Magellan Linux

Contents of /tags/mkinitrd-6_2_0/networking/ping.c

Parent Directory Parent Directory | Revision Log Revision Log


Revision 994 - (show annotations) (download)
Sun May 30 11:53:18 2010 UTC (13 years, 11 months ago) by niro
File MIME type: text/plain
File size: 22598 byte(s)
tagged 'mkinitrd-6_2_0'
1 /* vi: set sw=4 ts=4: */
2 /*
3 * Mini ping implementation for busybox
4 *
5 * Copyright (C) 1999 by Randolph Chung <tausq@debian.org>
6 *
7 * Adapted from the ping in netkit-base 0.10:
8 * Copyright (c) 1989 The Regents of the University of California.
9 * All rights reserved.
10 *
11 * This code is derived from software contributed to Berkeley by
12 * Mike Muuss.
13 *
14 * Licensed under GPLv2 or later, see file LICENSE in this tarball for details.
15 */
16 /* from ping6.c:
17 * Copyright (C) 1999 by Randolph Chung <tausq@debian.org>
18 *
19 * This version of ping is adapted from the ping in netkit-base 0.10,
20 * which is:
21 *
22 * Original copyright notice is retained at the end of this file.
23 *
24 * This version is an adaptation of ping.c from busybox.
25 * The code was modified by Bart Visscher <magick@linux-fan.com>
26 */
27
28 #include <net/if.h>
29 #include <netinet/ip_icmp.h>
30 #include "libbb.h"
31
32 #if ENABLE_PING6
33 # include <netinet/icmp6.h>
34 /* I see RENUMBERED constants in bits/in.h - !!?
35 * What a fuck is going on with libc? Is it a glibc joke? */
36 # ifdef IPV6_2292HOPLIMIT
37 # undef IPV6_HOPLIMIT
38 # define IPV6_HOPLIMIT IPV6_2292HOPLIMIT
39 # endif
40 #endif
41
42 enum {
43 DEFDATALEN = 56,
44 MAXIPLEN = 60,
45 MAXICMPLEN = 76,
46 MAXPACKET = 65468,
47 MAX_DUP_CHK = (8 * 128),
48 MAXWAIT = 10,
49 PINGINTERVAL = 1, /* 1 second */
50 };
51
52 /* common routines */
53
54 static int in_cksum(unsigned short *buf, int sz)
55 {
56 int nleft = sz;
57 int sum = 0;
58 unsigned short *w = buf;
59 unsigned short ans = 0;
60
61 while (nleft > 1) {
62 sum += *w++;
63 nleft -= 2;
64 }
65
66 if (nleft == 1) {
67 *(unsigned char *) (&ans) = *(unsigned char *) w;
68 sum += ans;
69 }
70
71 sum = (sum >> 16) + (sum & 0xFFFF);
72 sum += (sum >> 16);
73 ans = ~sum;
74 return ans;
75 }
76
77 #if !ENABLE_FEATURE_FANCY_PING
78
79 /* simple version */
80
81 static char *hostname;
82
83 static void noresp(int ign UNUSED_PARAM)
84 {
85 printf("No response from %s\n", hostname);
86 exit(EXIT_FAILURE);
87 }
88
89 static void ping4(len_and_sockaddr *lsa)
90 {
91 struct sockaddr_in pingaddr;
92 struct icmp *pkt;
93 int pingsock, c;
94 char packet[DEFDATALEN + MAXIPLEN + MAXICMPLEN];
95
96 pingsock = create_icmp_socket();
97 pingaddr = lsa->u.sin;
98
99 pkt = (struct icmp *) packet;
100 memset(pkt, 0, sizeof(packet));
101 pkt->icmp_type = ICMP_ECHO;
102 pkt->icmp_cksum = in_cksum((unsigned short *) pkt, sizeof(packet));
103
104 c = xsendto(pingsock, packet, DEFDATALEN + ICMP_MINLEN,
105 (struct sockaddr *) &pingaddr, sizeof(pingaddr));
106
107 /* listen for replies */
108 while (1) {
109 struct sockaddr_in from;
110 socklen_t fromlen = sizeof(from);
111
112 c = recvfrom(pingsock, packet, sizeof(packet), 0,
113 (struct sockaddr *) &from, &fromlen);
114 if (c < 0) {
115 if (errno != EINTR)
116 bb_perror_msg("recvfrom");
117 continue;
118 }
119 if (c >= 76) { /* ip + icmp */
120 struct iphdr *iphdr = (struct iphdr *) packet;
121
122 pkt = (struct icmp *) (packet + (iphdr->ihl << 2)); /* skip ip hdr */
123 if (pkt->icmp_type == ICMP_ECHOREPLY)
124 break;
125 }
126 }
127 if (ENABLE_FEATURE_CLEAN_UP)
128 close(pingsock);
129 }
130
131 #if ENABLE_PING6
132 static void ping6(len_and_sockaddr *lsa)
133 {
134 struct sockaddr_in6 pingaddr;
135 struct icmp6_hdr *pkt;
136 int pingsock, c;
137 int sockopt;
138 char packet[DEFDATALEN + MAXIPLEN + MAXICMPLEN];
139
140 pingsock = create_icmp6_socket();
141 pingaddr = lsa->u.sin6;
142
143 pkt = (struct icmp6_hdr *) packet;
144 memset(pkt, 0, sizeof(packet));
145 pkt->icmp6_type = ICMP6_ECHO_REQUEST;
146
147 sockopt = offsetof(struct icmp6_hdr, icmp6_cksum);
148 setsockopt(pingsock, SOL_RAW, IPV6_CHECKSUM, &sockopt, sizeof(sockopt));
149
150 c = xsendto(pingsock, packet, DEFDATALEN + sizeof (struct icmp6_hdr),
151 (struct sockaddr *) &pingaddr, sizeof(pingaddr));
152
153 /* listen for replies */
154 while (1) {
155 struct sockaddr_in6 from;
156 socklen_t fromlen = sizeof(from);
157
158 c = recvfrom(pingsock, packet, sizeof(packet), 0,
159 (struct sockaddr *) &from, &fromlen);
160 if (c < 0) {
161 if (errno != EINTR)
162 bb_perror_msg("recvfrom");
163 continue;
164 }
165 if (c >= ICMP_MINLEN) { /* icmp6_hdr */
166 pkt = (struct icmp6_hdr *) packet;
167 if (pkt->icmp6_type == ICMP6_ECHO_REPLY)
168 break;
169 }
170 }
171 if (ENABLE_FEATURE_CLEAN_UP)
172 close(pingsock);
173 }
174 #endif
175
176 #if !ENABLE_PING6
177 # define common_ping_main(af, argv) common_ping_main(argv)
178 #endif
179 static int common_ping_main(sa_family_t af, char **argv)
180 {
181 len_and_sockaddr *lsa;
182
183 #if ENABLE_PING6
184 while ((++argv)[0] && argv[0][0] == '-') {
185 if (argv[0][1] == '4') {
186 af = AF_INET;
187 continue;
188 }
189 if (argv[0][1] == '6') {
190 af = AF_INET6;
191 continue;
192 }
193 bb_show_usage();
194 }
195 #else
196 argv++;
197 #endif
198
199 hostname = *argv;
200 if (!hostname)
201 bb_show_usage();
202
203 #if ENABLE_PING6
204 lsa = xhost_and_af2sockaddr(hostname, 0, af);
205 #else
206 lsa = xhost_and_af2sockaddr(hostname, 0, AF_INET);
207 #endif
208 /* Set timer _after_ DNS resolution */
209 signal(SIGALRM, noresp);
210 alarm(5); /* give the host 5000ms to respond */
211
212 #if ENABLE_PING6
213 if (lsa->u.sa.sa_family == AF_INET6)
214 ping6(lsa);
215 else
216 #endif
217 ping4(lsa);
218 printf("%s is alive!\n", hostname);
219 return EXIT_SUCCESS;
220 }
221
222
223 #else /* FEATURE_FANCY_PING */
224
225
226 /* full(er) version */
227
228 #define OPT_STRING ("qvc:s:w:W:I:4" IF_PING6("6"))
229 enum {
230 OPT_QUIET = 1 << 0,
231 OPT_VERBOSE = 1 << 1,
232 OPT_c = 1 << 2,
233 OPT_s = 1 << 3,
234 OPT_w = 1 << 4,
235 OPT_W = 1 << 5,
236 OPT_I = 1 << 6,
237 OPT_IPV4 = 1 << 7,
238 OPT_IPV6 = (1 << 8) * ENABLE_PING6,
239 };
240
241
242 struct globals {
243 int pingsock;
244 int if_index;
245 char *str_I;
246 len_and_sockaddr *source_lsa;
247 unsigned datalen;
248 unsigned pingcount; /* must be int-sized */
249 unsigned long ntransmitted, nreceived, nrepeats;
250 uint16_t myid;
251 unsigned tmin, tmax; /* in us */
252 unsigned long long tsum; /* in us, sum of all times */
253 unsigned deadline;
254 unsigned timeout;
255 unsigned total_secs;
256 const char *hostname;
257 const char *dotted;
258 union {
259 struct sockaddr sa;
260 struct sockaddr_in sin;
261 #if ENABLE_PING6
262 struct sockaddr_in6 sin6;
263 #endif
264 } pingaddr;
265 char rcvd_tbl[MAX_DUP_CHK / 8];
266 };
267 #define G (*(struct globals*)&bb_common_bufsiz1)
268 #define pingsock (G.pingsock )
269 #define if_index (G.if_index )
270 #define source_lsa (G.source_lsa )
271 #define str_I (G.str_I )
272 #define datalen (G.datalen )
273 #define ntransmitted (G.ntransmitted)
274 #define nreceived (G.nreceived )
275 #define nrepeats (G.nrepeats )
276 #define pingcount (G.pingcount )
277 #define myid (G.myid )
278 #define tmin (G.tmin )
279 #define tmax (G.tmax )
280 #define tsum (G.tsum )
281 #define deadline (G.deadline )
282 #define timeout (G.timeout )
283 #define total_secs (G.total_secs )
284 #define hostname (G.hostname )
285 #define dotted (G.dotted )
286 #define pingaddr (G.pingaddr )
287 #define rcvd_tbl (G.rcvd_tbl )
288 void BUG_ping_globals_too_big(void);
289 #define INIT_G() do { \
290 if (sizeof(G) > COMMON_BUFSIZE) \
291 BUG_ping_globals_too_big(); \
292 pingsock = -1; \
293 datalen = DEFDATALEN; \
294 timeout = MAXWAIT; \
295 tmin = UINT_MAX; \
296 } while (0)
297
298
299 #define A(bit) rcvd_tbl[(bit)>>3] /* identify byte in array */
300 #define B(bit) (1 << ((bit) & 0x07)) /* identify bit in byte */
301 #define SET(bit) (A(bit) |= B(bit))
302 #define CLR(bit) (A(bit) &= (~B(bit)))
303 #define TST(bit) (A(bit) & B(bit))
304
305 /**************************************************************************/
306
307 static void print_stats_and_exit(int junk) NORETURN;
308 static void print_stats_and_exit(int junk UNUSED_PARAM)
309 {
310 signal(SIGINT, SIG_IGN);
311
312 printf("\n--- %s ping statistics ---\n", hostname);
313 printf("%lu packets transmitted, ", ntransmitted);
314 printf("%lu packets received, ", nreceived);
315 if (nrepeats)
316 printf("%lu duplicates, ", nrepeats);
317 if (ntransmitted)
318 ntransmitted = (ntransmitted - nreceived) * 100 / ntransmitted;
319 printf("%lu%% packet loss\n", ntransmitted);
320 if (tmin != UINT_MAX) {
321 unsigned tavg = tsum / (nreceived + nrepeats);
322 printf("round-trip min/avg/max = %u.%03u/%u.%03u/%u.%03u ms\n",
323 tmin / 1000, tmin % 1000,
324 tavg / 1000, tavg % 1000,
325 tmax / 1000, tmax % 1000);
326 }
327 /* if condition is true, exit with 1 -- 'failure' */
328 exit(nreceived == 0 || (deadline && nreceived < pingcount));
329 }
330
331 static void sendping_tail(void (*sp)(int), const void *pkt, int size_pkt)
332 {
333 int sz;
334
335 CLR((uint16_t)ntransmitted % MAX_DUP_CHK);
336 ntransmitted++;
337
338 /* sizeof(pingaddr) can be larger than real sa size, but I think
339 * it doesn't matter */
340 sz = xsendto(pingsock, pkt, size_pkt, &pingaddr.sa, sizeof(pingaddr));
341 if (sz != size_pkt)
342 bb_error_msg_and_die(bb_msg_write_error);
343
344 if (pingcount == 0 || deadline || ntransmitted < pingcount) {
345 /* Didn't send all pings yet - schedule next in 1s */
346 signal(SIGALRM, sp);
347 if (deadline) {
348 total_secs += PINGINTERVAL;
349 if (total_secs >= deadline)
350 signal(SIGALRM, print_stats_and_exit);
351 }
352 alarm(PINGINTERVAL);
353 } else { /* -c NN, and all NN are sent (and no deadline) */
354 /* Wait for the last ping to come back.
355 * -W timeout: wait for a response in seconds.
356 * Affects only timeout in absense of any responses,
357 * otherwise ping waits for two RTTs. */
358 unsigned expire = timeout;
359
360 if (nreceived) {
361 /* approx. 2*tmax, in seconds (2 RTT) */
362 expire = tmax / (512*1024);
363 if (expire == 0)
364 expire = 1;
365 }
366 signal(SIGALRM, print_stats_and_exit);
367 alarm(expire);
368 }
369 }
370
371 static void sendping4(int junk UNUSED_PARAM)
372 {
373 /* +4 reserves a place for timestamp, which may end up sitting
374 * *after* packet. Saves one if() */
375 struct icmp *pkt = alloca(datalen + ICMP_MINLEN + 4);
376
377 memset(pkt, 0, datalen + ICMP_MINLEN + 4);
378 pkt->icmp_type = ICMP_ECHO;
379 /*pkt->icmp_code = 0;*/
380 /*pkt->icmp_cksum = 0;*/
381 pkt->icmp_seq = htons(ntransmitted); /* don't ++ here, it can be a macro */
382 pkt->icmp_id = myid;
383
384 /* We don't do hton, because we will read it back on the same machine */
385 /*if (datalen >= 4)*/
386 *(uint32_t*)&pkt->icmp_dun = monotonic_us();
387
388 pkt->icmp_cksum = in_cksum((unsigned short *) pkt, datalen + ICMP_MINLEN);
389
390 sendping_tail(sendping4, pkt, datalen + ICMP_MINLEN);
391 }
392 #if ENABLE_PING6
393 static void sendping6(int junk UNUSED_PARAM)
394 {
395 struct icmp6_hdr *pkt = alloca(datalen + sizeof(struct icmp6_hdr) + 4);
396
397 memset(pkt, 0, datalen + sizeof(struct icmp6_hdr) + 4);
398 pkt->icmp6_type = ICMP6_ECHO_REQUEST;
399 /*pkt->icmp6_code = 0;*/
400 /*pkt->icmp6_cksum = 0;*/
401 pkt->icmp6_seq = htons(ntransmitted); /* don't ++ here, it can be a macro */
402 pkt->icmp6_id = myid;
403
404 /*if (datalen >= 4)*/
405 *(uint32_t*)(&pkt->icmp6_data8[4]) = monotonic_us();
406
407 sendping_tail(sendping6, pkt, datalen + sizeof(struct icmp6_hdr));
408 }
409 #endif
410
411 static const char *icmp_type_name(int id)
412 {
413 switch (id) {
414 case ICMP_ECHOREPLY: return "Echo Reply";
415 case ICMP_DEST_UNREACH: return "Destination Unreachable";
416 case ICMP_SOURCE_QUENCH: return "Source Quench";
417 case ICMP_REDIRECT: return "Redirect (change route)";
418 case ICMP_ECHO: return "Echo Request";
419 case ICMP_TIME_EXCEEDED: return "Time Exceeded";
420 case ICMP_PARAMETERPROB: return "Parameter Problem";
421 case ICMP_TIMESTAMP: return "Timestamp Request";
422 case ICMP_TIMESTAMPREPLY: return "Timestamp Reply";
423 case ICMP_INFO_REQUEST: return "Information Request";
424 case ICMP_INFO_REPLY: return "Information Reply";
425 case ICMP_ADDRESS: return "Address Mask Request";
426 case ICMP_ADDRESSREPLY: return "Address Mask Reply";
427 default: return "unknown ICMP type";
428 }
429 }
430 #if ENABLE_PING6
431 /* RFC3542 changed some definitions from RFC2292 for no good reason, whee!
432 * the newer 3542 uses a MLD_ prefix where as 2292 uses ICMP6_ prefix */
433 #ifndef MLD_LISTENER_QUERY
434 # define MLD_LISTENER_QUERY ICMP6_MEMBERSHIP_QUERY
435 #endif
436 #ifndef MLD_LISTENER_REPORT
437 # define MLD_LISTENER_REPORT ICMP6_MEMBERSHIP_REPORT
438 #endif
439 #ifndef MLD_LISTENER_REDUCTION
440 # define MLD_LISTENER_REDUCTION ICMP6_MEMBERSHIP_REDUCTION
441 #endif
442 static const char *icmp6_type_name(int id)
443 {
444 switch (id) {
445 case ICMP6_DST_UNREACH: return "Destination Unreachable";
446 case ICMP6_PACKET_TOO_BIG: return "Packet too big";
447 case ICMP6_TIME_EXCEEDED: return "Time Exceeded";
448 case ICMP6_PARAM_PROB: return "Parameter Problem";
449 case ICMP6_ECHO_REPLY: return "Echo Reply";
450 case ICMP6_ECHO_REQUEST: return "Echo Request";
451 case MLD_LISTENER_QUERY: return "Listener Query";
452 case MLD_LISTENER_REPORT: return "Listener Report";
453 case MLD_LISTENER_REDUCTION: return "Listener Reduction";
454 default: return "unknown ICMP type";
455 }
456 }
457 #endif
458
459 static void unpack_tail(int sz, uint32_t *tp,
460 const char *from_str,
461 uint16_t recv_seq, int ttl)
462 {
463 const char *dupmsg = " (DUP!)";
464 unsigned triptime = triptime; /* for gcc */
465
466 ++nreceived;
467
468 if (tp) {
469 /* (int32_t) cast is for hypothetical 64-bit unsigned */
470 /* (doesn't hurt 32-bit real-world anyway) */
471 triptime = (int32_t) ((uint32_t)monotonic_us() - *tp);
472 tsum += triptime;
473 if (triptime < tmin)
474 tmin = triptime;
475 if (triptime > tmax)
476 tmax = triptime;
477 }
478
479 if (TST(recv_seq % MAX_DUP_CHK)) {
480 ++nrepeats;
481 --nreceived;
482 } else {
483 SET(recv_seq % MAX_DUP_CHK);
484 dupmsg += 7;
485 }
486
487 if (option_mask32 & OPT_QUIET)
488 return;
489
490 printf("%d bytes from %s: seq=%u ttl=%d", sz,
491 from_str, recv_seq, ttl);
492 if (tp)
493 printf(" time=%u.%03u ms", triptime / 1000, triptime % 1000);
494 puts(dupmsg);
495 fflush_all();
496 }
497 static void unpack4(char *buf, int sz, struct sockaddr_in *from)
498 {
499 struct icmp *icmppkt;
500 struct iphdr *iphdr;
501 int hlen;
502
503 /* discard if too short */
504 if (sz < (datalen + ICMP_MINLEN))
505 return;
506
507 /* check IP header */
508 iphdr = (struct iphdr *) buf;
509 hlen = iphdr->ihl << 2;
510 sz -= hlen;
511 icmppkt = (struct icmp *) (buf + hlen);
512 if (icmppkt->icmp_id != myid)
513 return; /* not our ping */
514
515 if (icmppkt->icmp_type == ICMP_ECHOREPLY) {
516 uint16_t recv_seq = ntohs(icmppkt->icmp_seq);
517 uint32_t *tp = NULL;
518
519 if (sz >= ICMP_MINLEN + sizeof(uint32_t))
520 tp = (uint32_t *) icmppkt->icmp_data;
521 unpack_tail(sz, tp,
522 inet_ntoa(*(struct in_addr *) &from->sin_addr.s_addr),
523 recv_seq, iphdr->ttl);
524 } else if (icmppkt->icmp_type != ICMP_ECHO) {
525 bb_error_msg("warning: got ICMP %d (%s)",
526 icmppkt->icmp_type,
527 icmp_type_name(icmppkt->icmp_type));
528 }
529 }
530 #if ENABLE_PING6
531 static void unpack6(char *packet, int sz, /*struct sockaddr_in6 *from,*/ int hoplimit)
532 {
533 struct icmp6_hdr *icmppkt;
534 char buf[INET6_ADDRSTRLEN];
535
536 /* discard if too short */
537 if (sz < (datalen + sizeof(struct icmp6_hdr)))
538 return;
539
540 icmppkt = (struct icmp6_hdr *) packet;
541 if (icmppkt->icmp6_id != myid)
542 return; /* not our ping */
543
544 if (icmppkt->icmp6_type == ICMP6_ECHO_REPLY) {
545 uint16_t recv_seq = ntohs(icmppkt->icmp6_seq);
546 uint32_t *tp = NULL;
547
548 if (sz >= sizeof(struct icmp6_hdr) + sizeof(uint32_t))
549 tp = (uint32_t *) &icmppkt->icmp6_data8[4];
550 unpack_tail(sz, tp,
551 inet_ntop(AF_INET6, &pingaddr.sin6.sin6_addr,
552 buf, sizeof(buf)),
553 recv_seq, hoplimit);
554 } else if (icmppkt->icmp6_type != ICMP6_ECHO_REQUEST) {
555 bb_error_msg("warning: got ICMP %d (%s)",
556 icmppkt->icmp6_type,
557 icmp6_type_name(icmppkt->icmp6_type));
558 }
559 }
560 #endif
561
562 static void ping4(len_and_sockaddr *lsa)
563 {
564 char packet[datalen + MAXIPLEN + MAXICMPLEN];
565 int sockopt;
566
567 pingsock = create_icmp_socket();
568 pingaddr.sin = lsa->u.sin;
569 if (source_lsa) {
570 if (setsockopt(pingsock, IPPROTO_IP, IP_MULTICAST_IF,
571 &source_lsa->u.sa, source_lsa->len))
572 bb_error_msg_and_die("can't set multicast source interface");
573 xbind(pingsock, &source_lsa->u.sa, source_lsa->len);
574 }
575 if (str_I)
576 setsockopt_bindtodevice(pingsock, str_I);
577
578 /* enable broadcast pings */
579 setsockopt_broadcast(pingsock);
580
581 /* set recv buf (needed if we can get lots of responses: flood ping,
582 * broadcast ping etc) */
583 sockopt = (datalen * 2) + 7 * 1024; /* giving it a bit of extra room */
584 setsockopt(pingsock, SOL_SOCKET, SO_RCVBUF, &sockopt, sizeof(sockopt));
585
586 signal(SIGINT, print_stats_and_exit);
587
588 /* start the ping's going ... */
589 sendping4(0);
590
591 /* listen for replies */
592 while (1) {
593 struct sockaddr_in from;
594 socklen_t fromlen = (socklen_t) sizeof(from);
595 int c;
596
597 c = recvfrom(pingsock, packet, sizeof(packet), 0,
598 (struct sockaddr *) &from, &fromlen);
599 if (c < 0) {
600 if (errno != EINTR)
601 bb_perror_msg("recvfrom");
602 continue;
603 }
604 unpack4(packet, c, &from);
605 if (pingcount && nreceived >= pingcount)
606 break;
607 }
608 }
609 #if ENABLE_PING6
610 extern int BUG_bad_offsetof_icmp6_cksum(void);
611 static void ping6(len_and_sockaddr *lsa)
612 {
613 char packet[datalen + MAXIPLEN + MAXICMPLEN];
614 int sockopt;
615 struct msghdr msg;
616 struct sockaddr_in6 from;
617 struct iovec iov;
618 char control_buf[CMSG_SPACE(36)];
619
620 pingsock = create_icmp6_socket();
621 pingaddr.sin6 = lsa->u.sin6;
622 /* untested whether "-I addr" really works for IPv6: */
623 if (source_lsa)
624 xbind(pingsock, &source_lsa->u.sa, source_lsa->len);
625 if (str_I)
626 setsockopt_bindtodevice(pingsock, str_I);
627
628 #ifdef ICMP6_FILTER
629 {
630 struct icmp6_filter filt;
631 if (!(option_mask32 & OPT_VERBOSE)) {
632 ICMP6_FILTER_SETBLOCKALL(&filt);
633 ICMP6_FILTER_SETPASS(ICMP6_ECHO_REPLY, &filt);
634 } else {
635 ICMP6_FILTER_SETPASSALL(&filt);
636 }
637 if (setsockopt(pingsock, IPPROTO_ICMPV6, ICMP6_FILTER, &filt,
638 sizeof(filt)) < 0)
639 bb_error_msg_and_die("setsockopt(ICMP6_FILTER)");
640 }
641 #endif /*ICMP6_FILTER*/
642
643 /* enable broadcast pings */
644 setsockopt_broadcast(pingsock);
645
646 /* set recv buf (needed if we can get lots of responses: flood ping,
647 * broadcast ping etc) */
648 sockopt = (datalen * 2) + 7 * 1024; /* giving it a bit of extra room */
649 setsockopt(pingsock, SOL_SOCKET, SO_RCVBUF, &sockopt, sizeof(sockopt));
650
651 sockopt = offsetof(struct icmp6_hdr, icmp6_cksum);
652 if (offsetof(struct icmp6_hdr, icmp6_cksum) != 2)
653 BUG_bad_offsetof_icmp6_cksum();
654 setsockopt(pingsock, SOL_RAW, IPV6_CHECKSUM, &sockopt, sizeof(sockopt));
655
656 /* request ttl info to be returned in ancillary data */
657 setsockopt(pingsock, SOL_IPV6, IPV6_HOPLIMIT, &const_int_1, sizeof(const_int_1));
658
659 if (if_index)
660 pingaddr.sin6.sin6_scope_id = if_index;
661
662 signal(SIGINT, print_stats_and_exit);
663
664 /* start the ping's going ... */
665 sendping6(0);
666
667 /* listen for replies */
668 msg.msg_name = &from;
669 msg.msg_namelen = sizeof(from);
670 msg.msg_iov = &iov;
671 msg.msg_iovlen = 1;
672 msg.msg_control = control_buf;
673 iov.iov_base = packet;
674 iov.iov_len = sizeof(packet);
675 while (1) {
676 int c;
677 struct cmsghdr *mp;
678 int hoplimit = -1;
679 msg.msg_controllen = sizeof(control_buf);
680
681 c = recvmsg(pingsock, &msg, 0);
682 if (c < 0) {
683 if (errno != EINTR)
684 bb_perror_msg("recvfrom");
685 continue;
686 }
687 for (mp = CMSG_FIRSTHDR(&msg); mp; mp = CMSG_NXTHDR(&msg, mp)) {
688 if (mp->cmsg_level == SOL_IPV6
689 && mp->cmsg_type == IPV6_HOPLIMIT
690 /* don't check len - we trust the kernel: */
691 /* && mp->cmsg_len >= CMSG_LEN(sizeof(int)) */
692 ) {
693 /*hoplimit = *(int*)CMSG_DATA(mp); - unaligned access */
694 move_from_unaligned_int(hoplimit, CMSG_DATA(mp));
695 }
696 }
697 unpack6(packet, c, /*&from,*/ hoplimit);
698 if (pingcount && nreceived >= pingcount)
699 break;
700 }
701 }
702 #endif
703
704 static void ping(len_and_sockaddr *lsa)
705 {
706 printf("PING %s (%s)", hostname, dotted);
707 if (source_lsa) {
708 printf(" from %s",
709 xmalloc_sockaddr2dotted_noport(&source_lsa->u.sa));
710 }
711 printf(": %d data bytes\n", datalen);
712
713 #if ENABLE_PING6
714 if (lsa->u.sa.sa_family == AF_INET6)
715 ping6(lsa);
716 else
717 #endif
718 ping4(lsa);
719 }
720
721 static int common_ping_main(int opt, char **argv)
722 {
723 len_and_sockaddr *lsa;
724 char *str_s;
725
726 INIT_G();
727
728 /* exactly one argument needed; -v and -q don't mix; -c NUM, -w NUM, -W NUM */
729 opt_complementary = "=1:q--v:v--q:c+:w+:W+";
730 opt |= getopt32(argv, OPT_STRING, &pingcount, &str_s, &deadline, &timeout, &str_I);
731 if (opt & OPT_s)
732 datalen = xatou16(str_s); // -s
733 if (opt & OPT_I) { // -I
734 if_index = if_nametoindex(str_I);
735 if (!if_index) {
736 /* TODO: I'm not sure it takes IPv6 unless in [XX:XX..] format */
737 source_lsa = xdotted2sockaddr(str_I, 0);
738 str_I = NULL; /* don't try to bind to device later */
739 }
740 }
741 myid = (uint16_t) getpid();
742 hostname = argv[optind];
743 #if ENABLE_PING6
744 {
745 sa_family_t af = AF_UNSPEC;
746 if (opt & OPT_IPV4)
747 af = AF_INET;
748 if (opt & OPT_IPV6)
749 af = AF_INET6;
750 lsa = xhost_and_af2sockaddr(hostname, 0, af);
751 }
752 #else
753 lsa = xhost_and_af2sockaddr(hostname, 0, AF_INET);
754 #endif
755
756 if (source_lsa && source_lsa->u.sa.sa_family != lsa->u.sa.sa_family)
757 /* leaking it here... */
758 source_lsa = NULL;
759
760 dotted = xmalloc_sockaddr2dotted_noport(&lsa->u.sa);
761 ping(lsa);
762 print_stats_and_exit(EXIT_SUCCESS);
763 /*return EXIT_SUCCESS;*/
764 }
765 #endif /* FEATURE_FANCY_PING */
766
767
768 int ping_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
769 int ping_main(int argc UNUSED_PARAM, char **argv)
770 {
771 #if !ENABLE_FEATURE_FANCY_PING
772 return common_ping_main(AF_UNSPEC, argv);
773 #else
774 return common_ping_main(0, argv);
775 #endif
776 }
777
778 #if ENABLE_PING6
779 int ping6_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
780 int ping6_main(int argc UNUSED_PARAM, char **argv)
781 {
782 # if !ENABLE_FEATURE_FANCY_PING
783 return common_ping_main(AF_INET6, argv);
784 # else
785 return common_ping_main(OPT_IPV6, argv);
786 # endif
787 }
788 #endif
789
790 /* from ping6.c:
791 * Copyright (c) 1989 The Regents of the University of California.
792 * All rights reserved.
793 *
794 * This code is derived from software contributed to Berkeley by
795 * Mike Muuss.
796 *
797 * Redistribution and use in source and binary forms, with or without
798 * modification, are permitted provided that the following conditions
799 * are met:
800 * 1. Redistributions of source code must retain the above copyright
801 * notice, this list of conditions and the following disclaimer.
802 * 2. Redistributions in binary form must reproduce the above copyright
803 * notice, this list of conditions and the following disclaimer in the
804 * documentation and/or other materials provided with the distribution.
805 *
806 * 3. <BSD Advertising Clause omitted per the July 22, 1999 licensing change
807 * ftp://ftp.cs.berkeley.edu/pub/4bsd/README.Impt.License.Change>
808 *
809 * 4. Neither the name of the University nor the names of its contributors
810 * may be used to endorse or promote products derived from this software
811 * without specific prior written permission.
812 *
813 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
814 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
815 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
816 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
817 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
818 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
819 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
820 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
821 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
822 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
823 * SUCH DAMAGE.
824 */