get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/121397/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 121397,
    "url": "https://patches.dpdk.org/api/patches/121397/?format=api",
    "web_url": "https://patches.dpdk.org/project/dts/patch/20221227055632.13510-1-weiyuanx.li@intel.com/",
    "project": {
        "id": 3,
        "url": "https://patches.dpdk.org/api/projects/3/?format=api",
        "name": "DTS",
        "link_name": "dts",
        "list_id": "dts.dpdk.org",
        "list_email": "dts@dpdk.org",
        "web_url": "",
        "scm_url": "git://dpdk.org/tools/dts",
        "webscm_url": "http://git.dpdk.org/tools/dts/",
        "list_archive_url": "https://inbox.dpdk.org/dts",
        "list_archive_url_format": "https://inbox.dpdk.org/dts/{}",
        "commit_url_format": ""
    },
    "msgid": "<20221227055632.13510-1-weiyuanx.li@intel.com>",
    "list_archive_url": "https://inbox.dpdk.org/dts/20221227055632.13510-1-weiyuanx.li@intel.com",
    "date": "2022-12-27T05:56:31",
    "name": "[V1,1/2] test_plans/ice_advanced_rss_vlan_esp_ah_l2tp_pfcp: add PF new cases according to testplan",
    "commit_ref": null,
    "pull_url": null,
    "state": "superseded",
    "archived": false,
    "hash": "0530af708a3dda6fe944efb98192622b9ddceed2",
    "submitter": {
        "id": 2477,
        "url": "https://patches.dpdk.org/api/people/2477/?format=api",
        "name": "Weiyuan Li",
        "email": "weiyuanx.li@intel.com"
    },
    "delegate": null,
    "mbox": "https://patches.dpdk.org/project/dts/patch/20221227055632.13510-1-weiyuanx.li@intel.com/mbox/",
    "series": [
        {
            "id": 26287,
            "url": "https://patches.dpdk.org/api/series/26287/?format=api",
            "web_url": "https://patches.dpdk.org/project/dts/list/?series=26287",
            "date": "2022-12-27T05:56:31",
            "name": "[V1,1/2] test_plans/ice_advanced_rss_vlan_esp_ah_l2tp_pfcp: add PF new cases according to testplan",
            "version": 1,
            "mbox": "https://patches.dpdk.org/series/26287/mbox/"
        }
    ],
    "comments": "https://patches.dpdk.org/api/patches/121397/comments/",
    "check": "pending",
    "checks": "https://patches.dpdk.org/api/patches/121397/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dts-bounces@dpdk.org>",
        "X-Original-To": "patchwork@inbox.dpdk.org",
        "Delivered-To": "patchwork@inbox.dpdk.org",
        "Received": [
            "from mails.dpdk.org (mails.dpdk.org [217.70.189.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id D9AA4A04FD;\n\tTue, 27 Dec 2022 06:56:38 +0100 (CET)",
            "from mails.dpdk.org (localhost [127.0.0.1])\n\tby mails.dpdk.org (Postfix) with ESMTP id CF7DC410FC;\n\tTue, 27 Dec 2022 06:56:38 +0100 (CET)",
            "from mga18.intel.com (mga18.intel.com [134.134.136.126])\n by mails.dpdk.org (Postfix) with ESMTP id 2FA2A40E2D\n for <dts@dpdk.org>; Tue, 27 Dec 2022 06:56:37 +0100 (CET)",
            "from fmsmga002.fm.intel.com ([10.253.24.26])\n by orsmga106.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 26 Dec 2022 21:56:32 -0800",
            "from unknown (HELO localhost.localdomain) ([10.239.252.248])\n by fmsmga002-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 26 Dec 2022 21:56:30 -0800"
        ],
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/simple;\n d=intel.com; i=@intel.com; q=dns/txt; s=Intel;\n t=1672120597; x=1703656597;\n h=from:to:cc:subject:date:message-id:mime-version:\n content-transfer-encoding;\n bh=C+pkxTP3O/pn+dYb88F/OgC94MFAped3FTv5M7LkvRI=;\n b=DxAhxwxcCIiC5YlStu10hrqObDH+TQS5qr6lpB5NQgRmjQx5+Pm8mhtV\n WLqBKg0fH7Vgbqgp0sPW42taNgP84RWcinR5KXPfy0Za9hYKzVblF0axI\n ODBKXMVJ1xaX2ATXJyNHoA5/XSqvStPy7eO4LEI5n2r0RtnSm0f7YdHcl\n VVR95QED4PyUArWRARW40lkj0TeWoS126BU4NhPEDBpOong5LFfx9lDoL\n 0C+RmP05FEg6sK2mFCJiW11i+h3ODwUSQPU9zN40Uz/cksIcb7IWttDij\n fg0PiN1EX5UJKm6dW3QzmBTdPxRlXZIvR7jHKwV3gvMRvjvvAtvAX4qTm w==;",
        "X-IronPort-AV": [
            "E=McAfee;i=\"6500,9779,10572\"; a=\"304150956\"",
            "E=Sophos;i=\"5.96,277,1665471600\"; d=\"scan'208\";a=\"304150956\"",
            "E=McAfee;i=\"6500,9779,10572\"; a=\"760231696\"",
            "E=Sophos;i=\"5.96,277,1665471600\"; d=\"scan'208\";a=\"760231696\""
        ],
        "From": "Weiyuan Li <weiyuanx.li@intel.com>",
        "To": "dts@dpdk.org",
        "Cc": "Weiyuan Li <weiyuanx.li@intel.com>",
        "Subject": "[dts][PATCH V1 1/2]\n test_plans/ice_advanced_rss_vlan_esp_ah_l2tp_pfcp: add PF new cases according\n to testplan",
        "Date": "Tue, 27 Dec 2022 13:56:31 +0800",
        "Message-Id": "<20221227055632.13510-1-weiyuanx.li@intel.com>",
        "X-Mailer": "git-send-email 2.27.0",
        "MIME-Version": "1.0",
        "Content-Transfer-Encoding": "8bit",
        "X-BeenThere": "dts@dpdk.org",
        "X-Mailman-Version": "2.1.29",
        "Precedence": "list",
        "List-Id": "test suite reviews and discussions <dts.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dts>,\n <mailto:dts-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dts/>",
        "List-Post": "<mailto:dts@dpdk.org>",
        "List-Help": "<mailto:dts-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dts>,\n <mailto:dts-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dts-bounces@dpdk.org"
    },
    "content": "Add PF new cases according to testplan.\n\nSigned-off-by: Weiyuan Li <weiyuanx.li@intel.com>\n---\n ...ed_rss_vlan_esp_ah_l2tp_pfcp_test_plan.rst | 523 ++++++++++++++++++\n 1 file changed, 523 insertions(+)",
    "diff": "diff --git a/test_plans/ice_advanced_rss_vlan_esp_ah_l2tp_pfcp_test_plan.rst b/test_plans/ice_advanced_rss_vlan_esp_ah_l2tp_pfcp_test_plan.rst\nindex f365784e..12322737 100644\n--- a/test_plans/ice_advanced_rss_vlan_esp_ah_l2tp_pfcp_test_plan.rst\n+++ b/test_plans/ice_advanced_rss_vlan_esp_ah_l2tp_pfcp_test_plan.rst\n@@ -671,6 +671,8 @@ Test case: MAC_IPV6_AH\n \n Test case: MAC_VLAN_IPV4_PAY\n ============================\n+Subcase: MAC_VLAN_IPV4_PAY_VLAN\n+-------------------------------\n \n 1. validate a rule for RSS type of MAC_VLAN_IPV4_PAY::\n \n@@ -724,8 +726,65 @@ Test case: MAC_VLAN_IPV4_PAY\n    check the rule not exists.\n    send the matched packets, check the hash values of the packets are not exist.\n \n+Subcase: MAC_VLAN_IPV4_PAY_L3DST\n+--------------------------------\n+\n+1. validate a rule for RSS type of MAC_VLAN_IPV4_PAY::\n+\n+     testpmd> flow validate 0 ingress pattern eth / vlan / ipv4 / end actions rss types ipv4 l3-dst-only end key_len 0 queues end / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create a rule for RSS type of MAC_VLAN_IPV4_PAY::\n+\n+     testpmd> flow create 0 ingress pattern eth / vlan / ipv4 / end actions rss types ipv4 l3-dst-only end key_len 0 queues end / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets\n+\n+   * MAC_VLAN_IPV4_PAY packet::\n+\n+       sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+     change the field [l3 dst address], send packets::\n+\n+       sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src=\"192.168.1.1\", dst=\"192.168.1.3\")/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+     check the hash value is different from the first packet.\n+     change other fields, send packets::\n+\n+       sendp([Ether(src=\"10:22:33:44:55:99\", dst=\"00:11:22:33:44:53\",type=0x8100)/Dot1Q(vlan=2,type=0x0800)/IP(src=\"192.168.1.3\", dst=\"192.168.1.2\")/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+     check the hash values are the same as the first packet.\n+\n+4. send packets mismatched the pattern::\n+\n+     sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+  check the hash values not exist.\n+\n+5. destroy the rule::\n+\n+     testpmd> flow destroy 0 rule 0\n+     testpmd> flow list 0\n+\n+   check the rule not exists.\n+   send the matched packets, check the hash values of the packets are not exist.\n+\n Test case: MAC_VLAN_IPV4_UDP_PAY\n ================================\n+Subcase: MAC_VLAN_IPV4_UDP_VLAN\n+-------------------------------\n \n 1. validate a rule for RSS type of MAC_VLAN_IPV4_UDP_PAY::\n \n@@ -780,8 +839,122 @@ Test case: MAC_VLAN_IPV4_UDP_PAY\n    check the rule not exists.\n    send the matched packets, check the hash values of the packets are not exist.\n \n+Subcase: MAC_VLAN_IPV4_UDP_L3SRC\n+--------------------------------\n+\n+1. validate a rule for RSS type of MAC_VLAN_IPV4_UDP_PAY::\n+\n+     testpmd> flow validate 0 ingress pattern eth / vlan / ipv4 / udp / end actions rss types ipv4 l3-src-only end key_len 0 queues end / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create a rule for RSS type of MAC_VLAN_IPV4_UDP_PAY::\n+\n+     testpmd> flow create 0 ingress pattern eth / vlan / ipv4 / udp / end actions rss types ipv4 l3-src-only end key_len 0 queues end / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets\n+\n+   * MAC_VLAN_IPV4_UDP_PAY packet::\n+\n+       sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+     change the field [l3 src address], send packets::\n+\n+       sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src=\"192.168.1.3\", dst=\"192.168.1.2\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+     check the hash values are different from the first packet.\n+     change other fields, send packets::\n+\n+       sendp([Ether(src=\"10:22:33:44:55:99\", dst=\"00:11:22:33:44:53\",type=0x8100)/Dot1Q(vlan=2,type=0x0800)/IP(src=\"192.168.1.1\", dst=\"192.168.1.4\")/UDP(sport=19,dport=99)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+     check the hash values are the same as as the first packet.\n+\n+4. send packets mismatched the pattern::\n+\n+     sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+   check the hash values of the packets not exist.\n+\n+5. destroy the rule::\n+\n+     testpmd> flow destroy 0 rule 0\n+     testpmd> flow list 0\n+\n+   check the rule not exists.\n+   send the matched packets, check the hash values of the packets are not exist.\n+\n+Subcase: MAC_VLAN_IPV4_UDP_L4DST\n+--------------------------------\n+\n+1. validate a rule for RSS type of MAC_VLAN_IPV4_UDP_PAY::\n+\n+     testpmd> flow validate 0 ingress pattern eth / vlan / ipv4 / udp / end actions rss types ipv4-udp l4-dst-only end key_len 0 queues end / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create a rule for RSS type of MAC_VLAN_IPV4_UDP_PAY::\n+\n+     testpmd> flow create 0 ingress pattern eth / vlan / ipv4 / udp / end actions rss types ipv4-udp l4-dst-only end key_len 0 queues end / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets\n+\n+   * MAC_VLAN_IPV4_UDP_PAY packet::\n+\n+       sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+     change the field [l4 dst address], send packets::\n+\n+       sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/UDP(sport=25,dport=24)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+     check the hash values are different from the first packet.\n+     change other fields, send packets::\n+\n+       sendp([Ether(src=\"10:22:33:44:55:99\", dst=\"00:11:22:33:44:53\",type=0x8100)/Dot1Q(vlan=2,type=0x0800)/IP(src=\"192.168.1.3\", dst=\"192.168.1.4\")/UDP(sport=19,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+     check the hash values are the same as as the first packet.\n+\n+4. send packets mismatched the pattern::\n+\n+     sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+   check the hash values of the packets not exist.\n+\n+5. destroy the rule::\n+\n+     testpmd> flow destroy 0 rule 0\n+     testpmd> flow list 0\n+\n+   check the rule not exists.\n+   send the matched packets, check the hash values of the packets are not exist.\n+\n Test case: MAC_VLAN_IPV4_TCP_PAY\n ================================\n+Subcase: MAC_VLAN_IPV4_TCP_VLAN\n+-------------------------------\n \n 1. validate a rule for RSS type of MAC_VLAN_IPV4_TCP_PAY::\n \n@@ -836,8 +1009,67 @@ Test case: MAC_VLAN_IPV4_TCP_PAY\n    check the rule not exists.\n    send the matched packets, check the hash values of the packets are not exist.\n \n+Subcase: MAC_VLAN_IPV4_TCP_l3SRC_L4SRC\n+--------------------------------------\n+\n+1. validate a rule for RSS type of MAC_VLAN_IPV4_TCP_PAY::\n+\n+     testpmd> flow validate 0 ingress pattern eth / vlan / ipv4 / tcp / end actions rss types ipv4-tcp l3-src-only l4-src-only end key_len 0 queues end / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create a rule for RSS type of MAC_VLAN_IPV4_TCP_PAY::\n+\n+     testpmd> flow create 0 ingress pattern eth / vlan / ipv4 / tcp / end actions rss types ipv4-tcp l3-src-only l4-src-only end key_len 0 queues end / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets\n+\n+   * MAC_VLAN_IPV4_TCP_PAY packet::\n+\n+       sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+     change the field [l3 src address and l4 sport], send packets::\n+\n+       sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src=\"192.168.1.3\", dst=\"192.168.1.2\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+       sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/TCP(sport=22,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+     check the hash values are different from the first packet.\n+     change other fields, send packets::\n+\n+       sendp([Ether(src=\"10:22:33:44:55:99\", dst=\"00:11:22:33:44:53\",type=0x8100)/Dot1Q(vlan=2,type=0x0800)/IP(src=\"192.168.1.1\", dst=\"192.168.1.4\")/TCP(sport=25,dport=99)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+     check the hash values are the same as as the first packet.\n+\n+4. send packets mismatched the pattern::\n+\n+     sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+   check the hash values of the packets not exist.\n+\n+5. destroy the rule::\n+\n+     testpmd> flow destroy 0 rule 0\n+     testpmd> flow list 0\n+\n+   check the rule not exists.\n+   send the matched packets, check the hash values of the packets are not exist.\n+\n Test case: MAC_VLAN_IPV4_SCTP_PAY\n =================================\n+Subcase: MAC_VLAN_IPV4_SCTP_VLAN\n+--------------------------------\n \n 1. validate a rule for RSS type of MAC_VLAN_IPV4_SCTP_PAY::\n \n@@ -892,8 +1124,69 @@ Test case: MAC_VLAN_IPV4_SCTP_PAY\n    check the rule not exists.\n    send the matched packets, check the hash values of the packets are not exist.\n \n+Subcase: MAC_VLAN_IPV4_SCTP_ALL\n+-------------------------------\n+\n+1. validate a rule for RSS type of MAC_VLAN_IPV4_SCTP_PAY::\n+\n+     testpmd> flow validate 0 ingress pattern eth / vlan / ipv4 / sctp / end actions rss types ipv4-sctp end key_len 0 queues end / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create a rule for RSS type of MAC_VLAN_IPV4_SCTP_PAY::\n+\n+     testpmd> flow create 0 ingress pattern eth / vlan / ipv4 / sctp / end actions rss types ipv4-sctp end key_len 0 queues end / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets\n+\n+   * MAC_VLAN_IPV4_SCTP_PAY packet::\n+\n+       sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/SCTP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+     change the field [ipv4-sctp], send packets::\n+\n+       sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src=\"192.168.1.3\", dst=\"192.168.1.2\")/SCTP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+       sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src=\"192.168.1.1\", dst=\"192.168.1.4\")/SCTP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+       sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/SCTP(sport=19,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+       sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/SCTP(sport=25,dport=99)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+     check the hash values are different from the first packet.\n+     change other fields, send packets::\n+\n+       sendp([Ether(src=\"10:22:33:44:55:99\", dst=\"00:11:22:33:44:53\",type=0x8100)/Dot1Q(vlan=2,type=0x0800)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/SCTP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+     check the hash values are the same as as the first packet.\n+\n+4. send packets mismatched the pattern::\n+\n+     sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/SCTP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+   check the hash values of the packets not exist.\n+\n+5. destroy the rule::\n+\n+     testpmd> flow destroy 0 rule 0\n+     testpmd> flow list 0\n+\n+   check the rule not exists.\n+   send the matched packets, check the hash values of the packets are not exist.\n+\n Test case: MAC_VLAN_IPV6_PAY\n ============================\n+Subcase: MAC_VLAN_IPV6_PAY_vlan\n+-------------------------------\n \n 1. validate a rule for RSS type of MAC_VLAN_IPV6_PAY::\n \n@@ -947,8 +1240,65 @@ Test case: MAC_VLAN_IPV6_PAY\n    check the rule not exists.\n    send the matched packets, check the hash values of the packets are not exist.\n \n+Subcase: MAC_VLAN_IPV6_PAY_L3SRC\n+--------------------------------\n+\n+1. validate a rule for RSS type of MAC_VLAN_IPV6_PAY::\n+\n+     testpmd> flow validate 0 ingress pattern eth / vlan / ipv6 / end actions rss types ipv6 l3-src-only end key_len 0 queues end / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create a rule for RSS type of MAC_VLAN_IPV6_PAY::\n+\n+     testpmd> flow create 0 ingress pattern eth / vlan / ipv6 / end actions rss types ipv6 l3-src-only end key_len 0 queues end / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets\n+\n+   * MAC_VLAN_IPV6_PAY packet::\n+\n+       sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+     change the field [l3 src address], send packets::\n+\n+       sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1537\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+     check the hash values are different from the first packet.\n+     change other fields, send packets::\n+\n+       sendp([Ether(src=\"10:22:33:44:55:99\", dst=\"00:11:22:33:44:53\",type=0x8100)/Dot1Q(vlan=2,type=0x86dd)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2023\")/Raw(\"y\" * 80)],iface=\"ens786f0\",count=1)\n+\n+   check the hash values are the same as the first packet.\n+\n+4. send packets mismatched the pattern::\n+\n+     sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+  check the hash values not exist.\n+\n+5. destroy the rule::\n+\n+     testpmd> flow destroy 0 rule 0\n+     testpmd> flow list 0\n+\n+   check the rule not exists.\n+   send the matched packets, check the hash values of the packets are not exist.\n+\n Test case: MAC_VLAN_IPV6_UDP_PAY\n ================================\n+Subcase: MAC_VLAN_IPV6_UDP_VLAN\n+-------------------------------\n \n 1. validate a rule for RSS type of MAC_VLAN_IPV6_UDP_PAY::\n \n@@ -1003,8 +1353,66 @@ Test case: MAC_VLAN_IPV6_UDP_PAY\n    check the rule not exists.\n    send the matched packets, check the hash values of the packets are not exist.\n \n+Subcase: MAC_VLAN_IPV6_UDP_L4SRC\n+--------------------------------\n+\n+1. validate a rule for RSS type of MAC_VLAN_IPV6_UDP_PAY::\n+\n+     testpmd> flow validate 0 ingress pattern eth / vlan / ipv6 / udp / end actions rss types ipv6-udp l4-src-only end key_len 0 queues end / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create a rule for RSS type of MAC_VLAN_IPV6_UDP_PAY::\n+\n+     testpmd> flow create 0 ingress pattern eth / vlan / ipv6 / udp / end actions rss types ipv6-udp l4-src-only end key_len 0 queues end / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets\n+\n+   * MAC_VLAN_IPV6_UDP_PAY packet::\n+\n+       sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+     change the field [l4 src address], send packets::\n+\n+       sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/UDP(sport=19,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+     check the hash values are different from the first packet.\n+     change other fields, send packets::\n+\n+       sendp([Ether(src=\"10:22:33:44:55:99\", dst=\"00:11:22:33:44:53\",type=0x8100)/Dot1Q(vlan=2,type=0x86dd)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1537\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2023\")/UDP(sport=25,dport=99)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+     check the hash values are the same as the first packet.\n+\n+4. send packets mismatched the pattern::\n+\n+     sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+  check the hash values not exist.\n+\n+5. destroy the rule::\n+\n+     testpmd> flow destroy 0 rule 0\n+     testpmd> flow list 0\n+\n+   check the rule not exists.\n+   send the matched packets, check the hash values of the packets are not exist.\n+\n Test case: MAC_VLAN_IPV6_TCP_PAY\n ================================\n+Subcase: MAC_VLAN_IPV6_TCP_VLAN\n+-------------------------------\n \n 1. validate a rule for RSS type of MAC_VLAN_IPV6_TCP_PAY::\n \n@@ -1059,8 +1467,66 @@ Test case: MAC_VLAN_IPV6_TCP_PAY\n    check the rule not exists.\n    send the matched packets, check the hash values of the packets are not exist.\n \n+Subcase: MAC_VLAN_IPV6_TCP_L3DST\n+--------------------------------\n+\n+1. validate a rule for RSS type of MAC_VLAN_IPV6_TCP_PAY::\n+\n+     testpmd> flow validate 0 ingress pattern eth / vlan / ipv6 / tcp / end actions rss types ipv6-tcp l3-dst-only end key_len 0 queues end / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create a rule for RSS type of MAC_VLAN_IPV6_TCP_PAY::\n+\n+     testpmd> flow create 0 ingress pattern eth / vlan / ipv6 / tcp / end actions rss types ipv6-tcp l3-dst-only end key_len 0 queues end / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets\n+\n+   * MAC_VLAN_IPV6_TCP_PAY packet::\n+\n+       sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+     change the field [l3 dst address], send packets::\n+\n+       sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2023\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+     check the hash values are different from the first packet.\n+     change other fields, send packets::\n+\n+       sendp([Ether(src=\"10:22:33:44:55:99\", dst=\"00:11:22:33:44:53\",type=0x8100)/Dot1Q(vlan=2,type=0x86dd)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1537\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/TCP(sport=19,dport=99)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+     check the hash values are the same as the first packet.\n+\n+4. send packets mismatched the pattern::\n+\n+     sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/TCP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+  check the hash values not exist.\n+\n+5. destroy the rule::\n+\n+     testpmd> flow destroy 0 rule 0\n+     testpmd> flow list 0\n+\n+   check the rule not exists.\n+   send the matched packets, check the hash values of the packets are not exist.\n+\n Test case: MAC_VLAN_IPV6_SCTP_PAY\n =================================\n+Subcase: MAC_VLAN_IPV6_SCTP_VLAN\n+--------------------------------\n \n 1. validate a rule for RSS type of MAC_VLAN_IPV6_SCTP_PAY::\n \n@@ -1115,6 +1581,63 @@ Test case: MAC_VLAN_IPV6_SCTP_PAY\n    check the rule not exists.\n    send the matched packets, check the hash values the packets are not exist.\n \n+Subcase: MAC_VLAN_IPV6_SCTP_L3DST_L4DST\n+---------------------------------------\n+\n+1. validate a rule for RSS type of MAC_VLAN_IPV6_SCTP_PAY::\n+\n+     testpmd> flow validate 0 ingress pattern eth / vlan / ipv6 / sctp / end actions rss types ipv6-sctp l3-dst-only l4-dst-only end key_len 0 queues end / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create a rule for RSS type of MAC_VLAN_IPV6_SCTP_PAY::\n+\n+     testpmd> flow create 0 ingress pattern eth / vlan / ipv6 / sctp / end actions rss types ipv6-sctp l3-dst-only l4-dst-only end key_len 0 queues end / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets\n+\n+   * MAC_VLAN_IPV6_SCTP_PAY packet::\n+\n+       sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/SCTP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+     change the field [l3 dst address and l4 dport], send packets::\n+\n+       sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2023\")/SCTP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+       sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/SCTP(sport=25,dport=99)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+     check the hash values are different from the first packet.\n+     change other fields, send packets::\n+\n+       sendp([Ether(src=\"10:22:33:44:55:99\", dst=\"00:11:22:33:44:53\",type=0x8100)/Dot1Q(vlan=2,type=0x86dd)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1537\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/SCTP(sport=19,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+     check the hash values are the same as the first packet.\n+\n+4. send packets mismatched the pattern::\n+\n+     sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/SCTP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+     sendp([Ether(src=\"10:22:33:44:55:66\", dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src=\"CDCD:910A:2222:5498:8475:1111:3900:1536\", dst=\"CDCD:910A:2222:5498:8475:1111:3900:2022\")/UDP(sport=25,dport=23)/Raw(\"x\" * 80)],iface=\"ens786f0\",count=1)\n+\n+  check the hash values not exist.\n+\n+5. destroy the rule::\n+\n+     testpmd> flow destroy 0 rule 0\n+     testpmd> flow list 0\n+\n+   check the rule not exists.\n+   send the matched packets, check the hash values the packets are not exist.\n+\n Test case: negative cases\n =========================\n \n",
    "prefixes": [
        "V1",
        "1/2"
    ]
}