blob: 46a3889da3d783f97501cd6890f5f4bc53436f9b
1 | /* vi: set sw=4 ts=4: */ |
2 | /* |
3 | * Mini ping implementation for busybox |
4 | * |
5 | * Copyright (C) 1999 by Randolph Chung <tausq@debian.org> |
6 | * |
7 | * Adapted from the ping in netkit-base 0.10: |
8 | * Copyright (c) 1989 The Regents of the University of California. |
9 | * All rights reserved. |
10 | * |
11 | * This code is derived from software contributed to Berkeley by |
12 | * Mike Muuss. |
13 | * |
14 | * Licensed under GPLv2 or later, see file LICENSE in this source tree. |
15 | */ |
16 | /* from ping6.c: |
17 | * Copyright (C) 1999 by Randolph Chung <tausq@debian.org> |
18 | * |
19 | * This version of ping is adapted from the ping in netkit-base 0.10, |
20 | * which is: |
21 | * |
22 | * Original copyright notice is retained at the end of this file. |
23 | * |
24 | * This version is an adaptation of ping.c from busybox. |
25 | * The code was modified by Bart Visscher <magick@linux-fan.com> |
26 | */ |
27 | |
28 | #include <net/if.h> |
29 | #include <netinet/ip_icmp.h> |
30 | #include "libbb.h" |
31 | |
32 | #ifdef __BIONIC__ |
33 | /* should be in netinet/ip_icmp.h */ |
34 | # define ICMP_DEST_UNREACH 3 /* Destination Unreachable */ |
35 | # define ICMP_SOURCE_QUENCH 4 /* Source Quench */ |
36 | # define ICMP_REDIRECT 5 /* Redirect (change route) */ |
37 | # define ICMP_ECHO 8 /* Echo Request */ |
38 | # define ICMP_TIME_EXCEEDED 11 /* Time Exceeded */ |
39 | # define ICMP_PARAMETERPROB 12 /* Parameter Problem */ |
40 | # define ICMP_TIMESTAMP 13 /* Timestamp Request */ |
41 | # define ICMP_TIMESTAMPREPLY 14 /* Timestamp Reply */ |
42 | # define ICMP_INFO_REQUEST 15 /* Information Request */ |
43 | # define ICMP_INFO_REPLY 16 /* Information Reply */ |
44 | # define ICMP_ADDRESS 17 /* Address Mask Request */ |
45 | # define ICMP_ADDRESSREPLY 18 /* Address Mask Reply */ |
46 | #endif |
47 | |
48 | //config:config PING |
49 | //config: bool "ping" |
50 | //config: default y |
51 | //config: select PLATFORM_LINUX |
52 | //config: help |
53 | //config: ping uses the ICMP protocol's mandatory ECHO_REQUEST datagram to |
54 | //config: elicit an ICMP ECHO_RESPONSE from a host or gateway. |
55 | //config: |
56 | //config:config PING6 |
57 | //config: bool "ping6" |
58 | //config: default y |
59 | //config: depends on FEATURE_IPV6 && PING |
60 | //config: help |
61 | //config: This will give you a ping that can talk IPv6. |
62 | //config: |
63 | //config:config FEATURE_FANCY_PING |
64 | //config: bool "Enable fancy ping output" |
65 | //config: default y |
66 | //config: depends on PING |
67 | //config: help |
68 | //config: Make the output from the ping applet include statistics, and at the |
69 | //config: same time provide full support for ICMP packets. |
70 | |
71 | /* Needs socket(AF_INET, SOCK_RAW, IPPROTO_ICMP), therefore BB_SUID_MAYBE: */ |
72 | //applet:IF_PING(APPLET(ping, BB_DIR_BIN, BB_SUID_MAYBE)) |
73 | //applet:IF_PING6(APPLET(ping6, BB_DIR_BIN, BB_SUID_MAYBE)) |
74 | |
75 | //kbuild:lib-$(CONFIG_PING) += ping.o |
76 | //kbuild:lib-$(CONFIG_PING6) += ping.o |
77 | |
78 | //usage:#if !ENABLE_FEATURE_FANCY_PING |
79 | //usage:# define ping_trivial_usage |
80 | //usage: "HOST" |
81 | //usage:# define ping_full_usage "\n\n" |
82 | //usage: "Send ICMP ECHO_REQUEST packets to network hosts" |
83 | //usage:# define ping6_trivial_usage |
84 | //usage: "HOST" |
85 | //usage:# define ping6_full_usage "\n\n" |
86 | //usage: "Send ICMP ECHO_REQUEST packets to network hosts" |
87 | //usage:#else |
88 | //usage:# define ping_trivial_usage |
89 | //usage: "[OPTIONS] HOST" |
90 | //usage:# define ping_full_usage "\n\n" |
91 | //usage: "Send ICMP ECHO_REQUEST packets to network hosts\n" |
92 | //usage: IF_PING6( |
93 | //usage: "\n -4,-6 Force IP or IPv6 name resolution" |
94 | //usage: ) |
95 | //usage: "\n -c CNT Send only CNT pings" |
96 | //usage: "\n -s SIZE Send SIZE data bytes in packets (default:56)" |
97 | //usage: "\n -t TTL Set TTL" |
98 | //usage: "\n -I IFACE/IP Use interface or IP address as source" |
99 | //usage: "\n -W SEC Seconds to wait for the first response (default:10)" |
100 | //usage: "\n (after all -c CNT packets are sent)" |
101 | //usage: "\n -w SEC Seconds until ping exits (default:infinite)" |
102 | //usage: "\n (can exit earlier with -c CNT)" |
103 | //usage: "\n -q Quiet, only displays output at start" |
104 | //usage: "\n and when finished" |
105 | //usage: |
106 | //usage:# define ping6_trivial_usage |
107 | //usage: "[OPTIONS] HOST" |
108 | //usage:# define ping6_full_usage "\n\n" |
109 | //usage: "Send ICMP ECHO_REQUEST packets to network hosts\n" |
110 | //usage: "\n -c CNT Send only CNT pings" |
111 | //usage: "\n -s SIZE Send SIZE data bytes in packets (default:56)" |
112 | //usage: "\n -I IFACE/IP Use interface or IP address as source" |
113 | //usage: "\n -q Quiet, only displays output at start" |
114 | //usage: "\n and when finished" |
115 | //usage: |
116 | //usage:#endif |
117 | //usage: |
118 | //usage:#define ping_example_usage |
119 | //usage: "$ ping localhost\n" |
120 | //usage: "PING slag (127.0.0.1): 56 data bytes\n" |
121 | //usage: "64 bytes from 127.0.0.1: icmp_seq=0 ttl=255 time=20.1 ms\n" |
122 | //usage: "\n" |
123 | //usage: "--- debian ping statistics ---\n" |
124 | //usage: "1 packets transmitted, 1 packets received, 0% packet loss\n" |
125 | //usage: "round-trip min/avg/max = 20.1/20.1/20.1 ms\n" |
126 | //usage:#define ping6_example_usage |
127 | //usage: "$ ping6 ip6-localhost\n" |
128 | //usage: "PING ip6-localhost (::1): 56 data bytes\n" |
129 | //usage: "64 bytes from ::1: icmp6_seq=0 ttl=64 time=20.1 ms\n" |
130 | //usage: "\n" |
131 | //usage: "--- ip6-localhost ping statistics ---\n" |
132 | //usage: "1 packets transmitted, 1 packets received, 0% packet loss\n" |
133 | //usage: "round-trip min/avg/max = 20.1/20.1/20.1 ms\n" |
134 | |
135 | #if ENABLE_PING6 |
136 | # include <netinet/icmp6.h> |
137 | /* I see RENUMBERED constants in bits/in.h - !!? |
138 | * What a fuck is going on with libc? Is it a glibc joke? */ |
139 | # ifdef IPV6_2292HOPLIMIT |
140 | # undef IPV6_HOPLIMIT |
141 | # define IPV6_HOPLIMIT IPV6_2292HOPLIMIT |
142 | # endif |
143 | #endif |
144 | |
145 | enum { |
146 | DEFDATALEN = 56, |
147 | MAXIPLEN = 60, |
148 | MAXICMPLEN = 76, |
149 | MAX_DUP_CHK = (8 * 128), |
150 | MAXWAIT = 10, |
151 | PINGINTERVAL = 1, /* 1 second */ |
152 | pingsock = 0, |
153 | }; |
154 | |
155 | static void |
156 | #if ENABLE_PING6 |
157 | create_icmp_socket(len_and_sockaddr *lsa) |
158 | #else |
159 | create_icmp_socket(void) |
160 | #define create_icmp_socket(lsa) create_icmp_socket() |
161 | #endif |
162 | { |
163 | int sock; |
164 | #if ENABLE_PING6 |
165 | if (lsa->u.sa.sa_family == AF_INET6) |
166 | sock = socket(AF_INET6, SOCK_RAW, IPPROTO_ICMPV6); |
167 | else |
168 | #endif |
169 | sock = socket(AF_INET, SOCK_RAW, 1); /* 1 == ICMP */ |
170 | if (sock < 0) { |
171 | if (errno != EPERM) |
172 | bb_perror_msg_and_die("%s", bb_msg_can_not_create_raw_socket); |
173 | #if defined(__linux__) || defined(__APPLE__) |
174 | /* We don't have root privileges. Try SOCK_DGRAM instead. |
175 | * Linux needs net.ipv4.ping_group_range for this to work. |
176 | * MacOSX allows ICMP_ECHO, ICMP_TSTAMP or ICMP_MASKREQ |
177 | */ |
178 | #if ENABLE_PING6 |
179 | if (lsa->u.sa.sa_family == AF_INET6) |
180 | sock = socket(AF_INET6, SOCK_DGRAM, IPPROTO_ICMPV6); |
181 | else |
182 | #endif |
183 | sock = socket(AF_INET, SOCK_DGRAM, 1); /* 1 == ICMP */ |
184 | if (sock < 0) |
185 | #endif |
186 | bb_error_msg_and_die("%s", bb_msg_perm_denied_are_you_root); |
187 | } |
188 | |
189 | xmove_fd(sock, pingsock); |
190 | } |
191 | |
192 | #if !ENABLE_FEATURE_FANCY_PING |
193 | |
194 | /* Simple version */ |
195 | |
196 | struct globals { |
197 | char *hostname; |
198 | char packet[DEFDATALEN + MAXIPLEN + MAXICMPLEN]; |
199 | } FIX_ALIASING; |
200 | #define G (*(struct globals*)&bb_common_bufsiz1) |
201 | #define INIT_G() do { } while (0) |
202 | |
203 | static void noresp(int ign UNUSED_PARAM) |
204 | { |
205 | printf("No response from %s\n", G.hostname); |
206 | exit(EXIT_FAILURE); |
207 | } |
208 | |
209 | static void ping4(len_and_sockaddr *lsa) |
210 | { |
211 | struct icmp *pkt; |
212 | int c; |
213 | |
214 | pkt = (struct icmp *) G.packet; |
215 | /*memset(pkt, 0, sizeof(G.packet)); already is */ |
216 | pkt->icmp_type = ICMP_ECHO; |
217 | pkt->icmp_cksum = inet_cksum((uint16_t *) pkt, sizeof(G.packet)); |
218 | |
219 | xsendto(pingsock, G.packet, DEFDATALEN + ICMP_MINLEN, &lsa->u.sa, lsa->len); |
220 | |
221 | /* listen for replies */ |
222 | while (1) { |
223 | #if 0 |
224 | struct sockaddr_in from; |
225 | socklen_t fromlen = sizeof(from); |
226 | |
227 | c = recvfrom(pingsock, G.packet, sizeof(G.packet), 0, |
228 | (struct sockaddr *) &from, &fromlen); |
229 | #else |
230 | c = recv(pingsock, G.packet, sizeof(G.packet), 0); |
231 | #endif |
232 | if (c < 0) { |
233 | if (errno != EINTR) |
234 | bb_perror_msg("recvfrom"); |
235 | continue; |
236 | } |
237 | if (c >= 76) { /* ip + icmp */ |
238 | struct iphdr *iphdr = (struct iphdr *) G.packet; |
239 | |
240 | pkt = (struct icmp *) (G.packet + (iphdr->ihl << 2)); /* skip ip hdr */ |
241 | if (pkt->icmp_type == ICMP_ECHOREPLY) |
242 | break; |
243 | } |
244 | } |
245 | if (ENABLE_FEATURE_CLEAN_UP) |
246 | close(pingsock); |
247 | } |
248 | |
249 | #if ENABLE_PING6 |
250 | static void ping6(len_and_sockaddr *lsa) |
251 | { |
252 | struct icmp6_hdr *pkt; |
253 | int c; |
254 | int sockopt; |
255 | |
256 | pkt = (struct icmp6_hdr *) G.packet; |
257 | /*memset(pkt, 0, sizeof(G.packet)); already is */ |
258 | pkt->icmp6_type = ICMP6_ECHO_REQUEST; |
259 | |
260 | sockopt = offsetof(struct icmp6_hdr, icmp6_cksum); |
261 | setsockopt(pingsock, SOL_RAW, IPV6_CHECKSUM, &sockopt, sizeof(sockopt)); |
262 | |
263 | xsendto(pingsock, G.packet, DEFDATALEN + sizeof(struct icmp6_hdr), &lsa->u.sa, lsa->len); |
264 | |
265 | /* listen for replies */ |
266 | while (1) { |
267 | #if 0 |
268 | struct sockaddr_in6 from; |
269 | socklen_t fromlen = sizeof(from); |
270 | |
271 | c = recvfrom(pingsock, G.packet, sizeof(G.packet), 0, |
272 | (struct sockaddr *) &from, &fromlen); |
273 | #else |
274 | c = recv(pingsock, G.packet, sizeof(G.packet), 0); |
275 | #endif |
276 | if (c < 0) { |
277 | if (errno != EINTR) |
278 | bb_perror_msg("recvfrom"); |
279 | continue; |
280 | } |
281 | if (c >= ICMP_MINLEN) { /* icmp6_hdr */ |
282 | if (pkt->icmp6_type == ICMP6_ECHO_REPLY) |
283 | break; |
284 | } |
285 | } |
286 | if (ENABLE_FEATURE_CLEAN_UP) |
287 | close(pingsock); |
288 | } |
289 | #endif |
290 | |
291 | #if !ENABLE_PING6 |
292 | # define common_ping_main(af, argv) common_ping_main(argv) |
293 | #endif |
294 | static int common_ping_main(sa_family_t af, char **argv) |
295 | { |
296 | len_and_sockaddr *lsa; |
297 | |
298 | INIT_G(); |
299 | |
300 | #if ENABLE_PING6 |
301 | while ((++argv)[0] && argv[0][0] == '-') { |
302 | if (argv[0][1] == '4') { |
303 | af = AF_INET; |
304 | continue; |
305 | } |
306 | if (argv[0][1] == '6') { |
307 | af = AF_INET6; |
308 | continue; |
309 | } |
310 | bb_show_usage(); |
311 | } |
312 | #else |
313 | argv++; |
314 | #endif |
315 | |
316 | G.hostname = *argv; |
317 | if (!G.hostname) |
318 | bb_show_usage(); |
319 | |
320 | #if ENABLE_PING6 |
321 | lsa = xhost_and_af2sockaddr(G.hostname, 0, af); |
322 | #else |
323 | lsa = xhost_and_af2sockaddr(G.hostname, 0, AF_INET); |
324 | #endif |
325 | /* Set timer _after_ DNS resolution */ |
326 | signal(SIGALRM, noresp); |
327 | alarm(5); /* give the host 5000ms to respond */ |
328 | |
329 | create_icmp_socket(lsa); |
330 | #if ENABLE_PING6 |
331 | if (lsa->u.sa.sa_family == AF_INET6) |
332 | ping6(lsa); |
333 | else |
334 | #endif |
335 | ping4(lsa); |
336 | printf("%s is alive!\n", G.hostname); |
337 | return EXIT_SUCCESS; |
338 | } |
339 | |
340 | |
341 | #else /* FEATURE_FANCY_PING */ |
342 | |
343 | |
344 | /* Full(er) version */ |
345 | |
346 | #define OPT_STRING ("qvc:s:t:w:W:I:n4" IF_PING6("6")) |
347 | enum { |
348 | OPT_QUIET = 1 << 0, |
349 | OPT_VERBOSE = 1 << 1, |
350 | OPT_c = 1 << 2, |
351 | OPT_s = 1 << 3, |
352 | OPT_t = 1 << 4, |
353 | OPT_w = 1 << 5, |
354 | OPT_W = 1 << 6, |
355 | OPT_I = 1 << 7, |
356 | /*OPT_n = 1 << 8, - ignored */ |
357 | OPT_IPV4 = 1 << 9, |
358 | OPT_IPV6 = (1 << 10) * ENABLE_PING6, |
359 | }; |
360 | |
361 | |
362 | struct globals { |
363 | int if_index; |
364 | char *str_I; |
365 | len_and_sockaddr *source_lsa; |
366 | unsigned datalen; |
367 | unsigned pingcount; /* must be int-sized */ |
368 | unsigned opt_ttl; |
369 | unsigned long ntransmitted, nreceived, nrepeats; |
370 | uint16_t myid; |
371 | unsigned tmin, tmax; /* in us */ |
372 | unsigned long long tsum; /* in us, sum of all times */ |
373 | unsigned deadline; |
374 | unsigned timeout; |
375 | unsigned total_secs; |
376 | unsigned sizeof_rcv_packet; |
377 | char *rcv_packet; /* [datalen + MAXIPLEN + MAXICMPLEN] */ |
378 | void *snd_packet; /* [datalen + ipv4/ipv6_const] */ |
379 | const char *hostname; |
380 | const char *dotted; |
381 | union { |
382 | struct sockaddr sa; |
383 | struct sockaddr_in sin; |
384 | #if ENABLE_PING6 |
385 | struct sockaddr_in6 sin6; |
386 | #endif |
387 | } pingaddr; |
388 | unsigned char rcvd_tbl[MAX_DUP_CHK / 8]; |
389 | } FIX_ALIASING; |
390 | #define G (*(struct globals*)&bb_common_bufsiz1) |
391 | #define if_index (G.if_index ) |
392 | #define source_lsa (G.source_lsa ) |
393 | #define str_I (G.str_I ) |
394 | #define datalen (G.datalen ) |
395 | #define pingcount (G.pingcount ) |
396 | #define opt_ttl (G.opt_ttl ) |
397 | #define myid (G.myid ) |
398 | #define tmin (G.tmin ) |
399 | #define tmax (G.tmax ) |
400 | #define tsum (G.tsum ) |
401 | #define deadline (G.deadline ) |
402 | #define timeout (G.timeout ) |
403 | #define total_secs (G.total_secs ) |
404 | #define hostname (G.hostname ) |
405 | #define dotted (G.dotted ) |
406 | #define pingaddr (G.pingaddr ) |
407 | #define rcvd_tbl (G.rcvd_tbl ) |
408 | void BUG_ping_globals_too_big(void); |
409 | #define INIT_G() do { \ |
410 | if (sizeof(G) > COMMON_BUFSIZE) \ |
411 | BUG_ping_globals_too_big(); \ |
412 | datalen = DEFDATALEN; \ |
413 | timeout = MAXWAIT; \ |
414 | tmin = UINT_MAX; \ |
415 | } while (0) |
416 | |
417 | |
418 | #define BYTE(bit) rcvd_tbl[(bit)>>3] |
419 | #define MASK(bit) (1 << ((bit) & 7)) |
420 | #define SET(bit) (BYTE(bit) |= MASK(bit)) |
421 | #define CLR(bit) (BYTE(bit) &= (~MASK(bit))) |
422 | #define TST(bit) (BYTE(bit) & MASK(bit)) |
423 | |
424 | static void print_stats_and_exit(int junk) NORETURN; |
425 | static void print_stats_and_exit(int junk UNUSED_PARAM) |
426 | { |
427 | unsigned long ul; |
428 | unsigned long nrecv; |
429 | |
430 | signal(SIGINT, SIG_IGN); |
431 | |
432 | nrecv = G.nreceived; |
433 | printf("\n--- %s ping statistics ---\n" |
434 | "%lu packets transmitted, " |
435 | "%lu packets received, ", |
436 | hostname, G.ntransmitted, nrecv |
437 | ); |
438 | if (G.nrepeats) |
439 | printf("%lu duplicates, ", G.nrepeats); |
440 | ul = G.ntransmitted; |
441 | if (ul != 0) |
442 | ul = (ul - nrecv) * 100 / ul; |
443 | printf("%lu%% packet loss\n", ul); |
444 | if (tmin != UINT_MAX) { |
445 | unsigned tavg = tsum / (nrecv + G.nrepeats); |
446 | printf("round-trip min/avg/max = %u.%03u/%u.%03u/%u.%03u ms\n", |
447 | tmin / 1000, tmin % 1000, |
448 | tavg / 1000, tavg % 1000, |
449 | tmax / 1000, tmax % 1000); |
450 | } |
451 | /* if condition is true, exit with 1 -- 'failure' */ |
452 | exit(nrecv == 0 || (deadline && nrecv < pingcount)); |
453 | } |
454 | |
455 | static void sendping_tail(void (*sp)(int), int size_pkt) |
456 | { |
457 | int sz; |
458 | |
459 | CLR((uint16_t)G.ntransmitted % MAX_DUP_CHK); |
460 | G.ntransmitted++; |
461 | |
462 | size_pkt += datalen; |
463 | |
464 | /* sizeof(pingaddr) can be larger than real sa size, but I think |
465 | * it doesn't matter */ |
466 | sz = xsendto(pingsock, G.snd_packet, size_pkt, &pingaddr.sa, sizeof(pingaddr)); |
467 | if (sz != size_pkt) |
468 | bb_error_msg_and_die("%s", bb_msg_write_error); |
469 | |
470 | if (pingcount == 0 || deadline || G.ntransmitted < pingcount) { |
471 | /* Didn't send all pings yet - schedule next in 1s */ |
472 | signal(SIGALRM, sp); |
473 | if (deadline) { |
474 | total_secs += PINGINTERVAL; |
475 | if (total_secs >= deadline) |
476 | signal(SIGALRM, print_stats_and_exit); |
477 | } |
478 | alarm(PINGINTERVAL); |
479 | } else { /* -c NN, and all NN are sent (and no deadline) */ |
480 | /* Wait for the last ping to come back. |
481 | * -W timeout: wait for a response in seconds. |
482 | * Affects only timeout in absense of any responses, |
483 | * otherwise ping waits for two RTTs. */ |
484 | unsigned expire = timeout; |
485 | |
486 | if (G.nreceived) { |
487 | /* approx. 2*tmax, in seconds (2 RTT) */ |
488 | expire = tmax / (512*1024); |
489 | if (expire == 0) |
490 | expire = 1; |
491 | } |
492 | signal(SIGALRM, print_stats_and_exit); |
493 | alarm(expire); |
494 | } |
495 | } |
496 | |
497 | static void sendping4(int junk UNUSED_PARAM) |
498 | { |
499 | struct icmp *pkt = G.snd_packet; |
500 | |
501 | //memset(pkt, 0, datalen + ICMP_MINLEN + 4); - G.snd_packet was xzalloced |
502 | pkt->icmp_type = ICMP_ECHO; |
503 | /*pkt->icmp_code = 0;*/ |
504 | pkt->icmp_cksum = 0; /* cksum is calculated with this field set to 0 */ |
505 | pkt->icmp_seq = htons(G.ntransmitted); /* don't ++ here, it can be a macro */ |
506 | pkt->icmp_id = myid; |
507 | |
508 | /* If datalen < 4, we store timestamp _past_ the packet, |
509 | * but it's ok - we allocated 4 extra bytes in xzalloc() just in case. |
510 | */ |
511 | /*if (datalen >= 4)*/ |
512 | /* No hton: we'll read it back on the same machine */ |
513 | *(uint32_t*)&pkt->icmp_dun = monotonic_us(); |
514 | |
515 | pkt->icmp_cksum = inet_cksum((uint16_t *) pkt, datalen + ICMP_MINLEN); |
516 | |
517 | sendping_tail(sendping4, ICMP_MINLEN); |
518 | } |
519 | #if ENABLE_PING6 |
520 | static void sendping6(int junk UNUSED_PARAM) |
521 | { |
522 | struct icmp6_hdr *pkt = G.snd_packet; |
523 | |
524 | //memset(pkt, 0, datalen + sizeof(struct icmp6_hdr) + 4); |
525 | pkt->icmp6_type = ICMP6_ECHO_REQUEST; |
526 | /*pkt->icmp6_code = 0;*/ |
527 | /*pkt->icmp6_cksum = 0;*/ |
528 | pkt->icmp6_seq = htons(G.ntransmitted); /* don't ++ here, it can be a macro */ |
529 | pkt->icmp6_id = myid; |
530 | |
531 | /*if (datalen >= 4)*/ |
532 | *(bb__aliased_uint32_t*)(&pkt->icmp6_data8[4]) = monotonic_us(); |
533 | |
534 | //TODO? pkt->icmp_cksum = inet_cksum(...); |
535 | |
536 | sendping_tail(sendping6, sizeof(struct icmp6_hdr)); |
537 | } |
538 | #endif |
539 | |
540 | static const char *icmp_type_name(int id) |
541 | { |
542 | switch (id) { |
543 | case ICMP_ECHOREPLY: return "Echo Reply"; |
544 | case ICMP_DEST_UNREACH: return "Destination Unreachable"; |
545 | case ICMP_SOURCE_QUENCH: return "Source Quench"; |
546 | case ICMP_REDIRECT: return "Redirect (change route)"; |
547 | case ICMP_ECHO: return "Echo Request"; |
548 | case ICMP_TIME_EXCEEDED: return "Time Exceeded"; |
549 | case ICMP_PARAMETERPROB: return "Parameter Problem"; |
550 | case ICMP_TIMESTAMP: return "Timestamp Request"; |
551 | case ICMP_TIMESTAMPREPLY: return "Timestamp Reply"; |
552 | case ICMP_INFO_REQUEST: return "Information Request"; |
553 | case ICMP_INFO_REPLY: return "Information Reply"; |
554 | case ICMP_ADDRESS: return "Address Mask Request"; |
555 | case ICMP_ADDRESSREPLY: return "Address Mask Reply"; |
556 | default: return "unknown ICMP type"; |
557 | } |
558 | } |
559 | #if ENABLE_PING6 |
560 | /* RFC3542 changed some definitions from RFC2292 for no good reason, whee! |
561 | * the newer 3542 uses a MLD_ prefix where as 2292 uses ICMP6_ prefix */ |
562 | #ifndef MLD_LISTENER_QUERY |
563 | # define MLD_LISTENER_QUERY ICMP6_MEMBERSHIP_QUERY |
564 | #endif |
565 | #ifndef MLD_LISTENER_REPORT |
566 | # define MLD_LISTENER_REPORT ICMP6_MEMBERSHIP_REPORT |
567 | #endif |
568 | #ifndef MLD_LISTENER_REDUCTION |
569 | # define MLD_LISTENER_REDUCTION ICMP6_MEMBERSHIP_REDUCTION |
570 | #endif |
571 | static const char *icmp6_type_name(int id) |
572 | { |
573 | switch (id) { |
574 | case ICMP6_DST_UNREACH: return "Destination Unreachable"; |
575 | case ICMP6_PACKET_TOO_BIG: return "Packet too big"; |
576 | case ICMP6_TIME_EXCEEDED: return "Time Exceeded"; |
577 | case ICMP6_PARAM_PROB: return "Parameter Problem"; |
578 | case ICMP6_ECHO_REPLY: return "Echo Reply"; |
579 | case ICMP6_ECHO_REQUEST: return "Echo Request"; |
580 | case MLD_LISTENER_QUERY: return "Listener Query"; |
581 | case MLD_LISTENER_REPORT: return "Listener Report"; |
582 | case MLD_LISTENER_REDUCTION: return "Listener Reduction"; |
583 | default: return "unknown ICMP type"; |
584 | } |
585 | } |
586 | #endif |
587 | |
588 | static void unpack_tail(int sz, uint32_t *tp, |
589 | const char *from_str, |
590 | uint16_t recv_seq, int ttl) |
591 | { |
592 | unsigned char *b, m; |
593 | const char *dupmsg = " (DUP!)"; |
594 | unsigned triptime = 0; |
595 | |
596 | if (tp) { |
597 | /* (int32_t) cast is for hypothetical 64-bit unsigned */ |
598 | /* (doesn't hurt 32-bit real-world anyway) */ |
599 | triptime = (int32_t) ((uint32_t)monotonic_us() - *tp); |
600 | tsum += triptime; |
601 | if (triptime < tmin) |
602 | tmin = triptime; |
603 | if (triptime > tmax) |
604 | tmax = triptime; |
605 | } |
606 | |
607 | b = &BYTE(recv_seq % MAX_DUP_CHK); |
608 | m = MASK(recv_seq % MAX_DUP_CHK); |
609 | /*if TST(recv_seq % MAX_DUP_CHK):*/ |
610 | if (*b & m) { |
611 | ++G.nrepeats; |
612 | } else { |
613 | /*SET(recv_seq % MAX_DUP_CHK):*/ |
614 | *b |= m; |
615 | ++G.nreceived; |
616 | dupmsg += 7; |
617 | } |
618 | |
619 | if (option_mask32 & OPT_QUIET) |
620 | return; |
621 | |
622 | printf("%d bytes from %s: seq=%u ttl=%d", sz, |
623 | from_str, recv_seq, ttl); |
624 | if (tp) |
625 | printf(" time=%u.%03u ms", triptime / 1000, triptime % 1000); |
626 | puts(dupmsg); |
627 | fflush_all(); |
628 | } |
629 | static void unpack4(char *buf, int sz, struct sockaddr_in *from) |
630 | { |
631 | struct icmp *icmppkt; |
632 | struct iphdr *iphdr; |
633 | int hlen; |
634 | |
635 | /* discard if too short */ |
636 | if (sz < (int) (datalen + ICMP_MINLEN)) |
637 | return; |
638 | |
639 | /* check IP header */ |
640 | iphdr = (struct iphdr *) buf; |
641 | hlen = iphdr->ihl << 2; |
642 | sz -= hlen; |
643 | icmppkt = (struct icmp *) (buf + hlen); |
644 | if (icmppkt->icmp_id != myid) |
645 | return; /* not our ping */ |
646 | |
647 | if (icmppkt->icmp_type == ICMP_ECHOREPLY) { |
648 | uint16_t recv_seq = ntohs(icmppkt->icmp_seq); |
649 | uint32_t *tp = NULL; |
650 | |
651 | if (sz >= (int) (ICMP_MINLEN + sizeof(uint32_t))) |
652 | tp = (uint32_t *) icmppkt->icmp_data; |
653 | unpack_tail(sz, tp, |
654 | inet_ntoa(*(struct in_addr *) &from->sin_addr.s_addr), |
655 | recv_seq, iphdr->ttl); |
656 | } else if (icmppkt->icmp_type != ICMP_ECHO) { |
657 | bb_error_msg("warning: got ICMP %d (%s)", |
658 | icmppkt->icmp_type, |
659 | icmp_type_name(icmppkt->icmp_type)); |
660 | } |
661 | } |
662 | #if ENABLE_PING6 |
663 | static void unpack6(char *packet, int sz, struct sockaddr_in6 *from, int hoplimit) |
664 | { |
665 | struct icmp6_hdr *icmppkt; |
666 | char buf[INET6_ADDRSTRLEN]; |
667 | |
668 | /* discard if too short */ |
669 | if (sz < (int) (datalen + sizeof(struct icmp6_hdr))) |
670 | return; |
671 | |
672 | icmppkt = (struct icmp6_hdr *) packet; |
673 | if (icmppkt->icmp6_id != myid) |
674 | return; /* not our ping */ |
675 | |
676 | if (icmppkt->icmp6_type == ICMP6_ECHO_REPLY) { |
677 | uint16_t recv_seq = ntohs(icmppkt->icmp6_seq); |
678 | uint32_t *tp = NULL; |
679 | |
680 | if (sz >= (int) (sizeof(struct icmp6_hdr) + sizeof(uint32_t))) |
681 | tp = (uint32_t *) &icmppkt->icmp6_data8[4]; |
682 | unpack_tail(sz, tp, |
683 | inet_ntop(AF_INET6, &from->sin6_addr, |
684 | buf, sizeof(buf)), |
685 | recv_seq, hoplimit); |
686 | } else if (icmppkt->icmp6_type != ICMP6_ECHO_REQUEST) { |
687 | bb_error_msg("warning: got ICMP %d (%s)", |
688 | icmppkt->icmp6_type, |
689 | icmp6_type_name(icmppkt->icmp6_type)); |
690 | } |
691 | } |
692 | #endif |
693 | |
694 | static void ping4(len_and_sockaddr *lsa) |
695 | { |
696 | int sockopt; |
697 | |
698 | pingaddr.sin = lsa->u.sin; |
699 | if (source_lsa) { |
700 | if (setsockopt(pingsock, IPPROTO_IP, IP_MULTICAST_IF, |
701 | &source_lsa->u.sa, source_lsa->len)) |
702 | bb_error_msg_and_die("can't set multicast source interface"); |
703 | xbind(pingsock, &source_lsa->u.sa, source_lsa->len); |
704 | } |
705 | |
706 | /* enable broadcast pings */ |
707 | setsockopt_broadcast(pingsock); |
708 | |
709 | /* set recv buf (needed if we can get lots of responses: flood ping, |
710 | * broadcast ping etc) */ |
711 | sockopt = (datalen * 2) + 7 * 1024; /* giving it a bit of extra room */ |
712 | setsockopt(pingsock, SOL_SOCKET, SO_RCVBUF, &sockopt, sizeof(sockopt)); |
713 | |
714 | if (opt_ttl != 0) { |
715 | setsockopt(pingsock, IPPROTO_IP, IP_TTL, &opt_ttl, sizeof(opt_ttl)); |
716 | /* above doesnt affect packets sent to bcast IP, so... */ |
717 | setsockopt(pingsock, IPPROTO_IP, IP_MULTICAST_TTL, &opt_ttl, sizeof(opt_ttl)); |
718 | } |
719 | |
720 | signal(SIGINT, print_stats_and_exit); |
721 | |
722 | /* start the ping's going ... */ |
723 | sendping4(0); |
724 | |
725 | /* listen for replies */ |
726 | while (1) { |
727 | struct sockaddr_in from; |
728 | socklen_t fromlen = (socklen_t) sizeof(from); |
729 | int c; |
730 | |
731 | c = recvfrom(pingsock, G.rcv_packet, G.sizeof_rcv_packet, 0, |
732 | (struct sockaddr *) &from, &fromlen); |
733 | if (c < 0) { |
734 | if (errno != EINTR) |
735 | bb_perror_msg("recvfrom"); |
736 | continue; |
737 | } |
738 | unpack4(G.rcv_packet, c, &from); |
739 | if (pingcount && G.nreceived >= pingcount) |
740 | break; |
741 | } |
742 | } |
743 | #if ENABLE_PING6 |
744 | extern int BUG_bad_offsetof_icmp6_cksum(void); |
745 | static void ping6(len_and_sockaddr *lsa) |
746 | { |
747 | int sockopt; |
748 | struct msghdr msg; |
749 | struct sockaddr_in6 from; |
750 | struct iovec iov; |
751 | char control_buf[CMSG_SPACE(36)]; |
752 | |
753 | pingaddr.sin6 = lsa->u.sin6; |
754 | if (source_lsa) |
755 | xbind(pingsock, &source_lsa->u.sa, source_lsa->len); |
756 | |
757 | #ifdef ICMP6_FILTER |
758 | { |
759 | struct icmp6_filter filt; |
760 | if (!(option_mask32 & OPT_VERBOSE)) { |
761 | ICMP6_FILTER_SETBLOCKALL(&filt); |
762 | ICMP6_FILTER_SETPASS(ICMP6_ECHO_REPLY, &filt); |
763 | } else { |
764 | ICMP6_FILTER_SETPASSALL(&filt); |
765 | } |
766 | if (setsockopt(pingsock, IPPROTO_ICMPV6, ICMP6_FILTER, &filt, |
767 | sizeof(filt)) < 0) |
768 | bb_error_msg_and_die("setsockopt(ICMP6_FILTER)"); |
769 | } |
770 | #endif /*ICMP6_FILTER*/ |
771 | |
772 | /* enable broadcast pings */ |
773 | setsockopt_broadcast(pingsock); |
774 | |
775 | /* set recv buf (needed if we can get lots of responses: flood ping, |
776 | * broadcast ping etc) */ |
777 | sockopt = (datalen * 2) + 7 * 1024; /* giving it a bit of extra room */ |
778 | setsockopt(pingsock, SOL_SOCKET, SO_RCVBUF, &sockopt, sizeof(sockopt)); |
779 | |
780 | sockopt = offsetof(struct icmp6_hdr, icmp6_cksum); |
781 | if (offsetof(struct icmp6_hdr, icmp6_cksum) != 2) |
782 | BUG_bad_offsetof_icmp6_cksum(); |
783 | setsockopt(pingsock, SOL_RAW, IPV6_CHECKSUM, &sockopt, sizeof(sockopt)); |
784 | |
785 | /* request ttl info to be returned in ancillary data */ |
786 | setsockopt(pingsock, SOL_IPV6, IPV6_HOPLIMIT, &const_int_1, sizeof(const_int_1)); |
787 | |
788 | if (if_index) |
789 | pingaddr.sin6.sin6_scope_id = if_index; |
790 | |
791 | signal(SIGINT, print_stats_and_exit); |
792 | |
793 | /* start the ping's going ... */ |
794 | sendping6(0); |
795 | |
796 | /* listen for replies */ |
797 | msg.msg_name = &from; |
798 | msg.msg_namelen = sizeof(from); |
799 | msg.msg_iov = &iov; |
800 | msg.msg_iovlen = 1; |
801 | msg.msg_control = control_buf; |
802 | iov.iov_base = G.rcv_packet; |
803 | iov.iov_len = G.sizeof_rcv_packet; |
804 | while (1) { |
805 | int c; |
806 | struct cmsghdr *mp; |
807 | int hoplimit = -1; |
808 | msg.msg_controllen = sizeof(control_buf); |
809 | |
810 | c = recvmsg(pingsock, &msg, 0); |
811 | if (c < 0) { |
812 | if (errno != EINTR) |
813 | bb_perror_msg("recvfrom"); |
814 | continue; |
815 | } |
816 | for (mp = CMSG_FIRSTHDR(&msg); mp; mp = CMSG_NXTHDR(&msg, mp)) { |
817 | if (mp->cmsg_level == SOL_IPV6 |
818 | && mp->cmsg_type == IPV6_HOPLIMIT |
819 | /* don't check len - we trust the kernel: */ |
820 | /* && mp->cmsg_len >= CMSG_LEN(sizeof(int)) */ |
821 | ) { |
822 | /*hoplimit = *(int*)CMSG_DATA(mp); - unaligned access */ |
823 | move_from_unaligned_int(hoplimit, CMSG_DATA(mp)); |
824 | } |
825 | } |
826 | unpack6(G.rcv_packet, c, &from, hoplimit); |
827 | if (pingcount && G.nreceived >= pingcount) |
828 | break; |
829 | } |
830 | } |
831 | #endif |
832 | |
833 | static void ping(len_and_sockaddr *lsa) |
834 | { |
835 | printf("PING %s (%s)", hostname, dotted); |
836 | if (source_lsa) { |
837 | printf(" from %s", |
838 | xmalloc_sockaddr2dotted_noport(&source_lsa->u.sa)); |
839 | } |
840 | printf(": %d data bytes\n", datalen); |
841 | |
842 | create_icmp_socket(lsa); |
843 | /* untested whether "-I addr" really works for IPv6: */ |
844 | if (str_I) |
845 | setsockopt_bindtodevice(pingsock, str_I); |
846 | |
847 | G.sizeof_rcv_packet = datalen + MAXIPLEN + MAXICMPLEN; |
848 | G.rcv_packet = xzalloc(G.sizeof_rcv_packet); |
849 | #if ENABLE_PING6 |
850 | if (lsa->u.sa.sa_family == AF_INET6) { |
851 | /* +4 reserves a place for timestamp, which may end up sitting |
852 | * _after_ packet. Saves one if() - see sendping4/6() */ |
853 | G.snd_packet = xzalloc(datalen + sizeof(struct icmp6_hdr) + 4); |
854 | ping6(lsa); |
855 | } else |
856 | #endif |
857 | { |
858 | G.snd_packet = xzalloc(datalen + ICMP_MINLEN + 4); |
859 | ping4(lsa); |
860 | } |
861 | } |
862 | |
863 | static int common_ping_main(int opt, char **argv) |
864 | { |
865 | len_and_sockaddr *lsa; |
866 | char *str_s; |
867 | |
868 | INIT_G(); |
869 | |
870 | /* exactly one argument needed; -v and -q don't mix; -c NUM, -t NUM, -w NUM, -W NUM */ |
871 | opt_complementary = "=1:q--v:v--q:c+:t+:w+:W+"; |
872 | opt |= getopt32(argv, OPT_STRING, &pingcount, &str_s, &opt_ttl, &deadline, &timeout, &str_I); |
873 | if (opt & OPT_s) |
874 | datalen = xatou16(str_s); // -s |
875 | if (opt & OPT_I) { // -I |
876 | if_index = if_nametoindex(str_I); |
877 | if (!if_index) { |
878 | /* TODO: I'm not sure it takes IPv6 unless in [XX:XX..] format */ |
879 | source_lsa = xdotted2sockaddr(str_I, 0); |
880 | str_I = NULL; /* don't try to bind to device later */ |
881 | } |
882 | } |
883 | myid = (uint16_t) getpid(); |
884 | hostname = argv[optind]; |
885 | #if ENABLE_PING6 |
886 | { |
887 | sa_family_t af = AF_UNSPEC; |
888 | if (opt & OPT_IPV4) |
889 | af = AF_INET; |
890 | if (opt & OPT_IPV6) |
891 | af = AF_INET6; |
892 | lsa = xhost_and_af2sockaddr(hostname, 0, af); |
893 | } |
894 | #else |
895 | lsa = xhost_and_af2sockaddr(hostname, 0, AF_INET); |
896 | #endif |
897 | |
898 | if (source_lsa && source_lsa->u.sa.sa_family != lsa->u.sa.sa_family) |
899 | /* leaking it here... */ |
900 | source_lsa = NULL; |
901 | |
902 | dotted = xmalloc_sockaddr2dotted_noport(&lsa->u.sa); |
903 | ping(lsa); |
904 | print_stats_and_exit(EXIT_SUCCESS); |
905 | /*return EXIT_SUCCESS;*/ |
906 | } |
907 | #endif /* FEATURE_FANCY_PING */ |
908 | |
909 | |
910 | int ping_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE; |
911 | int ping_main(int argc UNUSED_PARAM, char **argv) |
912 | { |
913 | #if !ENABLE_FEATURE_FANCY_PING |
914 | return common_ping_main(AF_UNSPEC, argv); |
915 | #else |
916 | return common_ping_main(0, argv); |
917 | #endif |
918 | } |
919 | |
920 | #if ENABLE_PING6 |
921 | int ping6_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE; |
922 | int ping6_main(int argc UNUSED_PARAM, char **argv) |
923 | { |
924 | # if !ENABLE_FEATURE_FANCY_PING |
925 | return common_ping_main(AF_INET6, argv); |
926 | # else |
927 | return common_ping_main(OPT_IPV6, argv); |
928 | # endif |
929 | } |
930 | #endif |
931 | |
932 | /* from ping6.c: |
933 | * Copyright (c) 1989 The Regents of the University of California. |
934 | * All rights reserved. |
935 | * |
936 | * This code is derived from software contributed to Berkeley by |
937 | * Mike Muuss. |
938 | * |
939 | * Redistribution and use in source and binary forms, with or without |
940 | * modification, are permitted provided that the following conditions |
941 | * are met: |
942 | * 1. Redistributions of source code must retain the above copyright |
943 | * notice, this list of conditions and the following disclaimer. |
944 | * 2. Redistributions in binary form must reproduce the above copyright |
945 | * notice, this list of conditions and the following disclaimer in the |
946 | * documentation and/or other materials provided with the distribution. |
947 | * |
948 | * 3. <BSD Advertising Clause omitted per the July 22, 1999 licensing change |
949 | * ftp://ftp.cs.berkeley.edu/pub/4bsd/README.Impt.License.Change> |
950 | * |
951 | * 4. Neither the name of the University nor the names of its contributors |
952 | * may be used to endorse or promote products derived from this software |
953 | * without specific prior written permission. |
954 | * |
955 | * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND |
956 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
957 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
958 | * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE |
959 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL |
960 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS |
961 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
962 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT |
963 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
964 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
965 | * SUCH DAMAGE. |
966 | */ |
967 |