PageRenderTime 70ms CodeModel.GetById 20ms app.highlight 44ms RepoModel.GetById 1ms app.codeStats 0ms

/contrib/ntp/scripts/monitoring/ntp.pl

https://bitbucket.org/freebsd/freebsd-head/
Perl | 479 lines | 459 code | 19 blank | 1 comment | 5 complexity | 9e00e2813324cd1605cead96347e1743 MD5 | raw file
  1#!/usr/bin/perl -w
  2;#
  3;# ntp.pl,v 3.1 1993/07/06 01:09:09 jbj Exp
  4;#
  5;# process loop filter statistics file and either
  6;#     - show statistics periodically using gnuplot
  7;#     - or print a single plot
  8;#
  9;#  Copyright (c) 1992 
 10;#  Rainer Pruy Friedrich-Alexander Universitaet Erlangen-Nuernberg
 11;#
 12;#
 13;#############################################################
 14
 15package ntp;
 16
 17$NTP_version = 2;
 18$ctrl_mode=6;
 19
 20$byte1 = (($NTP_version & 0x7)<< 3) & 0x34 | ($ctrl_mode & 0x7);
 21$MAX_DATA = 468;
 22
 23$sequence = 0;			# initial sequence number incred before used
 24$pad=4;
 25$do_auth=0;			# no possibility today
 26$keyid=0;
 27;#list if known keys (passwords)
 28%KEYS = ( 0, "\200\200\200\200\200\200\200\200",
 29	 );
 30
 31;#-----------------------------------------------------------------------------
 32;# access routines for ntp control packet
 33    ;# NTP control message format
 34    ;#  C  LI|VN|MODE  LI 2bit=00  VN 3bit=2(3) MODE 3bit=6 : $byte1
 35    ;#  C  R|E|M|Op    R response  E error    M more   Op opcode
 36    ;#  n  sequence
 37    ;#  n  status
 38    ;#  n  associd
 39    ;#  n  offset
 40    ;#  n  count
 41    ;#  a+ data (+ padding)
 42    ;#  optional authentication data
 43    ;#  N  key
 44    ;#  N2 checksum
 45    
 46;# first byte of packet
 47sub pkt_LI   { return ($_[$[] >> 6) & 0x3; }
 48sub pkt_VN   { return ($_[$[] >> 3) & 0x7; }
 49sub pkt_MODE { return ($_[$[]     ) & 0x7; }
 50
 51;# second byte of packet
 52sub pkt_R  { return ($_[$[] & 0x80) == 0x80; }
 53sub pkt_E  { return ($_[$[] & 0x40) == 0x40; }
 54sub pkt_M  { return ($_[$[] & 0x20) == 0x20; }
 55sub pkt_OP { return $_[$[] & 0x1f; }
 56
 57;#-----------------------------------------------------------------------------
 58
 59sub setkey
 60{
 61    local($id,$key) = @_;
 62
 63    $KEYS{$id} = $key if (defined($key));
 64    if (! defined($KEYS{$id}))
 65    {
 66	warn "Key $id not yet specified - key not changed\n";
 67	return undef;
 68    }
 69    return ($keyid,$keyid = $id)[$[];
 70}
 71
 72;#-----------------------------------------------------------------------------
 73sub numerical { $a <=> $b; }
 74
 75;#-----------------------------------------------------------------------------
 76
 77sub send	#'
 78{
 79    local($fh,$opcode, $associd, $data,$address) = @_;
 80    $fh = caller(0)."'$fh";
 81
 82    local($junksize,$junk,$packet,$offset,$ret);
 83    $offset = 0;
 84
 85    $sequence++;
 86    while(1)
 87    {
 88	$junksize = length($data);
 89	$junksize = $MAX_DATA if $junksize > $MAX_DATA;
 90	
 91	($junk,$data) = $data =~ /^(.{$junksize})(.*)$/;
 92	$packet
 93	    = pack("C2n5a".(($junk eq "") ? 0 : &pad($junksize+12,$pad)-12),
 94		   $byte1,
 95		   ($opcode & 0x1f) | ($data ? 0x20 : 0),
 96		   $sequence,
 97		   0, $associd,
 98		   $offset, $junksize, $junk);
 99	if ($do_auth)
100	{
101	    ;# not yet
102	}
103	$offset += $junksize;
104
105	if (defined($address))
106	{
107	    $ret = send($fh, $packet, 0, $address);
108	}
109	else
110	{
111	    $ret = send($fh, $packet, 0);
112	}
113
114	if (! defined($ret))
115	{
116	    warn "send failed: $!\n";
117	    return undef;
118	}
119	elsif ($ret != length($packet))
120	{
121	    warn "send failed: sent only $ret from ".length($packet). "bytes\n";
122	    return undef;
123	}
124	return $sequence unless $data;
125    }
126}
127
128;#-----------------------------------------------------------------------------
129;# status interpretation
130;#
131sub getval
132{
133    local($val,*list) = @_;
134    
135    return $list{$val} if defined($list{$val});
136    return sprintf("%s#%d",$list{"-"},$val) if defined($list{"-"});
137    return "unknown-$val";
138}
139
140;#---------------------------------
141;# system status
142;#
143;# format: |LI|CS|SECnt|SECode| LI=2bit CS=6bit SECnt=4bit SECode=4bit
144sub ssw_LI     { return ($_[$[] >> 14) & 0x3; }
145sub ssw_CS     { return ($_[$[] >> 8)  & 0x3f; }
146sub ssw_SECnt  { return ($_[$[] >> 4)  & 0xf; }
147sub ssw_SECode { return $_[$[] & 0xf; }
148
149%LI = ( 0, "leap_none",  1, "leap_add_sec", 2, "leap_del_sec", 3, "sync_alarm", "-", "leap");
150%ClockSource = (0, "sync_unspec",
151		1, "sync_lf_clock",
152		2, "sync_uhf_clock",
153		3, "sync_hf_clock",
154		4, "sync_local_proto",
155		5, "sync_ntp",
156		6, "sync_udp/time",
157		7, "sync_wristwatch",
158		"-", "ClockSource",
159		);
160
161%SystemEvent = (0, "event_unspec",
162		1, "event_restart",
163		2, "event_fault",
164		3, "event_sync_chg",
165		4, "event_sync/strat_chg",
166		5, "event_clock_reset",
167		6, "event_bad_date",
168		7, "event_clock_excptn",
169		"-", "event",
170		);
171sub LI
172{
173    &getval(&ssw_LI($_[$[]),*LI);
174}
175sub ClockSource
176{
177    &getval(&ssw_CS($_[$[]),*ClockSource);
178}
179
180sub SystemEvent
181{
182    &getval(&ssw_SECode($_[$[]),*SystemEvent);
183}
184
185sub system_status
186{
187    return sprintf("%s, %s, %d event%s, %s", &LI($_[$[]), &ClockSource($_[$[]),
188		   &ssw_SECnt($_[$[]), ((&ssw_SECnt($_[$[])==1) ? "" : "s"),
189		   &SystemEvent($_[$[]));
190}
191;#---------------------------------
192;# peer status
193;#
194;# format: |PStat|PSel|PCnt|PCode| Pstat=6bit PSel=2bit PCnt=4bit PCode=4bit
195sub psw_PStat_config     { return ($_[$[] & 0x8000) == 0x8000; }
196sub psw_PStat_authenable { return ($_[$[] & 0x4000) == 0x4000; }
197sub psw_PStat_authentic  { return ($_[$[] & 0x2000) == 0x2000; }
198sub psw_PStat_reach      { return ($_[$[] & 0x1000) == 0x1000; }
199sub psw_PStat_sane       { return ($_[$[] & 0x0800) == 0x0800; }
200sub psw_PStat_dispok     { return ($_[$[] & 0x0400) == 0x0400; }
201sub psw_PStat { return ($_[$[] >> 10) & 0x3f; }
202sub psw_PSel  { return ($_[$[] >> 8)  & 0x3;  }
203sub psw_PCnt  { return ($_[$[] >> 4)  & 0xf; }
204sub psw_PCode { return $_[$[] & 0xf; }
205
206%PeerSelection = (0, "sel_reject",
207		  1, "sel_candidate",
208		  2, "sel_selcand",
209		  3, "sel_sys.peer",
210		  "-", "PeerSel",
211		  );
212%PeerEvent = (0, "event_unspec",
213	      1, "event_ip_err",
214	      2, "event_authen",
215	      3, "event_unreach",
216	      4, "event_reach",
217	      5, "event_clock_excptn",
218	      6, "event_stratum_chg",
219	      "-", "event",
220	      );
221
222sub PeerSelection
223{
224    &getval(&psw_PSel($_[$[]),*PeerSelection);
225}
226
227sub PeerEvent
228{
229    &getval(&psw_PCode($_[$[]),*PeerEvent);
230}
231
232sub peer_status
233{
234    local($x) = ("");
235    $x .= "config,"     if &psw_PStat_config($_[$[]);
236    $x .= "authenable," if &psw_PStat_authenable($_[$[]);
237    $x .= "authentic,"  if &psw_PStat_authentic($_[$[]);
238    $x .= "reach,"      if &psw_PStat_reach($_[$[]);
239    $x .= &psw_PStat_sane($_[$[]) ? "sane," : "insane,";
240    $x .= "hi_disp," unless &psw_PStat_dispok($_[$[]);
241
242    $x .= sprintf(" %s, %d event%s, %s", &PeerSelection($_[$[]),
243		  &psw_PCnt($_[$[]), ((&psw_PCnt($_[$[]) == 1) ? "" : "s"),
244		  &PeerEvent($_[$[]));
245    return $x;
246}
247
248;#---------------------------------
249;# clock status
250;#
251;# format: |CStat|CEvnt| CStat=8bit CEvnt=8bit
252sub csw_CStat { return ($_[$[] >> 8) & 0xff; }
253sub csw_CEvnt { return $_[$[] & 0xff; }
254
255%ClockStatus = (0, "clk_nominal",
256		1, "clk_timeout",
257		2, "clk_badreply",
258		3, "clk_fault",
259		4, "clk_prop",
260		5, "clk_baddate",
261		6, "clk_badtime",
262		"-", "clk",
263	       );
264
265sub clock_status
266{
267    return sprintf("%s, last %s",
268		   &getval(&csw_CStat($_[$[]),*ClockStatus),
269		   &getval(&csw_CEvnt($_[$[]),*ClockStatus));
270}
271
272;#---------------------------------
273;# error status
274;#
275;# format: |Err|reserved|  Err=8bit
276;#
277sub esw_Err { return ($_[$[] >> 8) & 0xff; }
278
279%ErrorStatus = (0, "err_unspec",
280		1, "err_auth_fail",
281		2, "err_invalid_fmt",
282		3, "err_invalid_opcode",
283		4, "err_unknown_assoc",
284		5, "err_unknown_var",
285		6, "err_invalid_value",
286		7, "err_adm_prohibit",
287		);
288
289sub error_status
290{
291    return sprintf("%s", &getval(&esw_Err($_[$[]),*ErrorStatus));
292}
293
294;#-----------------------------------------------------------------------------
295;#
296;# cntrl op name translation
297
298%CntrlOpName = (1, "read_status",
299		2, "read_variables",
300		3, "write_variables",
301		4, "read_clock_variables",
302		5, "write_clock_variables",
303		6, "set_trap",
304		7, "trap_response",
305		31, "unset_trap", # !!! unofficial !!!
306		"-", "cntrlop",
307		);
308
309sub cntrlop_name
310{
311    return &getval($_[$[],*CntrlOpName);
312}
313
314;#-----------------------------------------------------------------------------
315
316$STAT_short_pkt = 0;
317$STAT_pkt = 0;
318
319;# process a NTP control message (response) packet
320;# returns a list ($ret,$data,$status,$associd,$op,$seq,$auth_keyid)
321;#      $ret: undef     --> not yet complete
322;#            ""        --> complete packet received
323;#            "ERROR"   --> error during receive, bad packet, ...
324;#          else        --> error packet - list may contain useful info
325
326
327sub handle_packet
328{
329    local($pkt,$from) = @_;	# parameters
330    local($len_pkt) = (length($pkt));
331;#    local(*FRAGS,*lastseen);
332    local($li_vn_mode,$r_e_m_op,$seq,$status,$associd,$offset,$count,$data);
333    local($autch_keyid,$auth_cksum);
334
335    $STAT_pkt++;
336    if ($len_pkt < 12)
337    {
338	$STAT_short_pkt++;
339	return ("ERROR","short packet received");
340    }
341
342    ;# now break packet apart
343    ($li_vn_mode,$r_e_m_op,$seq,$status,$associd,$offset,$count,$data) =
344	unpack("C2n5a".($len_pkt-12),$pkt);
345    $data=substr($data,$[,$count);
346    if ((($len_pkt - 12) - &pad($count,4)) >= 12)
347    {
348	;# looks like an authenticator
349	($auth_keyid,$auth_cksum) =
350	    unpack("Na8",substr($pkt,$len_pkt-12+$[,12));
351	$STAT_auth++;
352	;# no checking of auth_cksum (yet ?)
353    }
354
355    if (&pkt_VN($li_vn_mode) != $NTP_version)
356    {
357	$STAT_bad_version++;
358	return ("ERROR","version ".&pkt_VN($li_vn_mode)."packet ignored");
359    }
360
361    if (&pkt_MODE($li_vn_mode) != $ctrl_mode)
362    {
363	$STAT_bad_mode++;
364	return ("ERROR", "mode ".&pkt_MODE($li_vn_mode)." packet ignored");
365    }
366    
367    ;# handle single fragment fast
368    if ($offset == 0 && &pkt_M($r_e_m_op) == 0)
369    {
370	$STAT_single_frag++;
371	if (&pkt_E($r_e_m_op))
372	{
373	    $STAT_err_pkt++;
374	    return (&error_status($status),
375		    $data,$status,$associd,&pkt_OP($r_e_m_op),$seq,
376		    $auth_keyid);
377	}
378	else
379	{
380	    return ("",
381		    $data,$status,$associd,&pkt_OP($r_e_m_op),$seq,
382		    $auth_keyid);
383	}
384    }
385    else
386    {
387	;# fragment - set up local name space
388	$id = "$from$seq".&pkt_OP($r_e_m_op);
389	$ID{$id} = 1;
390	*FRAGS = "$id FRAGS";
391	*lastseen = "$id lastseen";
392	
393	$STAT_frag++;
394	
395	$lastseen = 1 if !&pkt_M($r_e_m_op);
396	if (!defined(%FRAGS))
397	{
398	    print((&pkt_M($r_e_m_op) ? " more" : "")."\n");
399	    $FRAGS{$offset} = $data;
400	    ;# save other info
401	    @FRAGS = ($status,$associd,&pkt_OP($r_e_m_op),$seq,$auth_keyid,$r_e_m_op);
402	}
403	else
404	{
405	    print((&pkt_M($r_e_m_op) ? " more" : "")."\n");
406	    ;# add frag to previous - combine on the fly
407	    if (defined($FRAGS{$offset}))
408	    {
409		$STAT_dup_frag++;
410		return ("ERROR","duplicate fragment at $offset seq=$seq");
411	    }
412	    
413	    $FRAGS{$offset} = $data;
414	    
415	    undef($loff);
416	    foreach $off (sort numerical keys(%FRAGS))
417	    {
418		next unless defined($FRAGS{$off});
419		if (defined($loff) &&
420		    ($loff + length($FRAGS{$loff})) == $off)
421		{
422		    $FRAGS{$loff} .= $FRAGS{$off};
423		    delete $FRAGS{$off};
424		    last;
425		}
426		$loff = $off;
427	    }
428
429	    ;# return packet if all frags arrived
430	    ;# at most two frags with possible padding ???
431	    if ($lastseen && defined($FRAGS{0}) &&
432		(((scalar(@x=sort numerical keys(%FRAGS)) == 2) &&
433		  (length($FRAGS{0}) + 8) > $x[$[+1]) ||
434		  (scalar(@x=sort numerical keys(%FRAGS)) < 2)))
435	    {
436		@x=((&pkt_E($r_e_m_op) ? &error_status($status) : ""),
437		    $FRAGS{0},@FRAGS);
438		&pkt_E($r_e_m_op) ? $STAT_err_frag++ : $STAT_frag_all++;
439		undef(%FRAGS);
440		undef(@FRAGS);
441		undef($lastseen);
442		delete $ID{$id};
443		&main'clear_timeout($id);
444		return @x;
445	    }
446	    else
447	    {
448		&main'set_timeout($id,time+$timeout,"&ntp'handle_packet_timeout(\"".unpack("H*",$id)."\");"); #'";
449	    }
450	}
451	return (undef);
452    }
453}
454
455sub handle_packet_timeout
456{
457    local($id) = @_;
458    local($r_e_m_op,*FRAGS,*lastseen,@x) = (@FRAGS[$[+5]);
459    
460    *FRAGS = "$id FRAGS";
461    *lastseen = "$id lastseen";
462    
463    @x=((&pkt_E($r_e_m_op) ? &error_status($status) : "TIMEOUT"),
464	$FRAGS{0},@FRAGS[$[ .. $[+4]);
465    $STAT_frag_timeout++;
466    undef(%FRAGS);
467    undef(@FRAGS);
468    undef($lastseen);
469    delete $ID{$id};
470    return @x;
471}
472
473
474sub pad
475{
476    return $_[$[+1] * int(($_[$[] + $_[$[+1] - 1) / $_[$[+1]);
477}
478
4791;