]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/timesync/timesyncd-manager.c
Merge pull request #25602 from fbuihuu/fix-TEST-73-LOCALE
[thirdparty/systemd.git] / src / timesync / timesyncd-manager.c
CommitLineData
db9ecf05 1/* SPDX-License-Identifier: LGPL-2.1-or-later */
84e51726 2
84e51726 3#include <errno.h>
84e51726 4#include <math.h>
84e51726
LP
5#include <netinet/in.h>
6#include <netinet/ip.h>
07630cea
LP
7#include <resolv.h>
8#include <stdlib.h>
84e51726
LP
9#include <sys/timerfd.h>
10#include <sys/timex.h>
84e51726 11#include <sys/types.h>
07630cea
LP
12
13#include "sd-daemon.h"
b016e77e 14#include "sd-messages.h"
84e51726 15
b5efdb8a 16#include "alloc-util.h"
57b82eaa 17#include "bus-polkit.h"
dcb37458 18#include "dns-domain.h"
ec75e8e0 19#include "event-util.h"
3ffd4af2 20#include "fd-util.h"
ca78ad1d 21#include "format-util.h"
f4f15635 22#include "fs-util.h"
84e51726 23#include "list.h"
07630cea 24#include "log.h"
3ae6b3bf 25#include "logarithm.h"
07630cea 26#include "network-util.h"
84e51726 27#include "ratelimit.h"
7082bb05 28#include "resolve-private.h"
07630cea 29#include "socket-util.h"
07630cea 30#include "string-util.h"
84e51726 31#include "strv.h"
07630cea 32#include "time-util.h"
84e51726
LP
33#include "timesyncd-conf.h"
34#include "timesyncd-manager.h"
1f129b7f 35#include "user-util.h"
84e51726
LP
36
37#ifndef ADJ_SETOFFSET
38#define ADJ_SETOFFSET 0x0100 /* add 'time' to current time */
39#endif
40
403db470 41/* Expected accuracy of time synchronization; used to adjust the poll interval */
84e51726
LP
42#define NTP_ACCURACY_SEC 0.2
43
84e51726
LP
44/*
45 * Maximum delta in seconds which the system clock is gradually adjusted
a4465d0d 46 * (slewed) to approach the network time. Deltas larger that this are set by
84e51726
LP
47 * letting the system time jump. The kernel's limit for adjtime is 0.5s.
48 */
49#define NTP_MAX_ADJUST 0.4
50
a4465d0d 51/* Default of maximum acceptable root distance in microseconds. */
403db470 52#define NTP_ROOT_DISTANCE_MAX_USEC (5 * USEC_PER_SEC)
3af0442c 53
e8206972
ML
54/* Maximum number of missed replies before selecting another source. */
55#define NTP_MAX_MISSED_REPLIES 2
56
84e51726
LP
57#define RATELIMIT_INTERVAL_USEC (10*USEC_PER_SEC)
58#define RATELIMIT_BURST 10
59
60#define TIMEOUT_USEC (10*USEC_PER_SEC)
61
84e51726
LP
62static int manager_arm_timer(Manager *m, usec_t next);
63static int manager_clock_watch_setup(Manager *m);
7b628891 64static int manager_listen_setup(Manager *m);
f89c4e15 65static void manager_listen_stop(Manager *m);
1f129b7f 66static int manager_save_time_and_rearm(Manager *m, usec_t t);
84e51726 67
3af0442c
ML
68static double ntp_ts_short_to_d(const struct ntp_ts_short *ts) {
69 return be16toh(ts->sec) + (be16toh(ts->frac) / 65536.0);
70}
71
84e51726
LP
72static double ntp_ts_to_d(const struct ntp_ts *ts) {
73 return be32toh(ts->sec) + ((double)be32toh(ts->frac) / UINT_MAX);
74}
75
76static double ts_to_d(const struct timespec *ts) {
77 return ts->tv_sec + (1.0e-9 * ts->tv_nsec);
78}
79
370d3c31 80static uint32_t graceful_add_offset_1900_1970(time_t t) {
81 /* Adds OFFSET_1900_1970 to t and returns it as 32bit value. This is handles overflows
82 * gracefully in a deterministic and well-defined way by cutting off the top bits. */
83 uint64_t a = (uint64_t) t + OFFSET_1900_1970;
84 return (uint32_t) (a & UINT64_C(0xFFFFFFFF));
85}
86
84e51726
LP
87static int manager_timeout(sd_event_source *source, usec_t usec, void *userdata) {
88 _cleanup_free_ char *pretty = NULL;
99534007 89 Manager *m = ASSERT_PTR(userdata);
84e51726 90
84e51726
LP
91 assert(m->current_server_name);
92 assert(m->current_server_address);
93
94 server_address_pretty(m->current_server_address, &pretty);
95 log_info("Timed out waiting for reply from %s (%s).", strna(pretty), m->current_server_name->string);
96
97 return manager_connect(m);
98}
99
100static int manager_send_request(Manager *m) {
101 _cleanup_free_ char *pretty = NULL;
102 struct ntp_msg ntpmsg = {
103 /*
104 * "The client initializes the NTP message header, sends the request
105 * to the server, and strips the time of day from the Transmit
106 * Timestamp field of the reply. For this purpose, all the NTP
107 * header fields are set to 0, except the Mode, VN, and optional
108 * Transmit Timestamp fields."
109 */
110 .field = NTP_FIELD(0, 4, NTP_MODE_CLIENT),
111 };
112 ssize_t len;
113 int r;
114
115 assert(m);
116 assert(m->current_server_name);
117 assert(m->current_server_address);
118
119 m->event_timeout = sd_event_source_unref(m->event_timeout);
120
f89c4e15 121 r = manager_listen_setup(m);
9b4e04f0
FR
122 if (r < 0) {
123 log_warning_errno(r, "Failed to set up connection socket: %m");
124 return manager_connect(m);
125 }
7b628891 126
84e51726
LP
127 /*
128 * Set transmit timestamp, remember it; the server will send that back
129 * as the origin timestamp and we have an indication that this is the
130 * matching answer to our request.
131 *
132 * The actual value does not matter, We do not care about the correct
133 * NTP UINT_MAX fraction; we just pass the plain nanosecond value.
134 */
ba4e0427 135 assert_se(clock_gettime(CLOCK_BOOTTIME, &m->trans_time_mon) >= 0);
84e51726 136 assert_se(clock_gettime(CLOCK_REALTIME, &m->trans_time) >= 0);
370d3c31 137 ntpmsg.trans_time.sec = htobe32(graceful_add_offset_1900_1970(m->trans_time.tv_sec));
84e51726
LP
138 ntpmsg.trans_time.frac = htobe32(m->trans_time.tv_nsec);
139
140 server_address_pretty(m->current_server_address, &pretty);
141
142 len = sendto(m->server_socket, &ntpmsg, sizeof(ntpmsg), MSG_DONTWAIT, &m->current_server_address->sockaddr.sa, m->current_server_address->socklen);
143 if (len == sizeof(ntpmsg)) {
144 m->pending = true;
145 log_debug("Sent NTP request to %s (%s).", strna(pretty), m->current_server_name->string);
146 } else {
56f64d95 147 log_debug_errno(errno, "Sending NTP request to %s (%s) failed: %m", strna(pretty), m->current_server_name->string);
84e51726
LP
148 return manager_connect(m);
149 }
150
ab4df227 151 /* re-arm timer with increasing timeout, in case the packets never arrive back */
5919bd3d
ZJS
152 if (m->retry_interval == 0)
153 m->retry_interval = NTP_RETRY_INTERVAL_MIN_USEC;
154 else
155 m->retry_interval = MIN(m->retry_interval * 4/3, NTP_RETRY_INTERVAL_MAX_USEC);
ab4df227
KS
156
157 r = manager_arm_timer(m, m->retry_interval);
f647962d
MS
158 if (r < 0)
159 return log_error_errno(r, "Failed to rearm timer: %m");
ab4df227 160
e8206972
ML
161 m->missed_replies++;
162 if (m->missed_replies > NTP_MAX_MISSED_REPLIES) {
163 r = sd_event_add_time(
164 m->event,
165 &m->event_timeout,
ba4e0427
LP
166 CLOCK_BOOTTIME,
167 now(CLOCK_BOOTTIME) + TIMEOUT_USEC, 0,
e8206972 168 manager_timeout, m);
f647962d
MS
169 if (r < 0)
170 return log_error_errno(r, "Failed to arm timeout timer: %m");
84e51726
LP
171 }
172
173 return 0;
174}
175
176static int manager_timer(sd_event_source *source, usec_t usec, void *userdata) {
99534007 177 Manager *m = ASSERT_PTR(userdata);
84e51726
LP
178
179 return manager_send_request(m);
180}
181
182static int manager_arm_timer(Manager *m, usec_t next) {
183 int r;
184
185 assert(m);
84e51726
LP
186
187 if (next == 0) {
188 m->event_timer = sd_event_source_unref(m->event_timer);
189 return 0;
190 }
191
192 if (m->event_timer) {
39cf0351 193 r = sd_event_source_set_time_relative(m->event_timer, next);
84e51726
LP
194 if (r < 0)
195 return r;
196
197 return sd_event_source_set_enabled(m->event_timer, SD_EVENT_ONESHOT);
198 }
199
39cf0351 200 return sd_event_add_time_relative(
84e51726
LP
201 m->event,
202 &m->event_timer,
ba4e0427 203 CLOCK_BOOTTIME,
39cf0351 204 next, 0,
84e51726
LP
205 manager_timer, m);
206}
207
208static int manager_clock_watch(sd_event_source *source, int fd, uint32_t revents, void *userdata) {
99534007 209 Manager *m = ASSERT_PTR(userdata);
84e51726
LP
210
211 /* rearm timer */
212 manager_clock_watch_setup(m);
213
214 /* skip our own jumps */
215 if (m->jumped) {
216 m->jumped = false;
217 return 0;
218 }
219
220 /* resync */
7e3254b3 221 log_debug("System time changed. Resyncing.");
84e51726
LP
222 m->poll_resync = true;
223
224 return manager_send_request(m);
225}
226
227/* wake up when the system time changes underneath us */
228static int manager_clock_watch_setup(Manager *m) {
84e51726
LP
229 int r;
230
231 assert(m);
232
ec75e8e0 233 m->event_clock_watch = sd_event_source_disable_unref(m->event_clock_watch);
84e51726 234
ec75e8e0 235 r = event_add_time_change(m->event, &m->event_clock_watch, manager_clock_watch, m);
f647962d
MS
236 if (r < 0)
237 return log_error_errno(r, "Failed to create clock watch event source: %m");
84e51726
LP
238
239 return 0;
240}
241
242static int manager_adjust_clock(Manager *m, double offset, int leap_sec) {
40c6b514 243 struct timex tmx;
84e51726
LP
244
245 assert(m);
246
9a8b4302
LP
247 /* For small deltas, tell the kernel to gradually adjust the system clock to the NTP time, larger
248 * deltas are just directly set. */
84e51726 249 if (fabs(offset) < NTP_MAX_ADJUST) {
40c6b514
LP
250 tmx = (struct timex) {
251 .modes = ADJ_STATUS | ADJ_NANO | ADJ_OFFSET | ADJ_TIMECONST | ADJ_MAXERROR | ADJ_ESTERROR,
252 .status = STA_PLL,
253 .offset = offset * NSEC_PER_SEC,
254 .constant = log2i(m->poll_interval_usec / USEC_PER_SEC) - 4,
255 };
256
ff49bc32 257 log_debug(" adjust (slew): %+.3f sec", offset);
84e51726 258 } else {
40c6b514
LP
259 tmx = (struct timex) {
260 .modes = ADJ_STATUS | ADJ_NANO | ADJ_SETOFFSET | ADJ_MAXERROR | ADJ_ESTERROR,
84e51726 261
40c6b514
LP
262 /* ADJ_NANO uses nanoseconds in the microseconds field */
263 .time.tv_sec = (long)offset,
264 .time.tv_usec = (offset - (double) (long) offset) * NSEC_PER_SEC,
265 };
84e51726
LP
266
267 /* the kernel expects -0.3s as {-1, 7000.000.000} */
268 if (tmx.time.tv_usec < 0) {
269 tmx.time.tv_sec -= 1;
270 tmx.time.tv_usec += NSEC_PER_SEC;
271 }
272
273 m->jumped = true;
ff49bc32 274 log_debug(" adjust (jump): %+.3f sec", offset);
84e51726
LP
275 }
276
9a8b4302
LP
277 /* An unset STA_UNSYNC will enable the kernel's 11-minute mode, which syncs the system time
278 * periodically to the RTC.
84e51726 279 *
9a8b4302
LP
280 * In case the RTC runs in local time, never touch the RTC, we have no way to properly handle
281 * daylight saving changes and mobile devices moving between time zones. */
84e51726
LP
282 if (m->rtc_local_time)
283 tmx.status |= STA_UNSYNC;
284
285 switch (leap_sec) {
286 case 1:
287 tmx.status |= STA_INS;
288 break;
289 case -1:
290 tmx.status |= STA_DEL;
291 break;
292 }
293
aabda4f3 294 if (clock_adjtime(CLOCK_REALTIME, &tmx) < 0)
6ff6f4d8 295 return -errno;
84e51726 296
66086a40 297 m->drift_freq = tmx.freq;
84e51726
LP
298
299 log_debug(" status : %04i %s\n"
0060bb8f 300 " time now : %"PRI_TIME".%03"PRI_USEC"\n"
3bd7ef83 301 " constant : %"PRI_TIMEX"\n"
84e51726 302 " offset : %+.3f sec\n"
66086a40 303 " freq offset : %+"PRI_TIMEX" (%+"PRI_TIMEX" ppm)\n",
84e51726 304 tmx.status, tmx.status & STA_UNSYNC ? "unsync" : "sync",
70887c5f 305 tmx.time.tv_sec, tmx.time.tv_usec / NSEC_PER_MSEC,
84e51726
LP
306 tmx.constant,
307 (double)tmx.offset / NSEC_PER_SEC,
66086a40 308 tmx.freq, tmx.freq / 65536);
84e51726
LP
309
310 return 0;
311}
312
313static bool manager_sample_spike_detection(Manager *m, double offset, double delay) {
14cb109d 314 unsigned i, idx_cur, idx_new, idx_min;
84e51726
LP
315 double jitter;
316 double j;
317
318 assert(m);
319
320 m->packet_count++;
321
322 /* ignore initial sample */
323 if (m->packet_count == 1)
324 return false;
325
326 /* store the current data in our samples array */
327 idx_cur = m->samples_idx;
328 idx_new = (idx_cur + 1) % ELEMENTSOF(m->samples);
329 m->samples_idx = idx_new;
330 m->samples[idx_new].offset = offset;
331 m->samples[idx_new].delay = delay;
332
333 /* calculate new jitter value from the RMS differences relative to the lowest delay sample */
334 jitter = m->samples_jitter;
335 for (idx_min = idx_cur, i = 0; i < ELEMENTSOF(m->samples); i++)
336 if (m->samples[i].delay > 0 && m->samples[i].delay < m->samples[idx_min].delay)
337 idx_min = i;
338
339 j = 0;
340 for (i = 0; i < ELEMENTSOF(m->samples); i++)
fa66b606 341 j += pow(m->samples[i].offset - m->samples[idx_min].offset, 2);
84e51726
LP
342 m->samples_jitter = sqrt(j / (ELEMENTSOF(m->samples) - 1));
343
344 /* ignore samples when resyncing */
345 if (m->poll_resync)
346 return false;
347
348 /* always accept offset if we are farther off than the round-trip delay */
349 if (fabs(offset) > delay)
350 return false;
351
352 /* we need a few samples before looking at them */
353 if (m->packet_count < 4)
354 return false;
355
356 /* do not accept anything worse than the maximum possible error of the best sample */
357 if (fabs(offset) > m->samples[idx_min].delay)
358 return true;
359
360 /* compare the difference between the current offset to the previous offset and jitter */
361 return fabs(offset - m->samples[idx_cur].offset) > 3 * jitter;
362}
363
364static void manager_adjust_poll(Manager *m, double offset, bool spike) {
365 assert(m);
366
367 if (m->poll_resync) {
a4465d0d 368 m->poll_interval_usec = m->poll_interval_min_usec;
84e51726
LP
369 m->poll_resync = false;
370 return;
371 }
372
373 /* set to minimal poll interval */
374 if (!spike && fabs(offset) > NTP_ACCURACY_SEC) {
a4465d0d 375 m->poll_interval_usec = m->poll_interval_min_usec;
84e51726
LP
376 return;
377 }
378
379 /* increase polling interval */
380 if (fabs(offset) < NTP_ACCURACY_SEC * 0.25) {
a4465d0d 381 if (m->poll_interval_usec < m->poll_interval_max_usec)
84e51726
LP
382 m->poll_interval_usec *= 2;
383 return;
384 }
385
386 /* decrease polling interval */
387 if (spike || fabs(offset) > NTP_ACCURACY_SEC * 0.75) {
a4465d0d 388 if (m->poll_interval_usec > m->poll_interval_min_usec)
84e51726
LP
389 m->poll_interval_usec /= 2;
390 return;
391 }
392}
393
394static int manager_receive_response(sd_event_source *source, int fd, uint32_t revents, void *userdata) {
99534007 395 Manager *m = ASSERT_PTR(userdata);
84e51726
LP
396 struct ntp_msg ntpmsg;
397
398 struct iovec iov = {
399 .iov_base = &ntpmsg,
400 .iov_len = sizeof(ntpmsg),
401 };
f782eee6
YW
402 /* This needs to be initialized with zero. See #20741. */
403 CMSG_BUFFER_TYPE(CMSG_SPACE_TIMESPEC) control = {};
84e51726
LP
404 union sockaddr_union server_addr;
405 struct msghdr msghdr = {
406 .msg_iov = &iov,
407 .msg_iovlen = 1,
408 .msg_control = &control,
409 .msg_controllen = sizeof(control),
410 .msg_name = &server_addr,
411 .msg_namelen = sizeof(server_addr),
412 };
1cc6c93a 413 struct timespec *recv_time = NULL;
1f129b7f 414 triple_timestamp dts;
84e51726 415 ssize_t len;
5ba674cc 416 double origin, receive, trans, dest, delay, offset, root_distance;
84e51726 417 bool spike;
5ba674cc 418 int leap_sec, r;
84e51726
LP
419
420 assert(source);
84e51726
LP
421
422 if (revents & (EPOLLHUP|EPOLLERR)) {
423 log_warning("Server connection returned error.");
424 return manager_connect(m);
425 }
426
3691bcf3
LP
427 len = recvmsg_safe(fd, &msghdr, MSG_DONTWAIT);
428 if (len == -EAGAIN)
429 return 0;
84e51726 430 if (len < 0) {
3691bcf3 431 log_warning_errno(len, "Error receiving message, disconnecting: %m");
84e51726
LP
432 return manager_connect(m);
433 }
434
43fcd650
TM
435 /* Too short or too long packet? */
436 if (iov.iov_len < sizeof(struct ntp_msg) || (msghdr.msg_flags & MSG_TRUNC)) {
84e51726
LP
437 log_warning("Invalid response from server. Disconnecting.");
438 return manager_connect(m);
439 }
440
441 if (!m->current_server_name ||
442 !m->current_server_address ||
443 !sockaddr_equal(&server_addr, &m->current_server_address->sockaddr)) {
444 log_debug("Response from unknown server.");
445 return 0;
446 }
447
adc07c2b 448 recv_time = CMSG_FIND_DATA(&msghdr, SOL_SOCKET, SCM_TIMESTAMPNS, struct timespec);
baaa35ad 449 if (!recv_time)
adc07c2b 450 return log_error_errno(SYNTHETIC_ERRNO(EINVAL), "Packet timestamp missing.");
84e51726
LP
451
452 if (!m->pending) {
453 log_debug("Unexpected reply. Ignoring.");
454 return 0;
455 }
456
e8206972
ML
457 m->missed_replies = 0;
458
84e51726 459 /* check our "time cookie" (we just stored nanoseconds in the fraction field) */
370d3c31 460 if (be32toh(ntpmsg.origin_time.sec) != graceful_add_offset_1900_1970(m->trans_time.tv_sec) ||
edd50d5e 461 be32toh(ntpmsg.origin_time.frac) != (unsigned long) m->trans_time.tv_nsec) {
84e51726
LP
462 log_debug("Invalid reply; not our transmit time. Ignoring.");
463 return 0;
464 }
465
466 m->event_timeout = sd_event_source_unref(m->event_timeout);
467
468 if (be32toh(ntpmsg.recv_time.sec) < TIME_EPOCH + OFFSET_1900_1970 ||
469 be32toh(ntpmsg.trans_time.sec) < TIME_EPOCH + OFFSET_1900_1970) {
470 log_debug("Invalid reply, returned times before epoch. Ignoring.");
471 return manager_connect(m);
472 }
473
07610e10
ML
474 if (NTP_FIELD_LEAP(ntpmsg.field) == NTP_LEAP_NOTINSYNC ||
475 ntpmsg.stratum == 0 || ntpmsg.stratum >= 16) {
84e51726
LP
476 log_debug("Server is not synchronized. Disconnecting.");
477 return manager_connect(m);
478 }
479
480 if (!IN_SET(NTP_FIELD_VERSION(ntpmsg.field), 3, 4)) {
481 log_debug("Response NTPv%d. Disconnecting.", NTP_FIELD_VERSION(ntpmsg.field));
482 return manager_connect(m);
483 }
484
485 if (NTP_FIELD_MODE(ntpmsg.field) != NTP_MODE_SERVER) {
486 log_debug("Unsupported mode %d. Disconnecting.", NTP_FIELD_MODE(ntpmsg.field));
487 return manager_connect(m);
488 }
489
3af0442c 490 root_distance = ntp_ts_short_to_d(&ntpmsg.root_delay) / 2 + ntp_ts_short_to_d(&ntpmsg.root_dispersion);
403db470 491 if (root_distance > (double) m->root_distance_max_usec / (double) USEC_PER_SEC) {
ce96c9cb 492 log_info("Server has too large root distance. Disconnecting.");
3af0442c
ML
493 return manager_connect(m);
494 }
495
84e51726
LP
496 /* valid packet */
497 m->pending = false;
ab4df227 498 m->retry_interval = 0;
84e51726 499
7b628891 500 /* Stop listening */
f89c4e15 501 manager_listen_stop(m);
7b628891 502
84e51726
LP
503 /* announce leap seconds */
504 if (NTP_FIELD_LEAP(ntpmsg.field) & NTP_LEAP_PLUSSEC)
505 leap_sec = 1;
506 else if (NTP_FIELD_LEAP(ntpmsg.field) & NTP_LEAP_MINUSSEC)
507 leap_sec = -1;
508 else
509 leap_sec = 0;
510
511 /*
512 * "Timestamp Name ID When Generated
513 * ------------------------------------------------------------
514 * Originate Timestamp T1 time request sent by client
515 * Receive Timestamp T2 time request received by server
516 * Transmit Timestamp T3 time reply sent by server
517 * Destination Timestamp T4 time reply received by client
518 *
519 * The round-trip delay, d, and system clock offset, t, are defined as:
520 * d = (T4 - T1) - (T3 - T2) t = ((T2 - T1) + (T3 - T4)) / 2"
521 */
73c76e63 522 origin = ts_to_d(&m->trans_time) + OFFSET_1900_1970;
84e51726
LP
523 receive = ntp_ts_to_d(&ntpmsg.recv_time);
524 trans = ntp_ts_to_d(&ntpmsg.trans_time);
487a3682 525 dest = ts_to_d(recv_time) + OFFSET_1900_1970;
84e51726
LP
526
527 offset = ((receive - origin) + (trans - dest)) / 2;
528 delay = (dest - origin) - (trans - receive);
529
530 spike = manager_sample_spike_detection(m, offset, delay);
531
532 manager_adjust_poll(m, offset, spike);
533
534 log_debug("NTP response:\n"
c0f86d66
JJ
535 " leap : %i\n"
536 " version : %i\n"
537 " mode : %i\n"
84e51726 538 " stratum : %u\n"
c0f86d66 539 " precision : %.6f sec (%i)\n"
3af0442c 540 " root distance: %.6f sec\n"
84e51726
LP
541 " reference : %.4s\n"
542 " origin : %.3f\n"
543 " receive : %.3f\n"
544 " transmit : %.3f\n"
545 " dest : %.3f\n"
546 " offset : %+.3f sec\n"
547 " delay : %+.3f sec\n"
548 " packet count : %"PRIu64"\n"
549 " jitter : %.3f%s\n"
550 " poll interval: " USEC_FMT "\n",
551 NTP_FIELD_LEAP(ntpmsg.field),
552 NTP_FIELD_VERSION(ntpmsg.field),
553 NTP_FIELD_MODE(ntpmsg.field),
554 ntpmsg.stratum,
555 exp2(ntpmsg.precision), ntpmsg.precision,
3af0442c 556 root_distance,
84e51726
LP
557 ntpmsg.stratum == 1 ? ntpmsg.refid : "n/a",
558 origin - OFFSET_1900_1970,
559 receive - OFFSET_1900_1970,
560 trans - OFFSET_1900_1970,
561 dest - OFFSET_1900_1970,
562 offset, delay,
563 m->packet_count,
564 m->samples_jitter, spike ? " spike" : "",
565 m->poll_interval_usec / USEC_PER_SEC);
566
1f129b7f
LP
567 /* Get current monotonic/realtime clocks immediately before adjusting the latter */
568 triple_timestamp_get(&dts);
569
84e51726 570 if (!spike) {
1f129b7f
LP
571 /* Fix up our idea of the time. */
572 dts.realtime = (usec_t) (dts.realtime + offset * USEC_PER_SEC);
573
84e51726
LP
574 r = manager_adjust_clock(m, offset, leap_sec);
575 if (r < 0)
6ff6f4d8 576 log_error_errno(r, "Failed to call clock_adjtime(): %m");
7cb08ea8 577
1f129b7f 578 (void) manager_save_time_and_rearm(m, dts.realtime);
7cb08ea8
LP
579
580 /* If touch fails, there isn't much we can do. Maybe it'll work next time. */
1aa7ca22
LP
581 r = touch("/run/systemd/timesync/synchronized");
582 if (r < 0)
583 log_debug_errno(r, "Failed to touch /run/systemd/timesync/synchronized, ignoring: %m");
84e51726
LP
584 }
585
66086a40
YW
586 /* Save NTP response */
587 m->ntpmsg = ntpmsg;
588 m->origin_time = m->trans_time;
589 m->dest_time = *recv_time;
590 m->spike = spike;
591
75ca1621 592 log_debug("interval/delta/delay/jitter/drift " USEC_FMT "s/%+.3fs/%.3fs/%.3fs/%+"PRIi64"ppm%s",
66086a40 593 m->poll_interval_usec / USEC_PER_SEC, offset, delay, m->samples_jitter, m->drift_freq / 65536,
7b5b3fc3 594 spike ? " (ignored)" : "");
84e51726 595
933e95d7
YW
596 if (sd_bus_is_ready(m->bus) > 0)
597 (void) sd_bus_emit_properties_changed(
598 m->bus,
599 "/org/freedesktop/timesync1",
600 "org.freedesktop.timesync1.Manager",
601 "NTPMessage",
602 NULL);
66086a40 603
87057128 604 if (!m->talking) {
481b3f9e
LP
605 _cleanup_free_ char *pretty = NULL;
606
87057128 607 m->talking = true;
481b3f9e 608
c696878a
LP
609 (void) server_address_pretty(m->current_server_address, &pretty);
610
922a6508
LP
611 log_info("Contacted time server %s (%s).", strna(pretty), m->current_server_name->string);
612 (void) sd_notifyf(false, "STATUS=Contacted time server %s (%s).", strna(pretty), m->current_server_name->string);
481b3f9e
LP
613 }
614
b016e77e
LP
615 if (!spike && !m->synchronized) {
616 m->synchronized = true;
617
618 log_struct(LOG_INFO,
92663a5e
ZJS
619 LOG_MESSAGE("Initial clock synchronization to %s.",
620 FORMAT_TIMESTAMP_STYLE(dts.realtime, TIMESTAMP_US)),
b016e77e
LP
621 "MESSAGE_ID=" SD_MESSAGE_TIME_SYNC_STR,
622 "MONOTONIC_USEC=" USEC_FMT, dts.monotonic,
623 "REALTIME_USEC=" USEC_FMT, dts.realtime,
624 "BOOTIME_USEC=" USEC_FMT, dts.boottime);
625 }
626
84e51726 627 r = manager_arm_timer(m, m->poll_interval_usec);
f647962d
MS
628 if (r < 0)
629 return log_error_errno(r, "Failed to rearm timer: %m");
84e51726
LP
630
631 return 0;
632}
633
634static int manager_listen_setup(Manager *m) {
635 union sockaddr_union addr = {};
84e51726
LP
636 int r;
637
638 assert(m);
639
f89c4e15
LP
640 if (m->server_socket >= 0)
641 return 0;
642
84e51726
LP
643 assert(!m->event_receive);
644 assert(m->current_server_address);
645
646 addr.sa.sa_family = m->current_server_address->sockaddr.sa.sa_family;
647
648 m->server_socket = socket(addr.sa.sa_family, SOCK_DGRAM | SOCK_CLOEXEC, 0);
649 if (m->server_socket < 0)
650 return -errno;
651
652 r = bind(m->server_socket, &addr.sa, m->current_server_address->socklen);
653 if (r < 0)
654 return -errno;
655
2ff48e98 656 r = setsockopt_int(m->server_socket, SOL_SOCKET, SO_TIMESTAMPNS, true);
84e51726 657 if (r < 0)
2ff48e98 658 return r;
84e51726 659
00df39a5
LP
660 if (addr.sa.sa_family == AF_INET)
661 (void) setsockopt_int(m->server_socket, IPPROTO_IP, IP_TOS, IPTOS_LOWDELAY);
84e51726
LP
662
663 return sd_event_add_io(m->event, &m->event_receive, m->server_socket, EPOLLIN, manager_receive_response, m);
664}
665
f89c4e15
LP
666static void manager_listen_stop(Manager *m) {
667 assert(m);
668
669 m->event_receive = sd_event_source_unref(m->event_receive);
670 m->server_socket = safe_close(m->server_socket);
671}
672
84e51726
LP
673static int manager_begin(Manager *m) {
674 _cleanup_free_ char *pretty = NULL;
675 int r;
676
677 assert(m);
678 assert_return(m->current_server_name, -EHOSTUNREACH);
679 assert_return(m->current_server_address, -EHOSTUNREACH);
680
87057128 681 m->talking = false;
e8206972 682 m->missed_replies = NTP_MAX_MISSED_REPLIES;
80cd2606 683 if (m->poll_interval_usec == 0)
a4465d0d 684 m->poll_interval_usec = m->poll_interval_min_usec;
84e51726
LP
685
686 server_address_pretty(m->current_server_address, &pretty);
481b3f9e 687 log_debug("Connecting to time server %s (%s).", strna(pretty), m->current_server_name->string);
c696878a 688 (void) sd_notifyf(false, "STATUS=Connecting to time server %s (%s).", strna(pretty), m->current_server_name->string);
84e51726 689
84e51726
LP
690 r = manager_clock_watch_setup(m);
691 if (r < 0)
692 return r;
693
694 return manager_send_request(m);
695}
696
874ff7bf
LP
697void manager_set_server_name(Manager *m, ServerName *n) {
698 assert(m);
84e51726 699
874ff7bf
LP
700 if (m->current_server_name == n)
701 return;
84e51726 702
874ff7bf
LP
703 m->current_server_name = n;
704 m->current_server_address = NULL;
705
706 manager_disconnect(m);
84e51726 707
874ff7bf
LP
708 if (n)
709 log_debug("Selected server %s.", n->string);
710}
84e51726 711
874ff7bf 712void manager_set_server_address(Manager *m, ServerAddress *a) {
84e51726
LP
713 assert(m);
714
874ff7bf
LP
715 if (m->current_server_address == a)
716 return;
717
874ff7bf 718 m->current_server_address = a;
20f8d3cf
SN
719 /* If a is NULL, we are just clearing the address, without
720 * changing the name. Keep the existing name in that case. */
721 if (a)
722 m->current_server_name = a->name;
874ff7bf
LP
723
724 manager_disconnect(m);
725
726 if (a) {
727 _cleanup_free_ char *pretty = NULL;
728 server_address_pretty(a, &pretty);
729 log_debug("Selected address %s of server %s.", strna(pretty), a->name->string);
84e51726
LP
730 }
731}
732
7082bb05 733static int manager_resolve_handler(sd_resolve_query *q, int ret, const struct addrinfo *ai, Manager *m) {
874ff7bf 734 int r;
84e51726
LP
735
736 assert(q);
737 assert(m);
738 assert(m->current_server_name);
739
740 m->resolve_query = sd_resolve_query_unref(m->resolve_query);
741
742 if (ret != 0) {
743 log_debug("Failed to resolve %s: %s", m->current_server_name->string, gai_strerror(ret));
744
745 /* Try next host */
746 return manager_connect(m);
747 }
748
84e51726
LP
749 for (; ai; ai = ai->ai_next) {
750 _cleanup_free_ char *pretty = NULL;
874ff7bf 751 ServerAddress *a;
84e51726
LP
752
753 assert(ai->ai_addr);
754 assert(ai->ai_addrlen >= offsetof(struct sockaddr, sa_data));
84e51726
LP
755
756 if (!IN_SET(ai->ai_addr->sa_family, AF_INET, AF_INET6)) {
7a123287 757 log_debug("Ignoring unsuitable address protocol for %s.", m->current_server_name->string);
84e51726
LP
758 continue;
759 }
760
874ff7bf 761 r = server_address_new(m->current_server_name, &a, (const union sockaddr_union*) ai->ai_addr, ai->ai_addrlen);
f647962d
MS
762 if (r < 0)
763 return log_error_errno(r, "Failed to add server address: %m");
84e51726 764
874ff7bf 765 server_address_pretty(a, &pretty);
84e51726
LP
766 log_debug("Resolved address %s for %s.", pretty, m->current_server_name->string);
767 }
768
769 if (!m->current_server_name->addresses) {
770 log_error("Failed to find suitable address for host %s.", m->current_server_name->string);
771
772 /* Try next host */
773 return manager_connect(m);
774 }
775
874ff7bf 776 manager_set_server_address(m, m->current_server_name->addresses);
84e51726
LP
777
778 return manager_begin(m);
779}
780
874ff7bf 781static int manager_retry_connect(sd_event_source *source, usec_t usec, void *userdata) {
99534007 782 Manager *m = ASSERT_PTR(userdata);
84e51726
LP
783
784 return manager_connect(m);
785}
786
787int manager_connect(Manager *m) {
84e51726
LP
788 int r;
789
790 assert(m);
791
792 manager_disconnect(m);
793
794 m->event_retry = sd_event_source_unref(m->event_retry);
7994ac1d 795 if (!ratelimit_below(&m->ratelimit)) {
a9061d97 796 log_debug("Delaying attempts to contact servers.");
84e51726 797
ba4e0427 798 r = sd_event_add_time_relative(m->event, &m->event_retry, CLOCK_BOOTTIME, m->connection_retry_usec,
e81a44bf 799 0, manager_retry_connect, m);
f647962d
MS
800 if (r < 0)
801 return log_error_errno(r, "Failed to create retry timer: %m");
84e51726
LP
802
803 return 0;
804 }
805
806 /* If we already are operating on some address, switch to the
807 * next one. */
808 if (m->current_server_address && m->current_server_address->addresses_next)
874ff7bf 809 manager_set_server_address(m, m->current_server_address->addresses_next);
84e51726 810 else {
874ff7bf 811 /* Hmm, we are through all addresses, let's look for the next host instead */
84e51726 812 if (m->current_server_name && m->current_server_name->names_next)
874ff7bf 813 manager_set_server_name(m, m->current_server_name->names_next);
84e51726 814 else {
874ff7bf 815 ServerName *f;
63463bf0 816 bool restart = true;
874ff7bf
LP
817
818 /* Our current server name list is exhausted,
57b82eaa
DM
819 * let's find the next one to iterate. First we try the runtime list, then the system list,
820 * then the link list. After having processed the link list we jump back to the system list
821 * if no runtime server list.
822 * However, if all lists are empty, we change to the fallback list. */
874ff7bf 823 if (!m->current_server_name || m->current_server_name->type == SERVER_LINK) {
57b82eaa
DM
824 f = m->runtime_servers;
825 if (!f)
826 f = m->system_servers;
874ff7bf
LP
827 if (!f)
828 f = m->link_servers;
829 } else {
830 f = m->link_servers;
57b82eaa 831 if (f)
63463bf0 832 restart = false;
57b82eaa
DM
833 else {
834 f = m->runtime_servers;
835 if (!f)
836 f = m->system_servers;
837 }
874ff7bf
LP
838 }
839
840 if (!f)
841 f = m->fallback_servers;
842
843 if (!f) {
844 manager_set_server_name(m, NULL);
84e51726
LP
845 log_debug("No server found.");
846 return 0;
847 }
848
a08ea295 849 if (restart && !m->exhausted_servers && m->poll_interval_usec > 0) {
63463bf0 850 log_debug("Waiting after exhausting servers.");
ba4e0427 851 r = sd_event_add_time_relative(m->event, &m->event_retry, CLOCK_BOOTTIME, m->poll_interval_usec, 0, manager_retry_connect, m);
f647962d
MS
852 if (r < 0)
853 return log_error_errno(r, "Failed to create retry timer: %m");
63463bf0
ML
854
855 m->exhausted_servers = true;
856
857 /* Increase the polling interval */
a4465d0d 858 if (m->poll_interval_usec < m->poll_interval_max_usec)
63463bf0
ML
859 m->poll_interval_usec *= 2;
860
861 return 0;
862 }
863
864 m->exhausted_servers = false;
865
874ff7bf 866 manager_set_server_name(m, f);
84e51726
LP
867 }
868
869 /* Tell the resolver to reread /etc/resolv.conf, in
870 * case it changed. */
871 res_init();
872
874ff7bf
LP
873 /* Flush out any previously resolved addresses */
874 server_name_flush_addresses(m->current_server_name);
875
876 log_debug("Resolving %s...", m->current_server_name->string);
877
713e6e63
YW
878 struct addrinfo hints = {
879 .ai_flags = AI_NUMERICSERV|AI_ADDRCONFIG,
880 .ai_socktype = SOCK_DGRAM,
881 .ai_family = socket_ipv6_is_supported() ? AF_UNSPEC : AF_INET,
882 };
883
7082bb05 884 r = resolve_getaddrinfo(m->resolve, &m->resolve_query, m->current_server_name->string, "123", &hints, manager_resolve_handler, NULL, m);
f647962d
MS
885 if (r < 0)
886 return log_error_errno(r, "Failed to create resolver: %m");
84e51726
LP
887
888 return 1;
889 }
890
891 r = manager_begin(m);
892 if (r < 0)
893 return r;
894
895 return 1;
896}
897
84e51726
LP
898void manager_disconnect(Manager *m) {
899 assert(m);
900
901 m->resolve_query = sd_resolve_query_unref(m->resolve_query);
902
903 m->event_timer = sd_event_source_unref(m->event_timer);
904
f89c4e15 905 manager_listen_stop(m);
84e51726 906
ec75e8e0 907 m->event_clock_watch = sd_event_source_disable_unref(m->event_clock_watch);
84e51726
LP
908
909 m->event_timeout = sd_event_source_unref(m->event_timeout);
910
c696878a 911 (void) sd_notify(false, "STATUS=Idle.");
84e51726
LP
912}
913
874ff7bf
LP
914void manager_flush_server_names(Manager *m, ServerType t) {
915 assert(m);
916
917 if (t == SERVER_SYSTEM)
918 while (m->system_servers)
919 server_name_free(m->system_servers);
920
921 if (t == SERVER_LINK)
922 while (m->link_servers)
923 server_name_free(m->link_servers);
924
925 if (t == SERVER_FALLBACK)
926 while (m->fallback_servers)
927 server_name_free(m->fallback_servers);
57b82eaa
DM
928
929 if (t == SERVER_RUNTIME)
930 manager_flush_runtime_servers(m);
931}
932
933void manager_flush_runtime_servers(Manager *m) {
934 assert(m);
935
936 while (m->runtime_servers)
937 server_name_free(m->runtime_servers);
874ff7bf 938}
84e51726 939
75db809a 940Manager* manager_free(Manager *m) {
84e51726 941 if (!m)
75db809a 942 return NULL;
84e51726
LP
943
944 manager_disconnect(m);
874ff7bf
LP
945 manager_flush_server_names(m, SERVER_SYSTEM);
946 manager_flush_server_names(m, SERVER_LINK);
57b82eaa 947 manager_flush_server_names(m, SERVER_RUNTIME);
874ff7bf 948 manager_flush_server_names(m, SERVER_FALLBACK);
84e51726
LP
949
950 sd_event_source_unref(m->event_retry);
951
952 sd_event_source_unref(m->network_event_source);
953 sd_network_monitor_unref(m->network_monitor);
954
33e82f3e
DI
955 sd_event_source_unref(m->event_save_time);
956
84e51726
LP
957 sd_resolve_unref(m->resolve);
958 sd_event_unref(m->event);
959
92e31da1 960 sd_bus_flush_close_unref(m->bus);
e7dd3947 961
57b82eaa
DM
962 bus_verify_polkit_async_registry_free(m->polkit_registry);
963
75db809a 964 return mfree(m);
84e51726
LP
965}
966
874ff7bf
LP
967static int manager_network_read_link_servers(Manager *m) {
968 _cleanup_strv_free_ char **ntp = NULL;
3e85ec07 969 bool changed = false;
874ff7bf
LP
970 int r;
971
84e51726
LP
972 assert(m);
973
874ff7bf 974 r = sd_network_get_ntp(&ntp);
ba0c011e
YW
975 if (r < 0) {
976 if (r == -ENOMEM)
977 log_oom();
e05dd771 978 else if (r != -ENODATA)
ba0c011e 979 log_debug_errno(r, "Failed to get link NTP servers: %m");
874ff7bf 980 goto clear;
ba0c011e 981 }
874ff7bf
LP
982
983 LIST_FOREACH(names, n, m->link_servers)
984 n->marked = true;
985
986 STRV_FOREACH(i, ntp) {
987 bool found = false;
988
dcb37458
YW
989 r = dns_name_is_valid_or_address(*i);
990 if (r < 0) {
991 log_error_errno(r, "Failed to check validity of NTP server name or address '%s': %m", *i);
992 goto clear;
993 } else if (r == 0) {
994 log_error("Invalid NTP server name or address, ignoring: %s", *i);
995 continue;
996 }
997
874ff7bf
LP
998 LIST_FOREACH(names, n, m->link_servers)
999 if (streq(n->string, *i)) {
1000 n->marked = false;
1001 found = true;
1002 break;
1003 }
1004
1005 if (!found) {
1006 r = server_name_new(m, NULL, SERVER_LINK, *i);
ba0c011e
YW
1007 if (r < 0) {
1008 log_oom();
874ff7bf 1009 goto clear;
ba0c011e 1010 }
3e85ec07
YW
1011
1012 changed = true;
874ff7bf
LP
1013 }
1014 }
1015
80a226b2 1016 LIST_FOREACH(names, n, m->link_servers)
3e85ec07 1017 if (n->marked) {
874ff7bf 1018 server_name_free(n);
3e85ec07
YW
1019 changed = true;
1020 }
874ff7bf 1021
3e85ec07 1022 return changed;
874ff7bf
LP
1023
1024clear:
1025 manager_flush_server_names(m, SERVER_LINK);
1026 return r;
84e51726
LP
1027}
1028
f1b42a0b
DM
1029bool manager_is_connected(Manager *m) {
1030 assert(m);
1031
0630eb1b
YW
1032 /* Return true when the manager is sending a request, resolving a server name, or
1033 * in a poll interval. */
1034 return m->server_socket >= 0 || m->resolve_query || m->event_timer;
1035}
1036
84e51726 1037static int manager_network_event_handler(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
99534007 1038 Manager *m = ASSERT_PTR(userdata);
3e85ec07 1039 bool changed, connected, online;
84e51726
LP
1040 int r;
1041
84e51726
LP
1042 sd_network_monitor_flush(m->network_monitor);
1043
ba0c011e 1044 /* When manager_network_read_link_servers() failed, we assume that the servers are changed. */
55033662 1045 changed = manager_network_read_link_servers(m);
874ff7bf 1046
84e51726
LP
1047 /* check if the machine is online */
1048 online = network_is_online();
1049
1050 /* check if the client is currently connected */
0630eb1b 1051 connected = manager_is_connected(m);
84e51726
LP
1052
1053 if (connected && !online) {
1054 log_info("No network connectivity, watching for changes.");
1055 manager_disconnect(m);
1056
0630eb1b 1057 } else if ((!connected || changed) && online) {
84e51726
LP
1058 log_info("Network configuration changed, trying to establish connection.");
1059
1060 if (m->current_server_address)
1061 r = manager_begin(m);
1062 else
1063 r = manager_connect(m);
1064 if (r < 0)
1065 return r;
1066 }
1067
1068 return 0;
1069}
1070
1071static int manager_network_monitor_listen(Manager *m) {
1072 int r, fd, events;
1073
1074 assert(m);
1075
1076 r = sd_network_monitor_new(&m->network_monitor, NULL);
36484c03 1077 if (r == -ENOENT) {
f95b0be7 1078 log_info("systemd does not appear to be running, not listening for systemd-networkd events.");
36484c03
ZJS
1079 return 0;
1080 }
84e51726
LP
1081 if (r < 0)
1082 return r;
1083
1084 fd = sd_network_monitor_get_fd(m->network_monitor);
1085 if (fd < 0)
1086 return fd;
1087
1088 events = sd_network_monitor_get_events(m->network_monitor);
1089 if (events < 0)
1090 return events;
1091
1092 r = sd_event_add_io(m->event, &m->network_event_source, fd, events, manager_network_event_handler, m);
1093 if (r < 0)
1094 return r;
1095
1096 return 0;
1097}
1098
1099int manager_new(Manager **ret) {
1100 _cleanup_(manager_freep) Manager *m = NULL;
1101 int r;
1102
1103 assert(ret);
1104
40c6b514 1105 m = new(Manager, 1);
84e51726
LP
1106 if (!m)
1107 return -ENOMEM;
1108
40c6b514
LP
1109 *m = (Manager) {
1110 .root_distance_max_usec = NTP_ROOT_DISTANCE_MAX_USEC,
1111 .poll_interval_min_usec = NTP_POLL_INTERVAL_MIN_USEC,
1112 .poll_interval_max_usec = NTP_POLL_INTERVAL_MAX_USEC,
f907cc16 1113
40c6b514 1114 .connection_retry_usec = DEFAULT_CONNECTION_RETRY_USEC,
e81a44bf 1115
40c6b514 1116 .server_socket = -1,
84e51726 1117
7d1e61ca 1118 .ratelimit = (const RateLimit) {
40c6b514
LP
1119 RATELIMIT_INTERVAL_USEC,
1120 RATELIMIT_BURST
1121 },
84e51726 1122
40c6b514
LP
1123 .save_time_interval_usec = DEFAULT_SAVE_TIME_INTERVAL_USEC,
1124 };
33e82f3e 1125
84e51726
LP
1126 r = sd_event_default(&m->event);
1127 if (r < 0)
1128 return r;
1129
8b7140db
YW
1130 (void) sd_event_add_signal(m->event, NULL, SIGTERM, NULL, NULL);
1131 (void) sd_event_add_signal(m->event, NULL, SIGINT, NULL, NULL);
84e51726 1132
8b7140db 1133 (void) sd_event_set_watchdog(m->event, true);
84e51726 1134
b016e77e
LP
1135 /* Load previous synchronization state */
1136 r = access("/run/systemd/timesync/synchronized", F_OK);
1137 if (r < 0 && errno != ENOENT)
1138 log_debug_errno(errno, "Failed to determine whether /run/systemd/timesync/synchronized exists, ignoring: %m");
1139 m->synchronized = r >= 0;
1140
84e51726
LP
1141 r = sd_resolve_default(&m->resolve);
1142 if (r < 0)
1143 return r;
1144
1145 r = sd_resolve_attach_event(m->resolve, m->event, 0);
1146 if (r < 0)
1147 return r;
1148
1149 r = manager_network_monitor_listen(m);
1150 if (r < 0)
1151 return r;
1152
ba0c011e 1153 (void) manager_network_read_link_servers(m);
874ff7bf 1154
1cc6c93a 1155 *ret = TAKE_PTR(m);
84e51726
LP
1156
1157 return 0;
1158}
33e82f3e
DI
1159
1160static int manager_save_time_handler(sd_event_source *s, uint64_t usec, void *userdata) {
99534007 1161 Manager *m = ASSERT_PTR(userdata);
33e82f3e 1162
1f129b7f 1163 (void) manager_save_time_and_rearm(m, USEC_INFINITY);
33e82f3e
DI
1164 return 0;
1165}
1166
1167int manager_setup_save_time_event(Manager *m) {
1168 int r;
1169
1170 assert(m);
1171 assert(!m->event_save_time);
1172
1173 if (m->save_time_interval_usec == USEC_INFINITY)
1174 return 0;
1175
1176 /* NB: we'll accumulate scheduling latencies here, but this doesn't matter */
1177 r = sd_event_add_time_relative(
1178 m->event, &m->event_save_time,
ba4e0427 1179 CLOCK_BOOTTIME,
33e82f3e
DI
1180 m->save_time_interval_usec,
1181 10 * USEC_PER_SEC,
1182 manager_save_time_handler, m);
1183 if (r < 0)
1184 return log_error_errno(r, "Failed to add save time event: %m");
1185
1186 (void) sd_event_source_set_description(m->event_save_time, "save-time");
1187
1188 return 0;
1189}
1190
1f129b7f 1191static int manager_save_time_and_rearm(Manager *m, usec_t t) {
33e82f3e
DI
1192 int r;
1193
1194 assert(m);
1195
1f129b7f
LP
1196 /* Updates the timestamp file to the specified time. If 't' is USEC_INFINITY uses the current system
1197 * clock, but otherwise uses the specified timestamp. Note that whenever we acquire an NTP sync the
1198 * specified timestamp value might be more accurate than the system clock, since the latter is
1199 * subject to slow adjustments. */
1200 r = touch_file(CLOCK_FILE, false, t, UID_INVALID, GID_INVALID, MODE_INVALID);
33e82f3e
DI
1201 if (r < 0)
1202 log_debug_errno(r, "Failed to update " CLOCK_FILE ", ignoring: %m");
1203
1204 m->save_on_exit = true;
1205
1206 if (m->save_time_interval_usec != USEC_INFINITY) {
1207 r = sd_event_source_set_time_relative(m->event_save_time, m->save_time_interval_usec);
1208 if (r < 0)
1209 return log_error_errno(r, "Failed to rearm save time event: %m");
1210
1211 r = sd_event_source_set_enabled(m->event_save_time, SD_EVENT_ONESHOT);
1212 if (r < 0)
1213 return log_error_errno(r, "Failed to enable save time event: %m");
1214 }
1215
1216 return 0;
1217}