On 1/5/2018 10:46 AM, Justin Pettit wrote:
On Jan 5, 2018, at 8:05 AM, Gregory Rose <gvrose8...@gmail.com> wrote:

For now that's about as far as I can take my investigation since I have a few 
other things I need to work
on.  If you can think of another test I should run or something for me to check 
into let me know.
Ben noticed that this seemed to have been removed in error in my patch:

@@ -813,7 +816,6 @@ recv_upcalls(struct handler *handler)

         upcall->key = dupcall->key;
         upcall->key_len = dupcall->key_len;
-        upcall->ufid = &dupcall->ufid;

         upcall->out_tun_key = dupcall->out_tun_key;
         upcall->actions = dupcall->actions;

Can you try adding that line back and see if the problem goes away on your end?

Thanks,

--Justin

Justin,

That didn't seem to help.  The cookie->header.type is still equal to type USER_ACTION_COOKIE_UNSPEC
in the classify_upcall() function and that causes this message:

2018-01-05T19:12:09.957Z|00001|ofproto_dpif_upcall(handler1)|WARN|invalid user cookie of type 0 and size 4

- Greg

_______________________________________________
dev mailing list
d...@openvswitch.org
https://mail.openvswitch.org/mailman/listinfo/ovs-dev

Reply via email to