Busybox: Upgrade to 1.21.1 (stable). lsof active.
[tomato.git] / release / src / router / busybox / networking / ping.c
blob3df67f5c39845125339ce54daf05abf9423b4735
1 /* vi: set sw=4 ts=4: */
2 /*
3 * Mini ping implementation for busybox
5 * Copyright (C) 1999 by Randolph Chung <tausq@debian.org>
7 * Adapted from the ping in netkit-base 0.10:
8 * Copyright (c) 1989 The Regents of the University of California.
9 * All rights reserved.
11 * This code is derived from software contributed to Berkeley by
12 * Mike Muuss.
14 * Licensed under GPLv2 or later, see file LICENSE in this source tree.
16 /* from ping6.c:
17 * Copyright (C) 1999 by Randolph Chung <tausq@debian.org>
19 * This version of ping is adapted from the ping in netkit-base 0.10,
20 * which is:
22 * Original copyright notice is retained at the end of this file.
24 * This version is an adaptation of ping.c from busybox.
25 * The code was modified by Bart Visscher <magick@linux-fan.com>
28 #include <net/if.h>
29 #include <netinet/ip_icmp.h>
30 #include "libbb.h"
32 #ifdef __BIONIC__
33 /* should be in netinet/ip_icmp.h */
34 # define ICMP_DEST_UNREACH 3 /* Destination Unreachable */
35 # define ICMP_SOURCE_QUENCH 4 /* Source Quench */
36 # define ICMP_REDIRECT 5 /* Redirect (change route) */
37 # define ICMP_ECHO 8 /* Echo Request */
38 # define ICMP_TIME_EXCEEDED 11 /* Time Exceeded */
39 # define ICMP_PARAMETERPROB 12 /* Parameter Problem */
40 # define ICMP_TIMESTAMP 13 /* Timestamp Request */
41 # define ICMP_TIMESTAMPREPLY 14 /* Timestamp Reply */
42 # define ICMP_INFO_REQUEST 15 /* Information Request */
43 # define ICMP_INFO_REPLY 16 /* Information Reply */
44 # define ICMP_ADDRESS 17 /* Address Mask Request */
45 # define ICMP_ADDRESSREPLY 18 /* Address Mask Reply */
46 #endif
48 //config:config PING
49 //config: bool "ping"
50 //config: default y
51 //config: select PLATFORM_LINUX
52 //config: help
53 //config: ping uses the ICMP protocol's mandatory ECHO_REQUEST datagram to
54 //config: elicit an ICMP ECHO_RESPONSE from a host or gateway.
55 //config:
56 //config:config PING6
57 //config: bool "ping6"
58 //config: default y
59 //config: depends on FEATURE_IPV6 && PING
60 //config: help
61 //config: This will give you a ping that can talk IPv6.
62 //config:
63 //config:config FEATURE_FANCY_PING
64 //config: bool "Enable fancy ping output"
65 //config: default y
66 //config: depends on PING
67 //config: help
68 //config: Make the output from the ping applet include statistics, and at the
69 //config: same time provide full support for ICMP packets.
71 /* Needs socket(AF_INET, SOCK_RAW, IPPROTO_ICMP), therefore BB_SUID_MAYBE: */
72 //applet:IF_PING(APPLET(ping, BB_DIR_BIN, BB_SUID_MAYBE))
73 //applet:IF_PING6(APPLET(ping6, BB_DIR_BIN, BB_SUID_MAYBE))
75 //kbuild:lib-$(CONFIG_PING) += ping.o
76 //kbuild:lib-$(CONFIG_PING6) += ping.o
78 //usage:#if !ENABLE_FEATURE_FANCY_PING
79 //usage:# define ping_trivial_usage
80 //usage: "HOST"
81 //usage:# define ping_full_usage "\n\n"
82 //usage: "Send ICMP ECHO_REQUEST packets to network hosts"
83 //usage:# define ping6_trivial_usage
84 //usage: "HOST"
85 //usage:# define ping6_full_usage "\n\n"
86 //usage: "Send ICMP ECHO_REQUEST packets to network hosts"
87 //usage:#else
88 //usage:# define ping_trivial_usage
89 //usage: "[OPTIONS] HOST"
90 //usage:# define ping_full_usage "\n\n"
91 //usage: "Send ICMP ECHO_REQUEST packets to network hosts\n"
92 //usage: "\n -4,-6 Force IP or IPv6 name resolution"
93 //usage: "\n -c CNT Send only CNT pings"
94 //usage: "\n -s SIZE Send SIZE data bytes in packets (default:56)"
95 //usage: "\n -t TTL Set TTL"
96 //usage: "\n -I IFACE/IP Use interface or IP address as source"
97 //usage: "\n -W SEC Seconds to wait for the first response (default:10)"
98 //usage: "\n (after all -c CNT packets are sent)"
99 //usage: "\n -w SEC Seconds until ping exits (default:infinite)"
100 //usage: "\n (can exit earlier with -c CNT)"
101 //usage: "\n -q Quiet, only displays output at start"
102 //usage: "\n and when finished"
103 //usage:
104 //usage:# define ping6_trivial_usage
105 //usage: "[OPTIONS] HOST"
106 //usage:# define ping6_full_usage "\n\n"
107 //usage: "Send ICMP ECHO_REQUEST packets to network hosts\n"
108 //usage: "\n -c CNT Send only CNT pings"
109 //usage: "\n -s SIZE Send SIZE data bytes in packets (default:56)"
110 //usage: "\n -I IFACE/IP Use interface or IP address as source"
111 //usage: "\n -q Quiet, only displays output at start"
112 //usage: "\n and when finished"
113 //usage:
114 //usage:#endif
115 //usage:
116 //usage:#define ping_example_usage
117 //usage: "$ ping localhost\n"
118 //usage: "PING slag (127.0.0.1): 56 data bytes\n"
119 //usage: "64 bytes from 127.0.0.1: icmp_seq=0 ttl=255 time=20.1 ms\n"
120 //usage: "\n"
121 //usage: "--- debian ping statistics ---\n"
122 //usage: "1 packets transmitted, 1 packets received, 0% packet loss\n"
123 //usage: "round-trip min/avg/max = 20.1/20.1/20.1 ms\n"
124 //usage:#define ping6_example_usage
125 //usage: "$ ping6 ip6-localhost\n"
126 //usage: "PING ip6-localhost (::1): 56 data bytes\n"
127 //usage: "64 bytes from ::1: icmp6_seq=0 ttl=64 time=20.1 ms\n"
128 //usage: "\n"
129 //usage: "--- ip6-localhost ping statistics ---\n"
130 //usage: "1 packets transmitted, 1 packets received, 0% packet loss\n"
131 //usage: "round-trip min/avg/max = 20.1/20.1/20.1 ms\n"
133 #if ENABLE_PING6
134 # include <netinet/icmp6.h>
135 /* I see RENUMBERED constants in bits/in.h - !!?
136 * What a fuck is going on with libc? Is it a glibc joke? */
137 # ifdef IPV6_2292HOPLIMIT
138 # undef IPV6_HOPLIMIT
139 # define IPV6_HOPLIMIT IPV6_2292HOPLIMIT
140 # endif
141 #endif
143 enum {
144 DEFDATALEN = 56,
145 MAXIPLEN = 60,
146 MAXICMPLEN = 76,
147 MAX_DUP_CHK = (8 * 128),
148 MAXWAIT = 10,
149 PINGINTERVAL = 1, /* 1 second */
152 #if !ENABLE_FEATURE_FANCY_PING
154 /* Simple version */
156 struct globals {
157 char *hostname;
158 char packet[DEFDATALEN + MAXIPLEN + MAXICMPLEN];
159 } FIX_ALIASING;
160 #define G (*(struct globals*)&bb_common_bufsiz1)
161 #define INIT_G() do { } while (0)
163 static void noresp(int ign UNUSED_PARAM)
165 printf("No response from %s\n", G.hostname);
166 exit(EXIT_FAILURE);
169 static void ping4(len_and_sockaddr *lsa)
171 struct icmp *pkt;
172 int pingsock, c;
174 pingsock = create_icmp_socket();
176 pkt = (struct icmp *) G.packet;
177 memset(pkt, 0, sizeof(G.packet));
178 pkt->icmp_type = ICMP_ECHO;
179 pkt->icmp_cksum = inet_cksum((uint16_t *) pkt, sizeof(G.packet));
181 xsendto(pingsock, G.packet, DEFDATALEN + ICMP_MINLEN, &lsa->u.sa, lsa->len);
183 /* listen for replies */
184 while (1) {
185 struct sockaddr_in from;
186 socklen_t fromlen = sizeof(from);
188 c = recvfrom(pingsock, G.packet, sizeof(G.packet), 0,
189 (struct sockaddr *) &from, &fromlen);
190 if (c < 0) {
191 if (errno != EINTR)
192 bb_perror_msg("recvfrom");
193 continue;
195 if (c >= 76) { /* ip + icmp */
196 struct iphdr *iphdr = (struct iphdr *) G.packet;
198 pkt = (struct icmp *) (G.packet + (iphdr->ihl << 2)); /* skip ip hdr */
199 if (pkt->icmp_type == ICMP_ECHOREPLY)
200 break;
203 if (ENABLE_FEATURE_CLEAN_UP)
204 close(pingsock);
207 #if ENABLE_PING6
208 static void ping6(len_and_sockaddr *lsa)
210 struct icmp6_hdr *pkt;
211 int pingsock, c;
212 int sockopt;
214 pingsock = create_icmp6_socket();
216 pkt = (struct icmp6_hdr *) G.packet;
217 memset(pkt, 0, sizeof(G.packet));
218 pkt->icmp6_type = ICMP6_ECHO_REQUEST;
220 sockopt = offsetof(struct icmp6_hdr, icmp6_cksum);
221 setsockopt(pingsock, SOL_RAW, IPV6_CHECKSUM, &sockopt, sizeof(sockopt));
223 xsendto(pingsock, G.packet, DEFDATALEN + sizeof(struct icmp6_hdr), &lsa->u.sa, lsa->len);
225 /* listen for replies */
226 while (1) {
227 struct sockaddr_in6 from;
228 socklen_t fromlen = sizeof(from);
230 c = recvfrom(pingsock, G.packet, sizeof(G.packet), 0,
231 (struct sockaddr *) &from, &fromlen);
232 if (c < 0) {
233 if (errno != EINTR)
234 bb_perror_msg("recvfrom");
235 continue;
237 if (c >= ICMP_MINLEN) { /* icmp6_hdr */
238 pkt = (struct icmp6_hdr *) G.packet;
239 if (pkt->icmp6_type == ICMP6_ECHO_REPLY)
240 break;
243 if (ENABLE_FEATURE_CLEAN_UP)
244 close(pingsock);
246 #endif
248 #if !ENABLE_PING6
249 # define common_ping_main(af, argv) common_ping_main(argv)
250 #endif
251 static int common_ping_main(sa_family_t af, char **argv)
253 len_and_sockaddr *lsa;
255 INIT_G();
257 #if ENABLE_PING6
258 while ((++argv)[0] && argv[0][0] == '-') {
259 if (argv[0][1] == '4') {
260 af = AF_INET;
261 continue;
263 if (argv[0][1] == '6') {
264 af = AF_INET6;
265 continue;
267 bb_show_usage();
269 #else
270 argv++;
271 #endif
273 G.hostname = *argv;
274 if (!G.hostname)
275 bb_show_usage();
277 #if ENABLE_PING6
278 lsa = xhost_and_af2sockaddr(G.hostname, 0, af);
279 #else
280 lsa = xhost_and_af2sockaddr(G.hostname, 0, AF_INET);
281 #endif
282 /* Set timer _after_ DNS resolution */
283 signal(SIGALRM, noresp);
284 alarm(5); /* give the host 5000ms to respond */
286 #if ENABLE_PING6
287 if (lsa->u.sa.sa_family == AF_INET6)
288 ping6(lsa);
289 else
290 #endif
291 ping4(lsa);
292 printf("%s is alive!\n", G.hostname);
293 return EXIT_SUCCESS;
297 #else /* FEATURE_FANCY_PING */
300 /* Full(er) version */
302 #define OPT_STRING ("qvc:s:t:w:W:I:4" IF_PING6("6"))
303 enum {
304 OPT_QUIET = 1 << 0,
305 OPT_VERBOSE = 1 << 1,
306 OPT_c = 1 << 2,
307 OPT_s = 1 << 3,
308 OPT_t = 1 << 4,
309 OPT_w = 1 << 5,
310 OPT_W = 1 << 6,
311 OPT_I = 1 << 7,
312 OPT_IPV4 = 1 << 8,
313 OPT_IPV6 = (1 << 9) * ENABLE_PING6,
317 struct globals {
318 int pingsock;
319 int if_index;
320 char *str_I;
321 len_and_sockaddr *source_lsa;
322 unsigned datalen;
323 unsigned pingcount; /* must be int-sized */
324 unsigned opt_ttl;
325 unsigned long ntransmitted, nreceived, nrepeats;
326 uint16_t myid;
327 unsigned tmin, tmax; /* in us */
328 unsigned long long tsum; /* in us, sum of all times */
329 unsigned deadline;
330 unsigned timeout;
331 unsigned total_secs;
332 unsigned sizeof_rcv_packet;
333 char *rcv_packet; /* [datalen + MAXIPLEN + MAXICMPLEN] */
334 void *snd_packet; /* [datalen + ipv4/ipv6_const] */
335 const char *hostname;
336 const char *dotted;
337 union {
338 struct sockaddr sa;
339 struct sockaddr_in sin;
340 #if ENABLE_PING6
341 struct sockaddr_in6 sin6;
342 #endif
343 } pingaddr;
344 char rcvd_tbl[MAX_DUP_CHK / 8];
345 } FIX_ALIASING;
346 #define G (*(struct globals*)&bb_common_bufsiz1)
347 #define pingsock (G.pingsock )
348 #define if_index (G.if_index )
349 #define source_lsa (G.source_lsa )
350 #define str_I (G.str_I )
351 #define datalen (G.datalen )
352 #define ntransmitted (G.ntransmitted)
353 #define nreceived (G.nreceived )
354 #define nrepeats (G.nrepeats )
355 #define pingcount (G.pingcount )
356 #define opt_ttl (G.opt_ttl )
357 #define myid (G.myid )
358 #define tmin (G.tmin )
359 #define tmax (G.tmax )
360 #define tsum (G.tsum )
361 #define deadline (G.deadline )
362 #define timeout (G.timeout )
363 #define total_secs (G.total_secs )
364 #define hostname (G.hostname )
365 #define dotted (G.dotted )
366 #define pingaddr (G.pingaddr )
367 #define rcvd_tbl (G.rcvd_tbl )
368 void BUG_ping_globals_too_big(void);
369 #define INIT_G() do { \
370 if (sizeof(G) > COMMON_BUFSIZE) \
371 BUG_ping_globals_too_big(); \
372 pingsock = -1; \
373 datalen = DEFDATALEN; \
374 timeout = MAXWAIT; \
375 tmin = UINT_MAX; \
376 } while (0)
379 #define A(bit) rcvd_tbl[(bit)>>3] /* identify byte in array */
380 #define B(bit) (1 << ((bit) & 0x07)) /* identify bit in byte */
381 #define SET(bit) (A(bit) |= B(bit))
382 #define CLR(bit) (A(bit) &= (~B(bit)))
383 #define TST(bit) (A(bit) & B(bit))
385 /**************************************************************************/
387 static void print_stats_and_exit(int junk) NORETURN;
388 static void print_stats_and_exit(int junk UNUSED_PARAM)
390 signal(SIGINT, SIG_IGN);
392 printf("\n--- %s ping statistics ---\n", hostname);
393 printf("%lu packets transmitted, ", ntransmitted);
394 printf("%lu packets received, ", nreceived);
395 if (nrepeats)
396 printf("%lu duplicates, ", nrepeats);
397 if (ntransmitted)
398 ntransmitted = (ntransmitted - nreceived) * 100 / ntransmitted;
399 printf("%lu%% packet loss\n", ntransmitted);
400 if (tmin != UINT_MAX) {
401 unsigned tavg = tsum / (nreceived + nrepeats);
402 printf("round-trip min/avg/max = %u.%03u/%u.%03u/%u.%03u ms\n",
403 tmin / 1000, tmin % 1000,
404 tavg / 1000, tavg % 1000,
405 tmax / 1000, tmax % 1000);
407 /* if condition is true, exit with 1 -- 'failure' */
408 exit(nreceived == 0 || (deadline && nreceived < pingcount));
411 static void sendping_tail(void (*sp)(int), int size_pkt)
413 int sz;
415 CLR((uint16_t)ntransmitted % MAX_DUP_CHK);
416 ntransmitted++;
418 size_pkt += datalen;
420 /* sizeof(pingaddr) can be larger than real sa size, but I think
421 * it doesn't matter */
422 sz = xsendto(pingsock, G.snd_packet, size_pkt, &pingaddr.sa, sizeof(pingaddr));
423 if (sz != size_pkt)
424 bb_error_msg_and_die(bb_msg_write_error);
426 if (pingcount == 0 || deadline || ntransmitted < pingcount) {
427 /* Didn't send all pings yet - schedule next in 1s */
428 signal(SIGALRM, sp);
429 if (deadline) {
430 total_secs += PINGINTERVAL;
431 if (total_secs >= deadline)
432 signal(SIGALRM, print_stats_and_exit);
434 alarm(PINGINTERVAL);
435 } else { /* -c NN, and all NN are sent (and no deadline) */
436 /* Wait for the last ping to come back.
437 * -W timeout: wait for a response in seconds.
438 * Affects only timeout in absense of any responses,
439 * otherwise ping waits for two RTTs. */
440 unsigned expire = timeout;
442 if (nreceived) {
443 /* approx. 2*tmax, in seconds (2 RTT) */
444 expire = tmax / (512*1024);
445 if (expire == 0)
446 expire = 1;
448 signal(SIGALRM, print_stats_and_exit);
449 alarm(expire);
453 static void sendping4(int junk UNUSED_PARAM)
455 struct icmp *pkt = G.snd_packet;
457 //memset(pkt, 0, datalen + ICMP_MINLEN + 4); - G.snd_packet was xzalloced
458 pkt->icmp_type = ICMP_ECHO;
459 /*pkt->icmp_code = 0;*/
460 pkt->icmp_cksum = 0; /* cksum is calculated with this field set to 0 */
461 pkt->icmp_seq = htons(ntransmitted); /* don't ++ here, it can be a macro */
462 pkt->icmp_id = myid;
464 /* If datalen < 4, we store timestamp _past_ the packet,
465 * but it's ok - we allocated 4 extra bytes in xzalloc() just in case.
467 /*if (datalen >= 4)*/
468 /* No hton: we'll read it back on the same machine */
469 *(uint32_t*)&pkt->icmp_dun = monotonic_us();
471 pkt->icmp_cksum = inet_cksum((uint16_t *) pkt, datalen + ICMP_MINLEN);
473 sendping_tail(sendping4, ICMP_MINLEN);
475 #if ENABLE_PING6
476 static void sendping6(int junk UNUSED_PARAM)
478 struct icmp6_hdr *pkt = G.snd_packet;
480 //memset(pkt, 0, datalen + sizeof(struct icmp6_hdr) + 4);
481 pkt->icmp6_type = ICMP6_ECHO_REQUEST;
482 /*pkt->icmp6_code = 0;*/
483 /*pkt->icmp6_cksum = 0;*/
484 pkt->icmp6_seq = htons(ntransmitted); /* don't ++ here, it can be a macro */
485 pkt->icmp6_id = myid;
487 /*if (datalen >= 4)*/
488 *(uint32_t*)(&pkt->icmp6_data8[4]) = monotonic_us();
490 //TODO? pkt->icmp_cksum = inet_cksum(...);
492 sendping_tail(sendping6, sizeof(struct icmp6_hdr));
494 #endif
496 static const char *icmp_type_name(int id)
498 switch (id) {
499 case ICMP_ECHOREPLY: return "Echo Reply";
500 case ICMP_DEST_UNREACH: return "Destination Unreachable";
501 case ICMP_SOURCE_QUENCH: return "Source Quench";
502 case ICMP_REDIRECT: return "Redirect (change route)";
503 case ICMP_ECHO: return "Echo Request";
504 case ICMP_TIME_EXCEEDED: return "Time Exceeded";
505 case ICMP_PARAMETERPROB: return "Parameter Problem";
506 case ICMP_TIMESTAMP: return "Timestamp Request";
507 case ICMP_TIMESTAMPREPLY: return "Timestamp Reply";
508 case ICMP_INFO_REQUEST: return "Information Request";
509 case ICMP_INFO_REPLY: return "Information Reply";
510 case ICMP_ADDRESS: return "Address Mask Request";
511 case ICMP_ADDRESSREPLY: return "Address Mask Reply";
512 default: return "unknown ICMP type";
515 #if ENABLE_PING6
516 /* RFC3542 changed some definitions from RFC2292 for no good reason, whee!
517 * the newer 3542 uses a MLD_ prefix where as 2292 uses ICMP6_ prefix */
518 #ifndef MLD_LISTENER_QUERY
519 # define MLD_LISTENER_QUERY ICMP6_MEMBERSHIP_QUERY
520 #endif
521 #ifndef MLD_LISTENER_REPORT
522 # define MLD_LISTENER_REPORT ICMP6_MEMBERSHIP_REPORT
523 #endif
524 #ifndef MLD_LISTENER_REDUCTION
525 # define MLD_LISTENER_REDUCTION ICMP6_MEMBERSHIP_REDUCTION
526 #endif
527 static const char *icmp6_type_name(int id)
529 switch (id) {
530 case ICMP6_DST_UNREACH: return "Destination Unreachable";
531 case ICMP6_PACKET_TOO_BIG: return "Packet too big";
532 case ICMP6_TIME_EXCEEDED: return "Time Exceeded";
533 case ICMP6_PARAM_PROB: return "Parameter Problem";
534 case ICMP6_ECHO_REPLY: return "Echo Reply";
535 case ICMP6_ECHO_REQUEST: return "Echo Request";
536 case MLD_LISTENER_QUERY: return "Listener Query";
537 case MLD_LISTENER_REPORT: return "Listener Report";
538 case MLD_LISTENER_REDUCTION: return "Listener Reduction";
539 default: return "unknown ICMP type";
542 #endif
544 static void unpack_tail(int sz, uint32_t *tp,
545 const char *from_str,
546 uint16_t recv_seq, int ttl)
548 const char *dupmsg = " (DUP!)";
549 unsigned triptime = triptime; /* for gcc */
551 ++nreceived;
553 if (tp) {
554 /* (int32_t) cast is for hypothetical 64-bit unsigned */
555 /* (doesn't hurt 32-bit real-world anyway) */
556 triptime = (int32_t) ((uint32_t)monotonic_us() - *tp);
557 tsum += triptime;
558 if (triptime < tmin)
559 tmin = triptime;
560 if (triptime > tmax)
561 tmax = triptime;
564 if (TST(recv_seq % MAX_DUP_CHK)) {
565 ++nrepeats;
566 --nreceived;
567 } else {
568 SET(recv_seq % MAX_DUP_CHK);
569 dupmsg += 7;
572 if (option_mask32 & OPT_QUIET)
573 return;
575 printf("%d bytes from %s: seq=%u ttl=%d", sz,
576 from_str, recv_seq, ttl);
577 if (tp)
578 printf(" time=%u.%03u ms", triptime / 1000, triptime % 1000);
579 puts(dupmsg);
580 fflush_all();
582 static void unpack4(char *buf, int sz, struct sockaddr_in *from)
584 struct icmp *icmppkt;
585 struct iphdr *iphdr;
586 int hlen;
588 /* discard if too short */
589 if (sz < (datalen + ICMP_MINLEN))
590 return;
592 /* check IP header */
593 iphdr = (struct iphdr *) buf;
594 hlen = iphdr->ihl << 2;
595 sz -= hlen;
596 icmppkt = (struct icmp *) (buf + hlen);
597 if (icmppkt->icmp_id != myid)
598 return; /* not our ping */
600 if (icmppkt->icmp_type == ICMP_ECHOREPLY) {
601 uint16_t recv_seq = ntohs(icmppkt->icmp_seq);
602 uint32_t *tp = NULL;
604 if (sz >= ICMP_MINLEN + sizeof(uint32_t))
605 tp = (uint32_t *) icmppkt->icmp_data;
606 unpack_tail(sz, tp,
607 inet_ntoa(*(struct in_addr *) &from->sin_addr.s_addr),
608 recv_seq, iphdr->ttl);
609 } else if (icmppkt->icmp_type != ICMP_ECHO) {
610 bb_error_msg("warning: got ICMP %d (%s)",
611 icmppkt->icmp_type,
612 icmp_type_name(icmppkt->icmp_type));
615 #if ENABLE_PING6
616 static void unpack6(char *packet, int sz, struct sockaddr_in6 *from, int hoplimit)
618 struct icmp6_hdr *icmppkt;
619 char buf[INET6_ADDRSTRLEN];
621 /* discard if too short */
622 if (sz < (datalen + sizeof(struct icmp6_hdr)))
623 return;
625 icmppkt = (struct icmp6_hdr *) packet;
626 if (icmppkt->icmp6_id != myid)
627 return; /* not our ping */
629 if (icmppkt->icmp6_type == ICMP6_ECHO_REPLY) {
630 uint16_t recv_seq = ntohs(icmppkt->icmp6_seq);
631 uint32_t *tp = NULL;
633 if (sz >= sizeof(struct icmp6_hdr) + sizeof(uint32_t))
634 tp = (uint32_t *) &icmppkt->icmp6_data8[4];
635 unpack_tail(sz, tp,
636 inet_ntop(AF_INET6, &from->sin6_addr,
637 buf, sizeof(buf)),
638 recv_seq, hoplimit);
639 } else if (icmppkt->icmp6_type != ICMP6_ECHO_REQUEST) {
640 bb_error_msg("warning: got ICMP %d (%s)",
641 icmppkt->icmp6_type,
642 icmp6_type_name(icmppkt->icmp6_type));
645 #endif
647 static void ping4(len_and_sockaddr *lsa)
649 int sockopt;
651 pingsock = create_icmp_socket();
652 pingaddr.sin = lsa->u.sin;
653 if (source_lsa) {
654 if (setsockopt(pingsock, IPPROTO_IP, IP_MULTICAST_IF,
655 &source_lsa->u.sa, source_lsa->len))
656 bb_error_msg_and_die("can't set multicast source interface");
657 xbind(pingsock, &source_lsa->u.sa, source_lsa->len);
659 if (str_I)
660 setsockopt_bindtodevice(pingsock, str_I);
662 /* enable broadcast pings */
663 setsockopt_broadcast(pingsock);
665 /* set recv buf (needed if we can get lots of responses: flood ping,
666 * broadcast ping etc) */
667 sockopt = (datalen * 2) + 7 * 1024; /* giving it a bit of extra room */
668 setsockopt(pingsock, SOL_SOCKET, SO_RCVBUF, &sockopt, sizeof(sockopt));
670 if (opt_ttl != 0) {
671 setsockopt(pingsock, IPPROTO_IP, IP_TTL, &opt_ttl, sizeof(opt_ttl));
672 /* above doesnt affect packets sent to bcast IP, so... */
673 setsockopt(pingsock, IPPROTO_IP, IP_MULTICAST_TTL, &opt_ttl, sizeof(opt_ttl));
676 signal(SIGINT, print_stats_and_exit);
678 /* start the ping's going ... */
679 sendping4(0);
681 /* listen for replies */
682 while (1) {
683 struct sockaddr_in from;
684 socklen_t fromlen = (socklen_t) sizeof(from);
685 int c;
687 c = recvfrom(pingsock, G.rcv_packet, G.sizeof_rcv_packet, 0,
688 (struct sockaddr *) &from, &fromlen);
689 if (c < 0) {
690 if (errno != EINTR)
691 bb_perror_msg("recvfrom");
692 continue;
694 unpack4(G.rcv_packet, c, &from);
695 if (pingcount && nreceived >= pingcount)
696 break;
699 #if ENABLE_PING6
700 extern int BUG_bad_offsetof_icmp6_cksum(void);
701 static void ping6(len_and_sockaddr *lsa)
703 int sockopt;
704 struct msghdr msg;
705 struct sockaddr_in6 from;
706 struct iovec iov;
707 char control_buf[CMSG_SPACE(36)];
709 pingsock = create_icmp6_socket();
710 pingaddr.sin6 = lsa->u.sin6;
711 /* untested whether "-I addr" really works for IPv6: */
712 if (source_lsa)
713 xbind(pingsock, &source_lsa->u.sa, source_lsa->len);
714 if (str_I)
715 setsockopt_bindtodevice(pingsock, str_I);
717 #ifdef ICMP6_FILTER
719 struct icmp6_filter filt;
720 if (!(option_mask32 & OPT_VERBOSE)) {
721 ICMP6_FILTER_SETBLOCKALL(&filt);
722 ICMP6_FILTER_SETPASS(ICMP6_ECHO_REPLY, &filt);
723 } else {
724 ICMP6_FILTER_SETPASSALL(&filt);
726 if (setsockopt(pingsock, IPPROTO_ICMPV6, ICMP6_FILTER, &filt,
727 sizeof(filt)) < 0)
728 bb_error_msg_and_die("setsockopt(ICMP6_FILTER)");
730 #endif /*ICMP6_FILTER*/
732 /* enable broadcast pings */
733 setsockopt_broadcast(pingsock);
735 /* set recv buf (needed if we can get lots of responses: flood ping,
736 * broadcast ping etc) */
737 sockopt = (datalen * 2) + 7 * 1024; /* giving it a bit of extra room */
738 setsockopt(pingsock, SOL_SOCKET, SO_RCVBUF, &sockopt, sizeof(sockopt));
740 sockopt = offsetof(struct icmp6_hdr, icmp6_cksum);
741 if (offsetof(struct icmp6_hdr, icmp6_cksum) != 2)
742 BUG_bad_offsetof_icmp6_cksum();
743 setsockopt(pingsock, SOL_RAW, IPV6_CHECKSUM, &sockopt, sizeof(sockopt));
745 /* request ttl info to be returned in ancillary data */
746 setsockopt(pingsock, SOL_IPV6, IPV6_HOPLIMIT, &const_int_1, sizeof(const_int_1));
748 if (if_index)
749 pingaddr.sin6.sin6_scope_id = if_index;
751 signal(SIGINT, print_stats_and_exit);
753 /* start the ping's going ... */
754 sendping6(0);
756 /* listen for replies */
757 msg.msg_name = &from;
758 msg.msg_namelen = sizeof(from);
759 msg.msg_iov = &iov;
760 msg.msg_iovlen = 1;
761 msg.msg_control = control_buf;
762 iov.iov_base = G.rcv_packet;
763 iov.iov_len = G.sizeof_rcv_packet;
764 while (1) {
765 int c;
766 struct cmsghdr *mp;
767 int hoplimit = -1;
768 msg.msg_controllen = sizeof(control_buf);
770 c = recvmsg(pingsock, &msg, 0);
771 if (c < 0) {
772 if (errno != EINTR)
773 bb_perror_msg("recvfrom");
774 continue;
776 for (mp = CMSG_FIRSTHDR(&msg); mp; mp = CMSG_NXTHDR(&msg, mp)) {
777 if (mp->cmsg_level == SOL_IPV6
778 && mp->cmsg_type == IPV6_HOPLIMIT
779 /* don't check len - we trust the kernel: */
780 /* && mp->cmsg_len >= CMSG_LEN(sizeof(int)) */
782 /*hoplimit = *(int*)CMSG_DATA(mp); - unaligned access */
783 move_from_unaligned_int(hoplimit, CMSG_DATA(mp));
786 unpack6(G.rcv_packet, c, &from, hoplimit);
787 if (pingcount && nreceived >= pingcount)
788 break;
791 #endif
793 static void ping(len_and_sockaddr *lsa)
795 printf("PING %s (%s)", hostname, dotted);
796 if (source_lsa) {
797 printf(" from %s",
798 xmalloc_sockaddr2dotted_noport(&source_lsa->u.sa));
800 printf(": %d data bytes\n", datalen);
802 G.sizeof_rcv_packet = datalen + MAXIPLEN + MAXICMPLEN;
803 G.rcv_packet = xzalloc(G.sizeof_rcv_packet);
804 #if ENABLE_PING6
805 if (lsa->u.sa.sa_family == AF_INET6) {
806 /* +4 reserves a place for timestamp, which may end up sitting
807 * _after_ packet. Saves one if() - see sendping4/6() */
808 G.snd_packet = xzalloc(datalen + sizeof(struct icmp6_hdr) + 4);
809 ping6(lsa);
810 } else
811 #endif
813 G.snd_packet = xzalloc(datalen + ICMP_MINLEN + 4);
814 ping4(lsa);
818 static int common_ping_main(int opt, char **argv)
820 len_and_sockaddr *lsa;
821 char *str_s;
823 INIT_G();
825 /* exactly one argument needed; -v and -q don't mix; -c NUM, -t NUM, -w NUM, -W NUM */
826 opt_complementary = "=1:q--v:v--q:c+:t+:w+:W+";
827 opt |= getopt32(argv, OPT_STRING, &pingcount, &str_s, &opt_ttl, &deadline, &timeout, &str_I);
828 if (opt & OPT_s)
829 datalen = xatou16(str_s); // -s
830 if (opt & OPT_I) { // -I
831 if_index = if_nametoindex(str_I);
832 if (!if_index) {
833 /* TODO: I'm not sure it takes IPv6 unless in [XX:XX..] format */
834 source_lsa = xdotted2sockaddr(str_I, 0);
835 str_I = NULL; /* don't try to bind to device later */
838 myid = (uint16_t) getpid();
839 hostname = argv[optind];
840 #if ENABLE_PING6
842 sa_family_t af = AF_UNSPEC;
843 if (opt & OPT_IPV4)
844 af = AF_INET;
845 if (opt & OPT_IPV6)
846 af = AF_INET6;
847 lsa = xhost_and_af2sockaddr(hostname, 0, af);
849 #else
850 lsa = xhost_and_af2sockaddr(hostname, 0, AF_INET);
851 #endif
853 if (source_lsa && source_lsa->u.sa.sa_family != lsa->u.sa.sa_family)
854 /* leaking it here... */
855 source_lsa = NULL;
857 dotted = xmalloc_sockaddr2dotted_noport(&lsa->u.sa);
858 ping(lsa);
859 print_stats_and_exit(EXIT_SUCCESS);
860 /*return EXIT_SUCCESS;*/
862 #endif /* FEATURE_FANCY_PING */
865 int ping_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
866 int ping_main(int argc UNUSED_PARAM, char **argv)
868 #if !ENABLE_FEATURE_FANCY_PING
869 return common_ping_main(AF_UNSPEC, argv);
870 #else
871 return common_ping_main(0, argv);
872 #endif
875 #if ENABLE_PING6
876 int ping6_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
877 int ping6_main(int argc UNUSED_PARAM, char **argv)
879 # if !ENABLE_FEATURE_FANCY_PING
880 return common_ping_main(AF_INET6, argv);
881 # else
882 return common_ping_main(OPT_IPV6, argv);
883 # endif
885 #endif
887 /* from ping6.c:
888 * Copyright (c) 1989 The Regents of the University of California.
889 * All rights reserved.
891 * This code is derived from software contributed to Berkeley by
892 * Mike Muuss.
894 * Redistribution and use in source and binary forms, with or without
895 * modification, are permitted provided that the following conditions
896 * are met:
897 * 1. Redistributions of source code must retain the above copyright
898 * notice, this list of conditions and the following disclaimer.
899 * 2. Redistributions in binary form must reproduce the above copyright
900 * notice, this list of conditions and the following disclaimer in the
901 * documentation and/or other materials provided with the distribution.
903 * 3. <BSD Advertising Clause omitted per the July 22, 1999 licensing change
904 * ftp://ftp.cs.berkeley.edu/pub/4bsd/README.Impt.License.Change>
906 * 4. Neither the name of the University nor the names of its contributors
907 * may be used to endorse or promote products derived from this software
908 * without specific prior written permission.
910 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
911 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
912 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
913 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
914 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
915 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
916 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
917 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
918 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
919 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
920 * SUCH DAMAGE.