get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/1561700/
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 1561700,
    "url": "http://patchwork.ozlabs.org/api/patches/1561700/",
    "web_url": "http://patchwork.ozlabs.org/project/openvswitch/patch/20211130150013.6610-2-david.marchand@redhat.com/",
    "project": {
        "id": 47,
        "url": "http://patchwork.ozlabs.org/api/projects/47/",
        "name": "Open vSwitch",
        "link_name": "openvswitch",
        "list_id": "ovs-dev.openvswitch.org",
        "list_email": "ovs-dev@openvswitch.org",
        "web_url": "http://openvswitch.org/",
        "scm_url": "git@github.com:openvswitch/ovs.git",
        "webscm_url": "https://github.com/openvswitch/ovs",
        "list_archive_url": "",
        "list_archive_url_format": "",
        "commit_url_format": ""
    },
    "msgid": "<20211130150013.6610-2-david.marchand@redhat.com>",
    "list_archive_url": null,
    "date": "2021-11-30T15:00:11",
    "name": "[ovs-dev,v3,2/4] system-dpdk: Use dummy-pmd port for packet injection.",
    "commit_ref": null,
    "pull_url": null,
    "state": "superseded",
    "archived": false,
    "hash": "96910e95fa01acfc341bbb55e35f89980743483e",
    "submitter": {
        "id": 75396,
        "url": "http://patchwork.ozlabs.org/api/people/75396/",
        "name": "David Marchand",
        "email": "david.marchand@redhat.com"
    },
    "delegate": null,
    "mbox": "http://patchwork.ozlabs.org/project/openvswitch/patch/20211130150013.6610-2-david.marchand@redhat.com/mbox/",
    "series": [
        {
            "id": 274454,
            "url": "http://patchwork.ozlabs.org/api/series/274454/",
            "web_url": "http://patchwork.ozlabs.org/project/openvswitch/list/?series=274454",
            "date": "2021-11-30T15:00:10",
            "name": "[ovs-dev,v3,1/4] system-dpdk: Refactor common logs matching.",
            "version": 3,
            "mbox": "http://patchwork.ozlabs.org/series/274454/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/patches/1561700/comments/",
    "check": "success",
    "checks": "http://patchwork.ozlabs.org/api/patches/1561700/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<ovs-dev-bounces@openvswitch.org>",
        "X-Original-To": [
            "incoming@patchwork.ozlabs.org",
            "dev@openvswitch.org"
        ],
        "Delivered-To": [
            "patchwork-incoming@bilbo.ozlabs.org",
            "ovs-dev@lists.linuxfoundation.org"
        ],
        "Authentication-Results": [
            "bilbo.ozlabs.org;\n\tdkim=fail reason=\"signature verification failed\" (1024-bit key;\n unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256\n header.s=mimecast20190719 header.b=U7wBTCVH;\n\tdkim-atps=neutral",
            "ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=openvswitch.org\n (client-ip=2605:bc80:3010::138; helo=smtp1.osuosl.org;\n envelope-from=ovs-dev-bounces@openvswitch.org; receiver=<UNKNOWN>)",
            "smtp4.osuosl.org (amavisd-new);\n dkim=pass (1024-bit key) header.d=redhat.com",
            "relay.mimecast.com;\n auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=david.marchand@redhat.com"
        ],
        "Received": [
            "from smtp1.osuosl.org (smtp1.osuosl.org [IPv6:2605:bc80:3010::138])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest\n SHA256)\n\t(No client certificate requested)\n\tby bilbo.ozlabs.org (Postfix) with ESMTPS id 4J3QSP69x7z9sRK\n\tfor <incoming@patchwork.ozlabs.org>; Wed,  1 Dec 2021 02:02:45 +1100 (AEDT)",
            "from localhost (localhost [127.0.0.1])\n\tby smtp1.osuosl.org (Postfix) with ESMTP id 70531827BB;\n\tTue, 30 Nov 2021 15:02:43 +0000 (UTC)",
            "from smtp1.osuosl.org ([127.0.0.1])\n\tby localhost (smtp1.osuosl.org [127.0.0.1]) (amavisd-new, port 10024)\n\twith ESMTP id NiMhDlEyYTSk; Tue, 30 Nov 2021 15:02:42 +0000 (UTC)",
            "from lists.linuxfoundation.org (lf-lists.osuosl.org\n [IPv6:2605:bc80:3010:104::8cd3:938])\n\tby smtp1.osuosl.org (Postfix) with ESMTPS id 2DD878269C;\n\tTue, 30 Nov 2021 15:02:41 +0000 (UTC)",
            "from lf-lists.osuosl.org (localhost [127.0.0.1])\n\tby lists.linuxfoundation.org (Postfix) with ESMTP id 0DF3FC002F;\n\tTue, 30 Nov 2021 15:02:41 +0000 (UTC)",
            "from smtp4.osuosl.org (smtp4.osuosl.org [IPv6:2605:bc80:3010::137])\n by lists.linuxfoundation.org (Postfix) with ESMTP id 784ECC000A\n for <dev@openvswitch.org>; Tue, 30 Nov 2021 15:02:39 +0000 (UTC)",
            "from localhost (localhost [127.0.0.1])\n by smtp4.osuosl.org (Postfix) with ESMTP id 2B2AF405F1\n for <dev@openvswitch.org>; Tue, 30 Nov 2021 15:02:29 +0000 (UTC)",
            "from smtp4.osuosl.org ([127.0.0.1])\n by localhost (smtp4.osuosl.org [127.0.0.1]) (amavisd-new, port 10024)\n with ESMTP id 0DLOPB8V4ped for <dev@openvswitch.org>;\n Tue, 30 Nov 2021 15:02:28 +0000 (UTC)",
            "from us-smtp-delivery-124.mimecast.com\n (us-smtp-delivery-124.mimecast.com [170.10.129.124])\n by smtp4.osuosl.org (Postfix) with ESMTPS id DF1184063E\n for <dev@openvswitch.org>; Tue, 30 Nov 2021 15:02:27 +0000 (UTC)",
            "from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com\n [209.132.183.4]) by relay.mimecast.com with ESMTP with STARTTLS\n (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id\n us-mta-73-2ZUdZxYDMr-2gv4eV52DXA-1; Tue, 30 Nov 2021 10:02:19 -0500",
            "from smtp.corp.redhat.com (int-mx08.intmail.prod.int.phx2.redhat.com\n [10.5.11.23])\n (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits))\n (No client certificate requested)\n by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 4F883839A44;\n Tue, 30 Nov 2021 15:02:18 +0000 (UTC)",
            "from dmarchan.remote.csb (unknown [10.39.195.207])\n by smtp.corp.redhat.com (Postfix) with ESMTP id D47AD19724;\n Tue, 30 Nov 2021 15:01:32 +0000 (UTC)"
        ],
        "X-Virus-Scanned": [
            "amavisd-new at osuosl.org",
            "amavisd-new at osuosl.org"
        ],
        "X-Greylist": "domain auto-whitelisted by SQLgrey-1.8.0",
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;\n s=mimecast20190719; t=1638284546;\n h=from:from:reply-to:subject:subject:date:date:message-id:message-id:\n to:to:cc:cc:mime-version:mime-version:content-type:content-type:\n content-transfer-encoding:content-transfer-encoding:\n in-reply-to:in-reply-to:references:references;\n bh=+7PCoHElSiCfaPShFbE2qrxKUtajf6fgqw58Et1EBwY=;\n b=U7wBTCVHCKBSiWhuGOO3gf8Kn/SCUnFHyvsVDV6AY6T8WBXUgFCPNeFOlPvP1JFqFCKtYi\n RdOMnn0oZ9oS5KbHbbdQr15nZADjXEE34eSOjXN0JwHkIQ6fyl3pw6YvNCgd5R/yDuUwcR\n n0Te9iDw9j71wG5Qu+VdKNRN4ddQYlY=",
        "X-MC-Unique": "2ZUdZxYDMr-2gv4eV52DXA-1",
        "From": "David Marchand <david.marchand@redhat.com>",
        "To": "dev@openvswitch.org",
        "Date": "Tue, 30 Nov 2021 16:00:11 +0100",
        "Message-Id": "<20211130150013.6610-2-david.marchand@redhat.com>",
        "In-Reply-To": "<20211130150013.6610-1-david.marchand@redhat.com>",
        "References": "<20211130150013.6610-1-david.marchand@redhat.com>",
        "MIME-Version": "1.0",
        "X-Scanned-By": "MIMEDefang 2.84 on 10.5.11.23",
        "X-Mimecast-Spam-Score": "0",
        "X-Mimecast-Originator": "redhat.com",
        "Cc": "i.maximets@ovn.org, fbl@sysclose.org, maxime.coquelin@redhat.com,\n kumar.amber@intel.com",
        "Subject": "[ovs-dev] [PATCH v3 2/4] system-dpdk: Use dummy-pmd port for packet\n\tinjection.",
        "X-BeenThere": "ovs-dev@openvswitch.org",
        "X-Mailman-Version": "2.1.15",
        "Precedence": "list",
        "List-Id": "<ovs-dev.openvswitch.org>",
        "List-Unsubscribe": "<https://mail.openvswitch.org/mailman/options/ovs-dev>,\n <mailto:ovs-dev-request@openvswitch.org?subject=unsubscribe>",
        "List-Archive": "<http://mail.openvswitch.org/pipermail/ovs-dev/>",
        "List-Post": "<mailto:ovs-dev@openvswitch.org>",
        "List-Help": "<mailto:ovs-dev-request@openvswitch.org?subject=help>",
        "List-Subscribe": "<https://mail.openvswitch.org/mailman/listinfo/ovs-dev>,\n <mailto:ovs-dev-request@openvswitch.org?subject=subscribe>",
        "Content-Type": "text/plain; charset=\"us-ascii\"",
        "Content-Transfer-Encoding": "7bit",
        "Errors-To": "ovs-dev-bounces@openvswitch.org",
        "Sender": "\"dev\" <ovs-dev-bounces@openvswitch.org>"
    },
    "content": "net_pcap is not always available in DPDK (like, in a dev\nenvironment when you forgot to install the libpcap-devel).\nOn the other hand, OVS already has its own way to inject packets into a\nbridge. Let's make use of it.\n\nThis solution is slower than net/pcap DPDK, so lower the number of\nexpected packets so that it runs in OVS_CTL_TIMEOUT seconds.\n\nWhile at it, convert \"known\" packets from pcap to scapy so that the\ninjected packets can be updated without having to read/write a pcap file.\n\nNote: this change also (avoids/) fixes a python exception in PcapWriter\nwith scapy 2.4.3 that comes from EPEL.\n\nSuggested-by: Ilya Maximets <i.maximets@ovn.org>\nSigned-off-by: David Marchand <david.marchand@redhat.com>\n---\nChanges since v2:\n- updated documentation,\n- cleaned tests/automake.mk,\n- fixed shebang in python script,\n- added missing check for scapy availability,\n\nChanges since v1:\n- renamed generator script,\n- decreased packet count for fuzzy test,\n- simplified wait expression for packet count,\n\n---\n Documentation/topics/dpdk/bridge.rst |   7 ++--\n tests/automake.mk                    |   7 +---\n tests/genpkts.py                     |  56 +++++++++++++++++++++++++++\n tests/mfex_fuzzy.py                  |  32 ---------------\n tests/pcap/mfex_test.pcap            | Bin 416 -> 0 bytes\n tests/system-dpdk-macros.at          |   4 +-\n tests/system-dpdk.at                 |  33 +++++++++++++---\n 7 files changed, 89 insertions(+), 50 deletions(-)\n create mode 100755 tests/genpkts.py\n delete mode 100755 tests/mfex_fuzzy.py\n delete mode 100644 tests/pcap/mfex_test.pcap",
    "diff": "diff --git a/Documentation/topics/dpdk/bridge.rst b/Documentation/topics/dpdk/bridge.rst\nindex f645b9ade5..648ce203eb 100644\n--- a/Documentation/topics/dpdk/bridge.rst\n+++ b/Documentation/topics/dpdk/bridge.rst\n@@ -408,7 +408,7 @@ Fuzzy tests can also be done on miniflow extract with the help of\n auto-validator and Scapy. The steps below describes the steps to\n reproduce the setup with IP being fuzzed to generate packets.\n \n-Scapy is used to create fuzzy IP packets and save them into a PCAP ::\n+Scapy is used to create fuzzy IP packets (see tests/genpkts.py) ::\n \n     pkt = fuzz(Ether()/IP()/TCP())\n \n@@ -418,9 +418,8 @@ Set the miniflow extract to autovalidator using ::\n \n OVS is configured to receive the generated packets ::\n \n-    $ ovs-vsctl add-port br0 pcap0 -- \\\n-        set Interface pcap0 type=dpdk options:dpdk-devargs=net_pcap0\n-        \"rx_pcap=fuzzy.pcap\"\n+    $ ovs-vsctl add-port br0 p1 -- \\\n+        set Interface p1 type=dummy-pmd\n \n With this workflow, the autovalidator will ensure that all MFEX\n implementations are classifying each packet in exactly the same way.\ndiff --git a/tests/automake.mk b/tests/automake.mk\nindex 43731d0973..3bc74a5aff 100644\n--- a/tests/automake.mk\n+++ b/tests/automake.mk\n@@ -143,11 +143,6 @@ $(srcdir)/tests/fuzz-regression-list.at: tests/automake.mk\n \t    echo \"TEST_FUZZ_REGRESSION([$$basename])\"; \\\n \tdone > $@.tmp && mv $@.tmp $@\n \n-EXTRA_DIST += $(MFEX_AUTOVALIDATOR_TESTS)\n-MFEX_AUTOVALIDATOR_TESTS = \\\n-\ttests/pcap/mfex_test.pcap \\\n-\ttests/mfex_fuzzy.py\n-\n OVSDB_CLUSTER_TESTSUITE_AT = \\\n \ttests/ovsdb-cluster-testsuite.at \\\n \ttests/ovsdb-execution.at \\\n@@ -518,7 +513,7 @@ tests_test_type_props_SOURCES = tests/test-type-props.c\n CHECK_PYFILES = \\\n \ttests/appctl.py \\\n \ttests/flowgen.py \\\n-\ttests/mfex_fuzzy.py \\\n+\ttests/genpkts.py \\\n \ttests/ovsdb-monitor-sort.py \\\n \ttests/test-daemon.py \\\n \ttests/test-json.py \\\ndiff --git a/tests/genpkts.py b/tests/genpkts.py\nnew file mode 100755\nindex 0000000000..f64f786ccb\n--- /dev/null\n+++ b/tests/genpkts.py\n@@ -0,0 +1,56 @@\n+#!/usr/bin/env python3\n+\n+import sys\n+\n+from scapy.all import RandMAC, RandIP, RandIP6, RandShort, fuzz\n+from scapy.all import IPv6, Dot1Q, IP, Ether, UDP, TCP\n+\n+if len(sys.argv) < 2:\n+    print('usage: {} packets_count [fuzz]'.format(sys.argv[0]))\n+    sys.exit(1)\n+\n+tmpl = []\n+\n+if len(sys.argv) == 2:\n+    eth = Ether(dst='ff:ff:ff:ff:ff:ff')\n+    vlan = eth / Dot1Q(vlan=1)\n+    p = eth / IP() / TCP(sport=20, dport=80, flags='SA', window=8192)\n+    tmpl += [p.build().hex()]\n+    p = eth / IP() / UDP(sport=53, dport=53)\n+    tmpl += [p.build().hex()]\n+    p = eth / IP() / TCP(sport=20, dport=80, flags='S', window=8192)\n+    tmpl += [p.build().hex()]\n+    p = eth / IP() / UDP(sport=53, dport=53)\n+    tmpl += [p.build().hex()]\n+    p = vlan / IP() / UDP(sport=53, dport=53)\n+    tmpl += [p.build().hex()]\n+    p = vlan / IP() / TCP(sport=20, dport=80, flags='S', window=8192)\n+    tmpl += [p.build().hex()]\n+elif sys.argv[2] == 'fuzz':\n+    # Generate random protocol bases, use a fuzz() over the combined packet\n+    # for full fuzzing.\n+    eth = Ether(src=RandMAC(), dst=RandMAC())\n+    vlan = Dot1Q()\n+    ipv4 = IP(src=RandIP(), dst=RandIP())\n+    ipv6 = IPv6(src=RandIP6(), dst=RandIP6())\n+    udp = UDP(dport=RandShort(), sport=RandShort())\n+    tcp = TCP(dport=RandShort(), sport=RandShort())\n+\n+    # IPv4 packets with fuzzing\n+    tmpl += [fuzz(eth / ipv4 / udp).build().hex()]\n+    tmpl += [fuzz(eth / ipv4 / tcp).build().hex()]\n+    tmpl += [fuzz(eth / vlan / ipv4 / udp).build().hex()]\n+    tmpl += [fuzz(eth / vlan / ipv4 / tcp).build().hex()]\n+\n+    # IPv6 packets with fuzzing\n+    tmpl += [fuzz(eth / ipv6 / udp).build().hex()]\n+    tmpl += [fuzz(eth / ipv6 / tcp).build().hex()]\n+    tmpl += [fuzz(eth / vlan / ipv6 / udp).build().hex()]\n+    tmpl += [fuzz(eth / vlan / ipv6 / tcp).build().hex()]\n+\n+i = 0\n+count = int(sys.argv[1])\n+while count != 0:\n+    print(tmpl[i % len(tmpl)])\n+    i += 1\n+    count -= 1\ndiff --git a/tests/mfex_fuzzy.py b/tests/mfex_fuzzy.py\ndeleted file mode 100755\nindex 3efe1152da..0000000000\n--- a/tests/mfex_fuzzy.py\n+++ /dev/null\n@@ -1,32 +0,0 @@\n-#!/usr/bin/python3\n-\n-import sys\n-\n-from scapy.all import RandMAC, RandIP, PcapWriter, RandIP6, RandShort, fuzz\n-from scapy.all import IPv6, Dot1Q, IP, Ether, UDP, TCP\n-\n-path = str(sys.argv[1]) + \"/pcap/fuzzy.pcap\"\n-pktdump = PcapWriter(path, append=False, sync=True)\n-\n-for i in range(0, 2000):\n-\n-    # Generate random protocol bases, use a fuzz() over the combined packet\n-    # for full fuzzing.\n-    eth = Ether(src=RandMAC(), dst=RandMAC())\n-    vlan = Dot1Q()\n-    ipv4 = IP(src=RandIP(), dst=RandIP())\n-    ipv6 = IPv6(src=RandIP6(), dst=RandIP6())\n-    udp = UDP(dport=RandShort(), sport=RandShort())\n-    tcp = TCP(dport=RandShort(), sport=RandShort())\n-\n-    # IPv4 packets with fuzzing\n-    pktdump.write(fuzz(eth / ipv4 / udp))\n-    pktdump.write(fuzz(eth / ipv4 / tcp))\n-    pktdump.write(fuzz(eth / vlan / ipv4 / udp))\n-    pktdump.write(fuzz(eth / vlan / ipv4 / tcp))\n-\n-    # IPv6 packets with fuzzing\n-    pktdump.write(fuzz(eth / ipv6 / udp))\n-    pktdump.write(fuzz(eth / ipv6 / tcp))\n-    pktdump.write(fuzz(eth / vlan / ipv6 / udp))\n-    pktdump.write(fuzz(eth / vlan / ipv6 / tcp))\ndiff --git a/tests/pcap/mfex_test.pcap b/tests/pcap/mfex_test.pcap\ndeleted file mode 100644\nindex 1aac67b8d643ecb016c758cba4cc32212a80f52a..0000000000000000000000000000000000000000\nGIT binary patch\nliteral 0\nHcmV?d00001\n\nliteral 416\nzcmca|c+)~A1{MYw`2U}Qff2}Q<eHVR>K`M68ITRa|G@yFii5$Gfk6YL%z>@uY&}o|\nz2s4N<1VH2&7y^V87$)XGOtD~MV$cFgfG~zBGGJ2#YtF$<F=a4i;9x8Q*<ZrSM6Ufz\nxK>KST_NTIwYriok6N4Vm)gX-Q@<yO<!C`>c^{cp<7_5LgK^UuU{2>VS0RZ!RQ+EIW\n\ndiff --git a/tests/system-dpdk-macros.at b/tests/system-dpdk-macros.at\nindex ef0e84e939..5a6b3cbff9 100644\n--- a/tests/system-dpdk-macros.at\n+++ b/tests/system-dpdk-macros.at\n@@ -37,7 +37,7 @@ m4_define([OVS_DPDK_PRE_PHY_SKIP],\n #\n # Create an empty database and start ovsdb-server. Add special configuration\n # dpdk-init to enable DPDK functionality. Start ovs-vswitchd connected to that\n-# database using system devices (no dummies).\n+# database using system devices.\n #\n m4_define([OVS_DPDK_START],\n   [dnl Create database.\n@@ -62,7 +62,7 @@ m4_define([OVS_DPDK_START],\n    AT_CHECK([ovs-vsctl --no-wait set Open_vSwitch . other_config:dpdk-extra=--log-level=pmd.*:error])\n \n    dnl Start ovs-vswitchd.\n-   AT_CHECK([ovs-vswitchd --detach --no-chdir --pidfile --log-file -vvconn -vofproto_dpif -vunixctl], [0], [stdout], [stderr])\n+   AT_CHECK([ovs-vswitchd --enable-dummy --detach --no-chdir --pidfile --log-file -vvconn -vofproto_dpif -vunixctl], [0], [stdout], [stderr])\n    AT_CAPTURE_FILE([ovs-vswitchd.log])\n    on_exit \"kill_ovs_vswitchd `cat ovs-vswitchd.pid`\"\n ])\ndiff --git a/tests/system-dpdk.at b/tests/system-dpdk.at\nindex 9c8f4bb15a..73c58030b1 100644\n--- a/tests/system-dpdk.at\n+++ b/tests/system-dpdk.at\n@@ -224,22 +224,29 @@ dnl --------------------------------------------------------------------------\n dnl Add standard DPDK PHY port\n AT_SETUP([OVS-DPDK - MFEX Autovalidator])\n AT_KEYWORDS([dpdk])\n+AT_SKIP_IF([! $PYTHON3 -c \"import scapy\"], [], [])\n \n OVS_DPDK_START()\n \n dnl Add userspace bridge and attach it to OVS\n AT_CHECK([ovs-vsctl add-br br0 -- set bridge br0 datapath_type=netdev])\n-AT_CHECK([ovs-vsctl add-port br0 p1 -- set Interface p1 type=dpdk options:dpdk-devargs=net_pcap1,rx_pcap=$srcdir/pcap/mfex_test.pcap,infinite_rx=1], [], [stdout], [stderr])\n+AT_CHECK([ovs-vsctl add-port br0 p1 -- set interface p1 type=dummy-pmd])\n AT_CHECK([ovs-vsctl show], [], [stdout])\n \n AT_SKIP_IF([! ovs-appctl dpif-netdev/miniflow-parser-get | sed 1,4d | grep \"True\"], [], [dnl\n ])\n \n+on_exit \"pkill -f -x -9 '$PYTHON3 $srcdir/genpkts.py -1'\"\n+($PYTHON3 $srcdir/genpkts.py -1 | while read pkt; do\n+     ovs-appctl netdev-dummy/receive p1 \"$pkt\" || break\n+ done) &\n+\n AT_CHECK([ovs-appctl dpif-netdev/miniflow-parser-set autovalidator], [0], [dnl\n Miniflow extract implementation set to autovalidator.\n ])\n \n-OVS_WAIT_UNTIL([test `ovs-vsctl get interface p1 statistics | grep -oP 'rx_packets=\\s*\\K\\d+'` -ge 1000])\n+OVS_WAIT_UNTIL([test `ovs-vsctl get interface p1 statistics:rx_packets` -ge 1000])\n+pkill -f -x -9 '$PYTHON3 $srcdir/genpkts.py -1'\n \n dnl Clean up\n AT_CHECK([ovs-vsctl del-port br0 p1], [], [stdout], [stderr])\n@@ -252,22 +259,27 @@ dnl Add standard DPDK PHY port\n AT_SETUP([OVS-DPDK - MFEX Autovalidator Fuzzy])\n AT_KEYWORDS([dpdk])\n AT_SKIP_IF([! $PYTHON3 -c \"import scapy\"], [], [])\n-AT_CHECK([$PYTHON3 $srcdir/mfex_fuzzy.py $srcdir], [], [stdout])\n OVS_DPDK_START()\n \n dnl Add userspace bridge and attach it to OVS\n AT_CHECK([ovs-vsctl add-br br0 -- set bridge br0 datapath_type=netdev])\n-AT_CHECK([ovs-vsctl add-port br0 p1 -- set Interface p1 type=dpdk options:dpdk-devargs=net_pcap1,rx_pcap=$srcdir/pcap/fuzzy.pcap,infinite_rx=1], [], [stdout], [stderr])\n+AT_CHECK([ovs-vsctl add-port br0 p1 -- set interface p1 type=dummy-pmd])\n AT_CHECK([ovs-vsctl show], [], [stdout])\n \n AT_SKIP_IF([! ovs-appctl dpif-netdev/miniflow-parser-get | sed 1,4d | grep \"True\"], [], [dnl\n ])\n \n+on_exit \"pkill -f -x -9 '$PYTHON3 $srcdir/genpkts.py -1 fuzz'\"\n+($PYTHON3 $srcdir/genpkts.py -1 fuzz | while read pkt; do\n+     ovs-appctl netdev-dummy/receive p1 \"$pkt\" || break\n+ done) &\n+\n AT_CHECK([ovs-appctl dpif-netdev/miniflow-parser-set autovalidator], [0], [dnl\n Miniflow extract implementation set to autovalidator.\n ])\n \n-OVS_WAIT_UNTIL([test `ovs-vsctl get interface p1 statistics | grep -oP 'rx_packets=\\s*\\K\\d+'` -ge 100000])\n+OVS_WAIT_UNTIL([test `ovs-vsctl get interface p1 statistics:rx_packets` -ge 1000])\n+pkill -f -x -9 '$PYTHON3 $srcdir/genpkts.py -1 fuzz'\n \n dnl Clean up\n AT_CHECK([ovs-vsctl del-port br0 p1], [], [stdout], [stderr])\n@@ -278,13 +290,20 @@ dnl --------------------------------------------------------------------------\n dnl --------------------------------------------------------------------------\n AT_SETUP([OVS-DPDK - MFEX Configuration])\n AT_KEYWORDS([dpdk])\n+AT_SKIP_IF([! $PYTHON3 -c \"import scapy\"], [], [])\n+\n OVS_DPDK_START()\n AT_CHECK([ovs-vsctl --no-wait set Open_vSwitch . other_config:pmd-cpu-mask=0xC])\n dnl Add userspace bridge and attach it to OVS\n AT_CHECK([ovs-vsctl add-br br0 -- set bridge br0 datapath_type=netdev])\n-AT_CHECK([ovs-vsctl add-port br0 p1 -- set Interface p1 type=dpdk options:dpdk-devargs=net_pcap1,rx_pcap=$srcdir/pcap/mfex_test.pcap,infinite_rx=1], [], [stdout], [stderr])\n+AT_CHECK([ovs-vsctl add-port br0 p1 -- set interface p1 type=dummy-pmd])\n AT_CHECK([ovs-vsctl show], [], [stdout])\n \n+on_exit \"pkill -f -x -9 '$PYTHON3 $srcdir/genpkts.py -1'\"\n+($PYTHON3 $srcdir/genpkts.py -1 | while read pkt; do\n+     ovs-appctl netdev-dummy/receive p1 \"$pkt\" || break\n+ done) &\n+\n AT_CHECK([ovs-appctl dpif-netdev/miniflow-parser-set scalar 1], [2],\n [], [dnl\n Error: unknown argument 1.\n@@ -377,6 +396,8 @@ Error: invalid study_pkt_cnt value: -pmd.\n ovs-appctl: ovs-vswitchd: server returned an error\n ])\n \n+pkill -f -x -9 '$PYTHON3 $srcdir/genpkts.py -1'\n+\n dnl Clean up\n AT_CHECK([ovs-vsctl del-port br0 p1], [], [stdout], [stderr])\n OVS_VSWITCHD_STOP(\"m4_join([], [SYSTEM_DPDK_ALLOWED_LOGS], [\n",
    "prefixes": [
        "ovs-dev",
        "v3",
        "2/4"
    ]
}