get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/96695/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 96695,
    "url": "http://patches.dpdk.org/api/patches/96695/?format=api",
    "web_url": "http://patches.dpdk.org/project/dts/patch/20210805234931.70531-1-yuan.peng@intel.com/",
    "project": {
        "id": 3,
        "url": "http://patches.dpdk.org/api/projects/3/?format=api",
        "name": "DTS",
        "link_name": "dts",
        "list_id": "dts.dpdk.org",
        "list_email": "dts@dpdk.org",
        "web_url": "",
        "scm_url": "git://dpdk.org/tools/dts",
        "webscm_url": "http://git.dpdk.org/tools/dts/",
        "list_archive_url": "https://inbox.dpdk.org/dts",
        "list_archive_url_format": "https://inbox.dpdk.org/dts/{}",
        "commit_url_format": ""
    },
    "msgid": "<20210805234931.70531-1-yuan.peng@intel.com>",
    "list_archive_url": "https://inbox.dpdk.org/dts/20210805234931.70531-1-yuan.peng@intel.com",
    "date": "2021-08-05T23:49:31",
    "name": "[V2] test_plans/cvl_dcf_acl_filter_test_plan.rst: modified max entries cases in testplan",
    "commit_ref": null,
    "pull_url": null,
    "state": "accepted",
    "archived": false,
    "hash": "6f592d727e0d01325a5195afe61c61fdffa38c06",
    "submitter": {
        "id": 429,
        "url": "http://patches.dpdk.org/api/people/429/?format=api",
        "name": "Peng, Yuan",
        "email": "yuan.peng@intel.com"
    },
    "delegate": null,
    "mbox": "http://patches.dpdk.org/project/dts/patch/20210805234931.70531-1-yuan.peng@intel.com/mbox/",
    "series": [
        {
            "id": 18210,
            "url": "http://patches.dpdk.org/api/series/18210/?format=api",
            "web_url": "http://patches.dpdk.org/project/dts/list/?series=18210",
            "date": "2021-08-05T23:49:31",
            "name": "[V2] test_plans/cvl_dcf_acl_filter_test_plan.rst: modified max entries cases in testplan",
            "version": 2,
            "mbox": "http://patches.dpdk.org/series/18210/mbox/"
        }
    ],
    "comments": "http://patches.dpdk.org/api/patches/96695/comments/",
    "check": "success",
    "checks": "http://patches.dpdk.org/api/patches/96695/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dts-bounces@dpdk.org>",
        "X-Original-To": "patchwork@inbox.dpdk.org",
        "Delivered-To": "patchwork@inbox.dpdk.org",
        "Received": [
            "from mails.dpdk.org (mails.dpdk.org [217.70.189.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id 5F501A0C4C;\n\tFri,  6 Aug 2021 08:50:53 +0200 (CEST)",
            "from [217.70.189.124] (localhost [127.0.0.1])\n\tby mails.dpdk.org (Postfix) with ESMTP id 282CC41293;\n\tFri,  6 Aug 2021 08:50:53 +0200 (CEST)",
            "from mga17.intel.com (mga17.intel.com [192.55.52.151])\n by mails.dpdk.org (Postfix) with ESMTP id E263F41290\n for <dts@dpdk.org>; Fri,  6 Aug 2021 08:50:50 +0200 (CEST)",
            "from fmsmga006.fm.intel.com ([10.253.24.20])\n by fmsmga107.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 05 Aug 2021 23:50:49 -0700",
            "from pengyuan-dpdk.sh.intel.com ([10.67.115.83])\n by fmsmga006.fm.intel.com with ESMTP; 05 Aug 2021 23:50:48 -0700"
        ],
        "X-IronPort-AV": [
            "E=McAfee;i=\"6200,9189,10067\"; a=\"194590542\"",
            "E=Sophos;i=\"5.84,299,1620716400\"; d=\"scan'208\";a=\"194590542\"",
            "E=Sophos;i=\"5.84,299,1620716400\"; d=\"scan'208\";a=\"669312322\""
        ],
        "X-ExtLoop1": "1",
        "From": "Peng Yuan <yuan.peng@intel.com>",
        "To": "dts@dpdk.org",
        "Cc": "Peng Yuan <yuan.peng@intel.com>",
        "Date": "Thu,  5 Aug 2021 23:49:31 +0000",
        "Message-Id": "<20210805234931.70531-1-yuan.peng@intel.com>",
        "X-Mailer": "git-send-email 2.17.1",
        "Subject": "[dts] [PATCH V2] test_plans/cvl_dcf_acl_filter_test_plan.rst:\n modified max entries cases in testplan",
        "X-BeenThere": "dts@dpdk.org",
        "X-Mailman-Version": "2.1.29",
        "Precedence": "list",
        "List-Id": "test suite reviews and discussions <dts.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dts>,\n <mailto:dts-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dts/>",
        "List-Post": "<mailto:dts@dpdk.org>",
        "List-Help": "<mailto:dts-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dts>,\n <mailto:dts-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dts-bounces@dpdk.org",
        "Sender": "\"dts\" <dts-bounces@dpdk.org>"
    },
    "content": "Max entry is changed from 512 to 256, so modified the related cases.\n\nSigned-off-by: Peng Yuan <yuan.peng@intel.com>",
    "diff": "diff --git a/test_plans/cvl_dcf_acl_filter_test_plan.rst b/test_plans/cvl_dcf_acl_filter_test_plan.rst\nindex cdccb690..378514dd 100644\n--- a/test_plans/cvl_dcf_acl_filter_test_plan.rst\n+++ b/test_plans/cvl_dcf_acl_filter_test_plan.rst\n@@ -508,11 +508,11 @@ so there is some difference to UDP/TCP case.\n \n Test Case 5: max entry number\n =============================\n-Note: now the default entry number is 512.\n+Note: now the default entry number is 256.\n if create a IPv4 rule, will generate 4 entries:\n ipv4, ipv4-udp, ipv4-tcp, ipv4-sctp\n-So we can create 128 IPv4 rules at most.\n-while we can create 512 ipv4-udp/ipv4-tcp/ipv4-sctp rules at most.\n+So we can create 64 IPv4 rules at most.\n+while we can create 256 ipv4-udp/ipv4-tcp/ipv4-sctp rules at most.\n \n 1. launch DPDK on VF0, request DCF mode::\n \n@@ -526,55 +526,67 @@ while we can create 512 ipv4-udp/ipv4-tcp/ipv4-sctp rules at most.\n \n     flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.255.255.255 / udp / end actions drop / end\n \n-3. create 512 ipv4-udp ACL rules::\n+3. create 256 ipv4-udp ACL rules::\n \n-    flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.0 src mask 255.255.255.254 / udp / end actions drop / end\n-    flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.255.255.254 / udp / end actions drop / end\n-    flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.2 src mask 255.255.255.254 / udp / end actions drop / end\n-    ......\n-    flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.255 src mask 255.255.255.254 / udp / end actions drop / end\n-    flow create 0 ingress pattern eth / ipv4 src spec 192.168.1.0 src mask 255.255.255.254 / udp / end actions drop / end\n-    flow create 0 ingress pattern eth / ipv4 src spec 192.168.1.1 src mask 255.255.255.254 / udp / end actions drop / end\n+    flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.0 src mask 255.254.255.255 / udp / end actions drop / end\n+    flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.254.255.255 / udp / end actions drop / end\n+    flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.2 src mask 255.254.255.255 / udp / end actions drop / end\n     ......\n-    flow create 0 ingress pattern eth / ipv4 src spec 192.168.1.255 src mask 255.255.255.254 / udp / end actions drop / end\n+    flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.255 src mask 255.254.255.255 / udp / end actions drop / end\n \n    all the rules can be created successfully as ACL rules.\n \n-4. list the rules, there are rule 0-512 listed.\n+4. list the rules, there are rule 0-256 listed.\n \n 5. send packet1::\n \n-    sendp([Ether(dst=\"00:01:23:45:67:89\")/IP(src=\"192.168.0.0\", dst=\"192.168.100.2\")/UDP(sport=8010,dport=8017)/Raw(load='X'*30)], iface=\"enp134s0f1\")\n+    sendp([Ether(dst=\"00:01:23:45:67:89\")/IP(src=\"192.168.0.255\", dst=\"192.168.100.2\")/UDP(sport=8010,dport=8017)/Raw(load='X'*30)], iface=\"enp134s0f1\")\n \n-   check the packet dropped.\n+   check the packet dropped. stop the forward::\n+\n+    ---------------------- Forward statistics for port 1  ----------------------\n+    RX-packets: 0              RX-dropped: 1             RX-total: 1\n+    TX-packets: 0              TX-dropped: 0             TX-total: 0\n+    ----------------------------------------------------------------------------\n \n 6. create one more rule::\n \n-    flow create 0 ingress pattern eth / ipv4 src spec 192.168.2.1 src mask 255.255.255.254 / udp / end actions drop / end\n+    flow create 0 ingress pattern eth / ipv4 src spec 192.168.1.0 src mask 255.254.255.255 / udp / end actions drop / end\n \n-   check the rule can't be created as an ACL rule successfully.\n+   the rule is created as a switch rule.\n \n 7. send packet2::\n \n-    sendp([Ether(dst=\"00:01:23:45:67:89\")/IP(src=\"192.168.2.1\", dst=\"192.168.100.2\")/UDP(sport=8010,dport=8017)/Raw(load='X'*30)], iface=\"enp134s0f1\")\n+    sendp([Ether(dst=\"00:01:23:45:67:89\")/IP(src=\"192.168.1.0\", dst=\"192.168.100.2\")/UDP(sport=8010,dport=8017)/Raw(load='X'*30)], iface=\"enp134s0f1\")\n \n-   check the packet can be received by VF1.\n+   check the packet can't be received by VF1. stop the forward::\n+ \n+    ---------------------- Forward statistics for port 1  ----------------------\n+    RX-packets: 0              RX-dropped: 0             RX-total: 0\n+    TX-packets: 0              TX-dropped: 0             TX-total: 0\n+    ----------------------------------------------------------------------------\n \n-8. delete the rule 512::\n-\n-    flow destroy 0 rule 512\n+8. delete the rule 256 and 257::\n+ \n+    flow destroy 0 rule 256\n+    flow destroy 0 rule 257\n \n    list the rules::\n \n     flow list 0\n \n-   there are rule 0-511 listed.\n+   there are rule 0-255 listed.\n \n 9. create the rule in the step6 again,\n-   check the rule can be created successfully.\n-   list the rules, there are rule 0-512 listed.\n+   check the rule can be created as acl rule successfully.\n+   list the rules, there are rule 0-256 listed.\n+ \n+10.send packet2 again, check the packet dropped. stop the forward::\n \n-10. send packet2 again, check the packet dropped.\n+    ---------------------- Forward statistics for port 1  ----------------------\n+    RX-packets: 0              RX-dropped: 1             RX-total: 1\n+    TX-packets: 0              TX-dropped: 0             TX-total: 0\n+    ----------------------------------------------------------------------------\n \n Test Case 6: max entry number ipv4-other\n ========================================\n@@ -590,51 +602,68 @@ Test Case 6: max entry number ipv4-other\n \n     flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.255.255.255 / end actions drop / end\n \n-3. create 128 ipv4-other ACL rules::\n-\n-    flow create 0 ingress pattern eth / ipv4 src spec 192.168.1.1 src mask 255.255.255.254 / end actions drop / end\n-    flow create 0 ingress pattern eth / ipv4 src spec 192.168.1.2 src mask 255.255.255.254 / end actions drop / end\n-    flow create 0 ingress pattern eth / ipv4 src spec 192.168.1.3 src mask 255.255.255.254 / end actions drop / end\n-    ......\n-    flow create 0 ingress pattern eth / ipv4 src spec 192.168.1.128 src mask 255.255.255.254 / end actions drop / end\n+3. create 64 ipv4-other ACL rules::\n+ \n+    flow create 0 ingress pattern eth / ipv4 src spec 192.168.1.1 src mask 255.255.0.255 / end actions drop / end\n+    flow create 0 ingress pattern eth / ipv4 src spec 192.168.1.2 src mask 255.255.0.255 / end actions drop / end\n+    flow create 0 ingress pattern eth / ipv4 src spec 192.168.1.3 src mask 255.255.0.255 / end actions drop / end\n+     ......\n+    flow create 0 ingress pattern eth / ipv4 src spec 192.168.1.64 src mask 255.255.0.255 / end actions drop / end\n \n    all the rules can be created successfully as ACL rules.\n \n-4. list the rules, there are rule 0-128 listed.\n+4. list the rules, there are rule 0-64 listed.\n \n 5. send packet1::\n \n-    sendp([Ether(dst=\"00:01:23:45:67:89\")/IP(src=\"192.168.1.1\", dst=\"192.168.0.2\")/Raw(load='X'*30)], iface=\"enp134s0f1\")\n+    sendp([Ether(dst=\"00:01:23:45:67:89\")/IP(src=\"192.168.1.64\", dst=\"192.168.0.2\")/Raw(load='X'*30)], iface=\"enp134s0f1\")\n \n-   check the packet dropped.\n+   check the packet dropped. stop the forward::\n+\n+    ---------------------- Forward statistics for port 1  ----------------------\n+    RX-packets: 0              RX-dropped: 1             RX-total: 1\n+    TX-packets: 0              TX-dropped: 0             TX-total: 0\n+    ----------------------------------------------------------------------------\n \n 6. create one more rule::\n \n-    flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.2 src mask 255.255.255.254 / udp / end actions drop / end\n+    flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.2 src mask 255.255.0.255 / udp / end actions drop / end\n \n    check the rule can't be created as an ACL rule successfully.\n+   it's created as a switch rule.\n \n 7. send packet2::\n \n     sendp([Ether(dst=\"00:01:23:45:67:89\")/IP(src=\"192.168.0.2\", dst=\"192.168.1.2\")/Raw(load='X'*30)], iface=\"enp134s0f1\")\n \n-   check the packet can be received by VF1.\n-\n-8. delete the rule 128::\n+   check the packet can't be received by vf1. stop forward::\n+ \n+    ---------------------- Forward statistics for port 1  ----------------------\n+    RX-packets: 0              RX-dropped: 0             RX-total: 0\n+    TX-packets: 0              TX-dropped: 0             TX-total: 0\n+    ----------------------------------------------------------------------------\n+ \n+8. delete the rule 64 and 65::\n \n-    flow destroy 0 rule 128\n+    flow destroy 0 rule 64\n+    flow destroy 0 rule 65\n \n    list the rules::\n \n     flow list 0\n \n-   there are rule 0-127 listed.\n+   there are rule 0-63 listed.\n \n 9. create the rule in the step6 again,\n-   check the rule can be created successfully.\n-   list the rules, there are rule 0-128 listed.\n+   check the rule can be created as an ACL rule successfully.\n+   list the rules, there are rule 0-64 listed.\n \n-10. send packet2 again, check the packet dropped.\n+10.send packet2 again, check the packet dropped. stop the forward::\n+\n+    ---------------------- Forward statistics for port 1  ----------------------\n+    RX-packets: 0              RX-dropped: 1             RX-total: 1\n+    TX-packets: 0              TX-dropped: 0             TX-total: 0\n+    ----------------------------------------------------------------------------\n \n Test Case 7: max entry number combined patterns\n ===============================================\n@@ -646,27 +675,27 @@ Test Case 7: max entry number combined patterns\n \n     ./x86_64-native-linuxapp-gcc/app/dpdk-testpmd -c 0xf0 -n 4 -w 86:01.1 --file-prefix=vf1 -- -i\n \n-2. create 64 ipv4-other ACL rules::\n+2. create 32 ipv4-other ACL rules::\n \n-    flow create 0 ingress pattern eth / ipv4 dst spec 192.168.0.0 dst mask 255.255.255.0 / end actions drop / end\n-    flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.255.255.0 / end actions drop / end\n+    flow create 0 ingress pattern eth / ipv4 dst spec 192.168.0.0 dst mask 255.255.0.255 / end actions drop / end\n+    flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.255.0.255 / end actions drop / end\n     ......\n-    flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.62 src mask 255.255.255.0 / end actions drop / end\n-    flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.63 src mask 255.255.255.0 / end actions drop / end\n+    flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.30 src mask 255.255.0.255 / end actions drop / end\n+    flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.31 src mask 255.255.0.255 / end actions drop / end\n \n    all the rules can be created successfully as ACL rules.\n \n-3. create 256 ipv4-udp ACL rules::\n+3. create 128 ipv4-udp ACL rules::\n \n-    flow create 0 ingress pattern eth / ipv4 dst spec 192.168.0.0 dst mask 255.255.255.254 / udp / end actions drop / end\n-    flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.255.255.254 / udp / end actions drop / end\n+    flow create 0 ingress pattern eth / ipv4 dst spec 192.168.0.0 dst mask 255.255.0.255 / udp / end actions drop / end\n+    flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.255.0.255 / udp / end actions drop / end\n     ......\n-    flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.254 src mask 255.255.255.254 / udp / end actions drop / end\n-    flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.255 src mask 255.255.255.254 / udp / end actions drop / end\n+    flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.126 src mask 255.255.0.255 / udp / end actions drop / end\n+    flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.127 src mask 255.255.0.255 / udp / end actions drop / end\n \n    all the rules can be created successfully as ACL rules.\n \n-4. list the rules, there are rule 0-319 listed.\n+4. list the rules, there are rule 0-159 listed.\n \n 5. create one more ACl rule failed, it is created as a switch rule::\n \n@@ -678,7 +707,12 @@ Test Case 7: max entry number combined patterns\n \n     sendp([Ether(dst=\"00:01:23:45:67:89\")/IP(src=\"192.168.2.255\", dst=\"192.168.0.2\")/UDP(sport=8010,dport=8017)/Raw(load='X'*30)], iface=\"enp134s0f1\")\n \n-   check the packet dropped.\n+   check the packet dropped. stop the forward::\n+\n+    ---------------------- Forward statistics for port 1  ----------------------\n+    RX-packets: 0              RX-dropped: 1             RX-total: 1\n+    TX-packets: 0              TX-dropped: 0             TX-total: 0\n+    ----------------------------------------------------------------------------\n \n 8. delete all the rules, check the packet is received by vf1.\n \n",
    "prefixes": [
        "V2"
    ]
}