get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/105302/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 105302,
    "url": "http://patches.dpdk.org/api/patches/105302/?format=api",
    "web_url": "http://patches.dpdk.org/project/dts/patch/20211221165827.628330-1-yaqi.tang@intel.com/",
    "project": {
        "id": 3,
        "url": "http://patches.dpdk.org/api/projects/3/?format=api",
        "name": "DTS",
        "link_name": "dts",
        "list_id": "dts.dpdk.org",
        "list_email": "dts@dpdk.org",
        "web_url": "",
        "scm_url": "git://dpdk.org/tools/dts",
        "webscm_url": "http://git.dpdk.org/tools/dts/",
        "list_archive_url": "https://inbox.dpdk.org/dts",
        "list_archive_url_format": "https://inbox.dpdk.org/dts/{}",
        "commit_url_format": ""
    },
    "msgid": "<20211221165827.628330-1-yaqi.tang@intel.com>",
    "list_archive_url": "https://inbox.dpdk.org/dts/20211221165827.628330-1-yaqi.tang@intel.com",
    "date": "2021-12-21T16:58:27",
    "name": "[V1] test_plans/cvl_pf_qinq_switch_filter: cvl support l4",
    "commit_ref": null,
    "pull_url": null,
    "state": "superseded",
    "archived": false,
    "hash": "56277c86e8bde93f5337a83f8e52e78aa0abc22a",
    "submitter": {
        "id": 2357,
        "url": "http://patches.dpdk.org/api/people/2357/?format=api",
        "name": "Yaqi Tang",
        "email": "yaqi.tang@intel.com"
    },
    "delegate": null,
    "mbox": "http://patches.dpdk.org/project/dts/patch/20211221165827.628330-1-yaqi.tang@intel.com/mbox/",
    "series": [
        {
            "id": 20995,
            "url": "http://patches.dpdk.org/api/series/20995/?format=api",
            "web_url": "http://patches.dpdk.org/project/dts/list/?series=20995",
            "date": "2021-12-21T16:58:27",
            "name": "[V1] test_plans/cvl_pf_qinq_switch_filter: cvl support l4",
            "version": 1,
            "mbox": "http://patches.dpdk.org/series/20995/mbox/"
        }
    ],
    "comments": "http://patches.dpdk.org/api/patches/105302/comments/",
    "check": "pending",
    "checks": "http://patches.dpdk.org/api/patches/105302/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dts-bounces@dpdk.org>",
        "X-Original-To": "patchwork@inbox.dpdk.org",
        "Delivered-To": "patchwork@inbox.dpdk.org",
        "Received": [
            "from mails.dpdk.org (mails.dpdk.org [217.70.189.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id D63D9A034C;\n\tTue, 21 Dec 2021 10:00:30 +0100 (CET)",
            "from [217.70.189.124] (localhost [127.0.0.1])\n\tby mails.dpdk.org (Postfix) with ESMTP id CA30D40141;\n\tTue, 21 Dec 2021 10:00:30 +0100 (CET)",
            "from mga03.intel.com (mga03.intel.com [134.134.136.65])\n by mails.dpdk.org (Postfix) with ESMTP id AA1D84003C\n for <dts@dpdk.org>; Tue, 21 Dec 2021 10:00:28 +0100 (CET)",
            "from orsmga008.jf.intel.com ([10.7.209.65])\n by orsmga103.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 21 Dec 2021 01:00:27 -0800",
            "from dpdk-yaqi.sh.intel.com ([10.67.119.78])\n by orsmga008.jf.intel.com with ESMTP; 21 Dec 2021 01:00:25 -0800"
        ],
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/simple;\n d=intel.com; i=@intel.com; q=dns/txt; s=Intel;\n t=1640077228; x=1671613228;\n h=from:to:cc:subject:date:message-id:mime-version:\n content-transfer-encoding;\n bh=IyTUZnIBvA5U8aoQv8Krc9gsHCZcE14wWHVs/sTH2wg=;\n b=fV8vlFxJn13GIOVmEUrd0LIBFYvwAyJAkEJmIX7Qu3tYguldjeTZAshh\n B634XeOVjIJ9NHzrhv4tfs2eV+FvN8ywVPZpoMr+EeJk1z9lNJid4bOEm\n YstgmsD++K+iDxKSGpcTLp2cgaFD6gihmcRgqZ431ME2VV8mykjs0Zmos\n PsMvK50Syxb/CGaCf1QO874CMAxiS6U7KABkXa9jakojLwjJMAihW50EU\n B69o6Z1JqF/2SZlLj9SDvqrzSkqj0yMMYE7qSH2CBc3vTX7HaHIAaQaP1\n wwMQPC/r4NaZrWpE3ziY6lfUmMZhLLdfDLR1jsT5UucI1+gPfzTHY2b8o g==;",
        "X-IronPort-AV": [
            "E=McAfee;i=\"6200,9189,10204\"; a=\"240311274\"",
            "E=Sophos;i=\"5.88,222,1635231600\"; d=\"scan'208\";a=\"240311274\"",
            "E=Sophos;i=\"5.88,222,1635231600\"; d=\"scan'208\";a=\"521165136\""
        ],
        "X-ExtLoop1": "1",
        "From": "Yaqi Tang <yaqi.tang@intel.com>",
        "To": "dts@dpdk.org",
        "Cc": "Yaqi Tang <yaqi.tang@intel.com>",
        "Subject": "[dts][PATCH V1] test_plans/cvl_pf_qinq_switch_filter: cvl support l4",
        "Date": "Tue, 21 Dec 2021 16:58:27 +0000",
        "Message-Id": "<20211221165827.628330-1-yaqi.tang@intel.com>",
        "X-Mailer": "git-send-email 2.25.1",
        "MIME-Version": "1.0",
        "Content-Transfer-Encoding": "8bit",
        "X-BeenThere": "dts@dpdk.org",
        "X-Mailman-Version": "2.1.29",
        "Precedence": "list",
        "List-Id": "test suite reviews and discussions <dts.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dts>,\n <mailto:dts-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dts/>",
        "List-Post": "<mailto:dts@dpdk.org>",
        "List-Help": "<mailto:dts-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dts>,\n <mailto:dts-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dts-bounces@dpdk.org"
    },
    "content": "CVL support l4 for QinQ switch filter in PF driver is by dst MAC + outer VLAN id + inner VLAN id + dst IP + dst port, and port can support as eth / vlan / vlan / IP / tcp|udp.\n\nSigned-off-by: Yaqi Tang <yaqi.tang@intel.com>\nTested-by: Yaqi Tang < yaqi.tang@intel.com>\n---\n .../cvl_pf_qinq_switch_filter_test_plan.rst   | 687 ++++++++++++++++++\n 1 file changed, 687 insertions(+)\n create mode 100644 test_plans/cvl_pf_qinq_switch_filter_test_plan.rst",
    "diff": "diff --git a/test_plans/cvl_pf_qinq_switch_filter_test_plan.rst b/test_plans/cvl_pf_qinq_switch_filter_test_plan.rst\nnew file mode 100644\nindex 00000000..ccd431e6\n--- /dev/null\n+++ b/test_plans/cvl_pf_qinq_switch_filter_test_plan.rst\n@@ -0,0 +1,687 @@\n+.. Copyright (c) <2021>, Intel Corporation\n+   All rights reserved.\n+\n+   Redistribution and use in source and binary forms, with or without\n+   modification, are permitted provided that the following conditions\n+   are met:\n+\n+   - Redistributions of source code must retain the above copyright\n+     notice, this list of conditions and the following disclaimer.\n+\n+   - Redistributions in binary form must reproduce the above copyright\n+     notice, this list of conditions and the following disclaimer in\n+     the documentation and/or other materials provided with the\n+     distribution.\n+\n+   - Neither the name of Intel Corporation nor the names of its\n+     contributors may be used to endorse or promote products derived\n+     from this software without specific prior written permission.\n+\n+   THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS\n+   \"AS IS\" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT\n+   LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS\n+   FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE\n+   COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,\n+   INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES\n+   (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR\n+   SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)\n+   HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,\n+   STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)\n+   ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED\n+   OF THE POSSIBILITY OF SUCH DAMAGE.\n+\n+===================================\n+CVL PF QINQ Switch Filter Test Plan\n+===================================\n+\n+Description\n+===========\n+The test plan includes six test cases, such as MAC_QINQ_IPV4, MAC_QINQ_IPV6, MAC_QINQ_IPV4_UDP, MAC_QINQ_IPV4_TCP, MAC_QINQ_IPV6_UDP, MAC_QINQ_IPV6_TCP.\n+* Enable QINQ switch filter for IPv4/IPv6, IPv4 + TCP/UDP in non-pipeline mode. \n+* Enable QINQ switch filter for IPv6 + TCP/UDP in pipeline mode. \n+CVL support l4 for QinQ switch filter in PF driver is by dst MAC + outer VLAN id + inner VLAN id + dst IP + dst port, and port can support as eth / vlan / vlan / IP / tcp|udp.\n+\n+Prerequisites\n+=============\n+\n+Hardware\n+--------\n+Supportted NICs: columbiaville_25g/columbiaville_100g\n+\n+Software\n+--------\n+dpdk: http://dpdk.org/git/dpdk\n+scapy: http://www.secdev.org/projects/scapy/\n+\n+General Set Up\n+--------------\n+1. Copy specific ice package to /lib/firmware/updates/intel/ice/ddp/ice.pkg,\n+   then load driver::\n+\n+    # cp ice_comms-1.3.31.0.pkg /lib/firmware/updates/intel/ice/ddp/ice.pkg\n+    # rmmod ice\n+    # insmod ice.ko\n+\n+2. Compile DPDK::\n+\n+    # CC=gcc meson --werror -Denable_kmods=True -Dlibdir=lib --default-library=static x86_64-native-linuxapp-gcc\n+    # ninja -C x86_64-native-linuxapp-gcc -j 110\n+\n+3. Get the pci device id and interface of DUT and tester::\n+\n+    # ./usertools/dpdk-devbind.py -s\n+\n+    0000:3b:00.0 'Ethernet Controller E810-C for SFP 1593' if=ens785f0 drv=ice unused=vfio-pci\n+    0000:af:00.0 'Ethernet Controller XXV710 for 25GbE SFP28 158b' if=ens260f0 drv=i40e unused=vfio-pci\n+\n+4. Bind the DUT port to dpdk::\n+\n+    # ./usertools/dpdk-devbind.py -b vfio-pci 0000:3b:00.0\n+    \n+Test Case\n+=========\n+\n+Common Steps\n+------------\n+1. Launch the userland ``testpmd`` application on DUT as follows::\n+\n+     # ./x86_64-native-linuxapp-gcc/app/dpdk-testpmd -c 0xf -n 4 -a 0000:3b:00.0 -- -i --txq=16 --rxq=16\n+\n+2. Set verbose::\n+    \n+     testpmd> set verbose 1\n+    \n+3. Set fwd engine and start::\n+\n+     testpmd> set fwd rxonly\n+     testpmd> start\n+\n+#Non-pipeline mode\n+\n+Test Case 1: MAC_QINQ_IPV4\n+--------------------------\n+The test case enable QINQ switch filter for IPv4 in non-pipeline mode, and port can support as dst MAC + outer VLAN id + inner VLAN id + IPv4.\n+\n+Test Steps\n+~~~~~~~~~~\n+1. Validate a rule::\n+   \n+     testpmd> flow validate 0 ingress pattern eth dst is 00:11:22:33:44:55 / vlan tci is 2 / vlan tci is 1 / ipv4 src is 192.168.1.1 dst is 192.168.1.2 / end actions queue index 2 / end\n+\n+   Get the message::\n+\n+     Flow rule validated\n+\n+2. Create a rule and list rules::\n+\n+     testpmd> flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / vlan tci is 2 / vlan tci is 1 / ipv4 src is 192.168.1.1 dst is 192.168.1.2 / end actions queue index 2 / end\n+     \n+   Get the message::\n+\n+     Flow rule #0 created\n+   \n+3. Check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   ID      Group   Prio    Attr    Rule\n+   0       0       0       i--     ETH VLAN VLAN IPV4 => QUEUE\n+\n+4. Send matched packet in scapy on tester, check the DUT received this packet and the action is right::\n+\n+Tester::\n+\n+    >>> sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=2,type=0x8100)/Dot1Q(vlan=0x1,type=0x0800)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/(\"X\"*80)],iface=\"ens260f0\",count=1)\n+\n+DUT::\n+\n+    testpmd> port 0/queue 2: received 1 packets\n+  src=A4:BF:01:4D:6F:32 - dst=00:11:22:33:44:55 - type=0x8100 - length=122 - nb_segs=1 - RSS hash=0x26878aad - RSS queue=0x2 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG  - sw ptype: L2_ETHER_VLAN INNER_L2_ETHER_VLAN INNER_L3_IPV4  - l2_len=18 - inner_l2_len=4 - inner_l3_len=20 - Receive queue=0x2\n+  ol_flags: RTE_MBUF_F_RX_RSS_HASH RTE_MBUF_F_RX_L4_CKSUM_GOOD RTE_MBUF_F_RX_IP_CKSUM_GOOD RTE_MBUF_F_RX_OUTER_L4_CKSUM_GOOD\n+\n+5. Send mismatched packet in scapy on tester, check the DUT received this packet and the action is not right::\n+\n+Tester::\n+\n+    >>> sendp([Ether(dst=\"00:11:22:33:44:33\",type=0x8100)/Dot1Q(vlan=2,type=0x8100)/Dot1Q(vlan=0x1,type=0x0800)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/(\"X\"*80)],iface=\"ens260f0\",count=1)\n+    \n+DUT::\n+    \n+    testpmd> port 0/queue 13: received 1 packets\n+  src=A4:BF:01:4D:6F:32 - dst=00:11:22:33:44:33 - type=0x8100 - length=122 - nb_segs=1 - RSS hash=0x26878aad - RSS queue=0xd - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG  - sw ptype: L2_ETHER_VLAN INNER_L2_ETHER_VLAN INNER_L3_IPV4  - l2_len=18 - inner_l2_len=4 - inner_l3_len=20 - Receive queue=0xd\n+  ol_flags: RTE_MBUF_F_RX_RSS_HASH RTE_MBUF_F_RX_L4_CKSUM_GOOD RTE_MBUF_F_RX_IP_CKSUM_GOOD RTE_MBUF_F_RX_OUTER_L4_CKSUM_GOOD\n+\n+Tester::\n+\n+    >>> sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8100)/Dot1Q(vlan=0x1,type=0x0800)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/(\"X\"*80)],iface=\"ens260f0\",count=1)\n+\n+DUT::  \n+  \n+   testpmd> port 0/queue 13: received 1 packets\n+  src=A4:BF:01:4D:6F:32 - dst=00:11:22:33:44:55 - type=0x8100 - length=122 - nb_segs=1 - RSS hash=0x26878aad - RSS queue=0xd - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG  - sw ptype: L2_ETHER_VLAN INNER_L2_ETHER_VLAN INNER_L3_IPV4  - l2_len=18 - inner_l2_len=4 - inner_l3_len=20 - Receive queue=0xd\n+  ol_flags: RTE_MBUF_F_RX_RSS_HASH RTE_MBUF_F_RX_L4_CKSUM_GOOD RTE_MBUF_F_RX_IP_CKSUM_GOOD RTE_MBUF_F_RX_OUTER_L4_CKSUM_GOOD\n+\n+Tester::\n+\n+    >>> sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=2,type=0x8100)/Dot1Q(vlan=0x2,type=0x0800)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/(\"X\"*80)],iface=\"ens260f0\",count=1)\n+\n+DUT:: \n+\n+   testpmd> port 0/queue 13: received 1 packets\n+  src=A4:BF:01:4D:6F:32 - dst=00:11:22:33:44:55 - type=0x8100 - length=122 - nb_segs=1 - RSS hash=0x26878aad - RSS queue=0xd - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG  - sw ptype: L2_ETHER_VLAN INNER_L2_ETHER_VLAN INNER_L3_IPV4  - l2_len=18 - inner_l2_len=4 - inner_l3_len=20 - Receive queue=0xd\n+  ol_flags: RTE_MBUF_F_RX_RSS_HASH RTE_MBUF_F_RX_L4_CKSUM_GOOD RTE_MBUF_F_RX_IP_CKSUM_GOOD RTE_MBUF_F_RX_OUTER_L4_CKSUM_GOOD\n+\n+Tester::\n+\n+    >>> sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=2,type=0x8100)/Dot1Q(vlan=0x1,type=0x0800)/IP(src=\"192.168.1.3\", dst=\"192.168.1.2\")/(\"X\"*80)],iface=\"ens260f0\",count=1)\n+\n+DUT:: \n+\n+   testpmd> port 0/queue 10: received 1 packets\n+  src=A4:BF:01:4D:6F:32 - dst=00:11:22:33:44:55 - type=0x8100 - length=122 - nb_segs=1 - RSS hash=0xc99a75ba - RSS queue=0xa - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG  - sw ptype: L2_ETHER_VLAN INNER_L2_ETHER_VLAN INNER_L3_IPV4  - l2_len=18 - inner_l2_len=4 - inner_l3_len=20 - Receive queue=0xa\n+  ol_flags: RTE_MBUF_F_RX_RSS_HASH RTE_MBUF_F_RX_L4_CKSUM_GOOD RTE_MBUF_F_RX_IP_CKSUM_GOOD RTE_MBUF_F_RX_OUTER_L4_CKSUM_GOOD\n+\n+6. Destroy a rule and list rules::\n+\n+     testpmd> flow destroy 0 rule 0\n+  \n+   Get the message::\n+\n+     Flow rule #0 destroyed\n+\n+7. Check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   Check the rule not exists in the list.\n+   Send matched packets in step 4, check the action is not right.\n+\n+Test Case 2: MAC_QINQ_IPV6\n+--------------------------\n+The test case enable QINQ switch filter for IPv6 in non-pipeline mode, and port can support as dst MAC + outer VLAN id + inner VLAN id + IPv6.\n+\n+Test Steps\n+~~~~~~~~~~\n+1. Validate a rule::\n+   \n+     testpmd> flow validate 0 ingress pattern eth dst is 00:11:22:33:44:55 / vlan tci is 2 / vlan tci is 1 / ipv6 dst is CDCD:910A:2222:5498:8475:1111:3900:2020 / end actions rss queues 2 3 end / end\n+\n+   Get the message::\n+\n+     Flow rule validated\n+\n+2. Create a rule and list rules::\n+\n+     testpmd> flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / vlan tci is 2 / vlan tci is 1 / ipv6 dst is CDCD:910A:2222:5498:8475:1111:3900:2020 / end actions rss queues 2 3 end / end\n+\n+   Get the message::\n+\n+     Flow rule #0 created\n+   \n+3. Check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   ID      Group   Prio    Attr    Rule\n+   0       0       0       i--     ETH VLAN VLAN IPV6 => RSS\n+\n+4. Send matched packet in scapy on tester, check the DUT received this packet and the action is right::\n+\n+Tester::\n+\n+    >>> sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=2,type=0x8100)/Dot1Q(vlan=0x1,type=0x86DD)/IPv6(dst=\"CDCD:910A:2222:5498:8475:1111:3900:2020\")/(\"X\"*80)],iface=\"ens260f0\",count=1)\n+\n+DUT::\n+\n+    testpmd> port 0/queue 2: received 1 packets\n+  src=00:00:00:00:00:00 - dst=00:11:22:33:44:55 - type=0x8100 - length=142 - nb_segs=1 - RSS hash=0xb0c13d2c - RSS queue=0x2 - hw ptype: L2_ETHER L3_IPV6_EXT_UNKNOWN L4_NONFRAG  - sw ptype: L2_ETHER_VLAN INNER_L2_ETHER_VLAN INNER_L3_IPV6  - l2_len=18 - inner_l2_len=4 - inner_l3_len=40 - Receive queue=0x2\n+  ol_flags: RTE_MBUF_F_RX_RSS_HASH RTE_MBUF_F_RX_L4_CKSUM_GOOD RTE_MBUF_F_RX_IP_CKSUM_GOOD RTE_MBUF_F_RX_OUTER_L4_CKSUM_GOOD\n+\n+5. Send mismatched packet in scapy on tester, check the DUT received this packet and the action is not right::\n+\n+Tester::\n+\n+    >>> sendp([Ether(dst=\"00:11:22:33:44:33\",type=0x8100)/Dot1Q(vlan=2,type=0x8100)/Dot1Q(vlan=0x1,type=0x86DD)/IPv6(dst=\"CDCD:910A:2222:5498:8475:1111:3900:2020\")/(\"X\"*80)],iface=\"ens260f0\",count=1)\n+    \n+DUT::\n+  \n+    testpmd> port 0/queue 12: received 1 packets\n+  src=00:00:00:00:00:00 - dst=00:11:22:33:44:33 - type=0x8100 - length=142 - nb_segs=1 - RSS hash=0xb0c13d2c - RSS queue=0xc - hw ptype: L2_ETHER L3_IPV6_EXT_UNKNOWN L4_NONFRAG  - sw ptype: L2_ETHER_VLAN INNER_L2_ETHER_VLAN INNER_L3_IPV6  - l2_len=18 - inner_l2_len=4 - inner_l3_len=40 - Receive queue=0xc\n+  ol_flags: RTE_MBUF_F_RX_RSS_HASH RTE_MBUF_F_RX_L4_CKSUM_GOOD RTE_MBUF_F_RX_IP_CKSUM_GOOD RTE_MBUF_F_RX_OUTER_L4_CKSUM_GOOD\n+\n+Tester::\n+\n+    >>> sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8100)/Dot1Q(vlan=0x1,type=0x86DD)/IPv6(dst=\"CDCD:910A:2222:5498:8475:1111:3900:2020\")/(\"X\"*80)],iface=\"ens260f0\",count=1)\n+\n+DUT::  \n+  \n+   testpmd> port 0/queue 12: received 1 packets\n+  src=00:00:00:00:00:00 - dst=00:11:22:33:44:55 - type=0x8100 - length=142 - nb_segs=1 - RSS hash=0xb0c13d2c - RSS queue=0xc - hw ptype: L2_ETHER L3_IPV6_EXT_UNKNOWN L4_NONFRAG  - sw ptype: L2_ETHER_VLAN INNER_L2_ETHER_VLAN INNER_L3_IPV6  - l2_len=18 - inner_l2_len=4 - inner_l3_len=40 - Receive queue=0xc\n+  ol_flags: RTE_MBUF_F_RX_RSS_HASH RTE_MBUF_F_RX_L4_CKSUM_GOOD RTE_MBUF_F_RX_IP_CKSUM_GOOD RTE_MBUF_F_RX_OUTER_L4_CKSUM_GOOD\n+\n+Tester::\n+\n+    >>> sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=2,type=0x8100)/Dot1Q(vlan=0x2,type=0x86DD)/IPv6(dst=\"CDCD:910A:2222:5498:8475:1111:3900:2020\")/(\"X\"*80)],iface=\"ens260f0\",count=1)\n+\n+DUT:: \n+ \n+   testpmd> port 0/queue 12: received 1 packets\n+  src=00:00:00:00:00:00 - dst=00:11:22:33:44:55 - type=0x8100 - length=142 - nb_segs=1 - RSS hash=0xb0c13d2c - RSS queue=0xc - hw ptype: L2_ETHER L3_IPV6_EXT_UNKNOWN L4_NONFRAG  - sw ptype: L2_ETHER_VLAN INNER_L2_ETHER_VLAN INNER_L3_IPV6  - l2_len=18 - inner_l2_len=4 - inner_l3_len=40 - Receive queue=0xc\n+  ol_flags: RTE_MBUF_F_RX_RSS_HASH RTE_MBUF_F_RX_L4_CKSUM_GOOD RTE_MBUF_F_RX_IP_CKSUM_GOOD RTE_MBUF_F_RX_OUTER_L4_CKSUM_GOOD\n+  \n+Tester::\n+\n+    >>> sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=2,type=0x8100)/Dot1Q(vlan=0x1,type=0x86DD)/IPv6(dst=\"CDCD:910A:2222:5498:8475:1111:3900:2023\")/(\"X\"*80)],iface=\"ens260f0\",count=1)\n+\n+DUT:: \n+\n+   testpmd> port 0/queue 6: received 1 packets\n+  src=00:00:00:00:00:00 - dst=00:11:22:33:44:55 - type=0x8100 - length=142 - nb_segs=1 - RSS hash=0x63517896 - RSS queue=0x6 - hw ptype: L2_ETHER L3_IPV6_EXT_UNKNOWN L4_NONFRAG  - sw ptype: L2_ETHER_VLAN INNER_L2_ETHER_VLAN INNER_L3_IPV6  - l2_len=18 - inner_l2_len=4 - inner_l3_len=40 - Receive queue=0x6\n+  ol_flags: RTE_MBUF_F_RX_RSS_HASH RTE_MBUF_F_RX_L4_CKSUM_GOOD RTE_MBUF_F_RX_IP_CKSUM_GOOD RTE_MBUF_F_RX_OUTER_L4_CKSUM_GOOD\n+\n+6. Destroy a rule and list rules::\n+\n+     testpmd> flow destroy 0 rule 0\n+  \n+   Get the message::\n+\n+     Flow rule #0 destroyed\n+\n+7. Check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   Check the rule not exists in the list.\n+   Send matched packets in step 4, check the action is not right.\n+\n+Test Case 3: MAC_QINQ_IPV4_UDP\n+------------------------------\n+The test case enable QINQ switch filter for IPv4 + UDP in non-pipeline mode, and port can support as dst MAC + outer VLAN id + inner VLAN id + IPv4 + UDP.\n+\n+Test Steps\n+~~~~~~~~~~\n+1. Validate a rule::\n+   \n+     testpmd> flow validate 0 ingress pattern eth dst is 00:11:22:33:44:55 / vlan tci is 2 / vlan tci is 1 / ipv4 / udp src is 50 dst is 23 / end actions queue index 2 / end\n+\n+   Get the message::\n+\n+     Flow rule validated\n+\n+2. Create a rule and list rules::\n+\n+     testpmd> flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / vlan tci is 2 / vlan tci is 1 / ipv4 / udp src is 50 dst is 23 / end actions queue index 2 / end\n+     \n+   Get the message::\n+\n+     Flow rule #0 created\n+   \n+3. Check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   ID      Group   Prio    Attr    Rule\n+   0       0       0       i--     ETH VLAN VLAN IPV4 UDP => QUEUE\n+\n+4. Send matched packet in scapy on tester, check the DUT received this packet and the action is right::\n+\n+Tester::\n+\n+    >>> sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=2,type=0x8100)/Dot1Q(vlan=0x1,type=0x0800)/IP()/UDP(sport=50,dport=23)/(\"X\"*80)],iface=\"ens260f0\",count=1)\n+\n+DUT::\n+\n+    testpmd> port 0/queue 2: received 1 packets\n+  src=00:00:00:00:00:00 - dst=00:11:22:33:44:55 - type=0x8100 - length=130 - nb_segs=1 - RSS hash=0xddc4fdb3 - RSS queue=0x2 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_UDP  - sw ptype: L2_ETHER_VLAN INNER_L2_ETHER_VLAN INNER_L3_IPV4 INNER_L4_UDP  - l2_len=18 - inner_l2_len=4 - inner_l3_len=20 - inner_l4_len=8 - Receive queue=0x2\n+  ol_flags: RTE_MBUF_F_RX_RSS_HASH RTE_MBUF_F_RX_L4_CKSUM_GOOD RTE_MBUF_F_RX_IP_CKSUM_GOOD RTE_MBUF_F_RX_OUTER_L4_CKSUM_GOOD\n+\n+5. Send mismatched packet in scapy on tester, check the DUT received this packet and the action is not right::\n+\n+Tester::\n+\n+    >>> sendp([Ether(dst=\"00:11:22:33:44:33\",type=0x8100)/Dot1Q(vlan=2,type=0x8100)/Dot1Q(vlan=0x1,type=0x0800)/IP()/UDP(sport=50,dport=23)/(\"X\"*80)],iface=\"ens260f0\",count=1)\n+    \n+DUT::\n+    \n+    testpmd> port 0/queue 3: received 1 packets\n+  src=00:00:00:00:00:00 - dst=00:11:22:33:44:33 - type=0x8100 - length=130 - nb_segs=1 - RSS hash=0xddc4fdb3 - RSS queue=0x3 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_UDP  - sw ptype: L2_ETHER_VLAN INNER_L2_ETHER_VLAN INNER_L3_IPV4 INNER_L4_UDP  - l2_len=18 - inner_l2_len=4 - inner_l3_len=20 - inner_l4_len=8 - Receive queue=0x3\n+  ol_flags: RTE_MBUF_F_RX_RSS_HASH RTE_MBUF_F_RX_L4_CKSUM_GOOD RTE_MBUF_F_RX_IP_CKSUM_GOOD RTE_MBUF_F_RX_OUTER_L4_CKSUM_GOOD\n+\n+Tester::\n+\n+    >>> sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8100)/Dot1Q(vlan=0x1,type=0x0800)/IP()/UDP(sport=50,dport=23)/(\"X\"*80)],iface=\"ens260f0\",count=1)\n+\n+DUT::  \n+  \n+   testpmd> port 0/queue 3: received 1 packets\n+  src=00:00:00:00:00:00 - dst=00:11:22:33:44:55 - type=0x8100 - length=130 - nb_segs=1 - RSS hash=0xddc4fdb3 - RSS queue=0x3 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_UDP  - sw ptype: L2_ETHER_VLAN INNER_L2_ETHER_VLAN INNER_L3_IPV4 INNER_L4_UDP  - l2_len=18 - inner_l2_len=4 - inner_l3_len=20 - inner_l4_len=8 - Receive queue=0x3\n+  ol_flags: RTE_MBUF_F_RX_RSS_HASH RTE_MBUF_F_RX_L4_CKSUM_GOOD RTE_MBUF_F_RX_IP_CKSUM_GOOD RTE_MBUF_F_RX_OUTER_L4_CKSUM_GOOD\n+\n+Tester::\n+\n+    >>> sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=2,type=0x8100)/Dot1Q(vlan=0x2,type=0x0800)/IP()/UDP(sport=50,dport=23)/(\"X\"*80)],iface=\"ens260f0\",count=1)\n+\n+DUT:: \n+\n+   testpmd> port 0/queue 3: received 1 packets\n+  src=00:00:00:00:00:00 - dst=00:11:22:33:44:55 - type=0x8100 - length=130 - nb_segs=1 - RSS hash=0xddc4fdb3 - RSS queue=0x3 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_UDP  - sw ptype: L2_ETHER_VLAN INNER_L2_ETHER_VLAN INNER_L3_IPV4 INNER_L4_UDP  - l2_len=18 - inner_l2_len=4 - inner_l3_len=20 - inner_l4_len=8 - Receive queue=0x3\n+  ol_flags: RTE_MBUF_F_RX_RSS_HASH RTE_MBUF_F_RX_L4_CKSUM_GOOD RTE_MBUF_F_RX_IP_CKSUM_GOOD RTE_MBUF_F_RX_OUTER_L4_CKSUM_GOOD\n+\n+Tester::\n+\n+    >>> sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=2,type=0x8100)/Dot1Q(vlan=0x1,type=0x0800)/IP()/UDP(sport=50,dport=22)/(\"X\"*80)],iface=\"ens260f0\",count=1)\n+\n+DUT:: \n+\n+   testpmd> port 0/queue 3: received 1 packets\n+  src=00:00:00:00:00:00 - dst=00:11:22:33:44:55 - type=0x8100 - length=130 - nb_segs=1 - RSS hash=0xddc4fdb3 - RSS queue=0x3 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_UDP  - sw ptype: L2_ETHER_VLAN INNER_L2_ETHER_VLAN INNER_L3_IPV4 INNER_L4_UDP  - l2_len=18 - inner_l2_len=4 - inner_l3_len=20 - inner_l4_len=8 - Receive queue=0x3\n+  ol_flags: RTE_MBUF_F_RX_RSS_HASH RTE_MBUF_F_RX_L4_CKSUM_GOOD RTE_MBUF_F_RX_IP_CKSUM_GOOD RTE_MBUF_F_RX_OUTER_L4_CKSUM_GOOD\n+\n+6. Destroy a rule and list rules::\n+\n+     testpmd> flow destroy 0 rule 0\n+  \n+   Get the message::\n+\n+     Flow rule #0 destroyed\n+\n+7. Check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   Check the rule not exists in the list.\n+   Send matched packets in step 4, check the action is not right.\n+\n+Test Case 4: MAC_QINQ_IPV4_TCP\n+------------------------------\n+The test case enable QINQ switch filter for IPv4 + TCP in non-pipeline mode, and port can support as dst MAC + outer VLAN id + inner VLAN id + IPv4 + TCP.\n+\n+Test Steps\n+~~~~~~~~~~\n+1. Validate a rule::\n+   \n+     testpmd> flow validate 0 ingress pattern eth dst is 00:11:22:33:44:55 / vlan tci is 2 / vlan tci is 1 / ipv4 / tcp src is 50 dst is 23 / end actions rss queues 4 5 end / end\n+\n+   Get the message::\n+\n+     Flow rule validated\n+\n+2. Create a rule and list rules::\n+\n+     testpmd> flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / vlan tci is 2 / vlan tci is 1 / ipv4 / tcp src is 50 dst is 23 / end actions rss queues 4 5 end / end\n+     \n+   Get the message::\n+\n+     Flow rule #0 created\n+   \n+3. Check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   ID      Group   Prio    Attr    Rule\n+   0       0       0       i--     ETH VLAN VLAN IPV4 TCP => RSS\n+\n+4. Send matched packet in scapy on tester, check the DUT received this packet and the action is right::\n+\n+Tester::\n+\n+    >>> sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=2,type=0x8100)/Dot1Q(vlan=0x1,type=0x0800)/IP()/TCP(sport=50,dport=23)/(\"X\"*80)],iface=\"ens260f0\",count=1)\n+\n+DUT::\n+\n+    testpmd> port 0/queue 5: received 1 packets\n+  src=00:00:00:00:00:00 - dst=00:11:22:33:44:55 - type=0x8100 - length=142 - nb_segs=1 - RSS hash=0xddc4fdb3 - RSS queue=0x5 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_TCP  - sw ptype: L2_ETHER_VLAN INNER_L2_ETHER_VLAN INNER_L3_IPV4 INNER_L4_TCP  - l2_len=18 - inner_l2_len=4 - inner_l3_len=20 - inner_l4_len=20 - Receive queue=0x5\n+  ol_flags: RTE_MBUF_F_RX_RSS_HASH RTE_MBUF_F_RX_L4_CKSUM_GOOD RTE_MBUF_F_RX_IP_CKSUM_GOOD RTE_MBUF_F_RX_OUTER_L4_CKSUM_GOOD\n+\n+5. Send mismatched packet in scapy on tester, check the DUT received this packet and the action is not right::\n+\n+Tester::\n+\n+    >>> sendp([Ether(dst=\"00:11:22:33:44:33\",type=0x8100)/Dot1Q(vlan=2,type=0x8100)/Dot1Q(vlan=0x1,type=0x0800)/IP()/TCP(sport=50,dport=23)/(\"X\"*80)],iface=\"ens260f0\",count=1)\n+    \n+DUT::\n+    \n+    testpmd> port 0/queue 3: received 1 packets\n+  src=00:00:00:00:00:00 - dst=00:11:22:33:44:33 - type=0x8100 - length=142 - nb_segs=1 - RSS hash=0xddc4fdb3 - RSS queue=0x3 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_TCP  - sw ptype: L2_ETHER_VLAN INNER_L2_ETHER_VLAN INNER_L3_IPV4 INNER_L4_TCP  - l2_len=18 - inner_l2_len=4 - inner_l3_len=20 - inner_l4_len=20 - Receive queue=0x3\n+  ol_flags: RTE_MBUF_F_RX_RSS_HASH RTE_MBUF_F_RX_L4_CKSUM_GOOD RTE_MBUF_F_RX_IP_CKSUM_GOOD RTE_MBUF_F_RX_OUTER_L4_CKSUM_GOOD\n+\n+Tester::\n+\n+    >>> sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8100)/Dot1Q(vlan=0x1,type=0x0800)/IP()/TCP(sport=50,dport=23)/(\"X\"*80)],iface=\"ens260f0\",count=1)\n+\n+DUT::  \n+  \n+   testpmd> port 0/queue 3: received 1 packets\n+  src=00:00:00:00:00:00 - dst=00:11:22:33:44:55 - type=0x8100 - length=142 - nb_segs=1 - RSS hash=0xddc4fdb3 - RSS queue=0x3 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_TCP  - sw ptype: L2_ETHER_VLAN INNER_L2_ETHER_VLAN INNER_L3_IPV4 INNER_L4_TCP  - l2_len=18 - inner_l2_len=4 - inner_l3_len=20 - inner_l4_len=20 - Receive queue=0x3\n+  ol_flags: RTE_MBUF_F_RX_RSS_HASH RTE_MBUF_F_RX_L4_CKSUM_GOOD RTE_MBUF_F_RX_IP_CKSUM_GOOD RTE_MBUF_F_RX_OUTER_L4_CKSUM_GOOD\n+\n+Tester::\n+\n+    >>> sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=2,type=0x8100)/Dot1Q(vlan=0x2,type=0x0800)/IP()/TCP(sport=50,dport=23)/(\"X\"*80)],iface=\"ens260f0\",count=1)\n+\n+DUT:: \n+\n+   testpmd> port 0/queue 3: received 1 packets\n+  src=00:00:00:00:00:00 - dst=00:11:22:33:44:55 - type=0x8100 - length=142 - nb_segs=1 - RSS hash=0xddc4fdb3 - RSS queue=0x3 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_TCP  - sw ptype: L2_ETHER_VLAN INNER_L2_ETHER_VLAN INNER_L3_IPV4 INNER_L4_TCP  - l2_len=18 - inner_l2_len=4 - inner_l3_len=20 - inner_l4_len=20 - Receive queue=0x3\n+  ol_flags: RTE_MBUF_F_RX_RSS_HASH RTE_MBUF_F_RX_L4_CKSUM_GOOD RTE_MBUF_F_RX_IP_CKSUM_GOOD RTE_MBUF_F_RX_OUTER_L4_CKSUM_GOOD\n+\n+Tester::\n+\n+    >>> sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=2,type=0x8100)/Dot1Q(vlan=0x1,type=0x0800)/IP()/TCP(sport=50,dport=22)/(\"X\"*80)],iface=\"ens260f0\",count=1)\n+\n+DUT:: \n+\n+   testpmd> port 0/queue 3: received 1 packets\n+  src=00:00:00:00:00:00 - dst=00:11:22:33:44:55 - type=0x8100 - length=142 - nb_segs=1 - RSS hash=0xddc4fdb3 - RSS queue=0x3 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_TCP  - sw ptype: L2_ETHER_VLAN INNER_L2_ETHER_VLAN INNER_L3_IPV4 INNER_L4_TCP  - l2_len=18 - inner_l2_len=4 - inner_l3_len=20 - inner_l4_len=20 - Receive queue=0x3\n+  ol_flags: RTE_MBUF_F_RX_RSS_HASH RTE_MBUF_F_RX_L4_CKSUM_GOOD RTE_MBUF_F_RX_IP_CKSUM_GOOD RTE_MBUF_F_RX_OUTER_L4_CKSUM_GOOD\n+\n+6. Destroy a rule and list rules::\n+\n+     testpmd> flow destroy 0 rule 0\n+  \n+   Get the message::\n+\n+     Flow rule #0 destroyed\n+\n+7. Check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   Check the rule not exists in the list.\n+   Send matched packets in step 4, check the action is not right.\n+\n+#Pipeline mode\n+\n+Test Case 5: MAC_QINQ_IPV6_UDP\n+------------------------------\n+The test case enable QINQ switch filter for IPv6 + UDP in pipeline mode, and port can support as dst MAC + outer VLAN id + inner VLAN id + IPv6 + UDP.\n+\n+Test Steps\n+~~~~~~~~~~\n+1. Validate a rule::\n+   \n+     testpmd> flow validate 0 priority 0 ingress pattern eth dst is 00:11:22:33:44:55 / vlan tci is 2 / vlan tci is 1 / ipv6 dst is CDCD:910A:2222:5498:8475:1111:3900:2020 / udp src is 50 dst is 23 / end actions drop / end\n+\n+   Get the message::\n+\n+     Flow rule validated\n+\n+2. Create a rule and list rules::\n+\n+     testpmd> flow create 0 priority 0 ingress pattern eth dst is 00:11:22:33:44:55 / vlan tci is 2 / vlan tci is 1 / ipv6 dst is CDCD:910A:2222:5498:8475:1111:3900:2020 / udp src is 50 dst is 23 / end actions drop / end\n+\n+   Get the message::\n+\n+     Flow rule #0 created\n+   \n+3. Check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   ID      Group   Prio    Attr    Rule\n+   0       0       0       i--     ETH VLAN VLAN IPV6 UDP => DROP\n+\n+4. Send matched packet in scapy on tester, check the DUT received this packet and the action is right::\n+\n+Tester::\n+\n+    >>> sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=2,type=0x8100)/Dot1Q(vlan=0x1,type=0x86DD)/IPv6(dst=\"CDCD:910A:2222:5498:8475:1111:3900:2020\")/UDP(sport=50,dport=23)/(\"X\"*80)],iface=\"ens260f0\",count=1)\n+\n+DUT::\n+\n+    testpmd> \n+\n+5. Send mismatched packet in scapy on tester, check the DUT received this packet and the action is not right::\n+\n+Tester::\n+\n+    >>> sendp([Ether(dst=\"00:11:22:33:44:33\",type=0x8100)/Dot1Q(vlan=2,type=0x8100)/Dot1Q(vlan=0x1,type=0x86DD)/IPv6(dst=\"CDCD:910A:2222:5498:8475:1111:3900:2020\")/UDP(sport=50,dport=23)/(\"X\"*80)],iface=\"ens260f0\",count=1)\n+    \n+DUT::\n+  \n+    testpmd> port 0/queue 15: received 1 packets\n+  src=00:00:00:00:00:00 - dst=00:11:22:33:44:33 - type=0x8100 - length=150 - nb_segs=1 - RSS hash=0xc5dfbe3f - RSS queue=0xf - hw ptype: L2_ETHER L3_IPV6_EXT_UNKNOWN L4_UDP  - sw ptype: L2_ETHER_VLAN INNER_L2_ETHER_VLAN INNER_L3_IPV6 INNER_L4_UDP  - l2_len=18 - inner_l2_len=4 - inner_l3_len=40 - inner_l4_len=8 - Receive queue=0xf\n+  ol_flags: RTE_MBUF_F_RX_RSS_HASH RTE_MBUF_F_RX_L4_CKSUM_GOOD RTE_MBUF_F_RX_IP_CKSUM_GOOD RTE_MBUF_F_RX_OUTER_L4_CKSUM_GOOD\n+\n+Tester::\n+\n+    >>> sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8100)/Dot1Q(vlan=0x1,type=0x86DD)/IPv6(dst=\"CDCD:910A:2222:5498:8475:1111:3900:2020\")/UDP(sport=50,dport=23)/(\"X\"*80)],iface=\"ens260f0\",count=1)\n+\n+DUT::  \n+  \n+   testpmd> port 0/queue 15: received 1 packets\n+  src=00:00:00:00:00:00 - dst=00:11:22:33:44:55 - type=0x8100 - length=150 - nb_segs=1 - RSS hash=0xc5dfbe3f - RSS queue=0xf - hw ptype: L2_ETHER L3_IPV6_EXT_UNKNOWN L4_UDP  - sw ptype: L2_ETHER_VLAN INNER_L2_ETHER_VLAN INNER_L3_IPV6 INNER_L4_UDP  - l2_len=18 - inner_l2_len=4 - inner_l3_len=40 - inner_l4_len=8 - Receive queue=0xf\n+  ol_flags: RTE_MBUF_F_RX_RSS_HASH RTE_MBUF_F_RX_L4_CKSUM_GOOD RTE_MBUF_F_RX_IP_CKSUM_GOOD RTE_MBUF_F_RX_OUTER_L4_CKSUM_GOOD\n+\n+Tester::\n+\n+    >>> sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=2,type=0x8100)/Dot1Q(vlan=0x2,type=0x86DD)/IPv6(dst=\"CDCD:910A:2222:5498:8475:1111:3900:2020\")/UDP(sport=50,dport=23)/(\"X\"*80)],iface=\"ens260f0\",count=1)\n+\n+DUT:: \n+ \n+   testpmd> port 0/queue 15: received 1 packets\n+  src=00:00:00:00:00:00 - dst=00:11:22:33:44:55 - type=0x8100 - length=150 - nb_segs=1 - RSS hash=0xc5dfbe3f - RSS queue=0xf - hw ptype: L2_ETHER L3_IPV6_EXT_UNKNOWN L4_UDP  - sw ptype: L2_ETHER_VLAN INNER_L2_ETHER_VLAN INNER_L3_IPV6 INNER_L4_UDP  - l2_len=18 - inner_l2_len=4 - inner_l3_len=40 - inner_l4_len=8 - Receive queue=0xf\n+  ol_flags: RTE_MBUF_F_RX_RSS_HASH RTE_MBUF_F_RX_L4_CKSUM_GOOD RTE_MBUF_F_RX_IP_CKSUM_GOOD RTE_MBUF_F_RX_OUTER_L4_CKSUM_GOOD\n+  \n+Tester::\n+\n+    >>> sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=2,type=0x8100)/Dot1Q(vlan=0x1,type=0x86DD)/IPv6(dst=\"CDCD:910A:2222:5498:8475:1111:3900:2020\")/UDP(sport=50,dport=22)/(\"X\"*80)],iface=\"ens260f0\",count=1)\n+\n+DUT:: \n+\n+   testpmd> port 0/queue 15: received 1 packets\n+  src=00:00:00:00:00:00 - dst=00:11:22:33:44:55 - type=0x8100 - length=150 - nb_segs=1 - RSS hash=0xc5dfbe3f - RSS queue=0xf - hw ptype: L2_ETHER L3_IPV6_EXT_UNKNOWN L4_UDP  - sw ptype: L2_ETHER_VLAN INNER_L2_ETHER_VLAN INNER_L3_IPV6 INNER_L4_UDP  - l2_len=18 - inner_l2_len=4 - inner_l3_len=40 - inner_l4_len=8 - Receive queue=0xf\n+  ol_flags: RTE_MBUF_F_RX_RSS_HASH RTE_MBUF_F_RX_L4_CKSUM_GOOD RTE_MBUF_F_RX_IP_CKSUM_GOOD RTE_MBUF_F_RX_OUTER_L4_CKSUM_GOOD\n+\n+6. Destroy a rule and list rules::\n+\n+     testpmd> flow destroy 0 rule 0\n+  \n+   Get the message::\n+\n+     Flow rule #0 destroyed\n+\n+7. Check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   Check the rule not exists in the list.\n+   Send matched packets in step 4, check the action is not right.\n+\n+Test Case 6: MAC_QINQ_IPV6_TCP\n+------------------------------\n+The test case enable QINQ switch filter for IPv6 + TCP in pipeline mode, and port can support as dst MAC + outer VLAN id + inner VLAN id + IPv6 + TCP.\n+\n+Test Steps\n+~~~~~~~~~~\n+1. Validate a rule::\n+   \n+     testpmd> flow validate 0 priority 0 ingress pattern eth dst is 00:11:22:33:44:55 / vlan tci is 2 / vlan tci is 1 / ipv6 dst is CDCD:910A:2222:5498:8475:1111:3900:2020 / tcp src is 50 dst is 23 / end actions queue index 7 / end\n+\n+   Get the message::\n+\n+     Flow rule validated\n+\n+2. Create a rule and list rules::\n+\n+     testpmd> flow create 0 priority 0 ingress pattern eth dst is 00:11:22:33:44:55 / vlan tci is 2 / vlan tci is 1 / ipv6 dst is CDCD:910A:2222:5498:8475:1111:3900:2020 / tcp src is 50 dst is 23 / end actions queue index 7 / end\n+\n+   Get the message::\n+\n+     Flow rule #0 created\n+   \n+3. Check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   ID      Group   Prio    Attr    Rule\n+   0       0       0       i--     ETH VLAN VLAN IPV6 TCP => QUEUE\n+\n+4. Send matched packet in scapy on tester, check the DUT received this packet and the action is right::\n+\n+Tester::\n+\n+    >>> sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=2,type=0x8100)/Dot1Q(vlan=0x1,type=0x86DD)/IPv6(dst=\"CDCD:910A:2222:5498:8475:1111:3900:2020\")/TCP(sport=50,dport=23)/(\"X\"*80)],iface=\"ens260f0\",count=1)\n+\n+DUT::\n+\n+    testpmd> port 0/queue 7: received 1 packets\n+  src=00:00:00:00:00:00 - dst=00:11:22:33:44:55 - type=0x8100 - length=162 - nb_segs=1 - RSS hash=0xc5dfbe3f - RSS queue=0x7 - hw ptype: L2_ETHER L3_IPV6_EXT_UNKNOWN L4_TCP  - sw ptype: L2_ETHER_VLAN INNER_L2_ETHER_VLAN INNER_L3_IPV6 INNER_L4_TCP  - l2_len=18 - inner_l2_len=4 - inner_l3_len=40 - inner_l4_len=20 - Receive queue=0x7\n+  ol_flags: RTE_MBUF_F_RX_RSS_HASH RTE_MBUF_F_RX_L4_CKSUM_GOOD RTE_MBUF_F_RX_IP_CKSUM_GOOD RTE_MBUF_F_RX_OUTER_L4_CKSUM_GOOD\n+\n+5. Send mismatched packet in scapy on tester, check the DUT received this packet and the action is not right::\n+\n+Tester::\n+\n+    >>> sendp([Ether(dst=\"00:11:22:33:44:33\",type=0x8100)/Dot1Q(vlan=2,type=0x8100)/Dot1Q(vlan=0x1,type=0x86DD)/IPv6(dst=\"CDCD:910A:2222:5498:8475:1111:3900:2020\")/TCP(sport=50,dport=23)/(\"X\"*80)],iface=\"ens260f0\",count=1)\n+    \n+DUT::\n+  \n+    testpmd> port 0/queue 15: received 1 packets\n+  src=00:00:00:00:00:00 - dst=00:11:22:33:44:33 - type=0x8100 - length=162 - nb_segs=1 - RSS hash=0xc5dfbe3f - RSS queue=0xf - hw ptype: L2_ETHER L3_IPV6_EXT_UNKNOWN L4_TCP  - sw ptype: L2_ETHER_VLAN INNER_L2_ETHER_VLAN INNER_L3_IPV6 INNER_L4_TCP  - l2_len=18 - inner_l2_len=4 - inner_l3_len=40 - inner_l4_len=20 - Receive queue=0xf\n+  ol_flags: RTE_MBUF_F_RX_RSS_HASH RTE_MBUF_F_RX_L4_CKSUM_GOOD RTE_MBUF_F_RX_IP_CKSUM_GOOD RTE_MBUF_F_RX_OUTER_L4_CKSUM_GOOD\n+\n+Tester::\n+\n+    >>> sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8100)/Dot1Q(vlan=0x1,type=0x86DD)/IPv6(dst=\"CDCD:910A:2222:5498:8475:1111:3900:2020\")/TCP(sport=50,dport=23)/(\"X\"*80)],iface=\"ens260f0\",count=1)\n+\n+DUT::  \n+  \n+   testpmd> port 0/queue 15: received 1 packets\n+  src=00:00:00:00:00:00 - dst=00:11:22:33:44:55 - type=0x8100 - length=162 - nb_segs=1 - RSS hash=0xc5dfbe3f - RSS queue=0xf - hw ptype: L2_ETHER L3_IPV6_EXT_UNKNOWN L4_TCP  - sw ptype: L2_ETHER_VLAN INNER_L2_ETHER_VLAN INNER_L3_IPV6 INNER_L4_TCP  - l2_len=18 - inner_l2_len=4 - inner_l3_len=40 - inner_l4_len=20 - Receive queue=0xf\n+  ol_flags: RTE_MBUF_F_RX_RSS_HASH RTE_MBUF_F_RX_L4_CKSUM_GOOD RTE_MBUF_F_RX_IP_CKSUM_GOOD RTE_MBUF_F_RX_OUTER_L4_CKSUM_GOOD\n+\n+Tester::\n+\n+    >>> sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=2,type=0x8100)/Dot1Q(vlan=0x2,type=0x86DD)/IPv6(dst=\"CDCD:910A:2222:5498:8475:1111:3900:2020\")/TCP(sport=50,dport=23)/(\"X\"*80)],iface=\"ens260f0\",count=1)\n+\n+DUT:: \n+ \n+   testpmd> port 0/queue 15: received 1 packets\n+  src=00:00:00:00:00:00 - dst=00:11:22:33:44:55 - type=0x8100 - length=162 - nb_segs=1 - RSS hash=0xc5dfbe3f - RSS queue=0xf - hw ptype: L2_ETHER L3_IPV6_EXT_UNKNOWN L4_TCP  - sw ptype: L2_ETHER_VLAN INNER_L2_ETHER_VLAN INNER_L3_IPV6 INNER_L4_TCP  - l2_len=18 - inner_l2_len=4 - inner_l3_len=40 - inner_l4_len=20 - Receive queue=0xf\n+  ol_flags: RTE_MBUF_F_RX_RSS_HASH RTE_MBUF_F_RX_L4_CKSUM_GOOD RTE_MBUF_F_RX_IP_CKSUM_GOOD RTE_MBUF_F_RX_OUTER_L4_CKSUM_GOOD\n+  \n+Tester::\n+\n+    >>> sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=2,type=0x8100)/Dot1Q(vlan=0x1,type=0x86DD)/IPv6(dst=\"CDCD:910A:2222:5498:8475:1111:3900:2020\")/TCP(sport=50,dport=22)/(\"X\"*80)],iface=\"ens260f0\",count=1)\n+\n+DUT:: \n+\n+   testpmd> port 0/queue 15: received 1 packets\n+  src=00:00:00:00:00:00 - dst=00:11:22:33:44:55 - type=0x8100 - length=162 - nb_segs=1 - RSS hash=0xc5dfbe3f - RSS queue=0xf - hw ptype: L2_ETHER L3_IPV6_EXT_UNKNOWN L4_TCP  - sw ptype: L2_ETHER_VLAN INNER_L2_ETHER_VLAN INNER_L3_IPV6 INNER_L4_TCP  - l2_len=18 - inner_l2_len=4 - inner_l3_len=40 - inner_l4_len=20 - Receive queue=0xf\n+  ol_flags: RTE_MBUF_F_RX_RSS_HASH RTE_MBUF_F_RX_L4_CKSUM_GOOD RTE_MBUF_F_RX_IP_CKSUM_GOOD RTE_MBUF_F_RX_OUTER_L4_CKSUM_GOOD\n+\n+6. Destroy a rule and list rules::\n+\n+     testpmd> flow destroy 0 rule 0\n+  \n+   Get the message::\n+\n+     Flow rule #0 destroyed\n+\n+7. Check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   Check the rule not exists in the list.\n+   Send matched packets in step 4, check the action is not right.\n",
    "prefixes": [
        "V1"
    ]
}