]> git.proxmox.com Git - mirror_ovs.git/blob - lib/dpctl.c
ovsdb-idl: Remove prototype for function that is not defined or used.
[mirror_ovs.git] / lib / dpctl.c
1 /*
2 * Copyright (c) 2008-2019 Nicira, Inc.
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at:
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17 #include <config.h>
18 #include <sys/types.h>
19 #include <netinet/in.h>
20 #include <arpa/inet.h>
21 #include <errno.h>
22 #include <inttypes.h>
23 #include <sys/socket.h>
24 #include <net/if.h>
25 #include <stdarg.h>
26 #include <stdlib.h>
27 #include <string.h>
28 #include <unistd.h>
29
30 #include "command-line.h"
31 #include "compiler.h"
32 #include "ct-dpif.h"
33 #include "dirs.h"
34 #include "dpctl.h"
35 #include "dpif.h"
36 #include "dpif-provider.h"
37 #include "openvswitch/dynamic-string.h"
38 #include "flow.h"
39 #include "openvswitch/match.h"
40 #include "netdev.h"
41 #include "netlink.h"
42 #include "odp-util.h"
43 #include "openvswitch/ofpbuf.h"
44 #include "packets.h"
45 #include "openvswitch/shash.h"
46 #include "simap.h"
47 #include "smap.h"
48 #include "sset.h"
49 #include "timeval.h"
50 #include "unixctl.h"
51 #include "util.h"
52 #include "openvswitch/ofp-flow.h"
53 #include "openvswitch/ofp-port.h"
54
55 typedef int dpctl_command_handler(int argc, const char *argv[],
56 struct dpctl_params *);
57 struct dpctl_command {
58 const char *name;
59 const char *usage;
60 int min_args;
61 int max_args;
62 dpctl_command_handler *handler;
63 enum { DP_RO, DP_RW} mode;
64 };
65 static const struct dpctl_command *get_all_dpctl_commands(void);
66 static void dpctl_print(struct dpctl_params *dpctl_p, const char *fmt, ...)
67 OVS_PRINTF_FORMAT(2, 3);
68 static void dpctl_error(struct dpctl_params* dpctl_p, int err_no,
69 const char *fmt, ...)
70 OVS_PRINTF_FORMAT(3, 4);
71
72 static void
73 dpctl_puts(struct dpctl_params *dpctl_p, bool error, const char *string)
74 {
75 dpctl_p->output(dpctl_p->aux, error, string);
76 }
77
78 static void
79 dpctl_print(struct dpctl_params *dpctl_p, const char *fmt, ...)
80 {
81 char *string;
82 va_list args;
83
84 va_start(args, fmt);
85 string = xvasprintf(fmt, args);
86 va_end(args);
87
88 dpctl_puts(dpctl_p, false, string);
89 free(string);
90 }
91
92 static void
93 dpctl_error(struct dpctl_params* dpctl_p, int err_no, const char *fmt, ...)
94 {
95 const char *subprogram_name = get_subprogram_name();
96 struct ds ds = DS_EMPTY_INITIALIZER;
97 int save_errno = errno;
98 va_list args;
99
100
101 if (subprogram_name[0]) {
102 ds_put_format(&ds, "%s(%s): ", program_name,subprogram_name);
103 } else {
104 ds_put_format(&ds, "%s: ", program_name);
105 }
106
107 va_start(args, fmt);
108 ds_put_format_valist(&ds, fmt, args);
109 va_end(args);
110
111 if (err_no != 0) {
112 ds_put_format(&ds, " (%s)", ovs_retval_to_string(err_no));
113 }
114 ds_put_cstr(&ds, "\n");
115
116 dpctl_puts(dpctl_p, true, ds_cstr(&ds));
117
118 ds_destroy(&ds);
119
120 errno = save_errno;
121 }
122 \f
123 static int dpctl_add_if(int argc, const char *argv[], struct dpctl_params *);
124
125 static int
126 if_up(struct netdev *netdev)
127 {
128 return netdev_turn_flags_on(netdev, NETDEV_UP, NULL);
129 }
130
131 /* Retrieve the name of the datapath if exactly one exists. The caller
132 * is responsible for freeing the returned string. If a single datapath
133 * name cannot be determined, returns NULL. */
134 static char *
135 get_one_dp(struct dpctl_params *dpctl_p)
136 {
137 struct sset types;
138 const char *type;
139 char *dp_name = NULL;
140 size_t count = 0;
141
142 sset_init(&types);
143 dp_enumerate_types(&types);
144 SSET_FOR_EACH (type, &types) {
145 struct sset names;
146
147 sset_init(&names);
148 if (!dp_enumerate_names(type, &names)) {
149 count += sset_count(&names);
150 if (!dp_name && count == 1) {
151 dp_name = xasprintf("%s@%s", type, SSET_FIRST(&names));
152 }
153 }
154 sset_destroy(&names);
155 }
156 sset_destroy(&types);
157
158 if (!count) {
159 dpctl_error(dpctl_p, 0, "no datapaths exist");
160 } else if (count > 1) {
161 dpctl_error(dpctl_p, 0, "multiple datapaths, specify one");
162 free(dp_name);
163 dp_name = NULL;
164 }
165
166 return dp_name;
167 }
168
169 static int
170 parsed_dpif_open(const char *arg_, bool create, struct dpif **dpifp)
171 {
172 int result;
173 char *name, *type;
174
175 dp_parse_name(arg_, &name, &type);
176
177 if (create) {
178 result = dpif_create(name, type, dpifp);
179 } else {
180 result = dpif_open(name, type, dpifp);
181 }
182
183 free(name);
184 free(type);
185 return result;
186 }
187
188 static bool
189 dp_exists(const char *queried_dp)
190 {
191 char *queried_name, *queried_type;
192 dp_parse_name(queried_dp, &queried_name, &queried_type);
193 struct sset dpif_names = SSET_INITIALIZER(&dpif_names),
194 dpif_types = SSET_INITIALIZER(&dpif_types);
195 dp_enumerate_types(&dpif_types);
196
197 bool found = (sset_contains(&dpif_types, queried_type) &&
198 !dp_enumerate_names(queried_type, &dpif_names) &&
199 sset_contains(&dpif_names, queried_name));
200
201 sset_destroy(&dpif_names);
202 sset_destroy(&dpif_types);
203 free(queried_name);
204 free(queried_type);
205 return found;
206 }
207
208 static bool
209 dp_arg_exists(int argc, const char *argv[])
210 {
211 return argc > 1 && dp_exists(argv[1]);
212 }
213
214 /* Open a dpif with an optional name argument.
215 *
216 * The datapath name is not a mandatory parameter for this command. If it is
217 * not specified, we retrieve it from the current setup, assuming only one
218 * exists. On success stores the opened dpif in '*dpifp'. */
219 static int
220 opt_dpif_open(int argc, const char *argv[], struct dpctl_params *dpctl_p,
221 int max_args, struct dpif **dpifp)
222 {
223 char *dpname;
224
225 if (dp_arg_exists(argc, argv)) {
226 dpname = xstrdup(argv[1]);
227 } else if (argc != max_args) {
228 dpname = get_one_dp(dpctl_p);
229 } else {
230 /* If the arguments are the maximum possible number and there is no
231 * valid datapath argument, then we fall into the case of dpname is
232 * NULL, since this is an error. */
233 dpname = NULL;
234 }
235
236 int error = 0;
237 if (!dpname) {
238 error = EINVAL;
239 dpctl_error(dpctl_p, error, "datapath not found");
240 } else {
241 error = parsed_dpif_open(dpname, false, dpifp);
242 free(dpname);
243 if (error) {
244 dpctl_error(dpctl_p, error, "opening datapath");
245 }
246 }
247 return error;
248 }
249
250 static int
251 dpctl_add_dp(int argc, const char *argv[],
252 struct dpctl_params *dpctl_p)
253 {
254 struct dpif *dpif;
255 int error;
256
257 error = parsed_dpif_open(argv[1], true, &dpif);
258 if (error) {
259 dpctl_error(dpctl_p, error, "add_dp");
260 return error;
261 }
262 dpif_close(dpif);
263 if (argc > 2) {
264 error = dpctl_add_if(argc, argv, dpctl_p);
265 }
266 return error;
267 }
268
269 static int
270 dpctl_del_dp(int argc OVS_UNUSED, const char *argv[],
271 struct dpctl_params *dpctl_p)
272 {
273 struct dpif *dpif;
274 int error;
275
276 error = parsed_dpif_open(argv[1], false, &dpif);
277 if (error) {
278 dpctl_error(dpctl_p, error, "opening datapath");
279 return error;
280 }
281 error = dpif_delete(dpif);
282 if (error) {
283 dpctl_error(dpctl_p, error, "del_dp");
284 }
285
286 dpif_close(dpif);
287 return error;
288 }
289
290 static int
291 dpctl_add_if(int argc OVS_UNUSED, const char *argv[],
292 struct dpctl_params *dpctl_p)
293 {
294 struct dpif *dpif;
295 int i, error, lasterror = 0;
296
297 error = parsed_dpif_open(argv[1], false, &dpif);
298 if (error) {
299 dpctl_error(dpctl_p, error, "opening datapath");
300 return error;
301 }
302 for (i = 2; i < argc; i++) {
303 const char *name, *type;
304 char *save_ptr = NULL, *argcopy;
305 struct netdev *netdev = NULL;
306 struct smap args;
307 odp_port_t port_no = ODPP_NONE;
308 char *option;
309
310 argcopy = xstrdup(argv[i]);
311 name = strtok_r(argcopy, ",", &save_ptr);
312 type = "system";
313
314 if (!name) {
315 dpctl_error(dpctl_p, 0, "%s is not a valid network device name",
316 argv[i]);
317 error = EINVAL;
318 goto next;
319 }
320
321 smap_init(&args);
322 while ((option = strtok_r(NULL, ",", &save_ptr)) != NULL) {
323 char *save_ptr_2 = NULL;
324 char *key, *value;
325
326 key = strtok_r(option, "=", &save_ptr_2);
327 value = strtok_r(NULL, "", &save_ptr_2);
328 if (!value) {
329 value = "";
330 }
331
332 if (!strcmp(key, "type")) {
333 type = value;
334 } else if (!strcmp(key, "port_no")) {
335 port_no = u32_to_odp(atoi(value));
336 } else if (!smap_add_once(&args, key, value)) {
337 dpctl_error(dpctl_p, 0, "duplicate \"%s\" option", key);
338 }
339 }
340
341 error = netdev_open(name, type, &netdev);
342 if (error) {
343 dpctl_error(dpctl_p, error, "%s: failed to open network device",
344 name);
345 goto next_destroy_args;
346 }
347
348 error = netdev_set_config(netdev, &args, NULL);
349 if (error) {
350 goto next_destroy_args;
351 }
352
353 error = dpif_port_add(dpif, netdev, &port_no);
354 if (error) {
355 dpctl_error(dpctl_p, error, "adding %s to %s failed", name,
356 argv[1]);
357 goto next_destroy_args;
358 }
359
360 error = if_up(netdev);
361 if (error) {
362 dpctl_error(dpctl_p, error, "%s: failed bringing interface up",
363 name);
364 }
365
366 next_destroy_args:
367 netdev_close(netdev);
368 smap_destroy(&args);
369 next:
370 free(argcopy);
371 if (error) {
372 lasterror = error;
373 }
374 }
375 dpif_close(dpif);
376
377 return lasterror;
378 }
379
380 static int
381 dpctl_set_if(int argc, const char *argv[], struct dpctl_params *dpctl_p)
382 {
383 struct dpif *dpif;
384 int i, error, lasterror = 0;
385
386 error = parsed_dpif_open(argv[1], false, &dpif);
387 if (error) {
388 dpctl_error(dpctl_p, error, "opening datapath");
389 return error;
390 }
391 for (i = 2; i < argc; i++) {
392 struct netdev *netdev = NULL;
393 struct dpif_port dpif_port;
394 char *save_ptr = NULL;
395 char *type = NULL;
396 char *argcopy;
397 const char *name;
398 struct smap args;
399 odp_port_t port_no;
400 char *option;
401
402 error = 0;
403
404 argcopy = xstrdup(argv[i]);
405 name = strtok_r(argcopy, ",", &save_ptr);
406 if (!name) {
407 dpctl_error(dpctl_p, 0, "%s is not a valid network device name",
408 argv[i]);
409 goto next;
410 }
411
412 /* Get the port's type from the datapath. */
413 error = dpif_port_query_by_name(dpif, name, &dpif_port);
414 if (error) {
415 dpctl_error(dpctl_p, error, "%s: failed to query port in %s", name,
416 argv[1]);
417 goto next;
418 }
419 type = xstrdup(dpif_port.type);
420 port_no = dpif_port.port_no;
421 dpif_port_destroy(&dpif_port);
422
423 /* Retrieve its existing configuration. */
424 error = netdev_open(name, type, &netdev);
425 if (error) {
426 dpctl_error(dpctl_p, error, "%s: failed to open network device",
427 name);
428 goto next;
429 }
430
431 smap_init(&args);
432 error = netdev_get_config(netdev, &args);
433 if (error) {
434 dpctl_error(dpctl_p, error, "%s: failed to fetch configuration",
435 name);
436 goto next_destroy_args;
437 }
438
439 /* Parse changes to configuration. */
440 while ((option = strtok_r(NULL, ",", &save_ptr)) != NULL) {
441 char *save_ptr_2 = NULL;
442 char *key, *value;
443
444 key = strtok_r(option, "=", &save_ptr_2);
445 value = strtok_r(NULL, "", &save_ptr_2);
446 if (!value) {
447 value = "";
448 }
449
450 if (!strcmp(key, "type")) {
451 if (strcmp(value, type)) {
452 dpctl_error(dpctl_p, 0,
453 "%s: can't change type from %s to %s",
454 name, type, value);
455 error = EINVAL;
456 goto next_destroy_args;
457 }
458 } else if (!strcmp(key, "port_no")) {
459 if (port_no != u32_to_odp(atoi(value))) {
460 dpctl_error(dpctl_p, 0, "%s: can't change port number from"
461 " %"PRIu32" to %d", name, port_no, atoi(value));
462 error = EINVAL;
463 goto next_destroy_args;
464 }
465 } else if (value[0] == '\0') {
466 smap_remove(&args, key);
467 } else {
468 smap_replace(&args, key, value);
469 }
470 }
471
472 /* Update configuration. */
473 char *err_s = NULL;
474 error = netdev_set_config(netdev, &args, &err_s);
475 if (err_s || error) {
476 dpctl_error(dpctl_p, error, "%s",
477 err_s ? err_s : "Error updating configuration");
478 free(err_s);
479 }
480 if (error) {
481 goto next_destroy_args;
482 }
483
484 next_destroy_args:
485 smap_destroy(&args);
486 next:
487 netdev_close(netdev);
488 free(type);
489 free(argcopy);
490 if (error) {
491 lasterror = error;
492 }
493 }
494 dpif_close(dpif);
495
496 return lasterror;
497 }
498
499 static bool
500 get_port_number(struct dpif *dpif, const char *name, odp_port_t *port,
501 struct dpctl_params *dpctl_p)
502 {
503 struct dpif_port dpif_port;
504
505 if (!dpif_port_query_by_name(dpif, name, &dpif_port)) {
506 *port = dpif_port.port_no;
507 dpif_port_destroy(&dpif_port);
508 return true;
509 } else {
510 dpctl_error(dpctl_p, 0, "no port named %s", name);
511 return false;
512 }
513 }
514
515 static int
516 dpctl_del_if(int argc, const char *argv[], struct dpctl_params *dpctl_p)
517 {
518 struct dpif *dpif;
519 int i, error, lasterror = 0;
520
521 error = parsed_dpif_open(argv[1], false, &dpif);
522 if (error) {
523 dpctl_error(dpctl_p, error, "opening datapath");
524 return error;
525 }
526 for (i = 2; i < argc; i++) {
527 const char *name = argv[i];
528 odp_port_t port;
529
530 if (!name[strspn(name, "0123456789")]) {
531 port = u32_to_odp(atoi(name));
532 } else if (!get_port_number(dpif, name, &port, dpctl_p)) {
533 lasterror = ENOENT;
534 continue;
535 }
536
537 error = dpif_port_del(dpif, port, false);
538 if (error) {
539 dpctl_error(dpctl_p, error, "deleting port %s from %s failed",
540 name, argv[1]);
541 lasterror = error;
542 }
543 }
544 dpif_close(dpif);
545 return lasterror;
546 }
547
548 static void
549 print_stat(struct dpctl_params *dpctl_p, const char *leader, uint64_t value)
550 {
551 dpctl_print(dpctl_p, "%s", leader);
552 if (value != UINT64_MAX) {
553 dpctl_print(dpctl_p, "%"PRIu64, value);
554 } else {
555 dpctl_print(dpctl_p, "?");
556 }
557 }
558
559 static void
560 print_human_size(struct dpctl_params *dpctl_p, uint64_t value)
561 {
562 if (value == UINT64_MAX) {
563 /* Nothing to do. */
564 } else if (value >= 1024ULL * 1024 * 1024 * 1024) {
565 dpctl_print(dpctl_p, " (%.1f TiB)",
566 value / (1024.0 * 1024 * 1024 * 1024));
567 } else if (value >= 1024ULL * 1024 * 1024) {
568 dpctl_print(dpctl_p, " (%.1f GiB)", value / (1024.0 * 1024 * 1024));
569 } else if (value >= 1024ULL * 1024) {
570 dpctl_print(dpctl_p, " (%.1f MiB)", value / (1024.0 * 1024));
571 } else if (value >= 1024) {
572 dpctl_print(dpctl_p, " (%.1f KiB)", value / 1024.0);
573 }
574 }
575
576 /* qsort comparison function. */
577 static int
578 compare_port_nos(const void *a_, const void *b_)
579 {
580 const odp_port_t *ap = a_;
581 const odp_port_t *bp = b_;
582 uint32_t a = odp_to_u32(*ap);
583 uint32_t b = odp_to_u32(*bp);
584
585 return a < b ? -1 : a > b;
586 }
587
588 static void
589 show_dpif(struct dpif *dpif, struct dpctl_params *dpctl_p)
590 {
591 struct dpif_port_dump dump;
592 struct dpif_port dpif_port;
593 struct dpif_dp_stats stats;
594 struct netdev *netdev;
595
596 dpctl_print(dpctl_p, "%s:\n", dpif_name(dpif));
597 if (!dpif_get_dp_stats(dpif, &stats)) {
598 dpctl_print(dpctl_p, " lookups: hit:%"PRIu64" missed:%"PRIu64
599 " lost:%"PRIu64"\n flows: %"PRIu64"\n",
600 stats.n_hit, stats.n_missed, stats.n_lost, stats.n_flows);
601 if (stats.n_masks != UINT32_MAX) {
602 uint64_t n_pkts = stats.n_hit + stats.n_missed;
603 double avg = n_pkts ? (double) stats.n_mask_hit / n_pkts : 0.0;
604
605 dpctl_print(dpctl_p, " masks: hit:%"PRIu64" total:%"PRIu32
606 " hit/pkt:%.2f\n",
607 stats.n_mask_hit, stats.n_masks, avg);
608 }
609 }
610
611 odp_port_t *port_nos = NULL;
612 size_t allocated_port_nos = 0, n_port_nos = 0;
613 DPIF_PORT_FOR_EACH (&dpif_port, &dump, dpif) {
614 if (n_port_nos >= allocated_port_nos) {
615 port_nos = x2nrealloc(port_nos, &allocated_port_nos,
616 sizeof *port_nos);
617 }
618
619 port_nos[n_port_nos] = dpif_port.port_no;
620 n_port_nos++;
621 }
622
623 if (port_nos) {
624 qsort(port_nos, n_port_nos, sizeof *port_nos, compare_port_nos);
625 }
626
627 for (int i = 0; i < n_port_nos; i++) {
628 if (dpif_port_query_by_number(dpif, port_nos[i], &dpif_port)) {
629 continue;
630 }
631
632 dpctl_print(dpctl_p, " port %u: %s",
633 dpif_port.port_no, dpif_port.name);
634
635 if (strcmp(dpif_port.type, "system")) {
636 int error;
637
638 dpctl_print(dpctl_p, " (%s", dpif_port.type);
639
640 error = netdev_open(dpif_port.name, dpif_port.type, &netdev);
641 if (!error) {
642 struct smap config;
643
644 smap_init(&config);
645 error = netdev_get_config(netdev, &config);
646 if (!error) {
647 const struct smap_node **nodes = smap_sort(&config);
648 for (size_t j = 0; j < smap_count(&config); j++) {
649 const struct smap_node *node = nodes[j];
650 dpctl_print(dpctl_p, "%c %s=%s", j ? ',' : ':',
651 node->key, node->value);
652 }
653 free(nodes);
654 } else {
655 dpctl_print(dpctl_p, ", could not retrieve configuration "
656 "(%s)", ovs_strerror(error));
657 }
658 smap_destroy(&config);
659
660 netdev_close(netdev);
661 } else {
662 dpctl_print(dpctl_p, ": open failed (%s)",
663 ovs_strerror(error));
664 }
665 dpctl_print(dpctl_p, ")");
666 }
667 dpctl_print(dpctl_p, "\n");
668
669 if (dpctl_p->print_statistics) {
670 struct netdev_stats s;
671 int error;
672
673 error = netdev_open(dpif_port.name, dpif_port.type, &netdev);
674 if (error) {
675 dpctl_print(dpctl_p, ", open failed (%s)",
676 ovs_strerror(error));
677 dpif_port_destroy(&dpif_port);
678 continue;
679 }
680 error = netdev_get_stats(netdev, &s);
681 if (!error) {
682 netdev_close(netdev);
683 print_stat(dpctl_p, " RX packets:", s.rx_packets);
684 print_stat(dpctl_p, " errors:", s.rx_errors);
685 print_stat(dpctl_p, " dropped:", s.rx_dropped);
686 print_stat(dpctl_p, " overruns:", s.rx_over_errors);
687 print_stat(dpctl_p, " frame:", s.rx_frame_errors);
688 dpctl_print(dpctl_p, "\n");
689
690 print_stat(dpctl_p, " TX packets:", s.tx_packets);
691 print_stat(dpctl_p, " errors:", s.tx_errors);
692 print_stat(dpctl_p, " dropped:", s.tx_dropped);
693 print_stat(dpctl_p, " aborted:", s.tx_aborted_errors);
694 print_stat(dpctl_p, " carrier:", s.tx_carrier_errors);
695 dpctl_print(dpctl_p, "\n");
696
697 print_stat(dpctl_p, " collisions:", s.collisions);
698 dpctl_print(dpctl_p, "\n");
699
700 print_stat(dpctl_p, " RX bytes:", s.rx_bytes);
701 print_human_size(dpctl_p, s.rx_bytes);
702 print_stat(dpctl_p, " TX bytes:", s.tx_bytes);
703 print_human_size(dpctl_p, s.tx_bytes);
704 dpctl_print(dpctl_p, "\n");
705 } else {
706 dpctl_print(dpctl_p, ", could not retrieve stats (%s)",
707 ovs_strerror(error));
708 }
709 }
710 dpif_port_destroy(&dpif_port);
711 }
712
713 free(port_nos);
714 }
715
716 typedef void (*dps_for_each_cb)(struct dpif *, struct dpctl_params *);
717
718 static int
719 dps_for_each(struct dpctl_params *dpctl_p, dps_for_each_cb cb)
720 {
721 struct sset dpif_names = SSET_INITIALIZER(&dpif_names),
722 dpif_types = SSET_INITIALIZER(&dpif_types);
723 int error, openerror = 0, enumerror = 0;
724 const char *type, *name;
725 bool at_least_one = false;
726
727 dp_enumerate_types(&dpif_types);
728
729 SSET_FOR_EACH (type, &dpif_types) {
730 error = dp_enumerate_names(type, &dpif_names);
731 if (error) {
732 enumerror = error;
733 }
734
735 SSET_FOR_EACH (name, &dpif_names) {
736 struct dpif *dpif;
737
738 at_least_one = true;
739 error = dpif_open(name, type, &dpif);
740 if (!error) {
741 cb(dpif, dpctl_p);
742 dpif_close(dpif);
743 } else {
744 openerror = error;
745 dpctl_error(dpctl_p, error, "opening datapath %s failed",
746 name);
747 }
748 }
749 }
750
751 sset_destroy(&dpif_names);
752 sset_destroy(&dpif_types);
753
754 /* If there has been an error while opening a datapath it should be
755 * reported. Otherwise, we want to ignore the errors generated by
756 * dp_enumerate_names() if at least one datapath has been discovered,
757 * because they're not interesting for the user. This happens, for
758 * example, if OVS is using a userspace datapath and the kernel module
759 * is not loaded. */
760 if (openerror) {
761 return openerror;
762 } else {
763 return at_least_one ? 0 : enumerror;
764 }
765 }
766
767 static int
768 dpctl_show(int argc, const char *argv[], struct dpctl_params *dpctl_p)
769 {
770 int error, lasterror = 0;
771 if (argc > 1) {
772 int i;
773 for (i = 1; i < argc; i++) {
774 const char *name = argv[i];
775 struct dpif *dpif;
776
777 error = parsed_dpif_open(name, false, &dpif);
778 if (!error) {
779 show_dpif(dpif, dpctl_p);
780 dpif_close(dpif);
781 } else {
782 dpctl_error(dpctl_p, error, "opening datapath %s failed",
783 name);
784 lasterror = error;
785 }
786 }
787 } else {
788 lasterror = dps_for_each(dpctl_p, show_dpif);
789 }
790
791 return lasterror;
792 }
793
794 static void
795 dump_cb(struct dpif *dpif, struct dpctl_params *dpctl_p)
796 {
797 dpctl_print(dpctl_p, "%s\n", dpif_name(dpif));
798 }
799
800 static int
801 dpctl_dump_dps(int argc OVS_UNUSED, const char *argv[] OVS_UNUSED,
802 struct dpctl_params *dpctl_p)
803 {
804 return dps_for_each(dpctl_p, dump_cb);
805 }
806
807 static void
808 format_dpif_flow(struct ds *ds, const struct dpif_flow *f, struct hmap *ports,
809 struct dpctl_params *dpctl_p)
810 {
811 if (dpctl_p->verbosity && f->ufid_present) {
812 odp_format_ufid(&f->ufid, ds);
813 ds_put_cstr(ds, ", ");
814 }
815 odp_flow_format(f->key, f->key_len, f->mask, f->mask_len, ports, ds,
816 dpctl_p->verbosity);
817 ds_put_cstr(ds, ", ");
818
819 dpif_flow_stats_format(&f->stats, ds);
820 if (dpctl_p->verbosity && f->attrs.offloaded) {
821 if (f->attrs.dp_layer && !strcmp(f->attrs.dp_layer, "ovs")) {
822 ds_put_cstr(ds, ", offloaded:partial");
823 } else {
824 ds_put_cstr(ds, ", offloaded:yes");
825 }
826 }
827 if (dpctl_p->verbosity && f->attrs.dp_layer) {
828 ds_put_format(ds, ", dp:%s", f->attrs.dp_layer);
829 }
830 ds_put_cstr(ds, ", actions:");
831 format_odp_actions(ds, f->actions, f->actions_len, ports);
832 if (dpctl_p->verbosity && f->attrs.dp_extra_info) {
833 ds_put_format(ds, ", dp-extra-info:%s", f->attrs.dp_extra_info);
834 }
835 }
836
837 struct dump_types {
838 bool ovs;
839 bool tc;
840 bool dpdk;
841 bool offloaded;
842 bool non_offloaded;
843 bool partially_offloaded;
844 };
845
846 static void
847 enable_all_dump_types(struct dump_types *dump_types)
848 {
849 dump_types->ovs = true;
850 dump_types->tc = true;
851 dump_types->dpdk = true;
852 dump_types->offloaded = true;
853 dump_types->non_offloaded = true;
854 dump_types->partially_offloaded = true;
855 }
856
857 static int
858 populate_dump_types(char *types_list, struct dump_types *dump_types,
859 struct dpctl_params *dpctl_p)
860 {
861 if (!types_list) {
862 enable_all_dump_types(dump_types);
863 return 0;
864 }
865
866 char *current_type;
867
868 while (types_list && types_list[0] != '\0') {
869 current_type = types_list;
870 size_t type_len = strcspn(current_type, ",");
871
872 types_list += type_len + (types_list[type_len] != '\0');
873 current_type[type_len] = '\0';
874
875 if (!strcmp(current_type, "ovs")) {
876 dump_types->ovs = true;
877 } else if (!strcmp(current_type, "tc")) {
878 dump_types->tc = true;
879 } else if (!strcmp(current_type, "dpdk")) {
880 dump_types->dpdk = true;
881 } else if (!strcmp(current_type, "offloaded")) {
882 dump_types->offloaded = true;
883 } else if (!strcmp(current_type, "non-offloaded")) {
884 dump_types->non_offloaded = true;
885 } else if (!strcmp(current_type, "partially-offloaded")) {
886 dump_types->partially_offloaded = true;
887 } else if (!strcmp(current_type, "all")) {
888 enable_all_dump_types(dump_types);
889 } else {
890 dpctl_error(dpctl_p, EINVAL, "Failed to parse type (%s)",
891 current_type);
892 return EINVAL;
893 }
894 }
895 return 0;
896 }
897
898 static void
899 determine_dpif_flow_dump_types(struct dump_types *dump_types,
900 struct dpif_flow_dump_types *dpif_dump_types)
901 {
902 dpif_dump_types->ovs_flows = dump_types->ovs || dump_types->non_offloaded;
903 dpif_dump_types->netdev_flows = dump_types->tc || dump_types->offloaded
904 || dump_types->non_offloaded
905 || dump_types->dpdk
906 || dump_types->partially_offloaded;
907 }
908
909 static bool
910 flow_passes_type_filter(const struct dpif_flow *f,
911 struct dump_types *dump_types)
912 {
913 if (dump_types->ovs && !strcmp(f->attrs.dp_layer, "ovs")) {
914 return true;
915 }
916 if (dump_types->tc && !strcmp(f->attrs.dp_layer, "tc")) {
917 return true;
918 }
919 if (dump_types->dpdk && !strcmp(f->attrs.dp_layer, "dpdk")) {
920 return true;
921 }
922 if (dump_types->offloaded && f->attrs.offloaded &&
923 strcmp(f->attrs.dp_layer, "ovs")) {
924 return true;
925 }
926 if (dump_types->partially_offloaded && f->attrs.offloaded &&
927 !strcmp(f->attrs.dp_layer, "ovs")) {
928 return true;
929 }
930 if (dump_types->non_offloaded && !(f->attrs.offloaded)) {
931 return true;
932 }
933 return false;
934 }
935
936 static struct hmap *
937 dpctl_get_portno_names(struct dpif *dpif, const struct dpctl_params *dpctl_p)
938 {
939 if (dpctl_p->names) {
940 struct hmap *portno_names = xmalloc(sizeof *portno_names);
941 hmap_init(portno_names);
942
943 struct dpif_port_dump port_dump;
944 struct dpif_port dpif_port;
945 DPIF_PORT_FOR_EACH (&dpif_port, &port_dump, dpif) {
946 odp_portno_names_set(portno_names, dpif_port.port_no,
947 dpif_port.name);
948 }
949
950 return portno_names;
951 } else {
952 return NULL;
953 }
954 }
955
956 static void
957 dpctl_free_portno_names(struct hmap *portno_names)
958 {
959 if (portno_names) {
960 odp_portno_names_destroy(portno_names);
961 hmap_destroy(portno_names);
962 free(portno_names);
963 }
964 }
965
966 static int
967 dpctl_dump_flows(int argc, const char *argv[], struct dpctl_params *dpctl_p)
968 {
969 struct dpif *dpif;
970 struct ds ds;
971
972 char *filter = NULL;
973 struct flow flow_filter;
974 struct flow_wildcards wc_filter;
975 char *types_list = NULL;
976 struct dump_types dump_types;
977 struct dpif_flow_dump_types dpif_dump_types;
978
979 struct dpif_flow_dump_thread *flow_dump_thread;
980 struct dpif_flow_dump *flow_dump;
981 struct dpif_flow f;
982 int pmd_id = PMD_ID_NULL;
983 bool pmd_id_filter = false;
984 int lastargc = 0;
985 int error;
986
987 while (argc > 1 && lastargc != argc) {
988 lastargc = argc;
989 if (!strncmp(argv[argc - 1], "filter=", 7) && !filter) {
990 filter = xstrdup(argv[--argc] + 7);
991 } else if (!strncmp(argv[argc - 1], "type=", 5) && !types_list) {
992 if (!dpctl_p->is_appctl) {
993 dpctl_error(dpctl_p, 0,
994 "Invalid argument 'type'. "
995 "Use 'ovs-appctl dpctl/dump-flows' instead.");
996 error = EINVAL;
997 goto out_free;
998 }
999 types_list = xstrdup(argv[--argc] + 5);
1000 } else if (!strncmp(argv[argc - 1], "pmd=", 4)) {
1001 if (!ovs_scan(argv[--argc], "pmd=%d", &pmd_id)) {
1002 error = EINVAL;
1003 goto out_free;
1004 }
1005
1006 if (pmd_id == -1) {
1007 pmd_id = NON_PMD_CORE_ID;
1008 }
1009 pmd_id_filter = true;
1010 }
1011 }
1012
1013 error = opt_dpif_open(argc, argv, dpctl_p, 2, &dpif);
1014 if (error) {
1015 goto out_free;
1016 }
1017
1018 struct hmap *portno_names = dpctl_get_portno_names(dpif, dpctl_p);
1019
1020 if (filter) {
1021 struct ofputil_port_map port_map;
1022 ofputil_port_map_init(&port_map);
1023
1024 struct dpif_port_dump port_dump;
1025 struct dpif_port dpif_port;
1026 DPIF_PORT_FOR_EACH (&dpif_port, &port_dump, dpif) {
1027 ofputil_port_map_put(&port_map,
1028 u16_to_ofp(odp_to_u32(dpif_port.port_no)),
1029 dpif_port.name);
1030 }
1031 char *err = parse_ofp_exact_flow(&flow_filter, &wc_filter, NULL,
1032 filter, &port_map);
1033 ofputil_port_map_destroy(&port_map);
1034 if (err) {
1035 dpctl_error(dpctl_p, 0, "Failed to parse filter (%s)", err);
1036 free(err);
1037 error = EINVAL;
1038 goto out_dpifclose;
1039 }
1040 }
1041
1042 memset(&dump_types, 0, sizeof dump_types);
1043 error = populate_dump_types(types_list, &dump_types, dpctl_p);
1044 if (error) {
1045 goto out_dpifclose;
1046 }
1047 determine_dpif_flow_dump_types(&dump_types, &dpif_dump_types);
1048
1049 /* Make sure that these values are different. PMD_ID_NULL means that the
1050 * pmd is unspecified (e.g. because the datapath doesn't have different
1051 * pmd threads), while NON_PMD_CORE_ID refers to every non pmd threads
1052 * in the userspace datapath */
1053 BUILD_ASSERT(PMD_ID_NULL != NON_PMD_CORE_ID);
1054
1055 ds_init(&ds);
1056 memset(&f, 0, sizeof f);
1057 flow_dump = dpif_flow_dump_create(dpif, false, &dpif_dump_types);
1058 flow_dump_thread = dpif_flow_dump_thread_create(flow_dump);
1059 while (dpif_flow_dump_next(flow_dump_thread, &f, 1)) {
1060 if (filter) {
1061 struct flow flow;
1062 struct flow_wildcards wc;
1063 struct match match, match_filter;
1064 struct minimatch minimatch;
1065
1066 odp_flow_key_to_flow(f.key, f.key_len, &flow, NULL);
1067 odp_flow_key_to_mask(f.mask, f.mask_len, &wc, &flow, NULL);
1068 match_init(&match, &flow, &wc);
1069
1070 match_init(&match_filter, &flow_filter, &wc);
1071 match_init(&match_filter, &match_filter.flow, &wc_filter);
1072 minimatch_init(&minimatch, &match_filter);
1073
1074 if (!minimatch_matches_flow(&minimatch, &match.flow)) {
1075 minimatch_destroy(&minimatch);
1076 continue;
1077 }
1078 minimatch_destroy(&minimatch);
1079 }
1080 ds_clear(&ds);
1081 /* If 'pmd_id' is specified, overlapping flows could be dumped from
1082 * different pmd threads. So, separates dumps from different pmds
1083 * by printing a title line. */
1084 if (!pmd_id_filter && pmd_id != f.pmd_id) {
1085 if (f.pmd_id == NON_PMD_CORE_ID) {
1086 ds_put_format(&ds, "flow-dump from the main thread:\n");
1087 } else {
1088 ds_put_format(&ds, "flow-dump from pmd on cpu core: %d\n",
1089 f.pmd_id);
1090 }
1091 pmd_id = f.pmd_id;
1092 }
1093 if (pmd_id == f.pmd_id &&
1094 flow_passes_type_filter(&f, &dump_types)) {
1095 format_dpif_flow(&ds, &f, portno_names, dpctl_p);
1096 dpctl_print(dpctl_p, "%s\n", ds_cstr(&ds));
1097 }
1098 }
1099 dpif_flow_dump_thread_destroy(flow_dump_thread);
1100 error = dpif_flow_dump_destroy(flow_dump);
1101
1102 if (error) {
1103 dpctl_error(dpctl_p, error, "Failed to dump flows from datapath");
1104 }
1105 ds_destroy(&ds);
1106
1107 out_dpifclose:
1108 dpctl_free_portno_names(portno_names);
1109 dpif_close(dpif);
1110 out_free:
1111 free(filter);
1112 free(types_list);
1113 return error;
1114 }
1115
1116 static int
1117 dpctl_put_flow(int argc, const char *argv[], enum dpif_flow_put_flags flags,
1118 struct dpctl_params *dpctl_p)
1119 {
1120 const char *key_s = argv[argc - 2];
1121 const char *actions_s = argv[argc - 1];
1122 struct dpif_flow_stats stats;
1123 struct dpif_port dpif_port;
1124 struct dpif_port_dump port_dump;
1125 struct ofpbuf actions;
1126 struct ofpbuf key;
1127 struct ofpbuf mask;
1128 struct dpif *dpif;
1129 ovs_u128 ufid;
1130 bool ufid_present;
1131 struct simap port_names;
1132 int n, error;
1133
1134 error = opt_dpif_open(argc, argv, dpctl_p, 4, &dpif);
1135 if (error) {
1136 return error;
1137 }
1138
1139 ufid_present = false;
1140 n = odp_ufid_from_string(key_s, &ufid);
1141 if (n < 0) {
1142 dpctl_error(dpctl_p, -n, "parsing flow ufid");
1143 return -n;
1144 } else if (n) {
1145 key_s += n;
1146 ufid_present = true;
1147 }
1148
1149 simap_init(&port_names);
1150 DPIF_PORT_FOR_EACH (&dpif_port, &port_dump, dpif) {
1151 simap_put(&port_names, dpif_port.name, odp_to_u32(dpif_port.port_no));
1152 }
1153
1154 ofpbuf_init(&key, 0);
1155 ofpbuf_init(&mask, 0);
1156 char *error_s;
1157 error = odp_flow_from_string(key_s, &port_names, &key, &mask, &error_s);
1158 simap_destroy(&port_names);
1159 if (error) {
1160 dpctl_error(dpctl_p, error, "parsing flow key (%s)", error_s);
1161 free(error_s);
1162 goto out_freekeymask;
1163 }
1164
1165 ofpbuf_init(&actions, 0);
1166 error = odp_actions_from_string(actions_s, NULL, &actions);
1167 if (error) {
1168 dpctl_error(dpctl_p, error, "parsing actions");
1169 goto out_freeactions;
1170 }
1171
1172 if (!ufid_present && dpctl_p->is_appctl) {
1173 /* Generating UFID for this flow so it could be offloaded to HW. We're
1174 * not doing that if invoked from ovs-dpctl utility because
1175 * odp_flow_key_hash() uses randomly generated base for flow hashes
1176 * that will be different for each invocation. And, anyway, offloading
1177 * is only available via appctl. */
1178 odp_flow_key_hash(key.data, key.size, &ufid);
1179 ufid_present = true;
1180 }
1181
1182 /* The flow will be added on all pmds currently in the datapath. */
1183 error = dpif_flow_put(dpif, flags,
1184 key.data, key.size,
1185 mask.size == 0 ? NULL : mask.data,
1186 mask.size, actions.data,
1187 actions.size, ufid_present ? &ufid : NULL,
1188 PMD_ID_NULL,
1189 dpctl_p->print_statistics ? &stats : NULL);
1190
1191 if (error) {
1192 dpctl_error(dpctl_p, error, "updating flow table");
1193 goto out_freeactions;
1194 }
1195
1196 if (dpctl_p->print_statistics) {
1197 struct ds s;
1198
1199 ds_init(&s);
1200 dpif_flow_stats_format(&stats, &s);
1201 dpctl_print(dpctl_p, "%s\n", ds_cstr(&s));
1202 ds_destroy(&s);
1203 }
1204
1205 out_freeactions:
1206 ofpbuf_uninit(&actions);
1207 out_freekeymask:
1208 ofpbuf_uninit(&mask);
1209 ofpbuf_uninit(&key);
1210 dpif_close(dpif);
1211 return error;
1212 }
1213
1214 static int
1215 dpctl_add_flow(int argc, const char *argv[], struct dpctl_params *dpctl_p)
1216 {
1217 return dpctl_put_flow(argc, argv, DPIF_FP_CREATE, dpctl_p);
1218 }
1219
1220 static int
1221 dpctl_mod_flow(int argc, const char *argv[], struct dpctl_params *dpctl_p)
1222 {
1223 enum dpif_flow_put_flags flags;
1224
1225 flags = DPIF_FP_MODIFY;
1226 if (dpctl_p->may_create) {
1227 flags |= DPIF_FP_CREATE;
1228 }
1229 if (dpctl_p->zero_statistics) {
1230 flags |= DPIF_FP_ZERO_STATS;
1231 }
1232
1233 return dpctl_put_flow(argc, argv, flags, dpctl_p);
1234 }
1235
1236 static int
1237 dpctl_get_flow(int argc, const char *argv[], struct dpctl_params *dpctl_p)
1238 {
1239 const char *key_s = argv[argc - 1];
1240 struct dpif_flow flow;
1241 struct dpif *dpif;
1242 ovs_u128 ufid;
1243 struct ofpbuf buf;
1244 uint64_t stub[DPIF_FLOW_BUFSIZE / 8];
1245 struct ds ds;
1246 int n, error;
1247
1248 error = opt_dpif_open(argc, argv, dpctl_p, 3, &dpif);
1249 if (error) {
1250 return error;
1251 }
1252
1253 ofpbuf_use_stub(&buf, &stub, sizeof stub);
1254
1255 struct hmap *portno_names = dpctl_get_portno_names(dpif, dpctl_p);
1256
1257 n = odp_ufid_from_string(key_s, &ufid);
1258 if (n <= 0) {
1259 dpctl_error(dpctl_p, -n, "parsing flow ufid");
1260 goto out;
1261 }
1262
1263 /* In case of PMD will be returned flow from first PMD thread with match. */
1264 error = dpif_flow_get(dpif, NULL, 0, &ufid, PMD_ID_NULL, &buf, &flow);
1265 if (error) {
1266 dpctl_error(dpctl_p, error, "getting flow");
1267 goto out;
1268 }
1269
1270 ds_init(&ds);
1271 format_dpif_flow(&ds, &flow, portno_names, dpctl_p);
1272 dpctl_print(dpctl_p, "%s\n", ds_cstr(&ds));
1273 ds_destroy(&ds);
1274
1275 out:
1276 dpctl_free_portno_names(portno_names);
1277 ofpbuf_uninit(&buf);
1278 dpif_close(dpif);
1279 return error;
1280 }
1281
1282 static int
1283 dpctl_del_flow(int argc, const char *argv[], struct dpctl_params *dpctl_p)
1284 {
1285 const char *key_s = argv[argc - 1];
1286 struct dpif_flow_stats stats;
1287 struct dpif_port dpif_port;
1288 struct dpif_port_dump port_dump;
1289 struct ofpbuf key;
1290 struct ofpbuf mask; /* To be ignored. */
1291 struct dpif *dpif;
1292 ovs_u128 ufid;
1293 bool ufid_generated;
1294 bool ufid_present;
1295 struct simap port_names;
1296 int n, error;
1297
1298 error = opt_dpif_open(argc, argv, dpctl_p, 3, &dpif);
1299 if (error) {
1300 return error;
1301 }
1302
1303 ufid_present = false;
1304 n = odp_ufid_from_string(key_s, &ufid);
1305 if (n < 0) {
1306 dpctl_error(dpctl_p, -n, "parsing flow ufid");
1307 return -n;
1308 } else if (n) {
1309 key_s += n;
1310 ufid_present = true;
1311 }
1312
1313 simap_init(&port_names);
1314 DPIF_PORT_FOR_EACH (&dpif_port, &port_dump, dpif) {
1315 simap_put(&port_names, dpif_port.name, odp_to_u32(dpif_port.port_no));
1316 }
1317
1318 ofpbuf_init(&key, 0);
1319 ofpbuf_init(&mask, 0);
1320
1321 char *error_s;
1322 error = odp_flow_from_string(key_s, &port_names, &key, &mask, &error_s);
1323 if (error) {
1324 dpctl_error(dpctl_p, error, "%s", error_s);
1325 free(error_s);
1326 goto out;
1327 }
1328
1329 if (!ufid_present && dpctl_p->is_appctl) {
1330 /* While adding flow via appctl we're generating UFID to make HW
1331 * offloading possible. Generating UFID here to be sure that such
1332 * flows could be removed the same way they were added. */
1333 odp_flow_key_hash(key.data, key.size, &ufid);
1334 ufid_present = ufid_generated = true;
1335 }
1336
1337 /* The flow will be deleted from all pmds currently in the datapath. */
1338 error = dpif_flow_del(dpif, key.data, key.size,
1339 ufid_present ? &ufid : NULL, PMD_ID_NULL,
1340 dpctl_p->print_statistics ? &stats : NULL);
1341
1342 if (error) {
1343 dpctl_error(dpctl_p, error, "deleting flow");
1344 if (error == ENOENT && (!ufid_present || ufid_generated)) {
1345 struct ds s;
1346
1347 ds_init(&s);
1348 ds_put_format(&s, "Perhaps you need to specify a UFID?");
1349 dpctl_print(dpctl_p, "%s\n", ds_cstr(&s));
1350 ds_destroy(&s);
1351 }
1352 goto out;
1353 }
1354
1355 if (dpctl_p->print_statistics) {
1356 struct ds s;
1357
1358 ds_init(&s);
1359 dpif_flow_stats_format(&stats, &s);
1360 dpctl_print(dpctl_p, "%s\n", ds_cstr(&s));
1361 ds_destroy(&s);
1362 }
1363
1364 out:
1365 ofpbuf_uninit(&mask);
1366 ofpbuf_uninit(&key);
1367 simap_destroy(&port_names);
1368 dpif_close(dpif);
1369 return error;
1370 }
1371
1372 static int
1373 dpctl_del_flows(int argc, const char *argv[], struct dpctl_params *dpctl_p)
1374 {
1375 struct dpif *dpif;
1376
1377 int error = opt_dpif_open(argc, argv, dpctl_p, 2, &dpif);
1378 if (error) {
1379 return error;
1380 }
1381
1382 error = dpif_flow_flush(dpif);
1383 if (error) {
1384 dpctl_error(dpctl_p, error, "deleting all flows");
1385 }
1386 dpif_close(dpif);
1387 return error;
1388 }
1389
1390 static int
1391 dpctl_help(int argc OVS_UNUSED, const char *argv[] OVS_UNUSED,
1392 struct dpctl_params *dpctl_p)
1393 {
1394 if (dpctl_p->usage) {
1395 dpctl_p->usage(dpctl_p->aux);
1396 }
1397
1398 return 0;
1399 }
1400
1401 static int
1402 dpctl_list_commands(int argc OVS_UNUSED, const char *argv[] OVS_UNUSED,
1403 struct dpctl_params *dpctl_p)
1404 {
1405 struct ds ds = DS_EMPTY_INITIALIZER;
1406 const struct dpctl_command *commands = get_all_dpctl_commands();
1407
1408 ds_put_cstr(&ds, "The available commands are:\n");
1409 for (; commands->name; commands++) {
1410 const struct dpctl_command *c = commands;
1411
1412 if (dpctl_p->is_appctl && !strcmp(c->name, "help")) {
1413 continue;
1414 }
1415
1416 ds_put_format(&ds, " %s%-23s %s\n", dpctl_p->is_appctl ? "dpctl/" : "",
1417 c->name, c->usage);
1418 }
1419 dpctl_puts(dpctl_p, false, ds.string);
1420 ds_destroy(&ds);
1421
1422 return 0;
1423 }
1424 \f
1425
1426 static int
1427 dpctl_dump_conntrack(int argc, const char *argv[],
1428 struct dpctl_params *dpctl_p)
1429 {
1430 struct ct_dpif_dump_state *dump;
1431 struct ct_dpif_entry cte;
1432 uint16_t zone, *pzone = NULL;
1433 int tot_bkts;
1434 struct dpif *dpif;
1435 int error;
1436
1437 if (argc > 1 && ovs_scan(argv[argc - 1], "zone=%"SCNu16, &zone)) {
1438 pzone = &zone;
1439 argc--;
1440 }
1441
1442 error = opt_dpif_open(argc, argv, dpctl_p, 2, &dpif);
1443 if (error) {
1444 return error;
1445 }
1446
1447 error = ct_dpif_dump_start(dpif, &dump, pzone, &tot_bkts);
1448 if (error) {
1449 dpctl_error(dpctl_p, error, "starting conntrack dump");
1450 dpif_close(dpif);
1451 return error;
1452 }
1453
1454 while (!(error = ct_dpif_dump_next(dump, &cte))) {
1455 struct ds s = DS_EMPTY_INITIALIZER;
1456
1457 ct_dpif_format_entry(&cte, &s, dpctl_p->verbosity,
1458 dpctl_p->print_statistics);
1459 ct_dpif_entry_uninit(&cte);
1460
1461 dpctl_print(dpctl_p, "%s\n", ds_cstr(&s));
1462 ds_destroy(&s);
1463 }
1464 if (error == EOF) {
1465 /* Any CT entry was dumped with no issue. */
1466 error = 0;
1467 } else if (error) {
1468 dpctl_error(dpctl_p, error, "dumping conntrack entry");
1469 }
1470
1471 ct_dpif_dump_done(dump);
1472 dpif_close(dpif);
1473 return error;
1474 }
1475
1476 static int
1477 dpctl_flush_conntrack(int argc, const char *argv[],
1478 struct dpctl_params *dpctl_p)
1479 {
1480 struct dpif *dpif = NULL;
1481 struct ct_dpif_tuple tuple, *ptuple = NULL;
1482 struct ds ds = DS_EMPTY_INITIALIZER;
1483 uint16_t zone, *pzone = NULL;
1484 int error;
1485 int args = argc - 1;
1486
1487 /* Parse ct tuple */
1488 if (args && ct_dpif_parse_tuple(&tuple, argv[args], &ds)) {
1489 ptuple = &tuple;
1490 args--;
1491 }
1492
1493 /* Parse zone */
1494 if (args && ovs_scan(argv[args], "zone=%"SCNu16, &zone)) {
1495 pzone = &zone;
1496 args--;
1497 }
1498
1499 /* Report error if there are more than one unparsed argument. */
1500 if (args > 1) {
1501 ds_put_cstr(&ds, "invalid arguments");
1502 error = EINVAL;
1503 goto error;
1504 }
1505
1506 error = opt_dpif_open(argc, argv, dpctl_p, 4, &dpif);
1507 if (error) {
1508 return error;
1509 }
1510
1511 error = ct_dpif_flush(dpif, pzone, ptuple);
1512 if (!error) {
1513 dpif_close(dpif);
1514 return 0;
1515 } else {
1516 ds_put_cstr(&ds, "failed to flush conntrack");
1517 }
1518
1519 error:
1520 dpctl_error(dpctl_p, error, "%s", ds_cstr(&ds));
1521 ds_destroy(&ds);
1522 dpif_close(dpif);
1523 return error;
1524 }
1525
1526 static int
1527 dpctl_ct_stats_show(int argc, const char *argv[],
1528 struct dpctl_params *dpctl_p)
1529 {
1530 struct dpif *dpif;
1531 struct ct_dpif_dump_state *dump;
1532 struct ct_dpif_entry cte;
1533 uint16_t zone, *pzone = NULL;
1534 int tot_bkts;
1535 int lastargc = 0;
1536
1537 int proto_stats[CT_STATS_MAX];
1538 int tcp_conn_per_states[CT_DPIF_TCPS_MAX_NUM];
1539 int error;
1540
1541 bool verbose = dpctl_p->verbosity;
1542
1543 while (argc > 1 && lastargc != argc) {
1544 lastargc = argc;
1545 if (!strncmp(argv[argc - 1], "verbose", 7)) {
1546 /* Support "verbose" argument for backwards compatibility. */
1547 verbose = true;
1548 argc--;
1549 } else if (!strncmp(argv[argc - 1], "zone=", 5)) {
1550 if (ovs_scan(argv[argc - 1], "zone=%"SCNu16, &zone)) {
1551 pzone = &zone;
1552 argc--;
1553 }
1554 }
1555 }
1556
1557 error = opt_dpif_open(argc, argv, dpctl_p, 2, &dpif);
1558 if (error) {
1559 return error;
1560 }
1561
1562 memset(proto_stats, 0, sizeof(proto_stats));
1563 memset(tcp_conn_per_states, 0, sizeof(tcp_conn_per_states));
1564 error = ct_dpif_dump_start(dpif, &dump, pzone, &tot_bkts);
1565 if (error) {
1566 dpctl_error(dpctl_p, error, "starting conntrack dump");
1567 dpif_close(dpif);
1568 return error;
1569 }
1570
1571 int tot_conn = 0;
1572 while (!(error = ct_dpif_dump_next(dump, &cte))) {
1573 ct_dpif_entry_uninit(&cte);
1574 tot_conn++;
1575 switch (cte.tuple_orig.ip_proto) {
1576 case IPPROTO_ICMP:
1577 proto_stats[CT_STATS_ICMP]++;
1578 break;
1579 case IPPROTO_ICMPV6:
1580 proto_stats[CT_STATS_ICMPV6]++;
1581 break;
1582 case IPPROTO_TCP:
1583 proto_stats[CT_STATS_TCP]++;
1584 uint8_t tcp_state;
1585 /* We keep two separate tcp states, but we print just one. The
1586 * Linux kernel connection tracker internally keeps only one state,
1587 * so 'state_orig' and 'state_reply', will be the same. */
1588 tcp_state = MAX(cte.protoinfo.tcp.state_orig,
1589 cte.protoinfo.tcp.state_reply);
1590 tcp_state = ct_dpif_coalesce_tcp_state(tcp_state);
1591 tcp_conn_per_states[tcp_state]++;
1592 break;
1593 case IPPROTO_UDP:
1594 proto_stats[CT_STATS_UDP]++;
1595 break;
1596 case IPPROTO_SCTP:
1597 proto_stats[CT_STATS_SCTP]++;
1598 break;
1599 case IPPROTO_UDPLITE:
1600 proto_stats[CT_STATS_UDPLITE]++;
1601 break;
1602 case IPPROTO_DCCP:
1603 proto_stats[CT_STATS_DCCP]++;
1604 break;
1605 case IPPROTO_IGMP:
1606 proto_stats[CT_STATS_IGMP]++;
1607 break;
1608 default:
1609 proto_stats[CT_STATS_OTHER]++;
1610 break;
1611 }
1612 }
1613 if (error == EOF) {
1614 /* All CT entries were dumped with no issue. */
1615 error = 0;
1616 } else if (error) {
1617 dpctl_error(dpctl_p, error, "dumping conntrack entry");
1618 /* Fall through to show any other info we collected. */
1619 }
1620
1621 dpctl_print(dpctl_p, "Connections Stats:\n Total: %d\n", tot_conn);
1622 if (proto_stats[CT_STATS_TCP]) {
1623 dpctl_print(dpctl_p, " TCP: %d\n", proto_stats[CT_STATS_TCP]);
1624 if (verbose) {
1625 dpctl_print(dpctl_p, " Conn per TCP states:\n");
1626 for (int i = 0; i < CT_DPIF_TCPS_MAX_NUM; i++) {
1627 if (tcp_conn_per_states[i]) {
1628 struct ds s = DS_EMPTY_INITIALIZER;
1629 ct_dpif_format_tcp_stat(&s, i, tcp_conn_per_states[i]);
1630 dpctl_print(dpctl_p, "%s\n", ds_cstr(&s));
1631 ds_destroy(&s);
1632 }
1633 }
1634 }
1635 }
1636 if (proto_stats[CT_STATS_UDP]) {
1637 dpctl_print(dpctl_p, " UDP: %d\n", proto_stats[CT_STATS_UDP]);
1638 }
1639 if (proto_stats[CT_STATS_UDPLITE]) {
1640 dpctl_print(dpctl_p, " UDPLITE: %d\n", proto_stats[CT_STATS_UDPLITE]);
1641 }
1642 if (proto_stats[CT_STATS_SCTP]) {
1643 dpctl_print(dpctl_p, " SCTP: %d\n", proto_stats[CT_STATS_SCTP]);
1644 }
1645 if (proto_stats[CT_STATS_ICMP]) {
1646 dpctl_print(dpctl_p, " ICMP: %d\n", proto_stats[CT_STATS_ICMP]);
1647 }
1648 if (proto_stats[CT_STATS_DCCP]) {
1649 dpctl_print(dpctl_p, " DCCP: %d\n", proto_stats[CT_STATS_DCCP]);
1650 }
1651 if (proto_stats[CT_STATS_IGMP]) {
1652 dpctl_print(dpctl_p, " IGMP: %d\n", proto_stats[CT_STATS_IGMP]);
1653 }
1654 if (proto_stats[CT_STATS_OTHER]) {
1655 dpctl_print(dpctl_p, " Other: %d\n", proto_stats[CT_STATS_OTHER]);
1656 }
1657
1658 ct_dpif_dump_done(dump);
1659 dpif_close(dpif);
1660 return error;
1661 }
1662
1663 #define CT_BKTS_GT "gt="
1664 static int
1665 dpctl_ct_bkts(int argc, const char *argv[],
1666 struct dpctl_params *dpctl_p)
1667 {
1668 struct dpif *dpif;
1669 struct ct_dpif_dump_state *dump;
1670 struct ct_dpif_entry cte;
1671 uint16_t gt = 0; /* Threshold: display value when greater than gt. */
1672 uint16_t *pzone = NULL;
1673 int tot_bkts = 0;
1674 int error;
1675
1676 if (argc > 1 && !strncmp(argv[argc - 1], CT_BKTS_GT, strlen(CT_BKTS_GT))) {
1677 if (ovs_scan(argv[argc - 1], CT_BKTS_GT"%"SCNu16, &gt)) {
1678 argc--;
1679 }
1680 }
1681
1682 error = opt_dpif_open(argc, argv, dpctl_p, 2, &dpif);
1683 if (error) {
1684 return error;
1685 }
1686
1687 error = ct_dpif_dump_start(dpif, &dump, pzone, &tot_bkts);
1688 if (error) {
1689 dpctl_error(dpctl_p, error, "starting conntrack dump");
1690 dpif_close(dpif);
1691 return error;
1692 }
1693 if (tot_bkts == -1) {
1694 /* Command not available when called by kernel OvS. */
1695 dpctl_print(dpctl_p,
1696 "Command is available for UserSpace ConnTracker only.\n");
1697 ct_dpif_dump_done(dump);
1698 dpif_close(dpif);
1699 return 0;
1700 }
1701
1702 dpctl_print(dpctl_p, "Total Buckets: %d\n", tot_bkts);
1703
1704 int tot_conn = 0;
1705 uint32_t *conn_per_bkts = xzalloc(tot_bkts * sizeof(uint32_t));
1706
1707 while (!(error = ct_dpif_dump_next(dump, &cte))) {
1708 ct_dpif_entry_uninit(&cte);
1709 tot_conn++;
1710 if (tot_bkts > 0) {
1711 if (cte.bkt < tot_bkts) {
1712 conn_per_bkts[cte.bkt]++;
1713 } else {
1714 dpctl_print(dpctl_p, "Bucket nr out of range: %d >= %d\n",
1715 cte.bkt, tot_bkts);
1716 }
1717 }
1718 }
1719 if (error == EOF) {
1720 /* All CT entries were dumped with no issue. */
1721 error = 0;
1722 } else if (error) {
1723 dpctl_error(dpctl_p, error, "dumping conntrack entry");
1724 /* Fall through and display all the collected info. */
1725 }
1726
1727 dpctl_print(dpctl_p, "Current Connections: %d\n", tot_conn);
1728 dpctl_print(dpctl_p, "\n");
1729 if (tot_bkts && tot_conn) {
1730 dpctl_print(dpctl_p, "+-----------+"
1731 "-----------------------------------------+\n");
1732 dpctl_print(dpctl_p, "| Buckets |"
1733 " Connections per Buckets |\n");
1734 dpctl_print(dpctl_p, "+-----------+"
1735 "-----------------------------------------+");
1736 #define NUM_BKTS_DIPLAYED_PER_ROW 8
1737 for (int i = 0; i < tot_bkts; i++) {
1738 if (i % NUM_BKTS_DIPLAYED_PER_ROW == 0) {
1739 dpctl_print(dpctl_p, "\n %3d..%3d | ",
1740 i, i + NUM_BKTS_DIPLAYED_PER_ROW - 1);
1741 }
1742 if (conn_per_bkts[i] > gt) {
1743 dpctl_print(dpctl_p, "%5d", conn_per_bkts[i]);
1744 } else {
1745 dpctl_print(dpctl_p, "%5s", ".");
1746 }
1747 }
1748 dpctl_print(dpctl_p, "\n\n");
1749 }
1750
1751 ct_dpif_dump_done(dump);
1752 dpif_close(dpif);
1753 free(conn_per_bkts);
1754 return error;
1755 }
1756 \f
1757 static int
1758 dpctl_ct_set_maxconns(int argc, const char *argv[],
1759 struct dpctl_params *dpctl_p)
1760 {
1761 struct dpif *dpif;
1762 int error = opt_dpif_open(argc, argv, dpctl_p, 3, &dpif);
1763 if (!error) {
1764 uint32_t maxconns;
1765 if (ovs_scan(argv[argc - 1], "%"SCNu32, &maxconns)) {
1766 error = ct_dpif_set_maxconns(dpif, maxconns);
1767
1768 if (!error) {
1769 dpctl_print(dpctl_p, "setting maxconns successful");
1770 } else {
1771 dpctl_error(dpctl_p, error, "ct set maxconns failed");
1772 }
1773 } else {
1774 error = EINVAL;
1775 dpctl_error(dpctl_p, error, "maxconns missing or malformed");
1776 }
1777 dpif_close(dpif);
1778 }
1779
1780 return error;
1781 }
1782
1783 static int
1784 dpctl_ct_get_maxconns(int argc, const char *argv[],
1785 struct dpctl_params *dpctl_p)
1786 {
1787 struct dpif *dpif;
1788 int error = opt_dpif_open(argc, argv, dpctl_p, 2, &dpif);
1789 if (!error) {
1790 uint32_t maxconns;
1791 error = ct_dpif_get_maxconns(dpif, &maxconns);
1792
1793 if (!error) {
1794 dpctl_print(dpctl_p, "%u\n", maxconns);
1795 } else {
1796 dpctl_error(dpctl_p, error, "maxconns could not be retrieved");
1797 }
1798 dpif_close(dpif);
1799 }
1800
1801 return error;
1802 }
1803
1804 static int
1805 dpctl_ct_get_nconns(int argc, const char *argv[],
1806 struct dpctl_params *dpctl_p)
1807 {
1808 struct dpif *dpif;
1809 int error = opt_dpif_open(argc, argv, dpctl_p, 2, &dpif);
1810 if (!error) {
1811 uint32_t nconns;
1812 error = ct_dpif_get_nconns(dpif, &nconns);
1813
1814 if (!error) {
1815 dpctl_print(dpctl_p, "%u\n", nconns);
1816 } else {
1817 dpctl_error(dpctl_p, error, "nconns could not be retrieved");
1818 }
1819 dpif_close(dpif);
1820 }
1821
1822 return error;
1823 }
1824
1825 static int
1826 dpctl_ct_set_tcp_seq_chk__(int argc, const char *argv[],
1827 struct dpctl_params *dpctl_p, bool enabled)
1828 {
1829 struct dpif *dpif;
1830 int error = opt_dpif_open(argc, argv, dpctl_p, 3, &dpif);
1831 if (!error) {
1832 error = ct_dpif_set_tcp_seq_chk(dpif, enabled);
1833 if (!error) {
1834 dpctl_print(dpctl_p,
1835 "%s TCP sequence checking successful",
1836 enabled ? "enabling" : "disabling");
1837 } else {
1838 dpctl_error(dpctl_p, error,
1839 "%s TCP sequence checking failed",
1840 enabled ? "enabling" : "disabling");
1841 }
1842 dpif_close(dpif);
1843 }
1844 return error;
1845 }
1846
1847 static int
1848 dpctl_ct_enable_tcp_seq_chk(int argc, const char *argv[],
1849 struct dpctl_params *dpctl_p)
1850 {
1851 return dpctl_ct_set_tcp_seq_chk__(argc, argv, dpctl_p, true);
1852 }
1853
1854 static int
1855 dpctl_ct_disable_tcp_seq_chk(int argc, const char *argv[],
1856 struct dpctl_params *dpctl_p)
1857 {
1858 return dpctl_ct_set_tcp_seq_chk__(argc, argv, dpctl_p, false);
1859 }
1860
1861 static int
1862 dpctl_ct_get_tcp_seq_chk(int argc, const char *argv[],
1863 struct dpctl_params *dpctl_p)
1864 {
1865 struct dpif *dpif;
1866 int error = opt_dpif_open(argc, argv, dpctl_p, 2, &dpif);
1867 if (!error) {
1868 bool enabled;
1869 error = ct_dpif_get_tcp_seq_chk(dpif, &enabled);
1870 if (!error) {
1871 dpctl_print(dpctl_p, "TCP sequence checking: %s\n",
1872 enabled ? "enabled" : "disabled");
1873 } else {
1874 dpctl_error(dpctl_p, error, "TCP sequence checking query failed");
1875 }
1876 dpif_close(dpif);
1877 }
1878 return error;
1879 }
1880
1881 static int
1882 dpctl_ct_set_limits(int argc, const char *argv[],
1883 struct dpctl_params *dpctl_p)
1884 {
1885 struct dpif *dpif;
1886 struct ds ds = DS_EMPTY_INITIALIZER;
1887 int i = dp_arg_exists(argc, argv) ? 2 : 1;
1888 uint32_t default_limit, *p_default_limit = NULL;
1889 struct ovs_list zone_limits = OVS_LIST_INITIALIZER(&zone_limits);
1890
1891 int error = opt_dpif_open(argc, argv, dpctl_p, INT_MAX, &dpif);
1892 if (error) {
1893 return error;
1894 }
1895
1896 /* Parse default limit */
1897 if (!strncmp(argv[i], "default=", 8)) {
1898 if (ovs_scan(argv[i], "default=%"SCNu32, &default_limit)) {
1899 p_default_limit = &default_limit;
1900 i++;
1901 } else {
1902 ds_put_cstr(&ds, "invalid default limit");
1903 error = EINVAL;
1904 goto error;
1905 }
1906 }
1907
1908 /* Parse ct zone limit tuples */
1909 while (i < argc) {
1910 uint16_t zone;
1911 uint32_t limit;
1912 if (!ct_dpif_parse_zone_limit_tuple(argv[i++], &zone, &limit, &ds)) {
1913 error = EINVAL;
1914 goto error;
1915 }
1916 ct_dpif_push_zone_limit(&zone_limits, zone, limit, 0);
1917 }
1918
1919 error = ct_dpif_set_limits(dpif, p_default_limit, &zone_limits);
1920 if (!error) {
1921 ct_dpif_free_zone_limits(&zone_limits);
1922 dpif_close(dpif);
1923 return 0;
1924 } else {
1925 ds_put_cstr(&ds, "failed to set conntrack limit");
1926 }
1927
1928 error:
1929 dpctl_error(dpctl_p, error, "%s", ds_cstr(&ds));
1930 ds_destroy(&ds);
1931 ct_dpif_free_zone_limits(&zone_limits);
1932 dpif_close(dpif);
1933 return error;
1934 }
1935
1936 static int
1937 parse_ct_limit_zones(const char *argv, struct ovs_list *zone_limits,
1938 struct ds *ds)
1939 {
1940 char *save_ptr = NULL, *argcopy, *next_zone;
1941 uint16_t zone;
1942
1943 if (strncmp(argv, "zone=", 5)) {
1944 ds_put_format(ds, "invalid argument %s", argv);
1945 return EINVAL;
1946 }
1947
1948 argcopy = xstrdup(argv + 5);
1949 next_zone = strtok_r(argcopy, ",", &save_ptr);
1950
1951 do {
1952 if (ovs_scan(next_zone, "%"SCNu16, &zone)) {
1953 ct_dpif_push_zone_limit(zone_limits, zone, 0, 0);
1954 } else {
1955 ds_put_cstr(ds, "invalid zone");
1956 free(argcopy);
1957 return EINVAL;
1958 }
1959 } while ((next_zone = strtok_r(NULL, ",", &save_ptr)) != NULL);
1960
1961 free(argcopy);
1962 return 0;
1963 }
1964
1965 static int
1966 dpctl_ct_del_limits(int argc, const char *argv[],
1967 struct dpctl_params *dpctl_p)
1968 {
1969 struct dpif *dpif;
1970 struct ds ds = DS_EMPTY_INITIALIZER;
1971 int error;
1972 int i = dp_arg_exists(argc, argv) ? 2 : 1;
1973 struct ovs_list zone_limits = OVS_LIST_INITIALIZER(&zone_limits);
1974
1975 error = opt_dpif_open(argc, argv, dpctl_p, 3, &dpif);
1976 if (error) {
1977 return error;
1978 }
1979
1980 error = parse_ct_limit_zones(argv[i], &zone_limits, &ds);
1981 if (error) {
1982 goto error;
1983 }
1984
1985 error = ct_dpif_del_limits(dpif, &zone_limits);
1986 if (!error) {
1987 goto out;
1988 } else {
1989 ds_put_cstr(&ds, "failed to delete conntrack limit");
1990 }
1991
1992 error:
1993 dpctl_error(dpctl_p, error, "%s", ds_cstr(&ds));
1994 ds_destroy(&ds);
1995 out:
1996 ct_dpif_free_zone_limits(&zone_limits);
1997 dpif_close(dpif);
1998 return error;
1999 }
2000
2001 static int
2002 dpctl_ct_get_limits(int argc, const char *argv[],
2003 struct dpctl_params *dpctl_p)
2004 {
2005 struct dpif *dpif;
2006 struct ds ds = DS_EMPTY_INITIALIZER;
2007 uint32_t default_limit;
2008 int i = dp_arg_exists(argc, argv) ? 2 : 1;
2009 struct ovs_list list_query = OVS_LIST_INITIALIZER(&list_query);
2010 struct ovs_list list_reply = OVS_LIST_INITIALIZER(&list_reply);
2011
2012 int error = opt_dpif_open(argc, argv, dpctl_p, 3, &dpif);
2013 if (error) {
2014 return error;
2015 }
2016
2017 if (argc > i) {
2018 error = parse_ct_limit_zones(argv[i], &list_query, &ds);
2019 if (error) {
2020 goto error;
2021 }
2022 }
2023
2024 error = ct_dpif_get_limits(dpif, &default_limit, &list_query,
2025 &list_reply);
2026 if (!error) {
2027 ct_dpif_format_zone_limits(default_limit, &list_reply, &ds);
2028 dpctl_print(dpctl_p, "%s\n", ds_cstr(&ds));
2029 goto out;
2030 } else {
2031 ds_put_format(&ds, "failed to get conntrack limit %s",
2032 ovs_strerror(error));
2033 }
2034
2035 error:
2036 dpctl_error(dpctl_p, error, "%s", ds_cstr(&ds));
2037 out:
2038 ds_destroy(&ds);
2039 ct_dpif_free_zone_limits(&list_query);
2040 ct_dpif_free_zone_limits(&list_reply);
2041 dpif_close(dpif);
2042 return error;
2043 }
2044
2045 static int
2046 ipf_set_enabled__(int argc, const char *argv[], struct dpctl_params *dpctl_p,
2047 bool enabled)
2048 {
2049 struct dpif *dpif;
2050 int error = opt_dpif_open(argc, argv, dpctl_p, 4, &dpif);
2051 if (!error) {
2052 char v4_or_v6[3] = {0};
2053 if (ovs_scan(argv[argc - 1], "%2s", v4_or_v6) &&
2054 (!strncmp(v4_or_v6, "v4", 2) || !strncmp(v4_or_v6, "v6", 2))) {
2055 error = ct_dpif_ipf_set_enabled(
2056 dpif, !strncmp(v4_or_v6, "v6", 2), enabled);
2057 if (!error) {
2058 dpctl_print(dpctl_p,
2059 "%s fragmentation reassembly successful",
2060 enabled ? "enabling" : "disabling");
2061 } else {
2062 dpctl_error(dpctl_p, error,
2063 "%s fragmentation reassembly failed",
2064 enabled ? "enabling" : "disabling");
2065 }
2066 } else {
2067 error = EINVAL;
2068 dpctl_error(dpctl_p, error,
2069 "parameter missing: 'v4' for IPv4 or 'v6' for IPv6");
2070 }
2071 dpif_close(dpif);
2072 }
2073 return error;
2074 }
2075
2076 static int
2077 dpctl_ipf_set_enabled(int argc, const char *argv[],
2078 struct dpctl_params *dpctl_p)
2079 {
2080 return ipf_set_enabled__(argc, argv, dpctl_p, true);
2081 }
2082
2083 static int
2084 dpctl_ipf_set_disabled(int argc, const char *argv[],
2085 struct dpctl_params *dpctl_p)
2086 {
2087 return ipf_set_enabled__(argc, argv, dpctl_p, false);
2088 }
2089
2090 static int
2091 dpctl_ipf_set_min_frag(int argc, const char *argv[],
2092 struct dpctl_params *dpctl_p)
2093 {
2094 struct dpif *dpif;
2095 int error = opt_dpif_open(argc, argv, dpctl_p, 4, &dpif);
2096 if (!error) {
2097 char v4_or_v6[3] = {0};
2098 if (ovs_scan(argv[argc - 2], "%2s", v4_or_v6) &&
2099 (!strncmp(v4_or_v6, "v4", 2) || !strncmp(v4_or_v6, "v6", 2))) {
2100 uint32_t min_fragment;
2101 if (ovs_scan(argv[argc - 1], "%"SCNu32, &min_fragment)) {
2102 error = ct_dpif_ipf_set_min_frag(
2103 dpif, !strncmp(v4_or_v6, "v6", 2), min_fragment);
2104 if (!error) {
2105 dpctl_print(dpctl_p,
2106 "setting minimum fragment size successful");
2107 } else {
2108 dpctl_error(dpctl_p, error,
2109 "requested minimum fragment size too small;"
2110 " see documentation");
2111 }
2112 } else {
2113 error = EINVAL;
2114 dpctl_error(dpctl_p, error,
2115 "parameter missing for minimum fragment size");
2116 }
2117 } else {
2118 error = EINVAL;
2119 dpctl_error(dpctl_p, error,
2120 "parameter missing: v4 for IPv4 or v6 for IPv6");
2121 }
2122 dpif_close(dpif);
2123 }
2124
2125 return error;
2126 }
2127
2128 static int
2129 dpctl_ipf_set_max_nfrags(int argc, const char *argv[],
2130 struct dpctl_params *dpctl_p)
2131 {
2132 struct dpif *dpif;
2133 int error = opt_dpif_open(argc, argv, dpctl_p, 3, &dpif);
2134 if (!error) {
2135 uint32_t nfrags_max;
2136 if (ovs_scan(argv[argc - 1], "%"SCNu32, &nfrags_max)) {
2137 error = ct_dpif_ipf_set_max_nfrags(dpif, nfrags_max);
2138 if (!error) {
2139 dpctl_print(dpctl_p,
2140 "setting maximum fragments successful");
2141 } else {
2142 dpctl_error(dpctl_p, error,
2143 "setting maximum fragments failed");
2144 }
2145 } else {
2146 error = EINVAL;
2147 dpctl_error(dpctl_p, error,
2148 "parameter missing for maximum fragments");
2149 }
2150 dpif_close(dpif);
2151 }
2152
2153 return error;
2154 }
2155
2156 static void
2157 dpctl_dump_ipf(struct dpif *dpif, struct dpctl_params *dpctl_p)
2158 {
2159 struct ipf_dump_ctx *dump_ctx;
2160 char *dump;
2161
2162 int error = ct_dpif_ipf_dump_start(dpif, &dump_ctx);
2163 if (error) {
2164 dpctl_error(dpctl_p, error, "starting ipf list dump");
2165 /* Nothing to clean up, just return. */
2166 return;
2167 }
2168
2169 dpctl_print(dpctl_p, "\n Fragment Lists:\n\n");
2170 while (!(error = ct_dpif_ipf_dump_next(dpif, dump_ctx, &dump))) {
2171 dpctl_print(dpctl_p, "%s\n", dump);
2172 free(dump);
2173 }
2174
2175 if (error && error != EOF) {
2176 dpctl_error(dpctl_p, error, "dumping ipf lists failed");
2177 }
2178
2179 ct_dpif_ipf_dump_done(dpif, dump_ctx);
2180 }
2181
2182 static int
2183 dpctl_ct_ipf_get_status(int argc, const char *argv[],
2184 struct dpctl_params *dpctl_p)
2185 {
2186 struct dpif *dpif;
2187 int error = opt_dpif_open(argc, argv, dpctl_p, 2, &dpif);
2188
2189 if (!error) {
2190 struct dpif_ipf_status dpif_ipf_status;
2191 error = ct_dpif_ipf_get_status(dpif, &dpif_ipf_status);
2192
2193 if (!error) {
2194 dpctl_print(dpctl_p, " Fragmentation Module Status\n");
2195 dpctl_print(dpctl_p, " ---------------------------\n");
2196 dpctl_print(dpctl_p, " v4 enabled: %u\n",
2197 dpif_ipf_status.v4.enabled);
2198 dpctl_print(dpctl_p, " v6 enabled: %u\n",
2199 dpif_ipf_status.v6.enabled);
2200 dpctl_print(dpctl_p, " max num frags (v4/v6): %u\n",
2201 dpif_ipf_status.nfrag_max);
2202 dpctl_print(dpctl_p, " num frag: %u\n",
2203 dpif_ipf_status.nfrag);
2204 dpctl_print(dpctl_p, " min v4 frag size: %u\n",
2205 dpif_ipf_status.v4.min_frag_size);
2206 dpctl_print(dpctl_p, " v4 frags accepted: %"PRIu64"\n",
2207 dpif_ipf_status.v4.nfrag_accepted);
2208 dpctl_print(dpctl_p, " v4 frags completed: %"PRIu64"\n",
2209 dpif_ipf_status.v4.nfrag_completed_sent);
2210 dpctl_print(dpctl_p, " v4 frags expired: %"PRIu64"\n",
2211 dpif_ipf_status.v4.nfrag_expired_sent);
2212 dpctl_print(dpctl_p, " v4 frags too small: %"PRIu64"\n",
2213 dpif_ipf_status.v4.nfrag_too_small);
2214 dpctl_print(dpctl_p, " v4 frags overlapped: %"PRIu64"\n",
2215 dpif_ipf_status.v4.nfrag_overlap);
2216 dpctl_print(dpctl_p, " v4 frags purged: %"PRIu64"\n",
2217 dpif_ipf_status.v4.nfrag_purged);
2218
2219 dpctl_print(dpctl_p, " min v6 frag size: %u\n",
2220 dpif_ipf_status.v6.min_frag_size);
2221 dpctl_print(dpctl_p, " v6 frags accepted: %"PRIu64"\n",
2222 dpif_ipf_status.v6.nfrag_accepted);
2223 dpctl_print(dpctl_p, " v6 frags completed: %"PRIu64"\n",
2224 dpif_ipf_status.v6.nfrag_completed_sent);
2225 dpctl_print(dpctl_p, " v6 frags expired: %"PRIu64"\n",
2226 dpif_ipf_status.v6.nfrag_expired_sent);
2227 dpctl_print(dpctl_p, " v6 frags too small: %"PRIu64"\n",
2228 dpif_ipf_status.v6.nfrag_too_small);
2229 dpctl_print(dpctl_p, " v6 frags overlapped: %"PRIu64"\n",
2230 dpif_ipf_status.v6.nfrag_overlap);
2231 dpctl_print(dpctl_p, " v6 frags purged: %"PRIu64"\n",
2232 dpif_ipf_status.v6.nfrag_purged);
2233 } else {
2234 dpctl_error(dpctl_p, error,
2235 "ipf status could not be retrieved");
2236 return error;
2237 }
2238
2239 if (dpctl_p->verbosity) {
2240 dpctl_dump_ipf(dpif, dpctl_p);
2241 }
2242
2243 dpif_close(dpif);
2244 }
2245
2246 return error;
2247 }
2248
2249 /* Undocumented commands for unit testing. */
2250
2251 static int
2252 dpctl_parse_actions(int argc, const char *argv[], struct dpctl_params* dpctl_p)
2253 {
2254 int i, error = 0;
2255
2256 for (i = 1; i < argc; i++) {
2257 struct ofpbuf actions;
2258 struct ds s;
2259
2260 ofpbuf_init(&actions, 0);
2261 error = odp_actions_from_string(argv[i], NULL, &actions);
2262
2263 if (error) {
2264 ofpbuf_uninit(&actions);
2265 dpctl_error(dpctl_p, error, "odp_actions_from_string");
2266 return error;
2267 }
2268
2269 ds_init(&s);
2270 format_odp_actions(&s, actions.data, actions.size, NULL);
2271 dpctl_print(dpctl_p, "%s\n", ds_cstr(&s));
2272 ds_destroy(&s);
2273
2274 ofpbuf_uninit(&actions);
2275 }
2276
2277 return error;
2278 }
2279
2280 struct actions_for_flow {
2281 struct hmap_node hmap_node;
2282 struct flow flow;
2283 struct ofpbuf actions;
2284 };
2285
2286 static struct actions_for_flow *
2287 get_actions_for_flow(struct hmap *actions_per_flow, const struct flow *flow)
2288 {
2289 uint32_t hash = flow_hash(flow, 0);
2290 struct actions_for_flow *af;
2291
2292 HMAP_FOR_EACH_WITH_HASH (af, hmap_node, hash, actions_per_flow) {
2293 if (flow_equal(&af->flow, flow)) {
2294 return af;
2295 }
2296 }
2297
2298 af = xmalloc(sizeof *af);
2299 af->flow = *flow;
2300 ofpbuf_init(&af->actions, 0);
2301 hmap_insert(actions_per_flow, &af->hmap_node, hash);
2302 return af;
2303 }
2304
2305 static int
2306 compare_actions_for_flow(const void *a_, const void *b_)
2307 {
2308 struct actions_for_flow *const *a = a_;
2309 struct actions_for_flow *const *b = b_;
2310
2311 return flow_compare_3way(&(*a)->flow, &(*b)->flow);
2312 }
2313
2314 static int
2315 compare_output_actions(const void *a_, const void *b_)
2316 {
2317 const struct nlattr *a = a_;
2318 const struct nlattr *b = b_;
2319 uint32_t a_port = nl_attr_get_u32(a);
2320 uint32_t b_port = nl_attr_get_u32(b);
2321
2322 return a_port < b_port ? -1 : a_port > b_port;
2323 }
2324
2325 static void
2326 sort_output_actions__(struct nlattr *first, struct nlattr *end)
2327 {
2328 size_t bytes = (uint8_t *) end - (uint8_t *) first;
2329 size_t n = bytes / NL_A_U32_SIZE;
2330
2331 ovs_assert(bytes % NL_A_U32_SIZE == 0);
2332 qsort(first, n, NL_A_U32_SIZE, compare_output_actions);
2333 }
2334
2335 static void
2336 sort_output_actions(struct nlattr *actions, size_t length)
2337 {
2338 struct nlattr *first_output = NULL;
2339 struct nlattr *a;
2340 int left;
2341
2342 NL_ATTR_FOR_EACH (a, left, actions, length) {
2343 if (nl_attr_type(a) == OVS_ACTION_ATTR_OUTPUT) {
2344 if (!first_output) {
2345 first_output = a;
2346 }
2347 } else {
2348 if (first_output) {
2349 sort_output_actions__(first_output, a);
2350 first_output = NULL;
2351 }
2352 }
2353 }
2354 if (first_output) {
2355 uint8_t *end = (uint8_t *) actions + length;
2356 sort_output_actions__(first_output,
2357 ALIGNED_CAST(struct nlattr *, end));
2358 }
2359 }
2360
2361 /* usage: "ovs-dpctl normalize-actions FLOW ACTIONS" where FLOW and ACTIONS
2362 * have the syntax used by "ovs-dpctl dump-flows".
2363 *
2364 * This command prints ACTIONS in a format that shows what happens for each
2365 * VLAN, independent of the order of the ACTIONS. For example, there is more
2366 * than one way to output a packet on VLANs 9 and 11, but this command will
2367 * print the same output for any form.
2368 *
2369 * The idea here generalizes beyond VLANs (e.g. to setting other fields) but
2370 * so far the implementation only covers VLANs. */
2371 static int
2372 dpctl_normalize_actions(int argc, const char *argv[],
2373 struct dpctl_params *dpctl_p)
2374 {
2375 struct simap port_names;
2376 struct ofpbuf keybuf;
2377 struct flow flow;
2378 struct ofpbuf odp_actions;
2379 struct hmap actions_per_flow;
2380 struct actions_for_flow **afs;
2381 struct actions_for_flow *af;
2382 struct nlattr *a;
2383 size_t n_afs;
2384 struct ds s;
2385 int left;
2386 int i, error;
2387 int encaps = 0;
2388
2389 ds_init(&s);
2390
2391 simap_init(&port_names);
2392 for (i = 3; i < argc; i++) {
2393 char name[16];
2394 int number;
2395
2396 if (ovs_scan(argv[i], "%15[^=]=%d", name, &number)) {
2397 uintptr_t n = number;
2398 simap_put(&port_names, name, n);
2399 } else {
2400 dpctl_error(dpctl_p, 0, "%s: expected NAME=NUMBER", argv[i]);
2401 error = EINVAL;
2402 goto out;
2403 }
2404 }
2405
2406 /* Parse flow key. */
2407 ofpbuf_init(&keybuf, 0);
2408 char *error_s;
2409 error = odp_flow_from_string(argv[1], &port_names, &keybuf, NULL,
2410 &error_s);
2411 if (error) {
2412 dpctl_error(dpctl_p, error, "odp_flow_key_from_string (%s)", error_s);
2413 free(error_s);
2414 goto out_freekeybuf;
2415 }
2416
2417 ds_clear(&s);
2418 odp_flow_format(keybuf.data, keybuf.size, NULL, 0, NULL,
2419 &s, dpctl_p->verbosity);
2420 dpctl_print(dpctl_p, "input flow: %s\n", ds_cstr(&s));
2421
2422 error = odp_flow_key_to_flow(keybuf.data, keybuf.size, &flow, &error_s);
2423 if (error) {
2424 dpctl_error(dpctl_p, error, "odp_flow_key_to_flow failed (%s)",
2425 error_s ? error_s : "reason unknown");
2426 free(error_s);
2427 goto out_freekeybuf;
2428 }
2429
2430 /* Parse actions. */
2431 ofpbuf_init(&odp_actions, 0);
2432 error = odp_actions_from_string(argv[2], &port_names, &odp_actions);
2433 if (error) {
2434 dpctl_error(dpctl_p, error, "odp_actions_from_string");
2435 goto out_freeactions;
2436 }
2437
2438 if (dpctl_p->verbosity) {
2439 ds_clear(&s);
2440 format_odp_actions(&s, odp_actions.data, odp_actions.size, NULL);
2441 dpctl_print(dpctl_p, "input actions: %s\n", ds_cstr(&s));
2442 }
2443
2444 hmap_init(&actions_per_flow);
2445 NL_ATTR_FOR_EACH (a, left, odp_actions.data, odp_actions.size) {
2446 const struct ovs_action_push_vlan *push;
2447 switch(nl_attr_type(a)) {
2448 case OVS_ACTION_ATTR_POP_VLAN:
2449 flow_pop_vlan(&flow, NULL);
2450 continue;
2451
2452 case OVS_ACTION_ATTR_PUSH_VLAN:
2453 flow_push_vlan_uninit(&flow, NULL);
2454 push = nl_attr_get_unspec(a, sizeof *push);
2455 flow.vlans[0].tpid = push->vlan_tpid;
2456 flow.vlans[0].tci = push->vlan_tci;
2457 continue;
2458 }
2459
2460 af = get_actions_for_flow(&actions_per_flow, &flow);
2461 nl_msg_put_unspec(&af->actions, nl_attr_type(a),
2462 nl_attr_get(a), nl_attr_get_size(a));
2463 }
2464
2465 n_afs = hmap_count(&actions_per_flow);
2466 afs = xmalloc(n_afs * sizeof *afs);
2467 i = 0;
2468 HMAP_FOR_EACH (af, hmap_node, &actions_per_flow) {
2469 afs[i++] = af;
2470 }
2471
2472 ovs_assert(i == n_afs);
2473 hmap_destroy(&actions_per_flow);
2474
2475 qsort(afs, n_afs, sizeof *afs, compare_actions_for_flow);
2476
2477 for (i = 0; i < n_afs; i++) {
2478 af = afs[i];
2479 sort_output_actions(af->actions.data, af->actions.size);
2480
2481 for (encaps = 0; encaps < FLOW_MAX_VLAN_HEADERS; encaps ++) {
2482 union flow_vlan_hdr *vlan = &af->flow.vlans[encaps];
2483 if (vlan->tci != htons(0)) {
2484 dpctl_print(dpctl_p, "vlan(");
2485 if (vlan->tpid != htons(ETH_TYPE_VLAN)) {
2486 dpctl_print(dpctl_p, "tpid=0x%04"PRIx16",", vlan->tpid);
2487 }
2488 dpctl_print(dpctl_p, "vid=%"PRIu16",pcp=%d): ",
2489 vlan_tci_to_vid(vlan->tci),
2490 vlan_tci_to_pcp(vlan->tci));
2491 } else {
2492 if (encaps == 0) {
2493 dpctl_print(dpctl_p, "no vlan: ");
2494 }
2495 break;
2496 }
2497 }
2498
2499 if (eth_type_mpls(af->flow.dl_type)) {
2500 dpctl_print(dpctl_p, "mpls(label=%"PRIu32",tc=%d,ttl=%d): ",
2501 mpls_lse_to_label(af->flow.mpls_lse[0]),
2502 mpls_lse_to_tc(af->flow.mpls_lse[0]),
2503 mpls_lse_to_ttl(af->flow.mpls_lse[0]));
2504 } else {
2505 dpctl_print(dpctl_p, "no mpls: ");
2506 }
2507
2508 ds_clear(&s);
2509 format_odp_actions(&s, af->actions.data, af->actions.size, NULL);
2510 dpctl_puts(dpctl_p, false, ds_cstr(&s));
2511
2512 ofpbuf_uninit(&af->actions);
2513 free(af);
2514 }
2515 free(afs);
2516
2517
2518 out_freeactions:
2519 ofpbuf_uninit(&odp_actions);
2520 out_freekeybuf:
2521 ofpbuf_uninit(&keybuf);
2522 out:
2523 simap_destroy(&port_names);
2524 ds_destroy(&s);
2525
2526 return error;
2527 }
2528 \f
2529 static const struct dpctl_command all_commands[] = {
2530 { "add-dp", "dp [iface...]", 1, INT_MAX, dpctl_add_dp, DP_RW },
2531 { "del-dp", "dp", 1, 1, dpctl_del_dp, DP_RW },
2532 { "add-if", "dp iface...", 2, INT_MAX, dpctl_add_if, DP_RW },
2533 { "del-if", "dp iface...", 2, INT_MAX, dpctl_del_if, DP_RW },
2534 { "set-if", "dp iface...", 2, INT_MAX, dpctl_set_if, DP_RW },
2535 { "dump-dps", "", 0, 0, dpctl_dump_dps, DP_RO },
2536 { "show", "[dp...]", 0, INT_MAX, dpctl_show, DP_RO },
2537 { "dump-flows", "[dp] [filter=..] [type=..] [pmd=..]",
2538 0, 4, dpctl_dump_flows, DP_RO },
2539 { "add-flow", "[dp] flow actions", 2, 3, dpctl_add_flow, DP_RW },
2540 { "mod-flow", "[dp] flow actions", 2, 3, dpctl_mod_flow, DP_RW },
2541 { "get-flow", "[dp] ufid", 1, 2, dpctl_get_flow, DP_RO },
2542 { "del-flow", "[dp] flow", 1, 2, dpctl_del_flow, DP_RW },
2543 { "del-flows", "[dp]", 0, 1, dpctl_del_flows, DP_RW },
2544 { "dump-conntrack", "[dp] [zone=N]", 0, 2, dpctl_dump_conntrack, DP_RO },
2545 { "flush-conntrack", "[dp] [zone=N] [ct-tuple]", 0, 3,
2546 dpctl_flush_conntrack, DP_RW },
2547 { "ct-stats-show", "[dp] [zone=N]",
2548 0, 3, dpctl_ct_stats_show, DP_RO },
2549 { "ct-bkts", "[dp] [gt=N]", 0, 2, dpctl_ct_bkts, DP_RO },
2550 { "ct-set-maxconns", "[dp] maxconns", 1, 2, dpctl_ct_set_maxconns,
2551 DP_RW },
2552 { "ct-get-maxconns", "[dp]", 0, 1, dpctl_ct_get_maxconns, DP_RO },
2553 { "ct-get-nconns", "[dp]", 0, 1, dpctl_ct_get_nconns, DP_RO },
2554 { "ct-enable-tcp-seq-chk", "[dp]", 0, 1, dpctl_ct_enable_tcp_seq_chk,
2555 DP_RW },
2556 { "ct-disable-tcp-seq-chk", "[dp]", 0, 1, dpctl_ct_disable_tcp_seq_chk,
2557 DP_RW },
2558 { "ct-get-tcp-seq-chk", "[dp]", 0, 1, dpctl_ct_get_tcp_seq_chk, DP_RO },
2559 { "ct-set-limits", "[dp] [default=L] [zone=N,limit=L]...", 1, INT_MAX,
2560 dpctl_ct_set_limits, DP_RO },
2561 { "ct-del-limits", "[dp] zone=N1[,N2]...", 1, 2, dpctl_ct_del_limits,
2562 DP_RO },
2563 { "ct-get-limits", "[dp] [zone=N1[,N2]...]", 0, 2, dpctl_ct_get_limits,
2564 DP_RO },
2565 { "ipf-set-enabled", "[dp] v4|v6", 1, 2, dpctl_ipf_set_enabled, DP_RW },
2566 { "ipf-set-disabled", "[dp] v4|v6", 1, 2, dpctl_ipf_set_disabled, DP_RW },
2567 { "ipf-set-min-frag", "[dp] v4|v6 minfragment", 2, 3,
2568 dpctl_ipf_set_min_frag, DP_RW },
2569 { "ipf-set-max-nfrags", "[dp] maxfrags", 1, 2,
2570 dpctl_ipf_set_max_nfrags, DP_RW },
2571 { "ipf-get-status", "[dp]", 0, 1, dpctl_ct_ipf_get_status,
2572 DP_RO },
2573 { "help", "", 0, INT_MAX, dpctl_help, DP_RO },
2574 { "list-commands", "", 0, INT_MAX, dpctl_list_commands, DP_RO },
2575
2576 /* Undocumented commands for testing. */
2577 { "parse-actions", "actions", 1, INT_MAX, dpctl_parse_actions, DP_RO },
2578 { "normalize-actions", "actions",
2579 2, INT_MAX, dpctl_normalize_actions, DP_RO },
2580
2581 { NULL, NULL, 0, 0, NULL, DP_RO },
2582 };
2583
2584 static const struct dpctl_command *get_all_dpctl_commands(void)
2585 {
2586 return all_commands;
2587 }
2588
2589 /* Runs the command designated by argv[0] within the command table specified by
2590 * 'commands', which must be terminated by a command whose 'name' member is a
2591 * null pointer. */
2592 int
2593 dpctl_run_command(int argc, const char *argv[], struct dpctl_params *dpctl_p)
2594 {
2595 const struct dpctl_command *p;
2596 if (argc < 1) {
2597 dpctl_error(dpctl_p, 0, "missing command name; use --help for help");
2598 return EINVAL;
2599 }
2600
2601 for (p = all_commands; p->name != NULL; p++) {
2602 if (!strcmp(p->name, argv[0])) {
2603 int n_arg = argc - 1;
2604 if (n_arg < p->min_args) {
2605 dpctl_error(dpctl_p, 0,
2606 "'%s' command requires at least %d arguments",
2607 p->name, p->min_args);
2608 return EINVAL;
2609 } else if (n_arg > p->max_args) {
2610 dpctl_error(dpctl_p, 0,
2611 "'%s' command takes at most %d arguments",
2612 p->name, p->max_args);
2613 return EINVAL;
2614 } else {
2615 if (p->mode == DP_RW && dpctl_p->read_only) {
2616 dpctl_error(dpctl_p, 0,
2617 "'%s' command does not work in read only mode",
2618 p->name);
2619 return EINVAL;
2620 }
2621 return p->handler(argc, argv, dpctl_p);
2622 }
2623 }
2624 }
2625
2626 dpctl_error(dpctl_p, 0, "unknown command '%s'; use --help for help",
2627 argv[0]);
2628 return EINVAL;
2629 }
2630 \f
2631 static void
2632 dpctl_unixctl_print(void *userdata, bool error OVS_UNUSED, const char *msg)
2633 {
2634 struct ds *ds = userdata;
2635 ds_put_cstr(ds, msg);
2636 }
2637
2638 static void
2639 dpctl_unixctl_handler(struct unixctl_conn *conn, int argc, const char *argv[],
2640 void *aux)
2641 {
2642 struct ds ds = DS_EMPTY_INITIALIZER;
2643 bool error = false;
2644
2645 struct dpctl_params dpctl_p = {
2646 .is_appctl = true,
2647 .output = dpctl_unixctl_print,
2648 .aux = &ds,
2649 };
2650
2651 /* Parse options (like getopt). Unfortunately it does
2652 * not seem a good idea to call getopt_long() here, since it uses global
2653 * variables */
2654 bool set_names = false;
2655 while (argc > 1 && !error) {
2656 const char *arg = argv[1];
2657 if (!strncmp(arg, "--", 2)) {
2658 /* Long option */
2659 if (!strcmp(arg, "--statistics")) {
2660 dpctl_p.print_statistics = true;
2661 } else if (!strcmp(arg, "--clear")) {
2662 dpctl_p.zero_statistics = true;
2663 } else if (!strcmp(arg, "--may-create")) {
2664 dpctl_p.may_create = true;
2665 } else if (!strcmp(arg, "--more")) {
2666 dpctl_p.verbosity++;
2667 } else if (!strcmp(arg, "--names")) {
2668 dpctl_p.names = true;
2669 set_names = true;
2670 } else if (!strcmp(arg, "--no-names")) {
2671 dpctl_p.names = false;
2672 set_names = true;
2673 } else {
2674 ds_put_format(&ds, "Unrecognized option %s", argv[1]);
2675 error = true;
2676 }
2677 } else if (arg[0] == '-' && arg[1] != '\0') {
2678 /* Short option[s] */
2679 const char *opt = &arg[1];
2680
2681 while (*opt && !error) {
2682 switch (*opt) {
2683 case 'm':
2684 dpctl_p.verbosity++;
2685 break;
2686 case 's':
2687 dpctl_p.print_statistics = true;
2688 break;
2689 default:
2690 ds_put_format(&ds, "Unrecognized option -%c", *opt);
2691 error = true;
2692 break;
2693 }
2694 opt++;
2695 }
2696 } else {
2697 /* Doesn't start with -, not an option */
2698 break;
2699 }
2700
2701 if (error) {
2702 break;
2703 }
2704 argv++;
2705 argc--;
2706 }
2707 if (!set_names) {
2708 dpctl_p.names = dpctl_p.verbosity > 0;
2709 }
2710
2711 if (!error) {
2712 dpctl_command_handler *handler = (dpctl_command_handler *) aux;
2713 error = handler(argc, argv, &dpctl_p) != 0;
2714 }
2715
2716 if (error) {
2717 unixctl_command_reply_error(conn, ds_cstr(&ds));
2718 } else {
2719 unixctl_command_reply(conn, ds_cstr(&ds));
2720 }
2721
2722 ds_destroy(&ds);
2723 }
2724
2725 void
2726 dpctl_unixctl_register(void)
2727 {
2728 const struct dpctl_command *p;
2729
2730 for (p = all_commands; p->name != NULL; p++) {
2731 if (strcmp(p->name, "help")) {
2732 char *cmd_name = xasprintf("dpctl/%s", p->name);
2733 unixctl_command_register(cmd_name,
2734 p->usage,
2735 p->min_args,
2736 p->max_args,
2737 dpctl_unixctl_handler,
2738 p->handler);
2739 free(cmd_name);
2740 }
2741 }
2742 }