2 * Copyright (c) 1990, 1993
3 * The Regents of the University of California. All rights reserved.
5 * This code is derived from software contributed to Berkeley by
8 * Special for busybox ported by Vladimir Oleynik <dzo@simtreas.ru> 2001
9 * Redistribution and use in source and binary forms, with or without
10 * modification, are permitted provided that the following conditions
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
14 * 2. Redistributions in binary form must reproduce the above copyright
15 * notice, this list of conditions and the following disclaimer in the
16 * documentation and/or other materials provided with the distribution.
17 * 3. All advertising materials mentioning features or use of this software
18 * must display the following acknowledgement:
19 * This product includes software developed by the University of
20 * California, Berkeley and its contributors.
21 * 4. Neither the name of the University nor the names of its contributors
22 * may be used to endorse or promote products derived from this software
23 * without specific prior written permission.
25 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
26 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
27 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
28 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
29 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
30 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
31 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
32 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
33 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
34 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
39 * traceroute host - trace the route ip packets follow going to "host".
42 * This program must be run by root or be setuid. (I suggest that
43 * you *don't* make it setuid -- casual use could result in a lot
44 * of unnecessary traffic on our poor, congested nets.)
46 * I stole the idea for this program from Steve Deering. Since
47 * the first release, I've learned that had I attended the right
48 * IETF working group meetings, I also could have stolen it from Guy
49 * Almes or Matt Mathis. I don't know (or care) who came up with
50 * the idea first. I envy the originators' perspicacity and I'm
51 * glad they didn't keep the idea a secret.
53 * Tim Seaver, Ken Adelman and C. Philip Wood provided bug fixes and/or
54 * enhancements to the original distribution.
56 * I've hacked up a round-trip-route version of this that works by
57 * sending a loose-source-routed udp datagram through the destination
58 * back to yourself. Unfortunately, SO many gateways botch source
59 * routing, the thing is almost worthless. Maybe one day...
61 * -- Van Jacobson (van@helios.ee.lbl.gov)
62 * Tue Dec 20 03:50:13 PST 1988
65 #undef BB_FEATURE_TRACEROUTE_VERBOSE
66 //#define BB_FEATURE_TRACEROUTE_VERBOSE
67 #undef BB_FEATURE_TRACEROUTE_SO_DEBUG /* not in documentation man */
75 #include <sys/types.h>
76 #include <sys/socket.h>
79 #include <arpa/inet.h>
80 #include <netinet/udp.h>
81 #include <netinet/ip.h>
82 #include <netinet/ip_icmp.h>
85 /* It turns out that libc5 doesn't have proper icmp support
86 * built into it header files, so we have to supplement it */
87 #if __GNU_LIBRARY__ < 5
88 static const int ICMP_MINLEN = 8; /* abs minimum */
93 u_int32_t ira_preference;
99 u_int8_t icmp_type; /* type of message, see below */
100 u_int8_t icmp_code; /* type sub code */
101 u_int16_t icmp_cksum; /* ones complement checksum of struct */
104 u_char ih_pptr; /* ICMP_PARAMPROB */
105 struct in_addr ih_gwaddr; /* gateway address */
106 struct ih_idseq /* echo datagram */
113 /* ICMP_UNREACH_NEEDFRAG -- Path MTU Discovery (RFC1191) */
117 u_int16_t ipm_nextmtu;
122 u_int8_t irt_num_addrs;
124 u_int16_t irt_lifetime;
127 #define icmp_pptr icmp_hun.ih_pptr
128 #define icmp_gwaddr icmp_hun.ih_gwaddr
129 #define icmp_id icmp_hun.ih_idseq.icd_id
130 #define icmp_seq icmp_hun.ih_idseq.icd_seq
131 #define icmp_void icmp_hun.ih_void
132 #define icmp_pmvoid icmp_hun.ih_pmtu.ipm_void
133 #define icmp_nextmtu icmp_hun.ih_pmtu.ipm_nextmtu
134 #define icmp_num_addrs icmp_hun.ih_rtradv.irt_num_addrs
135 #define icmp_wpa icmp_hun.ih_rtradv.irt_wpa
136 #define icmp_lifetime icmp_hun.ih_rtradv.irt_lifetime
148 /* options and then 64 bits of data */
150 struct icmp_ra_addr id_radv;
154 #define icmp_otime icmp_dun.id_ts.its_otime
155 #define icmp_rtime icmp_dun.id_ts.its_rtime
156 #define icmp_ttime icmp_dun.id_ts.its_ttime
157 #define icmp_ip icmp_dun.id_ip.idi_ip
158 #define icmp_radv icmp_dun.id_radv
159 #define icmp_mask icmp_dun.id_mask
160 #define icmp_data icmp_dun.id_data
163 #define ICMP_MINLEN 8 /* abs minimum */
164 #define ICMP_UNREACH 3 /* dest unreachable, codes: */
165 #define ICMP_TIMXCEED 11 /* time exceeded, code: */
166 #define ICMP_TIMXCEED_INTRANS 0 /* ttl==0 in transit */
167 #define ICMP_UNREACH_NET 0 /* bad net */
168 #define ICMP_UNREACH_HOST 1 /* bad host */
169 #define ICMP_UNREACH_PROTOCOL 2 /* bad protocol */
170 #define ICMP_UNREACH_PORT 3 /* bad port */
171 #define ICMP_UNREACH_NEEDFRAG 4 /* IP_DF caused drop */
172 #define ICMP_UNREACH_SRCFAIL 5 /* src route failed */
176 #define MAXPACKET 65535 /* max ip packet size */
177 #ifndef MAXHOSTNAMELEN
178 #define MAXHOSTNAMELEN 64
182 * format of a (udp) probe packet.
187 u_char seq; /* sequence number of this packet */
188 u_char ttl; /* ttl packet left with */
189 struct timeval tv; /* time packet left */
193 * Definitions for internet protocol version 4.
194 * Per RFC 791, September 1981.
201 static u_char packet[512]; /* last inbound (icmp) packet */
202 static struct opacket *outpacket; /* last output (udp) packet */
204 static int s; /* receive (icmp) socket file descriptor */
205 static int sndsock; /* send (udp) socket file descriptor */
207 static struct sockaddr whereto; /* Who to try to reach */
208 static int datalen; /* How much data */
210 static char *hostname;
212 static int max_ttl = 30;
213 static u_short ident;
214 static u_short port = 32768+666; /* start udp dest port # for probe packets */
216 #ifdef BB_FEATURE_TRACEROUTE_VERBOSE
219 static int waittime = 5; /* time to wait for response (in seconds) */
220 static int nflag; /* print addresses numerically */
223 * Construct an Internet address representation.
224 * If the nflag has been supplied, give
225 * numeric value, otherwise try for symbolic name.
228 inetname(struct sockaddr_in *from)
232 static char domain[MAXHOSTNAMELEN + 1];
233 static int first = 1;
236 if (first && !nflag) {
238 if (gethostname(domain, MAXHOSTNAMELEN) == 0 &&
239 (cp = strchr(domain, '.')))
240 (void) strcpy(domain, cp + 1);
245 if (!nflag && from->sin_addr.s_addr != INADDR_ANY) {
246 hp = gethostbyaddr((char *)&(from->sin_addr), sizeof (from->sin_addr), AF_INET);
248 if ((cp = strchr(hp->h_name, '.')) &&
249 !strcmp(cp + 1, domain))
251 cp = (char *)hp->h_name;
254 ina = inet_ntoa(from->sin_addr);
258 printf(" %s (%s)", (cp ? cp : ina), ina);
262 print(u_char *buf, int cc, struct sockaddr_in *from)
267 ip = (struct ip *) buf;
268 hlen = ip->ip_hl << 2;
272 #ifdef BB_FEATURE_TRACEROUTE_VERBOSE
274 printf (" %d bytes to %s", cc, inet_ntoa (ip->ip_dst));
279 deltaT(struct timeval *t1p, struct timeval *t2p)
283 dt = (double)(t2p->tv_sec - t1p->tv_sec) * 1000.0 +
284 (double)(t2p->tv_usec - t1p->tv_usec) / 1000.0;
289 wait_for_reply(int sock, struct sockaddr_in *from, int reset_timer)
292 static struct timeval wait;
294 int fromlen = sizeof (*from);
300 * traceroute could hang if someone else has a ping
301 * running and our ICMP reply gets dropped but we don't
302 * realize it because we keep waking up to handle those
303 * other ICMP packets that keep coming in. To fix this,
304 * "reset_timer" will only be true if the last packet that
305 * came in was for us or if this is the first time we're
306 * waiting for a reply since sending out a probe. Note
307 * that this takes advantage of the select() feature on
308 * Linux where the remaining timeout is written to the
309 * struct timeval area.
311 wait.tv_sec = waittime;
315 if (select(sock+1, &fds, (fd_set *)0, (fd_set *)0, &wait) > 0)
316 cc=recvfrom(s, (char *)packet, sizeof(packet), 0,
317 (struct sockaddr *)from, &fromlen);
322 #ifdef BB_FEATURE_TRACEROUTE_VERBOSE
324 * Convert an ICMP "type" field to a printable string.
326 static inline const char *
330 static const char * const ttab[] = {
331 "Echo Reply", "ICMP 1", "ICMP 2", "Dest Unreachable",
332 "Source Quench", "Redirect", "ICMP 6", "ICMP 7",
333 "Echo", "ICMP 9", "ICMP 10", "Time Exceeded",
334 "Param Problem", "Timestamp", "Timestamp Reply", "Info Request",
339 return("OUT-OF-RANGE");
346 packet_ok(u_char *buf, int cc, struct sockaddr_in *from, int seq)
353 ip = (struct ip *) buf;
354 hlen = ip->ip_hl << 2;
355 if (cc < hlen + ICMP_MINLEN) {
356 #ifdef BB_FEATURE_TRACEROUTE_VERBOSE
358 printf("packet too short (%d bytes) from %s\n", cc,
359 inet_ntoa(from->sin_addr));
364 icp = (struct icmp *)(buf + hlen);
365 type = icp->icmp_type; code = icp->icmp_code;
366 if ((type == ICMP_TIMXCEED && code == ICMP_TIMXCEED_INTRANS) ||
367 type == ICMP_UNREACH) {
372 hlen = hip->ip_hl << 2;
373 up = (struct udphdr *)((u_char *)hip + hlen);
374 if (hlen + 12 <= cc && hip->ip_p == IPPROTO_UDP &&
375 up->source == htons(ident) &&
376 up->dest == htons(port+seq))
377 return (type == ICMP_TIMXCEED? -1 : code+1);
379 #ifdef BB_FEATURE_TRACEROUTE_VERBOSE
382 u_long *lp = (u_long *)&icp->icmp_ip;
384 printf("\n%d bytes from %s to %s: icmp type %d (%s) code %d\n",
385 cc, inet_ntoa(from->sin_addr), inet_ntoa(ip->ip_dst),
386 type, pr_type(type), icp->icmp_code);
387 for (i = 4; i < cc ; i += sizeof(long))
388 printf("%2d: x%8.8lx\n", i, *lp++);
394 static void /* not inline */
395 send_probe(int seq, int ttl)
397 struct opacket *op = outpacket;
398 struct ip *ip = &op->ip;
399 struct udphdr *up = &op->udp;
404 ip->ip_hl = sizeof(*ip) >> 2;
405 ip->ip_p = IPPROTO_UDP;
406 ip->ip_len = datalen;
408 ip->ip_v = IPVERSION;
409 ip->ip_id = htons(ident+seq);
411 up->source = htons(ident);
412 up->dest = htons(port+seq);
413 up->len = htons((u_short)(datalen - sizeof(struct ip)));
418 (void) gettimeofday(&op->tv, &tz);
420 i = sendto(sndsock, (char *)outpacket, datalen, 0, &whereto,
421 sizeof(struct sockaddr));
422 if (i < 0 || i != datalen) {
425 printf("traceroute: wrote %s %d chars, ret=%d\n", hostname,
427 (void) fflush(stdout);
433 #ifndef BB_TRACEROUTE
436 traceroute_main(argc, argv)
444 struct sockaddr_in from, *to;
445 int ch, i, on, probe, seq, tos, ttl;
447 int options = 0; /* socket options */
453 to = (struct sockaddr_in *)&whereto;
454 while ((ch = getopt(argc, argv, "dm:np:q:rs:t:w:v")) != EOF)
457 #ifdef BB_FEATURE_TRACEROUTE_SO_DEBUG
462 max_ttl = atoi(optarg);
464 error_msg_and_die("max ttl must be >1.");
472 error_msg_and_die("port must be >0.");
475 nprobes = atoi(optarg);
477 error_msg_and_die("nprobes must be >0.");
480 options |= SO_DONTROUTE;
484 * set the ip source address of the outbound
485 * probe (e.g., on a multi-homed host).
491 if (tos < 0 || tos > 255)
492 error_msg_and_die("tos must be 0 to 255.");
495 #ifdef BB_FEATURE_TRACEROUTE_VERBOSE
500 waittime = atoi(optarg);
502 error_msg_and_die("wait must be >1 sec.");
515 memset(&whereto, 0, sizeof(struct sockaddr));
516 hp = xgethostbyname(*argv);
517 to->sin_family = hp->h_addrtype;
518 memcpy(&to->sin_addr, hp->h_addr, hp->h_length);
519 hostname = (char *)hp->h_name;
521 datalen = atoi(*argv);
522 if (datalen < 0 || datalen >= MAXPACKET - sizeof(struct opacket))
523 error_msg_and_die("packet size must be 0 <= s < %d.",
524 MAXPACKET - sizeof(struct opacket));
525 datalen += sizeof(struct opacket);
526 outpacket = (struct opacket *)xmalloc((unsigned)datalen);
527 memset(outpacket, 0, datalen);
528 outpacket->ip.ip_dst = to->sin_addr;
529 outpacket->ip.ip_tos = tos;
530 outpacket->ip.ip_v = IPVERSION;
531 outpacket->ip.ip_id = 0;
533 ident = (getpid() & 0xffff) | 0x8000;
535 if ((sndsock = socket(AF_INET, SOCK_RAW, IPPROTO_RAW)) < 0)
536 perror_msg_and_die(can_not_create_raw_socket);
538 s = create_icmp_socket();
540 #ifdef BB_FEATURE_TRACEROUTE_SO_DEBUG
541 if (options & SO_DEBUG)
542 (void) setsockopt(s, SOL_SOCKET, SO_DEBUG,
543 (char *)&on, sizeof(on));
545 if (options & SO_DONTROUTE)
546 (void) setsockopt(s, SOL_SOCKET, SO_DONTROUTE,
547 (char *)&on, sizeof(on));
549 if (setsockopt(sndsock, SOL_SOCKET, SO_SNDBUF, (char *)&datalen,
550 sizeof(datalen)) < 0)
551 perror_msg_and_die("SO_SNDBUF");
554 if (setsockopt(sndsock, IPPROTO_IP, IP_HDRINCL, (char *)&on,
556 perror_msg_and_die("IP_HDRINCL");
558 #ifdef BB_FEATURE_TRACEROUTE_SO_DEBUG
559 if (options & SO_DEBUG)
560 (void) setsockopt(sndsock, SOL_SOCKET, SO_DEBUG,
561 (char *)&on, sizeof(on));
563 if (options & SO_DONTROUTE)
564 (void) setsockopt(sndsock, SOL_SOCKET, SO_DONTROUTE,
565 (char *)&on, sizeof(on));
568 memset(&from, 0, sizeof(struct sockaddr));
569 from.sin_family = AF_INET;
570 from.sin_addr.s_addr = inet_addr(source);
571 if (from.sin_addr.s_addr == -1)
572 error_msg_and_die("unknown host %s", source);
573 outpacket->ip.ip_src = from.sin_addr;
575 if (bind(sndsock, (struct sockaddr *)&from, sizeof(from)) < 0)
576 perror_msg_and_die("bind");
580 fprintf(stderr, "traceroute to %s (%s)", hostname,
581 inet_ntoa(to->sin_addr));
583 fprintf(stderr, " from %s", source);
584 fprintf(stderr, ", %d hops max, %d byte packets\n", max_ttl, datalen);
586 for (ttl = 1; ttl <= max_ttl; ++ttl) {
592 for (probe = 0; probe < nprobes; ++probe) {
594 struct timeval t1, t2;
598 (void) gettimeofday(&t1, &tz);
599 send_probe(++seq, ttl);
601 while ((cc = wait_for_reply(s, &from, reset_timer)) != 0) {
602 (void) gettimeofday(&t2, &tz);
603 if ((i = packet_ok(packet, cc, &from, seq))) {
605 if (from.sin_addr.s_addr != lastaddr) {
606 print(packet, cc, &from);
607 lastaddr = from.sin_addr.s_addr;
609 printf(" %g ms", deltaT(&t1, &t2));
611 case ICMP_UNREACH_PORT:
612 ip = (struct ip *)packet;
617 case ICMP_UNREACH_NET:
621 case ICMP_UNREACH_HOST:
625 case ICMP_UNREACH_PROTOCOL:
629 case ICMP_UNREACH_NEEDFRAG:
633 case ICMP_UNREACH_SRCFAIL:
644 (void) fflush(stdout);
647 if (got_there || unreachable >= nprobes-1)