get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/121429/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 121429,
    "url": "http://patches.dpdk.org/api/patches/121429/?format=api",
    "web_url": "http://patches.dpdk.org/project/dts/patch/20221228050850.33004-6-ke1.xu@intel.com/",
    "project": {
        "id": 3,
        "url": "http://patches.dpdk.org/api/projects/3/?format=api",
        "name": "DTS",
        "link_name": "dts",
        "list_id": "dts.dpdk.org",
        "list_email": "dts@dpdk.org",
        "web_url": "",
        "scm_url": "git://dpdk.org/tools/dts",
        "webscm_url": "http://git.dpdk.org/tools/dts/",
        "list_archive_url": "https://inbox.dpdk.org/dts",
        "list_archive_url_format": "https://inbox.dpdk.org/dts/{}",
        "commit_url_format": ""
    },
    "msgid": "<20221228050850.33004-6-ke1.xu@intel.com>",
    "list_archive_url": "https://inbox.dpdk.org/dts/20221228050850.33004-6-ke1.xu@intel.com",
    "date": "2022-12-28T05:08:50",
    "name": "[V2,5/5] tests/vf_offload: Replace the tcpdump implementation to a packet reading implementation.",
    "commit_ref": null,
    "pull_url": null,
    "state": "superseded",
    "archived": false,
    "hash": "d7d13cf9d2c2a878dc75141bb0cd22f71c3d8d79",
    "submitter": {
        "id": 2810,
        "url": "http://patches.dpdk.org/api/people/2810/?format=api",
        "name": "Ke Xu",
        "email": "ke1.xu@intel.com"
    },
    "delegate": null,
    "mbox": "http://patches.dpdk.org/project/dts/patch/20221228050850.33004-6-ke1.xu@intel.com/mbox/",
    "series": [
        {
            "id": 26302,
            "url": "http://patches.dpdk.org/api/series/26302/?format=api",
            "web_url": "http://patches.dpdk.org/project/dts/list/?series=26302",
            "date": "2022-12-28T05:08:45",
            "name": "Improve checksum validate and tso packet counting.",
            "version": 2,
            "mbox": "http://patches.dpdk.org/series/26302/mbox/"
        }
    ],
    "comments": "http://patches.dpdk.org/api/patches/121429/comments/",
    "check": "pending",
    "checks": "http://patches.dpdk.org/api/patches/121429/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dts-bounces@dpdk.org>",
        "X-Original-To": "patchwork@inbox.dpdk.org",
        "Delivered-To": "patchwork@inbox.dpdk.org",
        "Received": [
            "from mails.dpdk.org (mails.dpdk.org [217.70.189.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id 201D7A04FD;\n\tWed, 28 Dec 2022 06:10:31 +0100 (CET)",
            "from mails.dpdk.org (localhost [127.0.0.1])\n\tby mails.dpdk.org (Postfix) with ESMTP id 1BC2642C29;\n\tWed, 28 Dec 2022 06:10:31 +0100 (CET)",
            "from mga12.intel.com (mga12.intel.com [192.55.52.136])\n by mails.dpdk.org (Postfix) with ESMTP id C5FEC42C29\n for <dts@dpdk.org>; Wed, 28 Dec 2022 06:10:29 +0100 (CET)",
            "from fmsmga002.fm.intel.com ([10.253.24.26])\n by fmsmga106.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 27 Dec 2022 21:10:29 -0800",
            "from dpdk-xuke-lab.sh.intel.com ([10.67.119.8])\n by fmsmga002.fm.intel.com with ESMTP; 27 Dec 2022 21:10:27 -0800"
        ],
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/simple;\n d=intel.com; i=@intel.com; q=dns/txt; s=Intel;\n t=1672204230; x=1703740230;\n h=from:to:cc:subject:date:message-id:in-reply-to:\n references:mime-version:content-transfer-encoding;\n bh=yH02kApkDcv7vLhVcvNOfWLxngK53hQNiYBheQHyh8s=;\n b=QDBdMBghE7RyV8vuENsYYMK7KEKU1465WyKSoFkutTjJzP7G6swYpBYi\n Ln19DCFNy9pnJ1J3Hdo6BWhHcHgGWA35HlftOuuRgjULd5eT1QhsDq5/T\n DUHH7pGrd0Y3FUMnMAWGn25dgQOXJey9ftP0Lqu5iNADxks8p3yXzQ7FQ\n H2pb/OYMzVKbBFrI6vk0E7waIcfwDTm/7akNKiIXXAey1Tn6uNVJB28y0\n fkYdWwWA6hInhwWDiaKOQm28gFz62S1SameMHH1G3raL6FT+RvEPidrfo\n 8mzPbrO1iLnxWfW+x+XGYS/hJn212nm+k16U8aUHw7HARyRO/Wr60H7lx A==;",
        "X-IronPort-AV": [
            "E=McAfee;i=\"6500,9779,10573\"; a=\"300499481\"",
            "E=Sophos;i=\"5.96,280,1665471600\"; d=\"scan'208\";a=\"300499481\"",
            "E=McAfee;i=\"6500,9779,10573\"; a=\"760536375\"",
            "E=Sophos;i=\"5.96,280,1665471600\"; d=\"scan'208\";a=\"760536375\""
        ],
        "X-ExtLoop1": "1",
        "From": "Ke Xu <ke1.xu@intel.com>",
        "To": "dts@dpdk.org",
        "Cc": "qi.fu@intel.com, weiyuanx.li@intel.com, lijuan.tu@intel.com,\n ke1.xu@intel.com",
        "Subject": "[DTS][PATCH V2 5/5] tests/vf_offload: Replace the tcpdump\n implementation to a packet reading implementation.",
        "Date": "Wed, 28 Dec 2022 13:08:50 +0800",
        "Message-Id": "<20221228050850.33004-6-ke1.xu@intel.com>",
        "X-Mailer": "git-send-email 2.25.1",
        "In-Reply-To": "<20221228050850.33004-1-ke1.xu@intel.com>",
        "References": "<20221228050850.33004-1-ke1.xu@intel.com>",
        "MIME-Version": "1.0",
        "Content-Transfer-Encoding": "8bit",
        "X-BeenThere": "dts@dpdk.org",
        "X-Mailman-Version": "2.1.29",
        "Precedence": "list",
        "List-Id": "test suite reviews and discussions <dts.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dts>,\n <mailto:dts-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dts/>",
        "List-Post": "<mailto:dts@dpdk.org>",
        "List-Help": "<mailto:dts-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dts>,\n <mailto:dts-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dts-bounces@dpdk.org"
    },
    "content": "Packet reading implementation is more common to use when to verify the\n received packet count and payload size. The tcpdump method is not\n able to recognize some of the tunnel packets, leading to a wrong output\n failing the validation. Newly added tcpdump_analyse_sniff method is\n implemented by sniff packet reading and analysing and can replace\n the lagacy methods number_of_packets and number_of_bytes.\n\nSigned-off-by: Ke Xu <ke1.xu@intel.com>\n---\n tests/TestSuite_vf_offload.py | 77 +++++++++--------------------------\n 1 file changed, 20 insertions(+), 57 deletions(-)",
    "diff": "diff --git a/tests/TestSuite_vf_offload.py b/tests/TestSuite_vf_offload.py\nindex a9d587e9..084f2249 100644\n--- a/tests/TestSuite_vf_offload.py\n+++ b/tests/TestSuite_vf_offload.py\n@@ -627,43 +627,6 @@ class TestVfOffload(TestCase):\n         rx_packet_size = [len(p[Raw].load) for p in pkts]\n         return rx_packet_count, rx_packet_size\n \n-    def tcpdump_command(self, command):\n-        \"\"\"\n-        Send a tcpdump related command and return an integer from the output.\n-        \"\"\"\n-\n-        result = self.tester.send_expect(command, \"#\")\n-        print(result)\n-        return int(result.strip())\n-\n-    def number_of_packets(self, iface):\n-        \"\"\"\n-        By reading the file generated by tcpdump it counts how many packets are\n-        forwarded by the sample app and received in the self.tester. The sample app\n-        will add a known MAC address for the test to look for.\n-        \"\"\"\n-\n-        command = (\n-            \"tcpdump -A -nn -e -v -r tcpdump_{iface}.pcap 2>/dev/null | \"\n-            + 'grep -c \"seq\"'\n-        )\n-        return self.tcpdump_command(command.format(**locals()))\n-\n-    def tcpdump_scanner(self, scanner):\n-        \"\"\"\n-        Execute scanner to return results\n-        \"\"\"\n-        scanner_result = self.tester.send_expect(scanner, \"#\")\n-        finally_result = re.findall(r\"length( \\d+)\", scanner_result)\n-        return list(finally_result)\n-\n-    def number_of_bytes(self, iface):\n-        \"\"\"\n-        Get the length of loading_sizes\n-        \"\"\"\n-        scanner = 'tcpdump  -n -vv -r tcpdump_{iface}.pcap 2>/dev/null | grep \"seq\"  | grep \"length\"'\n-        return self.tcpdump_scanner(scanner.format(**locals()))\n-\n     def test_tso(self):\n         \"\"\"\n         TSO IPv4 TCP, IPv6 TCP testing.\n@@ -761,27 +724,26 @@ class TestVfOffload(TestCase):\n             out = self.vm0_testpmd.execute_cmd(\"show port stats all\")\n             print(out)\n             self.tcpdump_stop_sniff()\n-            rx_stats = self.number_of_packets(rx_interface)\n-            tx_stats = self.number_of_packets(tx_interface)\n-            tx_outlist = self.number_of_bytes(rx_interface)\n-            tx_outlist.sort(reverse=True)\n-            self.logger.info(tx_outlist)\n+            rx_stats, payload_size_list = self.tcpdump_analyse_sniff(rx_interface)\n+            tx_stats, _ = self.tcpdump_analyse_sniff(tx_interface)\n+            payload_size_list.sort(reverse=True)\n+            self.logger.info(payload_size_list)\n             if loading_size <= 800:\n                 self.verify(\n-                    rx_stats == tx_stats and int(tx_outlist[0]) == loading_size,\n+                    rx_stats == tx_stats and int(payload_size_list[0]) == loading_size,\n                     \"IPV4 RX or TX packet number not correct\",\n                 )\n             else:\n                 num = loading_size // 800\n                 for i in range(num):\n                     self.verify(\n-                        int(tx_outlist[i]) == 800,\n-                        \"the packet segmentation incorrect, %s\" % tx_outlist,\n+                        int(payload_size_list[i]) == 800,\n+                        \"the packet segmentation incorrect, %s\" % payload_size_list,\n                     )\n                 if loading_size % 800 != 0:\n                     self.verify(\n-                        int(tx_outlist[num]) == loading_size % 800,\n-                        \"the packet segmentation incorrect, %s\" % tx_outlist,\n+                        int(payload_size_list[num]) == loading_size % 800,\n+                        \"the packet segmentation incorrect, %s\" % payload_size_list,\n                     )\n \n         for loading_size in self.loading_sizes:\n@@ -796,27 +758,26 @@ class TestVfOffload(TestCase):\n             out = self.vm0_testpmd.execute_cmd(\"show port stats all\")\n             print(out)\n             self.tcpdump_stop_sniff()\n-            rx_stats = self.number_of_packets(rx_interface)\n-            tx_stats = self.number_of_packets(tx_interface)\n-            tx_outlist = self.number_of_bytes(rx_interface)\n-            tx_outlist.sort(reverse=True)\n-            self.logger.info(tx_outlist)\n+            rx_stats, payload_size_list = self.tcpdump_analyse_sniff(rx_interface)\n+            tx_stats, _ = self.tcpdump_analyse_sniff(tx_interface)\n+            payload_size_list.sort(reverse=True)\n+            self.logger.info(payload_size_list)\n             if loading_size <= 800:\n                 self.verify(\n-                    rx_stats == tx_stats and int(tx_outlist[0]) == loading_size,\n+                    rx_stats == tx_stats and int(payload_size_list[0]) == loading_size,\n                     \"IPV6 RX or TX packet number not correct\",\n                 )\n             else:\n                 num = loading_size // 800\n                 for i in range(num):\n                     self.verify(\n-                        int(tx_outlist[i]) == 800,\n-                        \"the packet segmentation incorrect, %s\" % tx_outlist,\n+                        int(payload_size_list[i]) == 800,\n+                        \"the packet segmentation incorrect, %s\" % payload_size_list,\n                     )\n                 if loading_size % 800 != 0:\n                     self.verify(\n-                        int(tx_outlist[num]) == loading_size % 800,\n-                        \"the packet segmentation incorrect, %s\" % tx_outlist,\n+                        int(payload_size_list[num]) == loading_size % 800,\n+                        \"the packet segmentation incorrect, %s\" % payload_size_list,\n                     )\n \n     @check_supported_nic(\n@@ -915,6 +876,7 @@ class TestVfOffload(TestCase):\n                 self.tcpdump_stop_sniff()\n                 rx_stats, payload_size_list = self.tcpdump_analyse_sniff(rx_interface)\n                 tx_stats, _ = self.tcpdump_analyse_sniff(tx_interface)\n+                payload_size_list.sort(reverse=True)\n                 self.logger.info(payload_size_list)\n                 if loading_size <= 800:\n                     self.verify(\n@@ -958,6 +920,7 @@ class TestVfOffload(TestCase):\n                 self.tcpdump_stop_sniff()\n                 rx_stats, payload_size_list = self.tcpdump_analyse_sniff(rx_interface)\n                 tx_stats, _ = self.tcpdump_analyse_sniff(tx_interface)\n+                payload_size_list.sort(reverse=True)\n                 self.logger.info(payload_size_list)\n                 if loading_size <= 800:\n                     self.verify(\n",
    "prefixes": [
        "V2",
        "5/5"
    ]
}