xref: /illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/traceroute/traceroute.c (revision 9b9d39d2a32ff806d2431dbcc50968ef1e6d46b2)
1 /*
2  * Copyright 2009 Sun Microsystems, Inc.  All rights reserved.
3  * Use is subject to license terms.
4  * Copyright (c) 2017, Joyent, Inc.
5  */
6 
7 /*
8  * Copyright (c) 1988, 1989, 1991, 1994, 1995, 1996, 1997
9  *	The Regents of the University of California.  All rights reserved.
10  *
11  * Redistribution and use in source and binary forms, with or without
12  * modification, are permitted provided that: (1) source code distributions
13  * retain the above copyright notice and this paragraph in its entirety, (2)
14  * distributions including binary code include the above copyright notice and
15  * this paragraph in its entirety in the documentation or other materials
16  * provided with the distribution, and (3) all advertising materials mentioning
17  * features or use of this software display the following acknowledgement:
18  * ``This product includes software developed by the University of California,
19  * Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
20  * the University nor the names of its contributors may be used to endorse
21  * or promote products derived from this software without specific prior
22  * written permission.
23  * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
24  * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
25  * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
26  *
27  *
28  * @(#)$Header: traceroute.c,v 1.49 97/06/13 02:30:23 leres Exp $ (LBL)
29  */
30 
31 #include <sys/param.h>
32 #include <sys/file.h>
33 #include <sys/ioctl.h>
34 #include <sys/socket.h>
35 #include <sys/time.h>
36 #include <sys/sysmacros.h>
37 
38 #include <netinet/in_systm.h>
39 #include <netinet/in.h>
40 #include <netinet/ip.h>
41 #include <netinet/ip_var.h>
42 #include <netinet/ip_icmp.h>
43 #include <netinet/udp.h>
44 #include <netinet/udp_var.h>
45 #include <netinet/ip6.h>
46 #include <netinet/icmp6.h>
47 
48 #include <arpa/inet.h>
49 
50 #include <ctype.h>
51 #include <errno.h>
52 #include <malloc.h>
53 #include <memory.h>
54 #include <netdb.h>
55 #include <stdio.h>
56 #include <stdlib.h>
57 #include <strings.h>
58 #include <unistd.h>
59 #include <libintl.h>
60 #include <locale.h>
61 #include <signal.h>
62 #include <setjmp.h>
63 #include <limits.h>
64 #include <zone.h>
65 #include <thread.h>
66 #include <synch.h>
67 
68 #include <priv_utils.h>
69 
70 #include <libinetutil.h>
71 #include "traceroute.h"
72 
73 #define	MAX_SEQ			65535	/* max sequence value for ICMP */
74 #define	MAX_TRAFFIC_CLASS	255	/* max traffic class for IPv6 */
75 #define	MAX_FLOW_LABEL		0xFFFFF	/* max flow label for IPv6 */
76 #define	MAX_TOS			255	/* max type-of-service for IPv4 */
77 #define	STR_LEN			30
78 
79 /* store the information about a host */
80 struct hostinfo {
81 	char *name;		/* hostname */
82 	int family;		/* address family of the IP addresses */
83 	int num_addr;			/* number of IP addresses */
84 	union any_in_addr *addrs;	/* list of IP addresses */
85 };
86 
87 /* used to store a bunch of protocol specific values */
88 struct pr_set {
89 	int family;		/* AF_INET or AF_INET6 */
90 	char name[STR_LEN];	/* "IPv4" or "IPv6" */
91 	char icmp[STR_LEN];	/* "icmp" or "ipv6-icmp" */
92 	int icmp_minlen;
93 	int addr_len;
94 	int ip_hdr_len;
95 	int packlen;
96 	int sock_size;		/* size of sockaddr_in or sockaddr_in6 */
97 	struct sockaddr *to;
98 	struct sockaddr *from;
99 	void *from_sin_addr;
100 	union any_in_addr *gwIPlist;
101 	/* pointers to v4/v6 functions */
102 	struct ip *(*set_buffers_fn) (int);
103 	int (*check_reply_fn)(struct msghdr *, int, int, uchar_t *, uchar_t *);
104 	boolean_t (*print_icmp_other_fn)(uchar_t, uchar_t);
105 	void (*print_addr_fn)(uchar_t *, int, struct sockaddr *);
106 
107 };
108 
109 /*
110  * LBNL bug fixed: in LBNL traceroute 'uchar_t packet[512];'
111  * Not sufficient to hold the complete packet for ECHO REPLY of a big probe.
112  * Packet size is reported incorrectly in such a case.
113  * Also this buffer needs to be 32 bit aligned. In the future the alignment
114  * requirement will be increased to 64 bit. So, let's use 64 bit alignment now.
115  */
116 static uint64_t packet[(IP_MAXPACKET + 1)/8];	/* received packet */
117 
118 static struct ip *outip4;	/* output buffer to send as an IPv4 datagram */
119 static struct ip *outip6;	/* output buffer to send as an IPv6 datagram */
120 
121 /* Used to store the ancillary data that comes with the received packets */
122 static uint64_t ancillary_data[(IP_MAXPACKET + 1)/8];
123 
124 /* first get the gw names, later you'll resolve them based on the family */
125 static char *gwlist[MAXMAX_GWS];		/* gateway names list */
126 static union any_in_addr gwIPlist[MAX_GWS];	/* gateway IPv4 address list */
127 static union any_in_addr gwIP6list[MAX_GWS6];	/* gateway IPv6 address list */
128 
129 static int family_input = AF_UNSPEC;	/* User supplied protocol family */
130 static int rcvsock4;		/* receive (icmp) socket file descriptor */
131 static int sndsock4;		/* send (udp/icmp) socket file descriptor */
132 static int rcvsock6;		/* receive (icmp6) socket file descriptor */
133 static int sndsock6;		/* send (udp6/icmp6) socket file descriptor */
134 int gw_count = 0;		/* number of gateways */
135 static struct sockaddr_in whereto;	/* Who to try to reach */
136 static struct sockaddr_in6 whereto6;
137 static struct sockaddr_in wherefrom;	/* Who we are */
138 static struct sockaddr_in6 wherefrom6;
139 static int packlen_input = 0;		/* user input for packlen */
140 
141 char *prog;
142 static char *source_input = NULL; /* this is user arg. source, doesn't change */
143 static char *source = NULL;	/* this gets modified after name lookup */
144 char *hostname;
145 static char *device = NULL;   	/* interface name */
146 static struct pr_set *pr4;	/* protocol info for IPv4 */
147 static struct pr_set *pr6;	/* protocol info for IPv6 */
148 static struct ifaddrlist *al4;	/* list of interfaces */
149 static struct ifaddrlist *al6;	/* list of interfaces */
150 static uint_t if_index = 0;	/* interface index */
151 static int num_v4 = 0;		/* count of IPv4 addresses */
152 static int num_v6 = 0;		/* count of IPv6 addresses */
153 static int num_ifs4 = 0;	/* count of local IPv4 interfaces */
154 static int num_ifs6 = 0;	/* count of local IPv6 interfaces */
155 
156 static int nprobes = 3;		/* number of probes */
157 static int max_ttl = 30;	/* max number of hops */
158 static int first_ttl = 1;	/* initial number of hops */
159 ushort_t ident;			/* used to authenticate replies */
160 ushort_t port = 32768 + 666;	/* start udp dest port # for probe packets */
161 
162 static int options = 0;		/* socket options */
163 boolean_t verbose = _B_FALSE;	/* verbose output */
164 static int waittime = 5;	/* time to wait for response (in seconds) */
165 static struct timeval delay = {0, 0}; /* delay between consecutive probe */
166 boolean_t nflag = _B_FALSE;	/* print addresses numerically */
167 static boolean_t showttl = _B_FALSE; /* print the ttl(hop limit) of recvd pkt */
168 boolean_t useicmp = _B_FALSE;  	/* use icmp echo instead of udp packets */
169 boolean_t docksum = _B_TRUE;	/* calculate checksums */
170 static boolean_t collect_stat = _B_FALSE;	/* print statistics */
171 boolean_t settos = _B_FALSE;   	/* set type-of-service field */
172 int dontfrag = 0;		/* IP*_DONTFRAG */
173 static int max_timeout = 5;	/* quit after this consecutive timeouts */
174 static boolean_t probe_all = _B_FALSE;	/* probe all the IFs of the target */
175 static boolean_t pick_src = _B_FALSE;	/* traceroute picks the src address */
176 
177 /*
178  * flow and class are specific to IPv6, tos and off are specific to IPv4.
179  * Each protocol uses the ones that are specific to itself, and ignores
180  * others.
181  */
182 static uint_t flow = 0;		/* IPv6 flow info */
183 static uint_t class = 0;	/* IPv6 class */
184 uchar_t tos = 0;		/* IPv4 type-of-service */
185 ushort_t off = 0;		/* set DF bit */
186 
187 static jmp_buf env;		/* stack environment for longjmp() */
188 boolean_t raw_req;		/* if sndsock for IPv4 must be raw */
189 
190 /*
191  * Name service lookup related data.
192  */
193 static mutex_t tr_nslock = ERRORCHECKMUTEX;
194 static boolean_t tr_nsactive = _B_FALSE;	/* Lookup ongoing */
195 static hrtime_t tr_nsstarttime;			/* Start time */
196 static int tr_nssleeptime = 2;			/* Interval between checks */
197 static int tr_nswarntime = 2;			/* Interval to warn after */
198 
199 /* Forwards */
200 static uint_t calc_packetlen(int, struct pr_set *);
201 extern int check_reply(struct msghdr *, int, int, uchar_t *, uchar_t *);
202 extern int check_reply6(struct msghdr *, int, int, uchar_t *, uchar_t *);
203 static double deltaT(struct timeval *, struct timeval *);
204 static char *device_name(struct ifaddrlist *, int, union any_in_addr *,
205     struct pr_set *);
206 extern void *find_ancillary_data(struct msghdr *, int, int);
207 static boolean_t has_addr(struct addrinfo *, union any_in_addr *);
208 static struct ifaddrlist *find_device(struct ifaddrlist *, int, char *);
209 static struct ifaddrlist *find_ifaddr(struct ifaddrlist *, int,
210     union any_in_addr *, int);
211 static void get_gwaddrs(char **, int, union any_in_addr *,
212     union any_in_addr *, int *, int *);
213 static void get_hostinfo(char *, int, struct addrinfo **);
214 char *inet_name(union any_in_addr *, int);
215 ushort_t in_cksum(ushort_t *, int);
216 extern int ip_hdr_length_v6(ip6_t *, int, uint8_t *);
217 extern char *pr_type(uchar_t);
218 extern char *pr_type6(uchar_t);
219 extern void print_addr(uchar_t *, int, struct sockaddr *);
220 extern void print_addr6(uchar_t *, int, struct sockaddr *);
221 extern boolean_t print_icmp_other(uchar_t, uchar_t);
222 extern boolean_t print_icmp_other6(uchar_t, uchar_t);
223 static void print_stats(int, int, double, double, double, double);
224 static void print_unknown_host_msg(const char *, const char *);
225 static void record_stats(double, int *, double *, double *, double *, double *);
226 static void resolve_nodes(int *, struct addrinfo **);
227 static void select_src_addr(union any_in_addr *, union any_in_addr *, int);
228 extern void send_probe(int, struct sockaddr *, struct ip *, int, int,
229     struct timeval *, int);
230 extern void send_probe6(int, struct msghdr *, struct ip *, int, int,
231     struct timeval *, int);
232 extern void set_ancillary_data(struct msghdr *, int, union any_in_addr *, int,
233     uint_t);
234 extern struct ip *set_buffers(int);
235 extern struct ip *set_buffers6(int);
236 extern void set_IPv4opt_sourcerouting(int, union any_in_addr *,
237     union any_in_addr *);
238 static void set_sin(struct sockaddr *, union any_in_addr *, int);
239 static int set_src_addr(struct pr_set *, struct ifaddrlist **);
240 static void setup_protocol(struct pr_set *, int);
241 static void setup_socket(struct pr_set *, int);
242 static void sig_handler(int);
243 static int str2int(const char *, const char *, int, int);
244 static double str2dbl(const char *, const char *, double, double);
245 static void trace_it(struct addrinfo *);
246 static void traceroute(union any_in_addr *, struct msghdr *, struct pr_set *,
247     int, struct ifaddrlist *);
248 static void tv_sub(struct timeval *, struct timeval *);
249 static void usage(void);
250 static int wait_for_reply(int, struct msghdr *, struct timeval *);
251 static double xsqrt(double);
252 static void *ns_warning_thr(void *);
253 
254 /*
255  * main
256  */
257 int
258 main(int argc, char **argv)
259 {
260 	struct addrinfo *ai_dst = NULL;		/* destination host */
261 	/*
262 	 * "probing_successful" indicates if we could successfully send probes,
263 	 * not necessarily received reply from the target (this behavior is from
264 	 * the original traceroute). It's _B_FALSE if packlen is invalid, or no
265 	 * interfaces found.
266 	 */
267 	boolean_t probing_successful = _B_FALSE;
268 	int longjmp_return;			/* return value from longjump */
269 	int i = 0;
270 	char *cp;
271 	int op;
272 	char *ep;
273 	char temp_buf[INET6_ADDRSTRLEN];	/* use for inet_ntop() */
274 	double pause;
275 
276 	/*
277 	 * A raw socket will be used for IPv4 if there is sufficient
278 	 * privilege.
279 	 */
280 	raw_req = priv_ineffect(PRIV_NET_RAWACCESS);
281 
282 	/*
283 	 * We'll need the privilege only when we open the sockets; that's
284 	 * when we'll fail if the program has insufficient privileges.
285 	 */
286 	(void) __init_suid_priv(PU_CLEARLIMITSET, PRIV_NET_ICMPACCESS,
287 	    raw_req ? PRIV_NET_RAWACCESS : NULL, NULL);
288 
289 	(void) setlinebuf(stdout);
290 
291 	if ((cp = strrchr(argv[0], '/')) != NULL)
292 		prog = cp + 1;
293 	else
294 		prog = argv[0];
295 
296 	opterr = 0;
297 	while ((op = getopt(argc, argv, "adFIlnrSvxA:c:f:g:i:L:m:P:p:Q:q:s:"
298 	    "t:w:")) != EOF) {
299 		switch (op) {
300 		case 'A':
301 			if (strcmp(optarg, "inet") == 0) {
302 				family_input = AF_INET;
303 			} else if (strcmp(optarg, "inet6") == 0) {
304 				family_input = AF_INET6;
305 			} else {
306 				Fprintf(stderr,
307 				    "%s: unknown address family %s\n",
308 				    prog, optarg);
309 				exit(EXIT_FAILURE);
310 			}
311 			break;
312 
313 		case 'a':
314 			probe_all = _B_TRUE;
315 			break;
316 
317 		case 'c':
318 			class = str2int(optarg, "traffic class", 0,
319 			    MAX_TRAFFIC_CLASS);
320 			break;
321 
322 		case 'd':
323 			options |= SO_DEBUG;
324 			break;
325 
326 		case 'f':
327 			first_ttl = str2int(optarg, "first ttl", 1, MAXTTL);
328 			break;
329 
330 		case 'F':
331 			off = IP_DF;
332 			dontfrag = 1;
333 			break;
334 
335 		case 'g':
336 			if (!raw_req) {
337 				Fprintf(stderr,
338 				    "%s: privilege to specify a loose source "
339 				    "route gateway is unavailable\n",
340 				    prog);
341 				exit(EXIT_FAILURE);
342 			}
343 			if (gw_count >= MAXMAX_GWS) {
344 				Fprintf(stderr,
345 				    "%s: Too many gateways\n", prog);
346 				exit(EXIT_FAILURE);
347 			}
348 			gwlist[gw_count] = strdup(optarg);
349 			if (gwlist[gw_count] == NULL) {
350 				Fprintf(stderr, "%s: strdup %s\n", prog,
351 				    strerror(errno));
352 				exit(EXIT_FAILURE);
353 			}
354 
355 			++gw_count;
356 			break;
357 
358 		case 'l':
359 			showttl = _B_TRUE;
360 			break;
361 
362 		case 'i':
363 			/* this can be IF name or IF index */
364 			if_index = (uint_t)strtol(optarg, &ep, 10);
365 
366 			/* convert IF index <-->  IF name */
367 			if (errno != 0 || *ep != '\0') {
368 				device = optarg;
369 				if_index = if_nametoindex((const char *)device);
370 
371 				/*
372 				 * In case it fails, check to see if the problem
373 				 * is other than "IF not found".
374 				 */
375 				if (if_index == 0 && errno != ENXIO) {
376 					Fprintf(stderr, "%s: if_nametoindex:"
377 					    "%s\n", prog, strerror(errno));
378 					exit(EXIT_FAILURE);
379 				}
380 			} else {
381 				device = (char *)malloc(LIFNAMSIZ + 1);
382 				if (device == NULL) {
383 					Fprintf(stderr, "%s: malloc: %s\n",
384 					    prog, strerror(errno));
385 					exit(EXIT_FAILURE);
386 				}
387 
388 				device = if_indextoname(if_index, device);
389 				if (device != NULL) {
390 					device[LIFNAMSIZ] = '\0';
391 				} else if (errno != ENXIO) {
392 					/*
393 					 * The problem was other than "index
394 					 * not found".
395 					 */
396 					Fprintf(stderr, "%s: if_indextoname:"
397 					    "%s\n", prog, strerror(errno));
398 					exit(EXIT_FAILURE);
399 				}
400 			}
401 
402 			if (device == NULL || if_index == 0) {
403 				Fprintf(stderr, "%s: interface %s "
404 				    "doesn't match any actual interfaces\n",
405 				    prog, optarg);
406 				exit(EXIT_FAILURE);
407 			}
408 			break;
409 
410 		case 'I':
411 			useicmp = _B_TRUE;
412 			break;
413 
414 		case 'L':
415 			flow = str2int(optarg, "flow label", 0, MAX_FLOW_LABEL);
416 			break;
417 
418 		case 'm':
419 			max_ttl = str2int(optarg, "max ttl(hop limit)", 1,
420 			    MAXTTL);
421 			break;
422 
423 		case 'n':
424 			nflag = _B_TRUE;
425 			break;
426 
427 		case 'P':
428 			pause = str2dbl(optarg, "pause", 0, INT_MAX);
429 			delay.tv_sec = (time_t)pause;
430 			delay.tv_usec = (suseconds_t)((pause - delay.tv_sec) *
431 			    1000000);
432 			break;
433 
434 		case 'p':
435 			port = str2int(optarg, "port", 1, MAX_PORT);
436 			break;
437 
438 		case 'Q':
439 			max_timeout = str2int(optarg, "max timeout", 1, -1);
440 			break;
441 
442 		case 'q':
443 			nprobes = str2int(optarg, "nprobes", 1, -1);
444 			break;
445 
446 		case 'r':
447 			options |= SO_DONTROUTE;
448 			break;
449 
450 		case 'S':
451 			collect_stat = _B_TRUE;
452 			break;
453 
454 		case 's':
455 			/*
456 			 * set the ip source address of the outbound
457 			 * probe (e.g., on a multi-homed host).
458 			 */
459 			source_input = optarg;
460 			break;
461 
462 		case 't':
463 			tos = (uchar_t)str2int(optarg, "tos", 0, MAX_TOS);
464 			settos = _B_TRUE;
465 			break;
466 
467 		case 'v':
468 			verbose = _B_TRUE;
469 			break;
470 
471 		case 'x':
472 			docksum = _B_FALSE;
473 			break;
474 
475 		case 'w':
476 			waittime = str2int(optarg, "wait time", 2, -1);
477 			break;
478 
479 		default:
480 			usage();
481 			break;
482 		}
483 	}
484 
485 	/*
486 	 * If it's probe_all, SIGQUIT makes traceroute exit(). But we set the
487 	 * address to jump back to in traceroute(). Until then, we'll need to
488 	 * temporarily specify one.
489 	 */
490 	if (probe_all) {
491 		if ((longjmp_return = setjmp(env)) != 0) {
492 			if (longjmp_return == SIGQUIT) {
493 				Printf("(exiting)\n");
494 				exit(EXIT_SUCCESS);
495 			} else {		/* should never happen */
496 				exit(EXIT_FAILURE);
497 			}
498 		}
499 		(void) signal(SIGQUIT, sig_handler);
500 	}
501 
502 	if ((gw_count > 0) && (options & SO_DONTROUTE)) {
503 		Fprintf(stderr, "%s: loose source route gateways (-g)"
504 		    " cannot be specified when probe packets are sent"
505 		    " directly to a host on an attached network (-r)\n",
506 		    prog);
507 		exit(EXIT_FAILURE);
508 	}
509 
510 	i = argc - optind;
511 	if (i == 1 || i == 2) {
512 		hostname = argv[optind];
513 
514 		if (i == 2) {
515 			/* accept any length now, we'll check it later */
516 			packlen_input = str2int(argv[optind + 1],
517 			    "packet length", 0, -1);
518 		}
519 	} else {
520 		usage();
521 	}
522 
523 	if (first_ttl > max_ttl) {
524 		Fprintf(stderr,
525 		    "%s: first ttl(hop limit) (%d) may not be greater"
526 		    " than max ttl(hop limit) (%d)\n",
527 		    prog, first_ttl, max_ttl);
528 		exit(EXIT_FAILURE);
529 	}
530 
531 	/*
532 	 * Start up the name services warning thread.
533 	 */
534 	if (thr_create(NULL, 0, ns_warning_thr, NULL,
535 	    THR_DETACHED | THR_DAEMON, NULL) != 0) {
536 		Fprintf(stderr, "%s: failed to create name services "
537 		    "thread: %s\n", prog, strerror(errno));
538 		exit(EXIT_FAILURE);
539 	}
540 
541 
542 	/* resolve hostnames */
543 	resolve_nodes(&family_input, &ai_dst);
544 	if (ai_dst == NULL) {
545 		exit(EXIT_FAILURE);
546 	}
547 
548 	/*
549 	 * If it's probe_all, SIGINT makes traceroute skip to probing next IP
550 	 * address of the target. The new interrupt handler is assigned in
551 	 * traceroute() function. Until then let's ignore the signal.
552 	 */
553 	if (probe_all)
554 		(void) signal(SIGINT, SIG_IGN);
555 
556 	ident = (getpid() & 0xffff) | 0x8000;
557 
558 	/*
559 	 * We KNOW that probe_all == TRUE if family is AF_UNSPEC,
560 	 * since family is set to the specific AF found unless it's
561 	 * probe_all. So if family == AF_UNSPEC, we need to init pr4 and pr6.
562 	 */
563 	switch (family_input) {
564 	case AF_UNSPEC:
565 		pr4 = (struct pr_set *)malloc(sizeof (struct pr_set));
566 		if (pr4 == NULL) {
567 			Fprintf(stderr,
568 			    "%s: malloc %s\n", prog, strerror(errno));
569 			exit(EXIT_FAILURE);
570 		}
571 		pr6 = (struct pr_set *)malloc(sizeof (struct pr_set));
572 		if (pr6 == NULL) {
573 			Fprintf(stderr,
574 			    "%s: malloc %s\n", prog, strerror(errno));
575 			exit(EXIT_FAILURE);
576 		}
577 		setup_protocol(pr6, AF_INET6);
578 		setup_protocol(pr4, AF_INET);
579 		outip6 = (*pr6->set_buffers_fn)(pr6->packlen);
580 		setup_socket(pr6, pr6->packlen);
581 
582 		outip4 = (*pr4->set_buffers_fn)(pr4->packlen);
583 		setup_socket(pr4, pr4->packlen);
584 		num_ifs6 = set_src_addr(pr6, &al6);
585 		num_ifs4 = set_src_addr(pr4, &al4);
586 		break;
587 	case AF_INET6:
588 		pr6 = (struct pr_set *)malloc(sizeof (struct pr_set));
589 		if (pr6 == NULL) {
590 			Fprintf(stderr,
591 			    "%s: malloc %s\n", prog, strerror(errno));
592 			exit(EXIT_FAILURE);
593 		}
594 		setup_protocol(pr6, AF_INET6);
595 		outip6 = (*pr6->set_buffers_fn)(pr6->packlen);
596 		setup_socket(pr6, pr6->packlen);
597 		num_ifs6 = set_src_addr(pr6, &al6);
598 		break;
599 	case AF_INET:
600 		pr4 = (struct pr_set *)malloc(sizeof (struct pr_set));
601 		if (pr4 == NULL) {
602 			Fprintf(stderr,
603 			    "%s: malloc %s\n", prog, strerror(errno));
604 			exit(EXIT_FAILURE);
605 		}
606 		setup_protocol(pr4, AF_INET);
607 		outip4 = (*pr4->set_buffers_fn)(pr4->packlen);
608 		setup_socket(pr4, pr4->packlen);
609 		num_ifs4 = set_src_addr(pr4, &al4);
610 		break;
611 	default:
612 		Fprintf(stderr, "%s: unknow address family.\n", prog);
613 		exit(EXIT_FAILURE);
614 	}
615 
616 	if (num_v4 + num_v6 > 1 && !probe_all) {
617 		if (ai_dst->ai_family == AF_INET) {
618 			Fprintf(stderr,
619 			    "%s: Warning: %s has multiple addresses;"
620 			    " using %s\n", prog, hostname,
621 			    inet_ntop(AF_INET,
622 			    /* LINTED E_BAD_PTR_CAST_ALIGN */
623 			    (void *)&((struct sockaddr_in *)
624 			    ai_dst->ai_addr)->sin_addr,
625 			    temp_buf, sizeof (temp_buf)));
626 		} else {
627 			Fprintf(stderr,
628 			    "%s: Warning: %s has multiple addresses;"
629 			    " using %s\n", prog, hostname,
630 			    inet_ntop(AF_INET6,
631 			    /* LINTED E_BAD_PTR_CAST_ALIGN */
632 			    (void *)&((struct sockaddr_in6 *)
633 			    ai_dst->ai_addr)->sin6_addr,
634 			    temp_buf, sizeof (temp_buf)));
635 		}
636 	}
637 
638 	if (num_ifs4 + num_ifs6 > 0) {
639 		trace_it(ai_dst);
640 		probing_successful = _B_TRUE;
641 	}
642 
643 	(void) close(rcvsock4);
644 	(void) close(sndsock4);
645 	(void) close(rcvsock6);
646 	(void) close(sndsock6);
647 
648 	/*
649 	 * if we could probe any of the IP addresses of the target, that means
650 	 * this was a successful operation
651 	 */
652 	if (probing_successful)
653 		return (EXIT_SUCCESS);
654 	else
655 		return (EXIT_FAILURE);
656 }
657 
658 /*
659  * print "unknown host" message
660  */
661 static void
662 print_unknown_host_msg(const char *protocol, const char *host)
663 {
664 	Fprintf(stderr, "%s: unknown%s host %s\n", prog, protocol, host);
665 }
666 
667 /*
668  * resolve destination host and gateways
669  */
670 static void
671 resolve_nodes(int *family, struct addrinfo **ai_dstp)
672 {
673 	struct addrinfo *ai_dst = NULL;
674 	struct addrinfo *aip = NULL;
675 	int num_resolved_gw = 0;
676 	int num_resolved_gw6 = 0;
677 
678 	get_hostinfo(hostname, *family, &ai_dst);
679 	if (ai_dst == NULL) {
680 		print_unknown_host_msg("", hostname);
681 		exit(EXIT_FAILURE);
682 	}
683 	/* Get a count of the v4 & v6 addresses */
684 	for (aip = ai_dst; aip != NULL; aip = aip->ai_next) {
685 		switch (aip->ai_family) {
686 		case AF_INET:
687 			num_v4++;
688 			break;
689 		case AF_INET6:
690 			num_v6++;
691 			break;
692 		}
693 	}
694 
695 	if (*family == AF_UNSPEC && !probe_all) {
696 		*family = ai_dst->ai_family;
697 	}
698 
699 	/* resolve gateways */
700 	if (gw_count > 0) {
701 		get_gwaddrs(gwlist, *family, gwIPlist, gwIP6list,
702 		    &num_resolved_gw, &num_resolved_gw6);
703 
704 		/* we couldn't resolve a gateway as an IPv6 host */
705 		if (num_resolved_gw6 != gw_count && num_v6 != 0) {
706 			if (*family == AF_INET6 || *family == AF_UNSPEC)
707 				print_unknown_host_msg(" IPv6",
708 				    gwlist[num_resolved_gw6]);
709 			num_v6 = 0;
710 		}
711 
712 		/* we couldn't resolve a gateway as an IPv4 host */
713 		if (num_resolved_gw != gw_count && num_v4 != 0) {
714 			if (*family == AF_INET || *family == AF_UNSPEC)
715 				print_unknown_host_msg(" IPv4",
716 				    gwlist[num_resolved_gw]);
717 			num_v4 = 0;
718 		}
719 	}
720 
721 	*ai_dstp = (num_v4 + num_v6 > 0) ? ai_dst : NULL;
722 }
723 
724 /*
725  * Given IP address or hostname, return v4 and v6 hostinfo lists.
726  * Assumes that hostinfo ** ptrs are non-null.
727  */
728 static void
729 get_hostinfo(char *host, int family, struct addrinfo **aipp)
730 {
731 	struct addrinfo hints, *ai;
732 	struct in6_addr addr6;
733 	struct in_addr addr;
734 	char abuf[INET6_ADDRSTRLEN];	/* use for inet_ntop() */
735 	int rc;
736 
737 	/*
738 	 * Take care of v4-mapped addresses. It should run same as v4, after
739 	 * chopping off the prefix, leaving the IPv4 address
740 	 */
741 	if ((inet_pton(AF_INET6, host, &addr6) > 0) &&
742 	    IN6_IS_ADDR_V4MAPPED(&addr6)) {
743 		/* peel off the "mapping" stuff, leaving 32 bit IPv4 address */
744 		IN6_V4MAPPED_TO_INADDR(&addr6, &addr);
745 
746 		/* convert it back to a string */
747 		(void) inet_ntop(AF_INET, &addr, abuf, sizeof (abuf));
748 
749 		/* now the host is an IPv4 address */
750 		(void) strcpy(host, abuf);
751 
752 		/*
753 		 * If it's a mapped address, we convert it into IPv4
754 		 * address because traceroute will send and receive IPv4
755 		 * packets for that address. Therefore, it's a failure case to
756 		 * ask get_hostinfo() to treat a mapped address as an IPv6
757 		 * address.
758 		 */
759 		if (family == AF_INET6) {
760 			return;
761 		}
762 	}
763 
764 	(void) memset(&hints, 0, sizeof (hints));
765 	hints.ai_family = family;
766 	hints.ai_flags = AI_ADDRCONFIG | AI_CANONNAME;
767 	rc = getaddrinfo(host, NULL, &hints, &ai);
768 	if (rc != 0) {
769 		if (rc != EAI_NONAME)
770 			Fprintf(stderr, "%s: getaddrinfo: %s\n", prog,
771 			    gai_strerror(rc));
772 		*aipp = NULL;
773 		return;
774 	}
775 	*aipp = ai;
776 }
777 
778 /*
779  * Calculate the packet length to be used, and check against the valid range.
780  * Returns -1 if range check fails.
781  */
782 static uint_t
783 calc_packetlen(int plen_input, struct pr_set *pr)
784 {
785 	int minpacket;			/* min ip packet size */
786 	int optlen;			/* length of ip options */
787 	int plen;
788 
789 	/*
790 	 * LBNL bug fixed: miscalculation of optlen
791 	 */
792 	if (gw_count > 0) {
793 		/*
794 		 * IPv4:
795 		 * ----
796 		 * 5 (NO OPs) + 3 (code, len, ptr) + gateways
797 		 * IP options field can hold up to 9 gateways. But the API
798 		 * allows you to specify only 8, because the last one is the
799 		 * destination host. When this packet is sent, on the wire
800 		 * you see one gateway replaced by 4 NO OPs. The other 1 NO
801 		 * OP is for alignment
802 		 *
803 		 * IPv6:
804 		 * ----
805 		 * Well, formula is different, but the result is same.
806 		 * 8 byte fixed part for Type 0 Routing header, followed by
807 		 * gateway addresses
808 		 */
809 		optlen = 8 + gw_count * pr->addr_len;
810 	} else {
811 		optlen = 0;
812 	}
813 
814 	/* take care of the packet length calculations and checks */
815 	minpacket = pr->ip_hdr_len + sizeof (struct outdata) + optlen;
816 	if (useicmp)
817 		minpacket += pr->icmp_minlen;	/* minimum ICMP header size */
818 	else
819 		minpacket += sizeof (struct udphdr);
820 	plen = plen_input;
821 	if (plen == 0) {
822 		plen = minpacket;		/* minimum sized packet */
823 	} else if (minpacket > plen || plen > IP_MAXPACKET) {
824 		Fprintf(stderr, "%s: %s packet size must be >= %d and <= %d\n",
825 		    prog, pr->name, minpacket, IP_MAXPACKET);
826 		return (0);
827 	}
828 
829 	return (plen);
830 }
831 
832 /*
833  * Sets the source address by resolving -i and -s arguments, or if -i and -s
834  * don't dictate any, it sets the pick_src to make sure traceroute uses the
835  * kernel's pick of the source address.
836  * Returns number of interfaces configured on the source host, 0 on error or
837  * there's no interface which is up amd not a loopback.
838  */
839 static int
840 set_src_addr(struct pr_set *pr, struct ifaddrlist **alp)
841 {
842 	union any_in_addr *ap;
843 	struct ifaddrlist *al = NULL;
844 	struct ifaddrlist *tmp1_al = NULL;
845 	struct ifaddrlist *tmp2_al = NULL;
846 	/* LINTED E_BAD_PTR_CAST_ALIGN */
847 	struct sockaddr_in *sin_from = (struct sockaddr_in *)pr->from;
848 	/* LINTED E_BAD_PTR_CAST_ALIGN */
849 	struct sockaddr_in6 *sin6_from = (struct sockaddr_in6 *)pr->from;
850 	struct addrinfo *aip;
851 	char errbuf[ERRBUFSIZE];
852 	char abuf[INET6_ADDRSTRLEN];		/* use for inet_ntop() */
853 	int num_ifs;				/* all the interfaces  */
854 	int num_src_ifs;			/* exclude loopback and down */
855 	int i;
856 	uint_t ifaddrflags = 0;
857 
858 	source = source_input;
859 
860 	if (device != NULL)
861 		ifaddrflags |= LIFC_UNDER_IPMP;
862 
863 	/* get the interface address list */
864 	num_ifs = ifaddrlist(&al, pr->family, ifaddrflags, errbuf);
865 	if (num_ifs < 0) {
866 		Fprintf(stderr, "%s: ifaddrlist: %s\n", prog, errbuf);
867 		exit(EXIT_FAILURE);
868 	}
869 
870 	num_src_ifs = 0;
871 	for (i = 0; i < num_ifs; i++) {
872 		if (!(al[i].flags & IFF_LOOPBACK) && (al[i].flags & IFF_UP))
873 			num_src_ifs++;
874 	}
875 
876 	if (num_src_ifs == 0) {
877 		Fprintf(stderr, "%s: can't find any %s network interfaces\n",
878 		    prog, pr->name);
879 		return (0);
880 	}
881 
882 	/* verify the device */
883 	if (device != NULL) {
884 		tmp1_al = find_device(al, num_ifs, device);
885 
886 		if (tmp1_al == NULL) {
887 			Fprintf(stderr, "%s: %s (index %d) is an invalid %s"
888 			    " interface\n", prog, device, if_index, pr->name);
889 			free(al);
890 			return (0);
891 		}
892 	}
893 
894 	/* verify the source address */
895 	if (source != NULL) {
896 		get_hostinfo(source, pr->family, &aip);
897 		if (aip == NULL) {
898 			Fprintf(stderr,
899 			    "%s: %s is an invalid %s source address\n",
900 			    prog, source, pr->name);
901 
902 			free(al);
903 			return (0);
904 		}
905 
906 		source = aip->ai_canonname;
907 
908 		if (pr->family == AF_INET)
909 			ap = (union any_in_addr *)
910 			    /* LINTED E_BAD_PTR_CAST_ALIGN */
911 			    &((struct sockaddr_in *)aip->ai_addr)->sin_addr;
912 		else
913 			ap = (union any_in_addr *)
914 			    /* LINTED E_BAD_PTR_CAST_ALIGN */
915 			    &((struct sockaddr_in6 *)aip->ai_addr)->sin6_addr;
916 
917 		/*
918 		 * LBNL bug fixed: used to accept any src address
919 		 */
920 		tmp2_al = find_ifaddr(al, num_ifs, ap, pr->family);
921 		if (tmp2_al == NULL) {
922 			(void) inet_ntop(pr->family, ap, abuf, sizeof (abuf));
923 			Fprintf(stderr, "%s: %s is not a local %s address\n",
924 			    prog, abuf, pr->name);
925 			free(al);
926 			freeaddrinfo(aip);
927 			return (0);
928 		}
929 	}
930 
931 	pick_src = _B_FALSE;
932 
933 	if (source == NULL) {			/* no -s used */
934 		if (device == NULL) {		/* no -i used, no -s used */
935 			pick_src = _B_TRUE;
936 		} else {			/* -i used, no -s used */
937 			/*
938 			 * -i used, but not -s, and it's IPv4: set the source
939 			 * address to whatever the interface has configured on
940 			 * it.
941 			 */
942 			if (pr->family == AF_INET)
943 				set_sin(pr->from, &(tmp1_al->addr), pr->family);
944 			else
945 				pick_src = _B_TRUE;
946 		}
947 	} else {				/* -s used */
948 		if (device == NULL) {		/* no -i used, -s used */
949 			set_sin(pr->from, ap, pr->family);
950 
951 			if (aip->ai_next != NULL) {
952 				(void) inet_ntop(pr->family, pr->from_sin_addr,
953 				    abuf, sizeof (abuf));
954 				Fprintf(stderr, "%s: Warning: %s has multiple "
955 				    "addresses; using %s\n", prog, source,
956 				    abuf);
957 			}
958 		} else {			/* -i and -s used */
959 			/*
960 			 * Make sure the source specified matches the
961 			 * interface address. You only care about this for IPv4
962 			 * IPv6 can handle IF not matching src address
963 			 */
964 			if (pr->family == AF_INET) {
965 				if (!has_addr(aip, &tmp1_al->addr)) {
966 					Fprintf(stderr,
967 					    "%s: %s is not on interface %s\n",
968 					    prog, source, device);
969 					exit(EXIT_FAILURE);
970 				}
971 				/*
972 				 * make sure we use the one matching the
973 				 * interface's address
974 				 */
975 				*ap = tmp1_al->addr;
976 			}
977 
978 			set_sin(pr->from, ap, pr->family);
979 		}
980 	}
981 
982 	/*
983 	 * Binding at this point will set the source address to be used
984 	 * for both IPv4 (when raw IP datagrams are not required) and
985 	 * IPv6.  If the address being bound to is zero, then the kernel
986 	 * will end up choosing the source address when the datagram is
987 	 * sent.
988 	 *
989 	 * For raw IPv4 datagrams, the source address is initialized
990 	 * within traceroute() along with the outbound destination
991 	 * address.
992 	 */
993 	if (pr->family == AF_INET && !raw_req) {
994 		sin_from->sin_family = AF_INET;
995 		sin_from->sin_port = htons(ident);
996 		if (bind(sndsock4, (struct sockaddr *)pr->from,
997 			sizeof (struct sockaddr_in)) < 0) {
998 			Fprintf(stderr, "%s: bind: %s\n", prog,
999 			    strerror(errno));
1000 			exit(EXIT_FAILURE);
1001 		}
1002 	} else if (pr->family == AF_INET6) {
1003 		sin6_from->sin6_family = AF_INET6;
1004 		sin6_from->sin6_port = htons(ident);
1005 		if (bind(sndsock6, (struct sockaddr *)pr->from,
1006 			sizeof (struct sockaddr_in6)) < 0) {
1007 			Fprintf(stderr, "%s: bind: %s\n", prog,
1008 			    strerror(errno));
1009 			exit(EXIT_FAILURE);
1010 		}
1011 
1012 		whereto6.sin6_flowinfo = htonl((class << 20) | flow);
1013 	}
1014 	*alp = al;
1015 	return (num_ifs);
1016 }
1017 
1018 /*
1019  * Returns the complete ifaddrlist structure matching the desired interface
1020  * address. Ignores interfaces which are either down or loopback.
1021  */
1022 static struct ifaddrlist *
1023 find_ifaddr(struct ifaddrlist *al, int len, union any_in_addr *addr,
1024     int family)
1025 {
1026 	struct ifaddrlist *tmp_al = al;
1027 	int i;
1028 	size_t addr_len = (family == AF_INET) ? sizeof (struct in_addr) :
1029 	    sizeof (struct in6_addr);
1030 
1031 	for (i = 0; i < len; i++, tmp_al++) {
1032 		if ((!(tmp_al->flags & IFF_LOOPBACK) &&
1033 		    (tmp_al->flags & IFF_UP)) &&
1034 		    (memcmp(&tmp_al->addr, addr, addr_len) == 0))
1035 			break;
1036 	}
1037 
1038 	if (i < len) {
1039 		return (tmp_al);
1040 	} else {
1041 		return (NULL);
1042 	}
1043 }
1044 
1045 /*
1046  * Returns the complete ifaddrlist structure matching the desired interface name
1047  * Ignores interfaces which are either down or loopback.
1048  */
1049 static struct ifaddrlist *
1050 find_device(struct ifaddrlist *al, int len, char *device)
1051 {
1052 	struct ifaddrlist *tmp_al = al;
1053 	int i;
1054 
1055 	for (i = 0; i < len; i++, tmp_al++) {
1056 		if ((!(tmp_al->flags & IFF_LOOPBACK) &&
1057 		    (tmp_al->flags & IFF_UP)) &&
1058 		    (strcmp(tmp_al->device, device) == 0))
1059 			break;
1060 	}
1061 
1062 	if (i < len) {
1063 		return (tmp_al);
1064 	} else {
1065 		return (NULL);
1066 	}
1067 }
1068 
1069 /*
1070  * returns _B_TRUE if given hostinfo contains the given address
1071  */
1072 static boolean_t
1073 has_addr(struct addrinfo *ai, union any_in_addr *addr)
1074 {
1075 	struct addrinfo *ai_tmp = NULL;
1076 	union any_in_addr *ap;
1077 
1078 	for (ai_tmp = ai; ai_tmp != NULL; ai_tmp = ai_tmp->ai_next) {
1079 		if (ai_tmp->ai_family == AF_INET6)
1080 			continue;
1081 		ap = (union any_in_addr *)
1082 		    /* LINTED E_BAD_PTR_CAST_ALIGN */
1083 		    &((struct sockaddr_in *)ai_tmp->ai_addr)->sin_addr;
1084 		if (memcmp(ap, addr, sizeof (struct in_addr)) == 0)
1085 			break;
1086 	}
1087 
1088 	if (ai_tmp != NULL) {
1089 		return (_B_TRUE);
1090 	} else {
1091 		return (_B_FALSE);
1092 	}
1093 }
1094 
1095 /*
1096  * Resolve the gateway names, splitting results into v4 and v6 lists.
1097  * Gateway addresses are added to the appropriate passed-in array; the
1098  * number of resolved gateways for each af is returned in resolved[6].
1099  * Assumes that passed-in arrays are large enough for MAX_GWS[6] addrs
1100  * and resolved[6] ptrs are non-null; ignores array and counter if the
1101  * address family param makes them irrelevant.
1102  */
1103 static void
1104 get_gwaddrs(char **gwlist, int family, union any_in_addr *gwIPlist,
1105     union any_in_addr *gwIPlist6, int *resolved, int *resolved6)
1106 {
1107 	int i;
1108 	boolean_t check_v4 = _B_TRUE, check_v6 = _B_TRUE;
1109 	struct addrinfo *ai = NULL;
1110 	struct addrinfo *aip = NULL;
1111 
1112 	*resolved = *resolved6 = 0;
1113 	switch (family) {
1114 	case AF_UNSPEC:
1115 		break;
1116 	case AF_INET:
1117 		check_v6 = _B_FALSE;
1118 		break;
1119 	case AF_INET6:
1120 		check_v4 = _B_FALSE;
1121 		break;
1122 	default:
1123 		return;
1124 	}
1125 
1126 	if (check_v4 && gw_count >= MAX_GWS) {
1127 		check_v4 = _B_FALSE;
1128 		Fprintf(stderr, "%s: too many IPv4 gateways\n", prog);
1129 		num_v4 = 0;
1130 	}
1131 	if (check_v6 && gw_count >= MAX_GWS6) {
1132 		check_v6 = _B_FALSE;
1133 		Fprintf(stderr, "%s: too many IPv6 gateways\n", prog);
1134 		num_v6 = 0;
1135 	}
1136 
1137 	for (i = 0; i < gw_count; i++) {
1138 		if (!check_v4 && !check_v6)
1139 			return;
1140 		get_hostinfo(gwlist[i], family, &ai);
1141 		if (ai == NULL)
1142 			return;
1143 		if (check_v4 && num_v4 != 0) {
1144 			check_v4 = _B_FALSE;
1145 			for (aip = ai; aip != NULL; aip = aip->ai_next) {
1146 				if (aip->ai_family == AF_INET) {
1147 					/* LINTED E_BAD_PTR_CAST_ALIGN */
1148 					bcopy(&((struct sockaddr_in *)
1149 					    aip->ai_addr)->sin_addr,
1150 					    &gwIPlist[i].addr,
1151 					    aip->ai_addrlen);
1152 					(*resolved)++;
1153 					check_v4 = _B_TRUE;
1154 					break;
1155 				}
1156 			}
1157 		} else if (check_v4) {
1158 			check_v4 = _B_FALSE;
1159 		}
1160 		if (check_v6 && num_v6 != 0) {
1161 			check_v6 = _B_FALSE;
1162 			for (aip = ai; aip != NULL; aip = aip->ai_next) {
1163 				if (aip->ai_family == AF_INET6) {
1164 					/* LINTED E_BAD_PTR_CAST_ALIGN */
1165 					bcopy(&((struct sockaddr_in6 *)
1166 					    aip->ai_addr)->sin6_addr,
1167 					    &gwIPlist6[i].addr6,
1168 					    aip->ai_addrlen);
1169 					(*resolved6)++;
1170 					check_v6 = _B_TRUE;
1171 					break;
1172 				}
1173 			}
1174 		} else if (check_v6) {
1175 			check_v6 = _B_FALSE;
1176 		}
1177 	}
1178 	freeaddrinfo(ai);
1179 }
1180 
1181 /*
1182  * set protocol specific values here
1183  */
1184 static void
1185 setup_protocol(struct pr_set *pr, int family)
1186 {
1187 	/*
1188 	 * Set the global variables for each AF. This is going to save us lots
1189 	 * of "if (family == AF_INET)... else .."
1190 	 */
1191 	pr->family = family;
1192 
1193 	if (family == AF_INET) {
1194 		if (!docksum) {
1195 			Fprintf(stderr,
1196 			    "%s: Warning: checksums disabled\n", prog);
1197 		}
1198 		(void) strcpy(pr->name, "IPv4");
1199 		(void) strcpy(pr->icmp, "icmp");
1200 		pr->icmp_minlen = ICMP_MINLEN;
1201 		pr->addr_len = sizeof (struct in_addr);
1202 		pr->ip_hdr_len = sizeof (struct ip);
1203 		pr->sock_size = sizeof (struct sockaddr_in);
1204 		pr->to = (struct sockaddr *)&whereto;
1205 		pr->from = (struct sockaddr *)&wherefrom;
1206 		pr->from_sin_addr = (void *)&wherefrom.sin_addr;
1207 		pr->gwIPlist = gwIPlist;
1208 		pr->set_buffers_fn = set_buffers;
1209 		pr->check_reply_fn = check_reply;
1210 		pr->print_icmp_other_fn = print_icmp_other;
1211 		pr->print_addr_fn = print_addr;
1212 		pr->packlen = calc_packetlen(packlen_input, pr);
1213 	} else {
1214 		(void) strcpy(pr->name, "IPv6");
1215 		(void) strcpy(pr->icmp, "ipv6-icmp");
1216 		pr->icmp_minlen = ICMP6_MINLEN;
1217 		pr->addr_len = sizeof (struct in6_addr);
1218 		pr->ip_hdr_len = sizeof (struct ip6_hdr);
1219 		pr->sock_size = sizeof (struct sockaddr_in6);
1220 		pr->to = (struct sockaddr *)&whereto6;
1221 		pr->from = (struct sockaddr *)&wherefrom6;
1222 		pr->from_sin_addr = (void *)&wherefrom6.sin6_addr;
1223 		pr->gwIPlist = gwIP6list;
1224 		pr->set_buffers_fn = set_buffers6;
1225 		pr->check_reply_fn = check_reply6;
1226 		pr->print_icmp_other_fn = print_icmp_other6;
1227 		pr->print_addr_fn = print_addr6;
1228 		pr->packlen = calc_packetlen(packlen_input, pr);
1229 	}
1230 	if (pr->packlen == 0)
1231 		exit(EXIT_FAILURE);
1232 }
1233 
1234 /*
1235  * setup the sockets for the given protocol's address family
1236  */
1237 static void
1238 setup_socket(struct pr_set *pr, int packet_len)
1239 {
1240 	int on = 1;
1241 	struct protoent *pe;
1242 	int type;
1243 	int proto;
1244 	int int_op;
1245 	int rsock;
1246 	int ssock;
1247 
1248 	if ((pe = getprotobyname(pr->icmp)) == NULL) {
1249 		Fprintf(stderr, "%s: unknown protocol %s\n", prog, pr->icmp);
1250 		exit(EXIT_FAILURE);
1251 	}
1252 
1253 	/* privilege bracketing */
1254 	(void) __priv_bracket(PRIV_ON);
1255 
1256 	if ((rsock = socket(pr->family, SOCK_RAW, pe->p_proto)) < 0) {
1257 		Fprintf(stderr, "%s: icmp socket: %s\n", prog, strerror(errno));
1258 		exit(EXIT_FAILURE);
1259 	}
1260 
1261 	if (options & SO_DEBUG) {
1262 		if (setsockopt(rsock, SOL_SOCKET, SO_DEBUG, (char *)&on,
1263 		    sizeof (on)) < 0) {
1264 			Fprintf(stderr, "%s: SO_DEBUG: %s\n", prog,
1265 			    strerror(errno));
1266 			exit(EXIT_FAILURE);
1267 		}
1268 	}
1269 	if (options & SO_DONTROUTE) {
1270 		if (setsockopt(rsock, SOL_SOCKET, SO_DONTROUTE, (char *)&on,
1271 		    sizeof (on)) < 0) {
1272 			Fprintf(stderr, "%s: SO_DONTROUTE: %s\n", prog,
1273 			    strerror(errno));
1274 			exit(EXIT_FAILURE);
1275 		}
1276 	}
1277 
1278 	if (pr->family == AF_INET6) {
1279 		/* Enable receipt of destination address info */
1280 		if (setsockopt(rsock, IPPROTO_IPV6, IPV6_RECVPKTINFO,
1281 		    (char *)&on, sizeof (on)) < 0) {
1282 			Fprintf(stderr, "%s: IPV6_RECVPKTINFO: %s\n", prog,
1283 			    strerror(errno));
1284 			exit(EXIT_FAILURE);
1285 		}
1286 		/* Enable receipt of hoplimit info */
1287 		if (setsockopt(rsock, IPPROTO_IPV6, IPV6_RECVHOPLIMIT,
1288 		    (char *)&on, sizeof (on)) < 0) {
1289 			Fprintf(stderr, "%s: IPV6_RECVHOPLIMIT: %s\n", prog,
1290 			    strerror(errno));
1291 			exit(EXIT_FAILURE);
1292 		}
1293 
1294 	}
1295 
1296 	/*
1297 	 * Initialize the socket type and protocol based on the address
1298 	 * family, whether or not a raw IP socket is required (for IPv4)
1299 	 * or whether ICMP will be used instead of UDP.
1300 	 *
1301 	 * For historical reasons, the datagrams sent out by
1302 	 * traceroute(8) do not have the "don't fragment" flag set.  For
1303 	 * this reason as well as the ability to set the Loose Source and
1304 	 * Record Route (LSRR) option, a raw IP socket will be used for
1305 	 * IPv4 when run in the global zone.  Otherwise, the actual
1306 	 * datagram that will be sent will be a regular UDP or ICMP echo
1307 	 * request packet.  However for convenience and for future options
1308 	 * when other IP header information may be specified using
1309 	 * traceroute, the buffer including the raw IP and UDP or ICMP
1310 	 * header is always filled in.  When the probe is actually sent,
1311 	 * the size of the request and the start of the packet is set
1312 	 * according to the type of datagram to send.
1313 	 */
1314 	if (pr->family == AF_INET && raw_req) {
1315 		type = SOCK_RAW;
1316 		proto = IPPROTO_RAW;
1317 	} else if (useicmp) {
1318 		type = SOCK_RAW;
1319 		if (pr->family == AF_INET)
1320 			proto = IPPROTO_ICMP;
1321 		else
1322 			proto = IPPROTO_ICMPV6;
1323 	} else {
1324 		type = SOCK_DGRAM;
1325 		proto = IPPROTO_UDP;
1326 	}
1327 	ssock = socket(pr->family, type, proto);
1328 
1329 	if (ssock < 0) {
1330 		if (proto == IPPROTO_RAW) {
1331 			Fprintf(stderr, "%s: raw socket: %s\n", prog,
1332 			    strerror(errno));
1333 		} else if (proto == IPPROTO_UDP) {
1334 			Fprintf(stderr, "%s: udp socket: %s\n", prog,
1335 			    strerror(errno));
1336 		} else {
1337 			Fprintf(stderr, "%s: icmp socket: %s\n", prog,
1338 			    strerror(errno));
1339 		}
1340 		exit(EXIT_FAILURE);
1341 	}
1342 
1343 	if (setsockopt(ssock, SOL_SOCKET, SO_SNDBUF, (char *)&packet_len,
1344 	    sizeof (packet_len)) < 0) {
1345 		Fprintf(stderr, "%s: SO_SNDBUF: %s\n", prog, strerror(errno));
1346 		exit(EXIT_FAILURE);
1347 	}
1348 
1349 	if (pr->family == AF_INET && raw_req) {
1350 		if (setsockopt(ssock, IPPROTO_IP, IP_HDRINCL, (char *)&on,
1351 		    sizeof (on)) < 0) {
1352 			Fprintf(stderr, "%s: IP_HDRINCL: %s\n", prog,
1353 			    strerror(errno));
1354 			exit(EXIT_FAILURE);
1355 		}
1356 	}
1357 
1358 	if (options & SO_DEBUG) {
1359 		if (setsockopt(ssock, SOL_SOCKET, SO_DEBUG, (char *)&on,
1360 		    sizeof (on)) < 0) {
1361 			Fprintf(stderr, "%s: SO_DEBUG: %s\n", prog,
1362 			    strerror(errno));
1363 			exit(EXIT_FAILURE);
1364 		}
1365 	}
1366 	if (options & SO_DONTROUTE) {
1367 		if (setsockopt(ssock, SOL_SOCKET, SO_DONTROUTE,
1368 		    (char *)&on, sizeof (on)) < 0) {
1369 			Fprintf(stderr, "%s: SO_DONTROUTE: %s\n", prog,
1370 			    strerror(errno));
1371 			exit(EXIT_FAILURE);
1372 		}
1373 	}
1374 
1375 	/*
1376 	 * If a raw IPv4 packet is going to be sent, the Type of Service
1377 	 * field in the packet will be initialized in set_buffers().
1378 	 * Otherwise, it is initialized here using the IPPROTO_IP level
1379 	 * socket option.
1380 	 */
1381 	if (settos && !raw_req) {
1382 		int_op = tos;
1383 		if (setsockopt(ssock, IPPROTO_IP, IP_TOS, (char *)&int_op,
1384 		    sizeof (int_op)) < 0) {
1385 			Fprintf(stderr, "%s: IP_TOS: %s\n", prog,
1386 			    strerror(errno));
1387 			exit(EXIT_FAILURE);
1388 		}
1389 	}
1390 
1391 	/* We enable or disable to not depend on the kernel default */
1392 	if (pr->family == AF_INET) {
1393 		if (setsockopt(ssock, IPPROTO_IP, IP_DONTFRAG,
1394 		    (char *)&dontfrag, sizeof (dontfrag)) == -1) {
1395 			Fprintf(stderr, "%s: IP_DONTFRAG %s\n", prog,
1396 			    strerror(errno));
1397 			exit(EXIT_FAILURE);
1398 		}
1399 	} else {
1400 		if (setsockopt(ssock, IPPROTO_IPV6, IPV6_DONTFRAG,
1401 		    (char *)&dontfrag, sizeof (dontfrag)) == -1) {
1402 			Fprintf(stderr, "%s: IPV6_DONTFRAG %s\n", prog,
1403 			    strerror(errno));
1404 			exit(EXIT_FAILURE);
1405 		}
1406 	}
1407 
1408 	if (pr->family == AF_INET) {
1409 		rcvsock4 = rsock;
1410 		sndsock4 = ssock;
1411 	} else {
1412 		rcvsock6 = rsock;
1413 		sndsock6 = ssock;
1414 	}
1415 	/* Revert to non-privileged user after configuring sockets */
1416 	(void) __priv_bracket(PRIV_OFF);
1417 }
1418 
1419 /*
1420  * If we are "probing all", this function calls traceroute() for each IP address
1421  * of the target, otherwise calls only once. Returns _B_FALSE if traceroute()
1422  * fails.
1423  */
1424 static void
1425 trace_it(struct addrinfo *ai_dst)
1426 {
1427 	struct msghdr msg6;
1428 	int num_dst_IPaddrs;
1429 	struct addrinfo *aip;
1430 	int i;
1431 
1432 	if (!probe_all)
1433 		num_dst_IPaddrs = 1;
1434 	else
1435 		num_dst_IPaddrs = num_v4 + num_v6;
1436 
1437 	/*
1438 	 * Initialize the msg6 structure using the hoplimit for the first
1439 	 * probe packet, gateway addresses and the outgoing interface index.
1440 	 */
1441 	if (ai_dst->ai_family == AF_INET6 || (probe_all && num_v6)) {
1442 		msg6.msg_control = NULL;
1443 		msg6.msg_controllen = 0;
1444 		set_ancillary_data(&msg6, first_ttl, pr6->gwIPlist, gw_count,
1445 		    if_index);
1446 	}
1447 
1448 	/* run traceroute for all the IP addresses of the multihomed dest */
1449 	for (aip = ai_dst, i = 0; i < num_dst_IPaddrs && aip != NULL; i++) {
1450 		union any_in_addr *addrp;
1451 		if (aip->ai_family == AF_INET) {
1452 			addrp = (union any_in_addr *)
1453 			    /* LINTED E_BAD_PTR_CAST_ALIGN */
1454 			    &((struct sockaddr_in *)
1455 			    aip->ai_addr)->sin_addr;
1456 			set_sin((struct sockaddr *)pr4->to, addrp,
1457 			    aip->ai_family);
1458 			traceroute(addrp, &msg6, pr4, num_ifs4, al4);
1459 		} else {
1460 			addrp = (union any_in_addr *)
1461 			    /* LINTED E_BAD_PTR_CAST_ALIGN */
1462 			    &((struct sockaddr_in6 *)
1463 			    aip->ai_addr)->sin6_addr;
1464 			set_sin((struct sockaddr *)pr6->to, addrp,
1465 			    aip->ai_family);
1466 			traceroute(addrp, &msg6, pr6, num_ifs6, al6);
1467 		}
1468 		aip = aip->ai_next;
1469 		if (i < (num_dst_IPaddrs - 1))
1470 			(void) putchar('\n');
1471 	}
1472 }
1473 
1474 /*
1475  * set the IP address in a sockaddr struct
1476  */
1477 static void
1478 set_sin(struct sockaddr *sock, union any_in_addr *addr, int family)
1479 {
1480 	sock->sa_family = family;
1481 
1482 	if (family == AF_INET)
1483 		/* LINTED E_BAD_PTR_CAST_ALIGN */
1484 		((struct sockaddr_in *)sock)->sin_addr = addr->addr;
1485 	else
1486 		/* LINTED E_BAD_PTR_CAST_ALIGN */
1487 		((struct sockaddr_in6 *)sock)->sin6_addr = addr->addr6;
1488 }
1489 
1490 /*
1491  * returns the IF name on which the given IP address is configured
1492  */
1493 static char *
1494 device_name(struct ifaddrlist *al, int len, union any_in_addr *ip_addr,
1495     struct pr_set *pr)
1496 {
1497 	int i;
1498 	struct ifaddrlist *tmp_al;
1499 
1500 	tmp_al = al;
1501 
1502 	for (i = 0; i < len; i++, tmp_al++) {
1503 		if (memcmp(&tmp_al->addr, ip_addr, pr->addr_len) == 0) {
1504 			return (tmp_al->device);
1505 		}
1506 	}
1507 
1508 	return (NULL);
1509 }
1510 
1511 /*
1512  * Trace the route to the host with given IP address.
1513  */
1514 static void
1515 traceroute(union any_in_addr *ip_addr, struct msghdr *msg6, struct pr_set *pr,
1516     int num_ifs, struct ifaddrlist *al)
1517 {
1518 	int ttl;
1519 	int probe;
1520 	uchar_t type;				/* icmp type */
1521 	uchar_t code;				/* icmp code */
1522 	int reply;
1523 	int seq = 0;
1524 	char abuf[INET6_ADDRSTRLEN];		/* use for inet_ntop() */
1525 	int longjmp_return;			/* return value from longjump */
1526 	struct ip *ip = (struct ip *)packet;
1527 	boolean_t got_there = _B_FALSE;		/* we hit the destination */
1528 	static boolean_t first_pkt = _B_TRUE;
1529 	int hoplimit;				/* hoplimit for IPv6 packets */
1530 	struct in6_addr addr6;
1531 	int num_src_ifs;			/* excludes down and loopback */
1532 	struct msghdr in_msg;
1533 	struct iovec iov;
1534 	int *intp;
1535 	int sndsock;
1536 	int rcvsock;
1537 
1538 	msg6->msg_name = pr->to;
1539 	msg6->msg_namelen = sizeof (struct sockaddr_in6);
1540 	sndsock =  (pr->family == AF_INET) ? sndsock4 : sndsock6;
1541 	rcvsock =  (pr->family == AF_INET) ? rcvsock4 : rcvsock6;
1542 
1543 	/* carry out the source address selection */
1544 	if (pick_src) {
1545 		union any_in_addr src_addr;
1546 		char *dev_name;
1547 		int i;
1548 
1549 		/*
1550 		 * If there's a gateway, a routing header as a consequence, our
1551 		 * kernel picks the source address based on the first hop
1552 		 * address, rather than final destination address.
1553 		 */
1554 		if (gw_count > 0) {
1555 			(void) select_src_addr(pr->gwIPlist, &src_addr,
1556 			    pr->family);
1557 		} else {
1558 			(void) select_src_addr(ip_addr, &src_addr, pr->family);
1559 		}
1560 		set_sin(pr->from, &src_addr, pr->family);
1561 
1562 		/* filter out down and loopback interfaces */
1563 		num_src_ifs = 0;
1564 		for (i = 0; i < num_ifs; i++) {
1565 			if (!(al[i].flags & IFF_LOOPBACK) &&
1566 			    (al[i].flags & IFF_UP))
1567 				num_src_ifs++;
1568 		}
1569 
1570 		if (num_src_ifs > 1) {
1571 			dev_name = device_name(al, num_ifs, &src_addr, pr);
1572 			if (dev_name == NULL)
1573 				dev_name = "?";
1574 
1575 			(void) inet_ntop(pr->family, pr->from_sin_addr, abuf,
1576 			    sizeof (abuf));
1577 			Fprintf(stderr,
1578 			    "%s: Warning: Multiple interfaces found;"
1579 			    " using %s @ %s\n", prog, abuf, dev_name);
1580 		}
1581 	}
1582 
1583 	if (pr->family == AF_INET) {
1584 		outip4->ip_src = *(struct in_addr *)pr->from_sin_addr;
1585 		outip4->ip_dst = ip_addr->addr;
1586 	}
1587 
1588 	/*
1589 	 * If the hostname is an IPv6 literal address, let's not print it twice.
1590 	 */
1591 	if (pr->family == AF_INET6 &&
1592 	    inet_pton(AF_INET6, hostname, &addr6) > 0) {
1593 		Fprintf(stderr, "%s to %s", prog, hostname);
1594 	} else {
1595 		Fprintf(stderr, "%s to %s (%s)", prog, hostname,
1596 		    inet_ntop(pr->family, ip_addr, abuf, sizeof (abuf)));
1597 	}
1598 
1599 	if (source)
1600 		Fprintf(stderr, " from %s", source);
1601 	Fprintf(stderr, ", %d hops max, %d byte packets\n", max_ttl,
1602 	    pr->packlen);
1603 	(void) fflush(stderr);
1604 
1605 	/*
1606 	 * Setup the source routing for IPv4. For IPv6, we did the required
1607 	 * setup in the caller function, trace_it(), because it's independent
1608 	 * from the IP address of target.
1609 	 */
1610 	if (pr->family == AF_INET && gw_count > 0)
1611 		set_IPv4opt_sourcerouting(sndsock, ip_addr, pr->gwIPlist);
1612 
1613 	if (probe_all) {
1614 		/* interrupt handler sig_handler() jumps back to here */
1615 		if ((longjmp_return = setjmp(env)) != 0) {
1616 			switch (longjmp_return) {
1617 			case SIGINT:
1618 				Printf("(skipping)\n");
1619 				return;
1620 			case SIGQUIT:
1621 				Printf("(exiting)\n");
1622 				exit(EXIT_SUCCESS);
1623 			default:	/* should never happen */
1624 				exit(EXIT_FAILURE);
1625 			}
1626 		}
1627 		(void) signal(SIGINT, sig_handler);
1628 	}
1629 
1630 	for (ttl = first_ttl; ttl <= max_ttl; ++ttl) {
1631 		union any_in_addr lastaddr;
1632 		int timeouts = 0;
1633 		double rtt;		/* for statistics */
1634 		int nreceived = 0;
1635 		double rttmin, rttmax;
1636 		double rttsum, rttssq;
1637 		int unreachable;
1638 
1639 		got_there = _B_FALSE;
1640 		unreachable = 0;
1641 
1642 		/*
1643 		 * The following line clears both IPv4 and IPv6 address stored
1644 		 * in the union.
1645 		 */
1646 		lastaddr.addr6 = in6addr_any;
1647 
1648 		if ((ttl == (first_ttl + 1)) && (options & SO_DONTROUTE)) {
1649 			Fprintf(stderr,
1650 			    "%s: host %s is not on a directly-attached"
1651 			    " network\n", prog, hostname);
1652 			break;
1653 		}
1654 
1655 		Printf("%2d ", ttl);
1656 		(void) fflush(stdout);
1657 
1658 		for (probe = 0; (probe < nprobes) && (timeouts < max_timeout);
1659 		    ++probe) {
1660 			int cc;
1661 			struct timeval t1, t2;
1662 
1663 			/*
1664 			 * Put a delay before sending this probe packet. Don't
1665 			 * delay it if it's the very first packet.
1666 			 */
1667 			if (!first_pkt) {
1668 				if (delay.tv_sec > 0)
1669 					(void) sleep((uint_t)delay.tv_sec);
1670 				if (delay.tv_usec > 0)
1671 					(void) usleep(delay.tv_usec);
1672 			} else {
1673 				first_pkt = _B_FALSE;
1674 			}
1675 
1676 			(void) gettimeofday(&t1, NULL);
1677 
1678 			if (pr->family == AF_INET) {
1679 				send_probe(sndsock, pr->to, outip4, seq, ttl,
1680 				    &t1, pr->packlen);
1681 			} else {
1682 				send_probe6(sndsock, msg6, outip6, seq, ttl,
1683 				    &t1, pr->packlen);
1684 			}
1685 
1686 			/* prepare msghdr for recvmsg() */
1687 			in_msg.msg_name = pr->from;
1688 			in_msg.msg_namelen = pr->sock_size;
1689 
1690 			iov.iov_base = (char *)packet;
1691 			iov.iov_len = sizeof (packet);
1692 
1693 			in_msg.msg_iov = &iov;
1694 			in_msg.msg_iovlen = 1;
1695 
1696 			in_msg.msg_control = ancillary_data;
1697 			in_msg.msg_controllen = sizeof (ancillary_data);
1698 
1699 			while ((cc = wait_for_reply(rcvsock, &in_msg,
1700 			    &t1)) != 0) {
1701 				(void) gettimeofday(&t2, NULL);
1702 
1703 				reply = (*pr->check_reply_fn) (&in_msg, cc, seq,
1704 				    &type, &code);
1705 
1706 				in_msg.msg_controllen =
1707 				    sizeof (ancillary_data);
1708 				/* Skip short packet */
1709 				if (reply == REPLY_SHORT_PKT) {
1710 					continue;
1711 				}
1712 
1713 				timeouts = 0;
1714 
1715 				/*
1716 				 * if reply comes from a different host, print
1717 				 * the hostname
1718 				 */
1719 				if (memcmp(pr->from_sin_addr, &lastaddr,
1720 				    pr->addr_len) != 0) {
1721 					(*pr->print_addr_fn) ((uchar_t *)packet,
1722 					    cc, pr->from);
1723 					/* store the address response */
1724 					(void) memcpy(&lastaddr,
1725 					    pr->from_sin_addr, pr->addr_len);
1726 				}
1727 
1728 				rtt = deltaT(&t1, &t2);
1729 				if (collect_stat) {
1730 					record_stats(rtt, &nreceived, &rttmin,
1731 					    &rttmax, &rttsum, &rttssq);
1732 				} else {
1733 					Printf("  %.3f ms", rtt);
1734 				}
1735 
1736 				if (pr->family == AF_INET6) {
1737 					intp = find_ancillary_data(&in_msg,
1738 					    IPPROTO_IPV6, IPV6_HOPLIMIT);
1739 					if (intp == NULL) {
1740 						Fprintf(stderr,
1741 						    "%s: can't find "
1742 						    "IPV6_HOPLIMIT ancillary "
1743 						    "data\n", prog);
1744 						exit(EXIT_FAILURE);
1745 					}
1746 					hoplimit = *intp;
1747 				}
1748 
1749 				if (reply == REPLY_GOT_TARGET) {
1750 					got_there = _B_TRUE;
1751 
1752 					if (((pr->family == AF_INET) &&
1753 					    (ip->ip_ttl <= 1)) ||
1754 					    ((pr->family == AF_INET6) &&
1755 					    (hoplimit <= 1)))
1756 						Printf(" !");
1757 				}
1758 
1759 				if (!collect_stat && showttl) {
1760 					if (pr->family == AF_INET) {
1761 						Printf(" (ttl=%d)",
1762 						    (int)ip->ip_ttl);
1763 					} else if (hoplimit != -1) {
1764 						Printf(" (hop limit=%d)",
1765 						    hoplimit);
1766 					}
1767 				}
1768 
1769 				if (reply == REPLY_GOT_OTHER) {
1770 					if ((*pr->print_icmp_other_fn)
1771 					    (type, code)) {
1772 						unreachable++;
1773 					}
1774 				}
1775 
1776 				/* special case */
1777 				if (pr->family == AF_INET &&
1778 				    type == ICMP_UNREACH &&
1779 				    code == ICMP_UNREACH_PROTOCOL)
1780 					got_there = _B_TRUE;
1781 
1782 				break;
1783 			}
1784 
1785 			seq = (seq + 1) % (MAX_SEQ + 1);
1786 
1787 			if (cc == 0) {
1788 				Printf(" *");
1789 				timeouts++;
1790 			}
1791 
1792 			(void) fflush(stdout);
1793 		}
1794 
1795 		if (collect_stat) {
1796 			print_stats(probe, nreceived, rttmin, rttmax, rttsum,
1797 			    rttssq);
1798 		}
1799 
1800 		(void) putchar('\n');
1801 
1802 		/* either we hit the target or received too many unreachables */
1803 		if (got_there ||
1804 		    (unreachable > 0 && unreachable >= nprobes - 1))
1805 			break;
1806 	}
1807 
1808 	/* Ignore the SIGINT between traceroute() runs */
1809 	if (probe_all)
1810 		(void) signal(SIGINT, SIG_IGN);
1811 }
1812 
1813 /*
1814  * for a given destination address and address family, it finds out what
1815  * source address kernel is going to pick
1816  */
1817 static void
1818 select_src_addr(union any_in_addr *dst_addr, union any_in_addr *src_addr,
1819     int family)
1820 {
1821 	int tmp_fd;
1822 	struct sockaddr *sock;
1823 	struct sockaddr_in *sin;
1824 	struct sockaddr_in6 *sin6;
1825 	size_t sock_len;
1826 
1827 	sock = (struct sockaddr *)malloc(sizeof (struct sockaddr_in6));
1828 	if (sock == NULL) {
1829 		Fprintf(stderr, "%s: malloc %s\n", prog, strerror(errno));
1830 		exit(EXIT_FAILURE);
1831 	}
1832 	(void) bzero(sock, sizeof (struct sockaddr_in6));
1833 
1834 	if (family == AF_INET) {
1835 		/* LINTED E_BAD_PTR_CAST_ALIGN */
1836 		sin = (struct sockaddr_in *)sock;
1837 		sin->sin_family = AF_INET;
1838 		sin->sin_addr = dst_addr->addr;
1839 		sin->sin_port = IPPORT_ECHO;	/* port shouldn't be 0 */
1840 		sock_len = sizeof (struct sockaddr_in);
1841 	} else {
1842 		/* LINTED E_BAD_PTR_CAST_ALIGN */
1843 		sin6 = (struct sockaddr_in6 *)sock;
1844 		sin6->sin6_family = AF_INET6;
1845 		sin6->sin6_addr = dst_addr->addr6;
1846 		sin6->sin6_port = IPPORT_ECHO;	/* port shouldn't be 0 */
1847 		sock_len = sizeof (struct sockaddr_in6);
1848 	}
1849 
1850 	/* open a UDP socket */
1851 	if ((tmp_fd = socket(family, SOCK_DGRAM, 0)) < 0) {
1852 		Fprintf(stderr, "%s: udp socket: %s\n", prog,
1853 		    strerror(errno));
1854 		exit(EXIT_FAILURE);
1855 	}
1856 
1857 	/* connect it */
1858 	if (connect(tmp_fd, sock, sock_len) < 0) {
1859 		/*
1860 		 * If there's no route to the destination, this connect() call
1861 		 * fails. We just return all-zero (wildcard) as the source
1862 		 * address, so that user can get to see "no route to dest"
1863 		 * message, as it'll try to send the probe packet out and will
1864 		 * receive ICMP unreachable.
1865 		 */
1866 		if (family == AF_INET)
1867 			src_addr->addr.s_addr = INADDR_ANY;
1868 		else
1869 			src_addr->addr6 = in6addr_any;
1870 		free(sock);
1871 		return;
1872 	}
1873 
1874 	/* get the local sock info */
1875 	if (getsockname(tmp_fd, sock, &sock_len) < 0) {
1876 		Fprintf(stderr, "%s: getsockname: %s\n", prog,
1877 		    strerror(errno));
1878 		exit(EXIT_FAILURE);
1879 	}
1880 
1881 	if (family == AF_INET) {
1882 		/* LINTED E_BAD_PTR_CAST_ALIGN */
1883 		sin = (struct sockaddr_in *)sock;
1884 		src_addr->addr = sin->sin_addr;
1885 	} else {
1886 		/* LINTED E_BAD_PTR_CAST_ALIGN */
1887 		sin6 = (struct sockaddr_in6 *)sock;
1888 		src_addr->addr6 = sin6->sin6_addr;
1889 	}
1890 
1891 	free(sock);
1892 	(void) close(tmp_fd);
1893 }
1894 
1895 /*
1896  * Checksum routine for Internet Protocol family headers (C Version)
1897  */
1898 ushort_t
1899 in_cksum(ushort_t *addr, int len)
1900 {
1901 	int nleft = len;
1902 	ushort_t *w = addr;
1903 	ushort_t answer;
1904 	int sum = 0;
1905 
1906 	/*
1907 	 *  Our algorithm is simple, using a 32 bit accumulator (sum),
1908 	 *  we add sequential 16 bit words to it, and at the end, fold
1909 	 *  back all the carry bits from the top 16 bits into the lower
1910 	 *  16 bits.
1911 	 */
1912 	while (nleft > 1)  {
1913 		sum += *w++;
1914 		nleft -= 2;
1915 	}
1916 
1917 	/* mop up an odd byte, if necessary */
1918 	if (nleft == 1)
1919 		sum += *(uchar_t *)w;
1920 
1921 	/* add back carry outs from top 16 bits to low 16 bits */
1922 	sum = (sum >> 16) + (sum & 0xffff);	/* add hi 16 to low 16 */
1923 	sum += (sum >> 16);			/* add carry */
1924 	answer = ~sum;				/* truncate to 16 bits */
1925 	return (answer);
1926 }
1927 
1928 /*
1929  * Wait until a reply arrives or timeout occurs. If packet arrived, read it
1930  * return the size of the packet read.
1931  */
1932 static int
1933 wait_for_reply(int sock, struct msghdr *msg, struct timeval *tp)
1934 {
1935 	fd_set fds;
1936 	struct timeval now, wait;
1937 	int cc = 0;
1938 	int result;
1939 
1940 	(void) FD_ZERO(&fds);
1941 	FD_SET(sock, &fds);
1942 
1943 	wait.tv_sec = tp->tv_sec + waittime;
1944 	wait.tv_usec = tp->tv_usec;
1945 	(void) gettimeofday(&now, NULL);
1946 	tv_sub(&wait, &now);
1947 
1948 	if (wait.tv_sec < 0 || wait.tv_usec < 0)
1949 		return (0);
1950 
1951 	result = select(sock + 1, &fds, (fd_set *)NULL, (fd_set *)NULL, &wait);
1952 
1953 	if (result == -1) {
1954 		if (errno != EINTR) {
1955 			Fprintf(stderr, "%s: select: %s\n", prog,
1956 			    strerror(errno));
1957 		}
1958 	} else if (result > 0)
1959 		cc = recvmsg(sock, msg, 0);
1960 
1961 	return (cc);
1962 }
1963 
1964 /*
1965  * Construct an Internet address representation. If the nflag has been supplied,
1966  * give numeric value, otherwise try for symbolic name.
1967  */
1968 char *
1969 inet_name(union any_in_addr *in, int family)
1970 {
1971 	char *cp;
1972 	static boolean_t first = _B_TRUE;
1973 	static char domain[NI_MAXHOST + 1];
1974 	static char line[NI_MAXHOST + 1];	/* assuming		*/
1975 				/* (NI_MAXHOST + 1) >= INET6_ADDRSTRLEN */
1976 	char hbuf[NI_MAXHOST];
1977 	socklen_t slen;
1978 	struct sockaddr_in sin;
1979 	struct sockaddr_in6 sin6;
1980 	struct sockaddr *sa;
1981 	int flags;
1982 
1983 	switch (family) {
1984 	case AF_INET:
1985 		slen = sizeof (struct sockaddr_in);
1986 		sin.sin_addr = in->addr;
1987 		sin.sin_port = 0;
1988 		sa = (struct sockaddr *)&sin;
1989 		break;
1990 	case AF_INET6:
1991 		slen = sizeof (struct sockaddr_in6);
1992 		sin6.sin6_addr = in->addr6;
1993 		sin6.sin6_port = 0;
1994 		sin6.sin6_scope_id = 0;
1995 		sa = (struct sockaddr *)&sin6;
1996 		break;
1997 	default:
1998 		(void) snprintf(line, sizeof (line),
1999 		    "<invalid address family>");
2000 		return (line);
2001 	}
2002 	sa->sa_family = family;
2003 
2004 	if (first && !nflag) {
2005 		/* find out the domain name */
2006 		first = _B_FALSE;
2007 		mutex_enter(&tr_nslock);
2008 		tr_nsactive = _B_TRUE;
2009 		tr_nsstarttime = gethrtime();
2010 		mutex_exit(&tr_nslock);
2011 		if (gethostname(domain, MAXHOSTNAMELEN) == 0 &&
2012 		    (cp = strchr(domain, '.')) != NULL) {
2013 			(void) strncpy(domain, cp + 1, sizeof (domain) - 1);
2014 			domain[sizeof (domain) - 1] = '\0';
2015 		} else {
2016 			domain[0] = '\0';
2017 		}
2018 		mutex_enter(&tr_nslock);
2019 		tr_nsactive = _B_FALSE;
2020 		mutex_exit(&tr_nslock);
2021 	}
2022 
2023 	flags = (nflag) ? NI_NUMERICHOST : NI_NAMEREQD;
2024 	mutex_enter(&tr_nslock);
2025 	tr_nsactive = _B_TRUE;
2026 	tr_nsstarttime = gethrtime();
2027 	mutex_exit(&tr_nslock);
2028 	if (getnameinfo(sa, slen, hbuf, sizeof (hbuf), NULL, 0, flags) != 0) {
2029 		if (inet_ntop(family, (const void *)&in->addr6,
2030 		    hbuf, sizeof (hbuf)) == NULL)
2031 			hbuf[0] = 0;
2032 	} else if (!nflag && (cp = strchr(hbuf, '.')) != NULL &&
2033 	    strcmp(cp + 1, domain) == 0) {
2034 		*cp = '\0';
2035 	}
2036 	mutex_enter(&tr_nslock);
2037 	tr_nsactive = _B_FALSE;
2038 	mutex_exit(&tr_nslock);
2039 	(void) strlcpy(line, hbuf, sizeof (line));
2040 
2041 	return (line);
2042 }
2043 
2044 /*
2045  * return the difference (in msec) between two time values
2046  */
2047 static double
2048 deltaT(struct timeval *t1p, struct timeval *t2p)
2049 {
2050 	double dt;
2051 
2052 	dt = (double)(t2p->tv_sec - t1p->tv_sec) * 1000.0 +
2053 	    (double)(t2p->tv_usec - t1p->tv_usec) / 1000.0;
2054 	return (dt);
2055 }
2056 
2057 /*
2058  * Subtract 2 timeval structs:  out = out - in.
2059  * Out is assumed to be >= in.
2060  */
2061 static void
2062 tv_sub(struct timeval *out, struct timeval *in)
2063 {
2064 	if ((out->tv_usec -= in->tv_usec) < 0)   {
2065 		--out->tv_sec;
2066 		out->tv_usec += 1000000;
2067 	}
2068 	out->tv_sec -= in->tv_sec;
2069 }
2070 
2071 /*
2072  * record statistics
2073  */
2074 static void
2075 record_stats(double rtt, int *nreceived, double *rttmin, double *rttmax,
2076     double *rttsum, double *rttssq)
2077 {
2078 	if (*nreceived == 0) {
2079 		*rttmin = rtt;
2080 		*rttmax = rtt;
2081 		*rttsum = rtt;
2082 		*rttssq = rtt * rtt;
2083 	} else {
2084 		if (rtt < *rttmin)
2085 			*rttmin = rtt;
2086 
2087 		if (rtt > *rttmax)
2088 			*rttmax = rtt;
2089 
2090 		*rttsum += rtt;
2091 		*rttssq += rtt * rtt;
2092 	}
2093 
2094 	(*nreceived)++;
2095 }
2096 
2097 /*
2098  * display statistics
2099  */
2100 static void
2101 print_stats(int ntransmitted, int nreceived, double rttmin, double rttmax,
2102     double rttsum, double rttssq)
2103 {
2104 	double rttavg;			/* average round-trip time */
2105 	double rttstd;			/* rtt standard deviation */
2106 
2107 	if (ntransmitted > 0 && ntransmitted >= nreceived) {
2108 		int missed = ntransmitted - nreceived;
2109 		double loss = 100 * (double)missed / (double)ntransmitted;
2110 
2111 		if (nreceived > 0) {
2112 			rttavg = rttsum / nreceived;
2113 			rttstd = rttssq - (rttavg * rttsum);
2114 			rttstd = xsqrt(rttstd / nreceived);
2115 
2116 			Printf("  %.3f", rttmin);
2117 			Printf("/%.3f", rttavg);
2118 			Printf("/%.3f", rttmax);
2119 
2120 			Printf(" (%.3f) ms ", rttstd);
2121 		}
2122 
2123 		Printf(" %d/%d pkts", nreceived, ntransmitted);
2124 
2125 		if (nreceived == 0)
2126 			Printf(" (100%% loss)");
2127 		else
2128 			Printf(" (%.2g%% loss)", loss);
2129 	}
2130 }
2131 
2132 /*
2133  * square root function
2134  */
2135 double
2136 xsqrt(double y)
2137 {
2138 	double t, x;
2139 
2140 	if (y <= 0) {
2141 		return (0.0);
2142 	}
2143 
2144 	x = (y < 1.0) ? 1.0 : y;
2145 	do {
2146 		t = x;
2147 		x = (t + (y/t))/2.0;
2148 	} while (0 < x && x < t);
2149 
2150 	return (x);
2151 }
2152 
2153 /*
2154  * String to double with optional min and max.
2155  */
2156 static double
2157 str2dbl(const char *str, const char *what, double mi, double ma)
2158 {
2159 	double val;
2160 	char *ep;
2161 
2162 	errno = 0;
2163 
2164 	val = strtod(str, &ep);
2165 	if (errno != 0 || *ep != '\0') {
2166 		Fprintf(stderr, "%s: \"%s\" bad value for %s \n",
2167 		    prog, str, what);
2168 		exit(EXIT_FAILURE);
2169 	}
2170 	if (val < mi && mi >= 0) {
2171 		Fprintf(stderr, "%s: %s must be >= %f\n", prog, what, mi);
2172 		exit(EXIT_FAILURE);
2173 	}
2174 	if (val > ma && ma >= 0) {
2175 		Fprintf(stderr, "%s: %s must be <= %f\n", prog, what, ma);
2176 		exit(EXIT_FAILURE);
2177 	}
2178 	return (val);
2179 }
2180 
2181 /*
2182  * String to int with optional min and max. Handles decimal and hex.
2183  */
2184 static int
2185 str2int(const char *str, const char *what, int mi, int ma)
2186 {
2187 	const char *cp;
2188 	int val;
2189 	char *ep;
2190 
2191 	errno = 0;
2192 
2193 	if (str[0] == '0' && (str[1] == 'x' || str[1] == 'X')) {
2194 		cp = str + 2;
2195 		val = (int)strtol(cp, &ep, 16);
2196 	} else {
2197 		val = (int)strtol(str, &ep, 10);
2198 	}
2199 	if (errno != 0 || *ep != '\0') {
2200 		Fprintf(stderr, "%s: \"%s\" bad value for %s \n",
2201 		    prog, str, what);
2202 		exit(EXIT_FAILURE);
2203 	}
2204 	if (val < mi && mi >= 0) {
2205 		if (mi == 0) {
2206 			Fprintf(stderr, "%s: %s must be >= %d\n",
2207 			    prog, what, mi);
2208 		} else {
2209 			Fprintf(stderr, "%s: %s must be > %d\n",
2210 			    prog, what, mi - 1);
2211 		}
2212 		exit(EXIT_FAILURE);
2213 	}
2214 	if (val > ma && ma >= 0) {
2215 		Fprintf(stderr, "%s: %s must be <= %d\n", prog, what, ma);
2216 		exit(EXIT_FAILURE);
2217 	}
2218 	return (val);
2219 }
2220 
2221 /*
2222  * This is the interrupt handler for SIGINT and SIGQUIT. It's completely handled
2223  * where it jumps to.
2224  */
2225 static void
2226 sig_handler(int sig)
2227 {
2228 	longjmp(env, sig);
2229 }
2230 
2231 /*
2232  * display the usage of traceroute
2233  */
2234 static void
2235 usage(void)
2236 {
2237 	Fprintf(stderr, "Usage: %s [-adFIlnSvx] [-A address_family] "
2238 	    "[-c traffic_class]\n"
2239 	    "\t[-f first_hop] [-g gateway [-g gateway ...]| -r] [-i iface]\n"
2240 	    "\t[-L flow_label] [-m max_hop] [-P pause_sec] [-p port] "
2241 	    "[-Q max_timeout]\n"
2242 	    "\t[-q nqueries] [-s src_addr] [-t tos] [-w wait_time] host "
2243 	    "[packetlen]\n", prog);
2244 	exit(EXIT_FAILURE);
2245 }
2246 
2247 /* ARGSUSED */
2248 static void *
2249 ns_warning_thr(void *unused)
2250 {
2251 	for (;;) {
2252 		hrtime_t now;
2253 
2254 		(void) sleep(tr_nssleeptime);
2255 
2256 		now = gethrtime();
2257 		mutex_enter(&tr_nslock);
2258 		if (tr_nsactive && now - tr_nsstarttime >=
2259 		    tr_nswarntime * NANOSEC) {
2260 			Fprintf(stderr, "%s: warning: responses "
2261 			    "received, but name service lookups are "
2262 			    "taking a while. Use %s -n to disable "
2263 			    "name service lookups.\n",
2264 			    prog, prog);
2265 			mutex_exit(&tr_nslock);
2266 			return (NULL);
2267 		}
2268 		mutex_exit(&tr_nslock);
2269 	}
2270 
2271 	/* LINTED: E_STMT_NOT_REACHED */
2272 	return (NULL);
2273 }
2274