Global replace of Nicira Networks.
[sliver-openvswitch.git] / vswitchd / ovs-vswitchd.c
1 /* Copyright (c) 2008, 2009, 2010, 2011, 2012 Nicira, Inc.
2  *
3  * Licensed under the Apache License, Version 2.0 (the "License");
4  * you may not use this file except in compliance with the License.
5  * You may obtain a copy of the License at:
6  *
7  *     http://www.apache.org/licenses/LICENSE-2.0
8  *
9  * Unless required by applicable law or agreed to in writing, software
10  * distributed under the License is distributed on an "AS IS" BASIS,
11  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12  * See the License for the specific language governing permissions and
13  * limitations under the License.
14  */
15
16 #include <config.h>
17
18 #include <assert.h>
19 #include <errno.h>
20 #include <getopt.h>
21 #include <limits.h>
22 #include <signal.h>
23 #include <stdlib.h>
24 #include <string.h>
25 #ifdef HAVE_MLOCKALL
26 #include <sys/mman.h>
27 #endif
28
29 #include "bridge.h"
30 #include "command-line.h"
31 #include "compiler.h"
32 #include "daemon.h"
33 #include "dirs.h"
34 #include "dpif.h"
35 #include "dummy.h"
36 #include "leak-checker.h"
37 #include "netdev.h"
38 #include "openflow/openflow.h"
39 #include "ovsdb-idl.h"
40 #include "poll-loop.h"
41 #include "process.h"
42 #include "signals.h"
43 #include "stream-ssl.h"
44 #include "stream.h"
45 #include "stress.h"
46 #include "svec.h"
47 #include "timeval.h"
48 #include "unixctl.h"
49 #include "util.h"
50 #include "vconn.h"
51 #include "vlog.h"
52 #include "lib/vswitch-idl.h"
53
54 VLOG_DEFINE_THIS_MODULE(vswitchd);
55
56 static unixctl_cb_func ovs_vswitchd_exit;
57
58 static char *parse_options(int argc, char *argv[], char **unixctl_path);
59 static void usage(void) NO_RETURN;
60
61 int
62 main(int argc, char *argv[])
63 {
64     char *unixctl_path = NULL;
65     struct unixctl_server *unixctl;
66     struct signal *sighup;
67     char *remote;
68     bool exiting;
69     int retval;
70
71     proctitle_init(argc, argv);
72     set_program_name(argv[0]);
73     stress_init_command();
74     remote = parse_options(argc, argv, &unixctl_path);
75     signal(SIGPIPE, SIG_IGN);
76     sighup = signal_register(SIGHUP);
77     process_init();
78     ovsrec_init();
79
80     daemonize_start();
81
82     retval = unixctl_server_create(unixctl_path, &unixctl);
83     if (retval) {
84         exit(EXIT_FAILURE);
85     }
86     unixctl_command_register("exit", "", 0, 0, ovs_vswitchd_exit, &exiting);
87
88     bridge_init(remote);
89     free(remote);
90
91     exiting = false;
92     while (!exiting) {
93         if (signal_poll(sighup)) {
94             vlog_reopen_log_file();
95         }
96         bridge_run_fast();
97         bridge_run();
98         bridge_run_fast();
99         unixctl_server_run(unixctl);
100         netdev_run();
101
102         signal_wait(sighup);
103         bridge_wait();
104         unixctl_server_wait(unixctl);
105         netdev_wait();
106         if (exiting) {
107             poll_immediate_wake();
108         }
109         poll_block();
110     }
111     bridge_exit();
112     unixctl_server_destroy(unixctl);
113     signal_unregister(sighup);
114
115     return 0;
116 }
117
118 static char *
119 parse_options(int argc, char *argv[], char **unixctl_pathp)
120 {
121     enum {
122         OPT_PEER_CA_CERT = UCHAR_MAX + 1,
123         OPT_MLOCKALL,
124         OPT_UNIXCTL,
125         VLOG_OPTION_ENUMS,
126         LEAK_CHECKER_OPTION_ENUMS,
127         OPT_BOOTSTRAP_CA_CERT,
128         OPT_ENABLE_DUMMY,
129         OPT_DISABLE_SYSTEM,
130         DAEMON_OPTION_ENUMS
131     };
132     static struct option long_options[] = {
133         {"help",        no_argument, NULL, 'h'},
134         {"version",     no_argument, NULL, 'V'},
135         {"mlockall",    no_argument, NULL, OPT_MLOCKALL},
136         {"unixctl",     required_argument, NULL, OPT_UNIXCTL},
137         DAEMON_LONG_OPTIONS,
138         VLOG_LONG_OPTIONS,
139         LEAK_CHECKER_LONG_OPTIONS,
140         STREAM_SSL_LONG_OPTIONS,
141         {"peer-ca-cert", required_argument, NULL, OPT_PEER_CA_CERT},
142         {"bootstrap-ca-cert", required_argument, NULL, OPT_BOOTSTRAP_CA_CERT},
143         {"enable-dummy", optional_argument, NULL, OPT_ENABLE_DUMMY},
144         {"disable-system", no_argument, NULL, OPT_DISABLE_SYSTEM},
145         {NULL, 0, NULL, 0},
146     };
147     char *short_options = long_options_to_short_options(long_options);
148
149     for (;;) {
150         int c;
151
152         c = getopt_long(argc, argv, short_options, long_options, NULL);
153         if (c == -1) {
154             break;
155         }
156
157         switch (c) {
158         case 'h':
159             usage();
160
161         case 'V':
162             ovs_print_version(OFP10_VERSION, OFP10_VERSION);
163             exit(EXIT_SUCCESS);
164
165         case OPT_MLOCKALL:
166 #ifdef HAVE_MLOCKALL
167             if (mlockall(MCL_CURRENT | MCL_FUTURE)) {
168                 VLOG_ERR("mlockall failed: %s", strerror(errno));
169             }
170 #else
171             VLOG_ERR("mlockall not supported on this system");
172 #endif
173             break;
174
175         case OPT_UNIXCTL:
176             *unixctl_pathp = optarg;
177             break;
178
179         VLOG_OPTION_HANDLERS
180         DAEMON_OPTION_HANDLERS
181         LEAK_CHECKER_OPTION_HANDLERS
182         STREAM_SSL_OPTION_HANDLERS
183
184         case OPT_PEER_CA_CERT:
185             stream_ssl_set_peer_ca_cert_file(optarg);
186             break;
187
188         case OPT_BOOTSTRAP_CA_CERT:
189             stream_ssl_set_ca_cert_file(optarg, true);
190             break;
191
192         case OPT_ENABLE_DUMMY:
193             dummy_enable(optarg && !strcmp(optarg, "override"));
194             break;
195
196         case OPT_DISABLE_SYSTEM:
197             dp_blacklist_provider("system");
198             break;
199
200         case '?':
201             exit(EXIT_FAILURE);
202
203         default:
204             abort();
205         }
206     }
207     free(short_options);
208
209     argc -= optind;
210     argv += optind;
211
212     switch (argc) {
213     case 0:
214         return xasprintf("unix:%s/db.sock", ovs_rundir());
215
216     case 1:
217         return xstrdup(argv[0]);
218
219     default:
220         VLOG_FATAL("at most one non-option argument accepted; "
221                    "use --help for usage");
222     }
223 }
224
225 static void
226 usage(void)
227 {
228     printf("%s: Open vSwitch daemon\n"
229            "usage: %s [OPTIONS] [DATABASE]\n"
230            "where DATABASE is a socket on which ovsdb-server is listening\n"
231            "      (default: \"unix:%s/db.sock\").\n",
232            program_name, program_name, ovs_rundir());
233     stream_usage("DATABASE", true, false, true);
234     daemon_usage();
235     vlog_usage();
236     printf("\nOther options:\n"
237            "  --unixctl=SOCKET        override default control socket name\n"
238            "  -h, --help              display this help message\n"
239            "  -V, --version           display version information\n");
240     leak_checker_usage();
241     exit(EXIT_SUCCESS);
242 }
243
244 static void
245 ovs_vswitchd_exit(struct unixctl_conn *conn, int argc OVS_UNUSED,
246                   const char *argv[] OVS_UNUSED, void *exiting_)
247 {
248     bool *exiting = exiting_;
249     *exiting = true;
250     unixctl_command_reply(conn, NULL);
251 }