1 /* vi: set sw=4 ts=4: */
3 * Mini ping implementation for busybox
5 * Copyright (C) 1999 by Randolph Chung <tausq@debian.org>
7 * Adapted from the ping in netkit-base 0.10:
8 * Copyright (c) 1989 The Regents of the University of California.
11 * This code is derived from software contributed to Berkeley by
14 * Licensed under GPLv2 or later, see file LICENSE in this source tree.
17 * Copyright (C) 1999 by Randolph Chung <tausq@debian.org>
19 * This version of ping is adapted from the ping in netkit-base 0.10,
22 * Original copyright notice is retained at the end of this file.
24 * This version is an adaptation of ping.c from busybox.
25 * The code was modified by Bart Visscher <magick@linux-fan.com>
29 #include <netinet/ip_icmp.h>
31 #include "common_bufsiz.h"
34 /* should be in netinet/ip_icmp.h */
35 # define ICMP_DEST_UNREACH 3 /* Destination Unreachable */
36 # define ICMP_SOURCE_QUENCH 4 /* Source Quench */
37 # define ICMP_REDIRECT 5 /* Redirect (change route) */
38 # define ICMP_ECHO 8 /* Echo Request */
39 # define ICMP_TIME_EXCEEDED 11 /* Time Exceeded */
40 # define ICMP_PARAMETERPROB 12 /* Parameter Problem */
41 # define ICMP_TIMESTAMP 13 /* Timestamp Request */
42 # define ICMP_TIMESTAMPREPLY 14 /* Timestamp Reply */
43 # define ICMP_INFO_REQUEST 15 /* Information Request */
44 # define ICMP_INFO_REPLY 16 /* Information Reply */
45 # define ICMP_ADDRESS 17 /* Address Mask Request */
46 # define ICMP_ADDRESSREPLY 18 /* Address Mask Reply */
50 //config: bool "ping (9.5 kb)"
52 //config: select PLATFORM_LINUX
54 //config: ping uses the ICMP protocol's mandatory ECHO_REQUEST datagram to
55 //config: elicit an ICMP ECHO_RESPONSE from a host or gateway.
58 //config: bool "ping6 (10 kb)"
60 //config: depends on FEATURE_IPV6
62 //config: Alias to "ping -6".
64 //config:config FEATURE_FANCY_PING
65 //config: bool "Enable fancy ping output"
67 //config: depends on PING || PING6
69 //config: With this option off, ping will say "HOST is alive!"
70 //config: or terminate with SIGALRM in 5 seconds otherwise.
71 //config: No command-line options will be recognized.
73 /* Needs socket(AF_INET, SOCK_RAW, IPPROTO_ICMP), therefore BB_SUID_MAYBE: */
74 //applet:IF_PING(APPLET(ping, BB_DIR_BIN, BB_SUID_MAYBE))
75 //applet:IF_PING6(APPLET(ping6, BB_DIR_BIN, BB_SUID_MAYBE))
77 //kbuild:lib-$(CONFIG_PING) += ping.o
78 //kbuild:lib-$(CONFIG_PING6) += ping.o
80 //usage:#if !ENABLE_FEATURE_FANCY_PING
81 //usage:# define ping_trivial_usage
83 //usage:# define ping_full_usage "\n\n"
84 //usage: "Send ICMP ECHO_REQUEST packets to network hosts"
85 //usage:# define ping6_trivial_usage
87 //usage:# define ping6_full_usage "\n\n"
88 //usage: "Send ICMP ECHO_REQUEST packets to network hosts"
90 //usage:# define ping_trivial_usage
91 //usage: "[OPTIONS] HOST"
92 //usage:# define ping_full_usage "\n\n"
93 //usage: "Send ICMP ECHO_REQUEST packets to network hosts\n"
95 //usage: "\n -4,-6 Force IP or IPv6 name resolution"
97 //usage: "\n -c CNT Send only CNT pings"
98 //usage: "\n -s SIZE Send SIZE data bytes in packets (default 56)"
99 //usage: "\n -t TTL Set TTL"
100 //usage: "\n -I IFACE/IP Source interface or IP address"
101 //usage: "\n -W SEC Seconds to wait for the first response (default 10)"
102 //usage: "\n (after all -c CNT packets are sent)"
103 //usage: "\n -w SEC Seconds until ping exits (default:infinite)"
104 //usage: "\n (can exit earlier with -c CNT)"
105 //usage: "\n -q Quiet, only display output at start"
106 //usage: "\n and when finished"
107 //usage: "\n -p HEXBYTE Pattern to use for payload"
109 //usage:# define ping6_trivial_usage
110 //usage: "[OPTIONS] HOST"
111 //usage:# define ping6_full_usage "\n\n"
112 //usage: "Send ICMP ECHO_REQUEST packets to network hosts\n"
113 //usage: "\n -c CNT Send only CNT pings"
114 //usage: "\n -s SIZE Send SIZE data bytes in packets (default 56)"
115 //usage: "\n -I IFACE/IP Source interface or IP address"
116 //usage: "\n -q Quiet, only display output at start"
117 //usage: "\n and when finished"
118 //usage: "\n -p HEXBYTE Pattern to use for payload"
122 //usage:#define ping_example_usage
123 //usage: "$ ping localhost\n"
124 //usage: "PING slag (127.0.0.1): 56 data bytes\n"
125 //usage: "64 bytes from 127.0.0.1: icmp_seq=0 ttl=255 time=20.1 ms\n"
127 //usage: "--- debian ping statistics ---\n"
128 //usage: "1 packets transmitted, 1 packets received, 0% packet loss\n"
129 //usage: "round-trip min/avg/max = 20.1/20.1/20.1 ms\n"
130 //usage:#define ping6_example_usage
131 //usage: "$ ping6 ip6-localhost\n"
132 //usage: "PING ip6-localhost (::1): 56 data bytes\n"
133 //usage: "64 bytes from ::1: icmp6_seq=0 ttl=64 time=20.1 ms\n"
135 //usage: "--- ip6-localhost ping statistics ---\n"
136 //usage: "1 packets transmitted, 1 packets received, 0% packet loss\n"
137 //usage: "round-trip min/avg/max = 20.1/20.1/20.1 ms\n"
140 # include <netinet/icmp6.h>
141 /* I see RENUMBERED constants in bits/in.h - !!?
142 * What a fuck is going on with libc? Is it a glibc joke? */
143 # ifdef IPV6_2292HOPLIMIT
144 # undef IPV6_HOPLIMIT
145 # define IPV6_HOPLIMIT IPV6_2292HOPLIMIT
153 MAX_DUP_CHK = (8 * 128),
155 PINGINTERVAL = 1, /* 1 second */
161 create_icmp_socket(len_and_sockaddr *lsa)
163 create_icmp_socket(void)
164 #define create_icmp_socket(lsa) create_icmp_socket()
169 if (lsa->u.sa.sa_family == AF_INET6)
170 sock = socket(AF_INET6, SOCK_RAW, IPPROTO_ICMPV6);
173 sock = socket(AF_INET, SOCK_RAW, 1); /* 1 == ICMP */
176 bb_error_msg_and_die(bb_msg_perm_denied_are_you_root);
177 bb_perror_msg_and_die(bb_msg_can_not_create_raw_socket);
180 xmove_fd(sock, pingsock);
183 #if !ENABLE_FEATURE_FANCY_PING
189 char packet[DEFDATALEN + MAXIPLEN + MAXICMPLEN];
192 #define G (*(struct globals*)bb_common_bufsiz1)
193 #define INIT_G() do { setup_common_bufsiz(); } while (0)
195 static void noresp(int ign UNUSED_PARAM)
197 printf("No response from %s\n", G.hostname);
201 static void ping4(len_and_sockaddr *lsa)
206 pkt = (struct icmp *) G.packet;
207 /*memset(pkt, 0, sizeof(G.packet)); already is */
208 pkt->icmp_type = ICMP_ECHO;
209 pkt->icmp_id = G.myid;
210 pkt->icmp_cksum = inet_cksum((uint16_t *) pkt, sizeof(G.packet));
212 xsendto(pingsock, G.packet, DEFDATALEN + ICMP_MINLEN, &lsa->u.sa, lsa->len);
214 /* listen for replies */
217 struct sockaddr_in from;
218 socklen_t fromlen = sizeof(from);
220 c = recvfrom(pingsock, G.packet, sizeof(G.packet), 0,
221 (struct sockaddr *) &from, &fromlen);
223 c = recv(pingsock, G.packet, sizeof(G.packet), 0);
227 bb_perror_msg("recvfrom");
230 if (c >= 76) { /* ip + icmp */
231 struct iphdr *iphdr = (struct iphdr *) G.packet;
233 pkt = (struct icmp *) (G.packet + (iphdr->ihl << 2)); /* skip ip hdr */
234 if (pkt->icmp_id != G.myid)
235 continue; /* not our ping */
236 if (pkt->icmp_type == ICMP_ECHOREPLY)
243 static void ping6(len_and_sockaddr *lsa)
245 struct icmp6_hdr *pkt;
249 pkt = (struct icmp6_hdr *) G.packet;
250 /*memset(pkt, 0, sizeof(G.packet)); already is */
251 pkt->icmp6_type = ICMP6_ECHO_REQUEST;
252 pkt->icmp6_id = G.myid;
254 sockopt = offsetof(struct icmp6_hdr, icmp6_cksum);
255 setsockopt_int(pingsock, SOL_RAW, IPV6_CHECKSUM, sockopt);
257 xsendto(pingsock, G.packet, DEFDATALEN + sizeof(struct icmp6_hdr), &lsa->u.sa, lsa->len);
259 /* listen for replies */
262 struct sockaddr_in6 from;
263 socklen_t fromlen = sizeof(from);
265 c = recvfrom(pingsock, G.packet, sizeof(G.packet), 0,
266 (struct sockaddr *) &from, &fromlen);
268 c = recv(pingsock, G.packet, sizeof(G.packet), 0);
272 bb_perror_msg("recvfrom");
275 if (c >= ICMP_MINLEN) { /* icmp6_hdr */
276 if (pkt->icmp6_id != G.myid)
277 continue; /* not our ping */
278 if (pkt->icmp6_type == ICMP6_ECHO_REPLY)
286 # define common_ping_main(af, argv) common_ping_main(argv)
288 static int common_ping_main(sa_family_t af, char **argv)
290 len_and_sockaddr *lsa;
295 while ((++argv)[0] && argv[0][0] == '-') {
296 if (argv[0][1] == '4') {
300 if (argv[0][1] == '6') {
315 lsa = xhost_and_af2sockaddr(G.hostname, 0, af);
317 lsa = xhost_and_af2sockaddr(G.hostname, 0, AF_INET);
319 /* Set timer _after_ DNS resolution */
320 signal(SIGALRM, noresp);
321 alarm(5); /* give the host 5000ms to respond */
323 create_icmp_socket(lsa);
324 G.myid = (uint16_t) getpid();
326 if (lsa->u.sa.sa_family == AF_INET6)
331 if (ENABLE_FEATURE_CLEAN_UP)
333 printf("%s is alive!\n", G.hostname);
338 #else /* FEATURE_FANCY_PING */
341 /* Full(er) version */
343 #define OPT_STRING ("qvc:+s:t:+w:+W:+I:np:4" IF_PING6("6"))
346 OPT_VERBOSE = 1 << 1,
353 /*OPT_n = 1 << 8, - ignored */
356 OPT_IPV6 = (1 << 11) * ENABLE_PING6,
363 len_and_sockaddr *source_lsa;
365 unsigned pingcount; /* must be int-sized */
367 unsigned long ntransmitted, nreceived, nrepeats;
370 unsigned tmin, tmax; /* in us */
371 unsigned long long tsum; /* in us, sum of all times */
375 unsigned sizeof_rcv_packet;
376 char *rcv_packet; /* [datalen + MAXIPLEN + MAXICMPLEN] */
377 void *snd_packet; /* [datalen + ipv4/ipv6_const] */
378 const char *hostname;
382 struct sockaddr_in sin;
384 struct sockaddr_in6 sin6;
387 unsigned char rcvd_tbl[MAX_DUP_CHK / 8];
389 #define G (*(struct globals*)bb_common_bufsiz1)
390 #define if_index (G.if_index )
391 #define source_lsa (G.source_lsa )
392 #define str_I (G.str_I )
393 #define datalen (G.datalen )
394 #define pingcount (G.pingcount )
395 #define opt_ttl (G.opt_ttl )
396 #define myid (G.myid )
397 #define tmin (G.tmin )
398 #define tmax (G.tmax )
399 #define tsum (G.tsum )
400 #define deadline (G.deadline )
401 #define timeout (G.timeout )
402 #define total_secs (G.total_secs )
403 #define hostname (G.hostname )
404 #define dotted (G.dotted )
405 #define pingaddr (G.pingaddr )
406 #define rcvd_tbl (G.rcvd_tbl )
407 #define INIT_G() do { \
408 setup_common_bufsiz(); \
409 BUILD_BUG_ON(sizeof(G) > COMMON_BUFSIZE); \
410 datalen = DEFDATALEN; \
416 #define BYTE(bit) rcvd_tbl[(bit)>>3]
417 #define MASK(bit) (1 << ((bit) & 7))
418 #define SET(bit) (BYTE(bit) |= MASK(bit))
419 #define CLR(bit) (BYTE(bit) &= (~MASK(bit)))
420 #define TST(bit) (BYTE(bit) & MASK(bit))
422 static void print_stats_and_exit(int junk) NORETURN;
423 static void print_stats_and_exit(int junk UNUSED_PARAM)
428 signal(SIGINT, SIG_IGN);
431 printf("\n--- %s ping statistics ---\n"
432 "%lu packets transmitted, "
433 "%lu packets received, ",
434 hostname, G.ntransmitted, nrecv
437 printf("%lu duplicates, ", G.nrepeats);
440 ul = (ul - nrecv) * 100 / ul;
441 printf("%lu%% packet loss\n", ul);
442 if (tmin != UINT_MAX) {
443 unsigned tavg = tsum / (nrecv + G.nrepeats);
444 printf("round-trip min/avg/max = %u.%03u/%u.%03u/%u.%03u ms\n",
445 tmin / 1000, tmin % 1000,
446 tavg / 1000, tavg % 1000,
447 tmax / 1000, tmax % 1000);
449 /* if condition is true, exit with 1 -- 'failure' */
450 exit(nrecv == 0 || (deadline && nrecv < pingcount));
453 static void sendping_tail(void (*sp)(int), int size_pkt)
457 CLR((uint16_t)G.ntransmitted % MAX_DUP_CHK);
462 /* sizeof(pingaddr) can be larger than real sa size, but I think
463 * it doesn't matter */
464 sz = xsendto(pingsock, G.snd_packet, size_pkt, &pingaddr.sa, sizeof(pingaddr));
466 bb_error_msg_and_die(bb_msg_write_error);
468 if (pingcount == 0 || deadline || G.ntransmitted < pingcount) {
469 /* Didn't send all pings yet - schedule next in 1s */
472 total_secs += PINGINTERVAL;
473 if (total_secs >= deadline)
474 signal(SIGALRM, print_stats_and_exit);
477 } else { /* -c NN, and all NN are sent (and no deadline) */
478 /* Wait for the last ping to come back.
479 * -W timeout: wait for a response in seconds.
480 * Affects only timeout in absence of any responses,
481 * otherwise ping waits for two RTTs. */
482 unsigned expire = timeout;
485 /* approx. 2*tmax, in seconds (2 RTT) */
486 expire = tmax / (512*1024);
490 signal(SIGALRM, print_stats_and_exit);
495 static void sendping4(int junk UNUSED_PARAM)
497 struct icmp *pkt = G.snd_packet;
499 memset(pkt, G.pattern, datalen + ICMP_MINLEN + 4);
500 pkt->icmp_type = ICMP_ECHO;
501 /*pkt->icmp_code = 0;*/
502 pkt->icmp_cksum = 0; /* cksum is calculated with this field set to 0 */
503 pkt->icmp_seq = htons(G.ntransmitted); /* don't ++ here, it can be a macro */
506 /* If datalen < 4, we store timestamp _past_ the packet,
507 * but it's ok - we allocated 4 extra bytes in xzalloc() just in case.
509 /*if (datalen >= 4)*/
510 /* No hton: we'll read it back on the same machine */
511 *(uint32_t*)&pkt->icmp_dun = monotonic_us();
513 pkt->icmp_cksum = inet_cksum((uint16_t *) pkt, datalen + ICMP_MINLEN);
515 sendping_tail(sendping4, ICMP_MINLEN);
518 static void sendping6(int junk UNUSED_PARAM)
520 struct icmp6_hdr *pkt = G.snd_packet;
522 memset(pkt, G.pattern, datalen + sizeof(struct icmp6_hdr) + 4);
523 pkt->icmp6_type = ICMP6_ECHO_REQUEST;
524 /*pkt->icmp6_code = 0;*/
525 /*pkt->icmp6_cksum = 0;*/
526 pkt->icmp6_seq = htons(G.ntransmitted); /* don't ++ here, it can be a macro */
527 pkt->icmp6_id = myid;
529 /*if (datalen >= 4)*/
530 *(bb__aliased_uint32_t*)(&pkt->icmp6_data8[4]) = monotonic_us();
532 //TODO? pkt->icmp_cksum = inet_cksum(...);
534 sendping_tail(sendping6, sizeof(struct icmp6_hdr));
538 static const char *icmp_type_name(int id)
541 case ICMP_ECHOREPLY: return "Echo Reply";
542 case ICMP_DEST_UNREACH: return "Destination Unreachable";
543 case ICMP_SOURCE_QUENCH: return "Source Quench";
544 case ICMP_REDIRECT: return "Redirect (change route)";
545 case ICMP_ECHO: return "Echo Request";
546 case ICMP_TIME_EXCEEDED: return "Time Exceeded";
547 case ICMP_PARAMETERPROB: return "Parameter Problem";
548 case ICMP_TIMESTAMP: return "Timestamp Request";
549 case ICMP_TIMESTAMPREPLY: return "Timestamp Reply";
550 case ICMP_INFO_REQUEST: return "Information Request";
551 case ICMP_INFO_REPLY: return "Information Reply";
552 case ICMP_ADDRESS: return "Address Mask Request";
553 case ICMP_ADDRESSREPLY: return "Address Mask Reply";
554 default: return "unknown ICMP type";
558 /* RFC3542 changed some definitions from RFC2292 for no good reason, whee!
559 * the newer 3542 uses a MLD_ prefix where as 2292 uses ICMP6_ prefix */
560 #ifndef MLD_LISTENER_QUERY
561 # define MLD_LISTENER_QUERY ICMP6_MEMBERSHIP_QUERY
563 #ifndef MLD_LISTENER_REPORT
564 # define MLD_LISTENER_REPORT ICMP6_MEMBERSHIP_REPORT
566 #ifndef MLD_LISTENER_REDUCTION
567 # define MLD_LISTENER_REDUCTION ICMP6_MEMBERSHIP_REDUCTION
569 static const char *icmp6_type_name(int id)
572 case ICMP6_DST_UNREACH: return "Destination Unreachable";
573 case ICMP6_PACKET_TOO_BIG: return "Packet too big";
574 case ICMP6_TIME_EXCEEDED: return "Time Exceeded";
575 case ICMP6_PARAM_PROB: return "Parameter Problem";
576 case ICMP6_ECHO_REPLY: return "Echo Reply";
577 case ICMP6_ECHO_REQUEST: return "Echo Request";
578 case MLD_LISTENER_QUERY: return "Listener Query";
579 case MLD_LISTENER_REPORT: return "Listener Report";
580 case MLD_LISTENER_REDUCTION: return "Listener Reduction";
581 default: return "unknown ICMP type";
586 static void unpack_tail(int sz, uint32_t *tp,
587 const char *from_str,
588 uint16_t recv_seq, int ttl)
591 const char *dupmsg = " (DUP!)";
592 unsigned triptime = triptime; /* for gcc */
595 /* (int32_t) cast is for hypothetical 64-bit unsigned */
596 /* (doesn't hurt 32-bit real-world anyway) */
597 triptime = (int32_t) ((uint32_t)monotonic_us() - *tp);
605 b = &BYTE(recv_seq % MAX_DUP_CHK);
606 m = MASK(recv_seq % MAX_DUP_CHK);
607 /*if TST(recv_seq % MAX_DUP_CHK):*/
611 /*SET(recv_seq % MAX_DUP_CHK):*/
617 if (option_mask32 & OPT_QUIET)
620 printf("%d bytes from %s: seq=%u ttl=%d", sz,
621 from_str, recv_seq, ttl);
623 printf(" time=%u.%03u ms", triptime / 1000, triptime % 1000);
627 static void unpack4(char *buf, int sz, struct sockaddr_in *from)
629 struct icmp *icmppkt;
633 /* discard if too short */
634 if (sz < (datalen + ICMP_MINLEN))
637 /* check IP header */
638 iphdr = (struct iphdr *) buf;
639 hlen = iphdr->ihl << 2;
641 icmppkt = (struct icmp *) (buf + hlen);
642 if (icmppkt->icmp_id != myid)
643 return; /* not our ping */
645 if (icmppkt->icmp_type == ICMP_ECHOREPLY) {
646 uint16_t recv_seq = ntohs(icmppkt->icmp_seq);
649 if (sz >= ICMP_MINLEN + sizeof(uint32_t))
650 tp = (uint32_t *) icmppkt->icmp_data;
652 inet_ntoa(*(struct in_addr *) &from->sin_addr.s_addr),
653 recv_seq, iphdr->ttl);
654 } else if (icmppkt->icmp_type != ICMP_ECHO) {
655 bb_error_msg("warning: got ICMP %d (%s)",
657 icmp_type_name(icmppkt->icmp_type));
661 static void unpack6(char *packet, int sz, struct sockaddr_in6 *from, int hoplimit)
663 struct icmp6_hdr *icmppkt;
664 char buf[INET6_ADDRSTRLEN];
666 /* discard if too short */
667 if (sz < (datalen + sizeof(struct icmp6_hdr)))
670 icmppkt = (struct icmp6_hdr *) packet;
671 if (icmppkt->icmp6_id != myid)
672 return; /* not our ping */
674 if (icmppkt->icmp6_type == ICMP6_ECHO_REPLY) {
675 uint16_t recv_seq = ntohs(icmppkt->icmp6_seq);
678 if (sz >= sizeof(struct icmp6_hdr) + sizeof(uint32_t))
679 tp = (uint32_t *) &icmppkt->icmp6_data8[4];
681 inet_ntop(AF_INET6, &from->sin6_addr,
684 } else if (icmppkt->icmp6_type != ICMP6_ECHO_REQUEST) {
685 bb_error_msg("warning: got ICMP %d (%s)",
687 icmp6_type_name(icmppkt->icmp6_type));
692 static void ping4(len_and_sockaddr *lsa)
696 pingaddr.sin = lsa->u.sin;
698 if (setsockopt(pingsock, IPPROTO_IP, IP_MULTICAST_IF,
699 &source_lsa->u.sa, source_lsa->len))
700 bb_error_msg_and_die("can't set multicast source interface");
701 xbind(pingsock, &source_lsa->u.sa, source_lsa->len);
704 /* enable broadcast pings */
705 setsockopt_broadcast(pingsock);
707 /* set recv buf (needed if we can get lots of responses: flood ping,
708 * broadcast ping etc) */
709 sockopt = (datalen * 2) + 7 * 1024; /* giving it a bit of extra room */
710 setsockopt_SOL_SOCKET_int(pingsock, SO_RCVBUF, sockopt);
713 setsockopt_int(pingsock, IPPROTO_IP, IP_TTL, opt_ttl);
714 /* above doesn't affect packets sent to bcast IP, so... */
715 setsockopt_int(pingsock, IPPROTO_IP, IP_MULTICAST_TTL, opt_ttl);
718 signal(SIGINT, print_stats_and_exit);
720 /* start the ping's going ... */
723 /* listen for replies */
725 struct sockaddr_in from;
726 socklen_t fromlen = (socklen_t) sizeof(from);
729 c = recvfrom(pingsock, G.rcv_packet, G.sizeof_rcv_packet, 0,
730 (struct sockaddr *) &from, &fromlen);
733 bb_perror_msg("recvfrom");
736 unpack4(G.rcv_packet, c, &from);
737 if (pingcount && G.nreceived >= pingcount)
742 static void ping6(len_and_sockaddr *lsa)
746 struct sockaddr_in6 from;
748 char control_buf[CMSG_SPACE(36)];
750 pingaddr.sin6 = lsa->u.sin6;
752 xbind(pingsock, &source_lsa->u.sa, source_lsa->len);
756 struct icmp6_filter filt;
757 if (!(option_mask32 & OPT_VERBOSE)) {
758 ICMP6_FILTER_SETBLOCKALL(&filt);
759 ICMP6_FILTER_SETPASS(ICMP6_ECHO_REPLY, &filt);
761 ICMP6_FILTER_SETPASSALL(&filt);
763 if (setsockopt(pingsock, IPPROTO_ICMPV6, ICMP6_FILTER, &filt,
765 bb_error_msg_and_die("setsockopt(%s)", "ICMP6_FILTER");
767 #endif /*ICMP6_FILTER*/
769 /* enable broadcast pings */
770 setsockopt_broadcast(pingsock);
772 /* set recv buf (needed if we can get lots of responses: flood ping,
773 * broadcast ping etc) */
774 sockopt = (datalen * 2) + 7 * 1024; /* giving it a bit of extra room */
775 setsockopt_SOL_SOCKET_int(pingsock, SO_RCVBUF, sockopt);
777 sockopt = offsetof(struct icmp6_hdr, icmp6_cksum);
778 BUILD_BUG_ON(offsetof(struct icmp6_hdr, icmp6_cksum) != 2);
779 setsockopt_int(pingsock, SOL_RAW, IPV6_CHECKSUM, sockopt);
781 /* request ttl info to be returned in ancillary data */
782 setsockopt_1(pingsock, SOL_IPV6, IPV6_HOPLIMIT);
785 pingaddr.sin6.sin6_scope_id = if_index;
787 signal(SIGINT, print_stats_and_exit);
789 /* start the ping's going ... */
792 /* listen for replies */
793 msg.msg_name = &from;
794 msg.msg_namelen = sizeof(from);
797 msg.msg_control = control_buf;
798 iov.iov_base = G.rcv_packet;
799 iov.iov_len = G.sizeof_rcv_packet;
804 msg.msg_controllen = sizeof(control_buf);
806 c = recvmsg(pingsock, &msg, 0);
809 bb_perror_msg("recvfrom");
812 for (mp = CMSG_FIRSTHDR(&msg); mp; mp = CMSG_NXTHDR(&msg, mp)) {
813 if (mp->cmsg_level == SOL_IPV6
814 && mp->cmsg_type == IPV6_HOPLIMIT
815 /* don't check len - we trust the kernel: */
816 /* && mp->cmsg_len >= CMSG_LEN(sizeof(int)) */
818 /*hoplimit = *(int*)CMSG_DATA(mp); - unaligned access */
819 move_from_unaligned_int(hoplimit, CMSG_DATA(mp));
822 unpack6(G.rcv_packet, c, &from, hoplimit);
823 if (pingcount && G.nreceived >= pingcount)
829 static void ping(len_and_sockaddr *lsa)
831 printf("PING %s (%s)", hostname, dotted);
834 xmalloc_sockaddr2dotted_noport(&source_lsa->u.sa));
836 printf(": %d data bytes\n", datalen);
838 create_icmp_socket(lsa);
839 /* untested whether "-I addr" really works for IPv6: */
841 setsockopt_bindtodevice(pingsock, str_I);
843 G.sizeof_rcv_packet = datalen + MAXIPLEN + MAXICMPLEN;
844 G.rcv_packet = xzalloc(G.sizeof_rcv_packet);
846 if (lsa->u.sa.sa_family == AF_INET6) {
847 /* +4 reserves a place for timestamp, which may end up sitting
848 * _after_ packet. Saves one if() - see sendping4/6() */
849 G.snd_packet = xzalloc(datalen + sizeof(struct icmp6_hdr) + 4);
854 G.snd_packet = xzalloc(datalen + ICMP_MINLEN + 4);
859 static int common_ping_main(int opt, char **argv)
861 len_and_sockaddr *lsa;
866 /* exactly one argument needed; -v and -q don't mix; -c NUM, -t NUM, -w NUM, -W NUM */
867 opt_complementary = "=1:q--v:v--q";
868 opt |= getopt32(argv, OPT_STRING, &pingcount, &str_s, &opt_ttl, &deadline, &timeout, &str_I, &str_p);
870 datalen = xatou16(str_s); // -s
871 if (opt & OPT_I) { // -I
872 if_index = if_nametoindex(str_I);
874 /* TODO: I'm not sure it takes IPv6 unless in [XX:XX..] format */
875 source_lsa = xdotted2sockaddr(str_I, 0);
876 str_I = NULL; /* don't try to bind to device later */
880 G.pattern = xstrtou_range(str_p, 16, 0, 255);
882 myid = (uint16_t) getpid();
883 hostname = argv[optind];
886 sa_family_t af = AF_UNSPEC;
891 lsa = xhost_and_af2sockaddr(hostname, 0, af);
894 lsa = xhost_and_af2sockaddr(hostname, 0, AF_INET);
897 if (source_lsa && source_lsa->u.sa.sa_family != lsa->u.sa.sa_family)
898 /* leaking it here... */
901 dotted = xmalloc_sockaddr2dotted_noport(&lsa->u.sa);
903 print_stats_and_exit(EXIT_SUCCESS);
904 /*return EXIT_SUCCESS;*/
906 #endif /* FEATURE_FANCY_PING */
910 int ping_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
911 int ping_main(int argc UNUSED_PARAM, char **argv)
913 # if !ENABLE_FEATURE_FANCY_PING
914 return common_ping_main(AF_UNSPEC, argv);
916 return common_ping_main(0, argv);
922 int ping6_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
923 int ping6_main(int argc UNUSED_PARAM, char **argv)
925 # if !ENABLE_FEATURE_FANCY_PING
926 return common_ping_main(AF_INET6, argv);
928 return common_ping_main(OPT_IPV6, argv);
934 * Copyright (c) 1989 The Regents of the University of California.
935 * All rights reserved.
937 * This code is derived from software contributed to Berkeley by
940 * Redistribution and use in source and binary forms, with or without
941 * modification, are permitted provided that the following conditions
943 * 1. Redistributions of source code must retain the above copyright
944 * notice, this list of conditions and the following disclaimer.
945 * 2. Redistributions in binary form must reproduce the above copyright
946 * notice, this list of conditions and the following disclaimer in the
947 * documentation and/or other materials provided with the distribution.
949 * 3. <BSD Advertising Clause omitted per the July 22, 1999 licensing change
950 * ftp://ftp.cs.berkeley.edu/pub/4bsd/README.Impt.License.Change>
952 * 4. Neither the name of the University nor the names of its contributors
953 * may be used to endorse or promote products derived from this software
954 * without specific prior written permission.
956 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND
957 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
958 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
959 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
960 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
961 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
962 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
963 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
964 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
965 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF