/* * Copyright (c) 2018-2020, Andreas Kling * * SPDX-License-Identifier: BSD-2-Clause */ #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include static int total_pings; static int successful_pings; static uint32_t total_ms; static int min_ms; static int max_ms; static const char* host; int main(int argc, char** argv) { if (pledge("stdio id inet unix sigaction", nullptr) < 0) { perror("pledge"); return 1; } Core::ArgsParser args_parser; args_parser.add_positional_argument(host, "Host to ping", "host"); args_parser.parse(argc, argv); int fd = socket(AF_INET, SOCK_RAW, IPPROTO_ICMP); if (fd < 0) { perror("socket"); return 1; } if (setgid(getgid()) || setuid(getuid())) { warnln("Failed to drop privileges."); return 1; } if (pledge("stdio inet unix sigaction", nullptr) < 0) { perror("pledge"); return 1; } struct timeval timeout { 1, 0 }; int rc = setsockopt(fd, SOL_SOCKET, SO_RCVTIMEO, &timeout, sizeof(timeout)); if (rc < 0) { perror("setsockopt"); return 1; } auto* hostent = gethostbyname(host); if (!hostent) { warnln("Lookup failed for '{}'", host); return 1; } if (pledge("stdio inet sigaction", nullptr) < 0) { perror("pledge"); return 1; } pid_t pid = getpid(); sockaddr_in peer_address; memset(&peer_address, 0, sizeof(peer_address)); peer_address.sin_family = AF_INET; peer_address.sin_port = 0; peer_address.sin_addr.s_addr = *(const in_addr_t*)hostent->h_addr_list[0]; struct PingPacket { struct icmphdr header; char msg[64 - sizeof(struct icmphdr)]; }; struct PongPacket { // FIXME: IPv4 headers are not actually fixed-size, handle other sizes. char ip_header[20]; struct icmphdr header; char msg[64 - sizeof(struct icmphdr)]; }; uint16_t seq = 1; sighandler_t ret = signal(SIGINT, [](int) { int packet_loss = 100; outln(); outln("--- {} ping statistics ---", host); if (total_pings) packet_loss -= 100.0f * successful_pings / total_pings; outln("{} packets transmitted, {} received, {}% packet loss", total_pings, successful_pings, packet_loss); int average_ms = 0; if (successful_pings) average_ms = total_ms / successful_pings; outln("rtt min/avg/max = {}/{}/{} ms", min_ms, average_ms, max_ms); exit(0); }); if (ret == SIG_ERR) { perror("failed to install SIGINT handler"); return 1; } for (;;) { PingPacket ping_packet; memset(&ping_packet, 0, sizeof(PingPacket)); ping_packet.header.type = ICMP_ECHO; ping_packet.header.code = 0; ping_packet.header.un.echo.id = htons(pid); ping_packet.header.un.echo.sequence = htons(seq++); bool fits = String("Hello there!\n").copy_characters_to_buffer(ping_packet.msg, sizeof(ping_packet.msg)); // It's a constant string, we can be sure that it fits. VERIFY(fits); ping_packet.header.checksum = internet_checksum(&ping_packet, sizeof(PingPacket)); struct timeval tv_send; gettimeofday(&tv_send, nullptr); rc = sendto(fd, &ping_packet, sizeof(PingPacket), 0, (const struct sockaddr*)&peer_address, sizeof(sockaddr_in)); if (rc < 0) { perror("sendto"); return 1; } total_pings++; for (;;) { PongPacket pong_packet; socklen_t peer_address_size = sizeof(peer_address); rc = recvfrom(fd, &pong_packet, sizeof(PongPacket), 0, (struct sockaddr*)&peer_address, &peer_address_size); if (rc < 0) { if (errno == EAGAIN) { outln("Request (seq={}) timed out.", ntohs(ping_packet.header.un.echo.sequence)); break; } perror("recvfrom"); return 1; } if (pong_packet.header.type != ICMP_ECHOREPLY) continue; if (pong_packet.header.code != 0) continue; if (ntohs(pong_packet.header.un.echo.id) != pid) continue; struct timeval tv_receive; gettimeofday(&tv_receive, nullptr); struct timeval tv_diff; timersub(&tv_receive, &tv_send, &tv_diff); int ms = tv_diff.tv_sec * 1000 + tv_diff.tv_usec / 1000; successful_pings++; int seq_dif = ntohs(ping_packet.header.un.echo.sequence) - ntohs(pong_packet.header.un.echo.sequence); // Approximation about the timeout of the out of order packet if (seq_dif) ms += seq_dif * 1000 * timeout.tv_sec; total_ms += ms; if (min_ms == 0) min_ms = max_ms = ms; else if (ms < min_ms) min_ms = ms; else if (ms > max_ms) max_ms = ms; char addr_buf[INET_ADDRSTRLEN]; outln("Pong from {}: id={}, seq={}{}, time={}ms", inet_ntop(AF_INET, &peer_address.sin_addr, addr_buf, sizeof(addr_buf)), ntohs(pong_packet.header.un.echo.id), ntohs(pong_packet.header.un.echo.sequence), pong_packet.header.un.echo.sequence != ping_packet.header.un.echo.sequence ? "(!)" : "", ms); // If this was a response to an earlier packet, we still need to wait for the current one. if (pong_packet.header.un.echo.sequence != ping_packet.header.un.echo.sequence) continue; break; } sleep(1); } return 0; }