2 * Copyright (c) 2015 Cisco and/or its affiliates.
3 * Licensed under the Apache License, Version 2.0 (the "License");
4 * you may not use this file except in compliance with the License.
5 * You may obtain a copy of the License at:
7 * http://www.apache.org/licenses/LICENSE-2.0
9 * Unless required by applicable law or agreed to in writing, software
10 * distributed under the License is distributed on an "AS IS" BASIS,
11 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 * See the License for the specific language governing permissions and
13 * limitations under the License.
16 * ip/icmp6.c: ip6 icmp
18 * Copyright (c) 2008 Eliot Dresselhaus
20 * Permission is hereby granted, free of charge, to any person obtaining
21 * a copy of this software and associated documentation files (the
22 * "Software"), to deal in the Software without restriction, including
23 * without limitation the rights to use, copy, modify, merge, publish,
24 * distribute, sublicense, and/or sell copies of the Software, and to
25 * permit persons to whom the Software is furnished to do so, subject to
26 * the following conditions:
28 * The above copyright notice and this permission notice shall be
29 * included in all copies or substantial portions of the Software.
31 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
32 * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
33 * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
34 * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
35 * LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
36 * OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
37 * WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
40 #include <vlib/vlib.h>
41 #include <vnet/ip/ip.h>
42 #include <vnet/pg/pg.h>
43 #include <vnet/ip/ip_sas.h>
46 format_ip6_icmp_type_and_code (u8 * s, va_list * args)
48 icmp6_type_t type = va_arg (*args, int);
49 u8 code = va_arg (*args, int);
52 #define _(n,f) case n: t = #f; break;
65 return format (s, "unknown 0x%x", type);
67 s = format (s, "%s", t);
70 switch ((type << 8) | code)
72 #define _(a,n,f) case (ICMP6_##a << 8) | (n): t = #f; break;
80 s = format (s, " %s", t);
86 format_icmp6_header (u8 * s, va_list * args)
88 icmp46_header_t *icmp = va_arg (*args, icmp46_header_t *);
89 u32 max_header_bytes = va_arg (*args, u32);
92 if (max_header_bytes < sizeof (icmp[0]))
93 return format (s, "ICMP header truncated");
95 s = format (s, "ICMP %U checksum 0x%x",
96 format_ip6_icmp_type_and_code, icmp->type, icmp->code,
97 clib_net_to_host_u16 (icmp->checksum));
99 if (max_header_bytes >=
100 sizeof (icmp6_neighbor_solicitation_or_advertisement_header_t) &&
101 (icmp->type == ICMP6_neighbor_solicitation ||
102 icmp->type == ICMP6_neighbor_advertisement))
104 icmp6_neighbor_solicitation_or_advertisement_header_t *icmp6_nd =
105 (icmp6_neighbor_solicitation_or_advertisement_header_t *) icmp;
106 s = format (s, "\n target address %U",
107 format_ip6_address, &icmp6_nd->target_address);
114 format_icmp6_input_trace (u8 * s, va_list * va)
116 CLIB_UNUSED (vlib_main_t * vm) = va_arg (*va, vlib_main_t *);
117 CLIB_UNUSED (vlib_node_t * node) = va_arg (*va, vlib_node_t *);
118 icmp6_input_trace_t *t = va_arg (*va, icmp6_input_trace_t *);
121 format_ip6_header, t->packet_data, sizeof (t->packet_data));
126 static char *icmp_error_strings[] = {
134 ICMP_INPUT_NEXT_PUNT,
140 uword *type_and_code_by_name;
144 /* Vector dispatch table indexed by [icmp type]. */
145 u8 input_next_index_by_type[256];
147 /* Max valid code indexed by icmp type. */
148 u8 max_valid_code_by_type[256];
150 /* hop_limit must be >= this value for this icmp type. */
151 u8 min_valid_hop_limit_by_type[256];
153 u8 min_valid_length_by_type[256];
156 icmp6_main_t icmp6_main;
159 ip6_icmp_input (vlib_main_t * vm,
160 vlib_node_runtime_t * node, vlib_frame_t * frame)
162 icmp6_main_t *im = &icmp6_main;
164 u32 n_left_from, n_left_to_next, next_index;
166 from = vlib_frame_vector_args (frame);
167 n_left_from = frame->n_vectors;
168 next_index = node->cached_next_index;
170 if (node->flags & VLIB_NODE_FLAG_TRACE)
171 vlib_trace_frame_buffers_only (vm, node, from, frame->n_vectors,
173 sizeof (icmp6_input_trace_t));
175 while (n_left_from > 0)
177 vlib_get_next_frame (vm, node, next_index, to_next, n_left_to_next);
179 while (n_left_from > 0 && n_left_to_next > 0)
183 icmp46_header_t *icmp0;
185 u32 bi0, next0, error0, len0;
187 bi0 = to_next[0] = from[0];
194 b0 = vlib_get_buffer (vm, bi0);
195 ip0 = vlib_buffer_get_current (b0);
196 icmp0 = ip6_next_header (ip0);
199 error0 = ICMP6_ERROR_NONE;
201 next0 = im->input_next_index_by_type[type0];
203 next0 == ICMP_INPUT_NEXT_PUNT ? ICMP6_ERROR_UNKNOWN_TYPE : error0;
205 /* Check code is valid for type. */
208 im->max_valid_code_by_type[type0] ?
209 ICMP6_ERROR_INVALID_CODE_FOR_TYPE : error0;
211 /* Checksum is already validated by ip6_local node so we don't need to check that. */
213 /* Check that hop limit == 255 for certain types. */
216 im->min_valid_hop_limit_by_type[type0] ?
217 ICMP6_ERROR_INVALID_HOP_LIMIT_FOR_TYPE : error0;
219 len0 = clib_net_to_host_u16 (ip0->payload_length);
222 im->min_valid_length_by_type[type0] ?
223 ICMP6_ERROR_LENGTH_TOO_SMALL_FOR_TYPE : error0;
225 b0->error = node->errors[error0];
227 next0 = error0 != ICMP6_ERROR_NONE ? ICMP_INPUT_NEXT_PUNT : next0;
229 vlib_validate_buffer_enqueue_x1 (vm, node, next_index,
230 to_next, n_left_to_next,
234 vlib_put_next_frame (vm, node, next_index, n_left_to_next);
237 return frame->n_vectors;
241 VLIB_REGISTER_NODE (ip6_icmp_input_node) = {
242 .function = ip6_icmp_input,
243 .name = "ip6-icmp-input",
245 .vector_size = sizeof (u32),
247 .format_trace = format_icmp6_input_trace,
249 .n_errors = ARRAY_LEN (icmp_error_strings),
250 .error_strings = icmp_error_strings,
254 [ICMP_INPUT_NEXT_PUNT] = "ip6-punt",
261 ICMP6_ECHO_REQUEST_NEXT_LOOKUP,
262 ICMP6_ECHO_REQUEST_NEXT_OUTPUT,
263 ICMP6_ECHO_REQUEST_N_NEXT,
264 } icmp6_echo_request_next_t;
267 ip6_icmp_echo_request (vlib_main_t * vm,
268 vlib_node_runtime_t * node, vlib_frame_t * frame)
271 u32 n_left_from, n_left_to_next, next_index;
272 ip6_main_t *im = &ip6_main;
274 from = vlib_frame_vector_args (frame);
275 n_left_from = frame->n_vectors;
276 next_index = node->cached_next_index;
278 if (node->flags & VLIB_NODE_FLAG_TRACE)
279 vlib_trace_frame_buffers_only (vm, node, from, frame->n_vectors,
281 sizeof (icmp6_input_trace_t));
283 while (n_left_from > 0)
285 vlib_get_next_frame (vm, node, next_index, to_next, n_left_to_next);
287 while (n_left_from > 2 && n_left_to_next > 2)
289 vlib_buffer_t *p0, *p1;
290 ip6_header_t *ip0, *ip1;
291 icmp46_header_t *icmp0, *icmp1;
292 ip6_address_t tmp0, tmp1;
293 ip_csum_t sum0, sum1;
295 u32 fib_index0, fib_index1;
296 u32 next0 = ICMP6_ECHO_REQUEST_NEXT_LOOKUP;
297 u32 next1 = ICMP6_ECHO_REQUEST_NEXT_LOOKUP;
299 bi0 = to_next[0] = from[0];
300 bi1 = to_next[1] = from[1];
307 p0 = vlib_get_buffer (vm, bi0);
308 p1 = vlib_get_buffer (vm, bi1);
309 ip0 = vlib_buffer_get_current (p0);
310 ip1 = vlib_buffer_get_current (p1);
311 icmp0 = ip6_next_header (ip0);
312 icmp1 = ip6_next_header (ip1);
314 /* Check icmp type to echo reply and update icmp checksum. */
315 sum0 = icmp0->checksum;
316 sum1 = icmp1->checksum;
318 ASSERT (icmp0->type == ICMP6_echo_request);
319 ASSERT (icmp1->type == ICMP6_echo_request);
320 sum0 = ip_csum_update (sum0, ICMP6_echo_request, ICMP6_echo_reply,
321 icmp46_header_t, type);
322 sum1 = ip_csum_update (sum1, ICMP6_echo_request, ICMP6_echo_reply,
323 icmp46_header_t, type);
325 icmp0->checksum = ip_csum_fold (sum0);
326 icmp1->checksum = ip_csum_fold (sum1);
328 icmp0->type = ICMP6_echo_reply;
329 icmp1->type = ICMP6_echo_reply;
331 /* Swap source and destination address. */
332 tmp0 = ip0->src_address;
333 tmp1 = ip1->src_address;
335 ip0->src_address = ip0->dst_address;
336 ip1->src_address = ip1->dst_address;
338 ip0->dst_address = tmp0;
339 ip1->dst_address = tmp1;
342 ip0->hop_limit = im->host_config.ttl;
343 ip1->hop_limit = im->host_config.ttl;
345 /* Determine the correct lookup fib indices... */
346 fib_index0 = vec_elt (im->fib_index_by_sw_if_index,
347 vnet_buffer (p0)->sw_if_index[VLIB_RX]);
348 vnet_buffer (p0)->sw_if_index[VLIB_TX] = fib_index0;
349 /* Determine the correct lookup fib indices... */
350 fib_index1 = vec_elt (im->fib_index_by_sw_if_index,
351 vnet_buffer (p1)->sw_if_index[VLIB_RX]);
352 vnet_buffer (p1)->sw_if_index[VLIB_TX] = fib_index1;
354 p0->flags |= VNET_BUFFER_F_LOCALLY_ORIGINATED;
355 p1->flags |= VNET_BUFFER_F_LOCALLY_ORIGINATED;
357 /* verify speculative enqueues, maybe switch current next frame */
358 /* if next0==next1==next_index then nothing special needs to be done */
359 vlib_validate_buffer_enqueue_x2 (vm, node, next_index,
360 to_next, n_left_to_next,
361 bi0, bi1, next0, next1);
364 while (n_left_from > 0 && n_left_to_next > 0)
368 icmp46_header_t *icmp0;
373 u32 next0 = ICMP6_ECHO_REQUEST_NEXT_LOOKUP;
375 bi0 = to_next[0] = from[0];
382 p0 = vlib_get_buffer (vm, bi0);
383 ip0 = vlib_buffer_get_current (p0);
384 icmp0 = ip6_next_header (ip0);
386 /* Check icmp type to echo reply and update icmp checksum. */
387 sum0 = icmp0->checksum;
389 ASSERT (icmp0->type == ICMP6_echo_request);
390 sum0 = ip_csum_update (sum0, ICMP6_echo_request, ICMP6_echo_reply,
391 icmp46_header_t, type);
393 icmp0->checksum = ip_csum_fold (sum0);
395 icmp0->type = ICMP6_echo_reply;
397 /* Swap source and destination address. */
398 tmp0 = ip0->src_address;
399 ip0->src_address = ip0->dst_address;
400 ip0->dst_address = tmp0;
402 ip0->hop_limit = im->host_config.ttl;
404 /* if the packet is link local, we'll bounce through the link-local
405 * table with the RX interface correctly set */
406 fib_index0 = vec_elt (im->fib_index_by_sw_if_index,
407 vnet_buffer (p0)->sw_if_index[VLIB_RX]);
408 vnet_buffer (p0)->sw_if_index[VLIB_TX] = fib_index0;
410 p0->flags |= VNET_BUFFER_F_LOCALLY_ORIGINATED;
411 /* Verify speculative enqueue, maybe switch current next frame */
412 vlib_validate_buffer_enqueue_x1 (vm, node, next_index,
413 to_next, n_left_to_next,
417 vlib_put_next_frame (vm, node, next_index, n_left_to_next);
420 vlib_error_count (vm, ip6_icmp_input_node.index,
421 ICMP6_ERROR_ECHO_REPLIES_SENT, frame->n_vectors);
423 return frame->n_vectors;
427 VLIB_REGISTER_NODE (ip6_icmp_echo_request_node,static) = {
428 .function = ip6_icmp_echo_request,
429 .name = "ip6-icmp-echo-request",
431 .vector_size = sizeof (u32),
433 .format_trace = format_icmp6_input_trace,
435 .n_next_nodes = ICMP6_ECHO_REQUEST_N_NEXT,
437 [ICMP6_ECHO_REQUEST_NEXT_LOOKUP] = "ip6-lookup",
438 [ICMP6_ECHO_REQUEST_NEXT_OUTPUT] = "interface-output",
445 IP6_ICMP_ERROR_NEXT_DROP,
446 IP6_ICMP_ERROR_NEXT_LOOKUP,
447 IP6_ICMP_ERROR_N_NEXT,
448 } ip6_icmp_error_next_t;
451 icmp6_error_set_vnet_buffer (vlib_buffer_t * b, u8 type, u8 code, u32 data)
453 vnet_buffer (b)->ip.icmp.type = type;
454 vnet_buffer (b)->ip.icmp.code = code;
455 vnet_buffer (b)->ip.icmp.data = data;
459 icmp6_icmp_type_to_error (u8 type)
463 case ICMP6_destination_unreachable:
464 return ICMP6_ERROR_DEST_UNREACH_SENT;
465 case ICMP6_packet_too_big:
466 return ICMP6_ERROR_PACKET_TOO_BIG_SENT;
467 case ICMP6_time_exceeded:
468 return ICMP6_ERROR_TTL_EXPIRE_SENT;
469 case ICMP6_parameter_problem:
470 return ICMP6_ERROR_PARAM_PROBLEM_SENT;
472 return ICMP6_ERROR_DROP;
477 ip6_icmp_error (vlib_main_t * vm,
478 vlib_node_runtime_t * node, vlib_frame_t * frame)
481 uword n_left_from, n_left_to_next;
482 ip6_icmp_error_next_t next_index;
484 from = vlib_frame_vector_args (frame);
485 n_left_from = frame->n_vectors;
486 next_index = node->cached_next_index;
488 if (node->flags & VLIB_NODE_FLAG_TRACE)
489 vlib_trace_frame_buffers_only (vm, node, from, frame->n_vectors,
491 sizeof (icmp6_input_trace_t));
493 while (n_left_from > 0)
495 vlib_get_next_frame (vm, node, next_index, to_next, n_left_to_next);
497 while (n_left_from > 0 && n_left_to_next > 0)
500 * Duplicate first buffer and free the original chain. Keep
501 * as much of the original packet as possible, within the
502 * minimum MTU. We chat "a little" here by keeping whatever
503 * is available in the first buffer.
507 u32 org_pi0 = from[0];
508 u32 next0 = IP6_ICMP_ERROR_NEXT_LOOKUP;
509 u8 error0 = ICMP6_ERROR_NONE;
510 vlib_buffer_t *p0, *org_p0;
511 ip6_header_t *ip0, *out_ip0;
512 icmp46_header_t *icmp0;
516 org_p0 = vlib_get_buffer (vm, org_pi0);
517 p0 = vlib_buffer_copy_no_chain (vm, org_p0, &pi0);
518 if (!p0 || pi0 == ~0) /* Out of buffers */
521 /* Speculatively enqueue p0 to the current next frame */
528 ip0 = vlib_buffer_get_current (p0);
529 sw_if_index0 = vnet_buffer (p0)->sw_if_index[VLIB_RX];
531 /* Add IP header and ICMPv6 header including a 4 byte data field */
532 vlib_buffer_advance (p0,
533 -(sizeof (ip6_header_t) +
534 sizeof (icmp46_header_t) + 4));
536 vnet_buffer (p0)->sw_if_index[VLIB_TX] = ~0;
537 p0->flags |= VNET_BUFFER_F_LOCALLY_ORIGINATED;
539 p0->current_length > 1280 ? 1280 : p0->current_length;
541 out_ip0 = vlib_buffer_get_current (p0);
542 icmp0 = (icmp46_header_t *) & out_ip0[1];
544 /* Fill ip header fields */
545 out_ip0->ip_version_traffic_class_and_flow_label =
546 clib_host_to_net_u32 (0x6 << 28);
548 out_ip0->payload_length =
549 clib_host_to_net_u16 (p0->current_length - sizeof (ip6_header_t));
550 out_ip0->protocol = IP_PROTOCOL_ICMP6;
551 out_ip0->hop_limit = 0xff;
552 out_ip0->dst_address = ip0->src_address;
553 /* Prefer a source address from "offending interface" */
554 if (!ip6_sas_by_sw_if_index (sw_if_index0, &out_ip0->dst_address,
555 &out_ip0->src_address))
556 { /* interface has no IP6 address - should not happen */
557 next0 = IP6_ICMP_ERROR_NEXT_DROP;
558 error0 = ICMP6_ERROR_DROP;
561 /* Fill icmp header fields */
562 icmp0->type = vnet_buffer (p0)->ip.icmp.type;
563 icmp0->code = vnet_buffer (p0)->ip.icmp.code;
564 *((u32 *) (icmp0 + 1)) =
565 clib_host_to_net_u32 (vnet_buffer (p0)->ip.icmp.data);
568 ip6_tcp_udp_icmp_compute_checksum (vm, p0, out_ip0,
571 /* Update error status */
572 if (error0 == ICMP6_ERROR_NONE)
573 error0 = icmp6_icmp_type_to_error (icmp0->type);
575 vlib_error_count (vm, node->node_index, error0, 1);
577 /* Verify speculative enqueue, maybe switch current next frame */
578 vlib_validate_buffer_enqueue_x1 (vm, node, next_index,
579 to_next, n_left_to_next,
582 vlib_put_next_frame (vm, node, next_index, n_left_to_next);
586 * push the original buffers to error-drop, so that
587 * they can get the error counters handled, then freed
589 vlib_buffer_enqueue_to_single_next (vm, node,
590 vlib_frame_vector_args (frame),
591 IP6_ICMP_ERROR_NEXT_DROP,
594 return frame->n_vectors;
598 VLIB_REGISTER_NODE (ip6_icmp_error_node) = {
599 .function = ip6_icmp_error,
600 .name = "ip6-icmp-error",
601 .vector_size = sizeof (u32),
603 .n_errors = ARRAY_LEN (icmp_error_strings),
604 .error_strings = icmp_error_strings,
606 .n_next_nodes = IP6_ICMP_ERROR_N_NEXT,
608 [IP6_ICMP_ERROR_NEXT_DROP] = "error-drop",
609 [IP6_ICMP_ERROR_NEXT_LOOKUP] = "ip6-lookup",
612 .format_trace = format_icmp6_input_trace,
618 unformat_icmp_type_and_code (unformat_input_t * input, va_list * args)
620 icmp46_header_t *h = va_arg (*args, icmp46_header_t *);
621 icmp6_main_t *cm = &icmp6_main;
624 if (unformat_user (input, unformat_vlib_number_by_name,
625 cm->type_and_code_by_name, &i))
627 h->type = (i >> 8) & 0xff;
628 h->code = (i >> 0) & 0xff;
630 else if (unformat_user (input, unformat_vlib_number_by_name,
631 cm->type_by_name, &i))
643 icmp6_pg_edit_function (pg_main_t * pg,
645 pg_edit_group_t * g, u32 * packets, u32 n_packets)
647 vlib_main_t *vm = vlib_get_main ();
648 u32 ip_offset, icmp_offset;
651 icmp_offset = g->start_byte_offset;
652 ip_offset = (g - 1)->start_byte_offset;
654 while (n_packets >= 1)
658 icmp46_header_t *icmp0;
660 p0 = vlib_get_buffer (vm, packets[0]);
664 ASSERT (p0->current_data == 0);
665 ip0 = (void *) (p0->data + ip_offset);
666 icmp0 = (void *) (p0->data + icmp_offset);
668 icmp0->checksum = ip6_tcp_udp_icmp_compute_checksum (vm, p0, ip0,
670 ASSERT (bogus_length == 0);
676 pg_edit_t type, code;
678 } pg_icmp46_header_t;
681 pg_icmp_header_init (pg_icmp46_header_t * p)
683 /* Initialize fields that are not bit fields in the IP header. */
684 #define _(f) pg_edit_init (&p->f, icmp46_header_t, f);
692 unformat_pg_icmp_header (unformat_input_t * input, va_list * args)
694 pg_stream_t *s = va_arg (*args, pg_stream_t *);
695 pg_icmp46_header_t *p;
698 p = pg_create_edit_group (s, sizeof (p[0]), sizeof (icmp46_header_t),
700 pg_icmp_header_init (p);
702 p->checksum.type = PG_EDIT_UNSPECIFIED;
707 if (!unformat (input, "ICMP %U", unformat_icmp_type_and_code, &tmp))
710 pg_edit_set_fixed (&p->type, tmp.type);
711 pg_edit_set_fixed (&p->code, tmp.code);
717 if (unformat (input, "checksum %U",
718 unformat_pg_edit, unformat_pg_number, &p->checksum))
721 /* Can't parse input: try next protocol level. */
726 if (!unformat_user (input, unformat_pg_payload, s))
729 if (p->checksum.type == PG_EDIT_UNSPECIFIED)
731 pg_edit_group_t *g = pg_stream_get_group (s, group_index);
732 g->edit_function = icmp6_pg_edit_function;
733 g->edit_function_opaque = 0;
739 /* Free up any edits we may have added. */
740 pg_free_edit_group (s);
745 icmp6_register_type (vlib_main_t * vm, icmp6_type_t type, u32 node_index)
747 icmp6_main_t *im = &icmp6_main;
749 ASSERT ((int) type < ARRAY_LEN (im->input_next_index_by_type));
750 im->input_next_index_by_type[type]
751 = vlib_node_add_next (vm, ip6_icmp_input_node.index, node_index);
754 static clib_error_t *
755 icmp6_init (vlib_main_t * vm)
757 ip_main_t *im = &ip_main;
758 ip_protocol_info_t *pi;
759 icmp6_main_t *cm = &icmp6_main;
762 error = vlib_call_init_function (vm, ip_main_init);
767 pi = ip_get_protocol_info (im, IP_PROTOCOL_ICMP6);
768 pi->format_header = format_icmp6_header;
769 pi->unformat_pg_edit = unformat_pg_icmp_header;
771 cm->type_by_name = hash_create_string (0, sizeof (uword));
772 #define _(n,t) hash_set_mem (cm->type_by_name, #t, (n));
776 cm->type_and_code_by_name = hash_create_string (0, sizeof (uword));
777 #define _(a,n,t) hash_set_mem (cm->type_by_name, #t, (n) | (ICMP6_##a << 8));
781 clib_memset (cm->input_next_index_by_type,
782 ICMP_INPUT_NEXT_PUNT, sizeof (cm->input_next_index_by_type));
783 clib_memset (cm->max_valid_code_by_type, 0,
784 sizeof (cm->max_valid_code_by_type));
786 #define _(a,n,t) cm->max_valid_code_by_type[ICMP6_##a] = clib_max (cm->max_valid_code_by_type[ICMP6_##a], n);
790 clib_memset (cm->min_valid_hop_limit_by_type, 0,
791 sizeof (cm->min_valid_hop_limit_by_type));
792 cm->min_valid_hop_limit_by_type[ICMP6_router_solicitation] = 255;
793 cm->min_valid_hop_limit_by_type[ICMP6_router_advertisement] = 255;
794 cm->min_valid_hop_limit_by_type[ICMP6_neighbor_solicitation] = 255;
795 cm->min_valid_hop_limit_by_type[ICMP6_neighbor_advertisement] = 255;
796 cm->min_valid_hop_limit_by_type[ICMP6_redirect] = 255;
798 clib_memset (cm->min_valid_length_by_type, sizeof (icmp46_header_t),
799 sizeof (cm->min_valid_length_by_type));
800 cm->min_valid_length_by_type[ICMP6_router_solicitation] =
801 sizeof (icmp6_neighbor_discovery_header_t);
802 cm->min_valid_length_by_type[ICMP6_router_advertisement] =
803 sizeof (icmp6_router_advertisement_header_t);
804 cm->min_valid_length_by_type[ICMP6_neighbor_solicitation] =
805 sizeof (icmp6_neighbor_solicitation_or_advertisement_header_t);
806 cm->min_valid_length_by_type[ICMP6_neighbor_advertisement] =
807 sizeof (icmp6_neighbor_solicitation_or_advertisement_header_t);
808 cm->min_valid_length_by_type[ICMP6_redirect] =
809 sizeof (icmp6_redirect_header_t);
811 icmp6_register_type (vm, ICMP6_echo_request,
812 ip6_icmp_echo_request_node.index);
817 VLIB_INIT_FUNCTION (icmp6_init);
820 * fd.io coding-style-patch-verification: ON
823 * eval: (c-set-style "gnu")