1 /* vi: set sw=4 ts=4: */
3 * Mini ping implementation for busybox
5 * Copyright (C) 1999 by Randolph Chung <tausq@debian.org>
7 * Adapted from the ping in netkit-base 0.10:
8 * Copyright (c) 1989 The Regents of the University of California.
11 * This code is derived from software contributed to Berkeley by
14 * Licensed under GPLv2 or later, see file LICENSE in this tarball for details.
17 * Copyright (C) 1999 by Randolph Chung <tausq@debian.org>
19 * This version of ping is adapted from the ping in netkit-base 0.10,
22 * Original copyright notice is retained at the end of this file.
24 * This version is an adaptation of ping.c from busybox.
25 * The code was modified by Bart Visscher <magick@linux-fan.com>
29 #include <netinet/ip_icmp.h>
33 #include <netinet/icmp6.h>
34 /* I see RENUMBERED constants in bits/in.h - !!?
35 * What a fuck is going on with libc? Is it a glibc joke? */
36 #ifdef IPV6_2292HOPLIMIT
38 #define IPV6_HOPLIMIT IPV6_2292HOPLIMIT
47 MAX_DUP_CHK = (8 * 128),
49 PINGINTERVAL = 1, /* 1 second */
54 static int in_cksum(unsigned short *buf, int sz)
58 unsigned short *w = buf;
59 unsigned short ans = 0;
67 *(unsigned char *) (&ans) = *(unsigned char *) w;
71 sum = (sum >> 16) + (sum & 0xFFFF);
77 #if !ENABLE_FEATURE_FANCY_PING
81 static char *hostname;
83 static void noresp(int ign ATTRIBUTE_UNUSED)
85 printf("No response from %s\n", hostname);
89 static void ping4(len_and_sockaddr *lsa)
91 struct sockaddr_in pingaddr;
94 char packet[DEFDATALEN + MAXIPLEN + MAXICMPLEN];
96 pingsock = create_icmp_socket();
97 pingaddr = lsa->u.sin;
99 pkt = (struct icmp *) packet;
100 memset(pkt, 0, sizeof(packet));
101 pkt->icmp_type = ICMP_ECHO;
102 pkt->icmp_cksum = in_cksum((unsigned short *) pkt, sizeof(packet));
104 c = xsendto(pingsock, packet, DEFDATALEN + ICMP_MINLEN,
105 (struct sockaddr *) &pingaddr, sizeof(pingaddr));
107 /* listen for replies */
109 struct sockaddr_in from;
110 socklen_t fromlen = sizeof(from);
112 c = recvfrom(pingsock, packet, sizeof(packet), 0,
113 (struct sockaddr *) &from, &fromlen);
116 bb_perror_msg("recvfrom");
119 if (c >= 76) { /* ip + icmp */
120 struct iphdr *iphdr = (struct iphdr *) packet;
122 pkt = (struct icmp *) (packet + (iphdr->ihl << 2)); /* skip ip hdr */
123 if (pkt->icmp_type == ICMP_ECHOREPLY)
127 if (ENABLE_FEATURE_CLEAN_UP)
132 static void ping6(len_and_sockaddr *lsa)
134 struct sockaddr_in6 pingaddr;
135 struct icmp6_hdr *pkt;
138 char packet[DEFDATALEN + MAXIPLEN + MAXICMPLEN];
140 pingsock = create_icmp6_socket();
141 pingaddr = lsa->u.sin6;
143 pkt = (struct icmp6_hdr *) packet;
144 memset(pkt, 0, sizeof(packet));
145 pkt->icmp6_type = ICMP6_ECHO_REQUEST;
147 sockopt = offsetof(struct icmp6_hdr, icmp6_cksum);
148 setsockopt(pingsock, SOL_RAW, IPV6_CHECKSUM, &sockopt, sizeof(sockopt));
150 c = xsendto(pingsock, packet, DEFDATALEN + sizeof (struct icmp6_hdr),
151 (struct sockaddr *) &pingaddr, sizeof(pingaddr));
153 /* listen for replies */
155 struct sockaddr_in6 from;
156 socklen_t fromlen = sizeof(from);
158 c = recvfrom(pingsock, packet, sizeof(packet), 0,
159 (struct sockaddr *) &from, &fromlen);
162 bb_perror_msg("recvfrom");
165 if (c >= 8) { /* icmp6_hdr */
166 pkt = (struct icmp6_hdr *) packet;
167 if (pkt->icmp6_type == ICMP6_ECHO_REPLY)
171 if (ENABLE_FEATURE_CLEAN_UP)
176 int ping_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
177 int ping_main(int argc, char **argv)
179 len_and_sockaddr *lsa;
181 sa_family_t af = AF_UNSPEC;
183 while ((++argv)[0] && argv[0][0] == '-') {
184 if (argv[0][1] == '4') {
188 if (argv[0][1] == '6') {
203 lsa = xhost_and_af2sockaddr(hostname, 0, af);
205 lsa = xhost_and_af2sockaddr(hostname, 0, AF_INET);
207 /* Set timer _after_ DNS resolution */
208 signal(SIGALRM, noresp);
209 alarm(5); /* give the host 5000ms to respond */
212 if (lsa->u.sa.sa_family == AF_INET6)
217 printf("%s is alive!\n", hostname);
222 #else /* FEATURE_FANCY_PING */
225 /* full(er) version */
227 #define OPT_STRING ("qvc:s:I:4" USE_PING6("6"))
230 OPT_VERBOSE = 1 << 1,
235 OPT_IPV6 = (1 << 6) * ENABLE_PING6,
243 len_and_sockaddr *source_lsa;
245 unsigned long ntransmitted, nreceived, nrepeats, pingcount;
247 unsigned tmin, tmax; /* in us */
248 unsigned long long tsum; /* in us, sum of all times */
249 const char *hostname;
253 struct sockaddr_in sin;
255 struct sockaddr_in6 sin6;
258 char rcvd_tbl[MAX_DUP_CHK / 8];
260 #define G (*(struct globals*)&bb_common_bufsiz1)
261 #define pingsock (G.pingsock )
262 #define if_index (G.if_index )
263 #define source_lsa (G.source_lsa )
264 #define opt_I (G.opt_I )
265 #define datalen (G.datalen )
266 #define ntransmitted (G.ntransmitted)
267 #define nreceived (G.nreceived )
268 #define nrepeats (G.nrepeats )
269 #define pingcount (G.pingcount )
270 #define myid (G.myid )
271 #define tmin (G.tmin )
272 #define tmax (G.tmax )
273 #define tsum (G.tsum )
274 #define hostname (G.hostname )
275 #define dotted (G.dotted )
276 #define pingaddr (G.pingaddr )
277 #define rcvd_tbl (G.rcvd_tbl )
278 void BUG_ping_globals_too_big(void);
279 #define INIT_G() do { \
280 if (sizeof(G) > COMMON_BUFSIZE) \
281 BUG_ping_globals_too_big(); \
287 #define A(bit) rcvd_tbl[(bit)>>3] /* identify byte in array */
288 #define B(bit) (1 << ((bit) & 0x07)) /* identify bit in byte */
289 #define SET(bit) (A(bit) |= B(bit))
290 #define CLR(bit) (A(bit) &= (~B(bit)))
291 #define TST(bit) (A(bit) & B(bit))
293 /**************************************************************************/
295 static void pingstats(int junk ATTRIBUTE_UNUSED)
297 signal(SIGINT, SIG_IGN);
299 printf("\n--- %s ping statistics ---\n", hostname);
300 printf("%lu packets transmitted, ", ntransmitted);
301 printf("%lu packets received, ", nreceived);
303 printf("%lu duplicates, ", nrepeats);
305 ntransmitted = (ntransmitted - nreceived) * 100 / ntransmitted;
306 printf("%lu%% packet loss\n", ntransmitted);
307 if (tmin != UINT_MAX) {
308 unsigned tavg = tsum / (nreceived + nrepeats);
309 printf("round-trip min/avg/max = %u.%03u/%u.%03u/%u.%03u ms\n",
310 tmin / 1000, tmin % 1000,
311 tavg / 1000, tavg % 1000,
312 tmax / 1000, tmax % 1000);
314 exit(nreceived == 0); /* (nreceived == 0) is true (1) -- 'failure' */
317 static void sendping_tail(void (*sp)(int), const void *pkt, int size_pkt)
321 CLR((uint16_t)ntransmitted % MAX_DUP_CHK);
324 /* sizeof(pingaddr) can be larger than real sa size, but I think
325 * it doesn't matter */
326 sz = xsendto(pingsock, pkt, size_pkt, &pingaddr.sa, sizeof(pingaddr));
328 bb_error_msg_and_die(bb_msg_write_error);
331 if (pingcount == 0 || ntransmitted < pingcount) { /* schedule next in 1s */
333 } else { /* done, wait for the last ping to come back */
334 /* todo, don't necessarily need to wait so long... */
335 signal(SIGALRM, pingstats);
340 static void sendping4(int junk ATTRIBUTE_UNUSED)
342 /* +4 reserves a place for timestamp, which may end up sitting
343 * *after* packet. Saves one if() */
344 struct icmp *pkt = alloca(datalen + ICMP_MINLEN + 4);
346 pkt->icmp_type = ICMP_ECHO;
349 pkt->icmp_seq = htons(ntransmitted); /* don't ++ here, it can be a macro */
352 /* We don't do hton, because we will read it back on the same machine */
353 /*if (datalen >= 4)*/
354 *(uint32_t*)&pkt->icmp_dun = monotonic_us();
356 pkt->icmp_cksum = in_cksum((unsigned short *) pkt, datalen + ICMP_MINLEN);
358 sendping_tail(sendping4, pkt, datalen + ICMP_MINLEN);
361 static void sendping6(int junk ATTRIBUTE_UNUSED)
363 struct icmp6_hdr *pkt = alloca(datalen + sizeof(struct icmp6_hdr) + 4);
365 pkt->icmp6_type = ICMP6_ECHO_REQUEST;
367 pkt->icmp6_cksum = 0;
368 pkt->icmp6_seq = htons(ntransmitted); /* don't ++ here, it can be a macro */
369 pkt->icmp6_id = myid;
371 /*if (datalen >= 4)*/
372 *(uint32_t*)(&pkt->icmp6_data8[4]) = monotonic_us();
374 sendping_tail(sendping6, pkt, datalen + sizeof(struct icmp6_hdr));
378 static const char *icmp_type_name(int id)
381 case ICMP_ECHOREPLY: return "Echo Reply";
382 case ICMP_DEST_UNREACH: return "Destination Unreachable";
383 case ICMP_SOURCE_QUENCH: return "Source Quench";
384 case ICMP_REDIRECT: return "Redirect (change route)";
385 case ICMP_ECHO: return "Echo Request";
386 case ICMP_TIME_EXCEEDED: return "Time Exceeded";
387 case ICMP_PARAMETERPROB: return "Parameter Problem";
388 case ICMP_TIMESTAMP: return "Timestamp Request";
389 case ICMP_TIMESTAMPREPLY: return "Timestamp Reply";
390 case ICMP_INFO_REQUEST: return "Information Request";
391 case ICMP_INFO_REPLY: return "Information Reply";
392 case ICMP_ADDRESS: return "Address Mask Request";
393 case ICMP_ADDRESSREPLY: return "Address Mask Reply";
394 default: return "unknown ICMP type";
398 /* RFC3542 changed some definitions from RFC2292 for no good reason, whee!
399 * the newer 3542 uses a MLD_ prefix where as 2292 uses ICMP6_ prefix */
400 #ifndef MLD_LISTENER_QUERY
401 # define MLD_LISTENER_QUERY ICMP6_MEMBERSHIP_QUERY
403 #ifndef MLD_LISTENER_REPORT
404 # define MLD_LISTENER_REPORT ICMP6_MEMBERSHIP_REPORT
406 #ifndef MLD_LISTENER_REDUCTION
407 # define MLD_LISTENER_REDUCTION ICMP6_MEMBERSHIP_REDUCTION
409 static const char *icmp6_type_name(int id)
412 case ICMP6_DST_UNREACH: return "Destination Unreachable";
413 case ICMP6_PACKET_TOO_BIG: return "Packet too big";
414 case ICMP6_TIME_EXCEEDED: return "Time Exceeded";
415 case ICMP6_PARAM_PROB: return "Parameter Problem";
416 case ICMP6_ECHO_REPLY: return "Echo Reply";
417 case ICMP6_ECHO_REQUEST: return "Echo Request";
418 case MLD_LISTENER_QUERY: return "Listener Query";
419 case MLD_LISTENER_REPORT: return "Listener Report";
420 case MLD_LISTENER_REDUCTION: return "Listener Reduction";
421 default: return "unknown ICMP type";
426 static void unpack_tail(int sz, uint32_t *tp,
427 const char *from_str,
428 uint16_t recv_seq, int ttl)
430 const char *dupmsg = " (DUP!)";
431 unsigned triptime = triptime; /* for gcc */
436 /* (int32_t) cast is for hypothetical 64-bit unsigned */
437 /* (doesn't hurt 32-bit real-world anyway) */
438 triptime = (int32_t) ((uint32_t)monotonic_us() - *tp);
446 if (TST(recv_seq % MAX_DUP_CHK)) {
450 SET(recv_seq % MAX_DUP_CHK);
454 if (option_mask32 & OPT_QUIET)
457 printf("%d bytes from %s: seq=%u ttl=%d", sz,
458 from_str, recv_seq, ttl);
460 printf(" time=%u.%03u ms", triptime / 1000, triptime % 1000);
464 static void unpack4(char *buf, int sz, struct sockaddr_in *from)
466 struct icmp *icmppkt;
470 /* discard if too short */
471 if (sz < (datalen + ICMP_MINLEN))
474 /* check IP header */
475 iphdr = (struct iphdr *) buf;
476 hlen = iphdr->ihl << 2;
478 icmppkt = (struct icmp *) (buf + hlen);
479 if (icmppkt->icmp_id != myid)
480 return; /* not our ping */
482 if (icmppkt->icmp_type == ICMP_ECHOREPLY) {
483 uint16_t recv_seq = ntohs(icmppkt->icmp_seq);
486 if (sz >= ICMP_MINLEN + sizeof(uint32_t))
487 tp = (uint32_t *) icmppkt->icmp_data;
489 inet_ntoa(*(struct in_addr *) &from->sin_addr.s_addr),
490 recv_seq, iphdr->ttl);
491 } else if (icmppkt->icmp_type != ICMP_ECHO) {
492 bb_error_msg("warning: got ICMP %d (%s)",
494 icmp_type_name(icmppkt->icmp_type));
498 static void unpack6(char *packet, int sz, struct sockaddr_in6 *from, int hoplimit)
500 struct icmp6_hdr *icmppkt;
501 char buf[INET6_ADDRSTRLEN];
503 /* discard if too short */
504 if (sz < (datalen + sizeof(struct icmp6_hdr)))
507 icmppkt = (struct icmp6_hdr *) packet;
508 if (icmppkt->icmp6_id != myid)
509 return; /* not our ping */
511 if (icmppkt->icmp6_type == ICMP6_ECHO_REPLY) {
512 uint16_t recv_seq = ntohs(icmppkt->icmp6_seq);
515 if (sz >= sizeof(struct icmp6_hdr) + sizeof(uint32_t))
516 tp = (uint32_t *) &icmppkt->icmp6_data8[4];
518 inet_ntop(AF_INET6, &pingaddr.sin6.sin6_addr,
521 } else if (icmppkt->icmp6_type != ICMP6_ECHO_REQUEST) {
522 bb_error_msg("warning: got ICMP %d (%s)",
524 icmp6_type_name(icmppkt->icmp6_type));
529 static void ping4(len_and_sockaddr *lsa)
531 char packet[datalen + MAXIPLEN + MAXICMPLEN];
534 pingsock = create_icmp_socket();
535 pingaddr.sin = lsa->u.sin;
537 if (setsockopt(pingsock, IPPROTO_IP, IP_MULTICAST_IF,
538 &source_lsa->u.sa, source_lsa->len))
539 bb_error_msg_and_die("can't set multicast source interface");
540 xbind(pingsock, &source_lsa->u.sa, source_lsa->len);
543 setsockopt(pingsock, SOL_SOCKET, SO_BINDTODEVICE, opt_I, strlen(opt_I) + 1);
545 /* enable broadcast pings */
546 setsockopt_broadcast(pingsock);
548 /* set recv buf for broadcast pings */
549 sockopt = 48 * 1024; /* explain why 48k? */
550 setsockopt(pingsock, SOL_SOCKET, SO_RCVBUF, &sockopt, sizeof(sockopt));
552 signal(SIGINT, pingstats);
554 /* start the ping's going ... */
557 /* listen for replies */
559 struct sockaddr_in from;
560 socklen_t fromlen = (socklen_t) sizeof(from);
563 c = recvfrom(pingsock, packet, sizeof(packet), 0,
564 (struct sockaddr *) &from, &fromlen);
567 bb_perror_msg("recvfrom");
570 unpack4(packet, c, &from);
571 if (pingcount > 0 && nreceived >= pingcount)
576 extern int BUG_bad_offsetof_icmp6_cksum(void);
577 static void ping6(len_and_sockaddr *lsa)
579 char packet[datalen + MAXIPLEN + MAXICMPLEN];
582 struct sockaddr_in6 from;
584 char control_buf[CMSG_SPACE(36)];
586 pingsock = create_icmp6_socket();
587 pingaddr.sin6 = lsa->u.sin6;
588 /* untested whether "-I addr" really works for IPv6: */
590 xbind(pingsock, &source_lsa->u.sa, source_lsa->len);
592 setsockopt(pingsock, SOL_SOCKET, SO_BINDTODEVICE, opt_I, strlen(opt_I) + 1);
596 struct icmp6_filter filt;
597 if (!(option_mask32 & OPT_VERBOSE)) {
598 ICMP6_FILTER_SETBLOCKALL(&filt);
599 ICMP6_FILTER_SETPASS(ICMP6_ECHO_REPLY, &filt);
601 ICMP6_FILTER_SETPASSALL(&filt);
603 if (setsockopt(pingsock, IPPROTO_ICMPV6, ICMP6_FILTER, &filt,
605 bb_error_msg_and_die("setsockopt(ICMP6_FILTER)");
607 #endif /*ICMP6_FILTER*/
609 /* enable broadcast pings */
610 setsockopt_broadcast(pingsock);
612 /* set recv buf for broadcast pings */
613 sockopt = 48 * 1024; /* explain why 48k? */
614 setsockopt(pingsock, SOL_SOCKET, SO_RCVBUF, &sockopt, sizeof(sockopt));
616 sockopt = offsetof(struct icmp6_hdr, icmp6_cksum);
617 if (offsetof(struct icmp6_hdr, icmp6_cksum) != 2)
618 BUG_bad_offsetof_icmp6_cksum();
619 setsockopt(pingsock, SOL_RAW, IPV6_CHECKSUM, &sockopt, sizeof(sockopt));
621 /* request ttl info to be returned in ancillary data */
622 setsockopt(pingsock, SOL_IPV6, IPV6_HOPLIMIT, &const_int_1, sizeof(const_int_1));
625 pingaddr.sin6.sin6_scope_id = if_index;
627 signal(SIGINT, pingstats);
629 /* start the ping's going ... */
632 /* listen for replies */
633 msg.msg_name = &from;
634 msg.msg_namelen = sizeof(from);
637 msg.msg_control = control_buf;
638 iov.iov_base = packet;
639 iov.iov_len = sizeof(packet);
644 msg.msg_controllen = sizeof(control_buf);
646 c = recvmsg(pingsock, &msg, 0);
649 bb_perror_msg("recvfrom");
652 for (mp = CMSG_FIRSTHDR(&msg); mp; mp = CMSG_NXTHDR(&msg, mp)) {
653 if (mp->cmsg_level == SOL_IPV6
654 && mp->cmsg_type == IPV6_HOPLIMIT
655 /* don't check len - we trust the kernel: */
656 /* && mp->cmsg_len >= CMSG_LEN(sizeof(int)) */
658 hoplimit = *(int*)CMSG_DATA(mp);
661 unpack6(packet, c, &from, hoplimit);
662 if (pingcount > 0 && nreceived >= pingcount)
668 static void ping(len_and_sockaddr *lsa)
670 printf("PING %s (%s)", hostname, dotted);
673 xmalloc_sockaddr2dotted_noport(&source_lsa->u.sa));
675 printf(": %d data bytes\n", datalen);
678 if (lsa->u.sa.sa_family == AF_INET6)
685 int ping_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
686 int ping_main(int argc, char **argv)
688 len_and_sockaddr *lsa;
690 USE_PING6(sa_family_t af = AF_UNSPEC;)
694 datalen = DEFDATALEN;
696 /* exactly one argument needed, -v and -q don't mix */
697 opt_complementary = "=1:q--v:v--q";
698 getopt32(argv, OPT_STRING, &opt_c, &opt_s, &opt_I);
699 if (option_mask32 & OPT_c)
700 pingcount = xatoul(opt_c); // -c
701 if (option_mask32 & OPT_s)
702 datalen = xatou16(opt_s); // -s
703 if (option_mask32 & OPT_I) { // -I
704 if_index = if_nametoindex(opt_I);
706 /* TODO: I'm not sure it takes IPv6 unless in [XX:XX..] format */
707 source_lsa = xdotted2sockaddr(opt_I, 0);
708 opt_I = NULL; /* don't try to bind to device later */
711 myid = (uint16_t) getpid();
712 hostname = argv[optind];
714 if (option_mask32 & OPT_IPV4)
716 if (option_mask32 & OPT_IPV6)
718 lsa = xhost_and_af2sockaddr(hostname, 0, af);
720 lsa = xhost_and_af2sockaddr(hostname, 0, AF_INET);
723 if (source_lsa && source_lsa->u.sa.sa_family != lsa->u.sa.sa_family)
724 /* leaking it here... */
727 dotted = xmalloc_sockaddr2dotted_noport(&lsa->u.sa);
732 #endif /* FEATURE_FANCY_PING */
736 int ping6_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
737 int ping6_main(int argc, char **argv)
739 argv[0] = (char*)"-6";
740 return ping_main(argc + 1, argv - 1);
745 * Copyright (c) 1989 The Regents of the University of California.
746 * All rights reserved.
748 * This code is derived from software contributed to Berkeley by
751 * Redistribution and use in source and binary forms, with or without
752 * modification, are permitted provided that the following conditions
754 * 1. Redistributions of source code must retain the above copyright
755 * notice, this list of conditions and the following disclaimer.
756 * 2. Redistributions in binary form must reproduce the above copyright
757 * notice, this list of conditions and the following disclaimer in the
758 * documentation and/or other materials provided with the distribution.
760 * 3. <BSD Advertising Clause omitted per the July 22, 1999 licensing change
761 * ftp://ftp.cs.berkeley.edu/pub/4bsd/README.Impt.License.Change>
763 * 4. Neither the name of the University nor the names of its contributors
764 * may be used to endorse or promote products derived from this software
765 * without specific prior written permission.
767 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
768 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
769 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
770 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
771 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
772 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
773 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
774 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
775 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
776 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF