8ef3b10e72036bf7c377b4c1c4d20a72bcf45936
[sliver-openvswitch.git] / vswitchd / ovs-vswitchd.c
1 /* Copyright (c) 2008, 2009, 2010, 2011, 2012 Nicira, Inc.
2  *
3  * Licensed under the Apache License, Version 2.0 (the "License");
4  * you may not use this file except in compliance with the License.
5  * You may obtain a copy of the License at:
6  *
7  *     http://www.apache.org/licenses/LICENSE-2.0
8  *
9  * Unless required by applicable law or agreed to in writing, software
10  * distributed under the License is distributed on an "AS IS" BASIS,
11  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12  * See the License for the specific language governing permissions and
13  * limitations under the License.
14  */
15
16 #include <config.h>
17
18 #include <assert.h>
19 #include <errno.h>
20 #include <getopt.h>
21 #include <limits.h>
22 #include <signal.h>
23 #include <stdlib.h>
24 #include <string.h>
25 #ifdef HAVE_MLOCKALL
26 #include <sys/mman.h>
27 #endif
28
29 #include "bridge.h"
30 #include "command-line.h"
31 #include "compiler.h"
32 #include "daemon.h"
33 #include "dirs.h"
34 #include "dpif.h"
35 #include "dummy.h"
36 #include "leak-checker.h"
37 #include "memory.h"
38 #include "netdev.h"
39 #include "openflow/openflow.h"
40 #include "ovsdb-idl.h"
41 #include "poll-loop.h"
42 #include "process.h"
43 #include "signals.h"
44 #include "simap.h"
45 #include "stream-ssl.h"
46 #include "stream.h"
47 #include "stress.h"
48 #include "svec.h"
49 #include "timeval.h"
50 #include "unixctl.h"
51 #include "util.h"
52 #include "vconn.h"
53 #include "vlog.h"
54 #include "lib/vswitch-idl.h"
55
56 VLOG_DEFINE_THIS_MODULE(vswitchd);
57
58 static unixctl_cb_func ovs_vswitchd_exit;
59
60 static char *parse_options(int argc, char *argv[], char **unixctl_path);
61 static void usage(void) NO_RETURN;
62
63 int
64 main(int argc, char *argv[])
65 {
66     char *unixctl_path = NULL;
67     struct unixctl_server *unixctl;
68     struct signal *sighup;
69     char *remote;
70     bool exiting;
71     int retval;
72
73     proctitle_init(argc, argv);
74     set_program_name(argv[0]);
75     stress_init_command();
76     remote = parse_options(argc, argv, &unixctl_path);
77     signal(SIGPIPE, SIG_IGN);
78     sighup = signal_register(SIGHUP);
79     process_init();
80     ovsrec_init();
81
82     daemonize_start();
83
84     retval = unixctl_server_create(unixctl_path, &unixctl);
85     if (retval) {
86         exit(EXIT_FAILURE);
87     }
88     unixctl_command_register("exit", "", 0, 0, ovs_vswitchd_exit, &exiting);
89
90     bridge_init(remote);
91     free(remote);
92
93     exiting = false;
94     while (!exiting) {
95         if (signal_poll(sighup)) {
96             vlog_reopen_log_file();
97         }
98         memory_run();
99         if (memory_should_report()) {
100             struct simap usage;
101
102             simap_init(&usage);
103             bridge_get_memory_usage(&usage);
104             memory_report(&usage);
105             simap_destroy(&usage);
106         }
107         bridge_run_fast();
108         bridge_run();
109         bridge_run_fast();
110         unixctl_server_run(unixctl);
111         netdev_run();
112
113         signal_wait(sighup);
114         memory_wait();
115         bridge_wait();
116         unixctl_server_wait(unixctl);
117         netdev_wait();
118         if (exiting) {
119             poll_immediate_wake();
120         }
121         poll_block();
122     }
123     bridge_exit();
124     unixctl_server_destroy(unixctl);
125     signal_unregister(sighup);
126
127     return 0;
128 }
129
130 static char *
131 parse_options(int argc, char *argv[], char **unixctl_pathp)
132 {
133     enum {
134         OPT_PEER_CA_CERT = UCHAR_MAX + 1,
135         OPT_MLOCKALL,
136         OPT_UNIXCTL,
137         VLOG_OPTION_ENUMS,
138         LEAK_CHECKER_OPTION_ENUMS,
139         OPT_BOOTSTRAP_CA_CERT,
140         OPT_ENABLE_DUMMY,
141         OPT_DISABLE_SYSTEM,
142         DAEMON_OPTION_ENUMS
143     };
144     static struct option long_options[] = {
145         {"help",        no_argument, NULL, 'h'},
146         {"version",     no_argument, NULL, 'V'},
147         {"mlockall",    no_argument, NULL, OPT_MLOCKALL},
148         {"unixctl",     required_argument, NULL, OPT_UNIXCTL},
149         DAEMON_LONG_OPTIONS,
150         VLOG_LONG_OPTIONS,
151         LEAK_CHECKER_LONG_OPTIONS,
152         STREAM_SSL_LONG_OPTIONS,
153         {"peer-ca-cert", required_argument, NULL, OPT_PEER_CA_CERT},
154         {"bootstrap-ca-cert", required_argument, NULL, OPT_BOOTSTRAP_CA_CERT},
155         {"enable-dummy", optional_argument, NULL, OPT_ENABLE_DUMMY},
156         {"disable-system", no_argument, NULL, OPT_DISABLE_SYSTEM},
157         {NULL, 0, NULL, 0},
158     };
159     char *short_options = long_options_to_short_options(long_options);
160
161     for (;;) {
162         int c;
163
164         c = getopt_long(argc, argv, short_options, long_options, NULL);
165         if (c == -1) {
166             break;
167         }
168
169         switch (c) {
170         case 'h':
171             usage();
172
173         case 'V':
174             ovs_print_version(OFP10_VERSION, OFP10_VERSION);
175             exit(EXIT_SUCCESS);
176
177         case OPT_MLOCKALL:
178 #ifdef HAVE_MLOCKALL
179             if (mlockall(MCL_CURRENT | MCL_FUTURE)) {
180                 VLOG_ERR("mlockall failed: %s", strerror(errno));
181             }
182 #else
183             VLOG_ERR("mlockall not supported on this system");
184 #endif
185             break;
186
187         case OPT_UNIXCTL:
188             *unixctl_pathp = optarg;
189             break;
190
191         VLOG_OPTION_HANDLERS
192         DAEMON_OPTION_HANDLERS
193         LEAK_CHECKER_OPTION_HANDLERS
194         STREAM_SSL_OPTION_HANDLERS
195
196         case OPT_PEER_CA_CERT:
197             stream_ssl_set_peer_ca_cert_file(optarg);
198             break;
199
200         case OPT_BOOTSTRAP_CA_CERT:
201             stream_ssl_set_ca_cert_file(optarg, true);
202             break;
203
204         case OPT_ENABLE_DUMMY:
205             dummy_enable(optarg && !strcmp(optarg, "override"));
206             break;
207
208         case OPT_DISABLE_SYSTEM:
209             dp_blacklist_provider("system");
210             break;
211
212         case '?':
213             exit(EXIT_FAILURE);
214
215         default:
216             abort();
217         }
218     }
219     free(short_options);
220
221     argc -= optind;
222     argv += optind;
223
224     switch (argc) {
225     case 0:
226         return xasprintf("unix:%s/db.sock", ovs_rundir());
227
228     case 1:
229         return xstrdup(argv[0]);
230
231     default:
232         VLOG_FATAL("at most one non-option argument accepted; "
233                    "use --help for usage");
234     }
235 }
236
237 static void
238 usage(void)
239 {
240     printf("%s: Open vSwitch daemon\n"
241            "usage: %s [OPTIONS] [DATABASE]\n"
242            "where DATABASE is a socket on which ovsdb-server is listening\n"
243            "      (default: \"unix:%s/db.sock\").\n",
244            program_name, program_name, ovs_rundir());
245     stream_usage("DATABASE", true, false, true);
246     daemon_usage();
247     vlog_usage();
248     printf("\nOther options:\n"
249            "  --unixctl=SOCKET        override default control socket name\n"
250            "  -h, --help              display this help message\n"
251            "  -V, --version           display version information\n");
252     leak_checker_usage();
253     exit(EXIT_SUCCESS);
254 }
255
256 static void
257 ovs_vswitchd_exit(struct unixctl_conn *conn, int argc OVS_UNUSED,
258                   const char *argv[] OVS_UNUSED, void *exiting_)
259 {
260     bool *exiting = exiting_;
261     *exiting = true;
262     unixctl_command_reply(conn, NULL);
263 }