Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/patches/89214/?format=api
http://patches.dpdk.org/api/patches/89214/?format=api", "web_url": "http://patches.dpdk.org/project/dts/patch/1615889106-6745-2-git-send-email-zhiminx.huang@intel.com/", "project": { "id": 3, "url": "http://patches.dpdk.org/api/projects/3/?format=api", "name": "DTS", "link_name": "dts", "list_id": "dts.dpdk.org", "list_email": "dts@dpdk.org", "web_url": "", "scm_url": "git://dpdk.org/tools/dts", "webscm_url": "http://git.dpdk.org/tools/dts/", "list_archive_url": "https://inbox.dpdk.org/dts", "list_archive_url_format": "https://inbox.dpdk.org/dts/{}", "commit_url_format": "" }, "msgid": "<1615889106-6745-2-git-send-email-zhiminx.huang@intel.com>", "list_archive_url": "https://inbox.dpdk.org/dts/1615889106-6745-2-git-send-email-zhiminx.huang@intel.com", "date": "2021-03-16T10:05:05", "name": "[V1,1/2] test_plans/cvl_dcf_switch_filter_test_plan:remove pppoe case", "commit_ref": null, "pull_url": null, "state": "accepted", "archived": false, "hash": "13fb19ca85cd735c13fd065a2b6eed30916c11a8", "submitter": { "id": 1685, "url": "http://patches.dpdk.org/api/people/1685/?format=api", "name": "Huang, ZhiminX", "email": "zhiminx.huang@intel.com" }, "delegate": null, "mbox": "http://patches.dpdk.org/project/dts/patch/1615889106-6745-2-git-send-email-zhiminx.huang@intel.com/mbox/", "series": [ { "id": 15690, "url": "http://patches.dpdk.org/api/series/15690/?format=api", "web_url": "http://patches.dpdk.org/project/dts/list/?series=15690", "date": "2021-03-16T10:05:04", "name": "add new suite and split case", "version": 1, "mbox": "http://patches.dpdk.org/series/15690/mbox/" } ], "comments": "http://patches.dpdk.org/api/patches/89214/comments/", "check": "pending", "checks": "http://patches.dpdk.org/api/patches/89214/checks/", "tags": {}, "related": [], "headers": { "Return-Path": "<dts-bounces@dpdk.org>", "X-Original-To": "patchwork@inbox.dpdk.org", "Delivered-To": "patchwork@inbox.dpdk.org", "Received": [ "from mails.dpdk.org (mails.dpdk.org [217.70.189.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id EDC3EA054F;\n\tTue, 16 Mar 2021 11:17:26 +0100 (CET)", "from [217.70.189.124] (localhost [127.0.0.1])\n\tby mails.dpdk.org (Postfix) with ESMTP id E158A24280E;\n\tTue, 16 Mar 2021 11:17:26 +0100 (CET)", "from mga05.intel.com (mga05.intel.com [192.55.52.43])\n by mails.dpdk.org (Postfix) with ESMTP id 1FFA624280D\n for <dts@dpdk.org>; Tue, 16 Mar 2021 11:17:23 +0100 (CET)", "from orsmga008.jf.intel.com ([10.7.209.65])\n by fmsmga105.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 16 Mar 2021 03:17:23 -0700", "from unknown (HELO dpdk-huangzm-d.sh.intel.com) ([10.240.183.72])\n by orsmga008-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 16 Mar 2021 03:17:21 -0700" ], "IronPort-SDR": [ "\n wWnlRUinG5lqRyMfDuX3UZThhlkSXLcFcve19xseNioFU/hBmw11YTMi1YK9uY/EVRcxU5Qqfu\n zp3AW8V7zAVQ==", "\n K3po9myZgNdW6+gUoBeRYquKJxkLzUM2Xhs1xv+UoCuT2kNy+4a27w3u604Cr+PsOXNeWjW5uA\n R8EhxyDyQxTQ==" ], "X-IronPort-AV": [ "E=McAfee;i=\"6000,8403,9924\"; a=\"274277040\"", "E=Sophos;i=\"5.81,251,1610438400\"; d=\"scan'208\";a=\"274277040\"", "E=Sophos;i=\"5.81,251,1610438400\"; d=\"scan'208\";a=\"412162966\"" ], "From": "Zhimin Huang <zhiminx.huang@intel.com>", "To": "dts@dpdk.org", "Cc": "xueqin.lin@intel.com,\n\tZhimin Huang <zhiminx.huang@intel.com>", "Date": "Tue, 16 Mar 2021 18:05:05 +0800", "Message-Id": "<1615889106-6745-2-git-send-email-zhiminx.huang@intel.com>", "X-Mailer": "git-send-email 1.8.3.1", "In-Reply-To": "<1615889106-6745-1-git-send-email-zhiminx.huang@intel.com>", "References": "<1615889106-6745-1-git-send-email-zhiminx.huang@intel.com>", "Subject": "[dts] [PATCH V1 1/2]\n test_plans/cvl_dcf_switch_filter_test_plan:remove pppoe case", "X-BeenThere": "dts@dpdk.org", "X-Mailman-Version": "2.1.29", "Precedence": "list", "List-Id": "test suite reviews and discussions <dts.dpdk.org>", "List-Unsubscribe": "<https://mails.dpdk.org/options/dts>,\n <mailto:dts-request@dpdk.org?subject=unsubscribe>", "List-Archive": "<http://mails.dpdk.org/archives/dts/>", "List-Post": "<mailto:dts@dpdk.org>", "List-Help": "<mailto:dts-request@dpdk.org?subject=help>", "List-Subscribe": "<https://mails.dpdk.org/listinfo/dts>,\n <mailto:dts-request@dpdk.org?subject=subscribe>", "Errors-To": "dts-bounces@dpdk.org", "Sender": "\"dts\" <dts-bounces@dpdk.org>" }, "content": "*.split cvl_dcf_switch_filter pppoe case into new suite \n\nSigned-off-by: Zhimin Huang <zhiminx.huang@intel.com>\n---\n test_plans/cvl_dcf_switch_filter_test_plan.rst | 1369 +-----------------------\n 1 file changed, 1 insertion(+), 1368 deletions(-)", "diff": "diff --git a/test_plans/cvl_dcf_switch_filter_test_plan.rst b/test_plans/cvl_dcf_switch_filter_test_plan.rst\nindex d6e2998..65b2ccf 100644\n--- a/test_plans/cvl_dcf_switch_filter_test_plan.rst\n+++ b/test_plans/cvl_dcf_switch_filter_test_plan.rst\n@@ -1,4 +1,4 @@\n-.. Copyright (c) <2020>, Intel Corporation\n+.. Copyright (c) <2021>, Intel Corporation\n All rights reserved.\n \n Redistribution and use in source and binary forms, with or without\n@@ -41,7 +41,6 @@ This document provides the plan for testing DCF switch filter of CVL, including:\n \n * Enable DCF switch filter for IPv4/IPv6 + TCP/UDP/IGMP (comm #1 package)\n * Enable DCF switch filter for tunnel: NVGRE (comm #1 package)\n-* Enable DCF switch filter for PPPOES (comm #1 package)\n * Enable DCF switch filter for PFCP/L2TPv3/AH/ESP/NAT-T-ESP (comm #1 package)\n * Enable DCF switch filter for IP/L2 multicast (comm #1 package)\n * Enable DCF switch filter for ethertype/UDP port/MAC VLAN/VLAN filter (comm #1 package)\n@@ -115,86 +114,6 @@ Pattern and input set\n | | | [Inner Source IP], [Inner Dest IP], |\n | | | [Inner Source Port], [Inner Dest Port] |\n +---------------------+-------------------------------+-------------------------------------------+\n- | | MAC_VLAN_PPPOE_IPV4_PAY | [Dest MAC], [VLAN], [seid], |\n- | | _session_id_proto_id | [pppoe_proto_id] |\n- | +-------------------------------+-------------------------------------------+\n- | | MAC_VLAN_PPPOE_IPV6_PAY | [Dest MAC], [VLAN], [seid], |\n- | | _session_id_proto_id | [pppoe_proto_id] |\n- | +-------------------------------+-------------------------------------------+\n- | | MAC_PPPOE_IPV4_PAY | [Dest MAC], [seid], [pppoe_proto_id] |\n- | | _session_id_proto_id | |\n- | +-------------------------------+-------------------------------------------+\n- | | MAC_PPPOE_IPV6_PAY | [Dest MAC], [seid], [pppoe_proto_id] |\n- | | _session_id_proto_id | |\n- | +-------------------------------+-------------------------------------------+\n- | | MAC_PPPOE_IPV4_PAY_IP_address | [Source IP], [Dest IP] |\n- | +-------------------------------+-------------------------------------------+\n- | | MAC_PPPOE_IPV4_UDP_PAY | [Source IP], [Dest IP], |\n- | | | [Source Port], [Dest Port] |\n- | +-------------------------------+-------------------------------------------+\n- | | MAC_PPPOE_IPV4_UDP_PAY | [Source IP], [Dest IP] |\n- | | _non_src_dst_port | |\n- | +-------------------------------+-------------------------------------------+\n- | | MAC_PPPOE_IPV4_TCP_PAY | [Source IP], [Dest IP], |\n- | | | [Source Port], [Dest Port] |\n- | +-------------------------------+-------------------------------------------+\n- | | MAC_PPPOE_IPV4_TCP_PAY | [Source IP], [Dest IP] |\n- | | _non_src_dst_port | |\n- | +-------------------------------+-------------------------------------------+\n- | | MAC_PPPOE_IPV6_PAY_IP_address | [Source IP], [Dest IP] |\n- | +-------------------------------+-------------------------------------------+\n- | | MAC_PPPOE_IPV6_UDP_PAY | [Source IP], [Dest IP], |\n- | | | [Source Port], [Dest Port] |\n- | +-------------------------------+-------------------------------------------+\n- | | MAC_PPPOE_IPV6_UDP_PAY | [Source IP], [Dest IP] |\n- | | _non_src_dst_port | |\n- | +-------------------------------+-------------------------------------------+\n- | | MAC_PPPOE_IPV6_TCP_PAY | [Source IP], [Dest IP], |\n- | | | [Source Port], [Dest Port] |\n- | PPPOES +-------------------------------+-------------------------------------------+\n- | | MAC_PPPOE_IPV6_TCP_PAY | [Source IP], [Dest IP], |\n- | | _non_src_dst_port | |\n- | +-------------------------------+-------------------------------------------+\n- | | MAC_VLAN_PPPOE_IPV4_PAY | [VLAN], [Source IP], [Dest IP] |\n- | | _IP_address | |\n- | +-------------------------------+-------------------------------------------+\n- | | MAC_VLAN_PPPOE_IPV4_UDP_PAY | [VLAN], [Source IP], [Dest IP] |\n- | | | [Source Port], [Dest Port] |\n- | +-------------------------------+-------------------------------------------+\n- | | MAC_VLAN_PPPOE_IPV4_UDP_PAY | [VLAN], [Source IP], [Dest IP] |\n- | | _non_src_dst_port | |\n- | +-------------------------------+-------------------------------------------+\n- | | MAC_VLAN_PPPOE_IPV4_TCP_PAY | [VLAN], [Source IP], [Dest IP] |\n- | | | [Source Port], [Dest Port] |\n- | +-------------------------------+-------------------------------------------+\n- | | MAC_VLAN_PPPOE_IPV4_TCP_PAY | [VLAN], [Source IP], [Dest IP] |\n- | | _non_src_dst_port | |\n- | +-------------------------------+-------------------------------------------+\n- | | MAC_VLAN_PPPOE_IPV6_PAY | [VLAN], [Source IP], [Dest IP] |\n- | | _IP_address | |\n- | +-------------------------------+-------------------------------------------+\n- | | MAC_VLAN_PPPOE_IPV6_UDP_PAY | [VLAN], [Source IP], [Dest IP] |\n- | | | [Source Port], [Dest Port] |\n- | +-------------------------------+-------------------------------------------+\n- | | MAC_VLAN_PPPOE_IPV6_UDP_PAY | [VLAN], [Source IP], [Dest IP] |\n- | | _non_src_dst_port | |\n- | +-------------------------------+-------------------------------------------+\n- | | MAC_VLAN_PPPOE_IPV6_TCP_PAY | [VLAN], [Source IP], [Dest IP] |\n- | | | [Source Port], [Dest Port] |\n- | +-------------------------------+-------------------------------------------+\n- | | MAC_VLAN_PPPOE_IPV6_TCP_PAY | [VLAN], [Source IP], [Dest IP] |\n- | | _non_src_dst_port | |\n- | +-------------------------------+-------------------------------------------+\n- | | MAC_PPPOE_LCP_PAY | [Dest MAC], [seid], [pppoe_proto_id] |\n- | +-------------------------------+-------------------------------------------+\n- | | MAC_PPPOE_IPCP_PAY | [Dest MAC], [seid], [pppoe_proto_id] |\n- | +-------------------------------+-------------------------------------------+\n- | | MAC_VLAN_PPPOE_LCP_PAY | [Dest MAC], [VLAN], [seid], |\n- | | | [pppoe_proto_id] |\n- | +-------------------------------+-------------------------------------------+\n- | | MAC_VLAN_PPPOE_IPCP_PAY | [Dest MAC], [VLAN], [seid], |\n- | | | [pppoe_proto_id] |\n- +---------------------+-------------------------------+-------------------------------------------+\n | | MAC_IPV4_PFCP_NODE | [Dest Port], [S-field] |\n | +-------------------------------+-------------------------------------------+\n | | MAC_IPV4_PFCP_SESSION | [Dest Port], [S-field] |\n@@ -1472,1292 +1391,6 @@ Test case: MAC_IPV4_NVGRE_MAC_IPV4_TCP\n check the rule not exists in the list.\n send matched packets, check the packets are not to port 1.\n \n-Test case: MAC_VLAN_PPPOE_IPV4_PAY_session_id_proto_id\n-======================================================\n-\n-1. validate a rule::\n-\n- testpmd> flow validate 0 ingress pattern eth dst is 00:11:22:33:44:55 / vlan tci is 1 / pppoes seid is 3 / pppoe_proto_id is 0x0021 / end actions vf id 1 / end\n-\n- get the message::\n-\n- Flow rule validated\n-\n- check the flow list::\n-\n- testpmd> flow list 0\n-\n- check the rule not exists in the list.\n-\n-2. create a rule::\n-\n- testpmd> flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / vlan tci is 1 / pppoes seid is 3 / pppoe_proto_id is 0x0021 / end actions vf id 1 / end\n- testpmd> flow list 0\n-\n- check the rule exists in the list.\n-\n-3. send matched packets::\n-\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP()/Raw(\"x\" * 80)],iface=\"enp27s0f0\",count=1)\n-\n- check port 1 receive the packets.\n- send mismatched packets::\n-\n- sendp([Ether(dst=\"00:11:22:33:44:54\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP()/Raw(\"x\" * 80)],iface=\"enp27s0f0\",count=1)\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=2,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP()/Raw(\"x\" * 80)],iface=\"enp27s0f0\",count=1)\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=4)/PPP(proto=0x0021)/IP()/Raw(\"x\" * 80)],iface=\"enp27s0f0\",count=1)\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6()/Raw(\"x\" * 80)],iface=\"enp27s0f0\",count=1)\n-\n- check the packets are not to port 1.\n-\n-4. verify rules can be destroyed::\n-\n- testpmd> flow destroy 0 rule 0\n- testpmd> flow list 0\n-\n- check the rule not exists in the list.\n- send matched packets, check the packets are not to port 1.\n-\n-Test case: MAC_VLAN_PPPOE_IPV6_PAY_session_id_proto_id\n-======================================================\n-\n-1. validate a rule::\n-\n- testpmd> flow validate 0 ingress pattern eth dst is 00:11:22:33:44:55 / vlan tci is 1 / pppoes seid is 3 / pppoe_proto_id is 0x0057 / end actions vf id 1 / end\n-\n- get the message::\n-\n- Flow rule validated\n-\n- check the flow list::\n-\n- testpmd> flow list 0\n-\n- check the rule not exists in the list.\n-\n-2. create a rule::\n-\n- testpmd> flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / vlan tci is 1 / pppoes seid is 3 / pppoe_proto_id is 0x0057 / end actions vf id 1 / end\n- testpmd> flow list 0\n-\n- check the rule exists in the list.\n-\n-3. send matched packets::\n-\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6()/Raw(\"x\" * 80)],iface=\"enp27s0f0\",count=1)\n-\n- check port 1 receive the packets.\n- send mismatched packets::\n-\n- sendp([Ether(dst=\"00:11:22:33:44:54\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6()/Raw(\"x\" * 80)],iface=\"enp27s0f0\",count=1)\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=2,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6()/Raw(\"x\" * 80)],iface=\"enp27s0f0\",count=1)\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=4)/PPP(proto=0x0057)/IPv6()/Raw(\"x\" * 80)],iface=\"enp27s0f0\",count=1)\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP()/Raw(\"x\" * 80)],iface=\"enp27s0f0\",count=1)\n-\n- check the packets are not to port 1.\n-\n-4. verify rules can be destroyed::\n-\n- testpmd> flow destroy 0 rule 0\n- testpmd> flow list 0\n-\n- check the rule not exists in the list.\n- send matched packets, check the packets are not to port 1.\n-\n-Test case: MAC_PPPOE_IPV4_PAY_session_id_proto_id\n-=================================================\n-\n-1. validate a rule::\n-\n- testpmd> flow validate 0 ingress pattern eth dst is 00:11:22:33:44:55 / pppoes seid is 3 / pppoe_proto_id is 0x0021 / end actions vf id 1 / end\n-\n- get the message::\n-\n- Flow rule validated\n-\n- check the flow list::\n-\n- testpmd> flow list 0\n-\n- check the rule not exists in the list.\n-\n-2. create a rule::\n-\n- testpmd> flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / pppoes seid is 3 / pppoe_proto_id is 0x0021 / end actions vf id 1 / end\n- testpmd> flow list 0\n-\n- check the rule exists in the list.\n-\n-3. send matched packets::\n-\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP()/Raw(\"x\" * 80)],iface=\"enp27s0f0\",count=1)\n-\n- check port 1 receive the packets.\n- send mismatched packets::\n-\n- sendp([Ether(dst=\"00:11:22:33:44:54\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP()/Raw(\"x\" * 80)],iface=\"enp27s0f0\",count=1)\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=4)/PPP(proto=0x0021)/IP()/Raw(\"x\" * 80)],iface=\"enp27s0f0\",count=1)\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6()/Raw(\"x\" * 80)],iface=\"enp27s0f0\",count=1)\n-\n- check the packets are not to port 1.\n-\n-4. verify rules can be destroyed::\n-\n- testpmd> flow destroy 0 rule 0\n- testpmd> flow list 0\n-\n- check the rule not exists in the list.\n- send matched packets, check the packets are not to port 1.\n-\n-Test case: MAC_PPPOE_IPV6_PAY_session_id_proto_id\n-=================================================\n-\n-1. validate a rule::\n-\n- testpmd> flow validate 0 ingress pattern eth dst is 00:11:22:33:44:55 / pppoes seid is 3 / pppoe_proto_id is 0x0057 / end actions vf id 1 / end\n-\n- get the message::\n-\n- Flow rule validated\n-\n- check the flow list::\n-\n- testpmd> flow list 0\n-\n- check the rule not exists in the list.\n-\n-2. create a rule::\n-\n- testpmd> flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / pppoes seid is 3 / pppoe_proto_id is 0x0057 / end actions vf id 1 / end\n- testpmd> flow list 0\n-\n- check the rule exists in the list.\n-\n-3. send matched packets::\n-\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6()/Raw(\"x\" * 80)],iface=\"enp27s0f0\",count=1)\n-\n- check port 1 receive the packets.\n- send mismatched packets::\n-\n- sendp([Ether(dst=\"00:11:22:33:44:54\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6()/Raw(\"x\" * 80)],iface=\"enp27s0f0\",count=1)\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=4)/PPP(proto=0x0057)/IPv6()/Raw(\"x\" * 80)],iface=\"enp27s0f0\",count=1)\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP()/Raw(\"x\" * 80)],iface=\"enp27s0f0\",count=1)\n-\n- check the packets are not to port 1.\n-\n-4. verify rules can be destroyed::\n-\n- testpmd> flow destroy 0 rule 0\n- testpmd> flow list 0\n-\n- check the rule not exists in the list.\n- send matched packets, check the packets are not to port 1.\n-\n-Test case: PPPoE data\n-=====================\n-\n-Subcase 1: MAC_PPPOE_IPV4_PAY_IP_address\n-----------------------------------------\n-\n-1. validate a rule::\n-\n- testpmd> flow validate 0 ingress pattern eth / pppoes / ipv4 src is 192.168.1.1 dst is 192.168.1.2 / end actions vf id 1 / end\n-\n- get the message::\n-\n- Flow rule validated\n-\n- check the flow list::\n-\n- testpmd> flow list 0\n-\n- check the rule not exists in the list.\n-\n-2. create a rule::\n-\n- testpmd> flow create 0 ingress pattern eth / pppoes / ipv4 src is 192.168.1.1 dst is 192.168.1.2 / end actions vf id 1 / end\n- testpmd> flow list 0\n-\n- check the rule exists in the list.\n-\n-3. send matched packets::\n-\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/Raw(\"x\"*80)],iface=\"ens786f0\",count=1)\n-\n- check port 1 receive the packets.\n- send mismatched packets::\n-\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.3\", dst=\"192.168.1.2\")/Raw(\"x\"*80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.4\")/Raw(\"x\"*80)],iface=\"ens786f0\",count=1)\n-\n- check the packets are not to port 1.\n-\n-4. verify rules can be destroyed::\n-\n- testpmd> flow destroy 0 rule 0\n- testpmd> flow list 0\n-\n- check the rule not exists in the list.\n- send matched packets, check the packets are not to port 1.\n-\n-Subcase 2: MAC_PPPOE_IPV4_UDP_PAY\n----------------------------------\n-\n-1. validate a rule::\n-\n- testpmd> flow validate 0 ingress pattern eth / pppoes / ipv4 src is 192.168.1.1 dst is 192.168.1.2 / udp src is 25 dst is 23 / end actions vf id 1 / end\n-\n- get the message::\n-\n- Flow rule validated\n-\n- check the flow list::\n-\n- testpmd> flow list 0\n-\n- check the rule not exists in the list.\n-\n-2. create a rule::\n-\n- testpmd> flow create 0 ingress pattern eth / pppoes / ipv4 src is 192.168.1.1 dst is 192.168.1.2 / udp src is 25 dst is 23 / end actions vf id 1 / end\n- testpmd> flow list 0\n-\n- check the rule exists in the list.\n-\n-3. send matched packets::\n-\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n-\n- check port 1 receive the packets.\n- send mismatched packets::\n-\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.3\", dst=\"192.168.1.2\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.4\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/UDP(sport=27,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/UDP(sport=25,dport=19)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n-\n- check the packets are not to port 1.\n-\n-4. verify rules can be destroyed::\n-\n- testpmd> flow destroy 0 rule 0\n- testpmd> flow list 0\n-\n- check the rule not exists in the list.\n- send matched packets, check the packets are not to port 1.\n-\n-Subcase 3: MAC_PPPOE_IPV4_UDP_PAY_non_src_dst_port\n---------------------------------------------------\n-\n-1. validate a rule::\n-\n- testpmd> flow validate 0 ingress pattern eth / pppoes / ipv4 src is 192.168.1.1 dst is 192.168.1.2 / udp / end actions vf id 1 / end\n-\n- get the message::\n-\n- Flow rule validated\n-\n- check the flow list::\n-\n- testpmd> flow list 0\n-\n- check the rule not exists in the list.\n-\n-2. create a rule::\n-\n- testpmd> flow create 0 ingress pattern eth / pppoes / ipv4 src is 192.168.1.1 dst is 192.168.1.2 / udp / end actions vf id 1 / end\n- testpmd> flow list 0\n-\n- check the rule exists in the list.\n-\n-3. send matched packets::\n-\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n-\n- check port 1 receive the packets.\n- send mismatched packets::\n-\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.3\", dst=\"192.168.1.2\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.4\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n-\n- check the packets are not to port 1.\n-\n-4. verify rules can be destroyed::\n-\n- testpmd> flow destroy 0 rule 0\n- testpmd> flow list 0\n-\n- check the rule not exists in the list.\n- send matched packets, check the packets are not to port 1.\n-\n-Subcase 4: MAC_PPPOE_IPV4_TCP_PAY\n----------------------------------\n-\n-1. validate a rule::\n-\n- testpmd> flow validate 0 ingress pattern eth / pppoes / ipv4 src is 192.168.1.1 dst is 192.168.1.2 / tcp src is 25 dst is 23 / end actions vf id 1 / end\n-\n- get the message::\n-\n- Flow rule validated\n-\n- check the flow list::\n-\n- testpmd> flow list 0\n-\n- check the rule not exists in the list.\n-\n-2. create a rule::\n-\n- testpmd> flow create 0 ingress pattern eth / pppoes / ipv4 src is 192.168.1.1 dst is 192.168.1.2 / tcp src is 25 dst is 23 / end actions vf id 1 / end\n- testpmd> flow list 0\n-\n- check the rule exists in the list.\n-\n-3. send matched packets::\n-\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n-\n- check port 1 receive the packets.\n- send mismatched packets::\n-\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.3\", dst=\"192.168.1.2\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.4\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/TCP(sport=27,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/TCP(sport=25,dport=19)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n-\n- check the packets are not to port 1.\n-\n-4. verify rules can be destroyed::\n-\n- testpmd> flow destroy 0 rule 0\n- testpmd> flow list 0\n-\n- check the rule not exists in the list.\n- send matched packets, check the packets are not to port 1.\n-\n-Subcase 5: MAC_PPPOE_IPV4_TCP_PAY_non_src_dst_port\n---------------------------------------------------\n-\n-1. validate a rule::\n-\n- testpmd> flow validate 0 ingress pattern eth / pppoes / ipv4 src is 192.168.1.1 dst is 192.168.1.2 / tcp / end actions vf id 1 / end\n-\n- get the message::\n-\n- Flow rule validated\n-\n- check the flow list::\n-\n- testpmd> flow list 0\n-\n- check the rule not exists in the list.\n-\n-2. create a rule::\n-\n- testpmd> flow create 0 ingress pattern eth / pppoes / ipv4 src is 192.168.1.1 dst is 192.168.1.2 / tcp / end actions vf id 1 / end\n- testpmd> flow list 0\n-\n- check the rule exists in the list.\n-\n-3. send matched packets::\n-\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n-\n- check port 1 receive the packets.\n- send mismatched packets::\n-\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.3\", dst=\"192.168.1.2\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.4\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n-\n- check the packets are not to port 1.\n-\n-4. verify rules can be destroyed::\n-\n- testpmd> flow destroy 0 rule 0\n- testpmd> flow list 0\n-\n- check the rule not exists in the list.\n- send matched packets, check the packets are not to port 1.\n-\n-Subcase 6: MAC_PPPOE_IPV6_PAY_IP_address\n-----------------------------------------\n-\n-1. validate a rule::\n-\n- testpmd> flow validate 0 ingress pattern eth / pppoes / ipv6 src is CDCD:910A:2222:5498:8475:1111:3900:1536 dst is CDCD:910A:2222:5498:8475:1111:3900:2022 / end actions vf id 1 / end\n-\n- get the message::\n-\n- Flow rule validated\n-\n- check the flow list::\n-\n- testpmd> flow list 0\n-\n- check the rule not exists in the list.\n-\n-2. create a rule::\n-\n- testpmd> flow create 0 ingress pattern eth / pppoes / ipv6 src is CDCD:910A:2222:5498:8475:1111:3900:1536 dst is CDCD:910A:2222:5498:8475:1111:3900:2022 / end actions vf id 1 / end\n- testpmd> flow list 0\n-\n- check the rule exists in the list.\n-\n-3. send matched packets::\n-\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/Raw(\"x\"*80)],iface=\"ens786f0\",count=1)\n-\n- check port 1 receive the packets.\n- send mismatched packets::\n-\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1537\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/Raw(\"x\"*80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2023\")/Raw(\"x\"*80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\")/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/Raw(\"x\"*80)],iface=\"ens786f0\",count=1)\n-\n- check the packets are not to port 1.\n-\n-4. verify rules can be destroyed::\n-\n- testpmd> flow destroy 0 rule 0\n- testpmd> flow list 0\n-\n- check the rule not exists in the list.\n- send matched packets, check the packets are not to port 1.\n-\n-Subcase 7: MAC_PPPOE_IPV6_UDP_PAY\n----------------------------------\n-\n-1. validate a rule::\n-\n- testpmd> flow validate 0 ingress pattern eth / pppoes / ipv6 dst is CDCD:910A:2222:5498:8475:1111:3900:2022 / udp src is 25 dst is 23 / end actions vf id 1 / end\n-\n- get the message::\n-\n- Flow rule validated\n-\n- check the flow list::\n-\n- testpmd> flow list 0\n-\n- check the rule not exists in the list.\n-\n-2. create a rule::\n-\n- testpmd> flow create 0 ingress pattern eth / pppoes / ipv6 dst is CDCD:910A:2222:5498:8475:1111:3900:2022 / udp src is 25 dst is 23 / end actions vf id 1 / end\n- testpmd> flow list 0\n-\n- check the rule exists in the list.\n-\n-3. send matched packets::\n-\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n-\n- check port 1 receive the packets.\n- send mismatched packets::\n-\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2023\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/UDP(sport=27,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/UDP(sport=25,dport=19)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n-\n- check the packets are not to port 1.\n-\n-4. verify rules can be destroyed::\n-\n- testpmd> flow destroy 0 rule 0\n- testpmd> flow list 0\n-\n- check the rule not exists in the list.\n- send matched packets, check the packets are not to port 1.\n-\n-Subcase 8: MAC_PPPOE_IPV6_UDP_PAY_non_src_dst_port\n---------------------------------------------------\n-\n-1. validate a rule::\n-\n- testpmd> flow validate 0 ingress pattern eth / pppoes / ipv6 src is CDCD:910A:2222:5498:8475:1111:3900:1536 dst is CDCD:910A:2222:5498:8475:1111:3900:2022 / udp / end actions vf id 1 / end\n-\n- get the message::\n-\n- Flow rule validated\n-\n- check the flow list::\n-\n- testpmd> flow list 0\n-\n- check the rule not exists in the list.\n-\n-2. create a rule::\n-\n- testpmd> flow create 0 ingress pattern eth / pppoes / ipv6 src is CDCD:910A:2222:5498:8475:1111:3900:1536 dst is CDCD:910A:2222:5498:8475:1111:3900:2022 / udp / end actions vf id 1 / end\n- testpmd> flow list 0\n-\n- check the rule exists in the list.\n-\n-3. send matched packets::\n-\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n-\n- check port 1 receive the packets.\n- send mismatched packets::\n-\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1537\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2023\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n-\n- check the packets are not to port 1.\n-\n-4. verify rules can be destroyed::\n-\n- testpmd> flow destroy 0 rule 0\n- testpmd> flow list 0\n-\n- check the rule not exists in the list.\n- send matched packets, check the packets are not to port 1.\n-\n-Subcase 9: MAC_PPPOE_IPV6_TCP_PAY\n----------------------------------\n-\n-1. validate a rule::\n-\n- testpmd> flow validate 0 ingress pattern eth / pppoes / ipv6 dst is CDCD:910A:2222:5498:8475:1111:3900:2022 / tcp src is 25 dst is 23 / end actions vf id 1 / end\n-\n- get the message::\n-\n- Flow rule validated\n-\n- check the flow list::\n-\n- testpmd> flow list 0\n-\n- check the rule not exists in the list.\n-\n-2. create a rule::\n-\n- testpmd> flow create 0 ingress pattern eth / pppoes / ipv6 dst is CDCD:910A:2222:5498:8475:1111:3900:2022 / tcp src is 25 dst is 23 / end actions vf id 1 / end\n- testpmd> flow list 0\n-\n- check the rule exists in the list.\n-\n-3. send matched packets::\n-\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n-\n- check port 1 receive the packets.\n- send mismatched packets::\n-\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2023\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/TCP(sport=27,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/TCP(sport=25,dport=19)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n-\n- check the packets are not to port 1.\n-\n-4. verify rules can be destroyed::\n-\n- testpmd> flow destroy 0 rule 0\n- testpmd> flow list 0\n-\n- check the rule not exists in the list.\n- send matched packets, check the packets are not to port 1.\n-\n-Subcase 10: MAC_PPPOE_IPV6_TCP_PAY_non_src_dst_port\n----------------------------------------------------\n-\n-1. validate a rule::\n-\n- testpmd> flow validate 0 ingress pattern eth / pppoes / ipv6 src is CDCD:910A:2222:5498:8475:1111:3900:1536 dst is CDCD:910A:2222:5498:8475:1111:3900:2022 / tcp / end actions vf id 1 / end\n-\n- get the message::\n-\n- Flow rule validated\n-\n- check the flow list::\n-\n- testpmd> flow list 0\n-\n- check the rule not exists in the list.\n-\n-2. create a rule::\n-\n- testpmd> flow create 0 ingress pattern eth / pppoes / ipv6 src is CDCD:910A:2222:5498:8475:1111:3900:1536 dst is CDCD:910A:2222:5498:8475:1111:3900:2022 / tcp / end actions vf id 1 / end\n- testpmd> flow list 0\n-\n- check the rule exists in the list.\n-\n-3. send matched packets::\n-\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n-\n- check port 1 receive the packets.\n- send mismatched packets::\n-\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1537\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2023\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n-\n- check the packets are not to port 1.\n-\n-4. verify rules can be destroyed::\n-\n- testpmd> flow destroy 0 rule 0\n- testpmd> flow list 0\n-\n- check the rule not exists in the list.\n- send matched packets, check the packets are not to port 1.\n-\n-Subcase 11: MAC_VLAN_PPPOE_IPV4_PAY_IP_address\n-----------------------------------------------\n-\n-1. validate a rule::\n-\n- testpmd> flow validate 0 ingress pattern eth / vlan tci is 1 / pppoes / ipv4 src is 192.168.1.1 dst is 192.168.1.2 / end actions vf id 1 / end\n-\n- get the message::\n-\n- Flow rule validated\n-\n- check the flow list::\n-\n- testpmd> flow list 0\n-\n- check the rule not exists in the list.\n-\n-2. create a rule::\n-\n- testpmd> flow create 0 ingress pattern eth / vlan tci is 1 / pppoes / ipv4 src is 192.168.1.1 dst is 192.168.1.2 / end actions vf id 1 / end\n- testpmd> flow list 0\n-\n- check the rule exists in the list.\n-\n-3. send matched packets::\n-\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/Raw(\"x\"*80)],iface=\"ens786f0\",count=1)\n-\n- check port 1 receive the packets.\n- send mismatched packets::\n-\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=2,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/Raw(\"x\"*80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.3\", dst=\"192.168.1.2\")/Raw(\"x\"*80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.4\")/Raw(\"x\"*80)],iface=\"ens786f0\",count=1)\n-\n- check the packets are not to port 1.\n-\n-4. verify rules can be destroyed::\n-\n- testpmd> flow destroy 0 rule 0\n- testpmd> flow list 0\n-\n- check the rule not exists in the list.\n- send matched packets, check the packets are not to port 1.\n-\n-Subcase 12: MAC_VLAN_PPPOE_IPV4_UDP_PAY\n----------------------------------------\n-\n-1. validate a rule::\n-\n- testpmd> flow validate 0 ingress pattern eth / vlan tci is 1 / pppoes / ipv4 src is 192.168.1.1 dst is 192.168.1.2 / udp src is 25 dst is 23 / end actions vf id 1 / end\n-\n- get the message::\n-\n- Flow rule validated\n-\n- check the flow list::\n-\n- testpmd> flow list 0\n-\n- check the rule not exists in the list.\n-\n-2. create a rule::\n-\n- testpmd> flow create 0 ingress pattern eth / vlan tci is 1 / pppoes / ipv4 src is 192.168.1.1 dst is 192.168.1.2 / udp src is 25 dst is 23 / end actions vf id 1 / end\n- testpmd> flow list 0\n-\n- check the rule exists in the list.\n-\n-3. send matched packets::\n-\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n-\n- check port 1 receive the packets.\n- send mismatched packets::\n-\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=2,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.3\", dst=\"192.168.1.2\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.4\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/UDP(sport=27,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/UDP(sport=25,dport=19)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n-\n- check the packets are not to port 1.\n-\n-4. verify rules can be destroyed::\n-\n- testpmd> flow destroy 0 rule 0\n- testpmd> flow list 0\n-\n- check the rule not exists in the list.\n- send matched packets, check the packets are not to port 1.\n-\n-Subcase 13: MAC_VLAN_PPPOE_IPV4_UDP_PAY_non_src_dst_port\n---------------------------------------------------------\n-\n-1. validate a rule::\n-\n- testpmd> flow validate 0 ingress pattern eth / vlan tci is 1 / pppoes / ipv4 src is 192.168.1.1 dst is 192.168.1.2 / udp / end actions vf id 1 / end\n-\n- get the message::\n-\n- Flow rule validated\n-\n- check the flow list::\n-\n- testpmd> flow list 0\n-\n- check the rule not exists in the list.\n-\n-2. create a rule::\n-\n- testpmd> flow create 0 ingress pattern eth / vlan tci is 1 / pppoes / ipv4 src is 192.168.1.1 dst is 192.168.1.2 / udp / end actions vf id 1 / end\n- testpmd> flow list 0\n-\n- check the rule exists in the list.\n-\n-3. send matched packets::\n-\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n-\n- check port 1 receive the packets.\n- send mismatched packets::\n-\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=2,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.3\", dst=\"192.168.1.2\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.4\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n-\n- check the packets are not to port 1.\n-\n-4. verify rules can be destroyed::\n-\n- testpmd> flow destroy 0 rule 0\n- testpmd> flow list 0\n-\n- check the rule not exists in the list.\n- send matched packets, check the packets are not to port 1.\n-\n-Subcase 14: MAC_VLAN_PPPOE_IPV4_TCP_PAY\n----------------------------------------\n-\n-1. validate a rule::\n-\n- testpmd> flow validate 0 ingress pattern eth / vlan tci is 1 / pppoes / ipv4 src is 192.168.1.1 dst is 192.168.1.2 / tcp src is 25 dst is 23 / end actions vf id 1 / end\n-\n- get the message::\n-\n- Flow rule validated\n-\n- check the flow list::\n-\n- testpmd> flow list 0\n-\n- check the rule not exists in the list.\n-\n-2. create a rule::\n-\n- testpmd> flow create 0 ingress pattern eth / vlan tci is 1 / pppoes / ipv4 src is 192.168.1.1 dst is 192.168.1.2 / tcp src is 25 dst is 23 / end actions vf id 1 / end\n- testpmd> flow list 0\n-\n- check the rule exists in the list.\n-\n-3. send matched packets::\n-\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n-\n- check port 1 receive the packets.\n- send mismatched packets::\n-\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=2,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.3\", dst=\"192.168.1.2\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.4\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/TCP(sport=27,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/TCP(sport=25,dport=19)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n-\n- check the packets are not to port 1.\n-\n-4. verify rules can be destroyed::\n-\n- testpmd> flow destroy 0 rule 0\n- testpmd> flow list 0\n-\n- check the rule not exists in the list.\n- send matched packets, check the packets are not to port 1.\n-\n-Subcase 15: MAC_VLAN_PPPOE_IPV4_TCP_PAY_non_src_dst_port\n---------------------------------------------------------\n-\n-1. validate a rule::\n-\n- testpmd> flow validate 0 ingress pattern eth / vlan tci is 1 / pppoes / ipv4 src is 192.168.1.1 dst is 192.168.1.2 / tcp / end actions vf id 1 / end\n-\n- get the message::\n-\n- Flow rule validated\n-\n- check the flow list::\n-\n- testpmd> flow list 0\n-\n- check the rule not exists in the list.\n-\n-2. create a rule::\n-\n- testpmd> flow create 0 ingress pattern eth / vlan tci is 1 / pppoes / ipv4 src is 192.168.1.1 dst is 192.168.1.2 / tcp / end actions vf id 1 / end\n- testpmd> flow list 0\n-\n- check the rule exists in the list.\n-\n-3. send matched packets::\n-\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n-\n- check port 1 receive the packets.\n- send mismatched packets::\n-\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=2,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.3\", dst=\"192.168.1.2\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.4\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n-\n- check the packets are not to port 1.\n-\n-4. verify rules can be destroyed::\n-\n- testpmd> flow destroy 0 rule 0\n- testpmd> flow list 0\n-\n- check the rule not exists in the list.\n- send matched packets, check the packets are not to port 1.\n-\n-Subcase 16: MAC_VLAN_PPPOE_IPV6_PAY_IP_address\n-----------------------------------------------\n-\n-1. validate a rule::\n-\n- testpmd> flow validate 0 ingress pattern eth / vlan tci is 1 / pppoes / ipv6 src is CDCD:910A:2222:5498:8475:1111:3900:1536 / end actions vf id 1 / end\n-\n- get the message::\n-\n- Flow rule validated\n-\n- check the flow list::\n-\n- testpmd> flow list 0\n-\n- check the rule not exists in the list.\n-\n-2. create a rule::\n-\n- testpmd> flow create 0 ingress pattern eth / vlan tci is 1 / pppoes / ipv6 src is CDCD:910A:2222:5498:8475:1111:3900:1536 / end actions vf id 1 / end\n- testpmd> flow list 0\n-\n- check the rule exists in the list.\n-\n-3. send matched packets::\n-\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/Raw(\"x\"*80)],iface=\"ens786f0\",count=1)\n-\n- check port 1 receive the packets.\n- send mismatched packets::\n-\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=2,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/Raw(\"x\"*80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1537\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/Raw(\"x\"*80)],iface=\"ens786f0\",count=1)\n-\n- check the packets are not to port 1.\n-\n-4. verify rules can be destroyed::\n-\n- testpmd> flow destroy 0 rule 0\n- testpmd> flow list 0\n-\n- check the rule not exists in the list.\n- send matched packets, check the packets are not to port 1.\n-\n-Subcase 17: MAC_VLAN_PPPOE_IPV6_UDP_PAY\n----------------------------------------\n-\n-1. validate a rule::\n-\n- testpmd> flow validate 0 ingress pattern eth / vlan tci is 1 / pppoes / ipv6 dst is CDCD:910A:2222:5498:8475:1111:3900:2022 / udp src is 25 dst is 23 / end actions vf id 1 / end\n-\n- get the message::\n-\n- Flow rule validated\n-\n- check the flow list::\n-\n- testpmd> flow list 0\n-\n- check the rule not exists in the list.\n-\n-2. create a rule::\n-\n- testpmd> flow create 0 ingress pattern eth / vlan tci is 1 / pppoes / ipv6 dst is CDCD:910A:2222:5498:8475:1111:3900:2022 / udp src is 25 dst is 23 / end actions vf id 1 / end\n- testpmd> flow list 0\n-\n- check the rule exists in the list.\n-\n-3. send matched packets::\n-\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n-\n- check port 1 receive the packets.\n- send mismatched packets::\n-\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=2,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2023\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/UDP(sport=27,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/UDP(sport=25,dport=19)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n-\n- check the packets are not to port 1.\n-\n-4. verify rules can be destroyed::\n-\n- testpmd> flow destroy 0 rule 0\n- testpmd> flow list 0\n-\n- check the rule not exists in the list.\n- send matched packets, check the packets are not to port 1.\n-\n-Subcase 18: MAC_VLAN_PPPOE_IPV6_UDP_PAY_non_src_dst_port\n---------------------------------------------------------\n-\n-1. validate a rule::\n-\n- testpmd> flow validate 0 ingress pattern eth / vlan tci is 1 / pppoes / ipv6 src is CDCD:910A:2222:5498:8475:1111:3900:1536 / udp / end actions vf id 1 / end\n-\n- get the message::\n-\n- Flow rule validated\n-\n- check the flow list::\n-\n- testpmd> flow list 0\n-\n- check the rule not exists in the list.\n-\n-2. create a rule::\n-\n- testpmd> flow create 0 ingress pattern eth / vlan tci is 1 / pppoes / ipv6 src is CDCD:910A:2222:5498:8475:1111:3900:1536 / udp / end actions vf id 1 / end\n- testpmd> flow list 0\n-\n- check the rule exists in the list.\n-\n-3. send matched packets::\n-\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n-\n- check port 1 receive the packets.\n- send mismatched packets::\n-\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=2,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1537\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n-\n- check the packets are not to port 1.\n-\n-4. verify rules can be destroyed::\n-\n- testpmd> flow destroy 0 rule 0\n- testpmd> flow list 0\n-\n- check the rule not exists in the list.\n- send matched packets, check the packets are not to port 1.\n-\n-Subcase 19: MAC_VLAN_PPPOE_IPV6_TCP_PAY\n----------------------------------------\n-\n-1. validate a rule::\n-\n- testpmd> flow validate 0 ingress pattern eth / vlan tci is 1 / pppoes / ipv6 dst is CDCD:910A:2222:5498:8475:1111:3900:2022 / tcp src is 25 dst is 23 / end actions vf id 1 / end\n-\n- get the message::\n-\n- Flow rule validated\n-\n- check the flow list::\n-\n- testpmd> flow list 0\n-\n- check the rule not exists in the list.\n-\n-2. create a rule::\n-\n- testpmd> flow create 0 ingress pattern eth / vlan tci is 1 / pppoes / ipv6 dst is CDCD:910A:2222:5498:8475:1111:3900:2022 / tcp src is 25 dst is 23 / end actions vf id 1 / end\n- testpmd> flow list 0\n-\n- check the rule exists in the list.\n-\n-3. send matched packets::\n-\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n-\n- check port 1 receive the packets.\n- send mismatched packets::\n-\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=2,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2023\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/TCP(sport=27,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/TCP(sport=25,dport=19)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n-\n- check the packets are not to port 1.\n-\n-4. verify rules can be destroyed::\n-\n- testpmd> flow destroy 0 rule 0\n- testpmd> flow list 0\n-\n- check the rule not exists in the list.\n- send matched packets, check the packets are not to port 1.\n-\n-Subcase 20: MAC_VLAN_PPPOE_IPV6_TCP_PAY_non_src_dst_port\n---------------------------------------------------------\n-\n-1. validate a rule::\n-\n- testpmd> flow validate 0 ingress pattern eth / vlan tci is 1 / pppoes / ipv6 src is CDCD:910A:2222:5498:8475:1111:3900:1536 / tcp / end actions vf id 1 / end\n-\n- get the message::\n-\n- Flow rule validated\n-\n- check the flow list::\n-\n- testpmd> flow list 0\n-\n- check the rule not exists in the list.\n-\n-2. create a rule::\n-\n- testpmd> flow create 0 ingress pattern eth / vlan tci is 1 / pppoes / ipv6 src is CDCD:910A:2222:5498:8475:1111:3900:1536 / tcp / end actions vf id 1 / end\n- testpmd> flow list 0\n-\n- check the rule exists in the list.\n-\n-3. send matched packets::\n-\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n-\n- check port 1 receive the packets.\n- send mismatched packets::\n-\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=2,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1537\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n-\n- check the packets are not to port 1.\n-\n-4. verify rules can be destroyed::\n-\n- testpmd> flow destroy 0 rule 0\n- testpmd> flow list 0\n-\n- check the rule not exists in the list.\n- send matched packets, check the packets are not to port 1.\n-\n-Test case: PPPoE control\n-========================\n-\n-Subcase 1: MAC_PPPOE_LCP_PAY\n-----------------------------\n-\n-1. validate a rule::\n-\n- testpmd> flow validate 0 ingress pattern eth dst is 00:11:22:33:44:55 / pppoes seid is 3 / pppoe_proto_id is 0xc021 / end actions vf id 1 / end\n-\n- get the message::\n-\n- Flow rule validated\n-\n- check the flow list::\n-\n- testpmd> flow list 0\n-\n- check the rule not exists in the list.\n-\n-2. create a rule::\n-\n- testpmd> flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / pppoes seid is 3 / pppoe_proto_id is 0xc021 / end actions vf id 1 / end\n- testpmd> flow list 0\n-\n- check the rule exists in the list.\n-\n-3. send matched packets::\n-\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0xc021)/PPP_LCP()/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n-\n- check port 1 receive the packets.\n- send mismatched packets::\n-\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:53\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0xc021)/PPP_LCP()/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=4)/PPP(proto=0xc021)/PPP_LCP()/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP()/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n-\n- check the packets are not to port 1.\n-\n-4. verify rules can be destroyed::\n-\n- testpmd> flow destroy 0 rule 0\n- testpmd> flow list 0\n-\n- check the rule not exists in the list.\n- send matched packets, check the packets are not to port 1.\n-\n-Subcase 2: MAC_PPPOE_IPCP_PAY\n------------------------------\n-\n-1. validate a rule::\n-\n- testpmd> flow validate 0 ingress pattern eth dst is 00:11:22:33:44:55 / pppoes seid is 3 / pppoe_proto_id is 0x8021 / end actions vf id 1 / end\n-\n- get the message::\n-\n- Flow rule validated\n-\n- check the flow list::\n-\n- testpmd> flow list 0\n-\n- check the rule not exists in the list.\n-\n-2. create a rule::\n-\n- testpmd> flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / pppoes seid is 3 / pppoe_proto_id is 0x8021 / end actions vf id 1 / end\n- testpmd> flow list 0\n-\n- check the rule exists in the list.\n-\n-3. send matched packets::\n-\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x8021)/PPP_IPCP()/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n-\n- check port 1 receive the packets.\n- send mismatched packets::\n-\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:53\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x8021)/PPP_IPCP()/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=4)/PPP(proto=0x8021)/PPP_IPCP()/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP()/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n-\n- check the packets are not to port 1.\n-\n-4. verify rules can be destroyed::\n-\n- testpmd> flow destroy 0 rule 0\n- testpmd> flow list 0\n-\n- check the rule not exists in the list.\n- send matched packets, check the packets are not to port 1.\n-\n-Subcase 3: MAC_VLAN_PPPOE_LCP_PAY\n----------------------------------\n-\n-1. validate a rule::\n-\n- testpmd> flow validate 0 ingress pattern eth dst is 00:11:22:33:44:55 / vlan tci is 1 / pppoes seid is 3 / pppoe_proto_id is 0xc021 / end actions vf id 1 / end\n-\n- get the message::\n-\n- Flow rule validated\n-\n- check the flow list::\n-\n- testpmd> flow list 0\n-\n- check the rule not exists in the list.\n-\n-2. create a rule::\n-\n- testpmd> flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / vlan tci is 1 / pppoes seid is 3 / pppoe_proto_id is 0xc021 / end actions vf id 1 / end\n- testpmd> flow list 0\n-\n- check the rule exists in the list.\n-\n-3. send matched packets::\n-\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0xc021)/PPP_LCP()/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n-\n- check port 1 receive the packets.\n- send mismatched packets::\n-\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:53\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0xc021)/PPP_LCP()/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=2,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0xc021)/PPP_LCP()/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=4)/PPP(proto=0xc021)/PPP_LCP()/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP()/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n-\n- check the packets are not to port 1.\n-\n-4. verify rules can be destroyed::\n-\n- testpmd> flow destroy 0 rule 0\n- testpmd> flow list 0\n-\n- check the rule not exists in the list.\n- send matched packets, check the packets are not to port 1.\n-\n-Subcase 4: MAC_VLAN_PPPOE_IPCP_PAY\n-----------------------------------\n-\n-1. validate a rule::\n-\n- testpmd> flow validate 0 ingress pattern eth dst is 00:11:22:33:44:55 / vlan tci is 1 / pppoes seid is 3 / pppoe_proto_id is 0x8021 / end actions vf id 1 / end\n-\n- get the message::\n-\n- Flow rule validated\n-\n- check the flow list::\n-\n- testpmd> flow list 0\n-\n- check the rule not exists in the list.\n-\n-2. create a rule::\n-\n- testpmd> flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / vlan tci is 1 / pppoes seid is 3 / pppoe_proto_id is 0x8021 / end actions vf id 1 / end\n- testpmd> flow list 0\n-\n- check the rule exists in the list.\n-\n-3. send matched packets::\n-\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x8021)/PPP_IPCP()/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n-\n- check port 1 receive the packets.\n- send mismatched packets::\n-\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:53\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x8021)/PPP_IPCP()/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=2,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x8021)/PPP_IPCP()/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=4)/PPP(proto=0x8021)/PPP_IPCP()/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n- sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP()/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n-\n- check the packets are not to port 1.\n-\n-4. verify rules can be destroyed::\n-\n- testpmd> flow destroy 0 rule 0\n- testpmd> flow list 0\n-\n- check the rule not exists in the list.\n- send matched packets, check the packets are not to port 1.\n-\n Test case: MAC_IPV4_PFCP_NODE\n =============================\n \n", "prefixes": [ "V1", "1/2" ] }{ "id": 89214, "url": "