]> git.proxmox.com Git - mirror_ovs.git/blob - lib/dpctl.c
dpctl: Drop parser debug information.
[mirror_ovs.git] / lib / dpctl.c
1 /*
2 * Copyright (c) 2008-2019 Nicira, Inc.
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at:
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17 #include <config.h>
18 #include <sys/types.h>
19 #include <netinet/in.h>
20 #include <arpa/inet.h>
21 #include <errno.h>
22 #include <inttypes.h>
23 #include <sys/socket.h>
24 #include <net/if.h>
25 #include <stdarg.h>
26 #include <stdlib.h>
27 #include <string.h>
28 #include <unistd.h>
29
30 #include "command-line.h"
31 #include "compiler.h"
32 #include "ct-dpif.h"
33 #include "dirs.h"
34 #include "dpctl.h"
35 #include "dpif.h"
36 #include "dpif-provider.h"
37 #include "openvswitch/dynamic-string.h"
38 #include "flow.h"
39 #include "openvswitch/match.h"
40 #include "netdev.h"
41 #include "netlink.h"
42 #include "odp-util.h"
43 #include "openvswitch/ofpbuf.h"
44 #include "packets.h"
45 #include "openvswitch/shash.h"
46 #include "simap.h"
47 #include "smap.h"
48 #include "sset.h"
49 #include "timeval.h"
50 #include "unixctl.h"
51 #include "util.h"
52 #include "openvswitch/ofp-flow.h"
53 #include "openvswitch/ofp-port.h"
54
55 typedef int dpctl_command_handler(int argc, const char *argv[],
56 struct dpctl_params *);
57 struct dpctl_command {
58 const char *name;
59 const char *usage;
60 int min_args;
61 int max_args;
62 dpctl_command_handler *handler;
63 enum { DP_RO, DP_RW} mode;
64 };
65 static const struct dpctl_command *get_all_dpctl_commands(void);
66 static void dpctl_print(struct dpctl_params *dpctl_p, const char *fmt, ...)
67 OVS_PRINTF_FORMAT(2, 3);
68 static void dpctl_error(struct dpctl_params* dpctl_p, int err_no,
69 const char *fmt, ...)
70 OVS_PRINTF_FORMAT(3, 4);
71
72 static void
73 dpctl_puts(struct dpctl_params *dpctl_p, bool error, const char *string)
74 {
75 dpctl_p->output(dpctl_p->aux, error, string);
76 }
77
78 static void
79 dpctl_print(struct dpctl_params *dpctl_p, const char *fmt, ...)
80 {
81 char *string;
82 va_list args;
83
84 va_start(args, fmt);
85 string = xvasprintf(fmt, args);
86 va_end(args);
87
88 dpctl_puts(dpctl_p, false, string);
89 free(string);
90 }
91
92 static void
93 dpctl_error(struct dpctl_params* dpctl_p, int err_no, const char *fmt, ...)
94 {
95 const char *subprogram_name = get_subprogram_name();
96 struct ds ds = DS_EMPTY_INITIALIZER;
97 int save_errno = errno;
98 va_list args;
99
100
101 if (subprogram_name[0]) {
102 ds_put_format(&ds, "%s(%s): ", program_name,subprogram_name);
103 } else {
104 ds_put_format(&ds, "%s: ", program_name);
105 }
106
107 va_start(args, fmt);
108 ds_put_format_valist(&ds, fmt, args);
109 va_end(args);
110
111 if (err_no != 0) {
112 ds_put_format(&ds, " (%s)", ovs_retval_to_string(err_no));
113 }
114 ds_put_cstr(&ds, "\n");
115
116 dpctl_puts(dpctl_p, true, ds_cstr(&ds));
117
118 ds_destroy(&ds);
119
120 errno = save_errno;
121 }
122 \f
123 static int dpctl_add_if(int argc, const char *argv[], struct dpctl_params *);
124
125 static int
126 if_up(struct netdev *netdev)
127 {
128 return netdev_turn_flags_on(netdev, NETDEV_UP, NULL);
129 }
130
131 /* Retrieve the name of the datapath if exactly one exists. The caller
132 * is responsible for freeing the returned string. If a single datapath
133 * name cannot be determined, returns NULL. */
134 static char *
135 get_one_dp(struct dpctl_params *dpctl_p)
136 {
137 struct sset types;
138 const char *type;
139 char *dp_name = NULL;
140 size_t count = 0;
141
142 sset_init(&types);
143 dp_enumerate_types(&types);
144 SSET_FOR_EACH (type, &types) {
145 struct sset names;
146
147 sset_init(&names);
148 if (!dp_enumerate_names(type, &names)) {
149 count += sset_count(&names);
150 if (!dp_name && count == 1) {
151 dp_name = xasprintf("%s@%s", type, SSET_FIRST(&names));
152 }
153 }
154 sset_destroy(&names);
155 }
156 sset_destroy(&types);
157
158 if (!count) {
159 dpctl_error(dpctl_p, 0, "no datapaths exist");
160 } else if (count > 1) {
161 dpctl_error(dpctl_p, 0, "multiple datapaths, specify one");
162 free(dp_name);
163 dp_name = NULL;
164 }
165
166 return dp_name;
167 }
168
169 static int
170 parsed_dpif_open(const char *arg_, bool create, struct dpif **dpifp)
171 {
172 int result;
173 char *name, *type;
174
175 dp_parse_name(arg_, &name, &type);
176
177 if (create) {
178 result = dpif_create(name, type, dpifp);
179 } else {
180 result = dpif_open(name, type, dpifp);
181 }
182
183 free(name);
184 free(type);
185 return result;
186 }
187
188 static bool
189 dp_exists(const char *queried_dp)
190 {
191 char *queried_name, *queried_type;
192 dp_parse_name(queried_dp, &queried_name, &queried_type);
193 struct sset dpif_names = SSET_INITIALIZER(&dpif_names),
194 dpif_types = SSET_INITIALIZER(&dpif_types);
195 dp_enumerate_types(&dpif_types);
196
197 bool found = (sset_contains(&dpif_types, queried_type) &&
198 !dp_enumerate_names(queried_type, &dpif_names) &&
199 sset_contains(&dpif_names, queried_name));
200
201 sset_destroy(&dpif_names);
202 sset_destroy(&dpif_types);
203 free(queried_name);
204 free(queried_type);
205 return found;
206 }
207
208 static bool
209 dp_arg_exists(int argc, const char *argv[])
210 {
211 return argc > 1 && dp_exists(argv[1]);
212 }
213
214 /* Open a dpif with an optional name argument.
215 *
216 * The datapath name is not a mandatory parameter for this command. If it is
217 * not specified, we retrieve it from the current setup, assuming only one
218 * exists. On success stores the opened dpif in '*dpifp'. */
219 static int
220 opt_dpif_open(int argc, const char *argv[], struct dpctl_params *dpctl_p,
221 int max_args, struct dpif **dpifp)
222 {
223 char *dpname;
224
225 if (dp_arg_exists(argc, argv)) {
226 dpname = xstrdup(argv[1]);
227 } else if (argc != max_args) {
228 dpname = get_one_dp(dpctl_p);
229 } else {
230 /* If the arguments are the maximum possible number and there is no
231 * valid datapath argument, then we fall into the case of dpname is
232 * NULL, since this is an error. */
233 dpname = NULL;
234 }
235
236 int error = 0;
237 if (!dpname) {
238 error = EINVAL;
239 dpctl_error(dpctl_p, error, "datapath not found");
240 } else {
241 error = parsed_dpif_open(dpname, false, dpifp);
242 free(dpname);
243 if (error) {
244 dpctl_error(dpctl_p, error, "opening datapath");
245 }
246 }
247 return error;
248 }
249
250 static int
251 dpctl_add_dp(int argc, const char *argv[],
252 struct dpctl_params *dpctl_p)
253 {
254 struct dpif *dpif;
255 int error;
256
257 error = parsed_dpif_open(argv[1], true, &dpif);
258 if (error) {
259 dpctl_error(dpctl_p, error, "add_dp");
260 return error;
261 }
262 dpif_close(dpif);
263 if (argc > 2) {
264 error = dpctl_add_if(argc, argv, dpctl_p);
265 }
266 return error;
267 }
268
269 static int
270 dpctl_del_dp(int argc OVS_UNUSED, const char *argv[],
271 struct dpctl_params *dpctl_p)
272 {
273 struct dpif *dpif;
274 int error;
275
276 error = parsed_dpif_open(argv[1], false, &dpif);
277 if (error) {
278 dpctl_error(dpctl_p, error, "opening datapath");
279 return error;
280 }
281 error = dpif_delete(dpif);
282 if (error) {
283 dpctl_error(dpctl_p, error, "del_dp");
284 }
285
286 dpif_close(dpif);
287 return error;
288 }
289
290 static int
291 dpctl_add_if(int argc OVS_UNUSED, const char *argv[],
292 struct dpctl_params *dpctl_p)
293 {
294 struct dpif *dpif;
295 int i, error, lasterror = 0;
296
297 error = parsed_dpif_open(argv[1], false, &dpif);
298 if (error) {
299 dpctl_error(dpctl_p, error, "opening datapath");
300 return error;
301 }
302 for (i = 2; i < argc; i++) {
303 const char *name, *type;
304 char *save_ptr = NULL, *argcopy;
305 struct netdev *netdev = NULL;
306 struct smap args;
307 odp_port_t port_no = ODPP_NONE;
308 char *option;
309
310 argcopy = xstrdup(argv[i]);
311 name = strtok_r(argcopy, ",", &save_ptr);
312 type = "system";
313
314 if (!name) {
315 dpctl_error(dpctl_p, 0, "%s is not a valid network device name",
316 argv[i]);
317 error = EINVAL;
318 goto next;
319 }
320
321 smap_init(&args);
322 while ((option = strtok_r(NULL, ",", &save_ptr)) != NULL) {
323 char *save_ptr_2 = NULL;
324 char *key, *value;
325
326 key = strtok_r(option, "=", &save_ptr_2);
327 value = strtok_r(NULL, "", &save_ptr_2);
328 if (!value) {
329 value = "";
330 }
331
332 if (!strcmp(key, "type")) {
333 type = value;
334 } else if (!strcmp(key, "port_no")) {
335 port_no = u32_to_odp(atoi(value));
336 } else if (!smap_add_once(&args, key, value)) {
337 dpctl_error(dpctl_p, 0, "duplicate \"%s\" option", key);
338 }
339 }
340
341 error = netdev_open(name, type, &netdev);
342 if (error) {
343 dpctl_error(dpctl_p, error, "%s: failed to open network device",
344 name);
345 goto next_destroy_args;
346 }
347
348 error = netdev_set_config(netdev, &args, NULL);
349 if (error) {
350 goto next_destroy_args;
351 }
352
353 error = dpif_port_add(dpif, netdev, &port_no);
354 if (error) {
355 dpctl_error(dpctl_p, error, "adding %s to %s failed", name,
356 argv[1]);
357 goto next_destroy_args;
358 }
359
360 error = if_up(netdev);
361 if (error) {
362 dpctl_error(dpctl_p, error, "%s: failed bringing interface up",
363 name);
364 }
365
366 next_destroy_args:
367 netdev_close(netdev);
368 smap_destroy(&args);
369 next:
370 free(argcopy);
371 if (error) {
372 lasterror = error;
373 }
374 }
375 dpif_close(dpif);
376
377 return lasterror;
378 }
379
380 static int
381 dpctl_set_if(int argc, const char *argv[], struct dpctl_params *dpctl_p)
382 {
383 struct dpif *dpif;
384 int i, error, lasterror = 0;
385
386 error = parsed_dpif_open(argv[1], false, &dpif);
387 if (error) {
388 dpctl_error(dpctl_p, error, "opening datapath");
389 return error;
390 }
391 for (i = 2; i < argc; i++) {
392 struct netdev *netdev = NULL;
393 struct dpif_port dpif_port;
394 char *save_ptr = NULL;
395 char *type = NULL;
396 char *argcopy;
397 const char *name;
398 struct smap args;
399 odp_port_t port_no;
400 char *option;
401
402 error = 0;
403
404 argcopy = xstrdup(argv[i]);
405 name = strtok_r(argcopy, ",", &save_ptr);
406 if (!name) {
407 dpctl_error(dpctl_p, 0, "%s is not a valid network device name",
408 argv[i]);
409 goto next;
410 }
411
412 /* Get the port's type from the datapath. */
413 error = dpif_port_query_by_name(dpif, name, &dpif_port);
414 if (error) {
415 dpctl_error(dpctl_p, error, "%s: failed to query port in %s", name,
416 argv[1]);
417 goto next;
418 }
419 type = xstrdup(dpif_port.type);
420 port_no = dpif_port.port_no;
421 dpif_port_destroy(&dpif_port);
422
423 /* Retrieve its existing configuration. */
424 error = netdev_open(name, type, &netdev);
425 if (error) {
426 dpctl_error(dpctl_p, error, "%s: failed to open network device",
427 name);
428 goto next;
429 }
430
431 smap_init(&args);
432 error = netdev_get_config(netdev, &args);
433 if (error) {
434 dpctl_error(dpctl_p, error, "%s: failed to fetch configuration",
435 name);
436 goto next_destroy_args;
437 }
438
439 /* Parse changes to configuration. */
440 while ((option = strtok_r(NULL, ",", &save_ptr)) != NULL) {
441 char *save_ptr_2 = NULL;
442 char *key, *value;
443
444 key = strtok_r(option, "=", &save_ptr_2);
445 value = strtok_r(NULL, "", &save_ptr_2);
446 if (!value) {
447 value = "";
448 }
449
450 if (!strcmp(key, "type")) {
451 if (strcmp(value, type)) {
452 dpctl_error(dpctl_p, 0,
453 "%s: can't change type from %s to %s",
454 name, type, value);
455 error = EINVAL;
456 goto next_destroy_args;
457 }
458 } else if (!strcmp(key, "port_no")) {
459 if (port_no != u32_to_odp(atoi(value))) {
460 dpctl_error(dpctl_p, 0, "%s: can't change port number from"
461 " %"PRIu32" to %d", name, port_no, atoi(value));
462 error = EINVAL;
463 goto next_destroy_args;
464 }
465 } else if (value[0] == '\0') {
466 smap_remove(&args, key);
467 } else {
468 smap_replace(&args, key, value);
469 }
470 }
471
472 /* Update configuration. */
473 char *err_s = NULL;
474 error = netdev_set_config(netdev, &args, &err_s);
475 if (err_s || error) {
476 dpctl_error(dpctl_p, error, "%s",
477 err_s ? err_s : "Error updating configuration");
478 free(err_s);
479 }
480 if (error) {
481 goto next_destroy_args;
482 }
483
484 next_destroy_args:
485 smap_destroy(&args);
486 next:
487 netdev_close(netdev);
488 free(type);
489 free(argcopy);
490 if (error) {
491 lasterror = error;
492 }
493 }
494 dpif_close(dpif);
495
496 return lasterror;
497 }
498
499 static bool
500 get_port_number(struct dpif *dpif, const char *name, odp_port_t *port,
501 struct dpctl_params *dpctl_p)
502 {
503 struct dpif_port dpif_port;
504
505 if (!dpif_port_query_by_name(dpif, name, &dpif_port)) {
506 *port = dpif_port.port_no;
507 dpif_port_destroy(&dpif_port);
508 return true;
509 } else {
510 dpctl_error(dpctl_p, 0, "no port named %s", name);
511 return false;
512 }
513 }
514
515 static int
516 dpctl_del_if(int argc, const char *argv[], struct dpctl_params *dpctl_p)
517 {
518 struct dpif *dpif;
519 int i, error, lasterror = 0;
520
521 error = parsed_dpif_open(argv[1], false, &dpif);
522 if (error) {
523 dpctl_error(dpctl_p, error, "opening datapath");
524 return error;
525 }
526 for (i = 2; i < argc; i++) {
527 const char *name = argv[i];
528 odp_port_t port;
529
530 if (!name[strspn(name, "0123456789")]) {
531 port = u32_to_odp(atoi(name));
532 } else if (!get_port_number(dpif, name, &port, dpctl_p)) {
533 lasterror = ENOENT;
534 continue;
535 }
536
537 error = dpif_port_del(dpif, port, false);
538 if (error) {
539 dpctl_error(dpctl_p, error, "deleting port %s from %s failed",
540 name, argv[1]);
541 lasterror = error;
542 }
543 }
544 dpif_close(dpif);
545 return lasterror;
546 }
547
548 static void
549 print_stat(struct dpctl_params *dpctl_p, const char *leader, uint64_t value)
550 {
551 dpctl_print(dpctl_p, "%s", leader);
552 if (value != UINT64_MAX) {
553 dpctl_print(dpctl_p, "%"PRIu64, value);
554 } else {
555 dpctl_print(dpctl_p, "?");
556 }
557 }
558
559 static void
560 print_human_size(struct dpctl_params *dpctl_p, uint64_t value)
561 {
562 if (value == UINT64_MAX) {
563 /* Nothing to do. */
564 } else if (value >= 1024ULL * 1024 * 1024 * 1024) {
565 dpctl_print(dpctl_p, " (%.1f TiB)",
566 value / (1024.0 * 1024 * 1024 * 1024));
567 } else if (value >= 1024ULL * 1024 * 1024) {
568 dpctl_print(dpctl_p, " (%.1f GiB)", value / (1024.0 * 1024 * 1024));
569 } else if (value >= 1024ULL * 1024) {
570 dpctl_print(dpctl_p, " (%.1f MiB)", value / (1024.0 * 1024));
571 } else if (value >= 1024) {
572 dpctl_print(dpctl_p, " (%.1f KiB)", value / 1024.0);
573 }
574 }
575
576 /* qsort comparison function. */
577 static int
578 compare_port_nos(const void *a_, const void *b_)
579 {
580 const odp_port_t *ap = a_;
581 const odp_port_t *bp = b_;
582 uint32_t a = odp_to_u32(*ap);
583 uint32_t b = odp_to_u32(*bp);
584
585 return a < b ? -1 : a > b;
586 }
587
588 static void
589 show_dpif(struct dpif *dpif, struct dpctl_params *dpctl_p)
590 {
591 struct dpif_port_dump dump;
592 struct dpif_port dpif_port;
593 struct dpif_dp_stats stats;
594 struct netdev *netdev;
595
596 dpctl_print(dpctl_p, "%s:\n", dpif_name(dpif));
597 if (!dpif_get_dp_stats(dpif, &stats)) {
598 dpctl_print(dpctl_p, " lookups: hit:%"PRIu64" missed:%"PRIu64
599 " lost:%"PRIu64"\n flows: %"PRIu64"\n",
600 stats.n_hit, stats.n_missed, stats.n_lost, stats.n_flows);
601 if (stats.n_masks != UINT32_MAX) {
602 uint64_t n_pkts = stats.n_hit + stats.n_missed;
603 double avg = n_pkts ? (double) stats.n_mask_hit / n_pkts : 0.0;
604
605 dpctl_print(dpctl_p, " masks: hit:%"PRIu64" total:%"PRIu32
606 " hit/pkt:%.2f\n",
607 stats.n_mask_hit, stats.n_masks, avg);
608 }
609 }
610
611 odp_port_t *port_nos = NULL;
612 size_t allocated_port_nos = 0, n_port_nos = 0;
613 DPIF_PORT_FOR_EACH (&dpif_port, &dump, dpif) {
614 if (n_port_nos >= allocated_port_nos) {
615 port_nos = x2nrealloc(port_nos, &allocated_port_nos,
616 sizeof *port_nos);
617 }
618
619 port_nos[n_port_nos] = dpif_port.port_no;
620 n_port_nos++;
621 }
622
623 if (port_nos) {
624 qsort(port_nos, n_port_nos, sizeof *port_nos, compare_port_nos);
625 }
626
627 for (int i = 0; i < n_port_nos; i++) {
628 if (dpif_port_query_by_number(dpif, port_nos[i], &dpif_port)) {
629 continue;
630 }
631
632 dpctl_print(dpctl_p, " port %u: %s",
633 dpif_port.port_no, dpif_port.name);
634
635 if (strcmp(dpif_port.type, "system")) {
636 int error;
637
638 dpctl_print(dpctl_p, " (%s", dpif_port.type);
639
640 error = netdev_open(dpif_port.name, dpif_port.type, &netdev);
641 if (!error) {
642 struct smap config;
643
644 smap_init(&config);
645 error = netdev_get_config(netdev, &config);
646 if (!error) {
647 const struct smap_node **nodes = smap_sort(&config);
648 for (size_t j = 0; j < smap_count(&config); j++) {
649 const struct smap_node *node = nodes[j];
650 dpctl_print(dpctl_p, "%c %s=%s", j ? ',' : ':',
651 node->key, node->value);
652 }
653 free(nodes);
654 } else {
655 dpctl_print(dpctl_p, ", could not retrieve configuration "
656 "(%s)", ovs_strerror(error));
657 }
658 smap_destroy(&config);
659
660 netdev_close(netdev);
661 } else {
662 dpctl_print(dpctl_p, ": open failed (%s)",
663 ovs_strerror(error));
664 }
665 dpctl_print(dpctl_p, ")");
666 }
667 dpctl_print(dpctl_p, "\n");
668
669 if (dpctl_p->print_statistics) {
670 struct netdev_stats s;
671 int error;
672
673 error = netdev_open(dpif_port.name, dpif_port.type, &netdev);
674 if (error) {
675 dpctl_print(dpctl_p, ", open failed (%s)",
676 ovs_strerror(error));
677 dpif_port_destroy(&dpif_port);
678 continue;
679 }
680 error = netdev_get_stats(netdev, &s);
681 if (!error) {
682 netdev_close(netdev);
683 print_stat(dpctl_p, " RX packets:", s.rx_packets);
684 print_stat(dpctl_p, " errors:", s.rx_errors);
685 print_stat(dpctl_p, " dropped:", s.rx_dropped);
686 print_stat(dpctl_p, " overruns:", s.rx_over_errors);
687 print_stat(dpctl_p, " frame:", s.rx_frame_errors);
688 dpctl_print(dpctl_p, "\n");
689
690 print_stat(dpctl_p, " TX packets:", s.tx_packets);
691 print_stat(dpctl_p, " errors:", s.tx_errors);
692 print_stat(dpctl_p, " dropped:", s.tx_dropped);
693 print_stat(dpctl_p, " aborted:", s.tx_aborted_errors);
694 print_stat(dpctl_p, " carrier:", s.tx_carrier_errors);
695 dpctl_print(dpctl_p, "\n");
696
697 print_stat(dpctl_p, " collisions:", s.collisions);
698 dpctl_print(dpctl_p, "\n");
699
700 print_stat(dpctl_p, " RX bytes:", s.rx_bytes);
701 print_human_size(dpctl_p, s.rx_bytes);
702 print_stat(dpctl_p, " TX bytes:", s.tx_bytes);
703 print_human_size(dpctl_p, s.tx_bytes);
704 dpctl_print(dpctl_p, "\n");
705 } else {
706 dpctl_print(dpctl_p, ", could not retrieve stats (%s)",
707 ovs_strerror(error));
708 }
709 }
710 dpif_port_destroy(&dpif_port);
711 }
712
713 free(port_nos);
714 }
715
716 typedef void (*dps_for_each_cb)(struct dpif *, struct dpctl_params *);
717
718 static int
719 dps_for_each(struct dpctl_params *dpctl_p, dps_for_each_cb cb)
720 {
721 struct sset dpif_names = SSET_INITIALIZER(&dpif_names),
722 dpif_types = SSET_INITIALIZER(&dpif_types);
723 int error, openerror = 0, enumerror = 0;
724 const char *type, *name;
725 bool at_least_one = false;
726
727 dp_enumerate_types(&dpif_types);
728
729 SSET_FOR_EACH (type, &dpif_types) {
730 error = dp_enumerate_names(type, &dpif_names);
731 if (error) {
732 enumerror = error;
733 }
734
735 SSET_FOR_EACH (name, &dpif_names) {
736 struct dpif *dpif;
737
738 at_least_one = true;
739 error = dpif_open(name, type, &dpif);
740 if (!error) {
741 cb(dpif, dpctl_p);
742 dpif_close(dpif);
743 } else {
744 openerror = error;
745 dpctl_error(dpctl_p, error, "opening datapath %s failed",
746 name);
747 }
748 }
749 }
750
751 sset_destroy(&dpif_names);
752 sset_destroy(&dpif_types);
753
754 /* If there has been an error while opening a datapath it should be
755 * reported. Otherwise, we want to ignore the errors generated by
756 * dp_enumerate_names() if at least one datapath has been discovered,
757 * because they're not interesting for the user. This happens, for
758 * example, if OVS is using a userspace datapath and the kernel module
759 * is not loaded. */
760 if (openerror) {
761 return openerror;
762 } else {
763 return at_least_one ? 0 : enumerror;
764 }
765 }
766
767 static int
768 dpctl_show(int argc, const char *argv[], struct dpctl_params *dpctl_p)
769 {
770 int error, lasterror = 0;
771 if (argc > 1) {
772 int i;
773 for (i = 1; i < argc; i++) {
774 const char *name = argv[i];
775 struct dpif *dpif;
776
777 error = parsed_dpif_open(name, false, &dpif);
778 if (!error) {
779 show_dpif(dpif, dpctl_p);
780 dpif_close(dpif);
781 } else {
782 dpctl_error(dpctl_p, error, "opening datapath %s failed",
783 name);
784 lasterror = error;
785 }
786 }
787 } else {
788 lasterror = dps_for_each(dpctl_p, show_dpif);
789 }
790
791 return lasterror;
792 }
793
794 static void
795 dump_cb(struct dpif *dpif, struct dpctl_params *dpctl_p)
796 {
797 dpctl_print(dpctl_p, "%s\n", dpif_name(dpif));
798 }
799
800 static int
801 dpctl_dump_dps(int argc OVS_UNUSED, const char *argv[] OVS_UNUSED,
802 struct dpctl_params *dpctl_p)
803 {
804 return dps_for_each(dpctl_p, dump_cb);
805 }
806
807 static void
808 format_dpif_flow(struct ds *ds, const struct dpif_flow *f, struct hmap *ports,
809 struct dpctl_params *dpctl_p)
810 {
811 if (dpctl_p->verbosity && f->ufid_present) {
812 odp_format_ufid(&f->ufid, ds);
813 ds_put_cstr(ds, ", ");
814 }
815 odp_flow_format(f->key, f->key_len, f->mask, f->mask_len, ports, ds,
816 dpctl_p->verbosity);
817 ds_put_cstr(ds, ", ");
818
819 dpif_flow_stats_format(&f->stats, ds);
820 if (dpctl_p->verbosity && f->attrs.offloaded) {
821 ds_put_cstr(ds, ", offloaded:yes");
822 }
823 if (dpctl_p->verbosity && f->attrs.dp_layer) {
824 ds_put_format(ds, ", dp:%s", f->attrs.dp_layer);
825 }
826 ds_put_cstr(ds, ", actions:");
827 format_odp_actions(ds, f->actions, f->actions_len, ports);
828 }
829
830 struct dump_types {
831 bool ovs;
832 bool tc;
833 bool offloaded;
834 bool non_offloaded;
835 };
836
837 static void
838 enable_all_dump_types(struct dump_types *dump_types)
839 {
840 dump_types->ovs = true;
841 dump_types->tc = true;
842 dump_types->offloaded = true;
843 dump_types->non_offloaded = true;
844 }
845
846 static int
847 populate_dump_types(char *types_list, struct dump_types *dump_types,
848 struct dpctl_params *dpctl_p)
849 {
850 if (!types_list) {
851 enable_all_dump_types(dump_types);
852 return 0;
853 }
854
855 char *current_type;
856
857 while (types_list && types_list[0] != '\0') {
858 current_type = types_list;
859 size_t type_len = strcspn(current_type, ",");
860
861 types_list += type_len + (types_list[type_len] != '\0');
862 current_type[type_len] = '\0';
863
864 if (!strcmp(current_type, "ovs")) {
865 dump_types->ovs = true;
866 } else if (!strcmp(current_type, "tc")) {
867 dump_types->tc = true;
868 } else if (!strcmp(current_type, "offloaded")) {
869 dump_types->offloaded = true;
870 } else if (!strcmp(current_type, "non-offloaded")) {
871 dump_types->non_offloaded = true;
872 } else if (!strcmp(current_type, "all")) {
873 enable_all_dump_types(dump_types);
874 } else {
875 dpctl_error(dpctl_p, EINVAL, "Failed to parse type (%s)",
876 current_type);
877 return EINVAL;
878 }
879 }
880 return 0;
881 }
882
883 static void
884 determine_dpif_flow_dump_types(struct dump_types *dump_types,
885 struct dpif_flow_dump_types *dpif_dump_types)
886 {
887 dpif_dump_types->ovs_flows = dump_types->ovs || dump_types->non_offloaded;
888 dpif_dump_types->netdev_flows = dump_types->tc || dump_types->offloaded
889 || dump_types->non_offloaded;
890 }
891
892 static bool
893 flow_passes_type_filter(const struct dpif_flow *f,
894 struct dump_types *dump_types)
895 {
896 if (dump_types->ovs && !strcmp(f->attrs.dp_layer, "ovs")) {
897 return true;
898 }
899 if (dump_types->tc && !strcmp(f->attrs.dp_layer, "tc")) {
900 return true;
901 }
902 if (dump_types->offloaded && f->attrs.offloaded) {
903 return true;
904 }
905 if (dump_types->non_offloaded && !(f->attrs.offloaded)) {
906 return true;
907 }
908 return false;
909 }
910
911 static struct hmap *
912 dpctl_get_portno_names(struct dpif *dpif, const struct dpctl_params *dpctl_p)
913 {
914 if (dpctl_p->names) {
915 struct hmap *portno_names = xmalloc(sizeof *portno_names);
916 hmap_init(portno_names);
917
918 struct dpif_port_dump port_dump;
919 struct dpif_port dpif_port;
920 DPIF_PORT_FOR_EACH (&dpif_port, &port_dump, dpif) {
921 odp_portno_names_set(portno_names, dpif_port.port_no,
922 dpif_port.name);
923 }
924
925 return portno_names;
926 } else {
927 return NULL;
928 }
929 }
930
931 static void
932 dpctl_free_portno_names(struct hmap *portno_names)
933 {
934 if (portno_names) {
935 odp_portno_names_destroy(portno_names);
936 hmap_destroy(portno_names);
937 free(portno_names);
938 }
939 }
940
941 static int
942 dpctl_dump_flows(int argc, const char *argv[], struct dpctl_params *dpctl_p)
943 {
944 struct dpif *dpif;
945 struct ds ds;
946
947 char *filter = NULL;
948 struct flow flow_filter;
949 struct flow_wildcards wc_filter;
950 char *types_list = NULL;
951 struct dump_types dump_types;
952 struct dpif_flow_dump_types dpif_dump_types;
953
954 struct dpif_flow_dump_thread *flow_dump_thread;
955 struct dpif_flow_dump *flow_dump;
956 struct dpif_flow f;
957 int pmd_id = PMD_ID_NULL;
958 int lastargc = 0;
959 int error;
960
961 while (argc > 1 && lastargc != argc) {
962 lastargc = argc;
963 if (!strncmp(argv[argc - 1], "filter=", 7) && !filter) {
964 filter = xstrdup(argv[--argc] + 7);
965 } else if (!strncmp(argv[argc - 1], "type=", 5) && !types_list) {
966 types_list = xstrdup(argv[--argc] + 5);
967 }
968 }
969
970 error = opt_dpif_open(argc, argv, dpctl_p, 2, &dpif);
971 if (error) {
972 goto out_free;
973 }
974
975 struct hmap *portno_names = dpctl_get_portno_names(dpif, dpctl_p);
976
977 if (filter) {
978 struct ofputil_port_map port_map;
979 ofputil_port_map_init(&port_map);
980
981 struct dpif_port_dump port_dump;
982 struct dpif_port dpif_port;
983 DPIF_PORT_FOR_EACH (&dpif_port, &port_dump, dpif) {
984 ofputil_port_map_put(&port_map,
985 u16_to_ofp(odp_to_u32(dpif_port.port_no)),
986 dpif_port.name);
987 }
988 char *err = parse_ofp_exact_flow(&flow_filter, &wc_filter, NULL,
989 filter, &port_map);
990 ofputil_port_map_destroy(&port_map);
991 if (err) {
992 dpctl_error(dpctl_p, 0, "Failed to parse filter (%s)", err);
993 free(err);
994 error = EINVAL;
995 goto out_dpifclose;
996 }
997 }
998
999 memset(&dump_types, 0, sizeof dump_types);
1000 error = populate_dump_types(types_list, &dump_types, dpctl_p);
1001 if (error) {
1002 goto out_free;
1003 }
1004 determine_dpif_flow_dump_types(&dump_types, &dpif_dump_types);
1005
1006 /* Make sure that these values are different. PMD_ID_NULL means that the
1007 * pmd is unspecified (e.g. because the datapath doesn't have different
1008 * pmd threads), while NON_PMD_CORE_ID refers to every non pmd threads
1009 * in the userspace datapath */
1010 BUILD_ASSERT(PMD_ID_NULL != NON_PMD_CORE_ID);
1011
1012 ds_init(&ds);
1013 memset(&f, 0, sizeof f);
1014 flow_dump = dpif_flow_dump_create(dpif, false, &dpif_dump_types);
1015 flow_dump_thread = dpif_flow_dump_thread_create(flow_dump);
1016 while (dpif_flow_dump_next(flow_dump_thread, &f, 1)) {
1017 if (filter) {
1018 struct flow flow;
1019 struct flow_wildcards wc;
1020 struct match match, match_filter;
1021 struct minimatch minimatch;
1022
1023 odp_flow_key_to_flow(f.key, f.key_len, &flow, NULL);
1024 odp_flow_key_to_mask(f.mask, f.mask_len, &wc, &flow, NULL);
1025 match_init(&match, &flow, &wc);
1026
1027 match_init(&match_filter, &flow_filter, &wc);
1028 match_init(&match_filter, &match_filter.flow, &wc_filter);
1029 minimatch_init(&minimatch, &match_filter);
1030
1031 if (!minimatch_matches_flow(&minimatch, &match.flow)) {
1032 minimatch_destroy(&minimatch);
1033 continue;
1034 }
1035 minimatch_destroy(&minimatch);
1036 }
1037 ds_clear(&ds);
1038 /* If 'pmd_id' is specified, overlapping flows could be dumped from
1039 * different pmd threads. So, separates dumps from different pmds
1040 * by printing a title line. */
1041 if (pmd_id != f.pmd_id) {
1042 if (f.pmd_id == NON_PMD_CORE_ID) {
1043 ds_put_format(&ds, "flow-dump from non-dpdk interfaces:\n");
1044 } else {
1045 ds_put_format(&ds, "flow-dump from pmd on cpu core: %d\n",
1046 f.pmd_id);
1047 }
1048 pmd_id = f.pmd_id;
1049 }
1050 if (flow_passes_type_filter(&f, &dump_types)) {
1051 format_dpif_flow(&ds, &f, portno_names, dpctl_p);
1052 dpctl_print(dpctl_p, "%s\n", ds_cstr(&ds));
1053 }
1054 }
1055 dpif_flow_dump_thread_destroy(flow_dump_thread);
1056 error = dpif_flow_dump_destroy(flow_dump);
1057
1058 if (error) {
1059 dpctl_error(dpctl_p, error, "Failed to dump flows from datapath");
1060 }
1061 ds_destroy(&ds);
1062
1063 out_dpifclose:
1064 dpctl_free_portno_names(portno_names);
1065 dpif_close(dpif);
1066 out_free:
1067 free(filter);
1068 free(types_list);
1069 return error;
1070 }
1071
1072 static int
1073 dpctl_put_flow(int argc, const char *argv[], enum dpif_flow_put_flags flags,
1074 struct dpctl_params *dpctl_p)
1075 {
1076 const char *key_s = argv[argc - 2];
1077 const char *actions_s = argv[argc - 1];
1078 struct dpif_flow_stats stats;
1079 struct dpif_port dpif_port;
1080 struct dpif_port_dump port_dump;
1081 struct ofpbuf actions;
1082 struct ofpbuf key;
1083 struct ofpbuf mask;
1084 struct dpif *dpif;
1085 ovs_u128 ufid;
1086 bool ufid_present;
1087 struct simap port_names;
1088 int n, error;
1089
1090 error = opt_dpif_open(argc, argv, dpctl_p, 4, &dpif);
1091 if (error) {
1092 return error;
1093 }
1094
1095 ufid_present = false;
1096 n = odp_ufid_from_string(key_s, &ufid);
1097 if (n < 0) {
1098 dpctl_error(dpctl_p, -n, "parsing flow ufid");
1099 return -n;
1100 } else if (n) {
1101 key_s += n;
1102 ufid_present = true;
1103 }
1104
1105 simap_init(&port_names);
1106 DPIF_PORT_FOR_EACH (&dpif_port, &port_dump, dpif) {
1107 simap_put(&port_names, dpif_port.name, odp_to_u32(dpif_port.port_no));
1108 }
1109
1110 ofpbuf_init(&key, 0);
1111 ofpbuf_init(&mask, 0);
1112 char *error_s;
1113 error = odp_flow_from_string(key_s, &port_names, &key, &mask, &error_s);
1114 simap_destroy(&port_names);
1115 if (error) {
1116 dpctl_error(dpctl_p, error, "parsing flow key (%s)", error_s);
1117 free(error_s);
1118 goto out_freekeymask;
1119 }
1120
1121 ofpbuf_init(&actions, 0);
1122 error = odp_actions_from_string(actions_s, NULL, &actions);
1123 if (error) {
1124 dpctl_error(dpctl_p, error, "parsing actions");
1125 goto out_freeactions;
1126 }
1127
1128 /* The flow will be added on all pmds currently in the datapath. */
1129 error = dpif_flow_put(dpif, flags,
1130 key.data, key.size,
1131 mask.size == 0 ? NULL : mask.data,
1132 mask.size, actions.data,
1133 actions.size, ufid_present ? &ufid : NULL,
1134 PMD_ID_NULL,
1135 dpctl_p->print_statistics ? &stats : NULL);
1136
1137 if (error) {
1138 dpctl_error(dpctl_p, error, "updating flow table");
1139 goto out_freeactions;
1140 }
1141
1142 if (dpctl_p->print_statistics) {
1143 struct ds s;
1144
1145 ds_init(&s);
1146 dpif_flow_stats_format(&stats, &s);
1147 dpctl_print(dpctl_p, "%s\n", ds_cstr(&s));
1148 ds_destroy(&s);
1149 }
1150
1151 out_freeactions:
1152 ofpbuf_uninit(&actions);
1153 out_freekeymask:
1154 ofpbuf_uninit(&mask);
1155 ofpbuf_uninit(&key);
1156 dpif_close(dpif);
1157 return error;
1158 }
1159
1160 static int
1161 dpctl_add_flow(int argc, const char *argv[], struct dpctl_params *dpctl_p)
1162 {
1163 return dpctl_put_flow(argc, argv, DPIF_FP_CREATE, dpctl_p);
1164 }
1165
1166 static int
1167 dpctl_mod_flow(int argc, const char *argv[], struct dpctl_params *dpctl_p)
1168 {
1169 enum dpif_flow_put_flags flags;
1170
1171 flags = DPIF_FP_MODIFY;
1172 if (dpctl_p->may_create) {
1173 flags |= DPIF_FP_CREATE;
1174 }
1175 if (dpctl_p->zero_statistics) {
1176 flags |= DPIF_FP_ZERO_STATS;
1177 }
1178
1179 return dpctl_put_flow(argc, argv, flags, dpctl_p);
1180 }
1181
1182 static int
1183 dpctl_get_flow(int argc, const char *argv[], struct dpctl_params *dpctl_p)
1184 {
1185 const char *key_s = argv[argc - 1];
1186 struct dpif_flow flow;
1187 struct dpif *dpif;
1188 ovs_u128 ufid;
1189 struct ofpbuf buf;
1190 uint64_t stub[DPIF_FLOW_BUFSIZE / 8];
1191 struct ds ds;
1192 int n, error;
1193
1194 error = opt_dpif_open(argc, argv, dpctl_p, 3, &dpif);
1195 if (error) {
1196 return error;
1197 }
1198
1199 ofpbuf_use_stub(&buf, &stub, sizeof stub);
1200
1201 struct hmap *portno_names = dpctl_get_portno_names(dpif, dpctl_p);
1202
1203 n = odp_ufid_from_string(key_s, &ufid);
1204 if (n <= 0) {
1205 dpctl_error(dpctl_p, -n, "parsing flow ufid");
1206 goto out;
1207 }
1208
1209 /* In case of PMD will be returned flow from first PMD thread with match. */
1210 error = dpif_flow_get(dpif, NULL, 0, &ufid, PMD_ID_NULL, &buf, &flow);
1211 if (error) {
1212 dpctl_error(dpctl_p, error, "getting flow");
1213 goto out;
1214 }
1215
1216 ds_init(&ds);
1217 format_dpif_flow(&ds, &flow, portno_names, dpctl_p);
1218 dpctl_print(dpctl_p, "%s\n", ds_cstr(&ds));
1219 ds_destroy(&ds);
1220
1221 out:
1222 dpctl_free_portno_names(portno_names);
1223 ofpbuf_uninit(&buf);
1224 dpif_close(dpif);
1225 return error;
1226 }
1227
1228 static int
1229 dpctl_del_flow(int argc, const char *argv[], struct dpctl_params *dpctl_p)
1230 {
1231 const char *key_s = argv[argc - 1];
1232 struct dpif_flow_stats stats;
1233 struct dpif_port dpif_port;
1234 struct dpif_port_dump port_dump;
1235 struct ofpbuf key;
1236 struct ofpbuf mask; /* To be ignored. */
1237 struct dpif *dpif;
1238 ovs_u128 ufid;
1239 bool ufid_present;
1240 struct simap port_names;
1241 int n, error;
1242
1243 error = opt_dpif_open(argc, argv, dpctl_p, 3, &dpif);
1244 if (error) {
1245 return error;
1246 }
1247
1248 ufid_present = false;
1249 n = odp_ufid_from_string(key_s, &ufid);
1250 if (n < 0) {
1251 dpctl_error(dpctl_p, -n, "parsing flow ufid");
1252 return -n;
1253 } else if (n) {
1254 key_s += n;
1255 ufid_present = true;
1256 }
1257
1258 simap_init(&port_names);
1259 DPIF_PORT_FOR_EACH (&dpif_port, &port_dump, dpif) {
1260 simap_put(&port_names, dpif_port.name, odp_to_u32(dpif_port.port_no));
1261 }
1262
1263 ofpbuf_init(&key, 0);
1264 ofpbuf_init(&mask, 0);
1265
1266 char *error_s;
1267 error = odp_flow_from_string(key_s, &port_names, &key, &mask, &error_s);
1268 if (error) {
1269 dpctl_error(dpctl_p, error, "%s", error_s);
1270 free(error_s);
1271 goto out;
1272 }
1273
1274 /* The flow will be deleted from all pmds currently in the datapath. */
1275 error = dpif_flow_del(dpif, key.data, key.size,
1276 ufid_present ? &ufid : NULL, PMD_ID_NULL,
1277 dpctl_p->print_statistics ? &stats : NULL);
1278
1279 if (error) {
1280 dpctl_error(dpctl_p, error, "deleting flow");
1281 if (error == ENOENT && !ufid_present) {
1282 struct ds s;
1283
1284 ds_init(&s);
1285 ds_put_format(&s, "Perhaps you need to specify a UFID?");
1286 dpctl_print(dpctl_p, "%s\n", ds_cstr(&s));
1287 ds_destroy(&s);
1288 }
1289 goto out;
1290 }
1291
1292 if (dpctl_p->print_statistics) {
1293 struct ds s;
1294
1295 ds_init(&s);
1296 dpif_flow_stats_format(&stats, &s);
1297 dpctl_print(dpctl_p, "%s\n", ds_cstr(&s));
1298 ds_destroy(&s);
1299 }
1300
1301 out:
1302 ofpbuf_uninit(&mask);
1303 ofpbuf_uninit(&key);
1304 simap_destroy(&port_names);
1305 dpif_close(dpif);
1306 return error;
1307 }
1308
1309 static int
1310 dpctl_del_flows(int argc, const char *argv[], struct dpctl_params *dpctl_p)
1311 {
1312 struct dpif *dpif;
1313
1314 int error = opt_dpif_open(argc, argv, dpctl_p, 2, &dpif);
1315 if (error) {
1316 return error;
1317 }
1318
1319 error = dpif_flow_flush(dpif);
1320 if (error) {
1321 dpctl_error(dpctl_p, error, "deleting all flows");
1322 }
1323 dpif_close(dpif);
1324 return error;
1325 }
1326
1327 static int
1328 dpctl_help(int argc OVS_UNUSED, const char *argv[] OVS_UNUSED,
1329 struct dpctl_params *dpctl_p)
1330 {
1331 if (dpctl_p->usage) {
1332 dpctl_p->usage(dpctl_p->aux);
1333 }
1334
1335 return 0;
1336 }
1337
1338 static int
1339 dpctl_list_commands(int argc OVS_UNUSED, const char *argv[] OVS_UNUSED,
1340 struct dpctl_params *dpctl_p)
1341 {
1342 struct ds ds = DS_EMPTY_INITIALIZER;
1343 const struct dpctl_command *commands = get_all_dpctl_commands();
1344
1345 ds_put_cstr(&ds, "The available commands are:\n");
1346 for (; commands->name; commands++) {
1347 const struct dpctl_command *c = commands;
1348
1349 if (dpctl_p->is_appctl && !strcmp(c->name, "help")) {
1350 continue;
1351 }
1352
1353 ds_put_format(&ds, " %s%-23s %s\n", dpctl_p->is_appctl ? "dpctl/" : "",
1354 c->name, c->usage);
1355 }
1356 dpctl_puts(dpctl_p, false, ds.string);
1357 ds_destroy(&ds);
1358
1359 return 0;
1360 }
1361 \f
1362
1363 static int
1364 dpctl_dump_conntrack(int argc, const char *argv[],
1365 struct dpctl_params *dpctl_p)
1366 {
1367 struct ct_dpif_dump_state *dump;
1368 struct ct_dpif_entry cte;
1369 uint16_t zone, *pzone = NULL;
1370 int tot_bkts;
1371 struct dpif *dpif;
1372 int error;
1373
1374 if (argc > 1 && ovs_scan(argv[argc - 1], "zone=%"SCNu16, &zone)) {
1375 pzone = &zone;
1376 argc--;
1377 }
1378
1379 error = opt_dpif_open(argc, argv, dpctl_p, 2, &dpif);
1380 if (error) {
1381 return error;
1382 }
1383
1384 error = ct_dpif_dump_start(dpif, &dump, pzone, &tot_bkts);
1385 if (error) {
1386 dpctl_error(dpctl_p, error, "starting conntrack dump");
1387 dpif_close(dpif);
1388 return error;
1389 }
1390
1391 while (!(error = ct_dpif_dump_next(dump, &cte))) {
1392 struct ds s = DS_EMPTY_INITIALIZER;
1393
1394 ct_dpif_format_entry(&cte, &s, dpctl_p->verbosity,
1395 dpctl_p->print_statistics);
1396 ct_dpif_entry_uninit(&cte);
1397
1398 dpctl_print(dpctl_p, "%s\n", ds_cstr(&s));
1399 ds_destroy(&s);
1400 }
1401 if (error == EOF) {
1402 /* Any CT entry was dumped with no issue. */
1403 error = 0;
1404 } else if (error) {
1405 dpctl_error(dpctl_p, error, "dumping conntrack entry");
1406 }
1407
1408 ct_dpif_dump_done(dump);
1409 dpif_close(dpif);
1410 return error;
1411 }
1412
1413 static int
1414 dpctl_flush_conntrack(int argc, const char *argv[],
1415 struct dpctl_params *dpctl_p)
1416 {
1417 struct dpif *dpif = NULL;
1418 struct ct_dpif_tuple tuple, *ptuple = NULL;
1419 struct ds ds = DS_EMPTY_INITIALIZER;
1420 uint16_t zone, *pzone = NULL;
1421 int error;
1422 int args = argc - 1;
1423
1424 /* Parse ct tuple */
1425 if (args && ct_dpif_parse_tuple(&tuple, argv[args], &ds)) {
1426 ptuple = &tuple;
1427 args--;
1428 }
1429
1430 /* Parse zone */
1431 if (args && ovs_scan(argv[args], "zone=%"SCNu16, &zone)) {
1432 pzone = &zone;
1433 args--;
1434 }
1435
1436 /* Report error if there are more than one unparsed argument. */
1437 if (args > 1) {
1438 ds_put_cstr(&ds, "invalid arguments");
1439 error = EINVAL;
1440 goto error;
1441 }
1442
1443 error = opt_dpif_open(argc, argv, dpctl_p, 4, &dpif);
1444 if (error) {
1445 return error;
1446 }
1447
1448 error = ct_dpif_flush(dpif, pzone, ptuple);
1449 if (!error) {
1450 dpif_close(dpif);
1451 return 0;
1452 } else {
1453 ds_put_cstr(&ds, "failed to flush conntrack");
1454 }
1455
1456 error:
1457 dpctl_error(dpctl_p, error, "%s", ds_cstr(&ds));
1458 ds_destroy(&ds);
1459 dpif_close(dpif);
1460 return error;
1461 }
1462
1463 static int
1464 dpctl_ct_stats_show(int argc, const char *argv[],
1465 struct dpctl_params *dpctl_p)
1466 {
1467 struct dpif *dpif;
1468 struct ct_dpif_dump_state *dump;
1469 struct ct_dpif_entry cte;
1470 uint16_t zone, *pzone = NULL;
1471 int tot_bkts;
1472 int lastargc = 0;
1473
1474 int proto_stats[CT_STATS_MAX];
1475 int tcp_conn_per_states[CT_DPIF_TCPS_MAX_NUM];
1476 int error;
1477
1478 bool verbose = dpctl_p->verbosity;
1479
1480 while (argc > 1 && lastargc != argc) {
1481 lastargc = argc;
1482 if (!strncmp(argv[argc - 1], "verbose", 7)) {
1483 /* Support "verbose" argument for backwards compatibility. */
1484 verbose = true;
1485 argc--;
1486 } else if (!strncmp(argv[argc - 1], "zone=", 5)) {
1487 if (ovs_scan(argv[argc - 1], "zone=%"SCNu16, &zone)) {
1488 pzone = &zone;
1489 argc--;
1490 }
1491 }
1492 }
1493
1494 error = opt_dpif_open(argc, argv, dpctl_p, 2, &dpif);
1495 if (error) {
1496 return error;
1497 }
1498
1499 memset(proto_stats, 0, sizeof(proto_stats));
1500 memset(tcp_conn_per_states, 0, sizeof(tcp_conn_per_states));
1501 error = ct_dpif_dump_start(dpif, &dump, pzone, &tot_bkts);
1502 if (error) {
1503 dpctl_error(dpctl_p, error, "starting conntrack dump");
1504 dpif_close(dpif);
1505 return error;
1506 }
1507
1508 int tot_conn = 0;
1509 while (!(error = ct_dpif_dump_next(dump, &cte))) {
1510 ct_dpif_entry_uninit(&cte);
1511 tot_conn++;
1512 switch (cte.tuple_orig.ip_proto) {
1513 case IPPROTO_ICMP:
1514 proto_stats[CT_STATS_ICMP]++;
1515 break;
1516 case IPPROTO_ICMPV6:
1517 proto_stats[CT_STATS_ICMPV6]++;
1518 break;
1519 case IPPROTO_TCP:
1520 proto_stats[CT_STATS_TCP]++;
1521 uint8_t tcp_state;
1522 /* We keep two separate tcp states, but we print just one. The
1523 * Linux kernel connection tracker internally keeps only one state,
1524 * so 'state_orig' and 'state_reply', will be the same. */
1525 tcp_state = MAX(cte.protoinfo.tcp.state_orig,
1526 cte.protoinfo.tcp.state_reply);
1527 tcp_state = ct_dpif_coalesce_tcp_state(tcp_state);
1528 tcp_conn_per_states[tcp_state]++;
1529 break;
1530 case IPPROTO_UDP:
1531 proto_stats[CT_STATS_UDP]++;
1532 break;
1533 case IPPROTO_SCTP:
1534 proto_stats[CT_STATS_SCTP]++;
1535 break;
1536 case IPPROTO_UDPLITE:
1537 proto_stats[CT_STATS_UDPLITE]++;
1538 break;
1539 case IPPROTO_DCCP:
1540 proto_stats[CT_STATS_DCCP]++;
1541 break;
1542 case IPPROTO_IGMP:
1543 proto_stats[CT_STATS_IGMP]++;
1544 break;
1545 default:
1546 proto_stats[CT_STATS_OTHER]++;
1547 break;
1548 }
1549 }
1550 if (error == EOF) {
1551 /* All CT entries were dumped with no issue. */
1552 error = 0;
1553 } else if (error) {
1554 dpctl_error(dpctl_p, error, "dumping conntrack entry");
1555 /* Fall through to show any other info we collected. */
1556 }
1557
1558 dpctl_print(dpctl_p, "Connections Stats:\n Total: %d\n", tot_conn);
1559 if (proto_stats[CT_STATS_TCP]) {
1560 dpctl_print(dpctl_p, " TCP: %d\n", proto_stats[CT_STATS_TCP]);
1561 if (verbose) {
1562 dpctl_print(dpctl_p, " Conn per TCP states:\n");
1563 for (int i = 0; i < CT_DPIF_TCPS_MAX_NUM; i++) {
1564 if (tcp_conn_per_states[i]) {
1565 struct ds s = DS_EMPTY_INITIALIZER;
1566 ct_dpif_format_tcp_stat(&s, i, tcp_conn_per_states[i]);
1567 dpctl_print(dpctl_p, "%s\n", ds_cstr(&s));
1568 ds_destroy(&s);
1569 }
1570 }
1571 }
1572 }
1573 if (proto_stats[CT_STATS_UDP]) {
1574 dpctl_print(dpctl_p, " UDP: %d\n", proto_stats[CT_STATS_UDP]);
1575 }
1576 if (proto_stats[CT_STATS_UDPLITE]) {
1577 dpctl_print(dpctl_p, " UDPLITE: %d\n", proto_stats[CT_STATS_UDPLITE]);
1578 }
1579 if (proto_stats[CT_STATS_SCTP]) {
1580 dpctl_print(dpctl_p, " SCTP: %d\n", proto_stats[CT_STATS_SCTP]);
1581 }
1582 if (proto_stats[CT_STATS_ICMP]) {
1583 dpctl_print(dpctl_p, " ICMP: %d\n", proto_stats[CT_STATS_ICMP]);
1584 }
1585 if (proto_stats[CT_STATS_DCCP]) {
1586 dpctl_print(dpctl_p, " DCCP: %d\n", proto_stats[CT_STATS_DCCP]);
1587 }
1588 if (proto_stats[CT_STATS_IGMP]) {
1589 dpctl_print(dpctl_p, " IGMP: %d\n", proto_stats[CT_STATS_IGMP]);
1590 }
1591 if (proto_stats[CT_STATS_OTHER]) {
1592 dpctl_print(dpctl_p, " Other: %d\n", proto_stats[CT_STATS_OTHER]);
1593 }
1594
1595 ct_dpif_dump_done(dump);
1596 dpif_close(dpif);
1597 return error;
1598 }
1599
1600 #define CT_BKTS_GT "gt="
1601 static int
1602 dpctl_ct_bkts(int argc, const char *argv[],
1603 struct dpctl_params *dpctl_p)
1604 {
1605 struct dpif *dpif;
1606 struct ct_dpif_dump_state *dump;
1607 struct ct_dpif_entry cte;
1608 uint16_t gt = 0; /* Threshold: display value when greater than gt. */
1609 uint16_t *pzone = NULL;
1610 int tot_bkts = 0;
1611 int error;
1612
1613 if (argc > 1 && !strncmp(argv[argc - 1], CT_BKTS_GT, strlen(CT_BKTS_GT))) {
1614 if (ovs_scan(argv[argc - 1], CT_BKTS_GT"%"SCNu16, &gt)) {
1615 argc--;
1616 }
1617 }
1618
1619 error = opt_dpif_open(argc, argv, dpctl_p, 2, &dpif);
1620 if (error) {
1621 return error;
1622 }
1623
1624 error = ct_dpif_dump_start(dpif, &dump, pzone, &tot_bkts);
1625 if (error) {
1626 dpctl_error(dpctl_p, error, "starting conntrack dump");
1627 dpif_close(dpif);
1628 return error;
1629 }
1630 if (tot_bkts == -1) {
1631 /* Command not available when called by kernel OvS. */
1632 dpctl_print(dpctl_p,
1633 "Command is available for UserSpace ConnTracker only.\n");
1634 ct_dpif_dump_done(dump);
1635 dpif_close(dpif);
1636 return 0;
1637 }
1638
1639 dpctl_print(dpctl_p, "Total Buckets: %d\n", tot_bkts);
1640
1641 int tot_conn = 0;
1642 uint32_t *conn_per_bkts = xzalloc(tot_bkts * sizeof(uint32_t));
1643
1644 while (!(error = ct_dpif_dump_next(dump, &cte))) {
1645 ct_dpif_entry_uninit(&cte);
1646 tot_conn++;
1647 if (tot_bkts > 0) {
1648 if (cte.bkt < tot_bkts) {
1649 conn_per_bkts[cte.bkt]++;
1650 } else {
1651 dpctl_print(dpctl_p, "Bucket nr out of range: %d >= %d\n",
1652 cte.bkt, tot_bkts);
1653 }
1654 }
1655 }
1656 if (error == EOF) {
1657 /* All CT entries were dumped with no issue. */
1658 error = 0;
1659 } else if (error) {
1660 dpctl_error(dpctl_p, error, "dumping conntrack entry");
1661 /* Fall through and display all the collected info. */
1662 }
1663
1664 dpctl_print(dpctl_p, "Current Connections: %d\n", tot_conn);
1665 dpctl_print(dpctl_p, "\n");
1666 if (tot_bkts && tot_conn) {
1667 dpctl_print(dpctl_p, "+-----------+"
1668 "-----------------------------------------+\n");
1669 dpctl_print(dpctl_p, "| Buckets |"
1670 " Connections per Buckets |\n");
1671 dpctl_print(dpctl_p, "+-----------+"
1672 "-----------------------------------------+");
1673 #define NUM_BKTS_DIPLAYED_PER_ROW 8
1674 for (int i = 0; i < tot_bkts; i++) {
1675 if (i % NUM_BKTS_DIPLAYED_PER_ROW == 0) {
1676 dpctl_print(dpctl_p, "\n %3d..%3d | ",
1677 i, i + NUM_BKTS_DIPLAYED_PER_ROW - 1);
1678 }
1679 if (conn_per_bkts[i] > gt) {
1680 dpctl_print(dpctl_p, "%5d", conn_per_bkts[i]);
1681 } else {
1682 dpctl_print(dpctl_p, "%5s", ".");
1683 }
1684 }
1685 dpctl_print(dpctl_p, "\n\n");
1686 }
1687
1688 ct_dpif_dump_done(dump);
1689 dpif_close(dpif);
1690 free(conn_per_bkts);
1691 return error;
1692 }
1693 \f
1694 static int
1695 dpctl_ct_set_maxconns(int argc, const char *argv[],
1696 struct dpctl_params *dpctl_p)
1697 {
1698 struct dpif *dpif;
1699 int error = opt_dpif_open(argc, argv, dpctl_p, 3, &dpif);
1700 if (!error) {
1701 uint32_t maxconns;
1702 if (ovs_scan(argv[argc - 1], "%"SCNu32, &maxconns)) {
1703 error = ct_dpif_set_maxconns(dpif, maxconns);
1704
1705 if (!error) {
1706 dpctl_print(dpctl_p, "setting maxconns successful");
1707 } else {
1708 dpctl_error(dpctl_p, error, "ct set maxconns failed");
1709 }
1710 } else {
1711 error = EINVAL;
1712 dpctl_error(dpctl_p, error, "maxconns missing or malformed");
1713 }
1714 dpif_close(dpif);
1715 }
1716
1717 return error;
1718 }
1719
1720 static int
1721 dpctl_ct_get_maxconns(int argc, const char *argv[],
1722 struct dpctl_params *dpctl_p)
1723 {
1724 struct dpif *dpif;
1725 int error = opt_dpif_open(argc, argv, dpctl_p, 2, &dpif);
1726 if (!error) {
1727 uint32_t maxconns;
1728 error = ct_dpif_get_maxconns(dpif, &maxconns);
1729
1730 if (!error) {
1731 dpctl_print(dpctl_p, "%u\n", maxconns);
1732 } else {
1733 dpctl_error(dpctl_p, error, "maxconns could not be retrieved");
1734 }
1735 dpif_close(dpif);
1736 }
1737
1738 return error;
1739 }
1740
1741 static int
1742 dpctl_ct_get_nconns(int argc, const char *argv[],
1743 struct dpctl_params *dpctl_p)
1744 {
1745 struct dpif *dpif;
1746 int error = opt_dpif_open(argc, argv, dpctl_p, 2, &dpif);
1747 if (!error) {
1748 uint32_t nconns;
1749 error = ct_dpif_get_nconns(dpif, &nconns);
1750
1751 if (!error) {
1752 dpctl_print(dpctl_p, "%u\n", nconns);
1753 } else {
1754 dpctl_error(dpctl_p, error, "nconns could not be retrieved");
1755 }
1756 dpif_close(dpif);
1757 }
1758
1759 return error;
1760 }
1761
1762 static int
1763 dpctl_ct_set_limits(int argc, const char *argv[],
1764 struct dpctl_params *dpctl_p)
1765 {
1766 struct dpif *dpif;
1767 struct ds ds = DS_EMPTY_INITIALIZER;
1768 int i = dp_arg_exists(argc, argv) ? 2 : 1;
1769 uint32_t default_limit, *p_default_limit = NULL;
1770 struct ovs_list zone_limits = OVS_LIST_INITIALIZER(&zone_limits);
1771
1772 int error = opt_dpif_open(argc, argv, dpctl_p, INT_MAX, &dpif);
1773 if (error) {
1774 return error;
1775 }
1776
1777 /* Parse default limit */
1778 if (!strncmp(argv[i], "default=", 8)) {
1779 if (ovs_scan(argv[i], "default=%"SCNu32, &default_limit)) {
1780 p_default_limit = &default_limit;
1781 i++;
1782 } else {
1783 ds_put_cstr(&ds, "invalid default limit");
1784 error = EINVAL;
1785 goto error;
1786 }
1787 }
1788
1789 /* Parse ct zone limit tuples */
1790 while (i < argc) {
1791 uint16_t zone;
1792 uint32_t limit;
1793 if (!ct_dpif_parse_zone_limit_tuple(argv[i++], &zone, &limit, &ds)) {
1794 error = EINVAL;
1795 goto error;
1796 }
1797 ct_dpif_push_zone_limit(&zone_limits, zone, limit, 0);
1798 }
1799
1800 error = ct_dpif_set_limits(dpif, p_default_limit, &zone_limits);
1801 if (!error) {
1802 ct_dpif_free_zone_limits(&zone_limits);
1803 dpif_close(dpif);
1804 return 0;
1805 } else {
1806 ds_put_cstr(&ds, "failed to set conntrack limit");
1807 }
1808
1809 error:
1810 dpctl_error(dpctl_p, error, "%s", ds_cstr(&ds));
1811 ds_destroy(&ds);
1812 ct_dpif_free_zone_limits(&zone_limits);
1813 dpif_close(dpif);
1814 return error;
1815 }
1816
1817 static int
1818 parse_ct_limit_zones(const char *argv, struct ovs_list *zone_limits,
1819 struct ds *ds)
1820 {
1821 char *save_ptr = NULL, *argcopy, *next_zone;
1822 uint16_t zone;
1823
1824 if (strncmp(argv, "zone=", 5)) {
1825 ds_put_format(ds, "invalid argument %s", argv);
1826 return EINVAL;
1827 }
1828
1829 argcopy = xstrdup(argv + 5);
1830 next_zone = strtok_r(argcopy, ",", &save_ptr);
1831
1832 do {
1833 if (ovs_scan(next_zone, "%"SCNu16, &zone)) {
1834 ct_dpif_push_zone_limit(zone_limits, zone, 0, 0);
1835 } else {
1836 ds_put_cstr(ds, "invalid zone");
1837 free(argcopy);
1838 return EINVAL;
1839 }
1840 } while ((next_zone = strtok_r(NULL, ",", &save_ptr)) != NULL);
1841
1842 free(argcopy);
1843 return 0;
1844 }
1845
1846 static int
1847 dpctl_ct_del_limits(int argc, const char *argv[],
1848 struct dpctl_params *dpctl_p)
1849 {
1850 struct dpif *dpif;
1851 struct ds ds = DS_EMPTY_INITIALIZER;
1852 int error;
1853 int i = dp_arg_exists(argc, argv) ? 2 : 1;
1854 struct ovs_list zone_limits = OVS_LIST_INITIALIZER(&zone_limits);
1855
1856 error = opt_dpif_open(argc, argv, dpctl_p, 3, &dpif);
1857 if (error) {
1858 return error;
1859 }
1860
1861 error = parse_ct_limit_zones(argv[i], &zone_limits, &ds);
1862 if (error) {
1863 goto error;
1864 }
1865
1866 error = ct_dpif_del_limits(dpif, &zone_limits);
1867 if (!error) {
1868 goto out;
1869 } else {
1870 ds_put_cstr(&ds, "failed to delete conntrack limit");
1871 }
1872
1873 error:
1874 dpctl_error(dpctl_p, error, "%s", ds_cstr(&ds));
1875 ds_destroy(&ds);
1876 out:
1877 ct_dpif_free_zone_limits(&zone_limits);
1878 dpif_close(dpif);
1879 return error;
1880 }
1881
1882 static int
1883 dpctl_ct_get_limits(int argc, const char *argv[],
1884 struct dpctl_params *dpctl_p)
1885 {
1886 struct dpif *dpif;
1887 struct ds ds = DS_EMPTY_INITIALIZER;
1888 uint32_t default_limit;
1889 int i = dp_arg_exists(argc, argv) ? 2 : 1;
1890 struct ovs_list list_query = OVS_LIST_INITIALIZER(&list_query);
1891 struct ovs_list list_reply = OVS_LIST_INITIALIZER(&list_reply);
1892
1893 int error = opt_dpif_open(argc, argv, dpctl_p, 3, &dpif);
1894 if (error) {
1895 return error;
1896 }
1897
1898 if (argc > i) {
1899 error = parse_ct_limit_zones(argv[i], &list_query, &ds);
1900 if (error) {
1901 goto error;
1902 }
1903 }
1904
1905 error = ct_dpif_get_limits(dpif, &default_limit, &list_query,
1906 &list_reply);
1907 if (!error) {
1908 ct_dpif_format_zone_limits(default_limit, &list_reply, &ds);
1909 dpctl_print(dpctl_p, "%s\n", ds_cstr(&ds));
1910 goto out;
1911 } else {
1912 ds_put_format(&ds, "failed to get conntrack limit %s",
1913 ovs_strerror(error));
1914 }
1915
1916 error:
1917 dpctl_error(dpctl_p, error, "%s", ds_cstr(&ds));
1918 out:
1919 ds_destroy(&ds);
1920 ct_dpif_free_zone_limits(&list_query);
1921 ct_dpif_free_zone_limits(&list_reply);
1922 dpif_close(dpif);
1923 return error;
1924 }
1925
1926 static int
1927 ipf_set_enabled__(int argc, const char *argv[], struct dpctl_params *dpctl_p,
1928 bool enabled)
1929 {
1930 struct dpif *dpif;
1931 int error = opt_dpif_open(argc, argv, dpctl_p, 4, &dpif);
1932 if (!error) {
1933 char v4_or_v6[3] = {0};
1934 if (ovs_scan(argv[argc - 1], "%2s", v4_or_v6) &&
1935 (!strncmp(v4_or_v6, "v4", 2) || !strncmp(v4_or_v6, "v6", 2))) {
1936 error = ct_dpif_ipf_set_enabled(
1937 dpif, !strncmp(v4_or_v6, "v6", 2), enabled);
1938 if (!error) {
1939 dpctl_print(dpctl_p,
1940 "%s fragmentation reassembly successful",
1941 enabled ? "enabling" : "disabling");
1942 } else {
1943 dpctl_error(dpctl_p, error,
1944 "%s fragmentation reassembly failed",
1945 enabled ? "enabling" : "disabling");
1946 }
1947 } else {
1948 error = EINVAL;
1949 dpctl_error(dpctl_p, error,
1950 "parameter missing: 'v4' for IPv4 or 'v6' for IPv6");
1951 }
1952 dpif_close(dpif);
1953 }
1954 return error;
1955 }
1956
1957 static int
1958 dpctl_ipf_set_enabled(int argc, const char *argv[],
1959 struct dpctl_params *dpctl_p)
1960 {
1961 return ipf_set_enabled__(argc, argv, dpctl_p, true);
1962 }
1963
1964 static int
1965 dpctl_ipf_set_disabled(int argc, const char *argv[],
1966 struct dpctl_params *dpctl_p)
1967 {
1968 return ipf_set_enabled__(argc, argv, dpctl_p, false);
1969 }
1970
1971 static int
1972 dpctl_ipf_set_min_frag(int argc, const char *argv[],
1973 struct dpctl_params *dpctl_p)
1974 {
1975 struct dpif *dpif;
1976 int error = opt_dpif_open(argc, argv, dpctl_p, 4, &dpif);
1977 if (!error) {
1978 char v4_or_v6[3] = {0};
1979 if (ovs_scan(argv[argc - 2], "%2s", v4_or_v6) &&
1980 (!strncmp(v4_or_v6, "v4", 2) || !strncmp(v4_or_v6, "v6", 2))) {
1981 uint32_t min_fragment;
1982 if (ovs_scan(argv[argc - 1], "%"SCNu32, &min_fragment)) {
1983 error = ct_dpif_ipf_set_min_frag(
1984 dpif, !strncmp(v4_or_v6, "v6", 2), min_fragment);
1985 if (!error) {
1986 dpctl_print(dpctl_p,
1987 "setting minimum fragment size successful");
1988 } else {
1989 dpctl_error(dpctl_p, error,
1990 "requested minimum fragment size too small;"
1991 " see documentation");
1992 }
1993 } else {
1994 error = EINVAL;
1995 dpctl_error(dpctl_p, error,
1996 "parameter missing for minimum fragment size");
1997 }
1998 } else {
1999 error = EINVAL;
2000 dpctl_error(dpctl_p, error,
2001 "parameter missing: v4 for IPv4 or v6 for IPv6");
2002 }
2003 dpif_close(dpif);
2004 }
2005
2006 return error;
2007 }
2008
2009 static int
2010 dpctl_ipf_set_max_nfrags(int argc, const char *argv[],
2011 struct dpctl_params *dpctl_p)
2012 {
2013 struct dpif *dpif;
2014 int error = opt_dpif_open(argc, argv, dpctl_p, 3, &dpif);
2015 if (!error) {
2016 uint32_t nfrags_max;
2017 if (ovs_scan(argv[argc - 1], "%"SCNu32, &nfrags_max)) {
2018 error = ct_dpif_ipf_set_max_nfrags(dpif, nfrags_max);
2019 if (!error) {
2020 dpctl_print(dpctl_p,
2021 "setting maximum fragments successful");
2022 } else {
2023 dpctl_error(dpctl_p, error,
2024 "setting maximum fragments failed");
2025 }
2026 } else {
2027 error = EINVAL;
2028 dpctl_error(dpctl_p, error,
2029 "parameter missing for maximum fragments");
2030 }
2031 dpif_close(dpif);
2032 }
2033
2034 return error;
2035 }
2036
2037 static void
2038 dpctl_dump_ipf(struct dpif *dpif, struct dpctl_params *dpctl_p)
2039 {
2040 struct ipf_dump_ctx *dump_ctx;
2041 char *dump;
2042
2043 int error = ct_dpif_ipf_dump_start(dpif, &dump_ctx);
2044 if (error) {
2045 dpctl_error(dpctl_p, error, "starting ipf list dump");
2046 /* Nothing to clean up, just return. */
2047 return;
2048 }
2049
2050 dpctl_print(dpctl_p, "\n Fragment Lists:\n\n");
2051 while (!(error = ct_dpif_ipf_dump_next(dpif, dump_ctx, &dump))) {
2052 dpctl_print(dpctl_p, "%s\n", dump);
2053 free(dump);
2054 }
2055
2056 if (error && error != EOF) {
2057 dpctl_error(dpctl_p, error, "dumping ipf lists failed");
2058 }
2059
2060 ct_dpif_ipf_dump_done(dpif, dump_ctx);
2061 }
2062
2063 static int
2064 dpctl_ct_ipf_get_status(int argc, const char *argv[],
2065 struct dpctl_params *dpctl_p)
2066 {
2067 struct dpif *dpif;
2068 int error = opt_dpif_open(argc, argv, dpctl_p, 2, &dpif);
2069
2070 if (!error) {
2071 struct dpif_ipf_status dpif_ipf_status;
2072 error = ct_dpif_ipf_get_status(dpif, &dpif_ipf_status);
2073
2074 if (!error) {
2075 dpctl_print(dpctl_p, " Fragmentation Module Status\n");
2076 dpctl_print(dpctl_p, " ---------------------------\n");
2077 dpctl_print(dpctl_p, " v4 enabled: %u\n",
2078 dpif_ipf_status.v4.enabled);
2079 dpctl_print(dpctl_p, " v6 enabled: %u\n",
2080 dpif_ipf_status.v6.enabled);
2081 dpctl_print(dpctl_p, " max num frags (v4/v6): %u\n",
2082 dpif_ipf_status.nfrag_max);
2083 dpctl_print(dpctl_p, " num frag: %u\n",
2084 dpif_ipf_status.nfrag);
2085 dpctl_print(dpctl_p, " min v4 frag size: %u\n",
2086 dpif_ipf_status.v4.min_frag_size);
2087 dpctl_print(dpctl_p, " v4 frags accepted: %"PRIu64"\n",
2088 dpif_ipf_status.v4.nfrag_accepted);
2089 dpctl_print(dpctl_p, " v4 frags completed: %"PRIu64"\n",
2090 dpif_ipf_status.v4.nfrag_completed_sent);
2091 dpctl_print(dpctl_p, " v4 frags expired: %"PRIu64"\n",
2092 dpif_ipf_status.v4.nfrag_expired_sent);
2093 dpctl_print(dpctl_p, " v4 frags too small: %"PRIu64"\n",
2094 dpif_ipf_status.v4.nfrag_too_small);
2095 dpctl_print(dpctl_p, " v4 frags overlapped: %"PRIu64"\n",
2096 dpif_ipf_status.v4.nfrag_overlap);
2097 dpctl_print(dpctl_p, " v4 frags purged: %"PRIu64"\n",
2098 dpif_ipf_status.v4.nfrag_purged);
2099
2100 dpctl_print(dpctl_p, " min v6 frag size: %u\n",
2101 dpif_ipf_status.v6.min_frag_size);
2102 dpctl_print(dpctl_p, " v6 frags accepted: %"PRIu64"\n",
2103 dpif_ipf_status.v6.nfrag_accepted);
2104 dpctl_print(dpctl_p, " v6 frags completed: %"PRIu64"\n",
2105 dpif_ipf_status.v6.nfrag_completed_sent);
2106 dpctl_print(dpctl_p, " v6 frags expired: %"PRIu64"\n",
2107 dpif_ipf_status.v6.nfrag_expired_sent);
2108 dpctl_print(dpctl_p, " v6 frags too small: %"PRIu64"\n",
2109 dpif_ipf_status.v6.nfrag_too_small);
2110 dpctl_print(dpctl_p, " v6 frags overlapped: %"PRIu64"\n",
2111 dpif_ipf_status.v6.nfrag_overlap);
2112 dpctl_print(dpctl_p, " v6 frags purged: %"PRIu64"\n",
2113 dpif_ipf_status.v6.nfrag_purged);
2114 } else {
2115 dpctl_error(dpctl_p, error,
2116 "ipf status could not be retrieved");
2117 return error;
2118 }
2119
2120 if (dpctl_p->verbosity) {
2121 dpctl_dump_ipf(dpif, dpctl_p);
2122 }
2123
2124 dpif_close(dpif);
2125 }
2126
2127 return error;
2128 }
2129
2130 /* Undocumented commands for unit testing. */
2131
2132 static int
2133 dpctl_parse_actions(int argc, const char *argv[], struct dpctl_params* dpctl_p)
2134 {
2135 int i, error = 0;
2136
2137 for (i = 1; i < argc; i++) {
2138 struct ofpbuf actions;
2139 struct ds s;
2140
2141 ofpbuf_init(&actions, 0);
2142 error = odp_actions_from_string(argv[i], NULL, &actions);
2143
2144 if (error) {
2145 ofpbuf_uninit(&actions);
2146 dpctl_error(dpctl_p, error, "odp_actions_from_string");
2147 return error;
2148 }
2149
2150 ds_init(&s);
2151 format_odp_actions(&s, actions.data, actions.size, NULL);
2152 dpctl_print(dpctl_p, "%s\n", ds_cstr(&s));
2153 ds_destroy(&s);
2154
2155 ofpbuf_uninit(&actions);
2156 }
2157
2158 return error;
2159 }
2160
2161 struct actions_for_flow {
2162 struct hmap_node hmap_node;
2163 struct flow flow;
2164 struct ofpbuf actions;
2165 };
2166
2167 static struct actions_for_flow *
2168 get_actions_for_flow(struct hmap *actions_per_flow, const struct flow *flow)
2169 {
2170 uint32_t hash = flow_hash(flow, 0);
2171 struct actions_for_flow *af;
2172
2173 HMAP_FOR_EACH_WITH_HASH (af, hmap_node, hash, actions_per_flow) {
2174 if (flow_equal(&af->flow, flow)) {
2175 return af;
2176 }
2177 }
2178
2179 af = xmalloc(sizeof *af);
2180 af->flow = *flow;
2181 ofpbuf_init(&af->actions, 0);
2182 hmap_insert(actions_per_flow, &af->hmap_node, hash);
2183 return af;
2184 }
2185
2186 static int
2187 compare_actions_for_flow(const void *a_, const void *b_)
2188 {
2189 struct actions_for_flow *const *a = a_;
2190 struct actions_for_flow *const *b = b_;
2191
2192 return flow_compare_3way(&(*a)->flow, &(*b)->flow);
2193 }
2194
2195 static int
2196 compare_output_actions(const void *a_, const void *b_)
2197 {
2198 const struct nlattr *a = a_;
2199 const struct nlattr *b = b_;
2200 uint32_t a_port = nl_attr_get_u32(a);
2201 uint32_t b_port = nl_attr_get_u32(b);
2202
2203 return a_port < b_port ? -1 : a_port > b_port;
2204 }
2205
2206 static void
2207 sort_output_actions__(struct nlattr *first, struct nlattr *end)
2208 {
2209 size_t bytes = (uint8_t *) end - (uint8_t *) first;
2210 size_t n = bytes / NL_A_U32_SIZE;
2211
2212 ovs_assert(bytes % NL_A_U32_SIZE == 0);
2213 qsort(first, n, NL_A_U32_SIZE, compare_output_actions);
2214 }
2215
2216 static void
2217 sort_output_actions(struct nlattr *actions, size_t length)
2218 {
2219 struct nlattr *first_output = NULL;
2220 struct nlattr *a;
2221 int left;
2222
2223 NL_ATTR_FOR_EACH (a, left, actions, length) {
2224 if (nl_attr_type(a) == OVS_ACTION_ATTR_OUTPUT) {
2225 if (!first_output) {
2226 first_output = a;
2227 }
2228 } else {
2229 if (first_output) {
2230 sort_output_actions__(first_output, a);
2231 first_output = NULL;
2232 }
2233 }
2234 }
2235 if (first_output) {
2236 uint8_t *end = (uint8_t *) actions + length;
2237 sort_output_actions__(first_output,
2238 ALIGNED_CAST(struct nlattr *, end));
2239 }
2240 }
2241
2242 /* usage: "ovs-dpctl normalize-actions FLOW ACTIONS" where FLOW and ACTIONS
2243 * have the syntax used by "ovs-dpctl dump-flows".
2244 *
2245 * This command prints ACTIONS in a format that shows what happens for each
2246 * VLAN, independent of the order of the ACTIONS. For example, there is more
2247 * than one way to output a packet on VLANs 9 and 11, but this command will
2248 * print the same output for any form.
2249 *
2250 * The idea here generalizes beyond VLANs (e.g. to setting other fields) but
2251 * so far the implementation only covers VLANs. */
2252 static int
2253 dpctl_normalize_actions(int argc, const char *argv[],
2254 struct dpctl_params *dpctl_p)
2255 {
2256 struct simap port_names;
2257 struct ofpbuf keybuf;
2258 struct flow flow;
2259 struct ofpbuf odp_actions;
2260 struct hmap actions_per_flow;
2261 struct actions_for_flow **afs;
2262 struct actions_for_flow *af;
2263 struct nlattr *a;
2264 size_t n_afs;
2265 struct ds s;
2266 int left;
2267 int i, error;
2268 int encaps = 0;
2269
2270 ds_init(&s);
2271
2272 simap_init(&port_names);
2273 for (i = 3; i < argc; i++) {
2274 char name[16];
2275 int number;
2276
2277 if (ovs_scan(argv[i], "%15[^=]=%d", name, &number)) {
2278 uintptr_t n = number;
2279 simap_put(&port_names, name, n);
2280 } else {
2281 dpctl_error(dpctl_p, 0, "%s: expected NAME=NUMBER", argv[i]);
2282 error = EINVAL;
2283 goto out;
2284 }
2285 }
2286
2287 /* Parse flow key. */
2288 ofpbuf_init(&keybuf, 0);
2289 char *error_s;
2290 error = odp_flow_from_string(argv[1], &port_names, &keybuf, NULL,
2291 &error_s);
2292 if (error) {
2293 dpctl_error(dpctl_p, error, "odp_flow_key_from_string (%s)", error_s);
2294 free(error_s);
2295 goto out_freekeybuf;
2296 }
2297
2298 ds_clear(&s);
2299 odp_flow_format(keybuf.data, keybuf.size, NULL, 0, NULL,
2300 &s, dpctl_p->verbosity);
2301 dpctl_print(dpctl_p, "input flow: %s\n", ds_cstr(&s));
2302
2303 error = odp_flow_key_to_flow(keybuf.data, keybuf.size, &flow, &error_s);
2304 if (error) {
2305 dpctl_error(dpctl_p, error, "odp_flow_key_to_flow failed (%s)",
2306 error_s ? error_s : "reason unknown");
2307 free(error_s);
2308 goto out_freekeybuf;
2309 }
2310
2311 /* Parse actions. */
2312 ofpbuf_init(&odp_actions, 0);
2313 error = odp_actions_from_string(argv[2], &port_names, &odp_actions);
2314 if (error) {
2315 dpctl_error(dpctl_p, error, "odp_actions_from_string");
2316 goto out_freeactions;
2317 }
2318
2319 if (dpctl_p->verbosity) {
2320 ds_clear(&s);
2321 format_odp_actions(&s, odp_actions.data, odp_actions.size, NULL);
2322 dpctl_print(dpctl_p, "input actions: %s\n", ds_cstr(&s));
2323 }
2324
2325 hmap_init(&actions_per_flow);
2326 NL_ATTR_FOR_EACH (a, left, odp_actions.data, odp_actions.size) {
2327 const struct ovs_action_push_vlan *push;
2328 switch(nl_attr_type(a)) {
2329 case OVS_ACTION_ATTR_POP_VLAN:
2330 flow_pop_vlan(&flow, NULL);
2331 continue;
2332
2333 case OVS_ACTION_ATTR_PUSH_VLAN:
2334 flow_push_vlan_uninit(&flow, NULL);
2335 push = nl_attr_get_unspec(a, sizeof *push);
2336 flow.vlans[0].tpid = push->vlan_tpid;
2337 flow.vlans[0].tci = push->vlan_tci;
2338 continue;
2339 }
2340
2341 af = get_actions_for_flow(&actions_per_flow, &flow);
2342 nl_msg_put_unspec(&af->actions, nl_attr_type(a),
2343 nl_attr_get(a), nl_attr_get_size(a));
2344 }
2345
2346 n_afs = hmap_count(&actions_per_flow);
2347 afs = xmalloc(n_afs * sizeof *afs);
2348 i = 0;
2349 HMAP_FOR_EACH (af, hmap_node, &actions_per_flow) {
2350 afs[i++] = af;
2351 }
2352
2353 ovs_assert(i == n_afs);
2354 hmap_destroy(&actions_per_flow);
2355
2356 qsort(afs, n_afs, sizeof *afs, compare_actions_for_flow);
2357
2358 for (i = 0; i < n_afs; i++) {
2359 af = afs[i];
2360 sort_output_actions(af->actions.data, af->actions.size);
2361
2362 for (encaps = 0; encaps < FLOW_MAX_VLAN_HEADERS; encaps ++) {
2363 union flow_vlan_hdr *vlan = &af->flow.vlans[encaps];
2364 if (vlan->tci != htons(0)) {
2365 dpctl_print(dpctl_p, "vlan(");
2366 if (vlan->tpid != htons(ETH_TYPE_VLAN)) {
2367 dpctl_print(dpctl_p, "tpid=0x%04"PRIx16",", vlan->tpid);
2368 }
2369 dpctl_print(dpctl_p, "vid=%"PRIu16",pcp=%d): ",
2370 vlan_tci_to_vid(vlan->tci),
2371 vlan_tci_to_pcp(vlan->tci));
2372 } else {
2373 if (encaps == 0) {
2374 dpctl_print(dpctl_p, "no vlan: ");
2375 }
2376 break;
2377 }
2378 }
2379
2380 if (eth_type_mpls(af->flow.dl_type)) {
2381 dpctl_print(dpctl_p, "mpls(label=%"PRIu32",tc=%d,ttl=%d): ",
2382 mpls_lse_to_label(af->flow.mpls_lse[0]),
2383 mpls_lse_to_tc(af->flow.mpls_lse[0]),
2384 mpls_lse_to_ttl(af->flow.mpls_lse[0]));
2385 } else {
2386 dpctl_print(dpctl_p, "no mpls: ");
2387 }
2388
2389 ds_clear(&s);
2390 format_odp_actions(&s, af->actions.data, af->actions.size, NULL);
2391 dpctl_puts(dpctl_p, false, ds_cstr(&s));
2392
2393 ofpbuf_uninit(&af->actions);
2394 free(af);
2395 }
2396 free(afs);
2397
2398
2399 out_freeactions:
2400 ofpbuf_uninit(&odp_actions);
2401 out_freekeybuf:
2402 ofpbuf_uninit(&keybuf);
2403 out:
2404 simap_destroy(&port_names);
2405 ds_destroy(&s);
2406
2407 return error;
2408 }
2409 \f
2410 static const struct dpctl_command all_commands[] = {
2411 { "add-dp", "dp [iface...]", 1, INT_MAX, dpctl_add_dp, DP_RW },
2412 { "del-dp", "dp", 1, 1, dpctl_del_dp, DP_RW },
2413 { "add-if", "dp iface...", 2, INT_MAX, dpctl_add_if, DP_RW },
2414 { "del-if", "dp iface...", 2, INT_MAX, dpctl_del_if, DP_RW },
2415 { "set-if", "dp iface...", 2, INT_MAX, dpctl_set_if, DP_RW },
2416 { "dump-dps", "", 0, 0, dpctl_dump_dps, DP_RO },
2417 { "show", "[dp...]", 0, INT_MAX, dpctl_show, DP_RO },
2418 { "dump-flows", "[dp] [filter=..] [type=..]",
2419 0, 3, dpctl_dump_flows, DP_RO },
2420 { "add-flow", "[dp] flow actions", 2, 3, dpctl_add_flow, DP_RW },
2421 { "mod-flow", "[dp] flow actions", 2, 3, dpctl_mod_flow, DP_RW },
2422 { "get-flow", "[dp] ufid", 1, 2, dpctl_get_flow, DP_RO },
2423 { "del-flow", "[dp] flow", 1, 2, dpctl_del_flow, DP_RW },
2424 { "del-flows", "[dp]", 0, 1, dpctl_del_flows, DP_RW },
2425 { "dump-conntrack", "[dp] [zone=N]", 0, 2, dpctl_dump_conntrack, DP_RO },
2426 { "flush-conntrack", "[dp] [zone=N] [ct-tuple]", 0, 3,
2427 dpctl_flush_conntrack, DP_RW },
2428 { "ct-stats-show", "[dp] [zone=N]",
2429 0, 3, dpctl_ct_stats_show, DP_RO },
2430 { "ct-bkts", "[dp] [gt=N]", 0, 2, dpctl_ct_bkts, DP_RO },
2431 { "ct-set-maxconns", "[dp] maxconns", 1, 2, dpctl_ct_set_maxconns, DP_RW },
2432 { "ct-get-maxconns", "[dp]", 0, 1, dpctl_ct_get_maxconns, DP_RO },
2433 { "ct-get-nconns", "[dp]", 0, 1, dpctl_ct_get_nconns, DP_RO },
2434 { "ct-set-limits", "[dp] [default=L] [zone=N,limit=L]...", 1, INT_MAX,
2435 dpctl_ct_set_limits, DP_RO },
2436 { "ct-del-limits", "[dp] zone=N1[,N2]...", 1, 2, dpctl_ct_del_limits,
2437 DP_RO },
2438 { "ct-get-limits", "[dp] [zone=N1[,N2]...]", 0, 2, dpctl_ct_get_limits,
2439 DP_RO },
2440 { "ipf-set-enabled", "[dp] v4|v6", 1, 2, dpctl_ipf_set_enabled, DP_RW },
2441 { "ipf-set-disabled", "[dp] v4|v6", 1, 2, dpctl_ipf_set_disabled, DP_RW },
2442 { "ipf-set-min-frag", "[dp] v4|v6 minfragment", 2, 3,
2443 dpctl_ipf_set_min_frag, DP_RW },
2444 { "ipf-set-max-nfrags", "[dp] maxfrags", 1, 2,
2445 dpctl_ipf_set_max_nfrags, DP_RW },
2446 { "ipf-get-status", "[dp]", 0, 1, dpctl_ct_ipf_get_status,
2447 DP_RO },
2448 { "help", "", 0, INT_MAX, dpctl_help, DP_RO },
2449 { "list-commands", "", 0, INT_MAX, dpctl_list_commands, DP_RO },
2450
2451 /* Undocumented commands for testing. */
2452 { "parse-actions", "actions", 1, INT_MAX, dpctl_parse_actions, DP_RO },
2453 { "normalize-actions", "actions",
2454 2, INT_MAX, dpctl_normalize_actions, DP_RO },
2455
2456 { NULL, NULL, 0, 0, NULL, DP_RO },
2457 };
2458
2459 static const struct dpctl_command *get_all_dpctl_commands(void)
2460 {
2461 return all_commands;
2462 }
2463
2464 /* Runs the command designated by argv[0] within the command table specified by
2465 * 'commands', which must be terminated by a command whose 'name' member is a
2466 * null pointer. */
2467 int
2468 dpctl_run_command(int argc, const char *argv[], struct dpctl_params *dpctl_p)
2469 {
2470 const struct dpctl_command *p;
2471 if (argc < 1) {
2472 dpctl_error(dpctl_p, 0, "missing command name; use --help for help");
2473 return EINVAL;
2474 }
2475
2476 for (p = all_commands; p->name != NULL; p++) {
2477 if (!strcmp(p->name, argv[0])) {
2478 int n_arg = argc - 1;
2479 if (n_arg < p->min_args) {
2480 dpctl_error(dpctl_p, 0,
2481 "'%s' command requires at least %d arguments",
2482 p->name, p->min_args);
2483 return EINVAL;
2484 } else if (n_arg > p->max_args) {
2485 dpctl_error(dpctl_p, 0,
2486 "'%s' command takes at most %d arguments",
2487 p->name, p->max_args);
2488 return EINVAL;
2489 } else {
2490 if (p->mode == DP_RW && dpctl_p->read_only) {
2491 dpctl_error(dpctl_p, 0,
2492 "'%s' command does not work in read only mode",
2493 p->name);
2494 return EINVAL;
2495 }
2496 return p->handler(argc, argv, dpctl_p);
2497 }
2498 }
2499 }
2500
2501 dpctl_error(dpctl_p, 0, "unknown command '%s'; use --help for help",
2502 argv[0]);
2503 return EINVAL;
2504 }
2505 \f
2506 static void
2507 dpctl_unixctl_print(void *userdata, bool error OVS_UNUSED, const char *msg)
2508 {
2509 struct ds *ds = userdata;
2510 ds_put_cstr(ds, msg);
2511 }
2512
2513 static void
2514 dpctl_unixctl_handler(struct unixctl_conn *conn, int argc, const char *argv[],
2515 void *aux)
2516 {
2517 struct ds ds = DS_EMPTY_INITIALIZER;
2518 bool error = false;
2519
2520 struct dpctl_params dpctl_p = {
2521 .is_appctl = true,
2522 .output = dpctl_unixctl_print,
2523 .aux = &ds,
2524 };
2525
2526 /* Parse options (like getopt). Unfortunately it does
2527 * not seem a good idea to call getopt_long() here, since it uses global
2528 * variables */
2529 bool set_names = false;
2530 while (argc > 1 && !error) {
2531 const char *arg = argv[1];
2532 if (!strncmp(arg, "--", 2)) {
2533 /* Long option */
2534 if (!strcmp(arg, "--statistics")) {
2535 dpctl_p.print_statistics = true;
2536 } else if (!strcmp(arg, "--clear")) {
2537 dpctl_p.zero_statistics = true;
2538 } else if (!strcmp(arg, "--may-create")) {
2539 dpctl_p.may_create = true;
2540 } else if (!strcmp(arg, "--more")) {
2541 dpctl_p.verbosity++;
2542 } else if (!strcmp(arg, "--names")) {
2543 dpctl_p.names = true;
2544 set_names = true;
2545 } else if (!strcmp(arg, "--no-names")) {
2546 dpctl_p.names = false;
2547 set_names = true;
2548 } else {
2549 ds_put_format(&ds, "Unrecognized option %s", argv[1]);
2550 error = true;
2551 }
2552 } else if (arg[0] == '-' && arg[1] != '\0') {
2553 /* Short option[s] */
2554 const char *opt = &arg[1];
2555
2556 while (*opt && !error) {
2557 switch (*opt) {
2558 case 'm':
2559 dpctl_p.verbosity++;
2560 break;
2561 case 's':
2562 dpctl_p.print_statistics = true;
2563 break;
2564 default:
2565 ds_put_format(&ds, "Unrecognized option -%c", *opt);
2566 error = true;
2567 break;
2568 }
2569 opt++;
2570 }
2571 } else {
2572 /* Doesn't start with -, not an option */
2573 break;
2574 }
2575
2576 if (error) {
2577 break;
2578 }
2579 argv++;
2580 argc--;
2581 }
2582 if (!set_names) {
2583 dpctl_p.names = dpctl_p.verbosity > 0;
2584 }
2585
2586 if (!error) {
2587 dpctl_command_handler *handler = (dpctl_command_handler *) aux;
2588 error = handler(argc, argv, &dpctl_p) != 0;
2589 }
2590
2591 if (error) {
2592 unixctl_command_reply_error(conn, ds_cstr(&ds));
2593 } else {
2594 unixctl_command_reply(conn, ds_cstr(&ds));
2595 }
2596
2597 ds_destroy(&ds);
2598 }
2599
2600 void
2601 dpctl_unixctl_register(void)
2602 {
2603 const struct dpctl_command *p;
2604
2605 for (p = all_commands; p->name != NULL; p++) {
2606 if (strcmp(p->name, "help")) {
2607 char *cmd_name = xasprintf("dpctl/%s", p->name);
2608 unixctl_command_register(cmd_name,
2609 p->usage,
2610 p->min_args,
2611 p->max_args,
2612 dpctl_unixctl_handler,
2613 p->handler);
2614 free(cmd_name);
2615 }
2616 }
2617 }