]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/timesync/timesyncd-manager.c
coccinelle: make use of SYNTHETIC_ERRNO
[thirdparty/systemd.git] / src / timesync / timesyncd-manager.c
CommitLineData
53e1b683 1/* SPDX-License-Identifier: LGPL-2.1+ */
84e51726 2
84e51726 3#include <errno.h>
84e51726 4#include <math.h>
84e51726
LP
5#include <netinet/in.h>
6#include <netinet/ip.h>
07630cea
LP
7#include <resolv.h>
8#include <stdlib.h>
9#include <sys/socket.h>
84e51726
LP
10#include <sys/timerfd.h>
11#include <sys/timex.h>
84e51726 12#include <sys/types.h>
07630cea
LP
13#include <time.h>
14
15#include "sd-daemon.h"
84e51726 16
b5efdb8a 17#include "alloc-util.h"
dcb37458 18#include "dns-domain.h"
3ffd4af2 19#include "fd-util.h"
f4f15635 20#include "fs-util.h"
84e51726 21#include "list.h"
07630cea
LP
22#include "log.h"
23#include "missing.h"
24#include "network-util.h"
84e51726 25#include "ratelimit.h"
07630cea 26#include "socket-util.h"
07630cea 27#include "string-util.h"
84e51726 28#include "strv.h"
07630cea 29#include "time-util.h"
84e51726
LP
30#include "timesyncd-conf.h"
31#include "timesyncd-manager.h"
3ffd4af2 32#include "util.h"
84e51726
LP
33
34#ifndef ADJ_SETOFFSET
35#define ADJ_SETOFFSET 0x0100 /* add 'time' to current time */
36#endif
37
38/* expected accuracy of time synchronization; used to adjust the poll interval */
39#define NTP_ACCURACY_SEC 0.2
40
84e51726
LP
41/*
42 * Maximum delta in seconds which the system clock is gradually adjusted
a4465d0d 43 * (slewed) to approach the network time. Deltas larger that this are set by
84e51726
LP
44 * letting the system time jump. The kernel's limit for adjtime is 0.5s.
45 */
46#define NTP_MAX_ADJUST 0.4
47
a4465d0d 48/* Default of maximum acceptable root distance in microseconds. */
f907cc16 49#define NTP_MAX_ROOT_DISTANCE (5 * USEC_PER_SEC)
3af0442c 50
e8206972
ML
51/* Maximum number of missed replies before selecting another source. */
52#define NTP_MAX_MISSED_REPLIES 2
53
84e51726
LP
54#define RETRY_USEC (30*USEC_PER_SEC)
55#define RATELIMIT_INTERVAL_USEC (10*USEC_PER_SEC)
56#define RATELIMIT_BURST 10
57
58#define TIMEOUT_USEC (10*USEC_PER_SEC)
59
84e51726
LP
60static int manager_arm_timer(Manager *m, usec_t next);
61static int manager_clock_watch_setup(Manager *m);
7b628891 62static int manager_listen_setup(Manager *m);
f89c4e15 63static void manager_listen_stop(Manager *m);
84e51726 64
3af0442c
ML
65static double ntp_ts_short_to_d(const struct ntp_ts_short *ts) {
66 return be16toh(ts->sec) + (be16toh(ts->frac) / 65536.0);
67}
68
84e51726
LP
69static double ntp_ts_to_d(const struct ntp_ts *ts) {
70 return be32toh(ts->sec) + ((double)be32toh(ts->frac) / UINT_MAX);
71}
72
73static double ts_to_d(const struct timespec *ts) {
74 return ts->tv_sec + (1.0e-9 * ts->tv_nsec);
75}
76
84e51726
LP
77static int manager_timeout(sd_event_source *source, usec_t usec, void *userdata) {
78 _cleanup_free_ char *pretty = NULL;
79 Manager *m = userdata;
80
81 assert(m);
82 assert(m->current_server_name);
83 assert(m->current_server_address);
84
85 server_address_pretty(m->current_server_address, &pretty);
86 log_info("Timed out waiting for reply from %s (%s).", strna(pretty), m->current_server_name->string);
87
88 return manager_connect(m);
89}
90
91static int manager_send_request(Manager *m) {
92 _cleanup_free_ char *pretty = NULL;
93 struct ntp_msg ntpmsg = {
94 /*
95 * "The client initializes the NTP message header, sends the request
96 * to the server, and strips the time of day from the Transmit
97 * Timestamp field of the reply. For this purpose, all the NTP
98 * header fields are set to 0, except the Mode, VN, and optional
99 * Transmit Timestamp fields."
100 */
101 .field = NTP_FIELD(0, 4, NTP_MODE_CLIENT),
102 };
103 ssize_t len;
104 int r;
105
106 assert(m);
107 assert(m->current_server_name);
108 assert(m->current_server_address);
109
110 m->event_timeout = sd_event_source_unref(m->event_timeout);
111
f89c4e15
LP
112 r = manager_listen_setup(m);
113 if (r < 0)
114 return log_warning_errno(r, "Failed to setup connection socket: %m");
7b628891 115
84e51726
LP
116 /*
117 * Set transmit timestamp, remember it; the server will send that back
118 * as the origin timestamp and we have an indication that this is the
119 * matching answer to our request.
120 *
121 * The actual value does not matter, We do not care about the correct
122 * NTP UINT_MAX fraction; we just pass the plain nanosecond value.
123 */
124 assert_se(clock_gettime(clock_boottime_or_monotonic(), &m->trans_time_mon) >= 0);
125 assert_se(clock_gettime(CLOCK_REALTIME, &m->trans_time) >= 0);
126 ntpmsg.trans_time.sec = htobe32(m->trans_time.tv_sec + OFFSET_1900_1970);
127 ntpmsg.trans_time.frac = htobe32(m->trans_time.tv_nsec);
128
129 server_address_pretty(m->current_server_address, &pretty);
130
131 len = sendto(m->server_socket, &ntpmsg, sizeof(ntpmsg), MSG_DONTWAIT, &m->current_server_address->sockaddr.sa, m->current_server_address->socklen);
132 if (len == sizeof(ntpmsg)) {
133 m->pending = true;
134 log_debug("Sent NTP request to %s (%s).", strna(pretty), m->current_server_name->string);
135 } else {
56f64d95 136 log_debug_errno(errno, "Sending NTP request to %s (%s) failed: %m", strna(pretty), m->current_server_name->string);
84e51726
LP
137 return manager_connect(m);
138 }
139
ab4df227
KS
140 /* re-arm timer with increasing timeout, in case the packets never arrive back */
141 if (m->retry_interval > 0) {
a4465d0d 142 if (m->retry_interval < m->poll_interval_max_usec)
ab4df227
KS
143 m->retry_interval *= 2;
144 } else
a4465d0d 145 m->retry_interval = m->poll_interval_min_usec;
ab4df227
KS
146
147 r = manager_arm_timer(m, m->retry_interval);
f647962d
MS
148 if (r < 0)
149 return log_error_errno(r, "Failed to rearm timer: %m");
ab4df227 150
e8206972
ML
151 m->missed_replies++;
152 if (m->missed_replies > NTP_MAX_MISSED_REPLIES) {
153 r = sd_event_add_time(
154 m->event,
155 &m->event_timeout,
156 clock_boottime_or_monotonic(),
157 now(clock_boottime_or_monotonic()) + TIMEOUT_USEC, 0,
158 manager_timeout, m);
f647962d
MS
159 if (r < 0)
160 return log_error_errno(r, "Failed to arm timeout timer: %m");
84e51726
LP
161 }
162
163 return 0;
164}
165
166static int manager_timer(sd_event_source *source, usec_t usec, void *userdata) {
167 Manager *m = userdata;
168
169 assert(m);
170
171 return manager_send_request(m);
172}
173
174static int manager_arm_timer(Manager *m, usec_t next) {
175 int r;
176
177 assert(m);
84e51726
LP
178
179 if (next == 0) {
180 m->event_timer = sd_event_source_unref(m->event_timer);
181 return 0;
182 }
183
184 if (m->event_timer) {
185 r = sd_event_source_set_time(m->event_timer, now(clock_boottime_or_monotonic()) + next);
186 if (r < 0)
187 return r;
188
189 return sd_event_source_set_enabled(m->event_timer, SD_EVENT_ONESHOT);
190 }
191
192 return sd_event_add_time(
193 m->event,
194 &m->event_timer,
195 clock_boottime_or_monotonic(),
196 now(clock_boottime_or_monotonic()) + next, 0,
197 manager_timer, m);
198}
199
200static int manager_clock_watch(sd_event_source *source, int fd, uint32_t revents, void *userdata) {
201 Manager *m = userdata;
202
203 assert(m);
204
205 /* rearm timer */
206 manager_clock_watch_setup(m);
207
208 /* skip our own jumps */
209 if (m->jumped) {
210 m->jumped = false;
211 return 0;
212 }
213
214 /* resync */
7e3254b3 215 log_debug("System time changed. Resyncing.");
84e51726
LP
216 m->poll_resync = true;
217
218 return manager_send_request(m);
219}
220
221/* wake up when the system time changes underneath us */
222static int manager_clock_watch_setup(Manager *m) {
84e51726
LP
223 int r;
224
225 assert(m);
226
227 m->event_clock_watch = sd_event_source_unref(m->event_clock_watch);
228 safe_close(m->clock_watch_fd);
229
4f811d27 230 m->clock_watch_fd = time_change_fd();
4a62c710 231 if (m->clock_watch_fd < 0)
4f811d27 232 return log_error_errno(m->clock_watch_fd, "Failed to create timerfd: %m");
84e51726
LP
233
234 r = sd_event_add_io(m->event, &m->event_clock_watch, m->clock_watch_fd, EPOLLIN, manager_clock_watch, m);
f647962d
MS
235 if (r < 0)
236 return log_error_errno(r, "Failed to create clock watch event source: %m");
84e51726
LP
237
238 return 0;
239}
240
241static int manager_adjust_clock(Manager *m, double offset, int leap_sec) {
242 struct timex tmx = {};
243 int r;
244
245 assert(m);
246
247 /*
248 * For small deltas, tell the kernel to gradually adjust the system
249 * clock to the NTP time, larger deltas are just directly set.
250 */
251 if (fabs(offset) < NTP_MAX_ADJUST) {
252 tmx.modes = ADJ_STATUS | ADJ_NANO | ADJ_OFFSET | ADJ_TIMECONST | ADJ_MAXERROR | ADJ_ESTERROR;
253 tmx.status = STA_PLL;
254 tmx.offset = offset * NSEC_PER_SEC;
255 tmx.constant = log2i(m->poll_interval_usec / USEC_PER_SEC) - 4;
256 tmx.maxerror = 0;
257 tmx.esterror = 0;
ff49bc32 258 log_debug(" adjust (slew): %+.3f sec", offset);
84e51726 259 } else {
5f36e3d3 260 tmx.modes = ADJ_STATUS | ADJ_NANO | ADJ_SETOFFSET | ADJ_MAXERROR | ADJ_ESTERROR;
84e51726
LP
261
262 /* ADJ_NANO uses nanoseconds in the microseconds field */
263 tmx.time.tv_sec = (long)offset;
264 tmx.time.tv_usec = (offset - tmx.time.tv_sec) * NSEC_PER_SEC;
5f36e3d3
AK
265 tmx.maxerror = 0;
266 tmx.esterror = 0;
84e51726
LP
267
268 /* the kernel expects -0.3s as {-1, 7000.000.000} */
269 if (tmx.time.tv_usec < 0) {
270 tmx.time.tv_sec -= 1;
271 tmx.time.tv_usec += NSEC_PER_SEC;
272 }
273
274 m->jumped = true;
ff49bc32 275 log_debug(" adjust (jump): %+.3f sec", offset);
84e51726
LP
276 }
277
278 /*
279 * An unset STA_UNSYNC will enable the kernel's 11-minute mode,
280 * which syncs the system time periodically to the RTC.
281 *
282 * In case the RTC runs in local time, never touch the RTC,
283 * we have no way to properly handle daylight saving changes and
284 * mobile devices moving between time zones.
285 */
286 if (m->rtc_local_time)
287 tmx.status |= STA_UNSYNC;
288
289 switch (leap_sec) {
290 case 1:
291 tmx.status |= STA_INS;
292 break;
293 case -1:
294 tmx.status |= STA_DEL;
295 break;
296 }
297
298 r = clock_adjtime(CLOCK_REALTIME, &tmx);
299 if (r < 0)
6ff6f4d8 300 return -errno;
84e51726 301
baa33e79 302 /* If touch fails, there isn't much we can do. Maybe it'll work next time. */
53d133ea 303 (void) touch("/var/lib/systemd/timesync/clock");
2dd79846 304 (void) touch("/run/systemd/timesync/synchronized");
84e51726 305
66086a40 306 m->drift_freq = tmx.freq;
84e51726
LP
307
308 log_debug(" status : %04i %s\n"
0060bb8f 309 " time now : %"PRI_TIME".%03"PRI_USEC"\n"
3bd7ef83 310 " constant : %"PRI_TIMEX"\n"
84e51726 311 " offset : %+.3f sec\n"
66086a40 312 " freq offset : %+"PRI_TIMEX" (%+"PRI_TIMEX" ppm)\n",
84e51726 313 tmx.status, tmx.status & STA_UNSYNC ? "unsync" : "sync",
70887c5f 314 tmx.time.tv_sec, tmx.time.tv_usec / NSEC_PER_MSEC,
84e51726
LP
315 tmx.constant,
316 (double)tmx.offset / NSEC_PER_SEC,
66086a40 317 tmx.freq, tmx.freq / 65536);
84e51726
LP
318
319 return 0;
320}
321
322static bool manager_sample_spike_detection(Manager *m, double offset, double delay) {
14cb109d 323 unsigned i, idx_cur, idx_new, idx_min;
84e51726
LP
324 double jitter;
325 double j;
326
327 assert(m);
328
329 m->packet_count++;
330
331 /* ignore initial sample */
332 if (m->packet_count == 1)
333 return false;
334
335 /* store the current data in our samples array */
336 idx_cur = m->samples_idx;
337 idx_new = (idx_cur + 1) % ELEMENTSOF(m->samples);
338 m->samples_idx = idx_new;
339 m->samples[idx_new].offset = offset;
340 m->samples[idx_new].delay = delay;
341
342 /* calculate new jitter value from the RMS differences relative to the lowest delay sample */
343 jitter = m->samples_jitter;
344 for (idx_min = idx_cur, i = 0; i < ELEMENTSOF(m->samples); i++)
345 if (m->samples[i].delay > 0 && m->samples[i].delay < m->samples[idx_min].delay)
346 idx_min = i;
347
348 j = 0;
349 for (i = 0; i < ELEMENTSOF(m->samples); i++)
fa66b606 350 j += pow(m->samples[i].offset - m->samples[idx_min].offset, 2);
84e51726
LP
351 m->samples_jitter = sqrt(j / (ELEMENTSOF(m->samples) - 1));
352
353 /* ignore samples when resyncing */
354 if (m->poll_resync)
355 return false;
356
357 /* always accept offset if we are farther off than the round-trip delay */
358 if (fabs(offset) > delay)
359 return false;
360
361 /* we need a few samples before looking at them */
362 if (m->packet_count < 4)
363 return false;
364
365 /* do not accept anything worse than the maximum possible error of the best sample */
366 if (fabs(offset) > m->samples[idx_min].delay)
367 return true;
368
369 /* compare the difference between the current offset to the previous offset and jitter */
370 return fabs(offset - m->samples[idx_cur].offset) > 3 * jitter;
371}
372
373static void manager_adjust_poll(Manager *m, double offset, bool spike) {
374 assert(m);
375
376 if (m->poll_resync) {
a4465d0d 377 m->poll_interval_usec = m->poll_interval_min_usec;
84e51726
LP
378 m->poll_resync = false;
379 return;
380 }
381
382 /* set to minimal poll interval */
383 if (!spike && fabs(offset) > NTP_ACCURACY_SEC) {
a4465d0d 384 m->poll_interval_usec = m->poll_interval_min_usec;
84e51726
LP
385 return;
386 }
387
388 /* increase polling interval */
389 if (fabs(offset) < NTP_ACCURACY_SEC * 0.25) {
a4465d0d 390 if (m->poll_interval_usec < m->poll_interval_max_usec)
84e51726
LP
391 m->poll_interval_usec *= 2;
392 return;
393 }
394
395 /* decrease polling interval */
396 if (spike || fabs(offset) > NTP_ACCURACY_SEC * 0.75) {
a4465d0d 397 if (m->poll_interval_usec > m->poll_interval_min_usec)
84e51726
LP
398 m->poll_interval_usec /= 2;
399 return;
400 }
401}
402
403static int manager_receive_response(sd_event_source *source, int fd, uint32_t revents, void *userdata) {
404 Manager *m = userdata;
405 struct ntp_msg ntpmsg;
406
407 struct iovec iov = {
408 .iov_base = &ntpmsg,
409 .iov_len = sizeof(ntpmsg),
410 };
411 union {
412 struct cmsghdr cmsghdr;
413 uint8_t buf[CMSG_SPACE(sizeof(struct timeval))];
414 } control;
415 union sockaddr_union server_addr;
416 struct msghdr msghdr = {
417 .msg_iov = &iov,
418 .msg_iovlen = 1,
419 .msg_control = &control,
420 .msg_controllen = sizeof(control),
421 .msg_name = &server_addr,
422 .msg_namelen = sizeof(server_addr),
423 };
424 struct cmsghdr *cmsg;
1cc6c93a 425 struct timespec *recv_time = NULL;
84e51726
LP
426 ssize_t len;
427 double origin, receive, trans, dest;
428 double delay, offset;
3af0442c 429 double root_distance;
84e51726
LP
430 bool spike;
431 int leap_sec;
432 int r;
433
434 assert(source);
435 assert(m);
436
437 if (revents & (EPOLLHUP|EPOLLERR)) {
438 log_warning("Server connection returned error.");
439 return manager_connect(m);
440 }
441
a38d9945 442 len = recvmsg(fd, &msghdr, MSG_DONTWAIT);
84e51726
LP
443 if (len < 0) {
444 if (errno == EAGAIN)
445 return 0;
446
447 log_warning("Error receiving message. Disconnecting.");
448 return manager_connect(m);
449 }
450
43fcd650
TM
451 /* Too short or too long packet? */
452 if (iov.iov_len < sizeof(struct ntp_msg) || (msghdr.msg_flags & MSG_TRUNC)) {
84e51726
LP
453 log_warning("Invalid response from server. Disconnecting.");
454 return manager_connect(m);
455 }
456
457 if (!m->current_server_name ||
458 !m->current_server_address ||
459 !sockaddr_equal(&server_addr, &m->current_server_address->sockaddr)) {
460 log_debug("Response from unknown server.");
461 return 0;
462 }
463
2a1288ff 464 CMSG_FOREACH(cmsg, &msghdr) {
84e51726
LP
465 if (cmsg->cmsg_level != SOL_SOCKET)
466 continue;
467
468 switch (cmsg->cmsg_type) {
487a3682
ML
469 case SCM_TIMESTAMPNS:
470 recv_time = (struct timespec *) CMSG_DATA(cmsg);
84e51726
LP
471 break;
472 }
473 }
baaa35ad
ZJS
474 if (!recv_time)
475 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
476 "Invalid packet timestamp.");
84e51726
LP
477
478 if (!m->pending) {
479 log_debug("Unexpected reply. Ignoring.");
480 return 0;
481 }
482
e8206972
ML
483 m->missed_replies = 0;
484
84e51726
LP
485 /* check our "time cookie" (we just stored nanoseconds in the fraction field) */
486 if (be32toh(ntpmsg.origin_time.sec) != m->trans_time.tv_sec + OFFSET_1900_1970 ||
edd50d5e 487 be32toh(ntpmsg.origin_time.frac) != (unsigned long) m->trans_time.tv_nsec) {
84e51726
LP
488 log_debug("Invalid reply; not our transmit time. Ignoring.");
489 return 0;
490 }
491
492 m->event_timeout = sd_event_source_unref(m->event_timeout);
493
494 if (be32toh(ntpmsg.recv_time.sec) < TIME_EPOCH + OFFSET_1900_1970 ||
495 be32toh(ntpmsg.trans_time.sec) < TIME_EPOCH + OFFSET_1900_1970) {
496 log_debug("Invalid reply, returned times before epoch. Ignoring.");
497 return manager_connect(m);
498 }
499
07610e10
ML
500 if (NTP_FIELD_LEAP(ntpmsg.field) == NTP_LEAP_NOTINSYNC ||
501 ntpmsg.stratum == 0 || ntpmsg.stratum >= 16) {
84e51726
LP
502 log_debug("Server is not synchronized. Disconnecting.");
503 return manager_connect(m);
504 }
505
506 if (!IN_SET(NTP_FIELD_VERSION(ntpmsg.field), 3, 4)) {
507 log_debug("Response NTPv%d. Disconnecting.", NTP_FIELD_VERSION(ntpmsg.field));
508 return manager_connect(m);
509 }
510
511 if (NTP_FIELD_MODE(ntpmsg.field) != NTP_MODE_SERVER) {
512 log_debug("Unsupported mode %d. Disconnecting.", NTP_FIELD_MODE(ntpmsg.field));
513 return manager_connect(m);
514 }
515
3af0442c 516 root_distance = ntp_ts_short_to_d(&ntpmsg.root_delay) / 2 + ntp_ts_short_to_d(&ntpmsg.root_dispersion);
f907cc16 517 if (root_distance > (double) m->max_root_distance_usec / (double) USEC_PER_SEC) {
3af0442c
ML
518 log_debug("Server has too large root distance. Disconnecting.");
519 return manager_connect(m);
520 }
521
84e51726
LP
522 /* valid packet */
523 m->pending = false;
ab4df227 524 m->retry_interval = 0;
84e51726 525
7b628891 526 /* Stop listening */
f89c4e15 527 manager_listen_stop(m);
7b628891 528
84e51726
LP
529 /* announce leap seconds */
530 if (NTP_FIELD_LEAP(ntpmsg.field) & NTP_LEAP_PLUSSEC)
531 leap_sec = 1;
532 else if (NTP_FIELD_LEAP(ntpmsg.field) & NTP_LEAP_MINUSSEC)
533 leap_sec = -1;
534 else
535 leap_sec = 0;
536
537 /*
538 * "Timestamp Name ID When Generated
539 * ------------------------------------------------------------
540 * Originate Timestamp T1 time request sent by client
541 * Receive Timestamp T2 time request received by server
542 * Transmit Timestamp T3 time reply sent by server
543 * Destination Timestamp T4 time reply received by client
544 *
545 * The round-trip delay, d, and system clock offset, t, are defined as:
546 * d = (T4 - T1) - (T3 - T2) t = ((T2 - T1) + (T3 - T4)) / 2"
547 */
73c76e63 548 origin = ts_to_d(&m->trans_time) + OFFSET_1900_1970;
84e51726
LP
549 receive = ntp_ts_to_d(&ntpmsg.recv_time);
550 trans = ntp_ts_to_d(&ntpmsg.trans_time);
487a3682 551 dest = ts_to_d(recv_time) + OFFSET_1900_1970;
84e51726
LP
552
553 offset = ((receive - origin) + (trans - dest)) / 2;
554 delay = (dest - origin) - (trans - receive);
555
556 spike = manager_sample_spike_detection(m, offset, delay);
557
558 manager_adjust_poll(m, offset, spike);
559
560 log_debug("NTP response:\n"
561 " leap : %u\n"
562 " version : %u\n"
563 " mode : %u\n"
564 " stratum : %u\n"
565 " precision : %.6f sec (%d)\n"
3af0442c 566 " root distance: %.6f sec\n"
84e51726
LP
567 " reference : %.4s\n"
568 " origin : %.3f\n"
569 " receive : %.3f\n"
570 " transmit : %.3f\n"
571 " dest : %.3f\n"
572 " offset : %+.3f sec\n"
573 " delay : %+.3f sec\n"
574 " packet count : %"PRIu64"\n"
575 " jitter : %.3f%s\n"
576 " poll interval: " USEC_FMT "\n",
577 NTP_FIELD_LEAP(ntpmsg.field),
578 NTP_FIELD_VERSION(ntpmsg.field),
579 NTP_FIELD_MODE(ntpmsg.field),
580 ntpmsg.stratum,
581 exp2(ntpmsg.precision), ntpmsg.precision,
3af0442c 582 root_distance,
84e51726
LP
583 ntpmsg.stratum == 1 ? ntpmsg.refid : "n/a",
584 origin - OFFSET_1900_1970,
585 receive - OFFSET_1900_1970,
586 trans - OFFSET_1900_1970,
587 dest - OFFSET_1900_1970,
588 offset, delay,
589 m->packet_count,
590 m->samples_jitter, spike ? " spike" : "",
591 m->poll_interval_usec / USEC_PER_SEC);
592
593 if (!spike) {
594 m->sync = true;
595 r = manager_adjust_clock(m, offset, leap_sec);
596 if (r < 0)
6ff6f4d8 597 log_error_errno(r, "Failed to call clock_adjtime(): %m");
84e51726
LP
598 }
599
66086a40
YW
600 /* Save NTP response */
601 m->ntpmsg = ntpmsg;
602 m->origin_time = m->trans_time;
603 m->dest_time = *recv_time;
604 m->spike = spike;
605
75ca1621 606 log_debug("interval/delta/delay/jitter/drift " USEC_FMT "s/%+.3fs/%.3fs/%.3fs/%+"PRIi64"ppm%s",
66086a40 607 m->poll_interval_usec / USEC_PER_SEC, offset, delay, m->samples_jitter, m->drift_freq / 65536,
7b5b3fc3 608 spike ? " (ignored)" : "");
84e51726 609
66086a40
YW
610 (void) sd_bus_emit_properties_changed(m->bus, "/org/freedesktop/timesync1", "org.freedesktop.timesync1.Manager", "NTPMessage", NULL);
611
481b3f9e
LP
612 if (!m->good) {
613 _cleanup_free_ char *pretty = NULL;
614
615 m->good = true;
616
617 server_address_pretty(m->current_server_address, &pretty);
618 log_info("Synchronized to time server %s (%s).", strna(pretty), m->current_server_name->string);
619 sd_notifyf(false, "STATUS=Synchronized to time server %s (%s).", strna(pretty), m->current_server_name->string);
620 }
621
84e51726 622 r = manager_arm_timer(m, m->poll_interval_usec);
f647962d
MS
623 if (r < 0)
624 return log_error_errno(r, "Failed to rearm timer: %m");
84e51726
LP
625
626 return 0;
627}
628
629static int manager_listen_setup(Manager *m) {
630 union sockaddr_union addr = {};
84e51726
LP
631 int r;
632
633 assert(m);
634
f89c4e15
LP
635 if (m->server_socket >= 0)
636 return 0;
637
84e51726
LP
638 assert(!m->event_receive);
639 assert(m->current_server_address);
640
641 addr.sa.sa_family = m->current_server_address->sockaddr.sa.sa_family;
642
643 m->server_socket = socket(addr.sa.sa_family, SOCK_DGRAM | SOCK_CLOEXEC, 0);
644 if (m->server_socket < 0)
645 return -errno;
646
647 r = bind(m->server_socket, &addr.sa, m->current_server_address->socklen);
648 if (r < 0)
649 return -errno;
650
2ff48e98 651 r = setsockopt_int(m->server_socket, SOL_SOCKET, SO_TIMESTAMPNS, true);
84e51726 652 if (r < 0)
2ff48e98 653 return r;
84e51726 654
9e5b6496 655 (void) setsockopt_int(m->server_socket, IPPROTO_IP, IP_TOS, IPTOS_LOWDELAY);
84e51726
LP
656
657 return sd_event_add_io(m->event, &m->event_receive, m->server_socket, EPOLLIN, manager_receive_response, m);
658}
659
f89c4e15
LP
660static void manager_listen_stop(Manager *m) {
661 assert(m);
662
663 m->event_receive = sd_event_source_unref(m->event_receive);
664 m->server_socket = safe_close(m->server_socket);
665}
666
84e51726
LP
667static int manager_begin(Manager *m) {
668 _cleanup_free_ char *pretty = NULL;
669 int r;
670
671 assert(m);
672 assert_return(m->current_server_name, -EHOSTUNREACH);
673 assert_return(m->current_server_address, -EHOSTUNREACH);
674
481b3f9e 675 m->good = false;
e8206972 676 m->missed_replies = NTP_MAX_MISSED_REPLIES;
80cd2606 677 if (m->poll_interval_usec == 0)
a4465d0d 678 m->poll_interval_usec = m->poll_interval_min_usec;
84e51726
LP
679
680 server_address_pretty(m->current_server_address, &pretty);
481b3f9e
LP
681 log_debug("Connecting to time server %s (%s).", strna(pretty), m->current_server_name->string);
682 sd_notifyf(false, "STATUS=Connecting to time server %s (%s).", strna(pretty), m->current_server_name->string);
84e51726 683
84e51726
LP
684 r = manager_clock_watch_setup(m);
685 if (r < 0)
686 return r;
687
688 return manager_send_request(m);
689}
690
874ff7bf
LP
691void manager_set_server_name(Manager *m, ServerName *n) {
692 assert(m);
84e51726 693
874ff7bf
LP
694 if (m->current_server_name == n)
695 return;
84e51726 696
874ff7bf
LP
697 m->current_server_name = n;
698 m->current_server_address = NULL;
699
700 manager_disconnect(m);
84e51726 701
874ff7bf
LP
702 if (n)
703 log_debug("Selected server %s.", n->string);
704}
84e51726 705
874ff7bf 706void manager_set_server_address(Manager *m, ServerAddress *a) {
84e51726
LP
707 assert(m);
708
874ff7bf
LP
709 if (m->current_server_address == a)
710 return;
711
874ff7bf 712 m->current_server_address = a;
20f8d3cf
SN
713 /* If a is NULL, we are just clearing the address, without
714 * changing the name. Keep the existing name in that case. */
715 if (a)
716 m->current_server_name = a->name;
874ff7bf
LP
717
718 manager_disconnect(m);
719
720 if (a) {
721 _cleanup_free_ char *pretty = NULL;
722 server_address_pretty(a, &pretty);
723 log_debug("Selected address %s of server %s.", strna(pretty), a->name->string);
84e51726
LP
724 }
725}
726
727static int manager_resolve_handler(sd_resolve_query *q, int ret, const struct addrinfo *ai, void *userdata) {
728 Manager *m = userdata;
874ff7bf 729 int r;
84e51726
LP
730
731 assert(q);
732 assert(m);
733 assert(m->current_server_name);
734
735 m->resolve_query = sd_resolve_query_unref(m->resolve_query);
736
737 if (ret != 0) {
738 log_debug("Failed to resolve %s: %s", m->current_server_name->string, gai_strerror(ret));
739
740 /* Try next host */
741 return manager_connect(m);
742 }
743
84e51726
LP
744 for (; ai; ai = ai->ai_next) {
745 _cleanup_free_ char *pretty = NULL;
874ff7bf 746 ServerAddress *a;
84e51726
LP
747
748 assert(ai->ai_addr);
749 assert(ai->ai_addrlen >= offsetof(struct sockaddr, sa_data));
84e51726
LP
750
751 if (!IN_SET(ai->ai_addr->sa_family, AF_INET, AF_INET6)) {
752 log_warning("Unsuitable address protocol for %s", m->current_server_name->string);
753 continue;
754 }
755
874ff7bf 756 r = server_address_new(m->current_server_name, &a, (const union sockaddr_union*) ai->ai_addr, ai->ai_addrlen);
f647962d
MS
757 if (r < 0)
758 return log_error_errno(r, "Failed to add server address: %m");
84e51726 759
874ff7bf 760 server_address_pretty(a, &pretty);
84e51726
LP
761 log_debug("Resolved address %s for %s.", pretty, m->current_server_name->string);
762 }
763
764 if (!m->current_server_name->addresses) {
765 log_error("Failed to find suitable address for host %s.", m->current_server_name->string);
766
767 /* Try next host */
768 return manager_connect(m);
769 }
770
874ff7bf 771 manager_set_server_address(m, m->current_server_name->addresses);
84e51726
LP
772
773 return manager_begin(m);
774}
775
874ff7bf 776static int manager_retry_connect(sd_event_source *source, usec_t usec, void *userdata) {
84e51726
LP
777 Manager *m = userdata;
778
779 assert(m);
780
781 return manager_connect(m);
782}
783
784int manager_connect(Manager *m) {
84e51726
LP
785 int r;
786
787 assert(m);
788
789 manager_disconnect(m);
790
791 m->event_retry = sd_event_source_unref(m->event_retry);
7994ac1d 792 if (!ratelimit_below(&m->ratelimit)) {
a9061d97 793 log_debug("Delaying attempts to contact servers.");
84e51726 794
874ff7bf 795 r = sd_event_add_time(m->event, &m->event_retry, clock_boottime_or_monotonic(), now(clock_boottime_or_monotonic()) + RETRY_USEC, 0, manager_retry_connect, m);
f647962d
MS
796 if (r < 0)
797 return log_error_errno(r, "Failed to create retry timer: %m");
84e51726
LP
798
799 return 0;
800 }
801
802 /* If we already are operating on some address, switch to the
803 * next one. */
804 if (m->current_server_address && m->current_server_address->addresses_next)
874ff7bf 805 manager_set_server_address(m, m->current_server_address->addresses_next);
84e51726 806 else {
874ff7bf
LP
807 struct addrinfo hints = {
808 .ai_flags = AI_NUMERICSERV|AI_ADDRCONFIG,
809 .ai_socktype = SOCK_DGRAM,
810 };
84e51726 811
874ff7bf 812 /* Hmm, we are through all addresses, let's look for the next host instead */
84e51726 813 if (m->current_server_name && m->current_server_name->names_next)
874ff7bf 814 manager_set_server_name(m, m->current_server_name->names_next);
84e51726 815 else {
874ff7bf 816 ServerName *f;
63463bf0 817 bool restart = true;
874ff7bf
LP
818
819 /* Our current server name list is exhausted,
820 * let's find the next one to iterate. First
821 * we try the system list, then the link list.
822 * After having processed the link list we
823 * jump back to the system list. However, if
824 * both lists are empty, we change to the
825 * fallback list. */
826 if (!m->current_server_name || m->current_server_name->type == SERVER_LINK) {
827 f = m->system_servers;
828 if (!f)
829 f = m->link_servers;
830 } else {
831 f = m->link_servers;
832 if (!f)
833 f = m->system_servers;
63463bf0
ML
834 else
835 restart = false;
874ff7bf
LP
836 }
837
838 if (!f)
839 f = m->fallback_servers;
840
841 if (!f) {
842 manager_set_server_name(m, NULL);
84e51726
LP
843 log_debug("No server found.");
844 return 0;
845 }
846
63463bf0
ML
847 if (restart && !m->exhausted_servers && m->poll_interval_usec) {
848 log_debug("Waiting after exhausting servers.");
849 r = sd_event_add_time(m->event, &m->event_retry, clock_boottime_or_monotonic(), now(clock_boottime_or_monotonic()) + m->poll_interval_usec, 0, manager_retry_connect, m);
f647962d
MS
850 if (r < 0)
851 return log_error_errno(r, "Failed to create retry timer: %m");
63463bf0
ML
852
853 m->exhausted_servers = true;
854
855 /* Increase the polling interval */
a4465d0d 856 if (m->poll_interval_usec < m->poll_interval_max_usec)
63463bf0
ML
857 m->poll_interval_usec *= 2;
858
859 return 0;
860 }
861
862 m->exhausted_servers = false;
863
874ff7bf 864 manager_set_server_name(m, f);
84e51726
LP
865 }
866
867 /* Tell the resolver to reread /etc/resolv.conf, in
868 * case it changed. */
869 res_init();
870
874ff7bf
LP
871 /* Flush out any previously resolved addresses */
872 server_name_flush_addresses(m->current_server_name);
873
874 log_debug("Resolving %s...", m->current_server_name->string);
875
84e51726 876 r = sd_resolve_getaddrinfo(m->resolve, &m->resolve_query, m->current_server_name->string, "123", &hints, manager_resolve_handler, m);
f647962d
MS
877 if (r < 0)
878 return log_error_errno(r, "Failed to create resolver: %m");
84e51726
LP
879
880 return 1;
881 }
882
883 r = manager_begin(m);
884 if (r < 0)
885 return r;
886
887 return 1;
888}
889
84e51726
LP
890void manager_disconnect(Manager *m) {
891 assert(m);
892
893 m->resolve_query = sd_resolve_query_unref(m->resolve_query);
894
895 m->event_timer = sd_event_source_unref(m->event_timer);
896
f89c4e15 897 manager_listen_stop(m);
84e51726
LP
898
899 m->event_clock_watch = sd_event_source_unref(m->event_clock_watch);
900 m->clock_watch_fd = safe_close(m->clock_watch_fd);
901
902 m->event_timeout = sd_event_source_unref(m->event_timeout);
903
904 sd_notifyf(false, "STATUS=Idle.");
905}
906
874ff7bf
LP
907void manager_flush_server_names(Manager *m, ServerType t) {
908 assert(m);
909
910 if (t == SERVER_SYSTEM)
911 while (m->system_servers)
912 server_name_free(m->system_servers);
913
914 if (t == SERVER_LINK)
915 while (m->link_servers)
916 server_name_free(m->link_servers);
917
918 if (t == SERVER_FALLBACK)
919 while (m->fallback_servers)
920 server_name_free(m->fallback_servers);
921}
84e51726
LP
922
923void manager_free(Manager *m) {
924 if (!m)
925 return;
926
927 manager_disconnect(m);
874ff7bf
LP
928 manager_flush_server_names(m, SERVER_SYSTEM);
929 manager_flush_server_names(m, SERVER_LINK);
930 manager_flush_server_names(m, SERVER_FALLBACK);
84e51726
LP
931
932 sd_event_source_unref(m->event_retry);
933
934 sd_event_source_unref(m->network_event_source);
935 sd_network_monitor_unref(m->network_monitor);
936
937 sd_resolve_unref(m->resolve);
938 sd_event_unref(m->event);
939
e7dd3947
YW
940 sd_bus_unref(m->bus);
941
84e51726
LP
942 free(m);
943}
944
874ff7bf
LP
945static int manager_network_read_link_servers(Manager *m) {
946 _cleanup_strv_free_ char **ntp = NULL;
947 ServerName *n, *nx;
948 char **i;
3e85ec07 949 bool changed = false;
874ff7bf
LP
950 int r;
951
84e51726
LP
952 assert(m);
953
874ff7bf 954 r = sd_network_get_ntp(&ntp);
ba0c011e
YW
955 if (r < 0) {
956 if (r == -ENOMEM)
957 log_oom();
958 else
959 log_debug_errno(r, "Failed to get link NTP servers: %m");
874ff7bf 960 goto clear;
ba0c011e 961 }
874ff7bf
LP
962
963 LIST_FOREACH(names, n, m->link_servers)
964 n->marked = true;
965
966 STRV_FOREACH(i, ntp) {
967 bool found = false;
968
dcb37458
YW
969 r = dns_name_is_valid_or_address(*i);
970 if (r < 0) {
971 log_error_errno(r, "Failed to check validity of NTP server name or address '%s': %m", *i);
972 goto clear;
973 } else if (r == 0) {
974 log_error("Invalid NTP server name or address, ignoring: %s", *i);
975 continue;
976 }
977
874ff7bf
LP
978 LIST_FOREACH(names, n, m->link_servers)
979 if (streq(n->string, *i)) {
980 n->marked = false;
981 found = true;
982 break;
983 }
984
985 if (!found) {
986 r = server_name_new(m, NULL, SERVER_LINK, *i);
ba0c011e
YW
987 if (r < 0) {
988 log_oom();
874ff7bf 989 goto clear;
ba0c011e 990 }
3e85ec07
YW
991
992 changed = true;
874ff7bf
LP
993 }
994 }
995
996 LIST_FOREACH_SAFE(names, n, nx, m->link_servers)
3e85ec07 997 if (n->marked) {
874ff7bf 998 server_name_free(n);
3e85ec07
YW
999 changed = true;
1000 }
874ff7bf 1001
3e85ec07 1002 return changed;
874ff7bf
LP
1003
1004clear:
1005 manager_flush_server_names(m, SERVER_LINK);
1006 return r;
84e51726
LP
1007}
1008
0630eb1b
YW
1009static bool manager_is_connected(Manager *m) {
1010 /* Return true when the manager is sending a request, resolving a server name, or
1011 * in a poll interval. */
1012 return m->server_socket >= 0 || m->resolve_query || m->event_timer;
1013}
1014
84e51726
LP
1015static int manager_network_event_handler(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
1016 Manager *m = userdata;
3e85ec07 1017 bool changed, connected, online;
84e51726
LP
1018 int r;
1019
1020 assert(m);
1021
1022 sd_network_monitor_flush(m->network_monitor);
1023
ba0c011e 1024 /* When manager_network_read_link_servers() failed, we assume that the servers are changed. */
3e85ec07 1025 changed = !!manager_network_read_link_servers(m);
874ff7bf 1026
84e51726
LP
1027 /* check if the machine is online */
1028 online = network_is_online();
1029
1030 /* check if the client is currently connected */
0630eb1b 1031 connected = manager_is_connected(m);
84e51726
LP
1032
1033 if (connected && !online) {
1034 log_info("No network connectivity, watching for changes.");
1035 manager_disconnect(m);
1036
0630eb1b 1037 } else if ((!connected || changed) && online) {
84e51726
LP
1038 log_info("Network configuration changed, trying to establish connection.");
1039
1040 if (m->current_server_address)
1041 r = manager_begin(m);
1042 else
1043 r = manager_connect(m);
1044 if (r < 0)
1045 return r;
1046 }
1047
1048 return 0;
1049}
1050
1051static int manager_network_monitor_listen(Manager *m) {
1052 int r, fd, events;
1053
1054 assert(m);
1055
1056 r = sd_network_monitor_new(&m->network_monitor, NULL);
36484c03 1057 if (r == -ENOENT) {
f95b0be7 1058 log_info("systemd does not appear to be running, not listening for systemd-networkd events.");
36484c03
ZJS
1059 return 0;
1060 }
84e51726
LP
1061 if (r < 0)
1062 return r;
1063
1064 fd = sd_network_monitor_get_fd(m->network_monitor);
1065 if (fd < 0)
1066 return fd;
1067
1068 events = sd_network_monitor_get_events(m->network_monitor);
1069 if (events < 0)
1070 return events;
1071
1072 r = sd_event_add_io(m->event, &m->network_event_source, fd, events, manager_network_event_handler, m);
1073 if (r < 0)
1074 return r;
1075
1076 return 0;
1077}
1078
1079int manager_new(Manager **ret) {
1080 _cleanup_(manager_freep) Manager *m = NULL;
1081 int r;
1082
1083 assert(ret);
1084
1085 m = new0(Manager, 1);
1086 if (!m)
1087 return -ENOMEM;
1088
f907cc16 1089 m->max_root_distance_usec = NTP_MAX_ROOT_DISTANCE;
a4465d0d
YW
1090 m->poll_interval_min_usec = NTP_POLL_INTERVAL_MIN_USEC;
1091 m->poll_interval_max_usec = NTP_POLL_INTERVAL_MAX_USEC;
f907cc16 1092
84e51726
LP
1093 m->server_socket = m->clock_watch_fd = -1;
1094
1095 RATELIMIT_INIT(m->ratelimit, RATELIMIT_INTERVAL_USEC, RATELIMIT_BURST);
1096
84e51726
LP
1097 r = sd_event_default(&m->event);
1098 if (r < 0)
1099 return r;
1100
8b7140db
YW
1101 (void) sd_event_add_signal(m->event, NULL, SIGTERM, NULL, NULL);
1102 (void) sd_event_add_signal(m->event, NULL, SIGINT, NULL, NULL);
84e51726 1103
8b7140db 1104 (void) sd_event_set_watchdog(m->event, true);
84e51726
LP
1105
1106 r = sd_resolve_default(&m->resolve);
1107 if (r < 0)
1108 return r;
1109
1110 r = sd_resolve_attach_event(m->resolve, m->event, 0);
1111 if (r < 0)
1112 return r;
1113
1114 r = manager_network_monitor_listen(m);
1115 if (r < 0)
1116 return r;
1117
ba0c011e 1118 (void) manager_network_read_link_servers(m);
874ff7bf 1119
1cc6c93a 1120 *ret = TAKE_PTR(m);
84e51726
LP
1121
1122 return 0;
1123}