The original message was included as attachment
___
dev mailing list
dev@openvswitch.org
http://openvswitch.org/mailman/listinfo/dev
Hi,
Please ignore this patch.
I tested this patch and found it fails the “make check TESTSUITEFLAGS='381’”.
(Surprisingly it passes the “make check-valgrind”, but fails the “make check").
I will investigate it and resubmit. Thank you.
Regards,
William
On 12/24/15, 1:58 PM, "dev on behalf
recirc_state_clone() allocates a memory for new->ofpacts without
later on freeing it. valgrind test case: 381:
xmemdup(util.c:134)
recirc_state_clone(ofproto-dpif-rid.c:221)
recirc_alloc_id__(ofproto-dpif-rid.c:238)
recirc_alloc_id_ctx(ofproto-dpif-rid.c:281)
compose_recirculate
On 24 December 2015 at 13:44, Joe Stringer wrote:
> Signed-off-by: Joe Stringer
I realised this is only needed in conjunction with another series I'm
working on; This has no effect on master. I will resubmit this patch
as part of that series.
___
dev m
Remove v4.2 as it is EOL; Add v4.3 as we support this version in
OVS-2.5. Update other versions to the latest listed on kernel.org.
Signed-off-by: Joe Stringer
---
.travis.yml | 16
1 file changed, 8 insertions(+), 8 deletions(-)
diff --git a/.travis.yml b/.travis.yml
index ea1
Signed-off-by: Joe Stringer
---
datapath/linux/compat/include/net/inetpeer.h | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/datapath/linux/compat/include/net/inetpeer.h
b/datapath/linux/compat/include/net/inetpeer.h
index 02e9d440a60c..68a1732388c1 100644
--- a/datapath/li
On 23 December 2015 at 14:21, Ben Pfaff wrote:
> On Wed, Dec 23, 2015 at 02:16:09PM -0800, Joe Stringer wrote:
>> Signed-off-by: Joe Stringer
>
> Makes sense, so even though I don't use ovs-dev.py:
> Acked-by: Ben Pfaff
Thanks, applied to master and branch-2.5.
_
On Tue, Dec 22, 2015 at 01:59:00PM +, Sugesh Chandran wrote:
> Adding a new flag to verify the validity of tunnel metadata. This flag avoids
> the need of resetting and validating the entire ipv4/ipv6 tunnel destination
> address which caused a serious performance drop.
>
> Signed-off-by: Suge
Test case 376 reports two leaks:
ofpbuf_new(ofpbuf.c:151)
ofpraw_alloc_xid(ofp-msgs.c:533)
ofpraw_alloc(ofp-msgs.c:525)
ofputil_encode_flow_mod(ofp-util.c:2290)
bundle_flow_mod__(ovs-ofctl.c:1312)
ofctl_flow_mod__(ovs-ofctl.c:1331)
ofctl_flow_mod_file.isra.13(ovs-ofctl.c
Call ds_put_and_free_cstr instead of ds_put_cstr to free msg.
Reported by test cases: 325, 326
ofp_print_bundle_add (ofp-print.c:3027)
ofp_to_string__ (ofp-print.c:3410)
ofp_to_string (ofp-print.c:3465)
ofp_print (ofp-print.c:3497)
ofctl_ofp_print (ovs-ofctl.c:3818)
ovs_cmdl
Free memory allocated from table_add_column and table_add_row. Call
stack is below:
xrealloc (util.c:123)
table_add_column (table.c:146) or table_add_row (table.c:172)
do_list_tables (ovsdb-client.c:449)
main (ovsdb-client.c:151)
Signed-off-by: William Tu
Signed-off-by: Daniele Di
Test case 377: return without freeing buf
xmalloc(util.c:112)
ofpbuf_init(ofpbuf.c:124)
parse_odp_userspace_action(odp-util.c:987)
parse_odp_action(odp-util.c:1552)
odp_actions_from_string(odp-util.c:1721)
parse_actions(test-odp.c:132)
Test case 380: exit withtou uninit in
Reported by valgrind on test case 886.
912 (24 direct, 888 indirect) bytes in 1 blocks are definitely lost
at malloc
by xmalloc (util.c:112)
by unixctl_server_create (unixctl.c:250)
by test_sflow_main (test-sflow.c:688)
by ovstest_wrapper_test_sflow_main__ (test-sflow.c:786)
Hi,
I need to have a Linux process (not VM) send packets to OVS. I have googled
many times without finding info
that can help me.
Use an example,
The are 3 processes (not VMs) P1, P2 and P3, I would like them to send to OVS
interfaces vnet1, vnet2, vnet3 respectively.
I am wondering what syste
14 matches
Mail list logo