get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/115962/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 115962,
    "url": "http://patches.dpdk.org/api/patches/115962/?format=api",
    "web_url": "http://patches.dpdk.org/project/dts/patch/20220906175026.18149-2-songx.jiale@intel.com/",
    "project": {
        "id": 3,
        "url": "http://patches.dpdk.org/api/projects/3/?format=api",
        "name": "DTS",
        "link_name": "dts",
        "list_id": "dts.dpdk.org",
        "list_email": "dts@dpdk.org",
        "web_url": "",
        "scm_url": "git://dpdk.org/tools/dts",
        "webscm_url": "http://git.dpdk.org/tools/dts/",
        "list_archive_url": "https://inbox.dpdk.org/dts",
        "list_archive_url_format": "https://inbox.dpdk.org/dts/{}",
        "commit_url_format": ""
    },
    "msgid": "<20220906175026.18149-2-songx.jiale@intel.com>",
    "list_archive_url": "https://inbox.dpdk.org/dts/20220906175026.18149-2-songx.jiale@intel.com",
    "date": "2022-09-06T17:50:26",
    "name": "[V3,2/2] tests/ice_dcf_switch_filter: add cas",
    "commit_ref": null,
    "pull_url": null,
    "state": "superseded",
    "archived": false,
    "hash": "f4ba96d35ccca773d61df1431d78df482c8a4285",
    "submitter": {
        "id": 2352,
        "url": "http://patches.dpdk.org/api/people/2352/?format=api",
        "name": "Jiale, SongX",
        "email": "songx.jiale@intel.com"
    },
    "delegate": null,
    "mbox": "http://patches.dpdk.org/project/dts/patch/20220906175026.18149-2-songx.jiale@intel.com/mbox/",
    "series": [
        {
            "id": 24555,
            "url": "http://patches.dpdk.org/api/series/24555/?format=api",
            "web_url": "http://patches.dpdk.org/project/dts/list/?series=24555",
            "date": "2022-09-06T17:50:25",
            "name": "[V3,1/2] test_plans/ice_dcf_switch_filter: add case",
            "version": 3,
            "mbox": "http://patches.dpdk.org/series/24555/mbox/"
        }
    ],
    "comments": "http://patches.dpdk.org/api/patches/115962/comments/",
    "check": "success",
    "checks": "http://patches.dpdk.org/api/patches/115962/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dts-bounces@dpdk.org>",
        "X-Original-To": "patchwork@inbox.dpdk.org",
        "Delivered-To": "patchwork@inbox.dpdk.org",
        "Received": [
            "from mails.dpdk.org (mails.dpdk.org [217.70.189.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id 44A34A054A;\n\tTue,  6 Sep 2022 11:35:53 +0200 (CEST)",
            "from [217.70.189.124] (localhost [127.0.0.1])\n\tby mails.dpdk.org (Postfix) with ESMTP id 376ED40695;\n\tTue,  6 Sep 2022 11:35:53 +0200 (CEST)",
            "from mga05.intel.com (mga05.intel.com [192.55.52.43])\n by mails.dpdk.org (Postfix) with ESMTP id AE358400D6\n for <dts@dpdk.org>; Tue,  6 Sep 2022 11:35:51 +0200 (CEST)",
            "from orsmga006.jf.intel.com ([10.7.209.51])\n by fmsmga105.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 06 Sep 2022 02:35:50 -0700",
            "from unknown (HELO localhost.localdomain) ([10.239.252.94])\n by orsmga006-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 06 Sep 2022 02:35:48 -0700"
        ],
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/simple;\n d=intel.com; i=@intel.com; q=dns/txt; s=Intel;\n t=1662456951; x=1693992951;\n h=from:to:cc:subject:date:message-id:in-reply-to: references;\n bh=g8bnV2NmsktLPk3vI6q+PNByW6U+s0LtycBim8JuuBE=;\n b=F9XRabSiwrxuYqizq72LOw1I/bE5bdEPxavL1q6GQzoovK+pGqFvPRRa\n OrqKFy+l0+LiNvLFhpArb3uhSFbmu4hYGLf3aANFNCJapp7qXmusDqLsZ\n m6X33Y0omn/+bb/OdtdQsSczUBBqaEbJ7kbDOos1luC7h/JJhESesvj6W\n axvqZf1wVXtBnb9HM48XaMxtxp8z9RBSNCYIqzFFTsL2ANhge5PmGqexY\n euOvWVxcwCPINfpjyL/xQVRfA7+xo0oaQ+Y7PgLp1nsFusX2SjZo+Izew\n OWHgywTWS994i2o6QaoZO9KoFRkHiTdihb+UDhpCAbsjQ66u8SzU0JJkz A==;",
        "X-IronPort-AV": [
            "E=McAfee;i=\"6500,9779,10461\"; a=\"382844002\"",
            "E=Sophos;i=\"5.93,293,1654585200\"; d=\"scan'208\";a=\"382844002\"",
            "E=Sophos;i=\"5.93,293,1654585200\"; d=\"scan'208\";a=\"591200591\""
        ],
        "From": "Song Jiale <songx.jiale@intel.com>",
        "To": "dts@dpdk.org",
        "Cc": "Song Jiale <songx.jiale@intel.com>",
        "Subject": "[dts] [PATCH V3 2/2] tests/ice_dcf_switch_filter: add cas",
        "Date": "Tue,  6 Sep 2022 17:50:26 +0000",
        "Message-Id": "<20220906175026.18149-2-songx.jiale@intel.com>",
        "X-Mailer": "git-send-email 2.17.1",
        "In-Reply-To": "<20220906175026.18149-1-songx.jiale@intel.com>",
        "References": "<20220906175026.18149-1-songx.jiale@intel.com>",
        "X-BeenThere": "dts@dpdk.org",
        "X-Mailman-Version": "2.1.29",
        "Precedence": "list",
        "List-Id": "test suite reviews and discussions <dts.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dts>,\n <mailto:dts-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dts/>",
        "List-Post": "<mailto:dts@dpdk.org>",
        "List-Help": "<mailto:dts-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dts>,\n <mailto:dts-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dts-bounces@dpdk.org"
    },
    "content": "add case to test l4 mask.\n\nSigned-off-by: Song Jiale <songx.jiale@intel.com>\n---\n tests/TestSuite_ice_dcf_switch_filter.py | 291 ++++++++++++++++++++++-\n 1 file changed, 288 insertions(+), 3 deletions(-)",
    "diff": "diff --git a/tests/TestSuite_ice_dcf_switch_filter.py b/tests/TestSuite_ice_dcf_switch_filter.py\nindex 3c647be6..c3fce696 100644\n--- a/tests/TestSuite_ice_dcf_switch_filter.py\n+++ b/tests/TestSuite_ice_dcf_switch_filter.py\n@@ -1388,6 +1388,145 @@ tv_add_two_rules_with_different_input_set_different_vf_id = {\n     },\n }\n \n+# l4 mask\n+# ipv4/ipv6 + udp/tcp\n+mac_ipv4_udp_l4_mask_scapy_str = {\n+    \"matched\": [\n+        'Ether(dst=\"00:11:22:33:44:66\")/IP(src=\"192.168.0.2\",dst=\"192.168.0.3\",tos=4)/UDP(sport=2048,dport=1)/Raw(\"x\"*80)',\n+    ],\n+    \"mismatched\": [\n+        'Ether(dst=\"00:11:22:33:44:66\")/IP(src=\"192.168.0.2\",dst=\"192.168.0.3\",tos=4)/UDP(sport=2047,dport=2)/Raw(\"x\"*80)',\n+        'Ether(dst=\"00:11:22:33:44:66\")/IP(src=\"192.168.0.2\",dst=\"192.168.0.3\",tos=4)/UDP(sport=2058,dport=3586)/Raw(\"x\"*80)',\n+    ],\n+}\n+tv_mac_ipv4_udp_l4_mask_in_single_vf_01 = {\n+    \"name\": \"tv_mac_ipv4_udp_l4_mask_in_single_vf_01\",\n+    \"rte_flow_pattern\": \"flow create 0 priority 0 ingress pattern eth / ipv4 / udp src spec 2152 src mask 0xff00 dst spec 1281 dst mask 0x00ff / end actions vf id 1 / end\",\n+    \"matched\": {\n+        \"scapy_str\": mac_ipv4_udp_l4_mask_scapy_str[\"matched\"],\n+        \"check_func\": {\n+            \"func\": rfc.check_vf_rx_packets_number,\n+            \"param\": {\"expect_port\": 1, \"expect_queues\": \"null\"},\n+        },\n+        \"expect_results\": {\n+            \"expect_pkts\": len(mac_ipv4_udp_l4_mask_scapy_str[\"matched\"])\n+        },\n+    },\n+    \"mismatched\": {\n+        \"scapy_str\": mac_ipv4_udp_l4_mask_scapy_str[\"mismatched\"],\n+        \"check_func\": {\n+            \"func\": rfc.check_vf_rx_packets_number,\n+            \"param\": {\"expect_port\": 1, \"expect_queues\": \"null\"},\n+        },\n+        \"expect_results\": {\"expect_pkts\": 0},\n+    },\n+}\n+\n+mac_ipv6_udp_l4_mask_scapy_str = {\n+    \"matched\": [\n+        'Ether(dst=\"00:11:22:33:44:66\")/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1515\",dst=\"CDCD:910A:2222:5498:8475:1111:3900:2020\",tc=3)/TCP(sport=10,dport=3328)/Raw(\"x\"*80)',\n+    ],\n+    \"mismatched\": [\n+        'Ether(dst=\"00:11:22:33:44:66\")/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1515\",dst=\"CDCD:910A:2222:5498:8475:1111:3900:2020\",tc=3)/TCP(sport=50,dport=3077)/Raw(\"x\"*80)',\n+        'Ether(dst=\"00:11:22:33:44:66\")/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1515\",dst=\"CDCD:910A:2222:5498:8475:1111:3900:2020\",tc=3)/TCP(sport=50,dport=3349)/Raw(\"x\"*80)',\n+    ],\n+}\n+tv_mac_ipv6_tcp_l4_mask_in_single_vf_02 = {\n+    \"name\": \"tv_mac_ipv6_tcp_l4_mask_in_single_vf_02\",\n+    \"rte_flow_pattern\": \"flow create 0 priority 0 ingress pattern eth / ipv6 / tcp dst spec 3333 dst mask 0x0ff0 / end actions vf id 1 / end\",\n+    \"matched\": {\n+        \"scapy_str\": mac_ipv6_udp_l4_mask_scapy_str[\"matched\"],\n+        \"check_func\": {\n+            \"func\": rfc.check_vf_rx_packets_number,\n+            \"param\": {\"expect_port\": 1, \"expect_queues\": \"null\"},\n+        },\n+        \"expect_results\": {\n+            \"expect_pkts\": len(mac_ipv6_udp_l4_mask_scapy_str[\"matched\"])\n+        },\n+    },\n+    \"mismatched\": {\n+        \"scapy_str\": mac_ipv6_udp_l4_mask_scapy_str[\"mismatched\"],\n+        \"check_func\": {\n+            \"func\": rfc.check_vf_rx_packets_number,\n+            \"param\": {\"expect_port\": 1, \"expect_queues\": \"null\"},\n+        },\n+        \"expect_results\": {\"expect_pkts\": 0},\n+    },\n+}\n+\n+# test vxlan l4 mask\n+mac_ipv4_udp_vxlan_eth_ipv4_udp_l4_mask_scapy_str = {\n+    \"matched\": [\n+        'Ether(dst=\"00:11:22:33:44:66\")/IP()/UDP()/VXLAN()/Ether()/IP(src=\"192.168.0.2\", dst=\"192.168.0.3\")/UDP(sport=16,dport=22)/Raw(\"x\"*80)',\n+    ],\n+    \"mismatched\": [\n+        'Ether(dst=\"00:11:22:33:44:66\")/IP()/UDP()/VXLAN()/Ether()/IP(src=\"192.168.0.2\", dst=\"192.168.0.3\")/UDP(sport=33,dport=22)/Raw(\"x\"*80)'\n+    ],\n+}\n+tv_mac_ipv4_udp_vxlan_eth_ipv4_udp_l4_mask_in_single_vf_03 = {\n+    \"name\": \"tv_mac_ipv4_udp_vxlan_eth_ipv4_udp_l4_mask_in_single_vf_03\",\n+    \"rte_flow_pattern\": \"flow create 0 priority 0 ingress pattern eth / ipv4 / udp / vxlan / eth / ipv4 / udp src spec 32 src mask 0x0f / end actions vf id 1 / end\",\n+    \"matched\": {\n+        \"scapy_str\": mac_ipv4_udp_vxlan_eth_ipv4_udp_l4_mask_scapy_str[\"matched\"],\n+        \"check_func\": {\n+            \"func\": rfc.check_vf_rx_packets_number,\n+            \"param\": {\"expect_port\": 1, \"expect_queues\": \"null\"},\n+        },\n+        \"expect_results\": {\n+            \"expect_pkts\": len(\n+                mac_ipv4_udp_vxlan_eth_ipv4_udp_l4_mask_scapy_str[\"matched\"]\n+            )\n+        },\n+    },\n+    \"mismatched\": {\n+        \"scapy_str\": mac_ipv4_udp_vxlan_eth_ipv4_udp_l4_mask_scapy_str[\"mismatched\"],\n+        \"check_func\": {\n+            \"func\": rfc.check_vf_rx_packets_number,\n+            \"param\": {\"expect_port\": 1, \"expect_queues\": \"null\"},\n+        },\n+        \"expect_results\": {\"expect_pkts\": 0},\n+    },\n+}\n+\n+# test nvgre l4 mask\n+mac_ipv4_nvgre_eth_ipv4_udp_l4_mask_scapy_str = {\n+    \"matched\": [\n+        'Ether(dst=\"00:11:22:33:44:66\")/IP(dst=\"192.168.0.1\")/NVGRE(TNI=0x8)/Ether()/IP(src=\"192.168.0.2\", dst=\"192.168.0.3\")/UDP(sport=1536)/Raw(\"x\"*80)',\n+    ],\n+    \"mismatched\": [\n+        'Ether(dst=\"00:11:22:33:44:66\")/IP(dst=\"192.168.0.1\")/NVGRE(TNI=0x8)/Ether()/IP(src=\"192.168.0.2\", dst=\"192.168.0.3\")/UDP(sport=1281)/Raw(\"x\"*80)',\n+    ],\n+}\n+tv_mac_ipv4_nvgre_eth_ipv4_udp_l4_mask_in_single_vf_04 = {\n+    \"name\": \"tv_mac_ipv4_nvgre_eth_ipv4_udp_l4_mask_in_single_vf_04\",\n+    \"rte_flow_pattern\": \"flow create 0 ingress pattern eth / ipv4 dst is 192.168.0.1 / nvgre tni is 0x8 / eth / ipv4 src is 192.168.0.2 dst is 192.168.0.3 / udp src spec 1280 src mask 0x00ff / end actions vf id 1 / end\",\n+    \"matched\": {\n+        \"scapy_str\": mac_ipv4_nvgre_eth_ipv4_udp_l4_mask_scapy_str[\"matched\"],\n+        \"check_func\": {\n+            \"func\": rfc.check_vf_rx_packets_number,\n+            \"param\": {\"expect_port\": 1, \"expect_queues\": \"null\"},\n+        },\n+        \"expect_results\": {\n+            \"expect_pkts\": len(mac_ipv4_nvgre_eth_ipv4_udp_l4_mask_scapy_str[\"matched\"])\n+        },\n+    },\n+    \"mismatched\": {\n+        \"scapy_str\": mac_ipv4_nvgre_eth_ipv4_udp_l4_mask_scapy_str[\"mismatched\"],\n+        \"check_func\": {\n+            \"func\": rfc.check_vf_rx_packets_number,\n+            \"param\": {\"expect_port\": 1, \"expect_queues\": \"null\"},\n+        },\n+        \"expect_results\": {\"expect_pkts\": 0},\n+    },\n+}\n+\n+tvs_l4_mask = [\n+    tv_mac_ipv4_udp_l4_mask_in_single_vf_01,\n+    tv_mac_ipv6_tcp_l4_mask_in_single_vf_02,\n+    tv_mac_ipv4_udp_vxlan_eth_ipv4_udp_l4_mask_in_single_vf_03,\n+    tv_mac_ipv4_nvgre_eth_ipv4_udp_l4_mask_in_single_vf_04,\n+]\n+\n tv_mac_ipv4_drop = {\n     \"name\": \"tv_mac_ipv4_drop\",\n     \"rte_flow_pattern\": \"flow create 0 priority 0 ingress pattern eth / ipv4 src is 192.168.0.1 / end actions drop / end\",\n@@ -1632,6 +1771,134 @@ tv_mac_blend_pkg_drop = {\n     },\n }\n \n+vf1_mac = \"00:11:22:33:44:55\"\n+mac_ipv4_tcp_l4_mask_scapy_str = {\n+    \"matched\": [\n+        'Ether(dst=\"%s\")/IP()/TCP(sport=2313,dport=23)/Raw(\"x\"*80)' % vf1_mac,\n+    ],\n+    \"mismatched\": [\n+        'Ether(dst=\"%s\")/IP(src=\"192.168.0.2\",dst=\"192.168.0.3\",tos=4)/TCP(sport=2344,dport=23)/Raw(\"x\"*80)'\n+        % vf1_mac,\n+        'Ether(dst=\"%s\")/IP(src=\"192.168.0.2\",dst=\"192.168.0.3\",tos=4)/TCP(sport=2601,dport=23)/Raw(\"x\"*80)'\n+        % vf1_mac,\n+    ],\n+}\n+tv_mac_ipv4_tcp_l4_mask_drop = {\n+    \"name\": \"tv_mac_ipv4_tcp_l4_mask_drop\",\n+    \"rte_flow_pattern\": \"flow create 0 priority 0 ingress pattern eth / ipv4 / tcp src spec 2345 src mask 0x0f0f / end actions drop / end\",\n+    \"matched\": {\n+        \"scapy_str\": mac_ipv4_tcp_l4_mask_scapy_str[\"matched\"],\n+        \"check_func\": {\n+            \"func\": rfc.check_vf_rx_packets_number,\n+            \"param\": {\"expect_port\": 1, \"expect_queues\": \"null\"},\n+        },\n+        \"expect_results\": {\"expect_pkts\": 0},\n+    },\n+    \"mismatched\": {\n+        \"scapy_str\": mac_ipv4_tcp_l4_mask_scapy_str[\"mismatched\"],\n+        \"check_func\": {\n+            \"func\": rfc.check_vf_rx_packets_number,\n+            \"param\": {\"expect_port\": 1, \"expect_queues\": \"null\"},\n+        },\n+        \"expect_results\": {\"expect_pkts\": 2},\n+    },\n+}\n+\n+mac_ipv6_tcp_l4_mask_scapy_str = {\n+    \"matched\": [\n+        'Ether(dst=\"%s\")/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1515\",dst=\"CDCD:910A:2222:5498:8475:1111:3900:2020\",tc=3)/UDP(sport=10,dport=3328)/Raw(\"x\"*80)'\n+        % vf1_mac,\n+    ],\n+    \"mismatched\": [\n+        'Ether(dst=\"%s\")/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1515\",dst=\"CDCD:910A:2222:5498:8475:1111:3900:2020\",tc=3)/UDP(sport=50,dport=3077)/Raw(\"x\"*80)'\n+        % vf1_mac,\n+        'Ether(dst=\"%s\")/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1515\",dst=\"CDCD:910A:2222:5498:8475:1111:3900:2020\",tc=3)/UDP(sport=50,dport=3349)/Raw(\"x\"*80)'\n+        % vf1_mac,\n+    ],\n+}\n+tv_mac_ipv6_udp_l4_mask_drop = {\n+    \"name\": \"tv_mac_ipv6_udp_l4_mask_drop\",\n+    \"rte_flow_pattern\": \"flow create 0 priority 0 ingress pattern eth / ipv6 / udp dst spec 3333 dst mask 0x0ff0 / end actions drop / end\",\n+    \"matched\": {\n+        \"scapy_str\": mac_ipv6_tcp_l4_mask_scapy_str[\"matched\"],\n+        \"check_func\": {\n+            \"func\": rfc.check_vf_rx_packets_number,\n+            \"param\": {\"expect_port\": 1, \"expect_queues\": \"null\"},\n+        },\n+        \"expect_results\": {\"expect_pkts\": 0},\n+    },\n+    \"mismatched\": {\n+        \"scapy_str\": mac_ipv6_tcp_l4_mask_scapy_str[\"mismatched\"],\n+        \"check_func\": {\n+            \"func\": rfc.check_vf_rx_packets_number,\n+            \"param\": {\"expect_port\": 1, \"expect_queues\": \"null\"},\n+        },\n+        \"expect_results\": {\"expect_pkts\": 2},\n+    },\n+}\n+\n+mac_ipv4_udp_vxlan_eth_ipv4_tcp_l4_mask_scapy_str = {\n+    \"matched\": [\n+        'Ether(dst=\"%s\")/IP()/UDP()/VXLAN()/Ether()/IP(src=\"192.168.0.2\", dst=\"192.168.0.3\")/TCP(sport=16,dport=22)/Raw(\"x\"*80)'\n+        % vf1_mac,\n+    ],\n+    \"mismatched\": [\n+        'Ether(dst=\"%s\")/IP()/UDP()/VXLAN()/Ether()/IP(src=\"192.168.0.2\", dst=\"192.168.0.3\")/TCP(sport=33,dport=22)/Raw(\"x\"*80)'\n+        % vf1_mac,\n+    ],\n+}\n+tv_mac_ipv4_udp_vxlan_eth_ipv4_tcp_l4_mask_drop = {\n+    \"name\": \"tv_mac_ipv4_udp_vxlan_eth_ipv4_tcp_l4_mask_drop\",\n+    \"rte_flow_pattern\": \"flow create 0 priority 0 ingress pattern eth / ipv4 / udp / vxlan / eth / ipv4 / tcp src spec 32 src mask 0x0f / end actions drop / end\",\n+    \"matched\": {\n+        \"scapy_str\": mac_ipv4_udp_vxlan_eth_ipv4_tcp_l4_mask_scapy_str[\"matched\"],\n+        \"check_func\": {\n+            \"func\": rfc.check_vf_rx_packets_number,\n+            \"param\": {\"expect_port\": 1, \"expect_queues\": \"null\"},\n+        },\n+        \"expect_results\": {\"expect_pkts\": 0},\n+    },\n+    \"mismatched\": {\n+        \"scapy_str\": mac_ipv4_udp_vxlan_eth_ipv4_tcp_l4_mask_scapy_str[\"mismatched\"],\n+        \"check_func\": {\n+            \"func\": rfc.check_vf_rx_packets_number,\n+            \"param\": {\"expect_port\": 1, \"expect_queues\": \"null\"},\n+        },\n+        \"expect_results\": {\"expect_pkts\": 1},\n+    },\n+}\n+\n+mac_ipv4_nvgre_eth_ipv4_tcp_l4_mask_scapy_str = {\n+    \"matched\": [\n+        'Ether(dst=\"%s\")/IP(dst=\"192.168.0.1\")/NVGRE(TNI=0x8)/Ether()/IP(src=\"192.168.0.2\", dst=\"192.168.0.3\")/TCP(sport=50,dport=1536)/Raw(\"x\"*80)'\n+        % vf1_mac,\n+    ],\n+    \"mismatched\": [\n+        'Ether(dst=\"%s\")/IP(dst=\"192.168.0.1\")/NVGRE(TNI=0x8)/Ether()/IP(src=\"192.168.0.2\", dst=\"192.168.0.3\")/TCP(sport=50,dport=1281)/Raw(\"x\"*80)'\n+        % vf1_mac,\n+    ],\n+}\n+tv_mac_ipv4_nvgre_eth_ipv4_tcp_l4_mask_drop = {\n+    \"name\": \"tv_mac_ipv4_nvgre_eth_ipv4_tcp_l4_mask_drop\",\n+    \"rte_flow_pattern\": \"flow create 0 ingress pattern eth / ipv4 dst is 192.168.0.1 / nvgre tni is 0x8 / eth / ipv4 src is 192.168.0.2 dst is 192.168.0.3 / tcp dst spec 1280 dst mask 0x00ff / end actions drop / end\",\n+    \"matched\": {\n+        \"scapy_str\": mac_ipv4_nvgre_eth_ipv4_tcp_l4_mask_scapy_str[\"matched\"],\n+        \"check_func\": {\n+            \"func\": rfc.check_vf_rx_packets_number,\n+            \"param\": {\"expect_port\": 1, \"expect_queues\": \"null\"},\n+        },\n+        \"expect_results\": {\"expect_pkts\": 0},\n+    },\n+    \"mismatched\": {\n+        \"scapy_str\": mac_ipv4_nvgre_eth_ipv4_tcp_l4_mask_scapy_str[\"mismatched\"],\n+        \"check_func\": {\n+            \"func\": rfc.check_vf_rx_packets_number,\n+            \"param\": {\"expect_port\": 1, \"expect_queues\": \"null\"},\n+        },\n+        \"expect_results\": {\"expect_pkts\": 1},\n+    },\n+}\n+\n sv_mac_test_drop_action = [\n     tv_mac_ipv4_drop,\n     tv_mac_ipv4_mask_drop,\n@@ -1642,6 +1909,10 @@ sv_mac_test_drop_action = [\n     tv_mac_l2tp_drop,\n     tv_mac_esp_drop,\n     tv_mac_blend_pkg_drop,\n+    tv_mac_ipv4_tcp_l4_mask_drop,\n+    tv_mac_ipv6_udp_l4_mask_drop,\n+    tv_mac_ipv4_udp_vxlan_eth_ipv4_tcp_l4_mask_drop,\n+    tv_mac_ipv4_nvgre_eth_ipv4_tcp_l4_mask_drop,\n ]\n \n \n@@ -1719,8 +1990,7 @@ class ICEDCFSwitchFilterTest(TestCase):\n         time.sleep(5)\n \n     def reload_ice(self):\n-        self.dut.send_expect(\"rmmod ice\", \"# \", 15)\n-        self.dut.send_expect(\"modprobe ice\", \"# \", 15)\n+        self.dut.send_expect(\"rmmod ice && modprobe ice\", \"# \", 60)\n \n     def set_up(self):\n         \"\"\"\n@@ -1748,8 +2018,8 @@ class ICEDCFSwitchFilterTest(TestCase):\n         launch testpmd with the command\n         \"\"\"\n         command = self.create_testpmd_command()\n-        out = self.dut.send_expect(command, \"testpmd> \", 15)\n         self.testpmd_status = \"running\"\n+        out = self.dut.send_expect(command, \"testpmd> \", 30)\n         self.dut.send_expect(\"set portlist 1\", \"testpmd> \", 15)\n         self.dut.send_expect(\"set fwd rxonly\", \"testpmd> \", 15)\n         self.dut.send_expect(\"set verbose 1\", \"testpmd> \", 15)\n@@ -2640,6 +2910,7 @@ class ICEDCFSwitchFilterTest(TestCase):\n             'ip link set %s vf 1 mac \"00:11:22:33:44:55\"' % self.pf0_intf, \"# \"\n         )\n         self.launch_testpmd()\n+        self.dut.send_expect(\"rx_vxlan_port add 4789 0\", \"testpmd> \")\n         for pattern in sv_mac_test_drop_action:\n             # validate a rule\n             self.validate_switch_filter_rule(pattern[\"rte_flow_pattern\"])\n@@ -2666,6 +2937,20 @@ class ICEDCFSwitchFilterTest(TestCase):\n             self.dut.send_expect(\"flow flush 0\", \"testpmd> \", 15)\n             self.dut.send_expect(\"clear port stats all\", \"testpmd> \", 15)\n \n+    # l4 mask\n+    def test_l4_mask(self):\n+        self.setup_1pf_vfs_env()\n+        self.dut.send_expect(\n+            \"ip link set %s vf 1 mac 00:11:22:33:44:55\" % self.pf0_intf, \"# \"\n+        )\n+        self.launch_testpmd()\n+        self.dut.send_expect(\"rx_vxlan_port add 4789 0\", \"testpmd> \")\n+        try:\n+            for sub_case in tvs_l4_mask:\n+                self._rte_flow_validate_pattern(sub_case, launch_testpmd=False)\n+        except Exception as ex:\n+            raise ex\n+\n     def tear_down(self):\n         \"\"\"\n         Run after each test case.\n",
    "prefixes": [
        "V3",
        "2/2"
    ]
}