get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/89215/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 89215,
    "url": "http://patches.dpdk.org/api/patches/89215/?format=api",
    "web_url": "http://patches.dpdk.org/project/dts/patch/1615889106-6745-3-git-send-email-zhiminx.huang@intel.com/",
    "project": {
        "id": 3,
        "url": "http://patches.dpdk.org/api/projects/3/?format=api",
        "name": "DTS",
        "link_name": "dts",
        "list_id": "dts.dpdk.org",
        "list_email": "dts@dpdk.org",
        "web_url": "",
        "scm_url": "git://dpdk.org/tools/dts",
        "webscm_url": "http://git.dpdk.org/tools/dts/",
        "list_archive_url": "https://inbox.dpdk.org/dts",
        "list_archive_url_format": "https://inbox.dpdk.org/dts/{}",
        "commit_url_format": ""
    },
    "msgid": "<1615889106-6745-3-git-send-email-zhiminx.huang@intel.com>",
    "list_archive_url": "https://inbox.dpdk.org/dts/1615889106-6745-3-git-send-email-zhiminx.huang@intel.com",
    "date": "2021-03-16T10:05:06",
    "name": "[V1,2/2] test_plans/cvl_dcf_switch_filter_pppoe_test_plan:add pppoe new suite",
    "commit_ref": null,
    "pull_url": null,
    "state": "accepted",
    "archived": false,
    "hash": "240dc8673908d8cfe4d8ea1ca864d0d342993884",
    "submitter": {
        "id": 1685,
        "url": "http://patches.dpdk.org/api/people/1685/?format=api",
        "name": "Huang, ZhiminX",
        "email": "zhiminx.huang@intel.com"
    },
    "delegate": null,
    "mbox": "http://patches.dpdk.org/project/dts/patch/1615889106-6745-3-git-send-email-zhiminx.huang@intel.com/mbox/",
    "series": [
        {
            "id": 15690,
            "url": "http://patches.dpdk.org/api/series/15690/?format=api",
            "web_url": "http://patches.dpdk.org/project/dts/list/?series=15690",
            "date": "2021-03-16T10:05:04",
            "name": "add new suite and split case",
            "version": 1,
            "mbox": "http://patches.dpdk.org/series/15690/mbox/"
        }
    ],
    "comments": "http://patches.dpdk.org/api/patches/89215/comments/",
    "check": "pending",
    "checks": "http://patches.dpdk.org/api/patches/89215/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dts-bounces@dpdk.org>",
        "X-Original-To": "patchwork@inbox.dpdk.org",
        "Delivered-To": "patchwork@inbox.dpdk.org",
        "Received": [
            "from mails.dpdk.org (mails.dpdk.org [217.70.189.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id 317B3A054F;\n\tTue, 16 Mar 2021 11:17:29 +0100 (CET)",
            "from [217.70.189.124] (localhost [127.0.0.1])\n\tby mails.dpdk.org (Postfix) with ESMTP id 2367224280D;\n\tTue, 16 Mar 2021 11:17:29 +0100 (CET)",
            "from mga05.intel.com (mga05.intel.com [192.55.52.43])\n by mails.dpdk.org (Postfix) with ESMTP id D1E6B4069F\n for <dts@dpdk.org>; Tue, 16 Mar 2021 11:17:25 +0100 (CET)",
            "from orsmga008.jf.intel.com ([10.7.209.65])\n by fmsmga105.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 16 Mar 2021 03:17:25 -0700",
            "from unknown (HELO dpdk-huangzm-d.sh.intel.com) ([10.240.183.72])\n by orsmga008-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 16 Mar 2021 03:17:23 -0700"
        ],
        "IronPort-SDR": [
            "\n lGioxA/9NL5S23rBRv17jnA8JoB9oSGLMi9qSYDDNWHj3kLygmtYc7YVRXddhD1liYpIDVvBJf\n a0Uxl0XkLVew==",
            "\n KImBRXoiTBihgpLYEBlDTNUHJK0hbOaitELSpWJLZqliSjUDkME2qfAjNKwUvWem+6ehuIX3TT\n bEbRjWwC3OFg=="
        ],
        "X-IronPort-AV": [
            "E=McAfee;i=\"6000,8403,9924\"; a=\"274277048\"",
            "E=Sophos;i=\"5.81,251,1610438400\"; d=\"scan'208\";a=\"274277048\"",
            "E=Sophos;i=\"5.81,251,1610438400\"; d=\"scan'208\";a=\"412162971\""
        ],
        "From": "Zhimin Huang <zhiminx.huang@intel.com>",
        "To": "dts@dpdk.org",
        "Cc": "xueqin.lin@intel.com,\n\tZhimin Huang <zhiminx.huang@intel.com>",
        "Date": "Tue, 16 Mar 2021 18:05:06 +0800",
        "Message-Id": "<1615889106-6745-3-git-send-email-zhiminx.huang@intel.com>",
        "X-Mailer": "git-send-email 1.8.3.1",
        "In-Reply-To": "<1615889106-6745-1-git-send-email-zhiminx.huang@intel.com>",
        "References": "<1615889106-6745-1-git-send-email-zhiminx.huang@intel.com>",
        "Subject": "[dts] [PATCH V1 2/2]\n test_plans/cvl_dcf_switch_filter_pppoe_test_plan:add pppoe new suite",
        "X-BeenThere": "dts@dpdk.org",
        "X-Mailman-Version": "2.1.29",
        "Precedence": "list",
        "List-Id": "test suite reviews and discussions <dts.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dts>,\n <mailto:dts-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dts/>",
        "List-Post": "<mailto:dts@dpdk.org>",
        "List-Help": "<mailto:dts-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dts>,\n <mailto:dts-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dts-bounces@dpdk.org",
        "Sender": "\"dts\" <dts-bounces@dpdk.org>"
    },
    "content": "*.split cvl_dcf_switch_filter pppoe case into cvl_dcf_switch_filter_pppoe\n\nSigned-off-by: Zhimin Huang <zhiminx.huang@intel.com>\n---\n .../cvl_dcf_switch_filter_pppoe_test_plan.rst      | 1510 ++++++++++++++++++++\n 1 file changed, 1510 insertions(+)\n create mode 100644 test_plans/cvl_dcf_switch_filter_pppoe_test_plan.rst",
    "diff": "diff --git a/test_plans/cvl_dcf_switch_filter_pppoe_test_plan.rst b/test_plans/cvl_dcf_switch_filter_pppoe_test_plan.rst\nnew file mode 100644\nindex 0000000..0149b46\n--- /dev/null\n+++ b/test_plans/cvl_dcf_switch_filter_pppoe_test_plan.rst\n@@ -0,0 +1,1510 @@\n+.. Copyright (c) <2021>, Intel Corporation\n+   All rights reserved.\n+\n+   Redistribution and use in source and binary forms, with or without\n+   modification, are permitted provided that the following conditions\n+   are met:\n+\n+   - Redistributions of source code must retain the above copyright\n+     notice, this list of conditions and the following disclaimer.\n+\n+   - Redistributions in binary form must reproduce the above copyright\n+     notice, this list of conditions and the following disclaimer in\n+     the documentation and/or other materials provided with the\n+     distribution.\n+\n+   - Neither the name of Intel Corporation nor the names of its\n+     contributors may be used to endorse or promote products derived\n+     from this software without specific prior written permission.\n+\n+   THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS\n+   \"AS IS\" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT\n+   LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS\n+   FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE\n+   COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,\n+   INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES\n+   (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR\n+   SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)\n+   HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,\n+   STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)\n+   ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED\n+   OF THE POSSIBILITY OF SUCH DAMAGE.\n+\n+=================================\n+CVL DCF Switch Filter PPPOE Tests\n+=================================\n+\n+Description\n+===========\n+\n+This document provides the plan for testing DCF switch filter pppoe of CVL, including:\n+\n+* Enable DCF switch filter for PPPOES (comm #1 package)\n+\n+\n+Pattern and input set\n+---------------------\n+\n+  +---------------------+-------------------------------+-------------------------------------------+\n+  |    Packet Types     |           Pattern             |                Input Set                  |\n+  +=====================+===============================+===========================================+\n+  |                     | MAC_VLAN_PPPOE_IPV4_PAY       | [Dest MAC], [VLAN], [seid],               |\n+  |                     | _session_id_proto_id          | [pppoe_proto_id]                          |\n+  |                     +-------------------------------+-------------------------------------------+\n+  |                     | MAC_VLAN_PPPOE_IPV6_PAY       | [Dest MAC], [VLAN], [seid],               |\n+  |                     | _session_id_proto_id          | [pppoe_proto_id]                          |\n+  |                     +-------------------------------+-------------------------------------------+\n+  |                     | MAC_PPPOE_IPV4_PAY            | [Dest MAC], [seid], [pppoe_proto_id]      |\n+  |                     | _session_id_proto_id          |                                           |\n+  |                     +-------------------------------+-------------------------------------------+\n+  |                     | MAC_PPPOE_IPV6_PAY            | [Dest MAC], [seid], [pppoe_proto_id]      |\n+  |                     | _session_id_proto_id          |                                           |\n+  |                     +-------------------------------+-------------------------------------------+\n+  |                     | MAC_PPPOE_IPV4_PAY_IP_address | [Source IP], [Dest IP]                    |\n+  |                     +-------------------------------+-------------------------------------------+\n+  |                     | MAC_PPPOE_IPV4_UDP_PAY        | [Source IP], [Dest IP],                   |\n+  |                     |                               | [Source Port], [Dest Port]                |\n+  |                     +-------------------------------+-------------------------------------------+\n+  |                     | MAC_PPPOE_IPV4_UDP_PAY        | [Source IP], [Dest IP]                    |\n+  |                     | _non_src_dst_port             |                                           |\n+  |                     +-------------------------------+-------------------------------------------+\n+  |                     | MAC_PPPOE_IPV4_TCP_PAY        | [Source IP], [Dest IP],                   |\n+  |                     |                               | [Source Port], [Dest Port]                |\n+  |                     +-------------------------------+-------------------------------------------+\n+  |                     | MAC_PPPOE_IPV4_TCP_PAY        | [Source IP], [Dest IP]                    |\n+  |                     | _non_src_dst_port             |                                           |\n+  |                     +-------------------------------+-------------------------------------------+\n+  |                     | MAC_PPPOE_IPV6_PAY_IP_address | [Source IP], [Dest IP]                    |\n+  |                     +-------------------------------+-------------------------------------------+\n+  |                     | MAC_PPPOE_IPV6_UDP_PAY        | [Source IP], [Dest IP],                   |\n+  |                     |                               | [Source Port], [Dest Port]                |\n+  |                     +-------------------------------+-------------------------------------------+\n+  |                     | MAC_PPPOE_IPV6_UDP_PAY        | [Source IP], [Dest IP]                    |\n+  |                     | _non_src_dst_port             |                                           |\n+  |                     +-------------------------------+-------------------------------------------+\n+  |                     | MAC_PPPOE_IPV6_TCP_PAY        | [Source IP], [Dest IP],                   |\n+  |                     |                               | [Source Port], [Dest Port]                |\n+  |       PPPOES        +-------------------------------+-------------------------------------------+\n+  |                     | MAC_PPPOE_IPV6_TCP_PAY        | [Source IP], [Dest IP],                   |\n+  |                     | _non_src_dst_port             |                                           |\n+  |                     +-------------------------------+-------------------------------------------+\n+  |                     | MAC_VLAN_PPPOE_IPV4_PAY       | [VLAN], [Source IP], [Dest IP]            |\n+  |                     | _IP_address                   |                                           |\n+  |                     +-------------------------------+-------------------------------------------+\n+  |                     | MAC_VLAN_PPPOE_IPV4_UDP_PAY   | [VLAN], [Source IP], [Dest IP]            |\n+  |                     |                               | [Source Port], [Dest Port]                |\n+  |                     +-------------------------------+-------------------------------------------+\n+  |                     | MAC_VLAN_PPPOE_IPV4_UDP_PAY   | [VLAN], [Source IP], [Dest IP]            |\n+  |                     | _non_src_dst_port             |                                           |\n+  |                     +-------------------------------+-------------------------------------------+\n+  |                     | MAC_VLAN_PPPOE_IPV4_TCP_PAY   | [VLAN], [Source IP], [Dest IP]            |\n+  |                     |                               | [Source Port], [Dest Port]                |\n+  |                     +-------------------------------+-------------------------------------------+\n+  |                     | MAC_VLAN_PPPOE_IPV4_TCP_PAY   | [VLAN], [Source IP], [Dest IP]            |\n+  |                     | _non_src_dst_port             |                                           |\n+  |                     +-------------------------------+-------------------------------------------+\n+  |                     | MAC_VLAN_PPPOE_IPV6_PAY       | [VLAN], [Source IP], [Dest IP]            |\n+  |                     | _IP_address                   |                                           |\n+  |                     +-------------------------------+-------------------------------------------+\n+  |                     | MAC_VLAN_PPPOE_IPV6_UDP_PAY   | [VLAN], [Source IP], [Dest IP]            |\n+  |                     |                               | [Source Port], [Dest Port]                |\n+  |                     +-------------------------------+-------------------------------------------+\n+  |                     | MAC_VLAN_PPPOE_IPV6_UDP_PAY   | [VLAN], [Source IP], [Dest IP]            |\n+  |                     | _non_src_dst_port             |                                           |\n+  |                     +-------------------------------+-------------------------------------------+\n+  |                     | MAC_VLAN_PPPOE_IPV6_TCP_PAY   | [VLAN], [Source IP], [Dest IP]            |\n+  |                     |                               | [Source Port], [Dest Port]                |\n+  |                     +-------------------------------+-------------------------------------------+\n+  |                     | MAC_VLAN_PPPOE_IPV6_TCP_PAY   | [VLAN], [Source IP], [Dest IP]            |\n+  |                     | _non_src_dst_port             |                                           |\n+  |                     +-------------------------------+-------------------------------------------+\n+  |                     | MAC_PPPOE_LCP_PAY             | [Dest MAC], [seid], [pppoe_proto_id]      |\n+  |                     +-------------------------------+-------------------------------------------+\n+  |                     | MAC_PPPOE_IPCP_PAY            | [Dest MAC], [seid], [pppoe_proto_id]      |\n+  |                     +-------------------------------+-------------------------------------------+\n+  |                     | MAC_VLAN_PPPOE_LCP_PAY        | [Dest MAC], [VLAN], [seid],               |\n+  |                     |                               | [pppoe_proto_id]                          |\n+  |                     +-------------------------------+-------------------------------------------+\n+  |                     | MAC_VLAN_PPPOE_IPCP_PAY       | [Dest MAC], [VLAN], [seid],               |\n+  |                     |                               | [pppoe_proto_id]                          |\n+  +---------------------+-------------------------------+-------------------------------------------+\n+\n+.. note::\n+\n+   1. The maximum input set length of a switch rule is 32 bytes, and src ipv6,\n+      dst ipv6 account for 32 bytes. Therefore, for ipv6 cases, if need to test\n+      fields other than src, dst ip, we create rule by removing src or dst ip in\n+      the test plan.\n+\n+Supported function type\n+-----------------------\n+\n+* create\n+* validate\n+* destroy\n+* flush\n+* list\n+\n+\n+Supported action type\n+---------------------\n+\n+* To vf/vsi\n+\n+\n+Prerequisites\n+=============\n+\n+1. Hardware:\n+   columbiaville_25g/columbiaville_100g\n+   design the cases with 2 ports card.\n+\n+2. Software:\n+   dpdk: http://dpdk.org/git/dpdk\n+   scapy: http://www.secdev.org/projects/scapy/\n+\n+3. Copy specific ice package to /lib/firmware/updates/intel/ice/ddp/ice.pkg,\n+   then load driver::\n+\n+     rmmod ice\n+     insmod ice.ko\n+\n+4. Compile DPDK::\n+\n+     make -j install T=x86_64-native-linuxapp-gcc\n+\n+5. Get the pci device id of DUT, for example::\n+\n+     ./usertools/dpdk-devbind.py -s\n+\n+     0000:18:00.0 'Device 1593' if=enp24s0f0 drv=ice unused=vfio-pci\n+     0000:18:00.1 'Device 1593' if=enp24s0f1 drv=ice unused=vfio-pci\n+\n+6. Generate 4 VFs on PF0::\n+\n+     echo 4 > /sys/bus/pci/devices/0000:18:00.0/sriov_numvfs\n+\n+     ./usertools/dpdk-devbind.py -s\n+     0000:18:01.0 'Ethernet Adaptive Virtual Function 1889' if=enp24s1 drv=iavf unused=vfio-pci\n+     0000:18:01.1 'Ethernet Adaptive Virtual Function 1889' if=enp24s1f1 drv=iavf unused=vfio-pci\n+     0000:18:01.2 'Ethernet Adaptive Virtual Function 1889' if=enp24s1f2 drv=iavf unused=vfio-pci\n+     0000:18:01.3 'Ethernet Adaptive Virtual Function 1889' if=enp24s1f3 drv=iavf unused=vfio-pci\n+\n+7. Set VF0 as trust::\n+\n+     ip link set enp24s0f0 vf 0 trust on\n+\n+8. Bind VFs to dpdk driver::\n+\n+     modprobe vfio-pci\n+     ./usertools/dpdk-devbind.py -b vfio-pci 0000:18:01.0 0000:18:01.1 0000:18:01.2 0000:18:01.3\n+\n+9. Launch dpdk on VF0 and VF1, and VF0 request DCF mode::\n+\n+     ./x86_64-native-linuxapp-gcc/app/testpmd -c 0xf -n 4 -w 0000:18:01.0,cap=dcf -w 0000:18:01.1 -- -i\n+     testpmd> set portlist 1\n+     testpmd> set fwd rxonly\n+     testpmd> set verbose 1\n+     testpmd> start\n+     testpmd> show port info all\n+\n+   check the VF0 driver is net_ice_dcf.\n+\n+10. on tester side, copy the layer python file to /root::\n+\n+      cp pfcp.py to /root\n+\n+    then import layers when start scapy::\n+\n+      >>> import sys\n+      >>> sys.path.append('/root')\n+      >>> from pfcp import PFCP\n+      >>> from scapy.contrib.igmp import *\n+\n+\n+\n+Test case: MAC_VLAN_PPPOE_IPV4_PAY_session_id_proto_id\n+======================================================\n+\n+1. validate a rule::\n+\n+     testpmd> flow validate 0 ingress pattern eth dst is 00:11:22:33:44:55 / vlan tci is 1 / pppoes seid is 3 / pppoe_proto_id is 0x0021 / end actions vf id 1 / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create a rule::\n+\n+     testpmd> flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / vlan tci is 1 / pppoes seid is 3 / pppoe_proto_id is 0x0021 / end actions vf id 1 / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets::\n+\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP()/Raw(\"x\" * 80)],iface=\"enp27s0f0\",count=1)\n+\n+   check port 1 receive the packets.\n+   send mismatched packets::\n+\n+     sendp([Ether(dst=\"00:11:22:33:44:54\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP()/Raw(\"x\" * 80)],iface=\"enp27s0f0\",count=1)\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=2,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP()/Raw(\"x\" * 80)],iface=\"enp27s0f0\",count=1)\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=4)/PPP(proto=0x0021)/IP()/Raw(\"x\" * 80)],iface=\"enp27s0f0\",count=1)\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6()/Raw(\"x\" * 80)],iface=\"enp27s0f0\",count=1)\n+\n+   check the packets are not to port 1.\n+\n+4. verify rules can be destroyed::\n+\n+     testpmd> flow destroy 0 rule 0\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+   send matched packets, check the packets are not to port 1.\n+\n+Test case: MAC_VLAN_PPPOE_IPV6_PAY_session_id_proto_id\n+======================================================\n+\n+1. validate a rule::\n+\n+     testpmd> flow validate 0 ingress pattern eth dst is 00:11:22:33:44:55 / vlan tci is 1 / pppoes seid is 3 / pppoe_proto_id is 0x0057 / end actions vf id 1 / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create a rule::\n+\n+     testpmd> flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / vlan tci is 1 / pppoes seid is 3 / pppoe_proto_id is 0x0057 / end actions vf id 1 / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets::\n+\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6()/Raw(\"x\" * 80)],iface=\"enp27s0f0\",count=1)\n+\n+   check port 1 receive the packets.\n+   send mismatched packets::\n+\n+     sendp([Ether(dst=\"00:11:22:33:44:54\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6()/Raw(\"x\" * 80)],iface=\"enp27s0f0\",count=1)\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=2,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6()/Raw(\"x\" * 80)],iface=\"enp27s0f0\",count=1)\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=4)/PPP(proto=0x0057)/IPv6()/Raw(\"x\" * 80)],iface=\"enp27s0f0\",count=1)\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP()/Raw(\"x\" * 80)],iface=\"enp27s0f0\",count=1)\n+\n+   check the packets are not to port 1.\n+\n+4. verify rules can be destroyed::\n+\n+     testpmd> flow destroy 0 rule 0\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+   send matched packets, check the packets are not to port 1.\n+\n+Test case: MAC_PPPOE_IPV4_PAY_session_id_proto_id\n+=================================================\n+\n+1. validate a rule::\n+\n+     testpmd> flow validate 0 ingress pattern eth dst is 00:11:22:33:44:55 / pppoes seid is 3 / pppoe_proto_id is 0x0021 / end actions vf id 1 / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create a rule::\n+\n+     testpmd> flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / pppoes seid is 3 / pppoe_proto_id is 0x0021 / end actions vf id 1 / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets::\n+\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP()/Raw(\"x\" * 80)],iface=\"enp27s0f0\",count=1)\n+\n+   check port 1 receive the packets.\n+   send mismatched packets::\n+\n+     sendp([Ether(dst=\"00:11:22:33:44:54\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP()/Raw(\"x\" * 80)],iface=\"enp27s0f0\",count=1)\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=4)/PPP(proto=0x0021)/IP()/Raw(\"x\" * 80)],iface=\"enp27s0f0\",count=1)\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6()/Raw(\"x\" * 80)],iface=\"enp27s0f0\",count=1)\n+\n+   check the packets are not to port 1.\n+\n+4. verify rules can be destroyed::\n+\n+     testpmd> flow destroy 0 rule 0\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+   send matched packets, check the packets are not to port 1.\n+\n+Test case: MAC_PPPOE_IPV6_PAY_session_id_proto_id\n+=================================================\n+\n+1. validate a rule::\n+\n+     testpmd> flow validate 0 ingress pattern eth dst is 00:11:22:33:44:55 / pppoes seid is 3 / pppoe_proto_id is 0x0057 / end actions vf id 1 / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create a rule::\n+\n+     testpmd> flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / pppoes seid is 3 / pppoe_proto_id is 0x0057 / end actions vf id 1 / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets::\n+\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6()/Raw(\"x\" * 80)],iface=\"enp27s0f0\",count=1)\n+\n+   check port 1 receive the packets.\n+   send mismatched packets::\n+\n+     sendp([Ether(dst=\"00:11:22:33:44:54\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6()/Raw(\"x\" * 80)],iface=\"enp27s0f0\",count=1)\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=4)/PPP(proto=0x0057)/IPv6()/Raw(\"x\" * 80)],iface=\"enp27s0f0\",count=1)\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP()/Raw(\"x\" * 80)],iface=\"enp27s0f0\",count=1)\n+\n+   check the packets are not to port 1.\n+\n+4. verify rules can be destroyed::\n+\n+     testpmd> flow destroy 0 rule 0\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+   send matched packets, check the packets are not to port 1.\n+\n+Test case: PPPoE data\n+=====================\n+\n+Subcase 1: MAC_PPPOE_IPV4_PAY_IP_address\n+----------------------------------------\n+\n+1. validate a rule::\n+\n+     testpmd> flow validate 0 ingress pattern eth / pppoes / ipv4 src is 192.168.1.1 dst is 192.168.1.2 / end actions vf id 1 / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create a rule::\n+\n+     testpmd> flow create 0 ingress pattern eth / pppoes / ipv4 src is 192.168.1.1 dst is 192.168.1.2 / end actions vf id 1 / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets::\n+\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/Raw(\"x\"*80)],iface=\"ens786f0\",count=1)\n+\n+   check port 1 receive the packets.\n+   send mismatched packets::\n+\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.3\", dst=\"192.168.1.2\")/Raw(\"x\"*80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.4\")/Raw(\"x\"*80)],iface=\"ens786f0\",count=1)\n+\n+   check the packets are not to port 1.\n+\n+4. verify rules can be destroyed::\n+\n+     testpmd> flow destroy 0 rule 0\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+   send matched packets, check the packets are not to port 1.\n+\n+Subcase 2: MAC_PPPOE_IPV4_UDP_PAY\n+---------------------------------\n+\n+1. validate a rule::\n+\n+     testpmd> flow validate 0 ingress pattern eth / pppoes / ipv4 src is 192.168.1.1 dst is 192.168.1.2 / udp src is 25 dst is 23 / end actions vf id 1 / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create a rule::\n+\n+     testpmd> flow create 0 ingress pattern eth / pppoes / ipv4 src is 192.168.1.1 dst is 192.168.1.2 / udp src is 25 dst is 23 / end actions vf id 1 / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets::\n+\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+   check port 1 receive the packets.\n+   send mismatched packets::\n+\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.3\", dst=\"192.168.1.2\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.4\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/UDP(sport=27,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/UDP(sport=25,dport=19)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+   check the packets are not to port 1.\n+\n+4. verify rules can be destroyed::\n+\n+     testpmd> flow destroy 0 rule 0\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+   send matched packets, check the packets are not to port 1.\n+\n+Subcase 3: MAC_PPPOE_IPV4_UDP_PAY_non_src_dst_port\n+--------------------------------------------------\n+\n+1. validate a rule::\n+\n+     testpmd> flow validate 0 ingress pattern eth / pppoes / ipv4 src is 192.168.1.1 dst is 192.168.1.2 / udp / end actions vf id 1 / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create a rule::\n+\n+     testpmd> flow create 0 ingress pattern eth / pppoes / ipv4 src is 192.168.1.1 dst is 192.168.1.2 / udp / end actions vf id 1 / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets::\n+\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+   check port 1 receive the packets.\n+   send mismatched packets::\n+\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.3\", dst=\"192.168.1.2\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.4\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+   check the packets are not to port 1.\n+\n+4. verify rules can be destroyed::\n+\n+     testpmd> flow destroy 0 rule 0\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+   send matched packets, check the packets are not to port 1.\n+\n+Subcase 4: MAC_PPPOE_IPV4_TCP_PAY\n+---------------------------------\n+\n+1. validate a rule::\n+\n+     testpmd> flow validate 0 ingress pattern eth / pppoes / ipv4 src is 192.168.1.1 dst is 192.168.1.2 / tcp src is 25 dst is 23 / end actions vf id 1 / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create a rule::\n+\n+     testpmd> flow create 0 ingress pattern eth / pppoes / ipv4 src is 192.168.1.1 dst is 192.168.1.2 / tcp src is 25 dst is 23 / end actions vf id 1 / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets::\n+\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+   check port 1 receive the packets.\n+   send mismatched packets::\n+\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.3\", dst=\"192.168.1.2\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.4\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/TCP(sport=27,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/TCP(sport=25,dport=19)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+   check the packets are not to port 1.\n+\n+4. verify rules can be destroyed::\n+\n+     testpmd> flow destroy 0 rule 0\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+   send matched packets, check the packets are not to port 1.\n+\n+Subcase 5: MAC_PPPOE_IPV4_TCP_PAY_non_src_dst_port\n+--------------------------------------------------\n+\n+1. validate a rule::\n+\n+     testpmd> flow validate 0 ingress pattern eth / pppoes / ipv4 src is 192.168.1.1 dst is 192.168.1.2 / tcp / end actions vf id 1 / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create a rule::\n+\n+     testpmd> flow create 0 ingress pattern eth / pppoes / ipv4 src is 192.168.1.1 dst is 192.168.1.2 / tcp / end actions vf id 1 / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets::\n+\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+   check port 1 receive the packets.\n+   send mismatched packets::\n+\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.3\", dst=\"192.168.1.2\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.4\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+   check the packets are not to port 1.\n+\n+4. verify rules can be destroyed::\n+\n+     testpmd> flow destroy 0 rule 0\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+   send matched packets, check the packets are not to port 1.\n+\n+Subcase 6: MAC_PPPOE_IPV6_PAY_IP_address\n+----------------------------------------\n+\n+1. validate a rule::\n+\n+     testpmd> flow validate 0 ingress pattern eth / pppoes / ipv6 src is CDCD:910A:2222:5498:8475:1111:3900:1536 dst is CDCD:910A:2222:5498:8475:1111:3900:2022 / end actions vf id 1 / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create a rule::\n+\n+     testpmd> flow create 0 ingress pattern eth / pppoes / ipv6 src is CDCD:910A:2222:5498:8475:1111:3900:1536 dst is CDCD:910A:2222:5498:8475:1111:3900:2022 / end actions vf id 1 / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets::\n+\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/Raw(\"x\"*80)],iface=\"ens786f0\",count=1)\n+\n+   check port 1 receive the packets.\n+   send mismatched packets::\n+\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1537\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/Raw(\"x\"*80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2023\")/Raw(\"x\"*80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\")/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/Raw(\"x\"*80)],iface=\"ens786f0\",count=1)\n+\n+   check the packets are not to port 1.\n+\n+4. verify rules can be destroyed::\n+\n+     testpmd> flow destroy 0 rule 0\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+   send matched packets, check the packets are not to port 1.\n+\n+Subcase 7: MAC_PPPOE_IPV6_UDP_PAY\n+---------------------------------\n+\n+1. validate a rule::\n+\n+     testpmd> flow validate 0 ingress pattern eth / pppoes / ipv6 dst is CDCD:910A:2222:5498:8475:1111:3900:2022 / udp src is 25 dst is 23 / end actions vf id 1 / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create a rule::\n+\n+     testpmd> flow create 0 ingress pattern eth / pppoes / ipv6 dst is CDCD:910A:2222:5498:8475:1111:3900:2022 / udp src is 25 dst is 23 / end actions vf id 1 / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets::\n+\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+   check port 1 receive the packets.\n+   send mismatched packets::\n+\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2023\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/UDP(sport=27,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/UDP(sport=25,dport=19)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+   check the packets are not to port 1.\n+\n+4. verify rules can be destroyed::\n+\n+     testpmd> flow destroy 0 rule 0\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+   send matched packets, check the packets are not to port 1.\n+\n+Subcase 8: MAC_PPPOE_IPV6_UDP_PAY_non_src_dst_port\n+--------------------------------------------------\n+\n+1. validate a rule::\n+\n+     testpmd> flow validate 0 ingress pattern eth / pppoes / ipv6 src is CDCD:910A:2222:5498:8475:1111:3900:1536 dst is CDCD:910A:2222:5498:8475:1111:3900:2022 / udp / end actions vf id 1 / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create a rule::\n+\n+     testpmd> flow create 0 ingress pattern eth / pppoes / ipv6 src is CDCD:910A:2222:5498:8475:1111:3900:1536 dst is CDCD:910A:2222:5498:8475:1111:3900:2022 / udp / end actions vf id 1 / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets::\n+\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+   check port 1 receive the packets.\n+   send mismatched packets::\n+\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1537\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2023\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+   check the packets are not to port 1.\n+\n+4. verify rules can be destroyed::\n+\n+     testpmd> flow destroy 0 rule 0\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+   send matched packets, check the packets are not to port 1.\n+\n+Subcase 9: MAC_PPPOE_IPV6_TCP_PAY\n+---------------------------------\n+\n+1. validate a rule::\n+\n+     testpmd> flow validate 0 ingress pattern eth / pppoes / ipv6 dst is CDCD:910A:2222:5498:8475:1111:3900:2022 / tcp src is 25 dst is 23 / end actions vf id 1 / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create a rule::\n+\n+     testpmd> flow create 0 ingress pattern eth / pppoes / ipv6 dst is CDCD:910A:2222:5498:8475:1111:3900:2022 / tcp src is 25 dst is 23 / end actions vf id 1 / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets::\n+\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+   check port 1 receive the packets.\n+   send mismatched packets::\n+\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2023\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/TCP(sport=27,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/TCP(sport=25,dport=19)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+   check the packets are not to port 1.\n+\n+4. verify rules can be destroyed::\n+\n+     testpmd> flow destroy 0 rule 0\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+   send matched packets, check the packets are not to port 1.\n+\n+Subcase 10: MAC_PPPOE_IPV6_TCP_PAY_non_src_dst_port\n+---------------------------------------------------\n+\n+1. validate a rule::\n+\n+     testpmd> flow validate 0 ingress pattern eth / pppoes / ipv6 src is CDCD:910A:2222:5498:8475:1111:3900:1536 dst is CDCD:910A:2222:5498:8475:1111:3900:2022 / tcp / end actions vf id 1 / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create a rule::\n+\n+     testpmd> flow create 0 ingress pattern eth / pppoes / ipv6 src is CDCD:910A:2222:5498:8475:1111:3900:1536 dst is CDCD:910A:2222:5498:8475:1111:3900:2022 / tcp / end actions vf id 1 / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets::\n+\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+   check port 1 receive the packets.\n+   send mismatched packets::\n+\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1537\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2023\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+   check the packets are not to port 1.\n+\n+4. verify rules can be destroyed::\n+\n+     testpmd> flow destroy 0 rule 0\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+   send matched packets, check the packets are not to port 1.\n+\n+Subcase 11: MAC_VLAN_PPPOE_IPV4_PAY_IP_address\n+----------------------------------------------\n+\n+1. validate a rule::\n+\n+     testpmd> flow validate 0 ingress pattern eth / vlan tci is 1 / pppoes / ipv4 src is 192.168.1.1 dst is 192.168.1.2 / end actions vf id 1 / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create a rule::\n+\n+     testpmd> flow create 0 ingress pattern eth / vlan tci is 1 / pppoes / ipv4 src is 192.168.1.1 dst is 192.168.1.2 / end actions vf id 1 / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets::\n+\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/Raw(\"x\"*80)],iface=\"ens786f0\",count=1)\n+\n+   check port 1 receive the packets.\n+   send mismatched packets::\n+\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=2,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/Raw(\"x\"*80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.3\", dst=\"192.168.1.2\")/Raw(\"x\"*80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.4\")/Raw(\"x\"*80)],iface=\"ens786f0\",count=1)\n+\n+   check the packets are not to port 1.\n+\n+4. verify rules can be destroyed::\n+\n+     testpmd> flow destroy 0 rule 0\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+   send matched packets, check the packets are not to port 1.\n+\n+Subcase 12: MAC_VLAN_PPPOE_IPV4_UDP_PAY\n+---------------------------------------\n+\n+1. validate a rule::\n+\n+     testpmd> flow validate 0 ingress pattern eth / vlan tci is 1 / pppoes / ipv4 src is 192.168.1.1 dst is 192.168.1.2 / udp src is 25 dst is 23 / end actions vf id 1 / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create a rule::\n+\n+     testpmd> flow create 0 ingress pattern eth / vlan tci is 1 / pppoes / ipv4 src is 192.168.1.1 dst is 192.168.1.2 / udp src is 25 dst is 23 / end actions vf id 1 / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets::\n+\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+   check port 1 receive the packets.\n+   send mismatched packets::\n+\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=2,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.3\", dst=\"192.168.1.2\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.4\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/UDP(sport=27,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/UDP(sport=25,dport=19)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+   check the packets are not to port 1.\n+\n+4. verify rules can be destroyed::\n+\n+     testpmd> flow destroy 0 rule 0\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+   send matched packets, check the packets are not to port 1.\n+\n+Subcase 13: MAC_VLAN_PPPOE_IPV4_UDP_PAY_non_src_dst_port\n+--------------------------------------------------------\n+\n+1. validate a rule::\n+\n+     testpmd> flow validate 0 ingress pattern eth / vlan tci is 1 / pppoes / ipv4 src is 192.168.1.1 dst is 192.168.1.2 / udp / end actions vf id 1 / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create a rule::\n+\n+     testpmd> flow create 0 ingress pattern eth / vlan tci is 1 / pppoes / ipv4 src is 192.168.1.1 dst is 192.168.1.2 / udp / end actions vf id 1 / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets::\n+\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+   check port 1 receive the packets.\n+   send mismatched packets::\n+\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=2,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.3\", dst=\"192.168.1.2\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.4\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+   check the packets are not to port 1.\n+\n+4. verify rules can be destroyed::\n+\n+     testpmd> flow destroy 0 rule 0\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+   send matched packets, check the packets are not to port 1.\n+\n+Subcase 14: MAC_VLAN_PPPOE_IPV4_TCP_PAY\n+---------------------------------------\n+\n+1. validate a rule::\n+\n+     testpmd> flow validate 0 ingress pattern eth / vlan tci is 1 / pppoes / ipv4 src is 192.168.1.1 dst is 192.168.1.2 / tcp src is 25 dst is 23 / end actions vf id 1 / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create a rule::\n+\n+     testpmd> flow create 0 ingress pattern eth / vlan tci is 1 / pppoes / ipv4 src is 192.168.1.1 dst is 192.168.1.2 / tcp src is 25 dst is 23 / end actions vf id 1 / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets::\n+\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+   check port 1 receive the packets.\n+   send mismatched packets::\n+\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=2,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.3\", dst=\"192.168.1.2\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.4\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/TCP(sport=27,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/TCP(sport=25,dport=19)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+   check the packets are not to port 1.\n+\n+4. verify rules can be destroyed::\n+\n+     testpmd> flow destroy 0 rule 0\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+   send matched packets, check the packets are not to port 1.\n+\n+Subcase 15: MAC_VLAN_PPPOE_IPV4_TCP_PAY_non_src_dst_port\n+--------------------------------------------------------\n+\n+1. validate a rule::\n+\n+     testpmd> flow validate 0 ingress pattern eth / vlan tci is 1 / pppoes / ipv4 src is 192.168.1.1 dst is 192.168.1.2 / tcp / end actions vf id 1 / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create a rule::\n+\n+     testpmd> flow create 0 ingress pattern eth / vlan tci is 1 / pppoes / ipv4 src is 192.168.1.1 dst is 192.168.1.2 / tcp / end actions vf id 1 / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets::\n+\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+   check port 1 receive the packets.\n+   send mismatched packets::\n+\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=2,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.3\", dst=\"192.168.1.2\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.4\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+   check the packets are not to port 1.\n+\n+4. verify rules can be destroyed::\n+\n+     testpmd> flow destroy 0 rule 0\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+   send matched packets, check the packets are not to port 1.\n+\n+Subcase 16: MAC_VLAN_PPPOE_IPV6_PAY_IP_address\n+----------------------------------------------\n+\n+1. validate a rule::\n+\n+     testpmd> flow validate 0 ingress pattern eth / vlan tci is 1 / pppoes / ipv6 src is CDCD:910A:2222:5498:8475:1111:3900:1536 / end actions vf id 1 / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create a rule::\n+\n+     testpmd> flow create 0 ingress pattern eth / vlan tci is 1 / pppoes / ipv6 src is CDCD:910A:2222:5498:8475:1111:3900:1536 / end actions vf id 1 / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets::\n+\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/Raw(\"x\"*80)],iface=\"ens786f0\",count=1)\n+\n+   check port 1 receive the packets.\n+   send mismatched packets::\n+\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=2,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/Raw(\"x\"*80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1537\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/Raw(\"x\"*80)],iface=\"ens786f0\",count=1)\n+\n+   check the packets are not to port 1.\n+\n+4. verify rules can be destroyed::\n+\n+     testpmd> flow destroy 0 rule 0\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+   send matched packets, check the packets are not to port 1.\n+\n+Subcase 17: MAC_VLAN_PPPOE_IPV6_UDP_PAY\n+---------------------------------------\n+\n+1. validate a rule::\n+\n+     testpmd> flow validate 0 ingress pattern eth / vlan tci is 1 / pppoes / ipv6 dst is CDCD:910A:2222:5498:8475:1111:3900:2022 / udp src is 25 dst is 23 / end actions vf id 1 / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create a rule::\n+\n+     testpmd> flow create 0 ingress pattern eth / vlan tci is 1 / pppoes / ipv6 dst is CDCD:910A:2222:5498:8475:1111:3900:2022 / udp src is 25 dst is 23 / end actions vf id 1 / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets::\n+\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+   check port 1 receive the packets.\n+   send mismatched packets::\n+\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=2,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2023\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/UDP(sport=27,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/UDP(sport=25,dport=19)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+   check the packets are not to port 1.\n+\n+4. verify rules can be destroyed::\n+\n+     testpmd> flow destroy 0 rule 0\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+   send matched packets, check the packets are not to port 1.\n+\n+Subcase 18: MAC_VLAN_PPPOE_IPV6_UDP_PAY_non_src_dst_port\n+--------------------------------------------------------\n+\n+1. validate a rule::\n+\n+     testpmd> flow validate 0 ingress pattern eth / vlan tci is 1 / pppoes / ipv6 src is CDCD:910A:2222:5498:8475:1111:3900:1536 / udp / end actions vf id 1 / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create a rule::\n+\n+     testpmd> flow create 0 ingress pattern eth / vlan tci is 1 / pppoes / ipv6 src is CDCD:910A:2222:5498:8475:1111:3900:1536 / udp / end actions vf id 1 / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets::\n+\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+   check port 1 receive the packets.\n+   send mismatched packets::\n+\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=2,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1537\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+   check the packets are not to port 1.\n+\n+4. verify rules can be destroyed::\n+\n+     testpmd> flow destroy 0 rule 0\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+   send matched packets, check the packets are not to port 1.\n+\n+Subcase 19: MAC_VLAN_PPPOE_IPV6_TCP_PAY\n+---------------------------------------\n+\n+1. validate a rule::\n+\n+     testpmd> flow validate 0 ingress pattern eth / vlan tci is 1 / pppoes / ipv6 dst is CDCD:910A:2222:5498:8475:1111:3900:2022 / tcp src is 25 dst is 23 / end actions vf id 1 / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create a rule::\n+\n+     testpmd> flow create 0 ingress pattern eth / vlan tci is 1 / pppoes / ipv6 dst is CDCD:910A:2222:5498:8475:1111:3900:2022 / tcp src is 25 dst is 23 / end actions vf id 1 / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets::\n+\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+   check port 1 receive the packets.\n+   send mismatched packets::\n+\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=2,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2023\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/TCP(sport=27,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/TCP(sport=25,dport=19)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+   check the packets are not to port 1.\n+\n+4. verify rules can be destroyed::\n+\n+     testpmd> flow destroy 0 rule 0\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+   send matched packets, check the packets are not to port 1.\n+\n+Subcase 20: MAC_VLAN_PPPOE_IPV6_TCP_PAY_non_src_dst_port\n+--------------------------------------------------------\n+\n+1. validate a rule::\n+\n+     testpmd> flow validate 0 ingress pattern eth / vlan tci is 1 / pppoes / ipv6 src is CDCD:910A:2222:5498:8475:1111:3900:1536 / tcp / end actions vf id 1 / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create a rule::\n+\n+     testpmd> flow create 0 ingress pattern eth / vlan tci is 1 / pppoes / ipv6 src is CDCD:910A:2222:5498:8475:1111:3900:1536 / tcp / end actions vf id 1 / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets::\n+\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+   check port 1 receive the packets.\n+   send mismatched packets::\n+\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=2,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1537\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0057)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+   check the packets are not to port 1.\n+\n+4. verify rules can be destroyed::\n+\n+     testpmd> flow destroy 0 rule 0\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+   send matched packets, check the packets are not to port 1.\n+\n+Test case: PPPoE control\n+========================\n+\n+Subcase 1: MAC_PPPOE_LCP_PAY\n+----------------------------\n+\n+1. validate a rule::\n+\n+     testpmd> flow validate 0 ingress pattern eth dst is 00:11:22:33:44:55 / pppoes seid is 3 / pppoe_proto_id is 0xc021 / end actions vf id 1 / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create a rule::\n+\n+     testpmd> flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / pppoes seid is 3 / pppoe_proto_id is 0xc021 / end actions vf id 1 / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets::\n+\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0xc021)/PPP_LCP()/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+   check port 1 receive the packets.\n+   send mismatched packets::\n+\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:53\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0xc021)/PPP_LCP()/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=4)/PPP(proto=0xc021)/PPP_LCP()/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP()/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+   check the packets are not to port 1.\n+\n+4. verify rules can be destroyed::\n+\n+     testpmd> flow destroy 0 rule 0\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+   send matched packets, check the packets are not to port 1.\n+\n+Subcase 2: MAC_PPPOE_IPCP_PAY\n+-----------------------------\n+\n+1. validate a rule::\n+\n+     testpmd> flow validate 0 ingress pattern eth dst is 00:11:22:33:44:55 / pppoes seid is 3 / pppoe_proto_id is 0x8021 / end actions vf id 1 / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create a rule::\n+\n+     testpmd> flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / pppoes seid is 3 / pppoe_proto_id is 0x8021 / end actions vf id 1 / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets::\n+\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x8021)/PPP_IPCP()/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+   check port 1 receive the packets.\n+   send mismatched packets::\n+\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:53\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x8021)/PPP_IPCP()/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=4)/PPP(proto=0x8021)/PPP_IPCP()/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP()/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+   check the packets are not to port 1.\n+\n+4. verify rules can be destroyed::\n+\n+     testpmd> flow destroy 0 rule 0\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+   send matched packets, check the packets are not to port 1.\n+\n+Subcase 3: MAC_VLAN_PPPOE_LCP_PAY\n+---------------------------------\n+\n+1. validate a rule::\n+\n+     testpmd> flow validate 0 ingress pattern eth dst is 00:11:22:33:44:55 / vlan tci is 1 / pppoes seid is 3 / pppoe_proto_id is 0xc021 / end actions vf id 1 / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create a rule::\n+\n+     testpmd> flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / vlan tci is 1 / pppoes seid is 3 / pppoe_proto_id is 0xc021 / end actions vf id 1 / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets::\n+\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0xc021)/PPP_LCP()/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+   check port 1 receive the packets.\n+   send mismatched packets::\n+\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:53\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0xc021)/PPP_LCP()/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=2,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0xc021)/PPP_LCP()/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=4)/PPP(proto=0xc021)/PPP_LCP()/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP()/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+   check the packets are not to port 1.\n+\n+4. verify rules can be destroyed::\n+\n+     testpmd> flow destroy 0 rule 0\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+   send matched packets, check the packets are not to port 1.\n+\n+Subcase 4: MAC_VLAN_PPPOE_IPCP_PAY\n+----------------------------------\n+\n+1. validate a rule::\n+\n+     testpmd> flow validate 0 ingress pattern eth dst is 00:11:22:33:44:55 / vlan tci is 1 / pppoes seid is 3 / pppoe_proto_id is 0x8021 / end actions vf id 1 / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create a rule::\n+\n+     testpmd> flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / vlan tci is 1 / pppoes seid is 3 / pppoe_proto_id is 0x8021 / end actions vf id 1 / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets::\n+\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x8021)/PPP_IPCP()/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+   check port 1 receive the packets.\n+   send mismatched packets::\n+\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:53\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x8021)/PPP_IPCP()/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=2,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x8021)/PPP_IPCP()/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=4)/PPP(proto=0x8021)/PPP_IPCP()/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(src=\"11:22:33:44:55:99\",dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(proto=0x0021)/IP()/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+   check the packets are not to port 1.\n+\n+4. verify rules can be destroyed::\n+\n+     testpmd> flow destroy 0 rule 0\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+   send matched packets, check the packets are not to port 1.\n",
    "prefixes": [
        "V1",
        "2/2"
    ]
}