Re: git: 20b41303140e - main - ping: Print the IP options of the original packet
- Reply: José Luis Durán : "Re: git: 20b41303140e - main - ping: Print the IP options of the original packet"
- Reply: José Luis Durán : "Re: git: 20b41303140e - main - ping: Print the IP options of the original packet"
- In reply to: Mark Johnston : "git: 20b41303140e - main - ping: Print the IP options of the original packet"
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Thu, 23 Mar 2023 16:05:20 UTC
On Sun, 19 Mar 2023 16:33:25 GMT Mark Johnston <markj@FreeBSD.org> wrote: > The branch main has been updated by markj: > > URL: https://cgit.FreeBSD.org/src/commit/?id=20b41303140eee4dfb896558fb83600c5f013d39 > > commit 20b41303140eee4dfb896558fb83600c5f013d39 > Author: Jose Luis Duran <jlduran@gmail.com> > AuthorDate: 2023-02-09 15:47:53 +0000 > Commit: Mark Johnston <markj@FreeBSD.org> > CommitDate: 2023-03-19 16:23:06 +0000 > > ping: Print the IP options of the original packet > > When an ICMP packet contains an IP packet in its payload, and that > original IP packet contains options, these options were not displayed > accordingly in pr_iph(). > > pr_iph() is a function that prints the original "quoted packet" IP > header, with only an IP struct as an argument. The IP struct does not > contain IP options, and it is not guaranteed that the options will be > contiguous in memory to the IP struct after > d9cacf605e2ac0f704e1ce76357cbfbe6cb63d52. > > Pass the raw ICMP data along with the IP struct, in order to print the > options, if any. > > Reviewed by: markj > MFC after: 1 week > Differential Revision: https://reviews.freebsd.org/D38469 > --- > sbin/ping/ping.c | 19 ++++++++++--------- > sbin/ping/tests/ping_test.sh | 2 +- > sbin/ping/tests/test_ping.py | 1 - > 3 files changed, 11 insertions(+), 11 deletions(-) > > diff --git a/sbin/ping/ping.c b/sbin/ping/ping.c > index fe319bfb70a5..b1721ad72a5c 100644 > --- a/sbin/ping/ping.c > +++ b/sbin/ping/ping.c > @@ -225,7 +225,7 @@ static void pinger(void); > static char *pr_addr(struct in_addr); > static char *pr_ntime(n_time); > static void pr_icmph(struct icmp *, struct ip *, const u_char *const); > -static void pr_iph(struct ip *); > +static void pr_iph(struct ip *, const u_char *); > static void pr_pack(char *, ssize_t, struct sockaddr_in *, struct timespec *); > static void pr_retip(struct ip *, const u_char *); > static void status(int); > @@ -1157,7 +1157,6 @@ pr_pack(char *buf, ssize_t cc, struct sockaddr_in *from, struct timespec *tv) > struct ip oip; > u_char oip_header_len; > struct icmp oicmp; > - const u_char *oicmp_raw; > > /* > * Get size of IP header of the received packet. > @@ -1355,8 +1354,6 @@ pr_pack(char *buf, ssize_t cc, struct sockaddr_in *from, struct timespec *tv) > } > > memcpy(&oip, icmp_data_raw, sizeof(struct ip)); > - oicmp_raw = icmp_data_raw + oip_header_len; > - memcpy(&oicmp, oicmp_raw, sizeof(struct icmp)); Coverity is complaining about uninitialized oicmp due to the deletion of the above two lines. > > if (((options & F_VERBOSE) && uid == 0) || > (!(options & F_QUIET2) && > @@ -1366,7 +1363,7 @@ pr_pack(char *buf, ssize_t cc, struct sockaddr_in *from, struct timespec *tv) > (oicmp.icmp_id == ident))) { > (void)printf("%zd bytes from %s: ", cc, > pr_addr(from->sin_addr)); > - pr_icmph(&icp, &oip, oicmp_raw); > + pr_icmph(&icp, &oip, icmp_data_raw); > } else > return; > } > @@ -1663,14 +1660,13 @@ pr_icmph(struct icmp *icp, struct ip *oip, const u_char *const oicmp_raw) > * Print an IP header with options. > */ > static void > -pr_iph(struct ip *ip) > +pr_iph(struct ip *ip, const u_char *cp) > { > struct in_addr ina; > - u_char *cp; > int hlen; > > hlen = ip->ip_hl << 2; > - cp = (u_char *)ip + sizeof(struct ip); /* point to options */ > + cp = cp + sizeof(struct ip); /* point to options */ > > (void)printf("Vr HL TOS Len ID Flg off TTL Pro cks Src Dst\n"); > (void)printf(" %1x %1x %02x %04x %04x", > @@ -1723,7 +1719,12 @@ pr_addr(struct in_addr ina) > static void > pr_retip(struct ip *ip, const u_char *cp) > { > - pr_iph(ip); > + int8_t hlen; > + > + pr_iph(ip, cp); > + > + hlen = ip->ip_hl << 2; > + cp = cp + hlen; > > if (ip->ip_p == 6) > (void)printf("TCP: from port %u, to port %u (decimal)\n", > diff --git a/sbin/ping/tests/ping_test.sh b/sbin/ping/tests/ping_test.sh > index 9f821ed96360..53383f2fb7bc 100644 > --- a/sbin/ping/tests/ping_test.sh > +++ b/sbin/ping/tests/ping_test.sh > @@ -178,7 +178,7 @@ inject_pip_head() > } > inject_pip_body() > { > - atf_check -s exit:2 -o match:"Destination Host Unreachable" -o not-match:"01010101" python3 $(atf_get_srcdir)/injection.py pip > + atf_check -s exit:2 -o match:"Destination Host Unreachable" -o match:"(01){40}" python3 $(atf_get_srcdir)/injection.py pip > } > inject_pip_cleanup() > { > diff --git a/sbin/ping/tests/test_ping.py b/sbin/ping/tests/test_ping.py > index a9b760ff7aca..79fd332f1c18 100644 > --- a/sbin/ping/tests/test_ping.py > +++ b/sbin/ping/tests/test_ping.py > @@ -893,7 +893,6 @@ Vr HL TOS Len ID Flg off TTL Pro cks Src Dst > "stderr": "", > "redacted": False, > }, > - marks=pytest.mark.skip("XXX currently failing"), > id="_3_1_opts_NOP_40", > ), > pytest.param( > -- Cheers, Cy Schubert <Cy.Schubert@cschubert.com> FreeBSD UNIX: <cy@FreeBSD.org> Web: https://FreeBSD.org NTP: <cy@nwtime.org> Web: https://nwtime.org e^(i*pi)+1=0