2 * Copyright (c) 2008, 2009, 2010 Nicira Networks.
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at:
8 * http://www.apache.org/licenses/LICENSE-2.0
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
29 #include "byte-order.h"
30 #include "classifier.h"
31 #include "command-line.h"
35 #include "dynamic-string.h"
39 #include "ofp-parse.h"
40 #include "ofp-print.h"
43 #include "openflow/nicira-ext.h"
44 #include "openflow/openflow.h"
46 #include "stream-ssl.h"
52 VLOG_DEFINE_THIS_MODULE(ofctl);
54 /* Use strict matching for flow mod commands? */
57 static const struct command all_commands[];
59 static void usage(void) NO_RETURN;
60 static void parse_options(int argc, char *argv[]);
63 main(int argc, char *argv[])
65 set_program_name(argv[0]);
66 parse_options(argc, argv);
67 signal(SIGPIPE, SIG_IGN);
68 run_command(argc - optind, argv + optind, all_commands);
73 parse_options(int argc, char *argv[])
76 OPT_STRICT = UCHAR_MAX + 1,
79 static struct option long_options[] = {
80 {"timeout", required_argument, 0, 't'},
81 {"strict", no_argument, 0, OPT_STRICT},
82 {"help", no_argument, 0, 'h'},
83 {"version", no_argument, 0, 'V'},
85 STREAM_SSL_LONG_OPTIONS
88 char *short_options = long_options_to_short_options(long_options);
91 unsigned long int timeout;
94 c = getopt_long(argc, argv, short_options, long_options, NULL);
101 timeout = strtoul(optarg, NULL, 10);
103 ovs_fatal(0, "value %s on -t or --timeout is not at least 1",
114 OVS_PRINT_VERSION(OFP_VERSION, OFP_VERSION);
122 STREAM_SSL_OPTION_HANDLERS
137 printf("%s: OpenFlow switch management utility\n"
138 "usage: %s [OPTIONS] COMMAND [ARG...]\n"
139 "\nFor OpenFlow switches:\n"
140 " show SWITCH show OpenFlow information\n"
141 " status SWITCH [KEY] report statistics (about KEY)\n"
142 " dump-desc SWITCH print switch description\n"
143 " dump-tables SWITCH print table stats\n"
144 " mod-port SWITCH IFACE ACT modify port behavior\n"
145 " dump-ports SWITCH [PORT] print port statistics\n"
146 " dump-flows SWITCH print all flow entries\n"
147 " dump-flows SWITCH FLOW print matching FLOWs\n"
148 " dump-aggregate SWITCH print aggregate flow statistics\n"
149 " dump-aggregate SWITCH FLOW print aggregate stats for FLOWs\n"
150 " queue-stats SWITCH [PORT [QUEUE]] dump queue stats\n"
151 " add-flow SWITCH FLOW add flow described by FLOW\n"
152 " add-flows SWITCH FILE add flows from FILE\n"
153 " mod-flows SWITCH FLOW modify actions of matching FLOWs\n"
154 " del-flows SWITCH [FLOW] delete matching FLOWs\n"
155 " monitor SWITCH [MISSLEN] print packets received from SWITCH\n"
156 "\nFor OpenFlow switches and controllers:\n"
157 " probe VCONN probe whether VCONN is up\n"
158 " ping VCONN [N] latency of N-byte echos\n"
159 " benchmark VCONN N COUNT bandwidth of COUNT N-byte echos\n"
160 "where each SWITCH is an active OpenFlow connection method.\n",
161 program_name, program_name);
162 vconn_usage(true, false, false);
164 printf("\nOther options:\n"
165 " --strict use strict match for flow commands\n"
166 " -t, --timeout=SECS give up after SECS seconds\n"
167 " -h, --help display this help message\n"
168 " -V, --version display version information\n");
172 static void run(int retval, const char *message, ...)
175 static void run(int retval, const char *message, ...)
180 fprintf(stderr, "%s: ", program_name);
181 va_start(args, message);
182 vfprintf(stderr, message, args);
185 fputs(": unexpected end of file\n", stderr);
187 fprintf(stderr, ": %s\n", strerror(retval));
194 /* Generic commands. */
197 open_vconn_socket(const char *name, struct vconn **vconnp)
199 char *vconn_name = xasprintf("unix:%s", name);
200 VLOG_INFO("connecting to %s", vconn_name);
201 run(vconn_open_block(vconn_name, OFP_VERSION, vconnp),
202 "connecting to %s", vconn_name);
207 open_vconn__(const char *name, const char *default_suffix,
208 struct vconn **vconnp)
212 char *bridge_path, *datapath_name, *datapath_type;
214 bridge_path = xasprintf("%s/%s.%s", ovs_rundir(), name, default_suffix);
215 dp_parse_name(name, &datapath_name, &datapath_type);
217 if (strstr(name, ":")) {
218 run(vconn_open_block(name, OFP_VERSION, vconnp),
219 "connecting to %s", name);
220 } else if (!stat(name, &s) && S_ISSOCK(s.st_mode)) {
221 open_vconn_socket(name, vconnp);
222 } else if (!stat(bridge_path, &s) && S_ISSOCK(s.st_mode)) {
223 open_vconn_socket(bridge_path, vconnp);
224 } else if (!dpif_open(datapath_name, datapath_type, &dpif)) {
225 char dpif_name[IF_NAMESIZE + 1];
228 run(dpif_port_get_name(dpif, ODPP_LOCAL, dpif_name, sizeof dpif_name),
229 "obtaining name of %s", dpif_name);
231 if (strcmp(dpif_name, name)) {
232 VLOG_INFO("datapath %s is named %s", name, dpif_name);
235 socket_name = xasprintf("%s/%s.%s",
236 ovs_rundir(), dpif_name, default_suffix);
237 if (stat(socket_name, &s)) {
238 ovs_fatal(errno, "cannot connect to %s: stat failed on %s",
240 } else if (!S_ISSOCK(s.st_mode)) {
241 ovs_fatal(0, "cannot connect to %s: %s is not a socket",
245 open_vconn_socket(socket_name, vconnp);
248 ovs_fatal(0, "%s is not a valid connection method", name);
257 open_vconn(const char *name, struct vconn **vconnp)
259 return open_vconn__(name, "mgmt", vconnp);
263 alloc_stats_request(size_t body_len, uint16_t type, struct ofpbuf **bufferp)
265 struct ofp_stats_request *rq;
266 rq = make_openflow((offsetof(struct ofp_stats_request, body)
267 + body_len), OFPT_STATS_REQUEST, bufferp);
268 rq->type = htons(type);
269 rq->flags = htons(0);
274 send_openflow_buffer(struct vconn *vconn, struct ofpbuf *buffer)
276 update_openflow_length(buffer);
277 run(vconn_send_block(vconn, buffer), "failed to send packet to switch");
281 dump_transaction(const char *vconn_name, struct ofpbuf *request)
284 struct ofpbuf *reply;
286 update_openflow_length(request);
287 open_vconn(vconn_name, &vconn);
288 run(vconn_transact(vconn, request, &reply), "talking to %s", vconn_name);
289 ofp_print(stdout, reply->data, reply->size, 1);
294 dump_trivial_transaction(const char *vconn_name, uint8_t request_type)
296 struct ofpbuf *request;
297 make_openflow(sizeof(struct ofp_header), request_type, &request);
298 dump_transaction(vconn_name, request);
302 dump_stats_transaction(const char *vconn_name, struct ofpbuf *request)
304 ovs_be32 send_xid = ((struct ofp_header *) request->data)->xid;
308 open_vconn(vconn_name, &vconn);
309 send_openflow_buffer(vconn, request);
312 struct ofpbuf *reply;
314 run(vconn_recv_block(vconn, &reply), "OpenFlow packet receive failed");
315 recv_xid = ((struct ofp_header *) reply->data)->xid;
316 if (send_xid == recv_xid) {
317 struct ofp_stats_reply *osr;
319 ofp_print(stdout, reply->data, reply->size, 1);
321 osr = ofpbuf_at(reply, 0, sizeof *osr);
322 done = !osr || !(ntohs(osr->flags) & OFPSF_REPLY_MORE);
324 VLOG_DBG("received reply with xid %08"PRIx32" "
325 "!= expected %08"PRIx32, recv_xid, send_xid);
327 ofpbuf_delete(reply);
333 dump_trivial_stats_transaction(const char *vconn_name, uint8_t stats_type)
335 struct ofpbuf *request;
336 alloc_stats_request(0, stats_type, &request);
337 dump_stats_transaction(vconn_name, request);
341 do_show(int argc OVS_UNUSED, char *argv[])
343 dump_trivial_transaction(argv[1], OFPT_FEATURES_REQUEST);
344 dump_trivial_transaction(argv[1], OFPT_GET_CONFIG_REQUEST);
348 do_status(int argc, char *argv[])
350 struct nicira_header *request, *reply;
354 request = make_nxmsg(sizeof *request, NXT_STATUS_REQUEST, &b);
356 ofpbuf_put(b, argv[2], strlen(argv[2]));
357 update_openflow_length(b);
359 open_vconn(argv[1], &vconn);
360 run(vconn_transact(vconn, b, &b), "talking to %s", argv[1]);
363 if (b->size < sizeof *reply) {
364 ovs_fatal(0, "short reply (%zu bytes)", b->size);
367 if (reply->header.type != OFPT_VENDOR
368 || reply->vendor != ntohl(NX_VENDOR_ID)
369 || reply->subtype != ntohl(NXT_STATUS_REPLY)) {
370 ofp_print(stderr, b->data, b->size, 2);
371 ovs_fatal(0, "bad reply");
374 fwrite(reply + 1, b->size - sizeof *reply, 1, stdout);
378 do_dump_desc(int argc OVS_UNUSED, char *argv[])
380 dump_trivial_stats_transaction(argv[1], OFPST_DESC);
384 do_dump_tables(int argc OVS_UNUSED, char *argv[])
386 dump_trivial_stats_transaction(argv[1], OFPST_TABLE);
390 str_to_port_no(const char *vconn_name, const char *str)
392 struct ofpbuf *request, *reply;
393 struct ofp_switch_features *osf;
397 unsigned int port_no;
400 /* Check if the argument is a port index. Otherwise, treat it as
402 if (str_to_uint(str, 10, &port_no)) {
406 /* Send a "Features Request" to resolve the name into a number. */
407 make_openflow(sizeof(struct ofp_header), OFPT_FEATURES_REQUEST, &request);
408 open_vconn(vconn_name, &vconn);
409 run(vconn_transact(vconn, request, &reply), "talking to %s", vconn_name);
412 n_ports = (reply->size - sizeof *osf) / sizeof *osf->ports;
414 for (port_idx = 0; port_idx < n_ports; port_idx++) {
415 /* Check argument as an interface name */
416 if (!strncmp((char *)osf->ports[port_idx].name, str,
417 sizeof osf->ports[0].name)) {
421 if (port_idx == n_ports) {
422 ovs_fatal(0, "couldn't find monitored port: %s", str);
425 ofpbuf_delete(reply);
428 return ntohs(osf->ports[port_idx].port_no);
432 do_dump_flows(int argc, char *argv[])
434 struct ofp_flow_stats_request *req;
435 struct parsed_flow pf;
436 struct ofpbuf *request;
438 req = alloc_stats_request(sizeof *req, OFPST_FLOW, &request);
439 parse_ofp_str(&pf, NULL, argc > 2 ? argv[2] : "");
440 ofputil_cls_rule_to_match(&pf.rule, NXFF_OPENFLOW10, &req->match);
441 memset(&req->pad, 0, sizeof req->pad);
442 req->out_port = htons(pf.out_port);
444 dump_stats_transaction(argv[1], request);
448 do_dump_aggregate(int argc, char *argv[])
450 struct ofp_aggregate_stats_request *req;
451 struct ofpbuf *request;
452 struct parsed_flow pf;
454 req = alloc_stats_request(sizeof *req, OFPST_AGGREGATE, &request);
455 parse_ofp_str(&pf, NULL, argc > 2 ? argv[2] : "");
456 ofputil_cls_rule_to_match(&pf.rule, NXFF_OPENFLOW10, &req->match);
457 memset(&req->pad, 0, sizeof req->pad);
458 req->out_port = htons(pf.out_port);
460 dump_stats_transaction(argv[1], request);
464 do_queue_stats(int argc, char *argv[])
466 struct ofp_queue_stats_request *req;
467 struct ofpbuf *request;
469 req = alloc_stats_request(sizeof *req, OFPST_QUEUE, &request);
471 if (argc > 2 && argv[2][0] && strcasecmp(argv[2], "all")) {
472 req->port_no = htons(str_to_port_no(argv[1], argv[2]));
474 req->port_no = htons(OFPP_ALL);
476 if (argc > 3 && argv[3][0] && strcasecmp(argv[3], "all")) {
477 req->queue_id = htonl(atoi(argv[3]));
479 req->queue_id = htonl(OFPQ_ALL);
482 memset(req->pad, 0, sizeof req->pad);
484 dump_stats_transaction(argv[1], request);
488 do_add_flow(int argc OVS_UNUSED, char *argv[])
491 struct ofpbuf *buffer;
493 buffer = parse_ofp_flow_mod_str(argv[2], OFPFC_ADD);
495 open_vconn(argv[1], &vconn);
496 send_openflow_buffer(vconn, buffer);
501 do_add_flows(int argc OVS_UNUSED, char *argv[])
507 file = fopen(argv[2], "r");
509 ovs_fatal(errno, "%s: open", argv[2]);
512 open_vconn(argv[1], &vconn);
513 while ((b = parse_ofp_add_flow_file(file)) != NULL) {
514 send_openflow_buffer(vconn, b);
521 do_mod_flows(int argc OVS_UNUSED, char *argv[])
524 struct ofpbuf *buffer;
527 command = strict ? OFPFC_MODIFY_STRICT : OFPFC_MODIFY;
528 buffer = parse_ofp_flow_mod_str(argv[2], command);
529 open_vconn(argv[1], &vconn);
530 send_openflow_buffer(vconn, buffer);
534 static void do_del_flows(int argc, char *argv[])
537 struct ofpbuf *buffer;
540 command = strict ? OFPFC_DELETE_STRICT : OFPFC_DELETE;
541 buffer = parse_ofp_flow_mod_str(argc > 2 ? argv[2] : "", command);
543 open_vconn(argv[1], &vconn);
544 send_openflow_buffer(vconn, buffer);
549 do_tun_cookie(int argc OVS_UNUSED, char *argv[])
551 struct nxt_tun_id_cookie *tun_id_cookie;
552 struct ofpbuf *buffer;
555 tun_id_cookie = make_nxmsg(sizeof *tun_id_cookie, NXT_TUN_ID_FROM_COOKIE,
557 tun_id_cookie->set = !strcmp(argv[2], "true");
559 open_vconn(argv[1], &vconn);
560 send_openflow_buffer(vconn, buffer);
565 monitor_vconn(struct vconn *vconn)
569 run(vconn_recv_block(vconn, &b), "vconn_recv");
570 ofp_print(stderr, b->data, b->size, 2);
576 do_monitor(int argc, char *argv[])
580 open_vconn(argv[1], &vconn);
582 int miss_send_len = atoi(argv[2]);
583 struct ofp_switch_config *osc;
586 osc = make_openflow(sizeof *osc, OFPT_SET_CONFIG, &buf);
587 osc->miss_send_len = htons(miss_send_len);
588 send_openflow_buffer(vconn, buf);
590 monitor_vconn(vconn);
594 do_snoop(int argc OVS_UNUSED, char *argv[])
598 open_vconn__(argv[1], "snoop", &vconn);
599 monitor_vconn(vconn);
603 do_dump_ports(int argc, char *argv[])
605 struct ofp_port_stats_request *req;
606 struct ofpbuf *request;
609 req = alloc_stats_request(sizeof *req, OFPST_PORT, &request);
610 port = argc > 2 ? str_to_port_no(argv[1], argv[2]) : OFPP_NONE;
611 req->port_no = htons(port);
612 dump_stats_transaction(argv[1], request);
616 do_probe(int argc OVS_UNUSED, char *argv[])
618 struct ofpbuf *request;
620 struct ofpbuf *reply;
622 make_openflow(sizeof(struct ofp_header), OFPT_ECHO_REQUEST, &request);
623 open_vconn(argv[1], &vconn);
624 run(vconn_transact(vconn, request, &reply), "talking to %s", argv[1]);
625 if (reply->size != sizeof(struct ofp_header)) {
626 ovs_fatal(0, "reply does not match request");
628 ofpbuf_delete(reply);
633 do_mod_port(int argc OVS_UNUSED, char *argv[])
635 struct ofpbuf *request, *reply;
636 struct ofp_switch_features *osf;
637 struct ofp_port_mod *opm;
645 /* Check if the argument is a port index. Otherwise, treat it as
647 port_no = strtol(argv[2], &endptr, 10);
648 if (port_no == 0 && endptr == argv[2]) {
652 /* Send a "Features Request" to get the information we need in order
653 * to modify the port. */
654 make_openflow(sizeof(struct ofp_header), OFPT_FEATURES_REQUEST, &request);
655 open_vconn(argv[1], &vconn);
656 run(vconn_transact(vconn, request, &reply), "talking to %s", argv[1]);
659 n_ports = (reply->size - sizeof *osf) / sizeof *osf->ports;
661 for (port_idx = 0; port_idx < n_ports; port_idx++) {
663 /* Check argument as a port index */
664 if (osf->ports[port_idx].port_no == htons(port_no)) {
668 /* Check argument as an interface name */
669 if (!strncmp((char *)osf->ports[port_idx].name, argv[2],
670 sizeof osf->ports[0].name)) {
676 if (port_idx == n_ports) {
677 ovs_fatal(0, "couldn't find monitored port: %s", argv[2]);
680 opm = make_openflow(sizeof(struct ofp_port_mod), OFPT_PORT_MOD, &request);
681 opm->port_no = osf->ports[port_idx].port_no;
682 memcpy(opm->hw_addr, osf->ports[port_idx].hw_addr, sizeof opm->hw_addr);
683 opm->config = htonl(0);
684 opm->mask = htonl(0);
685 opm->advertise = htonl(0);
687 if (!strcasecmp(argv[3], "up")) {
688 opm->mask |= htonl(OFPPC_PORT_DOWN);
689 } else if (!strcasecmp(argv[3], "down")) {
690 opm->mask |= htonl(OFPPC_PORT_DOWN);
691 opm->config |= htonl(OFPPC_PORT_DOWN);
692 } else if (!strcasecmp(argv[3], "flood")) {
693 opm->mask |= htonl(OFPPC_NO_FLOOD);
694 } else if (!strcasecmp(argv[3], "noflood")) {
695 opm->mask |= htonl(OFPPC_NO_FLOOD);
696 opm->config |= htonl(OFPPC_NO_FLOOD);
698 ovs_fatal(0, "unknown mod-port command '%s'", argv[3]);
701 send_openflow_buffer(vconn, request);
703 ofpbuf_delete(reply);
708 do_ping(int argc, char *argv[])
710 size_t max_payload = 65535 - sizeof(struct ofp_header);
711 unsigned int payload;
715 payload = argc > 2 ? atoi(argv[2]) : 64;
716 if (payload > max_payload) {
717 ovs_fatal(0, "payload must be between 0 and %zu bytes", max_payload);
720 open_vconn(argv[1], &vconn);
721 for (i = 0; i < 10; i++) {
722 struct timeval start, end;
723 struct ofpbuf *request, *reply;
724 struct ofp_header *rq_hdr, *rpy_hdr;
726 rq_hdr = make_openflow(sizeof(struct ofp_header) + payload,
727 OFPT_ECHO_REQUEST, &request);
728 random_bytes(rq_hdr + 1, payload);
730 gettimeofday(&start, NULL);
731 run(vconn_transact(vconn, ofpbuf_clone(request), &reply), "transact");
732 gettimeofday(&end, NULL);
734 rpy_hdr = reply->data;
735 if (reply->size != request->size
736 || memcmp(rpy_hdr + 1, rq_hdr + 1, payload)
737 || rpy_hdr->xid != rq_hdr->xid
738 || rpy_hdr->type != OFPT_ECHO_REPLY) {
739 printf("Reply does not match request. Request:\n");
740 ofp_print(stdout, request, request->size, 2);
742 ofp_print(stdout, reply, reply->size, 2);
744 printf("%zu bytes from %s: xid=%08"PRIx32" time=%.1f ms\n",
745 reply->size - sizeof *rpy_hdr, argv[1], ntohl(rpy_hdr->xid),
746 (1000*(double)(end.tv_sec - start.tv_sec))
747 + (.001*(end.tv_usec - start.tv_usec)));
748 ofpbuf_delete(request);
749 ofpbuf_delete(reply);
755 do_benchmark(int argc OVS_UNUSED, char *argv[])
757 size_t max_payload = 65535 - sizeof(struct ofp_header);
758 struct timeval start, end;
759 unsigned int payload_size, message_size;
765 payload_size = atoi(argv[2]);
766 if (payload_size > max_payload) {
767 ovs_fatal(0, "payload must be between 0 and %zu bytes", max_payload);
769 message_size = sizeof(struct ofp_header) + payload_size;
771 count = atoi(argv[3]);
773 printf("Sending %d packets * %u bytes (with header) = %u bytes total\n",
774 count, message_size, count * message_size);
776 open_vconn(argv[1], &vconn);
777 gettimeofday(&start, NULL);
778 for (i = 0; i < count; i++) {
779 struct ofpbuf *request, *reply;
780 struct ofp_header *rq_hdr;
782 rq_hdr = make_openflow(message_size, OFPT_ECHO_REQUEST, &request);
783 memset(rq_hdr + 1, 0, payload_size);
784 run(vconn_transact(vconn, request, &reply), "transact");
785 ofpbuf_delete(reply);
787 gettimeofday(&end, NULL);
790 duration = ((1000*(double)(end.tv_sec - start.tv_sec))
791 + (.001*(end.tv_usec - start.tv_usec)));
792 printf("Finished in %.1f ms (%.0f packets/s) (%.0f bytes/s)\n",
793 duration, count / (duration / 1000.0),
794 count * message_size / (duration / 1000.0));
798 do_help(int argc OVS_UNUSED, char *argv[] OVS_UNUSED)
803 /* Undocumented commands for unit testing. */
806 do_parse_flows(int argc OVS_UNUSED, char *argv[])
811 file = fopen(argv[1], "r");
813 ovs_fatal(errno, "%s: open", argv[2]);
816 while ((b = parse_ofp_add_flow_file(file)) != NULL) {
817 ofp_print(stdout, b->data, b->size, 0);
824 do_parse_nx_match(int argc OVS_UNUSED, char *argv[] OVS_UNUSED)
829 while (!ds_get_line(&in, stdin)) {
830 struct ofpbuf nx_match;
831 struct cls_rule rule;
836 /* Delete comments, skip blank lines. */
842 if (strchr(s, '#')) {
843 *strchr(s, '#') = '\0';
845 if (s[strspn(s, " ")] == '\0') {
850 /* Convert string to nx_match. */
851 ofpbuf_init(&nx_match, 0);
852 match_len = nx_match_from_string(ds_cstr(&in), &nx_match);
854 /* Convert nx_match to cls_rule. */
855 error = nx_pull_match(&nx_match, match_len, 0, &rule);
859 /* Convert cls_rule back to nx_match. */
860 ofpbuf_uninit(&nx_match);
861 ofpbuf_init(&nx_match, 0);
862 match_len = nx_put_match(&nx_match, &rule);
864 /* Convert nx_match to string. */
865 out = nx_match_to_string(nx_match.data, match_len);
869 printf("nx_pull_match() returned error %x\n", error);
872 ofpbuf_uninit(&nx_match);
877 static const struct command all_commands[] = {
878 { "show", 1, 1, do_show },
879 { "status", 1, 2, do_status },
880 { "monitor", 1, 2, do_monitor },
881 { "snoop", 1, 1, do_snoop },
882 { "dump-desc", 1, 1, do_dump_desc },
883 { "dump-tables", 1, 1, do_dump_tables },
884 { "dump-flows", 1, 2, do_dump_flows },
885 { "dump-aggregate", 1, 2, do_dump_aggregate },
886 { "queue-stats", 1, 3, do_queue_stats },
887 { "add-flow", 2, 2, do_add_flow },
888 { "add-flows", 2, 2, do_add_flows },
889 { "mod-flows", 2, 2, do_mod_flows },
890 { "del-flows", 1, 2, do_del_flows },
891 { "tun-cookie", 2, 2, do_tun_cookie },
892 { "dump-ports", 1, 2, do_dump_ports },
893 { "mod-port", 3, 3, do_mod_port },
894 { "probe", 1, 1, do_probe },
895 { "ping", 1, 2, do_ping },
896 { "benchmark", 3, 3, do_benchmark },
897 { "help", 0, INT_MAX, do_help },
899 /* Undocumented commands for testing. */
900 { "parse-flows", 1, 1, do_parse_flows },
901 { "parse-nx-match", 0, 0, do_parse_nx_match },
903 { NULL, 0, 0, NULL },