]>
Commit | Line | Data |
---|---|---|
a7ff9bd7 | 1 | /* Copyright (c) 2008, 2009, 2010, 2011 Nicira Networks |
064af421 | 2 | * |
a14bc59f BP |
3 | * Licensed under the Apache License, Version 2.0 (the "License"); |
4 | * you may not use this file except in compliance with the License. | |
5 | * You may obtain a copy of the License at: | |
064af421 | 6 | * |
a14bc59f | 7 | * http://www.apache.org/licenses/LICENSE-2.0 |
064af421 | 8 | * |
a14bc59f BP |
9 | * Unless required by applicable law or agreed to in writing, software |
10 | * distributed under the License is distributed on an "AS IS" BASIS, | |
11 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | |
12 | * See the License for the specific language governing permissions and | |
13 | * limitations under the License. | |
064af421 BP |
14 | */ |
15 | ||
16 | #include <config.h> | |
17 | ||
18 | #include <assert.h> | |
19 | #include <errno.h> | |
20 | #include <getopt.h> | |
21 | #include <limits.h> | |
22 | #include <signal.h> | |
23 | #include <stdlib.h> | |
24 | #include <string.h> | |
86a06318 BP |
25 | #ifdef HAVE_MLOCKALL |
26 | #include <sys/mman.h> | |
27 | #endif | |
064af421 BP |
28 | |
29 | #include "bridge.h" | |
064af421 BP |
30 | #include "command-line.h" |
31 | #include "compiler.h" | |
32 | #include "daemon.h" | |
614c4892 | 33 | #include "dummy.h" |
064af421 | 34 | #include "leak-checker.h" |
8b61709d | 35 | #include "netdev.h" |
76343538 | 36 | #include "ovsdb-idl.h" |
064af421 | 37 | #include "poll-loop.h" |
064af421 BP |
38 | #include "process.h" |
39 | #include "signals.h" | |
fe55ad15 | 40 | #include "stream-ssl.h" |
76343538 | 41 | #include "stream.h" |
cc01d0bb | 42 | #include "stress.h" |
064af421 BP |
43 | #include "svec.h" |
44 | #include "timeval.h" | |
45 | #include "unixctl.h" | |
46 | #include "util.h" | |
064af421 | 47 | #include "vconn.h" |
5136ce49 | 48 | #include "vlog.h" |
76343538 | 49 | #include "vswitchd/vswitch-idl.h" |
064af421 | 50 | |
d98e6007 | 51 | VLOG_DEFINE_THIS_MODULE(vswitchd); |
064af421 | 52 | |
9e15c889 BP |
53 | static unixctl_cb_func ovs_vswitchd_exit; |
54 | ||
76343538 | 55 | static const char *parse_options(int argc, char *argv[]); |
064af421 | 56 | static void usage(void) NO_RETURN; |
064af421 BP |
57 | |
58 | int | |
59 | main(int argc, char *argv[]) | |
60 | { | |
61 | struct unixctl_server *unixctl; | |
62 | struct signal *sighup; | |
76343538 | 63 | const char *remote; |
c5187f17 | 64 | bool exiting; |
064af421 BP |
65 | int retval; |
66 | ||
40f0707c | 67 | proctitle_init(argc, argv); |
064af421 | 68 | set_program_name(argv[0]); |
cc01d0bb | 69 | stress_init_command(); |
76343538 | 70 | remote = parse_options(argc, argv); |
064af421 BP |
71 | signal(SIGPIPE, SIG_IGN); |
72 | sighup = signal_register(SIGHUP); | |
73 | process_init(); | |
bd76d25d | 74 | ovsrec_init(); |
064af421 | 75 | |
95440284 | 76 | daemonize_start(); |
064af421 BP |
77 | |
78 | retval = unixctl_server_create(NULL, &unixctl); | |
79 | if (retval) { | |
4d12270a | 80 | exit(EXIT_FAILURE); |
064af421 | 81 | } |
9e15c889 | 82 | unixctl_command_register("exit", ovs_vswitchd_exit, &exiting); |
064af421 | 83 | |
c5187f17 | 84 | bridge_init(remote); |
9e15c889 BP |
85 | exiting = false; |
86 | while (!exiting) { | |
76343538 | 87 | if (signal_poll(sighup)) { |
064af421 | 88 | vlog_reopen_log_file(); |
064af421 | 89 | } |
c5187f17 | 90 | bridge_run(); |
064af421 | 91 | unixctl_server_run(unixctl); |
8b61709d | 92 | netdev_run(); |
064af421 | 93 | |
064af421 | 94 | signal_wait(sighup); |
c5187f17 | 95 | bridge_wait(); |
064af421 | 96 | unixctl_server_wait(unixctl); |
8b61709d | 97 | netdev_wait(); |
6d37aaf1 BP |
98 | if (exiting) { |
99 | poll_immediate_wake(); | |
100 | } | |
064af421 BP |
101 | poll_block(); |
102 | } | |
ee45ad81 BP |
103 | bridge_exit(); |
104 | unixctl_server_destroy(unixctl); | |
064af421 BP |
105 | |
106 | return 0; | |
107 | } | |
108 | ||
76343538 | 109 | static const char * |
064af421 BP |
110 | parse_options(int argc, char *argv[]) |
111 | { | |
112 | enum { | |
113 | OPT_PEER_CA_CERT = UCHAR_MAX + 1, | |
86a06318 | 114 | OPT_MLOCKALL, |
064af421 | 115 | VLOG_OPTION_ENUMS, |
6f61c75b | 116 | LEAK_CHECKER_OPTION_ENUMS, |
614c4892 | 117 | OPT_BOOTSTRAP_CA_CERT, |
8274ae95 BP |
118 | OPT_ENABLE_DUMMY, |
119 | DAEMON_OPTION_ENUMS | |
064af421 BP |
120 | }; |
121 | static struct option long_options[] = { | |
122 | {"help", no_argument, 0, 'h'}, | |
123 | {"version", no_argument, 0, 'V'}, | |
86a06318 | 124 | {"mlockall", no_argument, 0, OPT_MLOCKALL}, |
064af421 BP |
125 | DAEMON_LONG_OPTIONS, |
126 | VLOG_LONG_OPTIONS, | |
127 | LEAK_CHECKER_LONG_OPTIONS, | |
128 | #ifdef HAVE_OPENSSL | |
fe55ad15 | 129 | STREAM_SSL_LONG_OPTIONS |
064af421 | 130 | {"peer-ca-cert", required_argument, 0, OPT_PEER_CA_CERT}, |
6f61c75b | 131 | {"bootstrap-ca-cert", required_argument, 0, OPT_BOOTSTRAP_CA_CERT}, |
064af421 | 132 | #endif |
614c4892 | 133 | {"enable-dummy", no_argument, 0, OPT_ENABLE_DUMMY}, |
064af421 BP |
134 | {0, 0, 0, 0}, |
135 | }; | |
136 | char *short_options = long_options_to_short_options(long_options); | |
064af421 BP |
137 | |
138 | for (;;) { | |
139 | int c; | |
140 | ||
141 | c = getopt_long(argc, argv, short_options, long_options, NULL); | |
142 | if (c == -1) { | |
143 | break; | |
144 | } | |
145 | ||
146 | switch (c) { | |
147 | case 'H': | |
148 | case 'h': | |
149 | usage(); | |
150 | ||
151 | case 'V': | |
152 | OVS_PRINT_VERSION(OFP_VERSION, OFP_VERSION); | |
153 | exit(EXIT_SUCCESS); | |
154 | ||
86a06318 BP |
155 | case OPT_MLOCKALL: |
156 | #ifdef HAVE_MLOCKALL | |
157 | if (mlockall(MCL_CURRENT | MCL_FUTURE)) { | |
158 | VLOG_ERR("mlockall failed: %s", strerror(errno)); | |
159 | } | |
160 | #else | |
161 | VLOG_ERR("mlockall not supported on this system"); | |
162 | #endif | |
163 | break; | |
164 | ||
064af421 BP |
165 | VLOG_OPTION_HANDLERS |
166 | DAEMON_OPTION_HANDLERS | |
064af421 BP |
167 | LEAK_CHECKER_OPTION_HANDLERS |
168 | ||
169 | #ifdef HAVE_OPENSSL | |
fe55ad15 BP |
170 | STREAM_SSL_OPTION_HANDLERS |
171 | ||
064af421 | 172 | case OPT_PEER_CA_CERT: |
fe55ad15 | 173 | stream_ssl_set_peer_ca_cert_file(optarg); |
064af421 | 174 | break; |
6f61c75b BP |
175 | |
176 | case OPT_BOOTSTRAP_CA_CERT: | |
177 | stream_ssl_set_ca_cert_file(optarg, true); | |
178 | break; | |
064af421 BP |
179 | #endif |
180 | ||
614c4892 BP |
181 | case OPT_ENABLE_DUMMY: |
182 | dummy_enable(); | |
183 | break; | |
184 | ||
064af421 BP |
185 | case '?': |
186 | exit(EXIT_FAILURE); | |
187 | ||
188 | default: | |
189 | abort(); | |
190 | } | |
191 | } | |
192 | free(short_options); | |
193 | ||
194 | argc -= optind; | |
195 | argv += optind; | |
196 | ||
197 | if (argc != 1) { | |
279c9e03 BP |
198 | VLOG_FATAL("database socket is only non-option argument; " |
199 | "use --help for usage"); | |
064af421 BP |
200 | } |
201 | ||
76343538 | 202 | return argv[0]; |
064af421 BP |
203 | } |
204 | ||
205 | static void | |
206 | usage(void) | |
207 | { | |
f30f26be | 208 | printf("%s: Open vSwitch daemon\n" |
76343538 BP |
209 | "usage: %s [OPTIONS] DATABASE\n" |
210 | "where DATABASE is a socket on which ovsdb-server is listening.\n", | |
064af421 | 211 | program_name, program_name); |
9467fe62 | 212 | stream_usage("DATABASE", true, false, true); |
064af421 BP |
213 | daemon_usage(); |
214 | vlog_usage(); | |
0b8b6f71 | 215 | printf("\nOther options:\n" |
064af421 BP |
216 | " -h, --help display this help message\n" |
217 | " -V, --version display version information\n"); | |
218 | leak_checker_usage(); | |
219 | exit(EXIT_SUCCESS); | |
220 | } | |
9e15c889 BP |
221 | |
222 | static void | |
223 | ovs_vswitchd_exit(struct unixctl_conn *conn, const char *args OVS_UNUSED, | |
224 | void *exiting_) | |
225 | { | |
226 | bool *exiting = exiting_; | |
227 | *exiting = true; | |
228 | unixctl_command_reply(conn, 200, NULL); | |
229 | } |