]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/timesync/timesyncd-manager.c
core: move reset_arguments() to the end of main's finish
[thirdparty/systemd.git] / src / timesync / timesyncd-manager.c
CommitLineData
53e1b683 1/* SPDX-License-Identifier: LGPL-2.1+ */
84e51726 2
84e51726 3#include <errno.h>
84e51726 4#include <math.h>
84e51726
LP
5#include <netinet/in.h>
6#include <netinet/ip.h>
07630cea
LP
7#include <resolv.h>
8#include <stdlib.h>
84e51726
LP
9#include <sys/timerfd.h>
10#include <sys/timex.h>
84e51726 11#include <sys/types.h>
07630cea
LP
12
13#include "sd-daemon.h"
84e51726 14
b5efdb8a 15#include "alloc-util.h"
dcb37458 16#include "dns-domain.h"
3ffd4af2 17#include "fd-util.h"
ca78ad1d 18#include "format-util.h"
f4f15635 19#include "fs-util.h"
84e51726 20#include "list.h"
07630cea 21#include "log.h"
07630cea 22#include "network-util.h"
84e51726 23#include "ratelimit.h"
7082bb05 24#include "resolve-private.h"
07630cea 25#include "socket-util.h"
07630cea 26#include "string-util.h"
84e51726 27#include "strv.h"
07630cea 28#include "time-util.h"
84e51726
LP
29#include "timesyncd-conf.h"
30#include "timesyncd-manager.h"
3ffd4af2 31#include "util.h"
84e51726
LP
32
33#ifndef ADJ_SETOFFSET
34#define ADJ_SETOFFSET 0x0100 /* add 'time' to current time */
35#endif
36
37/* expected accuracy of time synchronization; used to adjust the poll interval */
38#define NTP_ACCURACY_SEC 0.2
39
84e51726
LP
40/*
41 * Maximum delta in seconds which the system clock is gradually adjusted
a4465d0d 42 * (slewed) to approach the network time. Deltas larger that this are set by
84e51726
LP
43 * letting the system time jump. The kernel's limit for adjtime is 0.5s.
44 */
45#define NTP_MAX_ADJUST 0.4
46
a4465d0d 47/* Default of maximum acceptable root distance in microseconds. */
f907cc16 48#define NTP_MAX_ROOT_DISTANCE (5 * USEC_PER_SEC)
3af0442c 49
e8206972
ML
50/* Maximum number of missed replies before selecting another source. */
51#define NTP_MAX_MISSED_REPLIES 2
52
84e51726
LP
53#define RETRY_USEC (30*USEC_PER_SEC)
54#define RATELIMIT_INTERVAL_USEC (10*USEC_PER_SEC)
55#define RATELIMIT_BURST 10
56
57#define TIMEOUT_USEC (10*USEC_PER_SEC)
58
84e51726
LP
59static int manager_arm_timer(Manager *m, usec_t next);
60static int manager_clock_watch_setup(Manager *m);
7b628891 61static int manager_listen_setup(Manager *m);
f89c4e15 62static void manager_listen_stop(Manager *m);
84e51726 63
3af0442c
ML
64static double ntp_ts_short_to_d(const struct ntp_ts_short *ts) {
65 return be16toh(ts->sec) + (be16toh(ts->frac) / 65536.0);
66}
67
84e51726
LP
68static double ntp_ts_to_d(const struct ntp_ts *ts) {
69 return be32toh(ts->sec) + ((double)be32toh(ts->frac) / UINT_MAX);
70}
71
72static double ts_to_d(const struct timespec *ts) {
73 return ts->tv_sec + (1.0e-9 * ts->tv_nsec);
74}
75
84e51726
LP
76static int manager_timeout(sd_event_source *source, usec_t usec, void *userdata) {
77 _cleanup_free_ char *pretty = NULL;
78 Manager *m = userdata;
79
80 assert(m);
81 assert(m->current_server_name);
82 assert(m->current_server_address);
83
84 server_address_pretty(m->current_server_address, &pretty);
85 log_info("Timed out waiting for reply from %s (%s).", strna(pretty), m->current_server_name->string);
86
87 return manager_connect(m);
88}
89
90static int manager_send_request(Manager *m) {
91 _cleanup_free_ char *pretty = NULL;
92 struct ntp_msg ntpmsg = {
93 /*
94 * "The client initializes the NTP message header, sends the request
95 * to the server, and strips the time of day from the Transmit
96 * Timestamp field of the reply. For this purpose, all the NTP
97 * header fields are set to 0, except the Mode, VN, and optional
98 * Transmit Timestamp fields."
99 */
100 .field = NTP_FIELD(0, 4, NTP_MODE_CLIENT),
101 };
102 ssize_t len;
103 int r;
104
105 assert(m);
106 assert(m->current_server_name);
107 assert(m->current_server_address);
108
109 m->event_timeout = sd_event_source_unref(m->event_timeout);
110
f89c4e15
LP
111 r = manager_listen_setup(m);
112 if (r < 0)
105a1a36 113 return log_warning_errno(r, "Failed to set up connection socket: %m");
7b628891 114
84e51726
LP
115 /*
116 * Set transmit timestamp, remember it; the server will send that back
117 * as the origin timestamp and we have an indication that this is the
118 * matching answer to our request.
119 *
120 * The actual value does not matter, We do not care about the correct
121 * NTP UINT_MAX fraction; we just pass the plain nanosecond value.
122 */
123 assert_se(clock_gettime(clock_boottime_or_monotonic(), &m->trans_time_mon) >= 0);
124 assert_se(clock_gettime(CLOCK_REALTIME, &m->trans_time) >= 0);
125 ntpmsg.trans_time.sec = htobe32(m->trans_time.tv_sec + OFFSET_1900_1970);
126 ntpmsg.trans_time.frac = htobe32(m->trans_time.tv_nsec);
127
128 server_address_pretty(m->current_server_address, &pretty);
129
130 len = sendto(m->server_socket, &ntpmsg, sizeof(ntpmsg), MSG_DONTWAIT, &m->current_server_address->sockaddr.sa, m->current_server_address->socklen);
131 if (len == sizeof(ntpmsg)) {
132 m->pending = true;
133 log_debug("Sent NTP request to %s (%s).", strna(pretty), m->current_server_name->string);
134 } else {
56f64d95 135 log_debug_errno(errno, "Sending NTP request to %s (%s) failed: %m", strna(pretty), m->current_server_name->string);
84e51726
LP
136 return manager_connect(m);
137 }
138
ab4df227 139 /* re-arm timer with increasing timeout, in case the packets never arrive back */
5919bd3d
ZJS
140 if (m->retry_interval == 0)
141 m->retry_interval = NTP_RETRY_INTERVAL_MIN_USEC;
142 else
143 m->retry_interval = MIN(m->retry_interval * 4/3, NTP_RETRY_INTERVAL_MAX_USEC);
ab4df227
KS
144
145 r = manager_arm_timer(m, m->retry_interval);
f647962d
MS
146 if (r < 0)
147 return log_error_errno(r, "Failed to rearm timer: %m");
ab4df227 148
e8206972
ML
149 m->missed_replies++;
150 if (m->missed_replies > NTP_MAX_MISSED_REPLIES) {
151 r = sd_event_add_time(
152 m->event,
153 &m->event_timeout,
154 clock_boottime_or_monotonic(),
155 now(clock_boottime_or_monotonic()) + TIMEOUT_USEC, 0,
156 manager_timeout, m);
f647962d
MS
157 if (r < 0)
158 return log_error_errno(r, "Failed to arm timeout timer: %m");
84e51726
LP
159 }
160
161 return 0;
162}
163
164static int manager_timer(sd_event_source *source, usec_t usec, void *userdata) {
165 Manager *m = userdata;
166
167 assert(m);
168
169 return manager_send_request(m);
170}
171
172static int manager_arm_timer(Manager *m, usec_t next) {
173 int r;
174
175 assert(m);
84e51726
LP
176
177 if (next == 0) {
178 m->event_timer = sd_event_source_unref(m->event_timer);
179 return 0;
180 }
181
182 if (m->event_timer) {
39cf0351 183 r = sd_event_source_set_time_relative(m->event_timer, next);
84e51726
LP
184 if (r < 0)
185 return r;
186
187 return sd_event_source_set_enabled(m->event_timer, SD_EVENT_ONESHOT);
188 }
189
39cf0351 190 return sd_event_add_time_relative(
84e51726
LP
191 m->event,
192 &m->event_timer,
193 clock_boottime_or_monotonic(),
39cf0351 194 next, 0,
84e51726
LP
195 manager_timer, m);
196}
197
198static int manager_clock_watch(sd_event_source *source, int fd, uint32_t revents, void *userdata) {
199 Manager *m = userdata;
200
201 assert(m);
202
203 /* rearm timer */
204 manager_clock_watch_setup(m);
205
206 /* skip our own jumps */
207 if (m->jumped) {
208 m->jumped = false;
209 return 0;
210 }
211
212 /* resync */
7e3254b3 213 log_debug("System time changed. Resyncing.");
84e51726
LP
214 m->poll_resync = true;
215
216 return manager_send_request(m);
217}
218
219/* wake up when the system time changes underneath us */
220static int manager_clock_watch_setup(Manager *m) {
84e51726
LP
221 int r;
222
223 assert(m);
224
225 m->event_clock_watch = sd_event_source_unref(m->event_clock_watch);
226 safe_close(m->clock_watch_fd);
227
4f811d27 228 m->clock_watch_fd = time_change_fd();
4a62c710 229 if (m->clock_watch_fd < 0)
4f811d27 230 return log_error_errno(m->clock_watch_fd, "Failed to create timerfd: %m");
84e51726
LP
231
232 r = sd_event_add_io(m->event, &m->event_clock_watch, m->clock_watch_fd, EPOLLIN, manager_clock_watch, m);
f647962d
MS
233 if (r < 0)
234 return log_error_errno(r, "Failed to create clock watch event source: %m");
84e51726
LP
235
236 return 0;
237}
238
239static int manager_adjust_clock(Manager *m, double offset, int leap_sec) {
240 struct timex tmx = {};
241 int r;
242
243 assert(m);
244
245 /*
246 * For small deltas, tell the kernel to gradually adjust the system
247 * clock to the NTP time, larger deltas are just directly set.
248 */
249 if (fabs(offset) < NTP_MAX_ADJUST) {
250 tmx.modes = ADJ_STATUS | ADJ_NANO | ADJ_OFFSET | ADJ_TIMECONST | ADJ_MAXERROR | ADJ_ESTERROR;
251 tmx.status = STA_PLL;
252 tmx.offset = offset * NSEC_PER_SEC;
253 tmx.constant = log2i(m->poll_interval_usec / USEC_PER_SEC) - 4;
254 tmx.maxerror = 0;
255 tmx.esterror = 0;
ff49bc32 256 log_debug(" adjust (slew): %+.3f sec", offset);
84e51726 257 } else {
5f36e3d3 258 tmx.modes = ADJ_STATUS | ADJ_NANO | ADJ_SETOFFSET | ADJ_MAXERROR | ADJ_ESTERROR;
84e51726
LP
259
260 /* ADJ_NANO uses nanoseconds in the microseconds field */
261 tmx.time.tv_sec = (long)offset;
262 tmx.time.tv_usec = (offset - tmx.time.tv_sec) * NSEC_PER_SEC;
5f36e3d3
AK
263 tmx.maxerror = 0;
264 tmx.esterror = 0;
84e51726
LP
265
266 /* the kernel expects -0.3s as {-1, 7000.000.000} */
267 if (tmx.time.tv_usec < 0) {
268 tmx.time.tv_sec -= 1;
269 tmx.time.tv_usec += NSEC_PER_SEC;
270 }
271
272 m->jumped = true;
ff49bc32 273 log_debug(" adjust (jump): %+.3f sec", offset);
84e51726
LP
274 }
275
276 /*
277 * An unset STA_UNSYNC will enable the kernel's 11-minute mode,
278 * which syncs the system time periodically to the RTC.
279 *
280 * In case the RTC runs in local time, never touch the RTC,
281 * we have no way to properly handle daylight saving changes and
282 * mobile devices moving between time zones.
283 */
284 if (m->rtc_local_time)
285 tmx.status |= STA_UNSYNC;
286
287 switch (leap_sec) {
288 case 1:
289 tmx.status |= STA_INS;
290 break;
291 case -1:
292 tmx.status |= STA_DEL;
293 break;
294 }
295
296 r = clock_adjtime(CLOCK_REALTIME, &tmx);
297 if (r < 0)
6ff6f4d8 298 return -errno;
84e51726 299
baa33e79 300 /* If touch fails, there isn't much we can do. Maybe it'll work next time. */
53d133ea 301 (void) touch("/var/lib/systemd/timesync/clock");
2dd79846 302 (void) touch("/run/systemd/timesync/synchronized");
84e51726 303
66086a40 304 m->drift_freq = tmx.freq;
84e51726
LP
305
306 log_debug(" status : %04i %s\n"
0060bb8f 307 " time now : %"PRI_TIME".%03"PRI_USEC"\n"
3bd7ef83 308 " constant : %"PRI_TIMEX"\n"
84e51726 309 " offset : %+.3f sec\n"
66086a40 310 " freq offset : %+"PRI_TIMEX" (%+"PRI_TIMEX" ppm)\n",
84e51726 311 tmx.status, tmx.status & STA_UNSYNC ? "unsync" : "sync",
70887c5f 312 tmx.time.tv_sec, tmx.time.tv_usec / NSEC_PER_MSEC,
84e51726
LP
313 tmx.constant,
314 (double)tmx.offset / NSEC_PER_SEC,
66086a40 315 tmx.freq, tmx.freq / 65536);
84e51726
LP
316
317 return 0;
318}
319
320static bool manager_sample_spike_detection(Manager *m, double offset, double delay) {
14cb109d 321 unsigned i, idx_cur, idx_new, idx_min;
84e51726
LP
322 double jitter;
323 double j;
324
325 assert(m);
326
327 m->packet_count++;
328
329 /* ignore initial sample */
330 if (m->packet_count == 1)
331 return false;
332
333 /* store the current data in our samples array */
334 idx_cur = m->samples_idx;
335 idx_new = (idx_cur + 1) % ELEMENTSOF(m->samples);
336 m->samples_idx = idx_new;
337 m->samples[idx_new].offset = offset;
338 m->samples[idx_new].delay = delay;
339
340 /* calculate new jitter value from the RMS differences relative to the lowest delay sample */
341 jitter = m->samples_jitter;
342 for (idx_min = idx_cur, i = 0; i < ELEMENTSOF(m->samples); i++)
343 if (m->samples[i].delay > 0 && m->samples[i].delay < m->samples[idx_min].delay)
344 idx_min = i;
345
346 j = 0;
347 for (i = 0; i < ELEMENTSOF(m->samples); i++)
fa66b606 348 j += pow(m->samples[i].offset - m->samples[idx_min].offset, 2);
84e51726
LP
349 m->samples_jitter = sqrt(j / (ELEMENTSOF(m->samples) - 1));
350
351 /* ignore samples when resyncing */
352 if (m->poll_resync)
353 return false;
354
355 /* always accept offset if we are farther off than the round-trip delay */
356 if (fabs(offset) > delay)
357 return false;
358
359 /* we need a few samples before looking at them */
360 if (m->packet_count < 4)
361 return false;
362
363 /* do not accept anything worse than the maximum possible error of the best sample */
364 if (fabs(offset) > m->samples[idx_min].delay)
365 return true;
366
367 /* compare the difference between the current offset to the previous offset and jitter */
368 return fabs(offset - m->samples[idx_cur].offset) > 3 * jitter;
369}
370
371static void manager_adjust_poll(Manager *m, double offset, bool spike) {
372 assert(m);
373
374 if (m->poll_resync) {
a4465d0d 375 m->poll_interval_usec = m->poll_interval_min_usec;
84e51726
LP
376 m->poll_resync = false;
377 return;
378 }
379
380 /* set to minimal poll interval */
381 if (!spike && fabs(offset) > NTP_ACCURACY_SEC) {
a4465d0d 382 m->poll_interval_usec = m->poll_interval_min_usec;
84e51726
LP
383 return;
384 }
385
386 /* increase polling interval */
387 if (fabs(offset) < NTP_ACCURACY_SEC * 0.25) {
a4465d0d 388 if (m->poll_interval_usec < m->poll_interval_max_usec)
84e51726
LP
389 m->poll_interval_usec *= 2;
390 return;
391 }
392
393 /* decrease polling interval */
394 if (spike || fabs(offset) > NTP_ACCURACY_SEC * 0.75) {
a4465d0d 395 if (m->poll_interval_usec > m->poll_interval_min_usec)
84e51726
LP
396 m->poll_interval_usec /= 2;
397 return;
398 }
399}
400
401static int manager_receive_response(sd_event_source *source, int fd, uint32_t revents, void *userdata) {
402 Manager *m = userdata;
403 struct ntp_msg ntpmsg;
404
405 struct iovec iov = {
406 .iov_base = &ntpmsg,
407 .iov_len = sizeof(ntpmsg),
408 };
fb29cdbe 409 CMSG_BUFFER_TYPE(CMSG_SPACE(sizeof(struct timeval))) control;
84e51726
LP
410 union sockaddr_union server_addr;
411 struct msghdr msghdr = {
412 .msg_iov = &iov,
413 .msg_iovlen = 1,
414 .msg_control = &control,
415 .msg_controllen = sizeof(control),
416 .msg_name = &server_addr,
417 .msg_namelen = sizeof(server_addr),
418 };
419 struct cmsghdr *cmsg;
1cc6c93a 420 struct timespec *recv_time = NULL;
84e51726
LP
421 ssize_t len;
422 double origin, receive, trans, dest;
423 double delay, offset;
3af0442c 424 double root_distance;
84e51726
LP
425 bool spike;
426 int leap_sec;
427 int r;
428
429 assert(source);
430 assert(m);
431
432 if (revents & (EPOLLHUP|EPOLLERR)) {
433 log_warning("Server connection returned error.");
434 return manager_connect(m);
435 }
436
3691bcf3
LP
437 len = recvmsg_safe(fd, &msghdr, MSG_DONTWAIT);
438 if (len == -EAGAIN)
439 return 0;
84e51726 440 if (len < 0) {
3691bcf3 441 log_warning_errno(len, "Error receiving message, disconnecting: %m");
84e51726
LP
442 return manager_connect(m);
443 }
444
43fcd650
TM
445 /* Too short or too long packet? */
446 if (iov.iov_len < sizeof(struct ntp_msg) || (msghdr.msg_flags & MSG_TRUNC)) {
84e51726
LP
447 log_warning("Invalid response from server. Disconnecting.");
448 return manager_connect(m);
449 }
450
451 if (!m->current_server_name ||
452 !m->current_server_address ||
453 !sockaddr_equal(&server_addr, &m->current_server_address->sockaddr)) {
454 log_debug("Response from unknown server.");
455 return 0;
456 }
457
2a1288ff 458 CMSG_FOREACH(cmsg, &msghdr) {
84e51726
LP
459 if (cmsg->cmsg_level != SOL_SOCKET)
460 continue;
461
462 switch (cmsg->cmsg_type) {
487a3682
ML
463 case SCM_TIMESTAMPNS:
464 recv_time = (struct timespec *) CMSG_DATA(cmsg);
84e51726
LP
465 break;
466 }
467 }
baaa35ad
ZJS
468 if (!recv_time)
469 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
470 "Invalid packet timestamp.");
84e51726
LP
471
472 if (!m->pending) {
473 log_debug("Unexpected reply. Ignoring.");
474 return 0;
475 }
476
e8206972
ML
477 m->missed_replies = 0;
478
84e51726
LP
479 /* check our "time cookie" (we just stored nanoseconds in the fraction field) */
480 if (be32toh(ntpmsg.origin_time.sec) != m->trans_time.tv_sec + OFFSET_1900_1970 ||
edd50d5e 481 be32toh(ntpmsg.origin_time.frac) != (unsigned long) m->trans_time.tv_nsec) {
84e51726
LP
482 log_debug("Invalid reply; not our transmit time. Ignoring.");
483 return 0;
484 }
485
486 m->event_timeout = sd_event_source_unref(m->event_timeout);
487
488 if (be32toh(ntpmsg.recv_time.sec) < TIME_EPOCH + OFFSET_1900_1970 ||
489 be32toh(ntpmsg.trans_time.sec) < TIME_EPOCH + OFFSET_1900_1970) {
490 log_debug("Invalid reply, returned times before epoch. Ignoring.");
491 return manager_connect(m);
492 }
493
07610e10
ML
494 if (NTP_FIELD_LEAP(ntpmsg.field) == NTP_LEAP_NOTINSYNC ||
495 ntpmsg.stratum == 0 || ntpmsg.stratum >= 16) {
84e51726
LP
496 log_debug("Server is not synchronized. Disconnecting.");
497 return manager_connect(m);
498 }
499
500 if (!IN_SET(NTP_FIELD_VERSION(ntpmsg.field), 3, 4)) {
501 log_debug("Response NTPv%d. Disconnecting.", NTP_FIELD_VERSION(ntpmsg.field));
502 return manager_connect(m);
503 }
504
505 if (NTP_FIELD_MODE(ntpmsg.field) != NTP_MODE_SERVER) {
506 log_debug("Unsupported mode %d. Disconnecting.", NTP_FIELD_MODE(ntpmsg.field));
507 return manager_connect(m);
508 }
509
3af0442c 510 root_distance = ntp_ts_short_to_d(&ntpmsg.root_delay) / 2 + ntp_ts_short_to_d(&ntpmsg.root_dispersion);
f907cc16 511 if (root_distance > (double) m->max_root_distance_usec / (double) USEC_PER_SEC) {
ce96c9cb 512 log_info("Server has too large root distance. Disconnecting.");
3af0442c
ML
513 return manager_connect(m);
514 }
515
84e51726
LP
516 /* valid packet */
517 m->pending = false;
ab4df227 518 m->retry_interval = 0;
84e51726 519
7b628891 520 /* Stop listening */
f89c4e15 521 manager_listen_stop(m);
7b628891 522
84e51726
LP
523 /* announce leap seconds */
524 if (NTP_FIELD_LEAP(ntpmsg.field) & NTP_LEAP_PLUSSEC)
525 leap_sec = 1;
526 else if (NTP_FIELD_LEAP(ntpmsg.field) & NTP_LEAP_MINUSSEC)
527 leap_sec = -1;
528 else
529 leap_sec = 0;
530
531 /*
532 * "Timestamp Name ID When Generated
533 * ------------------------------------------------------------
534 * Originate Timestamp T1 time request sent by client
535 * Receive Timestamp T2 time request received by server
536 * Transmit Timestamp T3 time reply sent by server
537 * Destination Timestamp T4 time reply received by client
538 *
539 * The round-trip delay, d, and system clock offset, t, are defined as:
540 * d = (T4 - T1) - (T3 - T2) t = ((T2 - T1) + (T3 - T4)) / 2"
541 */
73c76e63 542 origin = ts_to_d(&m->trans_time) + OFFSET_1900_1970;
84e51726
LP
543 receive = ntp_ts_to_d(&ntpmsg.recv_time);
544 trans = ntp_ts_to_d(&ntpmsg.trans_time);
487a3682 545 dest = ts_to_d(recv_time) + OFFSET_1900_1970;
84e51726
LP
546
547 offset = ((receive - origin) + (trans - dest)) / 2;
548 delay = (dest - origin) - (trans - receive);
549
550 spike = manager_sample_spike_detection(m, offset, delay);
551
552 manager_adjust_poll(m, offset, spike);
553
554 log_debug("NTP response:\n"
555 " leap : %u\n"
556 " version : %u\n"
557 " mode : %u\n"
558 " stratum : %u\n"
559 " precision : %.6f sec (%d)\n"
3af0442c 560 " root distance: %.6f sec\n"
84e51726
LP
561 " reference : %.4s\n"
562 " origin : %.3f\n"
563 " receive : %.3f\n"
564 " transmit : %.3f\n"
565 " dest : %.3f\n"
566 " offset : %+.3f sec\n"
567 " delay : %+.3f sec\n"
568 " packet count : %"PRIu64"\n"
569 " jitter : %.3f%s\n"
570 " poll interval: " USEC_FMT "\n",
571 NTP_FIELD_LEAP(ntpmsg.field),
572 NTP_FIELD_VERSION(ntpmsg.field),
573 NTP_FIELD_MODE(ntpmsg.field),
574 ntpmsg.stratum,
575 exp2(ntpmsg.precision), ntpmsg.precision,
3af0442c 576 root_distance,
84e51726
LP
577 ntpmsg.stratum == 1 ? ntpmsg.refid : "n/a",
578 origin - OFFSET_1900_1970,
579 receive - OFFSET_1900_1970,
580 trans - OFFSET_1900_1970,
581 dest - OFFSET_1900_1970,
582 offset, delay,
583 m->packet_count,
584 m->samples_jitter, spike ? " spike" : "",
585 m->poll_interval_usec / USEC_PER_SEC);
586
587 if (!spike) {
588 m->sync = true;
589 r = manager_adjust_clock(m, offset, leap_sec);
590 if (r < 0)
6ff6f4d8 591 log_error_errno(r, "Failed to call clock_adjtime(): %m");
84e51726
LP
592 }
593
66086a40
YW
594 /* Save NTP response */
595 m->ntpmsg = ntpmsg;
596 m->origin_time = m->trans_time;
597 m->dest_time = *recv_time;
598 m->spike = spike;
599
75ca1621 600 log_debug("interval/delta/delay/jitter/drift " USEC_FMT "s/%+.3fs/%.3fs/%.3fs/%+"PRIi64"ppm%s",
66086a40 601 m->poll_interval_usec / USEC_PER_SEC, offset, delay, m->samples_jitter, m->drift_freq / 65536,
7b5b3fc3 602 spike ? " (ignored)" : "");
84e51726 603
66086a40
YW
604 (void) sd_bus_emit_properties_changed(m->bus, "/org/freedesktop/timesync1", "org.freedesktop.timesync1.Manager", "NTPMessage", NULL);
605
481b3f9e
LP
606 if (!m->good) {
607 _cleanup_free_ char *pretty = NULL;
608
609 m->good = true;
610
611 server_address_pretty(m->current_server_address, &pretty);
37afb0ac 612 /* "Initial", as further successful syncs will not be logged. */
613 log_info("Initial synchronization to time server %s (%s).", strna(pretty), m->current_server_name->string);
614 sd_notifyf(false, "STATUS=Initial synchronization to time server %s (%s).", strna(pretty), m->current_server_name->string);
481b3f9e
LP
615 }
616
84e51726 617 r = manager_arm_timer(m, m->poll_interval_usec);
f647962d
MS
618 if (r < 0)
619 return log_error_errno(r, "Failed to rearm timer: %m");
84e51726
LP
620
621 return 0;
622}
623
624static int manager_listen_setup(Manager *m) {
625 union sockaddr_union addr = {};
84e51726
LP
626 int r;
627
628 assert(m);
629
f89c4e15
LP
630 if (m->server_socket >= 0)
631 return 0;
632
84e51726
LP
633 assert(!m->event_receive);
634 assert(m->current_server_address);
635
636 addr.sa.sa_family = m->current_server_address->sockaddr.sa.sa_family;
637
638 m->server_socket = socket(addr.sa.sa_family, SOCK_DGRAM | SOCK_CLOEXEC, 0);
639 if (m->server_socket < 0)
640 return -errno;
641
642 r = bind(m->server_socket, &addr.sa, m->current_server_address->socklen);
643 if (r < 0)
644 return -errno;
645
2ff48e98 646 r = setsockopt_int(m->server_socket, SOL_SOCKET, SO_TIMESTAMPNS, true);
84e51726 647 if (r < 0)
2ff48e98 648 return r;
84e51726 649
00df39a5
LP
650 if (addr.sa.sa_family == AF_INET)
651 (void) setsockopt_int(m->server_socket, IPPROTO_IP, IP_TOS, IPTOS_LOWDELAY);
84e51726
LP
652
653 return sd_event_add_io(m->event, &m->event_receive, m->server_socket, EPOLLIN, manager_receive_response, m);
654}
655
f89c4e15
LP
656static void manager_listen_stop(Manager *m) {
657 assert(m);
658
659 m->event_receive = sd_event_source_unref(m->event_receive);
660 m->server_socket = safe_close(m->server_socket);
661}
662
84e51726
LP
663static int manager_begin(Manager *m) {
664 _cleanup_free_ char *pretty = NULL;
665 int r;
666
667 assert(m);
668 assert_return(m->current_server_name, -EHOSTUNREACH);
669 assert_return(m->current_server_address, -EHOSTUNREACH);
670
481b3f9e 671 m->good = false;
e8206972 672 m->missed_replies = NTP_MAX_MISSED_REPLIES;
80cd2606 673 if (m->poll_interval_usec == 0)
a4465d0d 674 m->poll_interval_usec = m->poll_interval_min_usec;
84e51726
LP
675
676 server_address_pretty(m->current_server_address, &pretty);
481b3f9e
LP
677 log_debug("Connecting to time server %s (%s).", strna(pretty), m->current_server_name->string);
678 sd_notifyf(false, "STATUS=Connecting to time server %s (%s).", strna(pretty), m->current_server_name->string);
84e51726 679
84e51726
LP
680 r = manager_clock_watch_setup(m);
681 if (r < 0)
682 return r;
683
684 return manager_send_request(m);
685}
686
874ff7bf
LP
687void manager_set_server_name(Manager *m, ServerName *n) {
688 assert(m);
84e51726 689
874ff7bf
LP
690 if (m->current_server_name == n)
691 return;
84e51726 692
874ff7bf
LP
693 m->current_server_name = n;
694 m->current_server_address = NULL;
695
696 manager_disconnect(m);
84e51726 697
874ff7bf
LP
698 if (n)
699 log_debug("Selected server %s.", n->string);
700}
84e51726 701
874ff7bf 702void manager_set_server_address(Manager *m, ServerAddress *a) {
84e51726
LP
703 assert(m);
704
874ff7bf
LP
705 if (m->current_server_address == a)
706 return;
707
874ff7bf 708 m->current_server_address = a;
20f8d3cf
SN
709 /* If a is NULL, we are just clearing the address, without
710 * changing the name. Keep the existing name in that case. */
711 if (a)
712 m->current_server_name = a->name;
874ff7bf
LP
713
714 manager_disconnect(m);
715
716 if (a) {
717 _cleanup_free_ char *pretty = NULL;
718 server_address_pretty(a, &pretty);
719 log_debug("Selected address %s of server %s.", strna(pretty), a->name->string);
84e51726
LP
720 }
721}
722
7082bb05 723static int manager_resolve_handler(sd_resolve_query *q, int ret, const struct addrinfo *ai, Manager *m) {
874ff7bf 724 int r;
84e51726
LP
725
726 assert(q);
727 assert(m);
728 assert(m->current_server_name);
729
730 m->resolve_query = sd_resolve_query_unref(m->resolve_query);
731
732 if (ret != 0) {
733 log_debug("Failed to resolve %s: %s", m->current_server_name->string, gai_strerror(ret));
734
735 /* Try next host */
736 return manager_connect(m);
737 }
738
84e51726
LP
739 for (; ai; ai = ai->ai_next) {
740 _cleanup_free_ char *pretty = NULL;
874ff7bf 741 ServerAddress *a;
84e51726
LP
742
743 assert(ai->ai_addr);
744 assert(ai->ai_addrlen >= offsetof(struct sockaddr, sa_data));
84e51726
LP
745
746 if (!IN_SET(ai->ai_addr->sa_family, AF_INET, AF_INET6)) {
747 log_warning("Unsuitable address protocol for %s", m->current_server_name->string);
748 continue;
749 }
750
874ff7bf 751 r = server_address_new(m->current_server_name, &a, (const union sockaddr_union*) ai->ai_addr, ai->ai_addrlen);
f647962d
MS
752 if (r < 0)
753 return log_error_errno(r, "Failed to add server address: %m");
84e51726 754
874ff7bf 755 server_address_pretty(a, &pretty);
84e51726
LP
756 log_debug("Resolved address %s for %s.", pretty, m->current_server_name->string);
757 }
758
759 if (!m->current_server_name->addresses) {
760 log_error("Failed to find suitable address for host %s.", m->current_server_name->string);
761
762 /* Try next host */
763 return manager_connect(m);
764 }
765
874ff7bf 766 manager_set_server_address(m, m->current_server_name->addresses);
84e51726
LP
767
768 return manager_begin(m);
769}
770
874ff7bf 771static int manager_retry_connect(sd_event_source *source, usec_t usec, void *userdata) {
84e51726
LP
772 Manager *m = userdata;
773
774 assert(m);
775
776 return manager_connect(m);
777}
778
779int manager_connect(Manager *m) {
84e51726
LP
780 int r;
781
782 assert(m);
783
784 manager_disconnect(m);
785
786 m->event_retry = sd_event_source_unref(m->event_retry);
7994ac1d 787 if (!ratelimit_below(&m->ratelimit)) {
a9061d97 788 log_debug("Delaying attempts to contact servers.");
84e51726 789
39cf0351 790 r = sd_event_add_time_relative(m->event, &m->event_retry, clock_boottime_or_monotonic(), RETRY_USEC, 0, manager_retry_connect, m);
f647962d
MS
791 if (r < 0)
792 return log_error_errno(r, "Failed to create retry timer: %m");
84e51726
LP
793
794 return 0;
795 }
796
797 /* If we already are operating on some address, switch to the
798 * next one. */
799 if (m->current_server_address && m->current_server_address->addresses_next)
874ff7bf 800 manager_set_server_address(m, m->current_server_address->addresses_next);
84e51726 801 else {
874ff7bf
LP
802 struct addrinfo hints = {
803 .ai_flags = AI_NUMERICSERV|AI_ADDRCONFIG,
804 .ai_socktype = SOCK_DGRAM,
805 };
84e51726 806
874ff7bf 807 /* Hmm, we are through all addresses, let's look for the next host instead */
84e51726 808 if (m->current_server_name && m->current_server_name->names_next)
874ff7bf 809 manager_set_server_name(m, m->current_server_name->names_next);
84e51726 810 else {
874ff7bf 811 ServerName *f;
63463bf0 812 bool restart = true;
874ff7bf
LP
813
814 /* Our current server name list is exhausted,
815 * let's find the next one to iterate. First
816 * we try the system list, then the link list.
817 * After having processed the link list we
818 * jump back to the system list. However, if
819 * both lists are empty, we change to the
820 * fallback list. */
821 if (!m->current_server_name || m->current_server_name->type == SERVER_LINK) {
822 f = m->system_servers;
823 if (!f)
824 f = m->link_servers;
825 } else {
826 f = m->link_servers;
827 if (!f)
828 f = m->system_servers;
63463bf0
ML
829 else
830 restart = false;
874ff7bf
LP
831 }
832
833 if (!f)
834 f = m->fallback_servers;
835
836 if (!f) {
837 manager_set_server_name(m, NULL);
84e51726
LP
838 log_debug("No server found.");
839 return 0;
840 }
841
63463bf0
ML
842 if (restart && !m->exhausted_servers && m->poll_interval_usec) {
843 log_debug("Waiting after exhausting servers.");
39cf0351 844 r = sd_event_add_time_relative(m->event, &m->event_retry, clock_boottime_or_monotonic(), m->poll_interval_usec, 0, manager_retry_connect, m);
f647962d
MS
845 if (r < 0)
846 return log_error_errno(r, "Failed to create retry timer: %m");
63463bf0
ML
847
848 m->exhausted_servers = true;
849
850 /* Increase the polling interval */
a4465d0d 851 if (m->poll_interval_usec < m->poll_interval_max_usec)
63463bf0
ML
852 m->poll_interval_usec *= 2;
853
854 return 0;
855 }
856
857 m->exhausted_servers = false;
858
874ff7bf 859 manager_set_server_name(m, f);
84e51726
LP
860 }
861
862 /* Tell the resolver to reread /etc/resolv.conf, in
863 * case it changed. */
864 res_init();
865
874ff7bf
LP
866 /* Flush out any previously resolved addresses */
867 server_name_flush_addresses(m->current_server_name);
868
869 log_debug("Resolving %s...", m->current_server_name->string);
870
7082bb05 871 r = resolve_getaddrinfo(m->resolve, &m->resolve_query, m->current_server_name->string, "123", &hints, manager_resolve_handler, NULL, m);
f647962d
MS
872 if (r < 0)
873 return log_error_errno(r, "Failed to create resolver: %m");
84e51726
LP
874
875 return 1;
876 }
877
878 r = manager_begin(m);
879 if (r < 0)
880 return r;
881
882 return 1;
883}
884
84e51726
LP
885void manager_disconnect(Manager *m) {
886 assert(m);
887
888 m->resolve_query = sd_resolve_query_unref(m->resolve_query);
889
890 m->event_timer = sd_event_source_unref(m->event_timer);
891
f89c4e15 892 manager_listen_stop(m);
84e51726
LP
893
894 m->event_clock_watch = sd_event_source_unref(m->event_clock_watch);
895 m->clock_watch_fd = safe_close(m->clock_watch_fd);
896
897 m->event_timeout = sd_event_source_unref(m->event_timeout);
898
899 sd_notifyf(false, "STATUS=Idle.");
900}
901
874ff7bf
LP
902void manager_flush_server_names(Manager *m, ServerType t) {
903 assert(m);
904
905 if (t == SERVER_SYSTEM)
906 while (m->system_servers)
907 server_name_free(m->system_servers);
908
909 if (t == SERVER_LINK)
910 while (m->link_servers)
911 server_name_free(m->link_servers);
912
913 if (t == SERVER_FALLBACK)
914 while (m->fallback_servers)
915 server_name_free(m->fallback_servers);
916}
84e51726
LP
917
918void manager_free(Manager *m) {
919 if (!m)
920 return;
921
922 manager_disconnect(m);
874ff7bf
LP
923 manager_flush_server_names(m, SERVER_SYSTEM);
924 manager_flush_server_names(m, SERVER_LINK);
925 manager_flush_server_names(m, SERVER_FALLBACK);
84e51726
LP
926
927 sd_event_source_unref(m->event_retry);
928
929 sd_event_source_unref(m->network_event_source);
930 sd_network_monitor_unref(m->network_monitor);
931
932 sd_resolve_unref(m->resolve);
933 sd_event_unref(m->event);
934
92e31da1 935 sd_bus_flush_close_unref(m->bus);
e7dd3947 936
84e51726
LP
937 free(m);
938}
939
874ff7bf
LP
940static int manager_network_read_link_servers(Manager *m) {
941 _cleanup_strv_free_ char **ntp = NULL;
942 ServerName *n, *nx;
943 char **i;
3e85ec07 944 bool changed = false;
874ff7bf
LP
945 int r;
946
84e51726
LP
947 assert(m);
948
874ff7bf 949 r = sd_network_get_ntp(&ntp);
ba0c011e
YW
950 if (r < 0) {
951 if (r == -ENOMEM)
952 log_oom();
953 else
954 log_debug_errno(r, "Failed to get link NTP servers: %m");
874ff7bf 955 goto clear;
ba0c011e 956 }
874ff7bf
LP
957
958 LIST_FOREACH(names, n, m->link_servers)
959 n->marked = true;
960
961 STRV_FOREACH(i, ntp) {
962 bool found = false;
963
dcb37458
YW
964 r = dns_name_is_valid_or_address(*i);
965 if (r < 0) {
966 log_error_errno(r, "Failed to check validity of NTP server name or address '%s': %m", *i);
967 goto clear;
968 } else if (r == 0) {
969 log_error("Invalid NTP server name or address, ignoring: %s", *i);
970 continue;
971 }
972
874ff7bf
LP
973 LIST_FOREACH(names, n, m->link_servers)
974 if (streq(n->string, *i)) {
975 n->marked = false;
976 found = true;
977 break;
978 }
979
980 if (!found) {
981 r = server_name_new(m, NULL, SERVER_LINK, *i);
ba0c011e
YW
982 if (r < 0) {
983 log_oom();
874ff7bf 984 goto clear;
ba0c011e 985 }
3e85ec07
YW
986
987 changed = true;
874ff7bf
LP
988 }
989 }
990
991 LIST_FOREACH_SAFE(names, n, nx, m->link_servers)
3e85ec07 992 if (n->marked) {
874ff7bf 993 server_name_free(n);
3e85ec07
YW
994 changed = true;
995 }
874ff7bf 996
3e85ec07 997 return changed;
874ff7bf
LP
998
999clear:
1000 manager_flush_server_names(m, SERVER_LINK);
1001 return r;
84e51726
LP
1002}
1003
0630eb1b
YW
1004static bool manager_is_connected(Manager *m) {
1005 /* Return true when the manager is sending a request, resolving a server name, or
1006 * in a poll interval. */
1007 return m->server_socket >= 0 || m->resolve_query || m->event_timer;
1008}
1009
84e51726
LP
1010static int manager_network_event_handler(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
1011 Manager *m = userdata;
3e85ec07 1012 bool changed, connected, online;
84e51726
LP
1013 int r;
1014
1015 assert(m);
1016
1017 sd_network_monitor_flush(m->network_monitor);
1018
ba0c011e 1019 /* When manager_network_read_link_servers() failed, we assume that the servers are changed. */
55033662 1020 changed = manager_network_read_link_servers(m);
874ff7bf 1021
84e51726
LP
1022 /* check if the machine is online */
1023 online = network_is_online();
1024
1025 /* check if the client is currently connected */
0630eb1b 1026 connected = manager_is_connected(m);
84e51726
LP
1027
1028 if (connected && !online) {
1029 log_info("No network connectivity, watching for changes.");
1030 manager_disconnect(m);
1031
0630eb1b 1032 } else if ((!connected || changed) && online) {
84e51726
LP
1033 log_info("Network configuration changed, trying to establish connection.");
1034
1035 if (m->current_server_address)
1036 r = manager_begin(m);
1037 else
1038 r = manager_connect(m);
1039 if (r < 0)
1040 return r;
1041 }
1042
1043 return 0;
1044}
1045
1046static int manager_network_monitor_listen(Manager *m) {
1047 int r, fd, events;
1048
1049 assert(m);
1050
1051 r = sd_network_monitor_new(&m->network_monitor, NULL);
36484c03 1052 if (r == -ENOENT) {
f95b0be7 1053 log_info("systemd does not appear to be running, not listening for systemd-networkd events.");
36484c03
ZJS
1054 return 0;
1055 }
84e51726
LP
1056 if (r < 0)
1057 return r;
1058
1059 fd = sd_network_monitor_get_fd(m->network_monitor);
1060 if (fd < 0)
1061 return fd;
1062
1063 events = sd_network_monitor_get_events(m->network_monitor);
1064 if (events < 0)
1065 return events;
1066
1067 r = sd_event_add_io(m->event, &m->network_event_source, fd, events, manager_network_event_handler, m);
1068 if (r < 0)
1069 return r;
1070
1071 return 0;
1072}
1073
1074int manager_new(Manager **ret) {
1075 _cleanup_(manager_freep) Manager *m = NULL;
1076 int r;
1077
1078 assert(ret);
1079
1080 m = new0(Manager, 1);
1081 if (!m)
1082 return -ENOMEM;
1083
f907cc16 1084 m->max_root_distance_usec = NTP_MAX_ROOT_DISTANCE;
a4465d0d
YW
1085 m->poll_interval_min_usec = NTP_POLL_INTERVAL_MIN_USEC;
1086 m->poll_interval_max_usec = NTP_POLL_INTERVAL_MAX_USEC;
f907cc16 1087
84e51726
LP
1088 m->server_socket = m->clock_watch_fd = -1;
1089
8c227e7f 1090 m->ratelimit = (RateLimit) { RATELIMIT_INTERVAL_USEC, RATELIMIT_BURST };
84e51726 1091
84e51726
LP
1092 r = sd_event_default(&m->event);
1093 if (r < 0)
1094 return r;
1095
8b7140db
YW
1096 (void) sd_event_add_signal(m->event, NULL, SIGTERM, NULL, NULL);
1097 (void) sd_event_add_signal(m->event, NULL, SIGINT, NULL, NULL);
84e51726 1098
8b7140db 1099 (void) sd_event_set_watchdog(m->event, true);
84e51726
LP
1100
1101 r = sd_resolve_default(&m->resolve);
1102 if (r < 0)
1103 return r;
1104
1105 r = sd_resolve_attach_event(m->resolve, m->event, 0);
1106 if (r < 0)
1107 return r;
1108
1109 r = manager_network_monitor_listen(m);
1110 if (r < 0)
1111 return r;
1112
ba0c011e 1113 (void) manager_network_read_link_servers(m);
874ff7bf 1114
1cc6c93a 1115 *ret = TAKE_PTR(m);
84e51726
LP
1116
1117 return 0;
1118}