get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/116989/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 116989,
    "url": "https://patches.dpdk.org/api/patches/116989/?format=api",
    "web_url": "https://patches.dpdk.org/project/dts/patch/20220928031836.770004-13-ke1.xu@intel.com/",
    "project": {
        "id": 3,
        "url": "https://patches.dpdk.org/api/projects/3/?format=api",
        "name": "DTS",
        "link_name": "dts",
        "list_id": "dts.dpdk.org",
        "list_email": "dts@dpdk.org",
        "web_url": "",
        "scm_url": "git://dpdk.org/tools/dts",
        "webscm_url": "http://git.dpdk.org/tools/dts/",
        "list_archive_url": "https://inbox.dpdk.org/dts",
        "list_archive_url_format": "https://inbox.dpdk.org/dts/{}",
        "commit_url_format": ""
    },
    "msgid": "<20220928031836.770004-13-ke1.xu@intel.com>",
    "list_archive_url": "https://inbox.dpdk.org/dts/20220928031836.770004-13-ke1.xu@intel.com",
    "date": "2022-09-28T03:18:41",
    "name": "[V1,12/21] tests/ice_dcf_acl_filter: update test plan to support represented port action from deprecated vf action",
    "commit_ref": null,
    "pull_url": null,
    "state": "superseded",
    "archived": false,
    "hash": "cbf6a7cff6d7fd7731e15487946d744a59d58dc9",
    "submitter": {
        "id": 2810,
        "url": "https://patches.dpdk.org/api/people/2810/?format=api",
        "name": "Ke Xu",
        "email": "ke1.xu@intel.com"
    },
    "delegate": null,
    "mbox": "https://patches.dpdk.org/project/dts/patch/20220928031836.770004-13-ke1.xu@intel.com/mbox/",
    "series": [
        {
            "id": 24869,
            "url": "https://patches.dpdk.org/api/series/24869/?format=api",
            "web_url": "https://patches.dpdk.org/project/dts/list/?series=24869",
            "date": "2022-09-28T03:18:17",
            "name": "update test plans and tests to support represented port action and port representor action from deprecated vf action on DCF cases",
            "version": 1,
            "mbox": "https://patches.dpdk.org/series/24869/mbox/"
        }
    ],
    "comments": "https://patches.dpdk.org/api/patches/116989/comments/",
    "check": "pending",
    "checks": "https://patches.dpdk.org/api/patches/116989/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dts-bounces@dpdk.org>",
        "X-Original-To": "patchwork@inbox.dpdk.org",
        "Delivered-To": "patchwork@inbox.dpdk.org",
        "Received": [
            "from mails.dpdk.org (mails.dpdk.org [217.70.189.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id 10AC0A00C2;\n\tWed, 28 Sep 2022 05:26:52 +0200 (CEST)",
            "from [217.70.189.124] (localhost [127.0.0.1])\n\tby mails.dpdk.org (Postfix) with ESMTP id 0D43B4113D;\n\tWed, 28 Sep 2022 05:26:52 +0200 (CEST)",
            "from mga18.intel.com (mga18.intel.com [134.134.136.126])\n by mails.dpdk.org (Postfix) with ESMTP id 1782D40E25\n for <dts@dpdk.org>; Wed, 28 Sep 2022 05:26:49 +0200 (CEST)",
            "from fmsmga003.fm.intel.com ([10.253.24.29])\n by orsmga106.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 27 Sep 2022 20:26:49 -0700",
            "from unknown (HELO DPDK-XUKE-LAB.sh.intel.com) ([10.67.116.226])\n by FMSMGA003.fm.intel.com with ESMTP; 27 Sep 2022 20:26:46 -0700"
        ],
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/simple;\n d=intel.com; i=@intel.com; q=dns/txt; s=Intel;\n t=1664335610; x=1695871610;\n h=from:to:cc:subject:date:message-id:in-reply-to:\n references:mime-version:content-transfer-encoding;\n bh=0yKwtB5Qc1Q9uYyIkCY3TfYcPRpqH0Z+T78q3vuhWKI=;\n b=YkwQ2UqQAHskzXLvrVi6XnkyW9bkjaReCAOjwPEabV1iISZ3oUVVqo2x\n q8tM15yv+h7Ld4RUIGiGnqVTVtYK7a8k0s8apIRgtrcniHpIblaNvYXdg\n 5dGPZcHv9Rpp/PI3E4CLzaEkoHq53o6DRiw73WZxw5EVniSTQ+0ONzg8p\n PApqMe9eHR21Vfh0qBdxXM2SrzKX9M08IIK3QLRJ2hOIVNpfKV6BATs4/\n pbvL+TiTW0qEYht9LeUPVYqUEDaFlQGhs7Gyl/s2049Jv021z5Wy75g99\n XqfyqPkBkYfGKYnEU9tNyVxGiU5B1k/vRmVecrC1t7opLeYS9vWc2H35n A==;",
        "X-IronPort-AV": [
            "E=McAfee;i=\"6500,9779,10483\"; a=\"284624693\"",
            "E=Sophos;i=\"5.93,350,1654585200\"; d=\"scan'208\";a=\"284624693\"",
            "E=McAfee;i=\"6500,9779,10483\"; a=\"710803208\"",
            "E=Sophos;i=\"5.93,350,1654585200\"; d=\"scan'208\";a=\"710803208\""
        ],
        "X-ExtLoop1": "1",
        "From": "Ke Xu <ke1.xu@intel.com>",
        "To": "dts@dpdk.org",
        "Cc": "lijuan.tu@intel.com, jin.ling@intel.com, zhiminx.huang@intel.com,\n weiyuanx.li@intel.com, qi.fu@intel.com, Ke Xu <ke1.xu@intel.com>",
        "Subject": "[DTS][PATCH V1 12/21] tests/ice_dcf_acl_filter: update test plan to\n support represented port action from deprecated vf action",
        "Date": "Wed, 28 Sep 2022 03:18:41 +0000",
        "Message-Id": "<20220928031836.770004-13-ke1.xu@intel.com>",
        "X-Mailer": "git-send-email 2.25.1",
        "In-Reply-To": "<20220928031836.770004-1-ke1.xu@intel.com>",
        "References": "<20220928031836.770004-1-ke1.xu@intel.com>",
        "MIME-Version": "1.0",
        "Content-Transfer-Encoding": "8bit",
        "X-BeenThere": "dts@dpdk.org",
        "X-Mailman-Version": "2.1.29",
        "Precedence": "list",
        "List-Id": "test suite reviews and discussions <dts.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dts>,\n <mailto:dts-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dts/>",
        "List-Post": "<mailto:dts@dpdk.org>",
        "List-Help": "<mailto:dts-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dts>,\n <mailto:dts-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dts-bounces@dpdk.org"
    },
    "content": "Signed-off-by: Jin Ling <jin.ling@intel.com>\nReviewed-by: Ke Xu <ke1.xu@intel.com>\n---\n tests/TestSuite_ice_dcf_acl_filter.py | 104 ++++++++++++++------------\n 1 file changed, 57 insertions(+), 47 deletions(-)",
    "diff": "diff --git a/tests/TestSuite_ice_dcf_acl_filter.py b/tests/TestSuite_ice_dcf_acl_filter.py\nindex 4fcca800..6c1ff54e 100644\n--- a/tests/TestSuite_ice_dcf_acl_filter.py\n+++ b/tests/TestSuite_ice_dcf_acl_filter.py\n@@ -540,9 +540,9 @@ tv_mac_ipv4_pay_src_mac = {\n tv_mac_ipv4_pay_dst_mac = {\n     \"name\": \"test_mac_ipv4_pay_dst_mac\",\n     \"rules\": [\n-        \"flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv4 / end actions vf id 1 / end\",\n-        \"flow create 0 ingress pattern eth dst is 00:11:22:33:44:66 / ipv4 / end actions vf id 1 / end\",\n-        \"flow create 0 ingress pattern eth dst is 00:11:22:33:66:55 / ipv4 / end actions vf id 1 / end\",\n+        \"flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv4 / end actions represented_port ethdev_port_id 1 / end\",\n+        \"flow create 0 ingress pattern eth dst is 00:11:22:33:44:66 / ipv4 / end actions represented_port ethdev_port_id 1 / end\",\n+        \"flow create 0 ingress pattern eth dst is 00:11:22:33:66:55 / ipv4 / end actions represented_port ethdev_port_id 1 / end\",\n         \"flow create 0 ingress pattern eth dst spec 00:11:22:33:44:55 dst mask ff:ff:ff:ff:ff:00 / ipv4 / end actions drop / end\",\n     ],\n     \"scapy_str\": MAC_IPV4_PAY_DST_MAC,\n@@ -573,9 +573,9 @@ tv_mac_ipv4_pay_src_dst_ip = {\n tv_mac_ipv4_pay_src_dst_mac_src_dst_ip = {\n     \"name\": \"test_mac_ipv4_pay_src_dst_mac_src_dst_ip\",\n     \"rules\": [\n-        \"flow create 0 ingress pattern eth dst is 33:00:00:00:00:01 / ipv4 / end actions vf id 1 / end\",\n-        \"flow create 0 ingress pattern eth dst is 33:00:00:00:00:02 / ipv4 / end actions vf id 1 / end\",\n-        \"flow create 0 ingress pattern eth dst is 33:00:00:00:00:03 / ipv4 / end actions vf id 1 / end\",\n+        \"flow create 0 ingress pattern eth dst is 33:00:00:00:00:01 / ipv4 / end actions represented_port ethdev_port_id 1 / end\",\n+        \"flow create 0 ingress pattern eth dst is 33:00:00:00:00:02 / ipv4 / end actions represented_port ethdev_port_id 1 / end\",\n+        \"flow create 0 ingress pattern eth dst is 33:00:00:00:00:03 / ipv4 / end actions represented_port ethdev_port_id 1 / end\",\n         \"flow create 0 ingress pattern eth src spec 00:11:22:33:44:55 src mask ff:ff:ff:ff:ff:00 dst spec 33:00:00:00:00:02 dst mask ff:ff:ff:ff:ff:fe / ipv4 src spec 192.168.0.1 src mask 255.255.255.0 dst spec 192.168.0.2 dst mask 255.255.0.255 / end actions drop / end\",\n     ],\n     \"scapy_str\": MAC_IPV4_PAY_SRC_DST_MAC_SRC_DST_IP,\n@@ -592,9 +592,9 @@ tv_mac_ipv4_tcp_src_mac = {\n tv_mac_ipv4_tcp_dst_mac = {\n     \"name\": \"test_mac_ipv4_tcp_dst_mac\",\n     \"rules\": [\n-        \"flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv4 / tcp / end actions vf id 1 / end\",\n-        \"flow create 0 ingress pattern eth dst is 00:11:22:33:44:66 / ipv4 / tcp / end actions vf id 1 / end\",\n-        \"flow create 0 ingress pattern eth dst is 00:11:22:33:66:55 / ipv4 / tcp / end actions vf id 1 / end\",\n+        \"flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv4 / tcp / end actions represented_port ethdev_port_id 1 / end\",\n+        \"flow create 0 ingress pattern eth dst is 00:11:22:33:44:66 / ipv4 / tcp / end actions represented_port ethdev_port_id 1 / end\",\n+        \"flow create 0 ingress pattern eth dst is 00:11:22:33:66:55 / ipv4 / tcp / end actions represented_port ethdev_port_id 1 / end\",\n         \"flow create 0 ingress pattern eth dst spec 00:11:22:33:44:55 dst mask ff:ff:ff:ff:ff:00 / ipv4 / tcp / end actions drop / end\",\n     ],\n     \"scapy_str\": MAC_IPV4_TCP_DST_MAC,\n@@ -639,9 +639,9 @@ tv_mac_ipv4_tcp_src_dst_ip_src_dst_port = {\n tv_mac_ipv4_tcp_src_dst_mac_src_dst_ip_src_dst_port = {\n     \"name\": \"test_mac_ipv4_tcp_src_dst_mac_src_dst_ip_src_dst_port\",\n     \"rules\": [\n-        \"flow create 0 ingress pattern eth dst is 33:00:00:00:00:01 / ipv4 / end actions vf id 1 / end\",\n-        \"flow create 0 ingress pattern eth dst is 33:00:00:00:00:02 / ipv4 / end actions vf id 1 / end\",\n-        \"flow create 0 ingress pattern eth dst is 33:00:00:00:00:03 / ipv4 / end actions vf id 1 / end\",\n+        \"flow create 0 ingress pattern eth dst is 33:00:00:00:00:01 / ipv4 / end actions represented_port ethdev_port_id 1 / end\",\n+        \"flow create 0 ingress pattern eth dst is 33:00:00:00:00:02 / ipv4 / end actions represented_port ethdev_port_id 1 / end\",\n+        \"flow create 0 ingress pattern eth dst is 33:00:00:00:00:03 / ipv4 / end actions represented_port ethdev_port_id 1 / end\",\n         \"flow create 0 priority 0 ingress pattern eth src spec 00:11:22:33:44:55 src mask ff:ff:ff:ff:ff:00 dst spec 33:00:00:00:00:02 dst mask ff:ff:ff:ff:ff:fe / ipv4 src spec 192.168.0.1 src mask 255.255.255.0 dst spec 192.168.0.2 dst mask 255.255.0.255 / tcp src spec 8010 src mask 65520 dst spec 8017 dst mask 65520 / end actions drop / end\",\n     ],\n     \"scapy_str\": MAC_IPV4_TCP_SRC_DST_MAC_SRC_DST_IP_SRC_DST_PORT,\n@@ -658,9 +658,9 @@ tv_mac_ipv4_udp_src_mac = {\n tv_mac_ipv4_udp_dst_mac = {\n     \"name\": \"test_mac_ipv4_udp_dst_mac\",\n     \"rules\": [\n-        \"flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv4 / udp / end actions vf id 1 / end\",\n-        \"flow create 0 ingress pattern eth dst is 00:11:22:33:44:66 / ipv4 / udp / end actions vf id 1 / end\",\n-        \"flow create 0 ingress pattern eth dst is 00:11:22:33:66:55 / ipv4 / udp / end actions vf id 1 / end\",\n+        \"flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv4 / udp / end actions represented_port ethdev_port_id 1 / end\",\n+        \"flow create 0 ingress pattern eth dst is 00:11:22:33:44:66 / ipv4 / udp / end actions represented_port ethdev_port_id 1 / end\",\n+        \"flow create 0 ingress pattern eth dst is 00:11:22:33:66:55 / ipv4 / udp / end actions represented_port ethdev_port_id 1 / end\",\n         \"flow create 0 ingress pattern eth dst spec 00:11:22:33:44:55 dst mask ff:ff:ff:ff:ff:00 / ipv4 / udp / end actions drop / end\",\n     ],\n     \"scapy_str\": MAC_IPV4_UDP_DST_MAC,\n@@ -705,9 +705,9 @@ tv_mac_ipv4_udp_src_dst_ip_src_dst_port = {\n tv_mac_ipv4_udp_src_dst_mac_src_dst_ip_src_dst_port = {\n     \"name\": \"test_mac_ipv4_udp_src_dst_mac_src_dst_ip_src_dst_port\",\n     \"rules\": [\n-        \"flow create 0 ingress pattern eth dst is 33:00:00:00:00:01 / ipv4 / udp / end actions vf id 1 / end\",\n-        \"flow create 0 ingress pattern eth dst is 33:00:00:00:00:02 / ipv4 / udp / end actions vf id 1 / end\",\n-        \"flow create 0 ingress pattern eth dst is 33:00:00:00:00:03 / ipv4 / udp / end actions vf id 1 / end\",\n+        \"flow create 0 ingress pattern eth dst is 33:00:00:00:00:01 / ipv4 / udp / end actions represented_port ethdev_port_id 1 / end\",\n+        \"flow create 0 ingress pattern eth dst is 33:00:00:00:00:02 / ipv4 / udp / end actions represented_port ethdev_port_id 1 / end\",\n+        \"flow create 0 ingress pattern eth dst is 33:00:00:00:00:03 / ipv4 / udp / end actions represented_port ethdev_port_id 1 / end\",\n         \"flow create 0 priority 0 ingress pattern eth src spec 00:11:22:33:44:55 src mask ff:ff:ff:ff:ff:00 dst spec 33:00:00:00:00:03 dst mask ff:ff:ff:ff:ff:fe / ipv4 src spec 192.168.0.1 src mask 255.255.255.0 dst spec 192.168.0.2 dst mask 255.255.0.255 / udp src spec 8010 src mask 65520 dst spec 8017 dst mask 65520 / end actions drop / end\",\n     ],\n     \"scapy_str\": MAC_IPV4_UDP_SRC_DST_MAC_SRC_DST_IP_SRC_DST_PORT,\n@@ -930,28 +930,36 @@ class ICEDCFACLFilterTest(TestCase):\n         Run before each test case.\n         \"\"\"\n \n-    def create_testpmd_command(self, param):\n+    def create_testpmd_command(self,param=\"\",repre_vf=False):\n         \"\"\"\n         Create testpmd command\n         \"\"\"\n-        # Prepare testpmd EAL and parameters\n-        all_eal_param = self.dut.create_eal_parameters(\n+        if repre_vf:\n+            all_eal_param = self.dut.create_eal_parameters(\n             cores=\"1S/4C/1T\",\n             ports=[self.vf0_pci, self.vf1_pci],\n-            port_options={self.vf0_pci: \"cap=dcf\"},\n+            port_options={self.vf0_pci: \"cap=dcf,representor=vf[1]\"},\n         )\n+        else:\n+        # Prepare testpmd EAL and parametes\n+            all_eal_param = self.dut.create_eal_parameters(\n+                cores=\"1S/4C/1T\",\n+                ports=[self.vf0_pci, self.vf1_pci],\n+                port_options={self.vf0_pci: \"cap=dcf\"},\n+            )\n         command = self.path + all_eal_param + \"--log-level='ice,7'\" + \" -- -i\" + param\n         return command\n \n-    def launch_testpmd(self, param=\"\"):\n+    def launch_testpmd(self, param=\"\",repre_vf=False,):\n         \"\"\"\n         launch testpmd with the command\n         \"\"\"\n         time.sleep(5)\n-        command = self.create_testpmd_command(param)\n+        command = self.create_testpmd_command(param,repre_vf)\n+        port_id = 2 if repre_vf else 1\n         out = self.dut.send_expect(command, \"testpmd> \", 20)\n         self.testpmd_status = \"running\"\n-        self.dut.send_expect(\"set portlist 1\", \"testpmd> \", 15)\n+        self.dut.send_expect(\"set portlist {}\".format(port_id), \"testpmd> \", 15)\n         self.dut.send_expect(\"set fwd rxonly\", \"testpmd> \", 15)\n         self.dut.send_expect(\"set verbose 1\", \"testpmd> \", 15)\n         self.pmd_output.execute_cmd(\"start\")\n@@ -1115,15 +1123,17 @@ class ICEDCFACLFilterTest(TestCase):\n         else:\n             return destroy_list\n \n-    def common_process(self, vectors, launch_testpmd=True):\n+    def common_process(self, vectors,launch_testpmd=True,repre_vf=False):\n \n         if launch_testpmd:\n             # launch testpmd\n-            self.launch_testpmd()\n+            self.launch_testpmd(repre_vf=repre_vf)\n \n         test_results = {}\n         for test_vector in vectors:\n             try:\n+                if repre_vf:\n+                    test_vector[\"check_param\"][\"port_id\"] = 2\n                 self.dut.send_expect(\"flow flush 0\", \"testpmd> \", 120)\n \n                 # create a rule\n@@ -1169,19 +1179,19 @@ class ICEDCFACLFilterTest(TestCase):\n         if self.nic == \"ICE_25G-E810C_SFP\":\n             self.common_process(vectors_ipv4_pay_4ports)\n         else:\n-            self.common_process(vectors_ipv4_pay_2ports)\n+            self.common_process(vectors_ipv4_pay_2ports,repre_vf=True)\n \n     def test_mac_ipv4_tcp(self):\n         if self.nic == \"ICE_25G-E810C_SFP\":\n             self.common_process(vectors_ipv4_tcp_4ports)\n         else:\n-            self.common_process(vectors_ipv4_tcp_2ports)\n+            self.common_process(vectors_ipv4_tcp_2ports,repre_vf=True)\n \n     def test_mac_ipv4_udp(self):\n         if self.nic == \"ICE_25G-E810C_SFP\":\n             self.common_process(vectors_ipv4_udp_4ports)\n         else:\n-            self.common_process(vectors_ipv4_udp_2ports)\n+            self.common_process(vectors_ipv4_udp_2ports,repre_vf=True)\n \n     def test_mac_ipv4_sctp(self):\n         if self.nic == \"ICE_25G-E810C_SFP\":\n@@ -1289,7 +1299,7 @@ class ICEDCFACLFilterTest(TestCase):\n \n         # start testpmd with creating 512 ACL rules\n         param = \" --cmdline-file=%s\" % (self.dut_file_dir + src_file)\n-        out_testpmd = self.launch_testpmd(param)\n+        out_testpmd = self.launch_testpmd(param=param)\n         self.check_dcf_status(out_testpmd, stats=True)\n         rule_list = self.dut.send_expect(\"flow list 0\", \"testpmd> \", 15)\n         self.verify(\"159\" in rule_list, \"160 rules failed to be created\")\n@@ -1341,7 +1351,7 @@ class ICEDCFACLFilterTest(TestCase):\n \n         # start testpmd with creating 255 ACL rules\n         param = \" --cmdline-file=%s\" % (self.dut_file_dir + src_file)\n-        out_testpmd = self.launch_testpmd(param)\n+        out_testpmd = self.launch_testpmd(param=param)\n         self.check_dcf_status(out_testpmd, stats=True)\n         rule_list = self.dut.send_expect(\"flow list 0\", \"testpmd> \", 15)\n         self.verify(\"254\" in rule_list, \"255 rules failed to be created\")\n@@ -1636,23 +1646,23 @@ class ICEDCFACLFilterTest(TestCase):\n         create switch, acl and fdir rules simultaneously.\n         \"\"\"\n         param = \" --rxq=16 --txq=16\"\n-        out_testpmd = self.launch_testpmd(param)\n+        out_testpmd = self.launch_testpmd(repre_vf=True,param=param)\n         self.check_dcf_status(out_testpmd, stats=True)\n         rules = {\n             \"switch\": [\n-                \"flow create 0 ingress pattern eth / ipv4 src is 192.168.0.1 dst is 192.168.0.20 / tcp / end actions vf id 1 / end\",\n-                \"flow create 0 ingress pattern eth / ipv4 src is 192.168.0.2 dst is 192.168.0.20 / tcp / end actions vf id 1 / end\",\n-                \"flow create 0 ingress pattern eth / ipv4 src is 192.168.0.3 dst is 192.168.0.20 / tcp / end actions vf id 1 / end\",\n-                \"flow create 0 ingress pattern eth / ipv4 src is 192.168.0.4 dst is 192.168.0.20 / tcp / end actions vf id 1 / end\",\n+                \"flow create 0 ingress pattern eth / ipv4 src is 192.168.0.1 dst is 192.168.0.20 / tcp / end actions represented_port ethdev_port_id 1 / end\",\n+                \"flow create 0 ingress pattern eth / ipv4 src is 192.168.0.2 dst is 192.168.0.20 / tcp / end actions represented_port ethdev_port_id 1 / end\",\n+                \"flow create 0 ingress pattern eth / ipv4 src is 192.168.0.3 dst is 192.168.0.20 / tcp / end actions represented_port ethdev_port_id 1 / end\",\n+                \"flow create 0 ingress pattern eth / ipv4 src is 192.168.0.4 dst is 192.168.0.20 / tcp / end actions represented_port ethdev_port_id 1 / end\",\n             ],\n             \"acl\": [\n                 \"flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.2 src mask 255.255.255.254 / tcp / end actions drop / end\",\n                 \"flow create 0 ingress pattern eth / ipv4 dst spec 192.168.0.21 dst mask 255.255.0.255 / tcp / end actions drop / end\",\n             ],\n             \"fdir\": [\n-                \"flow create 1 ingress pattern eth / ipv4 src is 192.168.0.1 dst is 192.168.0.20 / tcp src is 22 dst is 23 / end actions queue index 3 / mark / end\",\n-                \"flow create 1 ingress pattern eth / ipv4 src is 192.168.0.2 dst is 192.168.0.20 / tcp src is 22 dst is 23 / end actions queue index 3 / mark / end\",\n-                \"flow create 1 ingress pattern eth / ipv4 src is 192.168.1.1 dst is 192.168.0.20 / tcp src is 22 dst is 23 / end actions queue index 3 / mark / end\",\n+                \"flow create 2 ingress pattern eth / ipv4 src is 192.168.0.1 dst is 192.168.0.20 / tcp src is 22 dst is 23 / end actions queue index 3 / mark / end\",\n+                \"flow create 2 ingress pattern eth / ipv4 src is 192.168.0.2 dst is 192.168.0.20 / tcp src is 22 dst is 23 / end actions queue index 3 / mark / end\",\n+                \"flow create 2 ingress pattern eth / ipv4 src is 192.168.1.1 dst is 192.168.0.20 / tcp src is 22 dst is 23 / end actions queue index 3 / mark / end\",\n             ],\n         }\n         switch_rule_list = self.create_other_filter_rule(\n@@ -1662,7 +1672,7 @@ class ICEDCFACLFilterTest(TestCase):\n         acl_rule_list = self.create_acl_filter_rule(rules[\"acl\"], check_stats=True)\n         self.check_filter_rule_list(0, switch_rule_list + acl_rule_list)\n         fdir_rule_list = self.create_other_filter_rule(rules[\"fdir\"], check_stats=True)\n-        self.check_filter_rule_list(1, fdir_rule_list)\n+        self.check_filter_rule_list(2, fdir_rule_list)\n \n         packets = {\n             \"drop\": [\n@@ -1687,7 +1697,7 @@ class ICEDCFACLFilterTest(TestCase):\n         rfc.check_drop(\n             out_drop,\n             pkt_num=len(packets[\"drop\"]),\n-            check_param={\"port_id\": 1, \"drop\": 1},\n+            check_param={\"port_id\": 2, \"drop\": 1},\n             stats=True,\n         )\n \n@@ -1695,19 +1705,19 @@ class ICEDCFACLFilterTest(TestCase):\n         rfc.check_iavf_fdir_mark(\n             out_mark,\n             pkt_num=len(packets[\"mark\"]),\n-            check_param={\"port_id\": 1, \"queue\": 3, \"mark_id\": 0},\n+            check_param={\"port_id\": 2, \"queue\": 3, \"mark_id\": 0},\n         )\n \n         out_rss = self.send_pkts_getouput(pkts=packets[\"rss\"])\n         rfc.check_iavf_fdir_mark(\n             out_rss,\n             pkt_num=len(packets[\"rss\"]),\n-            check_param={\"port_id\": 1, \"passthru\": 1},\n+            check_param={\"port_id\": 2, \"passthru\": 1},\n         )\n \n         out_noreceived = self.send_pkts_getouput(pkts=packets[\"noreceived\"])\n         rfc.check_iavf_fdir_mark(\n-            out_noreceived, pkt_num=0, check_param={\"port_id\": 1, \"passthru\": 1}\n+            out_noreceived, pkt_num=0, check_param={\"port_id\": 2, \"passthru\": 1}\n         )\n \n         self.dut.send_expect(\"flow destroy 0 rule 4\", \"testpmd> \", 15)\n@@ -1719,12 +1729,12 @@ class ICEDCFACLFilterTest(TestCase):\n \n         out_mark = self.send_pkts_getouput(pkts=packets[\"mark\"])\n         rfc.check_iavf_fdir_mark(\n-            out_mark, pkt_num=1, check_param={\"port_id\": 1, \"queue\": 3, \"mark_id\": 0}\n+            out_mark, pkt_num=1, check_param={\"port_id\": 2, \"queue\": 3, \"mark_id\": 0}\n         )\n \n         out_rss = self.send_pkts_getouput(pkts=packets[\"rss\"])\n         rfc.check_iavf_fdir_mark(\n-            out_rss, pkt_num=1, check_param={\"port_id\": 1, \"passthru\": 1}\n+            out_rss, pkt_num=1, check_param={\"port_id\": 2, \"passthru\": 1}\n         )\n \n     def check_dcf_status(self, out_testpmd, stats=True):\n",
    "prefixes": [
        "V1",
        "12/21"
    ]
}