Thanks to Reid Price <reid@nicira.com> for reporting the issue (which
only caused spurious warning messages).
return dp_send_echo_reply(chain->dp, sender, msg);
}
+static int
+recv_echo_reply(struct sw_chain *chain, const struct sender *sender,
+ const void *msg)
+{
+ return 0;
+}
+
static int
add_flow(struct sw_chain *chain, const struct ofp_flow_mod *ofm)
{
sizeof (struct ofp_header),
recv_echo_request,
},
+ [OFPT_ECHO_REPLY] = {
+ sizeof (struct ofp_header),
+ recv_echo_reply,
+ },
};
const struct openflow_packet *pkt;
return send_openflow_buffer(dp, make_echo_reply(oh), sender);
}
+static int
+recv_echo_reply(struct datapath *dp UNUSED, const struct sender *sender UNUSED,
+ const void *oh UNUSED)
+{
+ return 0;
+}
+
/* 'msg', which is 'length' bytes long, was received from the control path.
* Apply it to 'chain'. */
int
sizeof (struct ofp_header),
recv_echo_request,
},
+ [OFPT_ECHO_REPLY] = {
+ sizeof (struct ofp_header),
+ recv_echo_reply,
+ },
};
const struct openflow_packet *pkt;