get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/84652/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 84652,
    "url": "http://patches.dpdk.org/api/patches/84652/?format=api",
    "web_url": "http://patches.dpdk.org/project/dts/patch/1606836558-176780-1-git-send-email-yuan.peng@intel.com/",
    "project": {
        "id": 3,
        "url": "http://patches.dpdk.org/api/projects/3/?format=api",
        "name": "DTS",
        "link_name": "dts",
        "list_id": "dts.dpdk.org",
        "list_email": "dts@dpdk.org",
        "web_url": "",
        "scm_url": "git://dpdk.org/tools/dts",
        "webscm_url": "http://git.dpdk.org/tools/dts/",
        "list_archive_url": "https://inbox.dpdk.org/dts",
        "list_archive_url_format": "https://inbox.dpdk.org/dts/{}",
        "commit_url_format": ""
    },
    "msgid": "<1606836558-176780-1-git-send-email-yuan.peng@intel.com>",
    "list_archive_url": "https://inbox.dpdk.org/dts/1606836558-176780-1-git-send-email-yuan.peng@intel.com",
    "date": "2020-12-01T15:29:18",
    "name": "[v1] tests: add TestSuite_cvl_dcf_acl_filter.py",
    "commit_ref": null,
    "pull_url": null,
    "state": "accepted",
    "archived": false,
    "hash": "e12bf8c5f8eb641e8ebfed99640ca803afc7bc6b",
    "submitter": {
        "id": 429,
        "url": "http://patches.dpdk.org/api/people/429/?format=api",
        "name": "Peng, Yuan",
        "email": "yuan.peng@intel.com"
    },
    "delegate": null,
    "mbox": "http://patches.dpdk.org/project/dts/patch/1606836558-176780-1-git-send-email-yuan.peng@intel.com/mbox/",
    "series": [
        {
            "id": 14156,
            "url": "http://patches.dpdk.org/api/series/14156/?format=api",
            "web_url": "http://patches.dpdk.org/project/dts/list/?series=14156",
            "date": "2020-12-01T15:29:18",
            "name": "[v1] tests: add TestSuite_cvl_dcf_acl_filter.py",
            "version": 1,
            "mbox": "http://patches.dpdk.org/series/14156/mbox/"
        }
    ],
    "comments": "http://patches.dpdk.org/api/patches/84652/comments/",
    "check": "pending",
    "checks": "http://patches.dpdk.org/api/patches/84652/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dts-bounces@dpdk.org>",
        "X-Original-To": "patchwork@inbox.dpdk.org",
        "Delivered-To": "patchwork@inbox.dpdk.org",
        "Received": [
            "from dpdk.org (dpdk.org [92.243.14.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id 22C67A04DB;\n\tTue,  1 Dec 2020 09:26:32 +0100 (CET)",
            "from [92.243.14.124] (localhost [127.0.0.1])\n\tby dpdk.org (Postfix) with ESMTP id 08C03C982;\n\tTue,  1 Dec 2020 09:26:31 +0100 (CET)",
            "from mga03.intel.com (mga03.intel.com [134.134.136.65])\n by dpdk.org (Postfix) with ESMTP id C9C73C956\n for <dts@dpdk.org>; Tue,  1 Dec 2020 09:26:26 +0100 (CET)",
            "from fmsmga005.fm.intel.com ([10.253.24.32])\n by orsmga103.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 01 Dec 2020 00:26:11 -0800",
            "from npg_dpdk_nic_yuanpeng_tester62.sh.intel.com ([10.67.119.113])\n by fmsmga005.fm.intel.com with ESMTP; 01 Dec 2020 00:26:09 -0800"
        ],
        "IronPort-SDR": [
            "\n zbrn7eiOSeLhzXq8dubmynDSV5DFJTljzwjjBe2hJY/Oexe/XIO/uhXHcbwSFO0fCukp+ukNt6\n Q19kkwtqODTQ==",
            "\n uUzaDBXNJTF7ZHeiE1HaTzcYeutEDr320l1V7TmpFrGB8IGu2UdvTij9+18GnXs1BCSrcrPW0a\n 9VlLt8YlCcSw=="
        ],
        "X-IronPort-AV": [
            "E=McAfee;i=\"6000,8403,9821\"; a=\"172888367\"",
            "E=Sophos;i=\"5.78,384,1599548400\"; d=\"scan'208\";a=\"172888367\"",
            "E=Sophos;i=\"5.78,384,1599548400\"; d=\"scan'208\";a=\"538925114\""
        ],
        "X-Amp-Result": "SKIPPED(no attachment in message)",
        "X-Amp-File-Uploaded": "False",
        "X-ExtLoop1": "1",
        "From": "Peng Yuan <yuan.peng@intel.com>",
        "To": "dts@dpdk.org",
        "Cc": "pengyuan <yuan.peng@intel.com>",
        "Date": "Tue,  1 Dec 2020 15:29:18 +0000",
        "Message-Id": "<1606836558-176780-1-git-send-email-yuan.peng@intel.com>",
        "X-Mailer": "git-send-email 2.7.4",
        "Subject": "[dts] [PATCH v1]tests: add TestSuite_cvl_dcf_acl_filter.py",
        "X-BeenThere": "dts@dpdk.org",
        "X-Mailman-Version": "2.1.15",
        "Precedence": "list",
        "List-Id": "test suite reviews and discussions <dts.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dts>,\n <mailto:dts-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dts/>",
        "List-Post": "<mailto:dts@dpdk.org>",
        "List-Help": "<mailto:dts-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dts>,\n <mailto:dts-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dts-bounces@dpdk.org",
        "Sender": "\"dts\" <dts-bounces@dpdk.org>"
    },
    "content": "From: pengyuan <yuan.peng@intel.com>\n\nAdd TestSuite_cvl_dcf_acl_filter.py to tests.\n\nSigned-off-by: pengyuan <yuan.peng@intel.com>",
    "diff": "diff --git a/tests/TestSuite_cvl_dcf_acl_filter.py b/tests/TestSuite_cvl_dcf_acl_filter.py\nnew file mode 100644\nindex 00000000..826da9c5\n--- /dev/null\n+++ b/tests/TestSuite_cvl_dcf_acl_filter.py\n@@ -0,0 +1,1518 @@\n+# BSD LICENSE\n+#\n+# Copyright(c) 2020 Intel Corporation. All rights reserved.\n+# All rights reserved.\n+#\n+# Redistribution and use in source and binary forms, with or without\n+# modification, are permitted provided that the following conditions\n+# are met:\n+#\n+#   * Redistributions of source code must retain the above copyright\n+#     notice, this list of conditions and the following disclaimer.\n+#   * Redistributions in binary form must reproduce the above copyright\n+#     notice, this list of conditions and the following disclaimer in\n+#     the documentation and/or other materials provided with the\n+#     distribution.\n+#   * Neither the name of Intel Corporation nor the names of its\n+#     contributors may be used to endorse or promote products derived\n+#     from this software without specific prior written permission.\n+#\n+# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS\n+# \"AS IS\" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT\n+# LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR\n+# A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT\n+# OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,\n+# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT\n+# LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,\n+# DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY\n+# THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT\n+# (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE\n+# OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n+\n+import json\n+import time\n+import re\n+import copy\n+\n+from test_case import TestCase\n+from pmd_output import PmdOutput\n+from packet import Packet\n+from utils import BLUE, RED, GREEN\n+import rte_flow_common as rfc\n+\n+import os\n+\n+vf1_mac = \"00:01:23:45:67:89\"\n+\n+# send packets\n+\n+MAC_IPV4_PAY_SRC_MAC = {\n+    \"match\": [\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\", frag=1)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"01:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/UDP()/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"02:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/TCP()/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"ff:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/SCTP()/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"01:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/ICMP()/Raw(load=\"x\"*30)' % vf1_mac\n+    ],\n+    \"unmatch\": [\n+        'Ether(src=\"00:11:22:33:66:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:66\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\", frag=1)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:66:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/UDP()/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:66\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/TCP()/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:32:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/SCTP()/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"01:11:22:33:44:66\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/ICMP()/Raw(load=\"x\"*30)' % vf1_mac\n+    ]\n+}\n+\n+MAC_IPV4_PAY_DST_MAC = {\n+    \"match\": [\n+        'Ether(src=\"00:02:00:00:00:01\", dst=\"00:11:22:33:44:55\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/Raw(load=\"x\"*30)',\n+        'Ether(src=\"00:02:00:00:00:01\", dst=\"00:11:22:33:44:66\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/UDP()/Raw(load=\"x\"*30)'\n+    ],\n+    \"unmatch\": [\n+        'Ether(src=\"00:02:00:00:00:01\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:02:00:00:00:01\", dst=\"00:11:22:33:66:55\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/Raw(load=\"x\"*30)'\n+    ]\n+}\n+\n+MAC_IPV4_PAY_SRC_IP = {\n+    \"match\": [\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.0\", dst=\"192.168.0.2\")/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\",frag=1)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.158\", dst=\"192.168.0.2\")/UDP()/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.255\", dst=\"192.168.0.2\")/TCP()/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.255\", dst=\"192.168.0.2\")/SCTP()/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.255\", dst=\"192.168.0.2\")/ICMP()/Raw(load=\"x\"*30)' % vf1_mac\n+    ],\n+    \"unmatch\": [\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.1.1\", dst=\"192.168.0.2\")/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.1.1\", dst=\"192.168.0.2\",frag=1)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.1.1\", dst=\"192.168.0.2\")/UDP()/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.1.1\", dst=\"192.168.0.2\")/TCP()/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.1.1\", dst=\"192.168.0.2\")/SCTP()/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.1.1\", dst=\"192.168.0.2\")/ICMP()/Raw(load=\"x\"*30)' % vf1_mac\n+    ]\n+}\n+\n+MAC_IPV4_PAY_DST_IP = {\n+    \"match\": [\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.0\")/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.0\",frag=1)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.158\")/UDP()/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.255\")/TCP()/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.255\")/SCTP()/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.255\")/ICMP()/Raw(load=\"x\"*30)' % vf1_mac\n+    ],\n+    \"unmatch\": [\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.1.2\")/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.1.2\",frag=1)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.1.2\")/UDP()/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.1.2\")/TCP()/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.1.2\")/SCTP()/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.1.2\")/ICMP()/Raw(load=\"x\"*30)' % vf1_mac\n+    ]\n+}\n+\n+MAC_IPV4_PAY_SRC_DST_IP = {\n+    \"match\": [\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.255\", dst=\"192.168.0.2\")/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.255\", dst=\"192.168.0.2\",frag=1)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.158\", dst=\"192.168.255.2\")/UDP()/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.0\", dst=\"192.168.1.2\")/TCP()/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.0\", dst=\"192.168.1.2\")/SCTP()/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.0\", dst=\"192.168.1.2\")/ICMP()/Raw(load=\"x\"*30)' % vf1_mac\n+    ],\n+    \"unmatch\": [\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.1.1\", dst=\"192.168.0.2\")/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.1.1\", dst=\"192.168.0.2\",frag=1)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.1.1\", dst=\"192.168.0.2\")/UDP()/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.3\")/TCP()/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.3\")/SCTP()/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.3\")/ICMP()/Raw(load=\"x\"*30)' % vf1_mac\n+    ]\n+}\n+\n+MAC_IPV4_PAY_SRC_DST_MAC_SRC_DST_IP = {\n+    \"match\": [\n+        'Ether(src=\"00:11:22:33:44:1b\", dst=\"33:00:00:00:00:02\")/IP(src=\"192.168.0.255\", dst=\"192.168.0.2\")/Raw(load=\"x\"*30)',\n+        'Ether(src=\"00:11:22:33:44:1b\", dst=\"33:00:00:00:00:02\")/IP(src=\"192.168.0.255\", dst=\"192.168.0.2\",frag=1)/Raw(load=\"x\"*30)',\n+        'Ether(src=\"00:11:22:33:44:00\", dst=\"33:00:00:00:00:03\")/IP(src=\"192.168.0.158\", dst=\"192.168.255.2\")/UDP()/Raw(load=\"x\"*30)',\n+        'Ether(src=\"00:11:22:33:44:ff\", dst=\"33:00:00:00:00:02\")/IP(src=\"192.168.0.0\", dst=\"192.168.1.2\")/TCP()/Raw(load=\"x\"*30)',\n+        'Ether(src=\"00:11:22:33:44:ff\", dst=\"33:00:00:00:00:02\")/IP(src=\"192.168.0.0\", dst=\"192.168.1.2\")/SCTP()/Raw(load=\"x\"*30)',\n+        'Ether(src=\"00:11:22:33:44:ff\", dst=\"33:00:00:00:00:02\")/IP(src=\"192.168.0.0\", dst=\"192.168.1.2\")/ICMP()/Raw(load=\"x\"*30)'\n+    ],\n+    \"unmatch\": [\n+        'Ether(src=\"00:11:22:33:66:55\", dst=\"33:00:00:00:00:02\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/Raw(load=\"x\"*30)',\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\",frag=1)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"33:00:00:00:00:01\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/UDP()/Raw(load=\"x\"*30)',\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"33:00:00:00:00:02\")/IP(src=\"192.168.1.1\", dst=\"192.168.0.2\")/TCP()/Raw(load=\"x\"*30)',\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"33:00:00:00:00:02\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.3\")/SCTP()/Raw(load=\"x\"*30)',\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"33:00:00:00:00:02\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.3\")/ICMP()/Raw(load=\"x\"*30)'\n+    ]\n+}\n+\n+MAC_IPV4_TCP_SRC_MAC = {\n+    \"match\": [\n+        'Ether(src=\"00:11:22:33:44:54\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/TCP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac\n+    ],\n+    \"unmatch\": [\n+        'Ether(src=\"00:11:22:33:44:57\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/TCP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IPv6()/TCP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/UDP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/Raw(load=\"x\"*30)' % vf1_mac\n+    ]\n+}\n+\n+MAC_IPV4_TCP_DST_MAC = {\n+    \"match\": [\n+        'Ether(src=\"00:02:00:00:00:01\", dst=\"00:11:22:33:44:55\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/TCP(sport=8012,dport=8018)/Raw(load=\"x\"*30)',\n+        'Ether(src=\"00:02:00:00:00:01\", dst=\"00:11:22:33:44:66\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/TCP(sport=8012,dport=8018)/Raw(load=\"x\"*30)'\n+    ],\n+    \"unmatch\": [\n+        'Ether(src=\"00:02:00:00:00:01\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/TCP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:02:00:00:00:01\", dst=\"00:11:22:33:66:55\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/TCP(sport=8012,dport=8018)/Raw(load=\"x\"*30)'\n+    ]\n+}\n+\n+MAC_IPV4_TCP_SRC_IP = {\n+    \"match\": [\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.0\", dst=\"192.168.0.2\")/TCP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac\n+    ],\n+    \"unmatch\": [\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.3\", dst=\"192.168.0.2\")/TCP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/UDP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/Raw(load=\"x\"*30)' % vf1_mac\n+    ]\n+}\n+\n+MAC_IPV4_TCP_DST_IP = {\n+    \"match\": [\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.14\")/TCP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac\n+    ],\n+    \"unmatch\": [\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.3\")/TCP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/SCTP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/Raw(load=\"x\"*30)' % vf1_mac\n+    ]\n+}\n+\n+MAC_IPV4_TCP_SRC_PORT = {\n+    \"match\": [\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP()/TCP(sport=8012)/Raw(load=\"x\"*30)' % vf1_mac\n+    ],\n+    \"unmatch\": [\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP()/TCP(sport=7985)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IPv6()/TCP(sport=8012)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP()/SCTP(sport=8012)/Raw(load=\"x\"*30)' % vf1_mac\n+    ]\n+}\n+\n+MAC_IPV4_TCP_DST_PORT = {\n+    \"match\": [\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP()/TCP(dport=8012)/Raw(load=\"x\"*30)' % vf1_mac\n+    ],\n+    \"unmatch\": [\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP()/TCP(dport=7985)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP()/UDP(dport=8012)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IPv6()/TCP(dport=8012)/Raw(load=\"x\"*30)' % vf1_mac\n+    ]\n+}\n+\n+MAC_IPV4_TCP_SRC_DST_IP_SRC_DST_PORT = {\n+    \"match\": [\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.2\", dst=\"192.168.255.2\")/TCP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac\n+    ],\n+    \"unmatch\": [\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.1.1\", dst=\"192.168.0.2\")/TCP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.3\")/TCP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/TCP(sport=7985,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/TCP(sport=8012,dport=7985)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/UDP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac\n+    ]\n+}\n+\n+MAC_IPV4_TCP_SRC_DST_MAC_SRC_DST_IP_SRC_DST_PORT = {\n+    \"match\": [\n+        'Ether(src=\"00:11:22:33:44:66\", dst=\"33:00:00:00:00:03\")/IP(src=\"192.168.0.2\", dst=\"192.168.255.2\")/TCP(sport=8012,dport=8018)/Raw(load=\"x\"*30)'\n+    ],\n+    \"unmatch\": [\n+        'Ether(src=\"00:11:22:33:66:55\", dst=\"33:00:00:00:00:02\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/TCP(sport=8010,dport=8017)/Raw(load=\"x\"*30)',\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"33:00:00:00:00:01\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/TCP(sport=8010,dport=8017)/Raw(load=\"x\"*30)',\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"33:00:00:00:00:02\")/IP(src=\"192.168.1.1\", dst=\"192.168.0.2\")/TCP(sport=8010,dport=8017)/Raw(load=\"x\"*30)',\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"33:00:00:00:00:02\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.3\")/TCP(sport=8010,dport=8017)/Raw(load=\"x\"*30)',\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"33:00:00:00:00:02\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/TCP(sport=7985,dport=8017)/Raw(load=\"x\"*30)',\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"33:00:00:00:00:02\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/TCP(sport=8010,dport=7985)/Raw(load=\"x\"*30)',\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"33:00:00:00:00:02\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/UDP(sport=8010,dport=8017)/Raw(load=\"x\"*30)'\n+    ]\n+}\n+\n+MAC_IPV4_UDP_SRC_MAC = {\n+    \"match\": [\n+        'Ether(src=\"00:11:22:33:44:54\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/UDP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac\n+    ],\n+    \"unmatch\": [\n+        'Ether(src=\"00:11:22:33:44:57\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/UDP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IPv6()/UDP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/TCP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/Raw(load=\"x\"*30)' % vf1_mac\n+    ]\n+}\n+\n+MAC_IPV4_UDP_DST_MAC = {\n+    \"match\": [\n+        'Ether(src=\"00:02:00:00:00:01\", dst=\"00:11:22:33:44:55\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/UDP(sport=8012,dport=8018)/Raw(load=\"x\"*30)',\n+        'Ether(src=\"00:02:00:00:00:01\", dst=\"00:11:22:33:44:66\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/UDP(sport=8012,dport=8018)/Raw(load=\"x\"*30)'\n+    ],\n+    \"unmatch\": [\n+        'Ether(src=\"00:02:00:00:00:01\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/UDP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:02:00:00:00:01\", dst=\"00:11:22:33:66:55\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/UDP(sport=8012,dport=8018)/Raw(load=\"x\"*30)'\n+    ]\n+}\n+\n+MAC_IPV4_UDP_SRC_IP = {\n+    \"match\": [\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.0\", dst=\"192.168.0.2\")/UDP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac\n+    ],\n+    \"unmatch\": [\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.3\", dst=\"192.168.0.2\")/UDP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/TCP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/Raw(load=\"x\"*30)' % vf1_mac\n+    ]\n+}\n+\n+MAC_IPV4_UDP_DST_IP = {\n+    \"match\": [\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.14\")/UDP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac\n+    ],\n+    \"unmatch\": [\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.3\")/UDP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/SCTP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/Raw(load=\"x\"*30)' % vf1_mac\n+    ]\n+}\n+\n+MAC_IPV4_UDP_SRC_PORT = {\n+    \"match\": [\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP()/UDP(sport=8012)/Raw(load=\"x\"*30)' % vf1_mac\n+    ],\n+    \"unmatch\": [\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP()/UDP(sport=7985)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IPv6()/UDP(sport=8012)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP()/SCTP(sport=8012)/Raw(load=\"x\"*30)' % vf1_mac\n+    ]\n+}\n+\n+MAC_IPV4_UDP_DST_PORT = {\n+    \"match\": [\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP()/UDP(dport=8012)/Raw(load=\"x\"*30)' % vf1_mac\n+    ],\n+    \"unmatch\": [\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP()/UDP(dport=7985)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP()/TCP(dport=8012)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IPv6()/UDP(dport=8012)/Raw(load=\"x\"*30)' % vf1_mac\n+    ]\n+}\n+\n+MAC_IPV4_UDP_SRC_DST_IP_SRC_DST_PORT = {\n+    \"match\": [\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.2\", dst=\"192.168.255.2\")/UDP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac\n+    ],\n+    \"unmatch\": [\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.1.1\", dst=\"192.168.0.2\")/UDP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.3\")/UDP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/UDP(sport=7985,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/UDP(sport=8012,dport=7985)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/TCP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac\n+    ]\n+}\n+\n+MAC_IPV4_UDP_SRC_DST_MAC_SRC_DST_IP_SRC_DST_PORT = {\n+    \"match\": [\n+        'Ether(src=\"00:11:22:33:44:66\", dst=\"33:00:00:00:00:02\")/IP(src=\"192.168.0.2\", dst=\"192.168.255.2\")/UDP(sport=8012,dport=8018)/Raw(load=\"x\"*30)'\n+    ],\n+    \"unmatch\": [\n+        'Ether(src=\"00:11:22:33:66:55\", dst=\"33:00:00:00:00:03\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/UDP(sport=8010,dport=8017)/Raw(load=\"x\"*30)',\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"33:00:00:00:00:01\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/UDP(sport=8010,dport=8017)/Raw(load=\"x\"*30)',\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"33:00:00:00:00:02\")/IP(src=\"192.168.1.1\", dst=\"192.168.0.2\")/UDP(sport=8010,dport=8017)/Raw(load=\"x\"*30)',\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"33:00:00:00:00:02\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.3\")/UDP(sport=8010,dport=8017)/Raw(load=\"x\"*30)',\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"33:00:00:00:00:02\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/UDP(sport=7985,dport=8017)/Raw(load=\"x\"*30)',\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"33:00:00:00:00:02\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/UDP(sport=8010,dport=7985)/Raw(load=\"x\"*30)'\n+    ]\n+}\n+\n+MAC_IPV4_SCTP_SRC_MAC = {\n+    \"match\": [\n+        'Ether(src=\"00:11:22:33:44:54\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/SCTP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac\n+    ],\n+    \"unmatch\": [\n+        'Ether(src=\"00:11:22:33:44:57\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/SCTP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IPv6()/SCTP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/UDP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/Raw(load=\"x\"*30)' % vf1_mac\n+    ]\n+}\n+\n+MAC_IPV4_SCTP_DST_MAC = {\n+    \"match\": [\n+        'Ether(src=\"00:02:00:00:00:01\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/SCTP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac\n+    ],\n+    \"unmatch\": [\n+        'Ether(src=\"00:02:00:00:00:01\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/UDP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac\n+    ]\n+}\n+\n+MAC_IPV4_SCTP_SRC_IP = {\n+    \"match\": [\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.0\", dst=\"192.168.0.2\")/SCTP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac\n+    ],\n+    \"unmatch\": [\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.3\", dst=\"192.168.0.2\")/SCTP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/UDP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/Raw(load=\"x\"*30)' % vf1_mac\n+    ]\n+}\n+\n+MAC_IPV4_SCTP_DST_IP = {\n+    \"match\": [\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.14\")/SCTP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac\n+    ],\n+    \"unmatch\": [\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.3\")/SCTP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/UDP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/Raw(load=\"x\"*30)' % vf1_mac\n+    ]\n+}\n+\n+MAC_IPV4_SCTP_SRC_PORT = {\n+    \"match\": [\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP()/SCTP(sport=8012)/Raw(load=\"x\"*30)' % vf1_mac\n+    ],\n+    \"unmatch\": [\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP()/SCTP(sport=7985)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IPv6()/SCTP(sport=8012)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP()/UDP(sport=8012)/Raw(load=\"x\"*30)' % vf1_mac\n+    ]\n+}\n+\n+MAC_IPV4_SCTP_DST_PORT = {\n+    \"match\": [\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP()/SCTP(dport=8012)/Raw(load=\"x\"*30)' % vf1_mac\n+    ],\n+    \"unmatch\": [\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP()/SCTP(dport=7985)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP()/UDP(dport=8012)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IPv6()/SCTP(dport=8012)/Raw(load=\"x\"*30)' % vf1_mac\n+    ]\n+}\n+\n+MAC_IPV4_SCTP_SRC_DST_IP_SRC_DST_PORT = {\n+    \"match\": [\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.2\", dst=\"192.168.255.2\")/SCTP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac\n+    ],\n+    \"unmatch\": [\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.1.1\", dst=\"192.168.0.2\")/SCTP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.3\")/SCTP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/SCTP(sport=7985,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/SCTP(sport=8012,dport=7985)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/UDP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac\n+    ]\n+}\n+\n+MAC_IPV4_SCTP_SRC_DST_MAC_SRC_DST_IP_SRC_DST_PORT = {\n+    \"match\": [\n+        'Ether(src=\"00:11:22:33:44:66\", dst=\"%s\")/IP(src=\"192.168.0.2\", dst=\"192.168.255.2\")/SCTP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+    ],\n+    \"unmatch\": [\n+        'Ether(src=\"00:11:22:33:66:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/SCTP(sport=8010,dport=8017)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.1.1\", dst=\"192.168.0.2\")/SCTP(sport=8010,dport=8017)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.3\")/SCTP(sport=8010,dport=8017)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/SCTP(sport=7985,dport=8017)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/SCTP(sport=8010,dport=7985)/Raw(load=\"x\"*30)' % vf1_mac,\n+        'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/UDP(sport=8010,dport=8017)/Raw(load=\"x\"*30)' % vf1_mac\n+    ]\n+}\n+\n+# test vectors\n+\n+tv_mac_ipv4_pay_src_mac = {\n+    \"name\": \"test_mac_ipv4_pay_src_mac\",\n+    \"rules\": \"flow create 0 ingress pattern eth src spec 00:11:22:33:44:55 src mask 00:ff:ff:ff:ff:ff / ipv4 / end actions drop / end\",\n+    \"scapy_str\": MAC_IPV4_PAY_SRC_MAC,\n+    \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_pay_dst_mac = {\n+    \"name\": \"test_mac_ipv4_pay_dst_mac\",\n+    \"rules\": [\n+        \"flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv4 / end actions vf id 1 / end\",\n+        \"flow create 0 ingress pattern eth dst is 00:11:22:33:44:66 / ipv4 / end actions vf id 1 / end\",\n+        \"flow create 0 ingress pattern eth dst is 00:11:22:33:66:55 / ipv4 / end actions vf id 1 / end\",\n+        \"flow create 0 ingress pattern eth dst spec 00:11:22:33:44:55 dst mask ff:ff:ff:ff:ff:00 / ipv4 / end actions drop / end\"],\n+    \"scapy_str\": MAC_IPV4_PAY_DST_MAC,\n+    \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_pay_src_ip = {\n+    \"name\": \"test_mac_ipv4_pay_src_ip\",\n+    \"rules\": \"flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.255.255.0 / end actions drop / end\",\n+    \"scapy_str\": MAC_IPV4_PAY_SRC_IP,\n+    \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_pay_dst_ip = {\n+    \"name\": \"test_mac_ipv4_pay_dst_ip\",\n+    \"rules\": \"flow create 0 ingress pattern eth / ipv4 dst spec 192.168.0.2 dst mask 255.255.255.0 / end actions drop / end\",\n+    \"scapy_str\": MAC_IPV4_PAY_DST_IP,\n+    \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_pay_src_dst_ip = {\n+    \"name\": \"test_mac_ipv4_pay_src_dst_ip\",\n+    \"rules\": \"flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.255.255.0 dst spec 192.168.0.2 dst mask 255.255.0.255 / end actions drop / end\",\n+    \"scapy_str\": MAC_IPV4_PAY_SRC_DST_IP,\n+    \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_pay_src_dst_mac_src_dst_ip = {\n+    \"name\": \"test_mac_ipv4_pay_src_dst_mac_src_dst_ip\",\n+    \"rules\": [\n+        \"flow create 0 ingress pattern eth dst is 33:00:00:00:00:01 / ipv4 / end actions vf id 1 / end\",\n+        \"flow create 0 ingress pattern eth dst is 33:00:00:00:00:02 / ipv4 / end actions vf id 1 / end\",\n+        \"flow create 0 ingress pattern eth dst is 33:00:00:00:00:03 / ipv4 / end actions vf id 1 / end\",\n+        \"flow create 0 ingress pattern eth src spec 00:11:22:33:44:55 src mask ff:ff:ff:ff:ff:00 dst spec 33:00:00:00:00:02 dst mask ff:ff:ff:ff:ff:fe / ipv4 src spec 192.168.0.1 src mask 255.255.255.0 dst spec 192.168.0.2 dst mask 255.255.0.255 / end actions drop / end\"],\n+    \"scapy_str\": MAC_IPV4_PAY_SRC_DST_MAC_SRC_DST_IP,\n+    \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_tcp_src_mac = {\n+    \"name\": \"test_mac_ipv4_tcp_src_mac\",\n+    \"rules\": \"flow create 0 ingress pattern eth src spec 00:11:22:33:44:55 src mask ff:ff:ff:ff:ff:fe / ipv4 / tcp / end actions drop / end\",\n+    \"scapy_str\": MAC_IPV4_TCP_SRC_MAC,\n+    \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_tcp_dst_mac = {\n+    \"name\": \"test_mac_ipv4_tcp_dst_mac\",\n+    \"rules\": [\n+        \"flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv4 / tcp / end actions vf id 1 / end\",\n+        \"flow create 0 ingress pattern eth dst is 00:11:22:33:44:66 / ipv4 / tcp / end actions vf id 1 / end\",\n+        \"flow create 0 ingress pattern eth dst is 00:11:22:33:66:55 / ipv4 / tcp / end actions vf id 1 / end\",\n+        \"flow create 0 ingress pattern eth dst spec 00:11:22:33:44:55 dst mask ff:ff:ff:ff:ff:00 / ipv4 / tcp / end actions drop / end\"],\n+    \"scapy_str\": MAC_IPV4_TCP_DST_MAC,\n+    \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_tcp_src_ip = {\n+    \"name\": \"test_mac_ipv4_tcp_src_ip\",\n+    \"rules\": \"flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.255.255.254 / tcp / end actions drop / end\",\n+    \"scapy_str\": MAC_IPV4_TCP_SRC_IP,\n+    \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_tcp_dst_ip = {\n+    \"name\": \"test_mac_ipv4_tcp_dst_ip\",\n+    \"rules\": \"flow create 0 ingress pattern eth / ipv4 dst spec 192.168.0.2 dst mask 255.255.255.243 / tcp / end actions drop / end\",\n+    \"scapy_str\": MAC_IPV4_TCP_DST_IP,\n+    \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_tcp_src_port = {\n+    \"name\": \"test_mac_ipv4_tcp_src_port\",\n+    \"rules\": \"flow create 0 priority 0 ingress pattern eth / ipv4 / tcp src spec 8010 src mask 65520 / end actions drop / end\",\n+    \"scapy_str\": MAC_IPV4_TCP_SRC_PORT,\n+    \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_tcp_dst_port = {\n+    \"name\": \"test_mac_ipv4_tcp_dst_port\",\n+    \"rules\": \"flow create 0 priority 0 ingress pattern eth / ipv4 / tcp dst spec 8010 dst mask 65520 / end actions drop / end\",\n+    \"scapy_str\": MAC_IPV4_TCP_DST_PORT,\n+    \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_tcp_src_dst_ip_src_dst_port = {\n+    \"name\": \"test_mac_ipv4_tcp_src_dst_ip_src_dst_port\",\n+    \"rules\": \"flow create 0 priority 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.255.255.0 dst spec 192.168.0.2 dst mask 255.255.0.255 / tcp src spec 8010 src mask 65520 dst spec 8017 dst mask 65520 / end actions drop / end\",\n+    \"scapy_str\": MAC_IPV4_TCP_SRC_DST_IP_SRC_DST_PORT,\n+    \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_tcp_src_dst_mac_src_dst_ip_src_dst_port = {\n+    \"name\": \"test_mac_ipv4_tcp_src_dst_mac_src_dst_ip_src_dst_port\",\n+    \"rules\": [\n+        \"flow create 0 ingress pattern eth dst is 33:00:00:00:00:01 / ipv4 / end actions vf id 1 / end\",\n+        \"flow create 0 ingress pattern eth dst is 33:00:00:00:00:02 / ipv4 / end actions vf id 1 / end\",\n+        \"flow create 0 ingress pattern eth dst is 33:00:00:00:00:03 / ipv4 / end actions vf id 1 / end\",\n+        \"flow create 0 priority 0 ingress pattern eth src spec 00:11:22:33:44:55 src mask ff:ff:ff:ff:ff:00 dst spec 33:00:00:00:00:02 dst mask ff:ff:ff:ff:ff:fe / ipv4 src spec 192.168.0.1 src mask 255.255.255.0 dst spec 192.168.0.2 dst mask 255.255.0.255 / tcp src spec 8010 src mask 65520 dst spec 8017 dst mask 65520 / end actions drop / end\"],\n+    \"scapy_str\": MAC_IPV4_TCP_SRC_DST_MAC_SRC_DST_IP_SRC_DST_PORT,\n+    \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_udp_src_mac = {\n+    \"name\": \"test_mac_ipv4_udp_src_mac\",\n+    \"rules\": \"flow create 0 ingress pattern eth src spec 00:11:22:33:44:55 src mask ff:ff:ff:ff:ff:fe / ipv4 / udp / end actions drop / end\",\n+    \"scapy_str\": MAC_IPV4_UDP_SRC_MAC,\n+    \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_udp_dst_mac = {\n+    \"name\": \"test_mac_ipv4_udp_dst_mac\",\n+    \"rules\": [\n+        \"flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv4 / udp / end actions vf id 1 / end\",\n+        \"flow create 0 ingress pattern eth dst is 00:11:22:33:44:66 / ipv4 / udp / end actions vf id 1 / end\",\n+        \"flow create 0 ingress pattern eth dst is 00:11:22:33:66:55 / ipv4 / udp / end actions vf id 1 / end\",\n+        \"flow create 0 ingress pattern eth dst spec 00:11:22:33:44:55 dst mask ff:ff:ff:ff:ff:00 / ipv4 / udp / end actions drop / end\"],\n+    \"scapy_str\": MAC_IPV4_UDP_DST_MAC,\n+    \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_udp_src_ip = {\n+    \"name\": \"test_mac_ipv4_udp_src_ip\",\n+    \"rules\": \"flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.255.255.254 / udp / end actions drop / end\",\n+    \"scapy_str\": MAC_IPV4_UDP_SRC_IP,\n+    \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_udp_dst_ip = {\n+    \"name\": \"test_mac_ipv4_udp_dst_ip\",\n+    \"rules\": \"flow create 0 ingress pattern eth / ipv4 dst spec 192.168.0.2 dst mask 255.255.255.243 / udp / end actions drop / end\",\n+    \"scapy_str\": MAC_IPV4_UDP_DST_IP,\n+    \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_udp_src_port = {\n+    \"name\": \"test_mac_ipv4_udp_src_port\",\n+    \"rules\": \"flow create 0 priority 0 ingress pattern eth / ipv4 / udp src spec 8010 src mask 65520 / end actions drop / end\",\n+    \"scapy_str\": MAC_IPV4_UDP_SRC_PORT,\n+    \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_udp_dst_port = {\n+    \"name\": \"test_mac_ipv4_udp_dst_port\",\n+    \"rules\": \"flow create 0 priority 0 ingress pattern eth / ipv4 / udp dst spec 8010 dst mask 65520 / end actions drop / end\",\n+    \"scapy_str\": MAC_IPV4_UDP_DST_PORT,\n+    \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_udp_src_dst_ip_src_dst_port = {\n+    \"name\": \"test_mac_ipv4_udp_src_dst_ip_src_dst_port\",\n+    \"rules\": \"flow create 0 priority 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.255.255.0 dst spec 192.168.0.2 dst mask 255.255.0.255 / udp src spec 8010 src mask 65520 dst spec 8017 dst mask 65520 / end actions drop / end\",\n+    \"scapy_str\": MAC_IPV4_UDP_SRC_DST_IP_SRC_DST_PORT,\n+    \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_udp_src_dst_mac_src_dst_ip_src_dst_port = {\n+    \"name\": \"test_mac_ipv4_udp_src_dst_mac_src_dst_ip_src_dst_port\",\n+    \"rules\": [\n+        \"flow create 0 ingress pattern eth dst is 33:00:00:00:00:01 / ipv4 / udp / end actions vf id 1 / end\",\n+        \"flow create 0 ingress pattern eth dst is 33:00:00:00:00:02 / ipv4 / udp / end actions vf id 1 / end\",\n+        \"flow create 0 ingress pattern eth dst is 33:00:00:00:00:03 / ipv4 / udp / end actions vf id 1 / end\",\n+        \"flow create 0 priority 0 ingress pattern eth src spec 00:11:22:33:44:55 src mask ff:ff:ff:ff:ff:00 dst spec 33:00:00:00:00:03 dst mask ff:ff:ff:ff:ff:fe / ipv4 src spec 192.168.0.1 src mask 255.255.255.0 dst spec 192.168.0.2 dst mask 255.255.0.255 / udp src spec 8010 src mask 65520 dst spec 8017 dst mask 65520 / end actions drop / end\"],\n+    \"scapy_str\": MAC_IPV4_UDP_SRC_DST_MAC_SRC_DST_IP_SRC_DST_PORT,\n+    \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_sctp_src_mac = {\n+    \"name\": \"test_mac_ipv4_sctp_src_mac\",\n+    \"rules\": \"flow create 0 ingress pattern eth src spec 00:11:22:33:44:55 src mask ff:ff:ff:ff:ff:fe / ipv4 / sctp / end actions drop / end\",\n+    \"scapy_str\": MAC_IPV4_SCTP_SRC_MAC,\n+    \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_sctp_dst_mac = {\n+    \"name\": \"test_mac_ipv4_sctp_dst_mac\",\n+    \"rules\": [\n+        \"flow create 0 ingress pattern eth dst spec %s dst mask ff:ff:ff:ff:ff:00 / ipv4 / sctp / end actions drop / end\" % vf1_mac],\n+    \"scapy_str\": MAC_IPV4_SCTP_DST_MAC,\n+    \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_sctp_src_ip = {\n+    \"name\": \"test_mac_ipv4_sctp_src_ip\",\n+    \"rules\": \"flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.255.255.254 / sctp / end actions drop / end\",\n+    \"scapy_str\": MAC_IPV4_SCTP_SRC_IP,\n+    \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_sctp_dst_ip = {\n+    \"name\": \"test_mac_ipv4_sctp_dst_ip\",\n+    \"rules\": \"flow create 0 ingress pattern eth / ipv4 dst spec 192.168.0.2 dst mask 255.255.255.243 / sctp / end actions drop / end\",\n+    \"scapy_str\": MAC_IPV4_SCTP_DST_IP,\n+    \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_sctp_src_port = {\n+    \"name\": \"test_mac_ipv4_sctp_src_port\",\n+    \"rules\": \"flow create 0 priority 0 ingress pattern eth / ipv4 / sctp src spec 8010 src mask 65520 / end actions drop / end\",\n+    \"scapy_str\": MAC_IPV4_SCTP_SRC_PORT,\n+    \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_sctp_dst_port = {\n+    \"name\": \"test_mac_ipv4_sctp_dst_port\",\n+    \"rules\": \"flow create 0 priority 0 ingress pattern eth / ipv4 / sctp dst spec 8010 dst mask 65520 / end actions drop / end\",\n+    \"scapy_str\": MAC_IPV4_SCTP_DST_PORT,\n+    \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_sctp_src_dst_ip_src_dst_port = {\n+    \"name\": \"test_mac_ipv4_sctp_src_dst_ip_src_dst_port\",\n+    \"rules\": \"flow create 0 priority 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.255.255.0 dst spec 192.168.0.2 dst mask 255.255.0.255 / sctp src spec 8010 src mask 65520 dst spec 8017 dst mask 65520 / end actions drop / end\",\n+    \"scapy_str\": MAC_IPV4_SCTP_SRC_DST_IP_SRC_DST_PORT,\n+    \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_sctp_src_dst_mac_src_dst_ip_src_dst_port = {\n+    \"name\": \"test_mac_ipv4_sctp_src_dst_mac_src_dst_ip_src_dst_port\",\n+    \"rules\": [\n+        \"flow create 0 priority 0 ingress pattern eth src spec 00:11:22:33:44:55 src mask ff:ff:ff:ff:ff:00 dst spec %s dst mask ff:ff:ff:ff:ff:fe / ipv4 src spec 192.168.0.1 src mask 255.255.255.0 dst spec 192.168.0.2 dst mask 255.255.0.255 / sctp src spec 8010 src mask 65520 dst spec 8017 dst mask 65520 / end actions drop / end\" % vf1_mac],\n+    \"scapy_str\": MAC_IPV4_SCTP_SRC_DST_MAC_SRC_DST_IP_SRC_DST_PORT,\n+    \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+\n+vectors_ipv4_pay_4ports = [tv_mac_ipv4_pay_src_ip, tv_mac_ipv4_pay_dst_ip, tv_mac_ipv4_pay_src_dst_ip]\n+\n+vectors_ipv4_pay_2ports = [tv_mac_ipv4_pay_src_mac, tv_mac_ipv4_pay_dst_mac, tv_mac_ipv4_pay_src_ip, tv_mac_ipv4_pay_dst_ip, tv_mac_ipv4_pay_src_dst_mac_src_dst_ip]\n+\n+vectors_ipv4_tcp_4ports = [tv_mac_ipv4_tcp_src_ip, tv_mac_ipv4_tcp_dst_ip,\n+                    tv_mac_ipv4_tcp_src_port,tv_mac_ipv4_tcp_dst_port,\n+                    tv_mac_ipv4_tcp_src_dst_ip_src_dst_port]\n+\n+vectors_ipv4_tcp_2ports = [tv_mac_ipv4_tcp_src_mac, tv_mac_ipv4_tcp_dst_mac,\n+                    tv_mac_ipv4_tcp_src_ip, tv_mac_ipv4_tcp_dst_ip,\n+                    tv_mac_ipv4_tcp_src_port,tv_mac_ipv4_tcp_dst_port,\n+                    tv_mac_ipv4_tcp_src_dst_mac_src_dst_ip_src_dst_port]\n+\n+vectors_ipv4_udp_4ports = [tv_mac_ipv4_udp_src_ip, tv_mac_ipv4_udp_dst_ip,\n+                    tv_mac_ipv4_udp_src_port,tv_mac_ipv4_udp_dst_port,\n+                    tv_mac_ipv4_udp_src_dst_ip_src_dst_port]\n+\n+vectors_ipv4_udp_2ports = [tv_mac_ipv4_udp_src_mac, tv_mac_ipv4_udp_dst_mac,\n+                    tv_mac_ipv4_udp_src_ip, tv_mac_ipv4_udp_dst_ip,\n+                    tv_mac_ipv4_udp_src_port,tv_mac_ipv4_udp_dst_port,\n+                    tv_mac_ipv4_udp_src_dst_mac_src_dst_ip_src_dst_port]\n+\n+vectors_ipv4_sctp_4ports = [tv_mac_ipv4_sctp_src_ip, tv_mac_ipv4_sctp_dst_ip,\n+                    tv_mac_ipv4_sctp_src_port,tv_mac_ipv4_sctp_dst_port,\n+                    tv_mac_ipv4_sctp_src_dst_ip_src_dst_port]\n+\n+vectors_ipv4_sctp_2ports = [tv_mac_ipv4_sctp_src_mac, tv_mac_ipv4_sctp_dst_mac,\n+                    tv_mac_ipv4_sctp_src_ip, tv_mac_ipv4_sctp_dst_ip,\n+                    tv_mac_ipv4_sctp_src_port,tv_mac_ipv4_sctp_dst_port,\n+                    tv_mac_ipv4_sctp_src_dst_mac_src_dst_ip_src_dst_port]\n+\n+\n+class CVLDCFACLFilterTest(TestCase):\n+\n+    def bind_nics_driver(self, ports, driver=\"\"):\n+        # modprobe vfio driver\n+        if driver == \"vfio-pci\":\n+            for port in ports:\n+                netdev = self.dut.ports_info[port]['port']\n+                driver = netdev.get_nic_driver()\n+                if driver != 'vfio-pci':\n+                    netdev.bind_driver(driver='vfio-pci')\n+\n+        elif driver == \"igb_uio\":\n+            # igb_uio should insmod as default, no need to check\n+            for port in ports:\n+                netdev = self.dut.ports_info[port]['port']\n+                driver = netdev.get_nic_driver()\n+                if driver != 'igb_uio':\n+                    netdev.bind_driver(driver='igb_uio')\n+        else:\n+            for port in ports:\n+                netdev = self.dut.ports_info[port]['port']\n+                driver_now = netdev.get_nic_driver()\n+                if driver == \"\":\n+                    driver = netdev.default_driver\n+                if driver != driver_now:\n+                    netdev.bind_driver(driver=driver)\n+\n+    def set_up_all(self):\n+        \"\"\"\n+        Run at the start of each test suite.\n+        \"\"\"\n+        self.verify(self.nic in [\"columbiaville_25g\",\"columbiaville_100g\"], \"nic is not CVL\")\n+        self.dut_ports = self.dut.get_ports(self.nic)\n+        # Verify that enough ports are available\n+        self.verify(len(self.dut_ports) >= 2, \"Insufficient ports\")\n+        localPort0 = self.tester.get_local_port(self.dut_ports[0])\n+        self.tester_iface0 = self.tester.get_interface(localPort0)\n+        self.pf0_intf = self.dut.ports_info[self.dut_ports[0]]['intf']\n+        self.pf1_intf = self.dut.ports_info[self.dut_ports[1]]['intf']\n+        self.dut.send_expect(\"ifconfig %s up\" % self.tester_iface0, \"# \")\n+        self.pkt = Packet()\n+        self.pmd_output = PmdOutput(self.dut)\n+        self.testpmd_status = \"close\"\n+        #bind pf to kernel\n+        self.bind_nics_driver(self.dut_ports, driver=\"ice\")\n+        #move comms package to package folder\n+        self.suite_config = rfc.get_suite_config(self)\n+        comms_package_location = self.suite_config[\"comms_package_file_location\"]\n+        package_location = self.suite_config[\"package_file_location\"]\n+        self.dut.send_expect(\"cp %s %s\" % (comms_package_location, package_location), \"# \")\n+        self.re_load_ice_driver()\n+        #set vf driver\n+        self.vf_driver = 'vfio-pci'\n+        self.dut.send_expect(\"modprobe uio\", \"# \")\n+        self.path = self.dut.apps_name['test-pmd']\n+        self.setup_1pf_vfs_env()\n+        self.dut.send_expect(\"ifconfig %s up\" % self.tester_iface0, \"# \", 15)\n+\n+        self.src_file_dir = 'dep/'\n+        self.dut_file_dir = '/tmp/'\n+\n+    def setup_1pf_vfs_env(self, pf_port=0, driver='default'):\n+\n+        self.used_dut_port_0 = self.dut_ports[pf_port]\n+        #get PF interface name\n+        out = self.dut.send_expect('ethtool -i %s' % self.pf0_intf, '#')\n+        #generate 4 VFs on PF\n+        self.dut.generate_sriov_vfs_by_port(self.used_dut_port_0, 4, driver=driver)\n+        self.sriov_vfs_port_0 = self.dut.ports_info[self.used_dut_port_0]['vfs_port']\n+        self.vf0_pci = self.sriov_vfs_port_0[0].pci\n+        self.vf1_pci = self.sriov_vfs_port_0[1].pci\n+        #set VF0 as trust\n+        self.dut.send_expect('ip link set %s vf 0 trust on' % self.pf0_intf, '#')\n+        #set VF1 mac address\n+        self.dut.send_expect(\"ip link set %s vf 1 mac %s\" % (self.pf0_intf, vf1_mac), \"# \")\n+        #bind VFs to dpdk driver\n+        for port in self.sriov_vfs_port_0:\n+            port.bind_driver(self.vf_driver)\n+        time.sleep(15)\n+\n+    def re_load_ice_driver(self):\n+        \"\"\"\n+        remove and reload the ice driver\n+        \"\"\"\n+        ice_driver_file_location = self.suite_config[\"ice_driver_file_location\"]\n+        self.dut.send_expect(\"rmmod ice\", \"# \", 60)\n+        self.dut.send_expect(\"insmod %s\" % ice_driver_file_location, \"# \", 60)\n+        self.dut.send_expect(\"ifconfig %s up\" % self.pf0_intf, \"# \", 15)\n+        self.dut.send_expect(\"ifconfig %s up\" % self.tester_iface0, \"# \", 15)\n+\n+    def set_up(self):\n+        \"\"\"\n+        Run before each test case.\n+        \"\"\"\n+\n+    def create_testpmd_command(self, param):\n+        \"\"\"\n+        Create testpmd command\n+        \"\"\"\n+        #Prepare testpmd EAL and parameters\n+        all_eal_param = self.dut.create_eal_parameters(cores='1S/4C/1T',ports=[self.vf0_pci, self.vf1_pci], port_options={self.vf0_pci:\"cap=dcf\"})\n+        command = self.path + all_eal_param + \"--log-level='ice,7'\" + \" -- -i\" + param\n+        return command\n+\n+    def launch_testpmd(self, param=\"\"):\n+        \"\"\"\n+        launch testpmd with the command\n+        \"\"\"\n+        time.sleep(5)\n+        command = self.create_testpmd_command(param)\n+        out = self.dut.send_expect(command, \"testpmd> \", 20)\n+        self.testpmd_status = \"running\"\n+        self.dut.send_expect(\"set portlist 1\", \"testpmd> \", 15)\n+        self.dut.send_expect(\"set fwd rxonly\", \"testpmd> \", 15)\n+        self.dut.send_expect(\"set verbose 1\", \"testpmd> \", 15)\n+        self.pmd_output.execute_cmd(\"start\")\n+        return out\n+\n+    def send_packets(self, packets):\n+        self.pkt.update_pkt(packets)\n+        tx_port = self.tester_iface0\n+        self.pkt.send_pkt(crb=self.tester, tx_port=tx_port)\n+\n+    def send_pkts_getouput(self, pkts):\n+        \"\"\"\n+        if pkt_info is True, we need to get packet infomation to check the RSS hash and FDIR.\n+        if pkt_info is False, we just need to get the packet number and queue number.\n+        \"\"\"\n+        self.send_packets(pkts)\n+        time.sleep(1)\n+        out_info = self.dut.get_session_output(timeout=1)\n+        out_pkt = self.pmd_output.execute_cmd(\"stop\", timeout=15)\n+        out = out_info + out_pkt\n+        self.pmd_output.execute_cmd(\"start\")\n+        return out\n+\n+    def create_acl_filter_rule(self, rules, session_name=\"\", check_stats=True):\n+        \"\"\"\n+        create acl filter rules\n+        \"\"\"\n+        if session_name == \"\":\n+            session_name = self.dut\n+        p = re.compile(r\"Flow rule #(\\d+) created\")\n+        rule_list = []\n+        acl_rule = \"Succeeded to create (4) flow\"\n+        if isinstance(rules, list):\n+            for rule in rules:\n+                out = session_name.send_expect(rule, \"testpmd> \")\n+                if acl_rule in out:\n+                    m = p.search(out)\n+                    if m:\n+                        rule_list.append(m.group(1))\n+                    else:\n+                        rule_list.append(False)\n+        else:\n+            out = session_name.send_expect(rules, \"testpmd> \")\n+            if acl_rule in out:\n+                m = p.search(out)\n+                if m:\n+                    rule_list.append(m.group(1))\n+                else:\n+                    rule_list.append(False)\n+\n+        if check_stats:\n+            self.verify(all(rule_list), \"some rules not created successfully, result %s, rule %s\" % (rule_list, rules))\n+        else:\n+            self.verify(not any(rule_list), \"all rules should create failed, result %s\" % rule_list)\n+        return rule_list\n+\n+    def create_other_filter_rule(self, rules, session_name=\"\", check_stats=True):\n+        \"\"\"\n+        create switch or fdir filter rules\n+        \"\"\"\n+        if session_name == \"\":\n+            session_name = self.dut\n+        p = re.compile(r\"Flow rule #(\\d+) created\")\n+        rule_list = []\n+        if isinstance(rules, list):\n+            for rule in rules:\n+                out = session_name.send_expect(rule, \"testpmd> \")\n+                m = p.search(out)\n+                if m:\n+                    rule_list.append(m.group(1))\n+                else:\n+                    rule_list.append(False)\n+\n+        else:\n+            out = session_name.send_expect(rules, \"testpmd> \")\n+            m = p.search(out)\n+            if m:\n+                rule_list.append(m.group(1))\n+            else:\n+                rule_list.append(False)\n+        if check_stats:\n+            self.verify(all(rule_list), \"some rules not created successfully, result %s, rule %s\" % (rule_list, rules))\n+        else:\n+            self.verify(not any(rule_list), \"all rules should create failed, result %s\" % rule_list)\n+        return rule_list\n+\n+    def check_filter_rule_list(self, port_id, rule_list, session_name=\"\", need_verify=True):\n+        \"\"\"\n+        check the rules in list identical to ones in rule_list\n+        \"\"\"\n+        if session_name == \"\":\n+            session_name = self.dut\n+        out = session_name.send_expect(\"flow list %d\" % port_id, \"testpmd> \", 15)\n+        p = re.compile(r\"ID\\s+Group\\s+Prio\\s+Attr\\s+Rule\")\n+        m = p.search(out)\n+        if not m:\n+            result = []\n+        else:\n+            p_spec = re.compile(\"^(\\d+)\\s\")\n+            out_lines = out.splitlines()\n+            res = filter(bool, map(p_spec.match, out_lines))\n+            result = [i.group(1) for i in res]\n+        if need_verify:\n+            self.verify(result == rule_list,\n+                    \"the rule list is not the same. expect %s, result %s\" % (rule_list, result))\n+        else:\n+            return result\n+\n+    def destroy_acl_filter_rule(self, port_id, rule_list, session_name=\"\", need_verify=True):\n+        if session_name == \"\":\n+            session_name = self.dut\n+        p = re.compile(r\"Flow rule #(\\d+) destroyed\")\n+        destroy_list = []\n+        if isinstance(rule_list, list):\n+            for i in rule_list:\n+                out = session_name.send_expect(\"flow destroy %s rule %s\" % (port_id, i), \"testpmd> \", 15)\n+                m = p.search(out)\n+                if m:\n+                    destroy_list.append(m.group(1))\n+                else:\n+                    destroy_list.append(False)\n+        else:\n+            out = session_name.send_expect(\"flow destroy %s rule %s\" % (port_id, rule_list), \"testpmd> \", 15)\n+            m = p.search(out)\n+            if m:\n+                destroy_list.append(m.group(1))\n+            else:\n+                destroy_list.append(False)\n+            rule_list = [rule_list]\n+        if need_verify:\n+            self.verify(destroy_list == rule_list, \"flow rule destroy failed, expect %s result %s\" % (rule_list, destroy_list))\n+        else:\n+            return destroy_list\n+\n+    def common_process(self, vectors, launch_testpmd=True):\n+\n+        if launch_testpmd:\n+            #launch testpmd\n+            self.launch_testpmd()\n+\n+        test_results = {}\n+        for test_vector in vectors:\n+            try:\n+                self.dut.send_expect(\"flow flush 0\", \"testpmd> \", 120)\n+\n+                #create a rule\n+                rule_list = self.create_acl_filter_rule(test_vector[\"rules\"])\n+                # send and check match packets\n+                out1 = self.send_pkts_getouput(pkts=test_vector[\"scapy_str\"][\"match\"])\n+                rfc.check_drop(out1, pkt_num=len(test_vector[\"scapy_str\"][\"match\"]), check_param=test_vector[\"check_param\"])\n+                # send and check mismatch packets\n+                out2 = self.send_pkts_getouput(pkts=test_vector[\"scapy_str\"][\"unmatch\"])\n+                rfc.check_drop(out2, pkt_num=len(test_vector[\"scapy_str\"][\"unmatch\"]), check_param=test_vector[\"check_param\"],\n+                                 stats=False)\n+                #destroy rule\n+                self.destroy_acl_filter_rule(0, rule_list)\n+                #send matched packets and check\n+                out3 = self.send_pkts_getouput(pkts=test_vector[\"scapy_str\"][\"match\"])\n+                rfc.check_drop(out3, pkt_num=len(test_vector[\"scapy_str\"][\"match\"]), check_param=test_vector[\"check_param\"],\n+                                 stats=False)\n+                test_results[test_vector[\"name\"]] = True\n+                print((GREEN(\"case passed: %s\" % test_vector[\"name\"])))\n+            except Exception as e:\n+                print((RED(e)))\n+                test_results[test_vector[\"name\"]] = False\n+                continue\n+        failed_cases = []\n+        for k, v in list(test_results.items()):\n+            if not v:\n+                failed_cases.append(k)\n+        self.verify(all(test_results.values()), \"{} failed.\".format(failed_cases))\n+\n+    def test_mac_ipv4(self):\n+        if self.nic == \"columbiaville_25g\":\n+            self.common_process(vectors_ipv4_pay_4ports)\n+        else:\n+            self.common_process(vectors_ipv4_pay_2ports)\n+\n+    def test_mac_ipv4_tcp(self):\n+        if self.nic == \"columbiaville_25g\":\n+            self.common_process(vectors_ipv4_tcp_4ports)\n+        else:\n+            self.common_process(vectors_ipv4_tcp_2ports)\n+\n+    def test_mac_ipv4_udp(self):\n+        if self.nic == \"columbiaville_25g\":\n+            self.common_process(vectors_ipv4_udp_4ports)\n+        else:\n+            self.common_process(vectors_ipv4_udp_2ports)\n+\n+    def test_mac_ipv4_sctp(self):\n+        if self.nic == \"columbiaville_25g\":\n+            self.common_process(vectors_ipv4_sctp_4ports)\n+        else:\n+            self.common_process(vectors_ipv4_sctp_2ports)\n+\n+    def test_negative(self):\n+        \"\"\"\n+        negative cases\n+        \"\"\"\n+        out_testpmd = self.launch_testpmd()\n+        self.check_dcf_status(out_testpmd, stats=True)\n+        rules = {\n+            \"inconsistent spec and mask\" : [\n+                \"flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 dst mask 255.255.255.0 / end actions drop / end\",\n+                \"flow create 0 ingress pattern eth / ipv4 / tcp src spec 8010 dst mask 65520 / end actions drop / end\"],\n+            \"only spec/mask\" : [\n+                \"flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 / end actions drop / end\",\n+                \"flow create 0 ingress pattern eth / ipv4 src mask 255.255.255.0 / end actions drop / end\",\n+                \"flow create 0 ingress pattern eth src spec 00:11:22:33:44:55 / ipv4 / tcp / end actions drop / end\",\n+                \"flow create 0 ingress pattern eth src mask ff:ff:ff:ff:ff:00 / ipv4 / tcp / end actions drop / end\",\n+                \"flow create 0 ingress pattern eth / ipv4 / tcp src spec 8010 / end actions drop / end\",\n+                \"flow create 0 ingress pattern eth / ipv4 / tcp src mask 65520 / end actions drop / end\"],\n+            \"all 0 mask\" : [\n+                \"flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 0.0.0.0 / end actions drop / end\",\n+                \"flow create 0 ingress pattern eth / ipv4 / tcp dst spec 8010 dst mask 0 / end actions drop / end\",\n+                \"flow create 0 ingress pattern eth src spec 00:11:22:33:44:55 src mask 00:00:00:00:00:00 / ipv4 / tcp / end actions drop / end\"],\n+            \"acl rules\" : [\n+                \"flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.255.255.0 dst spec 192.168.0.2 dst mask 0.0.0.0 / end actions drop / end\",\n+                \"flow create 0 ingress pattern eth / ipv4 / tcp src spec 8010 src mask 65520 dst spec 8017 dst mask 0 / end actions drop / end\",\n+                \"flow create 0 ingress pattern eth src spec 00:11:22:33:44:55 src mask ff:ff:ff:ff:ff:00 dst spec 00:11:22:33:44:55 dst mask 00:00:00:00:00:00 / ipv4 / tcp / end actions drop / end\"],\n+            \"full mask\" : [\n+                \"flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.255.255.255 dst spec 192.168.0.2 dst mask 255.255.255.255 / end actions drop / end\",\n+                \"flow create 0 ingress pattern eth / ipv4 src spec 192.168.1.1 src mask 255.255.255.255 dst spec 192.168.1.2 dst mask 255.255.255.255 / tcp src spec 8010 src mask 65535 dst spec 8017 dst mask 65535 / end actions drop / end\",\n+                \"flow create 0 ingress pattern eth / ipv4 src spec 192.168.2.1 src mask 255.255.255.255 dst spec 192.168.2.2 dst mask 255.255.255.0 / udp src spec 8010 src mask 65520 dst spec 8017 dst mask 65535 / end actions drop / end\",\n+                \"flow create 0 ingress pattern eth / ipv4 src spec 192.168.2.1 src mask 255.255.255.255 dst spec 192.168.2.2 dst mask 255.255.255.255 / sctp src spec 8012 src mask 65535 dst spec 8018 dst mask 65535 / end actions drop / end\"],\n+        }\n+        # all the rules failed to be created\n+        self.create_acl_filter_rule(rules[\"only spec/mask\"], check_stats=False)\n+        self.check_filter_rule_list(0, [])\n+        self.create_acl_filter_rule(rules[\"all 0 mask\"], check_stats=False)\n+        self.check_filter_rule_list(0, [])\n+        # full mask rules are created as switch rules\n+        self.create_acl_filter_rule(rules[\"full mask\"], check_stats=False)\n+        self.dut.send_expect(\"flow flush 0\", \"testpmd> \", 15)\n+        # inconsistent spec and mask rules\n+        rule_list1 = self.create_acl_filter_rule(rules[\"inconsistent spec and mask\"], check_stats=True)\n+        self.check_filter_rule_list(0, rule_list1)\n+        packet1 = [\n+            'Ether(dst=\"%s\")/IP(src=\"192.168.1.1\",dst=\"0.0.0.0\")/(\"X\"*480)' % vf1_mac,\n+            'Ether(dst=\"%s\")/IP(src=\"192.168.0.1\",dst=\"192.168.0.2\")/TCP(sport=22,dport=0)/(\"X\"*480)' % vf1_mac]\n+        out1 = self.send_pkts_getouput(pkts=packet1)\n+        rfc.check_drop(out1, pkt_num=2, check_param={\"port_id\": 1, \"drop\": 1}, stats=True)\n+        self.dut.send_expect(\"flow flush 0\", \"testpmd> \", 15)\n+        # acl rules combined \"0\" mask and not \"0\" mask\n+        rule_list2 = self.create_acl_filter_rule(rules[\"acl rules\"], check_stats=True)\n+        self.check_filter_rule_list(0, rule_list2)\n+        packet2 = [\n+            'Ether(dst=\"%s\")/IP(src=\"192.168.0.1\",dst=\"192.168.1.2\")/(\"X\"*480)' % vf1_mac,\n+            'Ether(dst=\"%s\")/IP(src=\"192.168.1.1\",dst=\"192.168.0.2\")/TCP(sport=8012,dport=23)/(\"X\"*480)' % vf1_mac,\n+            'Ether(src=\"00:11:22:33:44:55\",dst=\"%s\")/IP(src=\"192.168.1.1\",dst=\"192.168.0.2\")/TCP(sport=22,dport=23)/(\"X\"*480)' % vf1_mac]\n+        out2 = self.send_pkts_getouput(pkts=packet2)\n+        rfc.check_drop(out2, pkt_num=3, check_param={\"port_id\": 1, \"drop\": 1}, stats=True)\n+\n+    def test_max_entry_num_combined_pattern(self):\n+        \"\"\"\n+        the max ACL entry number combined two patterns.\n+        \"\"\"\n+        src_file = 'max_entry_num'\n+        flows=open(self.src_file_dir + src_file,mode='w')\n+        count=0\n+        for i in range(64):\n+            flows.write('flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.%d src mask 255.255.255.0 / end actions drop / end \\n' % i)\n+            count=count+1\n+        for i in range(256):\n+            flows.write('flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.%d src mask 255.255.255.254 / tcp / end actions drop / end \\n' % i)\n+            count=count+1\n+        flows.close()\n+        self.verify(count == 320, \"failed to config 320 acl rules.\")\n+        self.dut.session.copy_file_to(self.src_file_dir + src_file, self.dut_file_dir)\n+\n+        # start testpmd with creating 512 ACL rules\n+        param = \" --cmdline-file=%s\" % (self.dut_file_dir + src_file)\n+        out_testpmd = self.launch_testpmd(param)\n+        self.check_dcf_status(out_testpmd, stats=True)\n+        rule_list = self.dut.send_expect(\"flow list 0\", \"testpmd> \", 15)\n+        self.verify(\"319\" in rule_list, \"320 rules failed to be created\")\n+\n+        # create one more ACl rule failed, it is created as a switch rule.\n+        rule = \"flow create 0 ingress pattern eth / ipv4 src spec 192.168.2.255 src mask 255.255.255.254 / tcp / end actions drop / end\"\n+        self.create_acl_filter_rule(rule, check_stats=False)\n+\n+        # delete one ACL rule, create the rule again, it is created as an ACL rule successfully.\n+        self.dut.send_expect(\"flow destroy 0 rule 319\", \"testpmd> \", 15)\n+        rule_list = self.dut.send_expect(\"flow list 0\", \"testpmd> \", 15)\n+        self.verify(\"319\" not in rule_list, \"rule 319 is not deleted\")\n+        self.create_acl_filter_rule(rule, check_stats=True)\n+        # delete the switch rule\n+        self.dut.send_expect(\"flow destroy 0 rule 320\", \"testpmd> \", 15)\n+        # send and check match packets\n+        packet = 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.2.255\", dst=\"192.168.0.2\")/TCP(sport=22, dport=23)/Raw(load=\"x\"*30)' % vf1_mac\n+        out1 = self.send_pkts_getouput(pkts=packet)\n+        rfc.check_drop(out1, pkt_num=1, check_param={\"port_id\": 1, \"drop\": 1}, stats=True)\n+\n+        # delete all rules, send and check match packets\n+        self.dut.send_expect(\"flow flush 0\", \"testpmd> \", 15)\n+        out1 = self.send_pkts_getouput(pkts=packet)\n+        rfc.check_drop(out1, pkt_num=1, check_param={\"port_id\": 1, \"drop\": 1}, stats=False)\n+\n+    def test_max_entry_num(self):\n+        \"\"\"\n+        the default entry number is 512\n+        \"\"\"\n+        src_file = 'max_entry_num'\n+        flows=open(self.src_file_dir + src_file,mode='w')\n+        count=0\n+        for i in range(256):\n+            flows.write('flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.%d src mask 255.255.255.254 / tcp / end actions drop / end \\n' % i)\n+            count=count+1\n+        for j in range(255):\n+            flows.write('flow create 0 ingress pattern eth / ipv4 src spec 192.168.1.%d src mask 255.255.255.254 / tcp / end actions drop / end \\n' % j)\n+            count=count+1\n+        flows.close()\n+        self.verify(count == 511, \"failed to config 511 acl rules.\")\n+        self.dut.session.copy_file_to(self.src_file_dir + src_file, self.dut_file_dir)\n+\n+        # start testpmd with creating 512 ACL rules\n+        param = \" --cmdline-file=%s\" % (self.dut_file_dir + src_file)\n+        out_testpmd = self.launch_testpmd(param)\n+        self.check_dcf_status(out_testpmd, stats=True)\n+        rule_list = self.dut.send_expect(\"flow list 0\", \"testpmd> \", 15)\n+        self.verify(\"510\" in rule_list, \"511 rules failed to be created\")\n+\n+        # create a switch rule\n+        rule = \"flow create 0 ingress pattern eth / ipv4 src spec 192.168.1.255 src mask 255.255.255.255 / tcp / end actions drop / end\"\n+        self.create_other_filter_rule(rule, check_stats=True)\n+\n+        # create the 512 ACl rule\n+        rule1 = \"flow create 0 ingress pattern eth / ipv4 src spec 192.168.2.255 src mask 255.255.255.254 / tcp / end actions drop / end\"\n+        self.create_acl_filter_rule(rule1, check_stats=True)\n+        rule_list = self.dut.send_expect(\"flow list 0\", \"testpmd> \", 15)\n+        self.verify(\"512\" in rule_list, \"the last ACL rule failed to be created\")\n+\n+        # send and check match packets\n+        packet1 = 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.2.255\", dst=\"192.168.0.2\")/TCP(sport=22, dport=23)/Raw(load=\"x\"*30)' % vf1_mac\n+        out1 = self.send_pkts_getouput(pkts=packet1)\n+        rfc.check_drop(out1, pkt_num=1, check_param={\"port_id\": 1, \"drop\": 1}, stats=True)\n+\n+        # create one more ACl rule\n+        rule2 = \"flow create 0 ingress pattern eth / ipv4 src spec 192.168.3.255 src mask 255.255.255.254 / tcp / end actions drop / end\"\n+        self.create_acl_filter_rule(rule2, check_stats=False)\n+        # send and check match packets\n+        packet2 = 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.3.255\", dst=\"192.168.0.2\")/TCP(sport=22, dport=23)/Raw(load=\"x\"*30)' % vf1_mac\n+        out2 = self.send_pkts_getouput(pkts=packet2)\n+        rfc.check_drop(out2, pkt_num=1, check_param={\"port_id\": 1, \"drop\": 1}, stats=False)\n+\n+        # delete one rule, create the rule again, successfully.\n+        self.dut.send_expect(\"flow destroy 0 rule 512\", \"testpmd> \", 15)\n+        rule_list = self.dut.send_expect(\"flow list 0\", \"testpmd> \", 15)\n+        self.verify(\"512\" not in rule_list, \"rule 512 is not deleted\")\n+        self.create_acl_filter_rule(rule2, check_stats=True)\n+        # send and check match packets\n+        out3 = self.send_pkts_getouput(pkts=packet2)\n+        rfc.check_drop(out3, pkt_num=1, check_param={\"port_id\": 1, \"drop\": 1}, stats=True)\n+\n+        # delete all rules, send and check match packets\n+        self.dut.send_expect(\"flow flush 0\", \"testpmd> \", 15)\n+        out4 = self.send_pkts_getouput(pkts=packet2)\n+        rfc.check_drop(out4, pkt_num=1, check_param={\"port_id\": 1, \"drop\": 1}, stats=False)\n+\n+    def test_max_entry_num_ipv4_other(self):\n+        \"\"\"\n+        create ipv4-other rules, 128 rules can be created at most.\n+        \"\"\"\n+        src_file = 'max_entry_num_ipv4_other'\n+        flows=open(self.src_file_dir + src_file,mode='w')\n+        count=0\n+        for i in range(127):\n+            flows.write('flow create 0 ingress pattern eth / ipv4 src spec 192.168.1.1 src mask 255.255.255.254 dst spec 192.168.0.%d dst mask 255.255.255.254 / end actions drop / end \\n' % i)\n+            count=count+1\n+        flows.close()\n+        self.verify(count == 127, \"failed to config 127 acl rules.\")\n+        self.dut.session.copy_file_to(self.src_file_dir + src_file, self.dut_file_dir)\n+\n+        # start testpmd with creating 128 ACL rules\n+        param = \" --cmdline-file=%s\" % (self.dut_file_dir + src_file)\n+        out_testpmd = self.launch_testpmd(param)\n+        self.check_dcf_status(out_testpmd, stats=True)\n+        rule_list = self.dut.send_expect(\"flow list 0\", \"testpmd> \", 15)\n+        self.verify(\"126\" in rule_list, \"127 rules failed to be created\")\n+\n+        # create one switch rule\n+        rule = \"flow create 0 ingress pattern eth / ipv4 src spec 192.168.1.1 src mask 255.255.255.254 dst spec 192.168.2.100 dst mask 255.255.255.255 / end actions drop / end\"\n+        self.create_other_filter_rule(rule, check_stats=True)\n+\n+        # create the 128th ACl rule\n+        rule1 = \"flow create 0 ingress pattern eth / ipv4 src spec 192.168.1.1 src mask 255.255.255.254 dst spec 192.168.0.127 dst mask 255.255.255.254 / end actions drop / end\"\n+        self.create_acl_filter_rule(rule1, check_stats=True)\n+\n+        # create one more ACl rule\n+        rule2 = \"flow create 0 ingress pattern eth / ipv4 src spec 192.168.1.1 src mask 255.255.255.254 dst spec 192.168.1.128 dst mask 255.255.255.254 / end actions drop / end\"\n+        self.create_acl_filter_rule(rule2, check_stats=False)\n+\n+        # delete one rule, create the rule again, successfully.\n+        self.dut.send_expect(\"flow destroy 0 rule 128\", \"testpmd> \", 15)\n+        rule_list = self.dut.send_expect(\"flow list 0\", \"testpmd> \", 15)\n+        self.verify(\"128\" not in rule_list, \"rule 128 is not deleted\")\n+        self.create_acl_filter_rule(rule2, check_stats=True)\n+        # delete switch rule\n+        self.dut.send_expect(\"flow destroy 0 rule 129\", \"testpmd> \", 15)\n+        rule_list = self.dut.send_expect(\"flow list 0\", \"testpmd> \", 15)\n+        self.verify(\"129\" not in rule_list, \"rule 129 is not deleted\")\n+\n+        # send and check match packets\n+        packet = 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.1.1\", dst=\"192.168.1.128\")/Raw(load=\"x\"*30)' % vf1_mac\n+        out1 = self.send_pkts_getouput(pkts=packet)\n+        rfc.check_drop(out1, pkt_num=1, check_param={\"port_id\": 1, \"drop\": 1}, stats=True)\n+\n+        # delete all rules, send and check match packets\n+        self.dut.send_expect(\"flow flush 0\", \"testpmd> \", 60)\n+        out1 = self.send_pkts_getouput(pkts=packet)\n+        rfc.check_drop(out1, pkt_num=1, check_param={\"port_id\": 1, \"drop\": 1}, stats=False)\n+\n+    def test_multirules_diff_pattern_inputset(self):\n+        \"\"\"\n+        create rules with different patterns or inputset step by step.\n+        \"\"\"\n+        out_testpmd = self.launch_testpmd()\n+        self.check_dcf_status(out_testpmd, stats=True)\n+        rules = [\n+            'flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.255.255.0 / end actions drop / end',\n+            'flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.255.0.255 / end actions drop / end',\n+            'flow create 0 ingress pattern eth / ipv4 src spec 192.168.1.1 src mask 255.255.255.0 / end actions drop / end',\n+            'flow create 0 ingress pattern eth / ipv4 dst spec 192.168.0.1 dst mask 255.255.255.0 / end actions drop / end',\n+            'flow create 0 ingress pattern eth / ipv4 src spec 192.168.2.3 src mask 255.255.0.255 / udp / end actions drop / end'\n+        ]\n+        packets = [\n+            'Ether(dst=\"%s\")/IP(src=\"192.168.0.3\", dst=\"192.168.0.2\")/Raw(load=\"x\"*30)' % vf1_mac,\n+            'Ether(dst=\"%s\")/IP(src=\"192.168.3.1\", dst=\"192.168.0.2\")/Raw(load=\"x\"*30)' % vf1_mac,\n+            'Ether(dst=\"%s\")/IP(src=\"192.168.1.3\", dst=\"192.168.0.2\")/Raw(load=\"x\"*30)' % vf1_mac,\n+            'Ether(dst=\"%s\")/IP(src=\"192.168.3.3\", dst=\"192.168.0.2\")/Raw(load=\"x\"*30)' % vf1_mac,\n+            'Ether(dst=\"%s\")/IP(src=\"192.168.3.3\", dst=\"192.168.1.2\")/UDP(sport=8012, dport=8018)/Raw(load=\"x\"*30)' % vf1_mac\n+        ]\n+\n+        self.create_acl_filter_rule(rules[0], check_stats=True)\n+        out_drop = self.send_pkts_getouput(pkts=packets[0])\n+        rfc.check_drop(out_drop, pkt_num=1, check_param={\"port_id\": 1, \"drop\": 1}, stats=True)\n+        out_receive = self.send_pkts_getouput(pkts=packets[1:5])\n+        rfc.check_drop(out_receive, pkt_num=4, check_param={\"port_id\": 1, \"drop\": 1}, stats=False)\n+\n+        # same input set field, same spec, different mask.\n+        self.create_acl_filter_rule(rules[1], check_stats=True)\n+        out_drop = self.send_pkts_getouput(pkts=packets[0:2])\n+        rfc.check_drop(out_drop, pkt_num=2, check_param={\"port_id\": 1, \"drop\": 1}, stats=True)\n+        out_receive = self.send_pkts_getouput(pkts=packets[2:5])\n+        rfc.check_drop(out_receive, pkt_num=3, check_param={\"port_id\": 1, \"drop\": 1}, stats=False)\n+\n+        # same input set field, different spec, same mask.\n+        self.create_acl_filter_rule(rules[2], check_stats=True)\n+        out_drop = self.send_pkts_getouput(pkts=packets[0:3])\n+        rfc.check_drop(out_drop, pkt_num=3, check_param={\"port_id\": 1, \"drop\": 1}, stats=True)\n+        out_receive = self.send_pkts_getouput(pkts=packets[3:5])\n+        rfc.check_drop(out_receive, pkt_num=2, check_param={\"port_id\": 1, \"drop\": 1}, stats=False)\n+\n+        # same pattern, different input set field.\n+        self.create_acl_filter_rule(rules[3], check_stats=True)\n+        out_drop = self.send_pkts_getouput(pkts=packets[0:4])\n+        rfc.check_drop(out_drop, pkt_num=4, check_param={\"port_id\": 1, \"drop\": 1}, stats=True)\n+        out_receive = self.send_pkts_getouput(pkts=packets[4])\n+        rfc.check_drop(out_receive, pkt_num=1, check_param={\"port_id\": 1, \"drop\": 1}, stats=False)\n+\n+        # different pattern, same input set field.\n+        self.create_acl_filter_rule(rules[4], check_stats=True)\n+        out_drop = self.send_pkts_getouput(pkts=packets[0:5])\n+        rfc.check_drop(out_drop, pkt_num=5, check_param={\"port_id\": 1, \"drop\": 1}, stats=True)\n+\n+    def test_multirules_all_pattern(self):\n+        \"\"\"\n+        create multirules for all patterns\n+        \"\"\"\n+        out_testpmd = self.launch_testpmd()\n+        self.check_dcf_status(out_testpmd, stats=True)\n+        rules = [\n+            'flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.255.255.0 / end actions drop / end',\n+            'flow create 0 ingress pattern eth / ipv4 dst spec 192.168.0.2 dst mask 255.255.255.0 / end actions drop / end',\n+            'flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.255.255.0 dst spec 192.168.0.2 dst mask 255.255.0.255 / end actions drop / end',\n+            'flow create 0 ingress pattern eth / ipv4 / tcp src spec 8010 src mask 65520 / end actions drop / end',\n+            'flow create 0 ingress pattern eth / ipv4 / tcp dst spec 8017 dst mask 65520 / end actions drop / end',\n+            'flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.255.255.254 / tcp / end actions drop / end',\n+            'flow create 0 ingress pattern eth / ipv4 dst spec 192.168.0.2 dst mask 255.255.255.254 / tcp / end actions drop / end',\n+            'flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.255.255.0 dst spec 192.168.0.2 dst mask 255.255.0.255 / tcp src spec 8010 src mask 65520 dst spec 8017 dst mask 65520 / end actions drop / end',\n+            'flow create 0 ingress pattern eth / ipv4 / udp src spec 8017 src mask 65520 / end actions drop / end',\n+            'flow create 0 ingress pattern eth / ipv4 / udp dst spec 8010 dst mask 65520 / end actions drop / end',\n+            'flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.255.254.255 / udp / end actions drop / end',\n+            'flow create 0 ingress pattern eth / ipv4 dst spec 192.168.0.2 dst mask 255.255.254.255 / udp / end actions drop / end',\n+            'flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.255.255.0 dst spec 192.168.0.2 dst mask 255.255.0.255 / udp src spec 8017 src mask 65520 dst spec 8010 dst mask 65520 / end actions drop / end',\n+            'flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.255.255.254 / sctp / end actions drop / end',\n+            'flow create 0 ingress pattern eth / ipv4 dst spec 192.168.0.2 dst mask 255.255.255.254 / sctp / end actions drop / end',\n+            'flow create 0 ingress pattern eth / ipv4 / sctp src spec 8010 src mask 65520 / end actions drop / end',\n+            'flow create 0 ingress pattern eth / ipv4 / sctp dst spec 8010 dst mask 65520 / end actions drop / end',\n+            'flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.255.255.0 dst spec 192.168.0.2 dst mask 255.255.0.255 / sctp src spec 8010 src mask 65520 dst spec 8017 dst mask 65520 / end actions drop / end'\n+        ]\n+        rule_list = self.create_acl_filter_rule(rules, check_stats=True)\n+        self.check_filter_rule_list(0, rule_list)\n+        packets = {\n+            \"drop\": [\n+                'Ether(dst=\"%s\")/IP(src=\"192.168.0.3\", dst=\"192.168.0.2\")/Raw(load=\"x\"*30)' % vf1_mac,\n+                'Ether(dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/Raw(load=\"x\"*30)' % vf1_mac,\n+                'Ether(dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.1.2\")/Raw(load=\"x\"*30)' % vf1_mac,\n+                'Ether(dst=\"%s\")/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/TCP(sport=8012, dport=7985)/Raw(load=\"x\"*30)' % vf1_mac,\n+                'Ether(dst=\"%s\")/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/TCP(sport=7985, dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+                'Ether(dst=\"%s\")/IP(src=\"192.168.0.0\", dst=\"192.168.1.2\")/TCP(sport=7984, dport=7985)/Raw(load=\"x\"*30)' % vf1_mac,\n+                'Ether(dst=\"%s\")/IP(src=\"192.168.1.1\", dst=\"192.168.0.3\")/TCP(sport=7984, dport=7985)/Raw(load=\"x\"*30)' % vf1_mac,\n+                'Ether(dst=\"%s\")/IP(src=\"192.168.0.3\", dst=\"192.168.1.2\")/TCP(sport=8012, dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+                'Ether(dst=\"%s\")/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/UDP(sport=8017, dport=7985)/Raw(load=\"x\"*30)' % vf1_mac,\n+                'Ether(dst=\"%s\")/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/UDP(sport=7985, dport=8012)/Raw(load=\"x\"*30)' % vf1_mac,\n+                'Ether(dst=\"%s\")/IP(src=\"192.168.1.1\", dst=\"192.168.0.3\")/UDP(sport=7984, dport=7985)/Raw(load=\"x\"*30)' % vf1_mac,\n+                'Ether(dst=\"%s\")/IP(src=\"192.168.0.3\", dst=\"192.168.1.2\")/UDP(sport=7984, dport=7985)/Raw(load=\"x\"*30)' % vf1_mac,\n+                'Ether(dst=\"%s\")/IP(src=\"192.168.0.3\", dst=\"192.168.1.2\")/UDP(sport=8018, dport=8012)/Raw(load=\"x\"*30)' % vf1_mac,\n+                'Ether(dst=\"%s\")/IP(src=\"192.168.0.0\", dst=\"192.168.0.3\")/UDP(sport=8012, dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+                'Ether(dst=\"%s\")/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/SCTP(sport=8012, dport=7985)/Raw(load=\"x\"*30)' % vf1_mac,\n+                'Ether(dst=\"%s\")/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/SCTP(sport=7985, dport=8012)/Raw(load=\"x\"*30)' % vf1_mac,\n+                'Ether(dst=\"%s\")/IP(src=\"192.168.1.1\", dst=\"192.168.0.3\")/SCTP(sport=7984, dport=7985)/Raw(load=\"x\"*30)' % vf1_mac,\n+                'Ether(dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.1.2\")/SCTP(sport=7984, dport=7985)/Raw(load=\"x\"*30)' % vf1_mac,\n+                'Ether(dst=\"%s\")/IP(src=\"192.168.0.3\", dst=\"192.168.1.2\")/SCTP(sport=8012, dport=8018)/Raw(load=\"x\"*30)' % vf1_mac],\n+            \"receive\": [\n+                'Ether(dst=\"%s\")/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/Raw(load=\"x\"*30)' % vf1_mac,\n+                'Ether(dst=\"%s\")/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/TCP(sport=8018, dport=8012)/Raw(load=\"x\"*30)' % vf1_mac,\n+                'Ether(dst=\"%s\")/IP(src=\"192.168.1.0\", dst=\"192.168.1.3\")/SCTP(sport=8017, dport=8018)/Raw(load=\"x\"*30)' % vf1_mac]\n+        }\n+        out_drop = self.send_pkts_getouput(pkts=packets[\"drop\"])\n+        rfc.check_drop(out_drop, pkt_num=len(packets[\"drop\"]), check_param={\"port_id\": 1, \"drop\": 1}, stats=True)\n+        out_receive = self.send_pkts_getouput(pkts=packets[\"receive\"])\n+        rfc.check_drop(out_receive, pkt_num=len(packets[\"receive\"]), check_param={\"port_id\": 1, \"drop\": 1}, stats=False)\n+\n+    def test_multi_rteflow_rules(self):\n+        \"\"\"\n+        create switch, acl and fdir rules simultaneously.\n+        \"\"\"\n+        param = \" --rxq=16 --txq=16\"\n+        out_testpmd = self.launch_testpmd(param)\n+        self.check_dcf_status(out_testpmd, stats=True)\n+        rules = {\n+            \"switch\": [\n+                \"flow create 0 ingress pattern eth / ipv4 src is 192.168.0.1 dst is 192.168.0.20 / tcp / end actions vf id 1 / end\",\n+                \"flow create 0 ingress pattern eth / ipv4 src is 192.168.0.2 dst is 192.168.0.20 / tcp / end actions vf id 1 / end\",\n+                \"flow create 0 ingress pattern eth / ipv4 src is 192.168.0.3 dst is 192.168.0.20 / tcp / end actions vf id 1 / end\",\n+                \"flow create 0 ingress pattern eth / ipv4 src is 192.168.0.4 dst is 192.168.0.20 / tcp / end actions vf id 1 / end\"],\n+            \"acl\": [\n+                \"flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.2 src mask 255.255.255.254 / tcp / end actions drop / end\",\n+                \"flow create 0 ingress pattern eth / ipv4 dst spec 192.168.0.21 dst mask 255.255.0.255 / tcp / end actions drop / end\"],\n+            \"fdir\": [\n+                \"flow create 1 ingress pattern eth / ipv4 src is 192.168.0.1 dst is 192.168.0.20 / tcp src is 22 dst is 23 / end actions queue index 3 / mark / end\",\n+                \"flow create 1 ingress pattern eth / ipv4 src is 192.168.0.2 dst is 192.168.0.20 / tcp src is 22 dst is 23 / end actions queue index 3 / mark / end\",\n+                \"flow create 1 ingress pattern eth / ipv4 src is 192.168.1.1 dst is 192.168.0.20 / tcp src is 22 dst is 23 / end actions queue index 3 / mark / end\"]\n+        }\n+        switch_rule_list = self.create_other_filter_rule(rules[\"switch\"], check_stats=True)\n+        self.check_filter_rule_list(0, switch_rule_list)\n+        acl_rule_list = self.create_acl_filter_rule(rules[\"acl\"], check_stats=True)\n+        self.check_filter_rule_list(0, switch_rule_list+acl_rule_list)\n+        fdir_rule_list = self.create_other_filter_rule(rules[\"fdir\"], check_stats=True)\n+        self.check_filter_rule_list(1, fdir_rule_list)\n+\n+        packets = {\n+            \"drop\": [\n+                'Ether(src=\"00:11:22:33:44:55\", dst=\"00:01:23:45:67:88\")/IP(src=\"192.168.0.2\", dst=\"192.168.0.20\")/TCP(sport=22,dport=23)/Raw(load=\"x\"*30)',\n+                'Ether(src=\"00:11:22:33:44:55\", dst=\"00:01:23:45:67:88\")/IP(src=\"192.168.0.3\", dst=\"192.168.0.20\")/TCP(sport=22,dport=23)/Raw(load=\"x\"*30)',\n+                'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.1.1\", dst=\"192.168.0.21\")/TCP(sport=22,dport=23)/Raw(load=\"x\"*30)' % vf1_mac],\n+            \"mark\": [\n+                'Ether(src=\"00:11:22:33:44:55\", dst=\"00:01:23:45:67:88\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.20\")/TCP(sport=22,dport=23)/Raw(load=\"x\"*30)',\n+                'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.1.1\", dst=\"192.168.0.20\")/TCP(sport=22,dport=23)/Raw(load=\"x\"*30)' % vf1_mac],\n+            \"rss\": [\n+                'Ether(src=\"00:11:22:33:44:55\", dst=\"00:01:23:45:67:88\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.20\")/TCP(sport=32,dport=33)/Raw(load=\"x\"*30)',\n+                'Ether(src=\"00:11:22:33:44:55\", dst=\"00:01:23:45:67:88\")/IP(src=\"192.168.0.4\", dst=\"192.168.0.20\")/TCP(sport=22,dport=23)/Raw(load=\"x\"*30)'],\n+            \"noreceived\": 'Ether(src=\"00:11:22:33:44:55\", dst=\"00:01:23:45:67:88\")/IP(src=\"192.168.1.1\", dst=\"192.168.0.20\")/TCP(sport=22,dport=23)/Raw(load=\"x\"*30)'\n+        }\n+\n+        out_drop = self.send_pkts_getouput(pkts=packets[\"drop\"])\n+        rfc.check_drop(out_drop, pkt_num=len(packets[\"drop\"]), check_param={\"port_id\": 1, \"drop\": 1}, stats=True)\n+\n+        out_mark = self.send_pkts_getouput(pkts=packets[\"mark\"])\n+        rfc.check_iavf_fdir_mark(out_mark, pkt_num=len(packets[\"mark\"]), check_param={\"port_id\": 1, \"queue\": 3, \"mark_id\": 0})\n+\n+        out_rss = self.send_pkts_getouput(pkts=packets[\"rss\"])\n+        rfc.check_iavf_fdir_mark(out_rss, pkt_num=len(packets[\"rss\"]), check_param={\"port_id\": 1, \"passthru\": 1})\n+\n+        out_noreceived = self.send_pkts_getouput(pkts=packets[\"noreceived\"])\n+        rfc.check_iavf_fdir_mark(out_noreceived, pkt_num=0, check_param={\"port_id\": 1, \"passthru\": 1})\n+\n+        self.dut.send_expect(\"flow destroy 0 rule 4\", \"testpmd> \", 15)\n+\n+        packets = {\n+            \"mark\": 'Ether(src=\"00:11:22:33:44:55\", dst=\"00:01:23:45:67:88\")/IP(src=\"192.168.0.2\", dst=\"192.168.0.20\")/TCP(sport=22,dport=23)/Raw(load=\"x\"*30)',\n+            \"rss\": 'Ether(src=\"00:11:22:33:44:55\", dst=\"00:01:23:45:67:88\")/IP(src=\"192.168.0.3\", dst=\"192.168.0.20\")/TCP(sport=22,dport=23)/Raw(load=\"x\"*30)'\n+        }\n+\n+        out_mark = self.send_pkts_getouput(pkts=packets[\"mark\"])\n+        rfc.check_iavf_fdir_mark(out_mark, pkt_num=1, check_param={\"port_id\": 1, \"queue\": 3, \"mark_id\": 0})\n+\n+        out_rss = self.send_pkts_getouput(pkts=packets[\"rss\"])\n+        rfc.check_iavf_fdir_mark(out_rss, pkt_num=1, check_param={\"port_id\": 1, \"passthru\": 1})\n+\n+    def check_dcf_status(self, out_testpmd, stats=True):\n+        \"\"\"\n+        check if request for DCF is accepted.\n+        \"\"\"\n+        if stats:\n+            self.verify(\"Failed to init DCF parent adapter\" not in out_testpmd, \"request for DCF is rejected.\")\n+            out_portinfo = self.dut.send_expect(\"show port info 0\", \"testpmd> \", 15)\n+            self.verify(\"net_ice_dcf\" in out_portinfo, \"request for DCF is rejected.\")\n+        else:\n+            self.verify(\"Failed to init DCF parent adapter\" in out_testpmd, \"request for DCF is accepted.\")\n+            out_portinfo = self.dut.send_expect(\"show port info 0\", \"testpmd> \", 15)\n+            self.verify(\"net_ice_dcf\" not in out_portinfo, \"request for DCF is accepted.\")\n+    def quit_testpmd(self):\n+        \"\"\"\n+        quit testpmd\n+        \"\"\"\n+        if self.testpmd_status != \"close\":\n+            # destroy all flow rules on DCF\n+            self.dut.send_expect(\"flow flush 0\", \"testpmd> \", 15)\n+            self.dut.send_expect(\"clear port stats all\", \"testpmd> \", 15)\n+            self.dut.send_expect(\"quit\", \"#\", 30)\n+            #kill all DPDK application\n+            self.dut.kill_all()\n+        self.testpmd_status = \"close\"\n+\n+    def test_mutually_exclusive(self):\n+        \"\"\"\n+        DCF mode and any ACL filters (not added by DCF) shall be mutually exclusive\n+        \"\"\"\n+        self.dut.kill_all()\n+        self.session_secondary = self.dut.new_session()\n+\n+        # add ACL rule by kernel, reject request for DCF functionality\n+        self.add_acl_rule_not_by_dcf(self.pf0_intf, stats=True)\n+        out_testpmd = self.launch_testpmd()\n+        self.check_dcf_status(out_testpmd, stats=False)\n+        self.quit_testpmd()\n+        self.delete_acl_rule_not_added_by_dcf()\n+        out_testpmd = self.launch_testpmd()\n+        self.check_dcf_status(out_testpmd, stats=True)\n+        self.quit_testpmd()\n+\n+        # add ACL rule by kernel, accept request for DCF functionality of another PF\n+        self.add_acl_rule_not_by_dcf(self.pf1_intf, stats=True)\n+        out_testpmd = self.launch_testpmd()\n+        self.check_dcf_status(out_testpmd, stats=True)\n+        self.quit_testpmd()\n+        self.delete_acl_rule_not_added_by_dcf()\n+\n+        # ACL DCF mode is active, add ACL filters by way of host based configuration is rejected\n+        out_testpmd = self.launch_testpmd()\n+        self.check_dcf_status(out_testpmd, stats=True)\n+        self.add_acl_rule_not_by_dcf(self.pf0_intf, stats=False)\n+        self.quit_testpmd()\n+        self.add_acl_rule_not_by_dcf(self.pf0_intf, stats=True)\n+        self.delete_acl_rule_not_added_by_dcf()\n+\n+        # ACL DCF mode is active, add ACL filters by way of host based configuration on another PF successfully\n+        out_testpmd = self.launch_testpmd()\n+        self.check_dcf_status(out_testpmd, stats=True)\n+        self.add_acl_rule_not_by_dcf(self.pf1_intf, stats=True)\n+        self.quit_testpmd()\n+        self.delete_acl_rule_not_added_by_dcf()\n+\n+    def add_acl_rule_not_by_dcf(self, pf, stats=True):\n+        \"\"\"\n+        use secondary session\n+        add acl rule by kernel command\n+        \"\"\"\n+        if stats:\n+            self.session_secondary.send_expect(\"ethtool -N %s flow-type tcp4 src-ip 192.168.10.0 m 0.255.255.255 dst-port 8000 m 0x00ff action -1\" % pf, \"# \")\n+        else:\n+            error_info = \"rmgr: Cannot insert RX class rule: No such file or directory\"\n+            self.session_secondary.send_expect(\"ethtool -N %s flow-type tcp4 src-ip 192.168.10.0 m 0.255.255.255 dst-port 8000 m 0x00ff action -1\" % pf, error_info)\n+\n+\n+    def delete_acl_rule_not_added_by_dcf(self):\n+        \"\"\"\n+        delete all the acl rule added not by DCF\n+        \"\"\"\n+        out_pf0 = self.dut.send_expect(\"ethtool -n %s\" % (self.pf0_intf), \"# \")\n+        out_pf1 = self.dut.send_expect(\"ethtool -n %s\" % (self.pf1_intf), \"# \")\n+\n+        p = re.compile(r\"Filter: (\\d+)\")\n+        m0 = p.search(out_pf0)\n+        m1 = p.search(out_pf1)\n+        if m0:\n+            self.dut.send_expect(\"ethtool -N %s delete %d\" % (self.pf0_intf, int(m0.group(1))), \"# \")\n+            self.dut.send_expect(\"ethtool -n %s\" % (self.pf0_intf), \"Total 0 rules\")\n+        if m1:\n+            self.dut.send_expect(\"ethtool -N %s delete %d\" % (self.pf1_intf, int(m1.group(1))), \"# \")\n+            self.dut.send_expect(\"ethtool -n %s\" % (self.pf1_intf), \"Total 0 rules\")\n+\n+    def tear_down(self):\n+        \"\"\"\n+        Run after each test case.\n+        \"\"\"\n+        self.quit_testpmd()\n+        if getattr(self, 'session_secondary', None):\n+            self.dut.close_session(self.session_secondary)\n+        self.delete_acl_rule_not_added_by_dcf()\n+\n+    def tear_down_all(self):\n+        \"\"\"\n+        Run after each test suite.\n+        \"\"\"\n+        self.dut.kill_all()\n",
    "prefixes": [
        "v1"
    ]
}