mirror of
https://github.com/sheumann/hush.git
synced 2024-11-19 08:31:11 +00:00
26a7e2ecbf
function old new delta unpack_tail 262 243 -19 Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
954 lines
27 KiB
C
954 lines
27 KiB
C
/* vi: set sw=4 ts=4: */
|
|
/*
|
|
* Mini ping implementation for busybox
|
|
*
|
|
* Copyright (C) 1999 by Randolph Chung <tausq@debian.org>
|
|
*
|
|
* Adapted from the ping in netkit-base 0.10:
|
|
* Copyright (c) 1989 The Regents of the University of California.
|
|
* All rights reserved.
|
|
*
|
|
* This code is derived from software contributed to Berkeley by
|
|
* Mike Muuss.
|
|
*
|
|
* Licensed under GPLv2 or later, see file LICENSE in this source tree.
|
|
*/
|
|
/* from ping6.c:
|
|
* Copyright (C) 1999 by Randolph Chung <tausq@debian.org>
|
|
*
|
|
* This version of ping is adapted from the ping in netkit-base 0.10,
|
|
* which is:
|
|
*
|
|
* Original copyright notice is retained at the end of this file.
|
|
*
|
|
* This version is an adaptation of ping.c from busybox.
|
|
* The code was modified by Bart Visscher <magick@linux-fan.com>
|
|
*/
|
|
|
|
#include <net/if.h>
|
|
#include <netinet/ip_icmp.h>
|
|
#include "libbb.h"
|
|
|
|
#ifdef __BIONIC__
|
|
/* should be in netinet/ip_icmp.h */
|
|
# define ICMP_DEST_UNREACH 3 /* Destination Unreachable */
|
|
# define ICMP_SOURCE_QUENCH 4 /* Source Quench */
|
|
# define ICMP_REDIRECT 5 /* Redirect (change route) */
|
|
# define ICMP_ECHO 8 /* Echo Request */
|
|
# define ICMP_TIME_EXCEEDED 11 /* Time Exceeded */
|
|
# define ICMP_PARAMETERPROB 12 /* Parameter Problem */
|
|
# define ICMP_TIMESTAMP 13 /* Timestamp Request */
|
|
# define ICMP_TIMESTAMPREPLY 14 /* Timestamp Reply */
|
|
# define ICMP_INFO_REQUEST 15 /* Information Request */
|
|
# define ICMP_INFO_REPLY 16 /* Information Reply */
|
|
# define ICMP_ADDRESS 17 /* Address Mask Request */
|
|
# define ICMP_ADDRESSREPLY 18 /* Address Mask Reply */
|
|
#endif
|
|
|
|
//config:config PING
|
|
//config: bool "ping"
|
|
//config: default y
|
|
//config: select PLATFORM_LINUX
|
|
//config: help
|
|
//config: ping uses the ICMP protocol's mandatory ECHO_REQUEST datagram to
|
|
//config: elicit an ICMP ECHO_RESPONSE from a host or gateway.
|
|
//config:
|
|
//config:config PING6
|
|
//config: bool "ping6"
|
|
//config: default y
|
|
//config: depends on FEATURE_IPV6 && PING
|
|
//config: help
|
|
//config: This will give you a ping that can talk IPv6.
|
|
//config:
|
|
//config:config FEATURE_FANCY_PING
|
|
//config: bool "Enable fancy ping output"
|
|
//config: default y
|
|
//config: depends on PING
|
|
//config: help
|
|
//config: Make the output from the ping applet include statistics, and at the
|
|
//config: same time provide full support for ICMP packets.
|
|
|
|
/* Needs socket(AF_INET, SOCK_RAW, IPPROTO_ICMP), therefore BB_SUID_MAYBE: */
|
|
//applet:IF_PING(APPLET(ping, BB_DIR_BIN, BB_SUID_MAYBE))
|
|
//applet:IF_PING6(APPLET(ping6, BB_DIR_BIN, BB_SUID_MAYBE))
|
|
|
|
//kbuild:lib-$(CONFIG_PING) += ping.o
|
|
//kbuild:lib-$(CONFIG_PING6) += ping.o
|
|
|
|
//usage:#if !ENABLE_FEATURE_FANCY_PING
|
|
//usage:# define ping_trivial_usage
|
|
//usage: "HOST"
|
|
//usage:# define ping_full_usage "\n\n"
|
|
//usage: "Send ICMP ECHO_REQUEST packets to network hosts"
|
|
//usage:# define ping6_trivial_usage
|
|
//usage: "HOST"
|
|
//usage:# define ping6_full_usage "\n\n"
|
|
//usage: "Send ICMP ECHO_REQUEST packets to network hosts"
|
|
//usage:#else
|
|
//usage:# define ping_trivial_usage
|
|
//usage: "[OPTIONS] HOST"
|
|
//usage:# define ping_full_usage "\n\n"
|
|
//usage: "Send ICMP ECHO_REQUEST packets to network hosts\n"
|
|
//usage: IF_PING6(
|
|
//usage: "\n -4,-6 Force IP or IPv6 name resolution"
|
|
//usage: )
|
|
//usage: "\n -c CNT Send only CNT pings"
|
|
//usage: "\n -s SIZE Send SIZE data bytes in packets (default:56)"
|
|
//usage: "\n -t TTL Set TTL"
|
|
//usage: "\n -I IFACE/IP Use interface or IP address as source"
|
|
//usage: "\n -W SEC Seconds to wait for the first response (default:10)"
|
|
//usage: "\n (after all -c CNT packets are sent)"
|
|
//usage: "\n -w SEC Seconds until ping exits (default:infinite)"
|
|
//usage: "\n (can exit earlier with -c CNT)"
|
|
//usage: "\n -q Quiet, only displays output at start"
|
|
//usage: "\n and when finished"
|
|
//usage:
|
|
//usage:# define ping6_trivial_usage
|
|
//usage: "[OPTIONS] HOST"
|
|
//usage:# define ping6_full_usage "\n\n"
|
|
//usage: "Send ICMP ECHO_REQUEST packets to network hosts\n"
|
|
//usage: "\n -c CNT Send only CNT pings"
|
|
//usage: "\n -s SIZE Send SIZE data bytes in packets (default:56)"
|
|
//usage: "\n -I IFACE/IP Use interface or IP address as source"
|
|
//usage: "\n -q Quiet, only displays output at start"
|
|
//usage: "\n and when finished"
|
|
//usage:
|
|
//usage:#endif
|
|
//usage:
|
|
//usage:#define ping_example_usage
|
|
//usage: "$ ping localhost\n"
|
|
//usage: "PING slag (127.0.0.1): 56 data bytes\n"
|
|
//usage: "64 bytes from 127.0.0.1: icmp_seq=0 ttl=255 time=20.1 ms\n"
|
|
//usage: "\n"
|
|
//usage: "--- debian ping statistics ---\n"
|
|
//usage: "1 packets transmitted, 1 packets received, 0% packet loss\n"
|
|
//usage: "round-trip min/avg/max = 20.1/20.1/20.1 ms\n"
|
|
//usage:#define ping6_example_usage
|
|
//usage: "$ ping6 ip6-localhost\n"
|
|
//usage: "PING ip6-localhost (::1): 56 data bytes\n"
|
|
//usage: "64 bytes from ::1: icmp6_seq=0 ttl=64 time=20.1 ms\n"
|
|
//usage: "\n"
|
|
//usage: "--- ip6-localhost ping statistics ---\n"
|
|
//usage: "1 packets transmitted, 1 packets received, 0% packet loss\n"
|
|
//usage: "round-trip min/avg/max = 20.1/20.1/20.1 ms\n"
|
|
|
|
#if ENABLE_PING6
|
|
# include <netinet/icmp6.h>
|
|
/* I see RENUMBERED constants in bits/in.h - !!?
|
|
* What a fuck is going on with libc? Is it a glibc joke? */
|
|
# ifdef IPV6_2292HOPLIMIT
|
|
# undef IPV6_HOPLIMIT
|
|
# define IPV6_HOPLIMIT IPV6_2292HOPLIMIT
|
|
# endif
|
|
#endif
|
|
|
|
enum {
|
|
DEFDATALEN = 56,
|
|
MAXIPLEN = 60,
|
|
MAXICMPLEN = 76,
|
|
MAX_DUP_CHK = (8 * 128),
|
|
MAXWAIT = 10,
|
|
PINGINTERVAL = 1, /* 1 second */
|
|
pingsock = 0,
|
|
};
|
|
|
|
static void
|
|
#if ENABLE_PING6
|
|
create_icmp_socket(len_and_sockaddr *lsa)
|
|
#else
|
|
create_icmp_socket(void)
|
|
#define create_icmp_socket(lsa) create_icmp_socket()
|
|
#endif
|
|
{
|
|
int sock;
|
|
#if ENABLE_PING6
|
|
if (lsa->u.sa.sa_family == AF_INET6)
|
|
sock = socket(AF_INET6, SOCK_RAW, IPPROTO_ICMPV6);
|
|
else
|
|
#endif
|
|
sock = socket(AF_INET, SOCK_RAW, 1); /* 1 == ICMP */
|
|
if (sock < 0) {
|
|
if (errno == EPERM)
|
|
bb_error_msg_and_die(bb_msg_perm_denied_are_you_root);
|
|
bb_perror_msg_and_die(bb_msg_can_not_create_raw_socket);
|
|
}
|
|
|
|
xmove_fd(sock, pingsock);
|
|
}
|
|
|
|
#if !ENABLE_FEATURE_FANCY_PING
|
|
|
|
/* Simple version */
|
|
|
|
struct globals {
|
|
char *hostname;
|
|
char packet[DEFDATALEN + MAXIPLEN + MAXICMPLEN];
|
|
} FIX_ALIASING;
|
|
#define G (*(struct globals*)&bb_common_bufsiz1)
|
|
#define INIT_G() do { } while (0)
|
|
|
|
static void noresp(int ign UNUSED_PARAM)
|
|
{
|
|
printf("No response from %s\n", G.hostname);
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
static void ping4(len_and_sockaddr *lsa)
|
|
{
|
|
struct icmp *pkt;
|
|
int c;
|
|
|
|
pkt = (struct icmp *) G.packet;
|
|
/*memset(pkt, 0, sizeof(G.packet)); already is */
|
|
pkt->icmp_type = ICMP_ECHO;
|
|
pkt->icmp_cksum = inet_cksum((uint16_t *) pkt, sizeof(G.packet));
|
|
|
|
xsendto(pingsock, G.packet, DEFDATALEN + ICMP_MINLEN, &lsa->u.sa, lsa->len);
|
|
|
|
/* listen for replies */
|
|
while (1) {
|
|
#if 0
|
|
struct sockaddr_in from;
|
|
socklen_t fromlen = sizeof(from);
|
|
|
|
c = recvfrom(pingsock, G.packet, sizeof(G.packet), 0,
|
|
(struct sockaddr *) &from, &fromlen);
|
|
#else
|
|
c = recv(pingsock, G.packet, sizeof(G.packet), 0);
|
|
#endif
|
|
if (c < 0) {
|
|
if (errno != EINTR)
|
|
bb_perror_msg("recvfrom");
|
|
continue;
|
|
}
|
|
if (c >= 76) { /* ip + icmp */
|
|
struct iphdr *iphdr = (struct iphdr *) G.packet;
|
|
|
|
pkt = (struct icmp *) (G.packet + (iphdr->ihl << 2)); /* skip ip hdr */
|
|
if (pkt->icmp_type == ICMP_ECHOREPLY)
|
|
break;
|
|
}
|
|
}
|
|
if (ENABLE_FEATURE_CLEAN_UP)
|
|
close(pingsock);
|
|
}
|
|
|
|
#if ENABLE_PING6
|
|
static void ping6(len_and_sockaddr *lsa)
|
|
{
|
|
struct icmp6_hdr *pkt;
|
|
int c;
|
|
int sockopt;
|
|
|
|
pkt = (struct icmp6_hdr *) G.packet;
|
|
/*memset(pkt, 0, sizeof(G.packet)); already is */
|
|
pkt->icmp6_type = ICMP6_ECHO_REQUEST;
|
|
|
|
sockopt = offsetof(struct icmp6_hdr, icmp6_cksum);
|
|
setsockopt(pingsock, SOL_RAW, IPV6_CHECKSUM, &sockopt, sizeof(sockopt));
|
|
|
|
xsendto(pingsock, G.packet, DEFDATALEN + sizeof(struct icmp6_hdr), &lsa->u.sa, lsa->len);
|
|
|
|
/* listen for replies */
|
|
while (1) {
|
|
#if 0
|
|
struct sockaddr_in6 from;
|
|
socklen_t fromlen = sizeof(from);
|
|
|
|
c = recvfrom(pingsock, G.packet, sizeof(G.packet), 0,
|
|
(struct sockaddr *) &from, &fromlen);
|
|
#else
|
|
c = recv(pingsock, G.packet, sizeof(G.packet), 0);
|
|
#endif
|
|
if (c < 0) {
|
|
if (errno != EINTR)
|
|
bb_perror_msg("recvfrom");
|
|
continue;
|
|
}
|
|
if (c >= ICMP_MINLEN) { /* icmp6_hdr */
|
|
if (pkt->icmp6_type == ICMP6_ECHO_REPLY)
|
|
break;
|
|
}
|
|
}
|
|
if (ENABLE_FEATURE_CLEAN_UP)
|
|
close(pingsock);
|
|
}
|
|
#endif
|
|
|
|
#if !ENABLE_PING6
|
|
# define common_ping_main(af, argv) common_ping_main(argv)
|
|
#endif
|
|
static int common_ping_main(sa_family_t af, char **argv)
|
|
{
|
|
len_and_sockaddr *lsa;
|
|
|
|
INIT_G();
|
|
|
|
#if ENABLE_PING6
|
|
while ((++argv)[0] && argv[0][0] == '-') {
|
|
if (argv[0][1] == '4') {
|
|
af = AF_INET;
|
|
continue;
|
|
}
|
|
if (argv[0][1] == '6') {
|
|
af = AF_INET6;
|
|
continue;
|
|
}
|
|
bb_show_usage();
|
|
}
|
|
#else
|
|
argv++;
|
|
#endif
|
|
|
|
G.hostname = *argv;
|
|
if (!G.hostname)
|
|
bb_show_usage();
|
|
|
|
#if ENABLE_PING6
|
|
lsa = xhost_and_af2sockaddr(G.hostname, 0, af);
|
|
#else
|
|
lsa = xhost_and_af2sockaddr(G.hostname, 0, AF_INET);
|
|
#endif
|
|
/* Set timer _after_ DNS resolution */
|
|
signal(SIGALRM, noresp);
|
|
alarm(5); /* give the host 5000ms to respond */
|
|
|
|
create_icmp_socket(lsa);
|
|
#if ENABLE_PING6
|
|
if (lsa->u.sa.sa_family == AF_INET6)
|
|
ping6(lsa);
|
|
else
|
|
#endif
|
|
ping4(lsa);
|
|
printf("%s is alive!\n", G.hostname);
|
|
return EXIT_SUCCESS;
|
|
}
|
|
|
|
|
|
#else /* FEATURE_FANCY_PING */
|
|
|
|
|
|
/* Full(er) version */
|
|
|
|
#define OPT_STRING ("qvc:s:t:w:W:I:n4" IF_PING6("6"))
|
|
enum {
|
|
OPT_QUIET = 1 << 0,
|
|
OPT_VERBOSE = 1 << 1,
|
|
OPT_c = 1 << 2,
|
|
OPT_s = 1 << 3,
|
|
OPT_t = 1 << 4,
|
|
OPT_w = 1 << 5,
|
|
OPT_W = 1 << 6,
|
|
OPT_I = 1 << 7,
|
|
/*OPT_n = 1 << 8, - ignored */
|
|
OPT_IPV4 = 1 << 9,
|
|
OPT_IPV6 = (1 << 10) * ENABLE_PING6,
|
|
};
|
|
|
|
|
|
struct globals {
|
|
int if_index;
|
|
char *str_I;
|
|
len_and_sockaddr *source_lsa;
|
|
unsigned datalen;
|
|
unsigned pingcount; /* must be int-sized */
|
|
unsigned opt_ttl;
|
|
unsigned long ntransmitted, nreceived, nrepeats;
|
|
uint16_t myid;
|
|
unsigned tmin, tmax; /* in us */
|
|
unsigned long long tsum; /* in us, sum of all times */
|
|
unsigned deadline;
|
|
unsigned timeout;
|
|
unsigned total_secs;
|
|
unsigned sizeof_rcv_packet;
|
|
char *rcv_packet; /* [datalen + MAXIPLEN + MAXICMPLEN] */
|
|
void *snd_packet; /* [datalen + ipv4/ipv6_const] */
|
|
const char *hostname;
|
|
const char *dotted;
|
|
union {
|
|
struct sockaddr sa;
|
|
struct sockaddr_in sin;
|
|
#if ENABLE_PING6
|
|
struct sockaddr_in6 sin6;
|
|
#endif
|
|
} pingaddr;
|
|
unsigned char rcvd_tbl[MAX_DUP_CHK / 8];
|
|
} FIX_ALIASING;
|
|
#define G (*(struct globals*)&bb_common_bufsiz1)
|
|
#define if_index (G.if_index )
|
|
#define source_lsa (G.source_lsa )
|
|
#define str_I (G.str_I )
|
|
#define datalen (G.datalen )
|
|
#define pingcount (G.pingcount )
|
|
#define opt_ttl (G.opt_ttl )
|
|
#define myid (G.myid )
|
|
#define tmin (G.tmin )
|
|
#define tmax (G.tmax )
|
|
#define tsum (G.tsum )
|
|
#define deadline (G.deadline )
|
|
#define timeout (G.timeout )
|
|
#define total_secs (G.total_secs )
|
|
#define hostname (G.hostname )
|
|
#define dotted (G.dotted )
|
|
#define pingaddr (G.pingaddr )
|
|
#define rcvd_tbl (G.rcvd_tbl )
|
|
void BUG_ping_globals_too_big(void);
|
|
#define INIT_G() do { \
|
|
if (sizeof(G) > COMMON_BUFSIZE) \
|
|
BUG_ping_globals_too_big(); \
|
|
datalen = DEFDATALEN; \
|
|
timeout = MAXWAIT; \
|
|
tmin = UINT_MAX; \
|
|
} while (0)
|
|
|
|
|
|
#define BYTE(bit) rcvd_tbl[(bit)>>3]
|
|
#define MASK(bit) (1 << ((bit) & 7))
|
|
#define SET(bit) (BYTE(bit) |= MASK(bit))
|
|
#define CLR(bit) (BYTE(bit) &= (~MASK(bit)))
|
|
#define TST(bit) (BYTE(bit) & MASK(bit))
|
|
|
|
static void print_stats_and_exit(int junk) NORETURN;
|
|
static void print_stats_and_exit(int junk UNUSED_PARAM)
|
|
{
|
|
unsigned long ul;
|
|
unsigned long nrecv;
|
|
|
|
signal(SIGINT, SIG_IGN);
|
|
|
|
nrecv = G.nreceived;
|
|
printf("\n--- %s ping statistics ---\n"
|
|
"%lu packets transmitted, "
|
|
"%lu packets received, ",
|
|
hostname, G.ntransmitted, nrecv
|
|
);
|
|
if (G.nrepeats)
|
|
printf("%lu duplicates, ", G.nrepeats);
|
|
ul = G.ntransmitted;
|
|
if (ul != 0)
|
|
ul = (ul - nrecv) * 100 / ul;
|
|
printf("%lu%% packet loss\n", ul);
|
|
if (tmin != UINT_MAX) {
|
|
unsigned tavg = tsum / (nrecv + G.nrepeats);
|
|
printf("round-trip min/avg/max = %u.%03u/%u.%03u/%u.%03u ms\n",
|
|
tmin / 1000, tmin % 1000,
|
|
tavg / 1000, tavg % 1000,
|
|
tmax / 1000, tmax % 1000);
|
|
}
|
|
/* if condition is true, exit with 1 -- 'failure' */
|
|
exit(nrecv == 0 || (deadline && nrecv < pingcount));
|
|
}
|
|
|
|
static void sendping_tail(void (*sp)(int), int size_pkt)
|
|
{
|
|
int sz;
|
|
|
|
CLR((uint16_t)G.ntransmitted % MAX_DUP_CHK);
|
|
G.ntransmitted++;
|
|
|
|
size_pkt += datalen;
|
|
|
|
/* sizeof(pingaddr) can be larger than real sa size, but I think
|
|
* it doesn't matter */
|
|
sz = xsendto(pingsock, G.snd_packet, size_pkt, &pingaddr.sa, sizeof(pingaddr));
|
|
if (sz != size_pkt)
|
|
bb_error_msg_and_die(bb_msg_write_error);
|
|
|
|
if (pingcount == 0 || deadline || G.ntransmitted < pingcount) {
|
|
/* Didn't send all pings yet - schedule next in 1s */
|
|
signal(SIGALRM, sp);
|
|
if (deadline) {
|
|
total_secs += PINGINTERVAL;
|
|
if (total_secs >= deadline)
|
|
signal(SIGALRM, print_stats_and_exit);
|
|
}
|
|
alarm(PINGINTERVAL);
|
|
} else { /* -c NN, and all NN are sent (and no deadline) */
|
|
/* Wait for the last ping to come back.
|
|
* -W timeout: wait for a response in seconds.
|
|
* Affects only timeout in absense of any responses,
|
|
* otherwise ping waits for two RTTs. */
|
|
unsigned expire = timeout;
|
|
|
|
if (G.nreceived) {
|
|
/* approx. 2*tmax, in seconds (2 RTT) */
|
|
expire = tmax / (512*1024);
|
|
if (expire == 0)
|
|
expire = 1;
|
|
}
|
|
signal(SIGALRM, print_stats_and_exit);
|
|
alarm(expire);
|
|
}
|
|
}
|
|
|
|
static void sendping4(int junk UNUSED_PARAM)
|
|
{
|
|
struct icmp *pkt = G.snd_packet;
|
|
|
|
//memset(pkt, 0, datalen + ICMP_MINLEN + 4); - G.snd_packet was xzalloced
|
|
pkt->icmp_type = ICMP_ECHO;
|
|
/*pkt->icmp_code = 0;*/
|
|
pkt->icmp_cksum = 0; /* cksum is calculated with this field set to 0 */
|
|
pkt->icmp_seq = htons(G.ntransmitted); /* don't ++ here, it can be a macro */
|
|
pkt->icmp_id = myid;
|
|
|
|
/* If datalen < 4, we store timestamp _past_ the packet,
|
|
* but it's ok - we allocated 4 extra bytes in xzalloc() just in case.
|
|
*/
|
|
/*if (datalen >= 4)*/
|
|
/* No hton: we'll read it back on the same machine */
|
|
*(uint32_t*)&pkt->icmp_dun = monotonic_us();
|
|
|
|
pkt->icmp_cksum = inet_cksum((uint16_t *) pkt, datalen + ICMP_MINLEN);
|
|
|
|
sendping_tail(sendping4, ICMP_MINLEN);
|
|
}
|
|
#if ENABLE_PING6
|
|
static void sendping6(int junk UNUSED_PARAM)
|
|
{
|
|
struct icmp6_hdr *pkt = G.snd_packet;
|
|
|
|
//memset(pkt, 0, datalen + sizeof(struct icmp6_hdr) + 4);
|
|
pkt->icmp6_type = ICMP6_ECHO_REQUEST;
|
|
/*pkt->icmp6_code = 0;*/
|
|
/*pkt->icmp6_cksum = 0;*/
|
|
pkt->icmp6_seq = htons(G.ntransmitted); /* don't ++ here, it can be a macro */
|
|
pkt->icmp6_id = myid;
|
|
|
|
/*if (datalen >= 4)*/
|
|
*(uint32_t*)(&pkt->icmp6_data8[4]) = monotonic_us();
|
|
|
|
//TODO? pkt->icmp_cksum = inet_cksum(...);
|
|
|
|
sendping_tail(sendping6, sizeof(struct icmp6_hdr));
|
|
}
|
|
#endif
|
|
|
|
static const char *icmp_type_name(int id)
|
|
{
|
|
switch (id) {
|
|
case ICMP_ECHOREPLY: return "Echo Reply";
|
|
case ICMP_DEST_UNREACH: return "Destination Unreachable";
|
|
case ICMP_SOURCE_QUENCH: return "Source Quench";
|
|
case ICMP_REDIRECT: return "Redirect (change route)";
|
|
case ICMP_ECHO: return "Echo Request";
|
|
case ICMP_TIME_EXCEEDED: return "Time Exceeded";
|
|
case ICMP_PARAMETERPROB: return "Parameter Problem";
|
|
case ICMP_TIMESTAMP: return "Timestamp Request";
|
|
case ICMP_TIMESTAMPREPLY: return "Timestamp Reply";
|
|
case ICMP_INFO_REQUEST: return "Information Request";
|
|
case ICMP_INFO_REPLY: return "Information Reply";
|
|
case ICMP_ADDRESS: return "Address Mask Request";
|
|
case ICMP_ADDRESSREPLY: return "Address Mask Reply";
|
|
default: return "unknown ICMP type";
|
|
}
|
|
}
|
|
#if ENABLE_PING6
|
|
/* RFC3542 changed some definitions from RFC2292 for no good reason, whee!
|
|
* the newer 3542 uses a MLD_ prefix where as 2292 uses ICMP6_ prefix */
|
|
#ifndef MLD_LISTENER_QUERY
|
|
# define MLD_LISTENER_QUERY ICMP6_MEMBERSHIP_QUERY
|
|
#endif
|
|
#ifndef MLD_LISTENER_REPORT
|
|
# define MLD_LISTENER_REPORT ICMP6_MEMBERSHIP_REPORT
|
|
#endif
|
|
#ifndef MLD_LISTENER_REDUCTION
|
|
# define MLD_LISTENER_REDUCTION ICMP6_MEMBERSHIP_REDUCTION
|
|
#endif
|
|
static const char *icmp6_type_name(int id)
|
|
{
|
|
switch (id) {
|
|
case ICMP6_DST_UNREACH: return "Destination Unreachable";
|
|
case ICMP6_PACKET_TOO_BIG: return "Packet too big";
|
|
case ICMP6_TIME_EXCEEDED: return "Time Exceeded";
|
|
case ICMP6_PARAM_PROB: return "Parameter Problem";
|
|
case ICMP6_ECHO_REPLY: return "Echo Reply";
|
|
case ICMP6_ECHO_REQUEST: return "Echo Request";
|
|
case MLD_LISTENER_QUERY: return "Listener Query";
|
|
case MLD_LISTENER_REPORT: return "Listener Report";
|
|
case MLD_LISTENER_REDUCTION: return "Listener Reduction";
|
|
default: return "unknown ICMP type";
|
|
}
|
|
}
|
|
#endif
|
|
|
|
static void unpack_tail(int sz, uint32_t *tp,
|
|
const char *from_str,
|
|
uint16_t recv_seq, int ttl)
|
|
{
|
|
unsigned char *b, m;
|
|
const char *dupmsg = " (DUP!)";
|
|
unsigned triptime = triptime; /* for gcc */
|
|
|
|
if (tp) {
|
|
/* (int32_t) cast is for hypothetical 64-bit unsigned */
|
|
/* (doesn't hurt 32-bit real-world anyway) */
|
|
triptime = (int32_t) ((uint32_t)monotonic_us() - *tp);
|
|
tsum += triptime;
|
|
if (triptime < tmin)
|
|
tmin = triptime;
|
|
if (triptime > tmax)
|
|
tmax = triptime;
|
|
}
|
|
|
|
b = &BYTE(recv_seq % MAX_DUP_CHK);
|
|
m = MASK(recv_seq % MAX_DUP_CHK);
|
|
/*if TST(recv_seq % MAX_DUP_CHK):*/
|
|
if (*b & m) {
|
|
++G.nrepeats;
|
|
} else {
|
|
/*SET(recv_seq % MAX_DUP_CHK):*/
|
|
*b |= m;
|
|
++G.nreceived;
|
|
dupmsg += 7;
|
|
}
|
|
|
|
if (option_mask32 & OPT_QUIET)
|
|
return;
|
|
|
|
printf("%d bytes from %s: seq=%u ttl=%d", sz,
|
|
from_str, recv_seq, ttl);
|
|
if (tp)
|
|
printf(" time=%u.%03u ms", triptime / 1000, triptime % 1000);
|
|
puts(dupmsg);
|
|
fflush_all();
|
|
}
|
|
static void unpack4(char *buf, int sz, struct sockaddr_in *from)
|
|
{
|
|
struct icmp *icmppkt;
|
|
struct iphdr *iphdr;
|
|
int hlen;
|
|
|
|
/* discard if too short */
|
|
if (sz < (datalen + ICMP_MINLEN))
|
|
return;
|
|
|
|
/* check IP header */
|
|
iphdr = (struct iphdr *) buf;
|
|
hlen = iphdr->ihl << 2;
|
|
sz -= hlen;
|
|
icmppkt = (struct icmp *) (buf + hlen);
|
|
if (icmppkt->icmp_id != myid)
|
|
return; /* not our ping */
|
|
|
|
if (icmppkt->icmp_type == ICMP_ECHOREPLY) {
|
|
uint16_t recv_seq = ntohs(icmppkt->icmp_seq);
|
|
uint32_t *tp = NULL;
|
|
|
|
if (sz >= ICMP_MINLEN + sizeof(uint32_t))
|
|
tp = (uint32_t *) icmppkt->icmp_data;
|
|
unpack_tail(sz, tp,
|
|
inet_ntoa(*(struct in_addr *) &from->sin_addr.s_addr),
|
|
recv_seq, iphdr->ttl);
|
|
} else if (icmppkt->icmp_type != ICMP_ECHO) {
|
|
bb_error_msg("warning: got ICMP %d (%s)",
|
|
icmppkt->icmp_type,
|
|
icmp_type_name(icmppkt->icmp_type));
|
|
}
|
|
}
|
|
#if ENABLE_PING6
|
|
static void unpack6(char *packet, int sz, struct sockaddr_in6 *from, int hoplimit)
|
|
{
|
|
struct icmp6_hdr *icmppkt;
|
|
char buf[INET6_ADDRSTRLEN];
|
|
|
|
/* discard if too short */
|
|
if (sz < (datalen + sizeof(struct icmp6_hdr)))
|
|
return;
|
|
|
|
icmppkt = (struct icmp6_hdr *) packet;
|
|
if (icmppkt->icmp6_id != myid)
|
|
return; /* not our ping */
|
|
|
|
if (icmppkt->icmp6_type == ICMP6_ECHO_REPLY) {
|
|
uint16_t recv_seq = ntohs(icmppkt->icmp6_seq);
|
|
uint32_t *tp = NULL;
|
|
|
|
if (sz >= sizeof(struct icmp6_hdr) + sizeof(uint32_t))
|
|
tp = (uint32_t *) &icmppkt->icmp6_data8[4];
|
|
unpack_tail(sz, tp,
|
|
inet_ntop(AF_INET6, &from->sin6_addr,
|
|
buf, sizeof(buf)),
|
|
recv_seq, hoplimit);
|
|
} else if (icmppkt->icmp6_type != ICMP6_ECHO_REQUEST) {
|
|
bb_error_msg("warning: got ICMP %d (%s)",
|
|
icmppkt->icmp6_type,
|
|
icmp6_type_name(icmppkt->icmp6_type));
|
|
}
|
|
}
|
|
#endif
|
|
|
|
static void ping4(len_and_sockaddr *lsa)
|
|
{
|
|
int sockopt;
|
|
|
|
pingaddr.sin = lsa->u.sin;
|
|
if (source_lsa) {
|
|
if (setsockopt(pingsock, IPPROTO_IP, IP_MULTICAST_IF,
|
|
&source_lsa->u.sa, source_lsa->len))
|
|
bb_error_msg_and_die("can't set multicast source interface");
|
|
xbind(pingsock, &source_lsa->u.sa, source_lsa->len);
|
|
}
|
|
|
|
/* enable broadcast pings */
|
|
setsockopt_broadcast(pingsock);
|
|
|
|
/* set recv buf (needed if we can get lots of responses: flood ping,
|
|
* broadcast ping etc) */
|
|
sockopt = (datalen * 2) + 7 * 1024; /* giving it a bit of extra room */
|
|
setsockopt(pingsock, SOL_SOCKET, SO_RCVBUF, &sockopt, sizeof(sockopt));
|
|
|
|
if (opt_ttl != 0) {
|
|
setsockopt(pingsock, IPPROTO_IP, IP_TTL, &opt_ttl, sizeof(opt_ttl));
|
|
/* above doesnt affect packets sent to bcast IP, so... */
|
|
setsockopt(pingsock, IPPROTO_IP, IP_MULTICAST_TTL, &opt_ttl, sizeof(opt_ttl));
|
|
}
|
|
|
|
signal(SIGINT, print_stats_and_exit);
|
|
|
|
/* start the ping's going ... */
|
|
sendping4(0);
|
|
|
|
/* listen for replies */
|
|
while (1) {
|
|
struct sockaddr_in from;
|
|
socklen_t fromlen = (socklen_t) sizeof(from);
|
|
int c;
|
|
|
|
c = recvfrom(pingsock, G.rcv_packet, G.sizeof_rcv_packet, 0,
|
|
(struct sockaddr *) &from, &fromlen);
|
|
if (c < 0) {
|
|
if (errno != EINTR)
|
|
bb_perror_msg("recvfrom");
|
|
continue;
|
|
}
|
|
unpack4(G.rcv_packet, c, &from);
|
|
if (pingcount && G.nreceived >= pingcount)
|
|
break;
|
|
}
|
|
}
|
|
#if ENABLE_PING6
|
|
extern int BUG_bad_offsetof_icmp6_cksum(void);
|
|
static void ping6(len_and_sockaddr *lsa)
|
|
{
|
|
int sockopt;
|
|
struct msghdr msg;
|
|
struct sockaddr_in6 from;
|
|
struct iovec iov;
|
|
char control_buf[CMSG_SPACE(36)];
|
|
|
|
pingaddr.sin6 = lsa->u.sin6;
|
|
if (source_lsa)
|
|
xbind(pingsock, &source_lsa->u.sa, source_lsa->len);
|
|
|
|
#ifdef ICMP6_FILTER
|
|
{
|
|
struct icmp6_filter filt;
|
|
if (!(option_mask32 & OPT_VERBOSE)) {
|
|
ICMP6_FILTER_SETBLOCKALL(&filt);
|
|
ICMP6_FILTER_SETPASS(ICMP6_ECHO_REPLY, &filt);
|
|
} else {
|
|
ICMP6_FILTER_SETPASSALL(&filt);
|
|
}
|
|
if (setsockopt(pingsock, IPPROTO_ICMPV6, ICMP6_FILTER, &filt,
|
|
sizeof(filt)) < 0)
|
|
bb_error_msg_and_die("setsockopt(ICMP6_FILTER)");
|
|
}
|
|
#endif /*ICMP6_FILTER*/
|
|
|
|
/* enable broadcast pings */
|
|
setsockopt_broadcast(pingsock);
|
|
|
|
/* set recv buf (needed if we can get lots of responses: flood ping,
|
|
* broadcast ping etc) */
|
|
sockopt = (datalen * 2) + 7 * 1024; /* giving it a bit of extra room */
|
|
setsockopt(pingsock, SOL_SOCKET, SO_RCVBUF, &sockopt, sizeof(sockopt));
|
|
|
|
sockopt = offsetof(struct icmp6_hdr, icmp6_cksum);
|
|
if (offsetof(struct icmp6_hdr, icmp6_cksum) != 2)
|
|
BUG_bad_offsetof_icmp6_cksum();
|
|
setsockopt(pingsock, SOL_RAW, IPV6_CHECKSUM, &sockopt, sizeof(sockopt));
|
|
|
|
/* request ttl info to be returned in ancillary data */
|
|
setsockopt(pingsock, SOL_IPV6, IPV6_HOPLIMIT, &const_int_1, sizeof(const_int_1));
|
|
|
|
if (if_index)
|
|
pingaddr.sin6.sin6_scope_id = if_index;
|
|
|
|
signal(SIGINT, print_stats_and_exit);
|
|
|
|
/* start the ping's going ... */
|
|
sendping6(0);
|
|
|
|
/* listen for replies */
|
|
msg.msg_name = &from;
|
|
msg.msg_namelen = sizeof(from);
|
|
msg.msg_iov = &iov;
|
|
msg.msg_iovlen = 1;
|
|
msg.msg_control = control_buf;
|
|
iov.iov_base = G.rcv_packet;
|
|
iov.iov_len = G.sizeof_rcv_packet;
|
|
while (1) {
|
|
int c;
|
|
struct cmsghdr *mp;
|
|
int hoplimit = -1;
|
|
msg.msg_controllen = sizeof(control_buf);
|
|
|
|
c = recvmsg(pingsock, &msg, 0);
|
|
if (c < 0) {
|
|
if (errno != EINTR)
|
|
bb_perror_msg("recvfrom");
|
|
continue;
|
|
}
|
|
for (mp = CMSG_FIRSTHDR(&msg); mp; mp = CMSG_NXTHDR(&msg, mp)) {
|
|
if (mp->cmsg_level == SOL_IPV6
|
|
&& mp->cmsg_type == IPV6_HOPLIMIT
|
|
/* don't check len - we trust the kernel: */
|
|
/* && mp->cmsg_len >= CMSG_LEN(sizeof(int)) */
|
|
) {
|
|
/*hoplimit = *(int*)CMSG_DATA(mp); - unaligned access */
|
|
move_from_unaligned_int(hoplimit, CMSG_DATA(mp));
|
|
}
|
|
}
|
|
unpack6(G.rcv_packet, c, &from, hoplimit);
|
|
if (pingcount && G.nreceived >= pingcount)
|
|
break;
|
|
}
|
|
}
|
|
#endif
|
|
|
|
static void ping(len_and_sockaddr *lsa)
|
|
{
|
|
printf("PING %s (%s)", hostname, dotted);
|
|
if (source_lsa) {
|
|
printf(" from %s",
|
|
xmalloc_sockaddr2dotted_noport(&source_lsa->u.sa));
|
|
}
|
|
printf(": %d data bytes\n", datalen);
|
|
|
|
create_icmp_socket(lsa);
|
|
/* untested whether "-I addr" really works for IPv6: */
|
|
if (str_I)
|
|
setsockopt_bindtodevice(pingsock, str_I);
|
|
|
|
G.sizeof_rcv_packet = datalen + MAXIPLEN + MAXICMPLEN;
|
|
G.rcv_packet = xzalloc(G.sizeof_rcv_packet);
|
|
#if ENABLE_PING6
|
|
if (lsa->u.sa.sa_family == AF_INET6) {
|
|
/* +4 reserves a place for timestamp, which may end up sitting
|
|
* _after_ packet. Saves one if() - see sendping4/6() */
|
|
G.snd_packet = xzalloc(datalen + sizeof(struct icmp6_hdr) + 4);
|
|
ping6(lsa);
|
|
} else
|
|
#endif
|
|
{
|
|
G.snd_packet = xzalloc(datalen + ICMP_MINLEN + 4);
|
|
ping4(lsa);
|
|
}
|
|
}
|
|
|
|
static int common_ping_main(int opt, char **argv)
|
|
{
|
|
len_and_sockaddr *lsa;
|
|
char *str_s;
|
|
|
|
INIT_G();
|
|
|
|
/* exactly one argument needed; -v and -q don't mix; -c NUM, -t NUM, -w NUM, -W NUM */
|
|
opt_complementary = "=1:q--v:v--q:c+:t+:w+:W+";
|
|
opt |= getopt32(argv, OPT_STRING, &pingcount, &str_s, &opt_ttl, &deadline, &timeout, &str_I);
|
|
if (opt & OPT_s)
|
|
datalen = xatou16(str_s); // -s
|
|
if (opt & OPT_I) { // -I
|
|
if_index = if_nametoindex(str_I);
|
|
if (!if_index) {
|
|
/* TODO: I'm not sure it takes IPv6 unless in [XX:XX..] format */
|
|
source_lsa = xdotted2sockaddr(str_I, 0);
|
|
str_I = NULL; /* don't try to bind to device later */
|
|
}
|
|
}
|
|
myid = (uint16_t) getpid();
|
|
hostname = argv[optind];
|
|
#if ENABLE_PING6
|
|
{
|
|
sa_family_t af = AF_UNSPEC;
|
|
if (opt & OPT_IPV4)
|
|
af = AF_INET;
|
|
if (opt & OPT_IPV6)
|
|
af = AF_INET6;
|
|
lsa = xhost_and_af2sockaddr(hostname, 0, af);
|
|
}
|
|
#else
|
|
lsa = xhost_and_af2sockaddr(hostname, 0, AF_INET);
|
|
#endif
|
|
|
|
if (source_lsa && source_lsa->u.sa.sa_family != lsa->u.sa.sa_family)
|
|
/* leaking it here... */
|
|
source_lsa = NULL;
|
|
|
|
dotted = xmalloc_sockaddr2dotted_noport(&lsa->u.sa);
|
|
ping(lsa);
|
|
print_stats_and_exit(EXIT_SUCCESS);
|
|
/*return EXIT_SUCCESS;*/
|
|
}
|
|
#endif /* FEATURE_FANCY_PING */
|
|
|
|
|
|
int ping_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
|
|
int ping_main(int argc UNUSED_PARAM, char **argv)
|
|
{
|
|
#if !ENABLE_FEATURE_FANCY_PING
|
|
return common_ping_main(AF_UNSPEC, argv);
|
|
#else
|
|
return common_ping_main(0, argv);
|
|
#endif
|
|
}
|
|
|
|
#if ENABLE_PING6
|
|
int ping6_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
|
|
int ping6_main(int argc UNUSED_PARAM, char **argv)
|
|
{
|
|
# if !ENABLE_FEATURE_FANCY_PING
|
|
return common_ping_main(AF_INET6, argv);
|
|
# else
|
|
return common_ping_main(OPT_IPV6, argv);
|
|
# endif
|
|
}
|
|
#endif
|
|
|
|
/* from ping6.c:
|
|
* Copyright (c) 1989 The Regents of the University of California.
|
|
* All rights reserved.
|
|
*
|
|
* This code is derived from software contributed to Berkeley by
|
|
* Mike Muuss.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
*
|
|
* 3. <BSD Advertising Clause omitted per the July 22, 1999 licensing change
|
|
* ftp://ftp.cs.berkeley.edu/pub/4bsd/README.Impt.License.Change>
|
|
*
|
|
* 4. Neither the name of the University nor the names of its contributors
|
|
* may be used to endorse or promote products derived from this software
|
|
* without specific prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
* SUCH DAMAGE.
|
|
*/
|