test suite reviews and discussions
 help / color / mirror / Atom feed
From: "Tu, Lijuan" <lijuan.tu@intel.com>
To: "Peng, Yuan" <yuan.peng@intel.com>, "dts@dpdk.org" <dts@dpdk.org>
Cc: "Peng, Yuan" <yuan.peng@intel.com>
Subject: Re: [dts] [PATCH v3]test_plans: add cvl_fdir_test_plan.rst
Date: Fri, 27 Dec 2019 06:13:22 +0000	[thread overview]
Message-ID: <8CE3E05A3F976642AAB0F4675D0AD20E0BB8ECE4@SHSMSX101.ccr.corp.intel.com> (raw)
In-Reply-To: <1577091817-3343-1-git-send-email-yuan.peng@intel.com>

Applied, thanks

> -----Original Message-----
> From: dts [mailto:dts-bounces@dpdk.org] On Behalf Of Peng Yuan
> Sent: Monday, December 23, 2019 5:04 PM
> To: dts@dpdk.org
> Cc: Peng, Yuan <yuan.peng@intel.com>
> Subject: [dts] [PATCH v3]test_plans: add cvl_fdir_test_plan.rst
> 
> Add cvl_fdir_test_plan.rst to test_plans
> 
> Signed-off-by: Peng Yuan <yuan.peng@intel.com>
> 
> diff --git a/test_plans/cvl_fdir_test_plan.rst
> b/test_plans/cvl_fdir_test_plan.rst
> new file mode 100644
> index 0000000..4a2ce00
> --- /dev/null
> +++ b/test_plans/cvl_fdir_test_plan.rst
> @@ -0,0 +1,2619 @@
> +.. Copyright (c) <2019>, Intel Corporation
> +   All rights reserved.
> +
> +   Redistribution and use in source and binary forms, with or without
> +   modification, are permitted provided that the following conditions
> +   are met:
> +
> +   - Redistributions of source code must retain the above copyright
> +     notice, this list of conditions and the following disclaimer.
> +
> +   - Redistributions in binary form must reproduce the above copyright
> +     notice, this list of conditions and the following disclaimer in
> +     the documentation and/or other materials provided with the
> +     distribution.
> +
> +   - Neither the name of Intel Corporation nor the names of its
> +     contributors may be used to endorse or promote products derived
> +     from this software without specific prior written permission.
> +
> +   THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
> CONTRIBUTORS
> +   "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> +   LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
> FITNESS
> +   FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
> +   COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
> INDIRECT,
> +   INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
> +   (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
> GOODS OR
> +   SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
> +   HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
> CONTRACT,
> +   STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
> +   ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
> ADVISED
> +   OF THE POSSIBILITY OF SUCH DAMAGE.
> +
> +================================
> +CVL:Classification:Flow Director
> +================================
> +
> +Enable fdir filter for IPv4/IPv6 + TCP/UDP/SCTP  (OS default package)
> +Enable fdir filter for UDP tunnel: Vxlan / NVGRE (OS default package)
> +Enable fdir filter for GTP (comm #1 package)
> +
> +Pattern and input set
> +---------------------
> +
> +    +------------------------------+----------------------------+---------------------------------
> ----------------------------------------------+
> +    |    Packet Type               |        Pattern             |            Input Set
> |
> +    +------------------------------+----------------------------+---------------------------------
> ----------------------------------------------+
> +    | IPv4/IPv6 + TCP/UDP/SCTP     |      MAC_IPV4_PAY          | [Dest MAC],
> [Source IP], [Dest IP], [IP protocol], [TTL], [DSCP]              |
> +    +------------------------------+----------------------------+---------------------------------
> ----------------------------------------------+
> +    |                              |      MAC_IPV4_UDP          | [Dest MAC],[Source IP],
> [Dest IP], [TTL], [DSCP], [Source Port], [Dest Port] |
> +    +------------------------------+----------------------------+---------------------------------
> ----------------------------------------------+
> +    |                              |      MAC_IPV4_TCP          | [Dest MAC],[Source IP],
> [Dest IP], [TTL], [DSCP], [Source Port], [Dest Port] |
> +    +------------------------------+----------------------------+---------------------------------
> ----------------------------------------------+
> +    |                              |      MAC_IPV4_SCTP         | [Dest MAC],[Source IP],
> [Dest IP], [TTL], [DSCP], [Source Port], [Dest Port] |
> +    +------------------------------+----------------------------+---------------------------------
> ----------------------------------------------+
> +    |                              |      MAC_IPV6_PAY          | [Dest MAC],[Source IP],
> [Dest IP], [IP protocol], [TTL], [TC]                |
> +    +------------------------------+----------------------------+---------------------------------
> ----------------------------------------------+
> +    |                              |      MAC_IPV6_UDP          | [Dest MAC],[Source IP],
> [Dest IP], [TTL], [TC], [Source Port], [Dest Port]   |
> +    +------------------------------+----------------------------+---------------------------------
> ----------------------------------------------+
> +    |                              |      MAC_IPV6_TCP          | [Dest MAC],[Source IP],
> [Dest IP], [TTL], [TC], [Source Port], [Dest Port]   |
> +    +------------------------------+----------------------------+---------------------------------
> ----------------------------------------------+
> +    |                              |      MAC_IPV6_SCTP         | [Dest MAC],[Source IP],
> [Dest IP], [TTL], [TC], [Source Port], [Dest Port]   |
> +    +------------------------------+----------------------------+---------------------------------
> ----------------------------------------------+
> +    | UDP tunnel: VXLAN inner only | MAC_IPV4_TUN_IPV4_PAY      | [Inner
> Source IP], [Inner Dest IP]                                            |
> +    +------------------------------+----------------------------+---------------------------------
> ----------------------------------------------+
> +    |                              | MAC_IPV4_TUN_IPV4_UDP      | [Inner Source IP],
> [Inner Dest IP], [Inner Source Port], [Inner Dest Port]    |
> +    +------------------------------+----------------------------+---------------------------------
> ----------------------------------------------+
> +    |                              | MAC_IPV4_TUN_IPV4_TCP      | [Inner Source IP],
> [Inner Dest IP], [Inner Source Port], [Inner Dest Port]    |
> +    +------------------------------+----------------------------+---------------------------------
> ----------------------------------------------+
> +    |                              | MAC_IPV4_TUN_IPV4_SCTP     | [Inner Source IP],
> [Inner Dest IP], [Inner Source Port], [Inner Dest Port]    |
> +    +------------------------------+----------------------------+---------------------------------
> ----------------------------------------------+
> +    |                              | MAC_IPV4_TUN_MAC_IPV4_PAY  | [Inner Source IP],
> [Inner Dest IP]                                            |
> +    +------------------------------+----------------------------+---------------------------------
> ----------------------------------------------+
> +    |                              | MAC_IPV4_TUN_MAC_IPV4_UDP  | [Inner Source IP],
> [Inner Dest IP], [Inner Source Port], [Inner Dest Port]    |
> +    +------------------------------+----------------------------+---------------------------------
> ----------------------------------------------+
> +    |                              | MAC_IPV4_TUN_MAC_IPV4_TCP  | [Inner Source IP],
> [Inner Dest IP], [Inner Source Port], [Inner Dest Port]    |
> +    +------------------------------+----------------------------+---------------------------------
> ----------------------------------------------+
> +    |                              | MAC_IPV4_TUN_MAC_IPV4_SCTP | [Inner Source IP],
> [Inner Dest IP], [Inner Source Port], [Inner Dest Port]    |
> +    +------------------------------+----------------------------+---------------------------------
> ----------------------------------------------+
> +    | GTP-U data packet types      |                            |
> |
> +    | IPv4 transport, IPv4 payload | MAC_IPV4_GTPU_IPV4_PAY     | [TEID],
> [QFI]                                                                 |
> +    +------------------------------+----------------------------+---------------------------------
> ----------------------------------------------+
> +    |                              | MAC_IPV4_GTPU_IPV4_UDP     | [TEID], [QFI]
> |
> +    +------------------------------+----------------------------+---------------------------------
> ----------------------------------------------+
> +    |                              | MAC_IPV4_GTPU_IPV4_TCP     | [TEID], [QFI]
> |
> +    +------------------------------+----------------------------+---------------------------------
> ----------------------------------------------+
> +    |                              | MAC_IPV4_GTPU_IPV4_SCTP    | [TEID], [QFI]
> |
> +    +------------------------------+----------------------------+---------------------------------
> ----------------------------------------------+
> +
> +Notes: 1. Enable fdir filter for UDP tunnel: Vxlan / NVGRE (OS default
> package) , share code not
> +          support outer header as inputset, so Out Dest IP and VNI/GRE_KEY
> may not able to be implemented.
> +       2. For VXLAN case MAC_IPV4_TUN_*** means
> MAC_IPV4_UDP_VXLAN_***
> +       3. For Dest MAC, there is package /sharecode limitation on multicast dst
> mac support for FDIR
> +
> +Action type
> +-----------
> +
> +    queue index
> +    drop
> +    rss queues
> +    count identifier 0x1234 shared on|off
> +    mark id
> +
> +
> +Prerequisites
> +=============
> +
> +1. Hardware:
> +   columbiaville_25g/columbiaville_100g
> +
> +2. Software:
> +   DPDK: http://dpdk.org/git/dpdk
> +   scapy: http://www.secdev.org/projects/scapy/
> +
> +3. Copy specific ice package to /lib/firmware/intel/ice/ddp/ice.pkg
> +   Then reboot server, and compile DPDK
> +
> +4. Bind the pf to dpdk driver::
> +
> +    ./usertools/dpdk-devbind.py -b igb_uio 86:00.0 86:00.1
> +
> +5. Launch the app ``testpmd`` with the following arguments::
> +
> +    ./testpmd -c 0xff -n 6 -w 86:00.0 -- -i --portmask=0xff --rxq=64 --txq=64 --
> port-topology=loop
> +    testpmd> set fwd rxonly
> +    testpmd> set verbose 1
> +
> +   If set UDP tunnel flow rule::
> +
> +    testpmd> port config 0 udp_tunnel_port add vxlan 4789
> +    testpmd> start
> +
> +   Notes: if need two ports environment, launch ``testpmd`` with the
> following arguments::
> +
> +    ./testpmd -c 0xff -n 6 -w 86:00.0 -w 86:00.1 -- -i --portmask=0xff --rxq=64 -
> -txq=64 --port-topology=loop
> +
> +   If create rules with mark actions, please add the following parameters in
> testpmd command line::
> +
> +    -w 86:00.0,flow-mark-support=1 -w 86:00.1,flow-mark-support=1
> +
> +
> +Default parameters
> +------------------
> +
> +   MAC::
> +
> +    [Dest MAC]: 00:11:22:33:44:55
> +
> +   IPv4::
> +
> +    [Source IP]: 192.168.0.20
> +    [Dest IP]: 192.168.0.21
> +    [IP protocol]: 255
> +    [TTL]: 2
> +    [DSCP]: 4
> +
> +   IPv6::
> +
> +    [Source IPv6]: 2001::2
> +    [Dest IPv6]: CDCD:910A:2222:5498:8475:1111:3900:2020
> +    [IP protocol]: 1
> +    [TTL]: 2
> +    [TC]: 1
> +
> +   UDP/TCP/SCTP::
> +
> +    [Source Port]: 22
> +    [Dest Port]: 23
> +
> +   VXLAN inner only::
> +
> +    [Inner Source IP]: 192.168.0.20
> +    [Inner Dest IP]: 192.168.0.21
> +    [Inner Source Port]: 22
> +    [Inner Dest Port]: 23
> +
> +   GTP-U data packet::
> +
> +    [TEID]: 0x12345678
> +    [QFI]: 0x34
> +
> +
> +Send packets
> +------------
> +
> +* MAC_IPV4_PAY
> +
> +   matched packets::
> +
> +    pkt1 =
> Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.20",dst="192.168.0.21",
> proto=255, ttl=2, tos=4) / Raw('x' * 80)
> +    pkt2 =
> Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.20",dst="192.168.0.21",
> frag=1, proto=255, ttl=2, tos=4)/Raw('x' * 80)
> +
> +   mismatched packets::
> +
> +
> sendp([Ether(dst="00:11:22:33:44:56")/IP(src="192.168.0.20",dst="192.168.0
> .21", proto=255, ttl=2, tos=4) / Raw('x' * 80)],iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.22",dst="192.168.0
> .21", proto=255, ttl=2, tos=4) / Raw('x' * 80)],iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.20",dst="192.168.1
> .21", proto=255, ttl=2, tos=4) / Raw('x' * 80)],iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.20",dst="192.168.0
> .21", proto=1, ttl=2, tos=4) / Raw('x' * 80)],iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.20",dst="192.168.0
> .21", proto=255, ttl=3, tos=4) / Raw('x' * 80)],iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.20",dst="192.168.0
> .21", proto=255, ttl=2, tos=9) / Raw('x' * 80)],iface="enp175s0f0")
> +
> +* MAC_IPV4_UDP
> +
> +   matched packets::
> +
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.20",dst="192.168.0
> .21", ttl=2, tos=4) /UDP(sport=22,dport=23)/Raw('x' *
> 80)],iface="enp175s0f0")
> +
> +   mismatched packets::
> +
> +
> sendp([Ether(dst="00:11:22:33:44:56")/IP(src="192.168.0.20",dst="192.168.0
> .21", ttl=2, tos=4) /UDP(sport=22,dport=23)/Raw('x' *
> 80)],iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.1.19",dst="192.168.0
> .21", ttl=2, tos=4) /UDP(sport=22,dport=23)/Raw('x' *
> 80)],iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.20",dst="192.168.0
> .22", ttl=2, tos=4) /UDP(sport=22,dport=23)/Raw('x' *
> 80)],iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.20",dst="192.168.0
> .21", ttl=2, tos=4) /UDP(sport=21,dport=23)/Raw('x' *
> 80)],iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.20",dst="192.168.0
> .21", ttl=2, tos=4) /UDP(sport=22,dport=24)/Raw('x' *
> 80)],iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.20",dst="192.168.0
> .21", ttl=64, tos=4) /UDP(sport=22,dport=23)/Raw('x' *
> 80)],iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.20",dst="192.168.0
> .21", ttl=2, tos=1) /UDP(sport=22,dport=23)/Raw('x' *
> 80)],iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.20",dst="192.168.0
> .21", ttl=2, tos=4) /TCP(sport=22,dport=23)/Raw('x' *
> 80)],iface="enp175s0f0")
> +
> +* MAC_IPV4_TCP
> +
> +   matched packets::
> +
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.20",dst="192.168.0
> .21", ttl=2, tos=4) /TCP(sport=22,dport=23)/Raw('x' *
> 80)],iface="enp175s0f0")
> +
> +   mismatched packets::
> +
> +
> sendp([Ether(dst="00:11:22:33:44:56")/IP(src="192.168.0.20",dst="192.168.0
> .21", ttl=2, tos=4) /TCP(sport=22,dport=23)/Raw('x' *
> 80)],iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.1.19",dst="192.168.0
> .21", ttl=2, tos=4) /TCP(sport=22,dport=23)/Raw('x' *
> 80)],iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.20",dst="192.168.0
> .22", ttl=2, tos=4) /TCP(sport=22,dport=23)/Raw('x' *
> 80)],iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.20",dst="192.168.0
> .21", ttl=2, tos=4) /TCP(sport=21,dport=23)/Raw('x' *
> 80)],iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.20",dst="192.168.0
> .21", ttl=2, tos=4) /TCP(sport=22,dport=24)/Raw('x' *
> 80)],iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.20",dst="192.168.0
> .21", ttl=64, tos=4) /TCP(sport=22,dport=23)/Raw('x' *
> 80)],iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.20",dst="192.168.0
> .21", ttl=2, tos=1) /TCP(sport=22,dport=23)/Raw('x' *
> 80)],iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.20",dst="192.168.0
> .21", ttl=2, tos=4) /UDP(sport=22,dport=23)/Raw('x' *
> 80)],iface="enp175s0f0")
> +
> +* MAC_IPV4_SCTP
> +
> +   matched packets::
> +
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.20",dst="192.168.0
> .21", ttl=2, tos=4) /SCTP(sport=22,dport=23)/Raw('x' *
> 80)],iface="enp175s0f0")
> +
> +   mismatched packets::
> +
> +
> sendp([Ether(dst="00:11:22:33:44:56")/IP(src="192.168.0.20",dst="192.168.0
> .21", ttl=2, tos=4) /SCTP(sport=22,dport=23)/Raw('x' *
> 80)],iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.1.19",dst="192.168.0
> .21", ttl=2, tos=4) /SCTP(sport=22,dport=23)/Raw('x' *
> 80)],iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.20",dst="192.168.0
> .22", ttl=2, tos=4) /SCTP(sport=22,dport=23)/Raw('x' *
> 80)],iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.20",dst="192.168.0
> .21", ttl=2, tos=4) /SCTP(sport=21,dport=23)/Raw('x' *
> 80)],iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.20",dst="192.168.0
> .21", ttl=2, tos=4) /SCTP(sport=22,dport=24)/Raw('x' *
> 80)],iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.20",dst="192.168.0
> .21", ttl=64, tos=4) /SCTP(sport=22,dport=23)/Raw('x' *
> 80)],iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.20",dst="192.168.0
> .21", ttl=2, tos=1) /SCTP(sport=22,dport=23)/Raw('x' *
> 80)],iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.20",dst="192.168.0
> .21", ttl=2, tos=4)/Raw('x' * 80)],iface="enp175s0f0")
> +
> +* MAC_IPV6_PAY
> +
> +   matched packets::
> +
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IPv6(dst="CDCD:910A:2222:5498:847
> 5:1111:3900:2020", src="2001::2", nh=1, tc=1, hlim=2)/("X"*480)],
> iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IPv6(dst="CDCD:910A:2222:5498:847
> 5:1111:3900:2020", src="2001::2", nh=1, tc=1,
> hlim=2)/IPv6ExtHdrFragment(1000)/("X"*480)], iface="enp175s0f0")
> +
> +   mismatched packets::
> +
> +
> sendp([Ether(dst="00:11:22:33:44:56")/IPv6(dst="CDCD:910A:2222:5498:847
> 5:1111:3900:2020", src="2001::2", nh=1, tc=1, hlim=2)/("X"*480)],
> iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IPv6(dst="CDCD:910A:2222:5498:847
> 5:1111:3900:2022", src="2001::2", nh=1, tc=1, hlim=2)/("X"*480)],
> iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IPv6(dst="CDCD:910A:2222:5498:847
> 5:1111:3900:2020", src="2001::1", nh=1, tc=1, hlim=2)/("X"*480)],
> iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IPv6(dst="CDCD:910A:2222:5498:847
> 5:1111:3900:2020", src="2001::2", nh=2, tc=1, hlim=2)/("X"*480)],
> iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IPv6(dst="CDCD:910A:2222:5498:847
> 5:1111:3900:2020", src="2001::2", nh=1, tc=2, hlim=2)/("X"*480)],
> iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IPv6(dst="CDCD:910A:2222:5498:847
> 5:1111:3900:2020", src="2001::2", nh=1, tc=1, hlim=5)/("X"*480)],
> iface="enp175s0f0")
> +
> +* MAC_IPV6_UDP
> +
> +   matched packets::
> +
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IPv6(dst="CDCD:910A:2222:5498:847
> 5:1111:3900:2020", src="2001::2",tc=1,
> hlim=2)/UDP(sport=22,dport=23)/("X"*480)], iface="enp175s0f0")
> +
> +   mismatched packets::
> +
> +
> sendp([Ether(dst="00:11:22:33:44:56")/IPv6(dst="CDCD:910A:2222:5498:847
> 5:1111:3900:2020", src="2001::2",tc=1,
> hlim=2)/UDP(sport=22,dport=23)/("X"*480)], iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IPv6(dst="CDCD:910A:2222:5498:847
> 5:1111:3900:2021", src="2001::2",tc=1,
> hlim=2)/UDP(sport=22,dport=23)/("X"*480)], iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IPv6(dst="CDCD:910A:2222:5498:847
> 5:1111:3900:2020", src="2002::2",tc=1,
> hlim=2)/UDP(sport=22,dport=23)/("X"*480)], iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IPv6(dst="CDCD:910A:2222:5498:847
> 5:1111:3900:2020", src="2001::2",tc=3,
> hlim=2)/UDP(sport=22,dport=23)/("X"*480)], iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IPv6(dst="CDCD:910A:2222:5498:847
> 5:1111:3900:2020", src="2001::2",tc=1,
> hlim=1)/UDP(sport=22,dport=23)/("X"*480)], iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IPv6(dst="CDCD:910A:2222:5498:847
> 5:1111:3900:2020", src="2001::2",tc=1,
> hlim=2)/UDP(sport=21,dport=23)/("X"*480)], iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IPv6(dst="CDCD:910A:2222:5498:847
> 5:1111:3900:2020", src="2001::2",tc=1,
> hlim=2)/UDP(sport=22,dport=24)/("X"*480)], iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IPv6(dst="CDCD:910A:2222:5498:847
> 5:1111:3900:2020", src="2001::2",tc=1,
> hlim=2)/TCP(sport=22,dport=23)/("X"*480)], iface="enp175s0f0")
> +
> +* MAC_IPV6_TCP
> +
> +   matched packets::
> +
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IPv6(dst="CDCD:910A:2222:5498:847
> 5:1111:3900:2020", src="2001::2",tc=1,
> hlim=2)/TCP(sport=22,dport=23)/("X"*480)], iface="enp175s0f0")
> +
> +   mismatched packets::
> +
> +
> sendp([Ether(dst="00:11:22:33:44:56")/IPv6(dst="CDCD:910A:2222:5498:847
> 5:1111:3900:2020", src="2001::2",tc=1,
> hlim=2)/TCP(sport=22,dport=23)/("X"*480)], iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IPv6(dst="CDCD:910A:2222:5498:847
> 5:1111:3900:2021", src="2001::2",tc=1,
> hlim=2)/TCP(sport=22,dport=23)/("X"*480)], iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IPv6(dst="CDCD:910A:2222:5498:847
> 5:1111:3900:2020", src="2002::2",tc=1,
> hlim=2)/TCP(sport=22,dport=23)/("X"*480)], iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IPv6(dst="CDCD:910A:2222:5498:847
> 5:1111:3900:2020", src="2001::2",tc=3,
> hlim=2)/TCP(sport=22,dport=23)/("X"*480)], iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IPv6(dst="CDCD:910A:2222:5498:847
> 5:1111:3900:2020", src="2001::2",tc=1,
> hlim=1)/TCP(sport=22,dport=23)/("X"*480)], iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IPv6(dst="CDCD:910A:2222:5498:847
> 5:1111:3900:2020", src="2001::2",tc=1,
> hlim=2)/TCP(sport=21,dport=23)/("X"*480)], iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IPv6(dst="CDCD:910A:2222:5498:847
> 5:1111:3900:2020", src="2001::2",tc=1,
> hlim=2)/TCP(sport=22,dport=24)/("X"*480)], iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IPv6(dst="CDCD:910A:2222:5498:847
> 5:1111:3900:2020", src="2001::2",tc=1,
> hlim=2)/SCTP(sport=22,dport=23)/("X"*480)], iface="enp175s0f0")
> +
> +* MAC_IPV6_SCTP
> +
> +   matched packets::
> +
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IPv6(dst="CDCD:910A:2222:5498:847
> 5:1111:3900:2020", src="2001::2",tc=1,
> hlim=2)/SCTP(sport=22,dport=23)/("X"*480)], iface="enp175s0f0")
> +
> +   mismatched packets::
> +
> +
> sendp([Ether(dst="00:11:22:33:44:56")/IPv6(dst="CDCD:910A:2222:5498:847
> 5:1111:3900:2020", src="2001::2",tc=1,
> hlim=2)/SCTP(sport=22,dport=23)/("X"*480)], iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IPv6(dst="CDCD:910A:2222:5498:847
> 5:1111:3900:2021", src="2001::2",tc=1,
> hlim=2)/SCTP(sport=22,dport=23)/("X"*480)], iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IPv6(dst="CDCD:910A:2222:5498:847
> 5:1111:3900:2020", src="2002::2",tc=1,
> hlim=2)/SCTP(sport=22,dport=23)/("X"*480)], iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IPv6(dst="CDCD:910A:2222:5498:847
> 5:1111:3900:2020", src="2001::2",tc=3,
> hlim=2)/SCTP(sport=22,dport=23)/("X"*480)], iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IPv6(dst="CDCD:910A:2222:5498:847
> 5:1111:3900:2020", src="2001::2",tc=1,
> hlim=1)/SCTP(sport=22,dport=23)/("X"*480)], iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IPv6(dst="CDCD:910A:2222:5498:847
> 5:1111:3900:2020", src="2001::2",tc=1,
> hlim=2)/SCTP(sport=21,dport=23)/("X"*480)], iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IPv6(dst="CDCD:910A:2222:5498:847
> 5:1111:3900:2020", src="2001::2",tc=1,
> hlim=2)/SCTP(sport=22,dport=24)/("X"*480)], iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IPv6(dst="CDCD:910A:2222:5498:847
> 5:1111:3900:2020", src="2001::2",tc=1,
> hlim=2)/UDP(sport=22,dport=23)/("X"*480)], iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IPv6(dst="CDCD:910A:2222:5498:847
> 5:1111:3900:2020", src="2001::2",tc=1, hlim=2)/("X"*480)],
> iface="enp175s0f0")
> +
> +* MAC_IPV4_TUN_IPV4_PAY/MAC_IPV4_TUN_MAC_IPV4_PAY
> +
> +   matched packets::
> +
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP()/UDP()/VXLAN()/Ether()/IP(src='1
> 92.168.0.20', dst='192.168.0.21')/("X"*480)], iface="enp175s0f0")
> +    sendp([Ether(dst="00:11:22:33:44:55")/IP()/UDP(sport=200,
> dport=4790)/VXLAN(flags=0xc)/IP(src='192.168.0.20', dst='192.168.0.21')],
> iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(dst='192.168.1.15')/UDP(sport=200,
> dport=4790)/VXLAN(flags=0xc)/Ether()/IP(src='192.168.0.20',
> dst='192.168.0.21')], iface="enp175s0f0")
> +    sendp([Ether(dst="00:11:22:33:44:55")/IP()/UDP(sport=200,
> dport=4790)/VXLAN(flags=0xc)/IP(src='192.168.0.20', dst='192.168.0.21',
> frag=1)], iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP()/UDP()/VXLAN(vni=2)/Ether(dst="
> 00:11:22:33:44:55")/IP(dst="192.168.0.21", src="192.168.0.20")/("X"*480)],
> iface="enp175s0f0")
> +
> +   mismatched packets::
> +
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(dst='192.168.1.15')/UDP(sport=200,
> dport=4790)/VXLAN(flags=0xc)/IP(src='192.168.0.20', dst='192.168.0.22')],
> iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(dst='192.168.1.15')/UDP(sport=200,
> dport=4790)/VXLAN(flags=0xc)/IP(src='192.168.0.30', dst='192.168.0.21')],
> iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP()/UDP()/VXLAN()/IP(dst="192.168.
> 0.21", src="192.168.0.20")/("X"*480)], iface="enp175s0f0")
> +
> +* MAC_IPV4_TUN_IPV4_UDP/MAC_IPV4_TUN_MAC_IPV4_UDP
> +
> +   matched packets::
> +
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP()/UDP()/VXLAN()/Ether()/IP(src='1
> 92.168.0.20', dst='192.168.0.21')/UDP(sport=22,dport=23)/("X"*480)],
> iface="enp175s0f0")
> +    sendp([Ether(dst="00:11:22:33:44:55")/IP()/UDP(sport=200,
> dport=4790)/VXLAN(flags=0xc)/IP(src='192.168.0.20',
> dst='192.168.0.21')/UDP(sport=22,dport=23)/("X"*480)], iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(dst='192.168.1.15')/UDP(sport=200,
> dport=4790)/VXLAN(flags=0xc)/Ether()/IP(src='192.168.0.20',
> dst='192.168.0.21')/UDP(sport=22,dport=23)/("X"*480)], iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP()/UDP()/VXLAN(vni=2)/Ether(dst="
> 00:11:22:33:44:55")/IP(dst="192.168.0.21",
> src="192.168.0.20")/UDP(sport=22,dport=23)/("X"*480)], iface="enp175s0f0")
> +
> +   mismatched packets::
> +
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(dst='192.168.1.15')/UDP(sport=200,
> dport=4790)/VXLAN(flags=0xc)/IP(src='192.168.0.20',
> dst='192.168.0.22')/UDP(sport=22,dport=23)/("X"*480)], iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP()/UDP()/VXLAN(vni=2)/Ether(dst="
> 00:11:22:33:44:55")/IP(src='192.168.0.21',
> dst='192.168.0.23')/UDP(sport=22,dport=23)/("X"*480)], iface="enp175s0f0")
> +    sendp([Ether(dst="00:11:22:33:44:55")/IP()/UDP(sport=200,
> dport=4790)/VXLAN(flags=0xc)/IP(src='192.168.0.20',
> dst='192.168.0.21')/UDP(sport=21,dport=23)/("X"*480)], iface="enp175s0f0")
> +    sendp([Ether(dst="00:11:22:33:44:55")/IP()/UDP(sport=200,
> dport=4790)/VXLAN(flags=0xc)/IP(src='192.168.0.20',
> dst='192.168.0.21')/UDP(sport=22,dport=24)/("X"*480)], iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(dst='192.168.1.15')/UDP(sport=200,
> dport=4790)/VXLAN(flags=0xc)/IP(src='192.168.0.20',
> dst='192.168.0.21')/TCP(sport=22, dport=23)], iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP()/UDP()/VXLAN()/IP(dst="192.168.
> 0.21", src="192.168.0.20")/UDP(sport=22,dport=23)/("X"*480)],
> iface="enp175s0f0")
> +
> +* MAC_IPV4_TUN_IPV4_TCP/MAC_IPV4_TUN_MAC_IPV4_TCP
> +
> +   matched packets::
> +
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP()/UDP()/VXLAN(vni=2)/Ether()/IP(s
> rc='192.168.0.20', dst='192.168.0.21')/TCP(sport=22,dport=23)/("X"*480)],
> iface="enp175s0f0")
> +    sendp([Ether(dst="00:11:22:33:44:55")/IP()/UDP(sport=200,
> dport=4790)/VXLAN(flags=0xc)/IP(src='192.168.0.20',
> dst='192.168.0.21')/TCP(sport=22,dport=23)/("X"*480)], iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(dst='192.168.1.15')/UDP(sport=200,
> dport=4790)/VXLAN(flags=0xc)/Ether()/IP(src='192.168.0.20',
> dst='192.168.0.21')/TCP(sport=22,dport=23)/("X"*480)], iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP()/UDP()/VXLAN(vni=2)/Ether(dst="
> 00:11:22:33:44:55")/IP(dst="192.168.0.21",
> src="192.168.0.20")/TCP(sport=22,dport=23)/("X"*480)], iface="enp175s0f0")
> +
> +   mismatched packets::
> +
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(dst='192.168.1.15')/UDP(sport=200,
> dport=4790)/VXLAN(flags=0xc)/IP(src='192.168.0.20',
> dst='192.168.0.22')/TCP(sport=22,dport=23)/("X"*480)], iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP()/UDP()/VXLAN(vni=2)/Ether(dst="
> 00:11:22:33:44:55")/IP(dst="192.168.0.21",
> src="192.168.0.23")/TCP(sport=22,dport=23)/("X"*480)], iface="enp175s0f0")
> +    sendp([Ether(dst="00:11:22:33:44:55")/IP()/UDP(sport=200,
> dport=4790)/VXLAN(flags=0xc)/IP(src='192.168.0.20',
> dst='192.168.0.21')/TCP(sport=21,dport=23)/("X"*480)], iface="enp175s0f0")
> +    sendp([Ether(dst="00:11:22:33:44:55")/IP()/UDP(sport=200,
> dport=4790)/VXLAN(flags=0xc)/IP(src='192.168.0.20',
> dst='192.168.0.21')/TCP(sport=22,dport=24)/("X"*480)], iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(dst='192.168.1.15')/UDP(sport=200,
> dport=4790)/VXLAN(flags=0xc)/IP(src='192.168.0.20',
> dst='192.168.0.21')/Raw('x' * 80)], iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP()/UDP()/VXLAN()/IP(dst="192.168.
> 0.21", src="192.168.0.20")/TCP(sport=22,dport=23)/("X"*480)],
> iface="enp175s0f0")
> +
> +* MAC_IPV4_TUN_IPV4_SCTP/MAC_IPV4_TUN_MAC_IPV4_SCTP
> +
> +   matched packets::
> +
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP()/UDP()/VXLAN(vni=2)/Ether()/IP(s
> rc='192.168.0.20', dst='192.168.0.21')/SCTP(sport=22,dport=23)/("X"*480)],
> iface="enp175s0f0")
> +    sendp([Ether(dst="00:11:22:33:44:55")/IP()/UDP(sport=200,
> dport=4790)/VXLAN(flags=0xc)/IP(src='192.168.0.20',
> dst='192.168.0.21')/SCTP(sport=22,dport=23)/("X"*480)], iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(dst='192.168.1.15')/UDP(sport=200,
> dport=4790)/VXLAN(flags=0xc)/Ether()/IP(src='192.168.0.20',
> dst='192.168.0.21')/SCTP(sport=22,dport=23)/("X"*480)], iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP()/UDP()/VXLAN(vni=2)/Ether(dst="
> 00:11:22:33:44:55")/IP(dst="192.168.0.21",
> src="192.168.0.20")/SCTP(sport=22,dport=23)/("X"*480)],
> iface="enp175s0f0")
> +
> +   mismatched packets::
> +
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(dst='192.168.1.15')/UDP(sport=200,
> dport=4790)/VXLAN(flags=0xc)/IP(src='192.168.0.20',
> dst='192.168.0.22')/SCTP(sport=22,dport=23)/("X"*480)], iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP()/UDP()/VXLAN(vni=2)/Ether(dst="
> 00:11:22:33:44:55")/IP(dst="192.168.0.21",
> src="192.168.0.23")/SCTP(sport=22,dport=23)/("X"*480)],
> iface="enp175s0f0")
> +    sendp([Ether(dst="00:11:22:33:44:55")/IP()/UDP(sport=200,
> dport=4790)/VXLAN(flags=0xc)/IP(src='192.168.0.20',
> dst='192.168.0.21')/SCTP(sport=21,dport=23)/("X"*480)], iface="enp175s0f0")
> +    sendp([Ether(dst="00:11:22:33:44:55")/IP()/UDP(sport=200,
> dport=4790)/VXLAN(flags=0xc)/IP(src='192.168.0.20',
> dst='192.168.0.21')/SCTP(sport=22,dport=24)/("X"*480)], iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(dst='192.168.1.15')/UDP(sport=200,
> dport=4790)/VXLAN(flags=0xc)/IP(src='192.168.0.20',
> dst='192.168.0.21')/UDP(sport=22, dport=23)/Raw('x' * 80)],
> iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP()/UDP()/VXLAN()/IP(dst="192.168.
> 0.21", src="192.168.0.20")/SCTP(sport=22,dport=23)/("X"*480)],
> iface="enp175s0f0")
> +
> +* MAC_IPV4_GTPU_IPV4_PAY
> +
> +   matched packets::
> +
> +    p_gtpu1 = Ether(src="a4:bf:01:51:27:ca",
> dst="00:00:00:00:01:03")/IP(src="192.168.0.20",
> dst="192.168.0.21")/UDP(dport=2152)/GTP_U_Header(gtp_type=255,
> teid=0x12345678)/GTP_PDUSession_ExtensionHeader(pdu_type=0,
> qos_flow=0x34)/IP()/Raw('x'*20)
> +    p_gtpu2 = Ether(src="a4:bf:01:51:27:ca",
> dst="00:00:00:00:01:03")/IP(src="192.168.0.20",
> dst="192.168.0.21")/UDP(dport=2152)/GTP_U_Header(gtp_type=255,
> teid=0x12345678)/GTP_PDUSession_ExtensionHeader(pdu_type=0,
> qos_flow=0x34)/IP(frag=1)/Raw('x'*20)
> +    p_gtpu3 = Ether(src="a4:bf:01:51:27:ca",
> dst="00:00:00:00:01:03")/IP(src="192.168.0.20",
> dst="192.168.0.21")/UDP(dport=2152)/GTP_U_Header(gtp_type=255,
> teid=0x12345678)/GTP_PDUSession_ExtensionHeader(pdu_type=0,
> qos_flow=0x34)/IP()/UDP()/Raw('x'*20)
> +    p_gtpu4 = Ether(src="a4:bf:01:51:27:ca",
> dst="00:00:00:00:01:03")/IP(src="192.168.0.20",
> dst="192.168.0.21")/UDP( dport=2152)/GTP_U_Header(gtp_type=255,
> teid=0x12345678)/GTP_PDUSession_ExtensionHeader(pdu_type=0,
> qos_flow=0x34)/IP()/TCP(sport=22, dport=23)/Raw('x'*20)
> +    p_gtpu5 = Ether(src="a4:bf:01:51:27:ca",
> dst="00:00:00:00:01:03")/IP(src="192.168.0.20",
> dst="192.168.0.21")/UDP(dport=2152)/GTP_U_Header(gtp_type=255,
> teid=0x12345678)/GTP_PDUSession_ExtensionHeader(pdu_type=0,
> qos_flow=0x34)/IP()/ICMP()/Raw('x'*20)
> +
> +   mismatched packets::
> +
> +    p_gtpu6 = Ether(src="a4:bf:01:51:27:ca",
> dst="00:00:00:00:01:03")/IP(src="192.168.0.20",
> dst="192.168.0.21")/UDP(dport=2152)/GTP_U_Header(gtp_type=255,
> teid=0x12345678)/GTP_PDUSession_ExtensionHeader(pdu_type=0,
> qos_flow=0x34)/IP()/SCTP()/Raw('x'*20)
> +    p_gtpu7 = Ether(src="a4:bf:01:51:27:ca",
> dst="00:00:00:00:01:03")/IP(src="192.168.0.20",
> dst="192.168.0.21")/UDP(dport=2152)/GTP_U_Header(gtp_type=255,
> teid=0x1234567)/GTP_PDUSession_ExtensionHeader(pdu_type=0,
> qos_flow=0x34)/IP()/Raw('x'*20)
> +    p_gtpu8 = Ether(src="a4:bf:01:51:27:ca",
> dst="00:00:00:00:01:03")/IP(src="192.168.0.20",
> dst="192.168.0.21")/UDP(dport=2152)/GTP_U_Header(gtp_type=255,
> teid=0x12345678)/GTP_PDUSession_ExtensionHeader(pdu_type=0,
> qos_flow=0x35)/IP()/Raw('x'*20)
> +
> +
> +Test case: MAC_IPV4_PAY queue index
> +===================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 proto is 255 ttl is 2 tos is 4 / end actions
> queue index 1 / end
> +
> +2. send matched packets, check the packets are distributed to queue 1.
> +   send mismatched packets, check the packets are not distributed to queue
> 1.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   verify matched packets are not distributed to queue 1.
> +   check there is no rule listed.
> +
> +Test case: MAC_IPV4_PAY selected inputset queue index
> +=====================================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth / ipv4 dst is 192.168.0.21 / end actions
> queue index 1 / end
> +
> +2. send matched packets::
> +
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.20",dst="192.168.0
> .21", proto=1) / Raw('x' * 80)],iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.20",dst="192.168.0
> .21", ttl=2, tos=4) /UDP(sport=22,dport=23)/Raw('x' *
> 80)],iface="enp175s0f0")
> +
> +   check the packets are distributed to queue 1.
> +   send mismatched packets::
> +
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.20",dst="192.168.0
> .22") / Raw('x' * 80)],iface="enp175s0f0")
> +
> +   check the packets are not distributed to queue 1.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   verify pkt1 is not distributed to queue 1.
> +   check there is no rule listed.
> +
> +Test case: MAC_IPV4_UDP queue index
> +===================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 ttl is 2 tos is 4 / udp src is 22 dst is 23 / end
> actions queue index 1 / end
> +
> +2. send matched packets, check the packets is distributed to queue 1.
> +   send mismatched packets, check the packets are not distributed to queue
> 1.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   verify matched packet is not distributed to queue 1.
> +   check there is no rule listed.
> +
> +Test case: MAC_IPV4_TCP queue index
> +===================================
> +
> +1. create filter rules::
> +
> +   flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 ttl is 2 tos is 4 / tcp src is 22 dst is 23 / end
> actions queue index 63 / end
> +
> +2. send matched packets, check the packets is distributed to queue 63.
> +   send mismatched packets, check the packets are not distributed to queue
> 63.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   verify matched packet is not distributed to queue 63.
> +   check there is no rule listed.
> +
> +Test case: MAC_IPV4_SCTP queue index
> +====================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 ttl is 2 tos is 4 / sctp src is 22 dst is 23 tag is 1
> / end actions queue index 2 / end
> +
> +2. send matched packets, check the packets is distributed to queue 2.
> +   send mismatched packets, check the packets are not distributed to queue
> 2.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   verify matched packet is not distributed to queue 2.
> +   check there is no rule listed
> +
> +Test case: MAC_IPV6_PAY queue index
> +===================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv6 dst is
> CDCD:910A:2222:5498:8475:1111:3900:2020 src is 2001::2 proto is 1 hop is 2
> tc is 1 / end actions queue index 1 / end
> +
> +2. send matched packets, check the packets is distributed to queue 1.
> +   send mismatched packets, check the packets are not distributed to queue
> 1.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   verify matched packet is not distributed to queue 1.
> +   check there is no rule listed.
> +
> +Test case: MAC_IPV6_PAY selected inputset queue index
> +=====================================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth / ipv6 dst is
> CDCD:910A:2222:5498:8475:1111:3900:2020 / end actions queue index 1 /
> end
> +
> +2. send matched packets::
> +
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IPv6(dst="CDCD:910A:2222:5498:847
> 5:1111:3900:2020", src="2001::2", nh=1, tc=1, hlim=2)/("X"*480)],
> iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IPv6(dst="CDCD:910A:2222:5498:847
> 5:1111:3900:2020")/IPv6ExtHdrFragment(1000)/("X"*480)],
> iface="enp175s0f0")
> +
> +   check the packets are distributed to queue 1.
> +   send mismatched packets::
> +
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IPv6(dst="CDCD:910A:2222:5498:847
> 5:1111:3900:2021")/("X"*480)], iface="enp175s0f0")
> +
> +   check the packets are not distributed to queue 1.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   verify matched packet are not distributed to queue 1.
> +   check there is no rule listed.
> +
> +Test case: MAC_IPV6_UDP queue index
> +===================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv6 dst is
> CDCD:910A:2222:5498:8475:1111:3900:2020 src is 2001::2 hop is 2 tc is 1 /
> udp src is 22 dst is 23 / end actions queue index 1 / end
> +
> +2. send matched packets, check the packets is distributed to queue 1.
> +   send mismatched packets, check the packets are not distributed to queue
> 1.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   verify matched packet is not distributed to queue 1.
> +   check there is no rule listed.
> +
> +Test case: MAC_IPV6_TCP queue index
> +===================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv6 dst is
> CDCD:910A:2222:5498:8475:1111:3900:2020 src is 2001::2 hop is 2 tc is 1 / tcp
> src is 22 dst is 23 / end actions queue index 1 / end
> +
> +2. send matched packets, check the packets is distributed to queue 1.
> +   send mismatched packets, check the packets are not distributed to queue
> 1.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   verify matched packet is not distributed to queue 1.
> +   check there is no rule listed.
> +
> +Test case: MAC_IPV6_SCTP queue index
> +====================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv6 dst is
> CDCD:910A:2222:5498:8475:1111:3900:2020 src is 2001::2 hop is 2 tc is 1 /
> sctp src is 22 dst is 23 / end actions queue index 1 / end
> +
> +2. send matched packets, check the packets is distributed to queue 1.
> +   send mismatched packets, check the packets are not distributed to queue
> 1.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   verify matched packet is not distributed to queue 1.
> +   check there is no rule listed.
> +
> +Test case: MAC_IPV4_TUN_IPV4_PAY queue index
> +============================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth / ipv4 / udp / vxlan / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 / end actions queue index 1 / end
> +
> +2. send matched packets, check the packets are distributed to queue 1.
> +   send mismatched packets, check the packets are not distributed to queue
> 1.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   verify the packets hit rule are not distributed to queue 1.
> +   check there is no rule listed.
> +
> +Test case: MAC_IPV4_TUN_IPV4_UDP queue index
> +============================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth / ipv4 / udp / vxlan / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 / udp src is 22 dst is 23 / end actions queue
> index 1 / end
> +
> +2. send matched packets, check the packets are distributed to queue 1.
> +   send mismatched packets, check the packets are not distributed to queue
> 1.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   verify the packets hit rule are not distributed to queue 1.
> +   check there is no rule listed.
> +
> +Test case: MAC_IPV4_TUN_IPV4_TCP queue index
> +============================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth / ipv4 / udp / vxlan / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 / tcp src is 22 dst is 23 / end actions queue
> index 1 / end
> +
> +2. send matched packets, check the packets are distributed to queue 1.
> +   send mismatched packets, check the packets are not distributed to queue
> 1.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   verify the packets hit rule are not distributed to queue 1.
> +   check there is no rule listed.
> +
> +Test case: MAC_IPV4_TUN_IPV4_SCTP queue index
> +=============================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth / ipv4 / udp / vxlan / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 / sctp src is 22 dst is 23 / end actions queue
> index 1 / end
> +
> +2. send matched packets, check the packets are distributed to queue 1.
> +   send mismatched packets, check the packets are not distributed to queue
> 1.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   verify the packets hit rule are not distributed to queue 1.
> +   check there is no rule listed.
> +
> +Test case: MAC_IPV4_TUN_MAC_IPV4_PAY queue index
> +================================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth / ipv4 / udp / vxlan / eth / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 / end actions queue index 1 / end
> +
> +2. send matched packets, check the packets are distributed to queue 1.
> +   send mismatched packets, check the packets are not distributed to queue
> 1.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   verify the packets hit rule are not distributed to queue 1.
> +   check there is no rule listed.
> +
> +Test case: MAC_IPV4_TUN_MAC_IPV4_UDP queue index
> +================================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth / ipv4 / udp / vxlan / eth / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 / udp src is 22 dst is 23 / end actions queue
> index 1 / end
> +
> +2. send matched packets, check the packets are distributed to queue 1.
> +   send mismatched packets, check the packets are not distributed to queue
> 1.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   verify the packets hit rule are not distributed to queue 1.
> +   check there is no rule listed.
> +
> +Test case: MAC_IPV4_TUN_MAC_IPV4_TCP queue index
> +================================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth / ipv4 / udp / vxlan / eth / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 / tcp src is 22 dst is 23 / end actions queue
> index 1 / end
> +
> +2. send matched packets, check the packets are distributed to queue 1.
> +   send mismatched packets, check the packets are not distributed to queue
> 1.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   verify the packets hit rule are not distributed to queue 1.
> +   check there is no rule listed.
> +
> +Test case: MAC_IPV4_TUN_MAC_IPV4_SCTP queue index
> +=================================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth / ipv4 / udp / vxlan / eth / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 / sctp src is 22 dst is 23 / end actions queue
> index 1 / end
> +
> +2. send matched packets, check the packets are distributed to queue 1.
> +   send mismatched packets, check the packets are not distributed to queue
> 1.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   verify the packets hit rule are not distributed to queue 1.
> +   check there is no rule listed.
> +
> +Test case: queue index wrong parameters
> +=======================================
> +
> +1. invalid parameters::
> +
> +    flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 proto is 255 ttl is 2 tos is 4 / end actions
> queue index 64 / end
> +
> +   failed to be created.
> +
> +2. same pattern items, different action::
> +
> +    flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 proto is 255 ttl is 2 tos is 4 / end actions
> queue index 1 / end
> +    flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 proto is 255 ttl is 2 tos is 4 / end actions
> queue index 2 / end
> +    flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 proto is 255 ttl is 2 tos is 4 / end actions drop
> / end
> +
> +   flow 1 can be created successfully,
> +   flow 2 and flow 3 failed to be created cause of confliction.
> +
> +Test case: MAC_IPV4_PAY drop
> +============================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 proto is 255 ttl is 2 tos is 4 / end actions drop
> / end
> +
> +2. send matched packets, check the packets dropped.
> +   send mismatched packets, check the packets are not dropped.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   check there is no rule listed.
> +   verify matched packets are not dropped.
> +
> +Test case: MAC_IPV4_UDP drop
> +============================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 ttl is 2 tos is 1 / udp src is 22 dst is 23 / end
> actions drop / end
> +
> +2. send matched packets, check the packet dropped.
> +   send mismatched packets, check the packets are not dropped.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   check there is no rule listed.
> +   verify the packet hit the rule is not dropped.
> +
> +Test case: MAC_IPV4_TCP drop
> +============================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 ttl is 2 tos is 1 / tcp src is 22 dst is 23 / end
> actions drop / end
> +
> +2. send matched packets, check the packet dropped.
> +   send mismatched packets, check the packets are not dropped.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   check there is no rule listed.
> +   verify the packet hit the rule is not dropped.
> +
> +Test case: MAC_IPV4_SCTP drop
> +=============================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 ttl is 2 tos is 1 / sctp src is 22 dst is 23 / end
> actions drop / end
> +
> +2. send matched packets, check the packet dropped.
> +   send mismatched packets, check the packets are not dropped.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   check there is no rule listed.
> +   verify the packet hit the rule is not dropped.
> +
> +Test case: MAC_IPV6_PAY drop
> +============================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv6 dst is
> CDCD:910A:2222:5498:8475:1111:3900:2020 src is 2001::2 proto is 1 hop is 2
> tc is 1 \
> +    / end actions drop / end
> +
> +2. send matched packets, check the packets dropped.
> +   send mismatched packets, check the packets are not dropped.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   check there is no rule listed.
> +   verify the packet hit the rule is not dropped.
> +
> +Test case: MAC_IPV6_UDP drop
> +============================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv6 dst is
> CDCD:910A:2222:5498:8475:1111:3900:2020 src is 2001::2 hop is 2 tc is 1 /
> udp src is 22 dst is 23 / end actions drop / end
> +
> +2. send matched packets, check the packet dropped.
> +   send mismatched packets, check the packets are not dropped.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   check there is no rule listed.
> +   verify the packet hit the rule is not dropped.
> +
> +Test case: MAC_IPV6_TCP drop
> +============================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv6 dst is
> CDCD:910A:2222:5498:8475:1111:3900:2020 src is 2001::2 hop is 2 tc is 1 / tcp
> src is 22 dst is 23 / end actions drop / end
> +
> +2. send matched packets, check the packet dropped.
> +   send mismatched packets, check the packets are not dropped.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   check there is no rule listed.
> +   verify the packet hit the rule is not dropped.
> +
> +Test case: MAC_IPV6_SCTP drop
> +=============================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv6 dst is
> CDCD:910A:2222:5498:8475:1111:3900:2020 src is 2001::2 hop is 2 tc is 1 /
> sctp src is 22 dst is 23 / end actions drop / end
> +
> +2. send matched packets, check the packet dropped.
> +   send mismatched packets, check the packets are not dropped.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   check there is no rule listed.
> +   verify the packet hit the rule is not dropped.
> +
> +Test case: MAC_IPV4_TUN_IPV4_PAY drop
> +=====================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth / ipv4 / udp / vxlan / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 / end actions drop / end
> +
> +2. send matched packets, check the packets dropped.
> +   send mismatched packets, check the packets are not dropped.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   check there is no rule listed.
> +   verify the packets hit the rule are not dropped.
> +
> +Test case: MAC_IPV4_TUN_IPV4_UDP drop
> +=====================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth / ipv4 / udp / vxlan / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 / udp src is 22 dst is 23 / end actions drop /
> end
> +
> +2. send matched packets, check the packets dropped.
> +   send mismatched packets, check the packets are not dropped.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   check there is no rule listed.
> +   verify the packets hit the rule are not dropped.
> +
> +Test case: MAC_IPV4_TUN_IPV4_TCP drop
> +=====================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth / ipv4 / udp / vxlan / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 / tcp src is 22 dst is 23 / end actions drop /
> end
> +
> +2. send matched packets, check the packets dropped.
> +   send mismatched packets, check the packets are not dropped.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   check there is no rule listed.
> +   verify the packets hit the rule are not dropped.
> +
> +Test case: MAC_IPV4_TUN_IPV4_SCTP drop
> +======================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth / ipv4 / udp / vxlan / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 / sctp src is 22 dst is 23 / end actions drop /
> end
> +
> +2. send matched packets, check the packets dropped.
> +   send mismatched packets, check the packets are not dropped.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   check there is no rule listed.
> +   verify the packets hit the rule are not dropped.
> +
> +Test case: MAC_IPV4_TUN_MAC_IPV4_PAY drop
> +=========================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth / ipv4 / udp / vxlan / eth / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 / end actions drop / end
> +
> +2. send matched packets, check the packets dropped.
> +   send mismatched packets, check the packets are not dropped.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   check there is no rule listed.
> +   verify the packets hit the rule are not dropped.
> +
> +Test case: MAC_IPV4_TUN_MAC_IPV4_UDP drop
> +=========================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth / ipv4 / udp / vxlan / eth / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 / udp src is 22 dst is 23 / end actions drop /
> end
> +
> +2. send matched packets, check the packets dropped.
> +   send mismatched packets, check the packets are not dropped.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   check there is no rule listed.
> +   verify the packets hit the rule are not dropped.
> +
> +Test case: MAC_IPV4_TUN_MAC_IPV4_TCP drop
> +=========================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth / ipv4 / udp / vxlan / eth / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 / tcp src is 22 dst is 23 / end actions drop /
> end
> +
> +2. send matched packets, check the packets dropped.
> +   send mismatched packets, check the packets are not dropped.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   check there is no rule listed.
> +   verify the packets hit the rule are not dropped.
> +
> +Test case: MAC_IPV4_TUN_MAC_IPV4_SCTP drop
> +==========================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth / ipv4 / udp / vxlan / eth / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 / sctp src is 22 dst is 23 / end actions drop /
> end
> +
> +2. send matched packets, check the packets dropped.
> +   send mismatched packets, check the packets are not dropped.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   check there is no rule listed.
> +   verify the packets hit the rule are not dropped.
> +
> +Test case: MAC_IPV4_PAY queue group
> +===================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 proto is 255 ttl is 2 tos is 4 / end actions rss
> queues 0 1 end / end
> +
> +2. send matched packets, check the packets are distributed to queue 0 or 1.
> +   send mismatched packets, check the packets are not distributed to queue
> 0 or 1.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   verify pkt1 and pkt2 are not distributed to queue 0 or 1.
> +   check there is no rule listed.
> +
> +Test case: MAC_IPV4_UDP queue group
> +===================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 ttl is 2 tos is 4 / udp src is 22 dst is 23 / end
> actions rss queues 1 2 3 4 end / end
> +
> +2. send matched packets, check the packets are distributed to queue group.
> +   send mismatched packets, check the packets are not distributed to queue
> group.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   verify the packets hit rule are not distributed to queue group.
> +   check there is no rule listed.
> +
> +Test case: MAC_IPV4_TCP queue group
> +===================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 ttl is 2 tos is 4 / tcp src is 22 dst is 23 / end
> actions rss queues 56 57 58 59 60 61 62 63 end / end
> +
> +2. send matched packets, check the packets are distributed to queue group.
> +   send mismatched packets, check the packets are not distributed to queue
> group.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   verify the packets hit rule are not distributed to queue group.
> +   check there is no rule listed.
> +
> +Test case: MAC_IPV4_SCTP queue group
> +====================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 ttl is 2 tos is 4 / sctp src is 22 dst is 23 tag is 1
> / end actions rss queues 0 1 2 3 end / end
> +
> +2. send matched packets, check the packets are distributed to queue group.
> +   send mismatched packets, check the packets are not distributed to queue
> group.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   verify the packets hit rule are not distributed to queue group.
> +   check there is no rule listed.
> +
> +Test case: MAC_IPV6_PAY queue group
> +===================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv6 dst is
> CDCD:910A:2222:5498:8475:1111:3900:2020 src is 2001::2 proto is 1 hop is 2
> tc is 1 / end actions rss queues 1 2 end / end
> +
> +2. send matched packets, check the packets are distributed to queue group.
> +   send mismatched packets, check the packets are not distributed to queue
> group.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   verify the packets hit rule are not distributed to queue group.
> +   check there is no rule listed.
> +
> +Test case: MAC_IPV6_UDP queue group
> +===================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv6 dst is
> CDCD:910A:2222:5498:8475:1111:3900:2020 src is 2001::2 hop is 2 tc is 1 /
> udp src is 22 dst is 23 / end actions rss queues 1 2 end / end
> +
> +2. send matched packets, check the packets are distributed to queue group.
> +   send mismatched packets, check the packets are not distributed to queue
> group.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   verify the packets hit rule are not distributed to queue group.
> +   check there is no rule listed.
> +
> +Test case: MAC_IPV6_TCP queue group
> +===================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv6 dst is
> CDCD:910A:2222:5498:8475:1111:3900:2020 src is 2001::2 hop is 2 tc is 1 / tcp
> src is 22 dst is 23 / end actions rss queues 1 2 end / end
> +
> +2. send matched packets, check the packets are distributed to queue group.
> +   send mismatched packets, check the packets are not distributed to queue
> group.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   verify the packets hit rule are not distributed to queue group.
> +   check there is no rule listed.
> +
> +Test case: MAC_IPV6_SCTP queue group
> +====================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv6 dst is
> CDCD:910A:2222:5498:8475:1111:3900:2020 src is 2001::2 hop is 2 tc is 1 /
> sctp src is 22 dst is 23 / end actions rss queues 1 2 end / end
> +
> +2. send matched packets, check the packets are distributed to queue group.
> +   send mismatched packets, check the packets are not distributed to queue
> group.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   verify the packets hit rule are not distributed to queue group.
> +   check there is no rule listed.
> +
> +Test case: MAC_IPV4_TUN_IPV4_PAY queue group
> +============================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth / ipv4 / udp / vxlan / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 / end actions rss queues 9 10 11 12 13 14 15
> 16 17 18 19 20 21 22 23 24 end / end
> +
> +2. send matched packets, check the packets are distributed to queue group.
> +   send mismatched packets, check the packets are not distributed to queue
> group.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   verify the packets hit rule are not distributed to queue group.
> +   check there is no rule listed.
> +
> +Test case: MAC_IPV4_TUN_IPV4_UDP queue group
> +============================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth / ipv4 / udp / vxlan / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 / udp src is 22 dst is 23 / end actions rss
> queues 38 39 40 41 end / end
> +
> +2. send matched packets, check the packets are distributed to queue group.
> +   send mismatched packets, check the packets are not distributed to queue
> group.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   verify the packets hit rule are not distributed to queue group.
> +   check there is no rule listed.
> +
> +Test case: MAC_IPV4_TUN_IPV4_TCP queue group
> +============================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth / ipv4 / udp / vxlan / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 / tcp src is 22 dst is 23 / end actions rss
> queues 1 2 end / end
> +
> +2. send matched packets, check the packets are distributed to queue group.
> +   send mismatched packets, check the packets are not distributed to queue
> group.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   verify the packets hit rule are not distributed to queue group.
> +   check there is no rule listed.
> +
> +Test case: MAC_IPV4_TUN_IPV4_SCTP queue group
> +=============================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth / ipv4 / udp / vxlan / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 / sctp src is 22 dst is 23 / end actions rss
> queues 1 2 end / end
> +
> +2. send matched packets, check the packets are distributed to queue group.
> +   send mismatched packets, check the packets are not distributed to queue
> group.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   verify the packets hit rule are not distributed to queue group.
> +   check there is no rule listed.
> +
> +Test case: MAC_IPV4_TUN_MAC_IPV4_PAY queue group
> +================================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth / ipv4 / udp / vxlan / eth / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 / end actions rss queues 1 2 end / end
> +
> +2. send matched packets, check the packets are distributed to queue group.
> +   send mismatched packets, check the packets are not distributed to queue
> group.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   verify the packets hit rule are not distributed to queue group.
> +   check there is no rule listed.
> +
> +Test case: MAC_IPV4_TUN_MAC_IPV4_UDP queue group
> +================================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth / ipv4 / udp / vxlan / eth / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 / udp src is 22 dst is 23 / end actions rss
> queues 1 2 end / end
> +
> +2. send matched packets, check the packets are distributed to queue group.
> +   send mismatched packets, check the packets are not distributed to queue
> group.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   verify the packets hit rule are not distributed to queue group.
> +   check there is no rule listed.
> +
> +Test case: MAC_IPV4_TUN_MAC_IPV4_TCP queue group
> +================================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth / ipv4 / udp / vxlan / eth / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 / tcp src is 22 dst is 23 / end actions rss
> queues 1 2 end / end
> +
> +2. send matched packets, check the packets are distributed to queue group.
> +   send mismatched packets, check the packets are not distributed to queue
> group.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   verify the packets hit rule are not distributed to queue group.
> +   check there is no rule listed.
> +
> +Test case: MAC_IPV4_TUN_MAC_IPV4_SCTP queue group
> +=================================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth / ipv4 / udp / vxlan / eth / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 / sctp src is 22 dst is 23 / end actions rss
> queues 1 2 end / end
> +
> +2. send matched packets, check the packets are distributed to queue group.
> +   send mismatched packets, check the packets are not distributed to queue
> group.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   verify the packets hit rule are not distributed to queue group.
> +   check there is no rule listed.
> +
> +Test case: queue group wrong parameters
> +=======================================
> +
> +1. invalid number of queues::
> +
> +    flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 proto is 255 ttl is 2 tos is 4 / end actions rss
> queues 0 1 2 end / end
> +
> +    flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 proto is 255 ttl is 2 tos is 4 / end actions rss
> queues 0 end / end
> +
> +2. Discontinuous queues::
> +
> +    flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 proto is 255 ttl is 2 tos is 4 / end actions rss
> queues 1 2 3 5 end / end
> +
> +3. invalid queue index::
> +
> +    flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 proto is 255 ttl is 2 tos is 4 / end actions rss
> queues 63 64 end / end
> +
> +4. "--rxq=32 --txq=32", set queue group 64 queues::
> +
> +    flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 ttl is 2 tos is 4 / end actions rss queues 0 1 2
> 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31
> 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57
> 58 59 60 61 62 63 end / end
> +
> +all the above five rules are failed to created.
> +
> +5. "--rxq=64 --txq=64", set queue group 64 queues,
> +   create the 64 queues flow successfully.
> +   send matched packets, check the packets are distributed to queue 0-63.
> +   send mismatched packets, check the packets are distributed to queue 0-63
> too.
> +
> +Test case: MAC_IPV4_GTPU_IPV4_PAY queue index
> +=============================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth / ipv4 / udp / gtpu teid is 0x12345678 /
> gtp_psc qfi is 0x34 / ipv4 / end actions queue index 1 / end
> +
> +2. send matched packets, check the packets are distributed to queue 1.
> +   send mismatched packets, check the packets are not distributed to queue
> 1.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   verify matched packets are not distributed to queue 1.
> +   Then check there is no rule listed.
> +
> +Test case: MAC_IPV4_GTPU_IPV4_PAY drop
> +======================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth / ipv4 / udp / gtpu teid is 0x12345678 /
> gtp_psc qfi is 0x34 / ipv4 / end actions drop / end
> +
> +2. send matched packets, check the packets are dropped.
> +   send mismatched packets, check the packets are not dropped.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   verify matched packets are not dropped.
> +   Then check there is no rule listed.
> +
> +Test case: MAC_IPV4_GTPU_IPV4_PAY queue group
> +=============================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth / ipv4 / udp / gtpu teid is 0x12345678 /
> gtp_psc qfi is 0x34 / ipv4 / end actions rss queues 0 1 end / end
> +
> +2. send matched packets, check the packets are distributed to queue group.
> +   send mismatched packets, check the packets are not distributed to queue
> group.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   verify matched packets are not distributed to queue group.
> +   Then check there is no rule listed.
> +
> +Test case: MAC_IPV4_GTPU_IPV4_PAY mark/count/query
> +==================================================
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth / ipv4 / udp / gtpu teid is 0x12345678 /
> gtp_psc qfi is 0x34 / ipv4 / end actions queue index 2 / mark id 2 / count /
> end
> +
> +2. send matched packets, check the packets are distributed to queue 2, the
> FDIR=0x2.
> +   send mismatched packets, check the packets are not distributed to queue
> 2, no FDIR.
> +   check the count number::
> +
> +    flow query 0 0 count
> +    count:
> +     hits_set: 1
> +     bytes_set: 0
> +     hits: 5
> +     bytes: 0
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   verify matched packets are not distributed to queue 2, and no FDIR.
> +   Then check there is no rule listed.
> +
> +Test case: MAC_IPV4_GTPU_IPV4_PAY TEID mark/count/query
> +=======================================================
> +
> +1. create filter rules on port 1::
> +
> +    flow create 1 ingress pattern eth / ipv4 / udp / gtpu teid is 0x12345678 /
> gtp_psc / ipv4 / end actions rss queues 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
> 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42
> 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 end / mark id
> 100 / count / end
> +
> +2. send matched packets, check the packets are distributed to queue in 0-63,
> the FDIR=0x64::
> +
> +    p_gtpu1 = Ether(src="a4:bf:01:51:27:ca",
> dst="00:00:00:00:01:03")/IP(src="192.168.0.20",
> dst="192.168.0.21")/UDP(dport=2152)/GTP_U_Header(gtp_type=255,
> teid=0x12345678)/GTP_PDUSession_ExtensionHeader(pdu_type=0,
> qos_flow=0x35)/IP()/Raw('x'*20)
> +
> +   send mismatched packets, check the packets have not FDIR::
> +
> +    p_gtpu2 = Ether(src="a4:bf:01:51:27:ca",
> dst="00:00:00:00:01:03")/IP(src="192.168.0.20",
> dst="192.168.0.21")/UDP(dport=2152)/GTP_U_Header(gtp_type=255,
> teid=0x1234567)/GTP_PDUSession_ExtensionHeader(pdu_type=0,
> qos_flow=0x34)/IP()/UDP()/Raw('x'*20)
> +
> +   check the count number::
> +
> +    flow query 1 0 count
> +    count:
> +     hits_set: 1
> +     bytes_set: 0
> +     hits: 1
> +     bytes: 0
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 1
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 1 rule 0
> +
> +   verify matched packets are distributed to queue in 0-63, and no FDIR.
> +   Then check there is no rule listed.
> +
> +Test case: MAC_IPV4_GTPU_IPV4_PAY QFI mark/count/query
> +=======================================================
> +
> +1. create filter rules on port 1::
> +
> +    flow create 1 ingress pattern eth / ipv4 / udp / gtpu / gtp_psc qfi is 0x34 /
> ipv4 / end actions drop / mark id 3 / count / end
> +
> +2. send matched packets, check the packets are dropped::
> +
> +    p_gtpu1 = Ether(src="a4:bf:01:51:27:ca",
> dst="00:00:00:00:01:03")/IP(src="192.168.0.20",
> dst="192.168.0.21")/UDP(dport=2152)/GTP_U_Header(gtp_type=255,
> teid=0x12345678)/GTP_PDUSession_ExtensionHeader(pdu_type=0,
> qos_flow=0x34)/IP()/TCP()/Raw('x'*20)
> +
> +   send mismatched packets, check the packets are not dropped, no FDIR::
> +
> +    p_gtpu2 = Ether(src="a4:bf:01:51:27:ca",
> dst="00:00:00:00:01:03")/IP(src="192.168.0.20",
> dst="192.168.0.21")/UDP(dport=2152)/GTP_U_Header(gtp_type=255,
> teid=0x12345678)/GTP_PDUSession_ExtensionHeader(pdu_type=0,
> qos_flow=0x35)/IP()/Raw('x'*20)
> +
> +   check the count number::
> +
> +    flow query 1 0 count
> +    count:
> +     hits_set: 1
> +     bytes_set: 0
> +     hits: 1
> +     bytes: 0
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 1
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 1 rule 0
> +
> +   verify matched packets are not dropped, and no FDIR.
> +   Then check there is no rule listed.
> +
> +Test case: MAC_IPV4_GTPU_IPV4_PAY multirules
> +============================================
> +
> +1. create filter rules on port 0::
> +
> +    flow create 0 ingress pattern eth / ipv4 / udp / gtpu teid is 0x12345678 /
> gtp_psc qfi is 0x34 / ipv4 / end actions queue index 1 / end
> +    flow create 0 ingress pattern eth / ipv4 / udp / gtpu teid is 0x12345678 /
> gtp_psc qfi is 0x35 / ipv4 / end actions queue index 2 / end
> +    flow create 0 ingress pattern eth / ipv4 / udp / gtpu teid is 0x1234567 /
> gtp_psc qfi is 0x35 / ipv4 / end actions queue index 3 / end
> +
> +   the three rules are created successfully.
> +   then create the following rules::
> +
> +    flow create 0 ingress pattern eth / ipv4 / udp / gtpu teid is 0x1234567 /
> gtp_psc qfi is 0x35 / ipv4 / end actions queue index 3 / end
> +    flow create 0 ingress pattern eth / ipv4 / udp / gtpu teid is 0x1234567 /
> gtp_psc qfi is 0x35 / ipv4 / end actions queue index 4 / end
> +    flow create 0 ingress pattern eth / ipv4 / udp / gtpu teid is 0x1234567 /
> gtp_psc qfi is 0x75 / ipv4 / end actions queue index 4 / end
> +
> +   the three rules are failed to created.
> +   then create the following rule::
> +
> +    flow create 0 ingress pattern eth / ipv4 / udp / gtpu teid is 0x1234567 /
> gtp_psc qfi is 0x34 / ipv4 / end actions queue index 3 / end
> +
> +   the rule is created successfully.
> +
> +2. send matched packets::
> +
> +    p_gtpu1 = Ether(src="a4:bf:01:51:27:ca",
> dst="00:00:00:00:01:03")/IP(src="192.168.0.20",
> dst="192.168.0.21")/UDP(dport=2152)/GTP_U_Header(gtp_type=255,
> teid=0x12345678)/GTP_PDUSession_ExtensionHeader(pdu_type=0,
> qos_flow=0x34)/IP()/Raw('x'*20)
> +    p_gtpu2 = Ether(src="a4:bf:01:51:27:ca",
> dst="00:00:00:00:01:03")/IP(src="192.168.0.20",
> dst="192.168.0.21")/UDP(dport=2152)/GTP_U_Header(gtp_type=255,
> teid=0x1234567)/GTP_PDUSession_ExtensionHeader(pdu_type=0,
> qos_flow=0x34)/IP()/Raw('x'*20)
> +    p_gtpu3 = Ether(src="a4:bf:01:51:27:ca",
> dst="00:00:00:00:01:03")/IP(src="192.168.0.20",
> dst="192.168.0.21")/UDP(dport=2152)/GTP_U_Header(gtp_type=255,
> teid=0x12345678)/GTP_PDUSession_ExtensionHeader(pdu_type=0,
> qos_flow=0x35)/IP()/Raw('x'*20)
> +    p_gtpu4 = Ether(src="a4:bf:01:51:27:ca",
> dst="00:00:00:00:01:03")/IP(src="192.168.0.20",
> dst="192.168.0.21")/UDP(dport=2152)/GTP_U_Header(gtp_type=255,
> teid=0x1234567)/GTP_PDUSession_ExtensionHeader(pdu_type=0,
> qos_flow=0x35)/IP()/Raw('x'*20)
> +
> +   check the packets, p_gtpu1 to queue 1, p_gtpu2 to queue 3, p_gtpu3 to
> queue 2, p_gtpu4 to queue 3.
> +   send mismatched packets, check the packets are not distributed to queue
> 1-3::
> +
> +    p_gtpu5 = Ether(src="a4:bf:01:51:27:ca",
> dst="00:00:00:00:01:03")/IP(src="192.168.0.20",
> dst="192.168.0.21")/UDP(dport=2152)/GTP_U_Header(gtp_type=255,
> teid=0x1234567)/GTP_PDUSession_ExtensionHeader(pdu_type=0,
> qos_flow=0x36)/IP()/Raw('x'*20)
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow flush 0
> +
> +   verify matched packets are not distributed to same queue.
> +   Then check there is no rule listed.
> +
> +Test case: MAC_IPV4_GTPU_IPV4_PAY two ports
> +===========================================
> +
> +1. create filter rules on two ports::
> +
> +    flow create 0 ingress pattern eth / ipv4 / udp / gtpu teid is 0x12345678 /
> gtp_psc qfi is 0x34 / ipv4 / end actions queue index 1 / end
> +    flow create 1 ingress pattern eth / ipv4 / udp / gtpu teid is 0x12345678 /
> gtp_psc qfi is 0x34 / ipv4 / end actions queue index 1 / end
> +
> +   send matched packets::
> +
> +    p_gtpu1 = Ether(src="a4:bf:01:51:27:ca",
> dst="00:00:00:00:01:03")/IP(src="192.168.0.20",
> dst="192.168.0.21")/UDP(dport=2152)/GTP_U_Header(gtp_type=255,
> teid=0x12345678)/GTP_PDUSession_ExtensionHeader(pdu_type=0,
> qos_flow=0x34)/IP()/Raw('x'*20)
> +
> +   send the packet to two ports, both are distributed to queue 1.
> +
> +2. create filter rules on two ports::
> +
> +    flow create 0 ingress pattern eth / ipv4 / udp / gtpu teid is 0x12345678 /
> gtp_psc qfi is 0x35 / ipv4 / end actions queue index 2 / end
> +    flow create 1 ingress pattern eth / ipv4 / udp / gtpu teid is 0x12345678 /
> gtp_psc qfi is 0x35 / ipv4 / end actions queue index 3 / end
> +
> +   send matched packets::
> +
> +    p_gtpu2 = Ether(src="a4:bf:01:51:27:ca",
> dst="00:00:00:00:01:03")/IP(src="192.168.0.20",
> dst="192.168.0.21")/UDP(dport=2152)/GTP_U_Header(gtp_type=255,
> teid=0x12345678)/GTP_PDUSession_ExtensionHeader(pdu_type=0,
> qos_flow=0x35)/IP()/Raw('x'*20)
> +
> +   send the packet to two ports, both are distributed to expected queue.
> +
> +3. flush the rules::
> +
> +    flow flush 0
> +    flow flush 1
> +
> +4. create filter rules on two ports::
> +
> +    flow create 0 ingress pattern eth / ipv4 / udp / gtpu teid is 0x12345678 /
> gtp_psc qfi is 0x34 / ipv4 / end actions queue index 1 / end
> +    flow create 1 ingress pattern eth / ipv4 / udp / gtpu teid is 0x12345678 /
> gtp_psc / ipv4 / end actions queue index 2 / end
> +
> +   send matched packets::
> +
> +    p_gtpu2 = Ether(src="a4:bf:01:51:27:ca",
> dst="00:00:00:00:01:03")/IP(src="192.168.0.20",
> dst="192.168.0.21")/UDP(dport=2152)/GTP_U_Header(gtp_type=255,
> teid=0x12345678)/GTP_PDUSession_ExtensionHeader(pdu_type=0,
> qos_flow=0x35)/IP()/Raw('x'*20)
> +
> +   send the packet to two ports, it is not distributed to queue 1 of port 0,
> +   it is distributed to queue 2 of port 1.
> +
> +
> +5. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +    testpmd> flow list 1
> +
> +   check the existing rules.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +    testpmd> flow destroy 1 rule 0
> +
> +   verify matched packets are not distributed to expected queue.
> +   Then check there is no rule listed.
> +
> +Test case: MAC_IPV4_GTPU_IPV4_PAY wrong parameters
> +==================================================
> +
> +1. create filter rules on port 0::
> +
> +    flow create 0 ingress pattern eth / ipv4 / udp / gtpu teid is 0x12345678 /
> gtp_psc qfi is 0x100 / ipv4 / end actions queue index 1 / end
> +    flow create 0 ingress pattern eth / ipv4 / udp / gtpu teid is 0x100000000 /
> gtp_psc qfi is 0x5 / ipv4 / end actions queue index 2 / end
> +
> +   the two flows can not be created successfully.
> +
> +2. list the flow::
> +
> +    testpmd> flow list 0
> +
> +   there is no flow listed.
> +
> +Test case: count query identifier share
> +=======================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth / ipv4 src is 192.168.0.1 / end actions
> queue index 1 / count identifier 0x1234 shared on / end
> +    flow create 0 ingress pattern eth / ipv4 src is 192.168.0.2 / end actions
> queue index 2 / count identifier 0x1234 shared on / end
> +    flow create 0 ingress pattern eth / ipv4 src is 192.168.0.3 / end actions
> queue index 3 / count identifier 0x1234 shared off / end
> +    flow create 0 ingress pattern eth / ipv4 src is 192.168.0.4 / end actions
> queue index 4 / count identifier 0x1234 / end
> +    flow create 0 ingress pattern eth / ipv4 src is 192.168.0.5 / end actions
> queue index 5 / count shared on / end
> +    flow create 0 ingress pattern eth / ipv4 src is 192.168.0.6 / end actions
> drop / count shared on / end
> +    flow create 0 ingress pattern eth / ipv4 src is 192.168.0.7 / end actions
> drop / count identifier 0x1235 shared on / end
> +
> +2. send matched packets::
> +
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.1",dst="192.168.0.
> 21") / Raw('x' * 80)],iface="enp175s0f0", count=10)
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.2",dst="192.168.0.
> 21") / Raw('x' * 80)],iface="enp175s0f0", count=10)
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.3",dst="192.168.0.
> 21") / Raw('x' * 80)],iface="enp175s0f0", count=10)
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.4",dst="192.168.0.
> 21") / Raw('x' * 80)],iface="enp175s0f0", count=10)
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.5",dst="192.168.0.
> 21") / Raw('x' * 80)],iface="enp175s0f0", count=10)
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.6",dst="192.168.0.
> 21") / Raw('x' * 80)],iface="enp175s0f0", count=10)
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.7",dst="192.168.0.
> 21") / Raw('x' * 80)],iface="enp175s0f0", count=10)
> +
> +   check the packets,
> +   packet 1 to queue 1, packet 2 to queue 2, packet 3 to queue 3, packet 4 to
> queue 4, packet 5 to queue 5,
> +   packet 6 dropped, packet 7 dropped.
> +
> +3. query count::
> +
> +    testpmd> flow query 0 0 count
> +    COUNT:
> +     hits_set: 1
> +     bytes_set: 0
> +     hits: 20
> +     bytes: 0
> +    testpmd> flow query 0 1 count
> +    COUNT:
> +     hits_set: 1
> +     bytes_set: 0
> +     hits: 20
> +     bytes: 0
> +    testpmd> flow query 0 2 count
> +    COUNT:
> +     hits_set: 1
> +     bytes_set: 0
> +     hits: 10
> +     bytes: 0
> +    testpmd> flow query 0 3 count
> +    COUNT:
> +     hits_set: 1
> +     bytes_set: 0
> +     hits: 10
> +     bytes: 0
> +    testpmd> flow query 0 4 count
> +    COUNT:
> +     hits_set: 1
> +     bytes_set: 0
> +     hits: 20
> +     bytes: 0
> +    testpmd> flow query 0 5 count
> +    COUNT:
> +     hits_set: 1
> +     bytes_set: 0
> +     hits: 20
> +     bytes: 0
> +    testpmd> flow query 0 6 count
> +    COUNT:
> +     hits_set: 1
> +     bytes_set: 0
> +     hits: 10
> +     bytes: 0
> +
> +4. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow flush 0
> +
> +   verify matched packet are not distributed to same queue.
> +   check there is no rule listed.
> +
> +Test case: multi patterns count query
> +=====================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth / ipv4 dst is 192.168.0.21 / tcp src is 22
> dst is 23 / end actions queue index 1 / count / end
> +    flow create 0 ingress pattern eth / ipv4 dst is 192.168.0.21 / udp src is 22
> dst is 23 / end actions drop / count / end
> +    flow create 0 ingress pattern eth / ipv4 dst is 192.168.0.21 / sctp src is 22
> dst is 23 / end actions rss queues 62 63 end / count / end
> +    flow create 0 ingress pattern eth / ipv6 dst is
> CDCD:910A:2222:5498:8475:1111:3900:2020 src is 2001::2 / end actions
> queue index 1 / count / end
> +    flow create 0 ingress pattern eth / ipv4 / udp / vxlan / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 / udp src is 22 dst is 23 / end actions queue
> index 3 / count / end
> +    flow create 0 ingress pattern eth / ipv4 / udp / vxlan / eth / ipv4 src is
> 192.168.0.20 / tcp dst is 23 / end actions queue index 4 / count / end
> +    flow create 0 ingress pattern eth / ipv4 / udp / vxlan / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 / sctp src is 22 dst is 23 / end actions queue
> index 5 / count / end
> +
> +2. send matched packets::
> +
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.20",dst="192.168.0
> .21") /TCP(sport=22, dport=23)/ Raw('x' * 80)],iface="enp175s0f0", count=10)
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.20",dst="192.168.0
> .21") /UDP(sport=22, dport=23)/ Raw('x' * 80)],iface="enp175s0f0", count=10)
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.20",dst="192.168.0
> .21") /SCTP(sport=22, dport=23)/ Raw('x' * 80)],iface="enp175s0f0",
> count=10)
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IPv6(dst="CDCD:910A:2222:5498:847
> 5:1111:3900:2020", src="2001::2", nh=1, tc=1, hlim=2)/("X"*480)],
> iface="enp175s0f0", count=10)
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP()/UDP(dport=4790)/VXLAN(flags=0
> xc)/IP(dst="192.168.0.21",
> src="192.168.0.20")/UDP(sport=22,dport=23)/("X"*480)], iface="enp175s0f0",
> count=10)
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP()/UDP()/VXLAN(vni=2)/Ether(dst="
> 00:11:22:33:44:55")/IP(src="192.168.0.20")/TCP(dport=23)/("X"*480)],
> iface="enp175s0f0", count=10)
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP()/UDP()/VXLAN(vni=2)/Ether()/IP(s
> rc='192.168.0.20', dst='192.168.0.21')/SCTP(sport=22,dport=23)/("X"*480)],
> iface="enp175s0f0", count=10)
> +
> +   check the packets,
> +   packet 1 to queue 1, packet 2 dropped, packet 3 to queue 62-63, packet 4
> to queue 1, packet 5 to queue 3,
> +   packet 6 to queue 4, packet 7 to queue 5.
> +
> +3. query count::
> +
> +    testpmd> flow query 0 0 count
> +    COUNT:
> +     hits_set: 1
> +     bytes_set: 0
> +     hits: 10
> +     bytes: 0
> +    testpmd> flow query 0 1 count
> +    COUNT:
> +     hits_set: 1
> +     bytes_set: 0
> +     hits: 10
> +     bytes: 0
> +    testpmd> flow query 0 2 count
> +    COUNT:
> +     hits_set: 1
> +     bytes_set: 0
> +     hits: 10
> +     bytes: 0
> +    testpmd> flow query 0 3 count
> +    COUNT:
> +     hits_set: 1
> +     bytes_set: 0
> +     hits: 10
> +     bytes: 0
> +    testpmd> flow query 0 4 count
> +    COUNT:
> +     hits_set: 1
> +     bytes_set: 0
> +     hits: 10
> +     bytes: 0
> +    testpmd> flow query 0 5 count
> +    COUNT:
> +     hits_set: 1
> +     bytes_set: 0
> +     hits: 10
> +     bytes: 0
> +    testpmd> flow query 0 6 count
> +    COUNT:
> +     hits_set: 1
> +     bytes_set: 0
> +     hits: 10
> +     bytes: 0
> +
> +4. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow flush 0
> +
> +   verify matched packet are not distributed to same queue.
> +   check there is no rule listed.
> +
> +Test case: two ports multi patterns count query
> +===============================================
> +
> +1. create filter rules::
> +
> +    flow create 1 ingress pattern eth / ipv4 dst is 192.168.0.21 proto is 255
> tos is 4 / end actions queue index 1 / count / end
> +    flow create 1 ingress pattern eth / ipv6 dst is
> CDCD:910A:2222:5498:8475:1111:3900:2020 src is 2001::2 hop is 2 tc is 1 /
> sctp src is 22 dst is 23 / end actions rss queues 6 7 end / count / end
> +    flow create 1 ingress pattern eth / ipv6 dst is
> CDCD:910A:2222:5498:8475:1111:3900:2020 src is 2001::2 hop is 2 tc is 1 /
> udp src is 22 dst is 23 / end actions rss queues 6 7 end / count / end
> +    flow create 1 ingress pattern eth / ipv6 dst is
> CDCD:910A:2222:5498:8475:1111:3900:2020 src is 2001::2 hop is 2 tc is 1 / tcp
> src is 22 dst is 23 / end actions queue index 2 / count / end
> +    flow create 1 ingress pattern eth / ipv4 / udp / vxlan / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 / end actions drop / count / end
> +    flow create 0 ingress pattern eth / ipv4 dst is 192.168.0.21 tos is 4 / tcp src
> is 22 dst is 23 / end actions drop / count / end
> +    flow create 0 ingress pattern eth / ipv6 dst is
> CDCD:910A:2222:5498:8475:1111:3900:2020 src is 2001::2 / end actions
> queue index 1 / count / end
> +
> +2. send matched packets::
> +
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.20",dst="192.168.0
> .21", proto=255, ttl=2, tos=4) / Raw('x' * 80)],iface="enp175s0f1", count=10)
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IPv6(dst="CDCD:910A:2222:5498:847
> 5:1111:3900:2020", src="2001::2", tc=1,
> hlim=2)/SCTP(sport=22,dport=23)/("X"*480)], iface="enp175s0f1", count=10)
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IPv6(dst="CDCD:910A:2222:5498:847
> 5:1111:3900:2020", src="2001::2", tc=1,
> hlim=2)/UDP(sport=22,dport=23)/("X"*480)], iface="enp175s0f1", count=10)
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IPv6(dst="CDCD:910A:2222:5498:847
> 5:1111:3900:2020", src="2001::2", tc=1,
> hlim=2)/TCP(sport=22,dport=23)/("X"*480)], iface="enp175s0f1", count=10)
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP()/UDP()/VXLAN()/Ether()/IP(src='1
> 92.168.0.20', dst='192.168.0.21')/("X"*480)], iface="enp175s0f1", count=10)
> +    sendp([Ether(dst="00:11:22:33:44:55")/IP(dst="192.168.0.21", ttl=2,
> tos=4)/TCP(sport=22,dport=23)/Raw(load="X"*480)], iface="enp175s0f0",
> count=10)
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IPv6(dst="CDCD:910A:2222:5498:847
> 5:1111:3900:2020", src="2001::2", nh=1, tc=1, hlim=2)/("X"*480)],
> iface="enp175s0f0", count=10)
> +    sendp([Ether(dst="00:11:22:33:44:55")/IP(dst="192.168.0.21", ttl=2,
> tos=4)/TCP(sport=22,dport=23)/Raw(load="X"*480)], iface="enp175s0f1",
> count=10)
> +
> +   check the packets,
> +   packet 1 to queue 1 of port 1, packet 2 to queue 6-7 of port 1, packet 3 to
> queue 6-7 of port 1,
> +   packet 4 to queue 2 of port 1, packet 5 dropped of port 1,
> +   packet 6 to dropped of port 0, packet 7 to queue 1 of port 0.
> +   packet 8 received by port 1.
> +
> +3. query count::
> +
> +    testpmd> flow query 1 0 count
> +    COUNT:
> +     hits_set: 1
> +     bytes_set: 0
> +     hits: 10
> +     bytes: 0
> +    testpmd> flow query 1 1 count
> +    COUNT:
> +     hits_set: 1
> +     bytes_set: 0
> +     hits: 10
> +     bytes: 0
> +    testpmd> flow query 1 2 count
> +    COUNT:
> +     hits_set: 1
> +     bytes_set: 0
> +     hits: 10
> +    testpmd> flow query 1 3 count
> +    COUNT:
> +     hits_set: 1
> +     bytes_set: 0
> +     hits: 10
> +     bytes: 0
> +    testpmd> flow query 1 4 count
> +    COUNT:
> +     hits_set: 1
> +     bytes_set: 0
> +     hits: 10
> +     bytes: 0
> +    testpmd> flow query 0 0 count
> +    COUNT:
> +     hits_set: 1
> +     bytes_set: 0
> +     hits: 10
> +    testpmd> flow query 0 1 count
> +    COUNT:
> +     hits_set: 1
> +     bytes_set: 0
> +     hits: 10
> +
> +4. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +    testpmd> flow list 1
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow flush 0
> +    testpmd> flow flush 1
> +
> +   verify matched packet are not distributed to same queue.
> +   check there is no rule listed::
> +
> +    testpmd> flow list 0
> +    testpmd> flow list 1
> +
> +Test case: max count
> +====================
> +
> +1. create 257 flows with count::
> +
> +    flow create 0 ingress pattern eth / ipv4 src is 192.168.0.1 / end actions
> drop / count / end
> +    flow create 0 ingress pattern eth / ipv4 src is 192.168.0.2 / end actions
> drop / count / end
> +    ……
> +    flow create 0 ingress pattern eth / ipv4 src is 192.168.1.1 / end actions
> drop / count / end
> +    flow create 0 ingress pattern eth / ipv4 src is 192.168.1.2 / end actions
> drop / count / end
> +
> +   the last one failed to create.
> +
> +2. send matched packets::
> +
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.1.1",dst="192.168.0.
> 21") / Raw('x' * 80)],iface="enp175s0f0", count=10)
> +
> +   check the packet dropped.
> +
> +3. query count::
> +
> +    testpmd> flow query 0 255 count
> +    COUNT:
> +     hits_set: 1
> +     bytes_set: 0
> +     hits: 10
> +     bytes: 0
> +
> +4. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow flush 0
> +
> +   verify matched packet are not dropped.
> +   check there is no rule listed.
> +
> +Test case: MAC_IPV4_PAY queue index mark
> +========================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 proto is 255 ttl is 2 tos is 4 / end actions
> queue index 1 / mark id 0 / end
> +
> +2. send 1 matched packet, check the packets are distributed to queue 1 with
> "FDIR matched ID=0x0" printed.
> +   send 1 mismatched packet, check the packets are not distributed to queue
> 1 without "FDIR matched" printed.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   verify matched packets are distributed to different queue without "FDIR
> matched" printed.
> +   Then check there is no rule listed.
> +
> +Test case: MAC_IPV4_UDP queue index mark
> +========================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 ttl is 2 tos is 4 / udp src is 22 dst is 23 / end
> actions queue index 0 / mark id 1 / end
> +
> +2. send 1 matched packet, check the packets are distributed to queue 0 with
> "FDIR matched ID=0x1" printed.
> +   send 1 mismatched packet, check the packets are not distributed to queue
> 0 without "FDIR matched" printed.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   verify matched packets are distributed to different queue without "FDIR
> matched" printed.
> +   Then check there is no rule listed.
> +
> +Test case: MAC_IPV4_TCP queue index mark
> +========================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 ttl is 2 tos is 4 / tcp src is 22 dst is 23 / end
> actions queue index 1 / mark id 4294967294 / end
> +
> +2. send 1 matched packet, check the packets are distributed to queue 1 with
> "FDIR matched ID=0xfffffffe" printed.
> +   send 1 mismatched packet, check the packets are not distributed to queue
> 1 without "FDIR matched" printed.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   verify matched packets are distributed to different queue without "FDIR
> matched" printed.
> +   Then check there is no rule listed.
> +
> +Test case: MAC_IPV4_SCTP drop mark
> +==================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 ttl is 2 tos is 4 / sctp src is 22 dst is 23 tag is 1
> / end actions drop / mark id 1 / end
> +
> +2. send 1 matched packet, check the packets are dropped.
> +   send 1 mismatched packet, check the packets are not dropped without
> "FDIR matched" printed.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   verify matched packets are distributed to different queue without "FDIR
> matched" printed.
> +   Then check there is no rule listed.
> +
> +Test case: MAC_IPV6_PAY queue index mark
> +========================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv6 dst is
> CDCD:910A:2222:5498:8475:1111:3900:2020 src is 2001::2 proto is 1 hop is 2
> tc is 1 / end actions queue index 1 / mark id 1 / end
> +
> +2. send 1 matched packet, check the packets are distributed to queue 1 with
> "FDIR matched ID=0x1" printed.
> +   send 1 mismatched packet, check the packets are not distributed to queue
> 1 without "FDIR matched" printed.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   verify matched packets are distributed to different queue without "FDIR
> matched" printed.
> +   Then check there is no rule listed.
> +
> +Test case: MAC_IPV6_UDP queue index mark
> +========================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv6 dst is
> CDCD:910A:2222:5498:8475:1111:3900:2020 src is 2001::2 hop is 2 tc is 1 /
> udp src is 22 dst is 23 / end actions queue index 1 / mark id 1 / end
> +
> +2. send 1 matched packet, check the packets are distributed to queue 1 with
> "FDIR matched ID=0x1" printed.
> +   send 1 mismatched packet, check the packets are not distributed to queue
> 1 without "FDIR matched" printed.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   verify matched packets are distributed to different queue without "FDIR
> matched" printed.
> +   Then check there is no rule listed.
> +
> +Test case: MAC_IPV6_TCP queue index mark
> +========================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv6 dst is
> CDCD:910A:2222:5498:8475:1111:3900:2020 src is 2001::2 hop is 2 tc is 1 / tcp
> src is 22 dst is 23 / end actions queue index 1 / mark id 1 / end
> +
> +2. send 1 matched packet, check the packets are distributed to queue 1 with
> "FDIR matched ID=0x1" printed.
> +   send 1 mismatched packet, check the packets are not distributed to queue
> 1 without "FDIR matched" printed.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   verify matched packets are distributed to different queue without "FDIR
> matched" printed.
> +   Then check there is no rule listed.
> +
> +Test case: MAC_IPV6_SCTP queue index mark
> +=========================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv6 dst is
> CDCD:910A:2222:5498:8475:1111:3900:2020 src is 2001::2 hop is 2 tc is 1 /
> sctp src is 22 dst is 23 / end actions queue index 1 / mark id 1 / end
> +
> +2. send 1 matched packet, check the packets are distributed to queue 1 with
> "FDIR matched ID=0x1" printed.
> +   send 1 mismatched packet, check the packets are not distributed to queue
> 1 without "FDIR matched" printed.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   verify matched packets are distributed to different queue without "FDIR
> matched" printed.
> +   Then check there is no rule listed.
> +
> +Test case: MAC_IPV4_TUN_IPV4_PAY queue index mark
> +=================================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth / ipv4 / udp / vxlan / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 / end actions queue index 1 / mark id 1 /
> end
> +
> +2. send 1 matched packet, check the packets are distributed to queue 1 with
> "FDIR matched ID=0x1" printed.
> +   send 1 mismatched packet, check the packets are not distributed to queue
> 1 without "FDIR matched" printed.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   verify matched packets are distributed to different queue without "FDIR
> matched" printed.
> +   Then check there is no rule listed.
> +
> +Test case: MAC_IPV4_TUN_IPV4_UDP queue group mark
> +=================================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth / ipv4 / udp / vxlan / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 / udp src is 22 dst is 23 / end actions rss
> queues 1 2 end / mark id 1 / end
> +
> +2. send 1 matched packet, check the packets are distributed to queue 1-2
> with "FDIR matched ID=0x1" printed.
> +   send 1 mismatched packet, check the packets are not distributed to queue
> 1-2 without "FDIR matched" printed.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   verify matched packets are distributed to different queue without "FDIR
> matched" printed.
> +   Then check there is no rule listed.
> +
> +Test case: MAC_IPV4_TUN_IPV4_TCP drop mark
> +==========================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth / ipv4 / udp / vxlan / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 / tcp src is 22 dst is 23 / end actions drop /
> mark id 1 / end
> +
> +2. send 1 matched packet, check the packets are dropped.
> +   send 1 mismatched packet, check the packets are not dropped without
> "FDIR matched" printed.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   verify matched packets are dropped without "FDIR matched" printed.
> +   Then check there is no rule listed.
> +
> +Test case: MAC_IPV4_TUN_IPV4_SCTP queue index mark
> +==================================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth / ipv4 / udp / vxlan / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 / sctp src is 22 dst is 23 / end actions queue
> index 1 / mark id 1 / end
> +
> +2. send 1 matched packet, check the packets are distributed to queue 1 with
> "FDIR matched ID=0x1" printed.
> +   send 1 mismatched packet, check the packets are not distributed to queue
> 1 without "FDIR matched" printed.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   verify matched packets are distributed to different queue without "FDIR
> matched" printed.
> +   Then check there is no rule listed.
> +
> +Test case: MAC_IPV4_TUN_MAC_IPV4_PAY queue index mark
> +=====================================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth / ipv4 / udp / vxlan / eth / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 / end actions queue index 1 / mark id 1 /
> end
> +
> +2. send 1 matched packet, check the packets are distributed to queue 1 with
> "FDIR matched ID=0x1" printed.
> +   send 1 mismatched packet, check the packets are not distributed to queue
> 1 without "FDIR matched" printed.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   verify matched packets are distributed to different queue without "FDIR
> matched" printed.
> +   Then check there is no rule listed.
> +
> +Test case: MAC_IPV4_TUN_MAC_IPV4_UDP queue index mark
> +=====================================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth / ipv4 / udp / vxlan / eth / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 / udp src is 22 dst is 23 / end actions queue
> index 1 / mark id 1 / end
> +
> +2. send 1 matched packet, check the packets are distributed to queue 1 with
> "FDIR matched ID=0x1" printed.
> +   send 1 mismatched packet, check the packets are not distributed to queue
> 1 without "FDIR matched" printed.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   verify matched packets are distributed to different queue without "FDIR
> matched" printed.
> +   Then check there is no rule listed.
> +
> +
> +Test case: MAC_IPV4_TUN_MAC_IPV4_TCP queue index mark
> +=====================================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth / ipv4 / udp / vxlan / eth / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 / tcp src is 22 dst is 23 / end actions queue
> index 1 / mark id 1 / end
> +
> +2. send 1 matched packet, check the packets are distributed to queue 1 with
> "FDIR matched ID=0x1" printed.
> +   send 1 mismatched packet, check the packets are not distributed to queue
> 1 without "FDIR matched" printed.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   verify matched packets are distributed to different queue without "FDIR
> matched" printed.
> +   Then check there is no rule listed.
> +
> +Test case: MAC_IPV4_TUN_MAC_IPV4_SCTP queue index mark
> +======================================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth / ipv4 / udp / vxlan / eth / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 / sctp src is 22 dst is 23 / end actions queue
> index 1 / mark id 1 / end
> +
> +2. send 1 matched packet, check the packets are distributed to queue 1 with
> "FDIR matched ID=0x1" printed.
> +   send 1 mismatched packet, check the packets are not distributed to queue
> 1 without "FDIR matched" printed.
> +
> +3. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check the existing rule.
> +   destroy the rule::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   verify matched packets are distributed to different queue without "FDIR
> matched" printed.
> +   Then check there is no rule listed.
> +
> +Test case: multirules mark
> +==========================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 ttl is 2 tos is 4 / udp src is 22 dst is 23 / end
> actions queue index 1 / mark id 1 / end
> +    flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 ttl is 2 tos is 4 / tcp src is 22 dst is 23 / end
> actions queue index 2 / mark id 1 / end
> +    flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv4 src is
> 192.168.0.20 dst is 192.168.0.21 ttl is 2 tos is 4 / sctp src is 22 dst is 23 / end
> actions queue index 1 / mark id 2 / count / end
> +
> +2. send matched packet::
> +
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.20",dst="192.168.0
> .21", ttl=2, tos=4) /UDP(sport=22,dport=23)/Raw('x' *
> 80)],iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.20",dst="192.168.0
> .21", ttl=2, tos=4) /TCP(sport=22,dport=23)/Raw('x' *
> 80)],iface="enp175s0f0")
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.20",dst="192.168.0
> .21", ttl=2, tos=4) /SCTP(sport=22,dport=23)/Raw('x' *
> 80)],iface="enp175s0f0")
> +
> +   check packet 1 to queue 1 with "FDIR matched ID=0x1" printed.
> +   packet 2 to queue 2 with "FDIR matched ID=0x1" printed.
> +   packet 3 to queue 1 with "FDIR matched ID=0x2" printed.
> +
> +3. query count::
> +
> +    testpmd> flow query 0 0 count
> +    COUNT:
> +     hits_set: 1
> +     bytes_set: 0
> +     hits: 1
> +     bytes: 0
> +
> +4. verify rules can be listed and destroyed::
> +
> +    testpmd> flow list 0
> +
> +   check 3 rules listed.
> +   destroy the rule 0::
> +
> +    testpmd> flow destroy 0 rule 0
> +
> +   verify packet 1 is distributed to different queue without "FDIR matched"
> printed.
> +   Then check there is 2 rules listed.
> +   packet 2 to queue 2 with "FDIR matched ID=0x1" printed.
> +   packet 3 to queue 1 with "FDIR matched ID=0x2" printed.
> +   query count::
> +
> +    testpmd> flow query 0 0 count
> +    COUNT:
> +     hits_set: 1
> +     bytes_set: 0
> +     hits: 2
> +     bytes: 0
> +
> +   flush rules::
> +
> +    testpmd> flow flush 0
> +
> +   verify matched packets are distributed to different queue without "FDIR
> matched" printed.
> +   Then check there is no rule listed, and no count exist.
> +
> +Test case: mark wrong parameters
> +================================
> +
> +1. create filter rules::
> +
> +    flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv4 src is
> 192.168.0.20 / end actions queue index 1 / mark id 4294967296 / end
> +
> +   the flow failed to be created.
> +
> +2. list the flow::
> +
> +    testpmd> flow list 0
> +
> +   Then check there is no rule listed.
> +
> +Test case: pattern conflict flow
> +================================
> +
> +MAC_IPV4_PAY and MAC_IPV4_UDP are conflict patterns.
> +so if create one, then create the other one, the second flow will be
> +set to switch filer.
> +IPV4_UDP packet can match MAC_IPV4_PAY rule.
> +but IPV4_PAY packet cannot match MAC_IPV4_UDP rule.
> +
> +1. set MAC_IPV4_PAY firstly::
> +
> +    flow create 0 ingress pattern eth / ipv4 dst is 192.168.0.21 / end actions
> queue index 1 / end
> +
> +   the first flow is set to fdir filter, send matched packet::
> +
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.20",dst="192.168.0
> .21")/Raw('x' * 80)],iface="enp175s0f0", count=10)
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.20",dst="192.168.0
> .21") /UDP(sport=22, dport=23)/ Raw('x' * 80)],iface="enp175s0f0", count=10)
> +
> +   the two type packets both to queue 1.
> +   then create MAC_IPV4_UDP flow, it is set to switch filer::
> +
> +    flow create 0 ingress pattern eth / ipv4 dst is 192.168.0.21 / udp src is 22
> dst is 23 / end actions queue index 2 / end
> +
> +   send same packets, IPV4_PAY packet to queue 1, IPV4_UDP packet to
> queue 2.
> +
> +2. set MAC_IPV4_UDP firstly::
> +
> +    flow create 0 ingress pattern eth / ipv4 dst is 192.168.0.21 / udp src is 22
> dst is 23 / end actions queue index 2 / end
> +
> +   send matched packet::
> +
> +
> sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.20",dst="192.168.0
> .21") /UDP(sport=22, dport=23)/ Raw('x' * 80)],iface="enp175s0f0", count=10)
> +
> +   packet to queue 2.
> +   then create MAC_IPV4_PAY flow::
> +
> +    flow create 0 ingress pattern eth / ipv4 dst is 192.168.0.21 / end actions
> queue index 1 / end
> +
> +   send same packet, packet to queue 1, because the packet match switch
> filter first.
> --
> 2.17.1


      reply	other threads:[~2019-12-27  6:13 UTC|newest]

Thread overview: 2+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2019-12-23  9:03 Peng Yuan
2019-12-27  6:13 ` Tu, Lijuan [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=8CE3E05A3F976642AAB0F4675D0AD20E0BB8ECE4@SHSMSX101.ccr.corp.intel.com \
    --to=lijuan.tu@intel.com \
    --cc=dts@dpdk.org \
    --cc=yuan.peng@intel.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).