| 1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135 | diff -Nur busybox-1.22.1.orig/networking/ping.c busybox-1.22.1/networking/ping.c--- busybox-1.22.1.orig/networking/ping.c	2014-01-20 03:38:10.000000000 +0100+++ busybox-1.22.1/networking/ping.c	2014-05-24 14:31:09.000000000 +0200@@ -152,6 +152,7 @@ 	pingsock = 0, }; +static int using_dgram; static void #if ENABLE_PING6 create_icmp_socket(len_and_sockaddr *lsa)@@ -184,6 +185,7 @@ 		if (sock < 0) #endif 		bb_error_msg_and_die(bb_msg_perm_denied_are_you_root);+		using_dgram = 1; 	}  	xmove_fd(sock, pingsock);@@ -234,10 +236,12 @@ 				bb_perror_msg("recvfrom"); 			continue; 		}-		if (c >= 76) {			/* ip + icmp */-			struct iphdr *iphdr = (struct iphdr *) G.packet;+		if (c >= 76 || using_dgram && (c == 64)) {			/* ip + icmp */+			if(!using_dgram) {+				struct iphdr *iphdr = (struct iphdr *) G.packet; -			pkt = (struct icmp *) (G.packet + (iphdr->ihl << 2));	/* skip ip hdr */+				pkt = (struct icmp *) (G.packet + (iphdr->ihl << 2));	/* skip ip hdr */+			} else pkt = (struct icmp *) G.packet; 			if (pkt->icmp_type == ICMP_ECHOREPLY) 				break; 		}@@ -628,19 +632,21 @@ } static void unpack4(char *buf, int sz, struct sockaddr_in *from) {-	struct icmp *icmppkt; 	struct iphdr *iphdr;+	struct icmp *icmppkt; 	int hlen;  	/* discard if too short */ 	if (sz < (datalen + ICMP_MINLEN)) 		return;+	if(!using_dgram) {+		/* check IP header */+		iphdr = (struct iphdr *) buf;+		hlen = iphdr->ihl << 2;+		sz -= hlen;+		icmppkt = (struct icmp *) (buf + hlen);+	} else icmppkt = (struct icmp *) buf; -	/* check IP header */-	iphdr = (struct iphdr *) buf;-	hlen = iphdr->ihl << 2;-	sz -= hlen;-	icmppkt = (struct icmp *) (buf + hlen); 	if (icmppkt->icmp_id != myid) 		return;				/* not our ping */ @@ -652,7 +658,7 @@ 			tp = (uint32_t *) icmppkt->icmp_data; 		unpack_tail(sz, tp, 			inet_ntoa(*(struct in_addr *) &from->sin_addr.s_addr),-			recv_seq, iphdr->ttl);+			recv_seq, using_dgram ? 42 : iphdr->ttl); 	} else if (icmppkt->icmp_type != ICMP_ECHO) { 		bb_error_msg("warning: got ICMP %d (%s)", 				icmppkt->icmp_type,@@ -696,11 +702,31 @@ 	int sockopt;  	pingaddr.sin = lsa->u.sin;-	if (source_lsa) {+	if (source_lsa && !using_dgram) { 		if (setsockopt(pingsock, IPPROTO_IP, IP_MULTICAST_IF, 				&source_lsa->u.sa, source_lsa->len)) 			bb_error_msg_and_die("can't set multicast source interface"); 		xbind(pingsock, &source_lsa->u.sa, source_lsa->len);+	} else if(using_dgram) {+		struct sockaddr_in sa;+		socklen_t sl;++		sa.sin_family = AF_INET;+		sa.sin_port = 0;+		sa.sin_addr.s_addr = source_lsa ?+			source_lsa->u.sin.sin_addr.s_addr : 0;+		sl = sizeof(sa);++		if (bind(pingsock, (struct sockaddr *) &sa, sl) == -1) {+			perror("bind");+			exit(2);+		}++		if (getsockname(pingsock, (struct sockaddr *) &sa, &sl) == -1) {+			perror("getsockname");+			exit(2);+		}+		myid = sa.sin_port; 	}  	/* enable broadcast pings */@@ -717,6 +743,15 @@ 		setsockopt(pingsock, IPPROTO_IP, IP_MULTICAST_TTL, &opt_ttl, sizeof(opt_ttl)); 	} +	if(using_dgram) {+		int hold = 65536;+		if (setsockopt(pingsock, SOL_IP, IP_RECVTTL, (char *)&hold, sizeof(hold)))+			perror("WARNING: setsockopt(IP_RECVTTL)");+		if (setsockopt(pingsock, SOL_IP, IP_RETOPTS, (char *)&hold, sizeof(hold)))+			perror("WARNING: setsockopt(IP_RETOPTS)");++	}+ 	signal(SIGINT, print_stats_and_exit);  	/* start the ping's going ... */@@ -751,10 +786,33 @@ 	char control_buf[CMSG_SPACE(36)];  	pingaddr.sin6 = lsa->u.sin6;-	if (source_lsa)+	if (source_lsa && !using_dgram) 		xbind(pingsock, &source_lsa->u.sa, source_lsa->len);+	else if(using_dgram) {+                struct sockaddr_in6 sa = {0};+                socklen_t sl;++                sa.sin6_family = AF_INET6;+                sa.sin6_port = 0;+		if(source_lsa) {+			memcpy(&sa.sin6_addr, &source_lsa->u.sin6.sin6_addr, sizeof(struct in6_addr));+		}+                sl = sizeof(sa);++                if (bind(pingsock, (struct sockaddr *) &sa, sl) == -1) {+                        perror("bind");+                        exit(2);+                }++                if (getsockname(pingsock, (struct sockaddr *) &sa, &sl) == -1) {+                        perror("getsockname");+                        exit(2);+                }+                myid = sa.sin6_port;+	}  #ifdef ICMP6_FILTER+	if(!using_dgram) 	{ 		struct icmp6_filter filt; 		if (!(option_mask32 & OPT_VERBOSE)) {@@ -880,7 +938,7 @@ 			str_I = NULL; /* don't try to bind to device later */ 		} 	}-	myid = (uint16_t) getpid();+	if(!using_dgram) myid = (uint16_t) getpid(); 	hostname = argv[optind]; #if ENABLE_PING6 	{diff -Nur busybox-1.22.1.orig/networking/ping.c.orig busybox-1.22.1/networking/ping.c.orig--- busybox-1.22.1.orig/networking/ping.c.orig	1970-01-01 01:00:00.000000000 +0100+++ busybox-1.22.1/networking/ping.c.orig	2014-01-20 03:38:10.000000000 +0100@@ -0,0 +1,966 @@+/* vi: set sw=4 ts=4: */+/*+ * Mini ping implementation for busybox+ *+ * Copyright (C) 1999 by Randolph Chung <tausq@debian.org>+ *+ * Adapted from the ping in netkit-base 0.10:+ * Copyright (c) 1989 The Regents of the University of California.+ * All rights reserved.+ *+ * This code is derived from software contributed to Berkeley by+ * Mike Muuss.+ *+ * Licensed under GPLv2 or later, see file LICENSE in this source tree.+ */+/* from ping6.c:+ * Copyright (C) 1999 by Randolph Chung <tausq@debian.org>+ *+ * This version of ping is adapted from the ping in netkit-base 0.10,+ * which is:+ *+ * Original copyright notice is retained at the end of this file.+ *+ * This version is an adaptation of ping.c from busybox.+ * The code was modified by Bart Visscher <magick@linux-fan.com>+ */++#include <net/if.h>+#include <netinet/ip_icmp.h>+#include "libbb.h"++#ifdef __BIONIC__+/* should be in netinet/ip_icmp.h */+# define ICMP_DEST_UNREACH    3  /* Destination Unreachable  */+# define ICMP_SOURCE_QUENCH   4  /* Source Quench    */+# define ICMP_REDIRECT        5  /* Redirect (change route)  */+# define ICMP_ECHO            8  /* Echo Request      */+# define ICMP_TIME_EXCEEDED  11  /* Time Exceeded    */+# define ICMP_PARAMETERPROB  12  /* Parameter Problem    */+# define ICMP_TIMESTAMP      13  /* Timestamp Request    */+# define ICMP_TIMESTAMPREPLY 14  /* Timestamp Reply    */+# define ICMP_INFO_REQUEST   15  /* Information Request    */+# define ICMP_INFO_REPLY     16  /* Information Reply    */+# define ICMP_ADDRESS        17  /* Address Mask Request    */+# define ICMP_ADDRESSREPLY   18  /* Address Mask Reply    */+#endif++//config:config PING+//config:	bool "ping"+//config:	default y+//config:	select PLATFORM_LINUX+//config:	help+//config:	  ping uses the ICMP protocol's mandatory ECHO_REQUEST datagram to+//config:	  elicit an ICMP ECHO_RESPONSE from a host or gateway.+//config:+//config:config PING6+//config:	bool "ping6"+//config:	default y+//config:	depends on FEATURE_IPV6 && PING+//config:	help+//config:	  This will give you a ping that can talk IPv6.+//config:+//config:config FEATURE_FANCY_PING+//config:	bool "Enable fancy ping output"+//config:	default y+//config:	depends on PING+//config:	help+//config:	  Make the output from the ping applet include statistics, and at the+//config:	  same time provide full support for ICMP packets.++/* Needs socket(AF_INET, SOCK_RAW, IPPROTO_ICMP), therefore BB_SUID_MAYBE: */+//applet:IF_PING(APPLET(ping, BB_DIR_BIN, BB_SUID_MAYBE))+//applet:IF_PING6(APPLET(ping6, BB_DIR_BIN, BB_SUID_MAYBE))++//kbuild:lib-$(CONFIG_PING)  += ping.o+//kbuild:lib-$(CONFIG_PING6) += ping.o++//usage:#if !ENABLE_FEATURE_FANCY_PING+//usage:# define ping_trivial_usage+//usage:       "HOST"+//usage:# define ping_full_usage "\n\n"+//usage:       "Send ICMP ECHO_REQUEST packets to network hosts"+//usage:# define ping6_trivial_usage+//usage:       "HOST"+//usage:# define ping6_full_usage "\n\n"+//usage:       "Send ICMP ECHO_REQUEST packets to network hosts"+//usage:#else+//usage:# define ping_trivial_usage+//usage:       "[OPTIONS] HOST"+//usage:# define ping_full_usage "\n\n"+//usage:       "Send ICMP ECHO_REQUEST packets to network hosts\n"+//usage:	IF_PING6(+//usage:     "\n	-4,-6		Force IP or IPv6 name resolution"+//usage:	)+//usage:     "\n	-c CNT		Send only CNT pings"+//usage:     "\n	-s SIZE		Send SIZE data bytes in packets (default:56)"+//usage:     "\n	-t TTL		Set TTL"+//usage:     "\n	-I IFACE/IP	Use interface or IP address as source"+//usage:     "\n	-W SEC		Seconds to wait for the first response (default:10)"+//usage:     "\n			(after all -c CNT packets are sent)"+//usage:     "\n	-w SEC		Seconds until ping exits (default:infinite)"+//usage:     "\n			(can exit earlier with -c CNT)"+//usage:     "\n	-q		Quiet, only displays output at start"+//usage:     "\n			and when finished"+//usage:+//usage:# define ping6_trivial_usage+//usage:       "[OPTIONS] HOST"+//usage:# define ping6_full_usage "\n\n"+//usage:       "Send ICMP ECHO_REQUEST packets to network hosts\n"+//usage:     "\n	-c CNT		Send only CNT pings"+//usage:     "\n	-s SIZE		Send SIZE data bytes in packets (default:56)"+//usage:     "\n	-I IFACE/IP	Use interface or IP address as source"+//usage:     "\n	-q		Quiet, only displays output at start"+//usage:     "\n			and when finished"+//usage:+//usage:#endif+//usage:+//usage:#define ping_example_usage+//usage:       "$ ping localhost\n"+//usage:       "PING slag (127.0.0.1): 56 data bytes\n"+//usage:       "64 bytes from 127.0.0.1: icmp_seq=0 ttl=255 time=20.1 ms\n"+//usage:       "\n"+//usage:       "--- debian ping statistics ---\n"+//usage:       "1 packets transmitted, 1 packets received, 0% packet loss\n"+//usage:       "round-trip min/avg/max = 20.1/20.1/20.1 ms\n"+//usage:#define ping6_example_usage+//usage:       "$ ping6 ip6-localhost\n"+//usage:       "PING ip6-localhost (::1): 56 data bytes\n"+//usage:       "64 bytes from ::1: icmp6_seq=0 ttl=64 time=20.1 ms\n"+//usage:       "\n"+//usage:       "--- ip6-localhost ping statistics ---\n"+//usage:       "1 packets transmitted, 1 packets received, 0% packet loss\n"+//usage:       "round-trip min/avg/max = 20.1/20.1/20.1 ms\n"++#if ENABLE_PING6+# include <netinet/icmp6.h>+/* I see RENUMBERED constants in bits/in.h - !!?+ * What a fuck is going on with libc? Is it a glibc joke? */+# ifdef IPV6_2292HOPLIMIT+#  undef IPV6_HOPLIMIT+#  define IPV6_HOPLIMIT IPV6_2292HOPLIMIT+# endif+#endif++enum {+	DEFDATALEN = 56,+	MAXIPLEN = 60,+	MAXICMPLEN = 76,+	MAX_DUP_CHK = (8 * 128),+	MAXWAIT = 10,+	PINGINTERVAL = 1, /* 1 second */+	pingsock = 0,+};++static void+#if ENABLE_PING6+create_icmp_socket(len_and_sockaddr *lsa)+#else+create_icmp_socket(void)+#define create_icmp_socket(lsa) create_icmp_socket()+#endif+{+	int sock;+#if ENABLE_PING6+	if (lsa->u.sa.sa_family == AF_INET6)+		sock = socket(AF_INET6, SOCK_RAW, IPPROTO_ICMPV6);+	else+#endif+		sock = socket(AF_INET, SOCK_RAW, 1); /* 1 == ICMP */+	if (sock < 0) {+		if (errno != EPERM)+			bb_perror_msg_and_die(bb_msg_can_not_create_raw_socket);+#if defined(__linux__) || defined(__APPLE__)+		/* We don't have root privileges.  Try SOCK_DGRAM instead.+		 * Linux needs net.ipv4.ping_group_range for this to work.+		 * MacOSX allows ICMP_ECHO, ICMP_TSTAMP or ICMP_MASKREQ+		 */+#if ENABLE_PING6+		if (lsa->u.sa.sa_family == AF_INET6)+			sock = socket(AF_INET6, SOCK_DGRAM, IPPROTO_ICMPV6);+		else+#endif+			sock = socket(AF_INET, SOCK_DGRAM, 1); /* 1 == ICMP */+		if (sock < 0)+#endif+		bb_error_msg_and_die(bb_msg_perm_denied_are_you_root);+	}++	xmove_fd(sock, pingsock);+}++#if !ENABLE_FEATURE_FANCY_PING++/* Simple version */++struct globals {+	char *hostname;+	char packet[DEFDATALEN + MAXIPLEN + MAXICMPLEN];+} FIX_ALIASING;+#define G (*(struct globals*)&bb_common_bufsiz1)+#define INIT_G() do { } while (0)++static void noresp(int ign UNUSED_PARAM)+{+	printf("No response from %s\n", G.hostname);+	exit(EXIT_FAILURE);+}++static void ping4(len_and_sockaddr *lsa)+{+	struct icmp *pkt;+	int c;++	pkt = (struct icmp *) G.packet;+	/*memset(pkt, 0, sizeof(G.packet)); already is */+	pkt->icmp_type = ICMP_ECHO;+	pkt->icmp_cksum = inet_cksum((uint16_t *) pkt, sizeof(G.packet));++	xsendto(pingsock, G.packet, DEFDATALEN + ICMP_MINLEN, &lsa->u.sa, lsa->len);++	/* listen for replies */+	while (1) {+#if 0+		struct sockaddr_in from;+		socklen_t fromlen = sizeof(from);++		c = recvfrom(pingsock, G.packet, sizeof(G.packet), 0,+				(struct sockaddr *) &from, &fromlen);+#else+		c = recv(pingsock, G.packet, sizeof(G.packet), 0);+#endif+		if (c < 0) {+			if (errno != EINTR)+				bb_perror_msg("recvfrom");+			continue;+		}+		if (c >= 76) {			/* ip + icmp */+			struct iphdr *iphdr = (struct iphdr *) G.packet;++			pkt = (struct icmp *) (G.packet + (iphdr->ihl << 2));	/* skip ip hdr */+			if (pkt->icmp_type == ICMP_ECHOREPLY)+				break;+		}+	}+	if (ENABLE_FEATURE_CLEAN_UP)+		close(pingsock);+}++#if ENABLE_PING6+static void ping6(len_and_sockaddr *lsa)+{+	struct icmp6_hdr *pkt;+	int c;+	int sockopt;++	pkt = (struct icmp6_hdr *) G.packet;+	/*memset(pkt, 0, sizeof(G.packet)); already is */+	pkt->icmp6_type = ICMP6_ECHO_REQUEST;++	sockopt = offsetof(struct icmp6_hdr, icmp6_cksum);+	setsockopt(pingsock, SOL_RAW, IPV6_CHECKSUM, &sockopt, sizeof(sockopt));++	xsendto(pingsock, G.packet, DEFDATALEN + sizeof(struct icmp6_hdr), &lsa->u.sa, lsa->len);++	/* listen for replies */+	while (1) {+#if 0+		struct sockaddr_in6 from;+		socklen_t fromlen = sizeof(from);++		c = recvfrom(pingsock, G.packet, sizeof(G.packet), 0,+				(struct sockaddr *) &from, &fromlen);+#else+		c = recv(pingsock, G.packet, sizeof(G.packet), 0);+#endif+		if (c < 0) {+			if (errno != EINTR)+				bb_perror_msg("recvfrom");+			continue;+		}+		if (c >= ICMP_MINLEN) {	/* icmp6_hdr */+			if (pkt->icmp6_type == ICMP6_ECHO_REPLY)+				break;+		}+	}+	if (ENABLE_FEATURE_CLEAN_UP)+		close(pingsock);+}+#endif++#if !ENABLE_PING6+# define common_ping_main(af, argv) common_ping_main(argv)+#endif+static int common_ping_main(sa_family_t af, char **argv)+{+	len_and_sockaddr *lsa;++	INIT_G();++#if ENABLE_PING6+	while ((++argv)[0] && argv[0][0] == '-') {+		if (argv[0][1] == '4') {+			af = AF_INET;+			continue;+		}+		if (argv[0][1] == '6') {+			af = AF_INET6;+			continue;+		}+		bb_show_usage();+	}+#else+	argv++;+#endif++	G.hostname = *argv;+	if (!G.hostname)+		bb_show_usage();++#if ENABLE_PING6+	lsa = xhost_and_af2sockaddr(G.hostname, 0, af);+#else+	lsa = xhost_and_af2sockaddr(G.hostname, 0, AF_INET);+#endif+	/* Set timer _after_ DNS resolution */+	signal(SIGALRM, noresp);+	alarm(5); /* give the host 5000ms to respond */++	create_icmp_socket(lsa);+#if ENABLE_PING6+	if (lsa->u.sa.sa_family == AF_INET6)+		ping6(lsa);+	else+#endif+		ping4(lsa);+	printf("%s is alive!\n", G.hostname);+	return EXIT_SUCCESS;+}+++#else /* FEATURE_FANCY_PING */+++/* Full(er) version */++#define OPT_STRING ("qvc:s:t:w:W:I:n4" IF_PING6("6"))+enum {+	OPT_QUIET = 1 << 0,+	OPT_VERBOSE = 1 << 1,+	OPT_c = 1 << 2,+	OPT_s = 1 << 3,+	OPT_t = 1 << 4,+	OPT_w = 1 << 5,+	OPT_W = 1 << 6,+	OPT_I = 1 << 7,+	/*OPT_n = 1 << 8, - ignored */+	OPT_IPV4 = 1 << 9,+	OPT_IPV6 = (1 << 10) * ENABLE_PING6,+};+++struct globals {+	int if_index;+	char *str_I;+	len_and_sockaddr *source_lsa;+	unsigned datalen;+	unsigned pingcount; /* must be int-sized */+	unsigned opt_ttl;+	unsigned long ntransmitted, nreceived, nrepeats;+	uint16_t myid;+	unsigned tmin, tmax; /* in us */+	unsigned long long tsum; /* in us, sum of all times */+	unsigned deadline;+	unsigned timeout;+	unsigned total_secs;+	unsigned sizeof_rcv_packet;+	char *rcv_packet; /* [datalen + MAXIPLEN + MAXICMPLEN] */+	void *snd_packet; /* [datalen + ipv4/ipv6_const] */+	const char *hostname;+	const char *dotted;+	union {+		struct sockaddr sa;+		struct sockaddr_in sin;+#if ENABLE_PING6+		struct sockaddr_in6 sin6;+#endif+	} pingaddr;+	unsigned char rcvd_tbl[MAX_DUP_CHK / 8];+} FIX_ALIASING;+#define G (*(struct globals*)&bb_common_bufsiz1)+#define if_index     (G.if_index    )+#define source_lsa   (G.source_lsa  )+#define str_I        (G.str_I       )+#define datalen      (G.datalen     )+#define pingcount    (G.pingcount   )+#define opt_ttl      (G.opt_ttl     )+#define myid         (G.myid        )+#define tmin         (G.tmin        )+#define tmax         (G.tmax        )+#define tsum         (G.tsum        )+#define deadline     (G.deadline    )+#define timeout      (G.timeout     )+#define total_secs   (G.total_secs  )+#define hostname     (G.hostname    )+#define dotted       (G.dotted      )+#define pingaddr     (G.pingaddr    )+#define rcvd_tbl     (G.rcvd_tbl    )+void BUG_ping_globals_too_big(void);+#define INIT_G() do { \+	if (sizeof(G) > COMMON_BUFSIZE) \+		BUG_ping_globals_too_big(); \+	datalen = DEFDATALEN; \+	timeout = MAXWAIT; \+	tmin = UINT_MAX; \+} while (0)+++#define BYTE(bit)	rcvd_tbl[(bit)>>3]+#define MASK(bit)	(1 << ((bit) & 7))+#define SET(bit)	(BYTE(bit) |= MASK(bit))+#define CLR(bit)	(BYTE(bit) &= (~MASK(bit)))+#define TST(bit)	(BYTE(bit) & MASK(bit))++static void print_stats_and_exit(int junk) NORETURN;+static void print_stats_and_exit(int junk UNUSED_PARAM)+{+	unsigned long ul;+	unsigned long nrecv;++	signal(SIGINT, SIG_IGN);++	nrecv = G.nreceived;+	printf("\n--- %s ping statistics ---\n"+		"%lu packets transmitted, "+		"%lu packets received, ",+		hostname, G.ntransmitted, nrecv+	);+	if (G.nrepeats)+		printf("%lu duplicates, ", G.nrepeats);+	ul = G.ntransmitted;+	if (ul != 0)+		ul = (ul - nrecv) * 100 / ul;+	printf("%lu%% packet loss\n", ul);+	if (tmin != UINT_MAX) {+		unsigned tavg = tsum / (nrecv + G.nrepeats);+		printf("round-trip min/avg/max = %u.%03u/%u.%03u/%u.%03u ms\n",+			tmin / 1000, tmin % 1000,+			tavg / 1000, tavg % 1000,+			tmax / 1000, tmax % 1000);+	}+	/* if condition is true, exit with 1 -- 'failure' */+	exit(nrecv == 0 || (deadline && nrecv < pingcount));+}++static void sendping_tail(void (*sp)(int), int size_pkt)+{+	int sz;++	CLR((uint16_t)G.ntransmitted % MAX_DUP_CHK);+	G.ntransmitted++;++	size_pkt += datalen;++	/* sizeof(pingaddr) can be larger than real sa size, but I think+	 * it doesn't matter */+	sz = xsendto(pingsock, G.snd_packet, size_pkt, &pingaddr.sa, sizeof(pingaddr));+	if (sz != size_pkt)+		bb_error_msg_and_die(bb_msg_write_error);++	if (pingcount == 0 || deadline || G.ntransmitted < pingcount) {+		/* Didn't send all pings yet - schedule next in 1s */+		signal(SIGALRM, sp);+		if (deadline) {+			total_secs += PINGINTERVAL;+			if (total_secs >= deadline)+				signal(SIGALRM, print_stats_and_exit);+		}+		alarm(PINGINTERVAL);+	} else { /* -c NN, and all NN are sent (and no deadline) */+		/* Wait for the last ping to come back.+		 * -W timeout: wait for a response in seconds.+		 * Affects only timeout in absense of any responses,+		 * otherwise ping waits for two RTTs. */+		unsigned expire = timeout;++		if (G.nreceived) {+			/* approx. 2*tmax, in seconds (2 RTT) */+			expire = tmax / (512*1024);+			if (expire == 0)+				expire = 1;+		}+		signal(SIGALRM, print_stats_and_exit);+		alarm(expire);+	}+}++static void sendping4(int junk UNUSED_PARAM)+{+	struct icmp *pkt = G.snd_packet;++	//memset(pkt, 0, datalen + ICMP_MINLEN + 4); - G.snd_packet was xzalloced+	pkt->icmp_type = ICMP_ECHO;+	/*pkt->icmp_code = 0;*/+	pkt->icmp_cksum = 0; /* cksum is calculated with this field set to 0 */+	pkt->icmp_seq = htons(G.ntransmitted); /* don't ++ here, it can be a macro */+	pkt->icmp_id = myid;++	/* If datalen < 4, we store timestamp _past_ the packet,+	 * but it's ok - we allocated 4 extra bytes in xzalloc() just in case.+	 */+	/*if (datalen >= 4)*/+		/* No hton: we'll read it back on the same machine */+		*(uint32_t*)&pkt->icmp_dun = monotonic_us();++	pkt->icmp_cksum = inet_cksum((uint16_t *) pkt, datalen + ICMP_MINLEN);++	sendping_tail(sendping4, ICMP_MINLEN);+}+#if ENABLE_PING6+static void sendping6(int junk UNUSED_PARAM)+{+	struct icmp6_hdr *pkt = G.snd_packet;++	//memset(pkt, 0, datalen + sizeof(struct icmp6_hdr) + 4);+	pkt->icmp6_type = ICMP6_ECHO_REQUEST;+	/*pkt->icmp6_code = 0;*/+	/*pkt->icmp6_cksum = 0;*/+	pkt->icmp6_seq = htons(G.ntransmitted); /* don't ++ here, it can be a macro */+	pkt->icmp6_id = myid;++	/*if (datalen >= 4)*/+		*(bb__aliased_uint32_t*)(&pkt->icmp6_data8[4]) = monotonic_us();++	//TODO? pkt->icmp_cksum = inet_cksum(...);++	sendping_tail(sendping6, sizeof(struct icmp6_hdr));+}+#endif++static const char *icmp_type_name(int id)+{+	switch (id) {+	case ICMP_ECHOREPLY:      return "Echo Reply";+	case ICMP_DEST_UNREACH:   return "Destination Unreachable";+	case ICMP_SOURCE_QUENCH:  return "Source Quench";+	case ICMP_REDIRECT:       return "Redirect (change route)";+	case ICMP_ECHO:           return "Echo Request";+	case ICMP_TIME_EXCEEDED:  return "Time Exceeded";+	case ICMP_PARAMETERPROB:  return "Parameter Problem";+	case ICMP_TIMESTAMP:      return "Timestamp Request";+	case ICMP_TIMESTAMPREPLY: return "Timestamp Reply";+	case ICMP_INFO_REQUEST:   return "Information Request";+	case ICMP_INFO_REPLY:     return "Information Reply";+	case ICMP_ADDRESS:        return "Address Mask Request";+	case ICMP_ADDRESSREPLY:   return "Address Mask Reply";+	default:                  return "unknown ICMP type";+	}+}+#if ENABLE_PING6+/* RFC3542 changed some definitions from RFC2292 for no good reason, whee!+ * the newer 3542 uses a MLD_ prefix where as 2292 uses ICMP6_ prefix */+#ifndef MLD_LISTENER_QUERY+# define MLD_LISTENER_QUERY ICMP6_MEMBERSHIP_QUERY+#endif+#ifndef MLD_LISTENER_REPORT+# define MLD_LISTENER_REPORT ICMP6_MEMBERSHIP_REPORT+#endif+#ifndef MLD_LISTENER_REDUCTION+# define MLD_LISTENER_REDUCTION ICMP6_MEMBERSHIP_REDUCTION+#endif+static const char *icmp6_type_name(int id)+{+	switch (id) {+	case ICMP6_DST_UNREACH:      return "Destination Unreachable";+	case ICMP6_PACKET_TOO_BIG:   return "Packet too big";+	case ICMP6_TIME_EXCEEDED:    return "Time Exceeded";+	case ICMP6_PARAM_PROB:       return "Parameter Problem";+	case ICMP6_ECHO_REPLY:       return "Echo Reply";+	case ICMP6_ECHO_REQUEST:     return "Echo Request";+	case MLD_LISTENER_QUERY:     return "Listener Query";+	case MLD_LISTENER_REPORT:    return "Listener Report";+	case MLD_LISTENER_REDUCTION: return "Listener Reduction";+	default:                     return "unknown ICMP type";+	}+}+#endif++static void unpack_tail(int sz, uint32_t *tp,+		const char *from_str,+		uint16_t recv_seq, int ttl)+{+	unsigned char *b, m;+	const char *dupmsg = " (DUP!)";+	unsigned triptime = triptime; /* for gcc */++	if (tp) {+		/* (int32_t) cast is for hypothetical 64-bit unsigned */+		/* (doesn't hurt 32-bit real-world anyway) */+		triptime = (int32_t) ((uint32_t)monotonic_us() - *tp);+		tsum += triptime;+		if (triptime < tmin)+			tmin = triptime;+		if (triptime > tmax)+			tmax = triptime;+	}++	b = &BYTE(recv_seq % MAX_DUP_CHK);+	m = MASK(recv_seq % MAX_DUP_CHK);+	/*if TST(recv_seq % MAX_DUP_CHK):*/+	if (*b & m) {+		++G.nrepeats;+	} else {+		/*SET(recv_seq % MAX_DUP_CHK):*/+		*b |= m;+		++G.nreceived;+		dupmsg += 7;+	}++	if (option_mask32 & OPT_QUIET)+		return;++	printf("%d bytes from %s: seq=%u ttl=%d", sz,+		from_str, recv_seq, ttl);+	if (tp)+		printf(" time=%u.%03u ms", triptime / 1000, triptime % 1000);+	puts(dupmsg);+	fflush_all();+}+static void unpack4(char *buf, int sz, struct sockaddr_in *from)+{+	struct icmp *icmppkt;+	struct iphdr *iphdr;+	int hlen;++	/* discard if too short */+	if (sz < (datalen + ICMP_MINLEN))+		return;++	/* check IP header */+	iphdr = (struct iphdr *) buf;+	hlen = iphdr->ihl << 2;+	sz -= hlen;+	icmppkt = (struct icmp *) (buf + hlen);+	if (icmppkt->icmp_id != myid)+		return;				/* not our ping */++	if (icmppkt->icmp_type == ICMP_ECHOREPLY) {+		uint16_t recv_seq = ntohs(icmppkt->icmp_seq);+		uint32_t *tp = NULL;++		if (sz >= ICMP_MINLEN + sizeof(uint32_t))+			tp = (uint32_t *) icmppkt->icmp_data;+		unpack_tail(sz, tp,+			inet_ntoa(*(struct in_addr *) &from->sin_addr.s_addr),+			recv_seq, iphdr->ttl);+	} else if (icmppkt->icmp_type != ICMP_ECHO) {+		bb_error_msg("warning: got ICMP %d (%s)",+				icmppkt->icmp_type,+				icmp_type_name(icmppkt->icmp_type));+	}+}+#if ENABLE_PING6+static void unpack6(char *packet, int sz, struct sockaddr_in6 *from, int hoplimit)+{+	struct icmp6_hdr *icmppkt;+	char buf[INET6_ADDRSTRLEN];++	/* discard if too short */+	if (sz < (datalen + sizeof(struct icmp6_hdr)))+		return;++	icmppkt = (struct icmp6_hdr *) packet;+	if (icmppkt->icmp6_id != myid)+		return;				/* not our ping */++	if (icmppkt->icmp6_type == ICMP6_ECHO_REPLY) {+		uint16_t recv_seq = ntohs(icmppkt->icmp6_seq);+		uint32_t *tp = NULL;++		if (sz >= sizeof(struct icmp6_hdr) + sizeof(uint32_t))+			tp = (uint32_t *) &icmppkt->icmp6_data8[4];+		unpack_tail(sz, tp,+			inet_ntop(AF_INET6, &from->sin6_addr,+					buf, sizeof(buf)),+			recv_seq, hoplimit);+	} else if (icmppkt->icmp6_type != ICMP6_ECHO_REQUEST) {+		bb_error_msg("warning: got ICMP %d (%s)",+				icmppkt->icmp6_type,+				icmp6_type_name(icmppkt->icmp6_type));+	}+}+#endif++static void ping4(len_and_sockaddr *lsa)+{+	int sockopt;++	pingaddr.sin = lsa->u.sin;+	if (source_lsa) {+		if (setsockopt(pingsock, IPPROTO_IP, IP_MULTICAST_IF,+				&source_lsa->u.sa, source_lsa->len))+			bb_error_msg_and_die("can't set multicast source interface");+		xbind(pingsock, &source_lsa->u.sa, source_lsa->len);+	}++	/* enable broadcast pings */+	setsockopt_broadcast(pingsock);++	/* set recv buf (needed if we can get lots of responses: flood ping,+	 * broadcast ping etc) */+	sockopt = (datalen * 2) + 7 * 1024; /* giving it a bit of extra room */+	setsockopt(pingsock, SOL_SOCKET, SO_RCVBUF, &sockopt, sizeof(sockopt));++	if (opt_ttl != 0) {+		setsockopt(pingsock, IPPROTO_IP, IP_TTL, &opt_ttl, sizeof(opt_ttl));+		/* above doesnt affect packets sent to bcast IP, so... */+		setsockopt(pingsock, IPPROTO_IP, IP_MULTICAST_TTL, &opt_ttl, sizeof(opt_ttl));+	}++	signal(SIGINT, print_stats_and_exit);++	/* start the ping's going ... */+	sendping4(0);++	/* listen for replies */+	while (1) {+		struct sockaddr_in from;+		socklen_t fromlen = (socklen_t) sizeof(from);+		int c;++		c = recvfrom(pingsock, G.rcv_packet, G.sizeof_rcv_packet, 0,+				(struct sockaddr *) &from, &fromlen);+		if (c < 0) {+			if (errno != EINTR)+				bb_perror_msg("recvfrom");+			continue;+		}+		unpack4(G.rcv_packet, c, &from);+		if (pingcount && G.nreceived >= pingcount)+			break;+	}+}+#if ENABLE_PING6+extern int BUG_bad_offsetof_icmp6_cksum(void);+static void ping6(len_and_sockaddr *lsa)+{+	int sockopt;+	struct msghdr msg;+	struct sockaddr_in6 from;+	struct iovec iov;+	char control_buf[CMSG_SPACE(36)];++	pingaddr.sin6 = lsa->u.sin6;+	if (source_lsa)+		xbind(pingsock, &source_lsa->u.sa, source_lsa->len);++#ifdef ICMP6_FILTER+	{+		struct icmp6_filter filt;+		if (!(option_mask32 & OPT_VERBOSE)) {+			ICMP6_FILTER_SETBLOCKALL(&filt);+			ICMP6_FILTER_SETPASS(ICMP6_ECHO_REPLY, &filt);+		} else {+			ICMP6_FILTER_SETPASSALL(&filt);+		}+		if (setsockopt(pingsock, IPPROTO_ICMPV6, ICMP6_FILTER, &filt,+					sizeof(filt)) < 0)+			bb_error_msg_and_die("setsockopt(ICMP6_FILTER)");+	}+#endif /*ICMP6_FILTER*/++	/* enable broadcast pings */+	setsockopt_broadcast(pingsock);++	/* set recv buf (needed if we can get lots of responses: flood ping,+	 * broadcast ping etc) */+	sockopt = (datalen * 2) + 7 * 1024; /* giving it a bit of extra room */+	setsockopt(pingsock, SOL_SOCKET, SO_RCVBUF, &sockopt, sizeof(sockopt));++	sockopt = offsetof(struct icmp6_hdr, icmp6_cksum);+	if (offsetof(struct icmp6_hdr, icmp6_cksum) != 2)+		BUG_bad_offsetof_icmp6_cksum();+	setsockopt(pingsock, SOL_RAW, IPV6_CHECKSUM, &sockopt, sizeof(sockopt));++	/* request ttl info to be returned in ancillary data */+	setsockopt(pingsock, SOL_IPV6, IPV6_HOPLIMIT, &const_int_1, sizeof(const_int_1));++	if (if_index)+		pingaddr.sin6.sin6_scope_id = if_index;++	signal(SIGINT, print_stats_and_exit);++	/* start the ping's going ... */+	sendping6(0);++	/* listen for replies */+	msg.msg_name = &from;+	msg.msg_namelen = sizeof(from);+	msg.msg_iov = &iov;+	msg.msg_iovlen = 1;+	msg.msg_control = control_buf;+	iov.iov_base = G.rcv_packet;+	iov.iov_len = G.sizeof_rcv_packet;+	while (1) {+		int c;+		struct cmsghdr *mp;+		int hoplimit = -1;+		msg.msg_controllen = sizeof(control_buf);++		c = recvmsg(pingsock, &msg, 0);+		if (c < 0) {+			if (errno != EINTR)+				bb_perror_msg("recvfrom");+			continue;+		}+		for (mp = CMSG_FIRSTHDR(&msg); mp; mp = CMSG_NXTHDR(&msg, mp)) {+			if (mp->cmsg_level == SOL_IPV6+			 && mp->cmsg_type == IPV6_HOPLIMIT+			 /* don't check len - we trust the kernel: */+			 /* && mp->cmsg_len >= CMSG_LEN(sizeof(int)) */+			) {+				/*hoplimit = *(int*)CMSG_DATA(mp); - unaligned access */+				move_from_unaligned_int(hoplimit, CMSG_DATA(mp));+			}+		}+		unpack6(G.rcv_packet, c, &from, hoplimit);+		if (pingcount && G.nreceived >= pingcount)+			break;+	}+}+#endif++static void ping(len_and_sockaddr *lsa)+{+	printf("PING %s (%s)", hostname, dotted);+	if (source_lsa) {+		printf(" from %s",+			xmalloc_sockaddr2dotted_noport(&source_lsa->u.sa));+	}+	printf(": %d data bytes\n", datalen);++	create_icmp_socket(lsa);+	/* untested whether "-I addr" really works for IPv6: */+	if (str_I)+		setsockopt_bindtodevice(pingsock, str_I);++	G.sizeof_rcv_packet = datalen + MAXIPLEN + MAXICMPLEN;+	G.rcv_packet = xzalloc(G.sizeof_rcv_packet);+#if ENABLE_PING6+	if (lsa->u.sa.sa_family == AF_INET6) {+		/* +4 reserves a place for timestamp, which may end up sitting+		 * _after_ packet. Saves one if() - see sendping4/6() */+		G.snd_packet = xzalloc(datalen + sizeof(struct icmp6_hdr) + 4);+		ping6(lsa);+	} else+#endif+	{+		G.snd_packet = xzalloc(datalen + ICMP_MINLEN + 4);+		ping4(lsa);+	}+}++static int common_ping_main(int opt, char **argv)+{+	len_and_sockaddr *lsa;+	char *str_s;++	INIT_G();++	/* exactly one argument needed; -v and -q don't mix; -c NUM, -t NUM, -w NUM, -W NUM */+	opt_complementary = "=1:q--v:v--q:c+:t+:w+:W+";+	opt |= getopt32(argv, OPT_STRING, &pingcount, &str_s, &opt_ttl, &deadline, &timeout, &str_I);+	if (opt & OPT_s)+		datalen = xatou16(str_s); // -s+	if (opt & OPT_I) { // -I+		if_index = if_nametoindex(str_I);+		if (!if_index) {+			/* TODO: I'm not sure it takes IPv6 unless in [XX:XX..] format */+			source_lsa = xdotted2sockaddr(str_I, 0);+			str_I = NULL; /* don't try to bind to device later */+		}+	}+	myid = (uint16_t) getpid();+	hostname = argv[optind];+#if ENABLE_PING6+	{+		sa_family_t af = AF_UNSPEC;+		if (opt & OPT_IPV4)+			af = AF_INET;+		if (opt & OPT_IPV6)+			af = AF_INET6;+		lsa = xhost_and_af2sockaddr(hostname, 0, af);+	}+#else+	lsa = xhost_and_af2sockaddr(hostname, 0, AF_INET);+#endif++	if (source_lsa && source_lsa->u.sa.sa_family != lsa->u.sa.sa_family)+		/* leaking it here... */+		source_lsa = NULL;++	dotted = xmalloc_sockaddr2dotted_noport(&lsa->u.sa);+	ping(lsa);+	print_stats_and_exit(EXIT_SUCCESS);+	/*return EXIT_SUCCESS;*/+}+#endif /* FEATURE_FANCY_PING */+++int ping_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;+int ping_main(int argc UNUSED_PARAM, char **argv)+{+#if !ENABLE_FEATURE_FANCY_PING+	return common_ping_main(AF_UNSPEC, argv);+#else+	return common_ping_main(0, argv);+#endif+}++#if ENABLE_PING6+int ping6_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;+int ping6_main(int argc UNUSED_PARAM, char **argv)+{+# if !ENABLE_FEATURE_FANCY_PING+	return common_ping_main(AF_INET6, argv);+# else+	return common_ping_main(OPT_IPV6, argv);+# endif+}+#endif++/* from ping6.c:+ * Copyright (c) 1989 The Regents of the University of California.+ * All rights reserved.+ *+ * This code is derived from software contributed to Berkeley by+ * Mike Muuss.+ *+ * Redistribution and use in source and binary forms, with or without+ * modification, are permitted provided that the following conditions+ * are met:+ * 1. Redistributions of source code must retain the above copyright+ *    notice, this list of conditions and the following disclaimer.+ * 2. Redistributions in binary form must reproduce the above copyright+ *    notice, this list of conditions and the following disclaimer in the+ *    documentation and/or other materials provided with the distribution.+ *+ * 3. <BSD Advertising Clause omitted per the July 22, 1999 licensing change+ *		ftp://ftp.cs.berkeley.edu/pub/4bsd/README.Impt.License.Change>+ *+ * 4. Neither the name of the University nor the names of its contributors+ *    may be used to endorse or promote products derived from this software+ *    without specific prior written permission.+ *+ * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE+ * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE+ * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS+ * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT+ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY+ * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF+ * SUCH DAMAGE.+ */
 |