get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/2194944/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 2194944,
    "url": "http://patchwork.ozlabs.org/api/patches/2194944/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/ovn/patch/20260210092340.646445-2-amusil@redhat.com/",
    "project": {
        "id": 68,
        "url": "http://patchwork.ozlabs.org/api/projects/68/?format=api",
        "name": "Open Virtual Network development",
        "link_name": "ovn",
        "list_id": "ovs-dev.openvswitch.org",
        "list_email": "ovs-dev@openvswitch.org",
        "web_url": "http://openvswitch.org/",
        "scm_url": "",
        "webscm_url": "",
        "list_archive_url": "",
        "list_archive_url_format": "",
        "commit_url_format": ""
    },
    "msgid": "<20260210092340.646445-2-amusil@redhat.com>",
    "list_archive_url": null,
    "date": "2026-02-10T09:23:38",
    "name": "[ovs-dev,v7,1/3] lflow: Make the port security ND flows consistent with ARP flows.",
    "commit_ref": null,
    "pull_url": null,
    "state": "changes-requested",
    "archived": false,
    "hash": "7c820e1788b55010a610fe4b5d7618f6a05237c6",
    "submitter": {
        "id": 83634,
        "url": "http://patchwork.ozlabs.org/api/people/83634/?format=api",
        "name": "Ales Musil",
        "email": "amusil@redhat.com"
    },
    "delegate": {
        "id": 94943,
        "url": "http://patchwork.ozlabs.org/api/users/94943/?format=api",
        "username": "dceara",
        "first_name": "Dumitru",
        "last_name": "Ceara",
        "email": "dceara@redhat.com"
    },
    "mbox": "http://patchwork.ozlabs.org/project/ovn/patch/20260210092340.646445-2-amusil@redhat.com/mbox/",
    "series": [
        {
            "id": 491630,
            "url": "http://patchwork.ozlabs.org/api/series/491630/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/ovn/list/?series=491630",
            "date": "2026-02-10T09:23:37",
            "name": "Add support for VRRPv3 in port security.",
            "version": 7,
            "mbox": "http://patchwork.ozlabs.org/series/491630/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/patches/2194944/comments/",
    "check": "success",
    "checks": "http://patchwork.ozlabs.org/api/patches/2194944/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<ovs-dev-bounces@openvswitch.org>",
        "X-Original-To": [
            "incoming@patchwork.ozlabs.org",
            "dev@openvswitch.org"
        ],
        "Delivered-To": [
            "patchwork-incoming@legolas.ozlabs.org",
            "ovs-dev@lists.linuxfoundation.org"
        ],
        "Authentication-Results": [
            "legolas.ozlabs.org;\n\tdkim=fail reason=\"signature verification failed\" (1024-bit key;\n unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256\n header.s=mimecast20190719 header.b=LOAymlAs;\n\tdkim-atps=neutral",
            "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=openvswitch.org\n (client-ip=2605:bc80:3010::138; helo=smtp1.osuosl.org;\n envelope-from=ovs-dev-bounces@openvswitch.org; receiver=patchwork.ozlabs.org)",
            "smtp1.osuosl.org;\n\tdkim=fail reason=\"signature verification failed\" (1024-bit key)\n header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256\n header.s=mimecast20190719 header.b=LOAymlAs",
            "smtp1.osuosl.org; dmarc=pass (p=quarantine dis=none)\n header.from=redhat.com"
        ],
        "Received": [
            "from smtp1.osuosl.org (smtp1.osuosl.org [IPv6:2605:bc80:3010::138])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4f9GMz33Jjz1xwH\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 10 Feb 2026 20:23:59 +1100 (AEDT)",
            "from localhost (localhost [127.0.0.1])\n\tby smtp1.osuosl.org (Postfix) with ESMTP id 41BB283D89;\n\tTue, 10 Feb 2026 09:23:55 +0000 (UTC)",
            "from smtp1.osuosl.org ([127.0.0.1])\n by localhost (smtp1.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP\n id xAZpPA_XQVN6; Tue, 10 Feb 2026 09:23:53 +0000 (UTC)",
            "from lists.linuxfoundation.org (lf-lists.osuosl.org\n [IPv6:2605:bc80:3010:104::8cd3:938])\n\tby smtp1.osuosl.org (Postfix) with ESMTPS id 340BF83D50;\n\tTue, 10 Feb 2026 09:23:53 +0000 (UTC)",
            "from lf-lists.osuosl.org (localhost [127.0.0.1])\n\tby lists.linuxfoundation.org (Postfix) with ESMTP id B11D1C0782;\n\tTue, 10 Feb 2026 09:23:52 +0000 (UTC)",
            "from smtp1.osuosl.org (smtp1.osuosl.org [IPv6:2605:bc80:3010::138])\n by lists.linuxfoundation.org (Postfix) with ESMTP id 4814FC077E\n for <dev@openvswitch.org>; Tue, 10 Feb 2026 09:23:50 +0000 (UTC)",
            "from localhost (localhost [127.0.0.1])\n by smtp1.osuosl.org (Postfix) with ESMTP id 26949817A7\n for <dev@openvswitch.org>; Tue, 10 Feb 2026 09:23:50 +0000 (UTC)",
            "from smtp1.osuosl.org ([127.0.0.1])\n by localhost (smtp1.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP\n id hfhaQZ3pus7o for <dev@openvswitch.org>;\n Tue, 10 Feb 2026 09:23:48 +0000 (UTC)",
            "from us-smtp-delivery-124.mimecast.com\n (us-smtp-delivery-124.mimecast.com [170.10.129.124])\n by smtp1.osuosl.org (Postfix) with ESMTPS id 2E7C3813FF\n for <dev@openvswitch.org>; Tue, 10 Feb 2026 09:23:47 +0000 (UTC)",
            "from mx-prod-mc-03.mail-002.prod.us-west-2.aws.redhat.com\n (ec2-54-186-198-63.us-west-2.compute.amazonaws.com [54.186.198.63]) by\n relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3,\n cipher=TLS_AES_256_GCM_SHA384) id us-mta-617-ZFscaA6yPWiyyhlpevOCUg-1; Tue,\n 10 Feb 2026 04:23:44 -0500",
            "from mx-prod-int-03.mail-002.prod.us-west-2.aws.redhat.com\n (mx-prod-int-03.mail-002.prod.us-west-2.aws.redhat.com [10.30.177.12])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest\n SHA256)\n (No client certificate requested)\n by mx-prod-mc-03.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTPS\n id 024C51955E7C\n for <dev@openvswitch.org>; Tue, 10 Feb 2026 09:23:44 +0000 (UTC)",
            "from amusil.brq.redhat.com (unknown [10.43.17.233])\n by mx-prod-int-03.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTP\n id 2D5B019560A3; Tue, 10 Feb 2026 09:23:42 +0000 (UTC)"
        ],
        "X-Virus-Scanned": [
            "amavis at osuosl.org",
            "amavis at osuosl.org"
        ],
        "X-Comment": "SPF check N/A for local connections -\n client-ip=2605:bc80:3010:104::8cd3:938; helo=lists.linuxfoundation.org;\n envelope-from=ovs-dev-bounces@openvswitch.org; receiver=<UNKNOWN> ",
        "DKIM-Filter": [
            "OpenDKIM Filter v2.11.0 smtp1.osuosl.org 340BF83D50",
            "OpenDKIM Filter v2.11.0 smtp1.osuosl.org 2E7C3813FF"
        ],
        "Received-SPF": "Pass (mailfrom) identity=mailfrom; client-ip=170.10.129.124;\n helo=us-smtp-delivery-124.mimecast.com; envelope-from=amusil@redhat.com;\n receiver=<UNKNOWN>",
        "DMARC-Filter": "OpenDMARC Filter v1.4.2 smtp1.osuosl.org 2E7C3813FF",
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;\n s=mimecast20190719; t=1770715426;\n h=from:from:reply-to:subject:subject:date:date:message-id:message-id:\n to:to:cc:cc:mime-version:mime-version:content-type:content-type:\n content-transfer-encoding:content-transfer-encoding:\n in-reply-to:in-reply-to:references:references;\n bh=KGKy4Q2NbHBFoID27Vz8YlZfdzlpxOFqjak3LeT4L4w=;\n b=LOAymlAsx/HHMY4DKIzz7DxUZ/o/1QgZciXnzgKPga7mOFMurUG29jAcwd+Zu3a2c9frfz\n zFmChco0C7HBqmJhvGrSXUNMximwZAok/aLWa12qtYNXBGKEK0SDmZ3N71vmT5eKqaIS+g\n H90x3sqJCldAQ8ErbaMgaM42YMSWJ3w=",
        "X-MC-Unique": "ZFscaA6yPWiyyhlpevOCUg-1",
        "X-Mimecast-MFC-AGG-ID": "ZFscaA6yPWiyyhlpevOCUg_1770715424",
        "To": "dev@openvswitch.org",
        "Date": "Tue, 10 Feb 2026 10:23:38 +0100",
        "Message-ID": "<20260210092340.646445-2-amusil@redhat.com>",
        "In-Reply-To": "<20260210092340.646445-1-amusil@redhat.com>",
        "References": "<20260210092340.646445-1-amusil@redhat.com>",
        "MIME-Version": "1.0",
        "X-Scanned-By": "MIMEDefang 3.0 on 10.30.177.12",
        "X-Mimecast-Spam-Score": "0",
        "X-Mimecast-MFC-PROC-ID": "7uugnnyyfz800FDlM9a8q6A6bj0VynF5rIJqJazGxf0_1770715424",
        "X-Mimecast-Originator": "redhat.com",
        "Subject": "[ovs-dev] [PATCH ovn v7 1/3] lflow: Make the port security ND flows\n consistent with ARP flows.",
        "X-BeenThere": "ovs-dev@openvswitch.org",
        "X-Mailman-Version": "2.1.30",
        "Precedence": "list",
        "List-Id": "<ovs-dev.openvswitch.org>",
        "List-Unsubscribe": "<https://mail.openvswitch.org/mailman/options/ovs-dev>,\n <mailto:ovs-dev-request@openvswitch.org?subject=unsubscribe>",
        "List-Archive": "<http://mail.openvswitch.org/pipermail/ovs-dev/>",
        "List-Post": "<mailto:ovs-dev@openvswitch.org>",
        "List-Help": "<mailto:ovs-dev-request@openvswitch.org?subject=help>",
        "List-Subscribe": "<https://mail.openvswitch.org/mailman/listinfo/ovs-dev>,\n <mailto:ovs-dev-request@openvswitch.org?subject=subscribe>",
        "From": "Ales Musil via dev <ovs-dev@openvswitch.org>",
        "Reply-To": "Ales Musil <amusil@redhat.com>",
        "Content-Type": "text/plain; charset=\"us-ascii\"",
        "Content-Transfer-Encoding": "7bit",
        "Errors-To": "ovs-dev-bounces@openvswitch.org",
        "Sender": "\"dev\" <ovs-dev-bounces@openvswitch.org>"
    },
    "content": "The ARP packet would unconditionally move to the next stage\nto check if it's allowed unlike the ND packet which would be\nchecked against source MAC address before moving on. Make sure\nthat this is consistent and add generic flows for ND NA/NS to\nmove into next table too.\n\nSigned-off-by: Ales Musil <amusil@redhat.com>\n---\nv7: New addition.\n---\n controller/lflow.c | 46 +++++++++++++++++++++++++++++++---------------\n tests/ovn.at       | 18 ++++++++++++------\n 2 files changed, 43 insertions(+), 21 deletions(-)",
    "diff": "diff --git a/controller/lflow.c b/controller/lflow.c\nindex b6be5c630..049b6eaa9 100644\n--- a/controller/lflow.c\n+++ b/controller/lflow.c\n@@ -2418,6 +2418,37 @@ build_in_port_sec_default_flows(const struct sbrec_port_binding *pb,\n                     pb->header_.uuid.parts[0], m, ofpacts,\n                     &pb->header_.uuid);\n \n+    /* ND checking is done in the next table. So just advance\n+     * the arp packets to the next table.\n+     *\n+     * Add the below logical flow equivalent OF rules in 'in_port_sec_nd' table\n+     * priority: 95\n+     * match - \"inport == pb->logical_port && icmp6 && icmp6.code == 135\"\n+     * action - \"resubmit(,PORT_SEC_ND_TABLE);\"\n+     */\n+    match_set_dl_type(m, htons(ETH_TYPE_IPV6));\n+    match_set_nw_proto(m, IPPROTO_ICMPV6);\n+    match_set_nw_ttl(m, 255);\n+    match_set_icmp_type(m, 135);\n+    build_port_sec_adv_nd_check(ofpacts);\n+    ofctrl_add_flow(flow_table, OFTABLE_CHK_IN_PORT_SEC, 95,\n+                    pb->header_.uuid.parts[0], m, ofpacts,\n+                    &pb->header_.uuid);\n+\n+    /* Add the below logical flow equivalent OF rules in 'in_port_sec_nd' table\n+     * priority: 95\n+     * match - \"inport == pb->logical_port && icmp6 && icmp6.code == 136\"\n+     * action - \"resubmit(,PORT_SEC_ND_TABLE);\"\n+     */\n+    match_set_dl_type(m, htons(ETH_TYPE_IPV6));\n+    match_set_nw_proto(m, IPPROTO_ICMPV6);\n+    match_set_nw_ttl(m, 255);\n+    match_set_icmp_type(m, 136);\n+    build_port_sec_adv_nd_check(ofpacts);\n+    ofctrl_add_flow(flow_table, OFTABLE_CHK_IN_PORT_SEC, 95,\n+                    pb->header_.uuid.parts[0], m, ofpacts,\n+                    &pb->header_.uuid);\n+\n     /* Add the below logical flow equivalent OF rules in 'in_port_sec_nd' table\n      * priority: 80\n      * match - \"inport == pb->logical_port && arp\"\n@@ -2693,21 +2724,6 @@ build_in_port_sec_ip6_flows(const struct sbrec_port_binding *pb,\n     ofctrl_add_flow(flow_table, OFTABLE_CHK_IN_PORT_SEC, 90,\n                     pb->header_.uuid.parts[0], m, ofpacts,\n                     &pb->header_.uuid);\n-\n-    /* Add the below logical flow equivalent OF rules in 'in_port_sec_nd'\n-     * table.\n-     * priority: 90\n-     * match - \"inport == pb->port && eth.src == ps_addr.ea &&\n-     *          ip6.src == :: && ip6.dst == ff02::/16 && icmp6 &&\n-     *          icmp6.code == 0 && icmp6.type == 135\"\n-     * action - \"next;\"\n-     * description: \"Advance the packet for Neighbor solicit check\"\n-     */\n-    build_port_sec_adv_nd_check(ofpacts);\n-    match_set_icmp_type(m, 135);\n-    ofctrl_add_flow(flow_table, OFTABLE_CHK_IN_PORT_SEC, 90,\n-                    pb->header_.uuid.parts[0], m, ofpacts,\n-                    &pb->header_.uuid);\n }\n \n /* Adds the OF rules to allow IPv6 Neigh discovery packet in\ndiff --git a/tests/ovn.at b/tests/ovn.at\nindex 802e6d0da..6a4efef97 100644\n--- a/tests/ovn.at\n+++ b/tests/ovn.at\n@@ -36005,7 +36005,9 @@ check ovn-nbctl --wait=hv lsp-set-port-security sw0p1 \"00:00:00:00:00:03\"\n \n echo \" table=OFTABLE_CHK_IN_PORT_SEC, priority=80,reg14=0x$sw0p1_key,metadata=0x$sw0_dp_key actions=load:0x1->NXM_NX_REG10[[12]]\n  table=OFTABLE_CHK_IN_PORT_SEC, priority=90,reg14=0x$sw0p1_key,metadata=0x$sw0_dp_key,dl_src=00:00:00:00:00:03 actions=resubmit(,OFTABLE_CHK_IN_PORT_SEC_ND)\n- table=OFTABLE_CHK_IN_PORT_SEC, priority=95,arp,reg14=0x$sw0p1_key,metadata=0x$sw0_dp_key actions=resubmit(,OFTABLE_CHK_IN_PORT_SEC_ND)\" > hv1_t${in_port_sec}_flows.expected\n+ table=OFTABLE_CHK_IN_PORT_SEC, priority=95,arp,reg14=0x$sw0p1_key,metadata=0x$sw0_dp_key actions=resubmit(,OFTABLE_CHK_IN_PORT_SEC_ND)\n+ table=OFTABLE_CHK_IN_PORT_SEC, priority=95,icmp6,reg14=0x$sw0p1_key,metadata=0x$sw0_dp_key,nw_ttl=255,icmp_type=135 actions=resubmit(,OFTABLE_CHK_IN_PORT_SEC_ND)\n+ table=OFTABLE_CHK_IN_PORT_SEC, priority=95,icmp6,reg14=0x$sw0p1_key,metadata=0x$sw0_dp_key,nw_ttl=255,icmp_type=136 actions=resubmit(,OFTABLE_CHK_IN_PORT_SEC_ND)\" > hv1_t${in_port_sec}_flows.expected\n \n check_port_sec_offlows hv1 OFTABLE_CHK_IN_PORT_SEC\n \n@@ -36041,7 +36043,9 @@ echo \" table=OFTABLE_CHK_IN_PORT_SEC, priority=80,reg14=0x$sw0p1_key,metadata=0x\n  table=OFTABLE_CHK_IN_PORT_SEC, priority=90,ip,reg14=0x$sw0p1_key,metadata=0x1,dl_src=00:00:00:00:00:13,nw_src=10.0.0.13 actions=load:0->NXM_NX_REG10[[12]]\n  table=OFTABLE_CHK_IN_PORT_SEC, priority=90,udp,reg14=0x$sw0p1_key,metadata=0x1,dl_src=00:00:00:00:00:03,nw_src=0.0.0.0,nw_dst=255.255.255.255,tp_src=68,tp_dst=67 actions=load:0->NXM_NX_REG10[[12]]\n  table=OFTABLE_CHK_IN_PORT_SEC, priority=90,udp,reg14=0x$sw0p1_key,metadata=0x1,dl_src=00:00:00:00:00:13,nw_src=0.0.0.0,nw_dst=255.255.255.255,tp_src=68,tp_dst=67 actions=load:0->NXM_NX_REG10[[12]]\n- table=OFTABLE_CHK_IN_PORT_SEC, priority=95,arp,reg14=0x$sw0p1_key,metadata=0x1 actions=resubmit(,OFTABLE_CHK_IN_PORT_SEC_ND)\" > hv1_t${in_port_sec}_flows.expected\n+ table=OFTABLE_CHK_IN_PORT_SEC, priority=95,arp,reg14=0x$sw0p1_key,metadata=0x1 actions=resubmit(,OFTABLE_CHK_IN_PORT_SEC_ND)\n+ table=OFTABLE_CHK_IN_PORT_SEC, priority=95,icmp6,reg14=0x$sw0p1_key,metadata=0x$sw0_dp_key,nw_ttl=255,icmp_type=135 actions=resubmit(,OFTABLE_CHK_IN_PORT_SEC_ND)\n+ table=OFTABLE_CHK_IN_PORT_SEC, priority=95,icmp6,reg14=0x$sw0p1_key,metadata=0x$sw0_dp_key,nw_ttl=255,icmp_type=136 actions=resubmit(,OFTABLE_CHK_IN_PORT_SEC_ND)\" > hv1_t${in_port_sec}_flows.expected\n \n check_port_sec_offlows hv1 OFTABLE_CHK_IN_PORT_SEC\n \n@@ -36106,10 +36110,8 @@ check_port_sec_offlows hv1 OFTABLE_CHK_OUT_PORT_SEC\n #hv2 ovn-controller should program flows.\n echo \" table=OFTABLE_CHK_IN_PORT_SEC, priority=80,reg14=0x$sw0p2_key,metadata=0x1 actions=load:0x1->NXM_NX_REG10[[12]]\n  table=OFTABLE_CHK_IN_PORT_SEC, priority=90,icmp6,reg14=0x$sw0p2_key,metadata=0x1,dl_src=00:00:00:00:00:04,ipv6_src=::,ipv6_dst=ff02::/16,icmp_type=131,icmp_code=0 actions=load:0->NXM_NX_REG10[[12]]\n- table=OFTABLE_CHK_IN_PORT_SEC, priority=90,icmp6,reg14=0x$sw0p2_key,metadata=0x1,dl_src=00:00:00:00:00:04,ipv6_src=::,ipv6_dst=ff02::/16,icmp_type=135,icmp_code=0 actions=resubmit(,OFTABLE_CHK_IN_PORT_SEC_ND)\n  table=OFTABLE_CHK_IN_PORT_SEC, priority=90,icmp6,reg14=0x$sw0p2_key,metadata=0x1,dl_src=00:00:00:00:00:04,ipv6_src=::,ipv6_dst=ff02::/16,icmp_type=143,icmp_code=0 actions=load:0->NXM_NX_REG10[[12]]\n  table=OFTABLE_CHK_IN_PORT_SEC, priority=90,icmp6,reg14=0x$sw0p2_key,metadata=0x1,dl_src=00:00:00:00:00:13,ipv6_src=::,ipv6_dst=ff02::/16,icmp_type=131,icmp_code=0 actions=load:0->NXM_NX_REG10[[12]]\n- table=OFTABLE_CHK_IN_PORT_SEC, priority=90,icmp6,reg14=0x$sw0p2_key,metadata=0x1,dl_src=00:00:00:00:00:13,ipv6_src=::,ipv6_dst=ff02::/16,icmp_type=135,icmp_code=0 actions=resubmit(,OFTABLE_CHK_IN_PORT_SEC_ND)\n  table=OFTABLE_CHK_IN_PORT_SEC, priority=90,icmp6,reg14=0x$sw0p2_key,metadata=0x1,dl_src=00:00:00:00:00:13,ipv6_src=::,ipv6_dst=ff02::/16,icmp_type=143,icmp_code=0 actions=load:0->NXM_NX_REG10[[12]]\n  table=OFTABLE_CHK_IN_PORT_SEC, priority=90,ip,reg14=0x$sw0p2_key,metadata=0x1,dl_src=00:00:00:00:00:04,nw_src=10.0.0.4 actions=load:0->NXM_NX_REG10[[12]]\n  table=OFTABLE_CHK_IN_PORT_SEC, priority=90,ip,reg14=0x$sw0p2_key,metadata=0x1,dl_src=00:00:00:00:00:04,nw_src=20.0.0.4 actions=load:0->NXM_NX_REG10[[12]]\n@@ -36120,7 +36122,9 @@ echo \" table=OFTABLE_CHK_IN_PORT_SEC, priority=80,reg14=0x$sw0p2_key,metadata=0x\n  table=OFTABLE_CHK_IN_PORT_SEC, priority=90,ipv6,reg14=0x$sw0p2_key,metadata=0x1,dl_src=00:00:00:00:00:13,ipv6_src=aef0::4 actions=resubmit(,OFTABLE_CHK_IN_PORT_SEC_ND)\n  table=OFTABLE_CHK_IN_PORT_SEC, priority=90,ipv6,reg14=0x$sw0p2_key,metadata=0x1,dl_src=00:00:00:00:00:13,ipv6_src=fe80::200:ff:fe00:13 actions=resubmit(,OFTABLE_CHK_IN_PORT_SEC_ND)\n  table=OFTABLE_CHK_IN_PORT_SEC, priority=90,udp,reg14=0x$sw0p2_key,metadata=0x1,dl_src=00:00:00:00:00:04,nw_src=0.0.0.0,nw_dst=255.255.255.255,tp_src=68,tp_dst=67 actions=load:0->NXM_NX_REG10[[12]]\n- table=OFTABLE_CHK_IN_PORT_SEC, priority=95,arp,reg14=0x$sw0p2_key,metadata=0x1 actions=resubmit(,OFTABLE_CHK_IN_PORT_SEC_ND)\" > hv2_t${in_port_sec}_flows.expected\n+ table=OFTABLE_CHK_IN_PORT_SEC, priority=95,arp,reg14=0x$sw0p2_key,metadata=0x1 actions=resubmit(,OFTABLE_CHK_IN_PORT_SEC_ND)\n+ table=OFTABLE_CHK_IN_PORT_SEC, priority=95,icmp6,reg14=0x$sw0p2_key,metadata=0x$sw0_dp_key,nw_ttl=255,icmp_type=135 actions=resubmit(,OFTABLE_CHK_IN_PORT_SEC_ND)\n+ table=OFTABLE_CHK_IN_PORT_SEC, priority=95,icmp6,reg14=0x$sw0p2_key,metadata=0x$sw0_dp_key,nw_ttl=255,icmp_type=136 actions=resubmit(,OFTABLE_CHK_IN_PORT_SEC_ND)\" > hv2_t${in_port_sec}_flows.expected\n \n check_port_sec_offlows hv2 OFTABLE_CHK_IN_PORT_SEC\n \n@@ -36192,7 +36196,9 @@ check_port_sec_offlows hv1 OFTABLE_CHK_OUT_PORT_SEC\n \n echo \" table=OFTABLE_CHK_IN_PORT_SEC, priority=80,reg14=0x$sw0p2_key,metadata=0x1 actions=load:0x1->NXM_NX_REG10[[12]]\n  table=OFTABLE_CHK_IN_PORT_SEC, priority=90,reg14=0x$sw0p2_key,metadata=0x1,dl_src=00:00:00:00:00:04 actions=resubmit(,OFTABLE_CHK_IN_PORT_SEC_ND)\n- table=OFTABLE_CHK_IN_PORT_SEC, priority=95,arp,reg14=0x$sw0p2_key,metadata=0x1 actions=resubmit(,OFTABLE_CHK_IN_PORT_SEC_ND)\" >  hv2_t${in_port_sec}_flows.expected\n+ table=OFTABLE_CHK_IN_PORT_SEC, priority=95,arp,reg14=0x$sw0p2_key,metadata=0x1 actions=resubmit(,OFTABLE_CHK_IN_PORT_SEC_ND)\n+ table=OFTABLE_CHK_IN_PORT_SEC, priority=95,icmp6,reg14=0x$sw0p2_key,metadata=0x$sw0_dp_key,nw_ttl=255,icmp_type=135 actions=resubmit(,OFTABLE_CHK_IN_PORT_SEC_ND)\n+ table=OFTABLE_CHK_IN_PORT_SEC, priority=95,icmp6,reg14=0x$sw0p2_key,metadata=0x$sw0_dp_key,nw_ttl=255,icmp_type=136 actions=resubmit(,OFTABLE_CHK_IN_PORT_SEC_ND)\" >  hv2_t${in_port_sec}_flows.expected\n \n check_port_sec_offlows hv2 OFTABLE_CHK_IN_PORT_SEC\n \n",
    "prefixes": [
        "ovs-dev",
        "v7",
        "1/3"
    ]
}