get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/121342/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 121342,
    "url": "http://patches.dpdk.org/api/patches/121342/?format=api",
    "web_url": "http://patches.dpdk.org/project/dts/patch/20221223032232.412042-4-ke1.xu@intel.com/",
    "project": {
        "id": 3,
        "url": "http://patches.dpdk.org/api/projects/3/?format=api",
        "name": "DTS",
        "link_name": "dts",
        "list_id": "dts.dpdk.org",
        "list_email": "dts@dpdk.org",
        "web_url": "",
        "scm_url": "git://dpdk.org/tools/dts",
        "webscm_url": "http://git.dpdk.org/tools/dts/",
        "list_archive_url": "https://inbox.dpdk.org/dts",
        "list_archive_url_format": "https://inbox.dpdk.org/dts/{}",
        "commit_url_format": ""
    },
    "msgid": "<20221223032232.412042-4-ke1.xu@intel.com>",
    "list_archive_url": "https://inbox.dpdk.org/dts/20221223032232.412042-4-ke1.xu@intel.com",
    "date": "2022-12-23T03:22:34",
    "name": "[V5,3/4] tests/vf_offload: add vf tso case for tunneling packets.",
    "commit_ref": null,
    "pull_url": null,
    "state": "superseded",
    "archived": false,
    "hash": "5b436b4ebe23404c10d3f626ec35f1fc8ccbed00",
    "submitter": {
        "id": 2810,
        "url": "http://patches.dpdk.org/api/people/2810/?format=api",
        "name": "Ke Xu",
        "email": "ke1.xu@intel.com"
    },
    "delegate": null,
    "mbox": "http://patches.dpdk.org/project/dts/patch/20221223032232.412042-4-ke1.xu@intel.com/mbox/",
    "series": [
        {
            "id": 26255,
            "url": "http://patches.dpdk.org/api/series/26255/?format=api",
            "web_url": "http://patches.dpdk.org/project/dts/list/?series=26255",
            "date": "2022-12-23T03:22:29",
            "name": "add vf checksum offload and tso case for tunnel packets.",
            "version": 5,
            "mbox": "http://patches.dpdk.org/series/26255/mbox/"
        }
    ],
    "comments": "http://patches.dpdk.org/api/patches/121342/comments/",
    "check": "pending",
    "checks": "http://patches.dpdk.org/api/patches/121342/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dts-bounces@dpdk.org>",
        "X-Original-To": "patchwork@inbox.dpdk.org",
        "Delivered-To": "patchwork@inbox.dpdk.org",
        "Received": [
            "from mails.dpdk.org (mails.dpdk.org [217.70.189.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id 06517A0093;\n\tFri, 23 Dec 2022 04:24:33 +0100 (CET)",
            "from mails.dpdk.org (localhost [127.0.0.1])\n\tby mails.dpdk.org (Postfix) with ESMTP id 023E342BB1;\n\tFri, 23 Dec 2022 04:24:33 +0100 (CET)",
            "from mga07.intel.com (mga07.intel.com [134.134.136.100])\n by mails.dpdk.org (Postfix) with ESMTP id D91A842BB1\n for <dts@dpdk.org>; Fri, 23 Dec 2022 04:24:30 +0100 (CET)",
            "from orsmga002.jf.intel.com ([10.7.209.21])\n by orsmga105.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 22 Dec 2022 19:24:30 -0800",
            "from dpdk-xuke-lab.sh.intel.com ([10.67.119.8])\n by orsmga002.jf.intel.com with ESMTP; 22 Dec 2022 19:24:28 -0800"
        ],
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/simple;\n d=intel.com; i=@intel.com; q=dns/txt; s=Intel;\n t=1671765871; x=1703301871;\n h=from:to:cc:subject:date:message-id:in-reply-to:\n references:mime-version:content-transfer-encoding;\n bh=nRkxm8br8Z4wOj6vwWbw/SXIqKSkE/1H+rx+3BE2e80=;\n b=Lt4NF9c4ggjMqoBFQQTaulxxboFU3rm4VATlEhg5UlysWY5h5kX+n753\n ysa2gf4PFIYHE7hX6VQAjPUuezqaAVjQnXInyAIhEq424QhyNpTTZi9Kn\n +9yWhXa2g0IDEkaykEq/7ZQ1kjGjrY7cyzpgYWIGy5rorvDo/zeF1Dg3D\n LfCMXK1vlRLqY/shMuVczVz5pGlwWeK8jCGVh3TzPBaxmn6cfQYIsATHx\n cMxWvj8zFB2IpRio4VmSDxhkt87rmAkfAkMUH/mCtK+htDsjtittdRRnu\n TJfmW3FxbDnvgHSovxdXnzZCyWe4ioNFv9HU6PjkzWXrXZ6DglnoSh6AW w==;",
        "X-IronPort-AV": [
            "E=McAfee;i=\"6500,9779,10569\"; a=\"384651771\"",
            "E=Sophos;i=\"5.96,267,1665471600\"; d=\"scan'208\";a=\"384651771\"",
            "E=McAfee;i=\"6500,9779,10569\"; a=\"651986625\"",
            "E=Sophos;i=\"5.96,267,1665471600\"; d=\"scan'208\";a=\"651986625\""
        ],
        "X-ExtLoop1": "1",
        "From": "Ke Xu <ke1.xu@intel.com>",
        "To": "dts@dpdk.org",
        "Cc": "ke1.xu@intel.com, weiyuanx.li@intel.com, qi.fu@intel.com,\n lijuan.tu@intel.com",
        "Subject": "[DTS][PATCH V5 3/4] tests/vf_offload: add vf tso case for tunneling\n packets.",
        "Date": "Fri, 23 Dec 2022 11:22:34 +0800",
        "Message-Id": "<20221223032232.412042-4-ke1.xu@intel.com>",
        "X-Mailer": "git-send-email 2.25.1",
        "In-Reply-To": "<20221223032232.412042-1-ke1.xu@intel.com>",
        "References": "<20221223032232.412042-1-ke1.xu@intel.com>",
        "MIME-Version": "1.0",
        "Content-Transfer-Encoding": "8bit",
        "X-BeenThere": "dts@dpdk.org",
        "X-Mailman-Version": "2.1.29",
        "Precedence": "list",
        "List-Id": "test suite reviews and discussions <dts.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dts>,\n <mailto:dts-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dts/>",
        "List-Post": "<mailto:dts@dpdk.org>",
        "List-Help": "<mailto:dts-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dts>,\n <mailto:dts-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dts-bounces@dpdk.org"
    },
    "content": "In DPDK 22.11, tunneling tso is supported.\nThis case supporting validation these packets.\n\nSigned-off-by: Weiyuan Li <weiyuanx.li@intel.com>\nSigned-off-by: Ke Xu <ke1.xu@intel.com>\n---\n tests/TestSuite_vf_offload.py | 186 ++++++++++++++++++++++++++++++++++\n 1 file changed, 186 insertions(+)",
    "diff": "diff --git a/tests/TestSuite_vf_offload.py b/tests/TestSuite_vf_offload.py\nindex bab4f39e..3d89729d 100644\n--- a/tests/TestSuite_vf_offload.py\n+++ b/tests/TestSuite_vf_offload.py\n@@ -216,6 +216,32 @@ class TestVfOffload(TestCase):\n         dut.send_expect(\"csum set sctp sw %d\" % port, \"testpmd>\")\n         dut.send_expect(\"port start all\", \"testpmd>\")\n \n+    def tso_enable(self, port, dut):\n+        dut.send_expect(\"port stop %d\" % port, \"testpmd>\")\n+        dut.send_expect(\"csum set ip hw %d\" % port, \"testpmd>\")\n+        dut.send_expect(\"csum set udp hw %d\" % port, \"testpmd>\")\n+        dut.send_expect(\"csum set tcp hw %d\" % port, \"testpmd>\")\n+        dut.send_expect(\"csum set sctp hw %d\" % port, \"testpmd>\")\n+        dut.send_expect(\"csum set outer-ip hw %d\" % port, \"testpmd>\")\n+        dut.send_expect(\"csum set outer-udp hw %d\" % port, \"testpmd>\")\n+        dut.send_expect(\"csum parse-tunnel on %d\" % port, \"testpmd>\")\n+        dut.send_expect(\"tso set 800 %d\" % port, \"testpmd>\")\n+        dut.send_expect(\"port start %d\" % port, \"testpmd>\")\n+\n+    def tso_enable_tunnel(self, port, dut):\n+        dut.send_expect(\"port stop %d\" % port, \"testpmd>\")\n+        dut.send_expect(\"csum set ip hw %d\" % port, \"testpmd>\")\n+        dut.send_expect(\"csum set udp hw %d\" % port, \"testpmd>\")\n+        dut.send_expect(\"csum set tcp hw %d\" % port, \"testpmd>\")\n+        dut.send_expect(\"csum set sctp hw %d\" % port, \"testpmd>\")\n+        dut.send_expect(\"csum set outer-ip hw %d\" % port, \"testpmd>\")\n+        dut.send_expect(\"csum set outer-udp hw %d\" % port, \"testpmd>\")\n+        dut.send_expect(\"csum parse-tunnel on %d\" % port, \"testpmd>\")\n+        dut.send_expect(\"rx_vxlan_port add 4789 %d\" % port, \"testpmd>\")\n+        dut.send_expect(\"tso set 800 %d\" % port, \"testpmd>\")\n+        dut.send_expect(\"tunnel_tso set 800 %d\" % port, \"testpmd>\")\n+        dut.send_expect(\"port start %d\" % port, \"testpmd>\")\n+\n     def checksum_validate(self, packets_sent, packets_expected):\n         \"\"\"\n         Validate the checksum.\n@@ -853,6 +879,166 @@ class TestVfOffload(TestCase):\n                         \"the packet segmentation incorrect, %s\" % tx_outlist,\n                     )\n \n+    @check_supported_nic(\n+        [\"ICE_100G-E810C_QSFP\", \"ICE_25G-E810C_SFP\", \"ICE_25G-E810_XXV_SFP\"]\n+    )\n+    @skip_unsupported_pkg([\"os default\"])\n+    def test_tso_tunnel(self):\n+        \"\"\"\n+        TSO tunneled IPv4 TCP, IPv6 TCP testing.\n+        \"\"\"\n+        tx_interface = self.tester.get_interface(\n+            self.tester.get_local_port(self.vm0_dut_ports[0])\n+        )\n+        rx_interface = self.tester.get_interface(\n+            self.tester.get_local_port(self.vm0_dut_ports[1])\n+        )\n+\n+        self.loading_sizes = [128, 800, 801, 1700, 2500]\n+\n+        self.tester.send_expect(\n+            \"ethtool -K %s rx off tx off tso off gso off gro off lro off\"\n+            % tx_interface,\n+            \"# \",\n+        )\n+        self.tester.send_expect(\"ip l set %s up\" % tx_interface, \"# \")\n+        self.dut.send_expect(\n+            \"ifconfig %s mtu %s\" % (self.dut.ports_info[0][\"intf\"], TSO_MTU), \"# \"\n+        )\n+        self.dut.send_expect(\n+            \"ifconfig %s mtu %s\" % (self.dut.ports_info[1][\"intf\"], TSO_MTU), \"# \"\n+        )\n+\n+        self.portMask = utils.create_mask([self.vm0_dut_ports[0]])\n+        self.launch_testpmd(\n+            dcf_flag=self.dcf_mode,\n+            param=\"--portmask=0x3 \"\n+            + \"--enable-rx-cksum \"\n+            + \"--max-pkt-len=%s\" % TSO_MTU,\n+        )\n+\n+        mac = self.vm0_testpmd.get_port_mac(0)\n+        self.vm0_testpmd.execute_cmd(\"set verbose 1\", \"testpmd> \", 120)\n+        self.vm0_testpmd.execute_cmd(\"set fwd csum\", \"testpmd>\", 120)\n+        self.vm0_testpmd.execute_cmd(\"set promisc 0 on\", \"testpmd> \", 120)\n+        self.vm0_testpmd.execute_cmd(\"set promisc 1 on\", \"testpmd> \", 120)\n+        self.vm0_testpmd.execute_cmd(\"csum mac-swap off 0\", \"testpmd>\")\n+        self.vm0_testpmd.execute_cmd(\"csum mac-swap off 1\", \"testpmd>\")\n+        self.tso_enable_tunnel(self.vm0_dut_ports[0], self.vm_dut_0)\n+        self.tso_enable_tunnel(self.vm0_dut_ports[1], self.vm_dut_0)\n+        self.vm0_testpmd.execute_cmd(\"start\")\n+        self.vm0_testpmd.wait_link_status_up(self.vm0_dut_ports[0])\n+        self.vm0_testpmd.wait_link_status_up(self.vm0_dut_ports[1])\n+\n+        pkts_outer = {\n+            \"IP/UDP/VXLAN/ETH\": 'IP(src = \"192.168.1.1\", dst = \"192.168.1.2\") / UDP(sport = 4789, dport = 4789) / VXLAN() / Ether()',\n+            \"IP/UDP/VXLAN-GPE\": 'IP(src = \"192.168.1.1\", dst = \"192.168.1.2\") / UDP(sport = 4790, dport = 4790) / VXLAN()',\n+            \"IP/UDP/VXLAN-GPE/ETH\": 'IP(src = \"192.168.1.1\", dst = \"192.168.1.2\") / UDP(sport = 4790, dport = 4790) / VXLAN() / Ether()',\n+            \"IPv6/UDP/VXLAN/ETH\": 'IPv6(src = \"FE80:0:0:0:200:1FF:FE00:200\", dst = \"3555:5555:6666:6666:7777:7777:8888:8888\") / UDP(sport = 4789, dport = 4789) / VXLAN() / Ether()',\n+            \"IPv6/UDP/VXLAN-GPE\": 'IPv6(src = \"FE80:0:0:0:200:1FF:FE00:200\", dst = \"3555:5555:6666:6666:7777:7777:8888:8888\") / UDP(sport = 4790, dport = 4790) / VXLAN()',\n+            \"IPv6/UDP/VXLAN-GPE/ETH\": 'IPv6(src = \"FE80:0:0:0:200:1FF:FE00:200\", dst = \"3555:5555:6666:6666:7777:7777:8888:8888\") / UDP(sport = 4790, dport = 4790) / VXLAN() / Ether()',\n+            \"IP/GRE\": 'IP(src = \"192.168.1.1\", dst = \"192.168.1.2\", proto = 47) / GRE()',\n+            \"IP/GRE/ETH\": 'IP(src = \"192.168.1.1\", dst = \"192.168.1.2\", proto = 47) / GRE() / Ether()',\n+            \"IP/NVGRE/ETH\": 'IP(src = \"192.168.1.1\", dst = \"192.168.1.2\", proto = 47) / GRE(key_present=1, proto=0x6558, key=0x00000100) / Ether()',\n+            \"IPv6/GRE\": 'IPv6(src = \"FE80:0:0:0:200:1FF:FE00:200\", dst = \"3555:5555:6666:6666:7777:7777:8888:8888\", nh = 47) / GRE()',\n+            \"IPv6/GRE/ETH\": 'IPv6(src = \"FE80:0:0:0:200:1FF:FE00:200\", dst = \"3555:5555:6666:6666:7777:7777:8888:8888\", nh = 47) / GRE() / Ether()',\n+            \"IPv6/NVGRE/ETH\": 'IPv6(src = \"FE80:0:0:0:200:1FF:FE00:200\", dst = \"3555:5555:6666:6666:7777:7777:8888:8888\", nh = 47) / GRE(key_present=1, proto=0x6558, key=0x00000100) / Ether()',\n+            \"IP/UDP/GTPU\": 'IP(src = \"192.168.1.1\", dst = \"192.168.1.2\") / UDP(dport = 2152) / GTP_U_Header(gtp_type=255, teid=0x123456)',\n+            \"IPv6/UDP/GTPU\": 'IPv6(src = \"FE80:0:0:0:200:1FF:FE00:200\", dst = \"3555:5555:6666:6666:7777:7777:8888:8888\") / UDP(dport = 2152) / GTP_U_Header(gtp_type=255, teid=0x123456)',\n+        }\n+\n+        self.tester.scapy_foreground()\n+        time.sleep(5)\n+\n+        for key_outer in pkts_outer:\n+            for loading_size in self.loading_sizes:\n+                # IPv4 tcp test\n+                out = self.vm0_testpmd.execute_cmd(\n+                    \"clear port info all\", \"testpmd> \", 120\n+                )\n+                self.tcpdump_start_sniffing([tx_interface, rx_interface])\n+                if \"GTPU\" in key_outer:\n+                    self.tester.scapy_append(\n+                        \"from scapy.contrib.gtp import GTP_U_Header\"\n+                    )\n+                self.tester.scapy_append(\n+                    (\n+                        'sendp([Ether(dst=\"%s\",src=\"52:00:00:00:00:00\")/'\n+                        + pkts_outer[key_outer]\n+                        + '/IP(src=\"192.168.1.1\",dst=\"192.168.1.2\")/TCP(sport=1021,dport=1021)/(\"X\"*%s)], iface=\"%s\")'\n+                    )\n+                    % (mac, loading_size, tx_interface)\n+                )\n+                out = self.tester.scapy_execute()\n+                out = self.vm0_testpmd.execute_cmd(\"show port stats all\")\n+                print(out)\n+                self.tcpdump_stop_sniff()\n+                rx_stats = self.number_of_packets(rx_interface)\n+                tx_stats = self.number_of_packets(tx_interface)\n+                tx_outlist = self.number_of_bytes(rx_interface)\n+                self.logger.info(tx_outlist)\n+                if loading_size <= 800:\n+                    self.verify(\n+                        rx_stats == tx_stats and int(tx_outlist[0]) == loading_size,\n+                        f\"{key_outer} tunnel IPV4 RX or TX packet number not correct\",\n+                    )\n+                else:\n+                    num = loading_size // 800\n+                    for i in range(num):\n+                        self.verify(\n+                            int(tx_outlist[i]) == 800,\n+                            \"the packet segmentation incorrect, %s\" % tx_outlist,\n+                        )\n+                    if loading_size % 800 != 0:\n+                        self.verify(\n+                            int(tx_outlist[num]) == loading_size % 800,\n+                            \"the packet segmentation incorrect, %s\" % tx_outlist,\n+                        )\n+\n+            for loading_size in self.loading_sizes:\n+                # IPv6 tcp test\n+                out = self.vm0_testpmd.execute_cmd(\n+                    \"clear port info all\", \"testpmd> \", 120\n+                )\n+                self.tcpdump_start_sniffing([tx_interface, rx_interface])\n+                if \"GTPU\" in key_outer:\n+                    self.tester.scapy_append(\n+                        \"from scapy.contrib.gtp import GTP_U_Header\"\n+                    )\n+                self.tester.scapy_append(\n+                    (\n+                        'sendp([Ether(dst=\"%s\", src=\"52:00:00:00:00:00\")/'\n+                        + pkts_outer[key_outer]\n+                        + '/IPv6(src=\"FE80:0:0:0:200:1FF:FE00:200\", dst=\"3555:5555:6666:6666:7777:7777:8888:8888\")/TCP(sport=1021,dport=1021)/(\"X\"*%s)], iface=\"%s\")'\n+                    )\n+                    % (mac, loading_size, tx_interface)\n+                )\n+                out = self.tester.scapy_execute()\n+                out = self.vm0_testpmd.execute_cmd(\"show port stats all\")\n+                print(out)\n+                self.tcpdump_stop_sniff()\n+                rx_stats = self.number_of_packets(rx_interface)\n+                tx_stats = self.number_of_packets(tx_interface)\n+                tx_outlist = self.number_of_bytes(rx_interface)\n+                self.logger.info(tx_outlist)\n+                if loading_size <= 800:\n+                    self.verify(\n+                        rx_stats == tx_stats and int(tx_outlist[0]) == loading_size,\n+                        f\"{key_outer} tunnel IPV6 RX or TX packet number not correct\",\n+                    )\n+                else:\n+                    num = loading_size // 800\n+                    for i in range(num):\n+                        self.verify(\n+                            int(tx_outlist[i]) == 800,\n+                            \"the packet segmentation incorrect, %s\" % tx_outlist,\n+                        )\n+                    if loading_size % 800 != 0:\n+                        self.verify(\n+                            int(tx_outlist[num]) == loading_size % 800,\n+                            \"the packet segmentation incorrect, %s\" % tx_outlist,\n+                        )\n+\n     def tear_down(self):\n         self.vm0_testpmd.execute_cmd(\"quit\", \"# \")\n         self.dut.send_expect(\n",
    "prefixes": [
        "V5",
        "3/4"
    ]
}