diff options
Diffstat (limited to 'plugins')
| -rw-r--r-- | plugins/check_icmp.c | 2241 |
1 files changed, 1012 insertions, 1229 deletions
diff --git a/plugins/check_icmp.c b/plugins/check_icmp.c index 45716824..2f03552f 100644 --- a/plugins/check_icmp.c +++ b/plugins/check_icmp.c | |||
| @@ -1,1416 +1,1199 @@ | |||
| 1 | /* | 1 | /* |
| 2 | * $Id$ | 2 | * $Id$ |
| 3 | * | 3 | * |
| 4 | * This is a hack of fping2 made to work with nagios. | 4 | * Author: Andreas Ericsson <ae@op5.se> |
| 5 | * It's fast and removes the necessity of parsing another programs output. | ||
| 6 | * | 5 | * |
| 7 | * VIEWING NOTES: | 6 | * License: GNU GPL 2.0 or any later version. |
| 8 | * This file was formatted with tab indents at a tab stop of 4. | ||
| 9 | * | 7 | * |
| 10 | * It is highly recommended that your editor is set to this | 8 | * Relevant RFC's: 792 (ICMP), 791 (IP) |
| 11 | * tab stop setting for viewing and editing. | ||
| 12 | * | 9 | * |
| 13 | * COPYLEFT; | 10 | * This program was modeled somewhat after the check_icmp program, |
| 14 | * This programs copyright status is currently undetermined. Much of | 11 | * which was in turn a hack of fping (www.fping.org) but has been |
| 15 | * the code in it comes from the fping2 program which used to be licensed | 12 | * completely rewritten since to generate higher precision rta values, |
| 16 | * under the Stanford General Software License (available at | 13 | * and support several different modes as well as setting ttl to control. |
| 17 | * http://graphics.stanford.edu/software/license.html). It is presently | 14 | * redundant routes. The only remainders of fping is currently a few |
| 18 | * unclear what license (if any) applies to the original code at the | 15 | * function names. |
| 19 | * moment. | ||
| 20 | * | 16 | * |
| 21 | * The fping website can be found at http://www.fping.com | ||
| 22 | */ | 17 | */ |
| 23 | 18 | ||
| 24 | const char *progname = "check_icmp"; | 19 | #include <sys/time.h> |
| 25 | const char *revision = "$Revision$"; | 20 | #include <sys/types.h> |
| 26 | const char *copyright = "2004"; | ||
| 27 | const char *email = "nagiosplug-devel@lists.sourceforge.net"; | ||
| 28 | |||
| 29 | #include "common.h" | ||
| 30 | #include "netutils.h" | ||
| 31 | #include "utils.h" | ||
| 32 | |||
| 33 | #include <stdio.h> | 21 | #include <stdio.h> |
| 34 | #include <errno.h> | ||
| 35 | #include <time.h> | ||
| 36 | #include <signal.h> | ||
| 37 | |||
| 38 | #include <unistd.h> | ||
| 39 | |||
| 40 | #include <stdlib.h> | 22 | #include <stdlib.h> |
| 41 | 23 | #include <stdarg.h> | |
| 42 | #include <string.h> | 24 | #include <unistd.h> |
| 43 | #include <stddef.h> | 25 | #include <stddef.h> |
| 44 | 26 | #include <errno.h> | |
| 45 | #include <sys/types.h> | 27 | #include <string.h> |
| 46 | #include <sys/time.h> | 28 | #include <ctype.h> |
| 29 | #include <netdb.h> | ||
| 47 | #include <sys/socket.h> | 30 | #include <sys/socket.h> |
| 48 | |||
| 49 | #include <sys/file.h> | ||
| 50 | |||
| 51 | #include <netinet/in_systm.h> | 31 | #include <netinet/in_systm.h> |
| 52 | #include <netinet/in.h> | 32 | #include <netinet/in.h> |
| 53 | |||
| 54 | #include <netinet/ip.h> | 33 | #include <netinet/ip.h> |
| 55 | #include <netinet/ip_icmp.h> | 34 | #include <netinet/ip_icmp.h> |
| 56 | |||
| 57 | #include <arpa/inet.h> | 35 | #include <arpa/inet.h> |
| 58 | #include <netdb.h> | 36 | #include <signal.h> |
| 59 | |||
| 60 | /* RS6000 has sys/select.h */ | ||
| 61 | #ifdef HAVE_SYS_SELECT_H | ||
| 62 | #include <sys/select.h> | ||
| 63 | #endif /* HAVE_SYS_SELECT_H */ | ||
| 64 | 37 | ||
| 65 | /* rta threshold values can't be larger than MAXTTL seconds */ | 38 | /** sometimes undefined system macros (quite a few, actually) **/ |
| 66 | #ifndef MAXTTL | 39 | #ifndef MAXTTL |
| 67 | # define MAXTTL 255 | 40 | # define MAXTTL 255 |
| 68 | #endif | ||
| 69 | #ifndef IPDEFTTL | ||
| 70 | # define IPDEFTTL 64 | ||
| 71 | #endif | 41 | #endif |
| 72 | |||
| 73 | /*** externals ***/ | ||
| 74 | extern char *optarg; | ||
| 75 | extern int optind, opterr; | ||
| 76 | |||
| 77 | /*** Constants ***/ | ||
| 78 | //#define EMAIL "ae@op5.se" | ||
| 79 | //#define VERSION "0.8.1" | ||
| 80 | |||
| 81 | #ifndef INADDR_NONE | 42 | #ifndef INADDR_NONE |
| 82 | # define INADDR_NONE 0xffffffU | 43 | # define INADDR_NONE 0xffffffU |
| 83 | #endif | 44 | #endif |
| 84 | 45 | ||
| 85 | /*** Ping packet defines ***/ | 46 | #ifndef SOL_IP |
| 86 | /* data added after ICMP header for our nefarious purposes */ | 47 | #define SOL_IP 0 |
| 87 | typedef struct ping_data { | ||
| 88 | unsigned int ping_count; /* counts up to -[n|p] count or 1 */ | ||
| 89 | struct timeval ping_ts; /* time sent */ | ||
| 90 | } PING_DATA; | ||
| 91 | |||
| 92 | #define MIN_PING_DATA sizeof(PING_DATA) | ||
| 93 | #define MAX_IP_PACKET 65536 /* (theoretical) max IP packet size */ | ||
| 94 | #define SIZE_IP_HDR 20 | ||
| 95 | #define SIZE_ICMP_HDR ICMP_MINLEN /* from ip_icmp.h */ | ||
| 96 | #define MAX_PING_DATA (MAX_IP_PACKET - SIZE_IP_HDR - SIZE_ICMP_HDR) | ||
| 97 | |||
| 98 | /* | ||
| 99 | * Interval is the minimum amount of time between sending a ping packet to | ||
| 100 | * any host. | ||
| 101 | * | ||
| 102 | * Perhost_interval is the minimum amount of time between sending a ping | ||
| 103 | * packet to a particular responding host | ||
| 104 | * | ||
| 105 | * Timeout is the initial amount of time between sending a ping packet to | ||
| 106 | * a particular non-responding host. | ||
| 107 | * | ||
| 108 | * Retry is the number of ping packets to send to a non-responding host | ||
| 109 | * before giving up (in is-it-alive mode). | ||
| 110 | * | ||
| 111 | * Backoff factor is how much longer to wait on successive retries. | ||
| 112 | */ | ||
| 113 | #ifndef DEFAULT_INTERVAL | ||
| 114 | #define DEFAULT_INTERVAL 25 /* default time between packets (msec) */ | ||
| 115 | #endif | ||
| 116 | |||
| 117 | #ifndef DEFAULT_RETRY | ||
| 118 | #define DEFAULT_RETRY 1 /* number of times to retry a host */ | ||
| 119 | #endif | 48 | #endif |
| 120 | 49 | ||
| 121 | #ifndef DEFAULT_TIMEOUT | 50 | /* we bundle these in one #ifndef, since they're all from BSD |
| 122 | # define DEFAULT_TIMEOUT 1000 | 51 | * Put individual #ifndef's around those that bother you */ |
| 52 | #ifndef ICMP_UNREACH_NET_UNKNOWN | ||
| 53 | # define ICMP_UNREACH_NET_UNKNOWN 6 | ||
| 54 | # define ICMP_UNREACH_HOST_UNKNOWN 7 | ||
| 55 | # define ICMP_UNREACH_ISOLATED 8 | ||
| 56 | # define ICMP_UNREACH_NET_PROHIB 9 | ||
| 57 | # define ICMP_UNREACH_HOST_PROHIB 10 | ||
| 58 | # define ICMP_UNREACH_TOSNET 11 | ||
| 59 | # define ICMP_UNREACH_TOSHOST 12 | ||
| 123 | #endif | 60 | #endif |
| 124 | 61 | /* tru64 has the ones above, but not these */ | |
| 125 | #ifndef DEFAULT_BACKOFF_FACTOR | 62 | #ifndef ICMP_UNREACH_FILTER_PROHIB |
| 126 | #define DEFAULT_BACKOFF_FACTOR 1.5 /* exponential timeout factor */ | 63 | # define ICMP_UNREACH_FILTER_PROHIB 13 |
| 64 | # define ICMP_UNREACH_HOST_PRECEDENCE 14 | ||
| 65 | # define ICMP_UNREACH_PRECEDENCE_CUTOFF 15 | ||
| 127 | #endif | 66 | #endif |
| 128 | #define MIN_BACKOFF_FACTOR 1.0 /* exponential timeout factor */ | ||
| 129 | #define MAX_BACKOFF_FACTOR 5.0 /* exponential timeout factor */ | ||
| 130 | |||
| 131 | #ifndef DNS_TIMEOUT | ||
| 132 | #define DNS_TIMEOUT 1000 /* time in usec for dns retry */ | ||
| 133 | #endif | ||
| 134 | |||
| 135 | #ifndef MAX_RTA_THRESHOLD_VALUE | ||
| 136 | # define MAX_RTA_THRESHOLD_VALUE 120*1000000 /* 2 minutes should be enough */ | ||
| 137 | #endif | ||
| 138 | #ifndef MIN_RTA_THRESHOLD_VALUE | ||
| 139 | # define MIN_RTA_THRESHOLD_VALUE 10000 /* minimum RTA threshold value */ | ||
| 140 | #endif | ||
| 141 | |||
| 142 | /* sized so as to be like traditional ping */ | ||
| 143 | #define DEFAULT_PING_DATA_SIZE (MIN_PING_DATA + 44) | ||
| 144 | |||
| 145 | /* maxima and minima */ | ||
| 146 | #define MAX_COUNT 50 /* max count even if we're root */ | ||
| 147 | #define MAX_RETRY 5 | ||
| 148 | #define MIN_INTERVAL 25 /* msecs */ | ||
| 149 | #define MIN_TIMEOUT 50 /* msecs */ | ||
| 150 | |||
| 151 | /* response time array flags */ | ||
| 152 | #define RESP_WAITING -1 | ||
| 153 | #define RESP_UNUSED -2 | ||
| 154 | |||
| 155 | #define ICMP_UNREACH_MAXTYPE 15 | ||
| 156 | |||
| 157 | /* entry used to keep track of each host we are pinging */ | ||
| 158 | struct host_entry { | ||
| 159 | int i; /* index into array */ | ||
| 160 | char *name; /* name as given by user */ | ||
| 161 | char *host; /* text description of host */ | ||
| 162 | struct sockaddr_in saddr; /* internet address */ | ||
| 163 | unsigned short **pr; /* TCP port range to check for connectivity */ | ||
| 164 | struct timeval last_send_time; /* time of last packet sent */ | ||
| 165 | unsigned int num_sent; /* number of ping packets sent */ | ||
| 166 | unsigned int num_recv; /* number of pings received */ | ||
| 167 | unsigned int total_time; /* sum of response times */ | ||
| 168 | unsigned int status; /* this hosts status */ | ||
| 169 | unsigned int running; /* unset when through sending */ | ||
| 170 | unsigned int waiting; /* waiting for response */ | ||
| 171 | int *resp_times; /* individual response times */ | ||
| 172 | struct host_entry *prev, *next; /* doubly linked list */ | ||
| 173 | }; | ||
| 174 | |||
| 175 | typedef struct host_entry HOST_ENTRY; | ||
| 176 | 67 | ||
| 177 | struct host_name_list { | ||
| 178 | char *entry; | ||
| 179 | struct host_name_list *next; | ||
| 180 | }; | ||
| 181 | 68 | ||
| 182 | /* threshold structure */ | 69 | /** typedefs and such **/ |
| 183 | struct threshold { | 70 | enum states { |
| 184 | unsigned int pl; /* packet loss */ | ||
| 185 | unsigned int rta; /* roundtrip time average */ | ||
| 186 | }; | ||
| 187 | typedef struct threshold threshold; | ||
| 188 | |||
| 189 | /***************************************************************************** | ||
| 190 | * Global Variables * | ||
| 191 | *****************************************************************************/ | ||
| 192 | |||
| 193 | HOST_ENTRY *rrlist = NULL; /* linked list of hosts be pinged */ | ||
| 194 | HOST_ENTRY **table = NULL; /* array of pointers to items in the list */ | ||
| 195 | HOST_ENTRY *cursor; | ||
| 196 | |||
| 197 | char *prog; /* our name */ | ||
| 198 | int ident; /* our pid, for marking icmp packets */ | ||
| 199 | int sock; /* socket */ | ||
| 200 | u_int debug = 0; | ||
| 201 | |||
| 202 | /* threshold value defaults; | ||
| 203 | * WARNING; 60% packetloss or 200 msecs round trip average | ||
| 204 | * CRITICAL; 80% packetloss or 500 msecs round trip average */ | ||
| 205 | threshold warn = {60, 200 * 1000}; | ||
| 206 | threshold crit = {80, 500 * 1000}; | ||
| 207 | |||
| 208 | /* times get *100 because all times are calculated in 10 usec units, not ms */ | ||
| 209 | unsigned int retry = DEFAULT_RETRY; | ||
| 210 | u_int timeout = DEFAULT_TIMEOUT * 100; | ||
| 211 | u_int interval = DEFAULT_INTERVAL * 100; | ||
| 212 | float backoff = DEFAULT_BACKOFF_FACTOR; | ||
| 213 | u_int select_time; /* calculated using maximum threshold rta value */ | ||
| 214 | u_int ping_data_size = DEFAULT_PING_DATA_SIZE; | ||
| 215 | u_int ping_pkt_size; | ||
| 216 | unsigned int count = 5; | ||
| 217 | unsigned int trials = 1; | ||
| 218 | |||
| 219 | /* global stats */ | ||
| 220 | int total_replies = 0; | ||
| 221 | int num_jobs = 0; /* number of hosts still to do */ | ||
| 222 | int num_hosts = 0; /* total number of hosts */ | ||
| 223 | int num_alive = 0; /* total number alive */ | ||
| 224 | int num_unreachable = 0; /* total number unreachable */ | ||
| 225 | int num_noaddress = 0; /* total number of addresses not found */ | ||
| 226 | int num_timeout = 0; /* number of timed out packets */ | ||
| 227 | int num_pingsent = 0; /* total pings sent */ | ||
| 228 | int num_pingreceived = 0; /* total pings received */ | ||
| 229 | int num_othericmprcvd = 0; /* total non-echo-reply ICMP received */ | ||
| 230 | |||
| 231 | struct timeval current_time; /* current time (pseudo) */ | ||
| 232 | struct timeval my_start_time; /* conflict with utils.c 33, but not found ?? */ | ||
| 233 | struct timeval my_end_time; /* conflict with utils.c 33, but not found ?? */ | ||
| 234 | struct timeval last_send_time; /* time last ping was sent */ | ||
| 235 | struct timezone tz; | ||
| 236 | |||
| 237 | /* switches */ | ||
| 238 | int generate_flag = 0; /* flag for IP list generation */ | ||
| 239 | int stats_flag, unreachable_flag, alive_flag; | ||
| 240 | int elapsed_flag, version_flag, count_flag; | ||
| 241 | int name_flag, addr_flag, backoff_flag; | ||
| 242 | int multif_flag; | ||
| 243 | |||
| 244 | /*** prototypes ***/ | ||
| 245 | void add_name(char *); | ||
| 246 | void add_addr(char *, char *, struct in_addr); | ||
| 247 | char *na_cat(char *, struct in_addr); | ||
| 248 | char *cpystr(char *); | ||
| 249 | void crash(char *); | ||
| 250 | char *get_host_by_address(struct in_addr); | ||
| 251 | int in_cksum(u_short *, int); | ||
| 252 | void u_sleep(int); | ||
| 253 | int recvfrom_wto(int, char *, int, struct sockaddr *, int); | ||
| 254 | void remove_job(HOST_ENTRY *); | ||
| 255 | void send_ping(int, HOST_ENTRY *); | ||
| 256 | long timeval_diff(struct timeval *, struct timeval *); | ||
| 257 | //void usage(void); | ||
| 258 | int wait_for_reply(int); | ||
| 259 | void finish(void); | ||
| 260 | int handle_random_icmp(struct icmp *, struct sockaddr_in *); | ||
| 261 | char *sprint_tm(int); | ||
| 262 | int get_threshold(char *, threshold *); | ||
| 263 | |||
| 264 | /* common functions */ | ||
| 265 | void print_help (void); | ||
| 266 | void print_usage (void); | ||
| 267 | |||
| 268 | /*** the various exit-states */ | ||
| 269 | /*enum { | ||
| 270 | STATE_OK = 0, | 71 | STATE_OK = 0, |
| 271 | STATE_WARNING, | 72 | STATE_WARNING, |
| 272 | STATE_CRITICAL, | 73 | STATE_CRITICAL, |
| 273 | STATE_UNKNOWN, | 74 | STATE_UNKNOWN, |
| 274 | STATE_DEPENDANT, | 75 | STATE_DEPENDENT, |
| 275 | STATE_OOB | 76 | STATE_OOB |
| 276 | };*/ | ||
| 277 | |||
| 278 | /* the strings that correspond to them */ | ||
| 279 | /* | ||
| 280 | char *status_string[STATE_OOB] = { | ||
| 281 | "OK", | ||
| 282 | "WARNING", | ||
| 283 | "CRITICAL", | ||
| 284 | "UNKNOWN", | ||
| 285 | "DEPENDANT" | ||
| 286 | }; | 77 | }; |
| 287 | */ | ||
| 288 | 78 | ||
| 289 | int status = STATE_OK; | 79 | typedef unsigned short range_t; /* type for get_range() -- unimplemented */ |
| 290 | int fin_stat = STATE_OK; | 80 | |
| 81 | typedef struct rta_host { | ||
| 82 | unsigned short id; /* id in **table, and icmp pkts */ | ||
| 83 | char *name; /* arg used for adding this host */ | ||
| 84 | char *msg; /* icmp error message, if any */ | ||
| 85 | struct sockaddr_in saddr_in; /* the address of this host */ | ||
| 86 | struct in_addr error_addr; /* stores address of error replies */ | ||
| 87 | unsigned long long time_waited; /* total time waited, in usecs */ | ||
| 88 | unsigned int icmp_sent, icmp_recv, icmp_lost; /* counters */ | ||
| 89 | unsigned char icmp_type, icmp_code; /* type and code from errors */ | ||
| 90 | unsigned short flags; /* control/status flags */ | ||
| 91 | double rta; /* measured RTA */ | ||
| 92 | unsigned char pl; /* measured packet loss */ | ||
| 93 | struct rta_host *next; /* linked list */ | ||
| 94 | } rta_host; | ||
| 95 | |||
| 96 | #define FLAG_LOST_CAUSE 0x01 /* decidedly dead target. */ | ||
| 97 | |||
| 98 | /* threshold structure. all values are maximum allowed, exclusive */ | ||
| 99 | typedef struct threshold { | ||
| 100 | unsigned char pl; /* max allowed packet loss in percent */ | ||
| 101 | unsigned int rta; /* roundtrip time average, microseconds */ | ||
| 102 | } threshold; | ||
| 103 | |||
| 104 | /* the data structure */ | ||
| 105 | typedef struct icmp_ping_data { | ||
| 106 | struct timeval stime; /* timestamp (saved in protocol struct as well) */ | ||
| 107 | unsigned short ping_id; | ||
| 108 | } icmp_ping_data; | ||
| 109 | |||
| 110 | /* the different modes of this program are as follows: | ||
| 111 | * MODE_RTA: send all packets no matter what (mimic check_icmp and check_ping) | ||
| 112 | * MODE_HOSTCHECK: Return immediately upon any sign of life | ||
| 113 | * In addition, sends packets to ALL addresses assigned | ||
| 114 | * to this host (as returned by gethostbyname() or | ||
| 115 | * gethostbyaddr() and expects one host only to be checked at | ||
| 116 | * a time. Therefore, any packet response what so ever will | ||
| 117 | * count as a sign of life, even when received outside | ||
| 118 | * crit.rta limit. Do not misspell any additional IP's. | ||
| 119 | * MODE_ALL: Requires packets from ALL requested IP to return OK (default). | ||
| 120 | * MODE_ICMP: implement something similar to check_icmp (MODE_RTA without | ||
| 121 | * tcp and udp args does this) | ||
| 122 | */ | ||
| 123 | #define MODE_RTA 0 | ||
| 124 | #define MODE_HOSTCHECK 1 | ||
| 125 | #define MODE_ALL 2 | ||
| 126 | #define MODE_ICMP 3 | ||
| 127 | |||
| 128 | /* the different ping types we can do | ||
| 129 | * TODO: investigate ARP ping as well */ | ||
| 130 | #define HAVE_ICMP 1 | ||
| 131 | #define HAVE_UDP 2 | ||
| 132 | #define HAVE_TCP 4 | ||
| 133 | #define HAVE_ARP 8 | ||
| 134 | |||
| 135 | #define MIN_PING_DATA_SIZE sizeof(struct icmp_ping_data) | ||
| 136 | #define MAX_IP_PKT_SIZE 65536 /* (theoretical) max IP packet size */ | ||
| 137 | #define IP_HDR_SIZE 20 | ||
| 138 | #define MAX_PING_DATA (MAX_IP_PKT_SIZE - IP_HDR_SIZE - ICMP_MINLEN) | ||
| 139 | #define DEFAULT_PING_DATA_SIZE (MIN_PING_DATA_SIZE + 44) | ||
| 140 | |||
| 141 | /* various target states */ | ||
| 142 | #define TSTATE_INACTIVE 0x01 /* don't ping this host anymore */ | ||
| 143 | #define TSTATE_WAITING 0x02 /* unanswered packets on the wire */ | ||
| 144 | #define TSTATE_ALIVE 0x04 /* target is alive (has answered something) */ | ||
| 145 | #define TSTATE_UNREACH 0x08 | ||
| 146 | |||
| 147 | /** prototypes **/ | ||
| 148 | static void usage(unsigned char, char *); | ||
| 149 | static u_int get_timevar(const char *); | ||
| 150 | static u_int get_timevaldiff(struct timeval *, struct timeval *); | ||
| 151 | static int wait_for_reply(int, u_int); | ||
| 152 | static int recvfrom_wto(int, char *, unsigned int, struct sockaddr *, u_int *); | ||
| 153 | static int send_icmp_ping(int, struct rta_host *); | ||
| 154 | static int get_threshold(char *str, threshold *th); | ||
| 155 | static void run_checks(void); | ||
| 156 | static int add_target(char *); | ||
| 157 | static int add_target_ip(char *, struct in_addr *); | ||
| 158 | static int handle_random_icmp(struct icmp *, struct sockaddr_in *); | ||
| 159 | static unsigned short icmp_checksum(unsigned short *, int); | ||
| 160 | static void finish(int); | ||
| 161 | static void crash(const char *, ...); | ||
| 162 | |||
| 163 | /** external **/ | ||
| 164 | extern int optind, opterr, optopt; | ||
| 165 | extern char *optarg; | ||
| 166 | extern char **environ; | ||
| 167 | |||
| 168 | /** global variables **/ | ||
| 169 | static char *progname; | ||
| 170 | static struct rta_host **table, *cursor, *list; | ||
| 171 | static threshold crit = {80, 500000}, warn = {40, 200000}; | ||
| 172 | static int mode, protocols, sockets, debug = 0, timeout = 10; | ||
| 173 | static unsigned short icmp_pkt_size, icmp_data_size = DEFAULT_PING_DATA_SIZE; | ||
| 174 | static unsigned int icmp_sent = 0, icmp_recv = 0, icmp_lost = 0; | ||
| 175 | #define icmp_pkts_en_route (icmp_sent - (icmp_recv + icmp_lost)) | ||
| 176 | static unsigned short targets_down = 0, targets = 0, packets = 0; | ||
| 177 | #define targets_alive (targets - targets_down) | ||
| 178 | static unsigned int retry_interval, pkt_interval, target_interval; | ||
| 179 | static int icmp_sock, tcp_sock, udp_sock, status = STATE_OK; | ||
| 180 | static pid_t pid; | ||
| 181 | static struct timezone tz; | ||
| 182 | static struct timeval prog_start; | ||
| 183 | static unsigned long long max_completion_time = 0; | ||
| 184 | static unsigned char ttl = 0; /* outgoing ttl */ | ||
| 185 | static unsigned int warn_down = 1, crit_down = 1; /* host down threshold values */ | ||
| 186 | float pkt_backoff_factor = 1.5; | ||
| 187 | float target_backoff_factor = 1.5; | ||
| 188 | |||
| 189 | /** code start **/ | ||
| 190 | static void | ||
| 191 | crash(const char *fmt, ...) | ||
| 192 | { | ||
| 193 | va_list ap; | ||
| 194 | |||
| 195 | printf("%s: ", progname); | ||
| 196 | |||
| 197 | va_start(ap, fmt); | ||
| 198 | vprintf(fmt, ap); | ||
| 199 | va_end(ap); | ||
| 200 | |||
| 201 | if(errno) printf(": %s", strerror(errno)); | ||
| 202 | puts(""); | ||
| 291 | 203 | ||
| 292 | /***************************************************************************** | 204 | exit(3); |
| 293 | * Code block start * | 205 | } |
| 294 | *****************************************************************************/ | 206 | |
| 295 | int main(int argc, char **argv) | 207 | |
| 208 | static char * | ||
| 209 | get_icmp_error_msg(unsigned char icmp_type, unsigned char icmp_code) | ||
| 296 | { | 210 | { |
| 297 | int c; | 211 | char *msg = "unreachable"; |
| 298 | u_int lt, ht; | ||
| 299 | int advance; | ||
| 300 | struct protoent *proto; | ||
| 301 | uid_t uid; | ||
| 302 | struct host_name_list *host_ptr, *host_base_ptr; | ||
| 303 | |||
| 304 | if(strchr(argv[0], '/')) prog = strrchr(argv[0], '/') + 1; | ||
| 305 | else prog = argv[0]; | ||
| 306 | |||
| 307 | setlocale (LC_ALL, ""); | ||
| 308 | bindtextdomain (PACKAGE, LOCALEDIR); | ||
| 309 | textdomain (PACKAGE); | ||
| 310 | |||
| 311 | /* check if we are root */ | ||
| 312 | if(geteuid()) { | ||
| 313 | printf(_("Root access needed (for raw sockets)\n")); | ||
| 314 | exit(STATE_UNKNOWN); | ||
| 315 | } | ||
| 316 | 212 | ||
| 317 | /* confirm that ICMP is available on this machine */ | 213 | if(debug > 1) printf("get_icmp_error_msg(%u, %u)\n", icmp_type, icmp_code); |
| 318 | if((proto = getprotobyname("icmp")) == NULL) | 214 | switch(icmp_type) { |
| 319 | crash(_("icmp: unknown protocol")); | 215 | case ICMP_UNREACH: |
| 216 | switch(icmp_code) { | ||
| 217 | case ICMP_UNREACH_NET: msg = "Net unreachable"; break; | ||
| 218 | case ICMP_UNREACH_HOST: msg = "Host unreachable"; break; | ||
| 219 | case ICMP_UNREACH_PROTOCOL: msg = "Protocol unreachable (firewall?)"; break; | ||
| 220 | case ICMP_UNREACH_PORT: msg = "Port unreachable (firewall?)"; break; | ||
| 221 | case ICMP_UNREACH_NEEDFRAG: msg = "Fragmentation needed"; break; | ||
| 222 | case ICMP_UNREACH_SRCFAIL: msg = "Source route failed"; break; | ||
| 223 | case ICMP_UNREACH_ISOLATED: msg = "Source host isolated"; break; | ||
| 224 | case ICMP_UNREACH_NET_UNKNOWN: msg = "Unknown network"; break; | ||
| 225 | case ICMP_UNREACH_HOST_UNKNOWN: msg = "Unknown host"; break; | ||
| 226 | case ICMP_UNREACH_NET_PROHIB: msg = "Network denied (firewall?)"; break; | ||
| 227 | case ICMP_UNREACH_HOST_PROHIB: msg = "Host denied (firewall?)"; break; | ||
| 228 | case ICMP_UNREACH_TOSNET: msg = "Bad TOS for network (firewall?)"; break; | ||
| 229 | case ICMP_UNREACH_TOSHOST: msg = "Bad TOS for host (firewall?)"; break; | ||
| 230 | case ICMP_UNREACH_FILTER_PROHIB: msg = "Prohibited by filter (firewall)"; break; | ||
| 231 | case ICMP_UNREACH_HOST_PRECEDENCE: msg = "Host precedence violation"; break; | ||
| 232 | case ICMP_UNREACH_PRECEDENCE_CUTOFF: msg = "Precedence cutoff"; break; | ||
| 233 | default: msg = "Invalid code"; break; | ||
| 234 | } | ||
| 235 | break; | ||
| 320 | 236 | ||
| 321 | /* create raw socket for ICMP calls (ping) */ | 237 | case ICMP_TIMXCEED: |
| 322 | sock = socket(AF_INET, SOCK_RAW, proto->p_proto); | 238 | /* really 'out of reach', or non-existant host behind a router serving |
| 239 | * two different subnets */ | ||
| 240 | switch(icmp_code) { | ||
| 241 | case ICMP_TIMXCEED_INTRANS: msg = "Time to live exceeded in transit"; break; | ||
| 242 | case ICMP_TIMXCEED_REASS: msg = "Fragment reassembly time exceeded"; break; | ||
| 243 | default: msg = "Invalid code"; break; | ||
| 244 | } | ||
| 245 | break; | ||
| 323 | 246 | ||
| 324 | if(sock < 0) | 247 | case ICMP_SOURCEQUENCH: msg = "Transmitting too fast"; break; |
| 325 | crash(_("Can't create raw socket")); | 248 | case ICMP_REDIRECT: msg = "Redirect (change route)"; break; |
| 249 | case ICMP_PARAMPROB: msg = "Bad IP header (required option absent)"; break; | ||
| 326 | 250 | ||
| 327 | /* drop privileges now that we have the socket */ | 251 | /* the following aren't error messages, so ignore */ |
| 328 | if((uid = getuid())) { | 252 | case ICMP_TSTAMP: |
| 329 | seteuid(uid); | 253 | case ICMP_TSTAMPREPLY: |
| 254 | case ICMP_IREQ: | ||
| 255 | case ICMP_IREQREPLY: | ||
| 256 | case ICMP_MASKREQ: | ||
| 257 | case ICMP_MASKREPLY: | ||
| 258 | default: msg = ""; break; | ||
| 330 | } | 259 | } |
| 331 | |||
| 332 | if(argc < 2) print_usage(); | ||
| 333 | 260 | ||
| 334 | ident = getpid() & 0xFFFF; | 261 | return msg; |
| 262 | } | ||
| 263 | |||
| 264 | static int | ||
| 265 | handle_random_icmp(struct icmp *p, struct sockaddr_in *addr) | ||
| 266 | { | ||
| 267 | struct icmp *sent_icmp = NULL; | ||
| 268 | struct rta_host *host = NULL; | ||
| 269 | unsigned char *ptr; | ||
| 335 | 270 | ||
| 336 | if(!(host_base_ptr = malloc(sizeof(struct host_name_list)))) { | 271 | if(p->icmp_type == ICMP_ECHO && p->icmp_id == pid) { |
| 337 | crash(_("Unable to allocate memory for host name list\n")); | 272 | /* echo request from us to us (pinging localhost) */ |
| 273 | return 0; | ||
| 338 | } | 274 | } |
| 339 | host_ptr = host_base_ptr; | ||
| 340 | |||
| 341 | backoff_flag = 0; | ||
| 342 | opterr = 1; | ||
| 343 | |||
| 344 | /* get command line options | ||
| 345 | * -H denotes a host (actually ignored and picked up later) | ||
| 346 | * -h for help | ||
| 347 | * -V or -v for version | ||
| 348 | * -d to display hostnames rather than addresses | ||
| 349 | * -t sets timeout for packets and tcp connects | ||
| 350 | * -r defines retries (persistence) | ||
| 351 | * -p or -n sets packet count (5) | ||
| 352 | * -b sets packet size (56) | ||
| 353 | * -w sets warning threshhold (200,40%) | ||
| 354 | * -c sets critical threshhold (500,80%) | ||
| 355 | * -i sets interval for both packet transmissions and connect attempts | ||
| 356 | */ | ||
| 357 | #define OPT_STR "amH:hvVDdAp:n:b:r:t:i:w:c:" | ||
| 358 | while((c = getopt(argc, argv, OPT_STR)) != EOF) { | ||
| 359 | switch (c) { | ||
| 360 | case 'H': | ||
| 361 | if(!(host_ptr->entry = malloc(strlen(optarg) + 1))) { | ||
| 362 | crash(_("Failed to allocate memory for hostname")); | ||
| 363 | } | ||
| 364 | memset(host_ptr->entry, 0, strlen(optarg) + 1); | ||
| 365 | host_ptr->entry = memcpy(host_ptr->entry, optarg, strlen(optarg)); | ||
| 366 | if(!(host_ptr->next = malloc(sizeof(struct host_name_list)))) | ||
| 367 | crash(_("Failed to allocate memory for hostname")); | ||
| 368 | host_ptr = host_ptr->next; | ||
| 369 | host_ptr->next = NULL; | ||
| 370 | // add_name(optarg); | ||
| 371 | break; | ||
| 372 | /* this is recognized, but silently ignored. | ||
| 373 | * host(s) are added later on */ | ||
| 374 | 275 | ||
| 375 | break; | 276 | ptr = (unsigned char *)p; |
| 376 | case 'w': | 277 | if(debug) printf("handle_random_icmp(%p, %p)\n", (void *)p, (void *)addr); |
| 377 | if(get_threshold(optarg, &warn)) { | 278 | |
| 378 | printf(_("Illegal threshold pair specified for -%c"), c); | 279 | /* only handle a few types, since others can't possibly be replies to |
| 379 | print_usage(); | 280 | * us in a sane network (if it is anyway, it will be counted as lost |
| 380 | } | 281 | * at summary time, but not as quickly as a proper response */ |
| 381 | break; | 282 | /* TIMXCEED can be an unreach from a router with multiple IP's which |
| 283 | * serves two different subnets on the same interface and a dead host | ||
| 284 | * on one net is pinged from the other. The router will respond to | ||
| 285 | * itself and thus set TTL=0 so as to not loop forever. Even when | ||
| 286 | * TIMXCEED actually sends a proper icmp response we will have passed | ||
| 287 | * too many hops to have a hope of reaching it later, in which case it | ||
| 288 | * indicates overconfidence in the network, poor routing or both. */ | ||
| 289 | if(p->icmp_type != ICMP_UNREACH && p->icmp_type != ICMP_TIMXCEED && | ||
| 290 | p->icmp_type != ICMP_SOURCEQUENCH && p->icmp_type != ICMP_PARAMPROB) | ||
| 291 | { | ||
| 292 | return 0; | ||
| 293 | } | ||
| 382 | 294 | ||
| 383 | case 'c': | 295 | /* might be for us. At least it holds the original package (according |
| 384 | if(get_threshold(optarg, &crit)) { | 296 | * to RFC 792). If it isn't, just ignore it */ |
| 385 | printf(_("Illegal threshold pair specified for -%c"), c); | 297 | sent_icmp = (struct icmp *)(ptr + 28); |
| 386 | print_usage(); | 298 | if(sent_icmp->icmp_type != ICMP_ECHO || sent_icmp->icmp_id != pid || |
| 387 | } | 299 | sent_icmp->icmp_seq >= targets) |
| 388 | break; | 300 | { |
| 301 | if(debug) printf("Packet is no response to a packet we sent\n"); | ||
| 302 | return 0; | ||
| 303 | } | ||
| 389 | 304 | ||
| 390 | case 't': | 305 | /* it is indeed a response for us */ |
| 391 | if(!(timeout = (u_int) strtoul(optarg, NULL, 0) * 100)) { | 306 | host = table[sent_icmp->icmp_seq]; |
| 392 | printf(_("Option -%c requires integer argument\n"), c); | 307 | if(debug) { |
| 393 | print_usage(); | 308 | printf("Received \"%s\" from %s for ICMP ECHO sent to %s.\n", |
| 394 | } | 309 | get_icmp_error_msg(p->icmp_type, p->icmp_code), |
| 395 | break; | 310 | inet_ntoa(addr->sin_addr), host->name); |
| 311 | } | ||
| 396 | 312 | ||
| 397 | case 'r': | 313 | icmp_lost++; |
| 398 | if(!(retry = (u_int) strtoul(optarg, NULL, 0))) { | 314 | host->icmp_lost++; |
| 399 | printf(_("Option -%c requires integer argument\n"), c); | 315 | /* don't spend time on lost hosts any more */ |
| 400 | print_usage(); | 316 | if(host->flags & FLAG_LOST_CAUSE) return 0; |
| 401 | } | ||
| 402 | break; | ||
| 403 | 317 | ||
| 404 | case 'i': | 318 | /* source quench means we're sending too fast, so increase the |
| 405 | if(!(interval = (u_int) strtoul(optarg, NULL, 0) * 100)) { | 319 | * interval and mark this packet lost */ |
| 406 | printf(_("Option -%c requires positive non-zero integer argument\n"), c); | 320 | if(p->icmp_type == ICMP_SOURCEQUENCH) { |
| 407 | print_usage(); | 321 | pkt_interval *= pkt_backoff_factor; |
| 408 | } | 322 | target_interval *= target_backoff_factor; |
| 409 | break; | 323 | } |
| 324 | else { | ||
| 325 | targets_down++; | ||
| 326 | host->flags |= FLAG_LOST_CAUSE; | ||
| 327 | } | ||
| 328 | host->icmp_type = p->icmp_type; | ||
| 329 | host->icmp_code = p->icmp_code; | ||
| 330 | host->error_addr.s_addr = addr->sin_addr.s_addr; | ||
| 410 | 331 | ||
| 411 | case 'p': | 332 | return 0; |
| 412 | case 'n': | 333 | } |
| 413 | if(!(count = (u_int) strtoul(optarg, NULL, 0))) { | ||
| 414 | printf(_("Option -%c requires positive non-zero integer argument\n"), c); | ||
| 415 | print_usage(); | ||
| 416 | } | ||
| 417 | break; | ||
| 418 | 334 | ||
| 335 | int | ||
| 336 | main(int argc, char **argv) | ||
| 337 | { | ||
| 338 | int i; | ||
| 339 | char *ptr; | ||
| 340 | long int arg; | ||
| 341 | int icmp_sockerrno, udp_sockerrno, tcp_sockerrno; | ||
| 342 | int result; | ||
| 343 | struct rta_host *host; | ||
| 344 | |||
| 345 | /* we only need to be setsuid when we get the sockets, so do | ||
| 346 | * that before pointer magic (esp. on network data) */ | ||
| 347 | icmp_sockerrno = udp_sockerrno = tcp_sockerrno = sockets = 0; | ||
| 348 | |||
| 349 | if((icmp_sock = socket(PF_INET, SOCK_RAW, IPPROTO_ICMP)) != -1) | ||
| 350 | sockets |= HAVE_ICMP; | ||
| 351 | else icmp_sockerrno = errno; | ||
| 352 | |||
| 353 | /* if((udp_sock = socket(PF_INET, SOCK_DGRAM, IPPROTO_UDP)) != -1) */ | ||
| 354 | /* sockets |= HAVE_UDP; */ | ||
| 355 | /* else udp_sockerrno = errno; */ | ||
| 356 | |||
| 357 | /* if((tcp_sock = socket(PF_INET, SOCK_STREAM, IPPROTO_TCP)) != -1) */ | ||
| 358 | /* sockets |= HAVE_TCP; */ | ||
| 359 | /* else tcp_sockerrno = errno; */ | ||
| 360 | |||
| 361 | /* now drop privileges (no effect if not setsuid or geteuid() == 0) */ | ||
| 362 | setuid(getuid()); | ||
| 363 | |||
| 364 | /* POSIXLY_CORRECT might break things, so unset it (the portable way) */ | ||
| 365 | environ = NULL; | ||
| 366 | |||
| 367 | /* use the pid to mark packets as ours */ | ||
| 368 | pid = getpid(); | ||
| 369 | /* printf("pid = %u\n", pid); */ | ||
| 370 | |||
| 371 | /* get calling name the old-fashioned way for portability instead | ||
| 372 | * of relying on the glibc-ism __progname */ | ||
| 373 | ptr = strrchr(argv[0], '/'); | ||
| 374 | if(ptr) progname = &ptr[1]; | ||
| 375 | else progname = argv[0]; | ||
| 376 | |||
| 377 | /* now set defaults. Use progname to set them initially (allows for | ||
| 378 | * superfast check_host program when target host is up */ | ||
| 379 | cursor = list = NULL; | ||
| 380 | table = NULL; | ||
| 381 | |||
| 382 | mode = MODE_RTA; | ||
| 383 | crit.rta = 500000; | ||
| 384 | crit.pl = 80; | ||
| 385 | warn.rta = 200000; | ||
| 386 | warn.pl = 40; | ||
| 387 | protocols = HAVE_ICMP | HAVE_UDP | HAVE_TCP; | ||
| 388 | pkt_interval = 80000; /* 80 msec packet interval by default */ | ||
| 389 | packets = 5; | ||
| 390 | |||
| 391 | if(!strcmp(progname, "check_icmp") || !strcmp(progname, "check_ping")) { | ||
| 392 | mode = MODE_ICMP; | ||
| 393 | protocols = HAVE_ICMP; | ||
| 394 | } | ||
| 395 | else if(!strcmp(progname, "check_host")) { | ||
| 396 | mode = MODE_HOSTCHECK; | ||
| 397 | pkt_interval = 1000000; | ||
| 398 | packets = 5; | ||
| 399 | crit.rta = warn.rta = 1000000; | ||
| 400 | crit.pl = warn.pl = 100; | ||
| 401 | } | ||
| 402 | else if(!strcmp(progname, "check_rta_multi")) { | ||
| 403 | mode = MODE_ALL; | ||
| 404 | target_interval = 0; | ||
| 405 | pkt_interval = 50000; | ||
| 406 | packets = 5; | ||
| 407 | } | ||
| 408 | |||
| 409 | /* parse the arguments */ | ||
| 410 | for(i = 1; i < argc; i++) { | ||
| 411 | while((arg = getopt(argc, argv, "vhVw:c:n:p:t:H:i:b:I:l:")) != EOF) { | ||
| 412 | switch(arg) { | ||
| 413 | case 'v': | ||
| 414 | debug++; | ||
| 415 | break; | ||
| 419 | case 'b': | 416 | case 'b': |
| 420 | if(!(ping_data_size = (u_int) strtoul(optarg, NULL, 0))) { | 417 | /* silently ignored for now */ |
| 421 | printf(_("Option -%c requires integer argument\n"), c); | ||
| 422 | print_usage(); | ||
| 423 | } | ||
| 424 | break; | 418 | break; |
| 425 | 419 | case 'i': | |
| 426 | case 'h': | 420 | pkt_interval = get_timevar(optarg); |
| 427 | print_usage(); | ||
| 428 | break; | 421 | break; |
| 429 | 422 | case 'I': | |
| 430 | case 'e': | 423 | target_interval = get_timevar(optarg); |
| 431 | elapsed_flag = 1; | ||
| 432 | break; | 424 | break; |
| 433 | 425 | case 'w': | |
| 434 | case 'm': | 426 | get_threshold(optarg, &warn); |
| 435 | multif_flag = 1; | ||
| 436 | break; | 427 | break; |
| 437 | 428 | case 'c': | |
| 438 | case 'd': | 429 | get_threshold(optarg, &crit); |
| 439 | name_flag = 1; | ||
| 440 | break; | 430 | break; |
| 441 | 431 | case 'n': | |
| 442 | case 'A': | 432 | case 'p': |
| 443 | addr_flag = 1; | 433 | packets = strtoul(optarg, NULL, 0); |
| 444 | break; | 434 | break; |
| 445 | 435 | case 't': | |
| 446 | case 's': | 436 | timeout = strtoul(optarg, NULL, 0); |
| 447 | stats_flag = 1; | 437 | if(!timeout) timeout = 10; |
| 448 | break; | 438 | break; |
| 449 | 439 | case 'H': | |
| 450 | case 'u': | 440 | add_target(optarg); |
| 451 | unreachable_flag = 1; | ||
| 452 | break; | 441 | break; |
| 453 | 442 | case 'l': | |
| 454 | case 'a': | 443 | ttl = (unsigned char)strtoul(optarg, NULL, 0); |
| 455 | alive_flag = 1; | ||
| 456 | break; | 444 | break; |
| 457 | 445 | case 'd': /* implement later, for cluster checks */ | |
| 458 | case 'v': | 446 | warn_down = (unsigned char)strtoul(optarg, &ptr, 0); |
| 459 | printf("%s: Version %s $Date$\n", prog, VERSION); | 447 | if(ptr) { |
| 460 | printf("%s: comments to %s\n", prog, email); | 448 | crit_down = (unsigned char)strtoul(ptr + 1, NULL, 0); |
| 461 | exit(STATE_OK); | 449 | } |
| 462 | |||
| 463 | case 'g': | ||
| 464 | /* use IP list generation */ | ||
| 465 | /* mutex with file input or command line targets */ | ||
| 466 | generate_flag = 1; | ||
| 467 | break; | 450 | break; |
| 468 | 451 | case 'h': case 'V': default: | |
| 469 | default: | 452 | usage(arg, NULL); |
| 470 | printf(_("Option flag -%c specified, but not recognized\n"), c); | ||
| 471 | print_usage(); | ||
| 472 | break; | 453 | break; |
| 454 | } | ||
| 473 | } | 455 | } |
| 474 | } | 456 | } |
| 475 | 457 | ||
| 476 | /* arguments are parsed, so now we validate them */ | 458 | argv = &argv[optind]; |
| 477 | 459 | while(*argv) { | |
| 478 | if(count > 1) count_flag = 1; | 460 | add_target(*argv); |
| 479 | 461 | argv++; | |
| 480 | /* set threshold values to 10usec units (inherited from fping.c) */ | ||
| 481 | crit.rta = crit.rta / 10; | ||
| 482 | warn.rta = warn.rta / 10; | ||
| 483 | select_time = crit.rta; | ||
| 484 | /* this isn't critical, but will most likely not be what the user expects | ||
| 485 | * so we tell him/her about it, but keep running anyways */ | ||
| 486 | if(warn.pl > crit.pl || warn.rta > crit.rta) { | ||
| 487 | select_time = warn.rta; | ||
| 488 | printf("(WARNING threshold > CRITICAL threshold) :: "); | ||
| 489 | fflush(stdout); | ||
| 490 | } | 462 | } |
| 491 | 463 | if(!targets) { | |
| 492 | /* A timeout smaller than maximum rta threshold makes no sense */ | 464 | errno = 0; |
| 493 | if(timeout < crit.rta) timeout = crit.rta; | 465 | crash("No hosts to check"); |
| 494 | else if(timeout < warn.rta) timeout = warn.rta; | 466 | exit(3); |
| 495 | |||
| 496 | if((interval < MIN_INTERVAL * 100 || retry > MAX_RETRY) && getuid()) { | ||
| 497 | printf(_("%s: these options are too risky for mere mortals.\n"), prog); | ||
| 498 | printf(_("%s: You need i >= %u and r < %u\n"), | ||
| 499 | prog, MIN_INTERVAL, MAX_RETRY); | ||
| 500 | printf(_("Current settings; i = %d, r = %d\n"), | ||
| 501 | interval / 100, retry); | ||
| 502 | print_usage(); | ||
| 503 | } | 467 | } |
| 504 | 468 | ||
| 505 | if((ping_data_size > MAX_PING_DATA) || (ping_data_size < MIN_PING_DATA)) { | 469 | if(!sockets) { |
| 506 | printf(_("%s: data size %u not valid, must be between %u and %u\n"), | 470 | if(icmp_sock == -1) { |
| 507 | prog, ping_data_size, MIN_PING_DATA, MAX_PING_DATA); | 471 | errno = icmp_sockerrno; |
| 508 | print_usage(); | 472 | crash("Failed to obtain ICMP socket"); |
| 509 | 473 | return -1; | |
| 474 | } | ||
| 475 | /* if(udp_sock == -1) { */ | ||
| 476 | /* errno = icmp_sockerrno; */ | ||
| 477 | /* crash("Failed to obtain UDP socket"); */ | ||
| 478 | /* return -1; */ | ||
| 479 | /* } */ | ||
| 480 | /* if(tcp_sock == -1) { */ | ||
| 481 | /* errno = icmp_sockerrno; */ | ||
| 482 | /* crash("Failed to obtain TCP socker"); */ | ||
| 483 | /* return -1; */ | ||
| 484 | /* } */ | ||
| 510 | } | 485 | } |
| 486 | if(!ttl) ttl = 64; | ||
| 511 | 487 | ||
| 512 | if((backoff > MAX_BACKOFF_FACTOR) || (backoff < MIN_BACKOFF_FACTOR)) { | 488 | if(icmp_sock) { |
| 513 | printf(_("%s: backoff factor %.1f not valid, must be between %.1f and %.1f\n"), | 489 | result = setsockopt(icmp_sock, SOL_IP, IP_TTL, &ttl, sizeof(ttl)); |
| 514 | prog, backoff, MIN_BACKOFF_FACTOR, MAX_BACKOFF_FACTOR); | 490 | if(debug) { |
| 515 | print_usage(); | 491 | if(result == -1) printf("setsockopt failed\n"); |
| 516 | 492 | else printf("ttl set to %u\n", ttl); | |
| 493 | } | ||
| 517 | } | 494 | } |
| 518 | 495 | ||
| 519 | if(count > MAX_COUNT) { | 496 | /* stupid users should be able to give whatever thresholds they want |
| 520 | printf(_("%s: count %u not valid, must be less than %u\n"), | 497 | * (nothing will break if they do), but some anal plugin maintainer |
| 521 | prog, count, MAX_COUNT); | 498 | * will probably add some printf() thing here later, so it might be |
| 522 | print_usage(); | 499 | * best to at least show them where to do it. ;) */ |
| 500 | if(warn.pl > crit.pl) warn.pl = crit.pl; | ||
| 501 | if(warn.rta > crit.rta) warn.rta = crit.rta; | ||
| 502 | if(warn_down > crit_down) crit_down = warn_down; | ||
| 503 | |||
| 504 | signal(SIGINT, finish); | ||
| 505 | signal(SIGHUP, finish); | ||
| 506 | signal(SIGTERM, finish); | ||
| 507 | signal(SIGALRM, finish); | ||
| 508 | if(debug) printf("Setting alarm timeout to %u seconds\n", timeout); | ||
| 509 | alarm(timeout); | ||
| 510 | |||
| 511 | /* make sure we don't wait any longer than necessary */ | ||
| 512 | gettimeofday(&prog_start, &tz); | ||
| 513 | max_completion_time = | ||
| 514 | ((targets * packets * pkt_interval) + (targets * target_interval)) + | ||
| 515 | (targets * packets * crit.rta) + crit.rta; | ||
| 516 | |||
| 517 | if(debug) { | ||
| 518 | printf("packets: %u, targets: %u\n" | ||
| 519 | "target_interval: %0.3f, pkt_interval %0.3f\n" | ||
| 520 | "crit.rta: %0.3f\n" | ||
| 521 | "max_completion_time: %0.3f\n", | ||
| 522 | packets, targets, | ||
| 523 | (float)target_interval / 1000, (float)pkt_interval / 1000, | ||
| 524 | (float)crit.rta / 1000, | ||
| 525 | (float)max_completion_time / 1000); | ||
| 523 | } | 526 | } |
| 524 | 527 | ||
| 525 | if(count_flag) { | 528 | if(debug) { |
| 526 | alive_flag = unreachable_flag = 0; | 529 | if(max_completion_time > (u_int)timeout * 1000000) { |
| 530 | printf("max_completion_time: %llu timeout: %u\n", | ||
| 531 | max_completion_time, timeout); | ||
| 532 | printf("Timout must be at lest %llu\n", | ||
| 533 | max_completion_time / 1000000 + 1); | ||
| 534 | } | ||
| 527 | } | 535 | } |
| 528 | 536 | ||
| 529 | trials = (count > retry + 1) ? count : retry + 1; | 537 | icmp_pkt_size = icmp_data_size + ICMP_MINLEN; |
| 530 | 538 | if(debug > 2) printf("icmp_pkt_size = %u\n", icmp_pkt_size); | |
| 531 | /* handle host names supplied on command line or in a file */ | 539 | if(icmp_pkt_size < sizeof(struct icmp) + sizeof(struct icmp_ping_data)) { |
| 532 | /* if the generate_flag is on, then generate the IP list */ | 540 | icmp_pkt_size = sizeof(struct icmp) + sizeof(struct icmp_ping_data); |
| 533 | argv = &argv[optind]; | ||
| 534 | |||
| 535 | /* cover allowable conditions */ | ||
| 536 | |||
| 537 | /* generate requires command line parameters beyond the switches */ | ||
| 538 | if(generate_flag && !*argv) { | ||
| 539 | printf(_("Generate flag requires command line parameters beyond switches\n")); | ||
| 540 | print_usage(); | ||
| 541 | } | 541 | } |
| 542 | 542 | if(debug > 2) printf("icmp_pkt_size = %u\n", icmp_pkt_size); | |
| 543 | if(*argv && !generate_flag) { | 543 | |
| 544 | while(*argv) { | 544 | if(debug) { |
| 545 | if(!(host_ptr->entry = malloc(strlen(*argv) + 1))) { | 545 | printf("crit = {%u, %u%%}, warn = {%u, %u%%}\n", |
| 546 | crash(_("Failed to allocate memory for hostname")); | 546 | crit.rta, crit.pl, warn.rta, warn.pl); |
| 547 | } | 547 | printf("pkt_interval: %u target_interval: %u retry_interval: %u\n", |
| 548 | memset(host_ptr->entry, 0, strlen(*argv) + 1); | 548 | pkt_interval, target_interval, retry_interval); |
| 549 | host_ptr->entry = memcpy(host_ptr->entry, *argv, strlen(*argv)); | 549 | printf("icmp_pkt_size: %u timeout: %u\n", |
| 550 | if(!(host_ptr->next = malloc(sizeof(struct host_name_list)))) | 550 | icmp_pkt_size, timeout); |
| 551 | crash(_("Failed to allocate memory for hostname")); | ||
| 552 | host_ptr = host_ptr->next; | ||
| 553 | host_ptr->next = NULL; | ||
| 554 | |||
| 555 | // add_name(*argv); | ||
| 556 | argv++; | ||
| 557 | } | ||
| 558 | } | 551 | } |
| 559 | 552 | ||
| 560 | // now add all the hosts | 553 | if(packets > 20) { |
| 561 | host_ptr = host_base_ptr; | 554 | errno = 0; |
| 562 | while(host_ptr->next) { | 555 | crash("packets is > 20 (%d)", packets); |
| 563 | add_name(host_ptr->entry); | ||
| 564 | host_ptr = host_ptr->next; | ||
| 565 | } | 556 | } |
| 566 | 557 | ||
| 567 | if(!num_hosts) { | 558 | host = list; |
| 568 | printf(_("No hosts to work with!\n\n")); | 559 | table = malloc(sizeof(struct rta_host **) * (argc - 1)); |
| 569 | print_usage(); | 560 | i = 0; |
| 561 | while(host) { | ||
| 562 | host->id = i; | ||
| 563 | table[i] = host; | ||
| 564 | host = host->next; | ||
| 565 | i++; | ||
| 570 | } | 566 | } |
| 571 | 567 | ||
| 572 | /* allocate array to hold outstanding ping requests */ | 568 | run_checks(); |
| 573 | table = (HOST_ENTRY **) malloc(sizeof(HOST_ENTRY *) * num_hosts); | ||
| 574 | if(!table) crash(_("Can't malloc array of hosts")); | ||
| 575 | |||
| 576 | cursor = rrlist; | ||
| 577 | |||
| 578 | for(num_jobs = 0; num_jobs < num_hosts; num_jobs++) { | ||
| 579 | table[num_jobs] = cursor; | ||
| 580 | cursor->i = num_jobs; | ||
| 581 | |||
| 582 | cursor = cursor->next; | ||
| 583 | } /* FOR */ | ||
| 584 | 569 | ||
| 585 | ping_pkt_size = ping_data_size + SIZE_ICMP_HDR; | 570 | errno = 0; |
| 571 | finish(0); | ||
| 586 | 572 | ||
| 587 | signal(SIGINT, (void *)finish); | 573 | return(0); |
| 588 | 574 | } | |
| 589 | gettimeofday(&my_start_time, &tz); | ||
| 590 | current_time = my_start_time; | ||
| 591 | |||
| 592 | last_send_time.tv_sec = current_time.tv_sec - 10000; | ||
| 593 | |||
| 594 | cursor = rrlist; | ||
| 595 | advance = 0; | ||
| 596 | |||
| 597 | /* main loop */ | ||
| 598 | while(num_jobs) { | ||
| 599 | /* fetch all packets that receive within time boundaries */ | ||
| 600 | while(num_pingsent && | ||
| 601 | cursor && | ||
| 602 | cursor->num_sent > cursor->num_recv && | ||
| 603 | wait_for_reply(sock)) ; | ||
| 604 | |||
| 605 | if(cursor && advance) { | ||
| 606 | cursor = cursor->next; | ||
| 607 | } | ||
| 608 | |||
| 609 | gettimeofday(¤t_time, &tz); | ||
| 610 | lt = timeval_diff(¤t_time, &last_send_time); | ||
| 611 | ht = timeval_diff(¤t_time, &cursor->last_send_time); | ||
| 612 | |||
| 613 | advance = 1; | ||
| 614 | |||
| 615 | /* if it's OK to send while counting or looping or starting */ | ||
| 616 | if(lt > interval) { | ||
| 617 | /* send if starting or looping */ | ||
| 618 | if((cursor->num_sent == 0)) { | ||
| 619 | send_ping(sock, cursor); | ||
| 620 | continue; | ||
| 621 | } /* IF */ | ||
| 622 | |||
| 623 | /* send if counting and count not exceeded */ | ||
| 624 | if(count_flag) { | ||
| 625 | if(cursor->num_sent < count) { | ||
| 626 | send_ping(sock, cursor); | ||
| 627 | continue; | ||
| 628 | } /* IF */ | ||
| 629 | } /* IF */ | ||
| 630 | } /* IF */ | ||
| 631 | |||
| 632 | /* is-it-alive mode, and timeout exceeded while waiting for a reply */ | ||
| 633 | /* and we haven't exceeded our retries */ | ||
| 634 | if((lt > interval) && !count_flag && !cursor->num_recv && | ||
| 635 | (ht > timeout) && (cursor->waiting < retry + 1)) { | ||
| 636 | num_timeout++; | ||
| 637 | |||
| 638 | /* try again */ | ||
| 639 | send_ping(sock, cursor); | ||
| 640 | continue; | ||
| 641 | } /* IF */ | ||
| 642 | |||
| 643 | /* didn't send, can we remove? */ | ||
| 644 | |||
| 645 | /* remove if counting and count exceeded */ | ||
| 646 | if(count_flag) { | ||
| 647 | if((cursor->num_sent >= count)) { | ||
| 648 | remove_job(cursor); | ||
| 649 | continue; | ||
| 650 | } /* IF */ | ||
| 651 | } /* IF */ | ||
| 652 | else { | ||
| 653 | /* normal mode, and we got one */ | ||
| 654 | if(cursor->num_recv) { | ||
| 655 | remove_job(cursor); | ||
| 656 | continue; | ||
| 657 | } /* IF */ | ||
| 658 | 575 | ||
| 659 | /* normal mode, and timeout exceeded while waiting for a reply */ | 576 | static void |
| 660 | /* and we've run out of retries, so node is unreachable */ | 577 | run_checks() |
| 661 | if((ht > timeout) && (cursor->waiting >= retry + 1)) { | 578 | { |
| 662 | num_timeout++; | 579 | u_int i, t, result; |
| 663 | remove_job(cursor); | 580 | u_int final_wait, time_passed; |
| 581 | |||
| 582 | /* this loop might actually violate the pkt_interval or target_interval | ||
| 583 | * settings, but only if there aren't any packets on the wire which | ||
| 584 | * indicates that the target can handle an increased packet rate */ | ||
| 585 | for(i = 0; i < packets; i++) { | ||
| 586 | for(t = 0; t < targets; t++) { | ||
| 587 | /* don't send useless packets */ | ||
| 588 | if(!targets_alive) finish(0); | ||
| 589 | if(table[t]->flags & FLAG_LOST_CAUSE) { | ||
| 590 | if(debug) printf("%s is a lost cause. not sending any more\n", | ||
| 591 | table[t]->name); | ||
| 664 | continue; | 592 | continue; |
| 593 | } | ||
| 594 | |||
| 595 | /* we're still in the game, so send next packet */ | ||
| 596 | (void)send_icmp_ping(icmp_sock, table[t]); | ||
| 597 | result = wait_for_reply(icmp_sock, target_interval); | ||
| 598 | } | ||
| 599 | result = wait_for_reply(icmp_sock, pkt_interval * targets); | ||
| 600 | } | ||
| 665 | 601 | ||
| 666 | } /* IF */ | 602 | if(icmp_pkts_en_route && targets_alive) { |
| 667 | } /* ELSE */ | 603 | time_passed = get_timevaldiff(NULL, NULL); |
| 604 | final_wait = max_completion_time - time_passed; | ||
| 668 | 605 | ||
| 669 | /* could send to this host, so keep considering it */ | 606 | if(debug) { |
| 670 | if(ht > interval) { | 607 | printf("time_passed: %u final_wait: %u max_completion_time: %llu\n", |
| 671 | advance = 0; | 608 | time_passed, final_wait, max_completion_time); |
| 609 | } | ||
| 610 | if(time_passed > max_completion_time) { | ||
| 611 | if(debug) printf("Time passed. Finishing up\n"); | ||
| 612 | finish(0); | ||
| 672 | } | 613 | } |
| 673 | } /* WHILE */ | ||
| 674 | 614 | ||
| 675 | finish(); | 615 | /* catch the packets that might come in within the timeframe, but |
| 676 | return 0; | 616 | * haven't yet */ |
| 677 | } /* main() */ | 617 | if(debug) printf("Waiting for %u micro-seconds (%0.3f msecs)\n", |
| 618 | final_wait, (float)final_wait / 1000); | ||
| 619 | result = wait_for_reply(icmp_sock, final_wait); | ||
| 620 | } | ||
| 621 | } | ||
| 678 | 622 | ||
| 679 | /************************************************************ | 623 | /* response structure: |
| 680 | * Description: | 624 | * ip header : 20 bytes |
| 681 | * | 625 | * icmp header : 28 bytes |
| 682 | * Main program clean up and exit point | 626 | * icmp echo reply : the rest |
| 683 | ************************************************************/ | 627 | */ |
| 684 | void finish() | 628 | static int |
| 629 | wait_for_reply(int sock, u_int t) | ||
| 685 | { | 630 | { |
| 686 | int i; | 631 | int n, hlen; |
| 687 | HOST_ENTRY *h; | 632 | static char buf[4096]; |
| 688 | 633 | struct sockaddr_in resp_addr; | |
| 689 | gettimeofday(&my_end_time, &tz); | 634 | struct ip *ip; |
| 690 | 635 | struct icmp *icp, *sent_icmp; | |
| 691 | /* tot up unreachables */ | 636 | struct rta_host *host; |
| 692 | for(i=0; i<num_hosts; i++) { | 637 | struct icmp_ping_data *data; |
| 693 | h = table[i]; | 638 | struct timeval wait_start, now; |
| 694 | 639 | u_int tdiff, i, per_pkt_wait; | |
| 695 | if(!h->num_recv) { | 640 | |
| 696 | num_unreachable++; | 641 | /* if we can't listen or don't have anything to listen to, just return */ |
| 697 | status = fin_stat = STATE_CRITICAL; | 642 | if(!t || !icmp_pkts_en_route) return 0; |
| 698 | if(num_hosts == 1) { | 643 | |
| 699 | printf("CRITICAL - %s is down (lost 100%%)|" | 644 | gettimeofday(&wait_start, &tz); |
| 700 | "rta=;%d;%d;; pl=100%%;%d;%d;;\n", | 645 | |
| 701 | h->host, | 646 | i = t; |
| 702 | warn.rta / 100, crit.rta / 100, | 647 | per_pkt_wait = t / icmp_pkts_en_route; |
| 703 | warn.pl, crit.pl); | 648 | while(icmp_pkts_en_route && get_timevaldiff(&wait_start, NULL) < i) { |
| 704 | } | 649 | t = per_pkt_wait; |
| 705 | else { | 650 | |
| 706 | printf(_("%s is down (lost 100%%)"), h->host); | 651 | /* wrap up if all targets are declared dead */ |
| 707 | } | 652 | if(!targets_alive || |
| 653 | get_timevaldiff(&prog_start, NULL) >= max_completion_time || | ||
| 654 | (mode == MODE_HOSTCHECK && targets_down)) | ||
| 655 | { | ||
| 656 | finish(0); | ||
| 708 | } | 657 | } |
| 709 | else { | ||
| 710 | /* reset the status */ | ||
| 711 | status = STATE_OK; | ||
| 712 | 658 | ||
| 713 | /* check for warning before critical, for debugging purposes */ | 659 | /* reap responses until we hit a timeout */ |
| 714 | if(warn.rta <= h->total_time / h->num_recv) { | 660 | n = recvfrom_wto(sock, buf, sizeof(buf), |
| 715 | /* printf("warn.rta exceeded\n"); | 661 | (struct sockaddr *)&resp_addr, &t); |
| 716 | */ status = STATE_WARNING; | 662 | if(!n) { |
| 717 | } | 663 | if(debug > 1) { |
| 718 | if(warn.pl <= ((h->num_sent - h->num_recv) * 100) / h->num_sent) { | 664 | printf("recvfrom_wto() timed out during a %u usecs wait\n", |
| 719 | /* printf("warn.pl exceeded (pl=%d)\n", | 665 | per_pkt_wait); |
| 720 | ((h->num_sent - h->num_recv) * 100) / h->num_sent); | ||
| 721 | */ status = STATE_WARNING; | ||
| 722 | } | ||
| 723 | if(crit.rta <= h->total_time / h->num_recv) { | ||
| 724 | /* printf("crit.rta exceeded\n"); | ||
| 725 | */ status = STATE_CRITICAL; | ||
| 726 | } | ||
| 727 | if(crit.pl <= ((h->num_sent - h->num_recv) * 100) / h->num_sent) { | ||
| 728 | /* printf("crit.pl exceeded (pl=%d)\n", | ||
| 729 | ((h->num_sent - h->num_recv) * 100) / h->num_sent); | ||
| 730 | */ status = STATE_CRITICAL; | ||
| 731 | } | 666 | } |
| 667 | continue; /* timeout for this one, so keep trying */ | ||
| 668 | } | ||
| 669 | if(n < 0) { | ||
| 670 | if(debug) printf("recvfrom_wto() returned errors\n"); | ||
| 671 | return n; | ||
| 672 | } | ||
| 732 | 673 | ||
| 733 | if(num_hosts == 1 || status != STATE_OK) { | 674 | ip = (struct ip *)buf; |
| 734 | printf("%s - %s: rta %s ms, lost %d%%", | 675 | if(debug > 1) printf("received %u bytes from %s\n", |
| 735 | state_text(status), h->host, | 676 | ntohs(ip->ip_len), inet_ntoa(resp_addr.sin_addr)); |
| 736 | sprint_tm(h->total_time / h->num_recv), | 677 | |
| 737 | h->num_sent > 0 ? ((h->num_sent - h->num_recv) * 100) / h->num_sent : 0 | 678 | /* obsolete. alpha on tru64 provides the necessary defines, but isn't broken */ |
| 738 | ); | 679 | /* #if defined( __alpha__ ) && __STDC__ && !defined( __GLIBC__ ) */ |
| 739 | /* perfdata only available for single-host stuff */ | 680 | /* alpha headers are decidedly broken. Using an ansi compiler, |
| 740 | if(num_hosts == 1) { | 681 | * they provide ip_vhl instead of ip_hl and ip_v, so we mask |
| 741 | printf("|rta=%sms;%d;%d;; pl=%d%%;%d;%d;;\n", | 682 | * off the bottom 4 bits */ |
| 742 | sprint_tm(h->total_time / h->num_recv), warn.rta / 100, crit.rta / 100, | 683 | /* hlen = (ip->ip_vhl & 0x0f) << 2; */ |
| 743 | h->num_sent > 0 ? ((h->num_sent - h->num_recv) * 100) / h->num_sent : 0, warn.pl, crit.pl | 684 | /* #else */ |
| 744 | ); | 685 | hlen = ip->ip_hl << 2; |
| 745 | } | 686 | /* #endif */ |
| 746 | else printf(" :: "); | 687 | |
| 747 | } | 688 | if(n < (hlen + ICMP_MINLEN)) { |
| 689 | crash("received packet too short for ICMP (%d bytes, expected %d) from %s\n", | ||
| 690 | n, hlen + icmp_pkt_size, inet_ntoa(resp_addr.sin_addr)); | ||
| 691 | } | ||
| 692 | /* else if(debug) { */ | ||
| 693 | /* printf("ip header size: %u, packet size: %u (expected %u, %u)\n", */ | ||
| 694 | /* hlen, ntohs(ip->ip_len) - hlen, */ | ||
| 695 | /* sizeof(struct ip), icmp_pkt_size); */ | ||
| 696 | /* } */ | ||
| 697 | |||
| 698 | /* check the response */ | ||
| 699 | icp = (struct icmp *)(buf + hlen); | ||
| 700 | sent_icmp = (struct icmp *)(buf + hlen + ICMP_MINLEN); | ||
| 701 | /* printf("buf: %p, icp: %p, distance: %u (expected %u)\n", */ | ||
| 702 | /* buf, icp, */ | ||
| 703 | /* (u_int)icp - (u_int)buf, hlen); */ | ||
| 704 | /* printf("buf: %p, sent_icmp: %p, distance: %u (expected %u)\n", */ | ||
| 705 | /* buf, sent_icmp, */ | ||
| 706 | /* (u_int)sent_icmp - (u_int)buf, hlen + ICMP_MINLEN); */ | ||
| 707 | |||
| 708 | if(icp->icmp_id != pid) { | ||
| 709 | handle_random_icmp(icp, &resp_addr); | ||
| 710 | continue; | ||
| 711 | } | ||
| 748 | 712 | ||
| 749 | /* fin_stat should always hold the WORST state */ | 713 | if(icp->icmp_type != ICMP_ECHOREPLY || icp->icmp_seq >= targets) { |
| 750 | if(fin_stat != STATE_CRITICAL && status != STATE_OK) { | 714 | if(debug > 2) printf("not a proper ICMP_ECHOREPLY\n"); |
| 751 | fin_stat = status; | 715 | handle_random_icmp(icp, &resp_addr); |
| 752 | } | 716 | continue; |
| 753 | } | 717 | } |
| 754 | } | ||
| 755 | 718 | ||
| 756 | if(num_noaddress) { | 719 | /* this is indeed a valid response */ |
| 757 | printf(_("No hostaddress specified.\n")); | 720 | data = (struct icmp_ping_data *)(icp->icmp_data); |
| 758 | print_usage(); | ||
| 759 | } | ||
| 760 | else if(num_alive != num_hosts) { | ||
| 761 | /* for future multi-check support */ | ||
| 762 | /*printf("num_alive != num_hosts (%d : %d)\n", num_alive, num_hosts);*/ | ||
| 763 | fin_stat = STATE_CRITICAL; | ||
| 764 | } | ||
| 765 | 721 | ||
| 766 | if(num_hosts > 1) { | 722 | host = table[icp->icmp_seq]; |
| 767 | if(num_alive == num_hosts) { | 723 | gettimeofday(&now, &tz); |
| 768 | printf(_("OK - All %d hosts are alive\n"), num_hosts); | 724 | tdiff = get_timevaldiff(&data->stime, &now); |
| 725 | |||
| 726 | host->time_waited += tdiff; | ||
| 727 | host->icmp_recv++; | ||
| 728 | icmp_recv++; | ||
| 729 | |||
| 730 | if(debug) { | ||
| 731 | printf("%0.3f ms rtt from %s, outgoing ttl: %u, incoming ttl: %u\n", | ||
| 732 | (float)tdiff / 1000, inet_ntoa(resp_addr.sin_addr), | ||
| 733 | ttl, ip->ip_ttl); | ||
| 769 | } | 734 | } |
| 770 | else { | 735 | |
| 771 | printf(_("CRITICAL - %d of %d hosts are alive\n"), num_alive, num_hosts); | 736 | /* if we're in hostcheck mode, exit with limited printouts */ |
| 737 | if(mode == MODE_HOSTCHECK) { | ||
| 738 | printf("OK - %s responds to ICMP. Packet %u, rta %0.3fms|" | ||
| 739 | "pkt=%u;;0;%u rta=%0.3f;%0.3f;%0.3f;;\n", | ||
| 740 | host->name, icmp_recv, (float)tdiff / 1000, | ||
| 741 | icmp_recv, packets, (float)tdiff / 1000, | ||
| 742 | (float)warn.rta / 1000, (float)crit.rta / 1000); | ||
| 743 | exit(STATE_OK); | ||
| 772 | } | 744 | } |
| 773 | } | 745 | } |
| 774 | exit(fin_stat); | ||
| 775 | } | ||
| 776 | 746 | ||
| 747 | return 0; | ||
| 748 | } | ||
| 777 | 749 | ||
| 778 | void send_ping(int lsock, HOST_ENTRY *h) | 750 | /* the ping functions */ |
| 751 | static int | ||
| 752 | send_icmp_ping(int sock, struct rta_host *host) | ||
| 779 | { | 753 | { |
| 780 | char *buffer; | 754 | static char *buf = NULL; /* re-use so we prevent leaks */ |
| 755 | long int len; | ||
| 781 | struct icmp *icp; | 756 | struct icmp *icp; |
| 782 | PING_DATA *pdp; | 757 | struct icmp_ping_data *data; |
| 783 | int n; | 758 | struct timeval tv; |
| 784 | 759 | struct sockaddr *addr; | |
| 785 | buffer = (char *)malloc((size_t) ping_pkt_size); | ||
| 786 | if(!buffer) | ||
| 787 | crash(_("Can't malloc ping packet")); | ||
| 788 | 760 | ||
| 789 | memset(buffer, 0, ping_pkt_size * sizeof(char)); | 761 | |
| 790 | icp = (struct icmp *)buffer; | 762 | if(sock == -1) { |
| 763 | errno = 0; | ||
| 764 | crash("Attempt to send on bogus socket"); | ||
| 765 | return -1; | ||
| 766 | } | ||
| 767 | addr = (struct sockaddr *)&host->saddr_in; | ||
| 768 | |||
| 769 | if(!buf) { | ||
| 770 | buf = (char *)malloc(icmp_pkt_size + sizeof(struct ip)); | ||
| 771 | if(!buf) { | ||
| 772 | crash("send_icmp_ping(): failed to malloc %d bytes for send buffer", | ||
| 773 | icmp_pkt_size); | ||
| 774 | return -1; /* might be reached if we're in debug mode */ | ||
| 775 | } | ||
| 776 | } | ||
| 777 | memset(buf, 0, icmp_pkt_size + sizeof(struct ip)); | ||
| 791 | 778 | ||
| 792 | gettimeofday(&h->last_send_time, &tz); | 779 | if((gettimeofday(&tv, &tz)) == -1) return -1; |
| 793 | 780 | ||
| 781 | icp = (struct icmp *)buf; | ||
| 794 | icp->icmp_type = ICMP_ECHO; | 782 | icp->icmp_type = ICMP_ECHO; |
| 795 | icp->icmp_code = 0; | 783 | icp->icmp_code = 0; |
| 796 | icp->icmp_cksum = 0; | 784 | icp->icmp_cksum = 0; |
| 797 | icp->icmp_seq = h->i; | 785 | icp->icmp_id = pid; |
| 798 | icp->icmp_id = ident; | 786 | icp->icmp_seq = host->id; |
| 799 | 787 | data = (struct icmp_ping_data *)icp->icmp_data; | |
| 800 | pdp = (PING_DATA *) (buffer + SIZE_ICMP_HDR); | 788 | data->ping_id = 10; /* host->icmp.icmp_sent; */ |
| 801 | pdp->ping_ts = h->last_send_time; | 789 | memcpy(&data->stime, &tv, sizeof(struct timeval)); |
| 802 | pdp->ping_count = h->num_sent; | 790 | icp->icmp_cksum = icmp_checksum((u_short *)icp, icmp_pkt_size); |
| 803 | 791 | ||
| 804 | icp->icmp_cksum = in_cksum((u_short *) icp, ping_pkt_size); | 792 | len = sendto(sock, buf, icmp_pkt_size, 0, (struct sockaddr *)addr, |
| 805 | 793 | sizeof(struct sockaddr)); | |
| 806 | n = sendto(lsock, buffer, ping_pkt_size, 0, | 794 | |
| 807 | (struct sockaddr *)&h->saddr, sizeof(struct sockaddr_in)); | 795 | if(len < 0 || (unsigned int)len != icmp_pkt_size) { |
| 808 | 796 | if(debug) printf("Failed to send ping to %s\n", | |
| 809 | if(n < 0 || (unsigned int)n != ping_pkt_size) { | 797 | inet_ntoa(host->saddr_in.sin_addr)); |
| 810 | if(unreachable_flag) { | 798 | return -1; |
| 811 | printf(_("%s error while sending ping: %s\n"), | 799 | } |
| 812 | h->host, strerror(errno)); | ||
| 813 | } /* IF */ | ||
| 814 | |||
| 815 | num_unreachable++; | ||
| 816 | remove_job(h); | ||
| 817 | } /* IF */ | ||
| 818 | else { | ||
| 819 | /* mark this trial as outstanding */ | ||
| 820 | h->resp_times[h->num_sent] = RESP_WAITING; | ||
| 821 | 800 | ||
| 822 | h->num_sent++; | 801 | icmp_sent++; |
| 823 | h->waiting++; | 802 | host->icmp_sent++; |
| 824 | num_pingsent++; | ||
| 825 | last_send_time = h->last_send_time; | ||
| 826 | } /* ELSE */ | ||
| 827 | 803 | ||
| 828 | free(buffer); | 804 | return 0; |
| 829 | } /* send_ping() */ | 805 | } |
| 830 | 806 | ||
| 831 | int wait_for_reply(int lsock) | 807 | static int |
| 808 | recvfrom_wto(int sock, char *buf, unsigned int len, struct sockaddr *saddr, | ||
| 809 | u_int *timo) | ||
| 832 | { | 810 | { |
| 833 | int result; | 811 | u_int slen; |
| 834 | static char buffer[4096]; | ||
| 835 | struct sockaddr_in response_addr; | ||
| 836 | struct ip *ip; | ||
| 837 | int hlen; | ||
| 838 | struct icmp *icp; | ||
| 839 | int n; | 812 | int n; |
| 840 | HOST_ENTRY *h = NULL; | 813 | struct timeval to, then, now; |
| 841 | long this_reply; | 814 | fd_set rd, wr; |
| 842 | int this_count; | ||
| 843 | struct timeval sent_time; | ||
| 844 | |||
| 845 | result = recvfrom_wto(lsock, buffer, sizeof(buffer), | ||
| 846 | (struct sockaddr *)&response_addr, select_time); | ||
| 847 | |||
| 848 | if(result < 0) return 0; /* timeout */ | ||
| 849 | |||
| 850 | ip = (struct ip *)buffer; | ||
| 851 | |||
| 852 | #if defined( __alpha__ ) && __STDC__ && !defined( __GLIBC__ ) | ||
| 853 | /* The alpha headers are decidedly broken. | ||
| 854 | * Using an ANSI compiler, it provides ip_vhl instead of ip_hl and | ||
| 855 | * ip_v. So, to get ip_hl, we mask off the bottom four bits. | ||
| 856 | */ | ||
| 857 | hlen = (ip->ip_vhl & 0x0F) << 2; | ||
| 858 | #else | ||
| 859 | hlen = ip->ip_hl << 2; | ||
| 860 | #endif /* defined(__alpha__) && __STDC__ */ | ||
| 861 | 815 | ||
| 862 | if(result < hlen + ICMP_MINLEN) { | 816 | if(!*timo) { |
| 863 | printf(_("Received packet too short for ICMP (%d bytes from %s)\n"), result, | 817 | if(debug) printf("*timo is not\n"); |
| 864 | inet_ntoa(response_addr.sin_addr)); | ||
| 865 | |||
| 866 | return (1); /* too short */ | ||
| 867 | } /* IF */ | ||
| 868 | |||
| 869 | icp = (struct icmp *)(buffer + hlen); | ||
| 870 | if(icp->icmp_type != ICMP_ECHOREPLY) { | ||
| 871 | /* handle some problem */ | ||
| 872 | if(handle_random_icmp(icp, &response_addr)) | ||
| 873 | num_othericmprcvd++; | ||
| 874 | |||
| 875 | return 1; | ||
| 876 | } /* IF */ | ||
| 877 | |||
| 878 | if(icp->icmp_id != ident) | ||
| 879 | return 1; /* packet received, but not the one we are looking for! */ | ||
| 880 | |||
| 881 | num_pingreceived++; | ||
| 882 | |||
| 883 | if(icp->icmp_seq >= (n_short) num_hosts) | ||
| 884 | return(1); /* packet received, don't worry about it anymore */ | ||
| 885 | |||
| 886 | n = icp->icmp_seq; | ||
| 887 | h = table[n]; | ||
| 888 | |||
| 889 | /* received ping is cool, so process it */ | ||
| 890 | |||
| 891 | gettimeofday(¤t_time, &tz); | ||
| 892 | h->waiting = 0; | ||
| 893 | h->num_recv++; | ||
| 894 | |||
| 895 | memcpy(&sent_time, icp->icmp_data + offsetof(PING_DATA, ping_ts), | ||
| 896 | sizeof(sent_time)); | ||
| 897 | memcpy(&this_count, icp->icmp_data, sizeof(this_count)); | ||
| 898 | |||
| 899 | this_reply = timeval_diff(¤t_time, &sent_time); | ||
| 900 | h->total_time += this_reply; | ||
| 901 | total_replies++; | ||
| 902 | |||
| 903 | /* note reply time in array, probably */ | ||
| 904 | if((this_count >= 0) && ((unsigned int)this_count < trials)) { | ||
| 905 | if(h->resp_times[this_count] != RESP_WAITING) { | ||
| 906 | printf(_("%s : duplicate for [%d], %d bytes, %s ms"), | ||
| 907 | h->host, this_count, result, sprint_tm(this_reply)); | ||
| 908 | |||
| 909 | if(response_addr.sin_addr.s_addr != h->saddr.sin_addr.s_addr) | ||
| 910 | printf(" [<- %s]\n", inet_ntoa(response_addr.sin_addr)); | ||
| 911 | } /* IF */ | ||
| 912 | else h->resp_times[this_count] = this_reply; | ||
| 913 | } /* IF */ | ||
| 914 | else { | ||
| 915 | /* count is out of bounds?? */ | ||
| 916 | printf(_("%s : duplicate for [%d], %d bytes, %s ms\n"), | ||
| 917 | h->host, this_count, result, sprint_tm(this_reply)); | ||
| 918 | } /* ELSE */ | ||
| 919 | |||
| 920 | if(h->num_recv == 1) { | ||
| 921 | num_alive++; | ||
| 922 | } /* IF */ | ||
| 923 | |||
| 924 | return num_jobs; | ||
| 925 | } /* wait_for_reply() */ | ||
| 926 | |||
| 927 | int handle_random_icmp(struct icmp *p, struct sockaddr_in *addr) | ||
| 928 | { | ||
| 929 | struct icmp *sent_icmp; | ||
| 930 | u_char *c; | ||
| 931 | HOST_ENTRY *h; | ||
| 932 | |||
| 933 | c = (u_char *) p; | ||
| 934 | switch (p->icmp_type) { | ||
| 935 | case ICMP_UNREACH: | ||
| 936 | sent_icmp = (struct icmp *)(c + 28); | ||
| 937 | |||
| 938 | if((sent_icmp->icmp_type == ICMP_ECHO) && | ||
| 939 | (sent_icmp->icmp_id == ident) && | ||
| 940 | (sent_icmp->icmp_seq < (n_short) num_hosts)) { | ||
| 941 | /* this is a response to a ping we sent */ | ||
| 942 | h = table[sent_icmp->icmp_seq]; | ||
| 943 | |||
| 944 | if(p->icmp_code > ICMP_UNREACH_MAXTYPE) { | ||
| 945 | printf(_("ICMP Unreachable (Invalid Code) from %s for ICMP Echo sent to %s"), | ||
| 946 | inet_ntoa(addr->sin_addr), h->host); | ||
| 947 | |||
| 948 | } /* IF */ | ||
| 949 | else { | ||
| 950 | printf(_("ICMP Unreachable from %s for ICMP Echo sent to %s"), | ||
| 951 | inet_ntoa(addr->sin_addr), h->host); | ||
| 952 | |||
| 953 | } /* ELSE */ | ||
| 954 | |||
| 955 | if(inet_addr(h->host) == INADDR_NONE) | ||
| 956 | printf(" (%s)", inet_ntoa(h->saddr.sin_addr)); | ||
| 957 | |||
| 958 | printf("\n"); | ||
| 959 | |||
| 960 | } /* IF */ | ||
| 961 | |||
| 962 | return 1; | ||
| 963 | |||
| 964 | case ICMP_SOURCEQUENCH: | ||
| 965 | case ICMP_REDIRECT: | ||
| 966 | case ICMP_TIMXCEED: | ||
| 967 | case ICMP_PARAMPROB: | ||
| 968 | sent_icmp = (struct icmp *)(c + 28); | ||
| 969 | if((sent_icmp->icmp_type = ICMP_ECHO) && | ||
| 970 | (sent_icmp->icmp_id = ident) && | ||
| 971 | (sent_icmp->icmp_seq < (n_short) num_hosts)) { | ||
| 972 | /* this is a response to a ping we sent */ | ||
| 973 | h = table[sent_icmp->icmp_seq]; | ||
| 974 | printf(_("ICMP Unreachable from %s for ICMP Echo sent to %s"), | ||
| 975 | inet_ntoa(addr->sin_addr), h->host); | ||
| 976 | |||
| 977 | if(inet_addr(h->host) == INADDR_NONE) | ||
| 978 | printf(" (%s)", inet_ntoa(h->saddr.sin_addr)); | ||
| 979 | |||
| 980 | printf("\n"); | ||
| 981 | } /* IF */ | ||
| 982 | |||
| 983 | return 2; | ||
| 984 | |||
| 985 | /* no way to tell whether any of these are sent due to our ping */ | ||
| 986 | /* or not (shouldn't be, of course), so just discard */ | ||
| 987 | case ICMP_TSTAMP: | ||
| 988 | case ICMP_TSTAMPREPLY: | ||
| 989 | case ICMP_IREQ: | ||
| 990 | case ICMP_IREQREPLY: | ||
| 991 | case ICMP_MASKREQ: | ||
| 992 | case ICMP_MASKREPLY: | ||
| 993 | default: | ||
| 994 | return 0; | 818 | return 0; |
| 819 | } | ||
| 995 | 820 | ||
| 996 | } /* SWITCH */ | 821 | to.tv_sec = *timo / 1000000; |
| 997 | 822 | to.tv_usec = (*timo - (to.tv_sec * 1000000)); | |
| 998 | } /* handle_random_icmp() */ | ||
| 999 | |||
| 1000 | int in_cksum(u_short * p, int n) | ||
| 1001 | { | ||
| 1002 | register u_short answer; | ||
| 1003 | register long sum = 0; | ||
| 1004 | u_short odd_byte = 0; | ||
| 1005 | |||
| 1006 | while(n > 1) { | ||
| 1007 | sum += *p++; | ||
| 1008 | n -= 2; | ||
| 1009 | } /* WHILE */ | ||
| 1010 | |||
| 1011 | /* mop up an odd byte, if necessary */ | ||
| 1012 | if(n == 1) { | ||
| 1013 | *(u_char *) (&odd_byte) = *(u_char *) p; | ||
| 1014 | sum += odd_byte; | ||
| 1015 | } /* IF */ | ||
| 1016 | |||
| 1017 | sum = (sum >> 16) + (sum & 0xffff); /* add hi 16 to low 16 */ | ||
| 1018 | sum += (sum >> 16); /* add carry */ | ||
| 1019 | answer = ~sum; /* ones-complement, truncate */ | ||
| 1020 | |||
| 1021 | return (answer); | ||
| 1022 | |||
| 1023 | } /* in_cksum() */ | ||
| 1024 | |||
| 1025 | void add_name(char *name) | ||
| 1026 | { | ||
| 1027 | struct hostent *host_ent; | ||
| 1028 | int ipaddress; | ||
| 1029 | struct in_addr *ipa = (struct in_addr *)&ipaddress; | ||
| 1030 | struct in_addr *host_add; | ||
| 1031 | char *nm; | ||
| 1032 | int i = 0; | ||
| 1033 | |||
| 1034 | if((ipaddress = inet_addr(name)) != -1) { | ||
| 1035 | /* input name is an IP addr, go with it */ | ||
| 1036 | if(name_flag) { | ||
| 1037 | if(addr_flag) | ||
| 1038 | add_addr(name, na_cat(get_host_by_address(*ipa), *ipa), *ipa); | ||
| 1039 | else { | ||
| 1040 | nm = cpystr(get_host_by_address(*ipa)); | ||
| 1041 | add_addr(name, nm, *ipa); | ||
| 1042 | |||
| 1043 | } /* ELSE */ | ||
| 1044 | } /* IF */ | ||
| 1045 | else add_addr(name, name, *ipa); | ||
| 1046 | |||
| 1047 | return; | ||
| 1048 | } /* IF */ | ||
| 1049 | |||
| 1050 | /* input name is not an IP addr, maybe it's a host name */ | ||
| 1051 | host_ent = gethostbyname(name); | ||
| 1052 | if(host_ent == NULL) { | ||
| 1053 | if(h_errno == TRY_AGAIN) { | ||
| 1054 | u_sleep(DNS_TIMEOUT); | ||
| 1055 | host_ent = gethostbyname(name); | ||
| 1056 | } /* IF */ | ||
| 1057 | |||
| 1058 | if(host_ent == NULL) { | ||
| 1059 | printf(_("%s address not found\n"), name); | ||
| 1060 | num_noaddress++; | ||
| 1061 | return; | ||
| 1062 | } /* IF */ | ||
| 1063 | } /* IF */ | ||
| 1064 | |||
| 1065 | host_add = (struct in_addr *)*(host_ent->h_addr_list); | ||
| 1066 | if(host_add == NULL) { | ||
| 1067 | printf(_("%s has no address data\n"), name); | ||
| 1068 | num_noaddress++; | ||
| 1069 | return; | ||
| 1070 | } /* IF */ | ||
| 1071 | else { | ||
| 1072 | /* it is indeed a hostname with a real address */ | ||
| 1073 | while(host_add) { | ||
| 1074 | if(name_flag && addr_flag) | ||
| 1075 | add_addr(name, na_cat(name, *host_add), *host_add); | ||
| 1076 | else if(addr_flag) { | ||
| 1077 | nm = cpystr(inet_ntoa(*host_add)); | ||
| 1078 | add_addr(name, nm, *host_add); | ||
| 1079 | } /* ELSE IF */ | ||
| 1080 | else { | ||
| 1081 | add_addr(name, name, *host_add); | ||
| 1082 | } | ||
| 1083 | |||
| 1084 | if(!multif_flag) break; | ||
| 1085 | |||
| 1086 | host_add = (struct in_addr *)(host_ent->h_addr_list[++i]); | ||
| 1087 | } /* WHILE */ | ||
| 1088 | } /* ELSE */ | ||
| 1089 | } /* add_name() */ | ||
| 1090 | |||
| 1091 | |||
| 1092 | char *na_cat(char *name, struct in_addr ipaddr) | ||
| 1093 | { | ||
| 1094 | char *nm, *as; | ||
| 1095 | |||
| 1096 | as = inet_ntoa(ipaddr); | ||
| 1097 | nm = (char *)malloc(strlen(name) + strlen(as) + 4); | ||
| 1098 | |||
| 1099 | if(!nm) | ||
| 1100 | crash(_("Can't allocate some space for a string")); | ||
| 1101 | 823 | ||
| 1102 | strcpy(nm, name); | 824 | FD_ZERO(&rd); |
| 1103 | strcat(nm, " ("); | 825 | FD_ZERO(&wr); |
| 1104 | strcat(nm, as); | 826 | FD_SET(sock, &rd); |
| 1105 | strcat(nm, ")"); | 827 | errno = 0; |
| 828 | gettimeofday(&then, &tz); | ||
| 829 | n = select(sock + 1, &rd, &wr, NULL, &to); | ||
| 830 | if(n < 0) crash("select() in recvfrom_wto"); | ||
| 831 | gettimeofday(&now, &tz); | ||
| 832 | *timo = get_timevaldiff(&then, &now); | ||
| 1106 | 833 | ||
| 1107 | return (nm); | 834 | if(!n) return 0; /* timeout */ |
| 1108 | 835 | ||
| 1109 | } /* na_cat() */ | 836 | slen = sizeof(struct sockaddr); |
| 1110 | 837 | ||
| 838 | return recvfrom(sock, buf, len, 0, saddr, &slen); | ||
| 839 | } | ||
| 1111 | 840 | ||
| 1112 | void add_addr(char *name, char *host, struct in_addr ipaddr) | 841 | static void |
| 842 | finish(int sig) | ||
| 1113 | { | 843 | { |
| 1114 | HOST_ENTRY *p; | 844 | u_int i = 0; |
| 1115 | unsigned int n; | 845 | unsigned char pl; |
| 1116 | int *i; | 846 | double rta; |
| 1117 | 847 | struct rta_host *host; | |
| 1118 | if(!(p = (HOST_ENTRY *) malloc(sizeof(HOST_ENTRY)))) { | 848 | char *status_string[] = |
| 1119 | crash(_("Can't allocate HOST_ENTRY")); | 849 | {"OK", "WARNING", "CRITICAL", "UNKNOWN", "DEPENDENT"}; |
| 850 | |||
| 851 | alarm(0); | ||
| 852 | if(debug > 1) printf("finish(%d) called\n", sig); | ||
| 853 | |||
| 854 | if(icmp_sock != -1) close(icmp_sock); | ||
| 855 | if(udp_sock != -1) close(udp_sock); | ||
| 856 | if(tcp_sock != -1) close(tcp_sock); | ||
| 857 | |||
| 858 | if(debug) { | ||
| 859 | printf("icmp_sent: %u icmp_recv: %u icmp_lost: %u\n", | ||
| 860 | icmp_sent, icmp_recv, icmp_lost); | ||
| 861 | printf("targets: %u targets_alive: %u\n", targets, targets_alive); | ||
| 1120 | } | 862 | } |
| 1121 | 863 | ||
| 1122 | memset((char *)p, 0, sizeof(HOST_ENTRY)); | 864 | /* iterate thrice to calculate values, give output, and print perfparse */ |
| 1123 | 865 | host = list; | |
| 1124 | p->name = name; | 866 | while(host) { |
| 1125 | p->host = host; | 867 | if(!host->icmp_recv) { |
| 1126 | p->saddr.sin_family = AF_INET; | 868 | /* rta 0 is ofcourse not entirely correct, but will still show up |
| 1127 | p->saddr.sin_addr = ipaddr; | 869 | * conspicuosly as missing entries in perfparse and cacti */ |
| 1128 | p->running = 1; | 870 | pl = 100; |
| 871 | rta = 0; | ||
| 872 | status = STATE_CRITICAL; | ||
| 873 | /* up the down counter if not already counted */ | ||
| 874 | if(!(host->flags & FLAG_LOST_CAUSE) && targets_alive) targets_down++; | ||
| 875 | } | ||
| 876 | else { | ||
| 877 | pl = ((host->icmp_sent - host->icmp_recv) * 100) / host->icmp_sent; | ||
| 878 | rta = (double)host->time_waited / host->icmp_recv; | ||
| 879 | } | ||
| 880 | host->pl = pl; | ||
| 881 | host->rta = rta; | ||
| 882 | if(!status && (pl >= warn.pl || rta >= warn.rta)) status = STATE_WARNING; | ||
| 883 | if(pl >= crit.pl || rta >= crit.rta) status = STATE_CRITICAL; | ||
| 1129 | 884 | ||
| 1130 | /* array for response time results */ | 885 | host = host->next; |
| 1131 | if(!(i = (int *)malloc(trials * sizeof(int)))) { | ||
| 1132 | crash(_("Can't allocate resp_times array")); | ||
| 1133 | } | 886 | } |
| 887 | /* this is inevitable */ | ||
| 888 | if(!targets_alive) status = STATE_CRITICAL; | ||
| 889 | printf("%s - ", status_string[status]); | ||
| 890 | |||
| 891 | host = list; | ||
| 892 | while(host) { | ||
| 893 | if(debug) puts(""); | ||
| 894 | if(i) { | ||
| 895 | if(i < targets) printf(" :: "); | ||
| 896 | else printf("\n"); | ||
| 897 | } | ||
| 898 | i++; | ||
| 899 | if(!host->icmp_recv) { | ||
| 900 | status = STATE_CRITICAL; | ||
| 901 | if(host->flags & FLAG_LOST_CAUSE) { | ||
| 902 | printf("%s: %s @ %s. rta nan, lost %d%%", | ||
| 903 | host->name, | ||
| 904 | get_icmp_error_msg(host->icmp_type, host->icmp_code), | ||
| 905 | inet_ntoa(host->error_addr), | ||
| 906 | 100); | ||
| 907 | } | ||
| 908 | else { /* not marked as lost cause, so we have no flags for it */ | ||
| 909 | printf("%s: rta nan, lost 100%%", host->name); | ||
| 910 | } | ||
| 911 | } | ||
| 912 | else { /* !icmp_recv */ | ||
| 913 | printf("%s: rta %0.3fms, lost %u%%", | ||
| 914 | host->name, host->rta / 1000, host->pl); | ||
| 915 | } | ||
| 1134 | 916 | ||
| 1135 | for(n = 1; n < trials; n++) | 917 | host = host->next; |
| 1136 | i[n] = RESP_UNUSED; | 918 | } |
| 1137 | |||
| 1138 | p->resp_times = i; | ||
| 1139 | |||
| 1140 | if(!rrlist) { | ||
| 1141 | rrlist = p; | ||
| 1142 | p->next = p; | ||
| 1143 | p->prev = p; | ||
| 1144 | } /* IF */ | ||
| 1145 | else { | ||
| 1146 | p->next = rrlist; | ||
| 1147 | p->prev = rrlist->prev; | ||
| 1148 | p->prev->next = p; | ||
| 1149 | p->next->prev = p; | ||
| 1150 | } /* ELSE */ | ||
| 1151 | |||
| 1152 | num_hosts++; | ||
| 1153 | } /* add_addr() */ | ||
| 1154 | |||
| 1155 | |||
| 1156 | void remove_job(HOST_ENTRY * h) | ||
| 1157 | { | ||
| 1158 | h->running = 0; | ||
| 1159 | h->waiting = 0; | ||
| 1160 | num_jobs--; | ||
| 1161 | |||
| 1162 | |||
| 1163 | if(num_jobs) { | ||
| 1164 | /* remove us from list of active jobs */ | ||
| 1165 | h->prev->next = h->next; | ||
| 1166 | h->next->prev = h->prev; | ||
| 1167 | if(h == cursor) cursor = h->next; | ||
| 1168 | } /* IF */ | ||
| 1169 | else { | ||
| 1170 | cursor = NULL; | ||
| 1171 | rrlist = NULL; | ||
| 1172 | } /* ELSE */ | ||
| 1173 | |||
| 1174 | } /* remove_job() */ | ||
| 1175 | |||
| 1176 | |||
| 1177 | char *get_host_by_address(struct in_addr in) | ||
| 1178 | { | ||
| 1179 | struct hostent *h; | ||
| 1180 | h = gethostbyaddr((char *)&in, sizeof(struct in_addr), AF_INET); | ||
| 1181 | 919 | ||
| 1182 | if(h == NULL || h->h_name == NULL) | 920 | /* iterate once more for pretty perfparse output */ |
| 1183 | return inet_ntoa(in); | 921 | printf("|"); |
| 1184 | else | 922 | i = 0; |
| 1185 | return (char *)h->h_name; | 923 | host = list; |
| 924 | while(host) { | ||
| 925 | if(debug) puts(""); | ||
| 926 | printf("%srta=%0.3fms;%0.3f;%0.3f;0; %spl=%u%%;%u;%u;; ", | ||
| 927 | (targets > 1) ? host->name : "", | ||
| 928 | host->rta / 1000, (float)warn.rta / 1000, (float)crit.rta / 1000, | ||
| 929 | (targets > 1) ? host->name : "", | ||
| 930 | host->pl, warn.pl, crit.pl); | ||
| 931 | |||
| 932 | host = host->next; | ||
| 933 | } | ||
| 1186 | 934 | ||
| 1187 | } /* get_host_by_address() */ | 935 | /* finish with an empty line */ |
| 936 | puts(""); | ||
| 937 | if(debug) printf("targets: %u, targets_alive: %u\n", | ||
| 938 | targets, targets_alive); | ||
| 1188 | 939 | ||
| 940 | exit(status); | ||
| 941 | } | ||
| 1189 | 942 | ||
| 1190 | char *cpystr(char *string) | 943 | static u_int |
| 944 | get_timevaldiff(struct timeval *early, struct timeval *later) | ||
| 1191 | { | 945 | { |
| 1192 | char *dst; | 946 | u_int ret; |
| 1193 | 947 | struct timeval now; | |
| 1194 | if(string) { | ||
| 1195 | dst = (char *)malloc(1 + strlen(string)); | ||
| 1196 | if(!dst) crash(_("malloc() failed!")); | ||
| 1197 | |||
| 1198 | strcpy(dst, string); | ||
| 1199 | return dst; | ||
| 1200 | |||
| 1201 | } /* IF */ | ||
| 1202 | else return NULL; | ||
| 1203 | |||
| 1204 | } /* cpystr() */ | ||
| 1205 | 948 | ||
| 949 | if(!later) { | ||
| 950 | gettimeofday(&now, &tz); | ||
| 951 | later = &now; | ||
| 952 | } | ||
| 953 | if(!early) early = &prog_start; | ||
| 1206 | 954 | ||
| 1207 | void crash(char *msg) | 955 | /* if early > later we return 0 so as to indicate a timeout */ |
| 1208 | { | 956 | if(early->tv_sec > early->tv_sec || |
| 1209 | if(errno || h_errno) { | 957 | (early->tv_sec == later->tv_sec && early->tv_usec > later->tv_usec)) |
| 1210 | if(errno) | 958 | { |
| 1211 | printf("%s: %s : %s\n", prog, msg, strerror(errno)); | 959 | return 0; |
| 1212 | if(h_errno) | ||
| 1213 | printf(_("%s: %s : A network error occurred\n"), prog, msg); | ||
| 1214 | } | 960 | } |
| 1215 | else printf("%s: %s\n", prog, msg); | ||
| 1216 | 961 | ||
| 1217 | exit(STATE_UNKNOWN); | 962 | ret = (later->tv_sec - early->tv_sec) * 1000000; |
| 1218 | } /* crash() */ | 963 | ret += later->tv_usec - early->tv_usec; |
| 1219 | 964 | ||
| 965 | return ret; | ||
| 966 | } | ||
| 1220 | 967 | ||
| 1221 | long timeval_diff(struct timeval *a, struct timeval *b) | 968 | static int |
| 969 | add_target_ip(char *arg, struct in_addr *in) | ||
| 1222 | { | 970 | { |
| 1223 | double temp; | 971 | struct rta_host *host; |
| 1224 | 972 | ||
| 1225 | temp = (((a->tv_sec * 1000000) + a->tv_usec) - | 973 | /* disregard obviously stupid addresses */ |
| 1226 | ((b->tv_sec * 1000000) + b->tv_usec)) / 10; | 974 | if(in->s_addr == INADDR_NONE || in->s_addr == INADDR_ANY) |
| 1227 | 975 | return -1; | |
| 1228 | return (long)temp; | 976 | |
| 1229 | 977 | /* no point in adding two identical IP's, so don't. ;) */ | |
| 1230 | } /* timeval_diff() */ | 978 | host = list; |
| 1231 | 979 | while(host) { | |
| 980 | if(host->saddr_in.sin_addr.s_addr == in->s_addr) { | ||
| 981 | if(debug) printf("Identical IP already exists. Not adding %s\n", arg); | ||
| 982 | return -1; | ||
| 983 | } | ||
| 984 | host = host->next; | ||
| 985 | } | ||
| 1232 | 986 | ||
| 1233 | char *sprint_tm(int t) | 987 | /* add the fresh ip */ |
| 1234 | { | 988 | host = malloc(sizeof(struct rta_host)); |
| 1235 | static char buf[10]; | 989 | if(!host) { |
| 990 | crash("add_target_ip(%s, %s): malloc(%d) failed", | ||
| 991 | arg, inet_ntoa(*in), sizeof(struct rta_host)); | ||
| 992 | } | ||
| 993 | memset(host, 0, sizeof(struct rta_host)); | ||
| 1236 | 994 | ||
| 1237 | /* <= 0.99 ms */ | 995 | /* set the values. use calling name for output */ |
| 1238 | if(t < 100) { | 996 | host->name = strdup(arg); |
| 1239 | sprintf(buf, "0.%02d", t); | ||
| 1240 | return (buf); | ||
| 1241 | } /* IF */ | ||
| 1242 | 997 | ||
| 1243 | /* 1.00 - 9.99 ms */ | 998 | /* fill out the sockaddr_in struct */ |
| 1244 | if(t < 1000) { | 999 | host->saddr_in.sin_family = AF_INET; |
| 1245 | sprintf(buf, "%d.%02d", t / 100, t % 100); | 1000 | host->saddr_in.sin_addr.s_addr = in->s_addr; |
| 1246 | return (buf); | ||
| 1247 | } /* IF */ | ||
| 1248 | 1001 | ||
| 1249 | /* 10.0 - 99.9 ms */ | 1002 | if(!list) list = cursor = host; |
| 1250 | if(t < 10000) { | 1003 | else cursor->next = host; |
| 1251 | sprintf(buf, "%d.%d", t / 100, (t % 100) / 10); | ||
| 1252 | return (buf); | ||
| 1253 | } /* IF */ | ||
| 1254 | 1004 | ||
| 1255 | /* >= 100 ms */ | 1005 | cursor = host; |
| 1256 | sprintf(buf, "%d", t / 100); | 1006 | targets++; |
| 1257 | return (buf); | ||
| 1258 | } /* sprint_tm() */ | ||
| 1259 | 1007 | ||
| 1008 | return 0; | ||
| 1009 | } | ||
| 1260 | 1010 | ||
| 1261 | /* | 1011 | /* wrapper for add_target_ip */ |
| 1262 | * select() is posix, so we expect it to be around | 1012 | static int |
| 1263 | */ | 1013 | add_target(char *arg) |
| 1264 | void u_sleep(int u_sec) | ||
| 1265 | { | 1014 | { |
| 1266 | int nfound; | 1015 | int i; |
| 1267 | struct timeval to; | 1016 | struct hostent *he; |
| 1268 | fd_set readset, writeset; | 1017 | struct in_addr *in, ip; |
| 1269 | 1018 | ||
| 1270 | to.tv_sec = u_sec / 1000000; | 1019 | /* don't resolve if we don't have to */ |
| 1271 | to.tv_usec = u_sec - (to.tv_sec * 1000000); | 1020 | if((ip.s_addr = inet_addr(arg)) != INADDR_NONE) { |
| 1272 | /* printf("u_sleep :: to.tv_sec: %d, to_tv_usec: %d\n", | 1021 | /* don't add all ip's if we were given a specific one */ |
| 1273 | (int)to.tv_sec, (int)to.tv_usec); | 1022 | return add_target_ip(arg, &ip); |
| 1274 | */ | 1023 | /* he = gethostbyaddr((char *)in, sizeof(struct in_addr), AF_INET); */ |
| 1275 | FD_ZERO(&writeset); | 1024 | /* if(!he) return add_target_ip(arg, in); */ |
| 1276 | FD_ZERO(&readset); | 1025 | } |
| 1277 | nfound = select(0, &readset, &writeset, NULL, &to); | 1026 | else { |
| 1278 | if(nfound < 0) | 1027 | errno = 0; |
| 1279 | crash(_("select() in u_sleep:")); | 1028 | he = gethostbyname(arg); |
| 1280 | 1029 | if(!he) { | |
| 1281 | return; | 1030 | errno = 0; |
| 1282 | } /* u_sleep() */ | 1031 | crash("Failed to resolve %s", arg); |
| 1283 | 1032 | return -1; | |
| 1284 | 1033 | } | |
| 1285 | /************************************************************ | ||
| 1286 | * Description: | ||
| 1287 | * | ||
| 1288 | * receive with timeout | ||
| 1289 | * returns length of data read or -1 if timeout | ||
| 1290 | * crash on any other errrors | ||
| 1291 | ************************************************************/ | ||
| 1292 | /* TODO: add MSG_DONTWAIT to recvfrom flags (currently 0) */ | ||
| 1293 | int recvfrom_wto(int lsock, char *buf, int len, struct sockaddr *saddr, int timo) | ||
| 1294 | { | ||
| 1295 | int nfound = 0, slen, n; | ||
| 1296 | struct timeval to; | ||
| 1297 | fd_set readset, writeset; | ||
| 1298 | |||
| 1299 | to.tv_sec = timo / 1000000; | ||
| 1300 | to.tv_usec = (timo - (to.tv_sec * 1000000)) * 10; | ||
| 1301 | |||
| 1302 | /* printf("to.tv_sec: %d, to.tv_usec: %d\n", (int)to.tv_sec, (int)to.tv_usec); | ||
| 1303 | */ | ||
| 1304 | |||
| 1305 | FD_ZERO(&readset); | ||
| 1306 | FD_ZERO(&writeset); | ||
| 1307 | FD_SET(lsock, &readset); | ||
| 1308 | nfound = select(lsock + 1, &readset, &writeset, NULL, &to); | ||
| 1309 | if(nfound < 0) crash(_("select() in recvfrom_wto")); | ||
| 1310 | |||
| 1311 | if(nfound == 0) return -1; /* timeout */ | ||
| 1312 | |||
| 1313 | if(nfound) { | ||
| 1314 | slen = sizeof(struct sockaddr); | ||
| 1315 | n = recvfrom(sock, buf, len, 0, saddr, &slen); | ||
| 1316 | if(n < 0) crash(_("recvfrom")); | ||
| 1317 | return(n); | ||
| 1318 | } | 1034 | } |
| 1319 | 1035 | ||
| 1320 | return(0); /* 0 bytes read, so return it */ | 1036 | /* possibly add all the IP's as targets */ |
| 1321 | } /* recvfrom_wto() */ | 1037 | for(i = 0; he->h_addr_list[i]; i++) { |
| 1038 | in = (struct in_addr *)he->h_addr_list[i]; | ||
| 1039 | add_target_ip(arg, in); | ||
| 1322 | 1040 | ||
| 1041 | /* this is silly, but it works */ | ||
| 1042 | if(mode == MODE_HOSTCHECK || mode == MODE_ALL) { | ||
| 1043 | printf("mode: %d\n", mode); | ||
| 1044 | continue; | ||
| 1045 | } | ||
| 1046 | break; | ||
| 1047 | } | ||
| 1323 | 1048 | ||
| 1049 | return 0; | ||
| 1050 | } | ||
| 1324 | /* | 1051 | /* |
| 1325 | * u = micro | 1052 | * u = micro |
| 1326 | * m = milli | 1053 | * m = milli |
| 1327 | * s = seconds | 1054 | * s = seconds |
| 1055 | * return value is in microseconds | ||
| 1328 | */ | 1056 | */ |
| 1329 | int get_threshold(char *str, threshold *th) | 1057 | static u_int |
| 1058 | get_timevar(const char *str) | ||
| 1059 | { | ||
| 1060 | char p, u, *ptr; | ||
| 1061 | unsigned int len; | ||
| 1062 | u_int i, d; /* integer and decimal, respectively */ | ||
| 1063 | u_int factor = 1000; /* default to milliseconds */ | ||
| 1064 | |||
| 1065 | if(!str) return 0; | ||
| 1066 | len = strlen(str); | ||
| 1067 | if(!len) return 0; | ||
| 1068 | |||
| 1069 | /* unit might be given as ms|m (millisec), | ||
| 1070 | * us|u (microsec) or just plain s, for seconds */ | ||
| 1071 | u = p = '\0'; | ||
| 1072 | u = str[len - 1]; | ||
| 1073 | if(len >= 2 && !isdigit((int)str[len - 2])) p = str[len - 2]; | ||
| 1074 | if(p && u == 's') u = p; | ||
| 1075 | else if(!p) p = u; | ||
| 1076 | if(debug > 2) printf("evaluating %s, u: %c, p: %c\n", str, u, p); | ||
| 1077 | |||
| 1078 | if(u == 'u') factor = 1; /* microseconds */ | ||
| 1079 | else if(u == 'm') factor = 1000; /* milliseconds */ | ||
| 1080 | else if(u == 's') factor = 1000000; /* seconds */ | ||
| 1081 | if(debug > 2) printf("factor is %u\n", factor); | ||
| 1082 | |||
| 1083 | i = strtoul(str, &ptr, 0); | ||
| 1084 | if(!ptr || *ptr != '.' || strlen(ptr) < 2 || factor == 1) | ||
| 1085 | return i * factor; | ||
| 1086 | |||
| 1087 | /* time specified in usecs can't have decimal points, so ignore them */ | ||
| 1088 | if(factor == 1) return i; | ||
| 1089 | |||
| 1090 | d = strtoul(ptr + 1, NULL, 0); | ||
| 1091 | |||
| 1092 | /* d is decimal, so get rid of excess digits */ | ||
| 1093 | while(d >= factor) d /= 10; | ||
| 1094 | |||
| 1095 | /* the last parenthesis avoids floating point exceptions. */ | ||
| 1096 | return ((i * factor) + (d * (factor / 10))); | ||
| 1097 | } | ||
| 1098 | |||
| 1099 | /* not too good at checking errors, but it'll do (main() should barfe on -1) */ | ||
| 1100 | static int | ||
| 1101 | get_threshold(char *str, threshold *th) | ||
| 1330 | { | 1102 | { |
| 1331 | unsigned int i, factor = 0; | 1103 | char *p = NULL, i = 0; |
| 1332 | char *p = NULL; | ||
| 1333 | 1104 | ||
| 1334 | if(!str || !strlen(str) || !th) return -1; | 1105 | if(!str || !strlen(str) || !th) return -1; |
| 1335 | 1106 | ||
| 1336 | for(i=0; i<strlen(str); i++) { | 1107 | /* pointer magic slims code by 10 lines. i is bof-stop on stupid libc's */ |
| 1337 | /* we happily accept decimal points in round trip time thresholds, | 1108 | p = &str[strlen(str) - 1]; |
| 1338 | * but we ignore them quite blandly. The new way of specifying higher | 1109 | while(p != &str[1]) { |
| 1339 | * precision is to specify 'u' (for microseconds), | 1110 | if(*p == '%') *p = '\0'; |
| 1340 | * 'm' (for millisecs - default) or 's' for seconds. */ | 1111 | else if(*p == ',' && i) { |
| 1341 | if(!p && !factor) { | 1112 | *p = '\0'; /* reset it so get_timevar(str) works nicely later */ |
| 1342 | if(str[i] == 's') factor = 1000000; /* seconds */ | 1113 | th->pl = (unsigned char)strtoul(p+1, NULL, 0); |
| 1343 | else if(str[i] == 'm') factor = 1000; /* milliseconds */ | 1114 | break; |
| 1344 | else if(str[i] == 'u') factor = 1; /* microseconds */ | ||
| 1345 | } | ||
| 1346 | |||
| 1347 | if(str[i] == '%') str[i] = '\0'; | ||
| 1348 | else if(str[i] == ',' && !p && i != (strlen(str) - 1)) { | ||
| 1349 | p = &str[i+1]; | ||
| 1350 | str[i] = '\0'; | ||
| 1351 | } | 1115 | } |
| 1116 | i = 1; | ||
| 1117 | p--; | ||
| 1352 | } | 1118 | } |
| 1119 | th->rta = get_timevar(str); | ||
| 1120 | |||
| 1121 | if(!th->rta) return -1; | ||
| 1353 | 1122 | ||
| 1354 | /* default to milliseconds */ | 1123 | if(th->rta > MAXTTL * 1000000) th->rta = MAXTTL * 1000000; |
| 1355 | if(!factor) factor = 1000; | 1124 | if(th->pl > 100) th->pl = 100; |
| 1356 | 1125 | ||
| 1357 | if(!p || !strlen(p)) return -1; | ||
| 1358 | th->rta = (unsigned int)strtoul(str, NULL, 0) * factor; | ||
| 1359 | th->pl = (unsigned int)strtoul(p, NULL, 0); | ||
| 1360 | return 0; | 1126 | return 0; |
| 1361 | } | 1127 | } |
| 1362 | 1128 | ||
| 1363 | void | 1129 | unsigned short |
| 1364 | print_help (void) | 1130 | icmp_checksum(unsigned short *p, int n) |
| 1365 | { | 1131 | { |
| 1366 | print_revision (progname, revision); | 1132 | register unsigned short cksum; |
| 1133 | register long sum = 0; | ||
| 1367 | 1134 | ||
| 1368 | printf ("Copyright (c) 2004 Andreas Ericsson <ae@op5.se>\n"); | 1135 | while(n > 1) { |
| 1369 | printf (COPYRIGHT, copyright, email); | 1136 | sum += *p++; |
| 1137 | n -= 2; | ||
| 1138 | } | ||
| 1370 | 1139 | ||
| 1371 | printf (_("This plugin will check hosts sending icmp pings\n\n")); | 1140 | /* mop up the occasional odd byte */ |
| 1141 | if(n == 1) sum += (unsigned char)*p; | ||
| 1372 | 1142 | ||
| 1373 | print_usage (); | 1143 | sum = (sum >> 16) + (sum & 0xffff); /* add hi 16 to low 16 */ |
| 1144 | sum += (sum >> 16); /* add carry */ | ||
| 1145 | cksum = ~sum; /* ones-complement, trunc to 16 bits */ | ||
| 1374 | 1146 | ||
| 1375 | printf (_(UT_HELP_VRSN)); | 1147 | return cksum; |
| 1376 | |||
| 1377 | printf (_("\ | ||
| 1378 | -H, \n\ | ||
| 1379 | Host name argument for servers\n\ | ||
| 1380 | -b \n\ | ||
| 1381 | ping packet size in bytes (default %d)\n\ | ||
| 1382 | -n \n\ | ||
| 1383 | number of pings to send to each target (default %d)\n\ | ||
| 1384 | -r \n\ | ||
| 1385 | number of retries (default %d)\n\ | ||
| 1386 | -t \n\ | ||
| 1387 | timeout value (in msec) (default %d)\n\ | ||
| 1388 | -i \n\ | ||
| 1389 | packet interval (in msec) (default %d)\n\ | ||
| 1390 | -w \n\ | ||
| 1391 | warning threshold pair, given as RTA[ums],PL[%%]\n\ | ||
| 1392 | -c \n\ | ||
| 1393 | critical threshold pair, given as RTA[ums],PL[%%]\n\ | ||
| 1394 | -D \n\ | ||
| 1395 | increase debug output level\n\n"),ping_data_size,count,retry,(timeout / 100),DEFAULT_INTERVAL); | ||
| 1396 | |||
| 1397 | printf (_(UT_WARN_CRIT)); | ||
| 1398 | |||
| 1399 | printf (_(UT_TIMEOUT), DEFAULT_SOCKET_TIMEOUT); | ||
| 1400 | |||
| 1401 | printf (_(UT_VERBOSE)); | ||
| 1402 | |||
| 1403 | // printf (_("This plugin will check hosts sending icmp pings\n")); | ||
| 1404 | |||
| 1405 | printf (_(UT_SUPPORT)); | ||
| 1406 | } | 1148 | } |
| 1407 | 1149 | ||
| 1408 | void | 1150 | /* make core plugin developers happy (silly, really) */ |
| 1409 | print_usage (void) | 1151 | static void |
| 1152 | usage(unsigned char arg, char *msg) | ||
| 1410 | { | 1153 | { |
| 1411 | printf ("\ | 1154 | if(msg) printf("%s: %s\n", progname, msg); |
| 1412 | Usage: %s -H <vhost> | [-b <ping packet size in bytes>] [-n <number of pings>]\n\ | 1155 | |
| 1413 | [-r <number of retries>] [-t <timeout>] [-i packet interval]\n\ | 1156 | if(arg == 'V') { |
| 1414 | [-w <warning threshold>] [-c <critical threshold>]\n\ | 1157 | printf("$Id$\n"); |
| 1415 | [-D <debug>] \n", progname); | 1158 | exit(STATE_UNKNOWN); |
| 1159 | } | ||
| 1160 | |||
| 1161 | printf("Usage: %s [options] [-H] host1 host2 hostn\n\n", progname); | ||
| 1162 | |||
| 1163 | if(arg != 'h') exit(3); | ||
| 1164 | |||
| 1165 | printf("Where options are any combination of:\n" | ||
| 1166 | " * -H | --host specify a target\n" | ||
| 1167 | " * -w | --warn warning threshold (currently %0.3fms,%u%%)\n" | ||
| 1168 | " * -c | --crit critical threshold (currently %0.3fms,%u%%)\n" | ||
| 1169 | " * -n | --packets number of packets to send (currently %u)\n" | ||
| 1170 | " * -i | --interval max packet interval (currently %0.3fms)\n" | ||
| 1171 | " * -I | --hostint max target interval (currently %0.3fms)\n" | ||
| 1172 | " * -l | --ttl TTL on outgoing packets (currently %u)\n" | ||
| 1173 | " * -t | --timeout timeout value (seconds, currently %u)\n" | ||
| 1174 | " * -b | --bytes icmp packet size (currenly ignored)\n" | ||
| 1175 | " -v | --verbose verbosity++\n" | ||
| 1176 | " -h | --help this cruft\n", | ||
| 1177 | (float)warn.rta / 1000, warn.pl, (float)crit.rta / 1000, crit.pl, | ||
| 1178 | packets, | ||
| 1179 | (float)pkt_interval / 1000, (float)target_interval / 1000, | ||
| 1180 | ttl, timeout); | ||
| 1181 | |||
| 1182 | puts("\nThe -H switch is optional. Naming a host (or several) to check is not.\n\n" | ||
| 1183 | "Threshold format for -w and -c is 200.25,60% for 200.25 msec RTA and 60%\n" | ||
| 1184 | "packet loss. The default values should work well for most users.\n" | ||
| 1185 | "You can specify different RTA factors using the standardized abbreviations\n" | ||
| 1186 | "us (microseconds), ms (milliseconds, default) or just plain s for seconds.\n\n" | ||
| 1187 | "Threshold format for -d is warn,crit. 12,14 means WARNING if >= 12 hops\n" | ||
| 1188 | "are spent and CRITICAL if >= 14 hops are spent.\n" | ||
| 1189 | "NOTE: Some systems decrease TTL when forming ICMP_ECHOREPLY, others do not.\n\n" | ||
| 1190 | "The -v switch can be specified several times for increased verbosity.\n\n" | ||
| 1191 | "Long options are currently unsupported.\n\n" | ||
| 1192 | "Options marked with * require an argument\n"); | ||
| 1193 | |||
| 1194 | puts("The latest version of this plugin can be found at http://oss.op5.se/nagios\n" | ||
| 1195 | "or https://devel.op5.se/oss until the day it is included in the official\n" | ||
| 1196 | "plugin distribution.\n"); | ||
| 1197 | |||
| 1198 | exit(3); | ||
| 1416 | } | 1199 | } |
