summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--networking/traceroute.c206
1 files changed, 135 insertions, 71 deletions
diff --git a/networking/traceroute.c b/networking/traceroute.c
index 7dde105..ddde922 100644
--- a/networking/traceroute.c
+++ b/networking/traceroute.c
@@ -414,9 +414,32 @@ struct globals {
waittime = 5; \
} while (0)
-#define outicmp ((struct icmp *)(outip + 1))
-#define outudp ((struct udphdr *)(outip + 1))
-
+#define outudp ((struct udphdr *)(outip + 1))
+#define outudp6 ((struct udphdr *)(((struct ip6_hdr*)outip) + 1))
+#define outicmp ((struct icmp *)(outip + 1))
+#define outicmp6 ((struct icmp *)(((struct ip6_hdr*)outip) + 1))
+/* NB: for icmp echo, IPv4 and IPv6 fields are the same size and offset:
+ * struct icmp:
+ * uint8_t icmp_type;
+ * uint8_t icmp_code;
+ * uint16_t icmp_cksum;
+ * uint16_t icmp_id;
+ * uint16_t icmp_seq;
+ * struct icmp6_hdr:
+ * uint8_t icmp6_type;
+ * uint8_t icmp6_code;
+ * uint16_t icmp6_cksum;
+ * uint16_t icmp6_id;
+ * uint16_t icmp6_seq;
+ * therefore both outicmp and outicmp6 are pointers to *IPv4* icmp struct.
+ * SIZEOF_ICMP_HDR == 8 is the same for both, as well.
+ * However, values of these pointers are not the same (since IPv6 IP header is larger),
+ * and icmp_type constants are not the same:
+ * #define ICMP_ECHO 8
+ * #define ICMP_ECHOREPLY 0
+ * #define ICMP6_ECHO_REQUEST 128
+ * #define ICMP6_ECHO_REPLY 129
+ */
static int
wait_for_reply(len_and_sockaddr *from_lsa, struct sockaddr *to, unsigned *timestamp_us, int *left_ms)
@@ -446,14 +469,16 @@ send_probe(int seq, int ttl)
{
int len, res;
void *out;
+ struct icmp *icp;
/* Payload */
#if ENABLE_TRACEROUTE6
if (dest_lsa->u.sa.sa_family == AF_INET6) {
- struct outdata6_t *pkt = (struct outdata6_t *) outdata;
+ struct outdata6_t *pkt = (void *) outdata;
pkt->ident6 = htonl(ident);
pkt->seq6 = htonl(seq);
/*gettimeofday(&pkt->tv, &tz);*/
+ icp = outicmp6;
} else
#endif
{
@@ -461,19 +486,23 @@ send_probe(int seq, int ttl)
outdata->ttl = ttl;
// UNUSED: was storing gettimeofday's result there, but never ever checked it
/*memcpy(&outdata->tv, tp, sizeof(outdata->tv));*/
-
- if (option_mask32 & OPT_USE_ICMP) {
- outicmp->icmp_seq = htons(seq);
-
- /* Always calculate checksum for icmp packets */
- outicmp->icmp_cksum = 0;
- outicmp->icmp_cksum = inet_cksum(
- outicmp,
- ((char*)outip + packlen) - (char*)outicmp
- );
- if (outicmp->icmp_cksum == 0)
- outicmp->icmp_cksum = 0xffff;
- }
+ icp = outicmp;
+ }
+ out = outdata;
+ if (option_mask32 & OPT_USE_ICMP) {
+ out = icp;
+ /*icp->icmp_type = ICMP[6]_ECHO; - already set */
+ /*icp->icmp_code = 0; - already set */
+ /*icp->icmp_id = ident; - already set */
+ icp->icmp_seq = htons(seq);
+ /* Always calculate checksum for icmp packets */
+ icp->icmp_cksum = 0;
+ icp->icmp_cksum = inet_cksum(
+ icp,
+ ((char*)outip + packlen) - (char*)icp
+ );
+ if (icp->icmp_cksum == 0)
+ icp->icmp_cksum = 0xffff;
}
//BUG! verbose is (x & OPT_VERBOSE), not a counter!
@@ -502,7 +531,6 @@ send_probe(int seq, int ttl)
}
#endif
- out = outdata;
#if ENABLE_TRACEROUTE6
if (dest_lsa->u.sa.sa_family == AF_INET6) {
res = setsockopt_int(sndsock, SOL_IPV6, IPV6_UNICAST_HOPS, ttl);
@@ -516,8 +544,6 @@ send_probe(int seq, int ttl)
if (res != 0)
bb_perror_msg_and_die("setsockopt(%s) %d", "TTL", ttl);
#endif
- if (option_mask32 & OPT_USE_ICMP)
- out = outicmp;
}
if (!(option_mask32 & OPT_USE_ICMP)) {
@@ -579,7 +605,12 @@ packet4_ok(int read_len, const struct sockaddr_in *from, int seq)
int hlen;
const struct ip *ip;
+ /* NB: reads from (AF_INET, SOCK_RAW, IPPROTO_ICMP) socket
+ * return the entire IP packet (IOW: they do not strip IP header).
+ * This differs from (AF_INET6, SOCK_RAW, IPPROTO_ICMPV6) sockets!?
+ */
ip = (struct ip *) recv_pkt;
+
hlen = ip->ip_hl << 2;
if (read_len < hlen + ICMP_MINLEN) {
#if ENABLE_FEATURE_TRACEROUTE_VERBOSE
@@ -598,9 +629,20 @@ packet4_ok(int read_len, const struct sockaddr_in *from, int seq)
if (code == ICMP_UNREACH_NEEDFRAG)
pmtu = ntohs(icp->icmp_nextmtu);
+ if ((option_mask32 & OPT_USE_ICMP)
+ && type == ICMP_ECHOREPLY
+ && icp->icmp_id == htons(ident)
+ && icp->icmp_seq == htons(seq)
+ ) {
+ /* In UDP mode, when we reach the machine, we (usually)
+ * would get "port unreachable" - in ICMP we got "echo reply".
+ * Simulate "port unreachable" for caller:
+ */
+ return ICMP_UNREACH_PORT+1;
+ }
+
if ((type == ICMP_TIMXCEED && code == ICMP_TIMXCEED_INTRANS)
|| type == ICMP_UNREACH
- || type == ICMP_ECHOREPLY
) {
const struct ip *hip;
const struct udphdr *up;
@@ -610,14 +652,6 @@ packet4_ok(int read_len, const struct sockaddr_in *from, int seq)
if (option_mask32 & OPT_USE_ICMP) {
struct icmp *hicmp;
- /* XXX */
- if (type == ICMP_ECHOREPLY
- && icp->icmp_id == htons(ident)
- && icp->icmp_seq == htons(seq)
- ) {
- return ICMP_UNREACH_PORT+1;
- }
-
hicmp = (struct icmp *)((unsigned char *)hip + hlen);
if (hlen + SIZEOF_ICMP_HDR <= read_len
&& hip->ip_p == IPPROTO_ICMP
@@ -648,6 +682,7 @@ packet4_ok(int read_len, const struct sockaddr_in *from, int seq)
printf("\n%d bytes from %s to "
"%s: icmp type %d (%s) code %d\n",
read_len, inet_ntoa(from->sin_addr),
+//BUG: inet_ntoa() returns static buf! x2 is NONO!
inet_ntoa(ip->ip_dst),
type, pr_type(type), icp->icmp_code);
for (i = 4; i < read_len; i += sizeof(*lp))
@@ -673,11 +708,27 @@ packet_ok(int read_len, len_and_sockaddr *from_lsa,
if (from_lsa->u.sa.sa_family == AF_INET)
return packet4_ok(read_len, &from_lsa->u.sin, seq);
+ /* NB: reads from (AF_INET6, SOCK_RAW, IPPROTO_ICMPV6) socket
+ * return only ICMP packet (IOW: they strip IPv6 header).
+ * This differs from (AF_INET, SOCK_RAW, IPPROTO_ICMP) sockets!?
+ */
icp = (struct icmp6_hdr *) recv_pkt;
type = icp->icmp6_type;
code = icp->icmp6_code;
+ if ((option_mask32 & OPT_USE_ICMP)
+ && type == ICMP6_ECHO_REPLY
+ && icp->icmp6_id == htons(ident)
+ && icp->icmp6_seq == htons(seq)
+ ) {
+ /* In UDP mode, when we reach the machine, we (usually)
+ * would get "port unreachable" - in ICMP we got "echo reply".
+ * Simulate "port unreachable" for caller:
+ */
+ return (ICMP6_DST_UNREACH_NOPORT << 8) + 1;
+ }
+
if ((type == ICMP6_TIME_EXCEEDED && code == ICMP6_TIME_EXCEED_TRANSIT)
|| type == ICMP6_DST_UNREACH
) {
@@ -787,8 +838,13 @@ print(int read_len, const struct sockaddr *from, const struct sockaddr *to)
if (verbose) {
char *ina = xmalloc_sockaddr2dotted_noport(to);
#if ENABLE_TRACEROUTE6
+ /* NB: reads from (AF_INET, SOCK_RAW, IPPROTO_ICMP) socket
+ * return the entire IP packet (IOW: they do not strip IP header).
+ * Reads from (AF_INET6, SOCK_RAW, IPPROTO_ICMPV6) do strip IPv6
+ * header and return only ICMP6 packet. Weird.
+ */
if (to->sa_family == AF_INET6) {
- read_len -= sizeof(struct ip6_hdr);
+ /* read_len -= sizeof(struct ip6_hdr); - WRONG! */
} else
#endif
{
@@ -844,6 +900,9 @@ common_traceroute_main(int op, char **argv)
struct sockaddr *lastaddr;
struct sockaddr *to;
+ /* Ensure the socket fds won't be 0, 1 or 2 */
+ bb_sanitize_stdio();
+
INIT_G();
op |= getopt32(argv, "^"
@@ -885,12 +944,14 @@ common_traceroute_main(int op, char **argv)
/* Process destination and optional packet size */
minpacket = sizeof(struct ip)
- + SIZEOF_ICMP_HDR
+ + sizeof(struct udphdr)
+ sizeof(struct outdata_t);
- if (!(op & OPT_USE_ICMP))
+ if (op & OPT_USE_ICMP) {
minpacket = sizeof(struct ip)
- + sizeof(struct udphdr)
+ + SIZEOF_ICMP_HDR
+ sizeof(struct outdata_t);
+ port = 0; /* on ICMP6 sockets, sendto(ipv6.nonzero_port) throws EINVAL */
+ }
#if ENABLE_TRACEROUTE6
af = AF_UNSPEC;
if (op & OPT_IPV4)
@@ -899,10 +960,15 @@ common_traceroute_main(int op, char **argv)
af = AF_INET6;
dest_lsa = xhost_and_af2sockaddr(argv[0], port, af);
af = dest_lsa->u.sa.sa_family;
- if (af == AF_INET6)
+ if (af == AF_INET6) {
minpacket = sizeof(struct ip6_hdr)
- + sizeof(struct udphdr)
- + sizeof(struct outdata6_t);
+ + sizeof(struct udphdr)
+ + sizeof(struct outdata6_t);
+ if (op & OPT_USE_ICMP)
+ minpacket = sizeof(struct ip6_hdr)
+ + SIZEOF_ICMP_HDR
+ + sizeof(struct outdata6_t);
+ }
#else
dest_lsa = xhost2sockaddr(argv[0], port);
#endif
@@ -910,13 +976,10 @@ common_traceroute_main(int op, char **argv)
if (argv[1])
packlen = xatoul_range(argv[1], minpacket, 32 * 1024);
- /* Ensure the socket fds won't be 0, 1 or 2 */
- bb_sanitize_stdio();
-
#if ENABLE_TRACEROUTE6
if (af == AF_INET6) {
xmove_fd(xsocket(AF_INET6, SOCK_RAW, IPPROTO_ICMPV6), rcvsock);
- setsockopt_1(rcvsock, SOL_IPV6, IPV6_RECVPKTINFO);
+ setsockopt_1(rcvsock, SOL_IPV6, IPV6_RECVPKTINFO); //why?
} else
#endif
{
@@ -934,7 +997,10 @@ common_traceroute_main(int op, char **argv)
if (af == AF_INET6) {
if (setsockopt_int(rcvsock, SOL_RAW, IPV6_CHECKSUM, 2) != 0)
bb_perror_msg_and_die("setsockopt(%s)", "IPV6_CHECKSUM");
- xmove_fd(xsocket(af, SOCK_DGRAM, 0), sndsock);
+ if (op & OPT_USE_ICMP)
+ xmove_fd(xsocket(AF_INET6, SOCK_RAW, IPPROTO_ICMPV6), sndsock);
+ else
+ xmove_fd(xsocket(AF_INET6, SOCK_DGRAM, 0), sndsock);
} else
#endif
{
@@ -943,6 +1009,7 @@ common_traceroute_main(int op, char **argv)
else
xmove_fd(xsocket(AF_INET, SOCK_DGRAM, 0), sndsock);
}
+//TODO xmove_fd to here!
#ifdef SO_SNDBUF
if (setsockopt_SOL_SOCKET_int(sndsock, SO_SNDBUF, packlen) != 0) {
@@ -970,21 +1037,25 @@ common_traceroute_main(int op, char **argv)
ident = getpid();
if (!ENABLE_TRACEROUTE6 || af == AF_INET) {
+ outdata = (void*)(outudp + 1);
if (op & OPT_USE_ICMP) {
ident |= 0x8000;
outicmp->icmp_type = ICMP_ECHO;
+ /*outicmp->icmp_code = 0; - set by xzalloc */
outicmp->icmp_id = htons(ident);
- outdata = (struct outdata_t *)((char *)outicmp + SIZEOF_ICMP_HDR);
- } else {
- outdata = (struct outdata_t *)(outudp + 1);
+ outdata = (void*)((char *)outicmp + SIZEOF_ICMP_HDR);
}
}
#if ENABLE_TRACEROUTE6
if (af == AF_INET6) {
- outdata = (void*)((char*)outip
- + sizeof(struct ip6_hdr)
- + sizeof(struct udphdr)
- );
+ outdata = (void*)(outudp6 + 1);
+ if (op & OPT_USE_ICMP) {
+ ident |= 0x8000;
+ outicmp6->icmp_type = ICMP6_ECHO_REQUEST;
+ /*outicmp->icmp_code = 0; - set by xzalloc */
+ outicmp6->icmp_id = htons(ident);
+ outdata = (void*)((char *)outicmp6 + SIZEOF_ICMP_HDR);
+ }
}
#endif
@@ -1013,26 +1084,16 @@ common_traceroute_main(int op, char **argv)
//TODO: why we don't do it for IPv4?
len_and_sockaddr *source_lsa;
- int probe_fd = xsocket(af, SOCK_DGRAM, 0);
- if (op & OPT_DEVICE)
- setsockopt_bindtodevice(probe_fd, device);
- set_nport(&dest_lsa->u.sa, htons(1025));
- /* dummy connect. makes kernel pick source IP (and port) */
- xconnect(probe_fd, &dest_lsa->u.sa, dest_lsa->len);
set_nport(&dest_lsa->u.sa, htons(port));
-
- /* read IP and port */
- source_lsa = get_sock_lsa(probe_fd);
+ /* Connect makes kernel pick source IP and port */
+ xconnect(sndsock, &dest_lsa->u.sa, dest_lsa->len);
+ /* Read IP and port */
+ source_lsa = get_sock_lsa(sndsock);
if (source_lsa == NULL)
bb_simple_error_msg_and_die("can't get probe addr");
-
- close(probe_fd);
-
- /* bind our sockets to this IP (but not port) */
+ /* bind our recv socket to this IP (but not port) */
set_nport(&source_lsa->u.sa, 0);
- xbind(sndsock, &source_lsa->u.sa, source_lsa->len);
xbind(rcvsock, &source_lsa->u.sa, source_lsa->len);
-
free(source_lsa);
}
#endif
@@ -1067,10 +1128,9 @@ common_traceroute_main(int op, char **argv)
unsigned t1;
unsigned t2;
int left_ms;
- struct ip *ip;
fflush_all();
- if (probe != 0 && pausemsecs > 0)
+ if (probe != 0)
msleep(pausemsecs);
send_probe(++seq, ttl);
@@ -1099,15 +1159,18 @@ common_traceroute_main(int op, char **argv)
}
print_delta_ms(t1, t2);
- ip = (struct ip *)recv_pkt;
- if (from_lsa->u.sa.sa_family == AF_INET)
- if (op & OPT_TTL_FLAG)
+ if (from_lsa->u.sa.sa_family == AF_INET) {
+ if (op & OPT_TTL_FLAG) {
+ struct ip *ip = (struct ip *)recv_pkt;
printf(" (%d)", ip->ip_ttl);
+ }
+ }
- /* time exceeded in transit */
+ /* Got a "time exceeded in transit" icmp message? */
if (icmp_code == -1)
break;
+
icmp_code--;
switch (icmp_code) {
#if ENABLE_TRACEROUTE6
@@ -1115,12 +1178,13 @@ common_traceroute_main(int op, char **argv)
got_there = 1;
break;
#endif
- case ICMP_UNREACH_PORT:
+ case ICMP_UNREACH_PORT: {
+ struct ip *ip = (struct ip *)recv_pkt;
if (ip->ip_ttl <= 1)
printf(" !");
got_there = 1;
break;
-
+ }
case ICMP_UNREACH_NET:
#if ENABLE_TRACEROUTE6 && (ICMP6_DST_UNREACH_NOROUTE != ICMP_UNREACH_NET)
case ICMP6_DST_UNREACH_NOROUTE << 8: