get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/117173/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 117173,
    "url": "http://patches.dpdk.org/api/patches/117173/?format=api",
    "web_url": "http://patches.dpdk.org/project/dts/patch/20220930054930.546563-2-ke1.xu@intel.com/",
    "project": {
        "id": 3,
        "url": "http://patches.dpdk.org/api/projects/3/?format=api",
        "name": "DTS",
        "link_name": "dts",
        "list_id": "dts.dpdk.org",
        "list_email": "dts@dpdk.org",
        "web_url": "",
        "scm_url": "git://dpdk.org/tools/dts",
        "webscm_url": "http://git.dpdk.org/tools/dts/",
        "list_archive_url": "https://inbox.dpdk.org/dts",
        "list_archive_url_format": "https://inbox.dpdk.org/dts/{}",
        "commit_url_format": ""
    },
    "msgid": "<20220930054930.546563-2-ke1.xu@intel.com>",
    "list_archive_url": "https://inbox.dpdk.org/dts/20220930054930.546563-2-ke1.xu@intel.com",
    "date": "2022-09-30T05:49:29",
    "name": "[V1,1/2] test_plans/vf_offload: add test cases for tunneling packets",
    "commit_ref": null,
    "pull_url": null,
    "state": "superseded",
    "archived": false,
    "hash": "0d60a3b0754d1f7fc881e0fa92acfd8be4327161",
    "submitter": {
        "id": 2810,
        "url": "http://patches.dpdk.org/api/people/2810/?format=api",
        "name": "Ke Xu",
        "email": "ke1.xu@intel.com"
    },
    "delegate": null,
    "mbox": "http://patches.dpdk.org/project/dts/patch/20220930054930.546563-2-ke1.xu@intel.com/mbox/",
    "series": [
        {
            "id": 24926,
            "url": "http://patches.dpdk.org/api/series/24926/?format=api",
            "web_url": "http://patches.dpdk.org/project/dts/list/?series=24926",
            "date": "2022-09-30T05:49:28",
            "name": "update existing cases and add new cases to validate vf tunneling packets",
            "version": 1,
            "mbox": "http://patches.dpdk.org/series/24926/mbox/"
        }
    ],
    "comments": "http://patches.dpdk.org/api/patches/117173/comments/",
    "check": "pending",
    "checks": "http://patches.dpdk.org/api/patches/117173/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dts-bounces@dpdk.org>",
        "X-Original-To": "patchwork@inbox.dpdk.org",
        "Delivered-To": "patchwork@inbox.dpdk.org",
        "Received": [
            "from mails.dpdk.org (mails.dpdk.org [217.70.189.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id E3FDAA034C;\n\tFri, 30 Sep 2022 07:50:30 +0200 (CEST)",
            "from [217.70.189.124] (localhost [127.0.0.1])\n\tby mails.dpdk.org (Postfix) with ESMTP id DF526427FF;\n\tFri, 30 Sep 2022 07:50:30 +0200 (CEST)",
            "from mga06.intel.com (mga06b.intel.com [134.134.136.31])\n by mails.dpdk.org (Postfix) with ESMTP id C14CE40E5A\n for <dts@dpdk.org>; Fri, 30 Sep 2022 07:50:27 +0200 (CEST)",
            "from fmsmga008.fm.intel.com ([10.253.24.58])\n by orsmga104.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 29 Sep 2022 22:50:22 -0700",
            "from bmca4bf0170a856.sh.intel.com (HELO DPDK-XUKE-LAB.sh.intel.com)\n ([10.67.115.115])\n by fmsmga008.fm.intel.com with ESMTP; 29 Sep 2022 22:50:20 -0700"
        ],
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/simple;\n d=intel.com; i=@intel.com; q=dns/txt; s=Intel;\n t=1664517027; x=1696053027;\n h=from:to:cc:subject:date:message-id:in-reply-to:\n references:mime-version:content-transfer-encoding;\n bh=Khp9XjjaSZZTpBRFqT92wK5HjkZQdfjesYBlThpF/Og=;\n b=Cpq+2iORnQrFus3Z2/6NX+mefHEgPm7ewjBYK5H+7nNRs8Oo2PHo8SgI\n KLehdFQQf+ZkoDbpRxtglSVopq/dxfnWT74mZH+m56UWorB2th3oAZtQQ\n A/xaq7Qymdj7KkEaEOPpxcAI3dWSdtqdXOabBYLuxjx4QtNCH+BpvaNGP\n 4uE5S1lA3qOBeDqEUrvzNjdp6ekwR9sY6JRSSrlWCr3SWgteQL0tJGUfA\n 2ajwgD6VdIIcqZWCRwPKgWH8KjUqPlM2pGvHHho9alH1ZedM8lfKY2c8G\n a62ZLvQatJ2cVTNejHybF9aThRjZUfu7gDUyZr3oP1JgCMMwpYw63TVME Q==;",
        "X-IronPort-AV": [
            "E=McAfee;i=\"6500,9779,10485\"; a=\"363953965\"",
            "E=Sophos;i=\"5.93,357,1654585200\"; d=\"scan'208\";a=\"363953965\"",
            "E=McAfee;i=\"6500,9779,10485\"; a=\"685157255\"",
            "E=Sophos;i=\"5.93,357,1654585200\"; d=\"scan'208\";a=\"685157255\""
        ],
        "X-ExtLoop1": "1",
        "From": "Ke Xu <ke1.xu@intel.com>",
        "To": "dts@dpdk.org",
        "Cc": "qi.fu@intel.com,\n\tlijuan.tu@intel.com,\n\tKe Xu <ke1.xu@intel.com>",
        "Subject": "[DTS][PATCH V1 1/2] test_plans/vf_offload: add test cases for\n tunneling packets",
        "Date": "Fri, 30 Sep 2022 05:49:29 +0000",
        "Message-Id": "<20220930054930.546563-2-ke1.xu@intel.com>",
        "X-Mailer": "git-send-email 2.25.1",
        "In-Reply-To": "<20220930054930.546563-1-ke1.xu@intel.com>",
        "References": "<20220930054930.546563-1-ke1.xu@intel.com>",
        "MIME-Version": "1.0",
        "Content-Transfer-Encoding": "8bit",
        "X-BeenThere": "dts@dpdk.org",
        "X-Mailman-Version": "2.1.29",
        "Precedence": "list",
        "List-Id": "test suite reviews and discussions <dts.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dts>,\n <mailto:dts-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dts/>",
        "List-Post": "<mailto:dts@dpdk.org>",
        "List-Help": "<mailto:dts-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dts>,\n <mailto:dts-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dts-bounces@dpdk.org"
    },
    "content": "DPDK will support outer checksum offload and tunneling TSO in release 22.11,\n this commit is intended to cover the new scenario of test these features.\n\nSigned-off-by: Ke Xu <ke1.xu@intel.com>\n---\n test_plans/vf_offload_test_plan.rst | 226 ++++++++++++++++++++++++++++\n 1 file changed, 226 insertions(+)",
    "diff": "diff --git a/test_plans/vf_offload_test_plan.rst b/test_plans/vf_offload_test_plan.rst\nindex ba490e06..c0a7f850 100644\n--- a/test_plans/vf_offload_test_plan.rst\n+++ b/test_plans/vf_offload_test_plan.rst\n@@ -97,6 +97,96 @@ be validated as pass by the tester.\n The IPv4 source address will not be changed by testpmd.\n \n \n+Test Case: HW tunneling checksum offload check\n+==============================================\n+Start testpmd and enable checksum offload on rx port.\n+\n+Setup the ``csum`` forwarding mode::\n+\n+  testpmd> set fwd csum\n+  Set csum packet forwarding mode\n+\n+Enable the IPv4/UDP/TCP/SCTP HW checksum offload on port 0::\n+\n+  testpmd> port stop all\n+  testpmd> csum set ip hw 0\n+  testpmd> csum set tcp hw 0\n+  testpmd> csum set udp hw 0\n+  testpmd> csum set sctp hw 0\n+  testpmd> csum set outer-ip hw 0\n+  testpmd> csum set outer-udp hw 0\n+  testpmd> csum parse-tunnel on 0\n+  testpmd> port start all\n+  testpmd> set promisc 0 on\n+  testpmd> start\n+    csum packet forwarding - CRC stripping disabled - packets/burst=32\n+    nb forwarding cores=1 - nb forwarding ports=10\n+    RX queues=1 - RX desc=128 - RX free threshold=64\n+    RX threshold registers: pthresh=8 hthresh=8 wthresh=4\n+    TX queues=1 - TX desc=512 - TX free threshold=0\n+    TX threshold registers: pthresh=32 hthresh=8 wthresh=8\n+\n+Configure the traffic generator to send the multiple packets for the following\n+combination with inner package of:\n+\n+  +----------------+----------------------------------------+\n+  | packet type    | packet organization                    |\n+  +================+========================================+\n+  |                | IPv4 / UDP / payload                   |\n+  |                +----------------------------------------+\n+  |                | IPv4 / TCP / payload                   |\n+  |                +----------------------------------------+\n+  | inner packets  | IPv4 / SCTP / payload                  |\n+  | for checksum   +----------------------------------------+\n+  | offload test   | IPv6 / UDP / payload                   |\n+  |                +----------------------------------------+\n+  |                | IPv6 / TCP / payload                   |\n+  |                +----------------------------------------+\n+  |                | IPv6 / SCTP / payload                  |\n+  +----------------+----------------------------------------+\n+\n+And outer or tunneling package of :\n+\n+  +----------------+----------------------------------------+\n+  | packet type    | packet organization                    |\n+  +================+========================================+\n+  |                | Ether / IPv4 / UDP / VXLAN / Ether     |\n+  |                +----------------------------------------+\n+  |                | Ether / IPv6 / UDP / VXLAN / Ether     |\n+  |                +----------------------------------------+\n+  |                | Ether / IPv4 / GRE                     |\n+  | outer and      +----------------------------------------+\n+  | tunneling      | Ether / IPv4 / GRE / Ether             |\n+  | packets        +----------------------------------------+\n+  | for checksum   | Ether / IPv6 / GRE                     |\n+  | offload test   +----------------------------------------+\n+  |                | Ether / IPv6 / GRE / Ether             |\n+  |                +----------------------------------------+\n+  |                | Ether / IPv4 / NVGRE                   |\n+  |                +----------------------------------------+\n+  |                | Ether / IPv4 / NVGRE / Ether           |\n+  |                +----------------------------------------+\n+  |                | Ether / IPv6 / NVGRE                   |\n+  |                +----------------------------------------+\n+  |                | Ether / IPv6 / NVGRE / Ether           |\n+  |                +----------------------------------------+\n+  |                | Ether / IPv4 / UDP / GTPU              |\n+  |                +----------------------------------------+\n+  |                | Ether / IPv6 / UDP / GTPU              |\n+  +----------------+----------------------------------------+\n+  \n+Notice that VxLAN needs DCF to configure, so testing of VxLAN may need to perform\n+on DCF.\n+\n+Send packets with incorrect checksum on outer IPv4, outer UDP (if exists), inner\n+IP, inner L4, verify dpdk can rx it and report the checksum error,\n+verify that the same number of packet are correctly received on the traffic\n+generator side. And IPv4 checksum, TCP checksum, UDP checksum, SCTP checksum need\n+be validated as pass by the tester.\n+\n+The IPv4 source address will not be changed by testpmd.\n+\n+\n Test Case: SW checksum offload check\n ====================================\n \n@@ -167,6 +257,91 @@ and checksum on rx port. The test commands is below::\n   # Enable TSO on tx port\n   testpmd> tso set 800 1\n \n+For tunneling cases, add tunneling support on csum and enable tunnel tso as\n+below::\n+\n+  # Enable hw checksum for tunneling on rx port\n+  testpmd> port stop all\n+  testpmd> csum set outer-ip hw 0\n+  testpmd> csum set outer-udp hw 0\n+  testpmd> csum parse-tunnel on 0\n+  testpmd> port start all\n+  testpmd> tunnel_tso set 800 1\n+\n+Configure the traffic generator to send the multiple packets for the following\n+combination:\n+\n+  +----------------+----------------------------------------+\n+  | packet type    | packet organization                    |\n+  +================+========================================+\n+  |                | Ether / IPv4 / TCP / payload len 128   |\n+  |                +----------------------------------------+\n+  |                | Ether / IPv4 / TCP / payload len 800   |\n+  |                +----------------------------------------+\n+  |                | Ether / IPv4 / TCP / payload len 801   |\n+  |                +----------------------------------------+\n+  |                | Ether / IPv4 / TCP / payload len 1700  |\n+  | non-tunneling  +----------------------------------------+\n+  | packets for    | Ether / IPv4 / TCP / payload len 2500  |\n+  | TSO test       +----------------------------------------+\n+  |                | Ether / IPv6 / TCP / payload len 128   |\n+  |                +----------------------------------------+\n+  |                | Ether / IPv6 / TCP / payload len 800   |\n+  |                +----------------------------------------+\n+  |                | Ether / IPv6 / TCP / payload len 801   |\n+  |                +----------------------------------------+\n+  |                | Ether / IPv6 / TCP / payload len 1700  |\n+  |                +----------------------------------------+\n+  |                | Ether / IPv6 / TCP / payload len 2500  |\n+  +----------------+----------------------------------------+\n+  |                | Ether / IPv4 / UDP / VXLAN / Ether     |\n+  |                +----------------------------------------+\n+  |                | Ether / IPv6 / UDP / VXLAN / Ether     |\n+  |                +----------------------------------------+\n+  |                | Ether / IPv4 / GRE                     |\n+  | outer and      +----------------------------------------+\n+  | tunneling      | Ether / IPv4 / GRE / Ether             |\n+  | packets        +----------------------------------------+\n+  | for tso test   | Ether / IPv6 / GRE                     |\n+  |                +----------------------------------------+\n+  |                | Ether / IPv6 / GRE / Ether             |\n+  |                +----------------------------------------+\n+  |                | Ether / IPv4 / NVGRE                   |\n+  |                +----------------------------------------+\n+  |                | Ether / IPv4 / NVGRE / Ether           |\n+  |                +----------------------------------------+\n+  |                | Ether / IPv6 / NVGRE                   |\n+  |                +----------------------------------------+\n+  |                | Ether / IPv6 / NVGRE / Ether           |\n+  |                +----------------------------------------+\n+  |                | Ether / IPv4 / UDP / GTPU              |\n+  |                +----------------------------------------+\n+  |                | Ether / IPv6 / UDP / GTPU              |\n+  +----------------+----------------------------------------+\n+  |                | IPv4 / TCP / payload len 128           |\n+  |                +----------------------------------------+\n+  |                | IPv4 / TCP / payload len 800           |\n+  |                +----------------------------------------+\n+  |                | IPv4 / TCP / payload len 801           |\n+  |                +----------------------------------------+\n+  |                | IPv4 / TCP / payload len 1700          |\n+  |                +----------------------------------------+\n+  | inner packets  | IPv4 / TCP / payload len 2500          |\n+  | for TSO test   +----------------------------------------+\n+  |                | IPv6 / TCP / payload len 128           |\n+  |                +----------------------------------------+\n+  |                | IPv6 / TCP / payload len 800           |\n+  |                +----------------------------------------+\n+  |                | IPv6 / TCP / payload len 801           |\n+  |                +----------------------------------------+\n+  |                | IPv6 / TCP / payload len 1700          |\n+  |                +----------------------------------------+\n+  |                | IPv6 / TCP / payload len 2500          |\n+  +----------------+----------------------------------------+\n+  \n+Notice that VxLAN needs DCF to configure, so testing of VxLAN may need to perform\n+on DCF.\n+\n \n Test case: csum fwd engine, use TSO\n ===================================\n@@ -210,3 +385,54 @@ Test IPv4() in scapy::\n Test IPv6() in scapy::\n \n     sendp([Ether(dst=\"%s\", src=\"52:00:00:00:00:00\")/IPv6(src=\"FE80:0:0:0:200:1FF:FE00:200\", dst=\"3555:5555:6666:6666:7777:7777:8888:8888\")/UDP(sport=1021,dport=1021)/Raw(load=\"\\x50\"*%s)], iface=\"%s\")\n+\n+\n+Test case: csum fwd engine, use tunnel TSO\n+==========================================\n+\n+.. .............................................................................\n+This test uses ``Scapy`` to send out one large tunneled TCP package. The dut\n+forwards package with tunnel TSO enable on tx port while rx port turns checksum\n+on. After package send out by TSO on tx port, the tester receives multiple small\n+TCP package.\n+\n+Turn off tx port by ethtool on tester::\n+\n+  ethtool -K <tx port> rx off tx off tso off gso off gro off lro off\n+  ip l set <tx port> up\n+\n+Capture package rx port on tester::\n+\n+  tcpdump -n -e -i <rx port> -s 0 -w /tmp/cap\n+\n+Launch the userland ``testpmd`` application on DUT as follows::\n+\n+  testpmd> set verbose 1\n+  # Enable hw checksum on rx port\n+  testpmd> port stop all\n+  testpmd> csum set ip hw 0\n+  testpmd> csum set tcp hw 0\n+  testpmd> csum set udp hw 0\n+  testpmd> csum set sctp hw 0\n+  testpmd> csum set outer-ip hw 0\n+  testpmd> csum set outer-udp hw 0\n+  testpmd> csum parse-tunnel on 0\n+  testpmd> set promisc 0 on\n+  testpmd> port start all\n+\n+  # Enable TSO on tx port\n+  testpmd> tunnel_tso set 800 1\n+  # Set fwd engine and start\n+\n+  testpmd> set fwd csum\n+  testpmd> start\n+\n+Test IPv4() in scapy::\n+\n+  for one_outer_packet in outer_packet_list:\n+    sendp([Ether(dst=\"%s\", src=\"52:00:00:00:00:00\")/one_outer_packet/IP(src=\"192.168.1.1\",dst=\"192.168.1.2\")/UDP(sport=1021,dport=1021)/Raw(load=\"\\x50\"*%s)], iface=\"%s\")\n+\n+Test IPv6() in scapy::\n+\n+  for one_outer_packet in outer_packet_list:\n+    sendp([Ether(dst=\"%s\", src=\"52:00:00:00:00:00\")/one_outer_packet/IPv6(src=\"FE80:0:0:0:200:1FF:FE00:200\", dst=\"3555:5555:6666:6666:7777:7777:8888:8888\")/UDP(sport=1021,dport=1021)/Raw(load=\"\\x50\"*%s)], iface=\"%s\")\n",
    "prefixes": [
        "V1",
        "1/2"
    ]
}