get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/121400/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 121400,
    "url": "http://patches.dpdk.org/api/patches/121400/?format=api",
    "web_url": "http://patches.dpdk.org/project/dts/patch/20221227063543.14134-1-weiyuanx.li@intel.com/",
    "project": {
        "id": 3,
        "url": "http://patches.dpdk.org/api/projects/3/?format=api",
        "name": "DTS",
        "link_name": "dts",
        "list_id": "dts.dpdk.org",
        "list_email": "dts@dpdk.org",
        "web_url": "",
        "scm_url": "git://dpdk.org/tools/dts",
        "webscm_url": "http://git.dpdk.org/tools/dts/",
        "list_archive_url": "https://inbox.dpdk.org/dts",
        "list_archive_url_format": "https://inbox.dpdk.org/dts/{}",
        "commit_url_format": ""
    },
    "msgid": "<20221227063543.14134-1-weiyuanx.li@intel.com>",
    "list_archive_url": "https://inbox.dpdk.org/dts/20221227063543.14134-1-weiyuanx.li@intel.com",
    "date": "2022-12-27T06:35:42",
    "name": "[V2,1/2] test_plans/ice_advanced_rss_vlan_esp_ah_l2tp_pfcp: add PF new cases according to testplan",
    "commit_ref": null,
    "pull_url": null,
    "state": "accepted",
    "archived": false,
    "hash": "0530af708a3dda6fe944efb98192622b9ddceed2",
    "submitter": {
        "id": 2477,
        "url": "http://patches.dpdk.org/api/people/2477/?format=api",
        "name": "Weiyuan Li",
        "email": "weiyuanx.li@intel.com"
    },
    "delegate": null,
    "mbox": "http://patches.dpdk.org/project/dts/patch/20221227063543.14134-1-weiyuanx.li@intel.com/mbox/",
    "series": [
        {
            "id": 26289,
            "url": "http://patches.dpdk.org/api/series/26289/?format=api",
            "web_url": "http://patches.dpdk.org/project/dts/list/?series=26289",
            "date": "2022-12-27T06:35:42",
            "name": "[V2,1/2] test_plans/ice_advanced_rss_vlan_esp_ah_l2tp_pfcp: add PF new cases according to testplan",
            "version": 2,
            "mbox": "http://patches.dpdk.org/series/26289/mbox/"
        }
    ],
    "comments": "http://patches.dpdk.org/api/patches/121400/comments/",
    "check": "pending",
    "checks": "http://patches.dpdk.org/api/patches/121400/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dts-bounces@dpdk.org>",
        "X-Original-To": "patchwork@inbox.dpdk.org",
        "Delivered-To": "patchwork@inbox.dpdk.org",
        "Received": [
            "from mails.dpdk.org (mails.dpdk.org [217.70.189.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id 00FDDA04FD;\n\tTue, 27 Dec 2022 07:35:47 +0100 (CET)",
            "from mails.dpdk.org (localhost [127.0.0.1])\n\tby mails.dpdk.org (Postfix) with ESMTP id CEADC41143;\n\tTue, 27 Dec 2022 07:35:47 +0100 (CET)",
            "from mga11.intel.com (mga11.intel.com [192.55.52.93])\n by mails.dpdk.org (Postfix) with ESMTP id DED4140E2D\n for <dts@dpdk.org>; Tue, 27 Dec 2022 07:35:45 +0100 (CET)",
            "from orsmga007.jf.intel.com ([10.7.209.58])\n by fmsmga102.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 26 Dec 2022 22:35:44 -0800",
            "from unknown (HELO localhost.localdomain) ([10.239.252.248])\n by orsmga007-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 26 Dec 2022 22:35:42 -0800"
        ],
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/simple;\n d=intel.com; i=@intel.com; q=dns/txt; s=Intel;\n t=1672122946; x=1703658946;\n h=from:to:cc:subject:date:message-id:mime-version:\n content-transfer-encoding;\n bh=7J2Hjfx+9Ezaulev8ltK3WusGcTFAKE/m5CzAGXx0JU=;\n b=a8td3cdXrsGuUpph6fJ5gizP05gU91IhPahe6xgwoNbsGv/bqf+FkoGP\n pS3BqmKBoFk3R9E20V+8H1skRGpwkG6pfkU6YppfbCzYJ3Pz7NVjgx3zU\n g76oKwLxy6fzL1VMg1uSZNijw3cX3cxWD31mIka6Dt2Fn6O0rxFl9SCQu\n uIGSZ2ojgj88H7blb83TfhgVDv8LE5sUMB5awVpW7522MXcDlNVW+MOr9\n 7s2tWo+mGTrhtSSCtXs7vaf7teixpKWIPSOy78/GSsorVvXqqDw6XA95t\n UthaIH4wkX0nD6ZUvgXMlzBnaXhnGHZnhklZsoa8D9hJQWRQzhW3EMhGw A==;",
        "X-IronPort-AV": [
            "E=McAfee;i=\"6500,9779,10572\"; a=\"318328400\"",
            "E=Sophos;i=\"5.96,277,1665471600\"; d=\"scan'208\";a=\"318328400\"",
            "E=McAfee;i=\"6500,9779,10572\"; a=\"646334380\"",
            "E=Sophos;i=\"5.96,277,1665471600\"; d=\"scan'208\";a=\"646334380\""
        ],
        "From": "Weiyuan Li <weiyuanx.li@intel.com>",
        "To": "dts@dpdk.org",
        "Cc": "Weiyuan Li <weiyuanx.li@intel.com>,\n\tYuan Peng <yuan.peng@intel.com>",
        "Subject": "[dts][PATCH V2 1/2]\n test_plans/ice_advanced_rss_vlan_esp_ah_l2tp_pfcp: add PF new cases according\n to testplan",
        "Date": "Tue, 27 Dec 2022 14:35:42 +0800",
        "Message-Id": "<20221227063543.14134-1-weiyuanx.li@intel.com>",
        "X-Mailer": "git-send-email 2.27.0",
        "MIME-Version": "1.0",
        "Content-Transfer-Encoding": "8bit",
        "X-BeenThere": "dts@dpdk.org",
        "X-Mailman-Version": "2.1.29",
        "Precedence": "list",
        "List-Id": "test suite reviews and discussions <dts.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dts>,\n <mailto:dts-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dts/>",
        "List-Post": "<mailto:dts@dpdk.org>",
        "List-Help": "<mailto:dts-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dts>,\n <mailto:dts-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dts-bounces@dpdk.org"
    },
    "content": "Add PF new cases according to testplan.\n\nSigned-off-by: Yuan Peng <yuan.peng@intel.com>\n---\n\nv2:\n-add signed-off-by.\n\n ...ed_rss_vlan_esp_ah_l2tp_pfcp_test_plan.rst | 523 ++++++++++++++++++\n 1 file changed, 523 insertions(+)",
    "diff": "diff --git a/test_plans/ice_advanced_rss_vlan_esp_ah_l2tp_pfcp_test_plan.rst b/test_plans/ice_advanced_rss_vlan_esp_ah_l2tp_pfcp_test_plan.rst\nindex f365784e..12322737 100644\n--- a/test_plans/ice_advanced_rss_vlan_esp_ah_l2tp_pfcp_test_plan.rst\n+++ b/test_plans/ice_advanced_rss_vlan_esp_ah_l2tp_pfcp_test_plan.rst\n@@ -671,6 +671,8 @@ Test case: MAC_IPV6_AH\n \n Test case: MAC_VLAN_IPV4_PAY\n ============================\n+Subcase: MAC_VLAN_IPV4_PAY_VLAN\n+-------------------------------\n \n 1. validate a rule for RSS type of MAC_VLAN_IPV4_PAY::\n \n@@ -724,8 +726,65 @@ Test case: MAC_VLAN_IPV4_PAY\n    check the rule not exists.\n    send the matched packets, check the hash values of the packets are not exist.\n \n+Subcase: MAC_VLAN_IPV4_PAY_L3DST\n+--------------------------------\n+\n+1. validate a rule for RSS type of MAC_VLAN_IPV4_PAY::\n+\n+     testpmd> flow validate 0 ingress pattern eth / vlan / ipv4 / end actions rss types ipv4 l3-dst-only end key_len 0 queues end / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create a rule for RSS type of MAC_VLAN_IPV4_PAY::\n+\n+     testpmd> flow create 0 ingress pattern eth / vlan / ipv4 / end actions rss types ipv4 l3-dst-only end key_len 0 queues end / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets\n+\n+   * MAC_VLAN_IPV4_PAY packet::\n+\n+       sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+     change the field [l3 dst address], send packets::\n+\n+       sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src=\"192.168.1.1\", dst=\"192.168.1.3\")/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+     check the hash value is different from the first packet.\n+     change other fields, send packets::\n+\n+       sendp([Ether(src=\"10:22:33:44:55:99\", dst=\"00:11:22:33:44:53\",type=0x8100)/Dot1Q(vlan=2,type=0x0800)/IP(src=\"192.168.1.3\", dst=\"192.168.1.2\")/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+     check the hash values are the same as the first packet.\n+\n+4. send packets mismatched the pattern::\n+\n+     sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+  check the hash values not exist.\n+\n+5. destroy the rule::\n+\n+     testpmd> flow destroy 0 rule 0\n+     testpmd> flow list 0\n+\n+   check the rule not exists.\n+   send the matched packets, check the hash values of the packets are not exist.\n+\n Test case: MAC_VLAN_IPV4_UDP_PAY\n ================================\n+Subcase: MAC_VLAN_IPV4_UDP_VLAN\n+-------------------------------\n \n 1. validate a rule for RSS type of MAC_VLAN_IPV4_UDP_PAY::\n \n@@ -780,8 +839,122 @@ Test case: MAC_VLAN_IPV4_UDP_PAY\n    check the rule not exists.\n    send the matched packets, check the hash values of the packets are not exist.\n \n+Subcase: MAC_VLAN_IPV4_UDP_L3SRC\n+--------------------------------\n+\n+1. validate a rule for RSS type of MAC_VLAN_IPV4_UDP_PAY::\n+\n+     testpmd> flow validate 0 ingress pattern eth / vlan / ipv4 / udp / end actions rss types ipv4 l3-src-only end key_len 0 queues end / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create a rule for RSS type of MAC_VLAN_IPV4_UDP_PAY::\n+\n+     testpmd> flow create 0 ingress pattern eth / vlan / ipv4 / udp / end actions rss types ipv4 l3-src-only end key_len 0 queues end / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets\n+\n+   * MAC_VLAN_IPV4_UDP_PAY packet::\n+\n+       sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+     change the field [l3 src address], send packets::\n+\n+       sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src=\"192.168.1.3\", dst=\"192.168.1.2\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+     check the hash values are different from the first packet.\n+     change other fields, send packets::\n+\n+       sendp([Ether(src=\"10:22:33:44:55:99\", dst=\"00:11:22:33:44:53\",type=0x8100)/Dot1Q(vlan=2,type=0x0800)/IP(src=\"192.168.1.1\", dst=\"192.168.1.4\")/UDP(sport=19,dport=99)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+     check the hash values are the same as as the first packet.\n+\n+4. send packets mismatched the pattern::\n+\n+     sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+   check the hash values of the packets not exist.\n+\n+5. destroy the rule::\n+\n+     testpmd> flow destroy 0 rule 0\n+     testpmd> flow list 0\n+\n+   check the rule not exists.\n+   send the matched packets, check the hash values of the packets are not exist.\n+\n+Subcase: MAC_VLAN_IPV4_UDP_L4DST\n+--------------------------------\n+\n+1. validate a rule for RSS type of MAC_VLAN_IPV4_UDP_PAY::\n+\n+     testpmd> flow validate 0 ingress pattern eth / vlan / ipv4 / udp / end actions rss types ipv4-udp l4-dst-only end key_len 0 queues end / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create a rule for RSS type of MAC_VLAN_IPV4_UDP_PAY::\n+\n+     testpmd> flow create 0 ingress pattern eth / vlan / ipv4 / udp / end actions rss types ipv4-udp l4-dst-only end key_len 0 queues end / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets\n+\n+   * MAC_VLAN_IPV4_UDP_PAY packet::\n+\n+       sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+     change the field [l4 dst address], send packets::\n+\n+       sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/UDP(sport=25,dport=24)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+     check the hash values are different from the first packet.\n+     change other fields, send packets::\n+\n+       sendp([Ether(src=\"10:22:33:44:55:99\", dst=\"00:11:22:33:44:53\",type=0x8100)/Dot1Q(vlan=2,type=0x0800)/IP(src=\"192.168.1.3\", dst=\"192.168.1.4\")/UDP(sport=19,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+     check the hash values are the same as as the first packet.\n+\n+4. send packets mismatched the pattern::\n+\n+     sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+   check the hash values of the packets not exist.\n+\n+5. destroy the rule::\n+\n+     testpmd> flow destroy 0 rule 0\n+     testpmd> flow list 0\n+\n+   check the rule not exists.\n+   send the matched packets, check the hash values of the packets are not exist.\n+\n Test case: MAC_VLAN_IPV4_TCP_PAY\n ================================\n+Subcase: MAC_VLAN_IPV4_TCP_VLAN\n+-------------------------------\n \n 1. validate a rule for RSS type of MAC_VLAN_IPV4_TCP_PAY::\n \n@@ -836,8 +1009,67 @@ Test case: MAC_VLAN_IPV4_TCP_PAY\n    check the rule not exists.\n    send the matched packets, check the hash values of the packets are not exist.\n \n+Subcase: MAC_VLAN_IPV4_TCP_l3SRC_L4SRC\n+--------------------------------------\n+\n+1. validate a rule for RSS type of MAC_VLAN_IPV4_TCP_PAY::\n+\n+     testpmd> flow validate 0 ingress pattern eth / vlan / ipv4 / tcp / end actions rss types ipv4-tcp l3-src-only l4-src-only end key_len 0 queues end / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create a rule for RSS type of MAC_VLAN_IPV4_TCP_PAY::\n+\n+     testpmd> flow create 0 ingress pattern eth / vlan / ipv4 / tcp / end actions rss types ipv4-tcp l3-src-only l4-src-only end key_len 0 queues end / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets\n+\n+   * MAC_VLAN_IPV4_TCP_PAY packet::\n+\n+       sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+     change the field [l3 src address and l4 sport], send packets::\n+\n+       sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src=\"192.168.1.3\", dst=\"192.168.1.2\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+       sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/TCP(sport=22,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+     check the hash values are different from the first packet.\n+     change other fields, send packets::\n+\n+       sendp([Ether(src=\"10:22:33:44:55:99\", dst=\"00:11:22:33:44:53\",type=0x8100)/Dot1Q(vlan=2,type=0x0800)/IP(src=\"192.168.1.1\", dst=\"192.168.1.4\")/TCP(sport=25,dport=99)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+     check the hash values are the same as as the first packet.\n+\n+4. send packets mismatched the pattern::\n+\n+     sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+   check the hash values of the packets not exist.\n+\n+5. destroy the rule::\n+\n+     testpmd> flow destroy 0 rule 0\n+     testpmd> flow list 0\n+\n+   check the rule not exists.\n+   send the matched packets, check the hash values of the packets are not exist.\n+\n Test case: MAC_VLAN_IPV4_SCTP_PAY\n =================================\n+Subcase: MAC_VLAN_IPV4_SCTP_VLAN\n+--------------------------------\n \n 1. validate a rule for RSS type of MAC_VLAN_IPV4_SCTP_PAY::\n \n@@ -892,8 +1124,69 @@ Test case: MAC_VLAN_IPV4_SCTP_PAY\n    check the rule not exists.\n    send the matched packets, check the hash values of the packets are not exist.\n \n+Subcase: MAC_VLAN_IPV4_SCTP_ALL\n+-------------------------------\n+\n+1. validate a rule for RSS type of MAC_VLAN_IPV4_SCTP_PAY::\n+\n+     testpmd> flow validate 0 ingress pattern eth / vlan / ipv4 / sctp / end actions rss types ipv4-sctp end key_len 0 queues end / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create a rule for RSS type of MAC_VLAN_IPV4_SCTP_PAY::\n+\n+     testpmd> flow create 0 ingress pattern eth / vlan / ipv4 / sctp / end actions rss types ipv4-sctp end key_len 0 queues end / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets\n+\n+   * MAC_VLAN_IPV4_SCTP_PAY packet::\n+\n+       sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/SCTP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+     change the field [ipv4-sctp], send packets::\n+\n+       sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src=\"192.168.1.3\", dst=\"192.168.1.2\")/SCTP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+       sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src=\"192.168.1.1\", dst=\"192.168.1.4\")/SCTP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+       sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/SCTP(sport=19,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+       sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/SCTP(sport=25,dport=99)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+     check the hash values are different from the first packet.\n+     change other fields, send packets::\n+\n+       sendp([Ether(src=\"10:22:33:44:55:99\", dst=\"00:11:22:33:44:53\",type=0x8100)/Dot1Q(vlan=2,type=0x0800)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/SCTP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+     check the hash values are the same as as the first packet.\n+\n+4. send packets mismatched the pattern::\n+\n+     sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/SCTP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+   check the hash values of the packets not exist.\n+\n+5. destroy the rule::\n+\n+     testpmd> flow destroy 0 rule 0\n+     testpmd> flow list 0\n+\n+   check the rule not exists.\n+   send the matched packets, check the hash values of the packets are not exist.\n+\n Test case: MAC_VLAN_IPV6_PAY\n ============================\n+Subcase: MAC_VLAN_IPV6_PAY_vlan\n+-------------------------------\n \n 1. validate a rule for RSS type of MAC_VLAN_IPV6_PAY::\n \n@@ -947,8 +1240,65 @@ Test case: MAC_VLAN_IPV6_PAY\n    check the rule not exists.\n    send the matched packets, check the hash values of the packets are not exist.\n \n+Subcase: MAC_VLAN_IPV6_PAY_L3SRC\n+--------------------------------\n+\n+1. validate a rule for RSS type of MAC_VLAN_IPV6_PAY::\n+\n+     testpmd> flow validate 0 ingress pattern eth / vlan / ipv6 / end actions rss types ipv6 l3-src-only end key_len 0 queues end / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create a rule for RSS type of MAC_VLAN_IPV6_PAY::\n+\n+     testpmd> flow create 0 ingress pattern eth / vlan / ipv6 / end actions rss types ipv6 l3-src-only end key_len 0 queues end / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets\n+\n+   * MAC_VLAN_IPV6_PAY packet::\n+\n+       sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+     change the field [l3 src address], send packets::\n+\n+       sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1537\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+     check the hash values are different from the first packet.\n+     change other fields, send packets::\n+\n+       sendp([Ether(src=\"10:22:33:44:55:99\", dst=\"00:11:22:33:44:53\",type=0x8100)/Dot1Q(vlan=2,type=0x86dd)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2023\")/Raw(\"y\" * 80)],iface=\"ens786f0\",count=1)\n+\n+   check the hash values are the same as the first packet.\n+\n+4. send packets mismatched the pattern::\n+\n+     sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+  check the hash values not exist.\n+\n+5. destroy the rule::\n+\n+     testpmd> flow destroy 0 rule 0\n+     testpmd> flow list 0\n+\n+   check the rule not exists.\n+   send the matched packets, check the hash values of the packets are not exist.\n+\n Test case: MAC_VLAN_IPV6_UDP_PAY\n ================================\n+Subcase: MAC_VLAN_IPV6_UDP_VLAN\n+-------------------------------\n \n 1. validate a rule for RSS type of MAC_VLAN_IPV6_UDP_PAY::\n \n@@ -1003,8 +1353,66 @@ Test case: MAC_VLAN_IPV6_UDP_PAY\n    check the rule not exists.\n    send the matched packets, check the hash values of the packets are not exist.\n \n+Subcase: MAC_VLAN_IPV6_UDP_L4SRC\n+--------------------------------\n+\n+1. validate a rule for RSS type of MAC_VLAN_IPV6_UDP_PAY::\n+\n+     testpmd> flow validate 0 ingress pattern eth / vlan / ipv6 / udp / end actions rss types ipv6-udp l4-src-only end key_len 0 queues end / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create a rule for RSS type of MAC_VLAN_IPV6_UDP_PAY::\n+\n+     testpmd> flow create 0 ingress pattern eth / vlan / ipv6 / udp / end actions rss types ipv6-udp l4-src-only end key_len 0 queues end / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets\n+\n+   * MAC_VLAN_IPV6_UDP_PAY packet::\n+\n+       sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+     change the field [l4 src address], send packets::\n+\n+       sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/UDP(sport=19,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+     check the hash values are different from the first packet.\n+     change other fields, send packets::\n+\n+       sendp([Ether(src=\"10:22:33:44:55:99\", dst=\"00:11:22:33:44:53\",type=0x8100)/Dot1Q(vlan=2,type=0x86dd)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1537\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2023\")/UDP(sport=25,dport=99)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+     check the hash values are the same as the first packet.\n+\n+4. send packets mismatched the pattern::\n+\n+     sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+  check the hash values not exist.\n+\n+5. destroy the rule::\n+\n+     testpmd> flow destroy 0 rule 0\n+     testpmd> flow list 0\n+\n+   check the rule not exists.\n+   send the matched packets, check the hash values of the packets are not exist.\n+\n Test case: MAC_VLAN_IPV6_TCP_PAY\n ================================\n+Subcase: MAC_VLAN_IPV6_TCP_VLAN\n+-------------------------------\n \n 1. validate a rule for RSS type of MAC_VLAN_IPV6_TCP_PAY::\n \n@@ -1059,8 +1467,66 @@ Test case: MAC_VLAN_IPV6_TCP_PAY\n    check the rule not exists.\n    send the matched packets, check the hash values of the packets are not exist.\n \n+Subcase: MAC_VLAN_IPV6_TCP_L3DST\n+--------------------------------\n+\n+1. validate a rule for RSS type of MAC_VLAN_IPV6_TCP_PAY::\n+\n+     testpmd> flow validate 0 ingress pattern eth / vlan / ipv6 / tcp / end actions rss types ipv6-tcp l3-dst-only end key_len 0 queues end / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create a rule for RSS type of MAC_VLAN_IPV6_TCP_PAY::\n+\n+     testpmd> flow create 0 ingress pattern eth / vlan / ipv6 / tcp / end actions rss types ipv6-tcp l3-dst-only end key_len 0 queues end / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets\n+\n+   * MAC_VLAN_IPV6_TCP_PAY packet::\n+\n+       sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+     change the field [l3 dst address], send packets::\n+\n+       sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2023\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+     check the hash values are different from the first packet.\n+     change other fields, send packets::\n+\n+       sendp([Ether(src=\"10:22:33:44:55:99\", dst=\"00:11:22:33:44:53\",type=0x8100)/Dot1Q(vlan=2,type=0x86dd)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1537\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/TCP(sport=19,dport=99)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+     check the hash values are the same as the first packet.\n+\n+4. send packets mismatched the pattern::\n+\n+     sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+  check the hash values not exist.\n+\n+5. destroy the rule::\n+\n+     testpmd> flow destroy 0 rule 0\n+     testpmd> flow list 0\n+\n+   check the rule not exists.\n+   send the matched packets, check the hash values of the packets are not exist.\n+\n Test case: MAC_VLAN_IPV6_SCTP_PAY\n =================================\n+Subcase: MAC_VLAN_IPV6_SCTP_VLAN\n+--------------------------------\n \n 1. validate a rule for RSS type of MAC_VLAN_IPV6_SCTP_PAY::\n \n@@ -1115,6 +1581,63 @@ Test case: MAC_VLAN_IPV6_SCTP_PAY\n    check the rule not exists.\n    send the matched packets, check the hash values the packets are not exist.\n \n+Subcase: MAC_VLAN_IPV6_SCTP_L3DST_L4DST\n+---------------------------------------\n+\n+1. validate a rule for RSS type of MAC_VLAN_IPV6_SCTP_PAY::\n+\n+     testpmd> flow validate 0 ingress pattern eth / vlan / ipv6 / sctp / end actions rss types ipv6-sctp l3-dst-only l4-dst-only end key_len 0 queues end / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create a rule for RSS type of MAC_VLAN_IPV6_SCTP_PAY::\n+\n+     testpmd> flow create 0 ingress pattern eth / vlan / ipv6 / sctp / end actions rss types ipv6-sctp l3-dst-only l4-dst-only end key_len 0 queues end / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets\n+\n+   * MAC_VLAN_IPV6_SCTP_PAY packet::\n+\n+       sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/SCTP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+     change the field [l3 dst address and l4 dport], send packets::\n+\n+       sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2023\")/SCTP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+       sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/SCTP(sport=25,dport=99)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+     check the hash values are different from the first packet.\n+     change other fields, send packets::\n+\n+       sendp([Ether(src=\"10:22:33:44:55:99\", dst=\"00:11:22:33:44:53\",type=0x8100)/Dot1Q(vlan=2,type=0x86dd)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1537\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/SCTP(sport=19,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+     check the hash values are the same as the first packet.\n+\n+4. send packets mismatched the pattern::\n+\n+     sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/SCTP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+  check the hash values not exist.\n+\n+5. destroy the rule::\n+\n+     testpmd> flow destroy 0 rule 0\n+     testpmd> flow list 0\n+\n+   check the rule not exists.\n+   send the matched packets, check the hash values the packets are not exist.\n+\n Test case: negative cases\n =========================\n \n",
    "prefixes": [
        "V2",
        "1/2"
    ]
}