get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/114059/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 114059,
    "url": "http://patches.dpdk.org/api/patches/114059/?format=api",
    "web_url": "http://patches.dpdk.org/project/dts/patch/20220720100243.31535-1-songx.jiale@intel.com/",
    "project": {
        "id": 3,
        "url": "http://patches.dpdk.org/api/projects/3/?format=api",
        "name": "DTS",
        "link_name": "dts",
        "list_id": "dts.dpdk.org",
        "list_email": "dts@dpdk.org",
        "web_url": "",
        "scm_url": "git://dpdk.org/tools/dts",
        "webscm_url": "http://git.dpdk.org/tools/dts/",
        "list_archive_url": "https://inbox.dpdk.org/dts",
        "list_archive_url_format": "https://inbox.dpdk.org/dts/{}",
        "commit_url_format": ""
    },
    "msgid": "<20220720100243.31535-1-songx.jiale@intel.com>",
    "list_archive_url": "https://inbox.dpdk.org/dts/20220720100243.31535-1-songx.jiale@intel.com",
    "date": "2022-07-20T10:02:42",
    "name": "[V1,1/2] test_plans/ice_dcf_switch_filter: add case",
    "commit_ref": null,
    "pull_url": null,
    "state": "superseded",
    "archived": false,
    "hash": "bc118c39ced33aebc55829c80b013fcafe84e1ad",
    "submitter": {
        "id": 2352,
        "url": "http://patches.dpdk.org/api/people/2352/?format=api",
        "name": "Jiale, SongX",
        "email": "songx.jiale@intel.com"
    },
    "delegate": null,
    "mbox": "http://patches.dpdk.org/project/dts/patch/20220720100243.31535-1-songx.jiale@intel.com/mbox/",
    "series": [
        {
            "id": 24033,
            "url": "http://patches.dpdk.org/api/series/24033/?format=api",
            "web_url": "http://patches.dpdk.org/project/dts/list/?series=24033",
            "date": "2022-07-20T10:02:42",
            "name": "[V1,1/2] test_plans/ice_dcf_switch_filter: add case",
            "version": 1,
            "mbox": "http://patches.dpdk.org/series/24033/mbox/"
        }
    ],
    "comments": "http://patches.dpdk.org/api/patches/114059/comments/",
    "check": "pending",
    "checks": "http://patches.dpdk.org/api/patches/114059/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dts-bounces@dpdk.org>",
        "X-Original-To": "patchwork@inbox.dpdk.org",
        "Delivered-To": "patchwork@inbox.dpdk.org",
        "Received": [
            "from mails.dpdk.org (mails.dpdk.org [217.70.189.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id 49864A0032;\n\tWed, 20 Jul 2022 03:41:53 +0200 (CEST)",
            "from [217.70.189.124] (localhost [127.0.0.1])\n\tby mails.dpdk.org (Postfix) with ESMTP id 2196640FAE;\n\tWed, 20 Jul 2022 03:41:53 +0200 (CEST)",
            "from mga04.intel.com (mga04.intel.com [192.55.52.120])\n by mails.dpdk.org (Postfix) with ESMTP id 1ED2840697\n for <dts@dpdk.org>; Wed, 20 Jul 2022 03:41:51 +0200 (CEST)",
            "from orsmga008.jf.intel.com ([10.7.209.65])\n by fmsmga104.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 19 Jul 2022 18:41:45 -0700",
            "from unknown (HELO localhost.localdomain) ([10.239.252.94])\n by orsmga008-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 19 Jul 2022 18:41:44 -0700"
        ],
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/simple;\n d=intel.com; i=@intel.com; q=dns/txt; s=Intel;\n t=1658281312; x=1689817312;\n h=from:to:cc:subject:date:message-id;\n bh=y65a7POXZNUfUFbOsVg2ciqHiVT4JoiK4c2bwGT6lc8=;\n b=oFw9cOfk8jBinsI6zXH7dalfvJ5KoGPAOOmNnIS41nIP8hCHKt4WarNy\n 1PHPDqjYRzpObtsO4+BAweThOYHAvpSPz/Cd8JsD0J+zr5dG6yPx6j3z2\n TCDrlU0Y/X0qWoDm5h9QWbLFcBigFcslB1nEGVTEtJ4LujlwKTl6ObMWe\n 1fWp12ulV6haSM2OkpS5HBvGScx18NIjm9xeCFqJVds4ob9ZsWMMDjLK2\n SxeHZS/a4KGqdncz6D4QKj3GHHShoCXk2smzaqek8bjwxNFEQj4CtYBOy\n ysVKzYu8b4VfkkzxdW21je+bcyveG/qfiNRtifyfOQW6xEHC47kyAAppI A==;",
        "X-IronPort-AV": [
            "E=McAfee;i=\"6400,9594,10413\"; a=\"285418952\"",
            "E=Sophos;i=\"5.92,285,1650956400\"; d=\"scan'208\";a=\"285418952\"",
            "E=Sophos;i=\"5.92,285,1650956400\"; d=\"scan'208\";a=\"625446772\""
        ],
        "From": "Jiale Song <songx.jiale@intel.com>",
        "To": "dts@dpdk.org",
        "Cc": "Jiale Song <songx.jiale@intel.com>",
        "Subject": "[dts] [PATCH V1 1/2] test_plans/ice_dcf_switch_filter: add case",
        "Date": "Wed, 20 Jul 2022 10:02:42 +0000",
        "Message-Id": "<20220720100243.31535-1-songx.jiale@intel.com>",
        "X-Mailer": "git-send-email 2.17.1",
        "X-BeenThere": "dts@dpdk.org",
        "X-Mailman-Version": "2.1.29",
        "Precedence": "list",
        "List-Id": "test suite reviews and discussions <dts.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dts>,\n <mailto:dts-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dts/>",
        "List-Post": "<mailto:dts@dpdk.org>",
        "List-Help": "<mailto:dts-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dts>,\n <mailto:dts-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dts-bounces@dpdk.org"
    },
    "content": "add case to test l4 multicast.\n\nSigned-off-by: Jiale Song <songx.jiale@intel.com>\n---\n .../ice_dcf_switch_filter_test_plan.rst       | 366 +++++++++++++++++-\n 1 file changed, 365 insertions(+), 1 deletion(-)",
    "diff": "diff --git a/test_plans/ice_dcf_switch_filter_test_plan.rst b/test_plans/ice_dcf_switch_filter_test_plan.rst\nindex 0d38c218..afc3cc94 100644\n--- a/test_plans/ice_dcf_switch_filter_test_plan.rst\n+++ b/test_plans/ice_dcf_switch_filter_test_plan.rst\n@@ -94,8 +94,12 @@ Pattern and input set\n   |                     | MAC_IPV6_PFCP_SESSION         | [Dest Port], [S-field]                    |\n   +---------------------+-------------------------------+-------------------------------------------+\n   |                     | IP multicast                  | [Dest IP]                                 |\n-  |      multicast      +-------------------------------+-------------------------------------------+\n+  |                     +-------------------------------+-------------------------------------------+\n   |                     | L2 multicast                  | [Dest MAC]                                |\n+  |       multicast     +-------------------------------+-------------------------------------------+\n+  |                     | IPV4/IPV6 + UDP/TCP multicast | [Dest Port]                               |\n+  |                     | VXLAN + UDP/TCP multicast     | [Dest Port]                               |\n+  |                     | NVGRE + UDP/TCP multicast     | [Dest Port]                               |\n   +---------------------+-------------------------------+-------------------------------------------+\n   |                     | ethertype filter_PPPOD        | [Ether type]                              |\n   |                     +-------------------------------+-------------------------------------------+\n@@ -3582,3 +3586,363 @@ Subcase 8:  DCF DROP blend PACKAGES\n \n    check the rules not exist in the list.\n    send matched packets, check port can receive the packet.\n+\n+Subcase 9:  MAC_IPV4_TCP + L4 MASK + drop\n+-----------------------------------------\n+1. validate a rule::\n+\n+     testpmd> flow validate 0 priority 0 ingress pattern eth / ipv4 / tcp src is 2345 src mask 0x0f0f / end actions drop / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create MAC_IPV4_L2TP_PAY rule::\n+\n+     testpmd> flow create 0 priority 0 ingress pattern eth / ipv4 / tcp src is 2345 src mask 0x0f0f / end actions drop / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets::\n+\n+     sendp([Ether(dst={vf1_mac})/IP()/TCP(sport=2313,dport=23)/Raw(\"x\"*80)], iface=\"enp27s0f0\", count=1)\n+     sendp([Ether(dst={vf1_mac})/IP()/TCP(sport=2553,dport=23)/Raw(\"x\"*80)], iface=\"enp27s0f0\", count=1)\n+\n+   check port 1 can't receive the packet.\n+\n+4. send mismatched packets::\n+\n+     sendp([Ether(dst={vf1_mac})/IP(src=\"192.168.0.2\",dst=\"192.168.0.3\",tos=4)/TCP(sport=2344,dport=23)/Raw(\"x\"*80)], iface=\"enp27s0f0\", count=1)\n+     sendp([Ether(dst={vf1_mac})/IP(src=\"192.168.0.2\",dst=\"192.168.0.3\",tos=4)/TCP(sport=2601,dport=23)/Raw(\"x\"*80)], iface=\"enp27s0f0\", count=1)\n+\n+   check port 1 can receive the packet.\n+\n+5. verify rules can be destroyed::\n+\n+     testpmd> flow flush 0\n+     testpmd> flow list 0\n+\n+   check the rules not exist in the list.\n+   send matched packets, check port 1 can receive the packet.\n+\n+Subcase 10:  MAC_IPV6_UDP + L4 MASK + drop\n+------------------------------------------\n+1. validate a rule::\n+\n+     testpmd> flow validate 0 priority 0 ingress pattern eth / ipv6 / udp dst is 3333 dst mask 0x0ff0 / end actions drop / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create MAC_IPV4_L2TP_PAY rule::\n+\n+     testpmd> flow create 0 priority 0 ingress pattern eth / ipv6 / udp dst is 3333 dst mask 0x0ff0 / end actions drop / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets::\n+\n+     sendp([Ether(dst={vf1_mac})/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1515\",dst=\"CDCD:910A:2222:5498:8475:1111:3900:2020\",tc=3)/UDP(sport=10,dport=3328)/Raw(\"x\"*80)], iface=\"enp27s0f0\", count=1)\n+     sendp([Ether(dst={vf1_mac})/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1515\",dst=\"CDCD:910A:2222:5498:8475:1111:3900:2020\",tc=3)/UDP(sport=20,dport=3343)/Raw(\"x\"*80)], iface=\"enp27s0f0\", count=1)\n+\n+   check port 1 can't receive the packet.\n+\n+4. send mismatched packets::\n+\n+     sendp([Ether(dst={vf1_mac})/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1515\",dst=\"CDCD:910A:2222:5498:8475:1111:3900:2020\",tc=3)/UDP(sport=50,dport=3077)/Raw(\"x\"*80)], iface=\"enp27s0f0\", count=1)\n+     sendp([Ether(dst={vf1_mac})/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1515\",dst=\"CDCD:910A:2222:5498:8475:1111:3900:2020\",tc=3)/UDP(sport=50,dport=3349)/Raw(\"x\"*80)], iface=\"enp27s0f0\", count=1)\n+\n+   check port 1 can receive the packet.\n+\n+5. verify rules can be destroyed::\n+\n+     testpmd> flow flush 0\n+     testpmd> flow list 0\n+\n+   check the rules not exist in the list.\n+   send matched packets, check port 1 can receive the packet.\n+\n+Subcase 11:  MAC_IPV4_UDP_VXLAN_MAC_IPV4_TCP + L4 MASK + drop\n+-------------------------------------------------------------\n+1. validate a rule::\n+\n+     testpmd> rx_vxlan_port add 4789 0\n+     testpmd> flow validate 0 priority 0 ingress pattern eth / ipv4 / udp / vxlan / eth / ipv4 / tcp src is 32 src mask 0x0f / end actions drop / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create MAC_IPV4_L2TP_PAY rule::\n+\n+     testpmd> flow create 0 priority 0 ingress pattern eth / ipv4 / udp / vxlan / eth / ipv4 / tcp src is 32 src mask 0x0f / end actions drop / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets::\n+\n+     sendp([Ether(dst={vf1_mac})/IP()/UDP()/VXLAN()/Ether()/IP(src=\"192.168.0.2\", dst=\"192.168.0.3\")/TCP(sport=32,dport=22)/Raw(\"x\"*80)], iface=\"enp27s0f0\", count=1)\n+     sendp([Ether(dst={vf1_mac})/IP()/UDP()/VXLAN()/Ether()/IP(src=\"192.168.0.2\", dst=\"192.168.0.3\")/TCP(sport=16,dport=22)/Raw(\"x\"*80)], iface=\"enp27s0f0\", count=1)\n+\n+   check port 1 can't receive the packet.\n+\n+4. send mismatched packets::\n+\n+     sendp([Ether(dst={vf1_mac})/IP()/UDP()/VXLAN()/Ether()/IP(src=\"192.168.0.2\", dst=\"192.168.0.3\")/TCP(sport=33,dport=22)/Raw(\"x\"*80)], iface=\"enp27s0f0\", count=1)\n+\n+   check port 1 can receive the packet.\n+\n+5. verify rules can be destroyed::\n+\n+     testpmd> flow flush 0\n+     testpmd> flow list 0\n+\n+   check the rules not exist in the list.\n+   send matched packets, check port 1 can receive the packet.\n+\n+Subcase 11:  MAC_IPV4_NVGRE_MAC_IPV4_TCP + L4 MASK + drop\n+---------------------------------------------------------\n+1. validate a rule::\n+\n+     testpmd> flow validate 0 ingress pattern eth / ipv4 dst is 192.168.0.1 / nvgre tni is 0x8 / eth / ipv4 src is 192.168.0.2 dst is 192.168.0.3 / tcp dst is 1280 dst mask 0x00ff / end actions drop / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create MAC_IPV4_L2TP_PAY rule::\n+\n+     testpmd> flow create 0 ingress pattern eth / ipv4 dst is 192.168.0.1 / nvgre tni is 0x8 / eth / ipv4 src is 192.168.0.2 dst is 192.168.0.3 / tcp dst is 1280 dst mask 0x00ff / end actions drop / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets::\n+\n+     sendp([Ether(dst={vf1_mac})/IP(dst=\"192.168.0.1\")/NVGRE(TNI=0x8)/Ether()/IP(src=\"192.168.0.2\", dst=\"192.168.0.3\")/TCP(sport=50,dport=1280)/Raw(\"x\"*80)], iface=\"enp27s0f0\", count=1)\n+     sendp([Ether(dst={vf1_mac})/IP(dst=\"192.168.0.1\")/NVGRE(TNI=0x8)/Ether()/IP(src=\"192.168.0.2\", dst=\"192.168.0.3\")/TCP(sport=50,dport=1536)/Raw(\"x\"*80)], iface=\"enp27s0f0\", count=1)\n+\n+   check port 1 can't receive the packet.\n+\n+4. send mismatched packets::\n+\n+     sendp([Ether(dst={vf1_mac})/IP(dst=\"192.168.0.1\")/NVGRE(TNI=0x8)/Ether()/IP(src=\"192.168.0.2\", dst=\"192.168.0.3\")/TCP(sport=50,dport=1281)/Raw(\"x\"*80)], iface=\"enp27s0f0\", count=1)\n+\n+   check port 1 can receive the packet.\n+\n+5. verify rules can be destroyed::\n+\n+     testpmd> flow flush 0\n+     testpmd> flow list 0\n+\n+   check the rules not exist in the list.\n+   send matched packets, check port 1 can receive the packet.\n+\n+Test case: IPv4/IPv6 + TCP/UDP + L4 MASK\n+========================================\n+Subcase 1:  MAC_IPV4_UDP + L4 MASK + single vf\n+----------------------------------------------\n+1. validate a rule::\n+\n+     testpmd> flow validate 0 priority 0 ingress pattern eth / ipv4 / udp src is 2152 src mask 0xff00 dst is 1281 dst mask 0x00ff / end actions vf id 1 / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create MAC_IPV4_L2TP_PAY rule::\n+\n+     testpmd> flow create 0 priority 0 ingress pattern eth / ipv4 / udp src is 2152 src mask 0xff00 dst is 1281 dst mask 0x00ff / end actions vf id 1 / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets::\n+\n+     sendp([Ether(dst=\"00:11:22:33:44:66\")/IP(src=\"192.168.0.2\",dst=\"192.168.0.3\",tos=4)/UDP(sport=2048,dport=1)/Raw(\"x\"*80)], iface=\"enp27s0f0\", count=1)\n+     sendp([Ether(dst=\"00:11:22:33:44:66\")/IP(src=\"192.168.0.2\",dst=\"192.168.0.3\",tos=4)/UDP(sport=2303,dport=3841)/Raw(\"x\"*80)], iface=\"enp27s0f0\", count=1)\n+\n+   check port 1 receive the packet.\n+\n+4. send mismatched packets::\n+\n+     sendp([Ether(dst=\"00:11:22:33:44:66\")/IP(src=\"192.168.0.2\",dst=\"192.168.0.3\",tos=4)/UDP(sport=2047,dport=2)/Raw(\"x\"*80)], iface=\"enp27s0f0\", count=1)\n+     sendp([Ether(dst=\"00:11:22:33:44:66\")/IP(src=\"192.168.0.2\",dst=\"192.168.0.3\",tos=4)/UDP(sport=2058,dport=3586)/Raw(\"x\"*80)], iface=\"enp27s0f0\", count=1)\n+\n+   check port 1 can not receive the packet.\n+\n+5. verify rules can be destroyed::\n+\n+     testpmd> flow flush 0\n+     testpmd> flow list 0\n+\n+   check the rules not exist in the list.\n+   send matched packets, check port 1 can not receive the packet.\n+\n+Subcase 2:  MAC_IPV6_TCP + L4 MASK + single vf\n+----------------------------------------------\n+1. validate a rule::\n+\n+     testpmd> flow validate 0 priority 0 ingress pattern eth / ipv6 / tcp dst is 3333 dst mask 0x0ff0 / end actions vf id 1 / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create MAC_IPV4_L2TP_PAY rule::\n+\n+     testpmd> flow create 0 priority 0 ingress pattern eth / ipv6 / tcp dst is 3333 dst mask 0x0ff0 / end actions vf id 1 / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets::\n+\n+     sendp([Ether(dst=\"00:11:22:33:44:66\")/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1515\",dst=\"CDCD:910A:2222:5498:8475:1111:3900:2020\",tc=3)/TCP(sport=10,dport=3328)/Raw(\"x\"*80)], iface=\"enp27s0f0\", count=1)\n+     sendp([Ether(dst=\"00:11:22:33:44:66\")/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1515\",dst=\"CDCD:910A:2222:5498:8475:1111:3900:2020\",tc=3)/TCP(sport=20,dport=3343)/Raw(\"x\"*80)], iface=\"enp27s0f0\", count=1)\n+\n+   check port 1 receive the packet.\n+\n+4. send mismatched packets::\n+\n+     sendp([Ether(dst=\"00:11:22:33:44:66\")/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1515\",dst=\"CDCD:910A:2222:5498:8475:1111:3900:2020\",tc=3)/TCP(sport=50,dport=3077)/Raw(\"x\"*80)], iface=\"enp27s0f0\", count=1)\n+     sendp([Ether(dst=\"00:11:22:33:44:66\")/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1515\",dst=\"CDCD:910A:2222:5498:8475:1111:3900:2020\",tc=3)/TCP(sport=50,dport=3349)/Raw(\"x\"*80)], iface=\"enp27s0f0\", count=1)\n+\n+   check port 1 can not receive the packet.\n+\n+5. verify rules can be destroyed::\n+\n+     testpmd> flow flush 0\n+     testpmd> flow list 0\n+\n+   check the rules not exist in the list.\n+   send matched packets, check port 1 can not receive the packet.\n+\n+Subcase 3:  MAC_IPV4_UDP_VXLAN_MAC_IPV4_UDP + L4 MASK + single vf\n+-----------------------------------------------------------------\n+1. validate a rule::\n+\n+     testpmd> rx_vxlan_port add 4789 0\n+     testpmd> flow validate 0 priority 0 ingress pattern eth / ipv4 / udp / vxlan / eth / ipv4 / udp src is 32 src mask 0x0f / end actions vf id 1 / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create MAC_IPV4_L2TP_PAY rule::\n+\n+     testpmd> flow create 0 priority 0 ingress pattern eth / ipv4 / udp / vxlan / eth / ipv4 / udp src is 32 src mask 0x0f / end actions vf id 1 / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets::\n+\n+     sendp([Ether(dst=\"00:11:22:33:44:66\")/IP()/UDP()/VXLAN()/Ether()/IP(src=\"192.168.0.2\", dst=\"192.168.0.3\")/UDP(sport=32,dport=22)/Raw(\"x\"*80)], iface=\"enp27s0f0\", count=1)\n+     sendp([Ether(dst=\"00:11:22:33:44:66\")/IP()/UDP()/VXLAN()/Ether()/IP(src=\"192.168.0.2\", dst=\"192.168.0.3\")/UDP(sport=16,dport=22)/Raw(\"x\"*80)], iface=\"enp27s0f0\", count=1)\n+\n+   check port 1 receive the packet.\n+\n+4. send mismatched packets::\n+\n+     sendp([Ether(dst=\"00:11:22:33:44:66\")/IP()/UDP()/VXLAN()/Ether()/IP(src=\"192.168.0.2\", dst=\"192.168.0.3\")/UDP(sport=33,dport=22)/Raw(\"x\"*80)], iface=\"enp27s0f0\", count=1)\n+\n+   check port 1 can not receive the packet.\n+\n+5. verify rules can be destroyed::\n+\n+     testpmd> flow flush 0\n+     testpmd> flow list 0\n+\n+   check the rules not exist in the list.\n+   send matched packets, check port 1 can not receive the packet.\n+\n+Subcase 4:  MAC_IPV4_NVGRE_MAC_IPV4_UDP + L4 MASK + single vf\n+-------------------------------------------------------------\n+1. validate a rule::\n+\n+     testpmd> flow validate 0 ingress pattern eth / ipv4 dst is 192.168.0.1 / nvgre tni is 0x8 / eth / ipv4 src is 192.168.0.2 dst is 192.168.0.3 / udp src is 1280 src mask 0x00ff / end actions vf id 1 / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create MAC_IPV4_L2TP_PAY rule::\n+\n+     testpmd> flow create 0 ingress pattern eth / ipv4 dst is 192.168.0.1 / nvgre tni is 0x8 / eth / ipv4 src is 192.168.0.2 dst is 192.168.0.3 / udp src is 1280 src mask 0x00ff / end actions vf id 1 / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets::\n+\n+     sendp([Ether(dst=\"00:11:22:33:44:66\")/IP(dst=\"192.168.0.1\")/NVGRE(TNI=0x8)/Ether()/IP(src=\"192.168.0.2\", dst=\"192.168.0.3\")/UDP(sport=1280)/Raw(\"x\"*80)], iface=\"enp27s0f0\", count=1)\n+     sendp([Ether(dst=\"00:11:22:33:44:66\")/IP(dst=\"192.168.0.1\")/NVGRE(TNI=0x8)/Ether()/IP(src=\"192.168.0.2\", dst=\"192.168.0.3\")/UDP(sport=1536)/Raw(\"x\"*80)], iface=\"enp27s0f0\", count=1)\n+\n+   check port 1 receive the packet.\n+\n+4. send mismatched packets::\n+\n+     sendp([Ether(dst=\"00:11:22:33:44:66\")/IP(dst=\"192.168.0.1\")/NVGRE(TNI=0x8)/Ether()/IP(src=\"192.168.0.2\", dst=\"192.168.0.3\")/UDP(sport=1281)/Raw(\"x\"*80)], iface=\"enp27s0f0\", count=1)\n+\n+   check port 1 can not receive the packet.\n+\n+5. verify rules can be destroyed::\n+\n+     testpmd> flow flush 0\n+     testpmd> flow list 0\n+\n+   check the rules not exist in the list.\n+   send matched packets, check port 1 can not receive the packet.\n\\ No newline at end of file\n",
    "prefixes": [
        "V1",
        "1/2"
    ]
}