diff options
author | Stanley Hopcroft <stanleyhopcroft@users.sourceforge.net> | 2005-02-01 07:33:13 +0000 |
---|---|---|
committer | Stanley Hopcroft <stanleyhopcroft@users.sourceforge.net> | 2005-02-01 07:33:13 +0000 |
commit | bf9d0869beeb86911855e1867ebd3ec5e4bdf746 (patch) | |
tree | 5ac901b7a6c61628bc0d7a09b9099d065038ed20 | |
parent | b7c0754632ece2e05cbb5d3d7af6a925d2dfba7b (diff) | |
download | monitoring-plugins-bf9d0869beeb86911855e1867ebd3ec5e4bdf746.tar.gz |
Revised check_icmp (1.0) from A Ericsson.
git-svn-id: https://nagiosplug.svn.sourceforge.net/svnroot/nagiosplug/nagiosplug/trunk@1118 f882894a-f735-0410-b71e-b25c423dba1c
-rw-r--r-- | plugins/check_icmp.c | 2241 |
1 files changed, 1012 insertions, 1229 deletions
diff --git a/plugins/check_icmp.c b/plugins/check_icmp.c index 45716824..2f03552f 100644 --- a/plugins/check_icmp.c +++ b/plugins/check_icmp.c @@ -1,1416 +1,1199 @@ /* * $Id$ * - * This is a hack of fping2 made to work with nagios. - * It's fast and removes the necessity of parsing another programs output. + * Author: Andreas Ericsson <ae@op5.se> * - * VIEWING NOTES: - * This file was formatted with tab indents at a tab stop of 4. + * License: GNU GPL 2.0 or any later version. * - * It is highly recommended that your editor is set to this - * tab stop setting for viewing and editing. + * Relevant RFC's: 792 (ICMP), 791 (IP) * - * COPYLEFT; - * This programs copyright status is currently undetermined. Much of - * the code in it comes from the fping2 program which used to be licensed - * under the Stanford General Software License (available at - * http://graphics.stanford.edu/software/license.html). It is presently - * unclear what license (if any) applies to the original code at the - * moment. + * This program was modeled somewhat after the check_icmp program, + * which was in turn a hack of fping (www.fping.org) but has been + * completely rewritten since to generate higher precision rta values, + * and support several different modes as well as setting ttl to control. + * redundant routes. The only remainders of fping is currently a few + * function names. * - * The fping website can be found at http://www.fping.com */ -const char *progname = "check_icmp"; -const char *revision = "$Revision$"; -const char *copyright = "2004"; -const char *email = "nagiosplug-devel@lists.sourceforge.net"; - -#include "common.h" -#include "netutils.h" -#include "utils.h" - +#include <sys/time.h> +#include <sys/types.h> #include <stdio.h> -#include <errno.h> -#include <time.h> -#include <signal.h> - -#include <unistd.h> - #include <stdlib.h> - -#include <string.h> +#include <stdarg.h> +#include <unistd.h> #include <stddef.h> - -#include <sys/types.h> -#include <sys/time.h> +#include <errno.h> +#include <string.h> +#include <ctype.h> +#include <netdb.h> #include <sys/socket.h> - -#include <sys/file.h> - #include <netinet/in_systm.h> #include <netinet/in.h> - #include <netinet/ip.h> #include <netinet/ip_icmp.h> - #include <arpa/inet.h> -#include <netdb.h> - -/* RS6000 has sys/select.h */ -#ifdef HAVE_SYS_SELECT_H -#include <sys/select.h> -#endif /* HAVE_SYS_SELECT_H */ +#include <signal.h> -/* rta threshold values can't be larger than MAXTTL seconds */ +/** sometimes undefined system macros (quite a few, actually) **/ #ifndef MAXTTL -# define MAXTTL 255 -#endif -#ifndef IPDEFTTL -# define IPDEFTTL 64 +# define MAXTTL 255 #endif - -/*** externals ***/ -extern char *optarg; -extern int optind, opterr; - -/*** Constants ***/ -//#define EMAIL "ae@op5.se" -//#define VERSION "0.8.1" - #ifndef INADDR_NONE # define INADDR_NONE 0xffffffU #endif -/*** Ping packet defines ***/ -/* data added after ICMP header for our nefarious purposes */ -typedef struct ping_data { - unsigned int ping_count; /* counts up to -[n|p] count or 1 */ - struct timeval ping_ts; /* time sent */ -} PING_DATA; - -#define MIN_PING_DATA sizeof(PING_DATA) -#define MAX_IP_PACKET 65536 /* (theoretical) max IP packet size */ -#define SIZE_IP_HDR 20 -#define SIZE_ICMP_HDR ICMP_MINLEN /* from ip_icmp.h */ -#define MAX_PING_DATA (MAX_IP_PACKET - SIZE_IP_HDR - SIZE_ICMP_HDR) - -/* - * Interval is the minimum amount of time between sending a ping packet to - * any host. - * - * Perhost_interval is the minimum amount of time between sending a ping - * packet to a particular responding host - * - * Timeout is the initial amount of time between sending a ping packet to - * a particular non-responding host. - * - * Retry is the number of ping packets to send to a non-responding host - * before giving up (in is-it-alive mode). - * - * Backoff factor is how much longer to wait on successive retries. - */ -#ifndef DEFAULT_INTERVAL -#define DEFAULT_INTERVAL 25 /* default time between packets (msec) */ -#endif - -#ifndef DEFAULT_RETRY -#define DEFAULT_RETRY 1 /* number of times to retry a host */ +#ifndef SOL_IP +#define SOL_IP 0 #endif -#ifndef DEFAULT_TIMEOUT -# define DEFAULT_TIMEOUT 1000 +/* we bundle these in one #ifndef, since they're all from BSD + * Put individual #ifndef's around those that bother you */ +#ifndef ICMP_UNREACH_NET_UNKNOWN +# define ICMP_UNREACH_NET_UNKNOWN 6 +# define ICMP_UNREACH_HOST_UNKNOWN 7 +# define ICMP_UNREACH_ISOLATED 8 +# define ICMP_UNREACH_NET_PROHIB 9 +# define ICMP_UNREACH_HOST_PROHIB 10 +# define ICMP_UNREACH_TOSNET 11 +# define ICMP_UNREACH_TOSHOST 12 #endif - -#ifndef DEFAULT_BACKOFF_FACTOR -#define DEFAULT_BACKOFF_FACTOR 1.5 /* exponential timeout factor */ +/* tru64 has the ones above, but not these */ +#ifndef ICMP_UNREACH_FILTER_PROHIB +# define ICMP_UNREACH_FILTER_PROHIB 13 +# define ICMP_UNREACH_HOST_PRECEDENCE 14 +# define ICMP_UNREACH_PRECEDENCE_CUTOFF 15 #endif -#define MIN_BACKOFF_FACTOR 1.0 /* exponential timeout factor */ -#define MAX_BACKOFF_FACTOR 5.0 /* exponential timeout factor */ - -#ifndef DNS_TIMEOUT -#define DNS_TIMEOUT 1000 /* time in usec for dns retry */ -#endif - -#ifndef MAX_RTA_THRESHOLD_VALUE -# define MAX_RTA_THRESHOLD_VALUE 120*1000000 /* 2 minutes should be enough */ -#endif -#ifndef MIN_RTA_THRESHOLD_VALUE -# define MIN_RTA_THRESHOLD_VALUE 10000 /* minimum RTA threshold value */ -#endif - -/* sized so as to be like traditional ping */ -#define DEFAULT_PING_DATA_SIZE (MIN_PING_DATA + 44) - -/* maxima and minima */ -#define MAX_COUNT 50 /* max count even if we're root */ -#define MAX_RETRY 5 -#define MIN_INTERVAL 25 /* msecs */ -#define MIN_TIMEOUT 50 /* msecs */ - -/* response time array flags */ -#define RESP_WAITING -1 -#define RESP_UNUSED -2 - -#define ICMP_UNREACH_MAXTYPE 15 - -/* entry used to keep track of each host we are pinging */ -struct host_entry { - int i; /* index into array */ - char *name; /* name as given by user */ - char *host; /* text description of host */ - struct sockaddr_in saddr; /* internet address */ - unsigned short **pr; /* TCP port range to check for connectivity */ - struct timeval last_send_time; /* time of last packet sent */ - unsigned int num_sent; /* number of ping packets sent */ - unsigned int num_recv; /* number of pings received */ - unsigned int total_time; /* sum of response times */ - unsigned int status; /* this hosts status */ - unsigned int running; /* unset when through sending */ - unsigned int waiting; /* waiting for response */ - int *resp_times; /* individual response times */ - struct host_entry *prev, *next; /* doubly linked list */ -}; - -typedef struct host_entry HOST_ENTRY; -struct host_name_list { - char *entry; - struct host_name_list *next; -}; -/* threshold structure */ -struct threshold { - unsigned int pl; /* packet loss */ - unsigned int rta; /* roundtrip time average */ -}; -typedef struct threshold threshold; - -/***************************************************************************** - * Global Variables * - *****************************************************************************/ - -HOST_ENTRY *rrlist = NULL; /* linked list of hosts be pinged */ -HOST_ENTRY **table = NULL; /* array of pointers to items in the list */ -HOST_ENTRY *cursor; - -char *prog; /* our name */ -int ident; /* our pid, for marking icmp packets */ -int sock; /* socket */ -u_int debug = 0; - -/* threshold value defaults; - * WARNING; 60% packetloss or 200 msecs round trip average - * CRITICAL; 80% packetloss or 500 msecs round trip average */ -threshold warn = {60, 200 * 1000}; -threshold crit = {80, 500 * 1000}; - -/* times get *100 because all times are calculated in 10 usec units, not ms */ -unsigned int retry = DEFAULT_RETRY; -u_int timeout = DEFAULT_TIMEOUT * 100; -u_int interval = DEFAULT_INTERVAL * 100; -float backoff = DEFAULT_BACKOFF_FACTOR; -u_int select_time; /* calculated using maximum threshold rta value */ -u_int ping_data_size = DEFAULT_PING_DATA_SIZE; -u_int ping_pkt_size; -unsigned int count = 5; -unsigned int trials = 1; - -/* global stats */ -int total_replies = 0; -int num_jobs = 0; /* number of hosts still to do */ -int num_hosts = 0; /* total number of hosts */ -int num_alive = 0; /* total number alive */ -int num_unreachable = 0; /* total number unreachable */ -int num_noaddress = 0; /* total number of addresses not found */ -int num_timeout = 0; /* number of timed out packets */ -int num_pingsent = 0; /* total pings sent */ -int num_pingreceived = 0; /* total pings received */ -int num_othericmprcvd = 0; /* total non-echo-reply ICMP received */ - -struct timeval current_time; /* current time (pseudo) */ -struct timeval my_start_time; /* conflict with utils.c 33, but not found ?? */ -struct timeval my_end_time; /* conflict with utils.c 33, but not found ?? */ -struct timeval last_send_time; /* time last ping was sent */ -struct timezone tz; - -/* switches */ -int generate_flag = 0; /* flag for IP list generation */ -int stats_flag, unreachable_flag, alive_flag; -int elapsed_flag, version_flag, count_flag; -int name_flag, addr_flag, backoff_flag; -int multif_flag; - -/*** prototypes ***/ -void add_name(char *); -void add_addr(char *, char *, struct in_addr); -char *na_cat(char *, struct in_addr); -char *cpystr(char *); -void crash(char *); -char *get_host_by_address(struct in_addr); -int in_cksum(u_short *, int); -void u_sleep(int); -int recvfrom_wto(int, char *, int, struct sockaddr *, int); -void remove_job(HOST_ENTRY *); -void send_ping(int, HOST_ENTRY *); -long timeval_diff(struct timeval *, struct timeval *); -//void usage(void); -int wait_for_reply(int); -void finish(void); -int handle_random_icmp(struct icmp *, struct sockaddr_in *); -char *sprint_tm(int); -int get_threshold(char *, threshold *); - -/* common functions */ -void print_help (void); -void print_usage (void); - -/*** the various exit-states */ -/*enum { +/** typedefs and such **/ +enum states { STATE_OK = 0, STATE_WARNING, STATE_CRITICAL, STATE_UNKNOWN, - STATE_DEPENDANT, + STATE_DEPENDENT, STATE_OOB -};*/ - -/* the strings that correspond to them */ -/* -char *status_string[STATE_OOB] = { - "OK", - "WARNING", - "CRITICAL", - "UNKNOWN", - "DEPENDANT" }; -*/ -int status = STATE_OK; -int fin_stat = STATE_OK; +typedef unsigned short range_t; /* type for get_range() -- unimplemented */ + +typedef struct rta_host { + unsigned short id; /* id in **table, and icmp pkts */ + char *name; /* arg used for adding this host */ + char *msg; /* icmp error message, if any */ + struct sockaddr_in saddr_in; /* the address of this host */ + struct in_addr error_addr; /* stores address of error replies */ + unsigned long long time_waited; /* total time waited, in usecs */ + unsigned int icmp_sent, icmp_recv, icmp_lost; /* counters */ + unsigned char icmp_type, icmp_code; /* type and code from errors */ + unsigned short flags; /* control/status flags */ + double rta; /* measured RTA */ + unsigned char pl; /* measured packet loss */ + struct rta_host *next; /* linked list */ +} rta_host; + +#define FLAG_LOST_CAUSE 0x01 /* decidedly dead target. */ + +/* threshold structure. all values are maximum allowed, exclusive */ +typedef struct threshold { + unsigned char pl; /* max allowed packet loss in percent */ + unsigned int rta; /* roundtrip time average, microseconds */ +} threshold; + +/* the data structure */ +typedef struct icmp_ping_data { + struct timeval stime; /* timestamp (saved in protocol struct as well) */ + unsigned short ping_id; +} icmp_ping_data; + +/* the different modes of this program are as follows: + * MODE_RTA: send all packets no matter what (mimic check_icmp and check_ping) + * MODE_HOSTCHECK: Return immediately upon any sign of life + * In addition, sends packets to ALL addresses assigned + * to this host (as returned by gethostbyname() or + * gethostbyaddr() and expects one host only to be checked at + * a time. Therefore, any packet response what so ever will + * count as a sign of life, even when received outside + * crit.rta limit. Do not misspell any additional IP's. + * MODE_ALL: Requires packets from ALL requested IP to return OK (default). + * MODE_ICMP: implement something similar to check_icmp (MODE_RTA without + * tcp and udp args does this) + */ +#define MODE_RTA 0 +#define MODE_HOSTCHECK 1 +#define MODE_ALL 2 +#define MODE_ICMP 3 + +/* the different ping types we can do + * TODO: investigate ARP ping as well */ +#define HAVE_ICMP 1 +#define HAVE_UDP 2 +#define HAVE_TCP 4 +#define HAVE_ARP 8 + +#define MIN_PING_DATA_SIZE sizeof(struct icmp_ping_data) +#define MAX_IP_PKT_SIZE 65536 /* (theoretical) max IP packet size */ +#define IP_HDR_SIZE 20 +#define MAX_PING_DATA (MAX_IP_PKT_SIZE - IP_HDR_SIZE - ICMP_MINLEN) +#define DEFAULT_PING_DATA_SIZE (MIN_PING_DATA_SIZE + 44) + +/* various target states */ +#define TSTATE_INACTIVE 0x01 /* don't ping this host anymore */ +#define TSTATE_WAITING 0x02 /* unanswered packets on the wire */ +#define TSTATE_ALIVE 0x04 /* target is alive (has answered something) */ +#define TSTATE_UNREACH 0x08 + +/** prototypes **/ +static void usage(unsigned char, char *); +static u_int get_timevar(const char *); +static u_int get_timevaldiff(struct timeval *, struct timeval *); +static int wait_for_reply(int, u_int); +static int recvfrom_wto(int, char *, unsigned int, struct sockaddr *, u_int *); +static int send_icmp_ping(int, struct rta_host *); +static int get_threshold(char *str, threshold *th); +static void run_checks(void); +static int add_target(char *); +static int add_target_ip(char *, struct in_addr *); +static int handle_random_icmp(struct icmp *, struct sockaddr_in *); +static unsigned short icmp_checksum(unsigned short *, int); +static void finish(int); +static void crash(const char *, ...); + +/** external **/ +extern int optind, opterr, optopt; +extern char *optarg; +extern char **environ; + +/** global variables **/ +static char *progname; +static struct rta_host **table, *cursor, *list; +static threshold crit = {80, 500000}, warn = {40, 200000}; +static int mode, protocols, sockets, debug = 0, timeout = 10; +static unsigned short icmp_pkt_size, icmp_data_size = DEFAULT_PING_DATA_SIZE; +static unsigned int icmp_sent = 0, icmp_recv = 0, icmp_lost = 0; +#define icmp_pkts_en_route (icmp_sent - (icmp_recv + icmp_lost)) +static unsigned short targets_down = 0, targets = 0, packets = 0; +#define targets_alive (targets - targets_down) +static unsigned int retry_interval, pkt_interval, target_interval; +static int icmp_sock, tcp_sock, udp_sock, status = STATE_OK; +static pid_t pid; +static struct timezone tz; +static struct timeval prog_start; +static unsigned long long max_completion_time = 0; +static unsigned char ttl = 0; /* outgoing ttl */ +static unsigned int warn_down = 1, crit_down = 1; /* host down threshold values */ +float pkt_backoff_factor = 1.5; +float target_backoff_factor = 1.5; + +/** code start **/ +static void +crash(const char *fmt, ...) +{ + va_list ap; + + printf("%s: ", progname); + + va_start(ap, fmt); + vprintf(fmt, ap); + va_end(ap); + + if(errno) printf(": %s", strerror(errno)); + puts(""); -/***************************************************************************** - * Code block start * - *****************************************************************************/ -int main(int argc, char **argv) + exit(3); +} + + +static char * +get_icmp_error_msg(unsigned char icmp_type, unsigned char icmp_code) { - int c; - u_int lt, ht; - int advance; - struct protoent *proto; - uid_t uid; - struct host_name_list *host_ptr, *host_base_ptr; - - if(strchr(argv[0], '/')) prog = strrchr(argv[0], '/') + 1; - else prog = argv[0]; - - setlocale (LC_ALL, ""); - bindtextdomain (PACKAGE, LOCALEDIR); - textdomain (PACKAGE); - - /* check if we are root */ - if(geteuid()) { - printf(_("Root access needed (for raw sockets)\n")); - exit(STATE_UNKNOWN); - } + char *msg = "unreachable"; - /* confirm that ICMP is available on this machine */ - if((proto = getprotobyname("icmp")) == NULL) - crash(_("icmp: unknown protocol")); + if(debug > 1) printf("get_icmp_error_msg(%u, %u)\n", icmp_type, icmp_code); + switch(icmp_type) { + case ICMP_UNREACH: + switch(icmp_code) { + case ICMP_UNREACH_NET: msg = "Net unreachable"; break; + case ICMP_UNREACH_HOST: msg = "Host unreachable"; break; + case ICMP_UNREACH_PROTOCOL: msg = "Protocol unreachable (firewall?)"; break; + case ICMP_UNREACH_PORT: msg = "Port unreachable (firewall?)"; break; + case ICMP_UNREACH_NEEDFRAG: msg = "Fragmentation needed"; break; + case ICMP_UNREACH_SRCFAIL: msg = "Source route failed"; break; + case ICMP_UNREACH_ISOLATED: msg = "Source host isolated"; break; + case ICMP_UNREACH_NET_UNKNOWN: msg = "Unknown network"; break; + case ICMP_UNREACH_HOST_UNKNOWN: msg = "Unknown host"; break; + case ICMP_UNREACH_NET_PROHIB: msg = "Network denied (firewall?)"; break; + case ICMP_UNREACH_HOST_PROHIB: msg = "Host denied (firewall?)"; break; + case ICMP_UNREACH_TOSNET: msg = "Bad TOS for network (firewall?)"; break; + case ICMP_UNREACH_TOSHOST: msg = "Bad TOS for host (firewall?)"; break; + case ICMP_UNREACH_FILTER_PROHIB: msg = "Prohibited by filter (firewall)"; break; + case ICMP_UNREACH_HOST_PRECEDENCE: msg = "Host precedence violation"; break; + case ICMP_UNREACH_PRECEDENCE_CUTOFF: msg = "Precedence cutoff"; break; + default: msg = "Invalid code"; break; + } + break; - /* create raw socket for ICMP calls (ping) */ - sock = socket(AF_INET, SOCK_RAW, proto->p_proto); + case ICMP_TIMXCEED: + /* really 'out of reach', or non-existant host behind a router serving + * two different subnets */ + switch(icmp_code) { + case ICMP_TIMXCEED_INTRANS: msg = "Time to live exceeded in transit"; break; + case ICMP_TIMXCEED_REASS: msg = "Fragment reassembly time exceeded"; break; + default: msg = "Invalid code"; break; + } + break; - if(sock < 0) - crash(_("Can't create raw socket")); + case ICMP_SOURCEQUENCH: msg = "Transmitting too fast"; break; + case ICMP_REDIRECT: msg = "Redirect (change route)"; break; + case ICMP_PARAMPROB: msg = "Bad IP header (required option absent)"; break; - /* drop privileges now that we have the socket */ - if((uid = getuid())) { - seteuid(uid); + /* the following aren't error messages, so ignore */ + case ICMP_TSTAMP: + case ICMP_TSTAMPREPLY: + case ICMP_IREQ: + case ICMP_IREQREPLY: + case ICMP_MASKREQ: + case ICMP_MASKREPLY: + default: msg = ""; break; } - - if(argc < 2) print_usage(); - ident = getpid() & 0xFFFF; + return msg; +} + +static int +handle_random_icmp(struct icmp *p, struct sockaddr_in *addr) +{ + struct icmp *sent_icmp = NULL; + struct rta_host *host = NULL; + unsigned char *ptr; - if(!(host_base_ptr = malloc(sizeof(struct host_name_list)))) { - crash(_("Unable to allocate memory for host name list\n")); + if(p->icmp_type == ICMP_ECHO && p->icmp_id == pid) { + /* echo request from us to us (pinging localhost) */ + return 0; } - host_ptr = host_base_ptr; - - backoff_flag = 0; - opterr = 1; - - /* get command line options - * -H denotes a host (actually ignored and picked up later) - * -h for help - * -V or -v for version - * -d to display hostnames rather than addresses - * -t sets timeout for packets and tcp connects - * -r defines retries (persistence) - * -p or -n sets packet count (5) - * -b sets packet size (56) - * -w sets warning threshhold (200,40%) - * -c sets critical threshhold (500,80%) - * -i sets interval for both packet transmissions and connect attempts - */ -#define OPT_STR "amH:hvVDdAp:n:b:r:t:i:w:c:" - while((c = getopt(argc, argv, OPT_STR)) != EOF) { - switch (c) { - case 'H': - if(!(host_ptr->entry = malloc(strlen(optarg) + 1))) { - crash(_("Failed to allocate memory for hostname")); - } - memset(host_ptr->entry, 0, strlen(optarg) + 1); - host_ptr->entry = memcpy(host_ptr->entry, optarg, strlen(optarg)); - if(!(host_ptr->next = malloc(sizeof(struct host_name_list)))) - crash(_("Failed to allocate memory for hostname")); - host_ptr = host_ptr->next; - host_ptr->next = NULL; -// add_name(optarg); - break; - /* this is recognized, but silently ignored. - * host(s) are added later on */ - break; - case 'w': - if(get_threshold(optarg, &warn)) { - printf(_("Illegal threshold pair specified for -%c"), c); - print_usage(); - } - break; + ptr = (unsigned char *)p; + if(debug) printf("handle_random_icmp(%p, %p)\n", (void *)p, (void *)addr); + + /* only handle a few types, since others can't possibly be replies to + * us in a sane network (if it is anyway, it will be counted as lost + * at summary time, but not as quickly as a proper response */ + /* TIMXCEED can be an unreach from a router with multiple IP's which + * serves two different subnets on the same interface and a dead host + * on one net is pinged from the other. The router will respond to + * itself and thus set TTL=0 so as to not loop forever. Even when + * TIMXCEED actually sends a proper icmp response we will have passed + * too many hops to have a hope of reaching it later, in which case it + * indicates overconfidence in the network, poor routing or both. */ + if(p->icmp_type != ICMP_UNREACH && p->icmp_type != ICMP_TIMXCEED && + p->icmp_type != ICMP_SOURCEQUENCH && p->icmp_type != ICMP_PARAMPROB) + { + return 0; + } - case 'c': - if(get_threshold(optarg, &crit)) { - printf(_("Illegal threshold pair specified for -%c"), c); - print_usage(); - } - break; + /* might be for us. At least it holds the original package (according + * to RFC 792). If it isn't, just ignore it */ + sent_icmp = (struct icmp *)(ptr + 28); + if(sent_icmp->icmp_type != ICMP_ECHO || sent_icmp->icmp_id != pid || + sent_icmp->icmp_seq >= targets) + { + if(debug) printf("Packet is no response to a packet we sent\n"); + return 0; + } - case 't': - if(!(timeout = (u_int) strtoul(optarg, NULL, 0) * 100)) { - printf(_("Option -%c requires integer argument\n"), c); - print_usage(); - } - break; + /* it is indeed a response for us */ + host = table[sent_icmp->icmp_seq]; + if(debug) { + printf("Received \"%s\" from %s for ICMP ECHO sent to %s.\n", + get_icmp_error_msg(p->icmp_type, p->icmp_code), + inet_ntoa(addr->sin_addr), host->name); + } - case 'r': - if(!(retry = (u_int) strtoul(optarg, NULL, 0))) { - printf(_("Option -%c requires integer argument\n"), c); - print_usage(); - } - break; + icmp_lost++; + host->icmp_lost++; + /* don't spend time on lost hosts any more */ + if(host->flags & FLAG_LOST_CAUSE) return 0; - case 'i': - if(!(interval = (u_int) strtoul(optarg, NULL, 0) * 100)) { - printf(_("Option -%c requires positive non-zero integer argument\n"), c); - print_usage(); - } - break; + /* source quench means we're sending too fast, so increase the + * interval and mark this packet lost */ + if(p->icmp_type == ICMP_SOURCEQUENCH) { + pkt_interval *= pkt_backoff_factor; + target_interval *= target_backoff_factor; + } + else { + targets_down++; + host->flags |= FLAG_LOST_CAUSE; + } + host->icmp_type = p->icmp_type; + host->icmp_code = p->icmp_code; + host->error_addr.s_addr = addr->sin_addr.s_addr; - case 'p': - case 'n': - if(!(count = (u_int) strtoul(optarg, NULL, 0))) { - printf(_("Option -%c requires positive non-zero integer argument\n"), c); - print_usage(); - } - break; + return 0; +} +int +main(int argc, char **argv) +{ + int i; + char *ptr; + long int arg; + int icmp_sockerrno, udp_sockerrno, tcp_sockerrno; + int result; + struct rta_host *host; + + /* we only need to be setsuid when we get the sockets, so do + * that before pointer magic (esp. on network data) */ + icmp_sockerrno = udp_sockerrno = tcp_sockerrno = sockets = 0; + + if((icmp_sock = socket(PF_INET, SOCK_RAW, IPPROTO_ICMP)) != -1) + sockets |= HAVE_ICMP; + else icmp_sockerrno = errno; + + /* if((udp_sock = socket(PF_INET, SOCK_DGRAM, IPPROTO_UDP)) != -1) */ + /* sockets |= HAVE_UDP; */ + /* else udp_sockerrno = errno; */ + + /* if((tcp_sock = socket(PF_INET, SOCK_STREAM, IPPROTO_TCP)) != -1) */ + /* sockets |= HAVE_TCP; */ + /* else tcp_sockerrno = errno; */ + + /* now drop privileges (no effect if not setsuid or geteuid() == 0) */ + setuid(getuid()); + + /* POSIXLY_CORRECT might break things, so unset it (the portable way) */ + environ = NULL; + + /* use the pid to mark packets as ours */ + pid = getpid(); + /* printf("pid = %u\n", pid); */ + + /* get calling name the old-fashioned way for portability instead + * of relying on the glibc-ism __progname */ + ptr = strrchr(argv[0], '/'); + if(ptr) progname = &ptr[1]; + else progname = argv[0]; + + /* now set defaults. Use progname to set them initially (allows for + * superfast check_host program when target host is up */ + cursor = list = NULL; + table = NULL; + + mode = MODE_RTA; + crit.rta = 500000; + crit.pl = 80; + warn.rta = 200000; + warn.pl = 40; + protocols = HAVE_ICMP | HAVE_UDP | HAVE_TCP; + pkt_interval = 80000; /* 80 msec packet interval by default */ + packets = 5; + + if(!strcmp(progname, "check_icmp") || !strcmp(progname, "check_ping")) { + mode = MODE_ICMP; + protocols = HAVE_ICMP; + } + else if(!strcmp(progname, "check_host")) { + mode = MODE_HOSTCHECK; + pkt_interval = 1000000; + packets = 5; + crit.rta = warn.rta = 1000000; + crit.pl = warn.pl = 100; + } + else if(!strcmp(progname, "check_rta_multi")) { + mode = MODE_ALL; + target_interval = 0; + pkt_interval = 50000; + packets = 5; + } + + /* parse the arguments */ + for(i = 1; i < argc; i++) { + while((arg = getopt(argc, argv, "vhVw:c:n:p:t:H:i:b:I:l:")) != EOF) { + switch(arg) { + case 'v': + debug++; + break; case 'b': - if(!(ping_data_size = (u_int) strtoul(optarg, NULL, 0))) { - printf(_("Option -%c requires integer argument\n"), c); - print_usage(); - } + /* silently ignored for now */ break; - - case 'h': - print_usage(); + case 'i': + pkt_interval = get_timevar(optarg); break; - - case 'e': - elapsed_flag = 1; + case 'I': + target_interval = get_timevar(optarg); break; - - case 'm': - multif_flag = 1; + case 'w': + get_threshold(optarg, &warn); break; - - case 'd': - name_flag = 1; + case 'c': + get_threshold(optarg, &crit); break; - - case 'A': - addr_flag = 1; + case 'n': + case 'p': + packets = strtoul(optarg, NULL, 0); break; - - case 's': - stats_flag = 1; + case 't': + timeout = strtoul(optarg, NULL, 0); + if(!timeout) timeout = 10; break; - - case 'u': - unreachable_flag = 1; + case 'H': + add_target(optarg); break; - - case 'a': - alive_flag = 1; + case 'l': + ttl = (unsigned char)strtoul(optarg, NULL, 0); break; - - case 'v': - printf("%s: Version %s $Date$\n", prog, VERSION); - printf("%s: comments to %s\n", prog, email); - exit(STATE_OK); - - case 'g': - /* use IP list generation */ - /* mutex with file input or command line targets */ - generate_flag = 1; + case 'd': /* implement later, for cluster checks */ + warn_down = (unsigned char)strtoul(optarg, &ptr, 0); + if(ptr) { + crit_down = (unsigned char)strtoul(ptr + 1, NULL, 0); + } break; - - default: - printf(_("Option flag -%c specified, but not recognized\n"), c); - print_usage(); + case 'h': case 'V': default: + usage(arg, NULL); break; + } } } - /* arguments are parsed, so now we validate them */ - - if(count > 1) count_flag = 1; - - /* set threshold values to 10usec units (inherited from fping.c) */ - crit.rta = crit.rta / 10; - warn.rta = warn.rta / 10; - select_time = crit.rta; - /* this isn't critical, but will most likely not be what the user expects - * so we tell him/her about it, but keep running anyways */ - if(warn.pl > crit.pl || warn.rta > crit.rta) { - select_time = warn.rta; - printf("(WARNING threshold > CRITICAL threshold) :: "); - fflush(stdout); + argv = &argv[optind]; + while(*argv) { + add_target(*argv); + argv++; } - - /* A timeout smaller than maximum rta threshold makes no sense */ - if(timeout < crit.rta) timeout = crit.rta; - else if(timeout < warn.rta) timeout = warn.rta; - - if((interval < MIN_INTERVAL * 100 || retry > MAX_RETRY) && getuid()) { - printf(_("%s: these options are too risky for mere mortals.\n"), prog); - printf(_("%s: You need i >= %u and r < %u\n"), - prog, MIN_INTERVAL, MAX_RETRY); - printf(_("Current settings; i = %d, r = %d\n"), - interval / 100, retry); - print_usage(); + if(!targets) { + errno = 0; + crash("No hosts to check"); + exit(3); } - if((ping_data_size > MAX_PING_DATA) || (ping_data_size < MIN_PING_DATA)) { - printf(_("%s: data size %u not valid, must be between %u and %u\n"), - prog, ping_data_size, MIN_PING_DATA, MAX_PING_DATA); - print_usage(); - + if(!sockets) { + if(icmp_sock == -1) { + errno = icmp_sockerrno; + crash("Failed to obtain ICMP socket"); + return -1; + } + /* if(udp_sock == -1) { */ + /* errno = icmp_sockerrno; */ + /* crash("Failed to obtain UDP socket"); */ + /* return -1; */ + /* } */ + /* if(tcp_sock == -1) { */ + /* errno = icmp_sockerrno; */ + /* crash("Failed to obtain TCP socker"); */ + /* return -1; */ + /* } */ } + if(!ttl) ttl = 64; - if((backoff > MAX_BACKOFF_FACTOR) || (backoff < MIN_BACKOFF_FACTOR)) { - printf(_("%s: backoff factor %.1f not valid, must be between %.1f and %.1f\n"), - prog, backoff, MIN_BACKOFF_FACTOR, MAX_BACKOFF_FACTOR); - print_usage(); - + if(icmp_sock) { + result = setsockopt(icmp_sock, SOL_IP, IP_TTL, &ttl, sizeof(ttl)); + if(debug) { + if(result == -1) printf("setsockopt failed\n"); + else printf("ttl set to %u\n", ttl); + } } - if(count > MAX_COUNT) { - printf(_("%s: count %u not valid, must be less than %u\n"), - prog, count, MAX_COUNT); - print_usage(); + /* stupid users should be able to give whatever thresholds they want + * (nothing will break if they do), but some anal plugin maintainer + * will probably add some printf() thing here later, so it might be + * best to at least show them where to do it. ;) */ + if(warn.pl > crit.pl) warn.pl = crit.pl; + if(warn.rta > crit.rta) warn.rta = crit.rta; + if(warn_down > crit_down) crit_down = warn_down; + + signal(SIGINT, finish); + signal(SIGHUP, finish); + signal(SIGTERM, finish); + signal(SIGALRM, finish); + if(debug) printf("Setting alarm timeout to %u seconds\n", timeout); + alarm(timeout); + + /* make sure we don't wait any longer than necessary */ + gettimeofday(&prog_start, &tz); + max_completion_time = + ((targets * packets * pkt_interval) + (targets * target_interval)) + + (targets * packets * crit.rta) + crit.rta; + + if(debug) { + printf("packets: %u, targets: %u\n" + "target_interval: %0.3f, pkt_interval %0.3f\n" + "crit.rta: %0.3f\n" + "max_completion_time: %0.3f\n", + packets, targets, + (float)target_interval / 1000, (float)pkt_interval / 1000, + (float)crit.rta / 1000, + (float)max_completion_time / 1000); } - if(count_flag) { - alive_flag = unreachable_flag = 0; + if(debug) { + if(max_completion_time > (u_int)timeout * 1000000) { + printf("max_completion_time: %llu timeout: %u\n", + max_completion_time, timeout); + printf("Timout must be at lest %llu\n", + max_completion_time / 1000000 + 1); + } } - trials = (count > retry + 1) ? count : retry + 1; - - /* handle host names supplied on command line or in a file */ - /* if the generate_flag is on, then generate the IP list */ - argv = &argv[optind]; - - /* cover allowable conditions */ - - /* generate requires command line parameters beyond the switches */ - if(generate_flag && !*argv) { - printf(_("Generate flag requires command line parameters beyond switches\n")); - print_usage(); + icmp_pkt_size = icmp_data_size + ICMP_MINLEN; + if(debug > 2) printf("icmp_pkt_size = %u\n", icmp_pkt_size); + if(icmp_pkt_size < sizeof(struct icmp) + sizeof(struct icmp_ping_data)) { + icmp_pkt_size = sizeof(struct icmp) + sizeof(struct icmp_ping_data); } - - if(*argv && !generate_flag) { - while(*argv) { - if(!(host_ptr->entry = malloc(strlen(*argv) + 1))) { - crash(_("Failed to allocate memory for hostname")); - } - memset(host_ptr->entry, 0, strlen(*argv) + 1); - host_ptr->entry = memcpy(host_ptr->entry, *argv, strlen(*argv)); - if(!(host_ptr->next = malloc(sizeof(struct host_name_list)))) - crash(_("Failed to allocate memory for hostname")); - host_ptr = host_ptr->next; - host_ptr->next = NULL; - -// add_name(*argv); - argv++; - } + if(debug > 2) printf("icmp_pkt_size = %u\n", icmp_pkt_size); + + if(debug) { + printf("crit = {%u, %u%%}, warn = {%u, %u%%}\n", + crit.rta, crit.pl, warn.rta, warn.pl); + printf("pkt_interval: %u target_interval: %u retry_interval: %u\n", + pkt_interval, target_interval, retry_interval); + printf("icmp_pkt_size: %u timeout: %u\n", + icmp_pkt_size, timeout); } - // now add all the hosts - host_ptr = host_base_ptr; - while(host_ptr->next) { - add_name(host_ptr->entry); - host_ptr = host_ptr->next; + if(packets > 20) { + errno = 0; + crash("packets is > 20 (%d)", packets); } - if(!num_hosts) { - printf(_("No hosts to work with!\n\n")); - print_usage(); + host = list; + table = malloc(sizeof(struct rta_host **) * (argc - 1)); + i = 0; + while(host) { + host->id = i; + table[i] = host; + host = host->next; + i++; } - /* allocate array to hold outstanding ping requests */ - table = (HOST_ENTRY **) malloc(sizeof(HOST_ENTRY *) * num_hosts); - if(!table) crash(_("Can't malloc array of hosts")); - - cursor = rrlist; - - for(num_jobs = 0; num_jobs < num_hosts; num_jobs++) { - table[num_jobs] = cursor; - cursor->i = num_jobs; - - cursor = cursor->next; - } /* FOR */ + run_checks(); - ping_pkt_size = ping_data_size + SIZE_ICMP_HDR; + errno = 0; + finish(0); - signal(SIGINT, (void *)finish); - - gettimeofday(&my_start_time, &tz); - current_time = my_start_time; - - last_send_time.tv_sec = current_time.tv_sec - 10000; - - cursor = rrlist; - advance = 0; - - /* main loop */ - while(num_jobs) { - /* fetch all packets that receive within time boundaries */ - while(num_pingsent && - cursor && - cursor->num_sent > cursor->num_recv && - wait_for_reply(sock)) ; - - if(cursor && advance) { - cursor = cursor->next; - } - - gettimeofday(¤t_time, &tz); - lt = timeval_diff(¤t_time, &last_send_time); - ht = timeval_diff(¤t_time, &cursor->last_send_time); - - advance = 1; - - /* if it's OK to send while counting or looping or starting */ - if(lt > interval) { - /* send if starting or looping */ - if((cursor->num_sent == 0)) { - send_ping(sock, cursor); - continue; - } /* IF */ - - /* send if counting and count not exceeded */ - if(count_flag) { - if(cursor->num_sent < count) { - send_ping(sock, cursor); - continue; - } /* IF */ - } /* IF */ - } /* IF */ - - /* is-it-alive mode, and timeout exceeded while waiting for a reply */ - /* and we haven't exceeded our retries */ - if((lt > interval) && !count_flag && !cursor->num_recv && - (ht > timeout) && (cursor->waiting < retry + 1)) { - num_timeout++; - - /* try again */ - send_ping(sock, cursor); - continue; - } /* IF */ - - /* didn't send, can we remove? */ - - /* remove if counting and count exceeded */ - if(count_flag) { - if((cursor->num_sent >= count)) { - remove_job(cursor); - continue; - } /* IF */ - } /* IF */ - else { - /* normal mode, and we got one */ - if(cursor->num_recv) { - remove_job(cursor); - continue; - } /* IF */ + return(0); +} - /* normal mode, and timeout exceeded while waiting for a reply */ - /* and we've run out of retries, so node is unreachable */ - if((ht > timeout) && (cursor->waiting >= retry + 1)) { - num_timeout++; - remove_job(cursor); +static void +run_checks() +{ + u_int i, t, result; + u_int final_wait, time_passed; + + /* this loop might actually violate the pkt_interval or target_interval + * settings, but only if there aren't any packets on the wire which + * indicates that the target can handle an increased packet rate */ + for(i = 0; i < packets; i++) { + for(t = 0; t < targets; t++) { + /* don't send useless packets */ + if(!targets_alive) finish(0); + if(table[t]->flags & FLAG_LOST_CAUSE) { + if(debug) printf("%s is a lost cause. not sending any more\n", + table[t]->name); continue; + } + + /* we're still in the game, so send next packet */ + (void)send_icmp_ping(icmp_sock, table[t]); + result = wait_for_reply(icmp_sock, target_interval); + } + result = wait_for_reply(icmp_sock, pkt_interval * targets); + } - } /* IF */ - } /* ELSE */ + if(icmp_pkts_en_route && targets_alive) { + time_passed = get_timevaldiff(NULL, NULL); + final_wait = max_completion_time - time_passed; - /* could send to this host, so keep considering it */ - if(ht > interval) { - advance = 0; + if(debug) { + printf("time_passed: %u final_wait: %u max_completion_time: %llu\n", + time_passed, final_wait, max_completion_time); + } + if(time_passed > max_completion_time) { + if(debug) printf("Time passed. Finishing up\n"); + finish(0); } - } /* WHILE */ - finish(); - return 0; -} /* main() */ + /* catch the packets that might come in within the timeframe, but + * haven't yet */ + if(debug) printf("Waiting for %u micro-seconds (%0.3f msecs)\n", + final_wait, (float)final_wait / 1000); + result = wait_for_reply(icmp_sock, final_wait); + } +} -/************************************************************ - * Description: - * - * Main program clean up and exit point - ************************************************************/ -void finish() +/* response structure: + * ip header : 20 bytes + * icmp header : 28 bytes + * icmp echo reply : the rest + */ +static int +wait_for_reply(int sock, u_int t) { - int i; - HOST_ENTRY *h; - - gettimeofday(&my_end_time, &tz); - - /* tot up unreachables */ - for(i=0; i<num_hosts; i++) { - h = table[i]; - - if(!h->num_recv) { - num_unreachable++; - status = fin_stat = STATE_CRITICAL; - if(num_hosts == 1) { - printf("CRITICAL - %s is down (lost 100%%)|" - "rta=;%d;%d;; pl=100%%;%d;%d;;\n", - h->host, - warn.rta / 100, crit.rta / 100, - warn.pl, crit.pl); - } - else { - printf(_("%s is down (lost 100%%)"), h->host); - } + int n, hlen; + static char buf[4096]; + struct sockaddr_in resp_addr; + struct ip *ip; + struct icmp *icp, *sent_icmp; + struct rta_host *host; + struct icmp_ping_data *data; + struct timeval wait_start, now; + u_int tdiff, i, per_pkt_wait; + + /* if we can't listen or don't have anything to listen to, just return */ + if(!t || !icmp_pkts_en_route) return 0; + + gettimeofday(&wait_start, &tz); + + i = t; + per_pkt_wait = t / icmp_pkts_en_route; + while(icmp_pkts_en_route && get_timevaldiff(&wait_start, NULL) < i) { + t = per_pkt_wait; + + /* wrap up if all targets are declared dead */ + if(!targets_alive || + get_timevaldiff(&prog_start, NULL) >= max_completion_time || + (mode == MODE_HOSTCHECK && targets_down)) + { + finish(0); } - else { - /* reset the status */ - status = STATE_OK; - /* check for warning before critical, for debugging purposes */ - if(warn.rta <= h->total_time / h->num_recv) { -/* printf("warn.rta exceeded\n"); -*/ status = STATE_WARNING; - } - if(warn.pl <= ((h->num_sent - h->num_recv) * 100) / h->num_sent) { -/* printf("warn.pl exceeded (pl=%d)\n", - ((h->num_sent - h->num_recv) * 100) / h->num_sent); -*/ status = STATE_WARNING; - } - if(crit.rta <= h->total_time / h->num_recv) { -/* printf("crit.rta exceeded\n"); -*/ status = STATE_CRITICAL; - } - if(crit.pl <= ((h->num_sent - h->num_recv) * 100) / h->num_sent) { -/* printf("crit.pl exceeded (pl=%d)\n", - ((h->num_sent - h->num_recv) * 100) / h->num_sent); -*/ status = STATE_CRITICAL; + /* reap responses until we hit a timeout */ + n = recvfrom_wto(sock, buf, sizeof(buf), + (struct sockaddr *)&resp_addr, &t); + if(!n) { + if(debug > 1) { + printf("recvfrom_wto() timed out during a %u usecs wait\n", + per_pkt_wait); } + continue; /* timeout for this one, so keep trying */ + } + if(n < 0) { + if(debug) printf("recvfrom_wto() returned errors\n"); + return n; + } - if(num_hosts == 1 || status != STATE_OK) { - printf("%s - %s: rta %s ms, lost %d%%", - state_text(status), h->host, - sprint_tm(h->total_time / h->num_recv), - h->num_sent > 0 ? ((h->num_sent - h->num_recv) * 100) / h->num_sent : 0 - ); - /* perfdata only available for single-host stuff */ - if(num_hosts == 1) { - printf("|rta=%sms;%d;%d;; pl=%d%%;%d;%d;;\n", - sprint_tm(h->total_time / h->num_recv), warn.rta / 100, crit.rta / 100, - h->num_sent > 0 ? ((h->num_sent - h->num_recv) * 100) / h->num_sent : 0, warn.pl, crit.pl - ); - } - else printf(" :: "); - } + ip = (struct ip *)buf; + if(debug > 1) printf("received %u bytes from %s\n", + ntohs(ip->ip_len), inet_ntoa(resp_addr.sin_addr)); + +/* obsolete. alpha on tru64 provides the necessary defines, but isn't broken */ +/* #if defined( __alpha__ ) && __STDC__ && !defined( __GLIBC__ ) */ + /* alpha headers are decidedly broken. Using an ansi compiler, + * they provide ip_vhl instead of ip_hl and ip_v, so we mask + * off the bottom 4 bits */ +/* hlen = (ip->ip_vhl & 0x0f) << 2; */ +/* #else */ + hlen = ip->ip_hl << 2; +/* #endif */ + + if(n < (hlen + ICMP_MINLEN)) { + crash("received packet too short for ICMP (%d bytes, expected %d) from %s\n", + n, hlen + icmp_pkt_size, inet_ntoa(resp_addr.sin_addr)); + } + /* else if(debug) { */ + /* printf("ip header size: %u, packet size: %u (expected %u, %u)\n", */ + /* hlen, ntohs(ip->ip_len) - hlen, */ + /* sizeof(struct ip), icmp_pkt_size); */ + /* } */ + + /* check the response */ + icp = (struct icmp *)(buf + hlen); + sent_icmp = (struct icmp *)(buf + hlen + ICMP_MINLEN); + /* printf("buf: %p, icp: %p, distance: %u (expected %u)\n", */ + /* buf, icp, */ + /* (u_int)icp - (u_int)buf, hlen); */ + /* printf("buf: %p, sent_icmp: %p, distance: %u (expected %u)\n", */ + /* buf, sent_icmp, */ + /* (u_int)sent_icmp - (u_int)buf, hlen + ICMP_MINLEN); */ + + if(icp->icmp_id != pid) { + handle_random_icmp(icp, &resp_addr); + continue; + } - /* fin_stat should always hold the WORST state */ - if(fin_stat != STATE_CRITICAL && status != STATE_OK) { - fin_stat = status; - } + if(icp->icmp_type != ICMP_ECHOREPLY || icp->icmp_seq >= targets) { + if(debug > 2) printf("not a proper ICMP_ECHOREPLY\n"); + handle_random_icmp(icp, &resp_addr); + continue; } - } - if(num_noaddress) { - printf(_("No hostaddress specified.\n")); - print_usage(); - } - else if(num_alive != num_hosts) { - /* for future multi-check support */ - /*printf("num_alive != num_hosts (%d : %d)\n", num_alive, num_hosts);*/ - fin_stat = STATE_CRITICAL; - } + /* this is indeed a valid response */ + data = (struct icmp_ping_data *)(icp->icmp_data); - if(num_hosts > 1) { - if(num_alive == num_hosts) { - printf(_("OK - All %d hosts are alive\n"), num_hosts); + host = table[icp->icmp_seq]; + gettimeofday(&now, &tz); + tdiff = get_timevaldiff(&data->stime, &now); + + host->time_waited += tdiff; + host->icmp_recv++; + icmp_recv++; + + if(debug) { + printf("%0.3f ms rtt from %s, outgoing ttl: %u, incoming ttl: %u\n", + (float)tdiff / 1000, inet_ntoa(resp_addr.sin_addr), + ttl, ip->ip_ttl); } - else { - printf(_("CRITICAL - %d of %d hosts are alive\n"), num_alive, num_hosts); + + /* if we're in hostcheck mode, exit with limited printouts */ + if(mode == MODE_HOSTCHECK) { + printf("OK - %s responds to ICMP. Packet %u, rta %0.3fms|" + "pkt=%u;;0;%u rta=%0.3f;%0.3f;%0.3f;;\n", + host->name, icmp_recv, (float)tdiff / 1000, + icmp_recv, packets, (float)tdiff / 1000, + (float)warn.rta / 1000, (float)crit.rta / 1000); + exit(STATE_OK); } } - exit(fin_stat); -} + return 0; +} -void send_ping(int lsock, HOST_ENTRY *h) +/* the ping functions */ +static int +send_icmp_ping(int sock, struct rta_host *host) { - char *buffer; + static char *buf = NULL; /* re-use so we prevent leaks */ + long int len; struct icmp *icp; - PING_DATA *pdp; - int n; - - buffer = (char *)malloc((size_t) ping_pkt_size); - if(!buffer) - crash(_("Can't malloc ping packet")); + struct icmp_ping_data *data; + struct timeval tv; + struct sockaddr *addr; - memset(buffer, 0, ping_pkt_size * sizeof(char)); - icp = (struct icmp *)buffer; + + if(sock == -1) { + errno = 0; + crash("Attempt to send on bogus socket"); + return -1; + } + addr = (struct sockaddr *)&host->saddr_in; + + if(!buf) { + buf = (char *)malloc(icmp_pkt_size + sizeof(struct ip)); + if(!buf) { + crash("send_icmp_ping(): failed to malloc %d bytes for send buffer", + icmp_pkt_size); + return -1; /* might be reached if we're in debug mode */ + } + } + memset(buf, 0, icmp_pkt_size + sizeof(struct ip)); - gettimeofday(&h->last_send_time, &tz); + if((gettimeofday(&tv, &tz)) == -1) return -1; + icp = (struct icmp *)buf; icp->icmp_type = ICMP_ECHO; icp->icmp_code = 0; icp->icmp_cksum = 0; - icp->icmp_seq = h->i; - icp->icmp_id = ident; - - pdp = (PING_DATA *) (buffer + SIZE_ICMP_HDR); - pdp->ping_ts = h->last_send_time; - pdp->ping_count = h->num_sent; - - icp->icmp_cksum = in_cksum((u_short *) icp, ping_pkt_size); - - n = sendto(lsock, buffer, ping_pkt_size, 0, - (struct sockaddr *)&h->saddr, sizeof(struct sockaddr_in)); - - if(n < 0 || (unsigned int)n != ping_pkt_size) { - if(unreachable_flag) { - printf(_("%s error while sending ping: %s\n"), - h->host, strerror(errno)); - } /* IF */ - - num_unreachable++; - remove_job(h); - } /* IF */ - else { - /* mark this trial as outstanding */ - h->resp_times[h->num_sent] = RESP_WAITING; + icp->icmp_id = pid; + icp->icmp_seq = host->id; + data = (struct icmp_ping_data *)icp->icmp_data; + data->ping_id = 10; /* host->icmp.icmp_sent; */ + memcpy(&data->stime, &tv, sizeof(struct timeval)); + icp->icmp_cksum = icmp_checksum((u_short *)icp, icmp_pkt_size); + + len = sendto(sock, buf, icmp_pkt_size, 0, (struct sockaddr *)addr, + sizeof(struct sockaddr)); + + if(len < 0 || (unsigned int)len != icmp_pkt_size) { + if(debug) printf("Failed to send ping to %s\n", + inet_ntoa(host->saddr_in.sin_addr)); + return -1; + } - h->num_sent++; - h->waiting++; - num_pingsent++; - last_send_time = h->last_send_time; - } /* ELSE */ + icmp_sent++; + host->icmp_sent++; - free(buffer); -} /* send_ping() */ + return 0; +} -int wait_for_reply(int lsock) +static int +recvfrom_wto(int sock, char *buf, unsigned int len, struct sockaddr *saddr, + u_int *timo) { - int result; - static char buffer[4096]; - struct sockaddr_in response_addr; - struct ip *ip; - int hlen; - struct icmp *icp; + u_int slen; int n; - HOST_ENTRY *h = NULL; - long this_reply; - int this_count; - struct timeval sent_time; - - result = recvfrom_wto(lsock, buffer, sizeof(buffer), - (struct sockaddr *)&response_addr, select_time); - - if(result < 0) return 0; /* timeout */ - - ip = (struct ip *)buffer; - -#if defined( __alpha__ ) && __STDC__ && !defined( __GLIBC__ ) - /* The alpha headers are decidedly broken. - * Using an ANSI compiler, it provides ip_vhl instead of ip_hl and - * ip_v. So, to get ip_hl, we mask off the bottom four bits. - */ - hlen = (ip->ip_vhl & 0x0F) << 2; -#else - hlen = ip->ip_hl << 2; -#endif /* defined(__alpha__) && __STDC__ */ + struct timeval to, then, now; + fd_set rd, wr; - if(result < hlen + ICMP_MINLEN) { - printf(_("Received packet too short for ICMP (%d bytes from %s)\n"), result, - inet_ntoa(response_addr.sin_addr)); - - return (1); /* too short */ - } /* IF */ - - icp = (struct icmp *)(buffer + hlen); - if(icp->icmp_type != ICMP_ECHOREPLY) { - /* handle some problem */ - if(handle_random_icmp(icp, &response_addr)) - num_othericmprcvd++; - - return 1; - } /* IF */ - - if(icp->icmp_id != ident) - return 1; /* packet received, but not the one we are looking for! */ - - num_pingreceived++; - - if(icp->icmp_seq >= (n_short) num_hosts) - return(1); /* packet received, don't worry about it anymore */ - - n = icp->icmp_seq; - h = table[n]; - - /* received ping is cool, so process it */ - - gettimeofday(¤t_time, &tz); - h->waiting = 0; - h->num_recv++; - - memcpy(&sent_time, icp->icmp_data + offsetof(PING_DATA, ping_ts), - sizeof(sent_time)); - memcpy(&this_count, icp->icmp_data, sizeof(this_count)); - - this_reply = timeval_diff(¤t_time, &sent_time); - h->total_time += this_reply; - total_replies++; - - /* note reply time in array, probably */ - if((this_count >= 0) && ((unsigned int)this_count < trials)) { - if(h->resp_times[this_count] != RESP_WAITING) { - printf(_("%s : duplicate for [%d], %d bytes, %s ms"), - h->host, this_count, result, sprint_tm(this_reply)); - - if(response_addr.sin_addr.s_addr != h->saddr.sin_addr.s_addr) - printf(" [<- %s]\n", inet_ntoa(response_addr.sin_addr)); - } /* IF */ - else h->resp_times[this_count] = this_reply; - } /* IF */ - else { - /* count is out of bounds?? */ - printf(_("%s : duplicate for [%d], %d bytes, %s ms\n"), - h->host, this_count, result, sprint_tm(this_reply)); - } /* ELSE */ - - if(h->num_recv == 1) { - num_alive++; - } /* IF */ - - return num_jobs; -} /* wait_for_reply() */ - -int handle_random_icmp(struct icmp *p, struct sockaddr_in *addr) -{ - struct icmp *sent_icmp; - u_char *c; - HOST_ENTRY *h; - - c = (u_char *) p; - switch (p->icmp_type) { - case ICMP_UNREACH: - sent_icmp = (struct icmp *)(c + 28); - - if((sent_icmp->icmp_type == ICMP_ECHO) && - (sent_icmp->icmp_id == ident) && - (sent_icmp->icmp_seq < (n_short) num_hosts)) { - /* this is a response to a ping we sent */ - h = table[sent_icmp->icmp_seq]; - - if(p->icmp_code > ICMP_UNREACH_MAXTYPE) { - printf(_("ICMP Unreachable (Invalid Code) from %s for ICMP Echo sent to %s"), - inet_ntoa(addr->sin_addr), h->host); - - } /* IF */ - else { - printf(_("ICMP Unreachable from %s for ICMP Echo sent to %s"), - inet_ntoa(addr->sin_addr), h->host); - - } /* ELSE */ - - if(inet_addr(h->host) == INADDR_NONE) - printf(" (%s)", inet_ntoa(h->saddr.sin_addr)); - - printf("\n"); - - } /* IF */ - - return 1; - - case ICMP_SOURCEQUENCH: - case ICMP_REDIRECT: - case ICMP_TIMXCEED: - case ICMP_PARAMPROB: - sent_icmp = (struct icmp *)(c + 28); - if((sent_icmp->icmp_type = ICMP_ECHO) && - (sent_icmp->icmp_id = ident) && - (sent_icmp->icmp_seq < (n_short) num_hosts)) { - /* this is a response to a ping we sent */ - h = table[sent_icmp->icmp_seq]; - printf(_("ICMP Unreachable from %s for ICMP Echo sent to %s"), - inet_ntoa(addr->sin_addr), h->host); - - if(inet_addr(h->host) == INADDR_NONE) - printf(" (%s)", inet_ntoa(h->saddr.sin_addr)); - - printf("\n"); - } /* IF */ - - return 2; - - /* no way to tell whether any of these are sent due to our ping */ - /* or not (shouldn't be, of course), so just discard */ - case ICMP_TSTAMP: - case ICMP_TSTAMPREPLY: - case ICMP_IREQ: - case ICMP_IREQREPLY: - case ICMP_MASKREQ: - case ICMP_MASKREPLY: - default: + if(!*timo) { + if(debug) printf("*timo is not\n"); return 0; + } - } /* SWITCH */ - -} /* handle_random_icmp() */ - -int in_cksum(u_short * p, int n) -{ - register u_short answer; - register long sum = 0; - u_short odd_byte = 0; - - while(n > 1) { - sum += *p++; - n -= 2; - } /* WHILE */ - - /* mop up an odd byte, if necessary */ - if(n == 1) { - *(u_char *) (&odd_byte) = *(u_char *) p; - sum += odd_byte; - } /* IF */ - - sum = (sum >> 16) + (sum & 0xffff); /* add hi 16 to low 16 */ - sum += (sum >> 16); /* add carry */ - answer = ~sum; /* ones-complement, truncate */ - - return (answer); - -} /* in_cksum() */ - -void add_name(char *name) -{ - struct hostent *host_ent; - int ipaddress; - struct in_addr *ipa = (struct in_addr *)&ipaddress; - struct in_addr *host_add; - char *nm; - int i = 0; - - if((ipaddress = inet_addr(name)) != -1) { - /* input name is an IP addr, go with it */ - if(name_flag) { - if(addr_flag) - add_addr(name, na_cat(get_host_by_address(*ipa), *ipa), *ipa); - else { - nm = cpystr(get_host_by_address(*ipa)); - add_addr(name, nm, *ipa); - - } /* ELSE */ - } /* IF */ - else add_addr(name, name, *ipa); - - return; - } /* IF */ - - /* input name is not an IP addr, maybe it's a host name */ - host_ent = gethostbyname(name); - if(host_ent == NULL) { - if(h_errno == TRY_AGAIN) { - u_sleep(DNS_TIMEOUT); - host_ent = gethostbyname(name); - } /* IF */ - - if(host_ent == NULL) { - printf(_("%s address not found\n"), name); - num_noaddress++; - return; - } /* IF */ - } /* IF */ - - host_add = (struct in_addr *)*(host_ent->h_addr_list); - if(host_add == NULL) { - printf(_("%s has no address data\n"), name); - num_noaddress++; - return; - } /* IF */ - else { - /* it is indeed a hostname with a real address */ - while(host_add) { - if(name_flag && addr_flag) - add_addr(name, na_cat(name, *host_add), *host_add); - else if(addr_flag) { - nm = cpystr(inet_ntoa(*host_add)); - add_addr(name, nm, *host_add); - } /* ELSE IF */ - else { - add_addr(name, name, *host_add); - } - - if(!multif_flag) break; - - host_add = (struct in_addr *)(host_ent->h_addr_list[++i]); - } /* WHILE */ - } /* ELSE */ -} /* add_name() */ - - -char *na_cat(char *name, struct in_addr ipaddr) -{ - char *nm, *as; - - as = inet_ntoa(ipaddr); - nm = (char *)malloc(strlen(name) + strlen(as) + 4); - - if(!nm) - crash(_("Can't allocate some space for a string")); + to.tv_sec = *timo / 1000000; + to.tv_usec = (*timo - (to.tv_sec * 1000000)); - strcpy(nm, name); - strcat(nm, " ("); - strcat(nm, as); - strcat(nm, ")"); + FD_ZERO(&rd); + FD_ZERO(&wr); + FD_SET(sock, &rd); + errno = 0; + gettimeofday(&then, &tz); + n = select(sock + 1, &rd, &wr, NULL, &to); + if(n < 0) crash("select() in recvfrom_wto"); + gettimeofday(&now, &tz); + *timo = get_timevaldiff(&then, &now); - return (nm); + if(!n) return 0; /* timeout */ -} /* na_cat() */ + slen = sizeof(struct sockaddr); + return recvfrom(sock, buf, len, 0, saddr, &slen); +} -void add_addr(char *name, char *host, struct in_addr ipaddr) +static void +finish(int sig) { - HOST_ENTRY *p; - unsigned int n; - int *i; - - if(!(p = (HOST_ENTRY *) malloc(sizeof(HOST_ENTRY)))) { - crash(_("Can't allocate HOST_ENTRY")); + u_int i = 0; + unsigned char pl; + double rta; + struct rta_host *host; + char *status_string[] = + {"OK", "WARNING", "CRITICAL", "UNKNOWN", "DEPENDENT"}; + + alarm(0); + if(debug > 1) printf("finish(%d) called\n", sig); + + if(icmp_sock != -1) close(icmp_sock); + if(udp_sock != -1) close(udp_sock); + if(tcp_sock != -1) close(tcp_sock); + + if(debug) { + printf("icmp_sent: %u icmp_recv: %u icmp_lost: %u\n", + icmp_sent, icmp_recv, icmp_lost); + printf("targets: %u targets_alive: %u\n", targets, targets_alive); } - memset((char *)p, 0, sizeof(HOST_ENTRY)); - - p->name = name; - p->host = host; - p->saddr.sin_family = AF_INET; - p->saddr.sin_addr = ipaddr; - p->running = 1; + /* iterate thrice to calculate values, give output, and print perfparse */ + host = list; + while(host) { + if(!host->icmp_recv) { + /* rta 0 is ofcourse not entirely correct, but will still show up + * conspicuosly as missing entries in perfparse and cacti */ + pl = 100; + rta = 0; + status = STATE_CRITICAL; + /* up the down counter if not already counted */ + if(!(host->flags & FLAG_LOST_CAUSE) && targets_alive) targets_down++; + } + else { + pl = ((host->icmp_sent - host->icmp_recv) * 100) / host->icmp_sent; + rta = (double)host->time_waited / host->icmp_recv; + } + host->pl = pl; + host->rta = rta; + if(!status && (pl >= warn.pl || rta >= warn.rta)) status = STATE_WARNING; + if(pl >= crit.pl || rta >= crit.rta) status = STATE_CRITICAL; - /* array for response time results */ - if(!(i = (int *)malloc(trials * sizeof(int)))) { - crash(_("Can't allocate resp_times array")); + host = host->next; } + /* this is inevitable */ + if(!targets_alive) status = STATE_CRITICAL; + printf("%s - ", status_string[status]); + + host = list; + while(host) { + if(debug) puts(""); + if(i) { + if(i < targets) printf(" :: "); + else printf("\n"); + } + i++; + if(!host->icmp_recv) { + status = STATE_CRITICAL; + if(host->flags & FLAG_LOST_CAUSE) { + printf("%s: %s @ %s. rta nan, lost %d%%", + host->name, + get_icmp_error_msg(host->icmp_type, host->icmp_code), + inet_ntoa(host->error_addr), + 100); + } + else { /* not marked as lost cause, so we have no flags for it */ + printf("%s: rta nan, lost 100%%", host->name); + } + } + else { /* !icmp_recv */ + printf("%s: rta %0.3fms, lost %u%%", + host->name, host->rta / 1000, host->pl); + } - for(n = 1; n < trials; n++) - i[n] = RESP_UNUSED; - - p->resp_times = i; - - if(!rrlist) { - rrlist = p; - p->next = p; - p->prev = p; - } /* IF */ - else { - p->next = rrlist; - p->prev = rrlist->prev; - p->prev->next = p; - p->next->prev = p; - } /* ELSE */ - - num_hosts++; -} /* add_addr() */ - - -void remove_job(HOST_ENTRY * h) -{ - h->running = 0; - h->waiting = 0; - num_jobs--; - - - if(num_jobs) { - /* remove us from list of active jobs */ - h->prev->next = h->next; - h->next->prev = h->prev; - if(h == cursor) cursor = h->next; - } /* IF */ - else { - cursor = NULL; - rrlist = NULL; - } /* ELSE */ - -} /* remove_job() */ - - -char *get_host_by_address(struct in_addr in) -{ - struct hostent *h; - h = gethostbyaddr((char *)&in, sizeof(struct in_addr), AF_INET); + host = host->next; + } - if(h == NULL || h->h_name == NULL) - return inet_ntoa(in); - else - return (char *)h->h_name; + /* iterate once more for pretty perfparse output */ + printf("|"); + i = 0; + host = list; + while(host) { + if(debug) puts(""); + printf("%srta=%0.3fms;%0.3f;%0.3f;0; %spl=%u%%;%u;%u;; ", + (targets > 1) ? host->name : "", + host->rta / 1000, (float)warn.rta / 1000, (float)crit.rta / 1000, + (targets > 1) ? host->name : "", + host->pl, warn.pl, crit.pl); + + host = host->next; + } -} /* get_host_by_address() */ + /* finish with an empty line */ + puts(""); + if(debug) printf("targets: %u, targets_alive: %u\n", + targets, targets_alive); + exit(status); +} -char *cpystr(char *string) +static u_int +get_timevaldiff(struct timeval *early, struct timeval *later) { - char *dst; - - if(string) { - dst = (char *)malloc(1 + strlen(string)); - if(!dst) crash(_("malloc() failed!")); - - strcpy(dst, string); - return dst; - - } /* IF */ - else return NULL; - -} /* cpystr() */ + u_int ret; + struct timeval now; + if(!later) { + gettimeofday(&now, &tz); + later = &now; + } + if(!early) early = &prog_start; -void crash(char *msg) -{ - if(errno || h_errno) { - if(errno) - printf("%s: %s : %s\n", prog, msg, strerror(errno)); - if(h_errno) - printf(_("%s: %s : A network error occurred\n"), prog, msg); + /* if early > later we return 0 so as to indicate a timeout */ + if(early->tv_sec > early->tv_sec || + (early->tv_sec == later->tv_sec && early->tv_usec > later->tv_usec)) + { + return 0; } - else printf("%s: %s\n", prog, msg); - exit(STATE_UNKNOWN); -} /* crash() */ + ret = (later->tv_sec - early->tv_sec) * 1000000; + ret += later->tv_usec - early->tv_usec; + return ret; +} -long timeval_diff(struct timeval *a, struct timeval *b) +static int +add_target_ip(char *arg, struct in_addr *in) { - double temp; - - temp = (((a->tv_sec * 1000000) + a->tv_usec) - - ((b->tv_sec * 1000000) + b->tv_usec)) / 10; - - return (long)temp; - -} /* timeval_diff() */ - + struct rta_host *host; + + /* disregard obviously stupid addresses */ + if(in->s_addr == INADDR_NONE || in->s_addr == INADDR_ANY) + return -1; + + /* no point in adding two identical IP's, so don't. ;) */ + host = list; + while(host) { + if(host->saddr_in.sin_addr.s_addr == in->s_addr) { + if(debug) printf("Identical IP already exists. Not adding %s\n", arg); + return -1; + } + host = host->next; + } -char *sprint_tm(int t) -{ - static char buf[10]; + /* add the fresh ip */ + host = malloc(sizeof(struct rta_host)); + if(!host) { + crash("add_target_ip(%s, %s): malloc(%d) failed", + arg, inet_ntoa(*in), sizeof(struct rta_host)); + } + memset(host, 0, sizeof(struct rta_host)); - /* <= 0.99 ms */ - if(t < 100) { - sprintf(buf, "0.%02d", t); - return (buf); - } /* IF */ + /* set the values. use calling name for output */ + host->name = strdup(arg); - /* 1.00 - 9.99 ms */ - if(t < 1000) { - sprintf(buf, "%d.%02d", t / 100, t % 100); - return (buf); - } /* IF */ + /* fill out the sockaddr_in struct */ + host->saddr_in.sin_family = AF_INET; + host->saddr_in.sin_addr.s_addr = in->s_addr; - /* 10.0 - 99.9 ms */ - if(t < 10000) { - sprintf(buf, "%d.%d", t / 100, (t % 100) / 10); - return (buf); - } /* IF */ + if(!list) list = cursor = host; + else cursor->next = host; - /* >= 100 ms */ - sprintf(buf, "%d", t / 100); - return (buf); -} /* sprint_tm() */ + cursor = host; + targets++; + return 0; +} -/* - * select() is posix, so we expect it to be around - */ -void u_sleep(int u_sec) +/* wrapper for add_target_ip */ +static int +add_target(char *arg) { - int nfound; - struct timeval to; - fd_set readset, writeset; - - to.tv_sec = u_sec / 1000000; - to.tv_usec = u_sec - (to.tv_sec * 1000000); -/* printf("u_sleep :: to.tv_sec: %d, to_tv_usec: %d\n", - (int)to.tv_sec, (int)to.tv_usec); -*/ - FD_ZERO(&writeset); - FD_ZERO(&readset); - nfound = select(0, &readset, &writeset, NULL, &to); - if(nfound < 0) - crash(_("select() in u_sleep:")); - - return; -} /* u_sleep() */ - - -/************************************************************ - * Description: - * - * receive with timeout - * returns length of data read or -1 if timeout - * crash on any other errrors - ************************************************************/ -/* TODO: add MSG_DONTWAIT to recvfrom flags (currently 0) */ -int recvfrom_wto(int lsock, char *buf, int len, struct sockaddr *saddr, int timo) -{ - int nfound = 0, slen, n; - struct timeval to; - fd_set readset, writeset; - - to.tv_sec = timo / 1000000; - to.tv_usec = (timo - (to.tv_sec * 1000000)) * 10; - -/* printf("to.tv_sec: %d, to.tv_usec: %d\n", (int)to.tv_sec, (int)to.tv_usec); -*/ - - FD_ZERO(&readset); - FD_ZERO(&writeset); - FD_SET(lsock, &readset); - nfound = select(lsock + 1, &readset, &writeset, NULL, &to); - if(nfound < 0) crash(_("select() in recvfrom_wto")); - - if(nfound == 0) return -1; /* timeout */ - - if(nfound) { - slen = sizeof(struct sockaddr); - n = recvfrom(sock, buf, len, 0, saddr, &slen); - if(n < 0) crash(_("recvfrom")); - return(n); + int i; + struct hostent *he; + struct in_addr *in, ip; + + /* don't resolve if we don't have to */ + if((ip.s_addr = inet_addr(arg)) != INADDR_NONE) { + /* don't add all ip's if we were given a specific one */ + return add_target_ip(arg, &ip); + /* he = gethostbyaddr((char *)in, sizeof(struct in_addr), AF_INET); */ + /* if(!he) return add_target_ip(arg, in); */ + } + else { + errno = 0; + he = gethostbyname(arg); + if(!he) { + errno = 0; + crash("Failed to resolve %s", arg); + return -1; + } } - return(0); /* 0 bytes read, so return it */ -} /* recvfrom_wto() */ + /* possibly add all the IP's as targets */ + for(i = 0; he->h_addr_list[i]; i++) { + in = (struct in_addr *)he->h_addr_list[i]; + add_target_ip(arg, in); + /* this is silly, but it works */ + if(mode == MODE_HOSTCHECK || mode == MODE_ALL) { + printf("mode: %d\n", mode); + continue; + } + break; + } + return 0; +} /* * u = micro * m = milli * s = seconds + * return value is in microseconds */ -int get_threshold(char *str, threshold *th) +static u_int +get_timevar(const char *str) +{ + char p, u, *ptr; + unsigned int len; + u_int i, d; /* integer and decimal, respectively */ + u_int factor = 1000; /* default to milliseconds */ + + if(!str) return 0; + len = strlen(str); + if(!len) return 0; + + /* unit might be given as ms|m (millisec), + * us|u (microsec) or just plain s, for seconds */ + u = p = '\0'; + u = str[len - 1]; + if(len >= 2 && !isdigit((int)str[len - 2])) p = str[len - 2]; + if(p && u == 's') u = p; + else if(!p) p = u; + if(debug > 2) printf("evaluating %s, u: %c, p: %c\n", str, u, p); + + if(u == 'u') factor = 1; /* microseconds */ + else if(u == 'm') factor = 1000; /* milliseconds */ + else if(u == 's') factor = 1000000; /* seconds */ + if(debug > 2) printf("factor is %u\n", factor); + + i = strtoul(str, &ptr, 0); + if(!ptr || *ptr != '.' || strlen(ptr) < 2 || factor == 1) + return i * factor; + + /* time specified in usecs can't have decimal points, so ignore them */ + if(factor == 1) return i; + + d = strtoul(ptr + 1, NULL, 0); + + /* d is decimal, so get rid of excess digits */ + while(d >= factor) d /= 10; + + /* the last parenthesis avoids floating point exceptions. */ + return ((i * factor) + (d * (factor / 10))); +} + +/* not too good at checking errors, but it'll do (main() should barfe on -1) */ +static int +get_threshold(char *str, threshold *th) { - unsigned int i, factor = 0; - char *p = NULL; + char *p = NULL, i = 0; if(!str || !strlen(str) || !th) return -1; - for(i=0; i<strlen(str); i++) { - /* we happily accept decimal points in round trip time thresholds, - * but we ignore them quite blandly. The new way of specifying higher - * precision is to specify 'u' (for microseconds), - * 'm' (for millisecs - default) or 's' for seconds. */ - if(!p && !factor) { - if(str[i] == 's') factor = 1000000; /* seconds */ - else if(str[i] == 'm') factor = 1000; /* milliseconds */ - else if(str[i] == 'u') factor = 1; /* microseconds */ - } - - if(str[i] == '%') str[i] = '\0'; - else if(str[i] == ',' && !p && i != (strlen(str) - 1)) { - p = &str[i+1]; - str[i] = '\0'; + /* pointer magic slims code by 10 lines. i is bof-stop on stupid libc's */ + p = &str[strlen(str) - 1]; + while(p != &str[1]) { + if(*p == '%') *p = '\0'; + else if(*p == ',' && i) { + *p = '\0'; /* reset it so get_timevar(str) works nicely later */ + th->pl = (unsigned char)strtoul(p+1, NULL, 0); + break; } + i = 1; + p--; } + th->rta = get_timevar(str); + + if(!th->rta) return -1; - /* default to milliseconds */ - if(!factor) factor = 1000; + if(th->rta > MAXTTL * 1000000) th->rta = MAXTTL * 1000000; + if(th->pl > 100) th->pl = 100; - if(!p || !strlen(p)) return -1; - th->rta = (unsigned int)strtoul(str, NULL, 0) * factor; - th->pl = (unsigned int)strtoul(p, NULL, 0); return 0; } -void -print_help (void) +unsigned short +icmp_checksum(unsigned short *p, int n) { - print_revision (progname, revision); + register unsigned short cksum; + register long sum = 0; - printf ("Copyright (c) 2004 Andreas Ericsson <ae@op5.se>\n"); - printf (COPYRIGHT, copyright, email); + while(n > 1) { + sum += *p++; + n -= 2; + } - printf (_("This plugin will check hosts sending icmp pings\n\n")); + /* mop up the occasional odd byte */ + if(n == 1) sum += (unsigned char)*p; - print_usage (); + sum = (sum >> 16) + (sum & 0xffff); /* add hi 16 to low 16 */ + sum += (sum >> 16); /* add carry */ + cksum = ~sum; /* ones-complement, trunc to 16 bits */ - printf (_(UT_HELP_VRSN)); - - printf (_("\ - -H, \n\ - Host name argument for servers\n\ - -b \n\ - ping packet size in bytes (default %d)\n\ - -n \n\ - number of pings to send to each target (default %d)\n\ - -r \n\ - number of retries (default %d)\n\ - -t \n\ - timeout value (in msec) (default %d)\n\ - -i \n\ - packet interval (in msec) (default %d)\n\ - -w \n\ - warning threshold pair, given as RTA[ums],PL[%%]\n\ - -c \n\ - critical threshold pair, given as RTA[ums],PL[%%]\n\ - -D \n\ - increase debug output level\n\n"),ping_data_size,count,retry,(timeout / 100),DEFAULT_INTERVAL); - - printf (_(UT_WARN_CRIT)); - - printf (_(UT_TIMEOUT), DEFAULT_SOCKET_TIMEOUT); - - printf (_(UT_VERBOSE)); - -// printf (_("This plugin will check hosts sending icmp pings\n")); - - printf (_(UT_SUPPORT)); + return cksum; } -void -print_usage (void) +/* make core plugin developers happy (silly, really) */ +static void +usage(unsigned char arg, char *msg) { - printf ("\ -Usage: %s -H <vhost> | [-b <ping packet size in bytes>] [-n <number of pings>]\n\ - [-r <number of retries>] [-t <timeout>] [-i packet interval]\n\ - [-w <warning threshold>] [-c <critical threshold>]\n\ - [-D <debug>] \n", progname); + if(msg) printf("%s: %s\n", progname, msg); + + if(arg == 'V') { + printf("$Id$\n"); + exit(STATE_UNKNOWN); + } + + printf("Usage: %s [options] [-H] host1 host2 hostn\n\n", progname); + + if(arg != 'h') exit(3); + + printf("Where options are any combination of:\n" + " * -H | --host specify a target\n" + " * -w | --warn warning threshold (currently %0.3fms,%u%%)\n" + " * -c | --crit critical threshold (currently %0.3fms,%u%%)\n" + " * -n | --packets number of packets to send (currently %u)\n" + " * -i | --interval max packet interval (currently %0.3fms)\n" + " * -I | --hostint max target interval (currently %0.3fms)\n" + " * -l | --ttl TTL on outgoing packets (currently %u)\n" + " * -t | --timeout timeout value (seconds, currently %u)\n" + " * -b | --bytes icmp packet size (currenly ignored)\n" + " -v | --verbose verbosity++\n" + " -h | --help this cruft\n", + (float)warn.rta / 1000, warn.pl, (float)crit.rta / 1000, crit.pl, + packets, + (float)pkt_interval / 1000, (float)target_interval / 1000, + ttl, timeout); + + puts("\nThe -H switch is optional. Naming a host (or several) to check is not.\n\n" + "Threshold format for -w and -c is 200.25,60% for 200.25 msec RTA and 60%\n" + "packet loss. The default values should work well for most users.\n" + "You can specify different RTA factors using the standardized abbreviations\n" + "us (microseconds), ms (milliseconds, default) or just plain s for seconds.\n\n" + "Threshold format for -d is warn,crit. 12,14 means WARNING if >= 12 hops\n" + "are spent and CRITICAL if >= 14 hops are spent.\n" + "NOTE: Some systems decrease TTL when forming ICMP_ECHOREPLY, others do not.\n\n" + "The -v switch can be specified several times for increased verbosity.\n\n" + "Long options are currently unsupported.\n\n" + "Options marked with * require an argument\n"); + + puts("The latest version of this plugin can be found at http://oss.op5.se/nagios\n" + "or https://devel.op5.se/oss until the day it is included in the official\n" + "plugin distribution.\n"); + + exit(3); } |