xref: /titanic_44/usr/src/cmd/cmd-inet/usr.sbin/ping/ping_aux6.c (revision fb3fb4f3d76d55b64440afd0af72775dfad3bd1d)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License, Version 1.0 only
6  * (the "License").  You may not use this file except in compliance
7  * with the License.
8  *
9  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
10  * or http://www.opensolaris.org/os/licensing.
11  * See the License for the specific language governing permissions
12  * and limitations under the License.
13  *
14  * When distributing Covered Code, include this CDDL HEADER in each
15  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
16  * If applicable, add the following below this CDDL HEADER, with the
17  * fields enclosed by brackets "[]" replaced with your own identifying
18  * information: Portions Copyright [yyyy] [name of copyright owner]
19  *
20  * CDDL HEADER END
21  */
22 /*
23  * Copyright 2006 Sun Microsystems, Inc.  All rights reserved.
24  * Use is subject to license terms.
25  */
26 
27 /*	Copyright (c) 1983, 1984, 1985, 1986, 1987, 1988, 1989 AT&T	*/
28 /*	  All Rights Reserved  	*/
29 
30 /*
31  * Portions of this source code were derived from Berkeley 4.3 BSD
32  * under license from the Regents of the University of California.
33  */
34 
35 #pragma ident	"%Z%%M%	%I%	%E% SMI"
36 
37 #include <stdio.h>
38 #include <string.h>
39 #include <strings.h>
40 #include <errno.h>
41 #include <fcntl.h>
42 #include <unistd.h>
43 #include <signal.h>
44 
45 #include <sys/time.h>
46 #include <sys/param.h>
47 #include <sys/socket.h>
48 #include <sys/sockio.h>
49 #include <sys/stropts.h>
50 #include <sys/file.h>
51 #include <arpa/inet.h>
52 #include <net/if.h>
53 #include <netinet/in_systm.h>
54 #include <netinet/in.h>
55 #include <netinet/ip.h>
56 #include <netinet/ip_icmp.h>
57 #include <netinet/ip6.h>
58 #include <netinet/icmp6.h>
59 #include <netinet/udp.h>
60 #include <netdb.h>
61 #include <stdlib.h>
62 
63 #include <libinetutil.h>
64 #include "ping.h"
65 
66 void check_reply6(struct addrinfo *, struct msghdr *, int, ushort_t);
67 extern void find_dstaddr(ushort_t, union any_in_addr *);
68 static int IPv6_hdrlen(ip6_t *, int, uint8_t *);
69 extern boolean_t is_a_target(struct addrinfo *, union any_in_addr *);
70 static void pr_ext_headers(struct msghdr *);
71 extern char *pr_name(char *, int);
72 extern char *pr_protocol(int);
73 static void pr_rthdr(unsigned char *);
74 static char *pr_type6(uchar_t);
75 extern void schedule_sigalrm();
76 extern void send_scheduled_probe();
77 extern boolean_t seq_match(ushort_t, int, ushort_t);
78 void set_ancillary_data(struct msghdr *, int, union any_in_addr *, int, uint_t);
79 extern void sigalrm_handler();
80 extern void tvsub(struct timeval *, struct timeval *);
81 
82 
83 /*
84  * Initialize the msghdr for specifying the hoplimit, outgoing interface and
85  * routing header.
86  */
87 void
88 set_ancillary_data(struct msghdr *msgp, int hoplimit,
89     union any_in_addr *gwIPlist, int gw_cnt, uint_t if_index)
90 {
91 	size_t hoplimit_space;
92 	size_t rthdr_space;
93 	size_t pktinfo_space;
94 	size_t bufspace;
95 	struct cmsghdr *cmsgp;
96 	uchar_t *cmsg_datap;
97 	static boolean_t first = _B_TRUE;
98 	int i;
99 
100 	if (hoplimit == -1 && gw_cnt == 0 && if_index == 0)
101 		return;
102 
103 	/*
104 	 * Need to figure out size of buffer needed for ancillary data
105 	 * containing routing header and packet info options.
106 	 *
107 	 * Portable heuristic to compute upper bound on space needed for
108 	 * N ancillary data options. It assumes up to _MAX_ALIGNMENT padding
109 	 * after both header and data as the worst possible upper bound on space
110 	 * consumed by padding.
111 	 * It also adds one extra "sizeof (struct cmsghdr)" for the last option.
112 	 * This is needed because we would like to use CMSG_NXTHDR() while
113 	 * composing the buffer. The CMSG_NXTHDR() macro is designed better for
114 	 * parsing than composing the buffer. It requires the pointer it returns
115 	 * to leave space in buffer for addressing a cmsghdr and we want to make
116 	 * sure it works for us while we skip beyond the last ancillary data
117 	 * option.
118 	 *
119 	 * bufspace[i]  = sizeof(struct cmsghdr) + <pad after header> +
120 	 *		<option[i] content length> + <pad after data>;
121 	 *
122 	 * total_bufspace = bufspace[0] + bufspace[1] + ...
123 	 *		    ... + bufspace[N-1] + sizeof (struct cmsghdr);
124 	 */
125 
126 	rthdr_space = 0;
127 	pktinfo_space = 0;
128 	hoplimit_space = 0;
129 	bufspace = 0;
130 
131 	if (hoplimit != -1) {
132 		hoplimit_space = sizeof (int);
133 		bufspace += sizeof (struct cmsghdr) + _MAX_ALIGNMENT +
134 		    hoplimit_space + _MAX_ALIGNMENT;
135 	}
136 
137 	if (gw_cnt > 0) {
138 		rthdr_space = inet6_rth_space(IPV6_RTHDR_TYPE_0, gw_cnt);
139 		bufspace += sizeof (struct cmsghdr) + _MAX_ALIGNMENT +
140 		    rthdr_space + _MAX_ALIGNMENT;
141 	}
142 
143 	if (if_index != 0) {
144 		pktinfo_space = sizeof (struct in6_pktinfo);
145 		bufspace += sizeof (struct cmsghdr) + _MAX_ALIGNMENT +
146 		    pktinfo_space + _MAX_ALIGNMENT;
147 	}
148 
149 	/*
150 	 * We need to temporarily set the msgp->msg_controllen to bufspace
151 	 * (we will later trim it to actual length used). This is needed because
152 	 * CMSG_NXTHDR() uses it to check we have not exceeded the bounds.
153 	 */
154 	bufspace += sizeof (struct cmsghdr);
155 	msgp->msg_controllen = bufspace;
156 
157 	/*
158 	 * This function is called more than once only if -l/-S used,
159 	 * since we need to modify the middle gateway. So, don't alloc
160 	 * new memory, just reuse what msg6 points to.
161 	 */
162 	if (first) {
163 		first = _B_FALSE;
164 		msgp->msg_control = (struct cmsghdr *)malloc(bufspace);
165 		if (msgp->msg_control == NULL) {
166 			Fprintf(stderr, "%s: malloc %s\n",
167 			    progname, strerror(errno));
168 			exit(EXIT_FAILURE);
169 		}
170 	};
171 	cmsgp = CMSG_FIRSTHDR(msgp);
172 
173 	/*
174 	 * Fill ancillary data. First hoplimit, then rthdr and pktinfo.
175 	 */
176 
177 	/* set hoplimit ancillary data if needed */
178 	if (hoplimit != -1) {
179 		cmsgp->cmsg_level = IPPROTO_IPV6;
180 		cmsgp->cmsg_type = IPV6_HOPLIMIT;
181 		cmsg_datap = CMSG_DATA(cmsgp);
182 		/* LINTED */
183 		*(int *)cmsg_datap = hoplimit;
184 		cmsgp->cmsg_len = cmsg_datap + hoplimit_space -
185 		    (uchar_t *)cmsgp;
186 		cmsgp = CMSG_NXTHDR(msgp, cmsgp);
187 	}
188 
189 	/* set rthdr ancillary data if needed */
190 	if (gw_cnt > 0) {
191 		struct ip6_rthdr0 *rthdr0p;
192 
193 		cmsgp->cmsg_level = IPPROTO_IPV6;
194 		cmsgp->cmsg_type = IPV6_RTHDR;
195 		cmsg_datap = CMSG_DATA(cmsgp);
196 
197 		/*
198 		 * Initialize rthdr structure
199 		 */
200 		/* LINTED */
201 		rthdr0p = (struct ip6_rthdr0 *)cmsg_datap;
202 		if (inet6_rth_init(rthdr0p, rthdr_space,
203 		    IPV6_RTHDR_TYPE_0, gw_cnt) == NULL) {
204 			Fprintf(stderr, "%s: inet6_rth_init failed\n",
205 			    progname);
206 			exit(EXIT_FAILURE);
207 		}
208 
209 		/*
210 		 * Stuff in gateway addresses
211 		 */
212 		for (i = 0; i < gw_cnt; i++) {
213 			if (inet6_rth_add(rthdr0p, &gwIPlist[i].addr6) == -1) {
214 				Fprintf(stderr,
215 				    "%s: inet6_rth_add\n", progname);
216 				exit(EXIT_FAILURE);
217 			}
218 		}
219 
220 		cmsgp->cmsg_len = cmsg_datap + rthdr_space - (uchar_t *)cmsgp;
221 		cmsgp = CMSG_NXTHDR(msgp, cmsgp);
222 	}
223 
224 	/* set pktinfo ancillary data if needed */
225 	if (if_index != 0) {
226 		struct in6_pktinfo *pktinfop;
227 
228 		cmsgp->cmsg_level = IPPROTO_IPV6;
229 		cmsgp->cmsg_type = IPV6_PKTINFO;
230 		cmsg_datap = CMSG_DATA(cmsgp);
231 
232 		/* LINTED */
233 		pktinfop = (struct in6_pktinfo *)cmsg_datap;
234 		/*
235 		 * We don't know if pktinfop->ipi6_addr is aligned properly,
236 		 * therefore let's use bcopy, instead of assignment.
237 		 */
238 		(void) bcopy(&in6addr_any, &pktinfop->ipi6_addr,
239 		sizeof (struct in6_addr));
240 
241 		/*
242 		 *  We can assume pktinfop->ipi6_ifindex is 32 bit aligned.
243 		 */
244 		pktinfop->ipi6_ifindex = if_index;
245 		cmsgp->cmsg_len = cmsg_datap + pktinfo_space - (uchar_t *)cmsgp;
246 		cmsgp = CMSG_NXTHDR(msgp, cmsgp);
247 	}
248 
249 	msgp->msg_controllen = (char *)cmsgp - (char *)msgp->msg_control;
250 }
251 
252 /*
253  * Check out the packet to see if it came from us.  This logic is necessary
254  * because ALL readers of the ICMP socket get a copy of ALL ICMP packets
255  * which arrive ('tis only fair).  This permits multiple copies of this
256  * program to be run without having intermingled output (or statistics!).
257  */
258 void
259 check_reply6(struct addrinfo *ai_dst, struct msghdr *msg, int cc,
260     ushort_t udp_src_port)
261 {
262 	struct icmp6_hdr *icmp6;
263 	ip6_t *ip6h;
264 	nd_redirect_t *nd_rdrct;
265 	struct udphdr *up;
266 	union any_in_addr dst_addr;
267 	uchar_t *buf;
268 	int32_t *intp;
269 	struct sockaddr_in6 *from6;
270 	struct timeval tv;
271 	struct timeval *tp;
272 	int64_t triptime;
273 	boolean_t valid_reply = _B_FALSE;
274 	boolean_t reply_matched_current_target;	/* Is the source address of */
275 						/* this reply same as where */
276 						/* we're sending currently? */
277 	boolean_t last_reply_from_targetaddr = _B_FALSE; /* Is this stats, */
278 						/* probe all with npackets>0 */
279 						/* and we received reply for */
280 						/* the last probe sent to */
281 						/* targetaddr */
282 	uint32_t ip6hdr_len;
283 	uint8_t last_hdr;
284 	int cc_left;
285 	int i;
286 	char tmp_buf[INET6_ADDRSTRLEN];
287 	static char *unreach6[] = {
288 	    "No Route to Destination",
289 	    "Communication Administratively Prohibited",
290 	    "Not a Neighbor (obsoleted ICMPv6 code)",
291 	    "Address Unreachable",
292 	    "Port Unreachable"
293 	};
294 	static char *timexceed6[] = {
295 	    "Hop limit exceeded in transit",
296 	    "Fragment reassembly time exceeded"
297 	};
298 	static char *param_prob6[] = {
299 	    "Erroneous header field encountered",
300 	    "Unrecognized next header type encountered",
301 	    "Unrecognized IPv6 option encountered"
302 	};
303 	boolean_t print_newline = _B_FALSE;
304 
305 	/* decompose msghdr into useful pieces */
306 	buf = (uchar_t *)msg->msg_iov->iov_base;
307 	from6 = (struct sockaddr_in6 *)msg->msg_name;
308 
309 	/* LINTED */
310 	intp = (int32_t *)buf;
311 
312 	/* get time now for most accurate time calculation */
313 	(void) gettimeofday(&tv, (struct timezone *)NULL);
314 
315 	/* Ignore packets > 64k or control buffers that don't fit */
316 	if (msg->msg_flags & (MSG_TRUNC|MSG_CTRUNC)) {
317 		if (verbose) {
318 			Printf("Truncated message: msg_flags 0x%x from %s\n",
319 			    msg->msg_flags,
320 			    pr_name((char *)&from6->sin6_addr, AF_INET6));
321 		}
322 		return;
323 	}
324 	if (cc < ICMP6_MINLEN) {
325 		if (verbose) {
326 			Printf("packet too short (%d bytes) from %s\n", cc,
327 			    pr_name((char *)&from6->sin6_addr, AF_INET6));
328 		}
329 		return;
330 	}
331 	/* LINTED */
332 	icmp6 = (struct icmp6_hdr *)buf;
333 	cc_left = cc - ICMP6_MINLEN;
334 
335 	switch (icmp6->icmp6_type) {
336 	case ICMP6_DST_UNREACH:
337 		/* LINTED */
338 		ip6h = (ip6_t *)((char *)icmp6 + ICMP6_MINLEN);
339 		if (cc_left < sizeof (ip6_t)) {
340 			if (verbose) {
341 				Printf("packet too short (%d bytes) from %s\n",
342 				    cc,
343 				    pr_name((char *)&from6->sin6_addr,
344 					AF_INET6));
345 			}
346 			return;
347 		}
348 
349 		/*
350 		 * Determine the total length of IPv6 header and extension
351 		 * headers, also the upper layer header (UDP, TCP, ICMP, etc.)
352 		 * following.
353 		 */
354 		ip6hdr_len = IPv6_hdrlen(ip6h, cc_left, &last_hdr);
355 
356 		cc_left -= ip6hdr_len;
357 
358 		/* LINTED */
359 		up = (struct udphdr *)((char *)ip6h + ip6hdr_len);
360 		if (cc_left < sizeof (struct udphdr)) {
361 			if (verbose) {
362 				Printf("packet too short (%d bytes) from %s\n",
363 				    cc,
364 				    pr_name((char *)&from6->sin6_addr,
365 					AF_INET6));
366 			}
367 			return;
368 		}
369 		cc_left -= sizeof (struct udphdr);
370 
371 		/* determine if this is *the* reply */
372 		if (icmp6->icmp6_code == ICMP6_DST_UNREACH_NOPORT &&
373 		    last_hdr == IPPROTO_UDP &&
374 		    udp_src_port == up->uh_sport &&
375 		    use_udp) {
376 			valid_reply = _B_TRUE;
377 		} else {
378 			valid_reply = _B_FALSE;
379 		}
380 
381 		if (valid_reply) {
382 			/*
383 			 * For this valid reply, if we are still sending to
384 			 * this target IP address, we'd like to do some
385 			 * updates to targetaddr, so hold SIGALRMs.
386 			 */
387 			(void) sighold(SIGALRM);
388 			is_alive = _B_TRUE;
389 			nreceived++;
390 			reply_matched_current_target =
391 			    seq_match(current_targetaddr->starting_seq_num,
392 				current_targetaddr->num_sent,
393 				ntohs(up->uh_dport));
394 			if (reply_matched_current_target) {
395 				current_targetaddr->got_reply = _B_TRUE;
396 				nreceived_last_target++;
397 				/*
398 				 * Determine if stats, probe-all, and
399 				 * npackets != 0, and this is the reply for
400 				 * the last probe we sent to current target
401 				 * address.
402 				 */
403 				if (stats && probe_all && npackets > 0 &&
404 				    ((current_targetaddr->starting_seq_num +
405 				    current_targetaddr->num_probes - 1) %
406 				    (MAX_PORT + 1) == ntohs(up->uh_dport)) &&
407 				    (current_targetaddr->num_probes ==
408 				    current_targetaddr->num_sent))
409 					last_reply_from_targetaddr = _B_TRUE;
410 			} else {
411 				/*
412 				 * If it's just probe_all and we just received
413 				 * a reply from a target address we were
414 				 * probing and had timed out (now we are probing
415 				 * some other target address), we ignore
416 				 * this reply.
417 				 */
418 				if (probe_all && !stats) {
419 					valid_reply = _B_FALSE;
420 					/*
421 					 * Only if it's verbose, we get a
422 					 * message regarding this reply,
423 					 * otherwise we are done here.
424 					 */
425 					if (!verbose) {
426 						(void) sigrelse(SIGALRM);
427 						return;
428 					}
429 				}
430 			}
431 		}
432 
433 		if (valid_reply && !stats) {
434 			/*
435 			 * if we are still sending to the same target address,
436 			 * then stop it, because we know it's alive.
437 			 */
438 			if (reply_matched_current_target) {
439 				(void) alarm(0);	/* cancel alarm */
440 				(void) sigset(SIGALRM, SIG_IGN);
441 				current_targetaddr->probing_done = _B_TRUE;
442 			}
443 			(void) sigrelse(SIGALRM);
444 
445 			if (!probe_all) {
446 				Printf("%s is alive\n", targethost);
447 			} else {
448 				(void) inet_ntop(AF_INET6,
449 				    (void *)&ip6h->ip6_dst,
450 				    tmp_buf, sizeof (tmp_buf));
451 				if (nflag) {
452 					Printf("%s is alive\n", tmp_buf);
453 				} else {
454 					Printf("%s (%s) is alive\n",
455 					    targethost, tmp_buf);
456 				}
457 			}
458 			if (reply_matched_current_target) {
459 				/*
460 				 * Let's get things going again, but now
461 				 * ping will start sending to next target IP
462 				 * address.
463 				 */
464 				send_scheduled_probe();
465 				(void) sigset(SIGALRM, sigalrm_handler);
466 				schedule_sigalrm();
467 			}
468 			return;
469 		} else {
470 			/*
471 			 * If we are not moving to next targetaddr, let's
472 			 * release the SIGALRM now. We don't want to stall in
473 			 * the middle of probing a targetaddr if the pr_name()
474 			 * call (see below) takes longer.
475 			 */
476 			if (!last_reply_from_targetaddr)
477 				(void) sigrelse(SIGALRM);
478 			/* else, we'll release it later */
479 		}
480 
481 		dst_addr.addr6 = ip6h->ip6_dst;
482 		if (valid_reply) {
483 			Printf("%d bytes from %s: ", cc,
484 			    pr_name((char *)&from6->sin6_addr, AF_INET6));
485 			Printf("udp_port=%d. ", ntohs(up->uh_dport));
486 			print_newline = _B_TRUE;
487 		} else if (is_a_target(ai_dst, &dst_addr)|| verbose) {
488 			if (icmp6->icmp6_code >= A_CNT(unreach6)) {
489 				Printf("ICMPv6 %d Unreachable from gateway "
490 				    "%s\n", icmp6->icmp6_code,
491 				    pr_name((char *)&from6->sin6_addr,
492 					AF_INET6));
493 			} else {
494 				Printf("ICMPv6 %s from gateway %s\n",
495 				    unreach6[icmp6->icmp6_code],
496 				    pr_name((char *)&from6->sin6_addr,
497 					AF_INET6));
498 			}
499 			Printf(" for %s from %s", pr_protocol(last_hdr),
500 			    pr_name((char *)&ip6h->ip6_src, AF_INET6));
501 			Printf(" to %s", pr_name((char *)&ip6h->ip6_dst,
502 			    AF_INET6));
503 			if (last_hdr == IPPROTO_TCP || last_hdr == IPPROTO_UDP)
504 				Printf(" port %d ", ntohs(up->uh_dport));
505 			print_newline = _B_TRUE;
506 		}
507 
508 		/*
509 		 * Update and print the stats, if it's a valid reply and
510 		 * contains a timestamp.
511 		 */
512 		if (valid_reply && datalen >= sizeof (struct timeval) &&
513 		    cc_left >= sizeof (struct timeval)) {
514 			/* LINTED */
515 			tp = (struct timeval *)((char *)up +
516 			    sizeof (struct udphdr));
517 			(void) tvsub(&tv, tp);
518 			triptime = (int64_t)tv.tv_sec * MICROSEC + tv.tv_usec;
519 			Printf("time=" TIMEFORMAT " ms", triptime/1000.0);
520 			tsum += triptime;
521 			tsum2 += triptime*triptime;
522 			if (triptime < tmin)
523 				tmin = triptime;
524 			if (triptime > tmax)
525 				tmax = triptime;
526 			print_newline = _B_TRUE;
527 		}
528 		if (print_newline)
529 			(void) putchar('\n');
530 		/*
531 		 * If it's stats, probe-all, npackets > 0, and we received reply
532 		 * for the last probe sent to this target address, then we
533 		 * don't need to wait anymore, let's move on to next target
534 		 * address, now!
535 		 */
536 		if (last_reply_from_targetaddr) {
537 			(void) alarm(0);	/* cancel alarm */
538 			current_targetaddr->probing_done = _B_TRUE;
539 			(void) sigrelse(SIGALRM);
540 			send_scheduled_probe();
541 			schedule_sigalrm();
542 		}
543 		break;
544 
545 	case ICMP6_PACKET_TOO_BIG:
546 		/* LINTED */
547 		ip6h = (ip6_t *)((char *)icmp6 + ICMP6_MINLEN);
548 		if (cc_left < sizeof (ip6_t)) {
549 			if (verbose) {
550 				Printf("packet too short (%d bytes) from %s\n",
551 				    cc, pr_name((char *)&from6->sin6_addr,
552 				    AF_INET6));
553 			}
554 			return;
555 		}
556 		ip6hdr_len = IPv6_hdrlen(ip6h, cc_left, &last_hdr);
557 
558 		dst_addr.addr6 = ip6h->ip6_dst;
559 		if (is_a_target(ai_dst, &dst_addr) || verbose) {
560 			Printf("ICMPv6 packet too big from %s\n",
561 			    pr_name((char *)&from6->sin6_addr, AF_INET6));
562 
563 			Printf(" for %s from %s", pr_protocol(last_hdr),
564 			    pr_name((char *)&ip6h->ip6_src, AF_INET6));
565 			Printf(" to %s", pr_name((char *)&ip6h->ip6_dst,
566 			    AF_INET6));
567 			if ((last_hdr == IPPROTO_TCP ||
568 			    last_hdr == IPPROTO_UDP) &&
569 			    (cc_left >= (ip6hdr_len + 4))) {
570 				/* LINTED */
571 				up = (struct udphdr *)
572 				    ((char *)ip6h + ip6hdr_len);
573 				Printf(" port %d ", ntohs(up->uh_dport));
574 			}
575 			Printf(" MTU = %d\n", ntohl(icmp6->icmp6_mtu));
576 		}
577 		break;
578 
579 	case ICMP6_TIME_EXCEEDED:
580 		/* LINTED */
581 		ip6h = (ip6_t *)((char *)icmp6 + ICMP6_MINLEN);
582 		if (cc_left < sizeof (ip6_t)) {
583 			if (verbose) {
584 				Printf("packet too short (%d bytes) from %s\n",
585 				    cc,
586 				    pr_name((char *)&from6->sin6_addr,
587 					AF_INET6));
588 			}
589 			return;
590 		}
591 		ip6hdr_len = IPv6_hdrlen(ip6h, cc_left, &last_hdr);
592 
593 		dst_addr.addr6 = ip6h->ip6_dst;
594 		if (is_a_target(ai_dst, &dst_addr) || verbose) {
595 			if (icmp6->icmp6_code >= A_CNT(timexceed6)) {
596 				Printf("ICMPv6 %d time exceeded from %s\n",
597 				    icmp6->icmp6_code,
598 				    pr_name((char *)&from6->sin6_addr,
599 					AF_INET6));
600 			} else {
601 				Printf("ICMPv6 %s from %s\n",
602 				    timexceed6[icmp6->icmp6_code],
603 				    pr_name((char *)&from6->sin6_addr,
604 					AF_INET6));
605 			}
606 			Printf(" for %s from %s", pr_protocol(last_hdr),
607 			    pr_name((char *)&ip6h->ip6_src, AF_INET6));
608 			Printf(" to %s", pr_name((char *)&ip6h->ip6_dst,
609 			    AF_INET6));
610 			if ((last_hdr == IPPROTO_TCP ||
611 			    last_hdr == IPPROTO_UDP) &&
612 			    (cc_left >= (ip6hdr_len + 4))) {
613 				/* LINTED */
614 				up = (struct udphdr *)
615 				    ((char *)ip6h + ip6hdr_len);
616 				Printf(" port %d", ntohs(up->uh_dport));
617 			}
618 			(void) putchar('\n');
619 		}
620 		break;
621 
622 	case ICMP6_PARAM_PROB:
623 		/* LINTED */
624 		ip6h = (ip6_t *)((char *)icmp6 + ICMP6_MINLEN);
625 		if (cc_left < sizeof (ip6_t)) {
626 			if (verbose) {
627 				Printf("packet too short (%d bytes) from %s\n",
628 				    cc,
629 				    pr_name((char *)&from6->sin6_addr,
630 					AF_INET6));
631 			}
632 			return;
633 		}
634 		ip6hdr_len = IPv6_hdrlen(ip6h, cc_left, &last_hdr);
635 
636 		dst_addr.addr6 = ip6h->ip6_dst;
637 		if (is_a_target(ai_dst, &dst_addr) || verbose) {
638 			if (icmp6->icmp6_code >= A_CNT(param_prob6)) {
639 				Printf("ICMPv6 %d parameter problem from %s\n",
640 				    icmp6->icmp6_code,
641 				    pr_name((char *)&from6->sin6_addr,
642 					AF_INET6));
643 			} else {
644 				Printf("ICMPv6 %s from %s\n",
645 				    param_prob6[icmp6->icmp6_code],
646 				    pr_name((char *)&from6->sin6_addr,
647 					AF_INET6));
648 			}
649 			icmp6->icmp6_pptr = ntohl(icmp6->icmp6_pptr);
650 			Printf(" in byte %d", icmp6->icmp6_pptr);
651 			if (icmp6->icmp6_pptr <= ip6hdr_len) {
652 				Printf(" (value 0x%x)",
653 				    *((uchar_t *)ip6h + icmp6->icmp6_pptr));
654 			}
655 			Printf(" for %s from %s", pr_protocol(last_hdr),
656 			    pr_name((char *)&ip6h->ip6_src, AF_INET6));
657 			Printf(" to %s", pr_name((char *)&ip6h->ip6_dst,
658 			    AF_INET6));
659 			if ((last_hdr == IPPROTO_TCP ||
660 			    last_hdr == IPPROTO_UDP) &&
661 			    (cc_left >= (ip6hdr_len + 4))) {
662 				/* LINTED */
663 				up = (struct udphdr *)
664 				    ((char *)ip6h + ip6hdr_len);
665 				Printf(" port %d", ntohs(up->uh_dport));
666 			}
667 			(void) putchar('\n');
668 		}
669 		break;
670 
671 	case ICMP6_ECHO_REQUEST:
672 		return;
673 
674 	case ICMP6_ECHO_REPLY:
675 		if (ntohs(icmp6->icmp6_id) == ident) {
676 			if (!use_udp)
677 				valid_reply = _B_TRUE;
678 			else
679 				valid_reply = _B_FALSE;
680 		} else {
681 			return;
682 		}
683 
684 		if (valid_reply) {
685 			/*
686 			 * For this valid reply, if we are still sending to
687 			 * this target IP address, we'd like to do some
688 			 * updates to targetaddr, so hold SIGALRMs.
689 			 */
690 			(void) sighold(SIGALRM);
691 			is_alive = _B_TRUE;
692 			nreceived++;
693 			reply_matched_current_target =
694 			    seq_match(current_targetaddr->starting_seq_num,
695 				current_targetaddr->num_sent,
696 				ntohs(icmp6->icmp6_seq));
697 			if (reply_matched_current_target) {
698 				current_targetaddr->got_reply = _B_TRUE;
699 				nreceived_last_target++;
700 				/*
701 				 * Determine if stats, probe-all, and
702 				 * npackets != 0, and this is the reply for
703 				 * the last probe we sent to current target
704 				 * address.
705 				 */
706 				if (stats && probe_all && npackets > 0 &&
707 				    ((current_targetaddr->starting_seq_num +
708 				    current_targetaddr->num_probes - 1) %
709 				    (MAX_ICMP_SEQ + 1) ==
710 				    ntohs(icmp6->icmp6_seq)) &&
711 				    (current_targetaddr->num_probes ==
712 				    current_targetaddr->num_sent))
713 					last_reply_from_targetaddr = _B_TRUE;
714 			} else {
715 				/*
716 				 * If it's just probe_all and we just received
717 				 * a reply from a target address we were
718 				 * probing and had timed out (now we are probing
719 				 * some other target address), we ignore
720 				 * this reply.
721 				 */
722 				if (probe_all && !stats) {
723 					valid_reply = _B_FALSE;
724 					/*
725 					 * Only if it's verbose, we get a
726 					 * message regarding this reply,
727 					 * otherwise we are done here.
728 					 */
729 					if (!verbose) {
730 						(void) sigrelse(SIGALRM);
731 						return;
732 					}
733 				}
734 			}
735 		}
736 
737 		if (!stats && valid_reply) {
738 			/*
739 			 * if we are still sending to the same target address,
740 			 * then stop it, because we know it's alive.
741 			 */
742 			if (reply_matched_current_target) {
743 				(void) alarm(0);	/* cancel alarm */
744 				(void) sigset(SIGALRM, SIG_IGN);
745 				current_targetaddr->probing_done = _B_TRUE;
746 			}
747 			(void) sigrelse(SIGALRM);
748 
749 			if (!probe_all) {
750 				Printf("%s is alive\n", targethost);
751 			} else {
752 				/*
753 				 * If we are using send_reply, the real
754 				 * target address is not the src address of the
755 				 * replies. Use icmp_seq to find out where this
756 				 * probe was sent to.
757 				 */
758 				if (send_reply) {
759 					(void) find_dstaddr(
760 					    ntohs(icmp6->icmp6_seq), &dst_addr);
761 					(void) inet_ntop(AF_INET6,
762 					    (void *)&dst_addr.addr6,
763 					    tmp_buf, sizeof (tmp_buf));
764 				} else {
765 					(void) inet_ntop(AF_INET6,
766 					    (void *)&from6->sin6_addr,
767 					    tmp_buf, sizeof (tmp_buf));
768 				}
769 
770 				if (nflag) {
771 					Printf("%s is alive\n", tmp_buf);
772 				} else {
773 					Printf("%s (%s) is alive\n",
774 					    targethost, tmp_buf);
775 				}
776 			}
777 			if (reply_matched_current_target) {
778 				/*
779 				 * Let's get things going again, but now
780 				 * ping will start sending to next target IP
781 				 * address.
782 				 */
783 				send_scheduled_probe();
784 				(void) sigset(SIGALRM, sigalrm_handler);
785 				schedule_sigalrm();
786 			}
787 			return;
788 		} else {
789 			/*
790 			 * If we are not moving to next targetaddr, let's
791 			 * release the SIGALRM now. We don't want to stall in
792 			 * the middle of probing a targetaddr if the pr_name()
793 			 * call (see below) takes longer.
794 			 */
795 			if (!last_reply_from_targetaddr)
796 				(void) sigrelse(SIGALRM);
797 			/* else, we'll release it later */
798 		}
799 
800 		/*
801 		 * If we are using send_reply, the real target address is
802 		 * not the src address of the replies. Use icmp_seq to find out
803 		 * where this probe was sent to.
804 		 */
805 		if (send_reply) {
806 			(void) find_dstaddr(ntohs(icmp6->icmp6_seq), &dst_addr);
807 			Printf("%d bytes from %s: ", cc,
808 			    pr_name((char *)&dst_addr.addr6,  AF_INET6));
809 		} else {
810 			Printf("%d bytes from %s: ", cc,
811 			    pr_name((char *)&from6->sin6_addr, AF_INET6));
812 		}
813 		Printf("icmp_seq=%d. ", ntohs(icmp6->icmp6_seq));
814 
815 		if (valid_reply && datalen >= sizeof (struct timeval) &&
816 		    cc_left >= sizeof (struct timeval)) {
817 			/* LINTED */
818 			tp = (struct timeval *)&icmp6->icmp6_data16[2];
819 			(void) tvsub(&tv, tp);
820 			triptime = (int64_t)tv.tv_sec * MICROSEC + tv.tv_usec;
821 			Printf("time=" TIMEFORMAT " ms", triptime/1000.0);
822 			tsum += triptime;
823 			tsum2 += triptime*triptime;
824 			if (triptime < tmin)
825 				tmin = triptime;
826 			if (triptime > tmax)
827 				tmax = triptime;
828 		}
829 		(void) putchar('\n');
830 		/*
831 		 * If it's stats, probe-all, npackets > 0, and we received reply
832 		 * for the last probe sent to this target address, then we
833 		 * don't need to wait anymore, let's move on to next target
834 		 * address, now!
835 		 */
836 		if (last_reply_from_targetaddr) {
837 			(void) alarm(0);	/* cancel alarm */
838 			current_targetaddr->probing_done = _B_TRUE;
839 			(void) sigrelse(SIGALRM);
840 			send_scheduled_probe();
841 			schedule_sigalrm();
842 		}
843 		break;
844 
845 	case MLD_LISTENER_QUERY:
846 	case MLD_LISTENER_REPORT:
847 	case MLD_LISTENER_REDUCTION:
848 	case ND_ROUTER_SOLICIT:
849 	case ND_ROUTER_ADVERT:
850 	case ND_NEIGHBOR_SOLICIT:
851 	case ND_NEIGHBOR_ADVERT:
852 		return;
853 
854 	case ND_REDIRECT:
855 		nd_rdrct = (nd_redirect_t *)icmp6;
856 
857 		if (cc_left < sizeof (nd_redirect_t) - ICMP6_MINLEN) {
858 			if (verbose) {
859 				Printf("packet too short (%d bytes) from %s\n",
860 				    cc,
861 				    pr_name((char *)&from6->sin6_addr,
862 					AF_INET6));
863 			}
864 			return;
865 		}
866 		dst_addr.addr6 = nd_rdrct->nd_rd_dst;
867 		if (is_a_target(ai_dst, &dst_addr) || verbose) {
868 			Printf("ICMPv6 redirect from gateway %s\n",
869 			    pr_name((char *)&from6->sin6_addr, AF_INET6));
870 
871 			Printf(" to %s",
872 			    pr_name((char *)&nd_rdrct->nd_rd_target, AF_INET6));
873 			Printf(" for %s\n",
874 			    pr_name((char *)&nd_rdrct->nd_rd_dst, AF_INET6));
875 		}
876 		break;
877 
878 	default:
879 		if (verbose) {
880 			Printf("%d bytes from %s:\n", cc,
881 			    pr_name((char *)&from6->sin6_addr, AF_INET6));
882 			Printf("icmp6_type=%d (%s) ", icmp6->icmp6_type,
883 			    pr_type6(icmp6->icmp6_type));
884 			Printf("icmp6_code=%d\n", icmp6->icmp6_code);
885 			for (i = 0; i < 12; i++) {
886 				Printf("x%2.2x: x%8.8x\n",
887 				    i * sizeof (int32_t), *intp++);
888 			}
889 		}
890 		break;
891 	}
892 
893 	/*
894 	 * If it's verbose mode and we recv'd ancillary data, print extension
895 	 * headers.
896 	 */
897 	if (verbose && msg->msg_controllen > 0)
898 		pr_ext_headers(msg);
899 }
900 
901 /*
902  * Convert an ICMP6 "type" field to a printable string.
903  */
904 static char *
905 pr_type6(uchar_t icmp6_type)
906 {
907 	static struct icmptype_table ttab6[] = {
908 		{ICMP6_DST_UNREACH,		"Dest Unreachable"},
909 		{ICMP6_PACKET_TOO_BIG,		"Packet Too Big"},
910 		{ICMP6_TIME_EXCEEDED,		"Time Exceeded"},
911 		{ICMP6_PARAM_PROB,		"Parameter Problem"},
912 		{ICMP6_ECHO_REQUEST,		"Echo Request"},
913 		{ICMP6_ECHO_REPLY,		"Echo Reply"},
914 		{MLD_LISTENER_QUERY,		"Multicast Listener Query"},
915 		{MLD_LISTENER_REPORT,		"Multicast Listener Report"},
916 		{MLD_LISTENER_REDUCTION,	"Multicast Listener Done"},
917 		{ND_ROUTER_SOLICIT,		"Router Solicitation"},
918 		{ND_ROUTER_ADVERT,		"Router Advertisement"},
919 		{ND_NEIGHBOR_SOLICIT,		"Neighbor Solicitation"},
920 		{ND_NEIGHBOR_ADVERT,		"Neighbor Advertisement"},
921 		{ND_REDIRECT,			"Redirect Message"},
922 	};
923 	int i;
924 
925 	for (i = 0; i < A_CNT(ttab6); i++) {
926 		if (ttab6[i].type == icmp6_type)
927 			return (ttab6[i].message);
928 
929 	}
930 
931 	return ("OUT-OF-RANGE");
932 }
933 
934 /*
935  * Return the length of the IPv6 related headers (including extension headers).
936  * It also sets the *last_hdr_rtrn to the first upper layer protocol header
937  * following IPv6 header and extension headers. If print_flag is _B_TRUE, it
938  * prints extension headers.
939  */
940 static int
941 IPv6_hdrlen(ip6_t *ip6h, int pkt_len, uint8_t *last_hdr_rtrn)
942 {
943 	int length;
944 	int exthdrlength;
945 	uint8_t nexthdr;
946 	uint8_t *whereptr;
947 	ip6_hbh_t *hbhhdr;
948 	ip6_dest_t *desthdr;
949 	ip6_rthdr_t *rthdr;
950 	ip6_frag_t *fraghdr;
951 	uint8_t	*endptr;
952 
953 	length = sizeof (ip6_t);
954 
955 	whereptr = ((uint8_t *)&ip6h[1]); 	/* point to next hdr */
956 	endptr = ((uint8_t *)ip6h) + pkt_len;
957 
958 	nexthdr = ip6h->ip6_nxt;
959 	*last_hdr_rtrn = IPPROTO_NONE;
960 
961 	if (whereptr >= endptr)
962 		return (length);
963 
964 	while (whereptr < endptr) {
965 		*last_hdr_rtrn = nexthdr;
966 		switch (nexthdr) {
967 		case IPPROTO_HOPOPTS:
968 			hbhhdr = (ip6_hbh_t *)whereptr;
969 			exthdrlength = 8 * (hbhhdr->ip6h_len + 1);
970 			if ((uchar_t *)hbhhdr + exthdrlength > endptr)
971 				return (length);
972 			nexthdr = hbhhdr->ip6h_nxt;
973 			length += exthdrlength;
974 			break;
975 
976 		case IPPROTO_DSTOPTS:
977 			desthdr = (ip6_dest_t *)whereptr;
978 			exthdrlength = 8 * (desthdr->ip6d_len + 1);
979 			if ((uchar_t *)desthdr + exthdrlength > endptr)
980 				return (length);
981 			nexthdr = desthdr->ip6d_nxt;
982 			length += exthdrlength;
983 			break;
984 
985 		case IPPROTO_ROUTING:
986 			rthdr = (ip6_rthdr_t *)whereptr;
987 			exthdrlength = 8 * (rthdr->ip6r_len + 1);
988 			if ((uchar_t *)rthdr + exthdrlength > endptr)
989 				return (length);
990 			nexthdr = rthdr->ip6r_nxt;
991 			length += exthdrlength;
992 			break;
993 
994 		case IPPROTO_FRAGMENT:
995 			/* LINTED */
996 			fraghdr = (ip6_frag_t *)whereptr;
997 			if ((uchar_t *)&fraghdr[1] > endptr)
998 				return (length);
999 			nexthdr = fraghdr->ip6f_nxt;
1000 			length += sizeof (struct ip6_frag);
1001 			break;
1002 
1003 		case IPPROTO_NONE:
1004 		default:
1005 			return (length);
1006 		}
1007 		whereptr = (uint8_t *)ip6h + length;
1008 	}
1009 	*last_hdr_rtrn = nexthdr;
1010 
1011 	return (length);
1012 }
1013 
1014 /*
1015  * Print extension headers
1016  */
1017 static void
1018 pr_ext_headers(struct msghdr *msg)
1019 {
1020 	struct cmsghdr *cmsg;
1021 
1022 	Printf("  IPv6 extension headers: ");
1023 
1024 	for (cmsg = CMSG_FIRSTHDR(msg); cmsg != NULL;
1025 	    cmsg = CMSG_NXTHDR(msg, cmsg)) {
1026 		if (cmsg->cmsg_level == IPPROTO_IPV6) {
1027 			switch (cmsg->cmsg_type) {
1028 			case IPV6_HOPOPTS:
1029 				Printf(" <hop-by-hop options>");
1030 				break;
1031 
1032 			case IPV6_DSTOPTS:
1033 				Printf(" <destination options (after routing"
1034 				    "header)>");
1035 				break;
1036 
1037 			case IPV6_RTHDRDSTOPTS:
1038 				Printf(" <destination options (before routing"
1039 				    "header)>");
1040 				break;
1041 
1042 			case IPV6_RTHDR:
1043 				pr_rthdr((uchar_t *)CMSG_DATA(cmsg));
1044 				break;
1045 
1046 			default:
1047 				Printf(" <option type %d>", cmsg->cmsg_type);
1048 				break;
1049 			}
1050 		}
1051 	}
1052 	(void) putchar('\n');
1053 }
1054 
1055 /*
1056  * Print the routing header 0 information
1057  */
1058 static void
1059 pr_rthdr(uchar_t *buf)
1060 {
1061 	ip6_rthdr_t *rthdr;
1062 	ip6_rthdr0_t *rthdr0;
1063 	struct in6_addr *gw_addr;
1064 	int i, num_addr;
1065 
1066 	rthdr = (ip6_rthdr_t *)buf;
1067 	Printf(" <type %d routing header, segleft %u> ",
1068 	    rthdr->ip6r_type, rthdr->ip6r_segleft);
1069 
1070 	if (rthdr->ip6r_type == 0) {
1071 		/* LINTED */
1072 		rthdr0 = (ip6_rthdr0_t *)buf;
1073 		gw_addr = (struct in6_addr *)(rthdr0 + 1);
1074 		num_addr = rthdr0->ip6r0_len / 2;
1075 
1076 		for (i = 0; i < num_addr; i++) {
1077 			Printf("%s", pr_name((char *)gw_addr, AF_INET6));
1078 			if (i == (num_addr - rthdr0->ip6r0_segleft))
1079 				Printf("(Current)");
1080 			gw_addr++;
1081 			if (i != num_addr - 1)
1082 				Printf(",  ");
1083 		}
1084 	}
1085 }
1086