diff options
author | Stanley Hopcroft <stanleyhopcroft@users.sourceforge.net> | 2005-02-01 07:33:13 (GMT) |
---|---|---|
committer | Stanley Hopcroft <stanleyhopcroft@users.sourceforge.net> | 2005-02-01 07:33:13 (GMT) |
commit | bf9d0869beeb86911855e1867ebd3ec5e4bdf746 (patch) | |
tree | 5ac901b7a6c61628bc0d7a09b9099d065038ed20 /plugins/check_icmp.c | |
parent | b7c0754632ece2e05cbb5d3d7af6a925d2dfba7b (diff) | |
download | monitoring-plugins-bf9d0869beeb86911855e1867ebd3ec5e4bdf746.tar.gz |
Revised check_icmp (1.0) from A Ericsson.
git-svn-id: https://nagiosplug.svn.sourceforge.net/svnroot/nagiosplug/nagiosplug/trunk@1118 f882894a-f735-0410-b71e-b25c423dba1c
Diffstat (limited to 'plugins/check_icmp.c')
-rw-r--r-- | plugins/check_icmp.c | 2241 |
1 files changed, 1012 insertions, 1229 deletions
diff --git a/plugins/check_icmp.c b/plugins/check_icmp.c index 4571682..2f03552 100644 --- a/plugins/check_icmp.c +++ b/plugins/check_icmp.c | |||
@@ -1,1416 +1,1199 @@ | |||
1 | /* | 1 | /* |
2 | * $Id$ | 2 | * $Id$ |
3 | * | 3 | * |
4 | * This is a hack of fping2 made to work with nagios. | 4 | * Author: Andreas Ericsson <ae@op5.se> |
5 | * It's fast and removes the necessity of parsing another programs output. | ||
6 | * | 5 | * |
7 | * VIEWING NOTES: | 6 | * License: GNU GPL 2.0 or any later version. |
8 | * This file was formatted with tab indents at a tab stop of 4. | ||
9 | * | 7 | * |
10 | * It is highly recommended that your editor is set to this | 8 | * Relevant RFC's: 792 (ICMP), 791 (IP) |
11 | * tab stop setting for viewing and editing. | ||
12 | * | 9 | * |
13 | * COPYLEFT; | 10 | * This program was modeled somewhat after the check_icmp program, |
14 | * This programs copyright status is currently undetermined. Much of | 11 | * which was in turn a hack of fping (www.fping.org) but has been |
15 | * the code in it comes from the fping2 program which used to be licensed | 12 | * completely rewritten since to generate higher precision rta values, |
16 | * under the Stanford General Software License (available at | 13 | * and support several different modes as well as setting ttl to control. |
17 | * http://graphics.stanford.edu/software/license.html). It is presently | 14 | * redundant routes. The only remainders of fping is currently a few |
18 | * unclear what license (if any) applies to the original code at the | 15 | * function names. |
19 | * moment. | ||
20 | * | 16 | * |
21 | * The fping website can be found at http://www.fping.com | ||
22 | */ | 17 | */ |
23 | 18 | ||
24 | const char *progname = "check_icmp"; | 19 | #include <sys/time.h> |
25 | const char *revision = "$Revision$"; | 20 | #include <sys/types.h> |
26 | const char *copyright = "2004"; | ||
27 | const char *email = "nagiosplug-devel@lists.sourceforge.net"; | ||
28 | |||
29 | #include "common.h" | ||
30 | #include "netutils.h" | ||
31 | #include "utils.h" | ||
32 | |||
33 | #include <stdio.h> | 21 | #include <stdio.h> |
34 | #include <errno.h> | ||
35 | #include <time.h> | ||
36 | #include <signal.h> | ||
37 | |||
38 | #include <unistd.h> | ||
39 | |||
40 | #include <stdlib.h> | 22 | #include <stdlib.h> |
41 | 23 | #include <stdarg.h> | |
42 | #include <string.h> | 24 | #include <unistd.h> |
43 | #include <stddef.h> | 25 | #include <stddef.h> |
44 | 26 | #include <errno.h> | |
45 | #include <sys/types.h> | 27 | #include <string.h> |
46 | #include <sys/time.h> | 28 | #include <ctype.h> |
29 | #include <netdb.h> | ||
47 | #include <sys/socket.h> | 30 | #include <sys/socket.h> |
48 | |||
49 | #include <sys/file.h> | ||
50 | |||
51 | #include <netinet/in_systm.h> | 31 | #include <netinet/in_systm.h> |
52 | #include <netinet/in.h> | 32 | #include <netinet/in.h> |
53 | |||
54 | #include <netinet/ip.h> | 33 | #include <netinet/ip.h> |
55 | #include <netinet/ip_icmp.h> | 34 | #include <netinet/ip_icmp.h> |
56 | |||
57 | #include <arpa/inet.h> | 35 | #include <arpa/inet.h> |
58 | #include <netdb.h> | 36 | #include <signal.h> |
59 | |||
60 | /* RS6000 has sys/select.h */ | ||
61 | #ifdef HAVE_SYS_SELECT_H | ||
62 | #include <sys/select.h> | ||
63 | #endif /* HAVE_SYS_SELECT_H */ | ||
64 | 37 | ||
65 | /* rta threshold values can't be larger than MAXTTL seconds */ | 38 | /** sometimes undefined system macros (quite a few, actually) **/ |
66 | #ifndef MAXTTL | 39 | #ifndef MAXTTL |
67 | # define MAXTTL 255 | 40 | # define MAXTTL 255 |
68 | #endif | ||
69 | #ifndef IPDEFTTL | ||
70 | # define IPDEFTTL 64 | ||
71 | #endif | 41 | #endif |
72 | |||
73 | /*** externals ***/ | ||
74 | extern char *optarg; | ||
75 | extern int optind, opterr; | ||
76 | |||
77 | /*** Constants ***/ | ||
78 | //#define EMAIL "ae@op5.se" | ||
79 | //#define VERSION "0.8.1" | ||
80 | |||
81 | #ifndef INADDR_NONE | 42 | #ifndef INADDR_NONE |
82 | # define INADDR_NONE 0xffffffU | 43 | # define INADDR_NONE 0xffffffU |
83 | #endif | 44 | #endif |
84 | 45 | ||
85 | /*** Ping packet defines ***/ | 46 | #ifndef SOL_IP |
86 | /* data added after ICMP header for our nefarious purposes */ | 47 | #define SOL_IP 0 |
87 | typedef struct ping_data { | ||
88 | unsigned int ping_count; /* counts up to -[n|p] count or 1 */ | ||
89 | struct timeval ping_ts; /* time sent */ | ||
90 | } PING_DATA; | ||
91 | |||
92 | #define MIN_PING_DATA sizeof(PING_DATA) | ||
93 | #define MAX_IP_PACKET 65536 /* (theoretical) max IP packet size */ | ||
94 | #define SIZE_IP_HDR 20 | ||
95 | #define SIZE_ICMP_HDR ICMP_MINLEN /* from ip_icmp.h */ | ||
96 | #define MAX_PING_DATA (MAX_IP_PACKET - SIZE_IP_HDR - SIZE_ICMP_HDR) | ||
97 | |||
98 | /* | ||
99 | * Interval is the minimum amount of time between sending a ping packet to | ||
100 | * any host. | ||
101 | * | ||
102 | * Perhost_interval is the minimum amount of time between sending a ping | ||
103 | * packet to a particular responding host | ||
104 | * | ||
105 | * Timeout is the initial amount of time between sending a ping packet to | ||
106 | * a particular non-responding host. | ||
107 | * | ||
108 | * Retry is the number of ping packets to send to a non-responding host | ||
109 | * before giving up (in is-it-alive mode). | ||
110 | * | ||
111 | * Backoff factor is how much longer to wait on successive retries. | ||
112 | */ | ||
113 | #ifndef DEFAULT_INTERVAL | ||
114 | #define DEFAULT_INTERVAL 25 /* default time between packets (msec) */ | ||
115 | #endif | ||
116 | |||
117 | #ifndef DEFAULT_RETRY | ||
118 | #define DEFAULT_RETRY 1 /* number of times to retry a host */ | ||
119 | #endif | 48 | #endif |
120 | 49 | ||
121 | #ifndef DEFAULT_TIMEOUT | 50 | /* we bundle these in one #ifndef, since they're all from BSD |
122 | # define DEFAULT_TIMEOUT 1000 | 51 | * Put individual #ifndef's around those that bother you */ |
52 | #ifndef ICMP_UNREACH_NET_UNKNOWN | ||
53 | # define ICMP_UNREACH_NET_UNKNOWN 6 | ||
54 | # define ICMP_UNREACH_HOST_UNKNOWN 7 | ||
55 | # define ICMP_UNREACH_ISOLATED 8 | ||
56 | # define ICMP_UNREACH_NET_PROHIB 9 | ||
57 | # define ICMP_UNREACH_HOST_PROHIB 10 | ||
58 | # define ICMP_UNREACH_TOSNET 11 | ||
59 | # define ICMP_UNREACH_TOSHOST 12 | ||
123 | #endif | 60 | #endif |
124 | 61 | /* tru64 has the ones above, but not these */ | |
125 | #ifndef DEFAULT_BACKOFF_FACTOR | 62 | #ifndef ICMP_UNREACH_FILTER_PROHIB |
126 | #define DEFAULT_BACKOFF_FACTOR 1.5 /* exponential timeout factor */ | 63 | # define ICMP_UNREACH_FILTER_PROHIB 13 |
64 | # define ICMP_UNREACH_HOST_PRECEDENCE 14 | ||
65 | # define ICMP_UNREACH_PRECEDENCE_CUTOFF 15 | ||
127 | #endif | 66 | #endif |
128 | #define MIN_BACKOFF_FACTOR 1.0 /* exponential timeout factor */ | ||
129 | #define MAX_BACKOFF_FACTOR 5.0 /* exponential timeout factor */ | ||
130 | |||
131 | #ifndef DNS_TIMEOUT | ||
132 | #define DNS_TIMEOUT 1000 /* time in usec for dns retry */ | ||
133 | #endif | ||
134 | |||
135 | #ifndef MAX_RTA_THRESHOLD_VALUE | ||
136 | # define MAX_RTA_THRESHOLD_VALUE 120*1000000 /* 2 minutes should be enough */ | ||
137 | #endif | ||
138 | #ifndef MIN_RTA_THRESHOLD_VALUE | ||
139 | # define MIN_RTA_THRESHOLD_VALUE 10000 /* minimum RTA threshold value */ | ||
140 | #endif | ||
141 | |||
142 | /* sized so as to be like traditional ping */ | ||
143 | #define DEFAULT_PING_DATA_SIZE (MIN_PING_DATA + 44) | ||
144 | |||
145 | /* maxima and minima */ | ||
146 | #define MAX_COUNT 50 /* max count even if we're root */ | ||
147 | #define MAX_RETRY 5 | ||
148 | #define MIN_INTERVAL 25 /* msecs */ | ||
149 | #define MIN_TIMEOUT 50 /* msecs */ | ||
150 | |||
151 | /* response time array flags */ | ||
152 | #define RESP_WAITING -1 | ||
153 | #define RESP_UNUSED -2 | ||
154 | |||
155 | #define ICMP_UNREACH_MAXTYPE 15 | ||
156 | |||
157 | /* entry used to keep track of each host we are pinging */ | ||
158 | struct host_entry { | ||
159 | int i; /* index into array */ | ||
160 | char *name; /* name as given by user */ | ||
161 | char *host; /* text description of host */ | ||
162 | struct sockaddr_in saddr; /* internet address */ | ||
163 | unsigned short **pr; /* TCP port range to check for connectivity */ | ||
164 | struct timeval last_send_time; /* time of last packet sent */ | ||
165 | unsigned int num_sent; /* number of ping packets sent */ | ||
166 | unsigned int num_recv; /* number of pings received */ | ||
167 | unsigned int total_time; /* sum of response times */ | ||
168 | unsigned int status; /* this hosts status */ | ||
169 | unsigned int running; /* unset when through sending */ | ||
170 | unsigned int waiting; /* waiting for response */ | ||
171 | int *resp_times; /* individual response times */ | ||
172 | struct host_entry *prev, *next; /* doubly linked list */ | ||
173 | }; | ||
174 | |||
175 | typedef struct host_entry HOST_ENTRY; | ||
176 | 67 | ||
177 | struct host_name_list { | ||
178 | char *entry; | ||
179 | struct host_name_list *next; | ||
180 | }; | ||
181 | 68 | ||
182 | /* threshold structure */ | 69 | /** typedefs and such **/ |
183 | struct threshold { | 70 | enum states { |
184 | unsigned int pl; /* packet loss */ | ||
185 | unsigned int rta; /* roundtrip time average */ | ||
186 | }; | ||
187 | typedef struct threshold threshold; | ||
188 | |||
189 | /***************************************************************************** | ||
190 | * Global Variables * | ||
191 | *****************************************************************************/ | ||
192 | |||
193 | HOST_ENTRY *rrlist = NULL; /* linked list of hosts be pinged */ | ||
194 | HOST_ENTRY **table = NULL; /* array of pointers to items in the list */ | ||
195 | HOST_ENTRY *cursor; | ||
196 | |||
197 | char *prog; /* our name */ | ||
198 | int ident; /* our pid, for marking icmp packets */ | ||
199 | int sock; /* socket */ | ||
200 | u_int debug = 0; | ||
201 | |||
202 | /* threshold value defaults; | ||
203 | * WARNING; 60% packetloss or 200 msecs round trip average | ||
204 | * CRITICAL; 80% packetloss or 500 msecs round trip average */ | ||
205 | threshold warn = {60, 200 * 1000}; | ||
206 | threshold crit = {80, 500 * 1000}; | ||
207 | |||
208 | /* times get *100 because all times are calculated in 10 usec units, not ms */ | ||
209 | unsigned int retry = DEFAULT_RETRY; | ||
210 | u_int timeout = DEFAULT_TIMEOUT * 100; | ||
211 | u_int interval = DEFAULT_INTERVAL * 100; | ||
212 | float backoff = DEFAULT_BACKOFF_FACTOR; | ||
213 | u_int select_time; /* calculated using maximum threshold rta value */ | ||
214 | u_int ping_data_size = DEFAULT_PING_DATA_SIZE; | ||
215 | u_int ping_pkt_size; | ||
216 | unsigned int count = 5; | ||
217 | unsigned int trials = 1; | ||
218 | |||
219 | /* global stats */ | ||
220 | int total_replies = 0; | ||
221 | int num_jobs = 0; /* number of hosts still to do */ | ||
222 | int num_hosts = 0; /* total number of hosts */ | ||
223 | int num_alive = 0; /* total number alive */ | ||
224 | int num_unreachable = 0; /* total number unreachable */ | ||
225 | int num_noaddress = 0; /* total number of addresses not found */ | ||
226 | int num_timeout = 0; /* number of timed out packets */ | ||
227 | int num_pingsent = 0; /* total pings sent */ | ||
228 | int num_pingreceived = 0; /* total pings received */ | ||
229 | int num_othericmprcvd = 0; /* total non-echo-reply ICMP received */ | ||
230 | |||
231 | struct timeval current_time; /* current time (pseudo) */ | ||
232 | struct timeval my_start_time; /* conflict with utils.c 33, but not found ?? */ | ||
233 | struct timeval my_end_time; /* conflict with utils.c 33, but not found ?? */ | ||
234 | struct timeval last_send_time; /* time last ping was sent */ | ||
235 | struct timezone tz; | ||
236 | |||
237 | /* switches */ | ||
238 | int generate_flag = 0; /* flag for IP list generation */ | ||
239 | int stats_flag, unreachable_flag, alive_flag; | ||
240 | int elapsed_flag, version_flag, count_flag; | ||
241 | int name_flag, addr_flag, backoff_flag; | ||
242 | int multif_flag; | ||
243 | |||
244 | /*** prototypes ***/ | ||
245 | void add_name(char *); | ||
246 | void add_addr(char *, char *, struct in_addr); | ||
247 | char *na_cat(char *, struct in_addr); | ||
248 | char *cpystr(char *); | ||
249 | void crash(char *); | ||
250 | char *get_host_by_address(struct in_addr); | ||
251 | int in_cksum(u_short *, int); | ||
252 | void u_sleep(int); | ||
253 | int recvfrom_wto(int, char *, int, struct sockaddr *, int); | ||
254 | void remove_job(HOST_ENTRY *); | ||
255 | void send_ping(int, HOST_ENTRY *); | ||
256 | long timeval_diff(struct timeval *, struct timeval *); | ||
257 | //void usage(void); | ||
258 | int wait_for_reply(int); | ||
259 | void finish(void); | ||
260 | int handle_random_icmp(struct icmp *, struct sockaddr_in *); | ||
261 | char *sprint_tm(int); | ||
262 | int get_threshold(char *, threshold *); | ||
263 | |||
264 | /* common functions */ | ||
265 | void print_help (void); | ||
266 | void print_usage (void); | ||
267 | |||
268 | /*** the various exit-states */ | ||
269 | /*enum { | ||
270 | STATE_OK = 0, | 71 | STATE_OK = 0, |
271 | STATE_WARNING, | 72 | STATE_WARNING, |
272 | STATE_CRITICAL, | 73 | STATE_CRITICAL, |
273 | STATE_UNKNOWN, | 74 | STATE_UNKNOWN, |
274 | STATE_DEPENDANT, | 75 | STATE_DEPENDENT, |
275 | STATE_OOB | 76 | STATE_OOB |
276 | };*/ | ||
277 | |||
278 | /* the strings that correspond to them */ | ||
279 | /* | ||
280 | char *status_string[STATE_OOB] = { | ||
281 | "OK", | ||
282 | "WARNING", | ||
283 | "CRITICAL", | ||
284 | "UNKNOWN", | ||
285 | "DEPENDANT" | ||
286 | }; | 77 | }; |
287 | */ | ||
288 | 78 | ||
289 | int status = STATE_OK; | 79 | typedef unsigned short range_t; /* type for get_range() -- unimplemented */ |
290 | int fin_stat = STATE_OK; | 80 | |
81 | typedef struct rta_host { | ||
82 | unsigned short id; /* id in **table, and icmp pkts */ | ||
83 | char *name; /* arg used for adding this host */ | ||
84 | char *msg; /* icmp error message, if any */ | ||
85 | struct sockaddr_in saddr_in; /* the address of this host */ | ||
86 | struct in_addr error_addr; /* stores address of error replies */ | ||
87 | unsigned long long time_waited; /* total time waited, in usecs */ | ||
88 | unsigned int icmp_sent, icmp_recv, icmp_lost; /* counters */ | ||
89 | unsigned char icmp_type, icmp_code; /* type and code from errors */ | ||
90 | unsigned short flags; /* control/status flags */ | ||
91 | double rta; /* measured RTA */ | ||
92 | unsigned char pl; /* measured packet loss */ | ||
93 | struct rta_host *next; /* linked list */ | ||
94 | } rta_host; | ||
95 | |||
96 | #define FLAG_LOST_CAUSE 0x01 /* decidedly dead target. */ | ||
97 | |||
98 | /* threshold structure. all values are maximum allowed, exclusive */ | ||
99 | typedef struct threshold { | ||
100 | unsigned char pl; /* max allowed packet loss in percent */ | ||
101 | unsigned int rta; /* roundtrip time average, microseconds */ | ||
102 | } threshold; | ||
103 | |||
104 | /* the data structure */ | ||
105 | typedef struct icmp_ping_data { | ||
106 | struct timeval stime; /* timestamp (saved in protocol struct as well) */ | ||
107 | unsigned short ping_id; | ||
108 | } icmp_ping_data; | ||
109 | |||
110 | /* the different modes of this program are as follows: | ||
111 | * MODE_RTA: send all packets no matter what (mimic check_icmp and check_ping) | ||
112 | * MODE_HOSTCHECK: Return immediately upon any sign of life | ||
113 | * In addition, sends packets to ALL addresses assigned | ||
114 | * to this host (as returned by gethostbyname() or | ||
115 | * gethostbyaddr() and expects one host only to be checked at | ||
116 | * a time. Therefore, any packet response what so ever will | ||
117 | * count as a sign of life, even when received outside | ||
118 | * crit.rta limit. Do not misspell any additional IP's. | ||
119 | * MODE_ALL: Requires packets from ALL requested IP to return OK (default). | ||
120 | * MODE_ICMP: implement something similar to check_icmp (MODE_RTA without | ||
121 | * tcp and udp args does this) | ||
122 | */ | ||
123 | #define MODE_RTA 0 | ||
124 | #define MODE_HOSTCHECK 1 | ||
125 | #define MODE_ALL 2 | ||
126 | #define MODE_ICMP 3 | ||
127 | |||
128 | /* the different ping types we can do | ||
129 | * TODO: investigate ARP ping as well */ | ||
130 | #define HAVE_ICMP 1 | ||
131 | #define HAVE_UDP 2 | ||
132 | #define HAVE_TCP 4 | ||
133 | #define HAVE_ARP 8 | ||
134 | |||
135 | #define MIN_PING_DATA_SIZE sizeof(struct icmp_ping_data) | ||
136 | #define MAX_IP_PKT_SIZE 65536 /* (theoretical) max IP packet size */ | ||
137 | #define IP_HDR_SIZE 20 | ||
138 | #define MAX_PING_DATA (MAX_IP_PKT_SIZE - IP_HDR_SIZE - ICMP_MINLEN) | ||
139 | #define DEFAULT_PING_DATA_SIZE (MIN_PING_DATA_SIZE + 44) | ||
140 | |||
141 | /* various target states */ | ||
142 | #define TSTATE_INACTIVE 0x01 /* don't ping this host anymore */ | ||
143 | #define TSTATE_WAITING 0x02 /* unanswered packets on the wire */ | ||
144 | #define TSTATE_ALIVE 0x04 /* target is alive (has answered something) */ | ||
145 | #define TSTATE_UNREACH 0x08 | ||
146 | |||
147 | /** prototypes **/ | ||
148 | static void usage(unsigned char, char *); | ||
149 | static u_int get_timevar(const char *); | ||
150 | static u_int get_timevaldiff(struct timeval *, struct timeval *); | ||
151 | static int wait_for_reply(int, u_int); | ||
152 | static int recvfrom_wto(int, char *, unsigned int, struct sockaddr *, u_int *); | ||
153 | static int send_icmp_ping(int, struct rta_host *); | ||
154 | static int get_threshold(char *str, threshold *th); | ||
155 | static void run_checks(void); | ||
156 | static int add_target(char *); | ||
157 | static int add_target_ip(char *, struct in_addr *); | ||
158 | static int handle_random_icmp(struct icmp *, struct sockaddr_in *); | ||
159 | static unsigned short icmp_checksum(unsigned short *, int); | ||
160 | static void finish(int); | ||
161 | static void crash(const char *, ...); | ||
162 | |||
163 | /** external **/ | ||
164 | extern int optind, opterr, optopt; | ||
165 | extern char *optarg; | ||
166 | extern char **environ; | ||
167 | |||
168 | /** global variables **/ | ||
169 | static char *progname; | ||
170 | static struct rta_host **table, *cursor, *list; | ||
171 | static threshold crit = {80, 500000}, warn = {40, 200000}; | ||
172 | static int mode, protocols, sockets, debug = 0, timeout = 10; | ||
173 | static unsigned short icmp_pkt_size, icmp_data_size = DEFAULT_PING_DATA_SIZE; | ||
174 | static unsigned int icmp_sent = 0, icmp_recv = 0, icmp_lost = 0; | ||
175 | #define icmp_pkts_en_route (icmp_sent - (icmp_recv + icmp_lost)) | ||
176 | static unsigned short targets_down = 0, targets = 0, packets = 0; | ||
177 | #define targets_alive (targets - targets_down) | ||
178 | static unsigned int retry_interval, pkt_interval, target_interval; | ||
179 | static int icmp_sock, tcp_sock, udp_sock, status = STATE_OK; | ||
180 | static pid_t pid; | ||
181 | static struct timezone tz; | ||
182 | static struct timeval prog_start; | ||
183 | static unsigned long long max_completion_time = 0; | ||
184 | static unsigned char ttl = 0; /* outgoing ttl */ | ||
185 | static unsigned int warn_down = 1, crit_down = 1; /* host down threshold values */ | ||
186 | float pkt_backoff_factor = 1.5; | ||
187 | float target_backoff_factor = 1.5; | ||
188 | |||
189 | /** code start **/ | ||
190 | static void | ||
191 | crash(const char *fmt, ...) | ||
192 | { | ||
193 | va_list ap; | ||
194 | |||
195 | printf("%s: ", progname); | ||
196 | |||
197 | va_start(ap, fmt); | ||
198 | vprintf(fmt, ap); | ||
199 | va_end(ap); | ||
200 | |||
201 | if(errno) printf(": %s", strerror(errno)); | ||
202 | puts(""); | ||
291 | 203 | ||
292 | /***************************************************************************** | 204 | exit(3); |
293 | * Code block start * | 205 | } |
294 | *****************************************************************************/ | 206 | |
295 | int main(int argc, char **argv) | 207 | |
208 | static char * | ||
209 | get_icmp_error_msg(unsigned char icmp_type, unsigned char icmp_code) | ||
296 | { | 210 | { |
297 | int c; | 211 | char *msg = "unreachable"; |
298 | u_int lt, ht; | ||
299 | int advance; | ||
300 | struct protoent *proto; | ||
301 | uid_t uid; | ||
302 | struct host_name_list *host_ptr, *host_base_ptr; | ||
303 | |||
304 | if(strchr(argv[0], '/')) prog = strrchr(argv[0], '/') + 1; | ||
305 | else prog = argv[0]; | ||
306 | |||
307 | setlocale (LC_ALL, ""); | ||
308 | bindtextdomain (PACKAGE, LOCALEDIR); | ||
309 | textdomain (PACKAGE); | ||
310 | |||
311 | /* check if we are root */ | ||
312 | if(geteuid()) { | ||
313 | printf(_("Root access needed (for raw sockets)\n")); | ||
314 | exit(STATE_UNKNOWN); | ||
315 | } | ||
316 | 212 | ||
317 | /* confirm that ICMP is available on this machine */ | 213 | if(debug > 1) printf("get_icmp_error_msg(%u, %u)\n", icmp_type, icmp_code); |
318 | if((proto = getprotobyname("icmp")) == NULL) | 214 | switch(icmp_type) { |
319 | crash(_("icmp: unknown protocol")); | 215 | case ICMP_UNREACH: |
216 | switch(icmp_code) { | ||
217 | case ICMP_UNREACH_NET: msg = "Net unreachable"; break; | ||
218 | case ICMP_UNREACH_HOST: msg = "Host unreachable"; break; | ||
219 | case ICMP_UNREACH_PROTOCOL: msg = "Protocol unreachable (firewall?)"; break; | ||
220 | case ICMP_UNREACH_PORT: msg = "Port unreachable (firewall?)"; break; | ||
221 | case ICMP_UNREACH_NEEDFRAG: msg = "Fragmentation needed"; break; | ||
222 | case ICMP_UNREACH_SRCFAIL: msg = "Source route failed"; break; | ||
223 | case ICMP_UNREACH_ISOLATED: msg = "Source host isolated"; break; | ||
224 | case ICMP_UNREACH_NET_UNKNOWN: msg = "Unknown network"; break; | ||
225 | case ICMP_UNREACH_HOST_UNKNOWN: msg = "Unknown host"; break; | ||
226 | case ICMP_UNREACH_NET_PROHIB: msg = "Network denied (firewall?)"; break; | ||
227 | case ICMP_UNREACH_HOST_PROHIB: msg = "Host denied (firewall?)"; break; | ||
228 | case ICMP_UNREACH_TOSNET: msg = "Bad TOS for network (firewall?)"; break; | ||
229 | case ICMP_UNREACH_TOSHOST: msg = "Bad TOS for host (firewall?)"; break; | ||
230 | case ICMP_UNREACH_FILTER_PROHIB: msg = "Prohibited by filter (firewall)"; break; | ||
231 | case ICMP_UNREACH_HOST_PRECEDENCE: msg = "Host precedence violation"; break; | ||
232 | case ICMP_UNREACH_PRECEDENCE_CUTOFF: msg = "Precedence cutoff"; break; | ||
233 | default: msg = "Invalid code"; break; | ||
234 | } | ||
235 | break; | ||
320 | 236 | ||
321 | /* create raw socket for ICMP calls (ping) */ | 237 | case ICMP_TIMXCEED: |
322 | sock = socket(AF_INET, SOCK_RAW, proto->p_proto); | 238 | /* really 'out of reach', or non-existant host behind a router serving |
239 | * two different subnets */ | ||
240 | switch(icmp_code) { | ||
241 | case ICMP_TIMXCEED_INTRANS: msg = "Time to live exceeded in transit"; break; | ||
242 | case ICMP_TIMXCEED_REASS: msg = "Fragment reassembly time exceeded"; break; | ||
243 | default: msg = "Invalid code"; break; | ||
244 | } | ||
245 | break; | ||
323 | 246 | ||
324 | if(sock < 0) | 247 | case ICMP_SOURCEQUENCH: msg = "Transmitting too fast"; break; |
325 | crash(_("Can't create raw socket")); | 248 | case ICMP_REDIRECT: msg = "Redirect (change route)"; break; |
249 | case ICMP_PARAMPROB: msg = "Bad IP header (required option absent)"; break; | ||
326 | 250 | ||
327 | /* drop privileges now that we have the socket */ | 251 | /* the following aren't error messages, so ignore */ |
328 | if((uid = getuid())) { | 252 | case ICMP_TSTAMP: |
329 | seteuid(uid); | 253 | case ICMP_TSTAMPREPLY: |
254 | case ICMP_IREQ: | ||
255 | case ICMP_IREQREPLY: | ||
256 | case ICMP_MASKREQ: | ||
257 | case ICMP_MASKREPLY: | ||
258 | default: msg = ""; break; | ||
330 | } | 259 | } |
331 | |||
332 | if(argc < 2) print_usage(); | ||
333 | 260 | ||
334 | ident = getpid() & 0xFFFF; | 261 | return msg; |
262 | } | ||
263 | |||
264 | static int | ||
265 | handle_random_icmp(struct icmp *p, struct sockaddr_in *addr) | ||
266 | { | ||
267 | struct icmp *sent_icmp = NULL; | ||
268 | struct rta_host *host = NULL; | ||
269 | unsigned char *ptr; | ||
335 | 270 | ||
336 | if(!(host_base_ptr = malloc(sizeof(struct host_name_list)))) { | 271 | if(p->icmp_type == ICMP_ECHO && p->icmp_id == pid) { |
337 | crash(_("Unable to allocate memory for host name list\n")); | 272 | /* echo request from us to us (pinging localhost) */ |
273 | return 0; | ||
338 | } | 274 | } |
339 | host_ptr = host_base_ptr; | ||
340 | |||
341 | backoff_flag = 0; | ||
342 | opterr = 1; | ||
343 | |||
344 | /* get command line options | ||
345 | * -H denotes a host (actually ignored and picked up later) | ||
346 | * -h for help | ||
347 | * -V or -v for version | ||
348 | * -d to display hostnames rather than addresses | ||
349 | * -t sets timeout for packets and tcp connects | ||
350 | * -r defines retries (persistence) | ||
351 | * -p or -n sets packet count (5) | ||
352 | * -b sets packet size (56) | ||
353 | * -w sets warning threshhold (200,40%) | ||
354 | * -c sets critical threshhold (500,80%) | ||
355 | * -i sets interval for both packet transmissions and connect attempts | ||
356 | */ | ||
357 | #define OPT_STR "amH:hvVDdAp:n:b:r:t:i:w:c:" | ||
358 | while((c = getopt(argc, argv, OPT_STR)) != EOF) { | ||
359 | switch (c) { | ||
360 | case 'H': | ||
361 | if(!(host_ptr->entry = malloc(strlen(optarg) + 1))) { | ||
362 | crash(_("Failed to allocate memory for hostname")); | ||
363 | } | ||
364 | memset(host_ptr->entry, 0, strlen(optarg) + 1); | ||
365 | host_ptr->entry = memcpy(host_ptr->entry, optarg, strlen(optarg)); | ||
366 | if(!(host_ptr->next = malloc(sizeof(struct host_name_list)))) | ||
367 | crash(_("Failed to allocate memory for hostname")); | ||
368 | host_ptr = host_ptr->next; | ||
369 | host_ptr->next = NULL; | ||
370 | // add_name(optarg); | ||
371 | break; | ||
372 | /* this is recognized, but silently ignored. | ||
373 | * host(s) are added later on */ | ||
374 | 275 | ||
375 | break; | 276 | ptr = (unsigned char *)p; |
376 | case 'w': | 277 | if(debug) printf("handle_random_icmp(%p, %p)\n", (void *)p, (void *)addr); |
377 | if(get_threshold(optarg, &warn)) { | 278 | |
378 | printf(_("Illegal threshold pair specified for -%c"), c); | 279 | /* only handle a few types, since others can't possibly be replies to |
379 | print_usage(); | 280 | * us in a sane network (if it is anyway, it will be counted as lost |
380 | } | 281 | * at summary time, but not as quickly as a proper response */ |
381 | break; | 282 | /* TIMXCEED can be an unreach from a router with multiple IP's which |
283 | * serves two different subnets on the same interface and a dead host | ||
284 | * on one net is pinged from the other. The router will respond to | ||
285 | * itself and thus set TTL=0 so as to not loop forever. Even when | ||
286 | * TIMXCEED actually sends a proper icmp response we will have passed | ||
287 | * too many hops to have a hope of reaching it later, in which case it | ||
288 | * indicates overconfidence in the network, poor routing or both. */ | ||
289 | if(p->icmp_type != ICMP_UNREACH && p->icmp_type != ICMP_TIMXCEED && | ||
290 | p->icmp_type != ICMP_SOURCEQUENCH && p->icmp_type != ICMP_PARAMPROB) | ||
291 | { | ||
292 | return 0; | ||
293 | } | ||
382 | 294 | ||
383 | case 'c': | 295 | /* might be for us. At least it holds the original package (according |
384 | if(get_threshold(optarg, &crit)) { | 296 | * to RFC 792). If it isn't, just ignore it */ |
385 | printf(_("Illegal threshold pair specified for -%c"), c); | 297 | sent_icmp = (struct icmp *)(ptr + 28); |
386 | print_usage(); | 298 | if(sent_icmp->icmp_type != ICMP_ECHO || sent_icmp->icmp_id != pid || |
387 | } | 299 | sent_icmp->icmp_seq >= targets) |
388 | break; | 300 | { |
301 | if(debug) printf("Packet is no response to a packet we sent\n"); | ||
302 | return 0; | ||
303 | } | ||
389 | 304 | ||
390 | case 't': | 305 | /* it is indeed a response for us */ |
391 | if(!(timeout = (u_int) strtoul(optarg, NULL, 0) * 100)) { | 306 | host = table[sent_icmp->icmp_seq]; |
392 | printf(_("Option -%c requires integer argument\n"), c); | 307 | if(debug) { |
393 | print_usage(); | 308 | printf("Received \"%s\" from %s for ICMP ECHO sent to %s.\n", |
394 | } | 309 | get_icmp_error_msg(p->icmp_type, p->icmp_code), |
395 | break; | 310 | inet_ntoa(addr->sin_addr), host->name); |
311 | } | ||
396 | 312 | ||
397 | case 'r': | 313 | icmp_lost++; |
398 | if(!(retry = (u_int) strtoul(optarg, NULL, 0))) { | 314 | host->icmp_lost++; |
399 | printf(_("Option -%c requires integer argument\n"), c); | 315 | /* don't spend time on lost hosts any more */ |
400 | print_usage(); | 316 | if(host->flags & FLAG_LOST_CAUSE) return 0; |
401 | } | ||
402 | break; | ||
403 | 317 | ||
404 | case 'i': | 318 | /* source quench means we're sending too fast, so increase the |
405 | if(!(interval = (u_int) strtoul(optarg, NULL, 0) * 100)) { | 319 | * interval and mark this packet lost */ |
406 | printf(_("Option -%c requires positive non-zero integer argument\n"), c); | 320 | if(p->icmp_type == ICMP_SOURCEQUENCH) { |
407 | print_usage(); | 321 | pkt_interval *= pkt_backoff_factor; |
408 | } | 322 | target_interval *= target_backoff_factor; |
409 | break; | 323 | } |
324 | else { | ||
325 | targets_down++; | ||
326 | host->flags |= FLAG_LOST_CAUSE; | ||
327 | } | ||
328 | host->icmp_type = p->icmp_type; | ||
329 | host->icmp_code = p->icmp_code; | ||
330 | host->error_addr.s_addr = addr->sin_addr.s_addr; | ||
410 | 331 | ||
411 | case 'p': | 332 | return 0; |
412 | case 'n': | 333 | } |
413 | if(!(count = (u_int) strtoul(optarg, NULL, 0))) { | ||
414 | printf(_("Option -%c requires positive non-zero integer argument\n"), c); | ||
415 | print_usage(); | ||
416 | } | ||
417 | break; | ||
418 | 334 | ||
335 | int | ||
336 | main(int argc, char **argv) | ||
337 | { | ||
338 | int i; | ||
339 | char *ptr; | ||
340 | long int arg; | ||
341 | int icmp_sockerrno, udp_sockerrno, tcp_sockerrno; | ||
342 | int result; | ||
343 | struct rta_host *host; | ||
344 | |||
345 | /* we only need to be setsuid when we get the sockets, so do | ||
346 | * that before pointer magic (esp. on network data) */ | ||
347 | icmp_sockerrno = udp_sockerrno = tcp_sockerrno = sockets = 0; | ||
348 | |||
349 | if((icmp_sock = socket(PF_INET, SOCK_RAW, IPPROTO_ICMP)) != -1) | ||
350 | sockets |= HAVE_ICMP; | ||
351 | else icmp_sockerrno = errno; | ||
352 | |||
353 | /* if((udp_sock = socket(PF_INET, SOCK_DGRAM, IPPROTO_UDP)) != -1) */ | ||
354 | /* sockets |= HAVE_UDP; */ | ||
355 | /* else udp_sockerrno = errno; */ | ||
356 | |||
357 | /* if((tcp_sock = socket(PF_INET, SOCK_STREAM, IPPROTO_TCP)) != -1) */ | ||
358 | /* sockets |= HAVE_TCP; */ | ||
359 | /* else tcp_sockerrno = errno; */ | ||
360 | |||
361 | /* now drop privileges (no effect if not setsuid or geteuid() == 0) */ | ||
362 | setuid(getuid()); | ||
363 | |||
364 | /* POSIXLY_CORRECT might break things, so unset it (the portable way) */ | ||
365 | environ = NULL; | ||
366 | |||
367 | /* use the pid to mark packets as ours */ | ||
368 | pid = getpid(); | ||
369 | /* printf("pid = %u\n", pid); */ | ||
370 | |||
371 | /* get calling name the old-fashioned way for portability instead | ||
372 | * of relying on the glibc-ism __progname */ | ||
373 | ptr = strrchr(argv[0], '/'); | ||
374 | if(ptr) progname = &ptr[1]; | ||
375 | else progname = argv[0]; | ||
376 | |||
377 | /* now set defaults. Use progname to set them initially (allows for | ||
378 | * superfast check_host program when target host is up */ | ||
379 | cursor = list = NULL; | ||
380 | table = NULL; | ||
381 | |||
382 | mode = MODE_RTA; | ||
383 | crit.rta = 500000; | ||
384 | crit.pl = 80; | ||
385 | warn.rta = 200000; | ||
386 | warn.pl = 40; | ||
387 | protocols = HAVE_ICMP | HAVE_UDP | HAVE_TCP; | ||
388 | pkt_interval = 80000; /* 80 msec packet interval by default */ | ||
389 | packets = 5; | ||
390 | |||
391 | if(!strcmp(progname, "check_icmp") || !strcmp(progname, "check_ping")) { | ||
392 | mode = MODE_ICMP; | ||
393 | protocols = HAVE_ICMP; | ||
394 | } | ||
395 | else if(!strcmp(progname, "check_host")) { | ||
396 | mode = MODE_HOSTCHECK; | ||
397 | pkt_interval = 1000000; | ||
398 | packets = 5; | ||
399 | crit.rta = warn.rta = 1000000; | ||
400 | crit.pl = warn.pl = 100; | ||
401 | } | ||
402 | else if(!strcmp(progname, "check_rta_multi")) { | ||
403 | mode = MODE_ALL; | ||
404 | target_interval = 0; | ||
405 | pkt_interval = 50000; | ||
406 | packets = 5; | ||
407 | } | ||
408 | |||
409 | /* parse the arguments */ | ||
410 | for(i = 1; i < argc; i++) { | ||
411 | while((arg = getopt(argc, argv, "vhVw:c:n:p:t:H:i:b:I:l:")) != EOF) { | ||
412 | switch(arg) { | ||
413 | case 'v': | ||
414 | debug++; | ||
415 | break; | ||
419 | case 'b': | 416 | case 'b': |
420 | if(!(ping_data_size = (u_int) strtoul(optarg, NULL, 0))) { | 417 | /* silently ignored for now */ |
421 | printf(_("Option -%c requires integer argument\n"), c); | ||
422 | print_usage(); | ||
423 | } | ||
424 | break; | 418 | break; |
425 | 419 | case 'i': | |
426 | case 'h': | 420 | pkt_interval = get_timevar(optarg); |
427 | print_usage(); | ||
428 | break; | 421 | break; |
429 | 422 | case 'I': | |
430 | case 'e': | 423 | target_interval = get_timevar(optarg); |
431 | elapsed_flag = 1; | ||
432 | break; | 424 | break; |
433 | 425 | case 'w': | |
434 | case 'm': | 426 | get_threshold(optarg, &warn); |
435 | multif_flag = 1; | ||
436 | break; | 427 | break; |
437 | 428 | case 'c': | |
438 | case 'd': | 429 | get_threshold(optarg, &crit); |
439 | name_flag = 1; | ||
440 | break; | 430 | break; |
441 | 431 | case 'n': | |
442 | case 'A': | 432 | case 'p': |
443 | addr_flag = 1; | 433 | packets = strtoul(optarg, NULL, 0); |
444 | break; | 434 | break; |
445 | 435 | case 't': | |
446 | case 's': | 436 | timeout = strtoul(optarg, NULL, 0); |
447 | stats_flag = 1; | 437 | if(!timeout) timeout = 10; |
448 | break; | 438 | break; |
449 | 439 | case 'H': | |
450 | case 'u': | 440 | add_target(optarg); |
451 | unreachable_flag = 1; | ||
452 | break; | 441 | break; |
453 | 442 | case 'l': | |
454 | case 'a': | 443 | ttl = (unsigned char)strtoul(optarg, NULL, 0); |
455 | alive_flag = 1; | ||
456 | break; | 444 | break; |
457 | 445 | case 'd': /* implement later, for cluster checks */ | |
458 | case 'v': | 446 | warn_down = (unsigned char)strtoul(optarg, &ptr, 0); |
459 | printf("%s: Version %s $Date$\n", prog, VERSION); | 447 | if(ptr) { |
460 | printf("%s: comments to %s\n", prog, email); | 448 | crit_down = (unsigned char)strtoul(ptr + 1, NULL, 0); |
461 | exit(STATE_OK); | 449 | } |
462 | |||
463 | case 'g': | ||
464 | /* use IP list generation */ | ||
465 | /* mutex with file input or command line targets */ | ||
466 | generate_flag = 1; | ||
467 | break; | 450 | break; |
468 | 451 | case 'h': case 'V': default: | |
469 | default: | 452 | usage(arg, NULL); |
470 | printf(_("Option flag -%c specified, but not recognized\n"), c); | ||
471 | print_usage(); | ||
472 | break; | 453 | break; |
454 | } | ||
473 | } | 455 | } |
474 | } | 456 | } |
475 | 457 | ||
476 | /* arguments are parsed, so now we validate them */ | 458 | argv = &argv[optind]; |
477 | 459 | while(*argv) { | |
478 | if(count > 1) count_flag = 1; | 460 | add_target(*argv); |
479 | 461 | argv++; | |
480 | /* set threshold values to 10usec units (inherited from fping.c) */ | ||
481 | crit.rta = crit.rta / 10; | ||
482 | warn.rta = warn.rta / 10; | ||
483 | select_time = crit.rta; | ||
484 | /* this isn't critical, but will most likely not be what the user expects | ||
485 | * so we tell him/her about it, but keep running anyways */ | ||
486 | if(warn.pl > crit.pl || warn.rta > crit.rta) { | ||
487 | select_time = warn.rta; | ||
488 | printf("(WARNING threshold > CRITICAL threshold) :: "); | ||
489 | fflush(stdout); | ||
490 | } | 462 | } |
491 | 463 | if(!targets) { | |
492 | /* A timeout smaller than maximum rta threshold makes no sense */ | 464 | errno = 0; |
493 | if(timeout < crit.rta) timeout = crit.rta; | 465 | crash("No hosts to check"); |
494 | else if(timeout < warn.rta) timeout = warn.rta; | 466 | exit(3); |
495 | |||
496 | if((interval < MIN_INTERVAL * 100 || retry > MAX_RETRY) && getuid()) { | ||
497 | printf(_("%s: these options are too risky for mere mortals.\n"), prog); | ||
498 | printf(_("%s: You need i >= %u and r < %u\n"), | ||
499 | prog, MIN_INTERVAL, MAX_RETRY); | ||
500 | printf(_("Current settings; i = %d, r = %d\n"), | ||
501 | interval / 100, retry); | ||
502 | print_usage(); | ||
503 | } | 467 | } |
504 | 468 | ||
505 | if((ping_data_size > MAX_PING_DATA) || (ping_data_size < MIN_PING_DATA)) { | 469 | if(!sockets) { |
506 | printf(_("%s: data size %u not valid, must be between %u and %u\n"), | 470 | if(icmp_sock == -1) { |
507 | prog, ping_data_size, MIN_PING_DATA, MAX_PING_DATA); | 471 | errno = icmp_sockerrno; |
508 | print_usage(); | 472 | crash("Failed to obtain ICMP socket"); |
509 | 473 | return -1; | |
474 | } | ||
475 | /* if(udp_sock == -1) { */ | ||
476 | /* errno = icmp_sockerrno; */ | ||
477 | /* crash("Failed to obtain UDP socket"); */ | ||
478 | /* return -1; */ | ||
479 | /* } */ | ||
480 | /* if(tcp_sock == -1) { */ | ||
481 | /* errno = icmp_sockerrno; */ | ||
482 | /* crash("Failed to obtain TCP socker"); */ | ||
483 | /* return -1; */ | ||
484 | /* } */ | ||
510 | } | 485 | } |
486 | if(!ttl) ttl = 64; | ||
511 | 487 | ||
512 | if((backoff > MAX_BACKOFF_FACTOR) || (backoff < MIN_BACKOFF_FACTOR)) { | 488 | if(icmp_sock) { |
513 | printf(_("%s: backoff factor %.1f not valid, must be between %.1f and %.1f\n"), | 489 | result = setsockopt(icmp_sock, SOL_IP, IP_TTL, &ttl, sizeof(ttl)); |
514 | prog, backoff, MIN_BACKOFF_FACTOR, MAX_BACKOFF_FACTOR); | 490 | if(debug) { |
515 | print_usage(); | 491 | if(result == -1) printf("setsockopt failed\n"); |
516 | 492 | else printf("ttl set to %u\n", ttl); | |
493 | } | ||
517 | } | 494 | } |
518 | 495 | ||
519 | if(count > MAX_COUNT) { | 496 | /* stupid users should be able to give whatever thresholds they want |
520 | printf(_("%s: count %u not valid, must be less than %u\n"), | 497 | * (nothing will break if they do), but some anal plugin maintainer |
521 | prog, count, MAX_COUNT); | 498 | * will probably add some printf() thing here later, so it might be |
522 | print_usage(); | 499 | * best to at least show them where to do it. ;) */ |
500 | if(warn.pl > crit.pl) warn.pl = crit.pl; | ||
501 | if(warn.rta > crit.rta) warn.rta = crit.rta; | ||
502 | if(warn_down > crit_down) crit_down = warn_down; | ||
503 | |||
504 | signal(SIGINT, finish); | ||
505 | signal(SIGHUP, finish); | ||
506 | signal(SIGTERM, finish); | ||
507 | signal(SIGALRM, finish); | ||
508 | if(debug) printf("Setting alarm timeout to %u seconds\n", timeout); | ||
509 | alarm(timeout); | ||
510 | |||
511 | /* make sure we don't wait any longer than necessary */ | ||
512 | gettimeofday(&prog_start, &tz); | ||
513 | max_completion_time = | ||
514 | ((targets * packets * pkt_interval) + (targets * target_interval)) + | ||
515 | (targets * packets * crit.rta) + crit.rta; | ||
516 | |||
517 | if(debug) { | ||
518 | printf("packets: %u, targets: %u\n" | ||
519 | "target_interval: %0.3f, pkt_interval %0.3f\n" | ||
520 | "crit.rta: %0.3f\n" | ||
521 | "max_completion_time: %0.3f\n", | ||
522 | packets, targets, | ||
523 | (float)target_interval / 1000, (float)pkt_interval / 1000, | ||
524 | (float)crit.rta / 1000, | ||
525 | (float)max_completion_time / 1000); | ||
523 | } | 526 | } |
524 | 527 | ||
525 | if(count_flag) { | 528 | if(debug) { |
526 | alive_flag = unreachable_flag = 0; | 529 | if(max_completion_time > (u_int)timeout * 1000000) { |
530 | printf("max_completion_time: %llu timeout: %u\n", | ||
531 | max_completion_time, timeout); | ||
532 | printf("Timout must be at lest %llu\n", | ||
533 | max_completion_time / 1000000 + 1); | ||
534 | } | ||
527 | } | 535 | } |
528 | 536 | ||
529 | trials = (count > retry + 1) ? count : retry + 1; | 537 | icmp_pkt_size = icmp_data_size + ICMP_MINLEN; |
530 | 538 | if(debug > 2) printf("icmp_pkt_size = %u\n", icmp_pkt_size); | |
531 | /* handle host names supplied on command line or in a file */ | 539 | if(icmp_pkt_size < sizeof(struct icmp) + sizeof(struct icmp_ping_data)) { |
532 | /* if the generate_flag is on, then generate the IP list */ | 540 | icmp_pkt_size = sizeof(struct icmp) + sizeof(struct icmp_ping_data); |
533 | argv = &argv[optind]; | ||
534 | |||
535 | /* cover allowable conditions */ | ||
536 | |||
537 | /* generate requires command line parameters beyond the switches */ | ||
538 | if(generate_flag && !*argv) { | ||
539 | printf(_("Generate flag requires command line parameters beyond switches\n")); | ||
540 | print_usage(); | ||
541 | } | 541 | } |
542 | 542 | if(debug > 2) printf("icmp_pkt_size = %u\n", icmp_pkt_size); | |
543 | if(*argv && !generate_flag) { | 543 | |
544 | while(*argv) { | 544 | if(debug) { |
545 | if(!(host_ptr->entry = malloc(strlen(*argv) + 1))) { | 545 | printf("crit = {%u, %u%%}, warn = {%u, %u%%}\n", |
546 | crash(_("Failed to allocate memory for hostname")); | 546 | crit.rta, crit.pl, warn.rta, warn.pl); |
547 | } | 547 | printf("pkt_interval: %u target_interval: %u retry_interval: %u\n", |
548 | memset(host_ptr->entry, 0, strlen(*argv) + 1); | 548 | pkt_interval, target_interval, retry_interval); |
549 | host_ptr->entry = memcpy(host_ptr->entry, *argv, strlen(*argv)); | 549 | printf("icmp_pkt_size: %u timeout: %u\n", |
550 | if(!(host_ptr->next = malloc(sizeof(struct host_name_list)))) | 550 | icmp_pkt_size, timeout); |
551 | crash(_("Failed to allocate memory for hostname")); | ||
552 | host_ptr = host_ptr->next; | ||
553 | host_ptr->next = NULL; | ||
554 | |||
555 | // add_name(*argv); | ||
556 | argv++; | ||
557 | } | ||
558 | } | 551 | } |
559 | 552 | ||
560 | // now add all the hosts | 553 | if(packets > 20) { |
561 | host_ptr = host_base_ptr; | 554 | errno = 0; |
562 | while(host_ptr->next) { | 555 | crash("packets is > 20 (%d)", packets); |
563 | add_name(host_ptr->entry); | ||
564 | host_ptr = host_ptr->next; | ||
565 | } | 556 | } |
566 | 557 | ||
567 | if(!num_hosts) { | 558 | host = list; |
568 | printf(_("No hosts to work with!\n\n")); | 559 | table = malloc(sizeof(struct rta_host **) * (argc - 1)); |
569 | print_usage(); | 560 | i = 0; |
561 | while(host) { | ||
562 | host->id = i; | ||
563 | table[i] = host; | ||
564 | host = host->next; | ||
565 | i++; | ||
570 | } | 566 | } |
571 | 567 | ||
572 | /* allocate array to hold outstanding ping requests */ | 568 | run_checks(); |
573 | table = (HOST_ENTRY **) malloc(sizeof(HOST_ENTRY *) * num_hosts); | ||
574 | if(!table) crash(_("Can't malloc array of hosts")); | ||
575 | |||
576 | cursor = rrlist; | ||
577 | |||
578 | for(num_jobs = 0; num_jobs < num_hosts; num_jobs++) { | ||
579 | table[num_jobs] = cursor; | ||
580 | cursor->i = num_jobs; | ||
581 | |||
582 | cursor = cursor->next; | ||
583 | } /* FOR */ | ||
584 | 569 | ||
585 | ping_pkt_size = ping_data_size + SIZE_ICMP_HDR; | 570 | errno = 0; |
571 | finish(0); | ||
586 | 572 | ||
587 | signal(SIGINT, (void *)finish); | 573 | return(0); |
588 | 574 | } | |
589 | gettimeofday(&my_start_time, &tz); | ||
590 | current_time = my_start_time; | ||
591 | |||
592 | last_send_time.tv_sec = current_time.tv_sec - 10000; | ||
593 | |||
594 | cursor = rrlist; | ||
595 | advance = 0; | ||
596 | |||
597 | /* main loop */ | ||
598 | while(num_jobs) { | ||
599 | /* fetch all packets that receive within time boundaries */ | ||
600 | while(num_pingsent && | ||
601 | cursor && | ||
602 | cursor->num_sent > cursor->num_recv && | ||
603 | wait_for_reply(sock)) ; | ||
604 | |||
605 | if(cursor && advance) { | ||
606 | cursor = cursor->next; | ||
607 | } | ||
608 | |||
609 | gettimeofday(¤t_time, &tz); | ||
610 | lt = timeval_diff(¤t_time, &last_send_time); | ||
611 | ht = timeval_diff(¤t_time, &cursor->last_send_time); | ||
612 | |||
613 | advance = 1; | ||
614 | |||
615 | /* if it's OK to send while counting or looping or starting */ | ||
616 | if(lt > interval) { | ||
617 | /* send if starting or looping */ | ||
618 | if((cursor->num_sent == 0)) { | ||
619 | send_ping(sock, cursor); | ||
620 | continue; | ||
621 | } /* IF */ | ||
622 | |||
623 | /* send if counting and count not exceeded */ | ||
624 | if(count_flag) { | ||
625 | if(cursor->num_sent < count) { | ||
626 | send_ping(sock, cursor); | ||
627 | continue; | ||
628 | } /* IF */ | ||
629 | } /* IF */ | ||
630 | } /* IF */ | ||
631 | |||
632 | /* is-it-alive mode, and timeout exceeded while waiting for a reply */ | ||
633 | /* and we haven't exceeded our retries */ | ||
634 | if((lt > interval) && !count_flag && !cursor->num_recv && | ||
635 | (ht > timeout) && (cursor->waiting < retry + 1)) { | ||
636 | num_timeout++; | ||
637 | |||
638 | /* try again */ | ||
639 | send_ping(sock, cursor); | ||
640 | continue; | ||
641 | } /* IF */ | ||
642 | |||
643 | /* didn't send, can we remove? */ | ||
644 | |||
645 | /* remove if counting and count exceeded */ | ||
646 | if(count_flag) { | ||
647 | if((cursor->num_sent >= count)) { | ||
648 | remove_job(cursor); | ||
649 | continue; | ||
650 | } /* IF */ | ||
651 | } /* IF */ | ||
652 | else { | ||
653 | /* normal mode, and we got one */ | ||
654 | if(cursor->num_recv) { | ||
655 | remove_job(cursor); | ||
656 | continue; | ||
657 | } /* IF */ | ||
658 | 575 | ||
659 | /* normal mode, and timeout exceeded while waiting for a reply */ | 576 | static void |
660 | /* and we've run out of retries, so node is unreachable */ | 577 | run_checks() |
661 | if((ht > timeout) && (cursor->waiting >= retry + 1)) { | 578 | { |
662 | num_timeout++; | 579 | u_int i, t, result; |
663 | remove_job(cursor); | 580 | u_int final_wait, time_passed; |
581 | |||
582 | /* this loop might actually violate the pkt_interval or target_interval | ||
583 | * settings, but only if there aren't any packets on the wire which | ||
584 | * indicates that the target can handle an increased packet rate */ | ||
585 | for(i = 0; i < packets; i++) { | ||
586 | for(t = 0; t < targets; t++) { | ||
587 | /* don't send useless packets */ | ||
588 | if(!targets_alive) finish(0); | ||
589 | if(table[t]->flags & FLAG_LOST_CAUSE) { | ||
590 | if(debug) printf("%s is a lost cause. not sending any more\n", | ||
591 | table[t]->name); | ||
664 | continue; | 592 | continue; |
593 | } | ||
594 | |||
595 | /* we're still in the game, so send next packet */ | ||
596 | (void)send_icmp_ping(icmp_sock, table[t]); | ||
597 | result = wait_for_reply(icmp_sock, target_interval); | ||
598 | } | ||
599 | result = wait_for_reply(icmp_sock, pkt_interval * targets); | ||
600 | } | ||
665 | 601 | ||
666 | } /* IF */ | 602 | if(icmp_pkts_en_route && targets_alive) { |
667 | } /* ELSE */ | 603 | time_passed = get_timevaldiff(NULL, NULL); |
604 | final_wait = max_completion_time - time_passed; | ||
668 | 605 | ||
669 | /* could send to this host, so keep considering it */ | 606 | if(debug) { |
670 | if(ht > interval) { | 607 | printf("time_passed: %u final_wait: %u max_completion_time: %llu\n", |
671 | advance = 0; | 608 | time_passed, final_wait, max_completion_time); |
609 | } | ||
610 | if(time_passed > max_completion_time) { | ||
611 | if(debug) printf("Time passed. Finishing up\n"); | ||
612 | finish(0); | ||
672 | } | 613 | } |
673 | } /* WHILE */ | ||
674 | 614 | ||
675 | finish(); | 615 | /* catch the packets that might come in within the timeframe, but |
676 | return 0; | 616 | * haven't yet */ |
677 | } /* main() */ | 617 | if(debug) printf("Waiting for %u micro-seconds (%0.3f msecs)\n", |
618 | final_wait, (float)final_wait / 1000); | ||
619 | result = wait_for_reply(icmp_sock, final_wait); | ||
620 | } | ||
621 | } | ||
678 | 622 | ||
679 | /************************************************************ | 623 | /* response structure: |
680 | * Description: | 624 | * ip header : 20 bytes |
681 | * | 625 | * icmp header : 28 bytes |
682 | * Main program clean up and exit point | 626 | * icmp echo reply : the rest |
683 | ************************************************************/ | 627 | */ |
684 | void finish() | 628 | static int |
629 | wait_for_reply(int sock, u_int t) | ||
685 | { | 630 | { |
686 | int i; | 631 | int n, hlen; |
687 | HOST_ENTRY *h; | 632 | static char buf[4096]; |
688 | 633 | struct sockaddr_in resp_addr; | |
689 | gettimeofday(&my_end_time, &tz); | 634 | struct ip *ip; |
690 | 635 | struct icmp *icp, *sent_icmp; | |
691 | /* tot up unreachables */ | 636 | struct rta_host *host; |
692 | for(i=0; i<num_hosts; i++) { | 637 | struct icmp_ping_data *data; |
693 | h = table[i]; | 638 | struct timeval wait_start, now; |
694 | 639 | u_int tdiff, i, per_pkt_wait; | |
695 | if(!h->num_recv) { | 640 | |
696 | num_unreachable++; | 641 | /* if we can't listen or don't have anything to listen to, just return */ |
697 | status = fin_stat = STATE_CRITICAL; | 642 | if(!t || !icmp_pkts_en_route) return 0; |
698 | if(num_hosts == 1) { | 643 | |
699 | printf("CRITICAL - %s is down (lost 100%%)|" | 644 | gettimeofday(&wait_start, &tz); |
700 | "rta=;%d;%d;; pl=100%%;%d;%d;;\n", | 645 | |
701 | h->host, | 646 | i = t; |
702 | warn.rta / 100, crit.rta / 100, | 647 | per_pkt_wait = t / icmp_pkts_en_route; |
703 | warn.pl, crit.pl); | 648 | while(icmp_pkts_en_route && get_timevaldiff(&wait_start, NULL) < i) { |
704 | } | 649 | t = per_pkt_wait; |
705 | else { | 650 | |
706 | printf(_("%s is down (lost 100%%)"), h->host); | 651 | /* wrap up if all targets are declared dead */ |
707 | } | 652 | if(!targets_alive || |
653 | get_timevaldiff(&prog_start, NULL) >= max_completion_time || | ||
654 | (mode == MODE_HOSTCHECK && targets_down)) | ||
655 | { | ||
656 | finish(0); | ||
708 | } | 657 | } |
709 | else { | ||
710 | /* reset the status */ | ||
711 | status = STATE_OK; | ||
712 | 658 | ||
713 | /* check for warning before critical, for debugging purposes */ | 659 | /* reap responses until we hit a timeout */ |
714 | if(warn.rta <= h->total_time / h->num_recv) { | 660 | n = recvfrom_wto(sock, buf, sizeof(buf), |
715 | /* printf("warn.rta exceeded\n"); | 661 | (struct sockaddr *)&resp_addr, &t); |
716 | */ status = STATE_WARNING; | 662 | if(!n) { |
717 | } | 663 | if(debug > 1) { |
718 | if(warn.pl <= ((h->num_sent - h->num_recv) * 100) / h->num_sent) { | 664 | printf("recvfrom_wto() timed out during a %u usecs wait\n", |
719 | /* printf("warn.pl exceeded (pl=%d)\n", | 665 | per_pkt_wait); |
720 | ((h->num_sent - h->num_recv) * 100) / h->num_sent); | ||
721 | */ status = STATE_WARNING; | ||
722 | } | ||
723 | if(crit.rta <= h->total_time / h->num_recv) { | ||
724 | /* printf("crit.rta exceeded\n"); | ||
725 | */ status = STATE_CRITICAL; | ||
726 | } | ||
727 | if(crit.pl <= ((h->num_sent - h->num_recv) * 100) / h->num_sent) { | ||
728 | /* printf("crit.pl exceeded (pl=%d)\n", | ||
729 | ((h->num_sent - h->num_recv) * 100) / h->num_sent); | ||
730 | */ status = STATE_CRITICAL; | ||
731 | } | 666 | } |
667 | continue; /* timeout for this one, so keep trying */ | ||
668 | } | ||
669 | if(n < 0) { | ||
670 | if(debug) printf("recvfrom_wto() returned errors\n"); | ||
671 | return n; | ||
672 | } | ||
732 | 673 | ||
733 | if(num_hosts == 1 || status != STATE_OK) { | 674 | ip = (struct ip *)buf; |
734 | printf("%s - %s: rta %s ms, lost %d%%", | 675 | if(debug > 1) printf("received %u bytes from %s\n", |
735 | state_text(status), h->host, | 676 | ntohs(ip->ip_len), inet_ntoa(resp_addr.sin_addr)); |
736 | sprint_tm(h->total_time / h->num_recv), | 677 | |
737 | h->num_sent > 0 ? ((h->num_sent - h->num_recv) * 100) / h->num_sent : 0 | 678 | /* obsolete. alpha on tru64 provides the necessary defines, but isn't broken */ |
738 | ); | 679 | /* #if defined( __alpha__ ) && __STDC__ && !defined( __GLIBC__ ) */ |
739 | /* perfdata only available for single-host stuff */ | 680 | /* alpha headers are decidedly broken. Using an ansi compiler, |
740 | if(num_hosts == 1) { | 681 | * they provide ip_vhl instead of ip_hl and ip_v, so we mask |
741 | printf("|rta=%sms;%d;%d;; pl=%d%%;%d;%d;;\n", | 682 | * off the bottom 4 bits */ |
742 | sprint_tm(h->total_time / h->num_recv), warn.rta / 100, crit.rta / 100, | 683 | /* hlen = (ip->ip_vhl & 0x0f) << 2; */ |
743 | h->num_sent > 0 ? ((h->num_sent - h->num_recv) * 100) / h->num_sent : 0, warn.pl, crit.pl | 684 | /* #else */ |
744 | ); | 685 | hlen = ip->ip_hl << 2; |
745 | } | 686 | /* #endif */ |
746 | else printf(" :: "); | 687 | |
747 | } | 688 | if(n < (hlen + ICMP_MINLEN)) { |
689 | crash("received packet too short for ICMP (%d bytes, expected %d) from %s\n", | ||
690 | n, hlen + icmp_pkt_size, inet_ntoa(resp_addr.sin_addr)); | ||
691 | } | ||
692 | /* else if(debug) { */ | ||
693 | /* printf("ip header size: %u, packet size: %u (expected %u, %u)\n", */ | ||
694 | /* hlen, ntohs(ip->ip_len) - hlen, */ | ||
695 | /* sizeof(struct ip), icmp_pkt_size); */ | ||
696 | /* } */ | ||
697 | |||
698 | /* check the response */ | ||
699 | icp = (struct icmp *)(buf + hlen); | ||
700 | sent_icmp = (struct icmp *)(buf + hlen + ICMP_MINLEN); | ||
701 | /* printf("buf: %p, icp: %p, distance: %u (expected %u)\n", */ | ||
702 | /* buf, icp, */ | ||
703 | /* (u_int)icp - (u_int)buf, hlen); */ | ||
704 | /* printf("buf: %p, sent_icmp: %p, distance: %u (expected %u)\n", */ | ||
705 | /* buf, sent_icmp, */ | ||
706 | /* (u_int)sent_icmp - (u_int)buf, hlen + ICMP_MINLEN); */ | ||
707 | |||
708 | if(icp->icmp_id != pid) { | ||
709 | handle_random_icmp(icp, &resp_addr); | ||
710 | continue; | ||
711 | } | ||
748 | 712 | ||
749 | /* fin_stat should always hold the WORST state */ | 713 | if(icp->icmp_type != ICMP_ECHOREPLY || icp->icmp_seq >= targets) { |
750 | if(fin_stat != STATE_CRITICAL && status != STATE_OK) { | 714 | if(debug > 2) printf("not a proper ICMP_ECHOREPLY\n"); |
751 | fin_stat = status; | 715 | handle_random_icmp(icp, &resp_addr); |
752 | } | 716 | continue; |
753 | } | 717 | } |
754 | } | ||
755 | 718 | ||
756 | if(num_noaddress) { | 719 | /* this is indeed a valid response */ |
757 | printf(_("No hostaddress specified.\n")); | 720 | data = (struct icmp_ping_data *)(icp->icmp_data); |
758 | print_usage(); | ||
759 | } | ||
760 | else if(num_alive != num_hosts) { | ||
761 | /* for future multi-check support */ | ||
762 | /*printf("num_alive != num_hosts (%d : %d)\n", num_alive, num_hosts);*/ | ||
763 | fin_stat = STATE_CRITICAL; | ||
764 | } | ||
765 | 721 | ||
766 | if(num_hosts > 1) { | 722 | host = table[icp->icmp_seq]; |
767 | if(num_alive == num_hosts) { | 723 | gettimeofday(&now, &tz); |
768 | printf(_("OK - All %d hosts are alive\n"), num_hosts); | 724 | tdiff = get_timevaldiff(&data->stime, &now); |
725 | |||
726 | host->time_waited += tdiff; | ||
727 | host->icmp_recv++; | ||
728 | icmp_recv++; | ||
729 | |||
730 | if(debug) { | ||
731 | printf("%0.3f ms rtt from %s, outgoing ttl: %u, incoming ttl: %u\n", | ||
732 | (float)tdiff / 1000, inet_ntoa(resp_addr.sin_addr), | ||
733 | ttl, ip->ip_ttl); | ||
769 | } | 734 | } |
770 | else { | 735 | |
771 | printf(_("CRITICAL - %d of %d hosts are alive\n"), num_alive, num_hosts); | 736 | /* if we're in hostcheck mode, exit with limited printouts */ |
737 | if(mode == MODE_HOSTCHECK) { | ||
738 | printf("OK - %s responds to ICMP. Packet %u, rta %0.3fms|" | ||
739 | "pkt=%u;;0;%u rta=%0.3f;%0.3f;%0.3f;;\n", | ||
740 | host->name, icmp_recv, (float)tdiff / 1000, | ||
741 | icmp_recv, packets, (float)tdiff / 1000, | ||
742 | (float)warn.rta / 1000, (float)crit.rta / 1000); | ||
743 | exit(STATE_OK); | ||
772 | } | 744 | } |
773 | } | 745 | } |
774 | exit(fin_stat); | ||
775 | } | ||
776 | 746 | ||
747 | return 0; | ||
748 | } | ||
777 | 749 | ||
778 | void send_ping(int lsock, HOST_ENTRY *h) | 750 | /* the ping functions */ |
751 | static int | ||
752 | send_icmp_ping(int sock, struct rta_host *host) | ||
779 | { | 753 | { |
780 | char *buffer; | 754 | static char *buf = NULL; /* re-use so we prevent leaks */ |
755 | long int len; | ||
781 | struct icmp *icp; | 756 | struct icmp *icp; |
782 | PING_DATA *pdp; | 757 | struct icmp_ping_data *data; |
783 | int n; | 758 | struct timeval tv; |
784 | 759 | struct sockaddr *addr; | |
785 | buffer = (char *)malloc((size_t) ping_pkt_size); | ||
786 | if(!buffer) | ||
787 | crash(_("Can't malloc ping packet")); | ||
788 | 760 | ||
789 | memset(buffer, 0, ping_pkt_size * sizeof(char)); | 761 | |
790 | icp = (struct icmp *)buffer; | 762 | if(sock == -1) { |
763 | errno = 0; | ||
764 | crash("Attempt to send on bogus socket"); | ||
765 | return -1; | ||
766 | } | ||
767 | addr = (struct sockaddr *)&host->saddr_in; | ||
768 | |||
769 | if(!buf) { | ||
770 | buf = (char *)malloc(icmp_pkt_size + sizeof(struct ip)); | ||
771 | if(!buf) { | ||
772 | crash("send_icmp_ping(): failed to malloc %d bytes for send buffer", | ||
773 | icmp_pkt_size); | ||
774 | return -1; /* might be reached if we're in debug mode */ | ||
775 | } | ||
776 | } | ||
777 | memset(buf, 0, icmp_pkt_size + sizeof(struct ip)); | ||
791 | 778 | ||
792 | gettimeofday(&h->last_send_time, &tz); | 779 | if((gettimeofday(&tv, &tz)) == -1) return -1; |
793 | 780 | ||
781 | icp = (struct icmp *)buf; | ||
794 | icp->icmp_type = ICMP_ECHO; | 782 | icp->icmp_type = ICMP_ECHO; |
795 | icp->icmp_code = 0; | 783 | icp->icmp_code = 0; |
796 | icp->icmp_cksum = 0; | 784 | icp->icmp_cksum = 0; |
797 | icp->icmp_seq = h->i; | 785 | icp->icmp_id = pid; |
798 | icp->icmp_id = ident; | 786 | icp->icmp_seq = host->id; |
799 | 787 | data = (struct icmp_ping_data *)icp->icmp_data; | |
800 | pdp = (PING_DATA *) (buffer + SIZE_ICMP_HDR); | 788 | data->ping_id = 10; /* host->icmp.icmp_sent; */ |
801 | pdp->ping_ts = h->last_send_time; | 789 | memcpy(&data->stime, &tv, sizeof(struct timeval)); |
802 | pdp->ping_count = h->num_sent; | 790 | icp->icmp_cksum = icmp_checksum((u_short *)icp, icmp_pkt_size); |
803 | 791 | ||
804 | icp->icmp_cksum = in_cksum((u_short *) icp, ping_pkt_size); | 792 | len = sendto(sock, buf, icmp_pkt_size, 0, (struct sockaddr *)addr, |
805 | 793 | sizeof(struct sockaddr)); | |
806 | n = sendto(lsock, buffer, ping_pkt_size, 0, | 794 | |
807 | (struct sockaddr *)&h->saddr, sizeof(struct sockaddr_in)); | 795 | if(len < 0 || (unsigned int)len != icmp_pkt_size) { |
808 | 796 | if(debug) printf("Failed to send ping to %s\n", | |
809 | if(n < 0 || (unsigned int)n != ping_pkt_size) { | 797 | inet_ntoa(host->saddr_in.sin_addr)); |
810 | if(unreachable_flag) { | 798 | return -1; |
811 | printf(_("%s error while sending ping: %s\n"), | 799 | } |
812 | h->host, strerror(errno)); | ||
813 | } /* IF */ | ||
814 | |||
815 | num_unreachable++; | ||
816 | remove_job(h); | ||
817 | } /* IF */ | ||
818 | else { | ||
819 | /* mark this trial as outstanding */ | ||
820 | h->resp_times[h->num_sent] = RESP_WAITING; | ||
821 | 800 | ||
822 | h->num_sent++; | 801 | icmp_sent++; |
823 | h->waiting++; | 802 | host->icmp_sent++; |
824 | num_pingsent++; | ||
825 | last_send_time = h->last_send_time; | ||
826 | } /* ELSE */ | ||
827 | 803 | ||
828 | free(buffer); | 804 | return 0; |
829 | } /* send_ping() */ | 805 | } |
830 | 806 | ||
831 | int wait_for_reply(int lsock) | 807 | static int |
808 | recvfrom_wto(int sock, char *buf, unsigned int len, struct sockaddr *saddr, | ||
809 | u_int *timo) | ||
832 | { | 810 | { |
833 | int result; | 811 | u_int slen; |
834 | static char buffer[4096]; | ||
835 | struct sockaddr_in response_addr; | ||
836 | struct ip *ip; | ||
837 | int hlen; | ||
838 | struct icmp *icp; | ||
839 | int n; | 812 | int n; |
840 | HOST_ENTRY *h = NULL; | 813 | struct timeval to, then, now; |
841 | long this_reply; | 814 | fd_set rd, wr; |
842 | int this_count; | ||
843 | struct timeval sent_time; | ||
844 | |||
845 | result = recvfrom_wto(lsock, buffer, sizeof(buffer), | ||
846 | (struct sockaddr *)&response_addr, select_time); | ||
847 | |||
848 | if(result < 0) return 0; /* timeout */ | ||
849 | |||
850 | ip = (struct ip *)buffer; | ||
851 | |||
852 | #if defined( __alpha__ ) && __STDC__ && !defined( __GLIBC__ ) | ||
853 | /* The alpha headers are decidedly broken. | ||
854 | * Using an ANSI compiler, it provides ip_vhl instead of ip_hl and | ||
855 | * ip_v. So, to get ip_hl, we mask off the bottom four bits. | ||
856 | */ | ||
857 | hlen = (ip->ip_vhl & 0x0F) << 2; | ||
858 | #else | ||
859 | hlen = ip->ip_hl << 2; | ||
860 | #endif /* defined(__alpha__) && __STDC__ */ | ||
861 | 815 | ||
862 | if(result < hlen + ICMP_MINLEN) { | 816 | if(!*timo) { |
863 | printf(_("Received packet too short for ICMP (%d bytes from %s)\n"), result, | 817 | if(debug) printf("*timo is not\n"); |
864 | inet_ntoa(response_addr.sin_addr)); | ||
865 | |||
866 | return (1); /* too short */ | ||
867 | } /* IF */ | ||
868 | |||
869 | icp = (struct icmp *)(buffer + hlen); | ||
870 | if(icp->icmp_type != ICMP_ECHOREPLY) { | ||
871 | /* handle some problem */ | ||
872 | if(handle_random_icmp(icp, &response_addr)) | ||
873 | num_othericmprcvd++; | ||
874 | |||
875 | return 1; | ||
876 | } /* IF */ | ||
877 | |||
878 | if(icp->icmp_id != ident) | ||
879 | return 1; /* packet received, but not the one we are looking for! */ | ||
880 | |||
881 | num_pingreceived++; | ||
882 | |||
883 | if(icp->icmp_seq >= (n_short) num_hosts) | ||
884 | return(1); /* packet received, don't worry about it anymore */ | ||
885 | |||
886 | n = icp->icmp_seq; | ||
887 | h = table[n]; | ||
888 | |||
889 | /* received ping is cool, so process it */ | ||
890 | |||
891 | gettimeofday(¤t_time, &tz); | ||
892 | h->waiting = 0; | ||
893 | h->num_recv++; | ||
894 | |||
895 | memcpy(&sent_time, icp->icmp_data + offsetof(PING_DATA, ping_ts), | ||
896 | sizeof(sent_time)); | ||
897 | memcpy(&this_count, icp->icmp_data, sizeof(this_count)); | ||
898 | |||
899 | this_reply = timeval_diff(¤t_time, &sent_time); | ||
900 | h->total_time += this_reply; | ||
901 | total_replies++; | ||
902 | |||
903 | /* note reply time in array, probably */ | ||
904 | if((this_count >= 0) && ((unsigned int)this_count < trials)) { | ||
905 | if(h->resp_times[this_count] != RESP_WAITING) { | ||
906 | printf(_("%s : duplicate for [%d], %d bytes, %s ms"), | ||
907 | h->host, this_count, result, sprint_tm(this_reply)); | ||
908 | |||
909 | if(response_addr.sin_addr.s_addr != h->saddr.sin_addr.s_addr) | ||
910 | printf(" [<- %s]\n", inet_ntoa(response_addr.sin_addr)); | ||
911 | } /* IF */ | ||
912 | else h->resp_times[this_count] = this_reply; | ||
913 | } /* IF */ | ||
914 | else { | ||
915 | /* count is out of bounds?? */ | ||
916 | printf(_("%s : duplicate for [%d], %d bytes, %s ms\n"), | ||
917 | h->host, this_count, result, sprint_tm(this_reply)); | ||
918 | } /* ELSE */ | ||
919 | |||
920 | if(h->num_recv == 1) { | ||
921 | num_alive++; | ||
922 | } /* IF */ | ||
923 | |||
924 | return num_jobs; | ||
925 | } /* wait_for_reply() */ | ||
926 | |||
927 | int handle_random_icmp(struct icmp *p, struct sockaddr_in *addr) | ||
928 | { | ||
929 | struct icmp *sent_icmp; | ||
930 | u_char *c; | ||
931 | HOST_ENTRY *h; | ||
932 | |||
933 | c = (u_char *) p; | ||
934 | switch (p->icmp_type) { | ||
935 | case ICMP_UNREACH: | ||
936 | sent_icmp = (struct icmp *)(c + 28); | ||
937 | |||
938 | if((sent_icmp->icmp_type == ICMP_ECHO) && | ||
939 | (sent_icmp->icmp_id == ident) && | ||
940 | (sent_icmp->icmp_seq < (n_short) num_hosts)) { | ||
941 | /* this is a response to a ping we sent */ | ||
942 | h = table[sent_icmp->icmp_seq]; | ||
943 | |||
944 | if(p->icmp_code > ICMP_UNREACH_MAXTYPE) { | ||
945 | printf(_("ICMP Unreachable (Invalid Code) from %s for ICMP Echo sent to %s"), | ||
946 | inet_ntoa(addr->sin_addr), h->host); | ||
947 | |||
948 | } /* IF */ | ||
949 | else { | ||
950 | printf(_("ICMP Unreachable from %s for ICMP Echo sent to %s"), | ||
951 | inet_ntoa(addr->sin_addr), h->host); | ||
952 | |||
953 | } /* ELSE */ | ||
954 | |||
955 | if(inet_addr(h->host) == INADDR_NONE) | ||
956 | printf(" (%s)", inet_ntoa(h->saddr.sin_addr)); | ||
957 | |||
958 | printf("\n"); | ||
959 | |||
960 | } /* IF */ | ||
961 | |||
962 | return 1; | ||
963 | |||
964 | case ICMP_SOURCEQUENCH: | ||
965 | case ICMP_REDIRECT: | ||
966 | case ICMP_TIMXCEED: | ||
967 | case ICMP_PARAMPROB: | ||
968 | sent_icmp = (struct icmp *)(c + 28); | ||
969 | if((sent_icmp->icmp_type = ICMP_ECHO) && | ||
970 | (sent_icmp->icmp_id = ident) && | ||
971 | (sent_icmp->icmp_seq < (n_short) num_hosts)) { | ||
972 | /* this is a response to a ping we sent */ | ||
973 | h = table[sent_icmp->icmp_seq]; | ||
974 | printf(_("ICMP Unreachable from %s for ICMP Echo sent to %s"), | ||
975 | inet_ntoa(addr->sin_addr), h->host); | ||
976 | |||
977 | if(inet_addr(h->host) == INADDR_NONE) | ||
978 | printf(" (%s)", inet_ntoa(h->saddr.sin_addr)); | ||
979 | |||
980 | printf("\n"); | ||
981 | } /* IF */ | ||
982 | |||
983 | return 2; | ||
984 | |||
985 | /* no way to tell whether any of these are sent due to our ping */ | ||
986 | /* or not (shouldn't be, of course), so just discard */ | ||
987 | case ICMP_TSTAMP: | ||
988 | case ICMP_TSTAMPREPLY: | ||
989 | case ICMP_IREQ: | ||
990 | case ICMP_IREQREPLY: | ||
991 | case ICMP_MASKREQ: | ||
992 | case ICMP_MASKREPLY: | ||
993 | default: | ||
994 | return 0; | 818 | return 0; |
819 | } | ||
995 | 820 | ||
996 | } /* SWITCH */ | 821 | to.tv_sec = *timo / 1000000; |
997 | 822 | to.tv_usec = (*timo - (to.tv_sec * 1000000)); | |
998 | } /* handle_random_icmp() */ | ||
999 | |||
1000 | int in_cksum(u_short * p, int n) | ||
1001 | { | ||
1002 | register u_short answer; | ||
1003 | register long sum = 0; | ||
1004 | u_short odd_byte = 0; | ||
1005 | |||
1006 | while(n > 1) { | ||
1007 | sum += *p++; | ||
1008 | n -= 2; | ||
1009 | } /* WHILE */ | ||
1010 | |||
1011 | /* mop up an odd byte, if necessary */ | ||
1012 | if(n == 1) { | ||
1013 | *(u_char *) (&odd_byte) = *(u_char *) p; | ||
1014 | sum += odd_byte; | ||
1015 | } /* IF */ | ||
1016 | |||
1017 | sum = (sum >> 16) + (sum & 0xffff); /* add hi 16 to low 16 */ | ||
1018 | sum += (sum >> 16); /* add carry */ | ||
1019 | answer = ~sum; /* ones-complement, truncate */ | ||
1020 | |||
1021 | return (answer); | ||
1022 | |||
1023 | } /* in_cksum() */ | ||
1024 | |||
1025 | void add_name(char *name) | ||
1026 | { | ||
1027 | struct hostent *host_ent; | ||
1028 | int ipaddress; | ||
1029 | struct in_addr *ipa = (struct in_addr *)&ipaddress; | ||
1030 | struct in_addr *host_add; | ||
1031 | char *nm; | ||
1032 | int i = 0; | ||
1033 | |||
1034 | if((ipaddress = inet_addr(name)) != -1) { | ||
1035 | /* input name is an IP addr, go with it */ | ||
1036 | if(name_flag) { | ||
1037 | if(addr_flag) | ||
1038 | add_addr(name, na_cat(get_host_by_address(*ipa), *ipa), *ipa); | ||
1039 | else { | ||
1040 | nm = cpystr(get_host_by_address(*ipa)); | ||
1041 | add_addr(name, nm, *ipa); | ||
1042 | |||
1043 | } /* ELSE */ | ||
1044 | } /* IF */ | ||
1045 | else add_addr(name, name, *ipa); | ||
1046 | |||
1047 | return; | ||
1048 | } /* IF */ | ||
1049 | |||
1050 | /* input name is not an IP addr, maybe it's a host name */ | ||
1051 | host_ent = gethostbyname(name); | ||
1052 | if(host_ent == NULL) { | ||
1053 | if(h_errno == TRY_AGAIN) { | ||
1054 | u_sleep(DNS_TIMEOUT); | ||
1055 | host_ent = gethostbyname(name); | ||
1056 | } /* IF */ | ||
1057 | |||
1058 | if(host_ent == NULL) { | ||
1059 | printf(_("%s address not found\n"), name); | ||
1060 | num_noaddress++; | ||
1061 | return; | ||
1062 | } /* IF */ | ||
1063 | } /* IF */ | ||
1064 | |||
1065 | host_add = (struct in_addr *)*(host_ent->h_addr_list); | ||
1066 | if(host_add == NULL) { | ||
1067 | printf(_("%s has no address data\n"), name); | ||
1068 | num_noaddress++; | ||
1069 | return; | ||
1070 | } /* IF */ | ||
1071 | else { | ||
1072 | /* it is indeed a hostname with a real address */ | ||
1073 | while(host_add) { | ||
1074 | if(name_flag && addr_flag) | ||
1075 | add_addr(name, na_cat(name, *host_add), *host_add); | ||
1076 | else if(addr_flag) { | ||
1077 | nm = cpystr(inet_ntoa(*host_add)); | ||
1078 | add_addr(name, nm, *host_add); | ||
1079 | } /* ELSE IF */ | ||
1080 | else { | ||
1081 | add_addr(name, name, *host_add); | ||
1082 | } | ||
1083 | |||
1084 | if(!multif_flag) break; | ||
1085 | |||
1086 | host_add = (struct in_addr *)(host_ent->h_addr_list[++i]); | ||
1087 | } /* WHILE */ | ||
1088 | } /* ELSE */ | ||
1089 | } /* add_name() */ | ||
1090 | |||
1091 | |||
1092 | char *na_cat(char *name, struct in_addr ipaddr) | ||
1093 | { | ||
1094 | char *nm, *as; | ||
1095 | |||
1096 | as = inet_ntoa(ipaddr); | ||
1097 | nm = (char *)malloc(strlen(name) + strlen(as) + 4); | ||
1098 | |||
1099 | if(!nm) | ||
1100 | crash(_("Can't allocate some space for a string")); | ||
1101 | 823 | ||
1102 | strcpy(nm, name); | 824 | FD_ZERO(&rd); |
1103 | strcat(nm, " ("); | 825 | FD_ZERO(&wr); |
1104 | strcat(nm, as); | 826 | FD_SET(sock, &rd); |
1105 | strcat(nm, ")"); | 827 | errno = 0; |
828 | gettimeofday(&then, &tz); | ||
829 | n = select(sock + 1, &rd, &wr, NULL, &to); | ||
830 | if(n < 0) crash("select() in recvfrom_wto"); | ||
831 | gettimeofday(&now, &tz); | ||
832 | *timo = get_timevaldiff(&then, &now); | ||
1106 | 833 | ||
1107 | return (nm); | 834 | if(!n) return 0; /* timeout */ |
1108 | 835 | ||
1109 | } /* na_cat() */ | 836 | slen = sizeof(struct sockaddr); |
1110 | 837 | ||
838 | return recvfrom(sock, buf, len, 0, saddr, &slen); | ||
839 | } | ||
1111 | 840 | ||
1112 | void add_addr(char *name, char *host, struct in_addr ipaddr) | 841 | static void |
842 | finish(int sig) | ||
1113 | { | 843 | { |
1114 | HOST_ENTRY *p; | 844 | u_int i = 0; |
1115 | unsigned int n; | 845 | unsigned char pl; |
1116 | int *i; | 846 | double rta; |
1117 | 847 | struct rta_host *host; | |
1118 | if(!(p = (HOST_ENTRY *) malloc(sizeof(HOST_ENTRY)))) { | 848 | char *status_string[] = |
1119 | crash(_("Can't allocate HOST_ENTRY")); | 849 | {"OK", "WARNING", "CRITICAL", "UNKNOWN", "DEPENDENT"}; |
850 | |||
851 | alarm(0); | ||
852 | if(debug > 1) printf("finish(%d) called\n", sig); | ||
853 | |||
854 | if(icmp_sock != -1) close(icmp_sock); | ||
855 | if(udp_sock != -1) close(udp_sock); | ||
856 | if(tcp_sock != -1) close(tcp_sock); | ||
857 | |||
858 | if(debug) { | ||
859 | printf("icmp_sent: %u icmp_recv: %u icmp_lost: %u\n", | ||
860 | icmp_sent, icmp_recv, icmp_lost); | ||
861 | printf("targets: %u targets_alive: %u\n", targets, targets_alive); | ||
1120 | } | 862 | } |
1121 | 863 | ||
1122 | memset((char *)p, 0, sizeof(HOST_ENTRY)); | 864 | /* iterate thrice to calculate values, give output, and print perfparse */ |
1123 | 865 | host = list; | |
1124 | p->name = name; | 866 | while(host) { |
1125 | p->host = host; | 867 | if(!host->icmp_recv) { |
1126 | p->saddr.sin_family = AF_INET; | 868 | /* rta 0 is ofcourse not entirely correct, but will still show up |
1127 | p->saddr.sin_addr = ipaddr; | 869 | * conspicuosly as missing entries in perfparse and cacti */ |
1128 | p->running = 1; | 870 | pl = 100; |
871 | rta = 0; | ||
872 | status = STATE_CRITICAL; | ||
873 | /* up the down counter if not already counted */ | ||
874 | if(!(host->flags & FLAG_LOST_CAUSE) && targets_alive) targets_down++; | ||
875 | } | ||
876 | else { | ||
877 | pl = ((host->icmp_sent - host->icmp_recv) * 100) / host->icmp_sent; | ||
878 | rta = (double)host->time_waited / host->icmp_recv; | ||
879 | } | ||
880 | host->pl = pl; | ||
881 | host->rta = rta; | ||
882 | if(!status && (pl >= warn.pl || rta >= warn.rta)) status = STATE_WARNING; | ||
883 | if(pl >= crit.pl || rta >= crit.rta) status = STATE_CRITICAL; | ||
1129 | 884 | ||
1130 | /* array for response time results */ | 885 | host = host->next; |
1131 | if(!(i = (int *)malloc(trials * sizeof(int)))) { | ||
1132 | crash(_("Can't allocate resp_times array")); | ||
1133 | } | 886 | } |
887 | /* this is inevitable */ | ||
888 | if(!targets_alive) status = STATE_CRITICAL; | ||
889 | printf("%s - ", status_string[status]); | ||
890 | |||
891 | host = list; | ||
892 | while(host) { | ||
893 | if(debug) puts(""); | ||
894 | if(i) { | ||
895 | if(i < targets) printf(" :: "); | ||
896 | else printf("\n"); | ||
897 | } | ||
898 | i++; | ||
899 | if(!host->icmp_recv) { | ||
900 | status = STATE_CRITICAL; | ||
901 | if(host->flags & FLAG_LOST_CAUSE) { | ||
902 | printf("%s: %s @ %s. rta nan, lost %d%%", | ||
903 | host->name, | ||
904 | get_icmp_error_msg(host->icmp_type, host->icmp_code), | ||
905 | inet_ntoa(host->error_addr), | ||
906 | 100); | ||
907 | } | ||
908 | else { /* not marked as lost cause, so we have no flags for it */ | ||
909 | printf("%s: rta nan, lost 100%%", host->name); | ||
910 | } | ||
911 | } | ||
912 | else { /* !icmp_recv */ | ||
913 | printf("%s: rta %0.3fms, lost %u%%", | ||
914 | host->name, host->rta / 1000, host->pl); | ||
915 | } | ||
1134 | 916 | ||
1135 | for(n = 1; n < trials; n++) | 917 | host = host->next; |
1136 | i[n] = RESP_UNUSED; | 918 | } |
1137 | |||
1138 | p->resp_times = i; | ||
1139 | |||
1140 | if(!rrlist) { | ||
1141 | rrlist = p; | ||
1142 | p->next = p; | ||
1143 | p->prev = p; | ||
1144 | } /* IF */ | ||
1145 | else { | ||
1146 | p->next = rrlist; | ||
1147 | p->prev = rrlist->prev; | ||
1148 | p->prev->next = p; | ||
1149 | p->next->prev = p; | ||
1150 | } /* ELSE */ | ||
1151 | |||
1152 | num_hosts++; | ||
1153 | } /* add_addr() */ | ||
1154 | |||
1155 | |||
1156 | void remove_job(HOST_ENTRY * h) | ||
1157 | { | ||
1158 | h->running = 0; | ||
1159 | h->waiting = 0; | ||
1160 | num_jobs--; | ||
1161 | |||
1162 | |||
1163 | if(num_jobs) { | ||
1164 | /* remove us from list of active jobs */ | ||
1165 | h->prev->next = h->next; | ||
1166 | h->next->prev = h->prev; | ||
1167 | if(h == cursor) cursor = h->next; | ||
1168 | } /* IF */ | ||
1169 | else { | ||
1170 | cursor = NULL; | ||
1171 | rrlist = NULL; | ||
1172 | } /* ELSE */ | ||
1173 | |||
1174 | } /* remove_job() */ | ||
1175 | |||
1176 | |||
1177 | char *get_host_by_address(struct in_addr in) | ||
1178 | { | ||
1179 | struct hostent *h; | ||
1180 | h = gethostbyaddr((char *)&in, sizeof(struct in_addr), AF_INET); | ||
1181 | 919 | ||
1182 | if(h == NULL || h->h_name == NULL) | 920 | /* iterate once more for pretty perfparse output */ |
1183 | return inet_ntoa(in); | 921 | printf("|"); |
1184 | else | 922 | i = 0; |
1185 | return (char *)h->h_name; | 923 | host = list; |
924 | while(host) { | ||
925 | if(debug) puts(""); | ||
926 | printf("%srta=%0.3fms;%0.3f;%0.3f;0; %spl=%u%%;%u;%u;; ", | ||
927 | (targets > 1) ? host->name : "", | ||
928 | host->rta / 1000, (float)warn.rta / 1000, (float)crit.rta / 1000, | ||
929 | (targets > 1) ? host->name : "", | ||
930 | host->pl, warn.pl, crit.pl); | ||
931 | |||
932 | host = host->next; | ||
933 | } | ||
1186 | 934 | ||
1187 | } /* get_host_by_address() */ | 935 | /* finish with an empty line */ |
936 | puts(""); | ||
937 | if(debug) printf("targets: %u, targets_alive: %u\n", | ||
938 | targets, targets_alive); | ||
1188 | 939 | ||
940 | exit(status); | ||
941 | } | ||
1189 | 942 | ||
1190 | char *cpystr(char *string) | 943 | static u_int |
944 | get_timevaldiff(struct timeval *early, struct timeval *later) | ||
1191 | { | 945 | { |
1192 | char *dst; | 946 | u_int ret; |
1193 | 947 | struct timeval now; | |
1194 | if(string) { | ||
1195 | dst = (char *)malloc(1 + strlen(string)); | ||
1196 | if(!dst) crash(_("malloc() failed!")); | ||
1197 | |||
1198 | strcpy(dst, string); | ||
1199 | return dst; | ||
1200 | |||
1201 | } /* IF */ | ||
1202 | else return NULL; | ||
1203 | |||
1204 | } /* cpystr() */ | ||
1205 | 948 | ||
949 | if(!later) { | ||
950 | gettimeofday(&now, &tz); | ||
951 | later = &now; | ||
952 | } | ||
953 | if(!early) early = &prog_start; | ||
1206 | 954 | ||
1207 | void crash(char *msg) | 955 | /* if early > later we return 0 so as to indicate a timeout */ |
1208 | { | 956 | if(early->tv_sec > early->tv_sec || |
1209 | if(errno || h_errno) { | 957 | (early->tv_sec == later->tv_sec && early->tv_usec > later->tv_usec)) |
1210 | if(errno) | 958 | { |
1211 | printf("%s: %s : %s\n", prog, msg, strerror(errno)); | 959 | return 0; |
1212 | if(h_errno) | ||
1213 | printf(_("%s: %s : A network error occurred\n"), prog, msg); | ||
1214 | } | 960 | } |
1215 | else printf("%s: %s\n", prog, msg); | ||
1216 | 961 | ||
1217 | exit(STATE_UNKNOWN); | 962 | ret = (later->tv_sec - early->tv_sec) * 1000000; |
1218 | } /* crash() */ | 963 | ret += later->tv_usec - early->tv_usec; |
1219 | 964 | ||
965 | return ret; | ||
966 | } | ||
1220 | 967 | ||
1221 | long timeval_diff(struct timeval *a, struct timeval *b) | 968 | static int |
969 | add_target_ip(char *arg, struct in_addr *in) | ||
1222 | { | 970 | { |
1223 | double temp; | 971 | struct rta_host *host; |
1224 | 972 | ||
1225 | temp = (((a->tv_sec * 1000000) + a->tv_usec) - | 973 | /* disregard obviously stupid addresses */ |
1226 | ((b->tv_sec * 1000000) + b->tv_usec)) / 10; | 974 | if(in->s_addr == INADDR_NONE || in->s_addr == INADDR_ANY) |
1227 | 975 | return -1; | |
1228 | return (long)temp; | 976 | |
1229 | 977 | /* no point in adding two identical IP's, so don't. ;) */ | |
1230 | } /* timeval_diff() */ | 978 | host = list; |
1231 | 979 | while(host) { | |
980 | if(host->saddr_in.sin_addr.s_addr == in->s_addr) { | ||
981 | if(debug) printf("Identical IP already exists. Not adding %s\n", arg); | ||
982 | return -1; | ||
983 | } | ||
984 | host = host->next; | ||
985 | } | ||
1232 | 986 | ||
1233 | char *sprint_tm(int t) | 987 | /* add the fresh ip */ |
1234 | { | 988 | host = malloc(sizeof(struct rta_host)); |
1235 | static char buf[10]; | 989 | if(!host) { |
990 | crash("add_target_ip(%s, %s): malloc(%d) failed", | ||
991 | arg, inet_ntoa(*in), sizeof(struct rta_host)); | ||
992 | } | ||
993 | memset(host, 0, sizeof(struct rta_host)); | ||
1236 | 994 | ||
1237 | /* <= 0.99 ms */ | 995 | /* set the values. use calling name for output */ |
1238 | if(t < 100) { | 996 | host->name = strdup(arg); |
1239 | sprintf(buf, "0.%02d", t); | ||
1240 | return (buf); | ||
1241 | } /* IF */ | ||
1242 | 997 | ||
1243 | /* 1.00 - 9.99 ms */ | 998 | /* fill out the sockaddr_in struct */ |
1244 | if(t < 1000) { | 999 | host->saddr_in.sin_family = AF_INET; |
1245 | sprintf(buf, "%d.%02d", t / 100, t % 100); | 1000 | host->saddr_in.sin_addr.s_addr = in->s_addr; |
1246 | return (buf); | ||
1247 | } /* IF */ | ||
1248 | 1001 | ||
1249 | /* 10.0 - 99.9 ms */ | 1002 | if(!list) list = cursor = host; |
1250 | if(t < 10000) { | 1003 | else cursor->next = host; |
1251 | sprintf(buf, "%d.%d", t / 100, (t % 100) / 10); | ||
1252 | return (buf); | ||
1253 | } /* IF */ | ||
1254 | 1004 | ||
1255 | /* >= 100 ms */ | 1005 | cursor = host; |
1256 | sprintf(buf, "%d", t / 100); | 1006 | targets++; |
1257 | return (buf); | ||
1258 | } /* sprint_tm() */ | ||
1259 | 1007 | ||
1008 | return 0; | ||
1009 | } | ||
1260 | 1010 | ||
1261 | /* | 1011 | /* wrapper for add_target_ip */ |
1262 | * select() is posix, so we expect it to be around | 1012 | static int |
1263 | */ | 1013 | add_target(char *arg) |
1264 | void u_sleep(int u_sec) | ||
1265 | { | 1014 | { |
1266 | int nfound; | 1015 | int i; |
1267 | struct timeval to; | 1016 | struct hostent *he; |
1268 | fd_set readset, writeset; | 1017 | struct in_addr *in, ip; |
1269 | 1018 | ||
1270 | to.tv_sec = u_sec / 1000000; | 1019 | /* don't resolve if we don't have to */ |
1271 | to.tv_usec = u_sec - (to.tv_sec * 1000000); | 1020 | if((ip.s_addr = inet_addr(arg)) != INADDR_NONE) { |
1272 | /* printf("u_sleep :: to.tv_sec: %d, to_tv_usec: %d\n", | 1021 | /* don't add all ip's if we were given a specific one */ |
1273 | (int)to.tv_sec, (int)to.tv_usec); | 1022 | return add_target_ip(arg, &ip); |
1274 | */ | 1023 | /* he = gethostbyaddr((char *)in, sizeof(struct in_addr), AF_INET); */ |
1275 | FD_ZERO(&writeset); | 1024 | /* if(!he) return add_target_ip(arg, in); */ |
1276 | FD_ZERO(&readset); | 1025 | } |
1277 | nfound = select(0, &readset, &writeset, NULL, &to); | 1026 | else { |
1278 | if(nfound < 0) | 1027 | errno = 0; |
1279 | crash(_("select() in u_sleep:")); | 1028 | he = gethostbyname(arg); |
1280 | 1029 | if(!he) { | |
1281 | return; | 1030 | errno = 0; |
1282 | } /* u_sleep() */ | 1031 | crash("Failed to resolve %s", arg); |
1283 | 1032 | return -1; | |
1284 | 1033 | } | |
1285 | /************************************************************ | ||
1286 | * Description: | ||
1287 | * | ||
1288 | * receive with timeout | ||
1289 | * returns length of data read or -1 if timeout | ||
1290 | * crash on any other errrors | ||
1291 | ************************************************************/ | ||
1292 | /* TODO: add MSG_DONTWAIT to recvfrom flags (currently 0) */ | ||
1293 | int recvfrom_wto(int lsock, char *buf, int len, struct sockaddr *saddr, int timo) | ||
1294 | { | ||
1295 | int nfound = 0, slen, n; | ||
1296 | struct timeval to; | ||
1297 | fd_set readset, writeset; | ||
1298 | |||
1299 | to.tv_sec = timo / 1000000; | ||
1300 | to.tv_usec = (timo - (to.tv_sec * 1000000)) * 10; | ||
1301 | |||
1302 | /* printf("to.tv_sec: %d, to.tv_usec: %d\n", (int)to.tv_sec, (int)to.tv_usec); | ||
1303 | */ | ||
1304 | |||
1305 | FD_ZERO(&readset); | ||
1306 | FD_ZERO(&writeset); | ||
1307 | FD_SET(lsock, &readset); | ||
1308 | nfound = select(lsock + 1, &readset, &writeset, NULL, &to); | ||
1309 | if(nfound < 0) crash(_("select() in recvfrom_wto")); | ||
1310 | |||
1311 | if(nfound == 0) return -1; /* timeout */ | ||
1312 | |||
1313 | if(nfound) { | ||
1314 | slen = sizeof(struct sockaddr); | ||
1315 | n = recvfrom(sock, buf, len, 0, saddr, &slen); | ||
1316 | if(n < 0) crash(_("recvfrom")); | ||
1317 | return(n); | ||
1318 | } | 1034 | } |
1319 | 1035 | ||
1320 | return(0); /* 0 bytes read, so return it */ | 1036 | /* possibly add all the IP's as targets */ |
1321 | } /* recvfrom_wto() */ | 1037 | for(i = 0; he->h_addr_list[i]; i++) { |
1038 | in = (struct in_addr *)he->h_addr_list[i]; | ||
1039 | add_target_ip(arg, in); | ||
1322 | 1040 | ||
1041 | /* this is silly, but it works */ | ||
1042 | if(mode == MODE_HOSTCHECK || mode == MODE_ALL) { | ||
1043 | printf("mode: %d\n", mode); | ||
1044 | continue; | ||
1045 | } | ||
1046 | break; | ||
1047 | } | ||
1323 | 1048 | ||
1049 | return 0; | ||
1050 | } | ||
1324 | /* | 1051 | /* |
1325 | * u = micro | 1052 | * u = micro |
1326 | * m = milli | 1053 | * m = milli |
1327 | * s = seconds | 1054 | * s = seconds |
1055 | * return value is in microseconds | ||
1328 | */ | 1056 | */ |
1329 | int get_threshold(char *str, threshold *th) | 1057 | static u_int |
1058 | get_timevar(const char *str) | ||
1059 | { | ||
1060 | char p, u, *ptr; | ||
1061 | unsigned int len; | ||
1062 | u_int i, d; /* integer and decimal, respectively */ | ||
1063 | u_int factor = 1000; /* default to milliseconds */ | ||
1064 | |||
1065 | if(!str) return 0; | ||
1066 | len = strlen(str); | ||
1067 | if(!len) return 0; | ||
1068 | |||
1069 | /* unit might be given as ms|m (millisec), | ||
1070 | * us|u (microsec) or just plain s, for seconds */ | ||
1071 | u = p = '\0'; | ||
1072 | u = str[len - 1]; | ||
1073 | if(len >= 2 && !isdigit((int)str[len - 2])) p = str[len - 2]; | ||
1074 | if(p && u == 's') u = p; | ||
1075 | else if(!p) p = u; | ||
1076 | if(debug > 2) printf("evaluating %s, u: %c, p: %c\n", str, u, p); | ||
1077 | |||
1078 | if(u == 'u') factor = 1; /* microseconds */ | ||
1079 | else if(u == 'm') factor = 1000; /* milliseconds */ | ||
1080 | else if(u == 's') factor = 1000000; /* seconds */ | ||
1081 | if(debug > 2) printf("factor is %u\n", factor); | ||
1082 | |||
1083 | i = strtoul(str, &ptr, 0); | ||
1084 | if(!ptr || *ptr != '.' || strlen(ptr) < 2 || factor == 1) | ||
1085 | return i * factor; | ||
1086 | |||
1087 | /* time specified in usecs can't have decimal points, so ignore them */ | ||
1088 | if(factor == 1) return i; | ||
1089 | |||
1090 | d = strtoul(ptr + 1, NULL, 0); | ||
1091 | |||
1092 | /* d is decimal, so get rid of excess digits */ | ||
1093 | while(d >= factor) d /= 10; | ||
1094 | |||
1095 | /* the last parenthesis avoids floating point exceptions. */ | ||
1096 | return ((i * factor) + (d * (factor / 10))); | ||
1097 | } | ||
1098 | |||
1099 | /* not too good at checking errors, but it'll do (main() should barfe on -1) */ | ||
1100 | static int | ||
1101 | get_threshold(char *str, threshold *th) | ||
1330 | { | 1102 | { |
1331 | unsigned int i, factor = 0; | 1103 | char *p = NULL, i = 0; |
1332 | char *p = NULL; | ||
1333 | 1104 | ||
1334 | if(!str || !strlen(str) || !th) return -1; | 1105 | if(!str || !strlen(str) || !th) return -1; |
1335 | 1106 | ||
1336 | for(i=0; i<strlen(str); i++) { | 1107 | /* pointer magic slims code by 10 lines. i is bof-stop on stupid libc's */ |
1337 | /* we happily accept decimal points in round trip time thresholds, | 1108 | p = &str[strlen(str) - 1]; |
1338 | * but we ignore them quite blandly. The new way of specifying higher | 1109 | while(p != &str[1]) { |
1339 | * precision is to specify 'u' (for microseconds), | 1110 | if(*p == '%') *p = '\0'; |
1340 | * 'm' (for millisecs - default) or 's' for seconds. */ | 1111 | else if(*p == ',' && i) { |
1341 | if(!p && !factor) { | 1112 | *p = '\0'; /* reset it so get_timevar(str) works nicely later */ |
1342 | if(str[i] == 's') factor = 1000000; /* seconds */ | 1113 | th->pl = (unsigned char)strtoul(p+1, NULL, 0); |
1343 | else if(str[i] == 'm') factor = 1000; /* milliseconds */ | 1114 | break; |
1344 | else if(str[i] == 'u') factor = 1; /* microseconds */ | ||
1345 | } | ||
1346 | |||
1347 | if(str[i] == '%') str[i] = '\0'; | ||
1348 | else if(str[i] == ',' && !p && i != (strlen(str) - 1)) { | ||
1349 | p = &str[i+1]; | ||
1350 | str[i] = '\0'; | ||
1351 | } | 1115 | } |
1116 | i = 1; | ||
1117 | p--; | ||
1352 | } | 1118 | } |
1119 | th->rta = get_timevar(str); | ||
1120 | |||
1121 | if(!th->rta) return -1; | ||
1353 | 1122 | ||
1354 | /* default to milliseconds */ | 1123 | if(th->rta > MAXTTL * 1000000) th->rta = MAXTTL * 1000000; |
1355 | if(!factor) factor = 1000; | 1124 | if(th->pl > 100) th->pl = 100; |
1356 | 1125 | ||
1357 | if(!p || !strlen(p)) return -1; | ||
1358 | th->rta = (unsigned int)strtoul(str, NULL, 0) * factor; | ||
1359 | th->pl = (unsigned int)strtoul(p, NULL, 0); | ||
1360 | return 0; | 1126 | return 0; |
1361 | } | 1127 | } |
1362 | 1128 | ||
1363 | void | 1129 | unsigned short |
1364 | print_help (void) | 1130 | icmp_checksum(unsigned short *p, int n) |
1365 | { | 1131 | { |
1366 | print_revision (progname, revision); | 1132 | register unsigned short cksum; |
1133 | register long sum = 0; | ||
1367 | 1134 | ||
1368 | printf ("Copyright (c) 2004 Andreas Ericsson <ae@op5.se>\n"); | 1135 | while(n > 1) { |
1369 | printf (COPYRIGHT, copyright, email); | 1136 | sum += *p++; |
1137 | n -= 2; | ||
1138 | } | ||
1370 | 1139 | ||
1371 | printf (_("This plugin will check hosts sending icmp pings\n\n")); | 1140 | /* mop up the occasional odd byte */ |
1141 | if(n == 1) sum += (unsigned char)*p; | ||
1372 | 1142 | ||
1373 | print_usage (); | 1143 | sum = (sum >> 16) + (sum & 0xffff); /* add hi 16 to low 16 */ |
1144 | sum += (sum >> 16); /* add carry */ | ||
1145 | cksum = ~sum; /* ones-complement, trunc to 16 bits */ | ||
1374 | 1146 | ||
1375 | printf (_(UT_HELP_VRSN)); | 1147 | return cksum; |
1376 | |||
1377 | printf (_("\ | ||
1378 | -H, \n\ | ||
1379 | Host name argument for servers\n\ | ||
1380 | -b \n\ | ||
1381 | ping packet size in bytes (default %d)\n\ | ||
1382 | -n \n\ | ||
1383 | number of pings to send to each target (default %d)\n\ | ||
1384 | -r \n\ | ||
1385 | number of retries (default %d)\n\ | ||
1386 | -t \n\ | ||
1387 | timeout value (in msec) (default %d)\n\ | ||
1388 | -i \n\ | ||
1389 | packet interval (in msec) (default %d)\n\ | ||
1390 | -w \n\ | ||
1391 | warning threshold pair, given as RTA[ums],PL[%%]\n\ | ||
1392 | -c \n\ | ||
1393 | critical threshold pair, given as RTA[ums],PL[%%]\n\ | ||
1394 | -D \n\ | ||
1395 | increase debug output level\n\n"),ping_data_size,count,retry,(timeout / 100),DEFAULT_INTERVAL); | ||
1396 | |||
1397 | printf (_(UT_WARN_CRIT)); | ||
1398 | |||
1399 | printf (_(UT_TIMEOUT), DEFAULT_SOCKET_TIMEOUT); | ||
1400 | |||
1401 | printf (_(UT_VERBOSE)); | ||
1402 | |||
1403 | // printf (_("This plugin will check hosts sending icmp pings\n")); | ||
1404 | |||
1405 | printf (_(UT_SUPPORT)); | ||
1406 | } | 1148 | } |
1407 | 1149 | ||
1408 | void | 1150 | /* make core plugin developers happy (silly, really) */ |
1409 | print_usage (void) | 1151 | static void |
1152 | usage(unsigned char arg, char *msg) | ||
1410 | { | 1153 | { |
1411 | printf ("\ | 1154 | if(msg) printf("%s: %s\n", progname, msg); |
1412 | Usage: %s -H <vhost> | [-b <ping packet size in bytes>] [-n <number of pings>]\n\ | 1155 | |
1413 | [-r <number of retries>] [-t <timeout>] [-i packet interval]\n\ | 1156 | if(arg == 'V') { |
1414 | [-w <warning threshold>] [-c <critical threshold>]\n\ | 1157 | printf("$Id$\n"); |
1415 | [-D <debug>] \n", progname); | 1158 | exit(STATE_UNKNOWN); |
1159 | } | ||
1160 | |||
1161 | printf("Usage: %s [options] [-H] host1 host2 hostn\n\n", progname); | ||
1162 | |||
1163 | if(arg != 'h') exit(3); | ||
1164 | |||
1165 | printf("Where options are any combination of:\n" | ||
1166 | " * -H | --host specify a target\n" | ||
1167 | " * -w | --warn warning threshold (currently %0.3fms,%u%%)\n" | ||
1168 | " * -c | --crit critical threshold (currently %0.3fms,%u%%)\n" | ||
1169 | " * -n | --packets number of packets to send (currently %u)\n" | ||
1170 | " * -i | --interval max packet interval (currently %0.3fms)\n" | ||
1171 | " * -I | --hostint max target interval (currently %0.3fms)\n" | ||
1172 | " * -l | --ttl TTL on outgoing packets (currently %u)\n" | ||
1173 | " * -t | --timeout timeout value (seconds, currently %u)\n" | ||
1174 | " * -b | --bytes icmp packet size (currenly ignored)\n" | ||
1175 | " -v | --verbose verbosity++\n" | ||
1176 | " -h | --help this cruft\n", | ||
1177 | (float)warn.rta / 1000, warn.pl, (float)crit.rta / 1000, crit.pl, | ||
1178 | packets, | ||
1179 | (float)pkt_interval / 1000, (float)target_interval / 1000, | ||
1180 | ttl, timeout); | ||
1181 | |||
1182 | puts("\nThe -H switch is optional. Naming a host (or several) to check is not.\n\n" | ||
1183 | "Threshold format for -w and -c is 200.25,60% for 200.25 msec RTA and 60%\n" | ||
1184 | "packet loss. The default values should work well for most users.\n" | ||
1185 | "You can specify different RTA factors using the standardized abbreviations\n" | ||
1186 | "us (microseconds), ms (milliseconds, default) or just plain s for seconds.\n\n" | ||
1187 | "Threshold format for -d is warn,crit. 12,14 means WARNING if >= 12 hops\n" | ||
1188 | "are spent and CRITICAL if >= 14 hops are spent.\n" | ||
1189 | "NOTE: Some systems decrease TTL when forming ICMP_ECHOREPLY, others do not.\n\n" | ||
1190 | "The -v switch can be specified several times for increased verbosity.\n\n" | ||
1191 | "Long options are currently unsupported.\n\n" | ||
1192 | "Options marked with * require an argument\n"); | ||
1193 | |||
1194 | puts("The latest version of this plugin can be found at http://oss.op5.se/nagios\n" | ||
1195 | "or https://devel.op5.se/oss until the day it is included in the official\n" | ||
1196 | "plugin distribution.\n"); | ||
1197 | |||
1198 | exit(3); | ||
1416 | } | 1199 | } |