2 * Copyright (c) 2008-2019 Nicira, Inc.
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at:
8 * http://www.apache.org/licenses/LICENSE-2.0
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
18 #include <sys/types.h>
19 #include <netinet/in.h>
20 #include <arpa/inet.h>
23 #include <sys/socket.h>
30 #include "command-line.h"
36 #include "dpif-provider.h"
37 #include "openvswitch/dynamic-string.h"
39 #include "openvswitch/match.h"
43 #include "openvswitch/ofpbuf.h"
45 #include "openvswitch/shash.h"
52 #include "openvswitch/ofp-flow.h"
53 #include "openvswitch/ofp-port.h"
55 typedef int dpctl_command_handler(int argc
, const char *argv
[],
56 struct dpctl_params
*);
57 struct dpctl_command
{
62 dpctl_command_handler
*handler
;
63 enum { DP_RO
, DP_RW
} mode
;
65 static const struct dpctl_command
*get_all_dpctl_commands(void);
66 static void dpctl_print(struct dpctl_params
*dpctl_p
, const char *fmt
, ...)
67 OVS_PRINTF_FORMAT(2, 3);
68 static void dpctl_error(struct dpctl_params
* dpctl_p
, int err_no
,
70 OVS_PRINTF_FORMAT(3, 4);
73 dpctl_puts(struct dpctl_params
*dpctl_p
, bool error
, const char *string
)
75 dpctl_p
->output(dpctl_p
->aux
, error
, string
);
79 dpctl_print(struct dpctl_params
*dpctl_p
, const char *fmt
, ...)
85 string
= xvasprintf(fmt
, args
);
88 dpctl_puts(dpctl_p
, false, string
);
93 dpctl_error(struct dpctl_params
* dpctl_p
, int err_no
, const char *fmt
, ...)
95 const char *subprogram_name
= get_subprogram_name();
96 struct ds ds
= DS_EMPTY_INITIALIZER
;
97 int save_errno
= errno
;
101 if (subprogram_name
[0]) {
102 ds_put_format(&ds
, "%s(%s): ", program_name
,subprogram_name
);
104 ds_put_format(&ds
, "%s: ", program_name
);
108 ds_put_format_valist(&ds
, fmt
, args
);
112 ds_put_format(&ds
, " (%s)", ovs_retval_to_string(err_no
));
114 ds_put_cstr(&ds
, "\n");
116 dpctl_puts(dpctl_p
, true, ds_cstr(&ds
));
123 static int dpctl_add_if(int argc
, const char *argv
[], struct dpctl_params
*);
126 if_up(struct netdev
*netdev
)
128 return netdev_turn_flags_on(netdev
, NETDEV_UP
, NULL
);
131 /* Retrieve the name of the datapath if exactly one exists. The caller
132 * is responsible for freeing the returned string. If a single datapath
133 * name cannot be determined, returns NULL. */
135 get_one_dp(struct dpctl_params
*dpctl_p
)
139 char *dp_name
= NULL
;
143 dp_enumerate_types(&types
);
144 SSET_FOR_EACH (type
, &types
) {
148 if (!dp_enumerate_names(type
, &names
)) {
149 count
+= sset_count(&names
);
150 if (!dp_name
&& count
== 1) {
151 dp_name
= xasprintf("%s@%s", type
, SSET_FIRST(&names
));
154 sset_destroy(&names
);
156 sset_destroy(&types
);
159 dpctl_error(dpctl_p
, 0, "no datapaths exist");
160 } else if (count
> 1) {
161 dpctl_error(dpctl_p
, 0, "multiple datapaths, specify one");
170 parsed_dpif_open(const char *arg_
, bool create
, struct dpif
**dpifp
)
175 dp_parse_name(arg_
, &name
, &type
);
178 result
= dpif_create(name
, type
, dpifp
);
180 result
= dpif_open(name
, type
, dpifp
);
189 dp_exists(const char *queried_dp
)
191 char *queried_name
, *queried_type
;
192 dp_parse_name(queried_dp
, &queried_name
, &queried_type
);
193 struct sset dpif_names
= SSET_INITIALIZER(&dpif_names
),
194 dpif_types
= SSET_INITIALIZER(&dpif_types
);
195 dp_enumerate_types(&dpif_types
);
197 bool found
= (sset_contains(&dpif_types
, queried_type
) &&
198 !dp_enumerate_names(queried_type
, &dpif_names
) &&
199 sset_contains(&dpif_names
, queried_name
));
201 sset_destroy(&dpif_names
);
202 sset_destroy(&dpif_types
);
209 dp_arg_exists(int argc
, const char *argv
[])
211 return argc
> 1 && dp_exists(argv
[1]);
214 /* Open a dpif with an optional name argument.
216 * The datapath name is not a mandatory parameter for this command. If it is
217 * not specified, we retrieve it from the current setup, assuming only one
218 * exists. On success stores the opened dpif in '*dpifp'. */
220 opt_dpif_open(int argc
, const char *argv
[], struct dpctl_params
*dpctl_p
,
221 int max_args
, struct dpif
**dpifp
)
225 if (dp_arg_exists(argc
, argv
)) {
226 dpname
= xstrdup(argv
[1]);
227 } else if (argc
!= max_args
) {
228 dpname
= get_one_dp(dpctl_p
);
230 /* If the arguments are the maximum possible number and there is no
231 * valid datapath argument, then we fall into the case of dpname is
232 * NULL, since this is an error. */
239 dpctl_error(dpctl_p
, error
, "datapath not found");
241 error
= parsed_dpif_open(dpname
, false, dpifp
);
244 dpctl_error(dpctl_p
, error
, "opening datapath");
251 dpctl_add_dp(int argc
, const char *argv
[],
252 struct dpctl_params
*dpctl_p
)
257 error
= parsed_dpif_open(argv
[1], true, &dpif
);
259 dpctl_error(dpctl_p
, error
, "add_dp");
264 error
= dpctl_add_if(argc
, argv
, dpctl_p
);
270 dpctl_del_dp(int argc OVS_UNUSED
, const char *argv
[],
271 struct dpctl_params
*dpctl_p
)
276 error
= parsed_dpif_open(argv
[1], false, &dpif
);
278 dpctl_error(dpctl_p
, error
, "opening datapath");
281 error
= dpif_delete(dpif
);
283 dpctl_error(dpctl_p
, error
, "del_dp");
291 dpctl_add_if(int argc OVS_UNUSED
, const char *argv
[],
292 struct dpctl_params
*dpctl_p
)
295 int i
, error
, lasterror
= 0;
297 error
= parsed_dpif_open(argv
[1], false, &dpif
);
299 dpctl_error(dpctl_p
, error
, "opening datapath");
302 for (i
= 2; i
< argc
; i
++) {
303 const char *name
, *type
;
304 char *save_ptr
= NULL
, *argcopy
;
305 struct netdev
*netdev
= NULL
;
307 odp_port_t port_no
= ODPP_NONE
;
310 argcopy
= xstrdup(argv
[i
]);
311 name
= strtok_r(argcopy
, ",", &save_ptr
);
315 dpctl_error(dpctl_p
, 0, "%s is not a valid network device name",
322 while ((option
= strtok_r(NULL
, ",", &save_ptr
)) != NULL
) {
323 char *save_ptr_2
= NULL
;
326 key
= strtok_r(option
, "=", &save_ptr_2
);
327 value
= strtok_r(NULL
, "", &save_ptr_2
);
332 if (!strcmp(key
, "type")) {
334 } else if (!strcmp(key
, "port_no")) {
335 port_no
= u32_to_odp(atoi(value
));
336 } else if (!smap_add_once(&args
, key
, value
)) {
337 dpctl_error(dpctl_p
, 0, "duplicate \"%s\" option", key
);
341 error
= netdev_open(name
, type
, &netdev
);
343 dpctl_error(dpctl_p
, error
, "%s: failed to open network device",
345 goto next_destroy_args
;
348 error
= netdev_set_config(netdev
, &args
, NULL
);
350 goto next_destroy_args
;
353 error
= dpif_port_add(dpif
, netdev
, &port_no
);
355 dpctl_error(dpctl_p
, error
, "adding %s to %s failed", name
,
357 goto next_destroy_args
;
360 error
= if_up(netdev
);
362 dpctl_error(dpctl_p
, error
, "%s: failed bringing interface up",
367 netdev_close(netdev
);
381 dpctl_set_if(int argc
, const char *argv
[], struct dpctl_params
*dpctl_p
)
384 int i
, error
, lasterror
= 0;
386 error
= parsed_dpif_open(argv
[1], false, &dpif
);
388 dpctl_error(dpctl_p
, error
, "opening datapath");
391 for (i
= 2; i
< argc
; i
++) {
392 struct netdev
*netdev
= NULL
;
393 struct dpif_port dpif_port
;
394 char *save_ptr
= NULL
;
404 argcopy
= xstrdup(argv
[i
]);
405 name
= strtok_r(argcopy
, ",", &save_ptr
);
407 dpctl_error(dpctl_p
, 0, "%s is not a valid network device name",
412 /* Get the port's type from the datapath. */
413 error
= dpif_port_query_by_name(dpif
, name
, &dpif_port
);
415 dpctl_error(dpctl_p
, error
, "%s: failed to query port in %s", name
,
419 type
= xstrdup(dpif_port
.type
);
420 port_no
= dpif_port
.port_no
;
421 dpif_port_destroy(&dpif_port
);
423 /* Retrieve its existing configuration. */
424 error
= netdev_open(name
, type
, &netdev
);
426 dpctl_error(dpctl_p
, error
, "%s: failed to open network device",
432 error
= netdev_get_config(netdev
, &args
);
434 dpctl_error(dpctl_p
, error
, "%s: failed to fetch configuration",
436 goto next_destroy_args
;
439 /* Parse changes to configuration. */
440 while ((option
= strtok_r(NULL
, ",", &save_ptr
)) != NULL
) {
441 char *save_ptr_2
= NULL
;
444 key
= strtok_r(option
, "=", &save_ptr_2
);
445 value
= strtok_r(NULL
, "", &save_ptr_2
);
450 if (!strcmp(key
, "type")) {
451 if (strcmp(value
, type
)) {
452 dpctl_error(dpctl_p
, 0,
453 "%s: can't change type from %s to %s",
456 goto next_destroy_args
;
458 } else if (!strcmp(key
, "port_no")) {
459 if (port_no
!= u32_to_odp(atoi(value
))) {
460 dpctl_error(dpctl_p
, 0, "%s: can't change port number from"
461 " %"PRIu32
" to %d", name
, port_no
, atoi(value
));
463 goto next_destroy_args
;
465 } else if (value
[0] == '\0') {
466 smap_remove(&args
, key
);
468 smap_replace(&args
, key
, value
);
472 /* Update configuration. */
474 error
= netdev_set_config(netdev
, &args
, &err_s
);
475 if (err_s
|| error
) {
476 dpctl_error(dpctl_p
, error
, "%s",
477 err_s
? err_s
: "Error updating configuration");
481 goto next_destroy_args
;
487 netdev_close(netdev
);
500 get_port_number(struct dpif
*dpif
, const char *name
, odp_port_t
*port
,
501 struct dpctl_params
*dpctl_p
)
503 struct dpif_port dpif_port
;
505 if (!dpif_port_query_by_name(dpif
, name
, &dpif_port
)) {
506 *port
= dpif_port
.port_no
;
507 dpif_port_destroy(&dpif_port
);
510 dpctl_error(dpctl_p
, 0, "no port named %s", name
);
516 dpctl_del_if(int argc
, const char *argv
[], struct dpctl_params
*dpctl_p
)
519 int i
, error
, lasterror
= 0;
521 error
= parsed_dpif_open(argv
[1], false, &dpif
);
523 dpctl_error(dpctl_p
, error
, "opening datapath");
526 for (i
= 2; i
< argc
; i
++) {
527 const char *name
= argv
[i
];
530 if (!name
[strspn(name
, "0123456789")]) {
531 port
= u32_to_odp(atoi(name
));
532 } else if (!get_port_number(dpif
, name
, &port
, dpctl_p
)) {
537 error
= dpif_port_del(dpif
, port
, false);
539 dpctl_error(dpctl_p
, error
, "deleting port %s from %s failed",
549 print_stat(struct dpctl_params
*dpctl_p
, const char *leader
, uint64_t value
)
551 dpctl_print(dpctl_p
, "%s", leader
);
552 if (value
!= UINT64_MAX
) {
553 dpctl_print(dpctl_p
, "%"PRIu64
, value
);
555 dpctl_print(dpctl_p
, "?");
560 print_human_size(struct dpctl_params
*dpctl_p
, uint64_t value
)
562 if (value
== UINT64_MAX
) {
564 } else if (value
>= 1024ULL * 1024 * 1024 * 1024) {
565 dpctl_print(dpctl_p
, " (%.1f TiB)",
566 value
/ (1024.0 * 1024 * 1024 * 1024));
567 } else if (value
>= 1024ULL * 1024 * 1024) {
568 dpctl_print(dpctl_p
, " (%.1f GiB)", value
/ (1024.0 * 1024 * 1024));
569 } else if (value
>= 1024ULL * 1024) {
570 dpctl_print(dpctl_p
, " (%.1f MiB)", value
/ (1024.0 * 1024));
571 } else if (value
>= 1024) {
572 dpctl_print(dpctl_p
, " (%.1f KiB)", value
/ 1024.0);
576 /* qsort comparison function. */
578 compare_port_nos(const void *a_
, const void *b_
)
580 const odp_port_t
*ap
= a_
;
581 const odp_port_t
*bp
= b_
;
582 uint32_t a
= odp_to_u32(*ap
);
583 uint32_t b
= odp_to_u32(*bp
);
585 return a
< b
? -1 : a
> b
;
589 show_dpif(struct dpif
*dpif
, struct dpctl_params
*dpctl_p
)
591 struct dpif_port_dump dump
;
592 struct dpif_port dpif_port
;
593 struct dpif_dp_stats stats
;
594 struct netdev
*netdev
;
596 dpctl_print(dpctl_p
, "%s:\n", dpif_name(dpif
));
597 if (!dpif_get_dp_stats(dpif
, &stats
)) {
598 dpctl_print(dpctl_p
, " lookups: hit:%"PRIu64
" missed:%"PRIu64
599 " lost:%"PRIu64
"\n flows: %"PRIu64
"\n",
600 stats
.n_hit
, stats
.n_missed
, stats
.n_lost
, stats
.n_flows
);
601 if (stats
.n_masks
!= UINT32_MAX
) {
602 uint64_t n_pkts
= stats
.n_hit
+ stats
.n_missed
;
603 double avg
= n_pkts
? (double) stats
.n_mask_hit
/ n_pkts
: 0.0;
605 dpctl_print(dpctl_p
, " masks: hit:%"PRIu64
" total:%"PRIu32
607 stats
.n_mask_hit
, stats
.n_masks
, avg
);
611 odp_port_t
*port_nos
= NULL
;
612 size_t allocated_port_nos
= 0, n_port_nos
= 0;
613 DPIF_PORT_FOR_EACH (&dpif_port
, &dump
, dpif
) {
614 if (n_port_nos
>= allocated_port_nos
) {
615 port_nos
= x2nrealloc(port_nos
, &allocated_port_nos
,
619 port_nos
[n_port_nos
] = dpif_port
.port_no
;
624 qsort(port_nos
, n_port_nos
, sizeof *port_nos
, compare_port_nos
);
627 for (int i
= 0; i
< n_port_nos
; i
++) {
628 if (dpif_port_query_by_number(dpif
, port_nos
[i
], &dpif_port
)) {
632 dpctl_print(dpctl_p
, " port %u: %s",
633 dpif_port
.port_no
, dpif_port
.name
);
635 if (strcmp(dpif_port
.type
, "system")) {
638 dpctl_print(dpctl_p
, " (%s", dpif_port
.type
);
640 error
= netdev_open(dpif_port
.name
, dpif_port
.type
, &netdev
);
645 error
= netdev_get_config(netdev
, &config
);
647 const struct smap_node
**nodes
= smap_sort(&config
);
648 for (size_t j
= 0; j
< smap_count(&config
); j
++) {
649 const struct smap_node
*node
= nodes
[j
];
650 dpctl_print(dpctl_p
, "%c %s=%s", j
? ',' : ':',
651 node
->key
, node
->value
);
655 dpctl_print(dpctl_p
, ", could not retrieve configuration "
656 "(%s)", ovs_strerror(error
));
658 smap_destroy(&config
);
660 netdev_close(netdev
);
662 dpctl_print(dpctl_p
, ": open failed (%s)",
663 ovs_strerror(error
));
665 dpctl_print(dpctl_p
, ")");
667 dpctl_print(dpctl_p
, "\n");
669 if (dpctl_p
->print_statistics
) {
670 struct netdev_stats s
;
673 error
= netdev_open(dpif_port
.name
, dpif_port
.type
, &netdev
);
675 dpctl_print(dpctl_p
, ", open failed (%s)",
676 ovs_strerror(error
));
677 dpif_port_destroy(&dpif_port
);
680 error
= netdev_get_stats(netdev
, &s
);
682 netdev_close(netdev
);
683 print_stat(dpctl_p
, " RX packets:", s
.rx_packets
);
684 print_stat(dpctl_p
, " errors:", s
.rx_errors
);
685 print_stat(dpctl_p
, " dropped:", s
.rx_dropped
);
686 print_stat(dpctl_p
, " overruns:", s
.rx_over_errors
);
687 print_stat(dpctl_p
, " frame:", s
.rx_frame_errors
);
688 dpctl_print(dpctl_p
, "\n");
690 print_stat(dpctl_p
, " TX packets:", s
.tx_packets
);
691 print_stat(dpctl_p
, " errors:", s
.tx_errors
);
692 print_stat(dpctl_p
, " dropped:", s
.tx_dropped
);
693 print_stat(dpctl_p
, " aborted:", s
.tx_aborted_errors
);
694 print_stat(dpctl_p
, " carrier:", s
.tx_carrier_errors
);
695 dpctl_print(dpctl_p
, "\n");
697 print_stat(dpctl_p
, " collisions:", s
.collisions
);
698 dpctl_print(dpctl_p
, "\n");
700 print_stat(dpctl_p
, " RX bytes:", s
.rx_bytes
);
701 print_human_size(dpctl_p
, s
.rx_bytes
);
702 print_stat(dpctl_p
, " TX bytes:", s
.tx_bytes
);
703 print_human_size(dpctl_p
, s
.tx_bytes
);
704 dpctl_print(dpctl_p
, "\n");
706 dpctl_print(dpctl_p
, ", could not retrieve stats (%s)",
707 ovs_strerror(error
));
710 dpif_port_destroy(&dpif_port
);
716 typedef void (*dps_for_each_cb
)(struct dpif
*, struct dpctl_params
*);
719 dps_for_each(struct dpctl_params
*dpctl_p
, dps_for_each_cb cb
)
721 struct sset dpif_names
= SSET_INITIALIZER(&dpif_names
),
722 dpif_types
= SSET_INITIALIZER(&dpif_types
);
723 int error
, openerror
= 0, enumerror
= 0;
724 const char *type
, *name
;
725 bool at_least_one
= false;
727 dp_enumerate_types(&dpif_types
);
729 SSET_FOR_EACH (type
, &dpif_types
) {
730 error
= dp_enumerate_names(type
, &dpif_names
);
735 SSET_FOR_EACH (name
, &dpif_names
) {
739 error
= dpif_open(name
, type
, &dpif
);
745 dpctl_error(dpctl_p
, error
, "opening datapath %s failed",
751 sset_destroy(&dpif_names
);
752 sset_destroy(&dpif_types
);
754 /* If there has been an error while opening a datapath it should be
755 * reported. Otherwise, we want to ignore the errors generated by
756 * dp_enumerate_names() if at least one datapath has been discovered,
757 * because they're not interesting for the user. This happens, for
758 * example, if OVS is using a userspace datapath and the kernel module
763 return at_least_one
? 0 : enumerror
;
768 dpctl_show(int argc
, const char *argv
[], struct dpctl_params
*dpctl_p
)
770 int error
, lasterror
= 0;
773 for (i
= 1; i
< argc
; i
++) {
774 const char *name
= argv
[i
];
777 error
= parsed_dpif_open(name
, false, &dpif
);
779 show_dpif(dpif
, dpctl_p
);
782 dpctl_error(dpctl_p
, error
, "opening datapath %s failed",
788 lasterror
= dps_for_each(dpctl_p
, show_dpif
);
795 dump_cb(struct dpif
*dpif
, struct dpctl_params
*dpctl_p
)
797 dpctl_print(dpctl_p
, "%s\n", dpif_name(dpif
));
801 dpctl_dump_dps(int argc OVS_UNUSED
, const char *argv
[] OVS_UNUSED
,
802 struct dpctl_params
*dpctl_p
)
804 return dps_for_each(dpctl_p
, dump_cb
);
808 format_dpif_flow(struct ds
*ds
, const struct dpif_flow
*f
, struct hmap
*ports
,
809 struct dpctl_params
*dpctl_p
)
811 if (dpctl_p
->verbosity
&& f
->ufid_present
) {
812 odp_format_ufid(&f
->ufid
, ds
);
813 ds_put_cstr(ds
, ", ");
815 odp_flow_format(f
->key
, f
->key_len
, f
->mask
, f
->mask_len
, ports
, ds
,
817 ds_put_cstr(ds
, ", ");
819 dpif_flow_stats_format(&f
->stats
, ds
);
820 if (dpctl_p
->verbosity
&& f
->attrs
.offloaded
) {
821 if (f
->attrs
.dp_layer
&& !strcmp(f
->attrs
.dp_layer
, "ovs")) {
822 ds_put_cstr(ds
, ", offloaded:partial");
824 ds_put_cstr(ds
, ", offloaded:yes");
827 if (dpctl_p
->verbosity
&& f
->attrs
.dp_layer
) {
828 ds_put_format(ds
, ", dp:%s", f
->attrs
.dp_layer
);
830 ds_put_cstr(ds
, ", actions:");
831 format_odp_actions(ds
, f
->actions
, f
->actions_len
, ports
);
832 if (dpctl_p
->verbosity
&& f
->attrs
.dp_extra_info
) {
833 ds_put_format(ds
, ", dp-extra-info:%s", f
->attrs
.dp_extra_info
);
843 bool partially_offloaded
;
847 enable_all_dump_types(struct dump_types
*dump_types
)
849 dump_types
->ovs
= true;
850 dump_types
->tc
= true;
851 dump_types
->dpdk
= true;
852 dump_types
->offloaded
= true;
853 dump_types
->non_offloaded
= true;
854 dump_types
->partially_offloaded
= true;
858 populate_dump_types(char *types_list
, struct dump_types
*dump_types
,
859 struct dpctl_params
*dpctl_p
)
862 enable_all_dump_types(dump_types
);
868 while (types_list
&& types_list
[0] != '\0') {
869 current_type
= types_list
;
870 size_t type_len
= strcspn(current_type
, ",");
872 types_list
+= type_len
+ (types_list
[type_len
] != '\0');
873 current_type
[type_len
] = '\0';
875 if (!strcmp(current_type
, "ovs")) {
876 dump_types
->ovs
= true;
877 } else if (!strcmp(current_type
, "tc")) {
878 dump_types
->tc
= true;
879 } else if (!strcmp(current_type
, "dpdk")) {
880 dump_types
->dpdk
= true;
881 } else if (!strcmp(current_type
, "offloaded")) {
882 dump_types
->offloaded
= true;
883 } else if (!strcmp(current_type
, "non-offloaded")) {
884 dump_types
->non_offloaded
= true;
885 } else if (!strcmp(current_type
, "partially-offloaded")) {
886 dump_types
->partially_offloaded
= true;
887 } else if (!strcmp(current_type
, "all")) {
888 enable_all_dump_types(dump_types
);
890 dpctl_error(dpctl_p
, EINVAL
, "Failed to parse type (%s)",
899 determine_dpif_flow_dump_types(struct dump_types
*dump_types
,
900 struct dpif_flow_dump_types
*dpif_dump_types
)
902 dpif_dump_types
->ovs_flows
= dump_types
->ovs
|| dump_types
->non_offloaded
;
903 dpif_dump_types
->netdev_flows
= dump_types
->tc
|| dump_types
->offloaded
904 || dump_types
->non_offloaded
906 || dump_types
->partially_offloaded
;
910 flow_passes_type_filter(const struct dpif_flow
*f
,
911 struct dump_types
*dump_types
)
913 if (dump_types
->ovs
&& !strcmp(f
->attrs
.dp_layer
, "ovs")) {
916 if (dump_types
->tc
&& !strcmp(f
->attrs
.dp_layer
, "tc")) {
919 if (dump_types
->dpdk
&& !strcmp(f
->attrs
.dp_layer
, "dpdk")) {
922 if (dump_types
->offloaded
&& f
->attrs
.offloaded
&&
923 strcmp(f
->attrs
.dp_layer
, "ovs")) {
926 if (dump_types
->partially_offloaded
&& f
->attrs
.offloaded
&&
927 !strcmp(f
->attrs
.dp_layer
, "ovs")) {
930 if (dump_types
->non_offloaded
&& !(f
->attrs
.offloaded
)) {
937 dpctl_get_portno_names(struct dpif
*dpif
, const struct dpctl_params
*dpctl_p
)
939 if (dpctl_p
->names
) {
940 struct hmap
*portno_names
= xmalloc(sizeof *portno_names
);
941 hmap_init(portno_names
);
943 struct dpif_port_dump port_dump
;
944 struct dpif_port dpif_port
;
945 DPIF_PORT_FOR_EACH (&dpif_port
, &port_dump
, dpif
) {
946 odp_portno_names_set(portno_names
, dpif_port
.port_no
,
957 dpctl_free_portno_names(struct hmap
*portno_names
)
960 odp_portno_names_destroy(portno_names
);
961 hmap_destroy(portno_names
);
967 dpctl_dump_flows(int argc
, const char *argv
[], struct dpctl_params
*dpctl_p
)
973 struct flow flow_filter
;
974 struct flow_wildcards wc_filter
;
975 char *types_list
= NULL
;
976 struct dump_types dump_types
;
977 struct dpif_flow_dump_types dpif_dump_types
;
979 struct dpif_flow_dump_thread
*flow_dump_thread
;
980 struct dpif_flow_dump
*flow_dump
;
982 int pmd_id
= PMD_ID_NULL
;
986 while (argc
> 1 && lastargc
!= argc
) {
988 if (!strncmp(argv
[argc
- 1], "filter=", 7) && !filter
) {
989 filter
= xstrdup(argv
[--argc
] + 7);
990 } else if (!strncmp(argv
[argc
- 1], "type=", 5) && !types_list
) {
991 if (!dpctl_p
->is_appctl
) {
992 dpctl_error(dpctl_p
, 0,
993 "Invalid argument 'type'. "
994 "Use 'ovs-appctl dpctl/dump-flows' instead.");
998 types_list
= xstrdup(argv
[--argc
] + 5);
1002 error
= opt_dpif_open(argc
, argv
, dpctl_p
, 2, &dpif
);
1007 struct hmap
*portno_names
= dpctl_get_portno_names(dpif
, dpctl_p
);
1010 struct ofputil_port_map port_map
;
1011 ofputil_port_map_init(&port_map
);
1013 struct dpif_port_dump port_dump
;
1014 struct dpif_port dpif_port
;
1015 DPIF_PORT_FOR_EACH (&dpif_port
, &port_dump
, dpif
) {
1016 ofputil_port_map_put(&port_map
,
1017 u16_to_ofp(odp_to_u32(dpif_port
.port_no
)),
1020 char *err
= parse_ofp_exact_flow(&flow_filter
, &wc_filter
, NULL
,
1022 ofputil_port_map_destroy(&port_map
);
1024 dpctl_error(dpctl_p
, 0, "Failed to parse filter (%s)", err
);
1031 memset(&dump_types
, 0, sizeof dump_types
);
1032 error
= populate_dump_types(types_list
, &dump_types
, dpctl_p
);
1036 determine_dpif_flow_dump_types(&dump_types
, &dpif_dump_types
);
1038 /* Make sure that these values are different. PMD_ID_NULL means that the
1039 * pmd is unspecified (e.g. because the datapath doesn't have different
1040 * pmd threads), while NON_PMD_CORE_ID refers to every non pmd threads
1041 * in the userspace datapath */
1042 BUILD_ASSERT(PMD_ID_NULL
!= NON_PMD_CORE_ID
);
1045 memset(&f
, 0, sizeof f
);
1046 flow_dump
= dpif_flow_dump_create(dpif
, false, &dpif_dump_types
);
1047 flow_dump_thread
= dpif_flow_dump_thread_create(flow_dump
);
1048 while (dpif_flow_dump_next(flow_dump_thread
, &f
, 1)) {
1051 struct flow_wildcards wc
;
1052 struct match match
, match_filter
;
1053 struct minimatch minimatch
;
1055 odp_flow_key_to_flow(f
.key
, f
.key_len
, &flow
, NULL
);
1056 odp_flow_key_to_mask(f
.mask
, f
.mask_len
, &wc
, &flow
, NULL
);
1057 match_init(&match
, &flow
, &wc
);
1059 match_init(&match_filter
, &flow_filter
, &wc
);
1060 match_init(&match_filter
, &match_filter
.flow
, &wc_filter
);
1061 minimatch_init(&minimatch
, &match_filter
);
1063 if (!minimatch_matches_flow(&minimatch
, &match
.flow
)) {
1064 minimatch_destroy(&minimatch
);
1067 minimatch_destroy(&minimatch
);
1070 /* If 'pmd_id' is specified, overlapping flows could be dumped from
1071 * different pmd threads. So, separates dumps from different pmds
1072 * by printing a title line. */
1073 if (pmd_id
!= f
.pmd_id
) {
1074 if (f
.pmd_id
== NON_PMD_CORE_ID
) {
1075 ds_put_format(&ds
, "flow-dump from the main thread:\n");
1077 ds_put_format(&ds
, "flow-dump from pmd on cpu core: %d\n",
1082 if (flow_passes_type_filter(&f
, &dump_types
)) {
1083 format_dpif_flow(&ds
, &f
, portno_names
, dpctl_p
);
1084 dpctl_print(dpctl_p
, "%s\n", ds_cstr(&ds
));
1087 dpif_flow_dump_thread_destroy(flow_dump_thread
);
1088 error
= dpif_flow_dump_destroy(flow_dump
);
1091 dpctl_error(dpctl_p
, error
, "Failed to dump flows from datapath");
1096 dpctl_free_portno_names(portno_names
);
1105 dpctl_put_flow(int argc
, const char *argv
[], enum dpif_flow_put_flags flags
,
1106 struct dpctl_params
*dpctl_p
)
1108 const char *key_s
= argv
[argc
- 2];
1109 const char *actions_s
= argv
[argc
- 1];
1110 struct dpif_flow_stats stats
;
1111 struct dpif_port dpif_port
;
1112 struct dpif_port_dump port_dump
;
1113 struct ofpbuf actions
;
1119 struct simap port_names
;
1122 error
= opt_dpif_open(argc
, argv
, dpctl_p
, 4, &dpif
);
1127 ufid_present
= false;
1128 n
= odp_ufid_from_string(key_s
, &ufid
);
1130 dpctl_error(dpctl_p
, -n
, "parsing flow ufid");
1134 ufid_present
= true;
1137 simap_init(&port_names
);
1138 DPIF_PORT_FOR_EACH (&dpif_port
, &port_dump
, dpif
) {
1139 simap_put(&port_names
, dpif_port
.name
, odp_to_u32(dpif_port
.port_no
));
1142 ofpbuf_init(&key
, 0);
1143 ofpbuf_init(&mask
, 0);
1145 error
= odp_flow_from_string(key_s
, &port_names
, &key
, &mask
, &error_s
);
1146 simap_destroy(&port_names
);
1148 dpctl_error(dpctl_p
, error
, "parsing flow key (%s)", error_s
);
1150 goto out_freekeymask
;
1153 ofpbuf_init(&actions
, 0);
1154 error
= odp_actions_from_string(actions_s
, NULL
, &actions
);
1156 dpctl_error(dpctl_p
, error
, "parsing actions");
1157 goto out_freeactions
;
1160 /* The flow will be added on all pmds currently in the datapath. */
1161 error
= dpif_flow_put(dpif
, flags
,
1163 mask
.size
== 0 ? NULL
: mask
.data
,
1164 mask
.size
, actions
.data
,
1165 actions
.size
, ufid_present
? &ufid
: NULL
,
1167 dpctl_p
->print_statistics
? &stats
: NULL
);
1170 dpctl_error(dpctl_p
, error
, "updating flow table");
1171 goto out_freeactions
;
1174 if (dpctl_p
->print_statistics
) {
1178 dpif_flow_stats_format(&stats
, &s
);
1179 dpctl_print(dpctl_p
, "%s\n", ds_cstr(&s
));
1184 ofpbuf_uninit(&actions
);
1186 ofpbuf_uninit(&mask
);
1187 ofpbuf_uninit(&key
);
1193 dpctl_add_flow(int argc
, const char *argv
[], struct dpctl_params
*dpctl_p
)
1195 return dpctl_put_flow(argc
, argv
, DPIF_FP_CREATE
, dpctl_p
);
1199 dpctl_mod_flow(int argc
, const char *argv
[], struct dpctl_params
*dpctl_p
)
1201 enum dpif_flow_put_flags flags
;
1203 flags
= DPIF_FP_MODIFY
;
1204 if (dpctl_p
->may_create
) {
1205 flags
|= DPIF_FP_CREATE
;
1207 if (dpctl_p
->zero_statistics
) {
1208 flags
|= DPIF_FP_ZERO_STATS
;
1211 return dpctl_put_flow(argc
, argv
, flags
, dpctl_p
);
1215 dpctl_get_flow(int argc
, const char *argv
[], struct dpctl_params
*dpctl_p
)
1217 const char *key_s
= argv
[argc
- 1];
1218 struct dpif_flow flow
;
1222 uint64_t stub
[DPIF_FLOW_BUFSIZE
/ 8];
1226 error
= opt_dpif_open(argc
, argv
, dpctl_p
, 3, &dpif
);
1231 ofpbuf_use_stub(&buf
, &stub
, sizeof stub
);
1233 struct hmap
*portno_names
= dpctl_get_portno_names(dpif
, dpctl_p
);
1235 n
= odp_ufid_from_string(key_s
, &ufid
);
1237 dpctl_error(dpctl_p
, -n
, "parsing flow ufid");
1241 /* In case of PMD will be returned flow from first PMD thread with match. */
1242 error
= dpif_flow_get(dpif
, NULL
, 0, &ufid
, PMD_ID_NULL
, &buf
, &flow
);
1244 dpctl_error(dpctl_p
, error
, "getting flow");
1249 format_dpif_flow(&ds
, &flow
, portno_names
, dpctl_p
);
1250 dpctl_print(dpctl_p
, "%s\n", ds_cstr(&ds
));
1254 dpctl_free_portno_names(portno_names
);
1255 ofpbuf_uninit(&buf
);
1261 dpctl_del_flow(int argc
, const char *argv
[], struct dpctl_params
*dpctl_p
)
1263 const char *key_s
= argv
[argc
- 1];
1264 struct dpif_flow_stats stats
;
1265 struct dpif_port dpif_port
;
1266 struct dpif_port_dump port_dump
;
1268 struct ofpbuf mask
; /* To be ignored. */
1272 struct simap port_names
;
1275 error
= opt_dpif_open(argc
, argv
, dpctl_p
, 3, &dpif
);
1280 ufid_present
= false;
1281 n
= odp_ufid_from_string(key_s
, &ufid
);
1283 dpctl_error(dpctl_p
, -n
, "parsing flow ufid");
1287 ufid_present
= true;
1290 simap_init(&port_names
);
1291 DPIF_PORT_FOR_EACH (&dpif_port
, &port_dump
, dpif
) {
1292 simap_put(&port_names
, dpif_port
.name
, odp_to_u32(dpif_port
.port_no
));
1295 ofpbuf_init(&key
, 0);
1296 ofpbuf_init(&mask
, 0);
1299 error
= odp_flow_from_string(key_s
, &port_names
, &key
, &mask
, &error_s
);
1301 dpctl_error(dpctl_p
, error
, "%s", error_s
);
1306 /* The flow will be deleted from all pmds currently in the datapath. */
1307 error
= dpif_flow_del(dpif
, key
.data
, key
.size
,
1308 ufid_present
? &ufid
: NULL
, PMD_ID_NULL
,
1309 dpctl_p
->print_statistics
? &stats
: NULL
);
1312 dpctl_error(dpctl_p
, error
, "deleting flow");
1313 if (error
== ENOENT
&& !ufid_present
) {
1317 ds_put_format(&s
, "Perhaps you need to specify a UFID?");
1318 dpctl_print(dpctl_p
, "%s\n", ds_cstr(&s
));
1324 if (dpctl_p
->print_statistics
) {
1328 dpif_flow_stats_format(&stats
, &s
);
1329 dpctl_print(dpctl_p
, "%s\n", ds_cstr(&s
));
1334 ofpbuf_uninit(&mask
);
1335 ofpbuf_uninit(&key
);
1336 simap_destroy(&port_names
);
1342 dpctl_del_flows(int argc
, const char *argv
[], struct dpctl_params
*dpctl_p
)
1346 int error
= opt_dpif_open(argc
, argv
, dpctl_p
, 2, &dpif
);
1351 error
= dpif_flow_flush(dpif
);
1353 dpctl_error(dpctl_p
, error
, "deleting all flows");
1360 dpctl_help(int argc OVS_UNUSED
, const char *argv
[] OVS_UNUSED
,
1361 struct dpctl_params
*dpctl_p
)
1363 if (dpctl_p
->usage
) {
1364 dpctl_p
->usage(dpctl_p
->aux
);
1371 dpctl_list_commands(int argc OVS_UNUSED
, const char *argv
[] OVS_UNUSED
,
1372 struct dpctl_params
*dpctl_p
)
1374 struct ds ds
= DS_EMPTY_INITIALIZER
;
1375 const struct dpctl_command
*commands
= get_all_dpctl_commands();
1377 ds_put_cstr(&ds
, "The available commands are:\n");
1378 for (; commands
->name
; commands
++) {
1379 const struct dpctl_command
*c
= commands
;
1381 if (dpctl_p
->is_appctl
&& !strcmp(c
->name
, "help")) {
1385 ds_put_format(&ds
, " %s%-23s %s\n", dpctl_p
->is_appctl
? "dpctl/" : "",
1388 dpctl_puts(dpctl_p
, false, ds
.string
);
1396 dpctl_dump_conntrack(int argc
, const char *argv
[],
1397 struct dpctl_params
*dpctl_p
)
1399 struct ct_dpif_dump_state
*dump
;
1400 struct ct_dpif_entry cte
;
1401 uint16_t zone
, *pzone
= NULL
;
1406 if (argc
> 1 && ovs_scan(argv
[argc
- 1], "zone=%"SCNu16
, &zone
)) {
1411 error
= opt_dpif_open(argc
, argv
, dpctl_p
, 2, &dpif
);
1416 error
= ct_dpif_dump_start(dpif
, &dump
, pzone
, &tot_bkts
);
1418 dpctl_error(dpctl_p
, error
, "starting conntrack dump");
1423 while (!(error
= ct_dpif_dump_next(dump
, &cte
))) {
1424 struct ds s
= DS_EMPTY_INITIALIZER
;
1426 ct_dpif_format_entry(&cte
, &s
, dpctl_p
->verbosity
,
1427 dpctl_p
->print_statistics
);
1428 ct_dpif_entry_uninit(&cte
);
1430 dpctl_print(dpctl_p
, "%s\n", ds_cstr(&s
));
1434 /* Any CT entry was dumped with no issue. */
1437 dpctl_error(dpctl_p
, error
, "dumping conntrack entry");
1440 ct_dpif_dump_done(dump
);
1446 dpctl_flush_conntrack(int argc
, const char *argv
[],
1447 struct dpctl_params
*dpctl_p
)
1449 struct dpif
*dpif
= NULL
;
1450 struct ct_dpif_tuple tuple
, *ptuple
= NULL
;
1451 struct ds ds
= DS_EMPTY_INITIALIZER
;
1452 uint16_t zone
, *pzone
= NULL
;
1454 int args
= argc
- 1;
1456 /* Parse ct tuple */
1457 if (args
&& ct_dpif_parse_tuple(&tuple
, argv
[args
], &ds
)) {
1463 if (args
&& ovs_scan(argv
[args
], "zone=%"SCNu16
, &zone
)) {
1468 /* Report error if there are more than one unparsed argument. */
1470 ds_put_cstr(&ds
, "invalid arguments");
1475 error
= opt_dpif_open(argc
, argv
, dpctl_p
, 4, &dpif
);
1480 error
= ct_dpif_flush(dpif
, pzone
, ptuple
);
1485 ds_put_cstr(&ds
, "failed to flush conntrack");
1489 dpctl_error(dpctl_p
, error
, "%s", ds_cstr(&ds
));
1496 dpctl_ct_stats_show(int argc
, const char *argv
[],
1497 struct dpctl_params
*dpctl_p
)
1500 struct ct_dpif_dump_state
*dump
;
1501 struct ct_dpif_entry cte
;
1502 uint16_t zone
, *pzone
= NULL
;
1506 int proto_stats
[CT_STATS_MAX
];
1507 int tcp_conn_per_states
[CT_DPIF_TCPS_MAX_NUM
];
1510 bool verbose
= dpctl_p
->verbosity
;
1512 while (argc
> 1 && lastargc
!= argc
) {
1514 if (!strncmp(argv
[argc
- 1], "verbose", 7)) {
1515 /* Support "verbose" argument for backwards compatibility. */
1518 } else if (!strncmp(argv
[argc
- 1], "zone=", 5)) {
1519 if (ovs_scan(argv
[argc
- 1], "zone=%"SCNu16
, &zone
)) {
1526 error
= opt_dpif_open(argc
, argv
, dpctl_p
, 2, &dpif
);
1531 memset(proto_stats
, 0, sizeof(proto_stats
));
1532 memset(tcp_conn_per_states
, 0, sizeof(tcp_conn_per_states
));
1533 error
= ct_dpif_dump_start(dpif
, &dump
, pzone
, &tot_bkts
);
1535 dpctl_error(dpctl_p
, error
, "starting conntrack dump");
1541 while (!(error
= ct_dpif_dump_next(dump
, &cte
))) {
1542 ct_dpif_entry_uninit(&cte
);
1544 switch (cte
.tuple_orig
.ip_proto
) {
1546 proto_stats
[CT_STATS_ICMP
]++;
1548 case IPPROTO_ICMPV6
:
1549 proto_stats
[CT_STATS_ICMPV6
]++;
1552 proto_stats
[CT_STATS_TCP
]++;
1554 /* We keep two separate tcp states, but we print just one. The
1555 * Linux kernel connection tracker internally keeps only one state,
1556 * so 'state_orig' and 'state_reply', will be the same. */
1557 tcp_state
= MAX(cte
.protoinfo
.tcp
.state_orig
,
1558 cte
.protoinfo
.tcp
.state_reply
);
1559 tcp_state
= ct_dpif_coalesce_tcp_state(tcp_state
);
1560 tcp_conn_per_states
[tcp_state
]++;
1563 proto_stats
[CT_STATS_UDP
]++;
1566 proto_stats
[CT_STATS_SCTP
]++;
1568 case IPPROTO_UDPLITE
:
1569 proto_stats
[CT_STATS_UDPLITE
]++;
1572 proto_stats
[CT_STATS_DCCP
]++;
1575 proto_stats
[CT_STATS_IGMP
]++;
1578 proto_stats
[CT_STATS_OTHER
]++;
1583 /* All CT entries were dumped with no issue. */
1586 dpctl_error(dpctl_p
, error
, "dumping conntrack entry");
1587 /* Fall through to show any other info we collected. */
1590 dpctl_print(dpctl_p
, "Connections Stats:\n Total: %d\n", tot_conn
);
1591 if (proto_stats
[CT_STATS_TCP
]) {
1592 dpctl_print(dpctl_p
, " TCP: %d\n", proto_stats
[CT_STATS_TCP
]);
1594 dpctl_print(dpctl_p
, " Conn per TCP states:\n");
1595 for (int i
= 0; i
< CT_DPIF_TCPS_MAX_NUM
; i
++) {
1596 if (tcp_conn_per_states
[i
]) {
1597 struct ds s
= DS_EMPTY_INITIALIZER
;
1598 ct_dpif_format_tcp_stat(&s
, i
, tcp_conn_per_states
[i
]);
1599 dpctl_print(dpctl_p
, "%s\n", ds_cstr(&s
));
1605 if (proto_stats
[CT_STATS_UDP
]) {
1606 dpctl_print(dpctl_p
, " UDP: %d\n", proto_stats
[CT_STATS_UDP
]);
1608 if (proto_stats
[CT_STATS_UDPLITE
]) {
1609 dpctl_print(dpctl_p
, " UDPLITE: %d\n", proto_stats
[CT_STATS_UDPLITE
]);
1611 if (proto_stats
[CT_STATS_SCTP
]) {
1612 dpctl_print(dpctl_p
, " SCTP: %d\n", proto_stats
[CT_STATS_SCTP
]);
1614 if (proto_stats
[CT_STATS_ICMP
]) {
1615 dpctl_print(dpctl_p
, " ICMP: %d\n", proto_stats
[CT_STATS_ICMP
]);
1617 if (proto_stats
[CT_STATS_DCCP
]) {
1618 dpctl_print(dpctl_p
, " DCCP: %d\n", proto_stats
[CT_STATS_DCCP
]);
1620 if (proto_stats
[CT_STATS_IGMP
]) {
1621 dpctl_print(dpctl_p
, " IGMP: %d\n", proto_stats
[CT_STATS_IGMP
]);
1623 if (proto_stats
[CT_STATS_OTHER
]) {
1624 dpctl_print(dpctl_p
, " Other: %d\n", proto_stats
[CT_STATS_OTHER
]);
1627 ct_dpif_dump_done(dump
);
1632 #define CT_BKTS_GT "gt="
1634 dpctl_ct_bkts(int argc
, const char *argv
[],
1635 struct dpctl_params
*dpctl_p
)
1638 struct ct_dpif_dump_state
*dump
;
1639 struct ct_dpif_entry cte
;
1640 uint16_t gt
= 0; /* Threshold: display value when greater than gt. */
1641 uint16_t *pzone
= NULL
;
1645 if (argc
> 1 && !strncmp(argv
[argc
- 1], CT_BKTS_GT
, strlen(CT_BKTS_GT
))) {
1646 if (ovs_scan(argv
[argc
- 1], CT_BKTS_GT
"%"SCNu16
, >
)) {
1651 error
= opt_dpif_open(argc
, argv
, dpctl_p
, 2, &dpif
);
1656 error
= ct_dpif_dump_start(dpif
, &dump
, pzone
, &tot_bkts
);
1658 dpctl_error(dpctl_p
, error
, "starting conntrack dump");
1662 if (tot_bkts
== -1) {
1663 /* Command not available when called by kernel OvS. */
1664 dpctl_print(dpctl_p
,
1665 "Command is available for UserSpace ConnTracker only.\n");
1666 ct_dpif_dump_done(dump
);
1671 dpctl_print(dpctl_p
, "Total Buckets: %d\n", tot_bkts
);
1674 uint32_t *conn_per_bkts
= xzalloc(tot_bkts
* sizeof(uint32_t));
1676 while (!(error
= ct_dpif_dump_next(dump
, &cte
))) {
1677 ct_dpif_entry_uninit(&cte
);
1680 if (cte
.bkt
< tot_bkts
) {
1681 conn_per_bkts
[cte
.bkt
]++;
1683 dpctl_print(dpctl_p
, "Bucket nr out of range: %d >= %d\n",
1689 /* All CT entries were dumped with no issue. */
1692 dpctl_error(dpctl_p
, error
, "dumping conntrack entry");
1693 /* Fall through and display all the collected info. */
1696 dpctl_print(dpctl_p
, "Current Connections: %d\n", tot_conn
);
1697 dpctl_print(dpctl_p
, "\n");
1698 if (tot_bkts
&& tot_conn
) {
1699 dpctl_print(dpctl_p
, "+-----------+"
1700 "-----------------------------------------+\n");
1701 dpctl_print(dpctl_p
, "| Buckets |"
1702 " Connections per Buckets |\n");
1703 dpctl_print(dpctl_p
, "+-----------+"
1704 "-----------------------------------------+");
1705 #define NUM_BKTS_DIPLAYED_PER_ROW 8
1706 for (int i
= 0; i
< tot_bkts
; i
++) {
1707 if (i
% NUM_BKTS_DIPLAYED_PER_ROW
== 0) {
1708 dpctl_print(dpctl_p
, "\n %3d..%3d | ",
1709 i
, i
+ NUM_BKTS_DIPLAYED_PER_ROW
- 1);
1711 if (conn_per_bkts
[i
] > gt
) {
1712 dpctl_print(dpctl_p
, "%5d", conn_per_bkts
[i
]);
1714 dpctl_print(dpctl_p
, "%5s", ".");
1717 dpctl_print(dpctl_p
, "\n\n");
1720 ct_dpif_dump_done(dump
);
1722 free(conn_per_bkts
);
1727 dpctl_ct_set_maxconns(int argc
, const char *argv
[],
1728 struct dpctl_params
*dpctl_p
)
1731 int error
= opt_dpif_open(argc
, argv
, dpctl_p
, 3, &dpif
);
1734 if (ovs_scan(argv
[argc
- 1], "%"SCNu32
, &maxconns
)) {
1735 error
= ct_dpif_set_maxconns(dpif
, maxconns
);
1738 dpctl_print(dpctl_p
, "setting maxconns successful");
1740 dpctl_error(dpctl_p
, error
, "ct set maxconns failed");
1744 dpctl_error(dpctl_p
, error
, "maxconns missing or malformed");
1753 dpctl_ct_get_maxconns(int argc
, const char *argv
[],
1754 struct dpctl_params
*dpctl_p
)
1757 int error
= opt_dpif_open(argc
, argv
, dpctl_p
, 2, &dpif
);
1760 error
= ct_dpif_get_maxconns(dpif
, &maxconns
);
1763 dpctl_print(dpctl_p
, "%u\n", maxconns
);
1765 dpctl_error(dpctl_p
, error
, "maxconns could not be retrieved");
1774 dpctl_ct_get_nconns(int argc
, const char *argv
[],
1775 struct dpctl_params
*dpctl_p
)
1778 int error
= opt_dpif_open(argc
, argv
, dpctl_p
, 2, &dpif
);
1781 error
= ct_dpif_get_nconns(dpif
, &nconns
);
1784 dpctl_print(dpctl_p
, "%u\n", nconns
);
1786 dpctl_error(dpctl_p
, error
, "nconns could not be retrieved");
1795 dpctl_ct_set_tcp_seq_chk__(int argc
, const char *argv
[],
1796 struct dpctl_params
*dpctl_p
, bool enabled
)
1799 int error
= opt_dpif_open(argc
, argv
, dpctl_p
, 3, &dpif
);
1801 error
= ct_dpif_set_tcp_seq_chk(dpif
, enabled
);
1803 dpctl_print(dpctl_p
,
1804 "%s TCP sequence checking successful",
1805 enabled
? "enabling" : "disabling");
1807 dpctl_error(dpctl_p
, error
,
1808 "%s TCP sequence checking failed",
1809 enabled
? "enabling" : "disabling");
1817 dpctl_ct_enable_tcp_seq_chk(int argc
, const char *argv
[],
1818 struct dpctl_params
*dpctl_p
)
1820 return dpctl_ct_set_tcp_seq_chk__(argc
, argv
, dpctl_p
, true);
1824 dpctl_ct_disable_tcp_seq_chk(int argc
, const char *argv
[],
1825 struct dpctl_params
*dpctl_p
)
1827 return dpctl_ct_set_tcp_seq_chk__(argc
, argv
, dpctl_p
, false);
1831 dpctl_ct_get_tcp_seq_chk(int argc
, const char *argv
[],
1832 struct dpctl_params
*dpctl_p
)
1835 int error
= opt_dpif_open(argc
, argv
, dpctl_p
, 2, &dpif
);
1838 error
= ct_dpif_get_tcp_seq_chk(dpif
, &enabled
);
1840 dpctl_print(dpctl_p
, "TCP sequence checking: %s\n",
1841 enabled
? "enabled" : "disabled");
1843 dpctl_error(dpctl_p
, error
, "TCP sequence checking query failed");
1851 dpctl_ct_set_limits(int argc
, const char *argv
[],
1852 struct dpctl_params
*dpctl_p
)
1855 struct ds ds
= DS_EMPTY_INITIALIZER
;
1856 int i
= dp_arg_exists(argc
, argv
) ? 2 : 1;
1857 uint32_t default_limit
, *p_default_limit
= NULL
;
1858 struct ovs_list zone_limits
= OVS_LIST_INITIALIZER(&zone_limits
);
1860 int error
= opt_dpif_open(argc
, argv
, dpctl_p
, INT_MAX
, &dpif
);
1865 /* Parse default limit */
1866 if (!strncmp(argv
[i
], "default=", 8)) {
1867 if (ovs_scan(argv
[i
], "default=%"SCNu32
, &default_limit
)) {
1868 p_default_limit
= &default_limit
;
1871 ds_put_cstr(&ds
, "invalid default limit");
1877 /* Parse ct zone limit tuples */
1881 if (!ct_dpif_parse_zone_limit_tuple(argv
[i
++], &zone
, &limit
, &ds
)) {
1885 ct_dpif_push_zone_limit(&zone_limits
, zone
, limit
, 0);
1888 error
= ct_dpif_set_limits(dpif
, p_default_limit
, &zone_limits
);
1890 ct_dpif_free_zone_limits(&zone_limits
);
1894 ds_put_cstr(&ds
, "failed to set conntrack limit");
1898 dpctl_error(dpctl_p
, error
, "%s", ds_cstr(&ds
));
1900 ct_dpif_free_zone_limits(&zone_limits
);
1906 parse_ct_limit_zones(const char *argv
, struct ovs_list
*zone_limits
,
1909 char *save_ptr
= NULL
, *argcopy
, *next_zone
;
1912 if (strncmp(argv
, "zone=", 5)) {
1913 ds_put_format(ds
, "invalid argument %s", argv
);
1917 argcopy
= xstrdup(argv
+ 5);
1918 next_zone
= strtok_r(argcopy
, ",", &save_ptr
);
1921 if (ovs_scan(next_zone
, "%"SCNu16
, &zone
)) {
1922 ct_dpif_push_zone_limit(zone_limits
, zone
, 0, 0);
1924 ds_put_cstr(ds
, "invalid zone");
1928 } while ((next_zone
= strtok_r(NULL
, ",", &save_ptr
)) != NULL
);
1935 dpctl_ct_del_limits(int argc
, const char *argv
[],
1936 struct dpctl_params
*dpctl_p
)
1939 struct ds ds
= DS_EMPTY_INITIALIZER
;
1941 int i
= dp_arg_exists(argc
, argv
) ? 2 : 1;
1942 struct ovs_list zone_limits
= OVS_LIST_INITIALIZER(&zone_limits
);
1944 error
= opt_dpif_open(argc
, argv
, dpctl_p
, 3, &dpif
);
1949 error
= parse_ct_limit_zones(argv
[i
], &zone_limits
, &ds
);
1954 error
= ct_dpif_del_limits(dpif
, &zone_limits
);
1958 ds_put_cstr(&ds
, "failed to delete conntrack limit");
1962 dpctl_error(dpctl_p
, error
, "%s", ds_cstr(&ds
));
1965 ct_dpif_free_zone_limits(&zone_limits
);
1971 dpctl_ct_get_limits(int argc
, const char *argv
[],
1972 struct dpctl_params
*dpctl_p
)
1975 struct ds ds
= DS_EMPTY_INITIALIZER
;
1976 uint32_t default_limit
;
1977 int i
= dp_arg_exists(argc
, argv
) ? 2 : 1;
1978 struct ovs_list list_query
= OVS_LIST_INITIALIZER(&list_query
);
1979 struct ovs_list list_reply
= OVS_LIST_INITIALIZER(&list_reply
);
1981 int error
= opt_dpif_open(argc
, argv
, dpctl_p
, 3, &dpif
);
1987 error
= parse_ct_limit_zones(argv
[i
], &list_query
, &ds
);
1993 error
= ct_dpif_get_limits(dpif
, &default_limit
, &list_query
,
1996 ct_dpif_format_zone_limits(default_limit
, &list_reply
, &ds
);
1997 dpctl_print(dpctl_p
, "%s\n", ds_cstr(&ds
));
2000 ds_put_format(&ds
, "failed to get conntrack limit %s",
2001 ovs_strerror(error
));
2005 dpctl_error(dpctl_p
, error
, "%s", ds_cstr(&ds
));
2008 ct_dpif_free_zone_limits(&list_query
);
2009 ct_dpif_free_zone_limits(&list_reply
);
2015 ipf_set_enabled__(int argc
, const char *argv
[], struct dpctl_params
*dpctl_p
,
2019 int error
= opt_dpif_open(argc
, argv
, dpctl_p
, 4, &dpif
);
2021 char v4_or_v6
[3] = {0};
2022 if (ovs_scan(argv
[argc
- 1], "%2s", v4_or_v6
) &&
2023 (!strncmp(v4_or_v6
, "v4", 2) || !strncmp(v4_or_v6
, "v6", 2))) {
2024 error
= ct_dpif_ipf_set_enabled(
2025 dpif
, !strncmp(v4_or_v6
, "v6", 2), enabled
);
2027 dpctl_print(dpctl_p
,
2028 "%s fragmentation reassembly successful",
2029 enabled
? "enabling" : "disabling");
2031 dpctl_error(dpctl_p
, error
,
2032 "%s fragmentation reassembly failed",
2033 enabled
? "enabling" : "disabling");
2037 dpctl_error(dpctl_p
, error
,
2038 "parameter missing: 'v4' for IPv4 or 'v6' for IPv6");
2046 dpctl_ipf_set_enabled(int argc
, const char *argv
[],
2047 struct dpctl_params
*dpctl_p
)
2049 return ipf_set_enabled__(argc
, argv
, dpctl_p
, true);
2053 dpctl_ipf_set_disabled(int argc
, const char *argv
[],
2054 struct dpctl_params
*dpctl_p
)
2056 return ipf_set_enabled__(argc
, argv
, dpctl_p
, false);
2060 dpctl_ipf_set_min_frag(int argc
, const char *argv
[],
2061 struct dpctl_params
*dpctl_p
)
2064 int error
= opt_dpif_open(argc
, argv
, dpctl_p
, 4, &dpif
);
2066 char v4_or_v6
[3] = {0};
2067 if (ovs_scan(argv
[argc
- 2], "%2s", v4_or_v6
) &&
2068 (!strncmp(v4_or_v6
, "v4", 2) || !strncmp(v4_or_v6
, "v6", 2))) {
2069 uint32_t min_fragment
;
2070 if (ovs_scan(argv
[argc
- 1], "%"SCNu32
, &min_fragment
)) {
2071 error
= ct_dpif_ipf_set_min_frag(
2072 dpif
, !strncmp(v4_or_v6
, "v6", 2), min_fragment
);
2074 dpctl_print(dpctl_p
,
2075 "setting minimum fragment size successful");
2077 dpctl_error(dpctl_p
, error
,
2078 "requested minimum fragment size too small;"
2079 " see documentation");
2083 dpctl_error(dpctl_p
, error
,
2084 "parameter missing for minimum fragment size");
2088 dpctl_error(dpctl_p
, error
,
2089 "parameter missing: v4 for IPv4 or v6 for IPv6");
2098 dpctl_ipf_set_max_nfrags(int argc
, const char *argv
[],
2099 struct dpctl_params
*dpctl_p
)
2102 int error
= opt_dpif_open(argc
, argv
, dpctl_p
, 3, &dpif
);
2104 uint32_t nfrags_max
;
2105 if (ovs_scan(argv
[argc
- 1], "%"SCNu32
, &nfrags_max
)) {
2106 error
= ct_dpif_ipf_set_max_nfrags(dpif
, nfrags_max
);
2108 dpctl_print(dpctl_p
,
2109 "setting maximum fragments successful");
2111 dpctl_error(dpctl_p
, error
,
2112 "setting maximum fragments failed");
2116 dpctl_error(dpctl_p
, error
,
2117 "parameter missing for maximum fragments");
2126 dpctl_dump_ipf(struct dpif
*dpif
, struct dpctl_params
*dpctl_p
)
2128 struct ipf_dump_ctx
*dump_ctx
;
2131 int error
= ct_dpif_ipf_dump_start(dpif
, &dump_ctx
);
2133 dpctl_error(dpctl_p
, error
, "starting ipf list dump");
2134 /* Nothing to clean up, just return. */
2138 dpctl_print(dpctl_p
, "\n Fragment Lists:\n\n");
2139 while (!(error
= ct_dpif_ipf_dump_next(dpif
, dump_ctx
, &dump
))) {
2140 dpctl_print(dpctl_p
, "%s\n", dump
);
2144 if (error
&& error
!= EOF
) {
2145 dpctl_error(dpctl_p
, error
, "dumping ipf lists failed");
2148 ct_dpif_ipf_dump_done(dpif
, dump_ctx
);
2152 dpctl_ct_ipf_get_status(int argc
, const char *argv
[],
2153 struct dpctl_params
*dpctl_p
)
2156 int error
= opt_dpif_open(argc
, argv
, dpctl_p
, 2, &dpif
);
2159 struct dpif_ipf_status dpif_ipf_status
;
2160 error
= ct_dpif_ipf_get_status(dpif
, &dpif_ipf_status
);
2163 dpctl_print(dpctl_p
, " Fragmentation Module Status\n");
2164 dpctl_print(dpctl_p
, " ---------------------------\n");
2165 dpctl_print(dpctl_p
, " v4 enabled: %u\n",
2166 dpif_ipf_status
.v4
.enabled
);
2167 dpctl_print(dpctl_p
, " v6 enabled: %u\n",
2168 dpif_ipf_status
.v6
.enabled
);
2169 dpctl_print(dpctl_p
, " max num frags (v4/v6): %u\n",
2170 dpif_ipf_status
.nfrag_max
);
2171 dpctl_print(dpctl_p
, " num frag: %u\n",
2172 dpif_ipf_status
.nfrag
);
2173 dpctl_print(dpctl_p
, " min v4 frag size: %u\n",
2174 dpif_ipf_status
.v4
.min_frag_size
);
2175 dpctl_print(dpctl_p
, " v4 frags accepted: %"PRIu64
"\n",
2176 dpif_ipf_status
.v4
.nfrag_accepted
);
2177 dpctl_print(dpctl_p
, " v4 frags completed: %"PRIu64
"\n",
2178 dpif_ipf_status
.v4
.nfrag_completed_sent
);
2179 dpctl_print(dpctl_p
, " v4 frags expired: %"PRIu64
"\n",
2180 dpif_ipf_status
.v4
.nfrag_expired_sent
);
2181 dpctl_print(dpctl_p
, " v4 frags too small: %"PRIu64
"\n",
2182 dpif_ipf_status
.v4
.nfrag_too_small
);
2183 dpctl_print(dpctl_p
, " v4 frags overlapped: %"PRIu64
"\n",
2184 dpif_ipf_status
.v4
.nfrag_overlap
);
2185 dpctl_print(dpctl_p
, " v4 frags purged: %"PRIu64
"\n",
2186 dpif_ipf_status
.v4
.nfrag_purged
);
2188 dpctl_print(dpctl_p
, " min v6 frag size: %u\n",
2189 dpif_ipf_status
.v6
.min_frag_size
);
2190 dpctl_print(dpctl_p
, " v6 frags accepted: %"PRIu64
"\n",
2191 dpif_ipf_status
.v6
.nfrag_accepted
);
2192 dpctl_print(dpctl_p
, " v6 frags completed: %"PRIu64
"\n",
2193 dpif_ipf_status
.v6
.nfrag_completed_sent
);
2194 dpctl_print(dpctl_p
, " v6 frags expired: %"PRIu64
"\n",
2195 dpif_ipf_status
.v6
.nfrag_expired_sent
);
2196 dpctl_print(dpctl_p
, " v6 frags too small: %"PRIu64
"\n",
2197 dpif_ipf_status
.v6
.nfrag_too_small
);
2198 dpctl_print(dpctl_p
, " v6 frags overlapped: %"PRIu64
"\n",
2199 dpif_ipf_status
.v6
.nfrag_overlap
);
2200 dpctl_print(dpctl_p
, " v6 frags purged: %"PRIu64
"\n",
2201 dpif_ipf_status
.v6
.nfrag_purged
);
2203 dpctl_error(dpctl_p
, error
,
2204 "ipf status could not be retrieved");
2208 if (dpctl_p
->verbosity
) {
2209 dpctl_dump_ipf(dpif
, dpctl_p
);
2218 /* Undocumented commands for unit testing. */
2221 dpctl_parse_actions(int argc
, const char *argv
[], struct dpctl_params
* dpctl_p
)
2225 for (i
= 1; i
< argc
; i
++) {
2226 struct ofpbuf actions
;
2229 ofpbuf_init(&actions
, 0);
2230 error
= odp_actions_from_string(argv
[i
], NULL
, &actions
);
2233 ofpbuf_uninit(&actions
);
2234 dpctl_error(dpctl_p
, error
, "odp_actions_from_string");
2239 format_odp_actions(&s
, actions
.data
, actions
.size
, NULL
);
2240 dpctl_print(dpctl_p
, "%s\n", ds_cstr(&s
));
2243 ofpbuf_uninit(&actions
);
2249 struct actions_for_flow
{
2250 struct hmap_node hmap_node
;
2252 struct ofpbuf actions
;
2255 static struct actions_for_flow
*
2256 get_actions_for_flow(struct hmap
*actions_per_flow
, const struct flow
*flow
)
2258 uint32_t hash
= flow_hash(flow
, 0);
2259 struct actions_for_flow
*af
;
2261 HMAP_FOR_EACH_WITH_HASH (af
, hmap_node
, hash
, actions_per_flow
) {
2262 if (flow_equal(&af
->flow
, flow
)) {
2267 af
= xmalloc(sizeof *af
);
2269 ofpbuf_init(&af
->actions
, 0);
2270 hmap_insert(actions_per_flow
, &af
->hmap_node
, hash
);
2275 compare_actions_for_flow(const void *a_
, const void *b_
)
2277 struct actions_for_flow
*const *a
= a_
;
2278 struct actions_for_flow
*const *b
= b_
;
2280 return flow_compare_3way(&(*a
)->flow
, &(*b
)->flow
);
2284 compare_output_actions(const void *a_
, const void *b_
)
2286 const struct nlattr
*a
= a_
;
2287 const struct nlattr
*b
= b_
;
2288 uint32_t a_port
= nl_attr_get_u32(a
);
2289 uint32_t b_port
= nl_attr_get_u32(b
);
2291 return a_port
< b_port
? -1 : a_port
> b_port
;
2295 sort_output_actions__(struct nlattr
*first
, struct nlattr
*end
)
2297 size_t bytes
= (uint8_t *) end
- (uint8_t *) first
;
2298 size_t n
= bytes
/ NL_A_U32_SIZE
;
2300 ovs_assert(bytes
% NL_A_U32_SIZE
== 0);
2301 qsort(first
, n
, NL_A_U32_SIZE
, compare_output_actions
);
2305 sort_output_actions(struct nlattr
*actions
, size_t length
)
2307 struct nlattr
*first_output
= NULL
;
2311 NL_ATTR_FOR_EACH (a
, left
, actions
, length
) {
2312 if (nl_attr_type(a
) == OVS_ACTION_ATTR_OUTPUT
) {
2313 if (!first_output
) {
2318 sort_output_actions__(first_output
, a
);
2319 first_output
= NULL
;
2324 uint8_t *end
= (uint8_t *) actions
+ length
;
2325 sort_output_actions__(first_output
,
2326 ALIGNED_CAST(struct nlattr
*, end
));
2330 /* usage: "ovs-dpctl normalize-actions FLOW ACTIONS" where FLOW and ACTIONS
2331 * have the syntax used by "ovs-dpctl dump-flows".
2333 * This command prints ACTIONS in a format that shows what happens for each
2334 * VLAN, independent of the order of the ACTIONS. For example, there is more
2335 * than one way to output a packet on VLANs 9 and 11, but this command will
2336 * print the same output for any form.
2338 * The idea here generalizes beyond VLANs (e.g. to setting other fields) but
2339 * so far the implementation only covers VLANs. */
2341 dpctl_normalize_actions(int argc
, const char *argv
[],
2342 struct dpctl_params
*dpctl_p
)
2344 struct simap port_names
;
2345 struct ofpbuf keybuf
;
2347 struct ofpbuf odp_actions
;
2348 struct hmap actions_per_flow
;
2349 struct actions_for_flow
**afs
;
2350 struct actions_for_flow
*af
;
2360 simap_init(&port_names
);
2361 for (i
= 3; i
< argc
; i
++) {
2365 if (ovs_scan(argv
[i
], "%15[^=]=%d", name
, &number
)) {
2366 uintptr_t n
= number
;
2367 simap_put(&port_names
, name
, n
);
2369 dpctl_error(dpctl_p
, 0, "%s: expected NAME=NUMBER", argv
[i
]);
2375 /* Parse flow key. */
2376 ofpbuf_init(&keybuf
, 0);
2378 error
= odp_flow_from_string(argv
[1], &port_names
, &keybuf
, NULL
,
2381 dpctl_error(dpctl_p
, error
, "odp_flow_key_from_string (%s)", error_s
);
2383 goto out_freekeybuf
;
2387 odp_flow_format(keybuf
.data
, keybuf
.size
, NULL
, 0, NULL
,
2388 &s
, dpctl_p
->verbosity
);
2389 dpctl_print(dpctl_p
, "input flow: %s\n", ds_cstr(&s
));
2391 error
= odp_flow_key_to_flow(keybuf
.data
, keybuf
.size
, &flow
, &error_s
);
2393 dpctl_error(dpctl_p
, error
, "odp_flow_key_to_flow failed (%s)",
2394 error_s
? error_s
: "reason unknown");
2396 goto out_freekeybuf
;
2399 /* Parse actions. */
2400 ofpbuf_init(&odp_actions
, 0);
2401 error
= odp_actions_from_string(argv
[2], &port_names
, &odp_actions
);
2403 dpctl_error(dpctl_p
, error
, "odp_actions_from_string");
2404 goto out_freeactions
;
2407 if (dpctl_p
->verbosity
) {
2409 format_odp_actions(&s
, odp_actions
.data
, odp_actions
.size
, NULL
);
2410 dpctl_print(dpctl_p
, "input actions: %s\n", ds_cstr(&s
));
2413 hmap_init(&actions_per_flow
);
2414 NL_ATTR_FOR_EACH (a
, left
, odp_actions
.data
, odp_actions
.size
) {
2415 const struct ovs_action_push_vlan
*push
;
2416 switch(nl_attr_type(a
)) {
2417 case OVS_ACTION_ATTR_POP_VLAN
:
2418 flow_pop_vlan(&flow
, NULL
);
2421 case OVS_ACTION_ATTR_PUSH_VLAN
:
2422 flow_push_vlan_uninit(&flow
, NULL
);
2423 push
= nl_attr_get_unspec(a
, sizeof *push
);
2424 flow
.vlans
[0].tpid
= push
->vlan_tpid
;
2425 flow
.vlans
[0].tci
= push
->vlan_tci
;
2429 af
= get_actions_for_flow(&actions_per_flow
, &flow
);
2430 nl_msg_put_unspec(&af
->actions
, nl_attr_type(a
),
2431 nl_attr_get(a
), nl_attr_get_size(a
));
2434 n_afs
= hmap_count(&actions_per_flow
);
2435 afs
= xmalloc(n_afs
* sizeof *afs
);
2437 HMAP_FOR_EACH (af
, hmap_node
, &actions_per_flow
) {
2441 ovs_assert(i
== n_afs
);
2442 hmap_destroy(&actions_per_flow
);
2444 qsort(afs
, n_afs
, sizeof *afs
, compare_actions_for_flow
);
2446 for (i
= 0; i
< n_afs
; i
++) {
2448 sort_output_actions(af
->actions
.data
, af
->actions
.size
);
2450 for (encaps
= 0; encaps
< FLOW_MAX_VLAN_HEADERS
; encaps
++) {
2451 union flow_vlan_hdr
*vlan
= &af
->flow
.vlans
[encaps
];
2452 if (vlan
->tci
!= htons(0)) {
2453 dpctl_print(dpctl_p
, "vlan(");
2454 if (vlan
->tpid
!= htons(ETH_TYPE_VLAN
)) {
2455 dpctl_print(dpctl_p
, "tpid=0x%04"PRIx16
",", vlan
->tpid
);
2457 dpctl_print(dpctl_p
, "vid=%"PRIu16
",pcp=%d): ",
2458 vlan_tci_to_vid(vlan
->tci
),
2459 vlan_tci_to_pcp(vlan
->tci
));
2462 dpctl_print(dpctl_p
, "no vlan: ");
2468 if (eth_type_mpls(af
->flow
.dl_type
)) {
2469 dpctl_print(dpctl_p
, "mpls(label=%"PRIu32
",tc=%d,ttl=%d): ",
2470 mpls_lse_to_label(af
->flow
.mpls_lse
[0]),
2471 mpls_lse_to_tc(af
->flow
.mpls_lse
[0]),
2472 mpls_lse_to_ttl(af
->flow
.mpls_lse
[0]));
2474 dpctl_print(dpctl_p
, "no mpls: ");
2478 format_odp_actions(&s
, af
->actions
.data
, af
->actions
.size
, NULL
);
2479 dpctl_puts(dpctl_p
, false, ds_cstr(&s
));
2481 ofpbuf_uninit(&af
->actions
);
2488 ofpbuf_uninit(&odp_actions
);
2490 ofpbuf_uninit(&keybuf
);
2492 simap_destroy(&port_names
);
2498 static const struct dpctl_command all_commands
[] = {
2499 { "add-dp", "dp [iface...]", 1, INT_MAX
, dpctl_add_dp
, DP_RW
},
2500 { "del-dp", "dp", 1, 1, dpctl_del_dp
, DP_RW
},
2501 { "add-if", "dp iface...", 2, INT_MAX
, dpctl_add_if
, DP_RW
},
2502 { "del-if", "dp iface...", 2, INT_MAX
, dpctl_del_if
, DP_RW
},
2503 { "set-if", "dp iface...", 2, INT_MAX
, dpctl_set_if
, DP_RW
},
2504 { "dump-dps", "", 0, 0, dpctl_dump_dps
, DP_RO
},
2505 { "show", "[dp...]", 0, INT_MAX
, dpctl_show
, DP_RO
},
2506 { "dump-flows", "[dp] [filter=..] [type=..]",
2507 0, 3, dpctl_dump_flows
, DP_RO
},
2508 { "add-flow", "[dp] flow actions", 2, 3, dpctl_add_flow
, DP_RW
},
2509 { "mod-flow", "[dp] flow actions", 2, 3, dpctl_mod_flow
, DP_RW
},
2510 { "get-flow", "[dp] ufid", 1, 2, dpctl_get_flow
, DP_RO
},
2511 { "del-flow", "[dp] flow", 1, 2, dpctl_del_flow
, DP_RW
},
2512 { "del-flows", "[dp]", 0, 1, dpctl_del_flows
, DP_RW
},
2513 { "dump-conntrack", "[dp] [zone=N]", 0, 2, dpctl_dump_conntrack
, DP_RO
},
2514 { "flush-conntrack", "[dp] [zone=N] [ct-tuple]", 0, 3,
2515 dpctl_flush_conntrack
, DP_RW
},
2516 { "ct-stats-show", "[dp] [zone=N]",
2517 0, 3, dpctl_ct_stats_show
, DP_RO
},
2518 { "ct-bkts", "[dp] [gt=N]", 0, 2, dpctl_ct_bkts
, DP_RO
},
2519 { "ct-set-maxconns", "[dp] maxconns", 1, 2, dpctl_ct_set_maxconns
,
2521 { "ct-get-maxconns", "[dp]", 0, 1, dpctl_ct_get_maxconns
, DP_RO
},
2522 { "ct-get-nconns", "[dp]", 0, 1, dpctl_ct_get_nconns
, DP_RO
},
2523 { "ct-enable-tcp-seq-chk", "[dp]", 0, 1, dpctl_ct_enable_tcp_seq_chk
,
2525 { "ct-disable-tcp-seq-chk", "[dp]", 0, 1, dpctl_ct_disable_tcp_seq_chk
,
2527 { "ct-get-tcp-seq-chk", "[dp]", 0, 1, dpctl_ct_get_tcp_seq_chk
, DP_RO
},
2528 { "ct-set-limits", "[dp] [default=L] [zone=N,limit=L]...", 1, INT_MAX
,
2529 dpctl_ct_set_limits
, DP_RO
},
2530 { "ct-del-limits", "[dp] zone=N1[,N2]...", 1, 2, dpctl_ct_del_limits
,
2532 { "ct-get-limits", "[dp] [zone=N1[,N2]...]", 0, 2, dpctl_ct_get_limits
,
2534 { "ipf-set-enabled", "[dp] v4|v6", 1, 2, dpctl_ipf_set_enabled
, DP_RW
},
2535 { "ipf-set-disabled", "[dp] v4|v6", 1, 2, dpctl_ipf_set_disabled
, DP_RW
},
2536 { "ipf-set-min-frag", "[dp] v4|v6 minfragment", 2, 3,
2537 dpctl_ipf_set_min_frag
, DP_RW
},
2538 { "ipf-set-max-nfrags", "[dp] maxfrags", 1, 2,
2539 dpctl_ipf_set_max_nfrags
, DP_RW
},
2540 { "ipf-get-status", "[dp]", 0, 1, dpctl_ct_ipf_get_status
,
2542 { "help", "", 0, INT_MAX
, dpctl_help
, DP_RO
},
2543 { "list-commands", "", 0, INT_MAX
, dpctl_list_commands
, DP_RO
},
2545 /* Undocumented commands for testing. */
2546 { "parse-actions", "actions", 1, INT_MAX
, dpctl_parse_actions
, DP_RO
},
2547 { "normalize-actions", "actions",
2548 2, INT_MAX
, dpctl_normalize_actions
, DP_RO
},
2550 { NULL
, NULL
, 0, 0, NULL
, DP_RO
},
2553 static const struct dpctl_command
*get_all_dpctl_commands(void)
2555 return all_commands
;
2558 /* Runs the command designated by argv[0] within the command table specified by
2559 * 'commands', which must be terminated by a command whose 'name' member is a
2562 dpctl_run_command(int argc
, const char *argv
[], struct dpctl_params
*dpctl_p
)
2564 const struct dpctl_command
*p
;
2566 dpctl_error(dpctl_p
, 0, "missing command name; use --help for help");
2570 for (p
= all_commands
; p
->name
!= NULL
; p
++) {
2571 if (!strcmp(p
->name
, argv
[0])) {
2572 int n_arg
= argc
- 1;
2573 if (n_arg
< p
->min_args
) {
2574 dpctl_error(dpctl_p
, 0,
2575 "'%s' command requires at least %d arguments",
2576 p
->name
, p
->min_args
);
2578 } else if (n_arg
> p
->max_args
) {
2579 dpctl_error(dpctl_p
, 0,
2580 "'%s' command takes at most %d arguments",
2581 p
->name
, p
->max_args
);
2584 if (p
->mode
== DP_RW
&& dpctl_p
->read_only
) {
2585 dpctl_error(dpctl_p
, 0,
2586 "'%s' command does not work in read only mode",
2590 return p
->handler(argc
, argv
, dpctl_p
);
2595 dpctl_error(dpctl_p
, 0, "unknown command '%s'; use --help for help",
2601 dpctl_unixctl_print(void *userdata
, bool error OVS_UNUSED
, const char *msg
)
2603 struct ds
*ds
= userdata
;
2604 ds_put_cstr(ds
, msg
);
2608 dpctl_unixctl_handler(struct unixctl_conn
*conn
, int argc
, const char *argv
[],
2611 struct ds ds
= DS_EMPTY_INITIALIZER
;
2614 struct dpctl_params dpctl_p
= {
2616 .output
= dpctl_unixctl_print
,
2620 /* Parse options (like getopt). Unfortunately it does
2621 * not seem a good idea to call getopt_long() here, since it uses global
2623 bool set_names
= false;
2624 while (argc
> 1 && !error
) {
2625 const char *arg
= argv
[1];
2626 if (!strncmp(arg
, "--", 2)) {
2628 if (!strcmp(arg
, "--statistics")) {
2629 dpctl_p
.print_statistics
= true;
2630 } else if (!strcmp(arg
, "--clear")) {
2631 dpctl_p
.zero_statistics
= true;
2632 } else if (!strcmp(arg
, "--may-create")) {
2633 dpctl_p
.may_create
= true;
2634 } else if (!strcmp(arg
, "--more")) {
2635 dpctl_p
.verbosity
++;
2636 } else if (!strcmp(arg
, "--names")) {
2637 dpctl_p
.names
= true;
2639 } else if (!strcmp(arg
, "--no-names")) {
2640 dpctl_p
.names
= false;
2643 ds_put_format(&ds
, "Unrecognized option %s", argv
[1]);
2646 } else if (arg
[0] == '-' && arg
[1] != '\0') {
2647 /* Short option[s] */
2648 const char *opt
= &arg
[1];
2650 while (*opt
&& !error
) {
2653 dpctl_p
.verbosity
++;
2656 dpctl_p
.print_statistics
= true;
2659 ds_put_format(&ds
, "Unrecognized option -%c", *opt
);
2666 /* Doesn't start with -, not an option */
2677 dpctl_p
.names
= dpctl_p
.verbosity
> 0;
2681 dpctl_command_handler
*handler
= (dpctl_command_handler
*) aux
;
2682 error
= handler(argc
, argv
, &dpctl_p
) != 0;
2686 unixctl_command_reply_error(conn
, ds_cstr(&ds
));
2688 unixctl_command_reply(conn
, ds_cstr(&ds
));
2695 dpctl_unixctl_register(void)
2697 const struct dpctl_command
*p
;
2699 for (p
= all_commands
; p
->name
!= NULL
; p
++) {
2700 if (strcmp(p
->name
, "help")) {
2701 char *cmd_name
= xasprintf("dpctl/%s", p
->name
);
2702 unixctl_command_register(cmd_name
,
2706 dpctl_unixctl_handler
,