
423     if (len < sizeof(struct sflow_vlan_counter_t))
424 	return 1;
425 
426     sflow_vlan_counter = (const struct sflow_vlan_counter_t *)pointer;
427     ND_PRINT((ndo, "\n\t      vlan_id %u, octets %" PRIu64
428 	   ", unicast_pkt %u, multicast_pkt %u, broadcast_pkt %u, discards %u",
429 	   EXTRACT_32BITS(sflow_vlan_counter->vlan_id),
430 	   EXTRACT_64BITS(sflow_vlan_counter->octets),
431 	   EXTRACT_32BITS(sflow_vlan_counter->unicast_pkt),
432 	   EXTRACT_32BITS(sflow_vlan_counter->multicast_pkt),
433 	   EXTRACT_32BITS(sflow_vlan_counter->broadcast_pkt),
434 	   EXTRACT_32BITS(sflow_vlan_counter->discards)));
435 
436     return 0;
437 }
438 
439 struct sflow_processor_counter_t {
440     uint8_t five_sec_util[4];
441     uint8_t one_min_util[4];
442     uint8_t five_min_util[4];
443     uint8_t total_memory[8];
444     uint8_t free_memory[8];
445 };
446 
447 static int
print_sflow_counter_processor(netdissect_options * ndo,const u_char * pointer,u_int len)448 print_sflow_counter_processor(netdissect_options *ndo,
449                               const u_char *pointer, u_int len)
450 {
451     const struct sflow_processor_counter_t *sflow_processor_counter;
452 
453     if (len < sizeof(struct sflow_processor_counter_t))
454 	return 1;
455 
456     sflow_processor_counter = (const struct sflow_processor_counter_t *)pointer;
457     ND_PRINT((ndo, "\n\t      5sec %u, 1min %u, 5min %u, total_mem %" PRIu64
458 	   ", total_mem %" PRIu64,
459 	   EXTRACT_32BITS(sflow_processor_counter->five_sec_util),
460 	   EXTRACT_32BITS(sflow_processor_counter->one_min_util),
461 	   EXTRACT_32BITS(sflow_processor_counter->five_min_util),
462 	   EXTRACT_64BITS(sflow_processor_counter->total_memory),
463 	   EXTRACT_64BITS(sflow_processor_counter->free_memory)));
464 
465     return 0;
466 }
467 
468 static int
sflow_print_counter_records(netdissect_options * ndo,const u_char * pointer,u_int len,u_int records)469 sflow_print_counter_records(netdissect_options *ndo,
470                             const u_char *pointer, u_int len, u_int records)
471 {
472     u_int nrecords;
473     const u_char *tptr;
474     u_int tlen;
475     u_int counter_type;
476     u_int counter_len;
477     u_int enterprise;
478     const struct sflow_counter_record_t *sflow_counter_record;
479 
480     nrecords = records;
481     tptr = pointer;
482     tlen = len;
483 
484     while (nrecords > 0) {
485 	/* do we have the "header?" */
486 	if (tlen < sizeof(struct sflow_counter_record_t))
487 	    return 1;
488 	sflow_counter_record = (const struct sflow_counter_record_t *)tptr;
489 
490 	enterprise = EXTRACT_32BITS(sflow_counter_record->format);
491 	counter_type = enterprise & 0x0FFF;
492 	enterprise = enterprise >> 20;
493 	counter_len  = EXTRACT_32BITS(sflow_counter_record->length);
494 	ND_PRINT((ndo, "\n\t    enterprise %u, %s (%u) length %u",
495 	       enterprise,
496 	       (enterprise == 0) ? tok2str(sflow_counter_type_values,"Unknown",counter_type) : "Unknown",
497 	       counter_type,
498 	       counter_len));
499 
500 	tptr += sizeof(struct sflow_counter_record_t);
501 	tlen -= sizeof(struct sflow_counter_record_t);
502 
503 	if (tlen < counter_len)
504 	    return 1;
505 	if (enterprise == 0) {
506 	    switch (counter_type) {
507 	    case SFLOW_COUNTER_GENERIC:
508 		if (print_sflow_counter_generic(ndo, tptr, tlen))
509 		    return 1;
510 		break;
511 	    case SFLOW_COUNTER_ETHERNET:
512 		if (print_sflow_counter_ethernet(ndo, tptr, tlen))
513 		    return 1;
514 		break;
515 	    case SFLOW_COUNTER_TOKEN_RING:
516 		if (print_sflow_counter_token_ring(ndo, tptr,tlen))
517 		    return 1;
518 		break;
519 	    case SFLOW_COUNTER_BASEVG:
520 		if (print_sflow_counter_basevg(ndo, tptr, tlen))
521 		    return 1;
522 		break;
523 	    case SFLOW_COUNTER_VLAN:
524 		if (print_sflow_counter_vlan(ndo, tptr, tlen))
525 		    return 1;
526 		break;
527 	    case SFLOW_COUNTER_PROCESSOR:
528 		if (print_sflow_counter_processor(ndo, tptr, tlen))
529 		    return 1;
530 		break;
531 	    default:
532 		if (ndo->ndo_vflag <= 1)
533 		    print_unknown_data(ndo, tptr, "\n\t\t", counter_len);
534 		break;
535 	    }
536 	}
537 	tptr += counter_len;
538 	tlen -= counter_len;
539 	nrecords--;
540 
541     }
542 
543     return 0;
544 }
545 
546 static int
sflow_print_counter_sample(netdissect_options * ndo,const u_char * pointer,u_int len)547 sflow_print_counter_sample(netdissect_options *ndo,
548                            const u_char *pointer, u_int len)
549 {
550     const struct sflow_counter_sample_t *sflow_counter_sample;
551     u_int           nrecords;
552     u_int           typesource;
553     u_int           type;
554     u_int           index;
555 
556 
557     if (len < sizeof(struct sflow_counter_sample_t))
558 	return 1;
559 
560     sflow_counter_sample = (const struct sflow_counter_sample_t *)pointer;
561 
562     typesource = EXTRACT_32BITS(sflow_counter_sample->typesource);
563     nrecords   = EXTRACT_32BITS(sflow_counter_sample->records);
564     type = typesource >> 24;
565     index = typesource & 0x0FFF;
566 
567     ND_PRINT((ndo, " seqnum %u, type %u, idx %u, records %u",
568 	   EXTRACT_32BITS(sflow_counter_sample->seqnum),
569 	   type,
570 	   index,
571 	   nrecords));
572 
573     return sflow_print_counter_records(ndo, pointer + sizeof(struct sflow_counter_sample_t),
574 				       len - sizeof(struct sflow_counter_sample_t),
575 				       nrecords);
576 
577 }
578 
579 static int
sflow_print_expanded_counter_sample(netdissect_options * ndo,const u_char * pointer,u_int len)580 sflow_print_expanded_counter_sample(netdissect_options *ndo,
581                                     const u_char *pointer, u_int len)
582 {
583     const struct sflow_expanded_counter_sample_t *sflow_expanded_counter_sample;
584     u_int           nrecords;
585 
586 
587     if (len < sizeof(struct sflow_expanded_counter_sample_t))
588 	return 1;
589 
590     sflow_expanded_counter_sample = (const struct sflow_expanded_counter_sample_t *)pointer;
591 
592     nrecords = EXTRACT_32BITS(sflow_expanded_counter_sample->records);
593 
594     ND_PRINT((ndo, " seqnum %u, type %u, idx %u, records %u",
595 	   EXTRACT_32BITS(sflow_expanded_counter_sample->seqnum),
596 	   EXTRACT_32BITS(sflow_expanded_counter_sample->type),
597 	   EXTRACT_32BITS(sflow_expanded_counter_sample->index),
598 	   nrecords));
599 
600     return sflow_print_counter_records(ndo, pointer + sizeof(struct sflow_expanded_counter_sample_t),
601 				       len - sizeof(struct sflow_expanded_counter_sample_t),
602 				       nrecords);
603 
604 }
605 
606 static int
print_sflow_raw_packet(netdissect_options * ndo,const u_char * pointer,u_int len)607 print_sflow_raw_packet(netdissect_options *ndo,
608                        const u_char *pointer, u_int len)
609 {
610     const struct sflow_expanded_flow_raw_t *sflow_flow_raw;
611 
612     if (len < sizeof(struct sflow_expanded_flow_raw_t))
613 	return 1;
614 
615     sflow_flow_raw = (const struct sflow_expanded_flow_raw_t *)pointer;
616     ND_PRINT((ndo, "\n\t      protocol %s (%u), length %u, stripped bytes %u, header_size %u",
617 	   tok2str(sflow_flow_raw_protocol_values,"Unknown",EXTRACT_32BITS(sflow_flow_raw->protocol)),
618 	   EXTRACT_32BITS(sflow_flow_raw->protocol),
619 	   EXTRACT_32BITS(sflow_flow_raw->length),
620 	   EXTRACT_32BITS(sflow_flow_raw->stripped_bytes),
621 	   EXTRACT_32BITS(sflow_flow_raw->header_size)));
622 
623     /* QUESTION - should we attempt to print the raw header itself?
624        assuming of course there is wnough data present to do so... */
625 
626     return 0;
627 }
628 
629 static int
print_sflow_ethernet_frame(netdissect_options * ndo,const u_char * pointer,u_int len)630 print_sflow_ethernet_frame(netdissect_options *ndo,
631                            const u_char *pointer, u_int len)
632 {
633     const struct sflow_ethernet_frame_t *sflow_ethernet_frame;
634 
635     if (len < sizeof(struct sflow_ethernet_frame_t))
636 	return 1;
637 
638     sflow_ethernet_frame = (const struct sflow_ethernet_frame_t *)pointer;
639 
640     ND_PRINT((ndo, "\n\t      frame len %u, type %u",
641 	   EXTRACT_32BITS(sflow_ethernet_frame->length),
642 	   EXTRACT_32BITS(sflow_ethernet_frame->type)));
643 
644     return 0;
645 }
646 
647 static int
print_sflow_extended_switch_data(netdissect_options * ndo,const u_char * pointer,u_int len)648 print_sflow_extended_switch_data(netdissect_options *ndo,
649                                  const u_char *pointer, u_int len)
650 {
651     const struct sflow_extended_switch_data_t *sflow_extended_sw_data;
652 
653     if (len < sizeof(struct sflow_extended_switch_data_t))
654 	return 1;
655 
656     sflow_extended_sw_data = (const struct sflow_extended_switch_data_t *)pointer;
657     ND_PRINT((ndo, "\n\t      src vlan %u, src pri %u, dst vlan %u, dst pri %u",
658 	   EXTRACT_32BITS(sflow_extended_sw_data->src_vlan),
659 	   EXTRACT_32BITS(sflow_extended_sw_data->src_pri),
660 	   EXTRACT_32BITS(sflow_extended_sw_data->dst_vlan),
661 	   EXTRACT_32BITS(sflow_extended_sw_data->dst_pri)));
662 
663     return 0;
664 }
665 
666 static int
sflow_print_flow_records(netdissect_options * ndo,const u_char * pointer,u_int len,u_int records)667 sflow_print_flow_records(netdissect_options *ndo,
668                          const u_char *pointer, u_int len, u_int records)
669 {
670     u_int nrecords;
671     const u_char *tptr;
672     u_int tlen;
673     u_int flow_type;
674     u_int enterprise;
675     u_int flow_len;
676     const struct sflow_flow_record_t *sflow_flow_record;
677 
678     nrecords = records;
679     tptr = pointer;
680     tlen = len;
681 
682     while (nrecords > 0) {
683 	/* do we have the "header?" */
684 	if (tlen < sizeof(struct sflow_flow_record_t))
685 	    return 1;
686 
687 	sflow_flow_record = (const struct sflow_flow_record_t *)tptr;
688 
689 	/* so, the funky encoding means we cannot blythly mask-off
690 	   bits, we must also check the enterprise. */
691 
692 	enterprise = EXTRACT_32BITS(sflow_flow_record->format);
693 	flow_type = enterprise & 0x0FFF;
694 	enterprise = enterprise >> 12;
695 	flow_len  = EXTRACT_32BITS(sflow_flow_record->length);
696 	ND_PRINT((ndo, "\n\t    enterprise %u %s (%u) length %u",
697 	       enterprise,
698 	       (enterprise == 0) ? tok2str(sflow_flow_type_values,"Unknown",flow_type) : "Unknown",
699 	       flow_type,
700 	       flow_len));
701 
702 	tptr += sizeof(struct sflow_flow_record_t);
703 	tlen -= sizeof(struct sflow_flow_record_t);
704 
705 	if (tlen < flow_len)
706 	    return 1;
707 
708 	if (enterprise == 0) {
709 	    switch (flow_type) {
710 	    case SFLOW_FLOW_RAW_PACKET:
711 		if (print_sflow_raw_packet(ndo, tptr, tlen))
712 		    return 1;
713 		break;
714 	    case SFLOW_FLOW_EXTENDED_SWITCH_DATA:
715 		if (print_sflow_extended_switch_data(ndo, tptr, tlen))
716 		    return 1;
717 		break;
718 	    case SFLOW_FLOW_ETHERNET_FRAME:
719 		if (print_sflow_ethernet_frame(ndo, tptr, tlen))
720 		    return 1;
721 		break;
722 		/* FIXME these need a decoder */
723 	    case SFLOW_FLOW_IPV4_DATA:
724 	    case SFLOW_FLOW_IPV6_DATA:
725 	    case SFLOW_FLOW_EXTENDED_ROUTER_DATA:
726 	    case SFLOW_FLOW_EXTENDED_GATEWAY_DATA:
727 	    case SFLOW_FLOW_EXTENDED_USER_DATA:
728 	    case SFLOW_FLOW_EXTENDED_URL_DATA:
729 	    case SFLOW_FLOW_EXTENDED_MPLS_DATA:
730 	    case SFLOW_FLOW_EXTENDED_NAT_DATA:
731 	    case SFLOW_FLOW_EXTENDED_MPLS_TUNNEL:
732 	    case SFLOW_FLOW_EXTENDED_MPLS_VC:
733 	    case SFLOW_FLOW_EXTENDED_MPLS_FEC:
734 	    case SFLOW_FLOW_EXTENDED_MPLS_LVP_FEC:
735 	    case SFLOW_FLOW_EXTENDED_VLAN_TUNNEL:
736 		break;
737 	    default:
738 		if (ndo->ndo_vflag <= 1)
739 		    print_unknown_data(ndo, tptr, "\n\t\t", flow_len);
740 		break;
741 	    }
742 	}
743 	tptr += flow_len;
744 	tlen -= flow_len;
745 	nrecords--;
746 
747     }
748 
749     return 0;
750 }
751 
752 static int
sflow_print_flow_sample(netdissect_options * ndo,const u_char * pointer,u_int len)753 sflow_print_flow_sample(netdissect_options *ndo,
754                         const u_char *pointer, u_int len)
755 {
756     const struct sflow_flow_sample_t *sflow_flow_sample;
757     u_int          nrecords;
758     u_int          typesource;
759     u_int          type;
760     u_int          index;
761 
762     if (len < sizeof(struct sflow_flow_sample_t))
763 	return 1;
764 
765     sflow_flow_sample = (struct sflow_flow_sample_t *)pointer;
766 
767     typesource = EXTRACT_32BITS(sflow_flow_sample->typesource);
768     nrecords = EXTRACT_32BITS(sflow_flow_sample->records);
769     type = typesource >> 24;
770     index = typesource & 0x0FFF;
771 
772     ND_PRINT((ndo, " seqnum %u, type %u, idx %u, rate %u, pool %u, drops %u, input %u output %u records %u",
773 	   EXTRACT_32BITS(sflow_flow_sample->seqnum),
774 	   type,
775 	   index,
776 	   EXTRACT_32BITS(sflow_flow_sample->rate),
777 	   EXTRACT_32BITS(sflow_flow_sample->pool),
778 	   EXTRACT_32BITS(sflow_flow_sample->drops),
779 	   EXTRACT_32BITS(sflow_flow_sample->in_interface),
780 	   EXTRACT_32BITS(sflow_flow_sample->out_interface),
781 	   nrecords));
782 
783     return sflow_print_flow_records(ndo, pointer + sizeof(struct sflow_flow_sample_t),
784 				    len - sizeof(struct sflow_flow_sample_t),
785 				    nrecords);
786 
787 }
788 
789 static int
sflow_print_expanded_flow_sample(netdissect_options * ndo,const u_char * pointer,u_int len)790 sflow_print_expanded_flow_sample(netdissect_options *ndo,
791                                  const u_char *pointer, u_int len)
792 {
793     const struct sflow_expanded_flow_sample_t *sflow_expanded_flow_sample;
794     u_int nrecords;
795 
796     if (len < sizeof(struct sflow_expanded_flow_sample_t))
797 	return 1;
798 
799     sflow_expanded_flow_sample = (const struct sflow_expanded_flow_sample_t *)pointer;
800 
801     nrecords = EXTRACT_32BITS(sflow_expanded_flow_sample->records);
802 
803     ND_PRINT((ndo, " seqnum %u, type %u, idx %u, rate %u, pool %u, drops %u, records %u",
804 	   EXTRACT_32BITS(sflow_expanded_flow_sample->seqnum),
805 	   EXTRACT_32BITS(sflow_expanded_flow_sample->type),
806 	   EXTRACT_32BITS(sflow_expanded_flow_sample->index),
807 	   EXTRACT_32BITS(sflow_expanded_flow_sample->rate),
808 	   EXTRACT_32BITS(sflow_expanded_flow_sample->pool),
809 	   EXTRACT_32BITS(sflow_expanded_flow_sample->drops),
810 	   EXTRACT_32BITS(sflow_expanded_flow_sample->records)));
811 
812     return sflow_print_flow_records(ndo, pointer + sizeof(struct sflow_expanded_flow_sample_t),
813 				    len - sizeof(struct sflow_expanded_flow_sample_t),
814 				    nrecords);
815 
816 }
817 
818 void
sflow_print(netdissect_options * ndo,const u_char * pptr,u_int len)819 sflow_print(netdissect_options *ndo,
820             const u_char *pptr, u_int len)
821 {
822     const struct sflow_datagram_t *sflow_datagram;
823     const struct sflow_sample_header *sflow_sample;
824 
825     const u_char *tptr;
826     u_int tlen;
827     uint32_t sflow_sample_type, sflow_sample_len;
828     uint32_t nsamples;
829 
830 
831     tptr = pptr;
832     tlen = len;
833     sflow_datagram = (const struct sflow_datagram_t *)pptr;
834     ND_TCHECK(*sflow_datagram);
835 
836     /*
837      * Sanity checking of the header.
838      */
839     if (EXTRACT_32BITS(sflow_datagram->version) != 5) {
840         ND_PRINT((ndo, "sFlow version %u packet not supported",
841                EXTRACT_32BITS(sflow_datagram->version)));
842         return;
843     }
844 
845     if (ndo->ndo_vflag < 1) {
846         ND_PRINT((ndo, "sFlowv%u, %s agent %s, agent-id %u, length %u",
847                EXTRACT_32BITS(sflow_datagram->version),
848                EXTRACT_32BITS(sflow_datagram->ip_version) == 1 ? "IPv4" : "IPv6",
849                ipaddr_string(ndo, sflow_datagram->agent),
850                EXTRACT_32BITS(sflow_datagram->agent_id),
851                len));
852         return;
853     }
854 
855     /* ok they seem to want to know everything - lets fully decode it */
856     nsamples=EXTRACT_32BITS(sflow_datagram->samples);
857     ND_PRINT((ndo, "sFlowv%u, %s agent %s, agent-id %u, seqnum %u, uptime %u, samples %u, length %u",
858            EXTRACT_32BITS(sflow_datagram->version),
859            EXTRACT_32BITS(sflow_datagram->ip_version) == 1 ? "IPv4" : "IPv6",
860            ipaddr_string(ndo, sflow_datagram->agent),
861            EXTRACT_32BITS(sflow_datagram->agent_id),
862            EXTRACT_32BITS(sflow_datagram->seqnum),
863            EXTRACT_32BITS(sflow_datagram->uptime),
864            nsamples,
865            len));
866 
867     /* skip Common header */
868     tptr += sizeof(const struct sflow_datagram_t);
869     tlen -= sizeof(const struct sflow_datagram_t);
870 
871     while (nsamples > 0 && tlen > 0) {
872         sflow_sample = (const struct sflow_sample_header *)tptr;
873         ND_TCHECK(*sflow_sample);
874 
875         sflow_sample_type = (EXTRACT_32BITS(sflow_sample->format)&0x0FFF);
876         sflow_sample_len = EXTRACT_32BITS(sflow_sample->len);
877 
878 	if (tlen < sizeof(struct sflow_sample_header))
879 	    goto trunc;
880 
881         tptr += sizeof(struct sflow_sample_header);
882         tlen -= sizeof(struct sflow_sample_header);
883 
884         ND_PRINT((ndo, "\n\t%s (%u), length %u,",
885                tok2str(sflow_format_values, "Unknown", sflow_sample_type),
886                sflow_sample_type,
887                sflow_sample_len));
888 
889         /* basic sanity check */
890         if (sflow_sample_type == 0 || sflow_sample_len ==0) {
891             return;
892         }
893 
894 	if (tlen < sflow_sample_len)
895 	    goto trunc;
896 
897         /* did we capture enough for fully decoding the sample ? */
898         ND_TCHECK2(*tptr, sflow_sample_len);
899 
900 	switch(sflow_sample_type) {
901         case SFLOW_FLOW_SAMPLE:
902 	    if (sflow_print_flow_sample(ndo, tptr, tlen))
903 		goto trunc;
904             break;
905 
906         case SFLOW_COUNTER_SAMPLE:
907 	    if (sflow_print_counter_sample(ndo, tptr,tlen))
908 		goto trunc;
909             break;
910 
911         case SFLOW_EXPANDED_FLOW_SAMPLE:
912 	    if (sflow_print_expanded_flow_sample(ndo, tptr, tlen))
913 		goto trunc;
914 	    break;
915 
916         case SFLOW_EXPANDED_COUNTER_SAMPLE:
917 	    if (sflow_print_expanded_counter_sample(ndo, tptr,tlen))
918 		goto trunc;
919 	    break;
920 
921         default:
922             if (ndo->ndo_vflag <= 1)
923                 print_unknown_data(ndo, tptr, "\n\t    ", sflow_sample_len);
924             break;
925         }
926         tptr += sflow_sample_len;
927         tlen -= sflow_sample_len;
928         nsamples--;
929     }
930     return;
931 
932  trunc:
933     ND_PRINT((ndo, "[|SFLOW]"));
934 }
935 
936 /*
937  * Local Variables:
938  * c-style: whitesmith
939  * c-basic-offset: 4
940  * End:
941  */
942