1 /* Copyright (c) 2008, 2009, 2010, 2011, 2012, 2013 Nicira, Inc.
3 * Licensed under the Apache License, Version 2.0 (the "License");
4 * you may not use this file except in compliance with the License.
5 * You may obtain a copy of the License at:
7 * http://www.apache.org/licenses/LICENSE-2.0
9 * Unless required by applicable law or agreed to in writing, software
10 * distributed under the License is distributed on an "AS IS" BASIS,
11 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 * See the License for the specific language governing permissions and
13 * limitations under the License.
29 #include "command-line.h"
37 #include "openflow/openflow.h"
38 #include "ovsdb-idl.h"
39 #include "poll-loop.h"
41 #include "stream-ssl.h"
49 #include "lib/vswitch-idl.h"
51 VLOG_DEFINE_THIS_MODULE(vswitchd);
53 /* --mlockall: If set, locks all process memory into physical RAM, preventing
54 * the kernel from paging any of its memory to disk. */
55 static bool want_mlockall;
57 static unixctl_cb_func ovs_vswitchd_exit;
59 static char *parse_options(int argc, char *argv[], char **unixctl_path);
60 static void usage(void) NO_RETURN;
63 main(int argc, char *argv[])
65 char *unixctl_path = NULL;
66 struct unixctl_server *unixctl;
71 proctitle_init(argc, argv);
72 set_program_name(argv[0]);
73 service_start(&argc, &argv);
74 remote = parse_options(argc, argv, &unixctl_path);
75 signal(SIGPIPE, SIG_IGN);
82 if (mlockall(MCL_CURRENT | MCL_FUTURE)) {
83 VLOG_ERR("mlockall failed: %s", ovs_strerror(errno));
86 VLOG_ERR("mlockall not supported on this system");
90 retval = unixctl_server_create(unixctl_path, &unixctl);
94 unixctl_command_register("exit", "", 0, 0, ovs_vswitchd_exit, &exiting);
102 if (memory_should_report()) {
106 bridge_get_memory_usage(&usage);
107 memory_report(&usage);
108 simap_destroy(&usage);
111 unixctl_server_run(unixctl);
116 unixctl_server_wait(unixctl);
119 poll_immediate_wake();
122 if (should_service_stop()) {
127 unixctl_server_destroy(unixctl);
134 parse_options(int argc, char *argv[], char **unixctl_pathp)
137 OPT_PEER_CA_CERT = UCHAR_MAX + 1,
141 OPT_BOOTSTRAP_CA_CERT,
146 static const struct option long_options[] = {
147 {"help", no_argument, NULL, 'h'},
148 {"version", no_argument, NULL, 'V'},
149 {"mlockall", no_argument, NULL, OPT_MLOCKALL},
150 {"unixctl", required_argument, NULL, OPT_UNIXCTL},
153 STREAM_SSL_LONG_OPTIONS,
154 {"peer-ca-cert", required_argument, NULL, OPT_PEER_CA_CERT},
155 {"bootstrap-ca-cert", required_argument, NULL, OPT_BOOTSTRAP_CA_CERT},
156 {"enable-dummy", optional_argument, NULL, OPT_ENABLE_DUMMY},
157 {"disable-system", no_argument, NULL, OPT_DISABLE_SYSTEM},
160 char *short_options = long_options_to_short_options(long_options);
165 c = getopt_long(argc, argv, short_options, long_options, NULL);
175 ovs_print_version(OFP10_VERSION, OFP10_VERSION);
179 want_mlockall = true;
183 *unixctl_pathp = optarg;
187 DAEMON_OPTION_HANDLERS
188 STREAM_SSL_OPTION_HANDLERS
190 case OPT_PEER_CA_CERT:
191 stream_ssl_set_peer_ca_cert_file(optarg);
194 case OPT_BOOTSTRAP_CA_CERT:
195 stream_ssl_set_ca_cert_file(optarg, true);
198 case OPT_ENABLE_DUMMY:
199 dummy_enable(optarg && !strcmp(optarg, "override"));
202 case OPT_DISABLE_SYSTEM:
203 dp_blacklist_provider("system");
220 return xasprintf("unix:%s/db.sock", ovs_rundir());
223 return xstrdup(argv[0]);
226 VLOG_FATAL("at most one non-option argument accepted; "
227 "use --help for usage");
234 printf("%s: Open vSwitch daemon\n"
235 "usage: %s [OPTIONS] [DATABASE]\n"
236 "where DATABASE is a socket on which ovsdb-server is listening\n"
237 " (default: \"unix:%s/db.sock\").\n",
238 program_name, program_name, ovs_rundir());
239 stream_usage("DATABASE", true, false, true);
242 printf("\nOther options:\n"
243 " --unixctl=SOCKET override default control socket name\n"
244 " -h, --help display this help message\n"
245 " -V, --version display version information\n");
250 ovs_vswitchd_exit(struct unixctl_conn *conn, int argc OVS_UNUSED,
251 const char *argv[] OVS_UNUSED, void *exiting_)
253 bool *exiting = exiting_;
255 unixctl_command_reply(conn, NULL);