]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/timesync/timesyncd-manager.c
Merge pull request #22759 from msekletar/issue-18077-long-sysfs-paths-hashing
[thirdparty/systemd.git] / src / timesync / timesyncd-manager.c
CommitLineData
db9ecf05 1/* SPDX-License-Identifier: LGPL-2.1-or-later */
84e51726 2
84e51726 3#include <errno.h>
84e51726 4#include <math.h>
84e51726
LP
5#include <netinet/in.h>
6#include <netinet/ip.h>
07630cea
LP
7#include <resolv.h>
8#include <stdlib.h>
84e51726
LP
9#include <sys/timerfd.h>
10#include <sys/timex.h>
84e51726 11#include <sys/types.h>
07630cea
LP
12
13#include "sd-daemon.h"
b016e77e 14#include "sd-messages.h"
84e51726 15
b5efdb8a 16#include "alloc-util.h"
57b82eaa 17#include "bus-polkit.h"
dcb37458 18#include "dns-domain.h"
ec75e8e0 19#include "event-util.h"
3ffd4af2 20#include "fd-util.h"
ca78ad1d 21#include "format-util.h"
f4f15635 22#include "fs-util.h"
84e51726 23#include "list.h"
07630cea 24#include "log.h"
07630cea 25#include "network-util.h"
84e51726 26#include "ratelimit.h"
7082bb05 27#include "resolve-private.h"
07630cea 28#include "socket-util.h"
07630cea 29#include "string-util.h"
84e51726 30#include "strv.h"
07630cea 31#include "time-util.h"
84e51726
LP
32#include "timesyncd-conf.h"
33#include "timesyncd-manager.h"
1f129b7f 34#include "user-util.h"
3ffd4af2 35#include "util.h"
84e51726
LP
36
37#ifndef ADJ_SETOFFSET
38#define ADJ_SETOFFSET 0x0100 /* add 'time' to current time */
39#endif
40
403db470 41/* Expected accuracy of time synchronization; used to adjust the poll interval */
84e51726
LP
42#define NTP_ACCURACY_SEC 0.2
43
84e51726
LP
44/*
45 * Maximum delta in seconds which the system clock is gradually adjusted
a4465d0d 46 * (slewed) to approach the network time. Deltas larger that this are set by
84e51726
LP
47 * letting the system time jump. The kernel's limit for adjtime is 0.5s.
48 */
49#define NTP_MAX_ADJUST 0.4
50
a4465d0d 51/* Default of maximum acceptable root distance in microseconds. */
403db470 52#define NTP_ROOT_DISTANCE_MAX_USEC (5 * USEC_PER_SEC)
3af0442c 53
e8206972
ML
54/* Maximum number of missed replies before selecting another source. */
55#define NTP_MAX_MISSED_REPLIES 2
56
84e51726
LP
57#define RATELIMIT_INTERVAL_USEC (10*USEC_PER_SEC)
58#define RATELIMIT_BURST 10
59
60#define TIMEOUT_USEC (10*USEC_PER_SEC)
61
84e51726
LP
62static int manager_arm_timer(Manager *m, usec_t next);
63static int manager_clock_watch_setup(Manager *m);
7b628891 64static int manager_listen_setup(Manager *m);
f89c4e15 65static void manager_listen_stop(Manager *m);
1f129b7f 66static int manager_save_time_and_rearm(Manager *m, usec_t t);
84e51726 67
3af0442c
ML
68static double ntp_ts_short_to_d(const struct ntp_ts_short *ts) {
69 return be16toh(ts->sec) + (be16toh(ts->frac) / 65536.0);
70}
71
84e51726
LP
72static double ntp_ts_to_d(const struct ntp_ts *ts) {
73 return be32toh(ts->sec) + ((double)be32toh(ts->frac) / UINT_MAX);
74}
75
76static double ts_to_d(const struct timespec *ts) {
77 return ts->tv_sec + (1.0e-9 * ts->tv_nsec);
78}
79
370d3c31 80static uint32_t graceful_add_offset_1900_1970(time_t t) {
81 /* Adds OFFSET_1900_1970 to t and returns it as 32bit value. This is handles overflows
82 * gracefully in a deterministic and well-defined way by cutting off the top bits. */
83 uint64_t a = (uint64_t) t + OFFSET_1900_1970;
84 return (uint32_t) (a & UINT64_C(0xFFFFFFFF));
85}
86
84e51726
LP
87static int manager_timeout(sd_event_source *source, usec_t usec, void *userdata) {
88 _cleanup_free_ char *pretty = NULL;
89 Manager *m = userdata;
90
91 assert(m);
92 assert(m->current_server_name);
93 assert(m->current_server_address);
94
95 server_address_pretty(m->current_server_address, &pretty);
96 log_info("Timed out waiting for reply from %s (%s).", strna(pretty), m->current_server_name->string);
97
98 return manager_connect(m);
99}
100
101static int manager_send_request(Manager *m) {
102 _cleanup_free_ char *pretty = NULL;
103 struct ntp_msg ntpmsg = {
104 /*
105 * "The client initializes the NTP message header, sends the request
106 * to the server, and strips the time of day from the Transmit
107 * Timestamp field of the reply. For this purpose, all the NTP
108 * header fields are set to 0, except the Mode, VN, and optional
109 * Transmit Timestamp fields."
110 */
111 .field = NTP_FIELD(0, 4, NTP_MODE_CLIENT),
112 };
113 ssize_t len;
114 int r;
115
116 assert(m);
117 assert(m->current_server_name);
118 assert(m->current_server_address);
119
120 m->event_timeout = sd_event_source_unref(m->event_timeout);
121
f89c4e15
LP
122 r = manager_listen_setup(m);
123 if (r < 0)
105a1a36 124 return log_warning_errno(r, "Failed to set up connection socket: %m");
7b628891 125
84e51726
LP
126 /*
127 * Set transmit timestamp, remember it; the server will send that back
128 * as the origin timestamp and we have an indication that this is the
129 * matching answer to our request.
130 *
131 * The actual value does not matter, We do not care about the correct
132 * NTP UINT_MAX fraction; we just pass the plain nanosecond value.
133 */
ba4e0427 134 assert_se(clock_gettime(CLOCK_BOOTTIME, &m->trans_time_mon) >= 0);
84e51726 135 assert_se(clock_gettime(CLOCK_REALTIME, &m->trans_time) >= 0);
370d3c31 136 ntpmsg.trans_time.sec = htobe32(graceful_add_offset_1900_1970(m->trans_time.tv_sec));
84e51726
LP
137 ntpmsg.trans_time.frac = htobe32(m->trans_time.tv_nsec);
138
139 server_address_pretty(m->current_server_address, &pretty);
140
141 len = sendto(m->server_socket, &ntpmsg, sizeof(ntpmsg), MSG_DONTWAIT, &m->current_server_address->sockaddr.sa, m->current_server_address->socklen);
142 if (len == sizeof(ntpmsg)) {
143 m->pending = true;
144 log_debug("Sent NTP request to %s (%s).", strna(pretty), m->current_server_name->string);
145 } else {
56f64d95 146 log_debug_errno(errno, "Sending NTP request to %s (%s) failed: %m", strna(pretty), m->current_server_name->string);
84e51726
LP
147 return manager_connect(m);
148 }
149
ab4df227 150 /* re-arm timer with increasing timeout, in case the packets never arrive back */
5919bd3d
ZJS
151 if (m->retry_interval == 0)
152 m->retry_interval = NTP_RETRY_INTERVAL_MIN_USEC;
153 else
154 m->retry_interval = MIN(m->retry_interval * 4/3, NTP_RETRY_INTERVAL_MAX_USEC);
ab4df227
KS
155
156 r = manager_arm_timer(m, m->retry_interval);
f647962d
MS
157 if (r < 0)
158 return log_error_errno(r, "Failed to rearm timer: %m");
ab4df227 159
e8206972
ML
160 m->missed_replies++;
161 if (m->missed_replies > NTP_MAX_MISSED_REPLIES) {
162 r = sd_event_add_time(
163 m->event,
164 &m->event_timeout,
ba4e0427
LP
165 CLOCK_BOOTTIME,
166 now(CLOCK_BOOTTIME) + TIMEOUT_USEC, 0,
e8206972 167 manager_timeout, m);
f647962d
MS
168 if (r < 0)
169 return log_error_errno(r, "Failed to arm timeout timer: %m");
84e51726
LP
170 }
171
172 return 0;
173}
174
175static int manager_timer(sd_event_source *source, usec_t usec, void *userdata) {
176 Manager *m = userdata;
177
178 assert(m);
179
180 return manager_send_request(m);
181}
182
183static int manager_arm_timer(Manager *m, usec_t next) {
184 int r;
185
186 assert(m);
84e51726
LP
187
188 if (next == 0) {
189 m->event_timer = sd_event_source_unref(m->event_timer);
190 return 0;
191 }
192
193 if (m->event_timer) {
39cf0351 194 r = sd_event_source_set_time_relative(m->event_timer, next);
84e51726
LP
195 if (r < 0)
196 return r;
197
198 return sd_event_source_set_enabled(m->event_timer, SD_EVENT_ONESHOT);
199 }
200
39cf0351 201 return sd_event_add_time_relative(
84e51726
LP
202 m->event,
203 &m->event_timer,
ba4e0427 204 CLOCK_BOOTTIME,
39cf0351 205 next, 0,
84e51726
LP
206 manager_timer, m);
207}
208
209static int manager_clock_watch(sd_event_source *source, int fd, uint32_t revents, void *userdata) {
210 Manager *m = userdata;
211
212 assert(m);
213
214 /* rearm timer */
215 manager_clock_watch_setup(m);
216
217 /* skip our own jumps */
218 if (m->jumped) {
219 m->jumped = false;
220 return 0;
221 }
222
223 /* resync */
7e3254b3 224 log_debug("System time changed. Resyncing.");
84e51726
LP
225 m->poll_resync = true;
226
227 return manager_send_request(m);
228}
229
230/* wake up when the system time changes underneath us */
231static int manager_clock_watch_setup(Manager *m) {
84e51726
LP
232 int r;
233
234 assert(m);
235
ec75e8e0 236 m->event_clock_watch = sd_event_source_disable_unref(m->event_clock_watch);
84e51726 237
ec75e8e0 238 r = event_add_time_change(m->event, &m->event_clock_watch, manager_clock_watch, m);
f647962d
MS
239 if (r < 0)
240 return log_error_errno(r, "Failed to create clock watch event source: %m");
84e51726
LP
241
242 return 0;
243}
244
245static int manager_adjust_clock(Manager *m, double offset, int leap_sec) {
40c6b514 246 struct timex tmx;
84e51726
LP
247
248 assert(m);
249
9a8b4302
LP
250 /* For small deltas, tell the kernel to gradually adjust the system clock to the NTP time, larger
251 * deltas are just directly set. */
84e51726 252 if (fabs(offset) < NTP_MAX_ADJUST) {
40c6b514
LP
253 tmx = (struct timex) {
254 .modes = ADJ_STATUS | ADJ_NANO | ADJ_OFFSET | ADJ_TIMECONST | ADJ_MAXERROR | ADJ_ESTERROR,
255 .status = STA_PLL,
256 .offset = offset * NSEC_PER_SEC,
257 .constant = log2i(m->poll_interval_usec / USEC_PER_SEC) - 4,
258 };
259
ff49bc32 260 log_debug(" adjust (slew): %+.3f sec", offset);
84e51726 261 } else {
40c6b514
LP
262 tmx = (struct timex) {
263 .modes = ADJ_STATUS | ADJ_NANO | ADJ_SETOFFSET | ADJ_MAXERROR | ADJ_ESTERROR,
84e51726 264
40c6b514
LP
265 /* ADJ_NANO uses nanoseconds in the microseconds field */
266 .time.tv_sec = (long)offset,
267 .time.tv_usec = (offset - (double) (long) offset) * NSEC_PER_SEC,
268 };
84e51726
LP
269
270 /* the kernel expects -0.3s as {-1, 7000.000.000} */
271 if (tmx.time.tv_usec < 0) {
272 tmx.time.tv_sec -= 1;
273 tmx.time.tv_usec += NSEC_PER_SEC;
274 }
275
276 m->jumped = true;
ff49bc32 277 log_debug(" adjust (jump): %+.3f sec", offset);
84e51726
LP
278 }
279
9a8b4302
LP
280 /* An unset STA_UNSYNC will enable the kernel's 11-minute mode, which syncs the system time
281 * periodically to the RTC.
84e51726 282 *
9a8b4302
LP
283 * In case the RTC runs in local time, never touch the RTC, we have no way to properly handle
284 * daylight saving changes and mobile devices moving between time zones. */
84e51726
LP
285 if (m->rtc_local_time)
286 tmx.status |= STA_UNSYNC;
287
288 switch (leap_sec) {
289 case 1:
290 tmx.status |= STA_INS;
291 break;
292 case -1:
293 tmx.status |= STA_DEL;
294 break;
295 }
296
aabda4f3 297 if (clock_adjtime(CLOCK_REALTIME, &tmx) < 0)
6ff6f4d8 298 return -errno;
84e51726 299
66086a40 300 m->drift_freq = tmx.freq;
84e51726
LP
301
302 log_debug(" status : %04i %s\n"
0060bb8f 303 " time now : %"PRI_TIME".%03"PRI_USEC"\n"
3bd7ef83 304 " constant : %"PRI_TIMEX"\n"
84e51726 305 " offset : %+.3f sec\n"
66086a40 306 " freq offset : %+"PRI_TIMEX" (%+"PRI_TIMEX" ppm)\n",
84e51726 307 tmx.status, tmx.status & STA_UNSYNC ? "unsync" : "sync",
70887c5f 308 tmx.time.tv_sec, tmx.time.tv_usec / NSEC_PER_MSEC,
84e51726
LP
309 tmx.constant,
310 (double)tmx.offset / NSEC_PER_SEC,
66086a40 311 tmx.freq, tmx.freq / 65536);
84e51726
LP
312
313 return 0;
314}
315
316static bool manager_sample_spike_detection(Manager *m, double offset, double delay) {
14cb109d 317 unsigned i, idx_cur, idx_new, idx_min;
84e51726
LP
318 double jitter;
319 double j;
320
321 assert(m);
322
323 m->packet_count++;
324
325 /* ignore initial sample */
326 if (m->packet_count == 1)
327 return false;
328
329 /* store the current data in our samples array */
330 idx_cur = m->samples_idx;
331 idx_new = (idx_cur + 1) % ELEMENTSOF(m->samples);
332 m->samples_idx = idx_new;
333 m->samples[idx_new].offset = offset;
334 m->samples[idx_new].delay = delay;
335
336 /* calculate new jitter value from the RMS differences relative to the lowest delay sample */
337 jitter = m->samples_jitter;
338 for (idx_min = idx_cur, i = 0; i < ELEMENTSOF(m->samples); i++)
339 if (m->samples[i].delay > 0 && m->samples[i].delay < m->samples[idx_min].delay)
340 idx_min = i;
341
342 j = 0;
343 for (i = 0; i < ELEMENTSOF(m->samples); i++)
fa66b606 344 j += pow(m->samples[i].offset - m->samples[idx_min].offset, 2);
84e51726
LP
345 m->samples_jitter = sqrt(j / (ELEMENTSOF(m->samples) - 1));
346
347 /* ignore samples when resyncing */
348 if (m->poll_resync)
349 return false;
350
351 /* always accept offset if we are farther off than the round-trip delay */
352 if (fabs(offset) > delay)
353 return false;
354
355 /* we need a few samples before looking at them */
356 if (m->packet_count < 4)
357 return false;
358
359 /* do not accept anything worse than the maximum possible error of the best sample */
360 if (fabs(offset) > m->samples[idx_min].delay)
361 return true;
362
363 /* compare the difference between the current offset to the previous offset and jitter */
364 return fabs(offset - m->samples[idx_cur].offset) > 3 * jitter;
365}
366
367static void manager_adjust_poll(Manager *m, double offset, bool spike) {
368 assert(m);
369
370 if (m->poll_resync) {
a4465d0d 371 m->poll_interval_usec = m->poll_interval_min_usec;
84e51726
LP
372 m->poll_resync = false;
373 return;
374 }
375
376 /* set to minimal poll interval */
377 if (!spike && fabs(offset) > NTP_ACCURACY_SEC) {
a4465d0d 378 m->poll_interval_usec = m->poll_interval_min_usec;
84e51726
LP
379 return;
380 }
381
382 /* increase polling interval */
383 if (fabs(offset) < NTP_ACCURACY_SEC * 0.25) {
a4465d0d 384 if (m->poll_interval_usec < m->poll_interval_max_usec)
84e51726
LP
385 m->poll_interval_usec *= 2;
386 return;
387 }
388
389 /* decrease polling interval */
390 if (spike || fabs(offset) > NTP_ACCURACY_SEC * 0.75) {
a4465d0d 391 if (m->poll_interval_usec > m->poll_interval_min_usec)
84e51726
LP
392 m->poll_interval_usec /= 2;
393 return;
394 }
395}
396
397static int manager_receive_response(sd_event_source *source, int fd, uint32_t revents, void *userdata) {
398 Manager *m = userdata;
399 struct ntp_msg ntpmsg;
400
401 struct iovec iov = {
402 .iov_base = &ntpmsg,
403 .iov_len = sizeof(ntpmsg),
404 };
f782eee6
YW
405 /* This needs to be initialized with zero. See #20741. */
406 CMSG_BUFFER_TYPE(CMSG_SPACE_TIMESPEC) control = {};
84e51726
LP
407 union sockaddr_union server_addr;
408 struct msghdr msghdr = {
409 .msg_iov = &iov,
410 .msg_iovlen = 1,
411 .msg_control = &control,
412 .msg_controllen = sizeof(control),
413 .msg_name = &server_addr,
414 .msg_namelen = sizeof(server_addr),
415 };
1cc6c93a 416 struct timespec *recv_time = NULL;
1f129b7f 417 triple_timestamp dts;
84e51726 418 ssize_t len;
5ba674cc 419 double origin, receive, trans, dest, delay, offset, root_distance;
84e51726 420 bool spike;
5ba674cc 421 int leap_sec, r;
84e51726
LP
422
423 assert(source);
424 assert(m);
425
426 if (revents & (EPOLLHUP|EPOLLERR)) {
427 log_warning("Server connection returned error.");
428 return manager_connect(m);
429 }
430
3691bcf3
LP
431 len = recvmsg_safe(fd, &msghdr, MSG_DONTWAIT);
432 if (len == -EAGAIN)
433 return 0;
84e51726 434 if (len < 0) {
3691bcf3 435 log_warning_errno(len, "Error receiving message, disconnecting: %m");
84e51726
LP
436 return manager_connect(m);
437 }
438
43fcd650
TM
439 /* Too short or too long packet? */
440 if (iov.iov_len < sizeof(struct ntp_msg) || (msghdr.msg_flags & MSG_TRUNC)) {
84e51726
LP
441 log_warning("Invalid response from server. Disconnecting.");
442 return manager_connect(m);
443 }
444
445 if (!m->current_server_name ||
446 !m->current_server_address ||
447 !sockaddr_equal(&server_addr, &m->current_server_address->sockaddr)) {
448 log_debug("Response from unknown server.");
449 return 0;
450 }
451
adc07c2b 452 recv_time = CMSG_FIND_DATA(&msghdr, SOL_SOCKET, SCM_TIMESTAMPNS, struct timespec);
baaa35ad 453 if (!recv_time)
adc07c2b 454 return log_error_errno(SYNTHETIC_ERRNO(EINVAL), "Packet timestamp missing.");
84e51726
LP
455
456 if (!m->pending) {
457 log_debug("Unexpected reply. Ignoring.");
458 return 0;
459 }
460
e8206972
ML
461 m->missed_replies = 0;
462
84e51726 463 /* check our "time cookie" (we just stored nanoseconds in the fraction field) */
370d3c31 464 if (be32toh(ntpmsg.origin_time.sec) != graceful_add_offset_1900_1970(m->trans_time.tv_sec) ||
edd50d5e 465 be32toh(ntpmsg.origin_time.frac) != (unsigned long) m->trans_time.tv_nsec) {
84e51726
LP
466 log_debug("Invalid reply; not our transmit time. Ignoring.");
467 return 0;
468 }
469
470 m->event_timeout = sd_event_source_unref(m->event_timeout);
471
472 if (be32toh(ntpmsg.recv_time.sec) < TIME_EPOCH + OFFSET_1900_1970 ||
473 be32toh(ntpmsg.trans_time.sec) < TIME_EPOCH + OFFSET_1900_1970) {
474 log_debug("Invalid reply, returned times before epoch. Ignoring.");
475 return manager_connect(m);
476 }
477
07610e10
ML
478 if (NTP_FIELD_LEAP(ntpmsg.field) == NTP_LEAP_NOTINSYNC ||
479 ntpmsg.stratum == 0 || ntpmsg.stratum >= 16) {
84e51726
LP
480 log_debug("Server is not synchronized. Disconnecting.");
481 return manager_connect(m);
482 }
483
484 if (!IN_SET(NTP_FIELD_VERSION(ntpmsg.field), 3, 4)) {
485 log_debug("Response NTPv%d. Disconnecting.", NTP_FIELD_VERSION(ntpmsg.field));
486 return manager_connect(m);
487 }
488
489 if (NTP_FIELD_MODE(ntpmsg.field) != NTP_MODE_SERVER) {
490 log_debug("Unsupported mode %d. Disconnecting.", NTP_FIELD_MODE(ntpmsg.field));
491 return manager_connect(m);
492 }
493
3af0442c 494 root_distance = ntp_ts_short_to_d(&ntpmsg.root_delay) / 2 + ntp_ts_short_to_d(&ntpmsg.root_dispersion);
403db470 495 if (root_distance > (double) m->root_distance_max_usec / (double) USEC_PER_SEC) {
ce96c9cb 496 log_info("Server has too large root distance. Disconnecting.");
3af0442c
ML
497 return manager_connect(m);
498 }
499
84e51726
LP
500 /* valid packet */
501 m->pending = false;
ab4df227 502 m->retry_interval = 0;
84e51726 503
7b628891 504 /* Stop listening */
f89c4e15 505 manager_listen_stop(m);
7b628891 506
84e51726
LP
507 /* announce leap seconds */
508 if (NTP_FIELD_LEAP(ntpmsg.field) & NTP_LEAP_PLUSSEC)
509 leap_sec = 1;
510 else if (NTP_FIELD_LEAP(ntpmsg.field) & NTP_LEAP_MINUSSEC)
511 leap_sec = -1;
512 else
513 leap_sec = 0;
514
515 /*
516 * "Timestamp Name ID When Generated
517 * ------------------------------------------------------------
518 * Originate Timestamp T1 time request sent by client
519 * Receive Timestamp T2 time request received by server
520 * Transmit Timestamp T3 time reply sent by server
521 * Destination Timestamp T4 time reply received by client
522 *
523 * The round-trip delay, d, and system clock offset, t, are defined as:
524 * d = (T4 - T1) - (T3 - T2) t = ((T2 - T1) + (T3 - T4)) / 2"
525 */
73c76e63 526 origin = ts_to_d(&m->trans_time) + OFFSET_1900_1970;
84e51726
LP
527 receive = ntp_ts_to_d(&ntpmsg.recv_time);
528 trans = ntp_ts_to_d(&ntpmsg.trans_time);
487a3682 529 dest = ts_to_d(recv_time) + OFFSET_1900_1970;
84e51726
LP
530
531 offset = ((receive - origin) + (trans - dest)) / 2;
532 delay = (dest - origin) - (trans - receive);
533
534 spike = manager_sample_spike_detection(m, offset, delay);
535
536 manager_adjust_poll(m, offset, spike);
537
538 log_debug("NTP response:\n"
539 " leap : %u\n"
540 " version : %u\n"
541 " mode : %u\n"
542 " stratum : %u\n"
543 " precision : %.6f sec (%d)\n"
3af0442c 544 " root distance: %.6f sec\n"
84e51726
LP
545 " reference : %.4s\n"
546 " origin : %.3f\n"
547 " receive : %.3f\n"
548 " transmit : %.3f\n"
549 " dest : %.3f\n"
550 " offset : %+.3f sec\n"
551 " delay : %+.3f sec\n"
552 " packet count : %"PRIu64"\n"
553 " jitter : %.3f%s\n"
554 " poll interval: " USEC_FMT "\n",
555 NTP_FIELD_LEAP(ntpmsg.field),
556 NTP_FIELD_VERSION(ntpmsg.field),
557 NTP_FIELD_MODE(ntpmsg.field),
558 ntpmsg.stratum,
559 exp2(ntpmsg.precision), ntpmsg.precision,
3af0442c 560 root_distance,
84e51726
LP
561 ntpmsg.stratum == 1 ? ntpmsg.refid : "n/a",
562 origin - OFFSET_1900_1970,
563 receive - OFFSET_1900_1970,
564 trans - OFFSET_1900_1970,
565 dest - OFFSET_1900_1970,
566 offset, delay,
567 m->packet_count,
568 m->samples_jitter, spike ? " spike" : "",
569 m->poll_interval_usec / USEC_PER_SEC);
570
1f129b7f
LP
571 /* Get current monotonic/realtime clocks immediately before adjusting the latter */
572 triple_timestamp_get(&dts);
573
84e51726 574 if (!spike) {
1f129b7f
LP
575 /* Fix up our idea of the time. */
576 dts.realtime = (usec_t) (dts.realtime + offset * USEC_PER_SEC);
577
84e51726
LP
578 r = manager_adjust_clock(m, offset, leap_sec);
579 if (r < 0)
6ff6f4d8 580 log_error_errno(r, "Failed to call clock_adjtime(): %m");
7cb08ea8 581
1f129b7f 582 (void) manager_save_time_and_rearm(m, dts.realtime);
7cb08ea8
LP
583
584 /* If touch fails, there isn't much we can do. Maybe it'll work next time. */
1aa7ca22
LP
585 r = touch("/run/systemd/timesync/synchronized");
586 if (r < 0)
587 log_debug_errno(r, "Failed to touch /run/systemd/timesync/synchronized, ignoring: %m");
84e51726
LP
588 }
589
66086a40
YW
590 /* Save NTP response */
591 m->ntpmsg = ntpmsg;
592 m->origin_time = m->trans_time;
593 m->dest_time = *recv_time;
594 m->spike = spike;
595
75ca1621 596 log_debug("interval/delta/delay/jitter/drift " USEC_FMT "s/%+.3fs/%.3fs/%.3fs/%+"PRIi64"ppm%s",
66086a40 597 m->poll_interval_usec / USEC_PER_SEC, offset, delay, m->samples_jitter, m->drift_freq / 65536,
7b5b3fc3 598 spike ? " (ignored)" : "");
84e51726 599
933e95d7
YW
600 if (sd_bus_is_ready(m->bus) > 0)
601 (void) sd_bus_emit_properties_changed(
602 m->bus,
603 "/org/freedesktop/timesync1",
604 "org.freedesktop.timesync1.Manager",
605 "NTPMessage",
606 NULL);
66086a40 607
87057128 608 if (!m->talking) {
481b3f9e
LP
609 _cleanup_free_ char *pretty = NULL;
610
87057128 611 m->talking = true;
481b3f9e 612
c696878a
LP
613 (void) server_address_pretty(m->current_server_address, &pretty);
614
922a6508
LP
615 log_info("Contacted time server %s (%s).", strna(pretty), m->current_server_name->string);
616 (void) sd_notifyf(false, "STATUS=Contacted time server %s (%s).", strna(pretty), m->current_server_name->string);
481b3f9e
LP
617 }
618
b016e77e
LP
619 if (!spike && !m->synchronized) {
620 m->synchronized = true;
621
622 log_struct(LOG_INFO,
623 LOG_MESSAGE("Initial clock synchronization to %s.", FORMAT_TIMESTAMP_STYLE(dts.realtime, TIMESTAMP_US)),
624 "MESSAGE_ID=" SD_MESSAGE_TIME_SYNC_STR,
625 "MONOTONIC_USEC=" USEC_FMT, dts.monotonic,
626 "REALTIME_USEC=" USEC_FMT, dts.realtime,
627 "BOOTIME_USEC=" USEC_FMT, dts.boottime);
628 }
629
84e51726 630 r = manager_arm_timer(m, m->poll_interval_usec);
f647962d
MS
631 if (r < 0)
632 return log_error_errno(r, "Failed to rearm timer: %m");
84e51726
LP
633
634 return 0;
635}
636
637static int manager_listen_setup(Manager *m) {
638 union sockaddr_union addr = {};
84e51726
LP
639 int r;
640
641 assert(m);
642
f89c4e15
LP
643 if (m->server_socket >= 0)
644 return 0;
645
84e51726
LP
646 assert(!m->event_receive);
647 assert(m->current_server_address);
648
649 addr.sa.sa_family = m->current_server_address->sockaddr.sa.sa_family;
650
651 m->server_socket = socket(addr.sa.sa_family, SOCK_DGRAM | SOCK_CLOEXEC, 0);
652 if (m->server_socket < 0)
653 return -errno;
654
655 r = bind(m->server_socket, &addr.sa, m->current_server_address->socklen);
656 if (r < 0)
657 return -errno;
658
2ff48e98 659 r = setsockopt_int(m->server_socket, SOL_SOCKET, SO_TIMESTAMPNS, true);
84e51726 660 if (r < 0)
2ff48e98 661 return r;
84e51726 662
00df39a5
LP
663 if (addr.sa.sa_family == AF_INET)
664 (void) setsockopt_int(m->server_socket, IPPROTO_IP, IP_TOS, IPTOS_LOWDELAY);
84e51726
LP
665
666 return sd_event_add_io(m->event, &m->event_receive, m->server_socket, EPOLLIN, manager_receive_response, m);
667}
668
f89c4e15
LP
669static void manager_listen_stop(Manager *m) {
670 assert(m);
671
672 m->event_receive = sd_event_source_unref(m->event_receive);
673 m->server_socket = safe_close(m->server_socket);
674}
675
84e51726
LP
676static int manager_begin(Manager *m) {
677 _cleanup_free_ char *pretty = NULL;
678 int r;
679
680 assert(m);
681 assert_return(m->current_server_name, -EHOSTUNREACH);
682 assert_return(m->current_server_address, -EHOSTUNREACH);
683
87057128 684 m->talking = false;
e8206972 685 m->missed_replies = NTP_MAX_MISSED_REPLIES;
80cd2606 686 if (m->poll_interval_usec == 0)
a4465d0d 687 m->poll_interval_usec = m->poll_interval_min_usec;
84e51726
LP
688
689 server_address_pretty(m->current_server_address, &pretty);
481b3f9e 690 log_debug("Connecting to time server %s (%s).", strna(pretty), m->current_server_name->string);
c696878a 691 (void) sd_notifyf(false, "STATUS=Connecting to time server %s (%s).", strna(pretty), m->current_server_name->string);
84e51726 692
84e51726
LP
693 r = manager_clock_watch_setup(m);
694 if (r < 0)
695 return r;
696
697 return manager_send_request(m);
698}
699
874ff7bf
LP
700void manager_set_server_name(Manager *m, ServerName *n) {
701 assert(m);
84e51726 702
874ff7bf
LP
703 if (m->current_server_name == n)
704 return;
84e51726 705
874ff7bf
LP
706 m->current_server_name = n;
707 m->current_server_address = NULL;
708
709 manager_disconnect(m);
84e51726 710
874ff7bf
LP
711 if (n)
712 log_debug("Selected server %s.", n->string);
713}
84e51726 714
874ff7bf 715void manager_set_server_address(Manager *m, ServerAddress *a) {
84e51726
LP
716 assert(m);
717
874ff7bf
LP
718 if (m->current_server_address == a)
719 return;
720
874ff7bf 721 m->current_server_address = a;
20f8d3cf
SN
722 /* If a is NULL, we are just clearing the address, without
723 * changing the name. Keep the existing name in that case. */
724 if (a)
725 m->current_server_name = a->name;
874ff7bf
LP
726
727 manager_disconnect(m);
728
729 if (a) {
730 _cleanup_free_ char *pretty = NULL;
731 server_address_pretty(a, &pretty);
732 log_debug("Selected address %s of server %s.", strna(pretty), a->name->string);
84e51726
LP
733 }
734}
735
7082bb05 736static int manager_resolve_handler(sd_resolve_query *q, int ret, const struct addrinfo *ai, Manager *m) {
874ff7bf 737 int r;
84e51726
LP
738
739 assert(q);
740 assert(m);
741 assert(m->current_server_name);
742
743 m->resolve_query = sd_resolve_query_unref(m->resolve_query);
744
745 if (ret != 0) {
746 log_debug("Failed to resolve %s: %s", m->current_server_name->string, gai_strerror(ret));
747
748 /* Try next host */
749 return manager_connect(m);
750 }
751
84e51726
LP
752 for (; ai; ai = ai->ai_next) {
753 _cleanup_free_ char *pretty = NULL;
874ff7bf 754 ServerAddress *a;
84e51726
LP
755
756 assert(ai->ai_addr);
757 assert(ai->ai_addrlen >= offsetof(struct sockaddr, sa_data));
84e51726
LP
758
759 if (!IN_SET(ai->ai_addr->sa_family, AF_INET, AF_INET6)) {
760 log_warning("Unsuitable address protocol for %s", m->current_server_name->string);
761 continue;
762 }
763
874ff7bf 764 r = server_address_new(m->current_server_name, &a, (const union sockaddr_union*) ai->ai_addr, ai->ai_addrlen);
f647962d
MS
765 if (r < 0)
766 return log_error_errno(r, "Failed to add server address: %m");
84e51726 767
874ff7bf 768 server_address_pretty(a, &pretty);
84e51726
LP
769 log_debug("Resolved address %s for %s.", pretty, m->current_server_name->string);
770 }
771
772 if (!m->current_server_name->addresses) {
773 log_error("Failed to find suitable address for host %s.", m->current_server_name->string);
774
775 /* Try next host */
776 return manager_connect(m);
777 }
778
874ff7bf 779 manager_set_server_address(m, m->current_server_name->addresses);
84e51726
LP
780
781 return manager_begin(m);
782}
783
874ff7bf 784static int manager_retry_connect(sd_event_source *source, usec_t usec, void *userdata) {
84e51726
LP
785 Manager *m = userdata;
786
787 assert(m);
788
789 return manager_connect(m);
790}
791
792int manager_connect(Manager *m) {
84e51726
LP
793 int r;
794
795 assert(m);
796
797 manager_disconnect(m);
798
799 m->event_retry = sd_event_source_unref(m->event_retry);
7994ac1d 800 if (!ratelimit_below(&m->ratelimit)) {
a9061d97 801 log_debug("Delaying attempts to contact servers.");
84e51726 802
ba4e0427 803 r = sd_event_add_time_relative(m->event, &m->event_retry, CLOCK_BOOTTIME, m->connection_retry_usec,
e81a44bf 804 0, manager_retry_connect, m);
f647962d
MS
805 if (r < 0)
806 return log_error_errno(r, "Failed to create retry timer: %m");
84e51726
LP
807
808 return 0;
809 }
810
811 /* If we already are operating on some address, switch to the
812 * next one. */
813 if (m->current_server_address && m->current_server_address->addresses_next)
874ff7bf 814 manager_set_server_address(m, m->current_server_address->addresses_next);
84e51726 815 else {
853efc39 816 static const struct addrinfo hints = {
874ff7bf
LP
817 .ai_flags = AI_NUMERICSERV|AI_ADDRCONFIG,
818 .ai_socktype = SOCK_DGRAM,
819 };
84e51726 820
874ff7bf 821 /* Hmm, we are through all addresses, let's look for the next host instead */
84e51726 822 if (m->current_server_name && m->current_server_name->names_next)
874ff7bf 823 manager_set_server_name(m, m->current_server_name->names_next);
84e51726 824 else {
874ff7bf 825 ServerName *f;
63463bf0 826 bool restart = true;
874ff7bf
LP
827
828 /* Our current server name list is exhausted,
57b82eaa
DM
829 * let's find the next one to iterate. First we try the runtime list, then the system list,
830 * then the link list. After having processed the link list we jump back to the system list
831 * if no runtime server list.
832 * However, if all lists are empty, we change to the fallback list. */
874ff7bf 833 if (!m->current_server_name || m->current_server_name->type == SERVER_LINK) {
57b82eaa
DM
834 f = m->runtime_servers;
835 if (!f)
836 f = m->system_servers;
874ff7bf
LP
837 if (!f)
838 f = m->link_servers;
839 } else {
840 f = m->link_servers;
57b82eaa 841 if (f)
63463bf0 842 restart = false;
57b82eaa
DM
843 else {
844 f = m->runtime_servers;
845 if (!f)
846 f = m->system_servers;
847 }
874ff7bf
LP
848 }
849
850 if (!f)
851 f = m->fallback_servers;
852
853 if (!f) {
854 manager_set_server_name(m, NULL);
84e51726
LP
855 log_debug("No server found.");
856 return 0;
857 }
858
a08ea295 859 if (restart && !m->exhausted_servers && m->poll_interval_usec > 0) {
63463bf0 860 log_debug("Waiting after exhausting servers.");
ba4e0427 861 r = sd_event_add_time_relative(m->event, &m->event_retry, CLOCK_BOOTTIME, m->poll_interval_usec, 0, manager_retry_connect, m);
f647962d
MS
862 if (r < 0)
863 return log_error_errno(r, "Failed to create retry timer: %m");
63463bf0
ML
864
865 m->exhausted_servers = true;
866
867 /* Increase the polling interval */
a4465d0d 868 if (m->poll_interval_usec < m->poll_interval_max_usec)
63463bf0
ML
869 m->poll_interval_usec *= 2;
870
871 return 0;
872 }
873
874 m->exhausted_servers = false;
875
874ff7bf 876 manager_set_server_name(m, f);
84e51726
LP
877 }
878
879 /* Tell the resolver to reread /etc/resolv.conf, in
880 * case it changed. */
881 res_init();
882
874ff7bf
LP
883 /* Flush out any previously resolved addresses */
884 server_name_flush_addresses(m->current_server_name);
885
886 log_debug("Resolving %s...", m->current_server_name->string);
887
7082bb05 888 r = resolve_getaddrinfo(m->resolve, &m->resolve_query, m->current_server_name->string, "123", &hints, manager_resolve_handler, NULL, m);
f647962d
MS
889 if (r < 0)
890 return log_error_errno(r, "Failed to create resolver: %m");
84e51726
LP
891
892 return 1;
893 }
894
895 r = manager_begin(m);
896 if (r < 0)
897 return r;
898
899 return 1;
900}
901
84e51726
LP
902void manager_disconnect(Manager *m) {
903 assert(m);
904
905 m->resolve_query = sd_resolve_query_unref(m->resolve_query);
906
907 m->event_timer = sd_event_source_unref(m->event_timer);
908
f89c4e15 909 manager_listen_stop(m);
84e51726 910
ec75e8e0 911 m->event_clock_watch = sd_event_source_disable_unref(m->event_clock_watch);
84e51726
LP
912
913 m->event_timeout = sd_event_source_unref(m->event_timeout);
914
c696878a 915 (void) sd_notify(false, "STATUS=Idle.");
84e51726
LP
916}
917
874ff7bf
LP
918void manager_flush_server_names(Manager *m, ServerType t) {
919 assert(m);
920
921 if (t == SERVER_SYSTEM)
922 while (m->system_servers)
923 server_name_free(m->system_servers);
924
925 if (t == SERVER_LINK)
926 while (m->link_servers)
927 server_name_free(m->link_servers);
928
929 if (t == SERVER_FALLBACK)
930 while (m->fallback_servers)
931 server_name_free(m->fallback_servers);
57b82eaa
DM
932
933 if (t == SERVER_RUNTIME)
934 manager_flush_runtime_servers(m);
935}
936
937void manager_flush_runtime_servers(Manager *m) {
938 assert(m);
939
940 while (m->runtime_servers)
941 server_name_free(m->runtime_servers);
874ff7bf 942}
84e51726 943
75db809a 944Manager* manager_free(Manager *m) {
84e51726 945 if (!m)
75db809a 946 return NULL;
84e51726
LP
947
948 manager_disconnect(m);
874ff7bf
LP
949 manager_flush_server_names(m, SERVER_SYSTEM);
950 manager_flush_server_names(m, SERVER_LINK);
57b82eaa 951 manager_flush_server_names(m, SERVER_RUNTIME);
874ff7bf 952 manager_flush_server_names(m, SERVER_FALLBACK);
84e51726
LP
953
954 sd_event_source_unref(m->event_retry);
955
956 sd_event_source_unref(m->network_event_source);
957 sd_network_monitor_unref(m->network_monitor);
958
33e82f3e
DI
959 sd_event_source_unref(m->event_save_time);
960
84e51726
LP
961 sd_resolve_unref(m->resolve);
962 sd_event_unref(m->event);
963
92e31da1 964 sd_bus_flush_close_unref(m->bus);
e7dd3947 965
57b82eaa
DM
966 bus_verify_polkit_async_registry_free(m->polkit_registry);
967
75db809a 968 return mfree(m);
84e51726
LP
969}
970
874ff7bf
LP
971static int manager_network_read_link_servers(Manager *m) {
972 _cleanup_strv_free_ char **ntp = NULL;
3e85ec07 973 bool changed = false;
874ff7bf
LP
974 int r;
975
84e51726
LP
976 assert(m);
977
874ff7bf 978 r = sd_network_get_ntp(&ntp);
ba0c011e
YW
979 if (r < 0) {
980 if (r == -ENOMEM)
981 log_oom();
982 else
983 log_debug_errno(r, "Failed to get link NTP servers: %m");
874ff7bf 984 goto clear;
ba0c011e 985 }
874ff7bf
LP
986
987 LIST_FOREACH(names, n, m->link_servers)
988 n->marked = true;
989
990 STRV_FOREACH(i, ntp) {
991 bool found = false;
992
dcb37458
YW
993 r = dns_name_is_valid_or_address(*i);
994 if (r < 0) {
995 log_error_errno(r, "Failed to check validity of NTP server name or address '%s': %m", *i);
996 goto clear;
997 } else if (r == 0) {
998 log_error("Invalid NTP server name or address, ignoring: %s", *i);
999 continue;
1000 }
1001
874ff7bf
LP
1002 LIST_FOREACH(names, n, m->link_servers)
1003 if (streq(n->string, *i)) {
1004 n->marked = false;
1005 found = true;
1006 break;
1007 }
1008
1009 if (!found) {
1010 r = server_name_new(m, NULL, SERVER_LINK, *i);
ba0c011e
YW
1011 if (r < 0) {
1012 log_oom();
874ff7bf 1013 goto clear;
ba0c011e 1014 }
3e85ec07
YW
1015
1016 changed = true;
874ff7bf
LP
1017 }
1018 }
1019
80a226b2 1020 LIST_FOREACH(names, n, m->link_servers)
3e85ec07 1021 if (n->marked) {
874ff7bf 1022 server_name_free(n);
3e85ec07
YW
1023 changed = true;
1024 }
874ff7bf 1025
3e85ec07 1026 return changed;
874ff7bf
LP
1027
1028clear:
1029 manager_flush_server_names(m, SERVER_LINK);
1030 return r;
84e51726
LP
1031}
1032
f1b42a0b
DM
1033bool manager_is_connected(Manager *m) {
1034 assert(m);
1035
0630eb1b
YW
1036 /* Return true when the manager is sending a request, resolving a server name, or
1037 * in a poll interval. */
1038 return m->server_socket >= 0 || m->resolve_query || m->event_timer;
1039}
1040
84e51726
LP
1041static int manager_network_event_handler(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
1042 Manager *m = userdata;
3e85ec07 1043 bool changed, connected, online;
84e51726
LP
1044 int r;
1045
1046 assert(m);
1047
1048 sd_network_monitor_flush(m->network_monitor);
1049
ba0c011e 1050 /* When manager_network_read_link_servers() failed, we assume that the servers are changed. */
55033662 1051 changed = manager_network_read_link_servers(m);
874ff7bf 1052
84e51726
LP
1053 /* check if the machine is online */
1054 online = network_is_online();
1055
1056 /* check if the client is currently connected */
0630eb1b 1057 connected = manager_is_connected(m);
84e51726
LP
1058
1059 if (connected && !online) {
1060 log_info("No network connectivity, watching for changes.");
1061 manager_disconnect(m);
1062
0630eb1b 1063 } else if ((!connected || changed) && online) {
84e51726
LP
1064 log_info("Network configuration changed, trying to establish connection.");
1065
1066 if (m->current_server_address)
1067 r = manager_begin(m);
1068 else
1069 r = manager_connect(m);
1070 if (r < 0)
1071 return r;
1072 }
1073
1074 return 0;
1075}
1076
1077static int manager_network_monitor_listen(Manager *m) {
1078 int r, fd, events;
1079
1080 assert(m);
1081
1082 r = sd_network_monitor_new(&m->network_monitor, NULL);
36484c03 1083 if (r == -ENOENT) {
f95b0be7 1084 log_info("systemd does not appear to be running, not listening for systemd-networkd events.");
36484c03
ZJS
1085 return 0;
1086 }
84e51726
LP
1087 if (r < 0)
1088 return r;
1089
1090 fd = sd_network_monitor_get_fd(m->network_monitor);
1091 if (fd < 0)
1092 return fd;
1093
1094 events = sd_network_monitor_get_events(m->network_monitor);
1095 if (events < 0)
1096 return events;
1097
1098 r = sd_event_add_io(m->event, &m->network_event_source, fd, events, manager_network_event_handler, m);
1099 if (r < 0)
1100 return r;
1101
1102 return 0;
1103}
1104
1105int manager_new(Manager **ret) {
1106 _cleanup_(manager_freep) Manager *m = NULL;
1107 int r;
1108
1109 assert(ret);
1110
40c6b514 1111 m = new(Manager, 1);
84e51726
LP
1112 if (!m)
1113 return -ENOMEM;
1114
40c6b514
LP
1115 *m = (Manager) {
1116 .root_distance_max_usec = NTP_ROOT_DISTANCE_MAX_USEC,
1117 .poll_interval_min_usec = NTP_POLL_INTERVAL_MIN_USEC,
1118 .poll_interval_max_usec = NTP_POLL_INTERVAL_MAX_USEC,
f907cc16 1119
40c6b514 1120 .connection_retry_usec = DEFAULT_CONNECTION_RETRY_USEC,
e81a44bf 1121
40c6b514 1122 .server_socket = -1,
84e51726 1123
40c6b514
LP
1124 .ratelimit = (RateLimit) {
1125 RATELIMIT_INTERVAL_USEC,
1126 RATELIMIT_BURST
1127 },
84e51726 1128
40c6b514
LP
1129 .save_time_interval_usec = DEFAULT_SAVE_TIME_INTERVAL_USEC,
1130 };
33e82f3e 1131
84e51726
LP
1132 r = sd_event_default(&m->event);
1133 if (r < 0)
1134 return r;
1135
8b7140db
YW
1136 (void) sd_event_add_signal(m->event, NULL, SIGTERM, NULL, NULL);
1137 (void) sd_event_add_signal(m->event, NULL, SIGINT, NULL, NULL);
84e51726 1138
8b7140db 1139 (void) sd_event_set_watchdog(m->event, true);
84e51726 1140
b016e77e
LP
1141 /* Load previous synchronization state */
1142 r = access("/run/systemd/timesync/synchronized", F_OK);
1143 if (r < 0 && errno != ENOENT)
1144 log_debug_errno(errno, "Failed to determine whether /run/systemd/timesync/synchronized exists, ignoring: %m");
1145 m->synchronized = r >= 0;
1146
84e51726
LP
1147 r = sd_resolve_default(&m->resolve);
1148 if (r < 0)
1149 return r;
1150
1151 r = sd_resolve_attach_event(m->resolve, m->event, 0);
1152 if (r < 0)
1153 return r;
1154
1155 r = manager_network_monitor_listen(m);
1156 if (r < 0)
1157 return r;
1158
ba0c011e 1159 (void) manager_network_read_link_servers(m);
874ff7bf 1160
1cc6c93a 1161 *ret = TAKE_PTR(m);
84e51726
LP
1162
1163 return 0;
1164}
33e82f3e
DI
1165
1166static int manager_save_time_handler(sd_event_source *s, uint64_t usec, void *userdata) {
1167 Manager *m = userdata;
1168
1169 assert(m);
1170
1f129b7f 1171 (void) manager_save_time_and_rearm(m, USEC_INFINITY);
33e82f3e
DI
1172 return 0;
1173}
1174
1175int manager_setup_save_time_event(Manager *m) {
1176 int r;
1177
1178 assert(m);
1179 assert(!m->event_save_time);
1180
1181 if (m->save_time_interval_usec == USEC_INFINITY)
1182 return 0;
1183
1184 /* NB: we'll accumulate scheduling latencies here, but this doesn't matter */
1185 r = sd_event_add_time_relative(
1186 m->event, &m->event_save_time,
ba4e0427 1187 CLOCK_BOOTTIME,
33e82f3e
DI
1188 m->save_time_interval_usec,
1189 10 * USEC_PER_SEC,
1190 manager_save_time_handler, m);
1191 if (r < 0)
1192 return log_error_errno(r, "Failed to add save time event: %m");
1193
1194 (void) sd_event_source_set_description(m->event_save_time, "save-time");
1195
1196 return 0;
1197}
1198
1f129b7f 1199static int manager_save_time_and_rearm(Manager *m, usec_t t) {
33e82f3e
DI
1200 int r;
1201
1202 assert(m);
1203
1f129b7f
LP
1204 /* Updates the timestamp file to the specified time. If 't' is USEC_INFINITY uses the current system
1205 * clock, but otherwise uses the specified timestamp. Note that whenever we acquire an NTP sync the
1206 * specified timestamp value might be more accurate than the system clock, since the latter is
1207 * subject to slow adjustments. */
1208 r = touch_file(CLOCK_FILE, false, t, UID_INVALID, GID_INVALID, MODE_INVALID);
33e82f3e
DI
1209 if (r < 0)
1210 log_debug_errno(r, "Failed to update " CLOCK_FILE ", ignoring: %m");
1211
1212 m->save_on_exit = true;
1213
1214 if (m->save_time_interval_usec != USEC_INFINITY) {
1215 r = sd_event_source_set_time_relative(m->event_save_time, m->save_time_interval_usec);
1216 if (r < 0)
1217 return log_error_errno(r, "Failed to rearm save time event: %m");
1218
1219 r = sd_event_source_set_enabled(m->event_save_time, SD_EVENT_ONESHOT);
1220 if (r < 0)
1221 return log_error_errno(r, "Failed to enable save time event: %m");
1222 }
1223
1224 return 0;
1225}