nut/tools/nut-scanner/nut-scanner.c

944 lines
31 KiB
C
Raw Normal View History

2016-07-18 00:11:41 +00:00
/*
* Copyright (C) 2011 - 2012 Arnaud Quette <arnaud.quette@free.fr>
2022-06-29 10:37:36 +00:00
* Copyright (C) 2016 Michal Vyskocil <MichalVyskocil@eaton.com>
* Copyright (C) 2016 - 2021 Jim Klimov <EvgenyKlimov@eaton.com>
2011-09-29 18:14:46 +00:00
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
*/
2016-07-18 00:11:41 +00:00
/*! \file nut-scanner.c
2022-06-29 10:37:36 +00:00
\brief A tool to detect NUT supported devices
2016-07-18 00:11:41 +00:00
\author Arnaud Quette <arnaud.quette@free.fr>
2022-06-29 10:37:36 +00:00
\author Michal Vyskocil <MichalVyskocil@eaton.com>
\author Jim Klimov <EvgenyKlimov@eaton.com>
2016-07-18 00:11:41 +00:00
*/
2022-06-29 10:37:36 +00:00
#include "common.h" /* Must be first include to pull "config.h" */
2011-09-29 18:14:46 +00:00
#include <stdio.h>
#include <stdlib.h>
#include <stdarg.h>
2012-01-24 10:22:33 +00:00
#include "nut_version.h"
2011-09-29 18:14:46 +00:00
#include <unistd.h>
#include <string.h>
2022-06-29 10:37:36 +00:00
2011-09-29 18:14:46 +00:00
#ifdef HAVE_PTHREAD
2022-06-29 10:37:36 +00:00
# include <pthread.h>
# ifdef HAVE_SEMAPHORE
# include <semaphore.h>
# endif
# if (defined HAVE_PTHREAD_TRYJOIN) || (defined HAVE_SEMAPHORE)
# include "nut_stdint.h"
# ifdef HAVE_SYS_RESOURCE_H
# include <sys/resource.h> /* for getrlimit() and struct rlimit */
# include <errno.h>
/* 3 is reserved for known overhead (for NetXML at least)
* following practical investigation summarized at
* https://github.com/networkupstools/nut/pull/1158
* and probably means the usual stdin/stdout/stderr triplet
*/
# define RESERVE_FD_COUNT 3
# endif /* HAVE_SYS_RESOURCE_H */
# endif /* HAVE_PTHREAD_TRYJOIN || HAVE_SEMAPHORE */
#endif /* HAVE_PTHREAD */
2011-09-29 18:14:46 +00:00
#include "nut-scan.h"
#define DEFAULT_TIMEOUT 5
2012-01-24 10:22:33 +00:00
#define ERR_BAD_OPTION (-1)
2022-06-29 10:37:36 +00:00
static const char optstring[] = "?ht:T:s:e:E:c:l:u:W:X:w:x:p:b:B:d:L:CUSMOAm:NPqIVaD";
2011-09-29 18:14:46 +00:00
#ifdef HAVE_GETOPT_LONG
2022-06-29 10:37:36 +00:00
static const struct option longopts[] = {
{ "timeout", required_argument, NULL, 't' },
{ "thread", required_argument, NULL, 'T' },
{ "start_ip", required_argument, NULL, 's' },
{ "end_ip", required_argument, NULL, 'e' },
{ "eaton_serial", required_argument, NULL, 'E' },
{ "mask_cidr", required_argument, NULL, 'm' },
{ "community", required_argument, NULL, 'c' },
{ "secLevel", required_argument, NULL, 'l' },
{ "secName", required_argument, NULL, 'u' },
{ "authPassword", required_argument, NULL, 'W' },
{ "privPassword", required_argument, NULL, 'X' },
{ "authProtocol", required_argument, NULL, 'w' },
{ "privProtocol", required_argument, NULL, 'x' },
{ "username", required_argument, NULL, 'b' },
{ "password", required_argument, NULL, 'B' },
{ "authType", required_argument, NULL, 'd' },
{ "cipher_suite_id", required_argument, NULL, 'L' },
{ "port", required_argument, NULL, 'p' },
{ "complete_scan", no_argument, NULL, 'C' },
{ "usb_scan", no_argument, NULL, 'U' },
{ "snmp_scan", no_argument, NULL, 'S' },
{ "xml_scan", no_argument, NULL, 'M' },
{ "oldnut_scan", no_argument, NULL, 'O' },
{ "avahi_scan", no_argument, NULL, 'A' },
{ "ipmi_scan", no_argument, NULL, 'I' },
{ "disp_nut_conf", no_argument, NULL, 'N' },
{ "disp_parsable", no_argument, NULL, 'P' },
{ "quiet", no_argument, NULL, 'q' },
{ "help", no_argument, NULL, 'h' },
{ "version", no_argument, NULL, 'V' },
{ "available", no_argument, NULL, 'a' },
{ "nut_debug_level", no_argument, NULL, 'D' },
{ NULL, 0, NULL, 0 }
};
2011-09-29 18:14:46 +00:00
#else
2022-06-29 10:37:36 +00:00
#define getopt_long(a,b,c,d,e) getopt(a,b,c)
2011-09-29 18:14:46 +00:00
#endif /* HAVE_GETOPT_LONG */
static nutscan_device_t *dev[TYPE_END];
2022-06-29 10:37:36 +00:00
static useconds_t timeout = DEFAULT_NETWORK_TIMEOUT * 1000 * 1000; /* in usec */
static char * start_ip = NULL;
static char * end_ip = NULL;
2011-09-29 18:14:46 +00:00
static char * port = NULL;
2013-11-24 15:00:12 +00:00
static char * serial_ports = NULL;
2011-09-29 18:14:46 +00:00
#ifdef HAVE_PTHREAD
2012-01-24 10:22:33 +00:00
static pthread_t thread[TYPE_END];
2022-06-29 10:37:36 +00:00
static void * run_usb(void *arg)
2011-09-29 18:14:46 +00:00
{
2022-06-29 10:37:36 +00:00
NUT_UNUSED_VARIABLE(arg);
2011-09-29 18:14:46 +00:00
dev[TYPE_USB] = nutscan_scan_usb();
return NULL;
}
2022-06-29 10:37:36 +00:00
2011-09-29 18:14:46 +00:00
static void * run_snmp(void * arg)
{
nutscan_snmp_t * sec = (nutscan_snmp_t *)arg;
2022-06-29 10:37:36 +00:00
dev[TYPE_SNMP] = nutscan_scan_snmp(start_ip, end_ip, timeout, sec);
2011-09-29 18:14:46 +00:00
return NULL;
}
2022-06-29 10:37:36 +00:00
2011-09-29 18:14:46 +00:00
static void * run_xml(void * arg)
{
2022-06-29 10:37:36 +00:00
nutscan_xml_t * sec = (nutscan_xml_t *)arg;
dev[TYPE_XML] = nutscan_scan_xml_http_range(start_ip, end_ip, timeout, sec);
2011-09-29 18:14:46 +00:00
return NULL;
}
2022-06-29 10:37:36 +00:00
static void * run_nut_old(void *arg)
2011-09-29 18:14:46 +00:00
{
2022-06-29 10:37:36 +00:00
NUT_UNUSED_VARIABLE(arg);
dev[TYPE_NUT] = nutscan_scan_nut(start_ip, end_ip, port, timeout);
2011-09-29 18:14:46 +00:00
return NULL;
}
2022-06-29 10:37:36 +00:00
static void * run_avahi(void *arg)
2011-09-29 18:14:46 +00:00
{
2022-06-29 10:37:36 +00:00
NUT_UNUSED_VARIABLE(arg);
2011-09-29 18:14:46 +00:00
dev[TYPE_AVAHI] = nutscan_scan_avahi(timeout);
return NULL;
}
2022-06-29 10:37:36 +00:00
2011-09-29 18:14:46 +00:00
static void * run_ipmi(void * arg)
{
2013-11-24 15:00:12 +00:00
nutscan_ipmi_t * sec = (nutscan_ipmi_t *)arg;
2022-06-29 10:37:36 +00:00
dev[TYPE_IPMI] = nutscan_scan_ipmi(start_ip, end_ip, sec);
2013-11-24 15:00:12 +00:00
return NULL;
}
2022-06-29 10:37:36 +00:00
static void * run_eaton_serial(void *arg)
2013-11-24 15:00:12 +00:00
{
2022-06-29 10:37:36 +00:00
NUT_UNUSED_VARIABLE(arg);
dev[TYPE_EATON_SERIAL] = nutscan_scan_eaton_serial(serial_ports);
2011-09-29 18:14:46 +00:00
return NULL;
}
2013-11-24 15:00:12 +00:00
2011-09-29 18:14:46 +00:00
#endif /* HAVE_PTHREAD */
2022-06-29 10:37:36 +00:00
static void show_usage()
2011-09-29 18:14:46 +00:00
{
2022-06-29 10:37:36 +00:00
/* NOTE: This code uses `nutscan_avail_*` global vars from nutscan-init.c */
puts("nut-scanner : utility for detection of available power devices.\n");
puts("OPTIONS:");
printf(" -C, --complete_scan: Scan all available devices except serial ports (default).\n");
if (nutscan_avail_usb) {
printf(" -U, --usb_scan: Scan USB devices.\n");
} else {
printf("* Options for USB devices scan not enabled: library not detected.\n");
}
if (nutscan_avail_snmp) {
printf(" -S, --snmp_scan: Scan SNMP devices using built-in mapping definitions.\n");
} else {
printf("* Options for SNMP devices scan not enabled: library not detected.\n");
}
if (nutscan_avail_xml_http) {
printf(" -M, --xml_scan: Scan XML/HTTP devices.\n");
} else {
printf("* Options for XML/HTTP devices scan not enabled: library not detected.\n");
}
printf(" -O, --oldnut_scan: Scan NUT devices (old method).\n");
if (nutscan_avail_avahi) {
printf(" -A, --avahi_scan: Scan NUT devices (avahi method).\n");
} else {
printf("* Options for NUT devices (avahi method) scan not enabled: library not detected.\n");
}
if (nutscan_avail_ipmi) {
printf(" -I, --ipmi_scan: Scan IPMI devices.\n");
} else {
printf("* Options for IPMI devices scan not enabled: library not detected.\n");
}
printf(" -E, --eaton_serial <serial ports list>: Scan serial Eaton devices (XCP, SHUT and Q1).\n");
2011-09-29 18:14:46 +00:00
2022-06-29 10:37:36 +00:00
#if (defined HAVE_PTHREAD) && (defined HAVE_PTHREAD_TRYJOIN)
printf(" -T, --thread <max number of threads>: Limit the amount of scanning threads running simultaneously (default: %zu).\n", max_threads);
#else
printf(" -T, --thread <max number of threads>: Limit the amount of scanning threads running simultaneously (not implemented in this build: no pthread support)");
#endif
printf("\nNetwork specific options:\n");
printf(" -t, --timeout <timeout in seconds>: network operation timeout (default %d).\n", DEFAULT_NETWORK_TIMEOUT);
printf(" -s, --start_ip <IP address>: First IP address to scan.\n");
printf(" -e, --end_ip <IP address>: Last IP address to scan.\n");
printf(" -m, --mask_cidr <IP address/mask>: Give a range of IP using CIDR notation.\n");
if (nutscan_avail_snmp) {
printf("\nSNMP v1 specific options:\n");
printf(" -c, --community <community name>: Set SNMP v1 community name (default = public)\n");
printf("\nSNMP v3 specific options:\n");
printf(" -l, --secLevel <security level>: Set the securityLevel used for SNMPv3 messages (allowed values: noAuthNoPriv, authNoPriv, authPriv)\n");
printf(" -u, --secName <security name>: Set the securityName used for authenticated SNMPv3 messages (mandatory if you set secLevel. No default)\n");
/* Construct help for AUTHPROTO */
{ int comma = 0;
NUT_UNUSED_VARIABLE(comma); /* potentially, if no protocols are available */
printf(" -w, --authProtocol <authentication protocol>: Set the authentication protocol (");
#if (defined WITH_SNMP) && (defined NUT_HAVE_LIBNETSNMP_usmHMACMD5AuthProtocol)
/* Note: NUT_HAVE_LIBNETSNMP_* macros are not AC_DEFINE'd when libsnmp was
* completely not detected at configure time, so "#if" is not a pedantically
* correct test (unknown macro may default to "0" but is not guaranteed to).
*/
# if NUT_HAVE_LIBNETSNMP_usmHMACMD5AuthProtocol
printf("%s%s",
(comma++ ? ", " : ""),
"MD5"
);
# endif
# if NUT_HAVE_LIBNETSNMP_usmHMACSHA1AuthProtocol
printf("%s%s",
(comma++ ? ", " : ""),
"SHA"
);
# endif
# if NUT_HAVE_LIBNETSNMP_usmHMAC192SHA256AuthProtocol
printf("%s%s",
(comma++ ? ", " : ""),
"SHA256"
);
# endif
# if NUT_HAVE_LIBNETSNMP_usmHMAC256SHA384AuthProtocol
printf("%s%s",
(comma++ ? ", " : ""),
"SHA384"
);
# endif
# if NUT_HAVE_LIBNETSNMP_usmHMAC384SHA512AuthProtocol
printf("%s%s",
(comma++ ? ", " : ""),
"SHA512"
);
# endif
printf("%s%s",
(comma ? "" : "none supported"),
") used for authenticated SNMPv3 messages (default=MD5 if available)\n"
);
} /* Construct help for AUTHPROTO */
printf(" -W, --authPassword <authentication pass phrase>: Set the authentication pass phrase used for authenticated SNMPv3 messages (mandatory if you set secLevel to authNoPriv or authPriv)\n");
/* Construct help for PRIVPROTO */
{ int comma = 0;
NUT_UNUSED_VARIABLE(comma); /* potentially, if no protocols are available */
printf(" -x, --privProtocol <privacy protocol>: Set the privacy protocol (");
# if NUT_HAVE_LIBNETSNMP_usmDESPrivProtocol
printf("%s%s",
(comma++ ? ", " : ""),
"DES"
);
# endif
# if NUT_HAVE_LIBNETSNMP_usmAESPrivProtocol || NUT_HAVE_LIBNETSNMP_usmAES128PrivProtocol
printf("%s%s",
(comma++ ? ", " : ""),
"AES"
);
# endif
# if NUT_HAVE_LIBNETSNMP_DRAFT_BLUMENTHAL_AES_04
# if NUT_HAVE_LIBNETSNMP_usmAES192PrivProtocol
printf("%s%s",
(comma++ ? ", " : ""),
"AES192"
);
# endif
# if NUT_HAVE_LIBNETSNMP_usmAES256PrivProtocol
printf("%s%s",
(comma++ ? ", " : ""),
"AES256"
);
# endif
# endif /* NUT_HAVE_LIBNETSNMP_DRAFT_BLUMENTHAL_AES_04 */
#endif /* built WITH_SNMP */
printf("%s%s",
(comma ? "" : "none supported"),
") used for encrypted SNMPv3 messages (default=DES if available)\n"
);
} /* Construct help for PRIVPROTO */
printf(" -X, --privPassword <privacy pass phrase>: Set the privacy pass phrase used for encrypted SNMPv3 messages (mandatory if you set secLevel to authPriv)\n");
2011-09-29 18:14:46 +00:00
}
2022-06-29 10:37:36 +00:00
if (nutscan_avail_ipmi) {
printf("\nIPMI over LAN specific options:\n");
printf(" -b, --username <username>: Set the username used for authenticating IPMI over LAN connections (mandatory for IPMI over LAN. No default)\n");
/* Specify the username to use when authenticating with the remote host. If not specified, a null (i.e. anonymous) username is assumed. The user must have
* at least ADMIN privileges in order for this tool to operate fully. */
printf(" -B, --password <password>: Specify the password to use when authenticationg with the remote host (mandatory for IPMI over LAN. No default)\n");
/* Specify the password to use when authenticationg with the remote host. If not specified, a null password is assumed. Maximum password length is 16 for IPMI
* 1.5 and 20 for IPMI 2.0. */
printf(" -d, --authType <authentication type>: Specify the IPMI 1.5 authentication type to use (NONE, STRAIGHT_PASSWORD_KEY, MD2, and MD5) with the remote host (default=MD5)\n");
printf(" -L, --cipher_suite_id <cipher suite id>: Specify the IPMI 2.0 cipher suite ID to use, for authentication, integrity, and confidentiality (default=3)\n");
}
2011-09-29 18:14:46 +00:00
2022-06-29 10:37:36 +00:00
printf("\nNUT specific options:\n");
printf(" -p, --port <port number>: Port number of remote NUT upsd\n");
printf("\ndisplay specific options:\n");
printf(" -N, --disp_nut_conf: Display result in the ups.conf format\n");
printf(" -P, --disp_parsable: Display result in a parsable format\n");
printf("\nMiscellaneous options:\n");
printf(" -V, --version: Display NUT version\n");
printf(" -a, --available: Display available bus that can be scanned\n");
printf(" -q, --quiet: Display only scan result. No information on currently scanned bus is displayed.\n");
printf(" -D, --nut_debug_level: Raise the debugging level. Use this multiple times to see more details.\n");
2011-09-29 18:14:46 +00:00
}
int main(int argc, char *argv[])
{
2012-08-12 21:39:31 +00:00
nutscan_snmp_t snmp_sec;
2013-11-24 15:00:12 +00:00
nutscan_ipmi_t ipmi_sec;
2022-06-29 10:37:36 +00:00
nutscan_xml_t xml_sec;
2011-09-29 18:14:46 +00:00
int opt_ret;
char * cidr = NULL;
int allow_all = 0;
int allow_usb = 0;
int allow_snmp = 0;
int allow_xml = 0;
int allow_oldnut = 0;
int allow_avahi = 0;
int allow_ipmi = 0;
2022-06-29 10:37:36 +00:00
int allow_eaton_serial = 0; /* MUST be requested explicitly! */
int quiet = 0; /* The debugging level for certain upsdebugx() progress messages; 0 = print always, quiet==1 is to require at least one -D */
2011-09-29 18:14:46 +00:00
void (*display_func)(nutscan_device_t * device);
2012-01-24 10:22:33 +00:00
int ret_code = EXIT_SUCCESS;
2022-06-29 10:37:36 +00:00
#if (defined HAVE_PTHREAD) && ( (defined HAVE_PTHREAD_TRYJOIN) || (defined HAVE_SEMAPHORE) ) && (defined HAVE_SYS_RESOURCE_H)
struct rlimit nofile_limit;
/* Limit the max scanning thread count by the amount of allowed open
* file descriptors (which caller can change with `ulimit -n NUM`),
* following practical investigation summarized at
* https://github.com/networkupstools/nut/pull/1158
* Resource-Limit code inspired by example from:
* https://stackoverflow.com/questions/4076848/how-to-do-the-equivalent-of-ulimit-n-400-from-within-c/4077000#4077000
*/
/* Get max number of files. */
if (getrlimit(RLIMIT_NOFILE, &nofile_limit) != 0) {
/* Report error, keep hardcoded default */
fprintf(stderr, "getrlimit() failed with errno=%d, keeping default job limits\n", errno);
nofile_limit.rlim_cur = 0;
nofile_limit.rlim_max = 0;
} else {
if (nofile_limit.rlim_cur > 0
&& nofile_limit.rlim_cur > RESERVE_FD_COUNT
&& (uintmax_t)max_threads > (uintmax_t)(nofile_limit.rlim_cur - RESERVE_FD_COUNT)
&& (uintmax_t)(nofile_limit.rlim_cur) < (uintmax_t)SIZE_MAX
) {
max_threads = (size_t)nofile_limit.rlim_cur;
if (max_threads > (RESERVE_FD_COUNT + 1)) {
max_threads -= RESERVE_FD_COUNT;
}
}
}
#endif /* HAVE_PTHREAD && ( HAVE_PTHREAD_TRYJOIN || HAVE_SEMAPHORE ) && HAVE_SYS_RESOURCE_H */
2011-09-29 18:14:46 +00:00
2012-08-12 21:39:31 +00:00
memset(&snmp_sec, 0, sizeof(snmp_sec));
2013-11-24 15:00:12 +00:00
memset(&ipmi_sec, 0, sizeof(ipmi_sec));
2022-06-29 10:37:36 +00:00
memset(&xml_sec, 0, sizeof(xml_sec));
2013-11-24 15:00:12 +00:00
/* Set the default values for IPMI */
ipmi_sec.authentication_type = IPMI_AUTHENTICATION_TYPE_MD5;
ipmi_sec.ipmi_version = IPMI_1_5; /* default to IPMI 1.5, if not otherwise specified */
ipmi_sec.cipher_suite_id = 3; /* default to HMAC-SHA1; HMAC-SHA1-96; AES-CBC-128 */
ipmi_sec.privilege_level = IPMI_PRIVILEGE_LEVEL_ADMIN; /* should be sufficient */
2011-09-29 18:14:46 +00:00
2022-06-29 10:37:36 +00:00
/* Set the default values for XML HTTP (run_xml()) */
xml_sec.port_http = 80;
xml_sec.port_udp = 4679;
xml_sec.usec_timeout = 0; /* Override with the "timeout" common setting later */
xml_sec.peername = NULL;
/* Parse command line options -- First loop: only get debug level */
/* Suppress error messages, for now -- leave them to the second loop. */
opterr = 0;
while ((opt_ret = getopt_long(argc, argv, optstring, longopts, NULL)) != -1) {
if (opt_ret == 'D')
nut_debug_level++;
}
2012-01-24 10:22:33 +00:00
nutscan_init();
2011-09-29 18:14:46 +00:00
display_func = nutscan_display_ups_conf;
2022-06-29 10:37:36 +00:00
/* Parse command line options -- Second loop: everything else */
/* Restore error messages... */
opterr = 1;
/* ...and index of the item to be processed by getopt(). */
optind = 1;
/* Note: the getopts print an error message about unknown arguments
* or arguments which need a second token and that is missing now */
while ((opt_ret = getopt_long(argc, argv, optstring, longopts, NULL)) != -1) {
2011-09-29 18:14:46 +00:00
switch(opt_ret) {
case 't':
2022-06-29 10:37:36 +00:00
timeout = (useconds_t)atol(optarg) * 1000 * 1000; /*in usec*/
if (timeout <= 0) {
fprintf(stderr,
"Illegal timeout value, using default %ds\n",
DEFAULT_NETWORK_TIMEOUT);
timeout = DEFAULT_NETWORK_TIMEOUT * 1000 * 1000;
2011-09-29 18:14:46 +00:00
}
break;
case 's':
start_ip = strdup(optarg);
2022-06-29 10:37:36 +00:00
if (end_ip == NULL)
end_ip = start_ip;
2011-09-29 18:14:46 +00:00
break;
case 'e':
end_ip = strdup(optarg);
2022-06-29 10:37:36 +00:00
if (start_ip == NULL)
start_ip = end_ip;
2011-09-29 18:14:46 +00:00
break;
2013-11-24 15:00:12 +00:00
case 'E':
serial_ports = strdup(optarg);
allow_eaton_serial = 1;
break;
2011-09-29 18:14:46 +00:00
case 'm':
cidr = strdup(optarg);
2022-06-29 10:37:36 +00:00
upsdebugx(5, "Got CIDR net/mask: %s", cidr);
break;
case 'D':
/* nothing to do, here */
2011-09-29 18:14:46 +00:00
break;
case 'c':
2022-06-29 10:37:36 +00:00
if (!nutscan_avail_snmp) {
2012-01-24 10:22:33 +00:00
goto display_help;
}
2012-08-12 21:39:31 +00:00
snmp_sec.community = strdup(optarg);
2011-09-29 18:14:46 +00:00
break;
case 'l':
2022-06-29 10:37:36 +00:00
if (!nutscan_avail_snmp) {
2012-01-24 10:22:33 +00:00
goto display_help;
}
2012-08-12 21:39:31 +00:00
snmp_sec.secLevel = strdup(optarg);
2011-09-29 18:14:46 +00:00
break;
case 'u':
2022-06-29 10:37:36 +00:00
if (!nutscan_avail_snmp) {
2012-01-24 10:22:33 +00:00
goto display_help;
}
2012-08-12 21:39:31 +00:00
snmp_sec.secName = strdup(optarg);
2011-09-29 18:14:46 +00:00
break;
case 'W':
2022-06-29 10:37:36 +00:00
if (!nutscan_avail_snmp) {
2012-01-24 10:22:33 +00:00
goto display_help;
}
2012-08-12 21:39:31 +00:00
snmp_sec.authPassword = strdup(optarg);
2011-09-29 18:14:46 +00:00
break;
case 'X':
2022-06-29 10:37:36 +00:00
if (!nutscan_avail_snmp) {
2012-01-24 10:22:33 +00:00
goto display_help;
}
2012-08-12 21:39:31 +00:00
snmp_sec.privPassword = strdup(optarg);
2011-09-29 18:14:46 +00:00
break;
case 'w':
2022-06-29 10:37:36 +00:00
if (!nutscan_avail_snmp) {
2012-01-24 10:22:33 +00:00
goto display_help;
}
2012-08-12 21:39:31 +00:00
snmp_sec.authProtocol = strdup(optarg);
2011-09-29 18:14:46 +00:00
break;
case 'x':
2022-06-29 10:37:36 +00:00
if (!nutscan_avail_snmp) {
2012-01-24 10:22:33 +00:00
goto display_help;
}
2012-08-12 21:39:31 +00:00
snmp_sec.privProtocol = strdup(optarg);
2011-09-29 18:14:46 +00:00
break;
2012-01-24 10:22:33 +00:00
case 'S':
2022-06-29 10:37:36 +00:00
if (!nutscan_avail_snmp) {
2012-01-24 10:22:33 +00:00
goto display_help;
}
allow_snmp = 1;
break;
2013-11-24 15:00:12 +00:00
case 'b':
2022-06-29 10:37:36 +00:00
if (!nutscan_avail_ipmi) {
2013-11-24 15:00:12 +00:00
goto display_help;
}
ipmi_sec.username = strdup(optarg);
break;
case 'B':
2022-06-29 10:37:36 +00:00
if (!nutscan_avail_ipmi) {
2013-11-24 15:00:12 +00:00
goto display_help;
}
ipmi_sec.password = strdup(optarg);
break;
case 'd':
2022-06-29 10:37:36 +00:00
if (!nutscan_avail_ipmi) {
2013-11-24 15:00:12 +00:00
goto display_help;
}
if (!strcmp(optarg, "NONE")) {
ipmi_sec.authentication_type = IPMI_AUTHENTICATION_TYPE_NONE;
}
else if (!strcmp(optarg, "STRAIGHT_PASSWORD_KEY")) {
ipmi_sec.authentication_type = IPMI_AUTHENTICATION_TYPE_STRAIGHT_PASSWORD_KEY;
}
else if (!strcmp(optarg, "MD2")) {
ipmi_sec.authentication_type = IPMI_AUTHENTICATION_TYPE_MD2;
}
else if (!strcmp(optarg, "MD5")) {
ipmi_sec.authentication_type = IPMI_AUTHENTICATION_TYPE_MD5;
}
else {
2022-06-29 10:37:36 +00:00
fprintf(stderr,
"Unknown authentication type (%s). Defaulting to MD5\n",
optarg);
2013-11-24 15:00:12 +00:00
}
break;
2022-06-29 10:37:36 +00:00
case 'L':
if (!nutscan_avail_ipmi) {
2013-11-24 15:00:12 +00:00
goto display_help;
}
ipmi_sec.cipher_suite_id = atoi(optarg);
/* Force IPMI 2.0! */
ipmi_sec.ipmi_version = IPMI_2_0;
break;
2011-09-29 18:14:46 +00:00
case 'p':
port = strdup(optarg);
break;
2022-06-29 10:37:36 +00:00
case 'T': {
#if (defined HAVE_PTHREAD) && ( (defined HAVE_PTHREAD_TRYJOIN) || (defined HAVE_SEMAPHORE) )
char* endptr;
long val = strtol(optarg, &endptr, 10);
/* With endptr we check that no chars were left in optarg
* (that is, pointed-to char -- if reported -- is '\0')
*/
if ((!endptr || !*endptr)
&& val > 0
&& (uintmax_t)val < (uintmax_t)SIZE_MAX
) {
# ifdef HAVE_SYS_RESOURCE_H
if (nofile_limit.rlim_cur > 0
&& nofile_limit.rlim_cur > RESERVE_FD_COUNT
&& (uintmax_t)nofile_limit.rlim_cur < (uintmax_t)SIZE_MAX
&& (uintmax_t)val > (uintmax_t)(nofile_limit.rlim_cur - RESERVE_FD_COUNT)
) {
upsdebugx(1, "Detected soft limit for "
"file descriptor count is %ju",
(uintmax_t)nofile_limit.rlim_cur);
upsdebugx(1, "Detected hard limit for "
"file descriptor count is %ju",
(uintmax_t)nofile_limit.rlim_max);
max_threads = (size_t)nofile_limit.rlim_cur;
if (max_threads > (RESERVE_FD_COUNT + 1)) {
max_threads -= RESERVE_FD_COUNT;
}
fprintf(stderr,
"WARNING: Requested max scanning "
"thread count %s (%ld) exceeds the "
"current file descriptor count limit "
"(minus reservation), constraining "
"to %zu\n",
optarg, val, max_threads);
} else
# endif /* HAVE_SYS_RESOURCE_H */
max_threads = (size_t)val;
} else {
fprintf(stderr,
"WARNING: Requested max scanning "
"thread count %s (%ld) is out of range, "
"using default %zu\n",
optarg, val, max_threads);
}
#else
fprintf(stderr,
"WARNING: Max scanning thread count option "
"is not supported in this build, ignored\n");
#endif /* HAVE_PTHREAD && ways to limit the thread count */
}
break;
2011-09-29 18:14:46 +00:00
case 'C':
allow_all = 1;
break;
case 'U':
2022-06-29 10:37:36 +00:00
if (!nutscan_avail_usb) {
2012-01-24 10:22:33 +00:00
goto display_help;
}
2011-09-29 18:14:46 +00:00
allow_usb = 1;
break;
case 'M':
2022-06-29 10:37:36 +00:00
if (!nutscan_avail_xml_http) {
2012-01-24 10:22:33 +00:00
goto display_help;
}
2011-09-29 18:14:46 +00:00
allow_xml = 1;
break;
case 'O':
allow_oldnut = 1;
break;
case 'A':
2022-06-29 10:37:36 +00:00
if (!nutscan_avail_avahi) {
2012-01-24 10:22:33 +00:00
goto display_help;
}
2011-09-29 18:14:46 +00:00
allow_avahi = 1;
break;
case 'I':
2022-06-29 10:37:36 +00:00
if (!nutscan_avail_ipmi) {
2012-01-24 10:22:33 +00:00
goto display_help;
}
2011-09-29 18:14:46 +00:00
allow_ipmi = 1;
break;
case 'N':
display_func = nutscan_display_ups_conf;
break;
case 'P':
display_func = nutscan_display_parsable;
break;
case 'q':
quiet = 1;
break;
2012-01-24 10:22:33 +00:00
case 'V':
printf("Network UPS Tools - %s\n", NUT_VERSION_MACRO);
exit(EXIT_SUCCESS);
case 'a':
printf("OLDNUT\n");
2022-06-29 10:37:36 +00:00
if (nutscan_avail_usb) {
2012-01-24 10:22:33 +00:00
printf("USB\n");
}
2022-06-29 10:37:36 +00:00
if (nutscan_avail_snmp) {
2012-01-24 10:22:33 +00:00
printf("SNMP\n");
}
2022-06-29 10:37:36 +00:00
if (nutscan_avail_xml_http) {
2012-01-24 10:22:33 +00:00
printf("XML\n");
}
2022-06-29 10:37:36 +00:00
if (nutscan_avail_avahi) {
2012-01-24 10:22:33 +00:00
printf("AVAHI\n");
}
2022-06-29 10:37:36 +00:00
if (nutscan_avail_ipmi) {
2013-11-24 15:00:12 +00:00
printf("IPMI\n");
2012-01-24 10:22:33 +00:00
}
2013-11-24 15:00:12 +00:00
printf("EATON_SERIAL\n");
2012-01-24 10:22:33 +00:00
exit(EXIT_SUCCESS);
2011-09-29 18:14:46 +00:00
case '?':
2012-01-24 10:22:33 +00:00
ret_code = ERR_BAD_OPTION;
2022-06-29 10:37:36 +00:00
goto display_help;
/* Fall through to usage and error exit */
2012-01-24 10:22:33 +00:00
case 'h':
2011-09-29 18:14:46 +00:00
default:
2012-01-24 10:22:33 +00:00
display_help:
2022-06-29 10:37:36 +00:00
show_usage();
if ((opt_ret != 'h') || (ret_code != EXIT_SUCCESS))
fprintf(stderr, "\n\n"
"WARNING: Some error has occurred while processing 'nut-scanner' command-line\n"
"arguments, see more details above the usage help text.\n\n");
2012-01-24 10:22:33 +00:00
return ret_code;
2011-09-29 18:14:46 +00:00
}
2022-06-29 10:37:36 +00:00
}
2011-09-29 18:14:46 +00:00
2022-06-29 10:37:36 +00:00
#ifdef HAVE_PTHREAD
# ifdef HAVE_SEMAPHORE
/* FIXME: Currently sem_init already done on nutscan-init for lib need.
We need to destroy it before re-init. We currently can't change "sem value"
on lib (need to be thread safe). */
sem_t *current_sem = nutscan_semaphore();
sem_destroy(current_sem);
#ifdef HAVE_PRAGMAS_FOR_GCC_DIAGNOSTIC_IGNORED_UNREACHABLE_CODE
#pragma GCC diagnostic push
#endif
#ifdef HAVE_PRAGMA_GCC_DIAGNOSTIC_IGNORED_UNREACHABLE_CODE
#pragma GCC diagnostic ignored "-Wunreachable-code"
#endif
#ifdef __clang__
#pragma clang diagnostic push
#pragma clang diagnostic ignored "-Wunreachable-code"
#endif
/* Different platforms, different sizes, none fits all... */
if (SIZE_MAX > UINT_MAX && max_threads > UINT_MAX) {
#ifdef __clang__
#pragma clang diagnostic pop
#endif
#ifdef HAVE_PRAGMAS_FOR_GCC_DIAGNOSTIC_IGNORED_UNREACHABLE_CODE
#pragma GCC diagnostic pop
#endif
fprintf(stderr, "\n\n"
"WARNING: Limiting max_threads to range acceptable for sem_init()\n\n");
max_threads = UINT_MAX - 1;
2011-09-29 18:14:46 +00:00
}
2022-06-29 10:37:36 +00:00
sem_init(current_sem, 0, (unsigned int)max_threads);
# endif
#endif /* HAVE_PTHREAD */
2011-09-29 18:14:46 +00:00
2022-06-29 10:37:36 +00:00
if (cidr) {
upsdebugx(1, "Processing CIDR net/mask: %s", cidr);
2011-09-29 18:14:46 +00:00
nutscan_cidr_to_ip(cidr, &start_ip, &end_ip);
2022-06-29 10:37:36 +00:00
upsdebugx(1, "Extracted IP address range from CIDR net/mask: %s => %s", start_ip, end_ip);
2011-09-29 18:14:46 +00:00
}
2022-06-29 10:37:36 +00:00
if (!allow_usb && !allow_snmp && !allow_xml && !allow_oldnut &&
!allow_avahi && !allow_ipmi && !allow_eaton_serial
) {
2011-09-29 18:14:46 +00:00
allow_all = 1;
}
2022-06-29 10:37:36 +00:00
if (allow_all) {
2012-01-24 10:22:33 +00:00
allow_usb = 1;
allow_snmp = 1;
allow_xml = 1;
allow_oldnut = 1;
allow_avahi = 1;
allow_ipmi = 1;
2013-11-24 15:00:12 +00:00
/* BEWARE: allow_all does not include allow_eaton_serial! */
2012-01-24 10:22:33 +00:00
}
2022-06-29 10:37:36 +00:00
/* TODO/discuss : Should the #else...#endif code below for lack of pthreads
* during build also serve as a fallback for pthread failure at runtime?
*/
if (allow_usb && nutscan_avail_usb) {
upsdebugx(quiet, "Scanning USB bus.");
2011-09-29 18:14:46 +00:00
#ifdef HAVE_PTHREAD
2022-06-29 10:37:36 +00:00
if (pthread_create(&thread[TYPE_USB], NULL, run_usb, NULL)) {
upsdebugx(1, "pthread_create returned an error; disabling this scan mode");
2012-01-24 10:22:33 +00:00
nutscan_avail_usb = 0;
}
2011-09-29 18:14:46 +00:00
#else
2022-06-29 10:37:36 +00:00
upsdebugx(1, "USB SCAN: no pthread support, starting nutscan_scan_usb...");
2011-09-29 18:14:46 +00:00
dev[TYPE_USB] = nutscan_scan_usb();
2012-01-24 10:22:33 +00:00
#endif /* HAVE_PTHREAD */
2022-06-29 10:37:36 +00:00
} else {
upsdebugx(1, "USB SCAN: not requested, SKIPPED");
2011-09-29 18:14:46 +00:00
}
2022-06-29 10:37:36 +00:00
if (allow_snmp && nutscan_avail_snmp) {
if (start_ip == NULL) {
upsdebugx(quiet, "No start IP, skipping SNMP");
2013-11-24 15:00:12 +00:00
nutscan_avail_snmp = 0;
2011-09-29 18:14:46 +00:00
}
else {
2022-06-29 10:37:36 +00:00
upsdebugx(quiet, "Scanning SNMP bus.");
2011-09-29 18:14:46 +00:00
#ifdef HAVE_PTHREAD
2022-06-29 10:37:36 +00:00
upsdebugx(1, "SNMP SCAN: starting pthread_create with run_snmp...");
if (pthread_create(&thread[TYPE_SNMP], NULL, run_snmp, &snmp_sec)) {
upsdebugx(1, "pthread_create returned an error; disabling this scan mode");
2012-01-24 10:22:33 +00:00
nutscan_avail_snmp = 0;
}
2011-09-29 18:14:46 +00:00
#else
2022-06-29 10:37:36 +00:00
upsdebugx(1, "SNMP SCAN: no pthread support, starting nutscan_scan_snmp...");
dev[TYPE_SNMP] = nutscan_scan_snmp(start_ip, end_ip, timeout, &snmp_sec);
2012-01-24 10:22:33 +00:00
#endif /* HAVE_PTHREAD */
2011-09-29 18:14:46 +00:00
}
2022-06-29 10:37:36 +00:00
} else {
upsdebugx(1, "SNMP SCAN: not requested, SKIPPED");
2011-09-29 18:14:46 +00:00
}
2022-06-29 10:37:36 +00:00
if (allow_xml && nutscan_avail_xml_http) {
upsdebugx(quiet, "Scanning XML/HTTP bus.");
xml_sec.usec_timeout = timeout;
2011-09-29 18:14:46 +00:00
#ifdef HAVE_PTHREAD
2022-06-29 10:37:36 +00:00
upsdebugx(1, "XML/HTTP SCAN: starting pthread_create with run_xml...");
if (pthread_create(&thread[TYPE_XML], NULL, run_xml, &xml_sec)) {
upsdebugx(1, "pthread_create returned an error; disabling this scan mode");
2012-01-24 10:22:33 +00:00
nutscan_avail_xml_http = 0;
}
2011-09-29 18:14:46 +00:00
#else
2022-06-29 10:37:36 +00:00
upsdebugx(1, "XML/HTTP SCAN: no pthread support, starting nutscan_scan_xml_http_range()...");
dev[TYPE_XML] = nutscan_scan_xml_http_range(start_ip, end_ip, timeout, &xml_sec);
2012-01-24 10:22:33 +00:00
#endif /* HAVE_PTHREAD */
2022-06-29 10:37:36 +00:00
} else {
upsdebugx(1, "XML/HTTP SCAN: not requested, SKIPPED");
2011-09-29 18:14:46 +00:00
}
2022-06-29 10:37:36 +00:00
if (allow_oldnut && nutscan_avail_nut) {
if (start_ip == NULL) {
upsdebugx(quiet, "No start IP, skipping NUT bus (old connect method)");
2013-11-24 15:00:12 +00:00
nutscan_avail_nut = 0;
2011-09-29 18:14:46 +00:00
}
else {
2022-06-29 10:37:36 +00:00
upsdebugx(quiet, "Scanning NUT bus (old connect method).");
2011-09-29 18:14:46 +00:00
#ifdef HAVE_PTHREAD
2022-06-29 10:37:36 +00:00
upsdebugx(1, "NUT bus (old) SCAN: starting pthread_create with run_nut_old...");
if (pthread_create(&thread[TYPE_NUT], NULL, run_nut_old, NULL)) {
upsdebugx(1, "pthread_create returned an error; disabling this scan mode");
2012-01-24 10:22:33 +00:00
nutscan_avail_nut = 0;
}
2011-09-29 18:14:46 +00:00
#else
2022-06-29 10:37:36 +00:00
upsdebugx(1, "NUT bus (old) SCAN: no pthread support, starting nutscan_scan_nut...");
dev[TYPE_NUT] = nutscan_scan_nut(start_ip, end_ip, port, timeout);
2012-01-24 10:22:33 +00:00
#endif /* HAVE_PTHREAD */
2011-09-29 18:14:46 +00:00
}
2022-06-29 10:37:36 +00:00
} else {
upsdebugx(1, "NUT bus (old) SCAN: not requested, SKIPPED");
2011-09-29 18:14:46 +00:00
}
2022-06-29 10:37:36 +00:00
if (allow_avahi && nutscan_avail_avahi) {
upsdebugx(quiet, "Scanning NUT bus (avahi method).");
2011-09-29 18:14:46 +00:00
#ifdef HAVE_PTHREAD
2022-06-29 10:37:36 +00:00
upsdebugx(1, "NUT bus (avahi) SCAN: starting pthread_create with run_avahi...");
if (pthread_create(&thread[TYPE_AVAHI], NULL, run_avahi, NULL)) {
upsdebugx(1, "pthread_create returned an error; disabling this scan mode");
2012-01-24 10:22:33 +00:00
nutscan_avail_avahi = 0;
}
2011-09-29 18:14:46 +00:00
#else
2022-06-29 10:37:36 +00:00
upsdebugx(1, "NUT bus (avahi) SCAN: no pthread support, starting nutscan_scan_avahi...");
2012-01-24 10:22:33 +00:00
dev[TYPE_AVAHI] = nutscan_scan_avahi(timeout);
#endif /* HAVE_PTHREAD */
2022-06-29 10:37:36 +00:00
} else {
upsdebugx(1, "NUT bus (avahi) SCAN: not requested, SKIPPED");
2011-09-29 18:14:46 +00:00
}
2022-06-29 10:37:36 +00:00
if (allow_ipmi && nutscan_avail_ipmi) {
upsdebugx(quiet, "Scanning IPMI bus.");
2011-09-29 18:14:46 +00:00
#ifdef HAVE_PTHREAD
2022-06-29 10:37:36 +00:00
upsdebugx(1, "IPMI SCAN: starting pthread_create with run_ipmi...");
if (pthread_create(&thread[TYPE_IPMI], NULL, run_ipmi, &ipmi_sec)) {
upsdebugx(1, "pthread_create returned an error; disabling this scan mode");
2012-01-24 10:22:33 +00:00
nutscan_avail_ipmi = 0;
}
2011-09-29 18:14:46 +00:00
#else
2022-06-29 10:37:36 +00:00
upsdebugx(1, "IPMI SCAN: no pthread support, starting nutscan_scan_ipmi...");
dev[TYPE_IPMI] = nutscan_scan_ipmi(start_ip, end_ip, &ipmi_sec);
2013-11-24 15:00:12 +00:00
#endif /* HAVE_PTHREAD */
2022-06-29 10:37:36 +00:00
} else {
upsdebugx(1, "IPMI SCAN: not requested, SKIPPED");
2013-11-24 15:00:12 +00:00
}
/* Eaton serial scan */
if (allow_eaton_serial) {
2022-06-29 10:37:36 +00:00
upsdebugx(quiet, "Scanning serial bus for Eaton devices.");
2013-11-24 15:00:12 +00:00
#ifdef HAVE_PTHREAD
2022-06-29 10:37:36 +00:00
upsdebugx(1, "SERIAL SCAN: starting pthread_create with run_eaton_serial (return not checked!)...");
2013-11-24 15:00:12 +00:00
pthread_create(&thread[TYPE_EATON_SERIAL], NULL, run_eaton_serial, serial_ports);
/* FIXME: check return code */
2022-06-29 10:37:36 +00:00
/* upsdebugx(1, "pthread_create returned an error; disabling this scan mode"); */
/* nutscan_avail_eaton_serial(?) = 0; */
2013-11-24 15:00:12 +00:00
#else
2022-06-29 10:37:36 +00:00
upsdebugx(1, "SERIAL SCAN: no pthread support, starting nutscan_scan_eaton_serial...");
2013-11-24 15:00:12 +00:00
dev[TYPE_EATON_SERIAL] = nutscan_scan_eaton_serial (serial_ports);
2012-01-24 10:22:33 +00:00
#endif /* HAVE_PTHREAD */
2022-06-29 10:37:36 +00:00
} else {
upsdebugx(1, "SERIAL SCAN: not requested, SKIPPED");
2011-09-29 18:14:46 +00:00
}
#ifdef HAVE_PTHREAD
2022-06-29 10:37:36 +00:00
if (allow_usb && nutscan_avail_usb && thread[TYPE_USB]) {
upsdebugx(1, "USB SCAN: join back the pthread");
2016-07-18 00:11:41 +00:00
pthread_join(thread[TYPE_USB], NULL);
2012-01-24 10:22:33 +00:00
}
2022-06-29 10:37:36 +00:00
if (allow_snmp && nutscan_avail_snmp && thread[TYPE_SNMP]) {
upsdebugx(1, "SNMP SCAN: join back the pthread");
2016-07-18 00:11:41 +00:00
pthread_join(thread[TYPE_SNMP], NULL);
2012-01-24 10:22:33 +00:00
}
2022-06-29 10:37:36 +00:00
if (allow_xml && nutscan_avail_xml_http && thread[TYPE_XML]) {
upsdebugx(1, "XML/HTTP SCAN: join back the pthread");
2016-07-18 00:11:41 +00:00
pthread_join(thread[TYPE_XML], NULL);
2012-01-24 10:22:33 +00:00
}
2022-06-29 10:37:36 +00:00
if (allow_oldnut && nutscan_avail_nut && thread[TYPE_NUT]) {
upsdebugx(1, "NUT bus (old) SCAN: join back the pthread");
2016-07-18 00:11:41 +00:00
pthread_join(thread[TYPE_NUT], NULL);
2012-01-24 10:22:33 +00:00
}
2022-06-29 10:37:36 +00:00
if (allow_avahi && nutscan_avail_avahi && thread[TYPE_AVAHI]) {
upsdebugx(1, "NUT bus (avahi) SCAN: join back the pthread");
2016-07-18 00:11:41 +00:00
pthread_join(thread[TYPE_AVAHI], NULL);
2012-01-24 10:22:33 +00:00
}
2022-06-29 10:37:36 +00:00
if (allow_ipmi && nutscan_avail_ipmi && thread[TYPE_IPMI]) {
upsdebugx(1, "IPMI SCAN: join back the pthread");
2016-07-18 00:11:41 +00:00
pthread_join(thread[TYPE_IPMI], NULL);
2012-01-24 10:22:33 +00:00
}
2016-07-18 00:11:41 +00:00
if (allow_eaton_serial && thread[TYPE_EATON_SERIAL]) {
2022-06-29 10:37:36 +00:00
upsdebugx(1, "SERIAL SCAN: join back the pthread");
2016-07-18 00:11:41 +00:00
pthread_join(thread[TYPE_EATON_SERIAL], NULL);
2013-11-24 15:00:12 +00:00
}
2011-09-29 18:14:46 +00:00
#endif /* HAVE_PTHREAD */
2022-06-29 10:37:36 +00:00
upsdebugx(1, "SCANS DONE: display results");
upsdebugx(1, "SCANS DONE: display results: USB");
2011-09-29 18:14:46 +00:00
display_func(dev[TYPE_USB]);
2022-06-29 10:37:36 +00:00
upsdebugx(1, "SCANS DONE: free resources: USB");
2011-09-29 18:14:46 +00:00
nutscan_free_device(dev[TYPE_USB]);
2012-01-24 10:22:33 +00:00
2022-06-29 10:37:36 +00:00
upsdebugx(1, "SCANS DONE: display results: SNMP");
2011-09-29 18:14:46 +00:00
display_func(dev[TYPE_SNMP]);
2022-06-29 10:37:36 +00:00
upsdebugx(1, "SCANS DONE: free resources: SNMP");
2011-09-29 18:14:46 +00:00
nutscan_free_device(dev[TYPE_SNMP]);
2012-01-24 10:22:33 +00:00
2022-06-29 10:37:36 +00:00
upsdebugx(1, "SCANS DONE: display results: XML/HTTP");
2011-09-29 18:14:46 +00:00
display_func(dev[TYPE_XML]);
2022-06-29 10:37:36 +00:00
upsdebugx(1, "SCANS DONE: free resources: XML/HTTP");
2011-09-29 18:14:46 +00:00
nutscan_free_device(dev[TYPE_XML]);
2012-01-24 10:22:33 +00:00
2022-06-29 10:37:36 +00:00
upsdebugx(1, "SCANS DONE: display results: NUT bus (old)");
2011-09-29 18:14:46 +00:00
display_func(dev[TYPE_NUT]);
2022-06-29 10:37:36 +00:00
upsdebugx(1, "SCANS DONE: free resources: NUT bus (old)");
2011-09-29 18:14:46 +00:00
nutscan_free_device(dev[TYPE_NUT]);
2012-01-24 10:22:33 +00:00
2022-06-29 10:37:36 +00:00
upsdebugx(1, "SCANS DONE: display results: NUT bus (avahi)");
2011-09-29 18:14:46 +00:00
display_func(dev[TYPE_AVAHI]);
2022-06-29 10:37:36 +00:00
upsdebugx(1, "SCANS DONE: free resources: NUT bus (avahi)");
2011-09-29 18:14:46 +00:00
nutscan_free_device(dev[TYPE_AVAHI]);
2012-01-24 10:22:33 +00:00
2022-06-29 10:37:36 +00:00
upsdebugx(1, "SCANS DONE: display results: IPMI");
2011-09-29 18:14:46 +00:00
display_func(dev[TYPE_IPMI]);
2022-06-29 10:37:36 +00:00
upsdebugx(1, "SCANS DONE: free resources: IPMI");
2011-09-29 18:14:46 +00:00
nutscan_free_device(dev[TYPE_IPMI]);
2012-06-01 13:55:19 +00:00
2022-06-29 10:37:36 +00:00
upsdebugx(1, "SCANS DONE: display results: SERIAL");
2013-11-24 15:00:12 +00:00
display_func(dev[TYPE_EATON_SERIAL]);
2022-06-29 10:37:36 +00:00
upsdebugx(1, "SCANS DONE: free resources: SERIAL");
2013-11-24 15:00:12 +00:00
nutscan_free_device(dev[TYPE_EATON_SERIAL]);
2022-06-29 10:37:36 +00:00
#ifdef HAVE_PTHREAD
# ifdef HAVE_SEMAPHORE
sem_destroy(nutscan_semaphore());
# endif
#endif
upsdebugx(1, "SCANS DONE: free common scanner resources");
2012-06-01 13:55:19 +00:00
nutscan_free();
2022-06-29 10:37:36 +00:00
upsdebugx(1, "SCANS DONE: EXIT_SUCCESS");
2011-09-29 18:14:46 +00:00
return EXIT_SUCCESS;
}