2 * Copyright (c) 2008-2019 Nicira, Inc.
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at:
8 * http://www.apache.org/licenses/LICENSE-2.0
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
18 #include <sys/types.h>
19 #include <netinet/in.h>
20 #include <arpa/inet.h>
23 #include <sys/socket.h>
30 #include "command-line.h"
36 #include "dpif-provider.h"
37 #include "openvswitch/dynamic-string.h"
39 #include "openvswitch/match.h"
43 #include "openvswitch/ofpbuf.h"
45 #include "openvswitch/shash.h"
52 #include "openvswitch/ofp-flow.h"
53 #include "openvswitch/ofp-port.h"
55 typedef int dpctl_command_handler(int argc
, const char *argv
[],
56 struct dpctl_params
*);
57 struct dpctl_command
{
62 dpctl_command_handler
*handler
;
63 enum { DP_RO
, DP_RW
} mode
;
65 static const struct dpctl_command
*get_all_dpctl_commands(void);
66 static void dpctl_print(struct dpctl_params
*dpctl_p
, const char *fmt
, ...)
67 OVS_PRINTF_FORMAT(2, 3);
68 static void dpctl_error(struct dpctl_params
* dpctl_p
, int err_no
,
70 OVS_PRINTF_FORMAT(3, 4);
73 dpctl_puts(struct dpctl_params
*dpctl_p
, bool error
, const char *string
)
75 dpctl_p
->output(dpctl_p
->aux
, error
, string
);
79 dpctl_print(struct dpctl_params
*dpctl_p
, const char *fmt
, ...)
85 string
= xvasprintf(fmt
, args
);
88 dpctl_puts(dpctl_p
, false, string
);
93 dpctl_error(struct dpctl_params
* dpctl_p
, int err_no
, const char *fmt
, ...)
95 const char *subprogram_name
= get_subprogram_name();
96 struct ds ds
= DS_EMPTY_INITIALIZER
;
97 int save_errno
= errno
;
101 if (subprogram_name
[0]) {
102 ds_put_format(&ds
, "%s(%s): ", program_name
,subprogram_name
);
104 ds_put_format(&ds
, "%s: ", program_name
);
108 ds_put_format_valist(&ds
, fmt
, args
);
112 ds_put_format(&ds
, " (%s)", ovs_retval_to_string(err_no
));
114 ds_put_cstr(&ds
, "\n");
116 dpctl_puts(dpctl_p
, true, ds_cstr(&ds
));
123 static int dpctl_add_if(int argc
, const char *argv
[], struct dpctl_params
*);
126 if_up(struct netdev
*netdev
)
128 return netdev_turn_flags_on(netdev
, NETDEV_UP
, NULL
);
131 /* Retrieve the name of the datapath if exactly one exists. The caller
132 * is responsible for freeing the returned string. If a single datapath
133 * name cannot be determined, returns NULL. */
135 get_one_dp(struct dpctl_params
*dpctl_p
)
139 char *dp_name
= NULL
;
143 dp_enumerate_types(&types
);
144 SSET_FOR_EACH (type
, &types
) {
148 if (!dp_enumerate_names(type
, &names
)) {
149 count
+= sset_count(&names
);
150 if (!dp_name
&& count
== 1) {
151 dp_name
= xasprintf("%s@%s", type
, SSET_FIRST(&names
));
154 sset_destroy(&names
);
156 sset_destroy(&types
);
159 dpctl_error(dpctl_p
, 0, "no datapaths exist");
160 } else if (count
> 1) {
161 dpctl_error(dpctl_p
, 0, "multiple datapaths, specify one");
170 parsed_dpif_open(const char *arg_
, bool create
, struct dpif
**dpifp
)
175 dp_parse_name(arg_
, &name
, &type
);
178 result
= dpif_create(name
, type
, dpifp
);
180 result
= dpif_open(name
, type
, dpifp
);
189 dp_exists(const char *queried_dp
)
191 char *queried_name
, *queried_type
;
192 dp_parse_name(queried_dp
, &queried_name
, &queried_type
);
193 struct sset dpif_names
= SSET_INITIALIZER(&dpif_names
),
194 dpif_types
= SSET_INITIALIZER(&dpif_types
);
195 dp_enumerate_types(&dpif_types
);
197 bool found
= (sset_contains(&dpif_types
, queried_type
) &&
198 !dp_enumerate_names(queried_type
, &dpif_names
) &&
199 sset_contains(&dpif_names
, queried_name
));
201 sset_destroy(&dpif_names
);
202 sset_destroy(&dpif_types
);
209 dp_arg_exists(int argc
, const char *argv
[])
211 return argc
> 1 && dp_exists(argv
[1]);
214 /* Open a dpif with an optional name argument.
216 * The datapath name is not a mandatory parameter for this command. If it is
217 * not specified, we retrieve it from the current setup, assuming only one
218 * exists. On success stores the opened dpif in '*dpifp'. */
220 opt_dpif_open(int argc
, const char *argv
[], struct dpctl_params
*dpctl_p
,
221 int max_args
, struct dpif
**dpifp
)
225 if (dp_arg_exists(argc
, argv
)) {
226 dpname
= xstrdup(argv
[1]);
227 } else if (argc
!= max_args
) {
228 dpname
= get_one_dp(dpctl_p
);
230 /* If the arguments are the maximum possible number and there is no
231 * valid datapath argument, then we fall into the case of dpname is
232 * NULL, since this is an error. */
239 dpctl_error(dpctl_p
, error
, "datapath not found");
241 error
= parsed_dpif_open(dpname
, false, dpifp
);
244 dpctl_error(dpctl_p
, error
, "opening datapath");
251 dpctl_add_dp(int argc
, const char *argv
[],
252 struct dpctl_params
*dpctl_p
)
257 error
= parsed_dpif_open(argv
[1], true, &dpif
);
259 dpctl_error(dpctl_p
, error
, "add_dp");
264 error
= dpctl_add_if(argc
, argv
, dpctl_p
);
270 dpctl_del_dp(int argc OVS_UNUSED
, const char *argv
[],
271 struct dpctl_params
*dpctl_p
)
276 error
= parsed_dpif_open(argv
[1], false, &dpif
);
278 dpctl_error(dpctl_p
, error
, "opening datapath");
281 error
= dpif_delete(dpif
);
283 dpctl_error(dpctl_p
, error
, "del_dp");
291 dpctl_add_if(int argc OVS_UNUSED
, const char *argv
[],
292 struct dpctl_params
*dpctl_p
)
295 int i
, error
, lasterror
= 0;
297 error
= parsed_dpif_open(argv
[1], false, &dpif
);
299 dpctl_error(dpctl_p
, error
, "opening datapath");
302 for (i
= 2; i
< argc
; i
++) {
303 const char *name
, *type
;
304 char *save_ptr
= NULL
, *argcopy
;
305 struct netdev
*netdev
= NULL
;
307 odp_port_t port_no
= ODPP_NONE
;
310 argcopy
= xstrdup(argv
[i
]);
311 name
= strtok_r(argcopy
, ",", &save_ptr
);
315 dpctl_error(dpctl_p
, 0, "%s is not a valid network device name",
322 while ((option
= strtok_r(NULL
, ",", &save_ptr
)) != NULL
) {
323 char *save_ptr_2
= NULL
;
326 key
= strtok_r(option
, "=", &save_ptr_2
);
327 value
= strtok_r(NULL
, "", &save_ptr_2
);
332 if (!strcmp(key
, "type")) {
334 } else if (!strcmp(key
, "port_no")) {
335 port_no
= u32_to_odp(atoi(value
));
336 } else if (!smap_add_once(&args
, key
, value
)) {
337 dpctl_error(dpctl_p
, 0, "duplicate \"%s\" option", key
);
341 error
= netdev_open(name
, type
, &netdev
);
343 dpctl_error(dpctl_p
, error
, "%s: failed to open network device",
345 goto next_destroy_args
;
348 error
= netdev_set_config(netdev
, &args
, NULL
);
350 goto next_destroy_args
;
353 error
= dpif_port_add(dpif
, netdev
, &port_no
);
355 dpctl_error(dpctl_p
, error
, "adding %s to %s failed", name
,
357 goto next_destroy_args
;
360 error
= if_up(netdev
);
362 dpctl_error(dpctl_p
, error
, "%s: failed bringing interface up",
367 netdev_close(netdev
);
381 dpctl_set_if(int argc
, const char *argv
[], struct dpctl_params
*dpctl_p
)
384 int i
, error
, lasterror
= 0;
386 error
= parsed_dpif_open(argv
[1], false, &dpif
);
388 dpctl_error(dpctl_p
, error
, "opening datapath");
391 for (i
= 2; i
< argc
; i
++) {
392 struct netdev
*netdev
= NULL
;
393 struct dpif_port dpif_port
;
394 char *save_ptr
= NULL
;
404 argcopy
= xstrdup(argv
[i
]);
405 name
= strtok_r(argcopy
, ",", &save_ptr
);
407 dpctl_error(dpctl_p
, 0, "%s is not a valid network device name",
412 /* Get the port's type from the datapath. */
413 error
= dpif_port_query_by_name(dpif
, name
, &dpif_port
);
415 dpctl_error(dpctl_p
, error
, "%s: failed to query port in %s", name
,
419 type
= xstrdup(dpif_port
.type
);
420 port_no
= dpif_port
.port_no
;
421 dpif_port_destroy(&dpif_port
);
423 /* Retrieve its existing configuration. */
424 error
= netdev_open(name
, type
, &netdev
);
426 dpctl_error(dpctl_p
, error
, "%s: failed to open network device",
432 error
= netdev_get_config(netdev
, &args
);
434 dpctl_error(dpctl_p
, error
, "%s: failed to fetch configuration",
436 goto next_destroy_args
;
439 /* Parse changes to configuration. */
440 while ((option
= strtok_r(NULL
, ",", &save_ptr
)) != NULL
) {
441 char *save_ptr_2
= NULL
;
444 key
= strtok_r(option
, "=", &save_ptr_2
);
445 value
= strtok_r(NULL
, "", &save_ptr_2
);
450 if (!strcmp(key
, "type")) {
451 if (strcmp(value
, type
)) {
452 dpctl_error(dpctl_p
, 0,
453 "%s: can't change type from %s to %s",
456 goto next_destroy_args
;
458 } else if (!strcmp(key
, "port_no")) {
459 if (port_no
!= u32_to_odp(atoi(value
))) {
460 dpctl_error(dpctl_p
, 0, "%s: can't change port number from"
461 " %"PRIu32
" to %d", name
, port_no
, atoi(value
));
463 goto next_destroy_args
;
465 } else if (value
[0] == '\0') {
466 smap_remove(&args
, key
);
468 smap_replace(&args
, key
, value
);
472 /* Update configuration. */
474 error
= netdev_set_config(netdev
, &args
, &err_s
);
475 if (err_s
|| error
) {
476 dpctl_error(dpctl_p
, error
, "%s",
477 err_s
? err_s
: "Error updating configuration");
481 goto next_destroy_args
;
487 netdev_close(netdev
);
500 get_port_number(struct dpif
*dpif
, const char *name
, odp_port_t
*port
,
501 struct dpctl_params
*dpctl_p
)
503 struct dpif_port dpif_port
;
505 if (!dpif_port_query_by_name(dpif
, name
, &dpif_port
)) {
506 *port
= dpif_port
.port_no
;
507 dpif_port_destroy(&dpif_port
);
510 dpctl_error(dpctl_p
, 0, "no port named %s", name
);
516 dpctl_del_if(int argc
, const char *argv
[], struct dpctl_params
*dpctl_p
)
519 int i
, error
, lasterror
= 0;
521 error
= parsed_dpif_open(argv
[1], false, &dpif
);
523 dpctl_error(dpctl_p
, error
, "opening datapath");
526 for (i
= 2; i
< argc
; i
++) {
527 const char *name
= argv
[i
];
530 if (!name
[strspn(name
, "0123456789")]) {
531 port
= u32_to_odp(atoi(name
));
532 } else if (!get_port_number(dpif
, name
, &port
, dpctl_p
)) {
537 error
= dpif_port_del(dpif
, port
, false);
539 dpctl_error(dpctl_p
, error
, "deleting port %s from %s failed",
549 print_stat(struct dpctl_params
*dpctl_p
, const char *leader
, uint64_t value
)
551 dpctl_print(dpctl_p
, "%s", leader
);
552 if (value
!= UINT64_MAX
) {
553 dpctl_print(dpctl_p
, "%"PRIu64
, value
);
555 dpctl_print(dpctl_p
, "?");
560 print_human_size(struct dpctl_params
*dpctl_p
, uint64_t value
)
562 if (value
== UINT64_MAX
) {
564 } else if (value
>= 1024ULL * 1024 * 1024 * 1024) {
565 dpctl_print(dpctl_p
, " (%.1f TiB)",
566 value
/ (1024.0 * 1024 * 1024 * 1024));
567 } else if (value
>= 1024ULL * 1024 * 1024) {
568 dpctl_print(dpctl_p
, " (%.1f GiB)", value
/ (1024.0 * 1024 * 1024));
569 } else if (value
>= 1024ULL * 1024) {
570 dpctl_print(dpctl_p
, " (%.1f MiB)", value
/ (1024.0 * 1024));
571 } else if (value
>= 1024) {
572 dpctl_print(dpctl_p
, " (%.1f KiB)", value
/ 1024.0);
576 /* qsort comparison function. */
578 compare_port_nos(const void *a_
, const void *b_
)
580 const odp_port_t
*ap
= a_
;
581 const odp_port_t
*bp
= b_
;
582 uint32_t a
= odp_to_u32(*ap
);
583 uint32_t b
= odp_to_u32(*bp
);
585 return a
< b
? -1 : a
> b
;
589 show_dpif(struct dpif
*dpif
, struct dpctl_params
*dpctl_p
)
591 struct dpif_port_dump dump
;
592 struct dpif_port dpif_port
;
593 struct dpif_dp_stats stats
;
594 struct netdev
*netdev
;
596 dpctl_print(dpctl_p
, "%s:\n", dpif_name(dpif
));
597 if (!dpif_get_dp_stats(dpif
, &stats
)) {
598 dpctl_print(dpctl_p
, " lookups: hit:%"PRIu64
" missed:%"PRIu64
599 " lost:%"PRIu64
"\n flows: %"PRIu64
"\n",
600 stats
.n_hit
, stats
.n_missed
, stats
.n_lost
, stats
.n_flows
);
601 if (stats
.n_masks
!= UINT32_MAX
) {
602 uint64_t n_pkts
= stats
.n_hit
+ stats
.n_missed
;
603 double avg
= n_pkts
? (double) stats
.n_mask_hit
/ n_pkts
: 0.0;
605 dpctl_print(dpctl_p
, " masks: hit:%"PRIu64
" total:%"PRIu32
607 stats
.n_mask_hit
, stats
.n_masks
, avg
);
611 odp_port_t
*port_nos
= NULL
;
612 size_t allocated_port_nos
= 0, n_port_nos
= 0;
613 DPIF_PORT_FOR_EACH (&dpif_port
, &dump
, dpif
) {
614 if (n_port_nos
>= allocated_port_nos
) {
615 port_nos
= x2nrealloc(port_nos
, &allocated_port_nos
,
619 port_nos
[n_port_nos
] = dpif_port
.port_no
;
624 qsort(port_nos
, n_port_nos
, sizeof *port_nos
, compare_port_nos
);
627 for (int i
= 0; i
< n_port_nos
; i
++) {
628 if (dpif_port_query_by_number(dpif
, port_nos
[i
], &dpif_port
)) {
632 dpctl_print(dpctl_p
, " port %u: %s",
633 dpif_port
.port_no
, dpif_port
.name
);
635 if (strcmp(dpif_port
.type
, "system")) {
638 dpctl_print(dpctl_p
, " (%s", dpif_port
.type
);
640 error
= netdev_open(dpif_port
.name
, dpif_port
.type
, &netdev
);
645 error
= netdev_get_config(netdev
, &config
);
647 const struct smap_node
**nodes
= smap_sort(&config
);
648 for (size_t j
= 0; j
< smap_count(&config
); j
++) {
649 const struct smap_node
*node
= nodes
[j
];
650 dpctl_print(dpctl_p
, "%c %s=%s", j
? ',' : ':',
651 node
->key
, node
->value
);
655 dpctl_print(dpctl_p
, ", could not retrieve configuration "
656 "(%s)", ovs_strerror(error
));
658 smap_destroy(&config
);
660 netdev_close(netdev
);
662 dpctl_print(dpctl_p
, ": open failed (%s)",
663 ovs_strerror(error
));
665 dpctl_print(dpctl_p
, ")");
667 dpctl_print(dpctl_p
, "\n");
669 if (dpctl_p
->print_statistics
) {
670 struct netdev_stats s
;
673 error
= netdev_open(dpif_port
.name
, dpif_port
.type
, &netdev
);
675 dpctl_print(dpctl_p
, ", open failed (%s)",
676 ovs_strerror(error
));
677 dpif_port_destroy(&dpif_port
);
680 error
= netdev_get_stats(netdev
, &s
);
682 netdev_close(netdev
);
683 print_stat(dpctl_p
, " RX packets:", s
.rx_packets
);
684 print_stat(dpctl_p
, " errors:", s
.rx_errors
);
685 print_stat(dpctl_p
, " dropped:", s
.rx_dropped
);
686 print_stat(dpctl_p
, " overruns:", s
.rx_over_errors
);
687 print_stat(dpctl_p
, " frame:", s
.rx_frame_errors
);
688 dpctl_print(dpctl_p
, "\n");
690 print_stat(dpctl_p
, " TX packets:", s
.tx_packets
);
691 print_stat(dpctl_p
, " errors:", s
.tx_errors
);
692 print_stat(dpctl_p
, " dropped:", s
.tx_dropped
);
693 print_stat(dpctl_p
, " aborted:", s
.tx_aborted_errors
);
694 print_stat(dpctl_p
, " carrier:", s
.tx_carrier_errors
);
695 dpctl_print(dpctl_p
, "\n");
697 print_stat(dpctl_p
, " collisions:", s
.collisions
);
698 dpctl_print(dpctl_p
, "\n");
700 print_stat(dpctl_p
, " RX bytes:", s
.rx_bytes
);
701 print_human_size(dpctl_p
, s
.rx_bytes
);
702 print_stat(dpctl_p
, " TX bytes:", s
.tx_bytes
);
703 print_human_size(dpctl_p
, s
.tx_bytes
);
704 dpctl_print(dpctl_p
, "\n");
706 dpctl_print(dpctl_p
, ", could not retrieve stats (%s)",
707 ovs_strerror(error
));
710 dpif_port_destroy(&dpif_port
);
716 typedef void (*dps_for_each_cb
)(struct dpif
*, struct dpctl_params
*);
719 dps_for_each(struct dpctl_params
*dpctl_p
, dps_for_each_cb cb
)
721 struct sset dpif_names
= SSET_INITIALIZER(&dpif_names
),
722 dpif_types
= SSET_INITIALIZER(&dpif_types
);
723 int error
, openerror
= 0, enumerror
= 0;
724 const char *type
, *name
;
725 bool at_least_one
= false;
727 dp_enumerate_types(&dpif_types
);
729 SSET_FOR_EACH (type
, &dpif_types
) {
730 error
= dp_enumerate_names(type
, &dpif_names
);
735 SSET_FOR_EACH (name
, &dpif_names
) {
739 error
= dpif_open(name
, type
, &dpif
);
745 dpctl_error(dpctl_p
, error
, "opening datapath %s failed",
751 sset_destroy(&dpif_names
);
752 sset_destroy(&dpif_types
);
754 /* If there has been an error while opening a datapath it should be
755 * reported. Otherwise, we want to ignore the errors generated by
756 * dp_enumerate_names() if at least one datapath has been discovered,
757 * because they're not interesting for the user. This happens, for
758 * example, if OVS is using a userspace datapath and the kernel module
763 return at_least_one
? 0 : enumerror
;
768 dpctl_show(int argc
, const char *argv
[], struct dpctl_params
*dpctl_p
)
770 int error
, lasterror
= 0;
773 for (i
= 1; i
< argc
; i
++) {
774 const char *name
= argv
[i
];
777 error
= parsed_dpif_open(name
, false, &dpif
);
779 show_dpif(dpif
, dpctl_p
);
782 dpctl_error(dpctl_p
, error
, "opening datapath %s failed",
788 lasterror
= dps_for_each(dpctl_p
, show_dpif
);
795 dump_cb(struct dpif
*dpif
, struct dpctl_params
*dpctl_p
)
797 dpctl_print(dpctl_p
, "%s\n", dpif_name(dpif
));
801 dpctl_dump_dps(int argc OVS_UNUSED
, const char *argv
[] OVS_UNUSED
,
802 struct dpctl_params
*dpctl_p
)
804 return dps_for_each(dpctl_p
, dump_cb
);
808 format_dpif_flow(struct ds
*ds
, const struct dpif_flow
*f
, struct hmap
*ports
,
809 struct dpctl_params
*dpctl_p
)
811 if (dpctl_p
->verbosity
&& f
->ufid_present
) {
812 odp_format_ufid(&f
->ufid
, ds
);
813 ds_put_cstr(ds
, ", ");
815 odp_flow_format(f
->key
, f
->key_len
, f
->mask
, f
->mask_len
, ports
, ds
,
817 ds_put_cstr(ds
, ", ");
819 dpif_flow_stats_format(&f
->stats
, ds
);
820 if (dpctl_p
->verbosity
&& f
->attrs
.offloaded
) {
821 if (f
->attrs
.dp_layer
&& !strcmp(f
->attrs
.dp_layer
, "ovs")) {
822 ds_put_cstr(ds
, ", offloaded:partial");
824 ds_put_cstr(ds
, ", offloaded:yes");
827 if (dpctl_p
->verbosity
&& f
->attrs
.dp_layer
) {
828 ds_put_format(ds
, ", dp:%s", f
->attrs
.dp_layer
);
830 ds_put_cstr(ds
, ", actions:");
831 format_odp_actions(ds
, f
->actions
, f
->actions_len
, ports
);
832 if (dpctl_p
->verbosity
&& f
->attrs
.dp_extra_info
) {
833 ds_put_format(ds
, ", dp-extra-info:%s", f
->attrs
.dp_extra_info
);
843 bool partially_offloaded
;
847 enable_all_dump_types(struct dump_types
*dump_types
)
849 dump_types
->ovs
= true;
850 dump_types
->tc
= true;
851 dump_types
->dpdk
= true;
852 dump_types
->offloaded
= true;
853 dump_types
->non_offloaded
= true;
854 dump_types
->partially_offloaded
= true;
858 populate_dump_types(char *types_list
, struct dump_types
*dump_types
,
859 struct dpctl_params
*dpctl_p
)
862 enable_all_dump_types(dump_types
);
868 while (types_list
&& types_list
[0] != '\0') {
869 current_type
= types_list
;
870 size_t type_len
= strcspn(current_type
, ",");
872 types_list
+= type_len
+ (types_list
[type_len
] != '\0');
873 current_type
[type_len
] = '\0';
875 if (!strcmp(current_type
, "ovs")) {
876 dump_types
->ovs
= true;
877 } else if (!strcmp(current_type
, "tc")) {
878 dump_types
->tc
= true;
879 } else if (!strcmp(current_type
, "dpdk")) {
880 dump_types
->dpdk
= true;
881 } else if (!strcmp(current_type
, "offloaded")) {
882 dump_types
->offloaded
= true;
883 } else if (!strcmp(current_type
, "non-offloaded")) {
884 dump_types
->non_offloaded
= true;
885 } else if (!strcmp(current_type
, "partially-offloaded")) {
886 dump_types
->partially_offloaded
= true;
887 } else if (!strcmp(current_type
, "all")) {
888 enable_all_dump_types(dump_types
);
890 dpctl_error(dpctl_p
, EINVAL
, "Failed to parse type (%s)",
899 determine_dpif_flow_dump_types(struct dump_types
*dump_types
,
900 struct dpif_flow_dump_types
*dpif_dump_types
)
902 dpif_dump_types
->ovs_flows
= dump_types
->ovs
|| dump_types
->non_offloaded
;
903 dpif_dump_types
->netdev_flows
= dump_types
->tc
|| dump_types
->offloaded
904 || dump_types
->non_offloaded
906 || dump_types
->partially_offloaded
;
910 flow_passes_type_filter(const struct dpif_flow
*f
,
911 struct dump_types
*dump_types
)
913 if (dump_types
->ovs
&& !strcmp(f
->attrs
.dp_layer
, "ovs")) {
916 if (dump_types
->tc
&& !strcmp(f
->attrs
.dp_layer
, "tc")) {
919 if (dump_types
->dpdk
&& !strcmp(f
->attrs
.dp_layer
, "dpdk")) {
922 if (dump_types
->offloaded
&& f
->attrs
.offloaded
&&
923 strcmp(f
->attrs
.dp_layer
, "ovs")) {
926 if (dump_types
->partially_offloaded
&& f
->attrs
.offloaded
&&
927 !strcmp(f
->attrs
.dp_layer
, "ovs")) {
930 if (dump_types
->non_offloaded
&& !(f
->attrs
.offloaded
)) {
937 dpctl_get_portno_names(struct dpif
*dpif
, const struct dpctl_params
*dpctl_p
)
939 if (dpctl_p
->names
) {
940 struct hmap
*portno_names
= xmalloc(sizeof *portno_names
);
941 hmap_init(portno_names
);
943 struct dpif_port_dump port_dump
;
944 struct dpif_port dpif_port
;
945 DPIF_PORT_FOR_EACH (&dpif_port
, &port_dump
, dpif
) {
946 odp_portno_names_set(portno_names
, dpif_port
.port_no
,
957 dpctl_free_portno_names(struct hmap
*portno_names
)
960 odp_portno_names_destroy(portno_names
);
961 hmap_destroy(portno_names
);
967 dpctl_dump_flows(int argc
, const char *argv
[], struct dpctl_params
*dpctl_p
)
973 struct flow flow_filter
;
974 struct flow_wildcards wc_filter
;
975 char *types_list
= NULL
;
976 struct dump_types dump_types
;
977 struct dpif_flow_dump_types dpif_dump_types
;
979 struct dpif_flow_dump_thread
*flow_dump_thread
;
980 struct dpif_flow_dump
*flow_dump
;
982 int pmd_id
= PMD_ID_NULL
;
983 bool pmd_id_filter
= false;
987 while (argc
> 1 && lastargc
!= argc
) {
989 if (!strncmp(argv
[argc
- 1], "filter=", 7) && !filter
) {
990 filter
= xstrdup(argv
[--argc
] + 7);
991 } else if (!strncmp(argv
[argc
- 1], "type=", 5) && !types_list
) {
992 if (!dpctl_p
->is_appctl
) {
993 dpctl_error(dpctl_p
, 0,
994 "Invalid argument 'type'. "
995 "Use 'ovs-appctl dpctl/dump-flows' instead.");
999 types_list
= xstrdup(argv
[--argc
] + 5);
1000 } else if (!strncmp(argv
[argc
- 1], "pmd=", 4)) {
1001 if (!ovs_scan(argv
[--argc
], "pmd=%d", &pmd_id
)) {
1007 pmd_id
= NON_PMD_CORE_ID
;
1009 pmd_id_filter
= true;
1013 error
= opt_dpif_open(argc
, argv
, dpctl_p
, 2, &dpif
);
1018 struct hmap
*portno_names
= dpctl_get_portno_names(dpif
, dpctl_p
);
1021 struct ofputil_port_map port_map
;
1022 ofputil_port_map_init(&port_map
);
1024 struct dpif_port_dump port_dump
;
1025 struct dpif_port dpif_port
;
1026 DPIF_PORT_FOR_EACH (&dpif_port
, &port_dump
, dpif
) {
1027 ofputil_port_map_put(&port_map
,
1028 u16_to_ofp(odp_to_u32(dpif_port
.port_no
)),
1031 char *err
= parse_ofp_exact_flow(&flow_filter
, &wc_filter
, NULL
,
1033 ofputil_port_map_destroy(&port_map
);
1035 dpctl_error(dpctl_p
, 0, "Failed to parse filter (%s)", err
);
1042 memset(&dump_types
, 0, sizeof dump_types
);
1043 error
= populate_dump_types(types_list
, &dump_types
, dpctl_p
);
1047 determine_dpif_flow_dump_types(&dump_types
, &dpif_dump_types
);
1049 /* Make sure that these values are different. PMD_ID_NULL means that the
1050 * pmd is unspecified (e.g. because the datapath doesn't have different
1051 * pmd threads), while NON_PMD_CORE_ID refers to every non pmd threads
1052 * in the userspace datapath */
1053 BUILD_ASSERT(PMD_ID_NULL
!= NON_PMD_CORE_ID
);
1056 memset(&f
, 0, sizeof f
);
1057 flow_dump
= dpif_flow_dump_create(dpif
, false, &dpif_dump_types
);
1058 flow_dump_thread
= dpif_flow_dump_thread_create(flow_dump
);
1059 while (dpif_flow_dump_next(flow_dump_thread
, &f
, 1)) {
1062 struct flow_wildcards wc
;
1063 struct match match
, match_filter
;
1064 struct minimatch minimatch
;
1066 odp_flow_key_to_flow(f
.key
, f
.key_len
, &flow
, NULL
);
1067 odp_flow_key_to_mask(f
.mask
, f
.mask_len
, &wc
, &flow
, NULL
);
1068 match_init(&match
, &flow
, &wc
);
1070 match_init(&match_filter
, &flow_filter
, &wc
);
1071 match_init(&match_filter
, &match_filter
.flow
, &wc_filter
);
1072 minimatch_init(&minimatch
, &match_filter
);
1074 if (!minimatch_matches_flow(&minimatch
, &match
.flow
)) {
1075 minimatch_destroy(&minimatch
);
1078 minimatch_destroy(&minimatch
);
1081 /* If 'pmd_id' is specified, overlapping flows could be dumped from
1082 * different pmd threads. So, separates dumps from different pmds
1083 * by printing a title line. */
1084 if (!pmd_id_filter
&& pmd_id
!= f
.pmd_id
) {
1085 if (f
.pmd_id
== NON_PMD_CORE_ID
) {
1086 ds_put_format(&ds
, "flow-dump from the main thread:\n");
1088 ds_put_format(&ds
, "flow-dump from pmd on cpu core: %d\n",
1093 if (pmd_id
== f
.pmd_id
&&
1094 flow_passes_type_filter(&f
, &dump_types
)) {
1095 format_dpif_flow(&ds
, &f
, portno_names
, dpctl_p
);
1096 dpctl_print(dpctl_p
, "%s\n", ds_cstr(&ds
));
1099 dpif_flow_dump_thread_destroy(flow_dump_thread
);
1100 error
= dpif_flow_dump_destroy(flow_dump
);
1103 dpctl_error(dpctl_p
, error
, "Failed to dump flows from datapath");
1108 dpctl_free_portno_names(portno_names
);
1117 dpctl_put_flow(int argc
, const char *argv
[], enum dpif_flow_put_flags flags
,
1118 struct dpctl_params
*dpctl_p
)
1120 const char *key_s
= argv
[argc
- 2];
1121 const char *actions_s
= argv
[argc
- 1];
1122 struct dpif_flow_stats stats
;
1123 struct dpif_port dpif_port
;
1124 struct dpif_port_dump port_dump
;
1125 struct ofpbuf actions
;
1131 struct simap port_names
;
1134 error
= opt_dpif_open(argc
, argv
, dpctl_p
, 4, &dpif
);
1139 ufid_present
= false;
1140 n
= odp_ufid_from_string(key_s
, &ufid
);
1142 dpctl_error(dpctl_p
, -n
, "parsing flow ufid");
1146 ufid_present
= true;
1149 simap_init(&port_names
);
1150 DPIF_PORT_FOR_EACH (&dpif_port
, &port_dump
, dpif
) {
1151 simap_put(&port_names
, dpif_port
.name
, odp_to_u32(dpif_port
.port_no
));
1154 ofpbuf_init(&key
, 0);
1155 ofpbuf_init(&mask
, 0);
1157 error
= odp_flow_from_string(key_s
, &port_names
, &key
, &mask
, &error_s
);
1158 simap_destroy(&port_names
);
1160 dpctl_error(dpctl_p
, error
, "parsing flow key (%s)", error_s
);
1162 goto out_freekeymask
;
1165 ofpbuf_init(&actions
, 0);
1166 error
= odp_actions_from_string(actions_s
, NULL
, &actions
);
1168 dpctl_error(dpctl_p
, error
, "parsing actions");
1169 goto out_freeactions
;
1172 if (!ufid_present
&& dpctl_p
->is_appctl
) {
1173 /* Generating UFID for this flow so it could be offloaded to HW. We're
1174 * not doing that if invoked from ovs-dpctl utility because
1175 * odp_flow_key_hash() uses randomly generated base for flow hashes
1176 * that will be different for each invocation. And, anyway, offloading
1177 * is only available via appctl. */
1178 odp_flow_key_hash(key
.data
, key
.size
, &ufid
);
1179 ufid_present
= true;
1182 /* The flow will be added on all pmds currently in the datapath. */
1183 error
= dpif_flow_put(dpif
, flags
,
1185 mask
.size
== 0 ? NULL
: mask
.data
,
1186 mask
.size
, actions
.data
,
1187 actions
.size
, ufid_present
? &ufid
: NULL
,
1189 dpctl_p
->print_statistics
? &stats
: NULL
);
1192 dpctl_error(dpctl_p
, error
, "updating flow table");
1193 goto out_freeactions
;
1196 if (dpctl_p
->print_statistics
) {
1200 dpif_flow_stats_format(&stats
, &s
);
1201 dpctl_print(dpctl_p
, "%s\n", ds_cstr(&s
));
1206 ofpbuf_uninit(&actions
);
1208 ofpbuf_uninit(&mask
);
1209 ofpbuf_uninit(&key
);
1215 dpctl_add_flow(int argc
, const char *argv
[], struct dpctl_params
*dpctl_p
)
1217 return dpctl_put_flow(argc
, argv
, DPIF_FP_CREATE
, dpctl_p
);
1221 dpctl_mod_flow(int argc
, const char *argv
[], struct dpctl_params
*dpctl_p
)
1223 enum dpif_flow_put_flags flags
;
1225 flags
= DPIF_FP_MODIFY
;
1226 if (dpctl_p
->may_create
) {
1227 flags
|= DPIF_FP_CREATE
;
1229 if (dpctl_p
->zero_statistics
) {
1230 flags
|= DPIF_FP_ZERO_STATS
;
1233 return dpctl_put_flow(argc
, argv
, flags
, dpctl_p
);
1237 dpctl_get_flow(int argc
, const char *argv
[], struct dpctl_params
*dpctl_p
)
1239 const char *key_s
= argv
[argc
- 1];
1240 struct dpif_flow flow
;
1244 uint64_t stub
[DPIF_FLOW_BUFSIZE
/ 8];
1248 error
= opt_dpif_open(argc
, argv
, dpctl_p
, 3, &dpif
);
1253 ofpbuf_use_stub(&buf
, &stub
, sizeof stub
);
1255 struct hmap
*portno_names
= dpctl_get_portno_names(dpif
, dpctl_p
);
1257 n
= odp_ufid_from_string(key_s
, &ufid
);
1259 dpctl_error(dpctl_p
, -n
, "parsing flow ufid");
1263 /* In case of PMD will be returned flow from first PMD thread with match. */
1264 error
= dpif_flow_get(dpif
, NULL
, 0, &ufid
, PMD_ID_NULL
, &buf
, &flow
);
1266 dpctl_error(dpctl_p
, error
, "getting flow");
1271 format_dpif_flow(&ds
, &flow
, portno_names
, dpctl_p
);
1272 dpctl_print(dpctl_p
, "%s\n", ds_cstr(&ds
));
1276 dpctl_free_portno_names(portno_names
);
1277 ofpbuf_uninit(&buf
);
1283 dpctl_del_flow(int argc
, const char *argv
[], struct dpctl_params
*dpctl_p
)
1285 const char *key_s
= argv
[argc
- 1];
1286 struct dpif_flow_stats stats
;
1287 struct dpif_port dpif_port
;
1288 struct dpif_port_dump port_dump
;
1290 struct ofpbuf mask
; /* To be ignored. */
1293 bool ufid_generated
;
1295 struct simap port_names
;
1298 error
= opt_dpif_open(argc
, argv
, dpctl_p
, 3, &dpif
);
1303 ufid_present
= false;
1304 n
= odp_ufid_from_string(key_s
, &ufid
);
1306 dpctl_error(dpctl_p
, -n
, "parsing flow ufid");
1310 ufid_present
= true;
1313 simap_init(&port_names
);
1314 DPIF_PORT_FOR_EACH (&dpif_port
, &port_dump
, dpif
) {
1315 simap_put(&port_names
, dpif_port
.name
, odp_to_u32(dpif_port
.port_no
));
1318 ofpbuf_init(&key
, 0);
1319 ofpbuf_init(&mask
, 0);
1322 error
= odp_flow_from_string(key_s
, &port_names
, &key
, &mask
, &error_s
);
1324 dpctl_error(dpctl_p
, error
, "%s", error_s
);
1329 if (!ufid_present
&& dpctl_p
->is_appctl
) {
1330 /* While adding flow via appctl we're generating UFID to make HW
1331 * offloading possible. Generating UFID here to be sure that such
1332 * flows could be removed the same way they were added. */
1333 odp_flow_key_hash(key
.data
, key
.size
, &ufid
);
1334 ufid_present
= ufid_generated
= true;
1337 /* The flow will be deleted from all pmds currently in the datapath. */
1338 error
= dpif_flow_del(dpif
, key
.data
, key
.size
,
1339 ufid_present
? &ufid
: NULL
, PMD_ID_NULL
,
1340 dpctl_p
->print_statistics
? &stats
: NULL
);
1343 dpctl_error(dpctl_p
, error
, "deleting flow");
1344 if (error
== ENOENT
&& (!ufid_present
|| ufid_generated
)) {
1348 ds_put_format(&s
, "Perhaps you need to specify a UFID?");
1349 dpctl_print(dpctl_p
, "%s\n", ds_cstr(&s
));
1355 if (dpctl_p
->print_statistics
) {
1359 dpif_flow_stats_format(&stats
, &s
);
1360 dpctl_print(dpctl_p
, "%s\n", ds_cstr(&s
));
1365 ofpbuf_uninit(&mask
);
1366 ofpbuf_uninit(&key
);
1367 simap_destroy(&port_names
);
1373 dpctl_del_flows(int argc
, const char *argv
[], struct dpctl_params
*dpctl_p
)
1377 int error
= opt_dpif_open(argc
, argv
, dpctl_p
, 2, &dpif
);
1382 error
= dpif_flow_flush(dpif
);
1384 dpctl_error(dpctl_p
, error
, "deleting all flows");
1391 dpctl_help(int argc OVS_UNUSED
, const char *argv
[] OVS_UNUSED
,
1392 struct dpctl_params
*dpctl_p
)
1394 if (dpctl_p
->usage
) {
1395 dpctl_p
->usage(dpctl_p
->aux
);
1402 dpctl_list_commands(int argc OVS_UNUSED
, const char *argv
[] OVS_UNUSED
,
1403 struct dpctl_params
*dpctl_p
)
1405 struct ds ds
= DS_EMPTY_INITIALIZER
;
1406 const struct dpctl_command
*commands
= get_all_dpctl_commands();
1408 ds_put_cstr(&ds
, "The available commands are:\n");
1409 for (; commands
->name
; commands
++) {
1410 const struct dpctl_command
*c
= commands
;
1412 if (dpctl_p
->is_appctl
&& !strcmp(c
->name
, "help")) {
1416 ds_put_format(&ds
, " %s%-23s %s\n", dpctl_p
->is_appctl
? "dpctl/" : "",
1419 dpctl_puts(dpctl_p
, false, ds
.string
);
1427 dpctl_dump_conntrack(int argc
, const char *argv
[],
1428 struct dpctl_params
*dpctl_p
)
1430 struct ct_dpif_dump_state
*dump
;
1431 struct ct_dpif_entry cte
;
1432 uint16_t zone
, *pzone
= NULL
;
1437 if (argc
> 1 && ovs_scan(argv
[argc
- 1], "zone=%"SCNu16
, &zone
)) {
1442 error
= opt_dpif_open(argc
, argv
, dpctl_p
, 2, &dpif
);
1447 error
= ct_dpif_dump_start(dpif
, &dump
, pzone
, &tot_bkts
);
1449 dpctl_error(dpctl_p
, error
, "starting conntrack dump");
1454 while (!(error
= ct_dpif_dump_next(dump
, &cte
))) {
1455 struct ds s
= DS_EMPTY_INITIALIZER
;
1457 ct_dpif_format_entry(&cte
, &s
, dpctl_p
->verbosity
,
1458 dpctl_p
->print_statistics
);
1459 ct_dpif_entry_uninit(&cte
);
1461 dpctl_print(dpctl_p
, "%s\n", ds_cstr(&s
));
1465 /* Any CT entry was dumped with no issue. */
1468 dpctl_error(dpctl_p
, error
, "dumping conntrack entry");
1471 ct_dpif_dump_done(dump
);
1477 dpctl_flush_conntrack(int argc
, const char *argv
[],
1478 struct dpctl_params
*dpctl_p
)
1480 struct dpif
*dpif
= NULL
;
1481 struct ct_dpif_tuple tuple
, *ptuple
= NULL
;
1482 struct ds ds
= DS_EMPTY_INITIALIZER
;
1483 uint16_t zone
, *pzone
= NULL
;
1485 int args
= argc
- 1;
1487 /* Parse ct tuple */
1488 if (args
&& ct_dpif_parse_tuple(&tuple
, argv
[args
], &ds
)) {
1494 if (args
&& ovs_scan(argv
[args
], "zone=%"SCNu16
, &zone
)) {
1499 /* Report error if there are more than one unparsed argument. */
1501 ds_put_cstr(&ds
, "invalid arguments");
1506 error
= opt_dpif_open(argc
, argv
, dpctl_p
, 4, &dpif
);
1511 error
= ct_dpif_flush(dpif
, pzone
, ptuple
);
1516 ds_put_cstr(&ds
, "failed to flush conntrack");
1520 dpctl_error(dpctl_p
, error
, "%s", ds_cstr(&ds
));
1527 dpctl_ct_stats_show(int argc
, const char *argv
[],
1528 struct dpctl_params
*dpctl_p
)
1531 struct ct_dpif_dump_state
*dump
;
1532 struct ct_dpif_entry cte
;
1533 uint16_t zone
, *pzone
= NULL
;
1537 int proto_stats
[CT_STATS_MAX
];
1538 int tcp_conn_per_states
[CT_DPIF_TCPS_MAX_NUM
];
1541 bool verbose
= dpctl_p
->verbosity
;
1543 while (argc
> 1 && lastargc
!= argc
) {
1545 if (!strncmp(argv
[argc
- 1], "verbose", 7)) {
1546 /* Support "verbose" argument for backwards compatibility. */
1549 } else if (!strncmp(argv
[argc
- 1], "zone=", 5)) {
1550 if (ovs_scan(argv
[argc
- 1], "zone=%"SCNu16
, &zone
)) {
1557 error
= opt_dpif_open(argc
, argv
, dpctl_p
, 2, &dpif
);
1562 memset(proto_stats
, 0, sizeof(proto_stats
));
1563 memset(tcp_conn_per_states
, 0, sizeof(tcp_conn_per_states
));
1564 error
= ct_dpif_dump_start(dpif
, &dump
, pzone
, &tot_bkts
);
1566 dpctl_error(dpctl_p
, error
, "starting conntrack dump");
1572 while (!(error
= ct_dpif_dump_next(dump
, &cte
))) {
1573 ct_dpif_entry_uninit(&cte
);
1575 switch (cte
.tuple_orig
.ip_proto
) {
1577 proto_stats
[CT_STATS_ICMP
]++;
1579 case IPPROTO_ICMPV6
:
1580 proto_stats
[CT_STATS_ICMPV6
]++;
1583 proto_stats
[CT_STATS_TCP
]++;
1585 /* We keep two separate tcp states, but we print just one. The
1586 * Linux kernel connection tracker internally keeps only one state,
1587 * so 'state_orig' and 'state_reply', will be the same. */
1588 tcp_state
= MAX(cte
.protoinfo
.tcp
.state_orig
,
1589 cte
.protoinfo
.tcp
.state_reply
);
1590 tcp_state
= ct_dpif_coalesce_tcp_state(tcp_state
);
1591 tcp_conn_per_states
[tcp_state
]++;
1594 proto_stats
[CT_STATS_UDP
]++;
1597 proto_stats
[CT_STATS_SCTP
]++;
1599 case IPPROTO_UDPLITE
:
1600 proto_stats
[CT_STATS_UDPLITE
]++;
1603 proto_stats
[CT_STATS_DCCP
]++;
1606 proto_stats
[CT_STATS_IGMP
]++;
1609 proto_stats
[CT_STATS_OTHER
]++;
1614 /* All CT entries were dumped with no issue. */
1617 dpctl_error(dpctl_p
, error
, "dumping conntrack entry");
1618 /* Fall through to show any other info we collected. */
1621 dpctl_print(dpctl_p
, "Connections Stats:\n Total: %d\n", tot_conn
);
1622 if (proto_stats
[CT_STATS_TCP
]) {
1623 dpctl_print(dpctl_p
, " TCP: %d\n", proto_stats
[CT_STATS_TCP
]);
1625 dpctl_print(dpctl_p
, " Conn per TCP states:\n");
1626 for (int i
= 0; i
< CT_DPIF_TCPS_MAX_NUM
; i
++) {
1627 if (tcp_conn_per_states
[i
]) {
1628 struct ds s
= DS_EMPTY_INITIALIZER
;
1629 ct_dpif_format_tcp_stat(&s
, i
, tcp_conn_per_states
[i
]);
1630 dpctl_print(dpctl_p
, "%s\n", ds_cstr(&s
));
1636 if (proto_stats
[CT_STATS_UDP
]) {
1637 dpctl_print(dpctl_p
, " UDP: %d\n", proto_stats
[CT_STATS_UDP
]);
1639 if (proto_stats
[CT_STATS_UDPLITE
]) {
1640 dpctl_print(dpctl_p
, " UDPLITE: %d\n", proto_stats
[CT_STATS_UDPLITE
]);
1642 if (proto_stats
[CT_STATS_SCTP
]) {
1643 dpctl_print(dpctl_p
, " SCTP: %d\n", proto_stats
[CT_STATS_SCTP
]);
1645 if (proto_stats
[CT_STATS_ICMP
]) {
1646 dpctl_print(dpctl_p
, " ICMP: %d\n", proto_stats
[CT_STATS_ICMP
]);
1648 if (proto_stats
[CT_STATS_DCCP
]) {
1649 dpctl_print(dpctl_p
, " DCCP: %d\n", proto_stats
[CT_STATS_DCCP
]);
1651 if (proto_stats
[CT_STATS_IGMP
]) {
1652 dpctl_print(dpctl_p
, " IGMP: %d\n", proto_stats
[CT_STATS_IGMP
]);
1654 if (proto_stats
[CT_STATS_OTHER
]) {
1655 dpctl_print(dpctl_p
, " Other: %d\n", proto_stats
[CT_STATS_OTHER
]);
1658 ct_dpif_dump_done(dump
);
1663 #define CT_BKTS_GT "gt="
1665 dpctl_ct_bkts(int argc
, const char *argv
[],
1666 struct dpctl_params
*dpctl_p
)
1669 struct ct_dpif_dump_state
*dump
;
1670 struct ct_dpif_entry cte
;
1671 uint16_t gt
= 0; /* Threshold: display value when greater than gt. */
1672 uint16_t *pzone
= NULL
;
1676 if (argc
> 1 && !strncmp(argv
[argc
- 1], CT_BKTS_GT
, strlen(CT_BKTS_GT
))) {
1677 if (ovs_scan(argv
[argc
- 1], CT_BKTS_GT
"%"SCNu16
, >
)) {
1682 error
= opt_dpif_open(argc
, argv
, dpctl_p
, 2, &dpif
);
1687 error
= ct_dpif_dump_start(dpif
, &dump
, pzone
, &tot_bkts
);
1689 dpctl_error(dpctl_p
, error
, "starting conntrack dump");
1693 if (tot_bkts
== -1) {
1694 /* Command not available when called by kernel OvS. */
1695 dpctl_print(dpctl_p
,
1696 "Command is available for UserSpace ConnTracker only.\n");
1697 ct_dpif_dump_done(dump
);
1702 dpctl_print(dpctl_p
, "Total Buckets: %d\n", tot_bkts
);
1705 uint32_t *conn_per_bkts
= xzalloc(tot_bkts
* sizeof(uint32_t));
1707 while (!(error
= ct_dpif_dump_next(dump
, &cte
))) {
1708 ct_dpif_entry_uninit(&cte
);
1711 if (cte
.bkt
< tot_bkts
) {
1712 conn_per_bkts
[cte
.bkt
]++;
1714 dpctl_print(dpctl_p
, "Bucket nr out of range: %d >= %d\n",
1720 /* All CT entries were dumped with no issue. */
1723 dpctl_error(dpctl_p
, error
, "dumping conntrack entry");
1724 /* Fall through and display all the collected info. */
1727 dpctl_print(dpctl_p
, "Current Connections: %d\n", tot_conn
);
1728 dpctl_print(dpctl_p
, "\n");
1729 if (tot_bkts
&& tot_conn
) {
1730 dpctl_print(dpctl_p
, "+-----------+"
1731 "-----------------------------------------+\n");
1732 dpctl_print(dpctl_p
, "| Buckets |"
1733 " Connections per Buckets |\n");
1734 dpctl_print(dpctl_p
, "+-----------+"
1735 "-----------------------------------------+");
1736 #define NUM_BKTS_DIPLAYED_PER_ROW 8
1737 for (int i
= 0; i
< tot_bkts
; i
++) {
1738 if (i
% NUM_BKTS_DIPLAYED_PER_ROW
== 0) {
1739 dpctl_print(dpctl_p
, "\n %3d..%3d | ",
1740 i
, i
+ NUM_BKTS_DIPLAYED_PER_ROW
- 1);
1742 if (conn_per_bkts
[i
] > gt
) {
1743 dpctl_print(dpctl_p
, "%5d", conn_per_bkts
[i
]);
1745 dpctl_print(dpctl_p
, "%5s", ".");
1748 dpctl_print(dpctl_p
, "\n\n");
1751 ct_dpif_dump_done(dump
);
1753 free(conn_per_bkts
);
1758 dpctl_ct_set_maxconns(int argc
, const char *argv
[],
1759 struct dpctl_params
*dpctl_p
)
1762 int error
= opt_dpif_open(argc
, argv
, dpctl_p
, 3, &dpif
);
1765 if (ovs_scan(argv
[argc
- 1], "%"SCNu32
, &maxconns
)) {
1766 error
= ct_dpif_set_maxconns(dpif
, maxconns
);
1769 dpctl_print(dpctl_p
, "setting maxconns successful");
1771 dpctl_error(dpctl_p
, error
, "ct set maxconns failed");
1775 dpctl_error(dpctl_p
, error
, "maxconns missing or malformed");
1784 dpctl_ct_get_maxconns(int argc
, const char *argv
[],
1785 struct dpctl_params
*dpctl_p
)
1788 int error
= opt_dpif_open(argc
, argv
, dpctl_p
, 2, &dpif
);
1791 error
= ct_dpif_get_maxconns(dpif
, &maxconns
);
1794 dpctl_print(dpctl_p
, "%u\n", maxconns
);
1796 dpctl_error(dpctl_p
, error
, "maxconns could not be retrieved");
1805 dpctl_ct_get_nconns(int argc
, const char *argv
[],
1806 struct dpctl_params
*dpctl_p
)
1809 int error
= opt_dpif_open(argc
, argv
, dpctl_p
, 2, &dpif
);
1812 error
= ct_dpif_get_nconns(dpif
, &nconns
);
1815 dpctl_print(dpctl_p
, "%u\n", nconns
);
1817 dpctl_error(dpctl_p
, error
, "nconns could not be retrieved");
1826 dpctl_ct_set_tcp_seq_chk__(int argc
, const char *argv
[],
1827 struct dpctl_params
*dpctl_p
, bool enabled
)
1830 int error
= opt_dpif_open(argc
, argv
, dpctl_p
, 3, &dpif
);
1832 error
= ct_dpif_set_tcp_seq_chk(dpif
, enabled
);
1834 dpctl_print(dpctl_p
,
1835 "%s TCP sequence checking successful",
1836 enabled
? "enabling" : "disabling");
1838 dpctl_error(dpctl_p
, error
,
1839 "%s TCP sequence checking failed",
1840 enabled
? "enabling" : "disabling");
1848 dpctl_ct_enable_tcp_seq_chk(int argc
, const char *argv
[],
1849 struct dpctl_params
*dpctl_p
)
1851 return dpctl_ct_set_tcp_seq_chk__(argc
, argv
, dpctl_p
, true);
1855 dpctl_ct_disable_tcp_seq_chk(int argc
, const char *argv
[],
1856 struct dpctl_params
*dpctl_p
)
1858 return dpctl_ct_set_tcp_seq_chk__(argc
, argv
, dpctl_p
, false);
1862 dpctl_ct_get_tcp_seq_chk(int argc
, const char *argv
[],
1863 struct dpctl_params
*dpctl_p
)
1866 int error
= opt_dpif_open(argc
, argv
, dpctl_p
, 2, &dpif
);
1869 error
= ct_dpif_get_tcp_seq_chk(dpif
, &enabled
);
1871 dpctl_print(dpctl_p
, "TCP sequence checking: %s\n",
1872 enabled
? "enabled" : "disabled");
1874 dpctl_error(dpctl_p
, error
, "TCP sequence checking query failed");
1882 dpctl_ct_set_limits(int argc
, const char *argv
[],
1883 struct dpctl_params
*dpctl_p
)
1886 struct ds ds
= DS_EMPTY_INITIALIZER
;
1887 int i
= dp_arg_exists(argc
, argv
) ? 2 : 1;
1888 uint32_t default_limit
, *p_default_limit
= NULL
;
1889 struct ovs_list zone_limits
= OVS_LIST_INITIALIZER(&zone_limits
);
1891 int error
= opt_dpif_open(argc
, argv
, dpctl_p
, INT_MAX
, &dpif
);
1896 /* Parse default limit */
1897 if (!strncmp(argv
[i
], "default=", 8)) {
1898 if (ovs_scan(argv
[i
], "default=%"SCNu32
, &default_limit
)) {
1899 p_default_limit
= &default_limit
;
1902 ds_put_cstr(&ds
, "invalid default limit");
1908 /* Parse ct zone limit tuples */
1912 if (!ct_dpif_parse_zone_limit_tuple(argv
[i
++], &zone
, &limit
, &ds
)) {
1916 ct_dpif_push_zone_limit(&zone_limits
, zone
, limit
, 0);
1919 error
= ct_dpif_set_limits(dpif
, p_default_limit
, &zone_limits
);
1921 ct_dpif_free_zone_limits(&zone_limits
);
1925 ds_put_cstr(&ds
, "failed to set conntrack limit");
1929 dpctl_error(dpctl_p
, error
, "%s", ds_cstr(&ds
));
1931 ct_dpif_free_zone_limits(&zone_limits
);
1937 parse_ct_limit_zones(const char *argv
, struct ovs_list
*zone_limits
,
1940 char *save_ptr
= NULL
, *argcopy
, *next_zone
;
1943 if (strncmp(argv
, "zone=", 5)) {
1944 ds_put_format(ds
, "invalid argument %s", argv
);
1948 argcopy
= xstrdup(argv
+ 5);
1949 next_zone
= strtok_r(argcopy
, ",", &save_ptr
);
1952 if (ovs_scan(next_zone
, "%"SCNu16
, &zone
)) {
1953 ct_dpif_push_zone_limit(zone_limits
, zone
, 0, 0);
1955 ds_put_cstr(ds
, "invalid zone");
1959 } while ((next_zone
= strtok_r(NULL
, ",", &save_ptr
)) != NULL
);
1966 dpctl_ct_del_limits(int argc
, const char *argv
[],
1967 struct dpctl_params
*dpctl_p
)
1970 struct ds ds
= DS_EMPTY_INITIALIZER
;
1972 int i
= dp_arg_exists(argc
, argv
) ? 2 : 1;
1973 struct ovs_list zone_limits
= OVS_LIST_INITIALIZER(&zone_limits
);
1975 error
= opt_dpif_open(argc
, argv
, dpctl_p
, 3, &dpif
);
1980 error
= parse_ct_limit_zones(argv
[i
], &zone_limits
, &ds
);
1985 error
= ct_dpif_del_limits(dpif
, &zone_limits
);
1989 ds_put_cstr(&ds
, "failed to delete conntrack limit");
1993 dpctl_error(dpctl_p
, error
, "%s", ds_cstr(&ds
));
1996 ct_dpif_free_zone_limits(&zone_limits
);
2002 dpctl_ct_get_limits(int argc
, const char *argv
[],
2003 struct dpctl_params
*dpctl_p
)
2006 struct ds ds
= DS_EMPTY_INITIALIZER
;
2007 uint32_t default_limit
;
2008 int i
= dp_arg_exists(argc
, argv
) ? 2 : 1;
2009 struct ovs_list list_query
= OVS_LIST_INITIALIZER(&list_query
);
2010 struct ovs_list list_reply
= OVS_LIST_INITIALIZER(&list_reply
);
2012 int error
= opt_dpif_open(argc
, argv
, dpctl_p
, 3, &dpif
);
2018 error
= parse_ct_limit_zones(argv
[i
], &list_query
, &ds
);
2024 error
= ct_dpif_get_limits(dpif
, &default_limit
, &list_query
,
2027 ct_dpif_format_zone_limits(default_limit
, &list_reply
, &ds
);
2028 dpctl_print(dpctl_p
, "%s\n", ds_cstr(&ds
));
2031 ds_put_format(&ds
, "failed to get conntrack limit %s",
2032 ovs_strerror(error
));
2036 dpctl_error(dpctl_p
, error
, "%s", ds_cstr(&ds
));
2039 ct_dpif_free_zone_limits(&list_query
);
2040 ct_dpif_free_zone_limits(&list_reply
);
2046 ipf_set_enabled__(int argc
, const char *argv
[], struct dpctl_params
*dpctl_p
,
2050 int error
= opt_dpif_open(argc
, argv
, dpctl_p
, 4, &dpif
);
2052 char v4_or_v6
[3] = {0};
2053 if (ovs_scan(argv
[argc
- 1], "%2s", v4_or_v6
) &&
2054 (!strncmp(v4_or_v6
, "v4", 2) || !strncmp(v4_or_v6
, "v6", 2))) {
2055 error
= ct_dpif_ipf_set_enabled(
2056 dpif
, !strncmp(v4_or_v6
, "v6", 2), enabled
);
2058 dpctl_print(dpctl_p
,
2059 "%s fragmentation reassembly successful",
2060 enabled
? "enabling" : "disabling");
2062 dpctl_error(dpctl_p
, error
,
2063 "%s fragmentation reassembly failed",
2064 enabled
? "enabling" : "disabling");
2068 dpctl_error(dpctl_p
, error
,
2069 "parameter missing: 'v4' for IPv4 or 'v6' for IPv6");
2077 dpctl_ipf_set_enabled(int argc
, const char *argv
[],
2078 struct dpctl_params
*dpctl_p
)
2080 return ipf_set_enabled__(argc
, argv
, dpctl_p
, true);
2084 dpctl_ipf_set_disabled(int argc
, const char *argv
[],
2085 struct dpctl_params
*dpctl_p
)
2087 return ipf_set_enabled__(argc
, argv
, dpctl_p
, false);
2091 dpctl_ipf_set_min_frag(int argc
, const char *argv
[],
2092 struct dpctl_params
*dpctl_p
)
2095 int error
= opt_dpif_open(argc
, argv
, dpctl_p
, 4, &dpif
);
2097 char v4_or_v6
[3] = {0};
2098 if (ovs_scan(argv
[argc
- 2], "%2s", v4_or_v6
) &&
2099 (!strncmp(v4_or_v6
, "v4", 2) || !strncmp(v4_or_v6
, "v6", 2))) {
2100 uint32_t min_fragment
;
2101 if (ovs_scan(argv
[argc
- 1], "%"SCNu32
, &min_fragment
)) {
2102 error
= ct_dpif_ipf_set_min_frag(
2103 dpif
, !strncmp(v4_or_v6
, "v6", 2), min_fragment
);
2105 dpctl_print(dpctl_p
,
2106 "setting minimum fragment size successful");
2108 dpctl_error(dpctl_p
, error
,
2109 "requested minimum fragment size too small;"
2110 " see documentation");
2114 dpctl_error(dpctl_p
, error
,
2115 "parameter missing for minimum fragment size");
2119 dpctl_error(dpctl_p
, error
,
2120 "parameter missing: v4 for IPv4 or v6 for IPv6");
2129 dpctl_ipf_set_max_nfrags(int argc
, const char *argv
[],
2130 struct dpctl_params
*dpctl_p
)
2133 int error
= opt_dpif_open(argc
, argv
, dpctl_p
, 3, &dpif
);
2135 uint32_t nfrags_max
;
2136 if (ovs_scan(argv
[argc
- 1], "%"SCNu32
, &nfrags_max
)) {
2137 error
= ct_dpif_ipf_set_max_nfrags(dpif
, nfrags_max
);
2139 dpctl_print(dpctl_p
,
2140 "setting maximum fragments successful");
2142 dpctl_error(dpctl_p
, error
,
2143 "setting maximum fragments failed");
2147 dpctl_error(dpctl_p
, error
,
2148 "parameter missing for maximum fragments");
2157 dpctl_dump_ipf(struct dpif
*dpif
, struct dpctl_params
*dpctl_p
)
2159 struct ipf_dump_ctx
*dump_ctx
;
2162 int error
= ct_dpif_ipf_dump_start(dpif
, &dump_ctx
);
2164 dpctl_error(dpctl_p
, error
, "starting ipf list dump");
2165 /* Nothing to clean up, just return. */
2169 dpctl_print(dpctl_p
, "\n Fragment Lists:\n\n");
2170 while (!(error
= ct_dpif_ipf_dump_next(dpif
, dump_ctx
, &dump
))) {
2171 dpctl_print(dpctl_p
, "%s\n", dump
);
2175 if (error
&& error
!= EOF
) {
2176 dpctl_error(dpctl_p
, error
, "dumping ipf lists failed");
2179 ct_dpif_ipf_dump_done(dpif
, dump_ctx
);
2183 dpctl_ct_ipf_get_status(int argc
, const char *argv
[],
2184 struct dpctl_params
*dpctl_p
)
2187 int error
= opt_dpif_open(argc
, argv
, dpctl_p
, 2, &dpif
);
2190 struct dpif_ipf_status dpif_ipf_status
;
2191 error
= ct_dpif_ipf_get_status(dpif
, &dpif_ipf_status
);
2194 dpctl_print(dpctl_p
, " Fragmentation Module Status\n");
2195 dpctl_print(dpctl_p
, " ---------------------------\n");
2196 dpctl_print(dpctl_p
, " v4 enabled: %u\n",
2197 dpif_ipf_status
.v4
.enabled
);
2198 dpctl_print(dpctl_p
, " v6 enabled: %u\n",
2199 dpif_ipf_status
.v6
.enabled
);
2200 dpctl_print(dpctl_p
, " max num frags (v4/v6): %u\n",
2201 dpif_ipf_status
.nfrag_max
);
2202 dpctl_print(dpctl_p
, " num frag: %u\n",
2203 dpif_ipf_status
.nfrag
);
2204 dpctl_print(dpctl_p
, " min v4 frag size: %u\n",
2205 dpif_ipf_status
.v4
.min_frag_size
);
2206 dpctl_print(dpctl_p
, " v4 frags accepted: %"PRIu64
"\n",
2207 dpif_ipf_status
.v4
.nfrag_accepted
);
2208 dpctl_print(dpctl_p
, " v4 frags completed: %"PRIu64
"\n",
2209 dpif_ipf_status
.v4
.nfrag_completed_sent
);
2210 dpctl_print(dpctl_p
, " v4 frags expired: %"PRIu64
"\n",
2211 dpif_ipf_status
.v4
.nfrag_expired_sent
);
2212 dpctl_print(dpctl_p
, " v4 frags too small: %"PRIu64
"\n",
2213 dpif_ipf_status
.v4
.nfrag_too_small
);
2214 dpctl_print(dpctl_p
, " v4 frags overlapped: %"PRIu64
"\n",
2215 dpif_ipf_status
.v4
.nfrag_overlap
);
2216 dpctl_print(dpctl_p
, " v4 frags purged: %"PRIu64
"\n",
2217 dpif_ipf_status
.v4
.nfrag_purged
);
2219 dpctl_print(dpctl_p
, " min v6 frag size: %u\n",
2220 dpif_ipf_status
.v6
.min_frag_size
);
2221 dpctl_print(dpctl_p
, " v6 frags accepted: %"PRIu64
"\n",
2222 dpif_ipf_status
.v6
.nfrag_accepted
);
2223 dpctl_print(dpctl_p
, " v6 frags completed: %"PRIu64
"\n",
2224 dpif_ipf_status
.v6
.nfrag_completed_sent
);
2225 dpctl_print(dpctl_p
, " v6 frags expired: %"PRIu64
"\n",
2226 dpif_ipf_status
.v6
.nfrag_expired_sent
);
2227 dpctl_print(dpctl_p
, " v6 frags too small: %"PRIu64
"\n",
2228 dpif_ipf_status
.v6
.nfrag_too_small
);
2229 dpctl_print(dpctl_p
, " v6 frags overlapped: %"PRIu64
"\n",
2230 dpif_ipf_status
.v6
.nfrag_overlap
);
2231 dpctl_print(dpctl_p
, " v6 frags purged: %"PRIu64
"\n",
2232 dpif_ipf_status
.v6
.nfrag_purged
);
2234 dpctl_error(dpctl_p
, error
,
2235 "ipf status could not be retrieved");
2239 if (dpctl_p
->verbosity
) {
2240 dpctl_dump_ipf(dpif
, dpctl_p
);
2249 /* Undocumented commands for unit testing. */
2252 dpctl_parse_actions(int argc
, const char *argv
[], struct dpctl_params
* dpctl_p
)
2256 for (i
= 1; i
< argc
; i
++) {
2257 struct ofpbuf actions
;
2260 ofpbuf_init(&actions
, 0);
2261 error
= odp_actions_from_string(argv
[i
], NULL
, &actions
);
2264 ofpbuf_uninit(&actions
);
2265 dpctl_error(dpctl_p
, error
, "odp_actions_from_string");
2270 format_odp_actions(&s
, actions
.data
, actions
.size
, NULL
);
2271 dpctl_print(dpctl_p
, "%s\n", ds_cstr(&s
));
2274 ofpbuf_uninit(&actions
);
2280 struct actions_for_flow
{
2281 struct hmap_node hmap_node
;
2283 struct ofpbuf actions
;
2286 static struct actions_for_flow
*
2287 get_actions_for_flow(struct hmap
*actions_per_flow
, const struct flow
*flow
)
2289 uint32_t hash
= flow_hash(flow
, 0);
2290 struct actions_for_flow
*af
;
2292 HMAP_FOR_EACH_WITH_HASH (af
, hmap_node
, hash
, actions_per_flow
) {
2293 if (flow_equal(&af
->flow
, flow
)) {
2298 af
= xmalloc(sizeof *af
);
2300 ofpbuf_init(&af
->actions
, 0);
2301 hmap_insert(actions_per_flow
, &af
->hmap_node
, hash
);
2306 compare_actions_for_flow(const void *a_
, const void *b_
)
2308 struct actions_for_flow
*const *a
= a_
;
2309 struct actions_for_flow
*const *b
= b_
;
2311 return flow_compare_3way(&(*a
)->flow
, &(*b
)->flow
);
2315 compare_output_actions(const void *a_
, const void *b_
)
2317 const struct nlattr
*a
= a_
;
2318 const struct nlattr
*b
= b_
;
2319 uint32_t a_port
= nl_attr_get_u32(a
);
2320 uint32_t b_port
= nl_attr_get_u32(b
);
2322 return a_port
< b_port
? -1 : a_port
> b_port
;
2326 sort_output_actions__(struct nlattr
*first
, struct nlattr
*end
)
2328 size_t bytes
= (uint8_t *) end
- (uint8_t *) first
;
2329 size_t n
= bytes
/ NL_A_U32_SIZE
;
2331 ovs_assert(bytes
% NL_A_U32_SIZE
== 0);
2332 qsort(first
, n
, NL_A_U32_SIZE
, compare_output_actions
);
2336 sort_output_actions(struct nlattr
*actions
, size_t length
)
2338 struct nlattr
*first_output
= NULL
;
2342 NL_ATTR_FOR_EACH (a
, left
, actions
, length
) {
2343 if (nl_attr_type(a
) == OVS_ACTION_ATTR_OUTPUT
) {
2344 if (!first_output
) {
2349 sort_output_actions__(first_output
, a
);
2350 first_output
= NULL
;
2355 uint8_t *end
= (uint8_t *) actions
+ length
;
2356 sort_output_actions__(first_output
,
2357 ALIGNED_CAST(struct nlattr
*, end
));
2361 /* usage: "ovs-dpctl normalize-actions FLOW ACTIONS" where FLOW and ACTIONS
2362 * have the syntax used by "ovs-dpctl dump-flows".
2364 * This command prints ACTIONS in a format that shows what happens for each
2365 * VLAN, independent of the order of the ACTIONS. For example, there is more
2366 * than one way to output a packet on VLANs 9 and 11, but this command will
2367 * print the same output for any form.
2369 * The idea here generalizes beyond VLANs (e.g. to setting other fields) but
2370 * so far the implementation only covers VLANs. */
2372 dpctl_normalize_actions(int argc
, const char *argv
[],
2373 struct dpctl_params
*dpctl_p
)
2375 struct simap port_names
;
2376 struct ofpbuf keybuf
;
2378 struct ofpbuf odp_actions
;
2379 struct hmap actions_per_flow
;
2380 struct actions_for_flow
**afs
;
2381 struct actions_for_flow
*af
;
2391 simap_init(&port_names
);
2392 for (i
= 3; i
< argc
; i
++) {
2396 if (ovs_scan(argv
[i
], "%15[^=]=%d", name
, &number
)) {
2397 uintptr_t n
= number
;
2398 simap_put(&port_names
, name
, n
);
2400 dpctl_error(dpctl_p
, 0, "%s: expected NAME=NUMBER", argv
[i
]);
2406 /* Parse flow key. */
2407 ofpbuf_init(&keybuf
, 0);
2409 error
= odp_flow_from_string(argv
[1], &port_names
, &keybuf
, NULL
,
2412 dpctl_error(dpctl_p
, error
, "odp_flow_key_from_string (%s)", error_s
);
2414 goto out_freekeybuf
;
2418 odp_flow_format(keybuf
.data
, keybuf
.size
, NULL
, 0, NULL
,
2419 &s
, dpctl_p
->verbosity
);
2420 dpctl_print(dpctl_p
, "input flow: %s\n", ds_cstr(&s
));
2422 error
= odp_flow_key_to_flow(keybuf
.data
, keybuf
.size
, &flow
, &error_s
);
2424 dpctl_error(dpctl_p
, error
, "odp_flow_key_to_flow failed (%s)",
2425 error_s
? error_s
: "reason unknown");
2427 goto out_freekeybuf
;
2430 /* Parse actions. */
2431 ofpbuf_init(&odp_actions
, 0);
2432 error
= odp_actions_from_string(argv
[2], &port_names
, &odp_actions
);
2434 dpctl_error(dpctl_p
, error
, "odp_actions_from_string");
2435 goto out_freeactions
;
2438 if (dpctl_p
->verbosity
) {
2440 format_odp_actions(&s
, odp_actions
.data
, odp_actions
.size
, NULL
);
2441 dpctl_print(dpctl_p
, "input actions: %s\n", ds_cstr(&s
));
2444 hmap_init(&actions_per_flow
);
2445 NL_ATTR_FOR_EACH (a
, left
, odp_actions
.data
, odp_actions
.size
) {
2446 const struct ovs_action_push_vlan
*push
;
2447 switch(nl_attr_type(a
)) {
2448 case OVS_ACTION_ATTR_POP_VLAN
:
2449 flow_pop_vlan(&flow
, NULL
);
2452 case OVS_ACTION_ATTR_PUSH_VLAN
:
2453 flow_push_vlan_uninit(&flow
, NULL
);
2454 push
= nl_attr_get_unspec(a
, sizeof *push
);
2455 flow
.vlans
[0].tpid
= push
->vlan_tpid
;
2456 flow
.vlans
[0].tci
= push
->vlan_tci
;
2460 af
= get_actions_for_flow(&actions_per_flow
, &flow
);
2461 nl_msg_put_unspec(&af
->actions
, nl_attr_type(a
),
2462 nl_attr_get(a
), nl_attr_get_size(a
));
2465 n_afs
= hmap_count(&actions_per_flow
);
2466 afs
= xmalloc(n_afs
* sizeof *afs
);
2468 HMAP_FOR_EACH (af
, hmap_node
, &actions_per_flow
) {
2472 ovs_assert(i
== n_afs
);
2473 hmap_destroy(&actions_per_flow
);
2475 qsort(afs
, n_afs
, sizeof *afs
, compare_actions_for_flow
);
2477 for (i
= 0; i
< n_afs
; i
++) {
2479 sort_output_actions(af
->actions
.data
, af
->actions
.size
);
2481 for (encaps
= 0; encaps
< FLOW_MAX_VLAN_HEADERS
; encaps
++) {
2482 union flow_vlan_hdr
*vlan
= &af
->flow
.vlans
[encaps
];
2483 if (vlan
->tci
!= htons(0)) {
2484 dpctl_print(dpctl_p
, "vlan(");
2485 if (vlan
->tpid
!= htons(ETH_TYPE_VLAN
)) {
2486 dpctl_print(dpctl_p
, "tpid=0x%04"PRIx16
",", vlan
->tpid
);
2488 dpctl_print(dpctl_p
, "vid=%"PRIu16
",pcp=%d): ",
2489 vlan_tci_to_vid(vlan
->tci
),
2490 vlan_tci_to_pcp(vlan
->tci
));
2493 dpctl_print(dpctl_p
, "no vlan: ");
2499 if (eth_type_mpls(af
->flow
.dl_type
)) {
2500 dpctl_print(dpctl_p
, "mpls(label=%"PRIu32
",tc=%d,ttl=%d): ",
2501 mpls_lse_to_label(af
->flow
.mpls_lse
[0]),
2502 mpls_lse_to_tc(af
->flow
.mpls_lse
[0]),
2503 mpls_lse_to_ttl(af
->flow
.mpls_lse
[0]));
2505 dpctl_print(dpctl_p
, "no mpls: ");
2509 format_odp_actions(&s
, af
->actions
.data
, af
->actions
.size
, NULL
);
2510 dpctl_puts(dpctl_p
, false, ds_cstr(&s
));
2512 ofpbuf_uninit(&af
->actions
);
2519 ofpbuf_uninit(&odp_actions
);
2521 ofpbuf_uninit(&keybuf
);
2523 simap_destroy(&port_names
);
2529 static const struct dpctl_command all_commands
[] = {
2530 { "add-dp", "dp [iface...]", 1, INT_MAX
, dpctl_add_dp
, DP_RW
},
2531 { "del-dp", "dp", 1, 1, dpctl_del_dp
, DP_RW
},
2532 { "add-if", "dp iface...", 2, INT_MAX
, dpctl_add_if
, DP_RW
},
2533 { "del-if", "dp iface...", 2, INT_MAX
, dpctl_del_if
, DP_RW
},
2534 { "set-if", "dp iface...", 2, INT_MAX
, dpctl_set_if
, DP_RW
},
2535 { "dump-dps", "", 0, 0, dpctl_dump_dps
, DP_RO
},
2536 { "show", "[dp...]", 0, INT_MAX
, dpctl_show
, DP_RO
},
2537 { "dump-flows", "[dp] [filter=..] [type=..] [pmd=..]",
2538 0, 4, dpctl_dump_flows
, DP_RO
},
2539 { "add-flow", "[dp] flow actions", 2, 3, dpctl_add_flow
, DP_RW
},
2540 { "mod-flow", "[dp] flow actions", 2, 3, dpctl_mod_flow
, DP_RW
},
2541 { "get-flow", "[dp] ufid", 1, 2, dpctl_get_flow
, DP_RO
},
2542 { "del-flow", "[dp] flow", 1, 2, dpctl_del_flow
, DP_RW
},
2543 { "del-flows", "[dp]", 0, 1, dpctl_del_flows
, DP_RW
},
2544 { "dump-conntrack", "[dp] [zone=N]", 0, 2, dpctl_dump_conntrack
, DP_RO
},
2545 { "flush-conntrack", "[dp] [zone=N] [ct-tuple]", 0, 3,
2546 dpctl_flush_conntrack
, DP_RW
},
2547 { "ct-stats-show", "[dp] [zone=N]",
2548 0, 3, dpctl_ct_stats_show
, DP_RO
},
2549 { "ct-bkts", "[dp] [gt=N]", 0, 2, dpctl_ct_bkts
, DP_RO
},
2550 { "ct-set-maxconns", "[dp] maxconns", 1, 2, dpctl_ct_set_maxconns
,
2552 { "ct-get-maxconns", "[dp]", 0, 1, dpctl_ct_get_maxconns
, DP_RO
},
2553 { "ct-get-nconns", "[dp]", 0, 1, dpctl_ct_get_nconns
, DP_RO
},
2554 { "ct-enable-tcp-seq-chk", "[dp]", 0, 1, dpctl_ct_enable_tcp_seq_chk
,
2556 { "ct-disable-tcp-seq-chk", "[dp]", 0, 1, dpctl_ct_disable_tcp_seq_chk
,
2558 { "ct-get-tcp-seq-chk", "[dp]", 0, 1, dpctl_ct_get_tcp_seq_chk
, DP_RO
},
2559 { "ct-set-limits", "[dp] [default=L] [zone=N,limit=L]...", 1, INT_MAX
,
2560 dpctl_ct_set_limits
, DP_RO
},
2561 { "ct-del-limits", "[dp] zone=N1[,N2]...", 1, 2, dpctl_ct_del_limits
,
2563 { "ct-get-limits", "[dp] [zone=N1[,N2]...]", 0, 2, dpctl_ct_get_limits
,
2565 { "ipf-set-enabled", "[dp] v4|v6", 1, 2, dpctl_ipf_set_enabled
, DP_RW
},
2566 { "ipf-set-disabled", "[dp] v4|v6", 1, 2, dpctl_ipf_set_disabled
, DP_RW
},
2567 { "ipf-set-min-frag", "[dp] v4|v6 minfragment", 2, 3,
2568 dpctl_ipf_set_min_frag
, DP_RW
},
2569 { "ipf-set-max-nfrags", "[dp] maxfrags", 1, 2,
2570 dpctl_ipf_set_max_nfrags
, DP_RW
},
2571 { "ipf-get-status", "[dp]", 0, 1, dpctl_ct_ipf_get_status
,
2573 { "help", "", 0, INT_MAX
, dpctl_help
, DP_RO
},
2574 { "list-commands", "", 0, INT_MAX
, dpctl_list_commands
, DP_RO
},
2576 /* Undocumented commands for testing. */
2577 { "parse-actions", "actions", 1, INT_MAX
, dpctl_parse_actions
, DP_RO
},
2578 { "normalize-actions", "actions",
2579 2, INT_MAX
, dpctl_normalize_actions
, DP_RO
},
2581 { NULL
, NULL
, 0, 0, NULL
, DP_RO
},
2584 static const struct dpctl_command
*get_all_dpctl_commands(void)
2586 return all_commands
;
2589 /* Runs the command designated by argv[0] within the command table specified by
2590 * 'commands', which must be terminated by a command whose 'name' member is a
2593 dpctl_run_command(int argc
, const char *argv
[], struct dpctl_params
*dpctl_p
)
2595 const struct dpctl_command
*p
;
2597 dpctl_error(dpctl_p
, 0, "missing command name; use --help for help");
2601 for (p
= all_commands
; p
->name
!= NULL
; p
++) {
2602 if (!strcmp(p
->name
, argv
[0])) {
2603 int n_arg
= argc
- 1;
2604 if (n_arg
< p
->min_args
) {
2605 dpctl_error(dpctl_p
, 0,
2606 "'%s' command requires at least %d arguments",
2607 p
->name
, p
->min_args
);
2609 } else if (n_arg
> p
->max_args
) {
2610 dpctl_error(dpctl_p
, 0,
2611 "'%s' command takes at most %d arguments",
2612 p
->name
, p
->max_args
);
2615 if (p
->mode
== DP_RW
&& dpctl_p
->read_only
) {
2616 dpctl_error(dpctl_p
, 0,
2617 "'%s' command does not work in read only mode",
2621 return p
->handler(argc
, argv
, dpctl_p
);
2626 dpctl_error(dpctl_p
, 0, "unknown command '%s'; use --help for help",
2632 dpctl_unixctl_print(void *userdata
, bool error OVS_UNUSED
, const char *msg
)
2634 struct ds
*ds
= userdata
;
2635 ds_put_cstr(ds
, msg
);
2639 dpctl_unixctl_handler(struct unixctl_conn
*conn
, int argc
, const char *argv
[],
2642 struct ds ds
= DS_EMPTY_INITIALIZER
;
2645 struct dpctl_params dpctl_p
= {
2647 .output
= dpctl_unixctl_print
,
2651 /* Parse options (like getopt). Unfortunately it does
2652 * not seem a good idea to call getopt_long() here, since it uses global
2654 bool set_names
= false;
2655 while (argc
> 1 && !error
) {
2656 const char *arg
= argv
[1];
2657 if (!strncmp(arg
, "--", 2)) {
2659 if (!strcmp(arg
, "--statistics")) {
2660 dpctl_p
.print_statistics
= true;
2661 } else if (!strcmp(arg
, "--clear")) {
2662 dpctl_p
.zero_statistics
= true;
2663 } else if (!strcmp(arg
, "--may-create")) {
2664 dpctl_p
.may_create
= true;
2665 } else if (!strcmp(arg
, "--more")) {
2666 dpctl_p
.verbosity
++;
2667 } else if (!strcmp(arg
, "--names")) {
2668 dpctl_p
.names
= true;
2670 } else if (!strcmp(arg
, "--no-names")) {
2671 dpctl_p
.names
= false;
2674 ds_put_format(&ds
, "Unrecognized option %s", argv
[1]);
2677 } else if (arg
[0] == '-' && arg
[1] != '\0') {
2678 /* Short option[s] */
2679 const char *opt
= &arg
[1];
2681 while (*opt
&& !error
) {
2684 dpctl_p
.verbosity
++;
2687 dpctl_p
.print_statistics
= true;
2690 ds_put_format(&ds
, "Unrecognized option -%c", *opt
);
2697 /* Doesn't start with -, not an option */
2708 dpctl_p
.names
= dpctl_p
.verbosity
> 0;
2712 dpctl_command_handler
*handler
= (dpctl_command_handler
*) aux
;
2713 error
= handler(argc
, argv
, &dpctl_p
) != 0;
2717 unixctl_command_reply_error(conn
, ds_cstr(&ds
));
2719 unixctl_command_reply(conn
, ds_cstr(&ds
));
2726 dpctl_unixctl_register(void)
2728 const struct dpctl_command
*p
;
2730 for (p
= all_commands
; p
->name
!= NULL
; p
++) {
2731 if (strcmp(p
->name
, "help")) {
2732 char *cmd_name
= xasprintf("dpctl/%s", p
->name
);
2733 unixctl_command_register(cmd_name
,
2737 dpctl_unixctl_handler
,