2013-11-26 22:55:28 +00:00
|
|
|
/*****************************************************************************
|
|
|
|
*
|
2014-07-11 19:01:00 +00:00
|
|
|
* Monitoring check_icmp plugin
|
2013-11-26 22:55:28 +00:00
|
|
|
*
|
2013-11-26 22:53:19 +00:00
|
|
|
* License: GPL
|
2014-07-11 19:01:00 +00:00
|
|
|
* Copyright (c) 2005-2008 Monitoring Plugins Development Team
|
2013-11-26 22:53:19 +00:00
|
|
|
* Original Author : Andreas Ericsson <ae@op5.se>
|
2013-11-26 22:55:28 +00:00
|
|
|
*
|
2013-11-26 22:53:19 +00:00
|
|
|
* Description:
|
2013-11-26 22:55:28 +00:00
|
|
|
*
|
2013-11-26 22:53:19 +00:00
|
|
|
* This file contains the check_icmp plugin
|
2013-11-26 22:55:28 +00:00
|
|
|
*
|
|
|
|
* Relevant RFC's: 792 (ICMP), 791 (IP)
|
|
|
|
*
|
|
|
|
* This program was modeled somewhat after the check_icmp program,
|
|
|
|
* which was in turn a hack of fping (www.fping.org) but has been
|
|
|
|
* completely rewritten since to generate higher precision rta values,
|
|
|
|
* and support several different modes as well as setting ttl to control.
|
|
|
|
* redundant routes. The only remainders of fping is currently a few
|
|
|
|
* function names.
|
|
|
|
*
|
|
|
|
*
|
|
|
|
* This program is free software: you can redistribute it and/or modify
|
2013-11-26 22:53:19 +00:00
|
|
|
* it under the terms of the GNU General Public License as published by
|
2013-11-26 22:55:28 +00:00
|
|
|
* the Free Software Foundation, either version 3 of the License, or
|
2013-11-26 22:53:19 +00:00
|
|
|
* (at your option) any later version.
|
2013-11-26 22:55:28 +00:00
|
|
|
*
|
2013-11-26 22:53:19 +00:00
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
2013-11-26 22:55:28 +00:00
|
|
|
*
|
2013-11-26 22:53:19 +00:00
|
|
|
* You should have received a copy of the GNU General Public License
|
2013-11-26 22:55:28 +00:00
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*
|
2013-11-26 22:53:19 +00:00
|
|
|
*
|
|
|
|
*****************************************************************************/
|
|
|
|
|
|
|
|
/* progname may change */
|
|
|
|
/* char *progname = "check_icmp"; */
|
|
|
|
char *progname;
|
2013-11-26 22:55:28 +00:00
|
|
|
const char *copyright = "2005-2008";
|
2014-07-11 19:01:00 +00:00
|
|
|
const char *email = "devel@monitoring-plugins.org";
|
2013-11-26 22:53:19 +00:00
|
|
|
|
2014-07-11 19:01:00 +00:00
|
|
|
/** Monitoring Plugins basic includes */
|
2013-11-26 22:53:19 +00:00
|
|
|
#include "common.h"
|
|
|
|
#include "netutils.h"
|
|
|
|
#include "utils.h"
|
|
|
|
|
2013-11-26 22:55:28 +00:00
|
|
|
#if HAVE_SYS_SOCKIO_H
|
|
|
|
#include <sys/sockio.h>
|
|
|
|
#endif
|
|
|
|
#include <sys/ioctl.h>
|
2013-11-26 22:53:19 +00:00
|
|
|
#include <sys/time.h>
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <stdarg.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
#include <stddef.h>
|
|
|
|
#include <errno.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <ctype.h>
|
|
|
|
#include <netdb.h>
|
|
|
|
#include <sys/socket.h>
|
2013-11-26 22:55:28 +00:00
|
|
|
#include <net/if.h>
|
2013-11-26 22:53:19 +00:00
|
|
|
#include <netinet/in_systm.h>
|
|
|
|
#include <netinet/in.h>
|
|
|
|
#include <netinet/ip.h>
|
|
|
|
#include <netinet/ip_icmp.h>
|
|
|
|
#include <arpa/inet.h>
|
|
|
|
#include <signal.h>
|
2013-11-26 22:56:50 +00:00
|
|
|
#include <float.h>
|
2013-11-26 22:53:19 +00:00
|
|
|
|
|
|
|
|
|
|
|
/** sometimes undefined system macros (quite a few, actually) **/
|
|
|
|
#ifndef MAXTTL
|
|
|
|
# define MAXTTL 255
|
|
|
|
#endif
|
|
|
|
#ifndef INADDR_NONE
|
2013-11-26 22:55:28 +00:00
|
|
|
# define INADDR_NONE (in_addr_t)(-1)
|
2013-11-26 22:53:19 +00:00
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifndef SOL_IP
|
|
|
|
#define SOL_IP 0
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/* we bundle these in one #ifndef, since they're all from BSD
|
|
|
|
* Put individual #ifndef's around those that bother you */
|
|
|
|
#ifndef ICMP_UNREACH_NET_UNKNOWN
|
|
|
|
# define ICMP_UNREACH_NET_UNKNOWN 6
|
|
|
|
# define ICMP_UNREACH_HOST_UNKNOWN 7
|
|
|
|
# define ICMP_UNREACH_ISOLATED 8
|
|
|
|
# define ICMP_UNREACH_NET_PROHIB 9
|
|
|
|
# define ICMP_UNREACH_HOST_PROHIB 10
|
|
|
|
# define ICMP_UNREACH_TOSNET 11
|
|
|
|
# define ICMP_UNREACH_TOSHOST 12
|
|
|
|
#endif
|
|
|
|
/* tru64 has the ones above, but not these */
|
|
|
|
#ifndef ICMP_UNREACH_FILTER_PROHIB
|
|
|
|
# define ICMP_UNREACH_FILTER_PROHIB 13
|
|
|
|
# define ICMP_UNREACH_HOST_PRECEDENCE 14
|
|
|
|
# define ICMP_UNREACH_PRECEDENCE_CUTOFF 15
|
|
|
|
#endif
|
|
|
|
|
2013-11-26 22:56:50 +00:00
|
|
|
#ifndef DBL_MAX
|
|
|
|
# define DBL_MAX 9.9999999999e999
|
|
|
|
#endif
|
2013-11-26 22:53:19 +00:00
|
|
|
|
|
|
|
typedef unsigned short range_t; /* type for get_range() -- unimplemented */
|
|
|
|
|
|
|
|
typedef struct rta_host {
|
|
|
|
unsigned short id; /* id in **table, and icmp pkts */
|
|
|
|
char *name; /* arg used for adding this host */
|
|
|
|
char *msg; /* icmp error message, if any */
|
|
|
|
struct sockaddr_in saddr_in; /* the address of this host */
|
|
|
|
struct in_addr error_addr; /* stores address of error replies */
|
|
|
|
unsigned long long time_waited; /* total time waited, in usecs */
|
|
|
|
unsigned int icmp_sent, icmp_recv, icmp_lost; /* counters */
|
|
|
|
unsigned char icmp_type, icmp_code; /* type and code from errors */
|
|
|
|
unsigned short flags; /* control/status flags */
|
|
|
|
double rta; /* measured RTA */
|
2013-11-26 22:56:50 +00:00
|
|
|
double rtmax; /* max rtt */
|
|
|
|
double rtmin; /* min rtt */
|
2013-11-26 22:53:19 +00:00
|
|
|
unsigned char pl; /* measured packet loss */
|
|
|
|
struct rta_host *next; /* linked list */
|
|
|
|
} rta_host;
|
|
|
|
|
|
|
|
#define FLAG_LOST_CAUSE 0x01 /* decidedly dead target. */
|
|
|
|
|
|
|
|
/* threshold structure. all values are maximum allowed, exclusive */
|
|
|
|
typedef struct threshold {
|
|
|
|
unsigned char pl; /* max allowed packet loss in percent */
|
|
|
|
unsigned int rta; /* roundtrip time average, microseconds */
|
|
|
|
} threshold;
|
|
|
|
|
|
|
|
/* the data structure */
|
|
|
|
typedef struct icmp_ping_data {
|
|
|
|
struct timeval stime; /* timestamp (saved in protocol struct as well) */
|
|
|
|
unsigned short ping_id;
|
|
|
|
} icmp_ping_data;
|
|
|
|
|
|
|
|
/* the different modes of this program are as follows:
|
|
|
|
* MODE_RTA: send all packets no matter what (mimic check_icmp and check_ping)
|
|
|
|
* MODE_HOSTCHECK: Return immediately upon any sign of life
|
|
|
|
* In addition, sends packets to ALL addresses assigned
|
|
|
|
* to this host (as returned by gethostbyname() or
|
|
|
|
* gethostbyaddr() and expects one host only to be checked at
|
|
|
|
* a time. Therefore, any packet response what so ever will
|
|
|
|
* count as a sign of life, even when received outside
|
|
|
|
* crit.rta limit. Do not misspell any additional IP's.
|
|
|
|
* MODE_ALL: Requires packets from ALL requested IP to return OK (default).
|
|
|
|
* MODE_ICMP: implement something similar to check_icmp (MODE_RTA without
|
|
|
|
* tcp and udp args does this)
|
|
|
|
*/
|
|
|
|
#define MODE_RTA 0
|
|
|
|
#define MODE_HOSTCHECK 1
|
|
|
|
#define MODE_ALL 2
|
|
|
|
#define MODE_ICMP 3
|
|
|
|
|
|
|
|
/* the different ping types we can do
|
|
|
|
* TODO: investigate ARP ping as well */
|
|
|
|
#define HAVE_ICMP 1
|
|
|
|
#define HAVE_UDP 2
|
|
|
|
#define HAVE_TCP 4
|
|
|
|
#define HAVE_ARP 8
|
|
|
|
|
|
|
|
#define MIN_PING_DATA_SIZE sizeof(struct icmp_ping_data)
|
|
|
|
#define MAX_IP_PKT_SIZE 65536 /* (theoretical) max IP packet size */
|
|
|
|
#define IP_HDR_SIZE 20
|
|
|
|
#define MAX_PING_DATA (MAX_IP_PKT_SIZE - IP_HDR_SIZE - ICMP_MINLEN)
|
|
|
|
#define DEFAULT_PING_DATA_SIZE (MIN_PING_DATA_SIZE + 44)
|
|
|
|
|
|
|
|
/* various target states */
|
|
|
|
#define TSTATE_INACTIVE 0x01 /* don't ping this host anymore */
|
|
|
|
#define TSTATE_WAITING 0x02 /* unanswered packets on the wire */
|
|
|
|
#define TSTATE_ALIVE 0x04 /* target is alive (has answered something) */
|
|
|
|
#define TSTATE_UNREACH 0x08
|
|
|
|
|
|
|
|
/** prototypes **/
|
|
|
|
void print_help (void);
|
|
|
|
void print_usage (void);
|
|
|
|
static u_int get_timevar(const char *);
|
|
|
|
static u_int get_timevaldiff(struct timeval *, struct timeval *);
|
2013-11-26 22:55:28 +00:00
|
|
|
static in_addr_t get_ip_address(const char *);
|
2013-11-26 22:53:19 +00:00
|
|
|
static int wait_for_reply(int, u_int);
|
2016-11-30 11:36:55 +00:00
|
|
|
static int recvfrom_wto(int, void *, unsigned int, struct sockaddr *, u_int *, struct timeval*);
|
2013-11-26 22:53:19 +00:00
|
|
|
static int send_icmp_ping(int, struct rta_host *);
|
|
|
|
static int get_threshold(char *str, threshold *th);
|
|
|
|
static void run_checks(void);
|
2013-11-26 22:55:28 +00:00
|
|
|
static void set_source_ip(char *);
|
2013-11-26 22:53:19 +00:00
|
|
|
static int add_target(char *);
|
|
|
|
static int add_target_ip(char *, struct in_addr *);
|
2013-11-26 22:56:50 +00:00
|
|
|
static int handle_random_icmp(unsigned char *, struct sockaddr_in *);
|
2013-11-26 22:53:19 +00:00
|
|
|
static unsigned short icmp_checksum(unsigned short *, int);
|
|
|
|
static void finish(int);
|
|
|
|
static void crash(const char *, ...);
|
|
|
|
|
|
|
|
/** external **/
|
|
|
|
extern int optind, opterr, optopt;
|
|
|
|
extern char *optarg;
|
|
|
|
extern char **environ;
|
|
|
|
|
|
|
|
/** global variables **/
|
|
|
|
static struct rta_host **table, *cursor, *list;
|
|
|
|
static threshold crit = {80, 500000}, warn = {40, 200000};
|
|
|
|
static int mode, protocols, sockets, debug = 0, timeout = 10;
|
2013-11-26 22:56:50 +00:00
|
|
|
static unsigned short icmp_data_size = DEFAULT_PING_DATA_SIZE;
|
|
|
|
static unsigned short icmp_pkt_size = DEFAULT_PING_DATA_SIZE + ICMP_MINLEN;
|
|
|
|
|
2013-11-26 22:53:19 +00:00
|
|
|
static unsigned int icmp_sent = 0, icmp_recv = 0, icmp_lost = 0;
|
|
|
|
#define icmp_pkts_en_route (icmp_sent - (icmp_recv + icmp_lost))
|
|
|
|
static unsigned short targets_down = 0, targets = 0, packets = 0;
|
|
|
|
#define targets_alive (targets - targets_down)
|
|
|
|
static unsigned int retry_interval, pkt_interval, target_interval;
|
|
|
|
static int icmp_sock, tcp_sock, udp_sock, status = STATE_OK;
|
|
|
|
static pid_t pid;
|
|
|
|
static struct timezone tz;
|
|
|
|
static struct timeval prog_start;
|
|
|
|
static unsigned long long max_completion_time = 0;
|
|
|
|
static unsigned char ttl = 0; /* outgoing ttl */
|
|
|
|
static unsigned int warn_down = 1, crit_down = 1; /* host down threshold values */
|
2013-11-26 22:53:44 +00:00
|
|
|
static int min_hosts_alive = -1;
|
2013-11-26 22:53:19 +00:00
|
|
|
float pkt_backoff_factor = 1.5;
|
|
|
|
float target_backoff_factor = 1.5;
|
|
|
|
|
|
|
|
/** code start **/
|
|
|
|
static void
|
|
|
|
crash(const char *fmt, ...)
|
|
|
|
{
|
|
|
|
va_list ap;
|
|
|
|
|
|
|
|
printf("%s: ", progname);
|
|
|
|
|
|
|
|
va_start(ap, fmt);
|
|
|
|
vprintf(fmt, ap);
|
|
|
|
va_end(ap);
|
|
|
|
|
|
|
|
if(errno) printf(": %s", strerror(errno));
|
|
|
|
puts("");
|
|
|
|
|
|
|
|
exit(3);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-11-26 22:55:28 +00:00
|
|
|
static const char *
|
2013-11-26 22:53:19 +00:00
|
|
|
get_icmp_error_msg(unsigned char icmp_type, unsigned char icmp_code)
|
|
|
|
{
|
2013-11-26 22:55:28 +00:00
|
|
|
const char *msg = "unreachable";
|
2013-11-26 22:53:19 +00:00
|
|
|
|
|
|
|
if(debug > 1) printf("get_icmp_error_msg(%u, %u)\n", icmp_type, icmp_code);
|
|
|
|
switch(icmp_type) {
|
|
|
|
case ICMP_UNREACH:
|
|
|
|
switch(icmp_code) {
|
|
|
|
case ICMP_UNREACH_NET: msg = "Net unreachable"; break;
|
|
|
|
case ICMP_UNREACH_HOST: msg = "Host unreachable"; break;
|
|
|
|
case ICMP_UNREACH_PROTOCOL: msg = "Protocol unreachable (firewall?)"; break;
|
|
|
|
case ICMP_UNREACH_PORT: msg = "Port unreachable (firewall?)"; break;
|
|
|
|
case ICMP_UNREACH_NEEDFRAG: msg = "Fragmentation needed"; break;
|
|
|
|
case ICMP_UNREACH_SRCFAIL: msg = "Source route failed"; break;
|
|
|
|
case ICMP_UNREACH_ISOLATED: msg = "Source host isolated"; break;
|
|
|
|
case ICMP_UNREACH_NET_UNKNOWN: msg = "Unknown network"; break;
|
|
|
|
case ICMP_UNREACH_HOST_UNKNOWN: msg = "Unknown host"; break;
|
|
|
|
case ICMP_UNREACH_NET_PROHIB: msg = "Network denied (firewall?)"; break;
|
|
|
|
case ICMP_UNREACH_HOST_PROHIB: msg = "Host denied (firewall?)"; break;
|
|
|
|
case ICMP_UNREACH_TOSNET: msg = "Bad TOS for network (firewall?)"; break;
|
|
|
|
case ICMP_UNREACH_TOSHOST: msg = "Bad TOS for host (firewall?)"; break;
|
|
|
|
case ICMP_UNREACH_FILTER_PROHIB: msg = "Prohibited by filter (firewall)"; break;
|
|
|
|
case ICMP_UNREACH_HOST_PRECEDENCE: msg = "Host precedence violation"; break;
|
|
|
|
case ICMP_UNREACH_PRECEDENCE_CUTOFF: msg = "Precedence cutoff"; break;
|
|
|
|
default: msg = "Invalid code"; break;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case ICMP_TIMXCEED:
|
|
|
|
/* really 'out of reach', or non-existant host behind a router serving
|
|
|
|
* two different subnets */
|
|
|
|
switch(icmp_code) {
|
|
|
|
case ICMP_TIMXCEED_INTRANS: msg = "Time to live exceeded in transit"; break;
|
|
|
|
case ICMP_TIMXCEED_REASS: msg = "Fragment reassembly time exceeded"; break;
|
|
|
|
default: msg = "Invalid code"; break;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case ICMP_SOURCEQUENCH: msg = "Transmitting too fast"; break;
|
|
|
|
case ICMP_REDIRECT: msg = "Redirect (change route)"; break;
|
|
|
|
case ICMP_PARAMPROB: msg = "Bad IP header (required option absent)"; break;
|
|
|
|
|
|
|
|
/* the following aren't error messages, so ignore */
|
|
|
|
case ICMP_TSTAMP:
|
|
|
|
case ICMP_TSTAMPREPLY:
|
|
|
|
case ICMP_IREQ:
|
|
|
|
case ICMP_IREQREPLY:
|
|
|
|
case ICMP_MASKREQ:
|
|
|
|
case ICMP_MASKREPLY:
|
|
|
|
default: msg = ""; break;
|
|
|
|
}
|
|
|
|
|
|
|
|
return msg;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2013-11-26 22:56:50 +00:00
|
|
|
handle_random_icmp(unsigned char *packet, struct sockaddr_in *addr)
|
2013-11-26 22:53:19 +00:00
|
|
|
{
|
2013-11-26 22:55:28 +00:00
|
|
|
struct icmp p, sent_icmp;
|
2013-11-26 22:53:19 +00:00
|
|
|
struct rta_host *host = NULL;
|
|
|
|
|
2013-11-26 22:55:28 +00:00
|
|
|
memcpy(&p, packet, sizeof(p));
|
2013-11-26 22:57:29 +00:00
|
|
|
if(p.icmp_type == ICMP_ECHO && ntohs(p.icmp_id) == pid) {
|
2013-11-26 22:53:19 +00:00
|
|
|
/* echo request from us to us (pinging localhost) */
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2013-11-26 22:55:28 +00:00
|
|
|
if(debug) printf("handle_random_icmp(%p, %p)\n", (void *)&p, (void *)addr);
|
2013-11-26 22:53:19 +00:00
|
|
|
|
|
|
|
/* only handle a few types, since others can't possibly be replies to
|
|
|
|
* us in a sane network (if it is anyway, it will be counted as lost
|
|
|
|
* at summary time, but not as quickly as a proper response */
|
|
|
|
/* TIMXCEED can be an unreach from a router with multiple IP's which
|
|
|
|
* serves two different subnets on the same interface and a dead host
|
|
|
|
* on one net is pinged from the other. The router will respond to
|
|
|
|
* itself and thus set TTL=0 so as to not loop forever. Even when
|
|
|
|
* TIMXCEED actually sends a proper icmp response we will have passed
|
|
|
|
* too many hops to have a hope of reaching it later, in which case it
|
|
|
|
* indicates overconfidence in the network, poor routing or both. */
|
2013-11-26 22:55:28 +00:00
|
|
|
if(p.icmp_type != ICMP_UNREACH && p.icmp_type != ICMP_TIMXCEED &&
|
|
|
|
p.icmp_type != ICMP_SOURCEQUENCH && p.icmp_type != ICMP_PARAMPROB)
|
2013-11-26 22:53:19 +00:00
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* might be for us. At least it holds the original package (according
|
|
|
|
* to RFC 792). If it isn't, just ignore it */
|
2013-11-26 22:55:28 +00:00
|
|
|
memcpy(&sent_icmp, packet + 28, sizeof(sent_icmp));
|
2013-11-26 22:57:29 +00:00
|
|
|
if(sent_icmp.icmp_type != ICMP_ECHO || ntohs(sent_icmp.icmp_id) != pid ||
|
|
|
|
ntohs(sent_icmp.icmp_seq) >= targets*packets)
|
2013-11-26 22:53:19 +00:00
|
|
|
{
|
|
|
|
if(debug) printf("Packet is no response to a packet we sent\n");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* it is indeed a response for us */
|
2013-11-26 22:57:29 +00:00
|
|
|
host = table[ntohs(sent_icmp.icmp_seq)/packets];
|
2013-11-26 22:53:19 +00:00
|
|
|
if(debug) {
|
|
|
|
printf("Received \"%s\" from %s for ICMP ECHO sent to %s.\n",
|
2013-11-26 22:55:28 +00:00
|
|
|
get_icmp_error_msg(p.icmp_type, p.icmp_code),
|
2013-11-26 22:53:19 +00:00
|
|
|
inet_ntoa(addr->sin_addr), host->name);
|
|
|
|
}
|
|
|
|
|
|
|
|
icmp_lost++;
|
|
|
|
host->icmp_lost++;
|
|
|
|
/* don't spend time on lost hosts any more */
|
|
|
|
if(host->flags & FLAG_LOST_CAUSE) return 0;
|
|
|
|
|
|
|
|
/* source quench means we're sending too fast, so increase the
|
|
|
|
* interval and mark this packet lost */
|
2013-11-26 22:55:28 +00:00
|
|
|
if(p.icmp_type == ICMP_SOURCEQUENCH) {
|
2013-11-26 22:53:19 +00:00
|
|
|
pkt_interval *= pkt_backoff_factor;
|
|
|
|
target_interval *= target_backoff_factor;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
targets_down++;
|
|
|
|
host->flags |= FLAG_LOST_CAUSE;
|
|
|
|
}
|
2013-11-26 22:55:28 +00:00
|
|
|
host->icmp_type = p.icmp_type;
|
|
|
|
host->icmp_code = p.icmp_code;
|
2013-11-26 22:53:19 +00:00
|
|
|
host->error_addr.s_addr = addr->sin_addr.s_addr;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
main(int argc, char **argv)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
char *ptr;
|
|
|
|
long int arg;
|
|
|
|
int icmp_sockerrno, udp_sockerrno, tcp_sockerrno;
|
|
|
|
int result;
|
|
|
|
struct rta_host *host;
|
2016-11-30 11:36:55 +00:00
|
|
|
#ifdef SO_TIMESTAMP
|
|
|
|
int on = 1;
|
|
|
|
#endif
|
2013-11-26 22:54:57 +00:00
|
|
|
|
|
|
|
setlocale (LC_ALL, "");
|
|
|
|
bindtextdomain (PACKAGE, LOCALEDIR);
|
|
|
|
textdomain (PACKAGE);
|
2013-11-26 22:55:28 +00:00
|
|
|
|
2013-11-26 22:53:19 +00:00
|
|
|
/* we only need to be setsuid when we get the sockets, so do
|
|
|
|
* that before pointer magic (esp. on network data) */
|
|
|
|
icmp_sockerrno = udp_sockerrno = tcp_sockerrno = sockets = 0;
|
|
|
|
|
|
|
|
if((icmp_sock = socket(PF_INET, SOCK_RAW, IPPROTO_ICMP)) != -1)
|
|
|
|
sockets |= HAVE_ICMP;
|
|
|
|
else icmp_sockerrno = errno;
|
|
|
|
|
|
|
|
/* if((udp_sock = socket(PF_INET, SOCK_DGRAM, IPPROTO_UDP)) != -1) */
|
|
|
|
/* sockets |= HAVE_UDP; */
|
|
|
|
/* else udp_sockerrno = errno; */
|
|
|
|
|
|
|
|
/* if((tcp_sock = socket(PF_INET, SOCK_STREAM, IPPROTO_TCP)) != -1) */
|
|
|
|
/* sockets |= HAVE_TCP; */
|
|
|
|
/* else tcp_sockerrno = errno; */
|
|
|
|
|
|
|
|
/* now drop privileges (no effect if not setsuid or geteuid() == 0) */
|
|
|
|
setuid(getuid());
|
|
|
|
|
2016-11-30 11:36:55 +00:00
|
|
|
#ifdef SO_TIMESTAMP
|
|
|
|
if(setsockopt(icmp_sock, SOL_SOCKET, SO_TIMESTAMP, &on, sizeof(on)))
|
|
|
|
if(debug) printf("Warning: no SO_TIMESTAMP support\n");
|
|
|
|
#endif // SO_TIMESTAMP
|
|
|
|
|
2013-11-26 22:53:19 +00:00
|
|
|
/* POSIXLY_CORRECT might break things, so unset it (the portable way) */
|
|
|
|
environ = NULL;
|
|
|
|
|
|
|
|
/* use the pid to mark packets as ours */
|
2013-11-26 22:53:44 +00:00
|
|
|
/* Some systems have 32-bit pid_t so mask off only 16 bits */
|
|
|
|
pid = getpid() & 0xffff;
|
2013-11-26 22:53:19 +00:00
|
|
|
/* printf("pid = %u\n", pid); */
|
|
|
|
|
|
|
|
/* get calling name the old-fashioned way for portability instead
|
|
|
|
* of relying on the glibc-ism __progname */
|
|
|
|
ptr = strrchr(argv[0], '/');
|
|
|
|
if(ptr) progname = &ptr[1];
|
|
|
|
else progname = argv[0];
|
|
|
|
|
|
|
|
/* now set defaults. Use progname to set them initially (allows for
|
|
|
|
* superfast check_host program when target host is up */
|
|
|
|
cursor = list = NULL;
|
|
|
|
table = NULL;
|
|
|
|
|
|
|
|
mode = MODE_RTA;
|
|
|
|
crit.rta = 500000;
|
|
|
|
crit.pl = 80;
|
|
|
|
warn.rta = 200000;
|
|
|
|
warn.pl = 40;
|
|
|
|
protocols = HAVE_ICMP | HAVE_UDP | HAVE_TCP;
|
|
|
|
pkt_interval = 80000; /* 80 msec packet interval by default */
|
|
|
|
packets = 5;
|
|
|
|
|
|
|
|
if(!strcmp(progname, "check_icmp") || !strcmp(progname, "check_ping")) {
|
|
|
|
mode = MODE_ICMP;
|
|
|
|
protocols = HAVE_ICMP;
|
|
|
|
}
|
|
|
|
else if(!strcmp(progname, "check_host")) {
|
|
|
|
mode = MODE_HOSTCHECK;
|
|
|
|
pkt_interval = 1000000;
|
|
|
|
packets = 5;
|
|
|
|
crit.rta = warn.rta = 1000000;
|
|
|
|
crit.pl = warn.pl = 100;
|
|
|
|
}
|
|
|
|
else if(!strcmp(progname, "check_rta_multi")) {
|
|
|
|
mode = MODE_ALL;
|
|
|
|
target_interval = 0;
|
|
|
|
pkt_interval = 50000;
|
|
|
|
packets = 5;
|
|
|
|
}
|
|
|
|
|
2013-11-26 22:55:28 +00:00
|
|
|
/* Parse extra opts if any */
|
|
|
|
argv=np_extra_opts(&argc, argv, progname);
|
|
|
|
|
2013-11-26 23:00:26 +00:00
|
|
|
/* support "--help" and "--version" */
|
|
|
|
if(argc == 2) {
|
|
|
|
if(!strcmp(argv[1], "--help"))
|
|
|
|
strcpy(argv[1], "-h");
|
|
|
|
if(!strcmp(argv[1], "--version"))
|
|
|
|
strcpy(argv[1], "-V");
|
|
|
|
}
|
|
|
|
|
2013-11-26 22:53:19 +00:00
|
|
|
/* parse the arguments */
|
|
|
|
for(i = 1; i < argc; i++) {
|
2013-11-26 22:55:28 +00:00
|
|
|
while((arg = getopt(argc, argv, "vhVw:c:n:p:t:H:s:i:b:I:l:m:")) != EOF) {
|
2016-11-30 11:36:55 +00:00
|
|
|
unsigned short size;
|
2013-11-26 22:53:19 +00:00
|
|
|
switch(arg) {
|
|
|
|
case 'v':
|
|
|
|
debug++;
|
|
|
|
break;
|
|
|
|
case 'b':
|
2016-11-30 11:36:55 +00:00
|
|
|
size = (unsigned short)strtol(optarg,NULL,0);
|
2013-11-26 22:56:50 +00:00
|
|
|
if (size >= (sizeof(struct icmp) + sizeof(struct icmp_ping_data)) &&
|
|
|
|
size < MAX_PING_DATA) {
|
|
|
|
icmp_data_size = size;
|
|
|
|
icmp_pkt_size = size + ICMP_MINLEN;
|
|
|
|
} else
|
|
|
|
usage_va("ICMP data length must be between: %d and %d",
|
|
|
|
sizeof(struct icmp) + sizeof(struct icmp_ping_data),
|
|
|
|
MAX_PING_DATA - 1);
|
2013-11-26 22:53:19 +00:00
|
|
|
break;
|
|
|
|
case 'i':
|
|
|
|
pkt_interval = get_timevar(optarg);
|
|
|
|
break;
|
|
|
|
case 'I':
|
|
|
|
target_interval = get_timevar(optarg);
|
|
|
|
break;
|
|
|
|
case 'w':
|
|
|
|
get_threshold(optarg, &warn);
|
|
|
|
break;
|
|
|
|
case 'c':
|
|
|
|
get_threshold(optarg, &crit);
|
|
|
|
break;
|
|
|
|
case 'n':
|
|
|
|
case 'p':
|
|
|
|
packets = strtoul(optarg, NULL, 0);
|
|
|
|
break;
|
|
|
|
case 't':
|
|
|
|
timeout = strtoul(optarg, NULL, 0);
|
|
|
|
if(!timeout) timeout = 10;
|
|
|
|
break;
|
|
|
|
case 'H':
|
|
|
|
add_target(optarg);
|
|
|
|
break;
|
|
|
|
case 'l':
|
|
|
|
ttl = (unsigned char)strtoul(optarg, NULL, 0);
|
|
|
|
break;
|
2013-11-26 22:53:44 +00:00
|
|
|
case 'm':
|
|
|
|
min_hosts_alive = (int)strtoul(optarg, NULL, 0);
|
|
|
|
break;
|
2013-11-26 22:53:19 +00:00
|
|
|
case 'd': /* implement later, for cluster checks */
|
|
|
|
warn_down = (unsigned char)strtoul(optarg, &ptr, 0);
|
|
|
|
if(ptr) {
|
|
|
|
crit_down = (unsigned char)strtoul(ptr + 1, NULL, 0);
|
|
|
|
}
|
|
|
|
break;
|
2013-11-26 22:55:28 +00:00
|
|
|
case 's': /* specify source IP address */
|
|
|
|
set_source_ip(optarg);
|
|
|
|
break;
|
2013-11-26 23:00:26 +00:00
|
|
|
case 'V': /* version */
|
|
|
|
print_revision (progname, NP_VERSION);
|
2016-11-30 11:36:55 +00:00
|
|
|
exit (STATE_UNKNOWN);
|
2013-11-26 23:00:26 +00:00
|
|
|
case 'h': /* help */
|
|
|
|
print_help ();
|
2016-11-30 11:36:55 +00:00
|
|
|
exit (STATE_UNKNOWN);
|
2013-11-26 22:53:19 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
argv = &argv[optind];
|
|
|
|
while(*argv) {
|
|
|
|
add_target(*argv);
|
|
|
|
argv++;
|
|
|
|
}
|
|
|
|
if(!targets) {
|
|
|
|
errno = 0;
|
|
|
|
crash("No hosts to check");
|
|
|
|
exit(3);
|
|
|
|
}
|
|
|
|
|
|
|
|
if(!sockets) {
|
|
|
|
if(icmp_sock == -1) {
|
|
|
|
errno = icmp_sockerrno;
|
|
|
|
crash("Failed to obtain ICMP socket");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
/* if(udp_sock == -1) { */
|
|
|
|
/* errno = icmp_sockerrno; */
|
|
|
|
/* crash("Failed to obtain UDP socket"); */
|
|
|
|
/* return -1; */
|
|
|
|
/* } */
|
|
|
|
/* if(tcp_sock == -1) { */
|
|
|
|
/* errno = icmp_sockerrno; */
|
|
|
|
/* crash("Failed to obtain TCP socker"); */
|
|
|
|
/* return -1; */
|
|
|
|
/* } */
|
|
|
|
}
|
|
|
|
if(!ttl) ttl = 64;
|
|
|
|
|
|
|
|
if(icmp_sock) {
|
|
|
|
result = setsockopt(icmp_sock, SOL_IP, IP_TTL, &ttl, sizeof(ttl));
|
|
|
|
if(debug) {
|
|
|
|
if(result == -1) printf("setsockopt failed\n");
|
|
|
|
else printf("ttl set to %u\n", ttl);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* stupid users should be able to give whatever thresholds they want
|
|
|
|
* (nothing will break if they do), but some anal plugin maintainer
|
|
|
|
* will probably add some printf() thing here later, so it might be
|
|
|
|
* best to at least show them where to do it. ;) */
|
|
|
|
if(warn.pl > crit.pl) warn.pl = crit.pl;
|
|
|
|
if(warn.rta > crit.rta) warn.rta = crit.rta;
|
|
|
|
if(warn_down > crit_down) crit_down = warn_down;
|
|
|
|
|
|
|
|
signal(SIGINT, finish);
|
|
|
|
signal(SIGHUP, finish);
|
|
|
|
signal(SIGTERM, finish);
|
|
|
|
signal(SIGALRM, finish);
|
|
|
|
if(debug) printf("Setting alarm timeout to %u seconds\n", timeout);
|
|
|
|
alarm(timeout);
|
|
|
|
|
|
|
|
/* make sure we don't wait any longer than necessary */
|
|
|
|
gettimeofday(&prog_start, &tz);
|
|
|
|
max_completion_time =
|
|
|
|
((targets * packets * pkt_interval) + (targets * target_interval)) +
|
|
|
|
(targets * packets * crit.rta) + crit.rta;
|
|
|
|
|
|
|
|
if(debug) {
|
|
|
|
printf("packets: %u, targets: %u\n"
|
|
|
|
"target_interval: %0.3f, pkt_interval %0.3f\n"
|
|
|
|
"crit.rta: %0.3f\n"
|
|
|
|
"max_completion_time: %0.3f\n",
|
|
|
|
packets, targets,
|
|
|
|
(float)target_interval / 1000, (float)pkt_interval / 1000,
|
|
|
|
(float)crit.rta / 1000,
|
|
|
|
(float)max_completion_time / 1000);
|
|
|
|
}
|
|
|
|
|
|
|
|
if(debug) {
|
|
|
|
if(max_completion_time > (u_int)timeout * 1000000) {
|
|
|
|
printf("max_completion_time: %llu timeout: %u\n",
|
|
|
|
max_completion_time, timeout);
|
|
|
|
printf("Timout must be at lest %llu\n",
|
|
|
|
max_completion_time / 1000000 + 1);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if(debug) {
|
|
|
|
printf("crit = {%u, %u%%}, warn = {%u, %u%%}\n",
|
|
|
|
crit.rta, crit.pl, warn.rta, warn.pl);
|
|
|
|
printf("pkt_interval: %u target_interval: %u retry_interval: %u\n",
|
|
|
|
pkt_interval, target_interval, retry_interval);
|
|
|
|
printf("icmp_pkt_size: %u timeout: %u\n",
|
|
|
|
icmp_pkt_size, timeout);
|
|
|
|
}
|
|
|
|
|
|
|
|
if(packets > 20) {
|
|
|
|
errno = 0;
|
|
|
|
crash("packets is > 20 (%d)", packets);
|
|
|
|
}
|
|
|
|
|
2013-11-26 22:53:44 +00:00
|
|
|
if(min_hosts_alive < -1) {
|
|
|
|
errno = 0;
|
|
|
|
crash("minimum alive hosts is negative (%i)", min_hosts_alive);
|
|
|
|
}
|
|
|
|
|
2013-11-26 22:53:19 +00:00
|
|
|
host = list;
|
2013-11-26 22:58:53 +00:00
|
|
|
table = malloc(sizeof(struct rta_host **) * targets);
|
2013-11-26 22:53:19 +00:00
|
|
|
i = 0;
|
|
|
|
while(host) {
|
2013-11-26 22:57:29 +00:00
|
|
|
host->id = i*packets;
|
2013-11-26 22:53:19 +00:00
|
|
|
table[i] = host;
|
|
|
|
host = host->next;
|
|
|
|
i++;
|
|
|
|
}
|
|
|
|
|
|
|
|
run_checks();
|
|
|
|
|
|
|
|
errno = 0;
|
|
|
|
finish(0);
|
|
|
|
|
|
|
|
return(0);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
run_checks()
|
|
|
|
{
|
|
|
|
u_int i, t, result;
|
|
|
|
u_int final_wait, time_passed;
|
|
|
|
|
|
|
|
/* this loop might actually violate the pkt_interval or target_interval
|
|
|
|
* settings, but only if there aren't any packets on the wire which
|
|
|
|
* indicates that the target can handle an increased packet rate */
|
|
|
|
for(i = 0; i < packets; i++) {
|
|
|
|
for(t = 0; t < targets; t++) {
|
|
|
|
/* don't send useless packets */
|
|
|
|
if(!targets_alive) finish(0);
|
|
|
|
if(table[t]->flags & FLAG_LOST_CAUSE) {
|
|
|
|
if(debug) printf("%s is a lost cause. not sending any more\n",
|
|
|
|
table[t]->name);
|
|
|
|
continue;
|
|
|
|
}
|
2013-11-26 22:55:28 +00:00
|
|
|
|
2013-11-26 22:53:19 +00:00
|
|
|
/* we're still in the game, so send next packet */
|
|
|
|
(void)send_icmp_ping(icmp_sock, table[t]);
|
|
|
|
result = wait_for_reply(icmp_sock, target_interval);
|
|
|
|
}
|
|
|
|
result = wait_for_reply(icmp_sock, pkt_interval * targets);
|
|
|
|
}
|
|
|
|
|
|
|
|
if(icmp_pkts_en_route && targets_alive) {
|
|
|
|
time_passed = get_timevaldiff(NULL, NULL);
|
|
|
|
final_wait = max_completion_time - time_passed;
|
|
|
|
|
|
|
|
if(debug) {
|
|
|
|
printf("time_passed: %u final_wait: %u max_completion_time: %llu\n",
|
|
|
|
time_passed, final_wait, max_completion_time);
|
|
|
|
}
|
|
|
|
if(time_passed > max_completion_time) {
|
|
|
|
if(debug) printf("Time passed. Finishing up\n");
|
|
|
|
finish(0);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* catch the packets that might come in within the timeframe, but
|
|
|
|
* haven't yet */
|
|
|
|
if(debug) printf("Waiting for %u micro-seconds (%0.3f msecs)\n",
|
|
|
|
final_wait, (float)final_wait / 1000);
|
|
|
|
result = wait_for_reply(icmp_sock, final_wait);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* response structure:
|
|
|
|
* ip header : 20 bytes
|
|
|
|
* icmp header : 28 bytes
|
|
|
|
* icmp echo reply : the rest
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
wait_for_reply(int sock, u_int t)
|
|
|
|
{
|
|
|
|
int n, hlen;
|
2013-11-26 22:56:50 +00:00
|
|
|
static unsigned char buf[4096];
|
2013-11-26 22:53:19 +00:00
|
|
|
struct sockaddr_in resp_addr;
|
|
|
|
struct ip *ip;
|
2013-11-26 22:54:42 +00:00
|
|
|
struct icmp icp;
|
2013-11-26 22:53:19 +00:00
|
|
|
struct rta_host *host;
|
2013-11-26 22:54:42 +00:00
|
|
|
struct icmp_ping_data data;
|
2013-11-26 22:53:19 +00:00
|
|
|
struct timeval wait_start, now;
|
|
|
|
u_int tdiff, i, per_pkt_wait;
|
|
|
|
|
|
|
|
/* if we can't listen or don't have anything to listen to, just return */
|
|
|
|
if(!t || !icmp_pkts_en_route) return 0;
|
|
|
|
|
|
|
|
gettimeofday(&wait_start, &tz);
|
|
|
|
|
|
|
|
i = t;
|
|
|
|
per_pkt_wait = t / icmp_pkts_en_route;
|
|
|
|
while(icmp_pkts_en_route && get_timevaldiff(&wait_start, NULL) < i) {
|
|
|
|
t = per_pkt_wait;
|
|
|
|
|
|
|
|
/* wrap up if all targets are declared dead */
|
|
|
|
if(!targets_alive ||
|
|
|
|
get_timevaldiff(&prog_start, NULL) >= max_completion_time ||
|
|
|
|
(mode == MODE_HOSTCHECK && targets_down))
|
|
|
|
{
|
|
|
|
finish(0);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* reap responses until we hit a timeout */
|
|
|
|
n = recvfrom_wto(sock, buf, sizeof(buf),
|
2016-11-30 11:36:55 +00:00
|
|
|
(struct sockaddr *)&resp_addr, &t, &now);
|
2013-11-26 22:53:19 +00:00
|
|
|
if(!n) {
|
|
|
|
if(debug > 1) {
|
|
|
|
printf("recvfrom_wto() timed out during a %u usecs wait\n",
|
|
|
|
per_pkt_wait);
|
|
|
|
}
|
|
|
|
continue; /* timeout for this one, so keep trying */
|
|
|
|
}
|
|
|
|
if(n < 0) {
|
|
|
|
if(debug) printf("recvfrom_wto() returned errors\n");
|
|
|
|
return n;
|
|
|
|
}
|
|
|
|
|
|
|
|
ip = (struct ip *)buf;
|
|
|
|
if(debug > 1) printf("received %u bytes from %s\n",
|
|
|
|
ntohs(ip->ip_len), inet_ntoa(resp_addr.sin_addr));
|
|
|
|
|
|
|
|
/* obsolete. alpha on tru64 provides the necessary defines, but isn't broken */
|
|
|
|
/* #if defined( __alpha__ ) && __STDC__ && !defined( __GLIBC__ ) */
|
|
|
|
/* alpha headers are decidedly broken. Using an ansi compiler,
|
|
|
|
* they provide ip_vhl instead of ip_hl and ip_v, so we mask
|
|
|
|
* off the bottom 4 bits */
|
|
|
|
/* hlen = (ip->ip_vhl & 0x0f) << 2; */
|
|
|
|
/* #else */
|
|
|
|
hlen = ip->ip_hl << 2;
|
|
|
|
/* #endif */
|
|
|
|
|
|
|
|
if(n < (hlen + ICMP_MINLEN)) {
|
|
|
|
crash("received packet too short for ICMP (%d bytes, expected %d) from %s\n",
|
|
|
|
n, hlen + icmp_pkt_size, inet_ntoa(resp_addr.sin_addr));
|
|
|
|
}
|
|
|
|
/* else if(debug) { */
|
|
|
|
/* printf("ip header size: %u, packet size: %u (expected %u, %u)\n", */
|
|
|
|
/* hlen, ntohs(ip->ip_len) - hlen, */
|
|
|
|
/* sizeof(struct ip), icmp_pkt_size); */
|
|
|
|
/* } */
|
|
|
|
|
|
|
|
/* check the response */
|
2013-11-26 22:54:42 +00:00
|
|
|
memcpy(&icp, buf + hlen, sizeof(icp));
|
|
|
|
|
2013-11-26 22:57:29 +00:00
|
|
|
if(ntohs(icp.icmp_id) != pid || icp.icmp_type != ICMP_ECHOREPLY ||
|
|
|
|
ntohs(icp.icmp_seq) >= targets*packets) {
|
2013-11-26 22:53:19 +00:00
|
|
|
if(debug > 2) printf("not a proper ICMP_ECHOREPLY\n");
|
2013-11-26 22:55:28 +00:00
|
|
|
handle_random_icmp(buf + hlen, &resp_addr);
|
2013-11-26 22:53:19 +00:00
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* this is indeed a valid response */
|
2013-11-26 22:54:42 +00:00
|
|
|
memcpy(&data, icp.icmp_data, sizeof(data));
|
2013-11-26 22:57:29 +00:00
|
|
|
if (debug > 2)
|
2016-11-30 11:36:55 +00:00
|
|
|
printf("ICMP echo-reply of len %lu, id %u, seq %u, cksum 0x%X\n",
|
|
|
|
(unsigned long)sizeof(data), ntohs(icp.icmp_id),
|
|
|
|
ntohs(icp.icmp_seq), icp.icmp_cksum);
|
2013-11-26 22:53:19 +00:00
|
|
|
|
2013-11-26 22:57:29 +00:00
|
|
|
host = table[ntohs(icp.icmp_seq)/packets];
|
2013-11-26 22:54:42 +00:00
|
|
|
tdiff = get_timevaldiff(&data.stime, &now);
|
2013-11-26 22:53:19 +00:00
|
|
|
|
|
|
|
host->time_waited += tdiff;
|
|
|
|
host->icmp_recv++;
|
|
|
|
icmp_recv++;
|
2013-11-26 22:56:50 +00:00
|
|
|
if (tdiff > host->rtmax)
|
|
|
|
host->rtmax = tdiff;
|
|
|
|
if (tdiff < host->rtmin)
|
|
|
|
host->rtmin = tdiff;
|
2013-11-26 22:53:19 +00:00
|
|
|
|
|
|
|
if(debug) {
|
2013-11-26 22:56:50 +00:00
|
|
|
printf("%0.3f ms rtt from %s, outgoing ttl: %u, incoming ttl: %u, max: %0.3f, min: %0.3f\n",
|
2013-11-26 22:53:19 +00:00
|
|
|
(float)tdiff / 1000, inet_ntoa(resp_addr.sin_addr),
|
2013-11-26 22:56:50 +00:00
|
|
|
ttl, ip->ip_ttl, (float)host->rtmax / 1000, (float)host->rtmin / 1000);
|
2013-11-26 22:53:19 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/* if we're in hostcheck mode, exit with limited printouts */
|
|
|
|
if(mode == MODE_HOSTCHECK) {
|
|
|
|
printf("OK - %s responds to ICMP. Packet %u, rta %0.3fms|"
|
|
|
|
"pkt=%u;;0;%u rta=%0.3f;%0.3f;%0.3f;;\n",
|
|
|
|
host->name, icmp_recv, (float)tdiff / 1000,
|
|
|
|
icmp_recv, packets, (float)tdiff / 1000,
|
|
|
|
(float)warn.rta / 1000, (float)crit.rta / 1000);
|
|
|
|
exit(STATE_OK);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* the ping functions */
|
|
|
|
static int
|
|
|
|
send_icmp_ping(int sock, struct rta_host *host)
|
|
|
|
{
|
2013-11-26 22:54:42 +00:00
|
|
|
static union {
|
2013-11-26 22:56:50 +00:00
|
|
|
void *buf; /* re-use so we prevent leaks */
|
2013-11-26 22:54:42 +00:00
|
|
|
struct icmp *icp;
|
|
|
|
u_short *cksum_in;
|
|
|
|
} packet = { NULL };
|
2013-11-26 22:53:19 +00:00
|
|
|
long int len;
|
2013-11-26 22:54:42 +00:00
|
|
|
struct icmp_ping_data data;
|
2016-11-30 11:36:55 +00:00
|
|
|
struct msghdr hdr;
|
|
|
|
struct iovec iov;
|
2013-11-26 22:53:19 +00:00
|
|
|
struct timeval tv;
|
|
|
|
struct sockaddr *addr;
|
|
|
|
|
|
|
|
if(sock == -1) {
|
|
|
|
errno = 0;
|
|
|
|
crash("Attempt to send on bogus socket");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
addr = (struct sockaddr *)&host->saddr_in;
|
|
|
|
|
2013-11-26 22:54:42 +00:00
|
|
|
if(!packet.buf) {
|
|
|
|
if (!(packet.buf = malloc(icmp_pkt_size))) {
|
2013-11-26 22:53:19 +00:00
|
|
|
crash("send_icmp_ping(): failed to malloc %d bytes for send buffer",
|
|
|
|
icmp_pkt_size);
|
|
|
|
return -1; /* might be reached if we're in debug mode */
|
|
|
|
}
|
|
|
|
}
|
2013-11-26 22:54:42 +00:00
|
|
|
memset(packet.buf, 0, icmp_pkt_size);
|
2013-11-26 22:53:19 +00:00
|
|
|
|
|
|
|
if((gettimeofday(&tv, &tz)) == -1) return -1;
|
|
|
|
|
2013-11-26 22:54:42 +00:00
|
|
|
data.ping_id = 10; /* host->icmp.icmp_sent; */
|
|
|
|
memcpy(&data.stime, &tv, sizeof(tv));
|
|
|
|
memcpy(&packet.icp->icmp_data, &data, sizeof(data));
|
|
|
|
packet.icp->icmp_type = ICMP_ECHO;
|
|
|
|
packet.icp->icmp_code = 0;
|
|
|
|
packet.icp->icmp_cksum = 0;
|
2013-11-26 22:57:29 +00:00
|
|
|
packet.icp->icmp_id = htons(pid);
|
|
|
|
packet.icp->icmp_seq = htons(host->id++);
|
2013-11-26 22:54:42 +00:00
|
|
|
packet.icp->icmp_cksum = icmp_checksum(packet.cksum_in, icmp_pkt_size);
|
|
|
|
|
2013-11-26 22:57:29 +00:00
|
|
|
if (debug > 2)
|
2016-11-30 11:36:55 +00:00
|
|
|
printf("Sending ICMP echo-request of len %lu, id %u, seq %u, cksum 0x%X to host %s\n",
|
|
|
|
(unsigned long)sizeof(data), ntohs(packet.icp->icmp_id),
|
|
|
|
ntohs(packet.icp->icmp_seq), packet.icp->icmp_cksum,
|
|
|
|
host->name);
|
|
|
|
|
|
|
|
memset(&iov, 0, sizeof(iov));
|
|
|
|
iov.iov_base = packet.buf;
|
|
|
|
iov.iov_len = icmp_pkt_size;
|
|
|
|
|
|
|
|
memset(&hdr, 0, sizeof(hdr));
|
|
|
|
hdr.msg_name = addr;
|
|
|
|
hdr.msg_namelen = sizeof(struct sockaddr);
|
|
|
|
hdr.msg_iov = &iov;
|
|
|
|
hdr.msg_iovlen = 1;
|
|
|
|
|
|
|
|
/* MSG_CONFIRM is a linux thing and only available on linux kernels >= 2.3.15, see send(2) */
|
|
|
|
#ifdef MSG_CONFIRM
|
|
|
|
len = sendmsg(sock, &hdr, MSG_CONFIRM);
|
|
|
|
#else
|
|
|
|
len = sendmsg(sock, &hdr, 0);
|
|
|
|
#endif
|
2013-11-26 22:53:19 +00:00
|
|
|
|
|
|
|
if(len < 0 || (unsigned int)len != icmp_pkt_size) {
|
|
|
|
if(debug) printf("Failed to send ping to %s\n",
|
|
|
|
inet_ntoa(host->saddr_in.sin_addr));
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
icmp_sent++;
|
|
|
|
host->icmp_sent++;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2013-11-26 22:56:50 +00:00
|
|
|
recvfrom_wto(int sock, void *buf, unsigned int len, struct sockaddr *saddr,
|
2016-11-30 11:36:55 +00:00
|
|
|
u_int *timo, struct timeval* tv)
|
2013-11-26 22:53:19 +00:00
|
|
|
{
|
|
|
|
u_int slen;
|
2016-11-30 11:36:55 +00:00
|
|
|
int n, ret;
|
2013-11-26 22:53:19 +00:00
|
|
|
struct timeval to, then, now;
|
|
|
|
fd_set rd, wr;
|
2016-11-30 11:36:55 +00:00
|
|
|
char ans_data[4096];
|
|
|
|
struct msghdr hdr;
|
|
|
|
struct iovec iov;
|
|
|
|
#ifdef SO_TIMESTAMP
|
|
|
|
struct cmsghdr* chdr;
|
|
|
|
#endif
|
2013-11-26 22:53:19 +00:00
|
|
|
|
|
|
|
if(!*timo) {
|
|
|
|
if(debug) printf("*timo is not\n");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
to.tv_sec = *timo / 1000000;
|
|
|
|
to.tv_usec = (*timo - (to.tv_sec * 1000000));
|
|
|
|
|
|
|
|
FD_ZERO(&rd);
|
|
|
|
FD_ZERO(&wr);
|
|
|
|
FD_SET(sock, &rd);
|
|
|
|
errno = 0;
|
|
|
|
gettimeofday(&then, &tz);
|
|
|
|
n = select(sock + 1, &rd, &wr, NULL, &to);
|
|
|
|
if(n < 0) crash("select() in recvfrom_wto");
|
|
|
|
gettimeofday(&now, &tz);
|
|
|
|
*timo = get_timevaldiff(&then, &now);
|
|
|
|
|
|
|
|
if(!n) return 0; /* timeout */
|
|
|
|
|
|
|
|
slen = sizeof(struct sockaddr);
|
|
|
|
|
2016-11-30 11:36:55 +00:00
|
|
|
memset(&iov, 0, sizeof(iov));
|
|
|
|
iov.iov_base = buf;
|
|
|
|
iov.iov_len = len;
|
|
|
|
|
|
|
|
memset(&hdr, 0, sizeof(hdr));
|
|
|
|
hdr.msg_name = saddr;
|
|
|
|
hdr.msg_namelen = slen;
|
|
|
|
hdr.msg_iov = &iov;
|
|
|
|
hdr.msg_iovlen = 1;
|
|
|
|
hdr.msg_control = ans_data;
|
|
|
|
hdr.msg_controllen = sizeof(ans_data);
|
|
|
|
|
|
|
|
ret = recvmsg(sock, &hdr, 0);
|
|
|
|
#ifdef SO_TIMESTAMP
|
|
|
|
for(chdr = CMSG_FIRSTHDR(&hdr); chdr; chdr = CMSG_NXTHDR(&hdr, chdr)) {
|
|
|
|
if(chdr->cmsg_level == SOL_SOCKET
|
|
|
|
&& chdr->cmsg_type == SO_TIMESTAMP
|
|
|
|
&& chdr->cmsg_len >= CMSG_LEN(sizeof(struct timeval))) {
|
|
|
|
memcpy(tv, CMSG_DATA(chdr), sizeof(*tv));
|
|
|
|
break ;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (!chdr)
|
|
|
|
#endif // SO_TIMESTAMP
|
|
|
|
gettimeofday(tv, &tz);
|
|
|
|
return (ret);
|
2013-11-26 22:53:19 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
finish(int sig)
|
|
|
|
{
|
|
|
|
u_int i = 0;
|
|
|
|
unsigned char pl;
|
|
|
|
double rta;
|
|
|
|
struct rta_host *host;
|
2013-11-26 22:55:28 +00:00
|
|
|
const char *status_string[] =
|
2013-11-26 22:53:19 +00:00
|
|
|
{"OK", "WARNING", "CRITICAL", "UNKNOWN", "DEPENDENT"};
|
2013-11-26 22:53:44 +00:00
|
|
|
int hosts_ok = 0;
|
|
|
|
int hosts_warn = 0;
|
2013-11-26 22:53:19 +00:00
|
|
|
|
|
|
|
alarm(0);
|
|
|
|
if(debug > 1) printf("finish(%d) called\n", sig);
|
|
|
|
|
|
|
|
if(icmp_sock != -1) close(icmp_sock);
|
|
|
|
if(udp_sock != -1) close(udp_sock);
|
|
|
|
if(tcp_sock != -1) close(tcp_sock);
|
|
|
|
|
|
|
|
if(debug) {
|
|
|
|
printf("icmp_sent: %u icmp_recv: %u icmp_lost: %u\n",
|
|
|
|
icmp_sent, icmp_recv, icmp_lost);
|
|
|
|
printf("targets: %u targets_alive: %u\n", targets, targets_alive);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* iterate thrice to calculate values, give output, and print perfparse */
|
|
|
|
host = list;
|
|
|
|
while(host) {
|
|
|
|
if(!host->icmp_recv) {
|
|
|
|
/* rta 0 is ofcourse not entirely correct, but will still show up
|
|
|
|
* conspicuosly as missing entries in perfparse and cacti */
|
|
|
|
pl = 100;
|
|
|
|
rta = 0;
|
|
|
|
status = STATE_CRITICAL;
|
|
|
|
/* up the down counter if not already counted */
|
|
|
|
if(!(host->flags & FLAG_LOST_CAUSE) && targets_alive) targets_down++;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
pl = ((host->icmp_sent - host->icmp_recv) * 100) / host->icmp_sent;
|
|
|
|
rta = (double)host->time_waited / host->icmp_recv;
|
|
|
|
}
|
|
|
|
host->pl = pl;
|
|
|
|
host->rta = rta;
|
2013-11-26 22:53:44 +00:00
|
|
|
if(pl >= crit.pl || rta >= crit.rta) {
|
|
|
|
status = STATE_CRITICAL;
|
|
|
|
}
|
|
|
|
else if(!status && (pl >= warn.pl || rta >= warn.rta)) {
|
|
|
|
status = STATE_WARNING;
|
|
|
|
hosts_warn++;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
hosts_ok++;
|
|
|
|
}
|
2013-11-26 22:53:19 +00:00
|
|
|
|
|
|
|
host = host->next;
|
|
|
|
}
|
|
|
|
/* this is inevitable */
|
|
|
|
if(!targets_alive) status = STATE_CRITICAL;
|
2013-11-26 22:53:44 +00:00
|
|
|
if(min_hosts_alive > -1) {
|
|
|
|
if(hosts_ok >= min_hosts_alive) status = STATE_OK;
|
|
|
|
else if((hosts_ok + hosts_warn) >= min_hosts_alive) status = STATE_WARNING;
|
|
|
|
}
|
2013-11-26 22:53:19 +00:00
|
|
|
printf("%s - ", status_string[status]);
|
|
|
|
|
|
|
|
host = list;
|
|
|
|
while(host) {
|
|
|
|
if(debug) puts("");
|
|
|
|
if(i) {
|
|
|
|
if(i < targets) printf(" :: ");
|
|
|
|
else printf("\n");
|
|
|
|
}
|
|
|
|
i++;
|
|
|
|
if(!host->icmp_recv) {
|
|
|
|
status = STATE_CRITICAL;
|
|
|
|
if(host->flags & FLAG_LOST_CAUSE) {
|
|
|
|
printf("%s: %s @ %s. rta nan, lost %d%%",
|
|
|
|
host->name,
|
|
|
|
get_icmp_error_msg(host->icmp_type, host->icmp_code),
|
|
|
|
inet_ntoa(host->error_addr),
|
|
|
|
100);
|
|
|
|
}
|
|
|
|
else { /* not marked as lost cause, so we have no flags for it */
|
|
|
|
printf("%s: rta nan, lost 100%%", host->name);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else { /* !icmp_recv */
|
|
|
|
printf("%s: rta %0.3fms, lost %u%%",
|
|
|
|
host->name, host->rta / 1000, host->pl);
|
|
|
|
}
|
|
|
|
|
|
|
|
host = host->next;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* iterate once more for pretty perfparse output */
|
|
|
|
printf("|");
|
|
|
|
i = 0;
|
|
|
|
host = list;
|
|
|
|
while(host) {
|
|
|
|
if(debug) puts("");
|
2013-11-26 22:56:50 +00:00
|
|
|
printf("%srta=%0.3fms;%0.3f;%0.3f;0; %spl=%u%%;%u;%u;; %srtmax=%0.3fms;;;; %srtmin=%0.3fms;;;; ",
|
2013-11-26 22:53:19 +00:00
|
|
|
(targets > 1) ? host->name : "",
|
|
|
|
host->rta / 1000, (float)warn.rta / 1000, (float)crit.rta / 1000,
|
2013-11-26 22:56:50 +00:00
|
|
|
(targets > 1) ? host->name : "", host->pl, warn.pl, crit.pl,
|
|
|
|
(targets > 1) ? host->name : "", (float)host->rtmax / 1000,
|
|
|
|
(targets > 1) ? host->name : "", (host->rtmin < DBL_MAX) ? (float)host->rtmin / 1000 : (float)0);
|
2013-11-26 22:53:19 +00:00
|
|
|
|
|
|
|
host = host->next;
|
|
|
|
}
|
|
|
|
|
2013-11-26 22:53:44 +00:00
|
|
|
if(min_hosts_alive > -1) {
|
|
|
|
if(hosts_ok >= min_hosts_alive) status = STATE_OK;
|
|
|
|
else if((hosts_ok + hosts_warn) >= min_hosts_alive) status = STATE_WARNING;
|
|
|
|
}
|
|
|
|
|
2013-11-26 22:53:19 +00:00
|
|
|
/* finish with an empty line */
|
|
|
|
puts("");
|
2013-11-26 22:53:44 +00:00
|
|
|
if(debug) printf("targets: %u, targets_alive: %u, hosts_ok: %u, hosts_warn: %u, min_hosts_alive: %i\n",
|
|
|
|
targets, targets_alive, hosts_ok, hosts_warn, min_hosts_alive);
|
2013-11-26 22:53:19 +00:00
|
|
|
|
|
|
|
exit(status);
|
|
|
|
}
|
|
|
|
|
|
|
|
static u_int
|
|
|
|
get_timevaldiff(struct timeval *early, struct timeval *later)
|
|
|
|
{
|
|
|
|
u_int ret;
|
|
|
|
struct timeval now;
|
|
|
|
|
|
|
|
if(!later) {
|
|
|
|
gettimeofday(&now, &tz);
|
|
|
|
later = &now;
|
|
|
|
}
|
|
|
|
if(!early) early = &prog_start;
|
|
|
|
|
|
|
|
/* if early > later we return 0 so as to indicate a timeout */
|
2013-11-26 22:56:50 +00:00
|
|
|
if(early->tv_sec > later->tv_sec ||
|
2013-11-26 22:53:19 +00:00
|
|
|
(early->tv_sec == later->tv_sec && early->tv_usec > later->tv_usec))
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = (later->tv_sec - early->tv_sec) * 1000000;
|
|
|
|
ret += later->tv_usec - early->tv_usec;
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
add_target_ip(char *arg, struct in_addr *in)
|
|
|
|
{
|
|
|
|
struct rta_host *host;
|
|
|
|
|
|
|
|
/* disregard obviously stupid addresses */
|
|
|
|
if(in->s_addr == INADDR_NONE || in->s_addr == INADDR_ANY)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
/* no point in adding two identical IP's, so don't. ;) */
|
|
|
|
host = list;
|
|
|
|
while(host) {
|
|
|
|
if(host->saddr_in.sin_addr.s_addr == in->s_addr) {
|
|
|
|
if(debug) printf("Identical IP already exists. Not adding %s\n", arg);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
host = host->next;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* add the fresh ip */
|
|
|
|
host = malloc(sizeof(struct rta_host));
|
|
|
|
if(!host) {
|
|
|
|
crash("add_target_ip(%s, %s): malloc(%d) failed",
|
|
|
|
arg, inet_ntoa(*in), sizeof(struct rta_host));
|
|
|
|
}
|
|
|
|
memset(host, 0, sizeof(struct rta_host));
|
|
|
|
|
|
|
|
/* set the values. use calling name for output */
|
|
|
|
host->name = strdup(arg);
|
|
|
|
|
|
|
|
/* fill out the sockaddr_in struct */
|
|
|
|
host->saddr_in.sin_family = AF_INET;
|
|
|
|
host->saddr_in.sin_addr.s_addr = in->s_addr;
|
|
|
|
|
2013-11-26 22:56:50 +00:00
|
|
|
host->rtmin = DBL_MAX;
|
|
|
|
|
2013-11-26 22:53:19 +00:00
|
|
|
if(!list) list = cursor = host;
|
|
|
|
else cursor->next = host;
|
|
|
|
|
|
|
|
cursor = host;
|
|
|
|
targets++;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* wrapper for add_target_ip */
|
|
|
|
static int
|
|
|
|
add_target(char *arg)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
struct hostent *he;
|
|
|
|
struct in_addr *in, ip;
|
|
|
|
|
|
|
|
/* don't resolve if we don't have to */
|
|
|
|
if((ip.s_addr = inet_addr(arg)) != INADDR_NONE) {
|
|
|
|
/* don't add all ip's if we were given a specific one */
|
|
|
|
return add_target_ip(arg, &ip);
|
|
|
|
/* he = gethostbyaddr((char *)in, sizeof(struct in_addr), AF_INET); */
|
|
|
|
/* if(!he) return add_target_ip(arg, in); */
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
errno = 0;
|
|
|
|
he = gethostbyname(arg);
|
|
|
|
if(!he) {
|
|
|
|
errno = 0;
|
|
|
|
crash("Failed to resolve %s", arg);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* possibly add all the IP's as targets */
|
|
|
|
for(i = 0; he->h_addr_list[i]; i++) {
|
|
|
|
in = (struct in_addr *)he->h_addr_list[i];
|
|
|
|
add_target_ip(arg, in);
|
|
|
|
|
|
|
|
/* this is silly, but it works */
|
|
|
|
if(mode == MODE_HOSTCHECK || mode == MODE_ALL) {
|
2013-11-26 22:55:28 +00:00
|
|
|
if(debug > 2) printf("mode: %d\n", mode);
|
2013-11-26 22:53:19 +00:00
|
|
|
continue;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
2013-11-26 22:55:28 +00:00
|
|
|
|
|
|
|
static void
|
|
|
|
set_source_ip(char *arg)
|
|
|
|
{
|
|
|
|
struct sockaddr_in src;
|
|
|
|
|
|
|
|
memset(&src, 0, sizeof(src));
|
|
|
|
src.sin_family = AF_INET;
|
|
|
|
if((src.sin_addr.s_addr = inet_addr(arg)) == INADDR_NONE)
|
|
|
|
src.sin_addr.s_addr = get_ip_address(arg);
|
|
|
|
if(bind(icmp_sock, (struct sockaddr *)&src, sizeof(src)) == -1)
|
|
|
|
crash("Cannot bind to IP address %s", arg);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* TODO: Move this to netutils.c and also change check_dhcp to use that. */
|
|
|
|
static in_addr_t
|
|
|
|
get_ip_address(const char *ifname)
|
|
|
|
{
|
|
|
|
#if defined(SIOCGIFADDR)
|
|
|
|
struct ifreq ifr;
|
|
|
|
struct sockaddr_in ip;
|
|
|
|
|
|
|
|
strncpy(ifr.ifr_name, ifname, sizeof(ifr.ifr_name) - 1);
|
|
|
|
ifr.ifr_name[sizeof(ifr.ifr_name) - 1] = '\0';
|
|
|
|
if(ioctl(icmp_sock, SIOCGIFADDR, &ifr) == -1)
|
|
|
|
crash("Cannot determine IP address of interface %s", ifname);
|
|
|
|
memcpy(&ip, &ifr.ifr_addr, sizeof(ip));
|
|
|
|
return ip.sin_addr.s_addr;
|
|
|
|
#else
|
|
|
|
errno = 0;
|
|
|
|
crash("Cannot get interface IP address on this platform.");
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2013-11-26 22:53:19 +00:00
|
|
|
/*
|
|
|
|
* u = micro
|
|
|
|
* m = milli
|
|
|
|
* s = seconds
|
|
|
|
* return value is in microseconds
|
|
|
|
*/
|
|
|
|
static u_int
|
|
|
|
get_timevar(const char *str)
|
|
|
|
{
|
|
|
|
char p, u, *ptr;
|
2016-11-30 11:36:55 +00:00
|
|
|
size_t len;
|
2013-11-26 22:53:19 +00:00
|
|
|
u_int i, d; /* integer and decimal, respectively */
|
|
|
|
u_int factor = 1000; /* default to milliseconds */
|
|
|
|
|
|
|
|
if(!str) return 0;
|
|
|
|
len = strlen(str);
|
|
|
|
if(!len) return 0;
|
|
|
|
|
|
|
|
/* unit might be given as ms|m (millisec),
|
|
|
|
* us|u (microsec) or just plain s, for seconds */
|
|
|
|
u = p = '\0';
|
|
|
|
u = str[len - 1];
|
|
|
|
if(len >= 2 && !isdigit((int)str[len - 2])) p = str[len - 2];
|
|
|
|
if(p && u == 's') u = p;
|
|
|
|
else if(!p) p = u;
|
|
|
|
if(debug > 2) printf("evaluating %s, u: %c, p: %c\n", str, u, p);
|
|
|
|
|
|
|
|
if(u == 'u') factor = 1; /* microseconds */
|
|
|
|
else if(u == 'm') factor = 1000; /* milliseconds */
|
|
|
|
else if(u == 's') factor = 1000000; /* seconds */
|
|
|
|
if(debug > 2) printf("factor is %u\n", factor);
|
|
|
|
|
|
|
|
i = strtoul(str, &ptr, 0);
|
|
|
|
if(!ptr || *ptr != '.' || strlen(ptr) < 2 || factor == 1)
|
|
|
|
return i * factor;
|
|
|
|
|
|
|
|
/* time specified in usecs can't have decimal points, so ignore them */
|
|
|
|
if(factor == 1) return i;
|
|
|
|
|
|
|
|
d = strtoul(ptr + 1, NULL, 0);
|
|
|
|
|
|
|
|
/* d is decimal, so get rid of excess digits */
|
|
|
|
while(d >= factor) d /= 10;
|
|
|
|
|
|
|
|
/* the last parenthesis avoids floating point exceptions. */
|
|
|
|
return ((i * factor) + (d * (factor / 10)));
|
|
|
|
}
|
|
|
|
|
|
|
|
/* not too good at checking errors, but it'll do (main() should barfe on -1) */
|
|
|
|
static int
|
|
|
|
get_threshold(char *str, threshold *th)
|
|
|
|
{
|
|
|
|
char *p = NULL, i = 0;
|
|
|
|
|
|
|
|
if(!str || !strlen(str) || !th) return -1;
|
|
|
|
|
|
|
|
/* pointer magic slims code by 10 lines. i is bof-stop on stupid libc's */
|
|
|
|
p = &str[strlen(str) - 1];
|
|
|
|
while(p != &str[1]) {
|
|
|
|
if(*p == '%') *p = '\0';
|
|
|
|
else if(*p == ',' && i) {
|
|
|
|
*p = '\0'; /* reset it so get_timevar(str) works nicely later */
|
|
|
|
th->pl = (unsigned char)strtoul(p+1, NULL, 0);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
i = 1;
|
|
|
|
p--;
|
|
|
|
}
|
|
|
|
th->rta = get_timevar(str);
|
|
|
|
|
|
|
|
if(!th->rta) return -1;
|
|
|
|
|
|
|
|
if(th->rta > MAXTTL * 1000000) th->rta = MAXTTL * 1000000;
|
|
|
|
if(th->pl > 100) th->pl = 100;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
unsigned short
|
|
|
|
icmp_checksum(unsigned short *p, int n)
|
|
|
|
{
|
|
|
|
register unsigned short cksum;
|
|
|
|
register long sum = 0;
|
|
|
|
|
|
|
|
while(n > 1) {
|
|
|
|
sum += *p++;
|
|
|
|
n -= 2;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* mop up the occasional odd byte */
|
|
|
|
if(n == 1) sum += (unsigned char)*p;
|
|
|
|
|
|
|
|
sum = (sum >> 16) + (sum & 0xffff); /* add hi 16 to low 16 */
|
|
|
|
sum += (sum >> 16); /* add carry */
|
|
|
|
cksum = ~sum; /* ones-complement, trunc to 16 bits */
|
|
|
|
|
|
|
|
return cksum;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
print_help(void)
|
|
|
|
{
|
|
|
|
|
2013-11-26 22:56:50 +00:00
|
|
|
/*print_revision (progname);*/ /* FIXME: Why? */
|
2013-11-26 22:55:28 +00:00
|
|
|
|
2013-11-26 22:53:19 +00:00
|
|
|
printf ("Copyright (c) 2005 Andreas Ericsson <ae@op5.se>\n");
|
|
|
|
printf (COPYRIGHT, copyright, email);
|
2013-11-26 22:55:28 +00:00
|
|
|
|
2013-11-26 22:53:19 +00:00
|
|
|
printf ("\n\n");
|
2013-11-26 22:55:28 +00:00
|
|
|
|
2013-11-26 22:53:19 +00:00
|
|
|
print_usage ();
|
2013-11-26 22:55:28 +00:00
|
|
|
|
2013-11-26 22:57:29 +00:00
|
|
|
printf (UT_HELP_VRSN);
|
|
|
|
printf (UT_EXTRA_OPTS);
|
2013-11-26 22:55:28 +00:00
|
|
|
|
2013-11-26 22:53:19 +00:00
|
|
|
printf (" %s\n", "-H");
|
|
|
|
printf (" %s\n", _("specify a target"));
|
|
|
|
printf (" %s\n", "-w");
|
|
|
|
printf (" %s", _("warning threshold (currently "));
|
2013-11-26 22:56:50 +00:00
|
|
|
printf ("%0.3fms,%u%%)\n", (float)warn.rta / 1000, warn.pl);
|
2013-11-26 22:53:19 +00:00
|
|
|
printf (" %s\n", "-c");
|
|
|
|
printf (" %s", _("critical threshold (currently "));
|
2013-11-26 22:56:50 +00:00
|
|
|
printf ("%0.3fms,%u%%)\n", (float)crit.rta / 1000, crit.pl);
|
2013-11-26 22:55:28 +00:00
|
|
|
printf (" %s\n", "-s");
|
|
|
|
printf (" %s\n", _("specify a source IP address or device name"));
|
2013-11-26 22:53:19 +00:00
|
|
|
printf (" %s\n", "-n");
|
|
|
|
printf (" %s", _("number of packets to send (currently "));
|
|
|
|
printf ("%u)\n",packets);
|
|
|
|
printf (" %s\n", "-i");
|
|
|
|
printf (" %s", _("max packet interval (currently "));
|
|
|
|
printf ("%0.3fms)\n",(float)pkt_interval / 1000);
|
|
|
|
printf (" %s\n", "-I");
|
|
|
|
printf (" %s", _("max target interval (currently "));
|
|
|
|
printf ("%0.3fms)\n", (float)target_interval / 1000);
|
2013-11-26 22:53:44 +00:00
|
|
|
printf (" %s\n", "-m");
|
|
|
|
printf (" %s",_("number of alive hosts required for success"));
|
|
|
|
printf ("\n");
|
2013-11-26 22:53:19 +00:00
|
|
|
printf (" %s\n", "-l");
|
|
|
|
printf (" %s", _("TTL on outgoing packets (currently "));
|
2013-11-26 22:56:50 +00:00
|
|
|
printf ("%u)\n", ttl);
|
2013-11-26 22:53:19 +00:00
|
|
|
printf (" %s\n", "-t");
|
|
|
|
printf (" %s",_("timeout value (seconds, currently "));
|
|
|
|
printf ("%u)\n", timeout);
|
|
|
|
printf (" %s\n", "-b");
|
2013-11-26 22:56:50 +00:00
|
|
|
printf (" %s\n", _("Number of icmp data bytes to send"));
|
|
|
|
printf (" %s %u + %d)\n", _("Packet size will be data bytes + icmp header (currently"),icmp_data_size, ICMP_MINLEN);
|
2013-11-26 22:53:19 +00:00
|
|
|
printf (" %s\n", "-v");
|
|
|
|
printf (" %s\n", _("verbose"));
|
|
|
|
|
|
|
|
printf ("\n");
|
2013-11-26 22:55:28 +00:00
|
|
|
printf ("%s\n", _("Notes:"));
|
|
|
|
printf (" %s\n", _("The -H switch is optional. Naming a host (or several) to check is not."));
|
|
|
|
printf ("\n");
|
|
|
|
printf (" %s\n", _("Threshold format for -w and -c is 200.25,60% for 200.25 msec RTA and 60%"));
|
|
|
|
printf (" %s\n", _("packet loss. The default values should work well for most users."));
|
|
|
|
printf (" %s\n", _("You can specify different RTA factors using the standardized abbreviations"));
|
|
|
|
printf (" %s\n", _("us (microseconds), ms (milliseconds, default) or just plain s for seconds."));
|
2013-11-26 22:53:44 +00:00
|
|
|
/* -d not yet implemented */
|
|
|
|
/* printf ("%s\n", _("Threshold format for -d is warn,crit. 12,14 means WARNING if >= 12 hops"));
|
2013-11-26 22:53:19 +00:00
|
|
|
printf ("%s\n", _("are spent and CRITICAL if >= 14 hops are spent."));
|
2013-11-26 22:53:44 +00:00
|
|
|
printf ("%s\n\n", _("NOTE: Some systems decrease TTL when forming ICMP_ECHOREPLY, others do not."));*/
|
2013-11-26 22:55:28 +00:00
|
|
|
printf ("\n");
|
|
|
|
printf (" %s\n", _("The -v switch can be specified several times for increased verbosity."));
|
2013-11-26 22:53:19 +00:00
|
|
|
/* printf ("%s\n", _("Long options are currently unsupported."));
|
|
|
|
printf ("%s\n", _("Options marked with * require an argument"));
|
|
|
|
*/
|
2013-11-26 22:55:28 +00:00
|
|
|
|
2013-11-26 22:57:29 +00:00
|
|
|
printf (UT_SUPPORT);
|
2013-11-26 22:53:19 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
void
|
|
|
|
print_usage (void)
|
|
|
|
{
|
2013-11-26 22:57:29 +00:00
|
|
|
printf ("%s\n", _("Usage:"));
|
2013-11-26 22:55:28 +00:00
|
|
|
printf(" %s [options] [-H] host1 host2 hostN\n", progname);
|
2013-11-26 22:53:19 +00:00
|
|
|
}
|