pkg-monitoring-plugins/plugins-root/check_icmp.c

1633 lines
46 KiB
C
Raw Permalink Normal View History

2013-11-26 22:55:28 +00:00
/*****************************************************************************
*
2014-07-11 19:01:00 +00:00
* Monitoring check_icmp plugin
2013-11-26 22:55:28 +00:00
*
2013-11-26 22:53:19 +00:00
* License: GPL
2014-07-11 19:01:00 +00:00
* Copyright (c) 2005-2008 Monitoring Plugins Development Team
2013-11-26 22:53:19 +00:00
* Original Author : Andreas Ericsson <ae@op5.se>
2013-11-26 22:55:28 +00:00
*
2013-11-26 22:53:19 +00:00
* Description:
2013-11-26 22:55:28 +00:00
*
2013-11-26 22:53:19 +00:00
* This file contains the check_icmp plugin
2013-11-26 22:55:28 +00:00
*
* Relevant RFC's: 792 (ICMP), 791 (IP)
*
* This program was modeled somewhat after the check_icmp program,
* which was in turn a hack of fping (www.fping.org) but has been
* completely rewritten since to generate higher precision rta values,
* and support several different modes as well as setting ttl to control.
* redundant routes. The only remainders of fping is currently a few
* function names.
*
*
* This program is free software: you can redistribute it and/or modify
2013-11-26 22:53:19 +00:00
* it under the terms of the GNU General Public License as published by
2013-11-26 22:55:28 +00:00
* the Free Software Foundation, either version 3 of the License, or
2013-11-26 22:53:19 +00:00
* (at your option) any later version.
2013-11-26 22:55:28 +00:00
*
2013-11-26 22:53:19 +00:00
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
2013-11-26 22:55:28 +00:00
*
2013-11-26 22:53:19 +00:00
* You should have received a copy of the GNU General Public License
2013-11-26 22:55:28 +00:00
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*
2013-11-26 22:53:19 +00:00
*
*****************************************************************************/
/* progname may change */
/* char *progname = "check_icmp"; */
char *progname;
2013-11-26 22:55:28 +00:00
const char *copyright = "2005-2008";
2014-07-11 19:01:00 +00:00
const char *email = "devel@monitoring-plugins.org";
2013-11-26 22:53:19 +00:00
2014-07-11 19:01:00 +00:00
/** Monitoring Plugins basic includes */
2013-11-26 22:53:19 +00:00
#include "common.h"
#include "netutils.h"
#include "utils.h"
2013-11-26 22:55:28 +00:00
#if HAVE_SYS_SOCKIO_H
#include <sys/sockio.h>
#endif
2022-10-19 15:24:24 +00:00
2013-11-26 22:53:19 +00:00
#include <sys/time.h>
#include <errno.h>
2022-10-19 15:24:24 +00:00
#include <signal.h>
2013-11-26 22:53:19 +00:00
#include <ctype.h>
2013-11-26 22:55:28 +00:00
#include <net/if.h>
2013-11-26 22:53:19 +00:00
#include <netinet/in_systm.h>
#include <netinet/in.h>
#include <netinet/ip.h>
2020-12-10 20:00:09 +00:00
#include <netinet/ip6.h>
2013-11-26 22:53:19 +00:00
#include <netinet/ip_icmp.h>
2020-12-10 20:00:09 +00:00
#include <netinet/icmp6.h>
2013-11-26 22:53:19 +00:00
#include <arpa/inet.h>
/** sometimes undefined system macros (quite a few, actually) **/
#ifndef MAXTTL
# define MAXTTL 255
#endif
#ifndef INADDR_NONE
2013-11-26 22:55:28 +00:00
# define INADDR_NONE (in_addr_t)(-1)
2013-11-26 22:53:19 +00:00
#endif
#ifndef SOL_IP
#define SOL_IP 0
#endif
/* we bundle these in one #ifndef, since they're all from BSD
* Put individual #ifndef's around those that bother you */
#ifndef ICMP_UNREACH_NET_UNKNOWN
# define ICMP_UNREACH_NET_UNKNOWN 6
# define ICMP_UNREACH_HOST_UNKNOWN 7
# define ICMP_UNREACH_ISOLATED 8
# define ICMP_UNREACH_NET_PROHIB 9
# define ICMP_UNREACH_HOST_PROHIB 10
# define ICMP_UNREACH_TOSNET 11
# define ICMP_UNREACH_TOSHOST 12
#endif
/* tru64 has the ones above, but not these */
#ifndef ICMP_UNREACH_FILTER_PROHIB
# define ICMP_UNREACH_FILTER_PROHIB 13
# define ICMP_UNREACH_HOST_PRECEDENCE 14
# define ICMP_UNREACH_PRECEDENCE_CUTOFF 15
#endif
#ifndef DBL_MAX
# define DBL_MAX 9.9999999999e999
#endif
2013-11-26 22:53:19 +00:00
typedef unsigned short range_t; /* type for get_range() -- unimplemented */
typedef struct rta_host {
unsigned short id; /* id in **table, and icmp pkts */
char *name; /* arg used for adding this host */
char *msg; /* icmp error message, if any */
2020-12-10 20:00:09 +00:00
struct sockaddr_storage saddr_in; /* the address of this host */
struct sockaddr_storage error_addr; /* stores address of error replies */
2013-11-26 22:53:19 +00:00
unsigned long long time_waited; /* total time waited, in usecs */
unsigned int icmp_sent, icmp_recv, icmp_lost; /* counters */
unsigned char icmp_type, icmp_code; /* type and code from errors */
unsigned short flags; /* control/status flags */
double rta; /* measured RTA */
double rtmax; /* max rtt */
double rtmin; /* min rtt */
2013-11-26 22:53:19 +00:00
unsigned char pl; /* measured packet loss */
struct rta_host *next; /* linked list */
} rta_host;
#define FLAG_LOST_CAUSE 0x01 /* decidedly dead target. */
/* threshold structure. all values are maximum allowed, exclusive */
typedef struct threshold {
unsigned char pl; /* max allowed packet loss in percent */
unsigned int rta; /* roundtrip time average, microseconds */
} threshold;
/* the data structure */
typedef struct icmp_ping_data {
struct timeval stime; /* timestamp (saved in protocol struct as well) */
unsigned short ping_id;
} icmp_ping_data;
2020-12-10 20:00:09 +00:00
typedef union ip_hdr {
struct ip ip;
struct ip6_hdr ip6;
} ip_hdr;
typedef union icmp_packet {
void *buf;
struct icmp *icp;
struct icmp6_hdr *icp6;
u_short *cksum_in;
} icmp_packet;
2013-11-26 22:53:19 +00:00
/* the different modes of this program are as follows:
* MODE_RTA: send all packets no matter what (mimic check_icmp and check_ping)
* MODE_HOSTCHECK: Return immediately upon any sign of life
* In addition, sends packets to ALL addresses assigned
* to this host (as returned by gethostbyname() or
* gethostbyaddr() and expects one host only to be checked at
* a time. Therefore, any packet response what so ever will
* count as a sign of life, even when received outside
* crit.rta limit. Do not misspell any additional IP's.
* MODE_ALL: Requires packets from ALL requested IP to return OK (default).
* MODE_ICMP: implement something similar to check_icmp (MODE_RTA without
* tcp and udp args does this)
*/
#define MODE_RTA 0
#define MODE_HOSTCHECK 1
#define MODE_ALL 2
#define MODE_ICMP 3
/* the different ping types we can do
* TODO: investigate ARP ping as well */
#define HAVE_ICMP 1
#define HAVE_UDP 2
#define HAVE_TCP 4
#define HAVE_ARP 8
#define MIN_PING_DATA_SIZE sizeof(struct icmp_ping_data)
#define MAX_IP_PKT_SIZE 65536 /* (theoretical) max IP packet size */
#define IP_HDR_SIZE 20
#define MAX_PING_DATA (MAX_IP_PKT_SIZE - IP_HDR_SIZE - ICMP_MINLEN)
#define DEFAULT_PING_DATA_SIZE (MIN_PING_DATA_SIZE + 44)
/* various target states */
#define TSTATE_INACTIVE 0x01 /* don't ping this host anymore */
#define TSTATE_WAITING 0x02 /* unanswered packets on the wire */
#define TSTATE_ALIVE 0x04 /* target is alive (has answered something) */
#define TSTATE_UNREACH 0x08
/** prototypes **/
void print_help (void);
void print_usage (void);
static u_int get_timevar(const char *);
static u_int get_timevaldiff(struct timeval *, struct timeval *);
2013-11-26 22:55:28 +00:00
static in_addr_t get_ip_address(const char *);
2013-11-26 22:53:19 +00:00
static int wait_for_reply(int, u_int);
2016-11-30 11:36:55 +00:00
static int recvfrom_wto(int, void *, unsigned int, struct sockaddr *, u_int *, struct timeval*);
2013-11-26 22:53:19 +00:00
static int send_icmp_ping(int, struct rta_host *);
static int get_threshold(char *str, threshold *th);
static void run_checks(void);
2013-11-26 22:55:28 +00:00
static void set_source_ip(char *);
2013-11-26 22:53:19 +00:00
static int add_target(char *);
2020-12-10 20:00:09 +00:00
static int add_target_ip(char *, struct sockaddr_storage *);
static int handle_random_icmp(unsigned char *, struct sockaddr_storage *);
static void parse_address(struct sockaddr_storage *, char *, int);
2022-10-19 15:24:24 +00:00
static unsigned short icmp_checksum(uint16_t *, size_t);
2013-11-26 22:53:19 +00:00
static void finish(int);
static void crash(const char *, ...);
/** external **/
extern int optind, opterr, optopt;
extern char *optarg;
extern char **environ;
/** global variables **/
static struct rta_host **table, *cursor, *list;
static threshold crit = {80, 500000}, warn = {40, 200000};
static int mode, protocols, sockets, debug = 0, timeout = 10;
static unsigned short icmp_data_size = DEFAULT_PING_DATA_SIZE;
static unsigned short icmp_pkt_size = DEFAULT_PING_DATA_SIZE + ICMP_MINLEN;
2022-10-19 15:24:24 +00:00
static unsigned int icmp_sent = 0, icmp_recv = 0, icmp_lost = 0, ttl = 0;
2013-11-26 22:53:19 +00:00
#define icmp_pkts_en_route (icmp_sent - (icmp_recv + icmp_lost))
static unsigned short targets_down = 0, targets = 0, packets = 0;
#define targets_alive (targets - targets_down)
static unsigned int retry_interval, pkt_interval, target_interval;
static int icmp_sock, tcp_sock, udp_sock, status = STATE_OK;
static pid_t pid;
static struct timezone tz;
static struct timeval prog_start;
static unsigned long long max_completion_time = 0;
static unsigned int warn_down = 1, crit_down = 1; /* host down threshold values */
2013-11-26 22:53:44 +00:00
static int min_hosts_alive = -1;
2013-11-26 22:53:19 +00:00
float pkt_backoff_factor = 1.5;
float target_backoff_factor = 1.5;
/** code start **/
static void
crash(const char *fmt, ...)
{
va_list ap;
printf("%s: ", progname);
va_start(ap, fmt);
vprintf(fmt, ap);
va_end(ap);
if(errno) printf(": %s", strerror(errno));
puts("");
exit(3);
}
2013-11-26 22:55:28 +00:00
static const char *
2013-11-26 22:53:19 +00:00
get_icmp_error_msg(unsigned char icmp_type, unsigned char icmp_code)
{
2013-11-26 22:55:28 +00:00
const char *msg = "unreachable";
2013-11-26 22:53:19 +00:00
if(debug > 1) printf("get_icmp_error_msg(%u, %u)\n", icmp_type, icmp_code);
switch(icmp_type) {
case ICMP_UNREACH:
switch(icmp_code) {
case ICMP_UNREACH_NET: msg = "Net unreachable"; break;
case ICMP_UNREACH_HOST: msg = "Host unreachable"; break;
case ICMP_UNREACH_PROTOCOL: msg = "Protocol unreachable (firewall?)"; break;
case ICMP_UNREACH_PORT: msg = "Port unreachable (firewall?)"; break;
case ICMP_UNREACH_NEEDFRAG: msg = "Fragmentation needed"; break;
case ICMP_UNREACH_SRCFAIL: msg = "Source route failed"; break;
case ICMP_UNREACH_ISOLATED: msg = "Source host isolated"; break;
case ICMP_UNREACH_NET_UNKNOWN: msg = "Unknown network"; break;
case ICMP_UNREACH_HOST_UNKNOWN: msg = "Unknown host"; break;
case ICMP_UNREACH_NET_PROHIB: msg = "Network denied (firewall?)"; break;
case ICMP_UNREACH_HOST_PROHIB: msg = "Host denied (firewall?)"; break;
case ICMP_UNREACH_TOSNET: msg = "Bad TOS for network (firewall?)"; break;
case ICMP_UNREACH_TOSHOST: msg = "Bad TOS for host (firewall?)"; break;
case ICMP_UNREACH_FILTER_PROHIB: msg = "Prohibited by filter (firewall)"; break;
case ICMP_UNREACH_HOST_PRECEDENCE: msg = "Host precedence violation"; break;
case ICMP_UNREACH_PRECEDENCE_CUTOFF: msg = "Precedence cutoff"; break;
default: msg = "Invalid code"; break;
}
break;
case ICMP_TIMXCEED:
/* really 'out of reach', or non-existant host behind a router serving
* two different subnets */
switch(icmp_code) {
case ICMP_TIMXCEED_INTRANS: msg = "Time to live exceeded in transit"; break;
case ICMP_TIMXCEED_REASS: msg = "Fragment reassembly time exceeded"; break;
default: msg = "Invalid code"; break;
}
break;
case ICMP_SOURCEQUENCH: msg = "Transmitting too fast"; break;
case ICMP_REDIRECT: msg = "Redirect (change route)"; break;
case ICMP_PARAMPROB: msg = "Bad IP header (required option absent)"; break;
/* the following aren't error messages, so ignore */
case ICMP_TSTAMP:
case ICMP_TSTAMPREPLY:
case ICMP_IREQ:
case ICMP_IREQREPLY:
case ICMP_MASKREQ:
case ICMP_MASKREPLY:
default: msg = ""; break;
}
return msg;
}
static int
2020-12-10 20:00:09 +00:00
handle_random_icmp(unsigned char *packet, struct sockaddr_storage *addr)
2013-11-26 22:53:19 +00:00
{
2013-11-26 22:55:28 +00:00
struct icmp p, sent_icmp;
2013-11-26 22:53:19 +00:00
struct rta_host *host = NULL;
2013-11-26 22:55:28 +00:00
memcpy(&p, packet, sizeof(p));
2013-11-26 22:57:29 +00:00
if(p.icmp_type == ICMP_ECHO && ntohs(p.icmp_id) == pid) {
2013-11-26 22:53:19 +00:00
/* echo request from us to us (pinging localhost) */
return 0;
}
2013-11-26 22:55:28 +00:00
if(debug) printf("handle_random_icmp(%p, %p)\n", (void *)&p, (void *)addr);
2013-11-26 22:53:19 +00:00
/* only handle a few types, since others can't possibly be replies to
* us in a sane network (if it is anyway, it will be counted as lost
* at summary time, but not as quickly as a proper response */
/* TIMXCEED can be an unreach from a router with multiple IP's which
* serves two different subnets on the same interface and a dead host
* on one net is pinged from the other. The router will respond to
* itself and thus set TTL=0 so as to not loop forever. Even when
* TIMXCEED actually sends a proper icmp response we will have passed
* too many hops to have a hope of reaching it later, in which case it
* indicates overconfidence in the network, poor routing or both. */
2013-11-26 22:55:28 +00:00
if(p.icmp_type != ICMP_UNREACH && p.icmp_type != ICMP_TIMXCEED &&
p.icmp_type != ICMP_SOURCEQUENCH && p.icmp_type != ICMP_PARAMPROB)
2013-11-26 22:53:19 +00:00
{
return 0;
}
/* might be for us. At least it holds the original package (according
* to RFC 792). If it isn't, just ignore it */
2013-11-26 22:55:28 +00:00
memcpy(&sent_icmp, packet + 28, sizeof(sent_icmp));
2013-11-26 22:57:29 +00:00
if(sent_icmp.icmp_type != ICMP_ECHO || ntohs(sent_icmp.icmp_id) != pid ||
ntohs(sent_icmp.icmp_seq) >= targets*packets)
2013-11-26 22:53:19 +00:00
{
if(debug) printf("Packet is no response to a packet we sent\n");
return 0;
}
/* it is indeed a response for us */
2013-11-26 22:57:29 +00:00
host = table[ntohs(sent_icmp.icmp_seq)/packets];
2013-11-26 22:53:19 +00:00
if(debug) {
2020-12-10 20:00:09 +00:00
char address[INET6_ADDRSTRLEN];
parse_address(addr, address, sizeof(address));
2013-11-26 22:53:19 +00:00
printf("Received \"%s\" from %s for ICMP ECHO sent to %s.\n",
2020-12-10 20:00:09 +00:00
get_icmp_error_msg(p.icmp_type, p.icmp_code),
address, host->name);
2013-11-26 22:53:19 +00:00
}
icmp_lost++;
host->icmp_lost++;
/* don't spend time on lost hosts any more */
if(host->flags & FLAG_LOST_CAUSE) return 0;
/* source quench means we're sending too fast, so increase the
* interval and mark this packet lost */
2013-11-26 22:55:28 +00:00
if(p.icmp_type == ICMP_SOURCEQUENCH) {
2013-11-26 22:53:19 +00:00
pkt_interval *= pkt_backoff_factor;
target_interval *= target_backoff_factor;
}
else {
targets_down++;
host->flags |= FLAG_LOST_CAUSE;
}
2013-11-26 22:55:28 +00:00
host->icmp_type = p.icmp_type;
host->icmp_code = p.icmp_code;
2020-12-10 20:00:09 +00:00
host->error_addr = *addr;
2013-11-26 22:53:19 +00:00
return 0;
}
2020-12-10 20:00:09 +00:00
void parse_address(struct sockaddr_storage *addr, char *address, int size)
{
switch (address_family) {
case AF_INET:
inet_ntop(address_family, &((struct sockaddr_in *)addr)->sin_addr, address, size);
break;
case AF_INET6:
inet_ntop(address_family, &((struct sockaddr_in6 *)addr)->sin6_addr, address, size);
break;
}
}
2013-11-26 22:53:19 +00:00
int
main(int argc, char **argv)
{
int i;
char *ptr;
long int arg;
int icmp_sockerrno, udp_sockerrno, tcp_sockerrno;
int result;
struct rta_host *host;
2016-11-30 11:36:55 +00:00
#ifdef SO_TIMESTAMP
int on = 1;
#endif
2022-10-19 15:24:24 +00:00
char *source_ip = NULL;
2020-12-10 20:00:09 +00:00
char * opts_str = "vhVw:c:n:p:t:H:s:i:b:I:l:m:64";
2013-11-26 22:54:57 +00:00
setlocale (LC_ALL, "");
bindtextdomain (PACKAGE, LOCALEDIR);
textdomain (PACKAGE);
2013-11-26 22:55:28 +00:00
2013-11-26 22:53:19 +00:00
/* we only need to be setsuid when we get the sockets, so do
* that before pointer magic (esp. on network data) */
icmp_sockerrno = udp_sockerrno = tcp_sockerrno = sockets = 0;
2020-12-10 20:00:09 +00:00
address_family = -1;
int icmp_proto = IPPROTO_ICMP;
2013-11-26 22:53:19 +00:00
/* get calling name the old-fashioned way for portability instead
* of relying on the glibc-ism __progname */
ptr = strrchr(argv[0], '/');
if(ptr) progname = &ptr[1];
else progname = argv[0];
/* now set defaults. Use progname to set them initially (allows for
* superfast check_host program when target host is up */
cursor = list = NULL;
table = NULL;
mode = MODE_RTA;
crit.rta = 500000;
crit.pl = 80;
warn.rta = 200000;
warn.pl = 40;
protocols = HAVE_ICMP | HAVE_UDP | HAVE_TCP;
pkt_interval = 80000; /* 80 msec packet interval by default */
packets = 5;
if(!strcmp(progname, "check_icmp") || !strcmp(progname, "check_ping")) {
mode = MODE_ICMP;
protocols = HAVE_ICMP;
}
else if(!strcmp(progname, "check_host")) {
mode = MODE_HOSTCHECK;
pkt_interval = 1000000;
packets = 5;
crit.rta = warn.rta = 1000000;
crit.pl = warn.pl = 100;
}
else if(!strcmp(progname, "check_rta_multi")) {
mode = MODE_ALL;
target_interval = 0;
pkt_interval = 50000;
packets = 5;
}
2023-02-02 09:13:25 +00:00
/* support "--help" and "--version" */
if(argc == 2) {
if(!strcmp(argv[1], "--help"))
strcpy(argv[1], "-h");
if(!strcmp(argv[1], "--version"))
strcpy(argv[1], "-V");
}
2020-12-10 20:00:09 +00:00
/* Parse protocol arguments first */
for(i = 1; i < argc; i++) {
while((arg = getopt(argc, argv, opts_str)) != EOF) {
switch(arg) {
case '4':
if (address_family != -1)
crash("Multiple protocol versions not supported");
address_family = AF_INET;
break;
case '6':
#ifdef USE_IPV6
if (address_family != -1)
crash("Multiple protocol versions not supported");
address_family = AF_INET6;
#else
usage (_("IPv6 support not available\n"));
#endif
break;
}
}
}
2020-12-10 20:00:09 +00:00
/* Reset argument scanning */
optind = 1;
2022-10-19 15:24:24 +00:00
unsigned short size;
2013-11-26 22:53:19 +00:00
/* parse the arguments */
for(i = 1; i < argc; i++) {
2020-12-10 20:00:09 +00:00
while((arg = getopt(argc, argv, opts_str)) != EOF) {
2013-11-26 22:53:19 +00:00
switch(arg) {
case 'v':
debug++;
break;
case 'b':
2016-11-30 11:36:55 +00:00
size = (unsigned short)strtol(optarg,NULL,0);
if (size >= (sizeof(struct icmp) + sizeof(struct icmp_ping_data)) &&
size < MAX_PING_DATA) {
icmp_data_size = size;
icmp_pkt_size = size + ICMP_MINLEN;
} else
2022-10-19 15:24:24 +00:00
usage_va("ICMP data length must be between: %lu and %lu",
sizeof(struct icmp) + sizeof(struct icmp_ping_data),
MAX_PING_DATA - 1);
2013-11-26 22:53:19 +00:00
break;
case 'i':
pkt_interval = get_timevar(optarg);
break;
case 'I':
target_interval = get_timevar(optarg);
break;
case 'w':
get_threshold(optarg, &warn);
break;
case 'c':
get_threshold(optarg, &crit);
break;
case 'n':
case 'p':
packets = strtoul(optarg, NULL, 0);
break;
case 't':
timeout = strtoul(optarg, NULL, 0);
if(!timeout) timeout = 10;
break;
case 'H':
add_target(optarg);
break;
case 'l':
2022-10-19 15:24:24 +00:00
ttl = (int)strtoul(optarg, NULL, 0);
2013-11-26 22:53:19 +00:00
break;
2013-11-26 22:53:44 +00:00
case 'm':
min_hosts_alive = (int)strtoul(optarg, NULL, 0);
break;
2013-11-26 22:53:19 +00:00
case 'd': /* implement later, for cluster checks */
warn_down = (unsigned char)strtoul(optarg, &ptr, 0);
if(ptr) {
crit_down = (unsigned char)strtoul(ptr + 1, NULL, 0);
}
break;
2013-11-26 22:55:28 +00:00
case 's': /* specify source IP address */
2022-10-19 15:24:24 +00:00
source_ip = optarg;
2013-11-26 22:55:28 +00:00
break;
case 'V': /* version */
print_revision (progname, NP_VERSION);
2016-11-30 11:36:55 +00:00
exit (STATE_UNKNOWN);
case 'h': /* help */
print_help ();
2016-11-30 11:36:55 +00:00
exit (STATE_UNKNOWN);
2020-12-10 20:00:09 +00:00
break;
2013-11-26 22:53:19 +00:00
}
}
}
2020-12-10 20:00:09 +00:00
/* POSIXLY_CORRECT might break things, so unset it (the portable way) */
environ = NULL;
/* use the pid to mark packets as ours */
/* Some systems have 32-bit pid_t so mask off only 16 bits */
pid = getpid() & 0xffff;
/* printf("pid = %u\n", pid); */
/* Parse extra opts if any */
argv=np_extra_opts(&argc, argv, progname);
2013-11-26 22:53:19 +00:00
argv = &argv[optind];
while(*argv) {
add_target(*argv);
argv++;
}
if(!targets) {
errno = 0;
crash("No hosts to check");
exit(3);
}
2020-12-10 20:00:09 +00:00
// add_target might change address_family
switch ( address_family ){
case AF_INET: icmp_proto = IPPROTO_ICMP;
break;
case AF_INET6: icmp_proto = IPPROTO_ICMPV6;
break;
default: crash("Address family not supported");
}
if((icmp_sock = socket(address_family, SOCK_RAW, icmp_proto)) != -1)
sockets |= HAVE_ICMP;
else icmp_sockerrno = errno;
2022-10-19 15:24:24 +00:00
if( source_ip )
set_source_ip(source_ip);
2020-12-10 20:00:09 +00:00
#ifdef SO_TIMESTAMP
if(setsockopt(icmp_sock, SOL_SOCKET, SO_TIMESTAMP, &on, sizeof(on)))
if(debug) printf("Warning: no SO_TIMESTAMP support\n");
#endif // SO_TIMESTAMP
/* now drop privileges (no effect if not setsuid or geteuid() == 0) */
if (setuid(getuid()) == -1) {
printf("ERROR: Failed to drop privileges\n");
return 1;
}
2013-11-26 22:53:19 +00:00
if(!sockets) {
if(icmp_sock == -1) {
errno = icmp_sockerrno;
crash("Failed to obtain ICMP socket");
return -1;
}
/* if(udp_sock == -1) { */
/* errno = icmp_sockerrno; */
/* crash("Failed to obtain UDP socket"); */
/* return -1; */
/* } */
/* if(tcp_sock == -1) { */
/* errno = icmp_sockerrno; */
/* crash("Failed to obtain TCP socker"); */
/* return -1; */
/* } */
}
if(!ttl) ttl = 64;
if(icmp_sock) {
result = setsockopt(icmp_sock, SOL_IP, IP_TTL, &ttl, sizeof(ttl));
if(debug) {
if(result == -1) printf("setsockopt failed\n");
else printf("ttl set to %u\n", ttl);
}
}
/* stupid users should be able to give whatever thresholds they want
* (nothing will break if they do), but some anal plugin maintainer
* will probably add some printf() thing here later, so it might be
* best to at least show them where to do it. ;) */
if(warn.pl > crit.pl) warn.pl = crit.pl;
if(warn.rta > crit.rta) warn.rta = crit.rta;
if(warn_down > crit_down) crit_down = warn_down;
signal(SIGINT, finish);
signal(SIGHUP, finish);
signal(SIGTERM, finish);
signal(SIGALRM, finish);
if(debug) printf("Setting alarm timeout to %u seconds\n", timeout);
alarm(timeout);
/* make sure we don't wait any longer than necessary */
gettimeofday(&prog_start, &tz);
max_completion_time =
((targets * packets * pkt_interval) + (targets * target_interval)) +
(targets * packets * crit.rta) + crit.rta;
if(debug) {
printf("packets: %u, targets: %u\n"
"target_interval: %0.3f, pkt_interval %0.3f\n"
"crit.rta: %0.3f\n"
"max_completion_time: %0.3f\n",
packets, targets,
(float)target_interval / 1000, (float)pkt_interval / 1000,
(float)crit.rta / 1000,
(float)max_completion_time / 1000);
}
if(debug) {
if(max_completion_time > (u_int)timeout * 1000000) {
printf("max_completion_time: %llu timeout: %u\n",
max_completion_time, timeout);
2020-12-10 20:00:09 +00:00
printf("Timeout must be at least %llu\n",
2013-11-26 22:53:19 +00:00
max_completion_time / 1000000 + 1);
}
}
if(debug) {
printf("crit = {%u, %u%%}, warn = {%u, %u%%}\n",
crit.rta, crit.pl, warn.rta, warn.pl);
printf("pkt_interval: %u target_interval: %u retry_interval: %u\n",
pkt_interval, target_interval, retry_interval);
printf("icmp_pkt_size: %u timeout: %u\n",
icmp_pkt_size, timeout);
}
if(packets > 20) {
errno = 0;
crash("packets is > 20 (%d)", packets);
}
2013-11-26 22:53:44 +00:00
if(min_hosts_alive < -1) {
errno = 0;
crash("minimum alive hosts is negative (%i)", min_hosts_alive);
}
2013-11-26 22:53:19 +00:00
host = list;
2020-12-10 20:00:09 +00:00
table = (struct rta_host**)malloc(sizeof(struct rta_host **) * targets);
2013-11-26 22:53:19 +00:00
i = 0;
while(host) {
2013-11-26 22:57:29 +00:00
host->id = i*packets;
2013-11-26 22:53:19 +00:00
table[i] = host;
host = host->next;
i++;
}
run_checks();
errno = 0;
finish(0);
return(0);
}
static void
run_checks()
{
2022-10-19 15:24:24 +00:00
u_int i, t;
2013-11-26 22:53:19 +00:00
u_int final_wait, time_passed;
/* this loop might actually violate the pkt_interval or target_interval
* settings, but only if there aren't any packets on the wire which
* indicates that the target can handle an increased packet rate */
for(i = 0; i < packets; i++) {
for(t = 0; t < targets; t++) {
/* don't send useless packets */
if(!targets_alive) finish(0);
if(table[t]->flags & FLAG_LOST_CAUSE) {
if(debug) printf("%s is a lost cause. not sending any more\n",
table[t]->name);
continue;
}
2013-11-26 22:55:28 +00:00
2013-11-26 22:53:19 +00:00
/* we're still in the game, so send next packet */
(void)send_icmp_ping(icmp_sock, table[t]);
2022-10-19 15:24:24 +00:00
wait_for_reply(icmp_sock, target_interval);
2013-11-26 22:53:19 +00:00
}
2022-10-19 15:24:24 +00:00
wait_for_reply(icmp_sock, pkt_interval * targets);
2013-11-26 22:53:19 +00:00
}
if(icmp_pkts_en_route && targets_alive) {
time_passed = get_timevaldiff(NULL, NULL);
final_wait = max_completion_time - time_passed;
if(debug) {
printf("time_passed: %u final_wait: %u max_completion_time: %llu\n",
time_passed, final_wait, max_completion_time);
}
if(time_passed > max_completion_time) {
if(debug) printf("Time passed. Finishing up\n");
finish(0);
}
/* catch the packets that might come in within the timeframe, but
* haven't yet */
if(debug) printf("Waiting for %u micro-seconds (%0.3f msecs)\n",
final_wait, (float)final_wait / 1000);
2022-10-19 15:24:24 +00:00
wait_for_reply(icmp_sock, final_wait);
2013-11-26 22:53:19 +00:00
}
}
2020-12-10 20:00:09 +00:00
2013-11-26 22:53:19 +00:00
/* response structure:
2020-12-10 20:00:09 +00:00
* IPv4:
2013-11-26 22:53:19 +00:00
* ip header : 20 bytes
* icmp header : 28 bytes
2020-12-10 20:00:09 +00:00
* IPv6:
* ip header : 40 bytes
* icmp header : 28 bytes
* both:
2013-11-26 22:53:19 +00:00
* icmp echo reply : the rest
*/
static int
wait_for_reply(int sock, u_int t)
{
int n, hlen;
2022-10-19 15:24:24 +00:00
static unsigned char buf[65536];
2020-12-10 20:00:09 +00:00
struct sockaddr_storage resp_addr;
union ip_hdr *ip;
union icmp_packet packet;
2013-11-26 22:53:19 +00:00
struct rta_host *host;
2013-11-26 22:54:42 +00:00
struct icmp_ping_data data;
2013-11-26 22:53:19 +00:00
struct timeval wait_start, now;
u_int tdiff, i, per_pkt_wait;
2020-12-10 20:00:09 +00:00
if (!(packet.buf = malloc(icmp_pkt_size))) {
crash("send_icmp_ping(): failed to malloc %d bytes for send buffer",
icmp_pkt_size);
return -1; /* might be reached if we're in debug mode */
}
memset(packet.buf, 0, icmp_pkt_size);
2013-11-26 22:53:19 +00:00
/* if we can't listen or don't have anything to listen to, just return */
2020-12-10 20:00:09 +00:00
if(!t || !icmp_pkts_en_route) {
free(packet.buf);
return 0;
}
2013-11-26 22:53:19 +00:00
gettimeofday(&wait_start, &tz);
i = t;
per_pkt_wait = t / icmp_pkts_en_route;
while(icmp_pkts_en_route && get_timevaldiff(&wait_start, NULL) < i) {
t = per_pkt_wait;
/* wrap up if all targets are declared dead */
if(!targets_alive ||
get_timevaldiff(&prog_start, NULL) >= max_completion_time ||
(mode == MODE_HOSTCHECK && targets_down))
{
finish(0);
}
/* reap responses until we hit a timeout */
n = recvfrom_wto(sock, buf, sizeof(buf),
2020-12-10 20:00:09 +00:00
(struct sockaddr *)&resp_addr, &t, &now);
2013-11-26 22:53:19 +00:00
if(!n) {
if(debug > 1) {
printf("recvfrom_wto() timed out during a %u usecs wait\n",
per_pkt_wait);
}
continue; /* timeout for this one, so keep trying */
}
if(n < 0) {
if(debug) printf("recvfrom_wto() returned errors\n");
2020-12-10 20:00:09 +00:00
free(packet.buf);
2013-11-26 22:53:19 +00:00
return n;
}
2020-12-10 20:00:09 +00:00
// FIXME: with ipv6 we don't have an ip header here
if (address_family != AF_INET6) {
ip = (union ip_hdr *)buf;
if(debug > 1) {
char address[INET6_ADDRSTRLEN];
parse_address(&resp_addr, address, sizeof(address));
printf("received %u bytes from %s\n",
address_family == AF_INET6 ? ntohs(ip->ip6.ip6_plen)
: ntohs(ip->ip.ip_len),
address);
}
}
2013-11-26 22:53:19 +00:00
/* obsolete. alpha on tru64 provides the necessary defines, but isn't broken */
/* #if defined( __alpha__ ) && __STDC__ && !defined( __GLIBC__ ) */
/* alpha headers are decidedly broken. Using an ansi compiler,
* they provide ip_vhl instead of ip_hl and ip_v, so we mask
* off the bottom 4 bits */
/* hlen = (ip->ip_vhl & 0x0f) << 2; */
/* #else */
2020-12-10 20:00:09 +00:00
hlen = (address_family == AF_INET6) ? 0 : ip->ip.ip_hl << 2;
2013-11-26 22:53:19 +00:00
/* #endif */
if(n < (hlen + ICMP_MINLEN)) {
2020-12-10 20:00:09 +00:00
char address[INET6_ADDRSTRLEN];
parse_address(&resp_addr, address, sizeof(address));
2013-11-26 22:53:19 +00:00
crash("received packet too short for ICMP (%d bytes, expected %d) from %s\n",
2020-12-10 20:00:09 +00:00
n, hlen + icmp_pkt_size, address);
2013-11-26 22:53:19 +00:00
}
/* else if(debug) { */
/* printf("ip header size: %u, packet size: %u (expected %u, %u)\n", */
/* hlen, ntohs(ip->ip_len) - hlen, */
/* sizeof(struct ip), icmp_pkt_size); */
/* } */
/* check the response */
2013-11-26 22:54:42 +00:00
2020-12-10 20:00:09 +00:00
memcpy(packet.buf, buf + hlen, icmp_pkt_size);
/* address_family == AF_INET6 ? sizeof(struct icmp6_hdr)
: sizeof(struct icmp));*/
if( (address_family == PF_INET &&
(ntohs(packet.icp->icmp_id) != pid || packet.icp->icmp_type != ICMP_ECHOREPLY
|| ntohs(packet.icp->icmp_seq) >= targets * packets))
|| (address_family == PF_INET6 &&
(ntohs(packet.icp6->icmp6_id) != pid || packet.icp6->icmp6_type != ICMP6_ECHO_REPLY
|| ntohs(packet.icp6->icmp6_seq) >= targets * packets))) {
2013-11-26 22:53:19 +00:00
if(debug > 2) printf("not a proper ICMP_ECHOREPLY\n");
2013-11-26 22:55:28 +00:00
handle_random_icmp(buf + hlen, &resp_addr);
2013-11-26 22:53:19 +00:00
continue;
}
/* this is indeed a valid response */
2020-12-10 20:00:09 +00:00
if (address_family == PF_INET) {
memcpy(&data, packet.icp->icmp_data, sizeof(data));
if (debug > 2)
printf("ICMP echo-reply of len %lu, id %u, seq %u, cksum 0x%X\n",
(unsigned long)sizeof(data), ntohs(packet.icp->icmp_id),
ntohs(packet.icp->icmp_seq), packet.icp->icmp_cksum);
host = table[ntohs(packet.icp->icmp_seq)/packets];
} else {
memcpy(&data, &packet.icp6->icmp6_dataun.icmp6_un_data8[4], sizeof(data));
if (debug > 2)
printf("ICMP echo-reply of len %lu, id %u, seq %u, cksum 0x%X\n",
(unsigned long)sizeof(data), ntohs(packet.icp6->icmp6_id),
ntohs(packet.icp6->icmp6_seq), packet.icp6->icmp6_cksum);
host = table[ntohs(packet.icp6->icmp6_seq)/packets];
}
2013-11-26 22:53:19 +00:00
2013-11-26 22:54:42 +00:00
tdiff = get_timevaldiff(&data.stime, &now);
2013-11-26 22:53:19 +00:00
host->time_waited += tdiff;
host->icmp_recv++;
icmp_recv++;
if (tdiff > host->rtmax)
host->rtmax = tdiff;
if (tdiff < host->rtmin)
host->rtmin = tdiff;
2013-11-26 22:53:19 +00:00
if(debug) {
2020-12-10 20:00:09 +00:00
char address[INET6_ADDRSTRLEN];
parse_address(&resp_addr, address, sizeof(address));
2022-10-19 15:24:24 +00:00
switch(address_family) {
case AF_INET: {
printf("%0.3f ms rtt from %s, outgoing ttl: %u, incoming ttl: %u, max: %0.3f, min: %0.3f\n",
(float)tdiff / 1000,
address,
ttl,
ip->ip.ip_ttl,
(float)host->rtmax / 1000,
(float)host->rtmin / 1000);
break;
};
case AF_INET6: {
printf("%0.3f ms rtt from %s, outgoing ttl: %u, max: %0.3f, min: %0.3f\n",
(float)tdiff / 1000,
address,
ttl,
(float)host->rtmax / 1000,
(float)host->rtmin / 1000);
};
}
2013-11-26 22:53:19 +00:00
}
/* if we're in hostcheck mode, exit with limited printouts */
if(mode == MODE_HOSTCHECK) {
printf("OK - %s responds to ICMP. Packet %u, rta %0.3fms|"
2022-10-19 15:24:24 +00:00
"pkt=%u;;;0;%u rta=%0.3f;%0.3f;%0.3f;;\n",
2020-12-10 20:00:09 +00:00
host->name, icmp_recv, (float)tdiff / 1000,
icmp_recv, packets, (float)tdiff / 1000,
(float)warn.rta / 1000, (float)crit.rta / 1000);
2013-11-26 22:53:19 +00:00
exit(STATE_OK);
}
}
2020-12-10 20:00:09 +00:00
free(packet.buf);
2013-11-26 22:53:19 +00:00
return 0;
}
/* the ping functions */
static int
send_icmp_ping(int sock, struct rta_host *host)
{
long int len;
2022-10-19 15:24:24 +00:00
size_t addrlen;
2013-11-26 22:54:42 +00:00
struct icmp_ping_data data;
2016-11-30 11:36:55 +00:00
struct msghdr hdr;
struct iovec iov;
2013-11-26 22:53:19 +00:00
struct timeval tv;
2020-12-10 20:00:09 +00:00
void *buf = NULL;
2013-11-26 22:53:19 +00:00
if(sock == -1) {
errno = 0;
crash("Attempt to send on bogus socket");
return -1;
}
2020-12-10 20:00:09 +00:00
if(!buf) {
if (!(buf = malloc(icmp_pkt_size))) {
2013-11-26 22:53:19 +00:00
crash("send_icmp_ping(): failed to malloc %d bytes for send buffer",
icmp_pkt_size);
return -1; /* might be reached if we're in debug mode */
}
}
2020-12-10 20:00:09 +00:00
memset(buf, 0, icmp_pkt_size);
2013-11-26 22:53:19 +00:00
2020-12-10 20:00:09 +00:00
if((gettimeofday(&tv, &tz)) == -1) {
free(buf);
return -1;
}
2013-11-26 22:53:19 +00:00
2013-11-26 22:54:42 +00:00
data.ping_id = 10; /* host->icmp.icmp_sent; */
memcpy(&data.stime, &tv, sizeof(tv));
2020-12-10 20:00:09 +00:00
if (address_family == AF_INET) {
struct icmp *icp = (struct icmp*)buf;
2022-10-19 15:24:24 +00:00
addrlen = sizeof(struct sockaddr_in);
2020-12-10 20:00:09 +00:00
memcpy(&icp->icmp_data, &data, sizeof(data));
icp->icmp_type = ICMP_ECHO;
icp->icmp_code = 0;
icp->icmp_cksum = 0;
icp->icmp_id = htons(pid);
icp->icmp_seq = htons(host->id++);
2022-10-19 15:24:24 +00:00
icp->icmp_cksum = icmp_checksum((uint16_t*)buf, (size_t)icmp_pkt_size);
2020-12-10 20:00:09 +00:00
if (debug > 2)
printf("Sending ICMP echo-request of len %lu, id %u, seq %u, cksum 0x%X to host %s\n",
(unsigned long)sizeof(data), ntohs(icp->icmp_id), ntohs(icp->icmp_seq), icp->icmp_cksum, host->name);
}
else {
struct icmp6_hdr *icp6 = (struct icmp6_hdr*)buf;
2022-10-19 15:24:24 +00:00
addrlen = sizeof(struct sockaddr_in6);
2020-12-10 20:00:09 +00:00
memcpy(&icp6->icmp6_dataun.icmp6_un_data8[4], &data, sizeof(data));
2022-10-19 15:24:24 +00:00
2020-12-10 20:00:09 +00:00
icp6->icmp6_type = ICMP6_ECHO_REQUEST;
icp6->icmp6_code = 0;
icp6->icmp6_cksum = 0;
icp6->icmp6_id = htons(pid);
icp6->icmp6_seq = htons(host->id++);
// let checksum be calculated automatically
if (debug > 2) {
printf("Sending ICMP echo-request of len %lu, id %u, seq %u, cksum 0x%X to host %s\n",
(unsigned long)sizeof(data), ntohs(icp6->icmp6_id),
ntohs(icp6->icmp6_seq), icp6->icmp6_cksum, host->name);
}
}
2016-11-30 11:36:55 +00:00
memset(&iov, 0, sizeof(iov));
2020-12-10 20:00:09 +00:00
iov.iov_base = buf;
2016-11-30 11:36:55 +00:00
iov.iov_len = icmp_pkt_size;
memset(&hdr, 0, sizeof(hdr));
2020-12-10 20:00:09 +00:00
hdr.msg_name = (struct sockaddr *)&host->saddr_in;
2022-10-19 15:24:24 +00:00
hdr.msg_namelen = addrlen;
2016-11-30 11:36:55 +00:00
hdr.msg_iov = &iov;
hdr.msg_iovlen = 1;
2020-12-10 20:00:09 +00:00
errno = 0;
2016-11-30 11:36:55 +00:00
/* MSG_CONFIRM is a linux thing and only available on linux kernels >= 2.3.15, see send(2) */
#ifdef MSG_CONFIRM
len = sendmsg(sock, &hdr, MSG_CONFIRM);
#else
len = sendmsg(sock, &hdr, 0);
#endif
2013-11-26 22:53:19 +00:00
2020-12-10 20:00:09 +00:00
free(buf);
2013-11-26 22:53:19 +00:00
if(len < 0 || (unsigned int)len != icmp_pkt_size) {
2020-12-10 20:00:09 +00:00
if(debug) {
char address[INET6_ADDRSTRLEN];
parse_address((struct sockaddr_storage *)&host->saddr_in, address, sizeof(address));
printf("Failed to send ping to %s: %s\n", address, strerror(errno));
}
errno = 0;
2013-11-26 22:53:19 +00:00
return -1;
}
icmp_sent++;
host->icmp_sent++;
return 0;
}
static int
recvfrom_wto(int sock, void *buf, unsigned int len, struct sockaddr *saddr,
2016-11-30 11:36:55 +00:00
u_int *timo, struct timeval* tv)
2013-11-26 22:53:19 +00:00
{
u_int slen;
2016-11-30 11:36:55 +00:00
int n, ret;
2013-11-26 22:53:19 +00:00
struct timeval to, then, now;
fd_set rd, wr;
2016-11-30 11:36:55 +00:00
char ans_data[4096];
struct msghdr hdr;
struct iovec iov;
#ifdef SO_TIMESTAMP
struct cmsghdr* chdr;
#endif
2013-11-26 22:53:19 +00:00
if(!*timo) {
if(debug) printf("*timo is not\n");
return 0;
}
to.tv_sec = *timo / 1000000;
to.tv_usec = (*timo - (to.tv_sec * 1000000));
FD_ZERO(&rd);
FD_ZERO(&wr);
FD_SET(sock, &rd);
errno = 0;
gettimeofday(&then, &tz);
n = select(sock + 1, &rd, &wr, NULL, &to);
if(n < 0) crash("select() in recvfrom_wto");
gettimeofday(&now, &tz);
*timo = get_timevaldiff(&then, &now);
if(!n) return 0; /* timeout */
2020-12-10 20:00:09 +00:00
slen = sizeof(struct sockaddr_storage);
2013-11-26 22:53:19 +00:00
2016-11-30 11:36:55 +00:00
memset(&iov, 0, sizeof(iov));
iov.iov_base = buf;
iov.iov_len = len;
memset(&hdr, 0, sizeof(hdr));
hdr.msg_name = saddr;
hdr.msg_namelen = slen;
hdr.msg_iov = &iov;
hdr.msg_iovlen = 1;
hdr.msg_control = ans_data;
hdr.msg_controllen = sizeof(ans_data);
ret = recvmsg(sock, &hdr, 0);
#ifdef SO_TIMESTAMP
for(chdr = CMSG_FIRSTHDR(&hdr); chdr; chdr = CMSG_NXTHDR(&hdr, chdr)) {
if(chdr->cmsg_level == SOL_SOCKET
&& chdr->cmsg_type == SO_TIMESTAMP
&& chdr->cmsg_len >= CMSG_LEN(sizeof(struct timeval))) {
memcpy(tv, CMSG_DATA(chdr), sizeof(*tv));
break ;
}
}
2020-12-10 20:00:09 +00:00
2016-11-30 11:36:55 +00:00
if (!chdr)
#endif // SO_TIMESTAMP
gettimeofday(tv, &tz);
return (ret);
2013-11-26 22:53:19 +00:00
}
static void
finish(int sig)
{
u_int i = 0;
unsigned char pl;
double rta;
struct rta_host *host;
2013-11-26 22:55:28 +00:00
const char *status_string[] =
2013-11-26 22:53:19 +00:00
{"OK", "WARNING", "CRITICAL", "UNKNOWN", "DEPENDENT"};
2013-11-26 22:53:44 +00:00
int hosts_ok = 0;
int hosts_warn = 0;
2013-11-26 22:53:19 +00:00
alarm(0);
if(debug > 1) printf("finish(%d) called\n", sig);
if(icmp_sock != -1) close(icmp_sock);
if(udp_sock != -1) close(udp_sock);
if(tcp_sock != -1) close(tcp_sock);
if(debug) {
printf("icmp_sent: %u icmp_recv: %u icmp_lost: %u\n",
icmp_sent, icmp_recv, icmp_lost);
printf("targets: %u targets_alive: %u\n", targets, targets_alive);
}
/* iterate thrice to calculate values, give output, and print perfparse */
host = list;
2020-12-10 20:00:09 +00:00
2013-11-26 22:53:19 +00:00
while(host) {
if(!host->icmp_recv) {
/* rta 0 is ofcourse not entirely correct, but will still show up
2021-04-11 09:58:04 +00:00
* conspicuously as missing entries in perfparse and cacti */
2013-11-26 22:53:19 +00:00
pl = 100;
rta = 0;
status = STATE_CRITICAL;
/* up the down counter if not already counted */
if(!(host->flags & FLAG_LOST_CAUSE) && targets_alive) targets_down++;
}
else {
pl = ((host->icmp_sent - host->icmp_recv) * 100) / host->icmp_sent;
rta = (double)host->time_waited / host->icmp_recv;
}
host->pl = pl;
host->rta = rta;
2013-11-26 22:53:44 +00:00
if(pl >= crit.pl || rta >= crit.rta) {
status = STATE_CRITICAL;
}
else if(!status && (pl >= warn.pl || rta >= warn.rta)) {
status = STATE_WARNING;
hosts_warn++;
}
else {
hosts_ok++;
}
2013-11-26 22:53:19 +00:00
host = host->next;
}
/* this is inevitable */
if(!targets_alive) status = STATE_CRITICAL;
2013-11-26 22:53:44 +00:00
if(min_hosts_alive > -1) {
if(hosts_ok >= min_hosts_alive) status = STATE_OK;
else if((hosts_ok + hosts_warn) >= min_hosts_alive) status = STATE_WARNING;
}
2013-11-26 22:53:19 +00:00
printf("%s - ", status_string[status]);
host = list;
while(host) {
if(debug) puts("");
if(i) {
if(i < targets) printf(" :: ");
else printf("\n");
}
i++;
if(!host->icmp_recv) {
status = STATE_CRITICAL;
if(host->flags & FLAG_LOST_CAUSE) {
2020-12-10 20:00:09 +00:00
char address[INET6_ADDRSTRLEN];
parse_address(&host->error_addr, address, sizeof(address));
2013-11-26 22:53:19 +00:00
printf("%s: %s @ %s. rta nan, lost %d%%",
host->name,
get_icmp_error_msg(host->icmp_type, host->icmp_code),
2020-12-10 20:00:09 +00:00
address,
2013-11-26 22:53:19 +00:00
100);
}
else { /* not marked as lost cause, so we have no flags for it */
printf("%s: rta nan, lost 100%%", host->name);
}
}
else { /* !icmp_recv */
printf("%s: rta %0.3fms, lost %u%%",
host->name, host->rta / 1000, host->pl);
}
host = host->next;
}
/* iterate once more for pretty perfparse output */
printf("|");
i = 0;
host = list;
while(host) {
if(debug) puts("");
printf("%srta=%0.3fms;%0.3f;%0.3f;0; %spl=%u%%;%u;%u;; %srtmax=%0.3fms;;;; %srtmin=%0.3fms;;;; ",
2013-11-26 22:53:19 +00:00
(targets > 1) ? host->name : "",
host->rta / 1000, (float)warn.rta / 1000, (float)crit.rta / 1000,
(targets > 1) ? host->name : "", host->pl, warn.pl, crit.pl,
(targets > 1) ? host->name : "", (float)host->rtmax / 1000,
(targets > 1) ? host->name : "", (host->rtmin < DBL_MAX) ? (float)host->rtmin / 1000 : (float)0);
2013-11-26 22:53:19 +00:00
host = host->next;
}
2013-11-26 22:53:44 +00:00
if(min_hosts_alive > -1) {
if(hosts_ok >= min_hosts_alive) status = STATE_OK;
else if((hosts_ok + hosts_warn) >= min_hosts_alive) status = STATE_WARNING;
}
2013-11-26 22:53:19 +00:00
/* finish with an empty line */
puts("");
2013-11-26 22:53:44 +00:00
if(debug) printf("targets: %u, targets_alive: %u, hosts_ok: %u, hosts_warn: %u, min_hosts_alive: %i\n",
targets, targets_alive, hosts_ok, hosts_warn, min_hosts_alive);
2013-11-26 22:53:19 +00:00
exit(status);
}
static u_int
get_timevaldiff(struct timeval *early, struct timeval *later)
{
u_int ret;
struct timeval now;
if(!later) {
gettimeofday(&now, &tz);
later = &now;
}
if(!early) early = &prog_start;
/* if early > later we return 0 so as to indicate a timeout */
if(early->tv_sec > later->tv_sec ||
2013-11-26 22:53:19 +00:00
(early->tv_sec == later->tv_sec && early->tv_usec > later->tv_usec))
{
return 0;
}
ret = (later->tv_sec - early->tv_sec) * 1000000;
ret += later->tv_usec - early->tv_usec;
return ret;
}
static int
2020-12-10 20:00:09 +00:00
add_target_ip(char *arg, struct sockaddr_storage *in)
2013-11-26 22:53:19 +00:00
{
struct rta_host *host;
2020-12-10 20:00:09 +00:00
struct sockaddr_in *sin, *host_sin;
struct sockaddr_in6 *sin6, *host_sin6;
if (address_family == AF_INET)
sin = (struct sockaddr_in *)in;
else
sin6 = (struct sockaddr_in6 *)in;
2013-11-26 22:53:19 +00:00
2020-12-10 20:00:09 +00:00
/* disregard obviously stupid addresses
* (I didn't find an ipv6 equivalent to INADDR_NONE) */
if (((address_family == AF_INET && (sin->sin_addr.s_addr == INADDR_NONE
|| sin->sin_addr.s_addr == INADDR_ANY)))
|| (address_family == AF_INET6 && (sin6->sin6_addr.s6_addr == in6addr_any.s6_addr))) {
2013-11-26 22:53:19 +00:00
return -1;
2020-12-10 20:00:09 +00:00
}
2013-11-26 22:53:19 +00:00
/* no point in adding two identical IP's, so don't. ;) */
host = list;
while(host) {
2020-12-10 20:00:09 +00:00
host_sin = (struct sockaddr_in *)&host->saddr_in;
host_sin6 = (struct sockaddr_in6 *)&host->saddr_in;
if( (address_family == AF_INET && host_sin->sin_addr.s_addr == sin->sin_addr.s_addr)
|| (address_family == AF_INET6 && host_sin6->sin6_addr.s6_addr == sin6->sin6_addr.s6_addr)) {
2013-11-26 22:53:19 +00:00
if(debug) printf("Identical IP already exists. Not adding %s\n", arg);
return -1;
}
host = host->next;
}
/* add the fresh ip */
2020-12-10 20:00:09 +00:00
host = (struct rta_host*)malloc(sizeof(struct rta_host));
2013-11-26 22:53:19 +00:00
if(!host) {
2020-12-10 20:00:09 +00:00
char straddr[INET6_ADDRSTRLEN];
parse_address((struct sockaddr_storage*)&in, straddr, sizeof(straddr));
2022-10-19 15:24:24 +00:00
crash("add_target_ip(%s, %s): malloc(%lu) failed",
2020-12-10 20:00:09 +00:00
arg, straddr, sizeof(struct rta_host));
2013-11-26 22:53:19 +00:00
}
memset(host, 0, sizeof(struct rta_host));
/* set the values. use calling name for output */
host->name = strdup(arg);
2020-12-10 20:00:09 +00:00
/* fill out the sockaddr_storage struct */
if(address_family == AF_INET) {
host_sin = (struct sockaddr_in *)&host->saddr_in;
host_sin->sin_family = AF_INET;
host_sin->sin_addr.s_addr = sin->sin_addr.s_addr;
}
else {
host_sin6 = (struct sockaddr_in6 *)&host->saddr_in;
host_sin6->sin6_family = AF_INET6;
memcpy(host_sin6->sin6_addr.s6_addr, sin6->sin6_addr.s6_addr, sizeof host_sin6->sin6_addr.s6_addr);
}
2013-11-26 22:53:19 +00:00
host->rtmin = DBL_MAX;
2013-11-26 22:53:19 +00:00
if(!list) list = cursor = host;
else cursor->next = host;
cursor = host;
targets++;
return 0;
}
/* wrapper for add_target_ip */
static int
add_target(char *arg)
{
2020-12-10 20:00:09 +00:00
int error, result;
struct sockaddr_storage ip;
struct addrinfo hints, *res, *p;
struct sockaddr_in *sin;
struct sockaddr_in6 *sin6;
switch (address_family) {
case -1:
/* -4 and -6 are not specified on cmdline */
address_family = AF_INET;
sin = (struct sockaddr_in *)&ip;
result = inet_pton(address_family, arg, &sin->sin_addr);
#ifdef USE_IPV6
if( result != 1 ){
address_family = AF_INET6;
sin6 = (struct sockaddr_in6 *)&ip;
result = inet_pton(address_family, arg, &sin6->sin6_addr);
}
#endif
/* If we don't find any valid addresses, we still don't know the address_family */
if ( result != 1) {
address_family = -1;
}
break;
case AF_INET:
sin = (struct sockaddr_in *)&ip;
result = inet_pton(address_family, arg, &sin->sin_addr);
break;
case AF_INET6:
sin6 = (struct sockaddr_in6 *)&ip;
result = inet_pton(address_family, arg, &sin6->sin6_addr);
break;
default: crash("Address family not supported");
}
2013-11-26 22:53:19 +00:00
/* don't resolve if we don't have to */
2020-12-10 20:00:09 +00:00
if(result == 1) {
2013-11-26 22:53:19 +00:00
/* don't add all ip's if we were given a specific one */
return add_target_ip(arg, &ip);
}
else {
errno = 0;
2020-12-10 20:00:09 +00:00
memset(&hints, 0, sizeof(hints));
if (address_family == -1) {
hints.ai_family = AF_UNSPEC;
} else {
hints.ai_family = address_family == AF_INET ? PF_INET : PF_INET6;
}
hints.ai_socktype = SOCK_RAW;
if((error = getaddrinfo(arg, NULL, &hints, &res)) != 0) {
2013-11-26 22:53:19 +00:00
errno = 0;
2020-12-10 20:00:09 +00:00
crash("Failed to resolve %s: %s", arg, gai_strerror(error));
2013-11-26 22:53:19 +00:00
return -1;
}
2020-12-10 20:00:09 +00:00
address_family = res->ai_family;
2013-11-26 22:53:19 +00:00
}
/* possibly add all the IP's as targets */
2020-12-10 20:00:09 +00:00
for(p = res; p != NULL; p = p->ai_next) {
memcpy(&ip, p->ai_addr, p->ai_addrlen);
add_target_ip(arg, &ip);
2013-11-26 22:53:19 +00:00
/* this is silly, but it works */
if(mode == MODE_HOSTCHECK || mode == MODE_ALL) {
2013-11-26 22:55:28 +00:00
if(debug > 2) printf("mode: %d\n", mode);
2013-11-26 22:53:19 +00:00
continue;
}
break;
}
2020-12-10 20:00:09 +00:00
freeaddrinfo(res);
2013-11-26 22:53:19 +00:00
return 0;
}
2013-11-26 22:55:28 +00:00
static void
set_source_ip(char *arg)
{
struct sockaddr_in src;
memset(&src, 0, sizeof(src));
2020-12-10 20:00:09 +00:00
src.sin_family = address_family;
2013-11-26 22:55:28 +00:00
if((src.sin_addr.s_addr = inet_addr(arg)) == INADDR_NONE)
src.sin_addr.s_addr = get_ip_address(arg);
if(bind(icmp_sock, (struct sockaddr *)&src, sizeof(src)) == -1)
crash("Cannot bind to IP address %s", arg);
}
/* TODO: Move this to netutils.c and also change check_dhcp to use that. */
static in_addr_t
get_ip_address(const char *ifname)
{
#if defined(SIOCGIFADDR)
struct ifreq ifr;
struct sockaddr_in ip;
strncpy(ifr.ifr_name, ifname, sizeof(ifr.ifr_name) - 1);
ifr.ifr_name[sizeof(ifr.ifr_name) - 1] = '\0';
if(ioctl(icmp_sock, SIOCGIFADDR, &ifr) == -1)
crash("Cannot determine IP address of interface %s", ifname);
memcpy(&ip, &ifr.ifr_addr, sizeof(ip));
return ip.sin_addr.s_addr;
#else
errno = 0;
crash("Cannot get interface IP address on this platform.");
#endif
}
2013-11-26 22:53:19 +00:00
/*
* u = micro
* m = milli
* s = seconds
* return value is in microseconds
*/
static u_int
get_timevar(const char *str)
{
char p, u, *ptr;
2016-11-30 11:36:55 +00:00
size_t len;
2013-11-26 22:53:19 +00:00
u_int i, d; /* integer and decimal, respectively */
u_int factor = 1000; /* default to milliseconds */
if(!str) return 0;
len = strlen(str);
if(!len) return 0;
/* unit might be given as ms|m (millisec),
* us|u (microsec) or just plain s, for seconds */
u = p = '\0';
u = str[len - 1];
if(len >= 2 && !isdigit((int)str[len - 2])) p = str[len - 2];
if(p && u == 's') u = p;
else if(!p) p = u;
if(debug > 2) printf("evaluating %s, u: %c, p: %c\n", str, u, p);
if(u == 'u') factor = 1; /* microseconds */
else if(u == 'm') factor = 1000; /* milliseconds */
else if(u == 's') factor = 1000000; /* seconds */
if(debug > 2) printf("factor is %u\n", factor);
i = strtoul(str, &ptr, 0);
if(!ptr || *ptr != '.' || strlen(ptr) < 2 || factor == 1)
return i * factor;
/* time specified in usecs can't have decimal points, so ignore them */
if(factor == 1) return i;
d = strtoul(ptr + 1, NULL, 0);
/* d is decimal, so get rid of excess digits */
while(d >= factor) d /= 10;
/* the last parenthesis avoids floating point exceptions. */
return ((i * factor) + (d * (factor / 10)));
}
/* not too good at checking errors, but it'll do (main() should barfe on -1) */
static int
get_threshold(char *str, threshold *th)
{
char *p = NULL, i = 0;
if(!str || !strlen(str) || !th) return -1;
/* pointer magic slims code by 10 lines. i is bof-stop on stupid libc's */
p = &str[strlen(str) - 1];
while(p != &str[1]) {
if(*p == '%') *p = '\0';
else if(*p == ',' && i) {
*p = '\0'; /* reset it so get_timevar(str) works nicely later */
th->pl = (unsigned char)strtoul(p+1, NULL, 0);
break;
}
i = 1;
p--;
}
th->rta = get_timevar(str);
if(!th->rta) return -1;
if(th->rta > MAXTTL * 1000000) th->rta = MAXTTL * 1000000;
if(th->pl > 100) th->pl = 100;
return 0;
}
unsigned short
2022-10-19 15:24:24 +00:00
icmp_checksum(uint16_t *p, size_t n)
2013-11-26 22:53:19 +00:00
{
2020-12-10 20:00:09 +00:00
unsigned short cksum;
long sum = 0;
2013-11-26 22:53:19 +00:00
2022-10-19 15:24:24 +00:00
/* sizeof(uint16_t) == 2 */
while(n >= 2) {
sum += *(p++);
n -= 2;
2013-11-26 22:53:19 +00:00
}
/* mop up the occasional odd byte */
2022-10-19 15:24:24 +00:00
if(n == 1) sum += *((uint8_t *)p -1);
2013-11-26 22:53:19 +00:00
sum = (sum >> 16) + (sum & 0xffff); /* add hi 16 to low 16 */
sum += (sum >> 16); /* add carry */
cksum = ~sum; /* ones-complement, trunc to 16 bits */
return cksum;
}
void
print_help(void)
{
/*print_revision (progname);*/ /* FIXME: Why? */
2013-11-26 22:55:28 +00:00
2013-11-26 22:53:19 +00:00
printf ("Copyright (c) 2005 Andreas Ericsson <ae@op5.se>\n");
printf (COPYRIGHT, copyright, email);
2013-11-26 22:55:28 +00:00
2013-11-26 22:53:19 +00:00
printf ("\n\n");
2013-11-26 22:55:28 +00:00
2013-11-26 22:53:19 +00:00
print_usage ();
2013-11-26 22:55:28 +00:00
2013-11-26 22:57:29 +00:00
printf (UT_HELP_VRSN);
printf (UT_EXTRA_OPTS);
2013-11-26 22:55:28 +00:00
2013-11-26 22:53:19 +00:00
printf (" %s\n", "-H");
printf (" %s\n", _("specify a target"));
2020-12-10 20:00:09 +00:00
printf (" %s\n", "[-4|-6]");
printf (" %s\n", _("Use IPv4 (default) or IPv6 to communicate with the targets"));
2013-11-26 22:53:19 +00:00
printf (" %s\n", "-w");
printf (" %s", _("warning threshold (currently "));
printf ("%0.3fms,%u%%)\n", (float)warn.rta / 1000, warn.pl);
2013-11-26 22:53:19 +00:00
printf (" %s\n", "-c");
printf (" %s", _("critical threshold (currently "));
printf ("%0.3fms,%u%%)\n", (float)crit.rta / 1000, crit.pl);
2013-11-26 22:55:28 +00:00
printf (" %s\n", "-s");
printf (" %s\n", _("specify a source IP address or device name"));
2013-11-26 22:53:19 +00:00
printf (" %s\n", "-n");
printf (" %s", _("number of packets to send (currently "));
printf ("%u)\n",packets);
printf (" %s\n", "-i");
printf (" %s", _("max packet interval (currently "));
printf ("%0.3fms)\n",(float)pkt_interval / 1000);
printf (" %s\n", "-I");
printf (" %s", _("max target interval (currently "));
printf ("%0.3fms)\n", (float)target_interval / 1000);
2013-11-26 22:53:44 +00:00
printf (" %s\n", "-m");
printf (" %s",_("number of alive hosts required for success"));
printf ("\n");
2013-11-26 22:53:19 +00:00
printf (" %s\n", "-l");
printf (" %s", _("TTL on outgoing packets (currently "));
printf ("%u)\n", ttl);
2013-11-26 22:53:19 +00:00
printf (" %s\n", "-t");
printf (" %s",_("timeout value (seconds, currently "));
printf ("%u)\n", timeout);
printf (" %s\n", "-b");
printf (" %s\n", _("Number of icmp data bytes to send"));
printf (" %s %u + %d)\n", _("Packet size will be data bytes + icmp header (currently"),icmp_data_size, ICMP_MINLEN);
2013-11-26 22:53:19 +00:00
printf (" %s\n", "-v");
printf (" %s\n", _("verbose"));
printf ("\n");
2013-11-26 22:55:28 +00:00
printf ("%s\n", _("Notes:"));
printf (" %s\n", _("The -H switch is optional. Naming a host (or several) to check is not."));
printf ("\n");
printf (" %s\n", _("Threshold format for -w and -c is 200.25,60% for 200.25 msec RTA and 60%"));
printf (" %s\n", _("packet loss. The default values should work well for most users."));
printf (" %s\n", _("You can specify different RTA factors using the standardized abbreviations"));
printf (" %s\n", _("us (microseconds), ms (milliseconds, default) or just plain s for seconds."));
2013-11-26 22:53:44 +00:00
/* -d not yet implemented */
/* printf ("%s\n", _("Threshold format for -d is warn,crit. 12,14 means WARNING if >= 12 hops"));
2013-11-26 22:53:19 +00:00
printf ("%s\n", _("are spent and CRITICAL if >= 14 hops are spent."));
2013-11-26 22:53:44 +00:00
printf ("%s\n\n", _("NOTE: Some systems decrease TTL when forming ICMP_ECHOREPLY, others do not."));*/
2013-11-26 22:55:28 +00:00
printf ("\n");
printf (" %s\n", _("The -v switch can be specified several times for increased verbosity."));
2013-11-26 22:53:19 +00:00
/* printf ("%s\n", _("Long options are currently unsupported."));
printf ("%s\n", _("Options marked with * require an argument"));
*/
2013-11-26 22:55:28 +00:00
2013-11-26 22:57:29 +00:00
printf (UT_SUPPORT);
2013-11-26 22:53:19 +00:00
}
void
print_usage (void)
{
2013-11-26 22:57:29 +00:00
printf ("%s\n", _("Usage:"));
2013-11-26 22:55:28 +00:00
printf(" %s [options] [-H] host1 host2 hostN\n", progname);
2013-11-26 22:53:19 +00:00
}