get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/84989/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 84989,
    "url": "https://patches.dpdk.org/api/patches/84989/?format=api",
    "web_url": "https://patches.dpdk.org/project/dts/patch/20201211021142.13295-1-box.c.chen@intel.com/",
    "project": {
        "id": 3,
        "url": "https://patches.dpdk.org/api/projects/3/?format=api",
        "name": "DTS",
        "link_name": "dts",
        "list_id": "dts.dpdk.org",
        "list_email": "dts@dpdk.org",
        "web_url": "",
        "scm_url": "git://dpdk.org/tools/dts",
        "webscm_url": "http://git.dpdk.org/tools/dts/",
        "list_archive_url": "https://inbox.dpdk.org/dts",
        "list_archive_url_format": "https://inbox.dpdk.org/dts/{}",
        "commit_url_format": ""
    },
    "msgid": "<20201211021142.13295-1-box.c.chen@intel.com>",
    "list_archive_url": "https://inbox.dpdk.org/dts/20201211021142.13295-1-box.c.chen@intel.com",
    "date": "2020-12-11T02:11:42",
    "name": "[V1] test_plans/cvl_dcf_switch_filter: add dcf drop action test",
    "commit_ref": null,
    "pull_url": null,
    "state": "superseded",
    "archived": false,
    "hash": "db94db3d9c0ef27c58827c77d4642a0f724d089e",
    "submitter": {
        "id": 1819,
        "url": "https://patches.dpdk.org/api/people/1819/?format=api",
        "name": "Chen, BoX C",
        "email": "box.c.chen@intel.com"
    },
    "delegate": null,
    "mbox": "https://patches.dpdk.org/project/dts/patch/20201211021142.13295-1-box.c.chen@intel.com/mbox/",
    "series": [
        {
            "id": 14245,
            "url": "https://patches.dpdk.org/api/series/14245/?format=api",
            "web_url": "https://patches.dpdk.org/project/dts/list/?series=14245",
            "date": "2020-12-11T02:11:42",
            "name": "[V1] test_plans/cvl_dcf_switch_filter: add dcf drop action test",
            "version": 1,
            "mbox": "https://patches.dpdk.org/series/14245/mbox/"
        }
    ],
    "comments": "https://patches.dpdk.org/api/patches/84989/comments/",
    "check": "pending",
    "checks": "https://patches.dpdk.org/api/patches/84989/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dts-bounces@dpdk.org>",
        "X-Original-To": "patchwork@inbox.dpdk.org",
        "Delivered-To": "patchwork@inbox.dpdk.org",
        "Received": [
            "from dpdk.org (dpdk.org [92.243.14.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id 3CC30A04DB;\n\tFri, 11 Dec 2020 03:13:12 +0100 (CET)",
            "from [92.243.14.124] (localhost [127.0.0.1])\n\tby dpdk.org (Postfix) with ESMTP id 17B4EAC9E;\n\tFri, 11 Dec 2020 03:13:11 +0100 (CET)",
            "from mga09.intel.com (mga09.intel.com [134.134.136.24])\n by dpdk.org (Postfix) with ESMTP id D64AEAC9B\n for <dts@dpdk.org>; Fri, 11 Dec 2020 03:13:07 +0100 (CET)",
            "from fmsmga005.fm.intel.com ([10.253.24.32])\n by orsmga102.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 10 Dec 2020 18:13:05 -0800",
            "from unknown (HELO cb-dts.sh.intel.com) ([10.240.183.58])\n by fmsmga005-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 10 Dec 2020 18:13:04 -0800"
        ],
        "IronPort-SDR": [
            "\n M+yqOIr4ddEskegtFOBwzaPzMv7BLPjE6739M0QO7HvjXrdfUVIjaTghax974Y2on7kXCyVu6M\n LZLurXjx6y2g==",
            "\n GTtaAvlV14c0P7LWyXnWV4ujY3c4hbFmZqqRYFXOf3jaWAZOz46h8xtiBK2Mwo3YNzA87Ul4nk\n 8XngzdcXzT3A=="
        ],
        "X-IronPort-AV": [
            "E=McAfee;i=\"6000,8403,9831\"; a=\"174510329\"",
            "E=Sophos;i=\"5.78,409,1599548400\"; d=\"scan'208\";a=\"174510329\"",
            "E=Sophos;i=\"5.78,409,1599548400\"; d=\"scan'208\";a=\"544294278\""
        ],
        "From": "ChenBo <box.c.chen@intel.com>",
        "To": "dts@dpdk.org",
        "Cc": "ChenBo <box.c.chen@intel.com>",
        "Date": "Fri, 11 Dec 2020 10:11:42 +0800",
        "Message-Id": "<20201211021142.13295-1-box.c.chen@intel.com>",
        "X-Mailer": "git-send-email 2.17.1",
        "Subject": "[dts] [PATCH V1] test_plans/cvl_dcf_switch_filter: add dcf drop\n\taction test",
        "X-BeenThere": "dts@dpdk.org",
        "X-Mailman-Version": "2.1.15",
        "Precedence": "list",
        "List-Id": "test suite reviews and discussions <dts.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dts>,\n <mailto:dts-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dts/>",
        "List-Post": "<mailto:dts@dpdk.org>",
        "List-Help": "<mailto:dts-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dts>,\n <mailto:dts-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dts-bounces@dpdk.org",
        "Sender": "\"dts\" <dts-bounces@dpdk.org>"
    },
    "content": "Add drop action test according to customer requirements.\n\nSigned-off-by: ChenBo <box.c.chen@intel.com>\n---\n .../cvl_dcf_switch_filter_test_plan.rst       | 436 +++++++++++++++++-\n 1 file changed, 431 insertions(+), 5 deletions(-)",
    "diff": "diff --git a/test_plans/cvl_dcf_switch_filter_test_plan.rst b/test_plans/cvl_dcf_switch_filter_test_plan.rst\nindex 55ea726..8e38b1d 100644\n--- a/test_plans/cvl_dcf_switch_filter_test_plan.rst\n+++ b/test_plans/cvl_dcf_switch_filter_test_plan.rst\n@@ -3965,12 +3965,12 @@ received and forwarded when there is one vf for forwarding, and no packets are d\n      ---------------------- Forward statistics for port 1  ----------------------\n      RX-packets: 1              RX-dropped: 0             RX-total: 1\n      TX-packets: 1              TX-dropped: 0             TX-total: 1\n-    ----------------------------------------------------------------------------\n+     ----------------------------------------------------------------------------\n \n-    +++++++++++++++ Accumulated forward statistics for all ports+++++++++++++++\n-    RX-packets: 1              RX-dropped: 0             RX-total: 1\n-    TX-packets: 1              TX-dropped: 0             TX-total: 1\n-    ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++\n+     +++++++++++++++ Accumulated forward statistics for all ports+++++++++++++++\n+     RX-packets: 1              RX-dropped: 0             RX-total: 1\n+     TX-packets: 1              TX-dropped: 0             TX-total: 1\n+     ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++\n \n    check the RX-packets and TX-packets of port 1 are both 1, and the TX-dropped in\n    \"Accumulated forward statistics for all ports\" is 0.\n@@ -4556,3 +4556,429 @@ Subcase 1: DCF stop/DCF start\n    check the rule is still there.\n \n 5. send matched packets, port 1 can still receive the packets.\n+\n+Test case: Drop action test\n+======================\n+\n+Subcase 1: DCF DROP IPV4 SRC PACKAGES\n+-----------------------------\n+\n+1. validate a rule::\n+\n+     testpmd> flow validate 0 priority 0 ingress pattern eth / ipv4 src is 192.168.0.1 / end actions drop / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create MAC_IPV4_SRC_ADDR rule::\n+\n+     testpmd> flow create 0 priority 0 ingress pattern eth / ipv4 src is 192.168.0.1 / end actions drop / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets::\n+\n+     sendp([Ether()/IP(src=\"192.168.0.1\")/Raw(\"x\"*80)],iface=\"enp27s0f0\")\n+\n+   check port can't receive the packet.\n+\n+4. send mismatched packets::\n+\n+     sendp([Ether()/IP(src=\"192.168.0.2\")/Raw(\"x\"*80)],iface=\"enp27s0f0\")\n+\n+   check port can receive the packet.\n+\n+5. verify rules can be destroyed::\n+\n+     testpmd> flow flush 0\n+     testpmd> flow list 0\n+\n+   check the rules not exist in the list.\n+   send matched packets, check port can receive the packet.\n+\n+Subcase 2: DCF DROP IPV4 SRC SPEC MASK PACKAGES\n+-----------------------------\n+\n+1. validate a rule::\n+\n+     testpmd> flow validate 0 ingress pattern eth / ipv4 dst spec 224.0.0.0 dst mask 240.0.0.0 / end actions drop / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create MAC_IPV4_SRC_SPEC_PAY rule::\n+\n+     testpmd> flow create 0 ingress pattern eth / ipv4 dst spec 224.0.0.0 dst mask 240.0.0.0 / end actions drop / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets::\n+\n+     sendp([Ether(dst=\"00:11:22:33:44:55\")/IP(dst=\"239.0.0.0\")/TCP()/Raw(\"x\"*80)],iface=\"enp27s0f0\")\n+\n+   check port can't receive the packet.\n+\n+4. send mismatched packets::\n+\n+     sendp([Ether(dst=\"00:11:22:33:44:55\")/IP(dst=\"128.0.0.0\")/TCP()/Raw(\"x\"*80)],iface=\"enp27s0f0\")\n+\n+   check port can receive the packet.\n+\n+5. verify rules can be destroyed::\n+\n+     testpmd> flow flush 0\n+     testpmd> flow list 0\n+\n+   check the rules not exist in the list.\n+   send matched packets, check port can receive the packet.\n+   \n+Subcase 3: DCF DROP NVGRE PACKAGES\n+-----------------------------\n+\n+1. validate a rule::\n+\n+     testpmd> flow validate 0 ingress pattern eth / ipv4 dst is 192.168.0.1 / nvgre tni is 2 / eth / ipv4 src is 192.168.1.2 dst is 192.168.1.3 / end actions drop / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create MAC_IPV4_NVGRE_PAY rule::\n+\n+     testpmd> flow create 0 ingress pattern eth / ipv4 dst is 192.168.0.1 / nvgre tni is 2 / eth / ipv4 src is 192.168.1.2 dst is 192.168.1.3 / end actions drop / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets::\n+\n+     sendp([Ether()/IP(dst=\"192.168.0.1\")/NVGRE(TNI=2)/Ether()/IP(src=\"192.168.1.2\", dst=\"192.168.1.3\")/Raw(\"x\"*80)],iface=\"enp27s0f0\")\n+\n+   check port can't receive the packet.\n+\n+4. send mismatched packets::\n+\n+     sendp([Ether()/IP(dst=\"192.168.0.1\")/NVGRE(TNI=1)/Ether()/IP(src=\"192.168.1.2\", dst=\"192.168.1.3\")/Raw(\"x\"*80)],iface=\"enp27s0f0\")\n+\n+   check port can receive the packet.\n+\n+5. verify rules can be destroyed::\n+\n+     testpmd> flow flush 0\n+     testpmd> flow list 0\n+\n+   check the rules not exist in the list.\n+   send matched packets, check port can receive the packet.\n+\n+Subcase 4: DCF DROP PPOES PACKAGES\n+-----------------------------\n+\n+1. validate a rule::\n+\n+     testpmd> flow validate 0 ingress pattern eth dst is 00:11:22:33:44:55 / vlan tci is 1 / pppoes seid is 3 / pppoe_proto_id is 0x0021 / end actions drop / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create MAC_IPV4_PPOES_PAY rule::\n+\n+     testpmd> flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / vlan tci is 1 / pppoes seid is 3 / pppoe_proto_id is 0x0021 / end actions drop / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets::\n+\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(b'\\\\x00\\\\x21')/IP()/Raw(\"x\" * 80)],iface=\"enp27s0f0\")\n+\n+   check port can't receive the packet.\n+\n+4. send mismatched packets::\n+\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=2)/PPP(b'\\\\x00\\\\x21')/IP()/Raw(\"x\" * 80)],iface=\"enp27s0f0\")\n+\n+   check port can receive the packet.\n+\n+5. verify rules can be destroyed::\n+\n+     testpmd> flow flush 0\n+     testpmd> flow list 0\n+\n+   check the rules not exist in the list.\n+   send matched packets, check port can receive the packet.\n+   \n+Subcase 5:  DCF DROP PFCP PACKAGES\n+-----------------------------\n+\n+1. validate a rule::\n+\n+     testpmd> flow validate 0 ingress pattern eth / ipv4 / udp / pfcp s_field is 0 / end actions drop / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create MAC_IPV4_PFCP rule::\n+\n+     testpmd> flow create 0 ingress pattern eth / ipv4 / udp / pfcp s_field is 0 / end actions drop / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets::\n+\n+     sendp(Ether(dst=\"00:11:22:33:44:11\")/IP()/UDP(dport=8805)/PFCP(S=0),iface=\"enp27s0f0\")\n+\n+   check port can't receive the packet.\n+\n+4. send mismatched packets::\n+\n+     sendp(Ether(dst=\"00:11:22:33:44:11\")/IP()/UDP(dport=8805)/PFCP(S=1),iface=\"enp27s0f0\")\n+\n+   check port can receive the packet.\n+\n+5. verify rules can be destroyed::\n+\n+     testpmd> flow flush 0\n+     testpmd> flow list 0\n+\n+   check the rules not exist in the list.\n+   send matched packets, check port can receive the packet.\n+\n+Subcase 6:  DCF DROP VLAN PACKAGES\n+-----------------------------\n+\n+1. validate a rule::\n+\n+     testpmd> flow validate 0 ingress pattern eth dst is 00:11:22:33:44:55 / vlan tci is 1 / end actions drop / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create MAC_VLAN rule::\n+\n+     testpmd> flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / vlan tci is 1 / end actions drop / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets::\n+\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1)/IP(src=\"192.168.0.1\",dst=\"192.168.0.2\",tos=4,ttl=2)/TCP()/Raw(\"X\"*80)],iface=\"enp27s0f0\")\n+\n+   check port can't receive the packet.\n+\n+4. send mismatched packets::\n+\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=2)/IP(src=\"192.168.0.1\",dst=\"192.168.0.2\",tos=4,ttl=2)/TCP()/Raw(\"X\"*80)],iface=\"enp27s0f0\")\n+\n+   check port can receive the packet.\n+\n+5. verify rules can be destroyed::\n+\n+     testpmd> flow flush 0\n+     testpmd> flow list 0\n+\n+   check the rules not exist in the list.\n+   send matched packets, check port can receive the packet.\n+\n+Subcase 7:  DCF DROP L2TP PACKAGES\n+-----------------------------\n+\n+1. validate a rule::\n+\n+     testpmd> flow validate 0 priority 0 ingress pattern eth / ipv4 src is 192.168.0.2 / l2tpv3oip session_id is 1 / end actions drop / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create MAC_IPV4_L2TP_PAY rule::\n+\n+     testpmd> flow create 0 priority 0 ingress pattern eth / ipv4 src is 192.168.0.2 / l2tpv3oip session_id is 1 / end actions drop / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets::\n+\n+     sendp([Ether(dst='00:11:22:33:44:12')/IP(src='192.168.0.2', proto=115)/L2TP(b'\\\\x00\\\\x00\\\\x00\\\\x01')/('X'*480)], iface=\"enp27s0f0\", count=1)\n+\n+   check port can't receive the packet.\n+\n+4. send mismatched packets::\n+\n+     sendp([Ether(dst='00:11:22:33:44:12')/IP(src='192.168.0.2', proto=115)/L2TP(b'\\\\x00\\\\x00\\\\x00\\\\x02')/('X'*480)], iface=\"enp27s0f0\", count=1)\n+\n+   check port can receive the packet.\n+\n+5. verify rules can be destroyed::\n+\n+     testpmd> flow flush 0\n+     testpmd> flow list 0\n+\n+   check the rules not exist in the list.\n+   send matched packets, check port can receive the packet.\n+\n+Subcase 8:  DCF DROP ESP PACKAGES\n+-----------------------------\n+\n+1. validate a rule::\n+\n+     testpmd> flow validate 0 priority 0 ingress pattern eth / ipv4 src is 192.168.0.2 / esp spi is 1 / end actions drop / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create MAC_IPV4_ESP_PAY rule::\n+\n+     testpmd> flow create 0 priority 0 ingress pattern eth / ipv4 src is 192.168.0.2 / esp spi is 1 / end actions drop / end\n+     testpmd> flow list 0\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets::\n+\n+     sendp([Ether(dst=\"00:11:22:33:44:13\")/IP(src=\"192.168.0.2\", proto=50)/ESP(spi=1)/(\"X\"*80)], iface=\"enp27s0f0\")\n+\n+   check port can't receive the packet.\n+\n+4. send mismatched packets::\n+\n+     sendp([Ether(dst=\"00:11:22:33:44:13\")/IP(src=\"192.168.0.2\", proto=50)/ESP(spi=2)/(\"X\"*80)], iface=\"enp27s0f0\")\n+\n+   check port can receive the packet.\n+\n+5. verify rules can be destroyed::\n+\n+     testpmd> flow flush 0\n+     testpmd> flow list 0\n+\n+   check the rules not exist in the list.\n+   send matched packets, check port can receive the packet.\n+\n+Subcase 8:  DCF DROP blend PACKAGES\n+-----------------------------\n+\n+1. validate a rule::\n+\n+     testpmd> flow validate 0 priority 0 ingress pattern eth / ipv4 src is 192.168.0.1 / end actions drop / end\n+     testpmd> flow validate 0 ingress pattern eth / ipv4 dst spec 224.0.0.0 dst mask 240.0.0.0 / end actions drop / end\n+     testpmd> flow validate 0 ingress pattern eth / ipv4 dst is 192.168.0.1 / nvgre tni is 2 / eth / ipv4 src is 192.168.1.2 dst is 192.168.1.3 / end actions drop / end\n+     testpmd> flow validate 0 ingress pattern eth dst is 00:11:22:33:44:55 / vlan tci is 1 / pppoes seid is 3 / pppoe_proto_id is 0x0021 / end actions drop / end\n+     testpmd> flow validate 0 ingress pattern eth / ipv4 / udp / pfcp s_field is 0 / end actions drop / end\n+     testpmd> flow validate 0 ingress pattern eth dst is 00:11:22:33:44:55 / vlan tci is 1 / end actions drop / end\n+     testpmd> flow validate 0 priority 0 ingress pattern eth / ipv4 src is 192.168.0.4 / l2tpv3oip session_id is 1 / end actions drop / end\n+     testpmd> flow validate 0 priority 0 ingress pattern eth / ipv4 src is 192.168.0.5 / esp spi is 1 / end actions drop / end\n+\n+   get the message::\n+\n+     Flow rule validated\n+\n+   check the flow list::\n+\n+     testpmd> flow list 0\n+\n+   check the rule not exists in the list.\n+\n+2. create rule::\n+\n+     testpmd> flow create 0 priority 0 ingress pattern eth / ipv4 src is 192.168.0.1 / end actions drop / end\n+     testpmd> flow create 0 ingress pattern eth / ipv4 dst spec 224.0.0.0 dst mask 240.0.0.0 / end actions drop / end\n+     testpmd> flow create 0 ingress pattern eth / ipv4 dst is 192.168.0.1 / nvgre tni is 2 / eth / ipv4 src is 192.168.1.2 dst is 192.168.1.3 / end actions drop / end\n+     testpmd> flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / vlan tci is 1 / pppoes seid is 3 / pppoe_proto_id is 0x0021 / end actions drop / end\n+     testpmd> flow create 0 ingress pattern eth / ipv4 / udp / pfcp s_field is 0 / end actions drop / end\n+     testpmd> flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / vlan tci is 1 / end actions drop / end\n+     testpmd> flow create 0 priority 0 ingress pattern eth / ipv4 src is 192.168.0.4 / l2tpv3oip session_id is 1 / end actions drop / end\n+     testpmd> flow create 0 priority 0 ingress pattern eth / ipv4 src is 192.168.0.5 / esp spi is 1 / end actions drop / end\n+\n+   check the rule exists in the list.\n+\n+3. send matched packets::\n+\n+     sendp([Ether()/IP(src=\"192.168.0.1\")/Raw(\"x\"*80)],iface=\"enp27s0f0\")\n+     sendp([Ether(dst=\"00:11:22:33:44:55\")/IP(dst=\"239.0.0.0\")/TCP()/Raw(\"x\"*80)],iface=\"enp27s0f0\")\n+     sendp([Ether()/IP(dst=\"192.168.0.3\")/NVGRE(TNI=2)/Ether()/IP(src=\"192.168.1.2\", dst=\"192.168.1.3\")/Raw(\"x\"*80)],iface=\"enp27s0f0\")\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=3)/PPP(b'\\\\x00\\\\x21')/IP()/Raw(\"x\" * 80)],iface=\"enp27s0f0\")\n+     sendp(Ether(dst=\"00:11:22:33:44:11\")/IP()/UDP(dport=8805)/PFCP(S=0),iface=\"enp27s0f0\")\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1)/IP(src=\"192.168.0.1\",dst=\"192.168.0.2\",tos=4,ttl=2)/TCP()/Raw(\"X\"*80)],iface=\"enp27s0f0\")\n+     sendp([Ether(dst='00:11:22:33:44:12')/IP(src='192.168.0.4', proto=115)/L2TP(b'\\\\x00\\\\x00\\\\x00\\\\x01')/('X'*480)], iface=\"enp27s0f0\", count=1)\n+     sendp([Ether(dst=\"00:11:22:33:44:13\")/IP(src=\"192.168.0.5\", proto=50)/ESP(spi=1)/(\"X\"*80)], iface=\"enp27s0f0\")\n+\n+   check port can't receive the packet.\n+\n+4. send mismatched packets::\n+\n+     sendp([Ether()/IP(src=\"192.168.0.6\")/Raw(\"x\"*80)],iface=\"enp27s0f0\")\n+     sendp([Ether(dst=\"00:11:22:33:44:55\")/IP(dst=\"128.0.0.0\")/TCP()/Raw(\"x\"*80)],iface=\"enp27s0f0\")\n+     sendp([Ether()/IP(dst=\"192.168.0.8\")/NVGRE(TNI=1)/Ether()/IP(src=\"192.168.1.2\", dst=\"192.168.1.3\")/Raw(\"x\"*80)],iface=\"enp27s0f0\")\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=2)/PPP(b'\\\\x00\\\\x21')/IP()/Raw(\"x\" * 80)],iface=\"enp27s0f0\")\n+     sendp(Ether(dst=\"00:11:22:33:44:11\")/IP()/UDP(dport=8805)/PFCP(S=1),iface=\"enp27s0f0\")\n+     sendp([Ether(dst=\"00:11:22:33:44:55\",type=0x8100)/Dot1Q(vlan=2)/IP(src=\"192.168.0.9\",dst=\"192.168.0.2\",tos=4,ttl=2)/TCP()/Raw(\"X\"*80)],iface=\"enp27s0f0\")\n+     sendp([Ether(dst='00:11:22:33:44:12')/IP(src='192.168.0.10', proto=115)/L2TP(b'\\\\x00\\\\x00\\\\x00\\\\x02')/('X'*480)], iface=\"enp27s0f0\", count=1)\n+     sendp([Ether(dst=\"00:11:22:33:44:13\")/IP(src=\"192.168.0.11\", proto=50)/ESP(spi=2)/(\"X\"*80)], iface=\"enp27s0f0\")\n+\n+   check port can receive the packet.\n+\n+5. verify rules can be destroyed::\n+\n+     testpmd> flow flush 0\n+     testpmd> flow list 0\n+\n+   check the rules not exist in the list.\n+   send matched packets, check port can receive the packet.\n\\ No newline at end of file\n",
    "prefixes": [
        "V1"
    ]
}