Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/patches/114059/?format=api
http://patches.dpdk.org/api/patches/114059/?format=api", "web_url": "http://patches.dpdk.org/project/dts/patch/20220720100243.31535-1-songx.jiale@intel.com/", "project": { "id": 3, "url": "http://patches.dpdk.org/api/projects/3/?format=api", "name": "DTS", "link_name": "dts", "list_id": "dts.dpdk.org", "list_email": "dts@dpdk.org", "web_url": "", "scm_url": "git://dpdk.org/tools/dts", "webscm_url": "http://git.dpdk.org/tools/dts/", "list_archive_url": "https://inbox.dpdk.org/dts", "list_archive_url_format": "https://inbox.dpdk.org/dts/{}", "commit_url_format": "" }, "msgid": "<20220720100243.31535-1-songx.jiale@intel.com>", "list_archive_url": "https://inbox.dpdk.org/dts/20220720100243.31535-1-songx.jiale@intel.com", "date": "2022-07-20T10:02:42", "name": "[V1,1/2] test_plans/ice_dcf_switch_filter: add case", "commit_ref": null, "pull_url": null, "state": "superseded", "archived": false, "hash": "bc118c39ced33aebc55829c80b013fcafe84e1ad", "submitter": { "id": 2352, "url": "http://patches.dpdk.org/api/people/2352/?format=api", "name": "Jiale, SongX", "email": "songx.jiale@intel.com" }, "delegate": null, "mbox": "http://patches.dpdk.org/project/dts/patch/20220720100243.31535-1-songx.jiale@intel.com/mbox/", "series": [ { "id": 24033, "url": "http://patches.dpdk.org/api/series/24033/?format=api", "web_url": "http://patches.dpdk.org/project/dts/list/?series=24033", "date": "2022-07-20T10:02:42", "name": "[V1,1/2] test_plans/ice_dcf_switch_filter: add case", "version": 1, "mbox": "http://patches.dpdk.org/series/24033/mbox/" } ], "comments": "http://patches.dpdk.org/api/patches/114059/comments/", "check": "pending", "checks": "http://patches.dpdk.org/api/patches/114059/checks/", "tags": {}, "related": [], "headers": { "Return-Path": "<dts-bounces@dpdk.org>", "X-Original-To": "patchwork@inbox.dpdk.org", "Delivered-To": "patchwork@inbox.dpdk.org", "Received": [ "from mails.dpdk.org (mails.dpdk.org [217.70.189.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id 49864A0032;\n\tWed, 20 Jul 2022 03:41:53 +0200 (CEST)", "from [217.70.189.124] (localhost [127.0.0.1])\n\tby mails.dpdk.org (Postfix) with ESMTP id 2196640FAE;\n\tWed, 20 Jul 2022 03:41:53 +0200 (CEST)", "from mga04.intel.com (mga04.intel.com [192.55.52.120])\n by mails.dpdk.org (Postfix) with ESMTP id 1ED2840697\n for <dts@dpdk.org>; Wed, 20 Jul 2022 03:41:51 +0200 (CEST)", "from orsmga008.jf.intel.com ([10.7.209.65])\n by fmsmga104.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 19 Jul 2022 18:41:45 -0700", "from unknown (HELO localhost.localdomain) ([10.239.252.94])\n by orsmga008-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 19 Jul 2022 18:41:44 -0700" ], "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/simple;\n d=intel.com; i=@intel.com; q=dns/txt; s=Intel;\n t=1658281312; x=1689817312;\n h=from:to:cc:subject:date:message-id;\n bh=y65a7POXZNUfUFbOsVg2ciqHiVT4JoiK4c2bwGT6lc8=;\n b=oFw9cOfk8jBinsI6zXH7dalfvJ5KoGPAOOmNnIS41nIP8hCHKt4WarNy\n 1PHPDqjYRzpObtsO4+BAweThOYHAvpSPz/Cd8JsD0J+zr5dG6yPx6j3z2\n TCDrlU0Y/X0qWoDm5h9QWbLFcBigFcslB1nEGVTEtJ4LujlwKTl6ObMWe\n 1fWp12ulV6haSM2OkpS5HBvGScx18NIjm9xeCFqJVds4ob9ZsWMMDjLK2\n SxeHZS/a4KGqdncz6D4QKj3GHHShoCXk2smzaqek8bjwxNFEQj4CtYBOy\n ysVKzYu8b4VfkkzxdW21je+bcyveG/qfiNRtifyfOQW6xEHC47kyAAppI A==;", "X-IronPort-AV": [ "E=McAfee;i=\"6400,9594,10413\"; a=\"285418952\"", "E=Sophos;i=\"5.92,285,1650956400\"; d=\"scan'208\";a=\"285418952\"", "E=Sophos;i=\"5.92,285,1650956400\"; d=\"scan'208\";a=\"625446772\"" ], "From": "Jiale Song <songx.jiale@intel.com>", "To": "dts@dpdk.org", "Cc": "Jiale Song <songx.jiale@intel.com>", "Subject": "[dts] [PATCH V1 1/2] test_plans/ice_dcf_switch_filter: add case", "Date": "Wed, 20 Jul 2022 10:02:42 +0000", "Message-Id": "<20220720100243.31535-1-songx.jiale@intel.com>", "X-Mailer": "git-send-email 2.17.1", "X-BeenThere": "dts@dpdk.org", "X-Mailman-Version": "2.1.29", "Precedence": "list", "List-Id": "test suite reviews and discussions <dts.dpdk.org>", "List-Unsubscribe": "<https://mails.dpdk.org/options/dts>,\n <mailto:dts-request@dpdk.org?subject=unsubscribe>", "List-Archive": "<http://mails.dpdk.org/archives/dts/>", "List-Post": "<mailto:dts@dpdk.org>", "List-Help": "<mailto:dts-request@dpdk.org?subject=help>", "List-Subscribe": "<https://mails.dpdk.org/listinfo/dts>,\n <mailto:dts-request@dpdk.org?subject=subscribe>", "Errors-To": "dts-bounces@dpdk.org" }, "content": "add case to test l4 multicast.\n\nSigned-off-by: Jiale Song <songx.jiale@intel.com>\n---\n .../ice_dcf_switch_filter_test_plan.rst | 366 +++++++++++++++++-\n 1 file changed, 365 insertions(+), 1 deletion(-)", "diff": "diff --git a/test_plans/ice_dcf_switch_filter_test_plan.rst b/test_plans/ice_dcf_switch_filter_test_plan.rst\nindex 0d38c218..afc3cc94 100644\n--- a/test_plans/ice_dcf_switch_filter_test_plan.rst\n+++ b/test_plans/ice_dcf_switch_filter_test_plan.rst\n@@ -94,8 +94,12 @@ Pattern and input set\n | | MAC_IPV6_PFCP_SESSION | [Dest Port], [S-field] |\n +---------------------+-------------------------------+-------------------------------------------+\n | | IP multicast | [Dest IP] |\n- | multicast +-------------------------------+-------------------------------------------+\n+ | +-------------------------------+-------------------------------------------+\n | | L2 multicast | [Dest MAC] |\n+ | multicast +-------------------------------+-------------------------------------------+\n+ | | IPV4/IPV6 + UDP/TCP multicast | [Dest Port] |\n+ | | VXLAN + UDP/TCP multicast | [Dest Port] |\n+ | | NVGRE + UDP/TCP multicast | [Dest Port] |\n +---------------------+-------------------------------+-------------------------------------------+\n | | ethertype filter_PPPOD | [Ether type] |\n | +-------------------------------+-------------------------------------------+\n@@ -3582,3 +3586,363 @@ Subcase 8: DCF DROP blend PACKAGES\n \n check the rules not exist in the list.\n send matched packets, check port can receive the packet.\n+\n+Subcase 9: MAC_IPV4_TCP + L4 MASK + drop\n+-----------------------------------------\n+1. validate a rule::\n+\n+ testpmd> flow validate 0 priority 0 ingress pattern eth / ipv4 / tcp src is 2345 src mask 0x0f0f / end actions drop / end\n+\n+ get the message::\n+\n+ Flow rule validated\n+\n+ check the flow list::\n+\n+ testpmd> flow list 0\n+\n+ check the rule not exists in the list.\n+\n+2. create MAC_IPV4_L2TP_PAY rule::\n+\n+ testpmd> flow create 0 priority 0 ingress pattern eth / ipv4 / tcp src is 2345 src mask 0x0f0f / end actions drop / end\n+ testpmd> flow list 0\n+\n+ check the rule exists in the list.\n+\n+3. send matched packets::\n+\n+ sendp([Ether(dst={vf1_mac})/IP()/TCP(sport=2313,dport=23)/Raw(\"x\"*80)], iface=\"enp27s0f0\", count=1)\n+ sendp([Ether(dst={vf1_mac})/IP()/TCP(sport=2553,dport=23)/Raw(\"x\"*80)], iface=\"enp27s0f0\", count=1)\n+\n+ check port 1 can't receive the packet.\n+\n+4. send mismatched packets::\n+\n+ sendp([Ether(dst={vf1_mac})/IP(src=\"192.168.0.2\",dst=\"192.168.0.3\",tos=4)/TCP(sport=2344,dport=23)/Raw(\"x\"*80)], iface=\"enp27s0f0\", count=1)\n+ sendp([Ether(dst={vf1_mac})/IP(src=\"192.168.0.2\",dst=\"192.168.0.3\",tos=4)/TCP(sport=2601,dport=23)/Raw(\"x\"*80)], iface=\"enp27s0f0\", count=1)\n+\n+ check port 1 can receive the packet.\n+\n+5. verify rules can be destroyed::\n+\n+ testpmd> flow flush 0\n+ testpmd> flow list 0\n+\n+ check the rules not exist in the list.\n+ send matched packets, check port 1 can receive the packet.\n+\n+Subcase 10: MAC_IPV6_UDP + L4 MASK + drop\n+------------------------------------------\n+1. validate a rule::\n+\n+ testpmd> flow validate 0 priority 0 ingress pattern eth / ipv6 / udp dst is 3333 dst mask 0x0ff0 / end actions drop / end\n+\n+ get the message::\n+\n+ Flow rule validated\n+\n+ check the flow list::\n+\n+ testpmd> flow list 0\n+\n+ check the rule not exists in the list.\n+\n+2. create MAC_IPV4_L2TP_PAY rule::\n+\n+ testpmd> flow create 0 priority 0 ingress pattern eth / ipv6 / udp dst is 3333 dst mask 0x0ff0 / end actions drop / end\n+ testpmd> flow list 0\n+\n+ check the rule exists in the list.\n+\n+3. send matched packets::\n+\n+ sendp([Ether(dst={vf1_mac})/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1515\",dst=\"CDCD:910A:2222:5498:8475:1111:3900:2020\",tc=3)/UDP(sport=10,dport=3328)/Raw(\"x\"*80)], iface=\"enp27s0f0\", count=1)\n+ sendp([Ether(dst={vf1_mac})/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1515\",dst=\"CDCD:910A:2222:5498:8475:1111:3900:2020\",tc=3)/UDP(sport=20,dport=3343)/Raw(\"x\"*80)], iface=\"enp27s0f0\", count=1)\n+\n+ check port 1 can't receive the packet.\n+\n+4. send mismatched packets::\n+\n+ sendp([Ether(dst={vf1_mac})/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1515\",dst=\"CDCD:910A:2222:5498:8475:1111:3900:2020\",tc=3)/UDP(sport=50,dport=3077)/Raw(\"x\"*80)], iface=\"enp27s0f0\", count=1)\n+ sendp([Ether(dst={vf1_mac})/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1515\",dst=\"CDCD:910A:2222:5498:8475:1111:3900:2020\",tc=3)/UDP(sport=50,dport=3349)/Raw(\"x\"*80)], iface=\"enp27s0f0\", count=1)\n+\n+ check port 1 can receive the packet.\n+\n+5. verify rules can be destroyed::\n+\n+ testpmd> flow flush 0\n+ testpmd> flow list 0\n+\n+ check the rules not exist in the list.\n+ send matched packets, check port 1 can receive the packet.\n+\n+Subcase 11: MAC_IPV4_UDP_VXLAN_MAC_IPV4_TCP + L4 MASK + drop\n+-------------------------------------------------------------\n+1. validate a rule::\n+\n+ testpmd> rx_vxlan_port add 4789 0\n+ testpmd> flow validate 0 priority 0 ingress pattern eth / ipv4 / udp / vxlan / eth / ipv4 / tcp src is 32 src mask 0x0f / end actions drop / end\n+\n+ get the message::\n+\n+ Flow rule validated\n+\n+ check the flow list::\n+\n+ testpmd> flow list 0\n+\n+ check the rule not exists in the list.\n+\n+2. create MAC_IPV4_L2TP_PAY rule::\n+\n+ testpmd> flow create 0 priority 0 ingress pattern eth / ipv4 / udp / vxlan / eth / ipv4 / tcp src is 32 src mask 0x0f / end actions drop / end\n+ testpmd> flow list 0\n+\n+ check the rule exists in the list.\n+\n+3. send matched packets::\n+\n+ sendp([Ether(dst={vf1_mac})/IP()/UDP()/VXLAN()/Ether()/IP(src=\"192.168.0.2\", dst=\"192.168.0.3\")/TCP(sport=32,dport=22)/Raw(\"x\"*80)], iface=\"enp27s0f0\", count=1)\n+ sendp([Ether(dst={vf1_mac})/IP()/UDP()/VXLAN()/Ether()/IP(src=\"192.168.0.2\", dst=\"192.168.0.3\")/TCP(sport=16,dport=22)/Raw(\"x\"*80)], iface=\"enp27s0f0\", count=1)\n+\n+ check port 1 can't receive the packet.\n+\n+4. send mismatched packets::\n+\n+ sendp([Ether(dst={vf1_mac})/IP()/UDP()/VXLAN()/Ether()/IP(src=\"192.168.0.2\", dst=\"192.168.0.3\")/TCP(sport=33,dport=22)/Raw(\"x\"*80)], iface=\"enp27s0f0\", count=1)\n+\n+ check port 1 can receive the packet.\n+\n+5. verify rules can be destroyed::\n+\n+ testpmd> flow flush 0\n+ testpmd> flow list 0\n+\n+ check the rules not exist in the list.\n+ send matched packets, check port 1 can receive the packet.\n+\n+Subcase 11: MAC_IPV4_NVGRE_MAC_IPV4_TCP + L4 MASK + drop\n+---------------------------------------------------------\n+1. validate a rule::\n+\n+ testpmd> flow validate 0 ingress pattern eth / ipv4 dst is 192.168.0.1 / nvgre tni is 0x8 / eth / ipv4 src is 192.168.0.2 dst is 192.168.0.3 / tcp dst is 1280 dst mask 0x00ff / end actions drop / end\n+\n+ get the message::\n+\n+ Flow rule validated\n+\n+ check the flow list::\n+\n+ testpmd> flow list 0\n+\n+ check the rule not exists in the list.\n+\n+2. create MAC_IPV4_L2TP_PAY rule::\n+\n+ testpmd> flow create 0 ingress pattern eth / ipv4 dst is 192.168.0.1 / nvgre tni is 0x8 / eth / ipv4 src is 192.168.0.2 dst is 192.168.0.3 / tcp dst is 1280 dst mask 0x00ff / end actions drop / end\n+ testpmd> flow list 0\n+\n+ check the rule exists in the list.\n+\n+3. send matched packets::\n+\n+ sendp([Ether(dst={vf1_mac})/IP(dst=\"192.168.0.1\")/NVGRE(TNI=0x8)/Ether()/IP(src=\"192.168.0.2\", dst=\"192.168.0.3\")/TCP(sport=50,dport=1280)/Raw(\"x\"*80)], iface=\"enp27s0f0\", count=1)\n+ sendp([Ether(dst={vf1_mac})/IP(dst=\"192.168.0.1\")/NVGRE(TNI=0x8)/Ether()/IP(src=\"192.168.0.2\", dst=\"192.168.0.3\")/TCP(sport=50,dport=1536)/Raw(\"x\"*80)], iface=\"enp27s0f0\", count=1)\n+\n+ check port 1 can't receive the packet.\n+\n+4. send mismatched packets::\n+\n+ sendp([Ether(dst={vf1_mac})/IP(dst=\"192.168.0.1\")/NVGRE(TNI=0x8)/Ether()/IP(src=\"192.168.0.2\", dst=\"192.168.0.3\")/TCP(sport=50,dport=1281)/Raw(\"x\"*80)], iface=\"enp27s0f0\", count=1)\n+\n+ check port 1 can receive the packet.\n+\n+5. verify rules can be destroyed::\n+\n+ testpmd> flow flush 0\n+ testpmd> flow list 0\n+\n+ check the rules not exist in the list.\n+ send matched packets, check port 1 can receive the packet.\n+\n+Test case: IPv4/IPv6 + TCP/UDP + L4 MASK\n+========================================\n+Subcase 1: MAC_IPV4_UDP + L4 MASK + single vf\n+----------------------------------------------\n+1. validate a rule::\n+\n+ testpmd> flow validate 0 priority 0 ingress pattern eth / ipv4 / udp src is 2152 src mask 0xff00 dst is 1281 dst mask 0x00ff / end actions vf id 1 / end\n+\n+ get the message::\n+\n+ Flow rule validated\n+\n+ check the flow list::\n+\n+ testpmd> flow list 0\n+\n+ check the rule not exists in the list.\n+\n+2. create MAC_IPV4_L2TP_PAY rule::\n+\n+ testpmd> flow create 0 priority 0 ingress pattern eth / ipv4 / udp src is 2152 src mask 0xff00 dst is 1281 dst mask 0x00ff / end actions vf id 1 / end\n+ testpmd> flow list 0\n+\n+ check the rule exists in the list.\n+\n+3. send matched packets::\n+\n+ sendp([Ether(dst=\"00:11:22:33:44:66\")/IP(src=\"192.168.0.2\",dst=\"192.168.0.3\",tos=4)/UDP(sport=2048,dport=1)/Raw(\"x\"*80)], iface=\"enp27s0f0\", count=1)\n+ sendp([Ether(dst=\"00:11:22:33:44:66\")/IP(src=\"192.168.0.2\",dst=\"192.168.0.3\",tos=4)/UDP(sport=2303,dport=3841)/Raw(\"x\"*80)], iface=\"enp27s0f0\", count=1)\n+\n+ check port 1 receive the packet.\n+\n+4. send mismatched packets::\n+\n+ sendp([Ether(dst=\"00:11:22:33:44:66\")/IP(src=\"192.168.0.2\",dst=\"192.168.0.3\",tos=4)/UDP(sport=2047,dport=2)/Raw(\"x\"*80)], iface=\"enp27s0f0\", count=1)\n+ sendp([Ether(dst=\"00:11:22:33:44:66\")/IP(src=\"192.168.0.2\",dst=\"192.168.0.3\",tos=4)/UDP(sport=2058,dport=3586)/Raw(\"x\"*80)], iface=\"enp27s0f0\", count=1)\n+\n+ check port 1 can not receive the packet.\n+\n+5. verify rules can be destroyed::\n+\n+ testpmd> flow flush 0\n+ testpmd> flow list 0\n+\n+ check the rules not exist in the list.\n+ send matched packets, check port 1 can not receive the packet.\n+\n+Subcase 2: MAC_IPV6_TCP + L4 MASK + single vf\n+----------------------------------------------\n+1. validate a rule::\n+\n+ testpmd> flow validate 0 priority 0 ingress pattern eth / ipv6 / tcp dst is 3333 dst mask 0x0ff0 / end actions vf id 1 / end\n+\n+ get the message::\n+\n+ Flow rule validated\n+\n+ check the flow list::\n+\n+ testpmd> flow list 0\n+\n+ check the rule not exists in the list.\n+\n+2. create MAC_IPV4_L2TP_PAY rule::\n+\n+ testpmd> flow create 0 priority 0 ingress pattern eth / ipv6 / tcp dst is 3333 dst mask 0x0ff0 / end actions vf id 1 / end\n+ testpmd> flow list 0\n+\n+ check the rule exists in the list.\n+\n+3. send matched packets::\n+\n+ sendp([Ether(dst=\"00:11:22:33:44:66\")/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1515\",dst=\"CDCD:910A:2222:5498:8475:1111:3900:2020\",tc=3)/TCP(sport=10,dport=3328)/Raw(\"x\"*80)], iface=\"enp27s0f0\", count=1)\n+ sendp([Ether(dst=\"00:11:22:33:44:66\")/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1515\",dst=\"CDCD:910A:2222:5498:8475:1111:3900:2020\",tc=3)/TCP(sport=20,dport=3343)/Raw(\"x\"*80)], iface=\"enp27s0f0\", count=1)\n+\n+ check port 1 receive the packet.\n+\n+4. send mismatched packets::\n+\n+ sendp([Ether(dst=\"00:11:22:33:44:66\")/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1515\",dst=\"CDCD:910A:2222:5498:8475:1111:3900:2020\",tc=3)/TCP(sport=50,dport=3077)/Raw(\"x\"*80)], iface=\"enp27s0f0\", count=1)\n+ sendp([Ether(dst=\"00:11:22:33:44:66\")/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1515\",dst=\"CDCD:910A:2222:5498:8475:1111:3900:2020\",tc=3)/TCP(sport=50,dport=3349)/Raw(\"x\"*80)], iface=\"enp27s0f0\", count=1)\n+\n+ check port 1 can not receive the packet.\n+\n+5. verify rules can be destroyed::\n+\n+ testpmd> flow flush 0\n+ testpmd> flow list 0\n+\n+ check the rules not exist in the list.\n+ send matched packets, check port 1 can not receive the packet.\n+\n+Subcase 3: MAC_IPV4_UDP_VXLAN_MAC_IPV4_UDP + L4 MASK + single vf\n+-----------------------------------------------------------------\n+1. validate a rule::\n+\n+ testpmd> rx_vxlan_port add 4789 0\n+ testpmd> flow validate 0 priority 0 ingress pattern eth / ipv4 / udp / vxlan / eth / ipv4 / udp src is 32 src mask 0x0f / end actions vf id 1 / end\n+\n+ get the message::\n+\n+ Flow rule validated\n+\n+ check the flow list::\n+\n+ testpmd> flow list 0\n+\n+ check the rule not exists in the list.\n+\n+2. create MAC_IPV4_L2TP_PAY rule::\n+\n+ testpmd> flow create 0 priority 0 ingress pattern eth / ipv4 / udp / vxlan / eth / ipv4 / udp src is 32 src mask 0x0f / end actions vf id 1 / end\n+ testpmd> flow list 0\n+\n+ check the rule exists in the list.\n+\n+3. send matched packets::\n+\n+ sendp([Ether(dst=\"00:11:22:33:44:66\")/IP()/UDP()/VXLAN()/Ether()/IP(src=\"192.168.0.2\", dst=\"192.168.0.3\")/UDP(sport=32,dport=22)/Raw(\"x\"*80)], iface=\"enp27s0f0\", count=1)\n+ sendp([Ether(dst=\"00:11:22:33:44:66\")/IP()/UDP()/VXLAN()/Ether()/IP(src=\"192.168.0.2\", dst=\"192.168.0.3\")/UDP(sport=16,dport=22)/Raw(\"x\"*80)], iface=\"enp27s0f0\", count=1)\n+\n+ check port 1 receive the packet.\n+\n+4. send mismatched packets::\n+\n+ sendp([Ether(dst=\"00:11:22:33:44:66\")/IP()/UDP()/VXLAN()/Ether()/IP(src=\"192.168.0.2\", dst=\"192.168.0.3\")/UDP(sport=33,dport=22)/Raw(\"x\"*80)], iface=\"enp27s0f0\", count=1)\n+\n+ check port 1 can not receive the packet.\n+\n+5. verify rules can be destroyed::\n+\n+ testpmd> flow flush 0\n+ testpmd> flow list 0\n+\n+ check the rules not exist in the list.\n+ send matched packets, check port 1 can not receive the packet.\n+\n+Subcase 4: MAC_IPV4_NVGRE_MAC_IPV4_UDP + L4 MASK + single vf\n+-------------------------------------------------------------\n+1. validate a rule::\n+\n+ testpmd> flow validate 0 ingress pattern eth / ipv4 dst is 192.168.0.1 / nvgre tni is 0x8 / eth / ipv4 src is 192.168.0.2 dst is 192.168.0.3 / udp src is 1280 src mask 0x00ff / end actions vf id 1 / end\n+\n+ get the message::\n+\n+ Flow rule validated\n+\n+ check the flow list::\n+\n+ testpmd> flow list 0\n+\n+ check the rule not exists in the list.\n+\n+2. create MAC_IPV4_L2TP_PAY rule::\n+\n+ testpmd> flow create 0 ingress pattern eth / ipv4 dst is 192.168.0.1 / nvgre tni is 0x8 / eth / ipv4 src is 192.168.0.2 dst is 192.168.0.3 / udp src is 1280 src mask 0x00ff / end actions vf id 1 / end\n+ testpmd> flow list 0\n+\n+ check the rule exists in the list.\n+\n+3. send matched packets::\n+\n+ sendp([Ether(dst=\"00:11:22:33:44:66\")/IP(dst=\"192.168.0.1\")/NVGRE(TNI=0x8)/Ether()/IP(src=\"192.168.0.2\", dst=\"192.168.0.3\")/UDP(sport=1280)/Raw(\"x\"*80)], iface=\"enp27s0f0\", count=1)\n+ sendp([Ether(dst=\"00:11:22:33:44:66\")/IP(dst=\"192.168.0.1\")/NVGRE(TNI=0x8)/Ether()/IP(src=\"192.168.0.2\", dst=\"192.168.0.3\")/UDP(sport=1536)/Raw(\"x\"*80)], iface=\"enp27s0f0\", count=1)\n+\n+ check port 1 receive the packet.\n+\n+4. send mismatched packets::\n+\n+ sendp([Ether(dst=\"00:11:22:33:44:66\")/IP(dst=\"192.168.0.1\")/NVGRE(TNI=0x8)/Ether()/IP(src=\"192.168.0.2\", dst=\"192.168.0.3\")/UDP(sport=1281)/Raw(\"x\"*80)], iface=\"enp27s0f0\", count=1)\n+\n+ check port 1 can not receive the packet.\n+\n+5. verify rules can be destroyed::\n+\n+ testpmd> flow flush 0\n+ testpmd> flow list 0\n+\n+ check the rules not exist in the list.\n+ send matched packets, check port 1 can not receive the packet.\n\\ No newline at end of file\n", "prefixes": [ "V1", "1/2" ] }{ "id": 114059, "url": "