projects
/
openvswitch
/ blobdiff
commit
grep
author
committer
pickaxe
?
search:
re
summary
|
shortlog
|
log
|
commit
|
commitdiff
|
tree
raw
|
inline
| side by side
userspace: Log version on startup.
[openvswitch]
/
vswitchd
/
ovs-vswitchd.c
diff --git
a/vswitchd/ovs-vswitchd.c
b/vswitchd/ovs-vswitchd.c
index bdc3533094aacea0157f8cf68a3741c6f8ad519b..3b6517884498b3591a419b6baab609d1c4d06b45 100644
(file)
--- a/
vswitchd/ovs-vswitchd.c
+++ b/
vswitchd/ovs-vswitchd.c
@@
-1,4
+1,4
@@
-/* Copyright (c) 2008, 2009, 2010, 2011
Nicira Networks
+/* Copyright (c) 2008, 2009, 2010, 2011
, 2012 Nicira, Inc.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
@@
-34,12
+34,14
@@
#include "dpif.h"
#include "dummy.h"
#include "leak-checker.h"
#include "dpif.h"
#include "dummy.h"
#include "leak-checker.h"
+#include "memory.h"
#include "netdev.h"
#include "openflow/openflow.h"
#include "ovsdb-idl.h"
#include "poll-loop.h"
#include "process.h"
#include "signals.h"
#include "netdev.h"
#include "openflow/openflow.h"
#include "ovsdb-idl.h"
#include "poll-loop.h"
#include "process.h"
#include "signals.h"
+#include "simap.h"
#include "stream-ssl.h"
#include "stream.h"
#include "stress.h"
#include "stream-ssl.h"
#include "stream.h"
#include "stress.h"
@@
-49,18
+51,23
@@
#include "util.h"
#include "vconn.h"
#include "vlog.h"
#include "util.h"
#include "vconn.h"
#include "vlog.h"
-#include "
vswitchd
/vswitch-idl.h"
+#include "
lib
/vswitch-idl.h"
VLOG_DEFINE_THIS_MODULE(vswitchd);
VLOG_DEFINE_THIS_MODULE(vswitchd);
+/* --mlockall: If set, locks all process memory into physical RAM, preventing
+ * the kernel from paging any of its memory to disk. */
+static bool want_mlockall;
+
static unixctl_cb_func ovs_vswitchd_exit;
static unixctl_cb_func ovs_vswitchd_exit;
-static char *parse_options(int argc, char *argv[]);
+static char *parse_options(int argc, char *argv[]
, char **unixctl_path
);
static void usage(void) NO_RETURN;
int
main(int argc, char *argv[])
{
static void usage(void) NO_RETURN;
int
main(int argc, char *argv[])
{
+ char *unixctl_path = NULL;
struct unixctl_server *unixctl;
struct signal *sighup;
char *remote;
struct unixctl_server *unixctl;
struct signal *sighup;
char *remote;
@@
-70,7
+77,7
@@
main(int argc, char *argv[])
proctitle_init(argc, argv);
set_program_name(argv[0]);
stress_init_command();
proctitle_init(argc, argv);
set_program_name(argv[0]);
stress_init_command();
- remote = parse_options(argc, argv);
+ remote = parse_options(argc, argv
, &unixctl_path
);
signal(SIGPIPE, SIG_IGN);
sighup = signal_register(SIGHUP);
process_init();
signal(SIGPIPE, SIG_IGN);
sighup = signal_register(SIGHUP);
process_init();
@@
-78,11
+85,23
@@
main(int argc, char *argv[])
daemonize_start();
daemonize_start();
- retval = unixctl_server_create(NULL, &unixctl);
+ VLOG_INFO("%s (Open vSwitch) %s", program_name, VERSION);
+
+ if (want_mlockall) {
+#ifdef HAVE_MLOCKALL
+ if (mlockall(MCL_CURRENT | MCL_FUTURE)) {
+ VLOG_ERR("mlockall failed: %s", strerror(errno));
+ }
+#else
+ VLOG_ERR("mlockall not supported on this system");
+#endif
+ }
+
+ retval = unixctl_server_create(unixctl_path, &unixctl);
if (retval) {
exit(EXIT_FAILURE);
}
if (retval) {
exit(EXIT_FAILURE);
}
- unixctl_command_register("exit", "", ovs_vswitchd_exit, &exiting);
+ unixctl_command_register("exit", "",
0, 0,
ovs_vswitchd_exit, &exiting);
bridge_init(remote);
free(remote);
bridge_init(remote);
free(remote);
@@
-92,11
+111,23
@@
main(int argc, char *argv[])
if (signal_poll(sighup)) {
vlog_reopen_log_file();
}
if (signal_poll(sighup)) {
vlog_reopen_log_file();
}
+ memory_run();
+ if (memory_should_report()) {
+ struct simap usage;
+
+ simap_init(&usage);
+ bridge_get_memory_usage(&usage);
+ memory_report(&usage);
+ simap_destroy(&usage);
+ }
+ bridge_run_fast();
bridge_run();
bridge_run();
+ bridge_run_fast();
unixctl_server_run(unixctl);
netdev_run();
signal_wait(sighup);
unixctl_server_run(unixctl);
netdev_run();
signal_wait(sighup);
+ memory_wait();
bridge_wait();
unixctl_server_wait(unixctl);
netdev_wait();
bridge_wait();
unixctl_server_wait(unixctl);
netdev_wait();
@@
-113,11
+144,12
@@
main(int argc, char *argv[])
}
static char *
}
static char *
-parse_options(int argc, char *argv[])
+parse_options(int argc, char *argv[]
, char **unixctl_pathp
)
{
enum {
OPT_PEER_CA_CERT = UCHAR_MAX + 1,
OPT_MLOCKALL,
{
enum {
OPT_PEER_CA_CERT = UCHAR_MAX + 1,
OPT_MLOCKALL,
+ OPT_UNIXCTL,
VLOG_OPTION_ENUMS,
LEAK_CHECKER_OPTION_ENUMS,
OPT_BOOTSTRAP_CA_CERT,
VLOG_OPTION_ENUMS,
LEAK_CHECKER_OPTION_ENUMS,
OPT_BOOTSTRAP_CA_CERT,
@@
-129,13
+161,14
@@
parse_options(int argc, char *argv[])
{"help", no_argument, NULL, 'h'},
{"version", no_argument, NULL, 'V'},
{"mlockall", no_argument, NULL, OPT_MLOCKALL},
{"help", no_argument, NULL, 'h'},
{"version", no_argument, NULL, 'V'},
{"mlockall", no_argument, NULL, OPT_MLOCKALL},
+ {"unixctl", required_argument, NULL, OPT_UNIXCTL},
DAEMON_LONG_OPTIONS,
VLOG_LONG_OPTIONS,
LEAK_CHECKER_LONG_OPTIONS,
STREAM_SSL_LONG_OPTIONS,
{"peer-ca-cert", required_argument, NULL, OPT_PEER_CA_CERT},
{"bootstrap-ca-cert", required_argument, NULL, OPT_BOOTSTRAP_CA_CERT},
DAEMON_LONG_OPTIONS,
VLOG_LONG_OPTIONS,
LEAK_CHECKER_LONG_OPTIONS,
STREAM_SSL_LONG_OPTIONS,
{"peer-ca-cert", required_argument, NULL, OPT_PEER_CA_CERT},
{"bootstrap-ca-cert", required_argument, NULL, OPT_BOOTSTRAP_CA_CERT},
- {"enable-dummy",
no
_argument, NULL, OPT_ENABLE_DUMMY},
+ {"enable-dummy",
optional
_argument, NULL, OPT_ENABLE_DUMMY},
{"disable-system", no_argument, NULL, OPT_DISABLE_SYSTEM},
{NULL, 0, NULL, 0},
};
{"disable-system", no_argument, NULL, OPT_DISABLE_SYSTEM},
{NULL, 0, NULL, 0},
};
@@
-154,17
+187,15
@@
parse_options(int argc, char *argv[])
usage();
case 'V':
usage();
case 'V':
- ovs_print_version(OFP
_VERSION, OFP
_VERSION);
+ ovs_print_version(OFP
10_VERSION, OFP10
_VERSION);
exit(EXIT_SUCCESS);
case OPT_MLOCKALL:
exit(EXIT_SUCCESS);
case OPT_MLOCKALL:
-#ifdef HAVE_MLOCKALL
- if (mlockall(MCL_CURRENT | MCL_FUTURE)) {
- VLOG_ERR("mlockall failed: %s", strerror(errno));
- }
-#else
- VLOG_ERR("mlockall not supported on this system");
-#endif
+ want_mlockall = true;
+ break;
+
+ case OPT_UNIXCTL:
+ *unixctl_pathp = optarg;
break;
VLOG_OPTION_HANDLERS
break;
VLOG_OPTION_HANDLERS
@@
-181,7
+212,7
@@
parse_options(int argc, char *argv[])
break;
case OPT_ENABLE_DUMMY:
break;
case OPT_ENABLE_DUMMY:
- dummy_enable();
+ dummy_enable(
optarg && !strcmp(optarg, "override")
);
break;
case OPT_DISABLE_SYSTEM:
break;
case OPT_DISABLE_SYSTEM:
@@
-225,6
+256,7
@@
usage(void)
daemon_usage();
vlog_usage();
printf("\nOther options:\n"
daemon_usage();
vlog_usage();
printf("\nOther options:\n"
+ " --unixctl=SOCKET override default control socket name\n"
" -h, --help display this help message\n"
" -V, --version display version information\n");
leak_checker_usage();
" -h, --help display this help message\n"
" -V, --version display version information\n");
leak_checker_usage();
@@
-232,10
+264,10
@@
usage(void)
}
static void
}
static void
-ovs_vswitchd_exit(struct unixctl_conn *conn,
const char *args
OVS_UNUSED,
- void *exiting_)
+ovs_vswitchd_exit(struct unixctl_conn *conn,
int argc
OVS_UNUSED,
+
const char *argv[] OVS_UNUSED,
void *exiting_)
{
bool *exiting = exiting_;
*exiting = true;
{
bool *exiting = exiting_;
*exiting = true;
- unixctl_command_reply(conn,
200,
NULL);
+ unixctl_command_reply(conn, NULL);
}
}