summaryrefslogtreecommitdiff
path: root/networking/ping.c (plain)
blob: 46a3889da3d783f97501cd6890f5f4bc53436f9b
1/* vi: set sw=4 ts=4: */
2/*
3 * Mini ping implementation for busybox
4 *
5 * Copyright (C) 1999 by Randolph Chung <tausq@debian.org>
6 *
7 * Adapted from the ping in netkit-base 0.10:
8 * Copyright (c) 1989 The Regents of the University of California.
9 * All rights reserved.
10 *
11 * This code is derived from software contributed to Berkeley by
12 * Mike Muuss.
13 *
14 * Licensed under GPLv2 or later, see file LICENSE in this source tree.
15 */
16/* from ping6.c:
17 * Copyright (C) 1999 by Randolph Chung <tausq@debian.org>
18 *
19 * This version of ping is adapted from the ping in netkit-base 0.10,
20 * which is:
21 *
22 * Original copyright notice is retained at the end of this file.
23 *
24 * This version is an adaptation of ping.c from busybox.
25 * The code was modified by Bart Visscher <magick@linux-fan.com>
26 */
27
28#include <net/if.h>
29#include <netinet/ip_icmp.h>
30#include "libbb.h"
31
32#ifdef __BIONIC__
33/* should be in netinet/ip_icmp.h */
34# define ICMP_DEST_UNREACH 3 /* Destination Unreachable */
35# define ICMP_SOURCE_QUENCH 4 /* Source Quench */
36# define ICMP_REDIRECT 5 /* Redirect (change route) */
37# define ICMP_ECHO 8 /* Echo Request */
38# define ICMP_TIME_EXCEEDED 11 /* Time Exceeded */
39# define ICMP_PARAMETERPROB 12 /* Parameter Problem */
40# define ICMP_TIMESTAMP 13 /* Timestamp Request */
41# define ICMP_TIMESTAMPREPLY 14 /* Timestamp Reply */
42# define ICMP_INFO_REQUEST 15 /* Information Request */
43# define ICMP_INFO_REPLY 16 /* Information Reply */
44# define ICMP_ADDRESS 17 /* Address Mask Request */
45# define ICMP_ADDRESSREPLY 18 /* Address Mask Reply */
46#endif
47
48//config:config PING
49//config: bool "ping"
50//config: default y
51//config: select PLATFORM_LINUX
52//config: help
53//config: ping uses the ICMP protocol's mandatory ECHO_REQUEST datagram to
54//config: elicit an ICMP ECHO_RESPONSE from a host or gateway.
55//config:
56//config:config PING6
57//config: bool "ping6"
58//config: default y
59//config: depends on FEATURE_IPV6 && PING
60//config: help
61//config: This will give you a ping that can talk IPv6.
62//config:
63//config:config FEATURE_FANCY_PING
64//config: bool "Enable fancy ping output"
65//config: default y
66//config: depends on PING
67//config: help
68//config: Make the output from the ping applet include statistics, and at the
69//config: same time provide full support for ICMP packets.
70
71/* Needs socket(AF_INET, SOCK_RAW, IPPROTO_ICMP), therefore BB_SUID_MAYBE: */
72//applet:IF_PING(APPLET(ping, BB_DIR_BIN, BB_SUID_MAYBE))
73//applet:IF_PING6(APPLET(ping6, BB_DIR_BIN, BB_SUID_MAYBE))
74
75//kbuild:lib-$(CONFIG_PING) += ping.o
76//kbuild:lib-$(CONFIG_PING6) += ping.o
77
78//usage:#if !ENABLE_FEATURE_FANCY_PING
79//usage:# define ping_trivial_usage
80//usage: "HOST"
81//usage:# define ping_full_usage "\n\n"
82//usage: "Send ICMP ECHO_REQUEST packets to network hosts"
83//usage:# define ping6_trivial_usage
84//usage: "HOST"
85//usage:# define ping6_full_usage "\n\n"
86//usage: "Send ICMP ECHO_REQUEST packets to network hosts"
87//usage:#else
88//usage:# define ping_trivial_usage
89//usage: "[OPTIONS] HOST"
90//usage:# define ping_full_usage "\n\n"
91//usage: "Send ICMP ECHO_REQUEST packets to network hosts\n"
92//usage: IF_PING6(
93//usage: "\n -4,-6 Force IP or IPv6 name resolution"
94//usage: )
95//usage: "\n -c CNT Send only CNT pings"
96//usage: "\n -s SIZE Send SIZE data bytes in packets (default:56)"
97//usage: "\n -t TTL Set TTL"
98//usage: "\n -I IFACE/IP Use interface or IP address as source"
99//usage: "\n -W SEC Seconds to wait for the first response (default:10)"
100//usage: "\n (after all -c CNT packets are sent)"
101//usage: "\n -w SEC Seconds until ping exits (default:infinite)"
102//usage: "\n (can exit earlier with -c CNT)"
103//usage: "\n -q Quiet, only displays output at start"
104//usage: "\n and when finished"
105//usage:
106//usage:# define ping6_trivial_usage
107//usage: "[OPTIONS] HOST"
108//usage:# define ping6_full_usage "\n\n"
109//usage: "Send ICMP ECHO_REQUEST packets to network hosts\n"
110//usage: "\n -c CNT Send only CNT pings"
111//usage: "\n -s SIZE Send SIZE data bytes in packets (default:56)"
112//usage: "\n -I IFACE/IP Use interface or IP address as source"
113//usage: "\n -q Quiet, only displays output at start"
114//usage: "\n and when finished"
115//usage:
116//usage:#endif
117//usage:
118//usage:#define ping_example_usage
119//usage: "$ ping localhost\n"
120//usage: "PING slag (127.0.0.1): 56 data bytes\n"
121//usage: "64 bytes from 127.0.0.1: icmp_seq=0 ttl=255 time=20.1 ms\n"
122//usage: "\n"
123//usage: "--- debian ping statistics ---\n"
124//usage: "1 packets transmitted, 1 packets received, 0% packet loss\n"
125//usage: "round-trip min/avg/max = 20.1/20.1/20.1 ms\n"
126//usage:#define ping6_example_usage
127//usage: "$ ping6 ip6-localhost\n"
128//usage: "PING ip6-localhost (::1): 56 data bytes\n"
129//usage: "64 bytes from ::1: icmp6_seq=0 ttl=64 time=20.1 ms\n"
130//usage: "\n"
131//usage: "--- ip6-localhost ping statistics ---\n"
132//usage: "1 packets transmitted, 1 packets received, 0% packet loss\n"
133//usage: "round-trip min/avg/max = 20.1/20.1/20.1 ms\n"
134
135#if ENABLE_PING6
136# include <netinet/icmp6.h>
137/* I see RENUMBERED constants in bits/in.h - !!?
138 * What a fuck is going on with libc? Is it a glibc joke? */
139# ifdef IPV6_2292HOPLIMIT
140# undef IPV6_HOPLIMIT
141# define IPV6_HOPLIMIT IPV6_2292HOPLIMIT
142# endif
143#endif
144
145enum {
146 DEFDATALEN = 56,
147 MAXIPLEN = 60,
148 MAXICMPLEN = 76,
149 MAX_DUP_CHK = (8 * 128),
150 MAXWAIT = 10,
151 PINGINTERVAL = 1, /* 1 second */
152 pingsock = 0,
153};
154
155static void
156#if ENABLE_PING6
157create_icmp_socket(len_and_sockaddr *lsa)
158#else
159create_icmp_socket(void)
160#define create_icmp_socket(lsa) create_icmp_socket()
161#endif
162{
163 int sock;
164#if ENABLE_PING6
165 if (lsa->u.sa.sa_family == AF_INET6)
166 sock = socket(AF_INET6, SOCK_RAW, IPPROTO_ICMPV6);
167 else
168#endif
169 sock = socket(AF_INET, SOCK_RAW, 1); /* 1 == ICMP */
170 if (sock < 0) {
171 if (errno != EPERM)
172 bb_perror_msg_and_die("%s", bb_msg_can_not_create_raw_socket);
173#if defined(__linux__) || defined(__APPLE__)
174 /* We don't have root privileges. Try SOCK_DGRAM instead.
175 * Linux needs net.ipv4.ping_group_range for this to work.
176 * MacOSX allows ICMP_ECHO, ICMP_TSTAMP or ICMP_MASKREQ
177 */
178#if ENABLE_PING6
179 if (lsa->u.sa.sa_family == AF_INET6)
180 sock = socket(AF_INET6, SOCK_DGRAM, IPPROTO_ICMPV6);
181 else
182#endif
183 sock = socket(AF_INET, SOCK_DGRAM, 1); /* 1 == ICMP */
184 if (sock < 0)
185#endif
186 bb_error_msg_and_die("%s", bb_msg_perm_denied_are_you_root);
187 }
188
189 xmove_fd(sock, pingsock);
190}
191
192#if !ENABLE_FEATURE_FANCY_PING
193
194/* Simple version */
195
196struct globals {
197 char *hostname;
198 char packet[DEFDATALEN + MAXIPLEN + MAXICMPLEN];
199} FIX_ALIASING;
200#define G (*(struct globals*)&bb_common_bufsiz1)
201#define INIT_G() do { } while (0)
202
203static void noresp(int ign UNUSED_PARAM)
204{
205 printf("No response from %s\n", G.hostname);
206 exit(EXIT_FAILURE);
207}
208
209static void ping4(len_and_sockaddr *lsa)
210{
211 struct icmp *pkt;
212 int c;
213
214 pkt = (struct icmp *) G.packet;
215 /*memset(pkt, 0, sizeof(G.packet)); already is */
216 pkt->icmp_type = ICMP_ECHO;
217 pkt->icmp_cksum = inet_cksum((uint16_t *) pkt, sizeof(G.packet));
218
219 xsendto(pingsock, G.packet, DEFDATALEN + ICMP_MINLEN, &lsa->u.sa, lsa->len);
220
221 /* listen for replies */
222 while (1) {
223#if 0
224 struct sockaddr_in from;
225 socklen_t fromlen = sizeof(from);
226
227 c = recvfrom(pingsock, G.packet, sizeof(G.packet), 0,
228 (struct sockaddr *) &from, &fromlen);
229#else
230 c = recv(pingsock, G.packet, sizeof(G.packet), 0);
231#endif
232 if (c < 0) {
233 if (errno != EINTR)
234 bb_perror_msg("recvfrom");
235 continue;
236 }
237 if (c >= 76) { /* ip + icmp */
238 struct iphdr *iphdr = (struct iphdr *) G.packet;
239
240 pkt = (struct icmp *) (G.packet + (iphdr->ihl << 2)); /* skip ip hdr */
241 if (pkt->icmp_type == ICMP_ECHOREPLY)
242 break;
243 }
244 }
245 if (ENABLE_FEATURE_CLEAN_UP)
246 close(pingsock);
247}
248
249#if ENABLE_PING6
250static void ping6(len_and_sockaddr *lsa)
251{
252 struct icmp6_hdr *pkt;
253 int c;
254 int sockopt;
255
256 pkt = (struct icmp6_hdr *) G.packet;
257 /*memset(pkt, 0, sizeof(G.packet)); already is */
258 pkt->icmp6_type = ICMP6_ECHO_REQUEST;
259
260 sockopt = offsetof(struct icmp6_hdr, icmp6_cksum);
261 setsockopt(pingsock, SOL_RAW, IPV6_CHECKSUM, &sockopt, sizeof(sockopt));
262
263 xsendto(pingsock, G.packet, DEFDATALEN + sizeof(struct icmp6_hdr), &lsa->u.sa, lsa->len);
264
265 /* listen for replies */
266 while (1) {
267#if 0
268 struct sockaddr_in6 from;
269 socklen_t fromlen = sizeof(from);
270
271 c = recvfrom(pingsock, G.packet, sizeof(G.packet), 0,
272 (struct sockaddr *) &from, &fromlen);
273#else
274 c = recv(pingsock, G.packet, sizeof(G.packet), 0);
275#endif
276 if (c < 0) {
277 if (errno != EINTR)
278 bb_perror_msg("recvfrom");
279 continue;
280 }
281 if (c >= ICMP_MINLEN) { /* icmp6_hdr */
282 if (pkt->icmp6_type == ICMP6_ECHO_REPLY)
283 break;
284 }
285 }
286 if (ENABLE_FEATURE_CLEAN_UP)
287 close(pingsock);
288}
289#endif
290
291#if !ENABLE_PING6
292# define common_ping_main(af, argv) common_ping_main(argv)
293#endif
294static int common_ping_main(sa_family_t af, char **argv)
295{
296 len_and_sockaddr *lsa;
297
298 INIT_G();
299
300#if ENABLE_PING6
301 while ((++argv)[0] && argv[0][0] == '-') {
302 if (argv[0][1] == '4') {
303 af = AF_INET;
304 continue;
305 }
306 if (argv[0][1] == '6') {
307 af = AF_INET6;
308 continue;
309 }
310 bb_show_usage();
311 }
312#else
313 argv++;
314#endif
315
316 G.hostname = *argv;
317 if (!G.hostname)
318 bb_show_usage();
319
320#if ENABLE_PING6
321 lsa = xhost_and_af2sockaddr(G.hostname, 0, af);
322#else
323 lsa = xhost_and_af2sockaddr(G.hostname, 0, AF_INET);
324#endif
325 /* Set timer _after_ DNS resolution */
326 signal(SIGALRM, noresp);
327 alarm(5); /* give the host 5000ms to respond */
328
329 create_icmp_socket(lsa);
330#if ENABLE_PING6
331 if (lsa->u.sa.sa_family == AF_INET6)
332 ping6(lsa);
333 else
334#endif
335 ping4(lsa);
336 printf("%s is alive!\n", G.hostname);
337 return EXIT_SUCCESS;
338}
339
340
341#else /* FEATURE_FANCY_PING */
342
343
344/* Full(er) version */
345
346#define OPT_STRING ("qvc:s:t:w:W:I:n4" IF_PING6("6"))
347enum {
348 OPT_QUIET = 1 << 0,
349 OPT_VERBOSE = 1 << 1,
350 OPT_c = 1 << 2,
351 OPT_s = 1 << 3,
352 OPT_t = 1 << 4,
353 OPT_w = 1 << 5,
354 OPT_W = 1 << 6,
355 OPT_I = 1 << 7,
356 /*OPT_n = 1 << 8, - ignored */
357 OPT_IPV4 = 1 << 9,
358 OPT_IPV6 = (1 << 10) * ENABLE_PING6,
359};
360
361
362struct globals {
363 int if_index;
364 char *str_I;
365 len_and_sockaddr *source_lsa;
366 unsigned datalen;
367 unsigned pingcount; /* must be int-sized */
368 unsigned opt_ttl;
369 unsigned long ntransmitted, nreceived, nrepeats;
370 uint16_t myid;
371 unsigned tmin, tmax; /* in us */
372 unsigned long long tsum; /* in us, sum of all times */
373 unsigned deadline;
374 unsigned timeout;
375 unsigned total_secs;
376 unsigned sizeof_rcv_packet;
377 char *rcv_packet; /* [datalen + MAXIPLEN + MAXICMPLEN] */
378 void *snd_packet; /* [datalen + ipv4/ipv6_const] */
379 const char *hostname;
380 const char *dotted;
381 union {
382 struct sockaddr sa;
383 struct sockaddr_in sin;
384#if ENABLE_PING6
385 struct sockaddr_in6 sin6;
386#endif
387 } pingaddr;
388 unsigned char rcvd_tbl[MAX_DUP_CHK / 8];
389} FIX_ALIASING;
390#define G (*(struct globals*)&bb_common_bufsiz1)
391#define if_index (G.if_index )
392#define source_lsa (G.source_lsa )
393#define str_I (G.str_I )
394#define datalen (G.datalen )
395#define pingcount (G.pingcount )
396#define opt_ttl (G.opt_ttl )
397#define myid (G.myid )
398#define tmin (G.tmin )
399#define tmax (G.tmax )
400#define tsum (G.tsum )
401#define deadline (G.deadline )
402#define timeout (G.timeout )
403#define total_secs (G.total_secs )
404#define hostname (G.hostname )
405#define dotted (G.dotted )
406#define pingaddr (G.pingaddr )
407#define rcvd_tbl (G.rcvd_tbl )
408void BUG_ping_globals_too_big(void);
409#define INIT_G() do { \
410 if (sizeof(G) > COMMON_BUFSIZE) \
411 BUG_ping_globals_too_big(); \
412 datalen = DEFDATALEN; \
413 timeout = MAXWAIT; \
414 tmin = UINT_MAX; \
415} while (0)
416
417
418#define BYTE(bit) rcvd_tbl[(bit)>>3]
419#define MASK(bit) (1 << ((bit) & 7))
420#define SET(bit) (BYTE(bit) |= MASK(bit))
421#define CLR(bit) (BYTE(bit) &= (~MASK(bit)))
422#define TST(bit) (BYTE(bit) & MASK(bit))
423
424static void print_stats_and_exit(int junk) NORETURN;
425static void print_stats_and_exit(int junk UNUSED_PARAM)
426{
427 unsigned long ul;
428 unsigned long nrecv;
429
430 signal(SIGINT, SIG_IGN);
431
432 nrecv = G.nreceived;
433 printf("\n--- %s ping statistics ---\n"
434 "%lu packets transmitted, "
435 "%lu packets received, ",
436 hostname, G.ntransmitted, nrecv
437 );
438 if (G.nrepeats)
439 printf("%lu duplicates, ", G.nrepeats);
440 ul = G.ntransmitted;
441 if (ul != 0)
442 ul = (ul - nrecv) * 100 / ul;
443 printf("%lu%% packet loss\n", ul);
444 if (tmin != UINT_MAX) {
445 unsigned tavg = tsum / (nrecv + G.nrepeats);
446 printf("round-trip min/avg/max = %u.%03u/%u.%03u/%u.%03u ms\n",
447 tmin / 1000, tmin % 1000,
448 tavg / 1000, tavg % 1000,
449 tmax / 1000, tmax % 1000);
450 }
451 /* if condition is true, exit with 1 -- 'failure' */
452 exit(nrecv == 0 || (deadline && nrecv < pingcount));
453}
454
455static void sendping_tail(void (*sp)(int), int size_pkt)
456{
457 int sz;
458
459 CLR((uint16_t)G.ntransmitted % MAX_DUP_CHK);
460 G.ntransmitted++;
461
462 size_pkt += datalen;
463
464 /* sizeof(pingaddr) can be larger than real sa size, but I think
465 * it doesn't matter */
466 sz = xsendto(pingsock, G.snd_packet, size_pkt, &pingaddr.sa, sizeof(pingaddr));
467 if (sz != size_pkt)
468 bb_error_msg_and_die("%s", bb_msg_write_error);
469
470 if (pingcount == 0 || deadline || G.ntransmitted < pingcount) {
471 /* Didn't send all pings yet - schedule next in 1s */
472 signal(SIGALRM, sp);
473 if (deadline) {
474 total_secs += PINGINTERVAL;
475 if (total_secs >= deadline)
476 signal(SIGALRM, print_stats_and_exit);
477 }
478 alarm(PINGINTERVAL);
479 } else { /* -c NN, and all NN are sent (and no deadline) */
480 /* Wait for the last ping to come back.
481 * -W timeout: wait for a response in seconds.
482 * Affects only timeout in absense of any responses,
483 * otherwise ping waits for two RTTs. */
484 unsigned expire = timeout;
485
486 if (G.nreceived) {
487 /* approx. 2*tmax, in seconds (2 RTT) */
488 expire = tmax / (512*1024);
489 if (expire == 0)
490 expire = 1;
491 }
492 signal(SIGALRM, print_stats_and_exit);
493 alarm(expire);
494 }
495}
496
497static void sendping4(int junk UNUSED_PARAM)
498{
499 struct icmp *pkt = G.snd_packet;
500
501 //memset(pkt, 0, datalen + ICMP_MINLEN + 4); - G.snd_packet was xzalloced
502 pkt->icmp_type = ICMP_ECHO;
503 /*pkt->icmp_code = 0;*/
504 pkt->icmp_cksum = 0; /* cksum is calculated with this field set to 0 */
505 pkt->icmp_seq = htons(G.ntransmitted); /* don't ++ here, it can be a macro */
506 pkt->icmp_id = myid;
507
508 /* If datalen < 4, we store timestamp _past_ the packet,
509 * but it's ok - we allocated 4 extra bytes in xzalloc() just in case.
510 */
511 /*if (datalen >= 4)*/
512 /* No hton: we'll read it back on the same machine */
513 *(uint32_t*)&pkt->icmp_dun = monotonic_us();
514
515 pkt->icmp_cksum = inet_cksum((uint16_t *) pkt, datalen + ICMP_MINLEN);
516
517 sendping_tail(sendping4, ICMP_MINLEN);
518}
519#if ENABLE_PING6
520static void sendping6(int junk UNUSED_PARAM)
521{
522 struct icmp6_hdr *pkt = G.snd_packet;
523
524 //memset(pkt, 0, datalen + sizeof(struct icmp6_hdr) + 4);
525 pkt->icmp6_type = ICMP6_ECHO_REQUEST;
526 /*pkt->icmp6_code = 0;*/
527 /*pkt->icmp6_cksum = 0;*/
528 pkt->icmp6_seq = htons(G.ntransmitted); /* don't ++ here, it can be a macro */
529 pkt->icmp6_id = myid;
530
531 /*if (datalen >= 4)*/
532 *(bb__aliased_uint32_t*)(&pkt->icmp6_data8[4]) = monotonic_us();
533
534 //TODO? pkt->icmp_cksum = inet_cksum(...);
535
536 sendping_tail(sendping6, sizeof(struct icmp6_hdr));
537}
538#endif
539
540static const char *icmp_type_name(int id)
541{
542 switch (id) {
543 case ICMP_ECHOREPLY: return "Echo Reply";
544 case ICMP_DEST_UNREACH: return "Destination Unreachable";
545 case ICMP_SOURCE_QUENCH: return "Source Quench";
546 case ICMP_REDIRECT: return "Redirect (change route)";
547 case ICMP_ECHO: return "Echo Request";
548 case ICMP_TIME_EXCEEDED: return "Time Exceeded";
549 case ICMP_PARAMETERPROB: return "Parameter Problem";
550 case ICMP_TIMESTAMP: return "Timestamp Request";
551 case ICMP_TIMESTAMPREPLY: return "Timestamp Reply";
552 case ICMP_INFO_REQUEST: return "Information Request";
553 case ICMP_INFO_REPLY: return "Information Reply";
554 case ICMP_ADDRESS: return "Address Mask Request";
555 case ICMP_ADDRESSREPLY: return "Address Mask Reply";
556 default: return "unknown ICMP type";
557 }
558}
559#if ENABLE_PING6
560/* RFC3542 changed some definitions from RFC2292 for no good reason, whee!
561 * the newer 3542 uses a MLD_ prefix where as 2292 uses ICMP6_ prefix */
562#ifndef MLD_LISTENER_QUERY
563# define MLD_LISTENER_QUERY ICMP6_MEMBERSHIP_QUERY
564#endif
565#ifndef MLD_LISTENER_REPORT
566# define MLD_LISTENER_REPORT ICMP6_MEMBERSHIP_REPORT
567#endif
568#ifndef MLD_LISTENER_REDUCTION
569# define MLD_LISTENER_REDUCTION ICMP6_MEMBERSHIP_REDUCTION
570#endif
571static const char *icmp6_type_name(int id)
572{
573 switch (id) {
574 case ICMP6_DST_UNREACH: return "Destination Unreachable";
575 case ICMP6_PACKET_TOO_BIG: return "Packet too big";
576 case ICMP6_TIME_EXCEEDED: return "Time Exceeded";
577 case ICMP6_PARAM_PROB: return "Parameter Problem";
578 case ICMP6_ECHO_REPLY: return "Echo Reply";
579 case ICMP6_ECHO_REQUEST: return "Echo Request";
580 case MLD_LISTENER_QUERY: return "Listener Query";
581 case MLD_LISTENER_REPORT: return "Listener Report";
582 case MLD_LISTENER_REDUCTION: return "Listener Reduction";
583 default: return "unknown ICMP type";
584 }
585}
586#endif
587
588static void unpack_tail(int sz, uint32_t *tp,
589 const char *from_str,
590 uint16_t recv_seq, int ttl)
591{
592 unsigned char *b, m;
593 const char *dupmsg = " (DUP!)";
594 unsigned triptime = 0;
595
596 if (tp) {
597 /* (int32_t) cast is for hypothetical 64-bit unsigned */
598 /* (doesn't hurt 32-bit real-world anyway) */
599 triptime = (int32_t) ((uint32_t)monotonic_us() - *tp);
600 tsum += triptime;
601 if (triptime < tmin)
602 tmin = triptime;
603 if (triptime > tmax)
604 tmax = triptime;
605 }
606
607 b = &BYTE(recv_seq % MAX_DUP_CHK);
608 m = MASK(recv_seq % MAX_DUP_CHK);
609 /*if TST(recv_seq % MAX_DUP_CHK):*/
610 if (*b & m) {
611 ++G.nrepeats;
612 } else {
613 /*SET(recv_seq % MAX_DUP_CHK):*/
614 *b |= m;
615 ++G.nreceived;
616 dupmsg += 7;
617 }
618
619 if (option_mask32 & OPT_QUIET)
620 return;
621
622 printf("%d bytes from %s: seq=%u ttl=%d", sz,
623 from_str, recv_seq, ttl);
624 if (tp)
625 printf(" time=%u.%03u ms", triptime / 1000, triptime % 1000);
626 puts(dupmsg);
627 fflush_all();
628}
629static void unpack4(char *buf, int sz, struct sockaddr_in *from)
630{
631 struct icmp *icmppkt;
632 struct iphdr *iphdr;
633 int hlen;
634
635 /* discard if too short */
636 if (sz < (int) (datalen + ICMP_MINLEN))
637 return;
638
639 /* check IP header */
640 iphdr = (struct iphdr *) buf;
641 hlen = iphdr->ihl << 2;
642 sz -= hlen;
643 icmppkt = (struct icmp *) (buf + hlen);
644 if (icmppkt->icmp_id != myid)
645 return; /* not our ping */
646
647 if (icmppkt->icmp_type == ICMP_ECHOREPLY) {
648 uint16_t recv_seq = ntohs(icmppkt->icmp_seq);
649 uint32_t *tp = NULL;
650
651 if (sz >= (int) (ICMP_MINLEN + sizeof(uint32_t)))
652 tp = (uint32_t *) icmppkt->icmp_data;
653 unpack_tail(sz, tp,
654 inet_ntoa(*(struct in_addr *) &from->sin_addr.s_addr),
655 recv_seq, iphdr->ttl);
656 } else if (icmppkt->icmp_type != ICMP_ECHO) {
657 bb_error_msg("warning: got ICMP %d (%s)",
658 icmppkt->icmp_type,
659 icmp_type_name(icmppkt->icmp_type));
660 }
661}
662#if ENABLE_PING6
663static void unpack6(char *packet, int sz, struct sockaddr_in6 *from, int hoplimit)
664{
665 struct icmp6_hdr *icmppkt;
666 char buf[INET6_ADDRSTRLEN];
667
668 /* discard if too short */
669 if (sz < (int) (datalen + sizeof(struct icmp6_hdr)))
670 return;
671
672 icmppkt = (struct icmp6_hdr *) packet;
673 if (icmppkt->icmp6_id != myid)
674 return; /* not our ping */
675
676 if (icmppkt->icmp6_type == ICMP6_ECHO_REPLY) {
677 uint16_t recv_seq = ntohs(icmppkt->icmp6_seq);
678 uint32_t *tp = NULL;
679
680 if (sz >= (int) (sizeof(struct icmp6_hdr) + sizeof(uint32_t)))
681 tp = (uint32_t *) &icmppkt->icmp6_data8[4];
682 unpack_tail(sz, tp,
683 inet_ntop(AF_INET6, &from->sin6_addr,
684 buf, sizeof(buf)),
685 recv_seq, hoplimit);
686 } else if (icmppkt->icmp6_type != ICMP6_ECHO_REQUEST) {
687 bb_error_msg("warning: got ICMP %d (%s)",
688 icmppkt->icmp6_type,
689 icmp6_type_name(icmppkt->icmp6_type));
690 }
691}
692#endif
693
694static void ping4(len_and_sockaddr *lsa)
695{
696 int sockopt;
697
698 pingaddr.sin = lsa->u.sin;
699 if (source_lsa) {
700 if (setsockopt(pingsock, IPPROTO_IP, IP_MULTICAST_IF,
701 &source_lsa->u.sa, source_lsa->len))
702 bb_error_msg_and_die("can't set multicast source interface");
703 xbind(pingsock, &source_lsa->u.sa, source_lsa->len);
704 }
705
706 /* enable broadcast pings */
707 setsockopt_broadcast(pingsock);
708
709 /* set recv buf (needed if we can get lots of responses: flood ping,
710 * broadcast ping etc) */
711 sockopt = (datalen * 2) + 7 * 1024; /* giving it a bit of extra room */
712 setsockopt(pingsock, SOL_SOCKET, SO_RCVBUF, &sockopt, sizeof(sockopt));
713
714 if (opt_ttl != 0) {
715 setsockopt(pingsock, IPPROTO_IP, IP_TTL, &opt_ttl, sizeof(opt_ttl));
716 /* above doesnt affect packets sent to bcast IP, so... */
717 setsockopt(pingsock, IPPROTO_IP, IP_MULTICAST_TTL, &opt_ttl, sizeof(opt_ttl));
718 }
719
720 signal(SIGINT, print_stats_and_exit);
721
722 /* start the ping's going ... */
723 sendping4(0);
724
725 /* listen for replies */
726 while (1) {
727 struct sockaddr_in from;
728 socklen_t fromlen = (socklen_t) sizeof(from);
729 int c;
730
731 c = recvfrom(pingsock, G.rcv_packet, G.sizeof_rcv_packet, 0,
732 (struct sockaddr *) &from, &fromlen);
733 if (c < 0) {
734 if (errno != EINTR)
735 bb_perror_msg("recvfrom");
736 continue;
737 }
738 unpack4(G.rcv_packet, c, &from);
739 if (pingcount && G.nreceived >= pingcount)
740 break;
741 }
742}
743#if ENABLE_PING6
744extern int BUG_bad_offsetof_icmp6_cksum(void);
745static void ping6(len_and_sockaddr *lsa)
746{
747 int sockopt;
748 struct msghdr msg;
749 struct sockaddr_in6 from;
750 struct iovec iov;
751 char control_buf[CMSG_SPACE(36)];
752
753 pingaddr.sin6 = lsa->u.sin6;
754 if (source_lsa)
755 xbind(pingsock, &source_lsa->u.sa, source_lsa->len);
756
757#ifdef ICMP6_FILTER
758 {
759 struct icmp6_filter filt;
760 if (!(option_mask32 & OPT_VERBOSE)) {
761 ICMP6_FILTER_SETBLOCKALL(&filt);
762 ICMP6_FILTER_SETPASS(ICMP6_ECHO_REPLY, &filt);
763 } else {
764 ICMP6_FILTER_SETPASSALL(&filt);
765 }
766 if (setsockopt(pingsock, IPPROTO_ICMPV6, ICMP6_FILTER, &filt,
767 sizeof(filt)) < 0)
768 bb_error_msg_and_die("setsockopt(ICMP6_FILTER)");
769 }
770#endif /*ICMP6_FILTER*/
771
772 /* enable broadcast pings */
773 setsockopt_broadcast(pingsock);
774
775 /* set recv buf (needed if we can get lots of responses: flood ping,
776 * broadcast ping etc) */
777 sockopt = (datalen * 2) + 7 * 1024; /* giving it a bit of extra room */
778 setsockopt(pingsock, SOL_SOCKET, SO_RCVBUF, &sockopt, sizeof(sockopt));
779
780 sockopt = offsetof(struct icmp6_hdr, icmp6_cksum);
781 if (offsetof(struct icmp6_hdr, icmp6_cksum) != 2)
782 BUG_bad_offsetof_icmp6_cksum();
783 setsockopt(pingsock, SOL_RAW, IPV6_CHECKSUM, &sockopt, sizeof(sockopt));
784
785 /* request ttl info to be returned in ancillary data */
786 setsockopt(pingsock, SOL_IPV6, IPV6_HOPLIMIT, &const_int_1, sizeof(const_int_1));
787
788 if (if_index)
789 pingaddr.sin6.sin6_scope_id = if_index;
790
791 signal(SIGINT, print_stats_and_exit);
792
793 /* start the ping's going ... */
794 sendping6(0);
795
796 /* listen for replies */
797 msg.msg_name = &from;
798 msg.msg_namelen = sizeof(from);
799 msg.msg_iov = &iov;
800 msg.msg_iovlen = 1;
801 msg.msg_control = control_buf;
802 iov.iov_base = G.rcv_packet;
803 iov.iov_len = G.sizeof_rcv_packet;
804 while (1) {
805 int c;
806 struct cmsghdr *mp;
807 int hoplimit = -1;
808 msg.msg_controllen = sizeof(control_buf);
809
810 c = recvmsg(pingsock, &msg, 0);
811 if (c < 0) {
812 if (errno != EINTR)
813 bb_perror_msg("recvfrom");
814 continue;
815 }
816 for (mp = CMSG_FIRSTHDR(&msg); mp; mp = CMSG_NXTHDR(&msg, mp)) {
817 if (mp->cmsg_level == SOL_IPV6
818 && mp->cmsg_type == IPV6_HOPLIMIT
819 /* don't check len - we trust the kernel: */
820 /* && mp->cmsg_len >= CMSG_LEN(sizeof(int)) */
821 ) {
822 /*hoplimit = *(int*)CMSG_DATA(mp); - unaligned access */
823 move_from_unaligned_int(hoplimit, CMSG_DATA(mp));
824 }
825 }
826 unpack6(G.rcv_packet, c, &from, hoplimit);
827 if (pingcount && G.nreceived >= pingcount)
828 break;
829 }
830}
831#endif
832
833static void ping(len_and_sockaddr *lsa)
834{
835 printf("PING %s (%s)", hostname, dotted);
836 if (source_lsa) {
837 printf(" from %s",
838 xmalloc_sockaddr2dotted_noport(&source_lsa->u.sa));
839 }
840 printf(": %d data bytes\n", datalen);
841
842 create_icmp_socket(lsa);
843 /* untested whether "-I addr" really works for IPv6: */
844 if (str_I)
845 setsockopt_bindtodevice(pingsock, str_I);
846
847 G.sizeof_rcv_packet = datalen + MAXIPLEN + MAXICMPLEN;
848 G.rcv_packet = xzalloc(G.sizeof_rcv_packet);
849#if ENABLE_PING6
850 if (lsa->u.sa.sa_family == AF_INET6) {
851 /* +4 reserves a place for timestamp, which may end up sitting
852 * _after_ packet. Saves one if() - see sendping4/6() */
853 G.snd_packet = xzalloc(datalen + sizeof(struct icmp6_hdr) + 4);
854 ping6(lsa);
855 } else
856#endif
857 {
858 G.snd_packet = xzalloc(datalen + ICMP_MINLEN + 4);
859 ping4(lsa);
860 }
861}
862
863static int common_ping_main(int opt, char **argv)
864{
865 len_and_sockaddr *lsa;
866 char *str_s;
867
868 INIT_G();
869
870 /* exactly one argument needed; -v and -q don't mix; -c NUM, -t NUM, -w NUM, -W NUM */
871 opt_complementary = "=1:q--v:v--q:c+:t+:w+:W+";
872 opt |= getopt32(argv, OPT_STRING, &pingcount, &str_s, &opt_ttl, &deadline, &timeout, &str_I);
873 if (opt & OPT_s)
874 datalen = xatou16(str_s); // -s
875 if (opt & OPT_I) { // -I
876 if_index = if_nametoindex(str_I);
877 if (!if_index) {
878 /* TODO: I'm not sure it takes IPv6 unless in [XX:XX..] format */
879 source_lsa = xdotted2sockaddr(str_I, 0);
880 str_I = NULL; /* don't try to bind to device later */
881 }
882 }
883 myid = (uint16_t) getpid();
884 hostname = argv[optind];
885#if ENABLE_PING6
886 {
887 sa_family_t af = AF_UNSPEC;
888 if (opt & OPT_IPV4)
889 af = AF_INET;
890 if (opt & OPT_IPV6)
891 af = AF_INET6;
892 lsa = xhost_and_af2sockaddr(hostname, 0, af);
893 }
894#else
895 lsa = xhost_and_af2sockaddr(hostname, 0, AF_INET);
896#endif
897
898 if (source_lsa && source_lsa->u.sa.sa_family != lsa->u.sa.sa_family)
899 /* leaking it here... */
900 source_lsa = NULL;
901
902 dotted = xmalloc_sockaddr2dotted_noport(&lsa->u.sa);
903 ping(lsa);
904 print_stats_and_exit(EXIT_SUCCESS);
905 /*return EXIT_SUCCESS;*/
906}
907#endif /* FEATURE_FANCY_PING */
908
909
910int ping_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
911int ping_main(int argc UNUSED_PARAM, char **argv)
912{
913#if !ENABLE_FEATURE_FANCY_PING
914 return common_ping_main(AF_UNSPEC, argv);
915#else
916 return common_ping_main(0, argv);
917#endif
918}
919
920#if ENABLE_PING6
921int ping6_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
922int ping6_main(int argc UNUSED_PARAM, char **argv)
923{
924# if !ENABLE_FEATURE_FANCY_PING
925 return common_ping_main(AF_INET6, argv);
926# else
927 return common_ping_main(OPT_IPV6, argv);
928# endif
929}
930#endif
931
932/* from ping6.c:
933 * Copyright (c) 1989 The Regents of the University of California.
934 * All rights reserved.
935 *
936 * This code is derived from software contributed to Berkeley by
937 * Mike Muuss.
938 *
939 * Redistribution and use in source and binary forms, with or without
940 * modification, are permitted provided that the following conditions
941 * are met:
942 * 1. Redistributions of source code must retain the above copyright
943 * notice, this list of conditions and the following disclaimer.
944 * 2. Redistributions in binary form must reproduce the above copyright
945 * notice, this list of conditions and the following disclaimer in the
946 * documentation and/or other materials provided with the distribution.
947 *
948 * 3. <BSD Advertising Clause omitted per the July 22, 1999 licensing change
949 * ftp://ftp.cs.berkeley.edu/pub/4bsd/README.Impt.License.Change>
950 *
951 * 4. Neither the name of the University nor the names of its contributors
952 * may be used to endorse or promote products derived from this software
953 * without specific prior written permission.
954 *
955 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
956 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
957 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
958 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
959 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
960 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
961 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
962 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
963 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
964 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
965 * SUCH DAMAGE.
966 */
967