diff options
author | Lorenz Kästle <12514511+RincewindsHat@users.noreply.github.com> | 2025-05-18 18:10:25 +0200 |
---|---|---|
committer | Lorenz Kästle <12514511+RincewindsHat@users.noreply.github.com> | 2025-05-18 18:10:25 +0200 |
commit | b5de682309589ddb230e04beaaa54d74f2fe70d5 (patch) | |
tree | 70c2557e7ad1605ef216a7cb6e1a5e8eb843a016 /plugins-root | |
parent | 8f08e7ab3ecc03ea38062fe4442668fbea30bb73 (diff) | |
download | monitoring-plugins-b5de682309589ddb230e04beaaa54d74f2fe70d5.tar.gz |
WIP - check_icmp refactor 8
Diffstat (limited to 'plugins-root')
-rw-r--r-- | plugins-root/check_icmp.c | 505 | ||||
-rw-r--r-- | plugins-root/check_icmp.d/check_icmp_helpers.c | 64 | ||||
-rw-r--r-- | plugins-root/check_icmp.d/check_icmp_helpers.h | 15 | ||||
-rw-r--r-- | plugins-root/check_icmp.d/config.h | 3 |
4 files changed, 332 insertions, 255 deletions
diff --git a/plugins-root/check_icmp.c b/plugins-root/check_icmp.c index 0614d6aa..d4e55b0d 100644 --- a/plugins-root/check_icmp.c +++ b/plugins-root/check_icmp.c | |||
@@ -71,6 +71,9 @@ const char *email = "devel@monitoring-plugins.org"; | |||
71 | #include <sys/types.h> | 71 | #include <sys/types.h> |
72 | #include <unistd.h> | 72 | #include <unistd.h> |
73 | #include <stdint.h> | 73 | #include <stdint.h> |
74 | #include <sys/socket.h> | ||
75 | #include <assert.h> | ||
76 | #include <sys/select.h> | ||
74 | 77 | ||
75 | #include "../lib/states.h" | 78 | #include "../lib/states.h" |
76 | #include "./check_icmp.d/config.h" | 79 | #include "./check_icmp.d/config.h" |
@@ -140,24 +143,31 @@ static time_t get_timevaldiff(struct timeval earlier, struct timeval later); | |||
140 | static time_t get_timevaldiff_to_now(struct timeval earlier); | 143 | static time_t get_timevaldiff_to_now(struct timeval earlier); |
141 | 144 | ||
142 | static in_addr_t get_ip_address(const char *ifname); | 145 | static in_addr_t get_ip_address(const char *ifname); |
143 | static void set_source_ip(char *arg, int icmp_sock); | 146 | static void set_source_ip(char *arg, int icmp_sock, sa_family_t addr_family); |
144 | 147 | ||
145 | /* Receiving data */ | 148 | /* Receiving data */ |
146 | static int wait_for_reply(int socket, time_t time_interval, unsigned short icmp_pkt_size, | 149 | static int wait_for_reply(check_icmp_socket_set sockset, time_t time_interval, |
147 | unsigned int *pkt_interval, unsigned int *target_interval, | 150 | unsigned short icmp_pkt_size, unsigned int *pkt_interval, |
148 | uint16_t sender_id, ping_target **table, unsigned short packets, | 151 | unsigned int *target_interval, uint16_t sender_id, ping_target **table, |
149 | unsigned short number_of_targets, check_icmp_state *program_state); | 152 | unsigned short packets, unsigned short number_of_targets, |
153 | check_icmp_state *program_state); | ||
150 | 154 | ||
151 | static ssize_t recvfrom_wto(int sock, void *buf, unsigned int len, struct sockaddr *saddr, | 155 | typedef struct { |
152 | time_t *timeout, struct timeval *received_timestamp); | 156 | sa_family_t recv_proto; |
157 | ssize_t received; | ||
158 | } recvfrom_wto_wrapper; | ||
159 | static recvfrom_wto_wrapper recvfrom_wto(check_icmp_socket_set sockset, void *buf, unsigned int len, | ||
160 | struct sockaddr *saddr, time_t *timeout, | ||
161 | struct timeval *received_timestamp); | ||
153 | static int handle_random_icmp(unsigned char *packet, struct sockaddr_storage *addr, | 162 | static int handle_random_icmp(unsigned char *packet, struct sockaddr_storage *addr, |
154 | unsigned int *pkt_interval, unsigned int *target_interval, | 163 | unsigned int *pkt_interval, unsigned int *target_interval, |
155 | uint16_t sender_id, ping_target **table, unsigned short packets, | 164 | uint16_t sender_id, ping_target **table, unsigned short packets, |
156 | unsigned short number_of_targets, check_icmp_state *program_state); | 165 | unsigned short number_of_targets, check_icmp_state *program_state); |
157 | 166 | ||
158 | /* Sending data */ | 167 | /* Sending data */ |
159 | static int send_icmp_ping(int socket, ping_target *host, unsigned short icmp_pkt_size, | 168 | static int send_icmp_ping(check_icmp_socket_set socket, ping_target *host, |
160 | uint16_t sender_id, check_icmp_state *program_state); | 169 | unsigned short icmp_pkt_size, uint16_t sender_id, |
170 | check_icmp_state *program_state); | ||
161 | 171 | ||
162 | /* Threshold related */ | 172 | /* Threshold related */ |
163 | typedef struct { | 173 | typedef struct { |
@@ -188,7 +198,7 @@ static void run_checks(unsigned short icmp_pkt_size, unsigned int *pkt_interval, | |||
188 | unsigned int *target_interval, uint16_t sender_id, | 198 | unsigned int *target_interval, uint16_t sender_id, |
189 | check_icmp_execution_mode mode, unsigned int max_completion_time, | 199 | check_icmp_execution_mode mode, unsigned int max_completion_time, |
190 | struct timeval prog_start, ping_target **table, unsigned short packets, | 200 | struct timeval prog_start, ping_target **table, unsigned short packets, |
191 | int icmp_sock, unsigned short number_of_targets, | 201 | check_icmp_socket_set sockset, unsigned short number_of_targets, |
192 | check_icmp_state *program_state); | 202 | check_icmp_state *program_state); |
193 | mp_subcheck evaluate_target(ping_target target, check_icmp_mode_switches modes, | 203 | mp_subcheck evaluate_target(ping_target target, check_icmp_mode_switches modes, |
194 | check_icmp_threshold warn, check_icmp_threshold crit); | 204 | check_icmp_threshold warn, check_icmp_threshold crit); |
@@ -206,15 +216,21 @@ evaluate_host_wrapper evaluate_host(check_icmp_target_container host, | |||
206 | typedef struct { | 216 | typedef struct { |
207 | int error_code; | 217 | int error_code; |
208 | check_icmp_target_container host; | 218 | check_icmp_target_container host; |
219 | bool has_v4; | ||
220 | bool has_v6; | ||
209 | } add_host_wrapper; | 221 | } add_host_wrapper; |
210 | static add_host_wrapper add_host(char *arg, check_icmp_execution_mode mode); | 222 | static add_host_wrapper add_host(char *arg, check_icmp_execution_mode mode, |
223 | sa_family_t enforced_proto); | ||
211 | 224 | ||
212 | typedef struct { | 225 | typedef struct { |
213 | int error_code; | 226 | int error_code; |
214 | ping_target *targets; | 227 | ping_target *targets; |
215 | unsigned int number_of_targets; | 228 | unsigned int number_of_targets; |
229 | bool has_v4; | ||
230 | bool has_v6; | ||
216 | } add_target_wrapper; | 231 | } add_target_wrapper; |
217 | static add_target_wrapper add_target(char *arg, check_icmp_execution_mode mode); | 232 | static add_target_wrapper add_target(char *arg, check_icmp_execution_mode mode, |
233 | sa_family_t enforced_proto); | ||
218 | 234 | ||
219 | typedef struct { | 235 | typedef struct { |
220 | int error_code; | 236 | int error_code; |
@@ -222,13 +238,13 @@ typedef struct { | |||
222 | } add_target_ip_wrapper; | 238 | } add_target_ip_wrapper; |
223 | static add_target_ip_wrapper add_target_ip(struct sockaddr_storage address); | 239 | static add_target_ip_wrapper add_target_ip(struct sockaddr_storage address); |
224 | 240 | ||
225 | static void parse_address(struct sockaddr_storage *addr, char *address, socklen_t size); | 241 | static void parse_address(const struct sockaddr_storage *addr, char *dst, socklen_t size); |
226 | 242 | ||
227 | static unsigned short icmp_checksum(uint16_t *packet, size_t packet_size); | 243 | static unsigned short icmp_checksum(uint16_t *packet, size_t packet_size); |
228 | 244 | ||
229 | /* End of run function */ | 245 | /* End of run function */ |
230 | static void finish(int sign, check_icmp_mode_switches modes, int min_hosts_alive, | 246 | static void finish(int sign, check_icmp_mode_switches modes, int min_hosts_alive, |
231 | check_icmp_threshold warn, check_icmp_threshold crit, int icmp_sock, | 247 | check_icmp_threshold warn, check_icmp_threshold crit, |
232 | unsigned short number_of_targets, check_icmp_state *program_state, | 248 | unsigned short number_of_targets, check_icmp_state *program_state, |
233 | check_icmp_target_container host_list[], unsigned short number_of_hosts, | 249 | check_icmp_target_container host_list[], unsigned short number_of_hosts, |
234 | mp_check overall[static 1]); | 250 | mp_check overall[static 1]); |
@@ -298,6 +314,8 @@ check_icmp_config_wrapper process_arguments(int argc, char **argv) { | |||
298 | } | 314 | } |
299 | } | 315 | } |
300 | 316 | ||
317 | sa_family_t enforced_ai_family = AF_UNSPEC; | ||
318 | |||
301 | // Parse protocol arguments first | 319 | // Parse protocol arguments first |
302 | // and count hosts here | 320 | // and count hosts here |
303 | char *opts_str = "vhVw:c:n:p:t:H:s:i:b:I:l:m:P:R:J:S:M:O64"; | 321 | char *opts_str = "vhVw:c:n:p:t:H:s:i:b:I:l:m:P:R:J:S:M:O64"; |
@@ -306,16 +324,16 @@ check_icmp_config_wrapper process_arguments(int argc, char **argv) { | |||
306 | while ((arg = getopt(argc, argv, opts_str)) != EOF) { | 324 | while ((arg = getopt(argc, argv, opts_str)) != EOF) { |
307 | switch (arg) { | 325 | switch (arg) { |
308 | case '4': | 326 | case '4': |
309 | if (address_family != -1) { | 327 | if (enforced_ai_family != AF_UNSPEC) { |
310 | crash("Multiple protocol versions not supported"); | 328 | crash("Multiple protocol versions not supported"); |
311 | } | 329 | } |
312 | address_family = AF_INET; | 330 | enforced_ai_family = AF_INET; |
313 | break; | 331 | break; |
314 | case '6': | 332 | case '6': |
315 | if (address_family != -1) { | 333 | if (enforced_ai_family != AF_UNSPEC) { |
316 | crash("Multiple protocol versions not supported"); | 334 | crash("Multiple protocol versions not supported"); |
317 | } | 335 | } |
318 | address_family = AF_INET6; | 336 | enforced_ai_family = AF_INET6; |
319 | break; | 337 | break; |
320 | case 'H': { | 338 | case 'H': { |
321 | result.config.number_of_hosts++; | 339 | result.config.number_of_hosts++; |
@@ -402,7 +420,8 @@ check_icmp_config_wrapper process_arguments(int argc, char **argv) { | |||
402 | // TODO die here and complain about wrong input | 420 | // TODO die here and complain about wrong input |
403 | break; | 421 | break; |
404 | case 'H': { | 422 | case 'H': { |
405 | add_host_wrapper host_add_result = add_host(optarg, result.config.mode); | 423 | add_host_wrapper host_add_result = |
424 | add_host(optarg, result.config.mode, enforced_ai_family); | ||
406 | if (host_add_result.error_code == OK) { | 425 | if (host_add_result.error_code == OK) { |
407 | result.config.hosts[host_counter] = host_add_result.host; | 426 | result.config.hosts[host_counter] = host_add_result.host; |
408 | host_counter++; | 427 | host_counter++; |
@@ -414,6 +433,13 @@ check_icmp_config_wrapper process_arguments(int argc, char **argv) { | |||
414 | result.config.targets = host_add_result.host.target_list; | 433 | result.config.targets = host_add_result.host.target_list; |
415 | result.config.number_of_targets += host_add_result.host.number_of_targets; | 434 | result.config.number_of_targets += host_add_result.host.number_of_targets; |
416 | } | 435 | } |
436 | |||
437 | if (host_add_result.has_v4) { | ||
438 | result.config.need_v4 = true; | ||
439 | } | ||
440 | if (host_add_result.has_v6) { | ||
441 | result.config.need_v6 = true; | ||
442 | } | ||
417 | } else { | 443 | } else { |
418 | // TODO adding host failed, crash here | 444 | // TODO adding host failed, crash here |
419 | } | 445 | } |
@@ -502,7 +528,7 @@ check_icmp_config_wrapper process_arguments(int argc, char **argv) { | |||
502 | 528 | ||
503 | argv = &argv[optind]; | 529 | argv = &argv[optind]; |
504 | while (*argv) { | 530 | while (*argv) { |
505 | add_target(*argv, result.config.mode); | 531 | add_target(*argv, result.config.mode, enforced_ai_family); |
506 | argv++; | 532 | argv++; |
507 | } | 533 | } |
508 | 534 | ||
@@ -704,9 +730,8 @@ static int handle_random_icmp(unsigned char *packet, struct sockaddr_storage *ad | |||
704 | if (debug) { | 730 | if (debug) { |
705 | char address[INET6_ADDRSTRLEN]; | 731 | char address[INET6_ADDRSTRLEN]; |
706 | parse_address(addr, address, sizeof(address)); | 732 | parse_address(addr, address, sizeof(address)); |
707 | printf("Received \"%s\" from %s for ICMP ECHO sent to %s.\n", | 733 | printf("Received \"%s\" from %s for ICMP ECHO sent.\n", |
708 | get_icmp_error_msg(icmp_packet.icmp_type, icmp_packet.icmp_code), address, | 734 | get_icmp_error_msg(icmp_packet.icmp_type, icmp_packet.icmp_code), address); |
709 | host->name); | ||
710 | } | 735 | } |
711 | 736 | ||
712 | program_state->icmp_lost++; | 737 | program_state->icmp_lost++; |
@@ -732,14 +757,16 @@ static int handle_random_icmp(unsigned char *packet, struct sockaddr_storage *ad | |||
732 | return 0; | 757 | return 0; |
733 | } | 758 | } |
734 | 759 | ||
735 | void parse_address(struct sockaddr_storage *addr, char *address, socklen_t size) { | 760 | void parse_address(const struct sockaddr_storage *addr, char *dst, socklen_t size) { |
736 | switch (address_family) { | 761 | switch (addr->ss_family) { |
737 | case AF_INET: | 762 | case AF_INET: |
738 | inet_ntop(address_family, &((struct sockaddr_in *)addr)->sin_addr, address, size); | 763 | inet_ntop(AF_INET, &((struct sockaddr_in *)addr)->sin_addr, dst, size); |
739 | break; | 764 | break; |
740 | case AF_INET6: | 765 | case AF_INET6: |
741 | inet_ntop(address_family, &((struct sockaddr_in6 *)addr)->sin6_addr, address, size); | 766 | inet_ntop(AF_INET6, &((struct sockaddr_in6 *)addr)->sin6_addr, dst, size); |
742 | break; | 767 | break; |
768 | default: | ||
769 | assert(false); | ||
743 | } | 770 | } |
744 | } | 771 | } |
745 | 772 | ||
@@ -748,9 +775,6 @@ int main(int argc, char **argv) { | |||
748 | bindtextdomain(PACKAGE, LOCALEDIR); | 775 | bindtextdomain(PACKAGE, LOCALEDIR); |
749 | textdomain(PACKAGE); | 776 | textdomain(PACKAGE); |
750 | 777 | ||
751 | address_family = -1; | ||
752 | int icmp_proto = IPPROTO_ICMP; | ||
753 | |||
754 | /* POSIXLY_CORRECT might break things, so unset it (the portable way) */ | 778 | /* POSIXLY_CORRECT might break things, so unset it (the portable way) */ |
755 | environ = NULL; | 779 | environ = NULL; |
756 | 780 | ||
@@ -765,35 +789,68 @@ int main(int argc, char **argv) { | |||
765 | 789 | ||
766 | const check_icmp_config config = tmp_config.config; | 790 | const check_icmp_config config = tmp_config.config; |
767 | 791 | ||
792 | // int icmp_proto = IPPROTO_ICMP; | ||
768 | // add_target might change address_family | 793 | // add_target might change address_family |
769 | switch (address_family) { | 794 | // switch (address_family) { |
770 | case AF_INET: | 795 | // case AF_INET: |
771 | icmp_proto = IPPROTO_ICMP; | 796 | // icmp_proto = IPPROTO_ICMP; |
772 | break; | 797 | // break; |
773 | case AF_INET6: | 798 | // case AF_INET6: |
774 | icmp_proto = IPPROTO_ICMPV6; | 799 | // icmp_proto = IPPROTO_ICMPV6; |
775 | break; | 800 | // break; |
776 | default: | 801 | // default: |
777 | crash("Address family not supported"); | 802 | // crash("Address family not supported"); |
778 | } | 803 | // } |
804 | |||
805 | check_icmp_socket_set sockset = { | ||
806 | .socket4 = -1, | ||
807 | .socket6 = -1, | ||
808 | }; | ||
779 | 809 | ||
780 | int icmp_sock = socket(address_family, SOCK_RAW, icmp_proto); | 810 | if (config.need_v4) { |
781 | if (icmp_sock == -1) { | 811 | sockset.socket4 = socket(AF_INET, SOCK_RAW, IPPROTO_ICMP); |
782 | crash("Failed to obtain ICMP socket"); | 812 | if (sockset.socket4 == -1) { |
783 | } | 813 | crash("Failed to obtain ICMP v4 socket"); |
814 | } | ||
784 | 815 | ||
785 | if (config.source_ip) { | 816 | if (config.source_ip) { |
786 | set_source_ip(config.source_ip, icmp_sock); | 817 | |
787 | } | 818 | struct in_addr tmp = {}; |
819 | int error_code = inet_pton(AF_INET, config.source_ip, &tmp); | ||
820 | if (error_code == 1) { | ||
821 | set_source_ip(config.source_ip, sockset.socket4, AF_INET); | ||
822 | } else { | ||
823 | // just try this mindlessly if it's not a v4 address | ||
824 | set_source_ip(config.source_ip, sockset.socket6, AF_INET6); | ||
825 | } | ||
826 | } | ||
788 | 827 | ||
789 | #ifdef SO_TIMESTAMP | 828 | #ifdef SO_TIMESTAMP |
790 | int on = 1; | 829 | if (sockset.socket4 != -1) { |
791 | if (setsockopt(icmp_sock, SOL_SOCKET, SO_TIMESTAMP, &on, sizeof(on))) { | 830 | int on = 1; |
792 | if (debug) { | 831 | if (setsockopt(sockset.socket4, SOL_SOCKET, SO_TIMESTAMP, &on, sizeof(on))) { |
793 | printf("Warning: no SO_TIMESTAMP support\n"); | 832 | if (debug) { |
833 | printf("Warning: no SO_TIMESTAMP support\n"); | ||
834 | } | ||
835 | } | ||
836 | } | ||
837 | if (sockset.socket6 != -1) { | ||
838 | int on = 1; | ||
839 | if (setsockopt(sockset.socket6, SOL_SOCKET, SO_TIMESTAMP, &on, sizeof(on))) { | ||
840 | if (debug) { | ||
841 | printf("Warning: no SO_TIMESTAMP support\n"); | ||
842 | } | ||
843 | } | ||
794 | } | 844 | } |
795 | } | ||
796 | #endif // SO_TIMESTAMP | 845 | #endif // SO_TIMESTAMP |
846 | } | ||
847 | |||
848 | if (config.need_v6) { | ||
849 | sockset.socket6 = socket(AF_INET6, SOCK_RAW, IPPROTO_ICMPV6); | ||
850 | if (sockset.socket6 == -1) { | ||
851 | crash("Failed to obtain ICMP v6 socket"); | ||
852 | } | ||
853 | } | ||
797 | 854 | ||
798 | /* now drop privileges (no effect if not setsuid or geteuid() == 0) */ | 855 | /* now drop privileges (no effect if not setsuid or geteuid() == 0) */ |
799 | if (setuid(getuid()) == -1) { | 856 | if (setuid(getuid()) == -1) { |
@@ -801,8 +858,19 @@ int main(int argc, char **argv) { | |||
801 | return 1; | 858 | return 1; |
802 | } | 859 | } |
803 | 860 | ||
804 | if (icmp_sock) { | 861 | if (sockset.socket4) { |
805 | int result = setsockopt(icmp_sock, SOL_IP, IP_TTL, &config.ttl, sizeof(config.ttl)); | 862 | int result = setsockopt(sockset.socket4, SOL_IP, IP_TTL, &config.ttl, sizeof(config.ttl)); |
863 | if (debug) { | ||
864 | if (result == -1) { | ||
865 | printf("setsockopt failed\n"); | ||
866 | } else { | ||
867 | printf("ttl set to %lu\n", config.ttl); | ||
868 | } | ||
869 | } | ||
870 | } | ||
871 | |||
872 | if (sockset.socket6) { | ||
873 | int result = setsockopt(sockset.socket6, SOL_IP, IP_TTL, &config.ttl, sizeof(config.ttl)); | ||
806 | if (debug) { | 874 | if (debug) { |
807 | if (result == -1) { | 875 | if (result == -1) { |
808 | printf("setsockopt failed\n"); | 876 | printf("setsockopt failed\n"); |
@@ -888,15 +956,22 @@ int main(int argc, char **argv) { | |||
888 | 956 | ||
889 | run_checks(config.icmp_data_size, &pkt_interval, &target_interval, config.sender_id, | 957 | run_checks(config.icmp_data_size, &pkt_interval, &target_interval, config.sender_id, |
890 | config.mode, max_completion_time, prog_start, table, config.number_of_packets, | 958 | config.mode, max_completion_time, prog_start, table, config.number_of_packets, |
891 | icmp_sock, config.number_of_targets, &program_state); | 959 | sockset, config.number_of_targets, &program_state); |
892 | 960 | ||
893 | errno = 0; | 961 | errno = 0; |
894 | 962 | ||
895 | mp_check overall = mp_check_init(); | 963 | mp_check overall = mp_check_init(); |
896 | finish(0, config.modes, config.min_hosts_alive, config.warn, config.crit, icmp_sock, | 964 | finish(0, config.modes, config.min_hosts_alive, config.warn, config.crit, |
897 | config.number_of_targets, &program_state, config.hosts, config.number_of_hosts, | 965 | config.number_of_targets, &program_state, config.hosts, config.number_of_hosts, |
898 | &overall); | 966 | &overall); |
899 | 967 | ||
968 | if (sockset.socket4) { | ||
969 | close(sockset.socket4); | ||
970 | } | ||
971 | if (sockset.socket6) { | ||
972 | close(sockset.socket6); | ||
973 | } | ||
974 | |||
900 | mp_exit(overall); | 975 | mp_exit(overall); |
901 | } | 976 | } |
902 | 977 | ||
@@ -904,7 +979,7 @@ static void run_checks(unsigned short icmp_pkt_size, unsigned int *pkt_interval, | |||
904 | unsigned int *target_interval, const uint16_t sender_id, | 979 | unsigned int *target_interval, const uint16_t sender_id, |
905 | const check_icmp_execution_mode mode, const unsigned int max_completion_time, | 980 | const check_icmp_execution_mode mode, const unsigned int max_completion_time, |
906 | const struct timeval prog_start, ping_target **table, | 981 | const struct timeval prog_start, ping_target **table, |
907 | const unsigned short packets, const int icmp_sock, | 982 | const unsigned short packets, const check_icmp_socket_set sockset, |
908 | const unsigned short number_of_targets, check_icmp_state *program_state) { | 983 | const unsigned short number_of_targets, check_icmp_state *program_state) { |
909 | /* this loop might actually violate the pkt_interval or target_interval | 984 | /* this loop might actually violate the pkt_interval or target_interval |
910 | * settings, but only if there aren't any packets on the wire which | 985 | * settings, but only if there aren't any packets on the wire which |
@@ -917,20 +992,23 @@ static void run_checks(unsigned short icmp_pkt_size, unsigned int *pkt_interval, | |||
917 | } | 992 | } |
918 | if (table[target_index]->flags & FLAG_LOST_CAUSE) { | 993 | if (table[target_index]->flags & FLAG_LOST_CAUSE) { |
919 | if (debug) { | 994 | if (debug) { |
920 | printf("%s is a lost cause. not sending any more\n", table[target_index]->name); | 995 | |
996 | char address[INET6_ADDRSTRLEN]; | ||
997 | parse_address(&table[target_index]->address, address, sizeof(address)); | ||
998 | printf("%s is a lost cause. not sending any more\n", address); | ||
921 | } | 999 | } |
922 | continue; | 1000 | continue; |
923 | } | 1001 | } |
924 | 1002 | ||
925 | /* we're still in the game, so send next packet */ | 1003 | /* we're still in the game, so send next packet */ |
926 | (void)send_icmp_ping(icmp_sock, table[target_index], icmp_pkt_size, sender_id, | 1004 | (void)send_icmp_ping(sockset, table[target_index], icmp_pkt_size, sender_id, |
927 | program_state); | 1005 | program_state); |
928 | 1006 | ||
929 | /* wrap up if all targets are declared dead */ | 1007 | /* wrap up if all targets are declared dead */ |
930 | if (targets_alive(number_of_targets, program_state->targets_down) || | 1008 | if (targets_alive(number_of_targets, program_state->targets_down) || |
931 | get_timevaldiff(prog_start, prog_start) < max_completion_time || | 1009 | get_timevaldiff(prog_start, prog_start) < max_completion_time || |
932 | !(mode == MODE_HOSTCHECK && program_state->targets_down)) { | 1010 | !(mode == MODE_HOSTCHECK && program_state->targets_down)) { |
933 | wait_for_reply(icmp_sock, *target_interval, icmp_pkt_size, pkt_interval, | 1011 | wait_for_reply(sockset, *target_interval, icmp_pkt_size, pkt_interval, |
934 | target_interval, sender_id, table, packets, number_of_targets, | 1012 | target_interval, sender_id, table, packets, number_of_targets, |
935 | program_state); | 1013 | program_state); |
936 | } | 1014 | } |
@@ -938,9 +1016,9 @@ static void run_checks(unsigned short icmp_pkt_size, unsigned int *pkt_interval, | |||
938 | if (targets_alive(number_of_targets, program_state->targets_down) || | 1016 | if (targets_alive(number_of_targets, program_state->targets_down) || |
939 | get_timevaldiff_to_now(prog_start) < max_completion_time || | 1017 | get_timevaldiff_to_now(prog_start) < max_completion_time || |
940 | !(mode == MODE_HOSTCHECK && program_state->targets_down)) { | 1018 | !(mode == MODE_HOSTCHECK && program_state->targets_down)) { |
941 | wait_for_reply(icmp_sock, *pkt_interval * number_of_targets, icmp_pkt_size, | 1019 | wait_for_reply(sockset, *pkt_interval * number_of_targets, icmp_pkt_size, pkt_interval, |
942 | pkt_interval, target_interval, sender_id, table, packets, | 1020 | target_interval, sender_id, table, packets, number_of_targets, |
943 | number_of_targets, program_state); | 1021 | program_state); |
944 | } | 1022 | } |
945 | } | 1023 | } |
946 | 1024 | ||
@@ -970,7 +1048,7 @@ static void run_checks(unsigned short icmp_pkt_size, unsigned int *pkt_interval, | |||
970 | if (targets_alive(number_of_targets, program_state->targets_down) || | 1048 | if (targets_alive(number_of_targets, program_state->targets_down) || |
971 | get_timevaldiff_to_now(prog_start) < max_completion_time || | 1049 | get_timevaldiff_to_now(prog_start) < max_completion_time || |
972 | !(mode == MODE_HOSTCHECK && program_state->targets_down)) { | 1050 | !(mode == MODE_HOSTCHECK && program_state->targets_down)) { |
973 | wait_for_reply(icmp_sock, final_wait, icmp_pkt_size, pkt_interval, target_interval, | 1051 | wait_for_reply(sockset, final_wait, icmp_pkt_size, pkt_interval, target_interval, |
974 | sender_id, table, packets, number_of_targets, program_state); | 1052 | sender_id, table, packets, number_of_targets, program_state); |
975 | } | 1053 | } |
976 | } | 1054 | } |
@@ -986,10 +1064,11 @@ static void run_checks(unsigned short icmp_pkt_size, unsigned int *pkt_interval, | |||
986 | * both: | 1064 | * both: |
987 | * icmp echo reply : the rest | 1065 | * icmp echo reply : the rest |
988 | */ | 1066 | */ |
989 | static int wait_for_reply(int sock, const time_t time_interval, unsigned short icmp_pkt_size, | 1067 | static int wait_for_reply(check_icmp_socket_set sockset, const time_t time_interval, |
990 | unsigned int *pkt_interval, unsigned int *target_interval, | 1068 | unsigned short icmp_pkt_size, unsigned int *pkt_interval, |
991 | uint16_t sender_id, ping_target **table, const unsigned short packets, | 1069 | unsigned int *target_interval, uint16_t sender_id, ping_target **table, |
992 | const unsigned short number_of_targets, check_icmp_state *program_state) { | 1070 | const unsigned short packets, const unsigned short number_of_targets, |
1071 | check_icmp_state *program_state) { | ||
993 | union icmp_packet packet; | 1072 | union icmp_packet packet; |
994 | if (!(packet.buf = malloc(icmp_pkt_size))) { | 1073 | if (!(packet.buf = malloc(icmp_pkt_size))) { |
995 | crash("send_icmp_ping(): failed to malloc %d bytes for send buffer", icmp_pkt_size); | 1074 | crash("send_icmp_ping(): failed to malloc %d bytes for send buffer", icmp_pkt_size); |
@@ -1022,25 +1101,25 @@ static int wait_for_reply(int sock, const time_t time_interval, unsigned short i | |||
1022 | time_t loop_time_interval = per_pkt_wait; | 1101 | time_t loop_time_interval = per_pkt_wait; |
1023 | 1102 | ||
1024 | /* reap responses until we hit a timeout */ | 1103 | /* reap responses until we hit a timeout */ |
1025 | ssize_t n = recvfrom_wto(sock, buf, sizeof(buf), (struct sockaddr *)&resp_addr, | 1104 | recvfrom_wto_wrapper recv_foo = |
1026 | &loop_time_interval, &packet_received_timestamp); | 1105 | recvfrom_wto(sockset, buf, sizeof(buf), (struct sockaddr *)&resp_addr, |
1027 | if (!n) { | 1106 | &loop_time_interval, &packet_received_timestamp); |
1107 | if (!recv_foo.received) { | ||
1028 | if (debug > 1) { | 1108 | if (debug > 1) { |
1029 | printf("recvfrom_wto() timed out during a %ld usecs wait\n", per_pkt_wait); | 1109 | printf("recvfrom_wto() timed out during a %ld usecs wait\n", per_pkt_wait); |
1030 | } | 1110 | } |
1031 | continue; /* timeout for this one, so keep trying */ | 1111 | continue; /* timeout for this one, so keep trying */ |
1032 | } | 1112 | } |
1033 | 1113 | ||
1034 | if (n < 0) { | 1114 | if (recv_foo.received < 0) { |
1035 | if (debug) { | 1115 | if (debug) { |
1036 | printf("recvfrom_wto() returned errors\n"); | 1116 | printf("recvfrom_wto() returned errors\n"); |
1037 | } | 1117 | } |
1038 | free(packet.buf); | 1118 | free(packet.buf); |
1039 | return (int)n; | 1119 | return (int)recv_foo.received; |
1040 | } | 1120 | } |
1041 | 1121 | ||
1042 | // FIXME: with ipv6 we don't have an ip header here | 1122 | if (recv_foo.recv_proto != AF_INET6) { |
1043 | if (address_family != AF_INET6) { | ||
1044 | ip_header = (union ip_hdr *)buf; | 1123 | ip_header = (union ip_hdr *)buf; |
1045 | 1124 | ||
1046 | if (debug > 1) { | 1125 | if (debug > 1) { |
@@ -1053,38 +1132,21 @@ static int wait_for_reply(int sock, const time_t time_interval, unsigned short i | |||
1053 | } | 1132 | } |
1054 | } | 1133 | } |
1055 | 1134 | ||
1056 | /* obsolete. alpha on tru64 provides the necessary defines, but isn't broken */ | 1135 | int hlen = (recv_foo.recv_proto == AF_INET6) ? 0 : ip_header->ip.ip_hl << 2; |
1057 | /* #if defined( __alpha__ ) && __STDC__ && !defined( __GLIBC__ ) */ | 1136 | |
1058 | /* alpha headers are decidedly broken. Using an ansi compiler, | 1137 | if (recv_foo.received < (hlen + ICMP_MINLEN)) { |
1059 | * they provide ip_vhl instead of ip_hl and ip_v, so we mask | ||
1060 | * off the bottom 4 bits */ | ||
1061 | /* hlen = (ip->ip_vhl & 0x0f) << 2; */ | ||
1062 | /* #else */ | ||
1063 | int hlen = (address_family == AF_INET6) ? 0 : ip_header->ip.ip_hl << 2; | ||
1064 | /* #endif */ | ||
1065 | |||
1066 | if (n < (hlen + ICMP_MINLEN)) { | ||
1067 | char address[INET6_ADDRSTRLEN]; | 1138 | char address[INET6_ADDRSTRLEN]; |
1068 | parse_address(&resp_addr, address, sizeof(address)); | 1139 | parse_address(&resp_addr, address, sizeof(address)); |
1069 | crash("received packet too short for ICMP (%d bytes, expected %d) from %s\n", n, | 1140 | crash("received packet too short for ICMP (%d bytes, expected %d) from %s\n", |
1070 | hlen + icmp_pkt_size, address); | 1141 | recv_foo.received, hlen + icmp_pkt_size, address); |
1071 | } | 1142 | } |
1072 | /* else if(debug) { */ | ||
1073 | /* printf("ip header size: %u, packet size: %u (expected %u, %u)\n", */ | ||
1074 | /* hlen, ntohs(ip->ip_len) - hlen, */ | ||
1075 | /* sizeof(struct ip), icmp_pkt_size); */ | ||
1076 | /* } */ | ||
1077 | |||
1078 | /* check the response */ | 1143 | /* check the response */ |
1079 | |||
1080 | memcpy(packet.buf, buf + hlen, icmp_pkt_size); | 1144 | memcpy(packet.buf, buf + hlen, icmp_pkt_size); |
1081 | /* address_family == AF_INET6 ? sizeof(struct icmp6_hdr) | ||
1082 | : sizeof(struct icmp));*/ | ||
1083 | 1145 | ||
1084 | if ((address_family == PF_INET && | 1146 | if ((recv_foo.recv_proto == AF_INET && |
1085 | (ntohs(packet.icp->icmp_id) != sender_id || packet.icp->icmp_type != ICMP_ECHOREPLY || | 1147 | (ntohs(packet.icp->icmp_id) != sender_id || packet.icp->icmp_type != ICMP_ECHOREPLY || |
1086 | ntohs(packet.icp->icmp_seq) >= number_of_targets * packets)) || | 1148 | ntohs(packet.icp->icmp_seq) >= number_of_targets * packets)) || |
1087 | (address_family == PF_INET6 && | 1149 | (recv_foo.recv_proto == AF_INET6 && |
1088 | (ntohs(packet.icp6->icmp6_id) != sender_id || | 1150 | (ntohs(packet.icp6->icmp6_id) != sender_id || |
1089 | packet.icp6->icmp6_type != ICMP6_ECHO_REPLY || | 1151 | packet.icp6->icmp6_type != ICMP6_ECHO_REPLY || |
1090 | ntohs(packet.icp6->icmp6_seq) >= number_of_targets * packets))) { | 1152 | ntohs(packet.icp6->icmp6_seq) >= number_of_targets * packets))) { |
@@ -1101,7 +1163,7 @@ static int wait_for_reply(int sock, const time_t time_interval, unsigned short i | |||
1101 | /* this is indeed a valid response */ | 1163 | /* this is indeed a valid response */ |
1102 | ping_target *target; | 1164 | ping_target *target; |
1103 | struct icmp_ping_data data; | 1165 | struct icmp_ping_data data; |
1104 | if (address_family == PF_INET) { | 1166 | if (address_family == AF_INET) { |
1105 | memcpy(&data, packet.icp->icmp_data, sizeof(data)); | 1167 | memcpy(&data, packet.icp->icmp_data, sizeof(data)); |
1106 | if (debug > 2) { | 1168 | if (debug > 2) { |
1107 | printf("ICMP echo-reply of len %lu, id %u, seq %u, cksum 0x%X\n", sizeof(data), | 1169 | printf("ICMP echo-reply of len %lu, id %u, seq %u, cksum 0x%X\n", sizeof(data), |
@@ -1171,7 +1233,7 @@ static int wait_for_reply(int sock, const time_t time_interval, unsigned short i | |||
1171 | char address[INET6_ADDRSTRLEN]; | 1233 | char address[INET6_ADDRSTRLEN]; |
1172 | parse_address(&resp_addr, address, sizeof(address)); | 1234 | parse_address(&resp_addr, address, sizeof(address)); |
1173 | 1235 | ||
1174 | switch (address_family) { | 1236 | switch (recv_foo.recv_proto) { |
1175 | case AF_INET: { | 1237 | case AF_INET: { |
1176 | printf("%0.3f ms rtt from %s, incoming ttl: %u, max: %0.3f, min: %0.3f\n", | 1238 | printf("%0.3f ms rtt from %s, incoming ttl: %u, max: %0.3f, min: %0.3f\n", |
1177 | (float)tdiff / 1000, address, ip_header->ip.ip_ttl, | 1239 | (float)tdiff / 1000, address, ip_header->ip.ip_ttl, |
@@ -1191,23 +1253,14 @@ static int wait_for_reply(int sock, const time_t time_interval, unsigned short i | |||
1191 | } | 1253 | } |
1192 | 1254 | ||
1193 | /* the ping functions */ | 1255 | /* the ping functions */ |
1194 | static int send_icmp_ping(const int sock, ping_target *host, const unsigned short icmp_pkt_size, | 1256 | static int send_icmp_ping(const check_icmp_socket_set sockset, ping_target *host, |
1195 | const uint16_t sender_id, check_icmp_state *program_state) { | 1257 | const unsigned short icmp_pkt_size, const uint16_t sender_id, |
1196 | if (sock == -1) { | 1258 | check_icmp_state *program_state) { |
1197 | errno = 0; | 1259 | void *buf = calloc(1, icmp_pkt_size); |
1198 | crash("Attempt to send on bogus socket"); | ||
1199 | return -1; | ||
1200 | } | ||
1201 | |||
1202 | void *buf = NULL; | ||
1203 | |||
1204 | if (!buf) { | 1260 | if (!buf) { |
1205 | if (!(buf = malloc(icmp_pkt_size))) { | 1261 | crash("send_icmp_ping(): failed to malloc %d bytes for send buffer", icmp_pkt_size); |
1206 | crash("send_icmp_ping(): failed to malloc %d bytes for send buffer", icmp_pkt_size); | 1262 | return -1; /* might be reached if we're in debug mode */ |
1207 | return -1; /* might be reached if we're in debug mode */ | ||
1208 | } | ||
1209 | } | 1263 | } |
1210 | memset(buf, 0, icmp_pkt_size); | ||
1211 | 1264 | ||
1212 | struct timeval current_time; | 1265 | struct timeval current_time; |
1213 | if ((gettimeofday(¤t_time, NULL)) == -1) { | 1266 | if ((gettimeofday(¤t_time, NULL)) == -1) { |
@@ -1221,7 +1274,7 @@ static int send_icmp_ping(const int sock, ping_target *host, const unsigned shor | |||
1221 | 1274 | ||
1222 | socklen_t addrlen; | 1275 | socklen_t addrlen; |
1223 | 1276 | ||
1224 | if (address_family == AF_INET) { | 1277 | if (host->address.ss_family == AF_INET) { |
1225 | struct icmp *icp = (struct icmp *)buf; | 1278 | struct icmp *icp = (struct icmp *)buf; |
1226 | addrlen = sizeof(struct sockaddr_in); | 1279 | addrlen = sizeof(struct sockaddr_in); |
1227 | 1280 | ||
@@ -1235,11 +1288,14 @@ static int send_icmp_ping(const int sock, ping_target *host, const unsigned shor | |||
1235 | icp->icmp_cksum = icmp_checksum((uint16_t *)buf, (size_t)icmp_pkt_size); | 1288 | icp->icmp_cksum = icmp_checksum((uint16_t *)buf, (size_t)icmp_pkt_size); |
1236 | 1289 | ||
1237 | if (debug > 2) { | 1290 | if (debug > 2) { |
1291 | char address[INET6_ADDRSTRLEN]; | ||
1292 | parse_address((&host->address), address, sizeof(address)); | ||
1293 | |||
1238 | printf("Sending ICMP echo-request of len %lu, id %u, seq %u, cksum 0x%X to host %s\n", | 1294 | printf("Sending ICMP echo-request of len %lu, id %u, seq %u, cksum 0x%X to host %s\n", |
1239 | sizeof(data), ntohs(icp->icmp_id), ntohs(icp->icmp_seq), icp->icmp_cksum, | 1295 | sizeof(data), ntohs(icp->icmp_id), ntohs(icp->icmp_seq), icp->icmp_cksum, |
1240 | host->name); | 1296 | address); |
1241 | } | 1297 | } |
1242 | } else { | 1298 | } else if (host->address.ss_family == AF_INET6) { |
1243 | struct icmp6_hdr *icp6 = (struct icmp6_hdr *)buf; | 1299 | struct icmp6_hdr *icp6 = (struct icmp6_hdr *)buf; |
1244 | addrlen = sizeof(struct sockaddr_in6); | 1300 | addrlen = sizeof(struct sockaddr_in6); |
1245 | 1301 | ||
@@ -1253,10 +1309,16 @@ static int send_icmp_ping(const int sock, ping_target *host, const unsigned shor | |||
1253 | // let checksum be calculated automatically | 1309 | // let checksum be calculated automatically |
1254 | 1310 | ||
1255 | if (debug > 2) { | 1311 | if (debug > 2) { |
1256 | printf("Sending ICMP echo-request of len %lu, id %u, seq %u, cksum 0x%X to host %s\n", | 1312 | char address[INET6_ADDRSTRLEN]; |
1313 | parse_address((&host->address), address, sizeof(address)); | ||
1314 | |||
1315 | printf("Sending ICMP echo-request of len %lu, id %u, seq %u, cksum 0x%X to target %s\n", | ||
1257 | sizeof(data), ntohs(icp6->icmp6_id), ntohs(icp6->icmp6_seq), icp6->icmp6_cksum, | 1316 | sizeof(data), ntohs(icp6->icmp6_id), ntohs(icp6->icmp6_seq), icp6->icmp6_cksum, |
1258 | host->name); | 1317 | address); |
1259 | } | 1318 | } |
1319 | } else { | ||
1320 | // unknown address family | ||
1321 | crash("unknown address family in ", __func__); | ||
1260 | } | 1322 | } |
1261 | 1323 | ||
1262 | struct iovec iov; | 1324 | struct iovec iov; |
@@ -1266,7 +1328,7 @@ static int send_icmp_ping(const int sock, ping_target *host, const unsigned shor | |||
1266 | 1328 | ||
1267 | struct msghdr hdr; | 1329 | struct msghdr hdr; |
1268 | memset(&hdr, 0, sizeof(hdr)); | 1330 | memset(&hdr, 0, sizeof(hdr)); |
1269 | hdr.msg_name = (struct sockaddr *)&host->saddr_in; | 1331 | hdr.msg_name = (struct sockaddr *)&host->address; |
1270 | hdr.msg_namelen = addrlen; | 1332 | hdr.msg_namelen = addrlen; |
1271 | hdr.msg_iov = &iov; | 1333 | hdr.msg_iov = &iov; |
1272 | hdr.msg_iovlen = 1; | 1334 | hdr.msg_iovlen = 1; |
@@ -1274,19 +1336,29 @@ static int send_icmp_ping(const int sock, ping_target *host, const unsigned shor | |||
1274 | errno = 0; | 1336 | errno = 0; |
1275 | 1337 | ||
1276 | long int len; | 1338 | long int len; |
1277 | /* MSG_CONFIRM is a linux thing and only available on linux kernels >= 2.3.15, see send(2) */ | 1339 | /* MSG_CONFIRM is a linux thing and only available on linux kernels >= 2.3.15, see send(2) */ |
1340 | if (host->address.ss_family == AF_INET) { | ||
1278 | #ifdef MSG_CONFIRM | 1341 | #ifdef MSG_CONFIRM |
1279 | len = sendmsg(sock, &hdr, MSG_CONFIRM); | 1342 | len = sendmsg(sockset.socket4, &hdr, MSG_CONFIRM); |
1280 | #else | 1343 | #else |
1281 | len = sendmsg(sock, &hdr, 0); | 1344 | len = sendmsg(sockset.socket4, &hdr, 0); |
1282 | #endif | 1345 | #endif |
1346 | } else if (host->address.ss_family == AF_INET6) { | ||
1347 | #ifdef MSG_CONFIRM | ||
1348 | len = sendmsg(sockset.socket6, &hdr, MSG_CONFIRM); | ||
1349 | #else | ||
1350 | len = sendmsg(sockset.socket6, &hdr, 0); | ||
1351 | #endif | ||
1352 | } else { | ||
1353 | assert(false); | ||
1354 | } | ||
1283 | 1355 | ||
1284 | free(buf); | 1356 | free(buf); |
1285 | 1357 | ||
1286 | if (len < 0 || (unsigned int)len != icmp_pkt_size) { | 1358 | if (len < 0 || (unsigned int)len != icmp_pkt_size) { |
1287 | if (debug) { | 1359 | if (debug) { |
1288 | char address[INET6_ADDRSTRLEN]; | 1360 | char address[INET6_ADDRSTRLEN]; |
1289 | parse_address((&host->saddr_in), address, sizeof(address)); | 1361 | parse_address((&host->address), address, sizeof(address)); |
1290 | printf("Failed to send ping to %s: %s\n", address, strerror(errno)); | 1362 | printf("Failed to send ping to %s: %s\n", address, strerror(errno)); |
1291 | } | 1363 | } |
1292 | errno = 0; | 1364 | errno = 0; |
@@ -1299,9 +1371,9 @@ static int send_icmp_ping(const int sock, ping_target *host, const unsigned shor | |||
1299 | return 0; | 1371 | return 0; |
1300 | } | 1372 | } |
1301 | 1373 | ||
1302 | static ssize_t recvfrom_wto(const int sock, void *buf, const unsigned int len, | 1374 | static recvfrom_wto_wrapper recvfrom_wto(const check_icmp_socket_set sockset, void *buf, |
1303 | struct sockaddr *saddr, time_t *timeout, | 1375 | const unsigned int len, struct sockaddr *saddr, |
1304 | struct timeval *received_timestamp) { | 1376 | time_t *timeout, struct timeval *received_timestamp) { |
1305 | #ifdef HAVE_MSGHDR_MSG_CONTROL | 1377 | #ifdef HAVE_MSGHDR_MSG_CONTROL |
1306 | char ans_data[4096]; | 1378 | char ans_data[4096]; |
1307 | #endif // HAVE_MSGHDR_MSG_CONTROL | 1379 | #endif // HAVE_MSGHDR_MSG_CONTROL |
@@ -1309,11 +1381,16 @@ static ssize_t recvfrom_wto(const int sock, void *buf, const unsigned int len, | |||
1309 | struct cmsghdr *chdr; | 1381 | struct cmsghdr *chdr; |
1310 | #endif | 1382 | #endif |
1311 | 1383 | ||
1384 | recvfrom_wto_wrapper result = { | ||
1385 | .received = 0, | ||
1386 | .recv_proto = AF_UNSPEC, | ||
1387 | }; | ||
1388 | |||
1312 | if (!*timeout) { | 1389 | if (!*timeout) { |
1313 | if (debug) { | 1390 | if (debug) { |
1314 | printf("*timeout is not\n"); | 1391 | printf("*timeout is not\n"); |
1315 | } | 1392 | } |
1316 | return 0; | 1393 | return result; |
1317 | } | 1394 | } |
1318 | 1395 | ||
1319 | struct timeval real_timeout; | 1396 | struct timeval real_timeout; |
@@ -1327,13 +1404,21 @@ static ssize_t recvfrom_wto(const int sock, void *buf, const unsigned int len, | |||
1327 | // Read fds for select with the socket | 1404 | // Read fds for select with the socket |
1328 | fd_set read_fds; | 1405 | fd_set read_fds; |
1329 | FD_ZERO(&read_fds); | 1406 | FD_ZERO(&read_fds); |
1330 | FD_SET(sock, &read_fds); | 1407 | |
1408 | if (sockset.socket4 != -1) { | ||
1409 | FD_SET(sockset.socket4, &read_fds); | ||
1410 | } | ||
1411 | if (sockset.socket6 != -1) { | ||
1412 | FD_SET(sockset.socket6, &read_fds); | ||
1413 | } | ||
1414 | |||
1415 | int nfds = (sockset.socket4 > sockset.socket6 ? sockset.socket4 : sockset.socket6) + 1; | ||
1331 | 1416 | ||
1332 | struct timeval then; | 1417 | struct timeval then; |
1333 | gettimeofday(&then, NULL); | 1418 | gettimeofday(&then, NULL); |
1334 | 1419 | ||
1335 | errno = 0; | 1420 | errno = 0; |
1336 | int select_return = select(sock + 1, &read_fds, &dummy_write_fds, NULL, &real_timeout); | 1421 | int select_return = select(nfds, &read_fds, &dummy_write_fds, NULL, &real_timeout); |
1337 | if (select_return < 0) { | 1422 | if (select_return < 0) { |
1338 | crash("select() in recvfrom_wto"); | 1423 | crash("select() in recvfrom_wto"); |
1339 | } | 1424 | } |
@@ -1343,7 +1428,7 @@ static ssize_t recvfrom_wto(const int sock, void *buf, const unsigned int len, | |||
1343 | *timeout = get_timevaldiff(then, now); | 1428 | *timeout = get_timevaldiff(then, now); |
1344 | 1429 | ||
1345 | if (!select_return) { | 1430 | if (!select_return) { |
1346 | return 0; /* timeout */ | 1431 | return result; /* timeout */ |
1347 | } | 1432 | } |
1348 | 1433 | ||
1349 | unsigned int slen = sizeof(struct sockaddr_storage); | 1434 | unsigned int slen = sizeof(struct sockaddr_storage); |
@@ -1364,7 +1449,18 @@ static ssize_t recvfrom_wto(const int sock, void *buf, const unsigned int len, | |||
1364 | #endif | 1449 | #endif |
1365 | }; | 1450 | }; |
1366 | 1451 | ||
1367 | ssize_t ret = recvmsg(sock, &hdr, 0); | 1452 | ssize_t ret; |
1453 | if (FD_ISSET(sockset.socket4, &read_fds)) { | ||
1454 | ret = recvmsg(sockset.socket4, &hdr, 0); | ||
1455 | result.recv_proto = AF_INET; | ||
1456 | } else if (FD_ISSET(sockset.socket6, &read_fds)) { | ||
1457 | ret = recvmsg(sockset.socket6, &hdr, 0); | ||
1458 | result.recv_proto = AF_INET6; | ||
1459 | } else { | ||
1460 | assert(false); | ||
1461 | } | ||
1462 | |||
1463 | result.received = ret; | ||
1368 | 1464 | ||
1369 | #ifdef SO_TIMESTAMP | 1465 | #ifdef SO_TIMESTAMP |
1370 | for (chdr = CMSG_FIRSTHDR(&hdr); chdr; chdr = CMSG_NXTHDR(&hdr, chdr)) { | 1466 | for (chdr = CMSG_FIRSTHDR(&hdr); chdr; chdr = CMSG_NXTHDR(&hdr, chdr)) { |
@@ -1382,11 +1478,11 @@ static ssize_t recvfrom_wto(const int sock, void *buf, const unsigned int len, | |||
1382 | gettimeofday(tv, NULL); | 1478 | gettimeofday(tv, NULL); |
1383 | #endif // SO_TIMESTAMP | 1479 | #endif // SO_TIMESTAMP |
1384 | 1480 | ||
1385 | return (ret); | 1481 | return (result); |
1386 | } | 1482 | } |
1387 | 1483 | ||
1388 | static void finish(int sig, check_icmp_mode_switches modes, int min_hosts_alive, | 1484 | static void finish(int sig, check_icmp_mode_switches modes, int min_hosts_alive, |
1389 | check_icmp_threshold warn, check_icmp_threshold crit, const int icmp_sock, | 1485 | check_icmp_threshold warn, check_icmp_threshold crit, |
1390 | const unsigned short number_of_targets, check_icmp_state *program_state, | 1486 | const unsigned short number_of_targets, check_icmp_state *program_state, |
1391 | check_icmp_target_container host_list[], unsigned short number_of_hosts, | 1487 | check_icmp_target_container host_list[], unsigned short number_of_hosts, |
1392 | mp_check overall[static 1]) { | 1488 | mp_check overall[static 1]) { |
@@ -1397,10 +1493,6 @@ static void finish(int sig, check_icmp_mode_switches modes, int min_hosts_alive, | |||
1397 | printf("finish(%d) called\n", sig); | 1493 | printf("finish(%d) called\n", sig); |
1398 | } | 1494 | } |
1399 | 1495 | ||
1400 | if (icmp_sock != -1) { | ||
1401 | close(icmp_sock); | ||
1402 | } | ||
1403 | |||
1404 | if (debug) { | 1496 | if (debug) { |
1405 | printf("icmp_sent: %u icmp_recv: %u icmp_lost: %u\n", program_state->icmp_sent, | 1497 | printf("icmp_sent: %u icmp_recv: %u icmp_lost: %u\n", program_state->icmp_sent, |
1406 | program_state->icmp_recv, program_state->icmp_lost); | 1498 | program_state->icmp_recv, program_state->icmp_lost); |
@@ -1476,17 +1568,21 @@ static time_t get_timevaldiff_to_now(struct timeval earlier) { | |||
1476 | } | 1568 | } |
1477 | 1569 | ||
1478 | static add_target_ip_wrapper add_target_ip(struct sockaddr_storage address) { | 1570 | static add_target_ip_wrapper add_target_ip(struct sockaddr_storage address) { |
1571 | assert((address.ss_family == AF_INET) || (address.ss_family == AF_INET6)); | ||
1572 | |||
1479 | if (debug) { | 1573 | if (debug) { |
1480 | char straddr[INET6_ADDRSTRLEN]; | 1574 | char straddr[INET6_ADDRSTRLEN]; |
1481 | parse_address((struct sockaddr_storage *)&address, straddr, sizeof(straddr)); | 1575 | parse_address((&address), straddr, sizeof(straddr)); |
1482 | printf("add_target_ip called with: %s\n", straddr); | 1576 | printf("add_target_ip called with: %s\n", straddr); |
1483 | } | 1577 | } |
1484 | struct sockaddr_in *sin; | 1578 | struct sockaddr_in *sin; |
1485 | struct sockaddr_in6 *sin6; | 1579 | struct sockaddr_in6 *sin6; |
1486 | if (address_family == AF_INET) { | 1580 | if (address.ss_family == AF_INET) { |
1487 | sin = (struct sockaddr_in *)&address; | 1581 | sin = (struct sockaddr_in *)&address; |
1488 | } else { | 1582 | } else if (address.ss_family == AF_INET6) { |
1489 | sin6 = (struct sockaddr_in6 *)&address; | 1583 | sin6 = (struct sockaddr_in6 *)&address; |
1584 | } else { | ||
1585 | assert(false); | ||
1490 | } | 1586 | } |
1491 | 1587 | ||
1492 | add_target_ip_wrapper result = { | 1588 | add_target_ip_wrapper result = { |
@@ -1496,9 +1592,9 @@ static add_target_ip_wrapper add_target_ip(struct sockaddr_storage address) { | |||
1496 | 1592 | ||
1497 | /* disregard obviously stupid addresses | 1593 | /* disregard obviously stupid addresses |
1498 | * (I didn't find an ipv6 equivalent to INADDR_NONE) */ | 1594 | * (I didn't find an ipv6 equivalent to INADDR_NONE) */ |
1499 | if (((address_family == AF_INET && | 1595 | if (((address.ss_family == AF_INET && |
1500 | (sin->sin_addr.s_addr == INADDR_NONE || sin->sin_addr.s_addr == INADDR_ANY))) || | 1596 | (sin->sin_addr.s_addr == INADDR_NONE || sin->sin_addr.s_addr == INADDR_ANY))) || |
1501 | (address_family == AF_INET6 && (sin6->sin6_addr.s6_addr == in6addr_any.s6_addr))) { | 1597 | (address.ss_family == AF_INET6 && (sin6->sin6_addr.s6_addr == in6addr_any.s6_addr))) { |
1502 | result.error_code = ERROR; | 1598 | result.error_code = ERROR; |
1503 | return result; | 1599 | return result; |
1504 | } | 1600 | } |
@@ -1513,32 +1609,21 @@ static add_target_ip_wrapper add_target_ip(struct sockaddr_storage address) { | |||
1513 | crash("add_target_ip(%s): malloc(%lu) failed", straddr, sizeof(ping_target)); | 1609 | crash("add_target_ip(%s): malloc(%lu) failed", straddr, sizeof(ping_target)); |
1514 | } | 1610 | } |
1515 | 1611 | ||
1516 | *target = ping_target_init(); | 1612 | ping_target_create_wrapper target_wrapper = ping_target_create(address); |
1517 | 1613 | ||
1518 | /* set the values. use calling name for output */ | 1614 | if (target_wrapper.errorcode == OK) { |
1519 | target->name = strdup(straddr); | 1615 | *target = target_wrapper.host; |
1520 | 1616 | result.target = target; | |
1521 | /* fill out the sockaddr_storage struct */ | ||
1522 | struct sockaddr_in *host_sin; | ||
1523 | struct sockaddr_in6 *host_sin6; | ||
1524 | if (address_family == AF_INET) { | ||
1525 | host_sin = (struct sockaddr_in *)&target->saddr_in; | ||
1526 | host_sin->sin_family = AF_INET; | ||
1527 | host_sin->sin_addr.s_addr = sin->sin_addr.s_addr; | ||
1528 | } else { | 1617 | } else { |
1529 | host_sin6 = (struct sockaddr_in6 *)&target->saddr_in; | 1618 | result.error_code = target_wrapper.errorcode; |
1530 | host_sin6->sin6_family = AF_INET6; | ||
1531 | memcpy(host_sin6->sin6_addr.s6_addr, sin6->sin6_addr.s6_addr, | ||
1532 | sizeof host_sin6->sin6_addr.s6_addr); | ||
1533 | } | 1619 | } |
1534 | 1620 | ||
1535 | result.target = target; | ||
1536 | |||
1537 | return result; | 1621 | return result; |
1538 | } | 1622 | } |
1539 | 1623 | ||
1540 | /* wrapper for add_target_ip */ | 1624 | /* wrapper for add_target_ip */ |
1541 | static add_target_wrapper add_target(char *arg, const check_icmp_execution_mode mode) { | 1625 | static add_target_wrapper add_target(char *arg, const check_icmp_execution_mode mode, |
1626 | sa_family_t enforced_proto) { | ||
1542 | if (debug > 0) { | 1627 | if (debug > 0) { |
1543 | printf("add_target called with argument %s\n", arg); | 1628 | printf("add_target called with argument %s\n", arg); |
1544 | } | 1629 | } |
@@ -1548,30 +1633,31 @@ static add_target_wrapper add_target(char *arg, const check_icmp_execution_mode | |||
1548 | struct sockaddr_in6 *sin6 = NULL; | 1633 | struct sockaddr_in6 *sin6 = NULL; |
1549 | int error_code = -1; | 1634 | int error_code = -1; |
1550 | 1635 | ||
1551 | switch (address_family) { | 1636 | switch (enforced_proto) { |
1552 | case -1: | 1637 | case AF_UNSPEC: |
1553 | /* -4 and -6 are not specified on cmdline */ | 1638 | /* |
1554 | address_family = AF_INET; | 1639 | * no enforced protocoll family |
1640 | * try to parse the address with each one | ||
1641 | */ | ||
1555 | sin = (struct sockaddr_in *)&address_storage; | 1642 | sin = (struct sockaddr_in *)&address_storage; |
1556 | error_code = inet_pton(address_family, arg, &sin->sin_addr); | 1643 | error_code = inet_pton(AF_INET, arg, &sin->sin_addr); |
1644 | address_storage.ss_family = AF_INET; | ||
1557 | 1645 | ||
1558 | if (error_code != 1) { | 1646 | if (error_code != 1) { |
1559 | address_family = AF_INET6; | ||
1560 | sin6 = (struct sockaddr_in6 *)&address_storage; | 1647 | sin6 = (struct sockaddr_in6 *)&address_storage; |
1561 | error_code = inet_pton(address_family, arg, &sin6->sin6_addr); | 1648 | error_code = inet_pton(AF_INET6, arg, &sin6->sin6_addr); |
1562 | } | 1649 | address_storage.ss_family = AF_INET6; |
1563 | /* If we don't find any valid addresses, we still don't know the address_family */ | ||
1564 | if (error_code != 1) { | ||
1565 | address_family = -1; | ||
1566 | } | 1650 | } |
1567 | break; | 1651 | break; |
1568 | case AF_INET: | 1652 | case AF_INET: |
1569 | sin = (struct sockaddr_in *)&address_storage; | 1653 | sin = (struct sockaddr_in *)&address_storage; |
1570 | error_code = inet_pton(address_family, arg, &sin->sin_addr); | 1654 | error_code = inet_pton(AF_INET, arg, &sin->sin_addr); |
1655 | address_storage.ss_family = AF_INET; | ||
1571 | break; | 1656 | break; |
1572 | case AF_INET6: | 1657 | case AF_INET6: |
1573 | sin6 = (struct sockaddr_in6 *)&address_storage; | 1658 | sin6 = (struct sockaddr_in6 *)&address_storage; |
1574 | error_code = inet_pton(address_family, arg, &sin6->sin6_addr); | 1659 | error_code = inet_pton(AF_INET, arg, &sin6->sin6_addr); |
1660 | address_storage.ss_family = AF_INET6; | ||
1575 | break; | 1661 | break; |
1576 | default: | 1662 | default: |
1577 | crash("Address family not supported"); | 1663 | crash("Address family not supported"); |
@@ -1580,9 +1666,11 @@ static add_target_wrapper add_target(char *arg, const check_icmp_execution_mode | |||
1580 | add_target_wrapper result = { | 1666 | add_target_wrapper result = { |
1581 | .error_code = OK, | 1667 | .error_code = OK, |
1582 | .targets = NULL, | 1668 | .targets = NULL, |
1669 | .has_v4 = false, | ||
1670 | .has_v6 = false, | ||
1583 | }; | 1671 | }; |
1584 | 1672 | ||
1585 | /* don't resolve if we don't have to */ | 1673 | // if error_code == 1 the address was a valid address parsed above |
1586 | if (error_code == 1) { | 1674 | if (error_code == 1) { |
1587 | /* don't add all ip's if we were given a specific one */ | 1675 | /* don't add all ip's if we were given a specific one */ |
1588 | add_target_ip_wrapper targeted = add_target_ip(address_storage); | 1676 | add_target_ip_wrapper targeted = add_target_ip(address_storage); |
@@ -1592,19 +1680,21 @@ static add_target_wrapper add_target(char *arg, const check_icmp_execution_mode | |||
1592 | return result; | 1680 | return result; |
1593 | } | 1681 | } |
1594 | 1682 | ||
1683 | if (targeted.target->address.ss_family == AF_INET) { | ||
1684 | result.has_v4 = true; | ||
1685 | } else if (targeted.target->address.ss_family == AF_INET6) { | ||
1686 | result.has_v6 = true; | ||
1687 | } else { | ||
1688 | assert(false); | ||
1689 | } | ||
1595 | result.targets = targeted.target; | 1690 | result.targets = targeted.target; |
1596 | result.number_of_targets = 1; | 1691 | result.number_of_targets = 1; |
1597 | return result; | 1692 | return result; |
1598 | } | 1693 | } |
1599 | 1694 | ||
1600 | struct addrinfo hints; | 1695 | struct addrinfo hints = {}; |
1601 | errno = 0; | 1696 | errno = 0; |
1602 | memset(&hints, 0, sizeof(hints)); | 1697 | hints.ai_family = enforced_proto; |
1603 | if (address_family == -1) { | ||
1604 | hints.ai_family = AF_UNSPEC; | ||
1605 | } else { | ||
1606 | hints.ai_family = address_family == AF_INET ? PF_INET : PF_INET6; | ||
1607 | } | ||
1608 | hints.ai_socktype = SOCK_RAW; | 1698 | hints.ai_socktype = SOCK_RAW; |
1609 | 1699 | ||
1610 | int error; | 1700 | int error; |
@@ -1615,7 +1705,6 @@ static add_target_wrapper add_target(char *arg, const check_icmp_execution_mode | |||
1615 | result.error_code = ERROR; | 1705 | result.error_code = ERROR; |
1616 | return result; | 1706 | return result; |
1617 | } | 1707 | } |
1618 | address_family = res->ai_family; | ||
1619 | 1708 | ||
1620 | /* possibly add all the IP's as targets */ | 1709 | /* possibly add all the IP's as targets */ |
1621 | for (struct addrinfo *address = res; address != NULL; address = address->ai_next) { | 1710 | for (struct addrinfo *address = res; address != NULL; address = address->ai_next) { |
@@ -1634,6 +1723,11 @@ static add_target_wrapper add_target(char *arg, const check_icmp_execution_mode | |||
1634 | } else { | 1723 | } else { |
1635 | result.number_of_targets += ping_target_list_append(result.targets, tmp.target); | 1724 | result.number_of_targets += ping_target_list_append(result.targets, tmp.target); |
1636 | } | 1725 | } |
1726 | if (address->ai_family == AF_INET) { | ||
1727 | result.has_v4 = true; | ||
1728 | } else if (address->ai_family == AF_INET6) { | ||
1729 | result.has_v6 = true; | ||
1730 | } | ||
1637 | } | 1731 | } |
1638 | 1732 | ||
1639 | /* this is silly, but it works */ | 1733 | /* this is silly, but it works */ |
@@ -1652,11 +1746,11 @@ static add_target_wrapper add_target(char *arg, const check_icmp_execution_mode | |||
1652 | return result; | 1746 | return result; |
1653 | } | 1747 | } |
1654 | 1748 | ||
1655 | static void set_source_ip(char *arg, const int icmp_sock) { | 1749 | static void set_source_ip(char *arg, const int icmp_sock, sa_family_t addr_family) { |
1656 | struct sockaddr_in src; | 1750 | struct sockaddr_in src; |
1657 | 1751 | ||
1658 | memset(&src, 0, sizeof(src)); | 1752 | memset(&src, 0, sizeof(src)); |
1659 | src.sin_family = address_family; | 1753 | src.sin_family = addr_family; |
1660 | if ((src.sin_addr.s_addr = inet_addr(arg)) == INADDR_NONE) { | 1754 | if ((src.sin_addr.s_addr = inet_addr(arg)) == INADDR_NONE) { |
1661 | src.sin_addr.s_addr = get_ip_address(arg); | 1755 | src.sin_addr.s_addr = get_ip_address(arg); |
1662 | } | 1756 | } |
@@ -2026,7 +2120,8 @@ void print_usage(void) { | |||
2026 | printf(" %s [options] [-H] host1 host2 hostN\n", progname); | 2120 | printf(" %s [options] [-H] host1 host2 hostN\n", progname); |
2027 | } | 2121 | } |
2028 | 2122 | ||
2029 | static add_host_wrapper add_host(char *arg, check_icmp_execution_mode mode) { | 2123 | static add_host_wrapper add_host(char *arg, check_icmp_execution_mode mode, |
2124 | sa_family_t enforced_proto) { | ||
2030 | if (debug) { | 2125 | if (debug) { |
2031 | printf("add_host called with argument %s\n", arg); | 2126 | printf("add_host called with argument %s\n", arg); |
2032 | } | 2127 | } |
@@ -2034,15 +2129,20 @@ static add_host_wrapper add_host(char *arg, check_icmp_execution_mode mode) { | |||
2034 | add_host_wrapper result = { | 2129 | add_host_wrapper result = { |
2035 | .error_code = OK, | 2130 | .error_code = OK, |
2036 | .host = check_icmp_target_container_init(), | 2131 | .host = check_icmp_target_container_init(), |
2132 | .has_v4 = false, | ||
2133 | .has_v6 = false, | ||
2037 | }; | 2134 | }; |
2038 | 2135 | ||
2039 | add_target_wrapper targets = add_target(arg, mode); | 2136 | add_target_wrapper targets = add_target(arg, mode, enforced_proto); |
2040 | 2137 | ||
2041 | if (targets.error_code != OK) { | 2138 | if (targets.error_code != OK) { |
2042 | result.error_code = targets.error_code; | 2139 | result.error_code = targets.error_code; |
2043 | return result; | 2140 | return result; |
2044 | } | 2141 | } |
2045 | 2142 | ||
2143 | result.has_v4 = targets.has_v4; | ||
2144 | result.has_v6 = targets.has_v6; | ||
2145 | |||
2046 | result.host = check_icmp_target_container_init(); | 2146 | result.host = check_icmp_target_container_init(); |
2047 | 2147 | ||
2048 | result.host.name = strdup(arg); | 2148 | result.host.name = strdup(arg); |
@@ -2063,7 +2163,12 @@ mp_subcheck evaluate_target(ping_target target, check_icmp_mode_switches modes, | |||
2063 | 2163 | ||
2064 | mp_subcheck result = mp_subcheck_init(); | 2164 | mp_subcheck result = mp_subcheck_init(); |
2065 | result = mp_set_subcheck_default_state(result, STATE_OK); | 2165 | result = mp_set_subcheck_default_state(result, STATE_OK); |
2066 | xasprintf(&result.output, "%s", target.name); | 2166 | |
2167 | char address[INET6_ADDRSTRLEN]; | ||
2168 | memset(address, 0, INET6_ADDRSTRLEN); | ||
2169 | parse_address(&target.address, address, sizeof(address)); | ||
2170 | |||
2171 | xasprintf(&result.output, "%s", address); | ||
2067 | 2172 | ||
2068 | double packet_loss; | 2173 | double packet_loss; |
2069 | double rta; | 2174 | double rta; |
@@ -2076,8 +2181,6 @@ mp_subcheck evaluate_target(ping_target target, check_icmp_mode_switches modes, | |||
2076 | /* up the down counter if not already counted */ | 2181 | /* up the down counter if not already counted */ |
2077 | 2182 | ||
2078 | if (target.flags & FLAG_LOST_CAUSE) { | 2183 | if (target.flags & FLAG_LOST_CAUSE) { |
2079 | char address[INET6_ADDRSTRLEN]; | ||
2080 | parse_address(&target.error_addr, address, sizeof(address)); | ||
2081 | xasprintf(&result.output, "%s: %s @ %s", result.output, | 2184 | xasprintf(&result.output, "%s: %s @ %s", result.output, |
2082 | get_icmp_error_msg(target.icmp_type, target.icmp_code), address); | 2185 | get_icmp_error_msg(target.icmp_type, target.icmp_code), address); |
2083 | } else { /* not marked as lost cause, so we have no flags for it */ | 2186 | } else { /* not marked as lost cause, so we have no flags for it */ |
@@ -2159,7 +2262,7 @@ mp_subcheck evaluate_target(ping_target target, check_icmp_mode_switches modes, | |||
2159 | 2262 | ||
2160 | if (packet_loss < 100) { | 2263 | if (packet_loss < 100) { |
2161 | mp_perfdata pd_rta = perfdata_init(); | 2264 | mp_perfdata pd_rta = perfdata_init(); |
2162 | xasprintf(&pd_rta.label, "%srta", target.name); | 2265 | xasprintf(&pd_rta.label, "%srta", address); |
2163 | pd_rta.uom = strdup("ms"); | 2266 | pd_rta.uom = strdup("ms"); |
2164 | pd_rta.value = mp_create_pd_value(rta / 1000); | 2267 | pd_rta.value = mp_create_pd_value(rta / 1000); |
2165 | pd_rta.min = mp_create_pd_value(0); | 2268 | pd_rta.min = mp_create_pd_value(0); |
@@ -2169,13 +2272,13 @@ mp_subcheck evaluate_target(ping_target target, check_icmp_mode_switches modes, | |||
2169 | mp_add_perfdata_to_subcheck(&sc_rta, pd_rta); | 2272 | mp_add_perfdata_to_subcheck(&sc_rta, pd_rta); |
2170 | 2273 | ||
2171 | mp_perfdata pd_rt_min = perfdata_init(); | 2274 | mp_perfdata pd_rt_min = perfdata_init(); |
2172 | xasprintf(&pd_rt_min.label, "%srtmin", target.name); | 2275 | xasprintf(&pd_rt_min.label, "%srtmin", address); |
2173 | pd_rt_min.value = mp_create_pd_value(target.rtmin / 1000); | 2276 | pd_rt_min.value = mp_create_pd_value(target.rtmin / 1000); |
2174 | pd_rt_min.uom = strdup("ms"); | 2277 | pd_rt_min.uom = strdup("ms"); |
2175 | mp_add_perfdata_to_subcheck(&sc_rta, pd_rt_min); | 2278 | mp_add_perfdata_to_subcheck(&sc_rta, pd_rt_min); |
2176 | 2279 | ||
2177 | mp_perfdata pd_rt_max = perfdata_init(); | 2280 | mp_perfdata pd_rt_max = perfdata_init(); |
2178 | xasprintf(&pd_rt_max.label, "%srtmax", target.name); | 2281 | xasprintf(&pd_rt_max.label, "%srtmax", address); |
2179 | pd_rt_max.value = mp_create_pd_value(target.rtmax / 1000); | 2282 | pd_rt_max.value = mp_create_pd_value(target.rtmax / 1000); |
2180 | pd_rt_max.uom = strdup("ms"); | 2283 | pd_rt_max.uom = strdup("ms"); |
2181 | mp_add_perfdata_to_subcheck(&sc_rta, pd_rt_max); | 2284 | mp_add_perfdata_to_subcheck(&sc_rta, pd_rt_max); |
@@ -2198,7 +2301,7 @@ mp_subcheck evaluate_target(ping_target target, check_icmp_mode_switches modes, | |||
2198 | } | 2301 | } |
2199 | 2302 | ||
2200 | mp_perfdata pd_pl = perfdata_init(); | 2303 | mp_perfdata pd_pl = perfdata_init(); |
2201 | xasprintf(&pd_pl.label, "%spl", target.name); | 2304 | xasprintf(&pd_pl.label, "%spl", address); |
2202 | pd_pl.uom = strdup("%"); | 2305 | pd_pl.uom = strdup("%"); |
2203 | 2306 | ||
2204 | pd_pl.warn = mp_range_set_end(pd_pl.warn, mp_create_pd_value(warn.pl)); | 2307 | pd_pl.warn = mp_range_set_end(pd_pl.warn, mp_create_pd_value(warn.pl)); |
@@ -2226,7 +2329,7 @@ mp_subcheck evaluate_target(ping_target target, check_icmp_mode_switches modes, | |||
2226 | if (packet_loss < 100) { | 2329 | if (packet_loss < 100) { |
2227 | mp_perfdata pd_jitter = perfdata_init(); | 2330 | mp_perfdata pd_jitter = perfdata_init(); |
2228 | pd_jitter.uom = strdup("ms"); | 2331 | pd_jitter.uom = strdup("ms"); |
2229 | xasprintf(&pd_jitter.label, "%sjitter_avg", target.name); | 2332 | xasprintf(&pd_jitter.label, "%sjitter_avg", address); |
2230 | pd_jitter.value = mp_create_pd_value(target.jitter); | 2333 | pd_jitter.value = mp_create_pd_value(target.jitter); |
2231 | pd_jitter.warn = mp_range_set_end(pd_jitter.warn, mp_create_pd_value(warn.jitter)); | 2334 | pd_jitter.warn = mp_range_set_end(pd_jitter.warn, mp_create_pd_value(warn.jitter)); |
2232 | pd_jitter.crit = mp_range_set_end(pd_jitter.crit, mp_create_pd_value(crit.jitter)); | 2335 | pd_jitter.crit = mp_range_set_end(pd_jitter.crit, mp_create_pd_value(crit.jitter)); |
@@ -2234,13 +2337,13 @@ mp_subcheck evaluate_target(ping_target target, check_icmp_mode_switches modes, | |||
2234 | 2337 | ||
2235 | mp_perfdata pd_jitter_min = perfdata_init(); | 2338 | mp_perfdata pd_jitter_min = perfdata_init(); |
2236 | pd_jitter_min.uom = strdup("ms"); | 2339 | pd_jitter_min.uom = strdup("ms"); |
2237 | xasprintf(&pd_jitter_min.label, "%sjitter_min", target.name); | 2340 | xasprintf(&pd_jitter_min.label, "%sjitter_min", address); |
2238 | pd_jitter_min.value = mp_create_pd_value(target.jitter_min); | 2341 | pd_jitter_min.value = mp_create_pd_value(target.jitter_min); |
2239 | mp_add_perfdata_to_subcheck(&sc_jitter, pd_jitter_min); | 2342 | mp_add_perfdata_to_subcheck(&sc_jitter, pd_jitter_min); |
2240 | 2343 | ||
2241 | mp_perfdata pd_jitter_max = perfdata_init(); | 2344 | mp_perfdata pd_jitter_max = perfdata_init(); |
2242 | pd_jitter_max.uom = strdup("ms"); | 2345 | pd_jitter_max.uom = strdup("ms"); |
2243 | xasprintf(&pd_jitter_max.label, "%sjitter_max", target.name); | 2346 | xasprintf(&pd_jitter_max.label, "%sjitter_max", address); |
2244 | pd_jitter_max.value = mp_create_pd_value(target.jitter_max); | 2347 | pd_jitter_max.value = mp_create_pd_value(target.jitter_max); |
2245 | mp_add_perfdata_to_subcheck(&sc_jitter, pd_jitter_max); | 2348 | mp_add_perfdata_to_subcheck(&sc_jitter, pd_jitter_max); |
2246 | } | 2349 | } |
@@ -2262,7 +2365,7 @@ mp_subcheck evaluate_target(ping_target target, check_icmp_mode_switches modes, | |||
2262 | 2365 | ||
2263 | if (packet_loss < 100) { | 2366 | if (packet_loss < 100) { |
2264 | mp_perfdata pd_mos = perfdata_init(); | 2367 | mp_perfdata pd_mos = perfdata_init(); |
2265 | xasprintf(&pd_mos.label, "%smos", target.name); | 2368 | xasprintf(&pd_mos.label, "%smos", address); |
2266 | pd_mos.value = mp_create_pd_value(mos); | 2369 | pd_mos.value = mp_create_pd_value(mos); |
2267 | pd_mos.warn = mp_range_set_end(pd_mos.warn, mp_create_pd_value(warn.mos)); | 2370 | pd_mos.warn = mp_range_set_end(pd_mos.warn, mp_create_pd_value(warn.mos)); |
2268 | pd_mos.crit = mp_range_set_end(pd_mos.crit, mp_create_pd_value(crit.mos)); | 2371 | pd_mos.crit = mp_range_set_end(pd_mos.crit, mp_create_pd_value(crit.mos)); |
@@ -2288,7 +2391,7 @@ mp_subcheck evaluate_target(ping_target target, check_icmp_mode_switches modes, | |||
2288 | 2391 | ||
2289 | if (packet_loss < 100) { | 2392 | if (packet_loss < 100) { |
2290 | mp_perfdata pd_score = perfdata_init(); | 2393 | mp_perfdata pd_score = perfdata_init(); |
2291 | xasprintf(&pd_score.label, "%sscore", target.name); | 2394 | xasprintf(&pd_score.label, "%sscore", address); |
2292 | pd_score.value = mp_create_pd_value(score); | 2395 | pd_score.value = mp_create_pd_value(score); |
2293 | pd_score.warn = mp_range_set_end(pd_score.warn, mp_create_pd_value(warn.score)); | 2396 | pd_score.warn = mp_range_set_end(pd_score.warn, mp_create_pd_value(warn.score)); |
2294 | pd_score.crit = mp_range_set_end(pd_score.crit, mp_create_pd_value(crit.score)); | 2397 | pd_score.crit = mp_range_set_end(pd_score.crit, mp_create_pd_value(crit.score)); |
diff --git a/plugins-root/check_icmp.d/check_icmp_helpers.c b/plugins-root/check_icmp.d/check_icmp_helpers.c index a2b54c6a..47604952 100644 --- a/plugins-root/check_icmp.d/check_icmp_helpers.c +++ b/plugins-root/check_icmp.d/check_icmp_helpers.c | |||
@@ -1,7 +1,7 @@ | |||
1 | #include "./config.h" | 1 | #include "./config.h" |
2 | #include "states.h" | ||
3 | #include <math.h> | 2 | #include <math.h> |
4 | #include <netinet/in.h> | 3 | #include <netinet/in.h> |
4 | #include <sys/socket.h> | ||
5 | #include "./check_icmp_helpers.h" | 5 | #include "./check_icmp_helpers.h" |
6 | #include "../../plugins/netutils.h" | 6 | #include "../../plugins/netutils.h" |
7 | 7 | ||
@@ -38,7 +38,10 @@ check_icmp_config check_icmp_config_init() { | |||
38 | .pkt_interval = DEFAULT_PKT_INTERVAL, | 38 | .pkt_interval = DEFAULT_PKT_INTERVAL, |
39 | .target_interval = 0, | 39 | .target_interval = 0, |
40 | .number_of_packets = DEFAULT_NUMBER_OF_PACKETS, | 40 | .number_of_packets = DEFAULT_NUMBER_OF_PACKETS, |
41 | |||
41 | .source_ip = NULL, | 42 | .source_ip = NULL, |
43 | .need_v4 = false, | ||
44 | .need_v6 = false, | ||
42 | 45 | ||
43 | .sender_id = {}, | 46 | .sender_id = {}, |
44 | 47 | ||
@@ -71,68 +74,31 @@ check_icmp_state check_icmp_state_init() { | |||
71 | return tmp; | 74 | return tmp; |
72 | } | 75 | } |
73 | 76 | ||
74 | ping_target_create_wrapper ping_target_create(char *name, struct sockaddr_storage *address) { | 77 | ping_target_create_wrapper ping_target_create(struct sockaddr_storage address) { |
75 | struct sockaddr_in *sin; | ||
76 | struct sockaddr_in6 *sin6; | ||
77 | if (address_family == AF_INET) { | ||
78 | sin = (struct sockaddr_in *)address; | ||
79 | } else { | ||
80 | sin6 = (struct sockaddr_in6 *)address; | ||
81 | } | ||
82 | |||
83 | ping_target_create_wrapper result = { | 78 | ping_target_create_wrapper result = { |
84 | .errorcode = OK, | 79 | .errorcode = OK, |
85 | }; | 80 | }; |
86 | 81 | ||
82 | struct sockaddr_storage *tmp_addr = &address; | ||
83 | |||
87 | /* disregard obviously stupid addresses | 84 | /* disregard obviously stupid addresses |
88 | * (I didn't find an ipv6 equivalent to INADDR_NONE) */ | 85 | * (I didn't find an ipv6 equivalent to INADDR_NONE) */ |
89 | if (((address_family == AF_INET && | 86 | if (((tmp_addr->ss_family == AF_INET && |
90 | (sin->sin_addr.s_addr == INADDR_NONE || sin->sin_addr.s_addr == INADDR_ANY))) || | 87 | (((struct sockaddr_in *)tmp_addr)->sin_addr.s_addr == INADDR_NONE || |
91 | (address_family == AF_INET6 && (sin6->sin6_addr.s6_addr == in6addr_any.s6_addr))) { | 88 | ((struct sockaddr_in *)tmp_addr)->sin_addr.s_addr == INADDR_ANY))) || |
89 | (tmp_addr->ss_family == AF_INET6 && | ||
90 | (((struct sockaddr_in6 *)tmp_addr)->sin6_addr.s6_addr == in6addr_any.s6_addr))) { | ||
92 | result.errorcode = ERROR; | 91 | result.errorcode = ERROR; |
93 | return result; | 92 | return result; |
94 | } | 93 | } |
95 | 94 | ||
96 | // TODO: Maybe add the following back in as a sanity check for the config | ||
97 | // /* no point in adding two identical IP's, so don't. ;) */ | ||
98 | // struct sockaddr_in *host_sin; | ||
99 | // struct sockaddr_in6 *host_sin6; | ||
100 | // struct rta_host *host = host_list; | ||
101 | |||
102 | // while (host) { | ||
103 | // host_sin = (struct sockaddr_in *)&host->saddr_in; | ||
104 | // host_sin6 = (struct sockaddr_in6 *)&host->saddr_in; | ||
105 | |||
106 | // if ((address_family == AF_INET && host_sin->sin_addr.s_addr == sin->sin_addr.s_addr) || | ||
107 | // (address_family == AF_INET6 && | ||
108 | // host_sin6->sin6_addr.s6_addr == sin6->sin6_addr.s6_addr)) { | ||
109 | // if (debug) { | ||
110 | // printf("Identical IP already exists. Not adding %s\n", name); | ||
111 | // } | ||
112 | // return -1; | ||
113 | // } | ||
114 | // host = host->next; | ||
115 | // } | ||
116 | |||
117 | /* add the fresh ip */ | 95 | /* add the fresh ip */ |
118 | ping_target host = ping_target_init(); | 96 | ping_target target = ping_target_init(); |
119 | |||
120 | /* set the values. use calling name for output */ | ||
121 | host.name = strdup(name); | ||
122 | 97 | ||
123 | /* fill out the sockaddr_storage struct */ | 98 | /* fill out the sockaddr_storage struct */ |
124 | if (address_family == AF_INET) { | 99 | target.address = address; |
125 | struct sockaddr_in *host_sin = (struct sockaddr_in *)&host.saddr_in; | ||
126 | host_sin->sin_family = AF_INET; | ||
127 | host_sin->sin_addr.s_addr = sin->sin_addr.s_addr; | ||
128 | } else { | ||
129 | struct sockaddr_in6 *host_sin6 = (struct sockaddr_in6 *)&host.saddr_in; | ||
130 | host_sin6->sin6_family = AF_INET6; | ||
131 | memcpy(host_sin6->sin6_addr.s6_addr, sin6->sin6_addr.s6_addr, | ||
132 | sizeof host_sin6->sin6_addr.s6_addr); | ||
133 | } | ||
134 | 100 | ||
135 | result.host = host; | 101 | result.host = target; |
136 | 102 | ||
137 | return result; | 103 | return result; |
138 | } | 104 | } |
diff --git a/plugins-root/check_icmp.d/check_icmp_helpers.h b/plugins-root/check_icmp.d/check_icmp_helpers.h index 5f771635..713dd8ce 100644 --- a/plugins-root/check_icmp.d/check_icmp_helpers.h +++ b/plugins-root/check_icmp.d/check_icmp_helpers.h | |||
@@ -10,10 +10,10 @@ | |||
10 | #include <arpa/inet.h> | 10 | #include <arpa/inet.h> |
11 | 11 | ||
12 | typedef struct rta_host { | 12 | typedef struct rta_host { |
13 | unsigned short id; /* id in **table, and icmp pkts */ | 13 | unsigned short id; /* id in **table, and icmp pkts */ |
14 | char *name; /* arg used for adding this host */ | 14 | char *msg; /* icmp error message, if any */ |
15 | char *msg; /* icmp error message, if any */ | 15 | |
16 | struct sockaddr_storage saddr_in; /* the address of this host */ | 16 | struct sockaddr_storage address; /* the address of this host */ |
17 | struct sockaddr_storage error_addr; /* stores address of error replies */ | 17 | struct sockaddr_storage error_addr; /* stores address of error replies */ |
18 | time_t time_waited; /* total time waited, in usecs */ | 18 | time_t time_waited; /* total time waited, in usecs */ |
19 | unsigned int icmp_sent, icmp_recv, icmp_lost; /* counters */ | 19 | unsigned int icmp_sent, icmp_recv, icmp_lost; /* counters */ |
@@ -59,7 +59,12 @@ typedef struct { | |||
59 | ping_target host; | 59 | ping_target host; |
60 | } ping_target_create_wrapper; | 60 | } ping_target_create_wrapper; |
61 | 61 | ||
62 | ping_target_create_wrapper ping_target_create(char *name, struct sockaddr_storage *address); | 62 | typedef struct { |
63 | int socket4; | ||
64 | int socket6; | ||
65 | } check_icmp_socket_set; | ||
66 | |||
67 | ping_target_create_wrapper ping_target_create(struct sockaddr_storage address); | ||
63 | unsigned int ping_target_list_append(ping_target *list, ping_target *elem); | 68 | unsigned int ping_target_list_append(ping_target *list, ping_target *elem); |
64 | 69 | ||
65 | void check_icmp_timeout_handler(int, siginfo_t *, void *); | 70 | void check_icmp_timeout_handler(int, siginfo_t *, void *); |
diff --git a/plugins-root/check_icmp.d/config.h b/plugins-root/check_icmp.d/config.h index aa33c991..8e9c96b2 100644 --- a/plugins-root/check_icmp.d/config.h +++ b/plugins-root/check_icmp.d/config.h | |||
@@ -63,7 +63,10 @@ typedef struct { | |||
63 | unsigned int pkt_interval; | 63 | unsigned int pkt_interval; |
64 | unsigned int target_interval; | 64 | unsigned int target_interval; |
65 | unsigned short number_of_packets; | 65 | unsigned short number_of_packets; |
66 | |||
66 | char *source_ip; | 67 | char *source_ip; |
68 | bool need_v4; | ||
69 | bool need_v6; | ||
67 | 70 | ||
68 | uint16_t sender_id; // PID of the main process, which is used as an ID in packets | 71 | uint16_t sender_id; // PID of the main process, which is used as an ID in packets |
69 | 72 | ||