[ovs-dev] error

2015-12-24 Thread Automatic Email Delivery Software
The original message was included as attachment ___ dev mailing list dev@openvswitch.org http://openvswitch.org/mailman/listinfo/dev

Re: [ovs-dev] [PATCH] ofproto/trace: fix memory leak at recirculate state

2015-12-24 Thread ChengChun Tu
Hi, Please ignore this patch. I tested this patch and found it fails the “make check TESTSUITEFLAGS='381’”. (Surprisingly it passes the “make check-valgrind”, but fails the “make check"). I will investigate it and resubmit. Thank you. Regards, William On 12/24/15, 1:58 PM, "dev on behalf

[ovs-dev] [PATCH] ofproto/trace: fix memory leak at recirculate state

2015-12-24 Thread William Tu
recirc_state_clone() allocates a memory for new->ofpacts without later on freeing it. valgrind test case: 381: xmemdup(util.c:134) recirc_state_clone(ofproto-dpif-rid.c:221) recirc_alloc_id__(ofproto-dpif-rid.c:238) recirc_alloc_id_ctx(ofproto-dpif-rid.c:281) compose_recirculate

Re: [ovs-dev] [PATCH 1/2] datapath: Fix build on Linux-4.3.

2015-12-24 Thread Joe Stringer
On 24 December 2015 at 13:44, Joe Stringer wrote: > Signed-off-by: Joe Stringer I realised this is only needed in conjunction with another series I'm working on; This has no effect on master. I will resubmit this patch as part of that series. ___ dev m

[ovs-dev] [PATCH 2/2] travis: Update kernel matrix.

2015-12-24 Thread Joe Stringer
Remove v4.2 as it is EOL; Add v4.3 as we support this version in OVS-2.5. Update other versions to the latest listed on kernel.org. Signed-off-by: Joe Stringer --- .travis.yml | 16 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/.travis.yml b/.travis.yml index ea1

[ovs-dev] [PATCH 1/2] datapath: Fix build on Linux-4.3.

2015-12-24 Thread Joe Stringer
Signed-off-by: Joe Stringer --- datapath/linux/compat/include/net/inetpeer.h | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/datapath/linux/compat/include/net/inetpeer.h b/datapath/linux/compat/include/net/inetpeer.h index 02e9d440a60c..68a1732388c1 100644 --- a/datapath/li

Re: [ovs-dev] [PATCH] ovs-dev.py: Fix libcap-ng-dev dependency.

2015-12-24 Thread Joe Stringer
On 23 December 2015 at 14:21, Ben Pfaff wrote: > On Wed, Dec 23, 2015 at 02:16:09PM -0800, Joe Stringer wrote: >> Signed-off-by: Joe Stringer > > Makes sense, so even though I don't use ovs-dev.py: > Acked-by: Ben Pfaff Thanks, applied to master and branch-2.5. _

Re: [ovs-dev] [RFC v2] ipv6 tunneling: Fix for performance drop introduced by ipv6 tunnel support.

2015-12-24 Thread Thadeu Lima de Souza Cascardo
On Tue, Dec 22, 2015 at 01:59:00PM +, Sugesh Chandran wrote: > Adding a new flag to verify the validity of tunnel metadata. This flag avoids > the need of resetting and validating the entire ipv4/ipv6 tunnel destination > address which caused a serious performance drop. > > Signed-off-by: Suge

[ovs-dev] [PATCH 3/4] ovs-ofctl: fix memory leak reported by valgrind, case 376

2015-12-24 Thread William Tu
Test case 376 reports two leaks: ofpbuf_new(ofpbuf.c:151) ofpraw_alloc_xid(ofp-msgs.c:533) ofpraw_alloc(ofp-msgs.c:525) ofputil_encode_flow_mod(ofp-util.c:2290) bundle_flow_mod__(ovs-ofctl.c:1312) ofctl_flow_mod__(ovs-ofctl.c:1331) ofctl_flow_mod_file.isra.13(ovs-ofctl.c

[ovs-dev] [PATCH 2/4] ofp-print.c: fix memory leak at ofp_print_bundle_add()

2015-12-24 Thread William Tu
Call ds_put_and_free_cstr instead of ds_put_cstr to free msg. Reported by test cases: 325, 326 ofp_print_bundle_add (ofp-print.c:3027) ofp_to_string__ (ofp-print.c:3410) ofp_to_string (ofp-print.c:3465) ofp_print (ofp-print.c:3497) ofctl_ofp_print (ovs-ofctl.c:3818) ovs_cmdl

[ovs-dev] [PATCH 1/4] ovsdb-client: fix memory leak reported by valgrind

2015-12-24 Thread William Tu
Free memory allocated from table_add_column and table_add_row. Call stack is below: xrealloc (util.c:123) table_add_column (table.c:146) or table_add_row (table.c:172) do_list_tables (ovsdb-client.c:449) main (ovsdb-client.c:151) Signed-off-by: William Tu Signed-off-by: Daniele Di

[ovs-dev] [PATCH 4/4] odp-util.c: fix memory leak reported by valgrind

2015-12-24 Thread William Tu
Test case 377: return without freeing buf xmalloc(util.c:112) ofpbuf_init(ofpbuf.c:124) parse_odp_userspace_action(odp-util.c:987) parse_odp_action(odp-util.c:1552) odp_actions_from_string(odp-util.c:1721) parse_actions(test-odp.c:132) Test case 380: exit withtou uninit in

[ovs-dev] [PATCH] test-sflow: Fix memory leak in main function.

2015-12-24 Thread Ilya Maximets
Reported by valgrind on test case 886. 912 (24 direct, 888 indirect) bytes in 1 blocks are definitely lost at malloc by xmalloc (util.c:112) by unixctl_server_create (unixctl.c:250) by test_sflow_main (test-sflow.c:688) by ovstest_wrapper_test_sflow_main__ (test-sflow.c:786)

[ovs-dev] How to send packets from a Linux process to OVS

2015-12-24 Thread Allan Lue
Hi, I need to have a Linux process (not VM) send packets to OVS. I have googled many times without finding info that can help me. Use an example, The are 3 processes (not VMs) P1, P2 and P3, I would like them to send to OVS interfaces vnet1, vnet2, vnet3 respectively. I am wondering what syste