]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/timesync/timesyncd-manager.c
timesync: add more log messages in manager_network_read_link_servers()
[thirdparty/systemd.git] / src / timesync / timesyncd-manager.c
CommitLineData
53e1b683 1/* SPDX-License-Identifier: LGPL-2.1+ */
84e51726
LP
2/***
3 This file is part of systemd.
4
5 Copyright 2014 Kay Sievers, Lennart Poettering
84e51726
LP
6***/
7
84e51726 8#include <errno.h>
84e51726 9#include <math.h>
84e51726
LP
10#include <netinet/in.h>
11#include <netinet/ip.h>
07630cea
LP
12#include <resolv.h>
13#include <stdlib.h>
14#include <sys/socket.h>
84e51726
LP
15#include <sys/timerfd.h>
16#include <sys/timex.h>
84e51726 17#include <sys/types.h>
07630cea
LP
18#include <time.h>
19
20#include "sd-daemon.h"
84e51726 21
b5efdb8a 22#include "alloc-util.h"
dcb37458 23#include "dns-domain.h"
3ffd4af2 24#include "fd-util.h"
f4f15635 25#include "fs-util.h"
84e51726 26#include "list.h"
07630cea
LP
27#include "log.h"
28#include "missing.h"
29#include "network-util.h"
84e51726 30#include "ratelimit.h"
07630cea 31#include "socket-util.h"
07630cea 32#include "string-util.h"
84e51726 33#include "strv.h"
07630cea 34#include "time-util.h"
84e51726
LP
35#include "timesyncd-conf.h"
36#include "timesyncd-manager.h"
3ffd4af2 37#include "util.h"
84e51726
LP
38
39#ifndef ADJ_SETOFFSET
40#define ADJ_SETOFFSET 0x0100 /* add 'time' to current time */
41#endif
42
43/* expected accuracy of time synchronization; used to adjust the poll interval */
44#define NTP_ACCURACY_SEC 0.2
45
84e51726
LP
46/*
47 * Maximum delta in seconds which the system clock is gradually adjusted
a4465d0d 48 * (slewed) to approach the network time. Deltas larger that this are set by
84e51726
LP
49 * letting the system time jump. The kernel's limit for adjtime is 0.5s.
50 */
51#define NTP_MAX_ADJUST 0.4
52
a4465d0d 53/* Default of maximum acceptable root distance in microseconds. */
f907cc16 54#define NTP_MAX_ROOT_DISTANCE (5 * USEC_PER_SEC)
3af0442c 55
e8206972
ML
56/* Maximum number of missed replies before selecting another source. */
57#define NTP_MAX_MISSED_REPLIES 2
58
84e51726
LP
59#define RETRY_USEC (30*USEC_PER_SEC)
60#define RATELIMIT_INTERVAL_USEC (10*USEC_PER_SEC)
61#define RATELIMIT_BURST 10
62
63#define TIMEOUT_USEC (10*USEC_PER_SEC)
64
84e51726
LP
65static int manager_arm_timer(Manager *m, usec_t next);
66static int manager_clock_watch_setup(Manager *m);
7b628891 67static int manager_listen_setup(Manager *m);
f89c4e15 68static void manager_listen_stop(Manager *m);
84e51726 69
3af0442c
ML
70static double ntp_ts_short_to_d(const struct ntp_ts_short *ts) {
71 return be16toh(ts->sec) + (be16toh(ts->frac) / 65536.0);
72}
73
84e51726
LP
74static double ntp_ts_to_d(const struct ntp_ts *ts) {
75 return be32toh(ts->sec) + ((double)be32toh(ts->frac) / UINT_MAX);
76}
77
78static double ts_to_d(const struct timespec *ts) {
79 return ts->tv_sec + (1.0e-9 * ts->tv_nsec);
80}
81
84e51726
LP
82static int manager_timeout(sd_event_source *source, usec_t usec, void *userdata) {
83 _cleanup_free_ char *pretty = NULL;
84 Manager *m = userdata;
85
86 assert(m);
87 assert(m->current_server_name);
88 assert(m->current_server_address);
89
90 server_address_pretty(m->current_server_address, &pretty);
91 log_info("Timed out waiting for reply from %s (%s).", strna(pretty), m->current_server_name->string);
92
93 return manager_connect(m);
94}
95
96static int manager_send_request(Manager *m) {
97 _cleanup_free_ char *pretty = NULL;
98 struct ntp_msg ntpmsg = {
99 /*
100 * "The client initializes the NTP message header, sends the request
101 * to the server, and strips the time of day from the Transmit
102 * Timestamp field of the reply. For this purpose, all the NTP
103 * header fields are set to 0, except the Mode, VN, and optional
104 * Transmit Timestamp fields."
105 */
106 .field = NTP_FIELD(0, 4, NTP_MODE_CLIENT),
107 };
108 ssize_t len;
109 int r;
110
111 assert(m);
112 assert(m->current_server_name);
113 assert(m->current_server_address);
114
115 m->event_timeout = sd_event_source_unref(m->event_timeout);
116
f89c4e15
LP
117 r = manager_listen_setup(m);
118 if (r < 0)
119 return log_warning_errno(r, "Failed to setup connection socket: %m");
7b628891 120
84e51726
LP
121 /*
122 * Set transmit timestamp, remember it; the server will send that back
123 * as the origin timestamp and we have an indication that this is the
124 * matching answer to our request.
125 *
126 * The actual value does not matter, We do not care about the correct
127 * NTP UINT_MAX fraction; we just pass the plain nanosecond value.
128 */
129 assert_se(clock_gettime(clock_boottime_or_monotonic(), &m->trans_time_mon) >= 0);
130 assert_se(clock_gettime(CLOCK_REALTIME, &m->trans_time) >= 0);
131 ntpmsg.trans_time.sec = htobe32(m->trans_time.tv_sec + OFFSET_1900_1970);
132 ntpmsg.trans_time.frac = htobe32(m->trans_time.tv_nsec);
133
134 server_address_pretty(m->current_server_address, &pretty);
135
136 len = sendto(m->server_socket, &ntpmsg, sizeof(ntpmsg), MSG_DONTWAIT, &m->current_server_address->sockaddr.sa, m->current_server_address->socklen);
137 if (len == sizeof(ntpmsg)) {
138 m->pending = true;
139 log_debug("Sent NTP request to %s (%s).", strna(pretty), m->current_server_name->string);
140 } else {
56f64d95 141 log_debug_errno(errno, "Sending NTP request to %s (%s) failed: %m", strna(pretty), m->current_server_name->string);
84e51726
LP
142 return manager_connect(m);
143 }
144
ab4df227
KS
145 /* re-arm timer with increasing timeout, in case the packets never arrive back */
146 if (m->retry_interval > 0) {
a4465d0d 147 if (m->retry_interval < m->poll_interval_max_usec)
ab4df227
KS
148 m->retry_interval *= 2;
149 } else
a4465d0d 150 m->retry_interval = m->poll_interval_min_usec;
ab4df227
KS
151
152 r = manager_arm_timer(m, m->retry_interval);
f647962d
MS
153 if (r < 0)
154 return log_error_errno(r, "Failed to rearm timer: %m");
ab4df227 155
e8206972
ML
156 m->missed_replies++;
157 if (m->missed_replies > NTP_MAX_MISSED_REPLIES) {
158 r = sd_event_add_time(
159 m->event,
160 &m->event_timeout,
161 clock_boottime_or_monotonic(),
162 now(clock_boottime_or_monotonic()) + TIMEOUT_USEC, 0,
163 manager_timeout, m);
f647962d
MS
164 if (r < 0)
165 return log_error_errno(r, "Failed to arm timeout timer: %m");
84e51726
LP
166 }
167
168 return 0;
169}
170
171static int manager_timer(sd_event_source *source, usec_t usec, void *userdata) {
172 Manager *m = userdata;
173
174 assert(m);
175
176 return manager_send_request(m);
177}
178
179static int manager_arm_timer(Manager *m, usec_t next) {
180 int r;
181
182 assert(m);
84e51726
LP
183
184 if (next == 0) {
185 m->event_timer = sd_event_source_unref(m->event_timer);
186 return 0;
187 }
188
189 if (m->event_timer) {
190 r = sd_event_source_set_time(m->event_timer, now(clock_boottime_or_monotonic()) + next);
191 if (r < 0)
192 return r;
193
194 return sd_event_source_set_enabled(m->event_timer, SD_EVENT_ONESHOT);
195 }
196
197 return sd_event_add_time(
198 m->event,
199 &m->event_timer,
200 clock_boottime_or_monotonic(),
201 now(clock_boottime_or_monotonic()) + next, 0,
202 manager_timer, m);
203}
204
205static int manager_clock_watch(sd_event_source *source, int fd, uint32_t revents, void *userdata) {
206 Manager *m = userdata;
207
208 assert(m);
209
210 /* rearm timer */
211 manager_clock_watch_setup(m);
212
213 /* skip our own jumps */
214 if (m->jumped) {
215 m->jumped = false;
216 return 0;
217 }
218
219 /* resync */
7e3254b3 220 log_debug("System time changed. Resyncing.");
84e51726
LP
221 m->poll_resync = true;
222
223 return manager_send_request(m);
224}
225
226/* wake up when the system time changes underneath us */
227static int manager_clock_watch_setup(Manager *m) {
84e51726
LP
228 int r;
229
230 assert(m);
231
232 m->event_clock_watch = sd_event_source_unref(m->event_clock_watch);
233 safe_close(m->clock_watch_fd);
234
4f811d27 235 m->clock_watch_fd = time_change_fd();
4a62c710 236 if (m->clock_watch_fd < 0)
4f811d27 237 return log_error_errno(m->clock_watch_fd, "Failed to create timerfd: %m");
84e51726
LP
238
239 r = sd_event_add_io(m->event, &m->event_clock_watch, m->clock_watch_fd, EPOLLIN, manager_clock_watch, m);
f647962d
MS
240 if (r < 0)
241 return log_error_errno(r, "Failed to create clock watch event source: %m");
84e51726
LP
242
243 return 0;
244}
245
246static int manager_adjust_clock(Manager *m, double offset, int leap_sec) {
247 struct timex tmx = {};
248 int r;
249
250 assert(m);
251
252 /*
253 * For small deltas, tell the kernel to gradually adjust the system
254 * clock to the NTP time, larger deltas are just directly set.
255 */
256 if (fabs(offset) < NTP_MAX_ADJUST) {
257 tmx.modes = ADJ_STATUS | ADJ_NANO | ADJ_OFFSET | ADJ_TIMECONST | ADJ_MAXERROR | ADJ_ESTERROR;
258 tmx.status = STA_PLL;
259 tmx.offset = offset * NSEC_PER_SEC;
260 tmx.constant = log2i(m->poll_interval_usec / USEC_PER_SEC) - 4;
261 tmx.maxerror = 0;
262 tmx.esterror = 0;
ff49bc32 263 log_debug(" adjust (slew): %+.3f sec", offset);
84e51726 264 } else {
5f36e3d3 265 tmx.modes = ADJ_STATUS | ADJ_NANO | ADJ_SETOFFSET | ADJ_MAXERROR | ADJ_ESTERROR;
84e51726
LP
266
267 /* ADJ_NANO uses nanoseconds in the microseconds field */
268 tmx.time.tv_sec = (long)offset;
269 tmx.time.tv_usec = (offset - tmx.time.tv_sec) * NSEC_PER_SEC;
5f36e3d3
AK
270 tmx.maxerror = 0;
271 tmx.esterror = 0;
84e51726
LP
272
273 /* the kernel expects -0.3s as {-1, 7000.000.000} */
274 if (tmx.time.tv_usec < 0) {
275 tmx.time.tv_sec -= 1;
276 tmx.time.tv_usec += NSEC_PER_SEC;
277 }
278
279 m->jumped = true;
ff49bc32 280 log_debug(" adjust (jump): %+.3f sec", offset);
84e51726
LP
281 }
282
283 /*
284 * An unset STA_UNSYNC will enable the kernel's 11-minute mode,
285 * which syncs the system time periodically to the RTC.
286 *
287 * In case the RTC runs in local time, never touch the RTC,
288 * we have no way to properly handle daylight saving changes and
289 * mobile devices moving between time zones.
290 */
291 if (m->rtc_local_time)
292 tmx.status |= STA_UNSYNC;
293
294 switch (leap_sec) {
295 case 1:
296 tmx.status |= STA_INS;
297 break;
298 case -1:
299 tmx.status |= STA_DEL;
300 break;
301 }
302
303 r = clock_adjtime(CLOCK_REALTIME, &tmx);
304 if (r < 0)
6ff6f4d8 305 return -errno;
84e51726 306
baa33e79 307 /* If touch fails, there isn't much we can do. Maybe it'll work next time. */
53d133ea 308 (void) touch("/var/lib/systemd/timesync/clock");
2dd79846 309 (void) touch("/run/systemd/timesync/synchronized");
84e51726 310
66086a40 311 m->drift_freq = tmx.freq;
84e51726
LP
312
313 log_debug(" status : %04i %s\n"
0060bb8f 314 " time now : %"PRI_TIME".%03"PRI_USEC"\n"
3bd7ef83 315 " constant : %"PRI_TIMEX"\n"
84e51726 316 " offset : %+.3f sec\n"
66086a40 317 " freq offset : %+"PRI_TIMEX" (%+"PRI_TIMEX" ppm)\n",
84e51726 318 tmx.status, tmx.status & STA_UNSYNC ? "unsync" : "sync",
70887c5f 319 tmx.time.tv_sec, tmx.time.tv_usec / NSEC_PER_MSEC,
84e51726
LP
320 tmx.constant,
321 (double)tmx.offset / NSEC_PER_SEC,
66086a40 322 tmx.freq, tmx.freq / 65536);
84e51726
LP
323
324 return 0;
325}
326
327static bool manager_sample_spike_detection(Manager *m, double offset, double delay) {
328 unsigned int i, idx_cur, idx_new, idx_min;
329 double jitter;
330 double j;
331
332 assert(m);
333
334 m->packet_count++;
335
336 /* ignore initial sample */
337 if (m->packet_count == 1)
338 return false;
339
340 /* store the current data in our samples array */
341 idx_cur = m->samples_idx;
342 idx_new = (idx_cur + 1) % ELEMENTSOF(m->samples);
343 m->samples_idx = idx_new;
344 m->samples[idx_new].offset = offset;
345 m->samples[idx_new].delay = delay;
346
347 /* calculate new jitter value from the RMS differences relative to the lowest delay sample */
348 jitter = m->samples_jitter;
349 for (idx_min = idx_cur, i = 0; i < ELEMENTSOF(m->samples); i++)
350 if (m->samples[i].delay > 0 && m->samples[i].delay < m->samples[idx_min].delay)
351 idx_min = i;
352
353 j = 0;
354 for (i = 0; i < ELEMENTSOF(m->samples); i++)
fa66b606 355 j += pow(m->samples[i].offset - m->samples[idx_min].offset, 2);
84e51726
LP
356 m->samples_jitter = sqrt(j / (ELEMENTSOF(m->samples) - 1));
357
358 /* ignore samples when resyncing */
359 if (m->poll_resync)
360 return false;
361
362 /* always accept offset if we are farther off than the round-trip delay */
363 if (fabs(offset) > delay)
364 return false;
365
366 /* we need a few samples before looking at them */
367 if (m->packet_count < 4)
368 return false;
369
370 /* do not accept anything worse than the maximum possible error of the best sample */
371 if (fabs(offset) > m->samples[idx_min].delay)
372 return true;
373
374 /* compare the difference between the current offset to the previous offset and jitter */
375 return fabs(offset - m->samples[idx_cur].offset) > 3 * jitter;
376}
377
378static void manager_adjust_poll(Manager *m, double offset, bool spike) {
379 assert(m);
380
381 if (m->poll_resync) {
a4465d0d 382 m->poll_interval_usec = m->poll_interval_min_usec;
84e51726
LP
383 m->poll_resync = false;
384 return;
385 }
386
387 /* set to minimal poll interval */
388 if (!spike && fabs(offset) > NTP_ACCURACY_SEC) {
a4465d0d 389 m->poll_interval_usec = m->poll_interval_min_usec;
84e51726
LP
390 return;
391 }
392
393 /* increase polling interval */
394 if (fabs(offset) < NTP_ACCURACY_SEC * 0.25) {
a4465d0d 395 if (m->poll_interval_usec < m->poll_interval_max_usec)
84e51726
LP
396 m->poll_interval_usec *= 2;
397 return;
398 }
399
400 /* decrease polling interval */
401 if (spike || fabs(offset) > NTP_ACCURACY_SEC * 0.75) {
a4465d0d 402 if (m->poll_interval_usec > m->poll_interval_min_usec)
84e51726
LP
403 m->poll_interval_usec /= 2;
404 return;
405 }
406}
407
408static int manager_receive_response(sd_event_source *source, int fd, uint32_t revents, void *userdata) {
409 Manager *m = userdata;
410 struct ntp_msg ntpmsg;
411
412 struct iovec iov = {
413 .iov_base = &ntpmsg,
414 .iov_len = sizeof(ntpmsg),
415 };
416 union {
417 struct cmsghdr cmsghdr;
418 uint8_t buf[CMSG_SPACE(sizeof(struct timeval))];
419 } control;
420 union sockaddr_union server_addr;
421 struct msghdr msghdr = {
422 .msg_iov = &iov,
423 .msg_iovlen = 1,
424 .msg_control = &control,
425 .msg_controllen = sizeof(control),
426 .msg_name = &server_addr,
427 .msg_namelen = sizeof(server_addr),
428 };
429 struct cmsghdr *cmsg;
1cc6c93a 430 struct timespec *recv_time = NULL;
84e51726
LP
431 ssize_t len;
432 double origin, receive, trans, dest;
433 double delay, offset;
3af0442c 434 double root_distance;
84e51726
LP
435 bool spike;
436 int leap_sec;
437 int r;
438
439 assert(source);
440 assert(m);
441
442 if (revents & (EPOLLHUP|EPOLLERR)) {
443 log_warning("Server connection returned error.");
444 return manager_connect(m);
445 }
446
a38d9945 447 len = recvmsg(fd, &msghdr, MSG_DONTWAIT);
84e51726
LP
448 if (len < 0) {
449 if (errno == EAGAIN)
450 return 0;
451
452 log_warning("Error receiving message. Disconnecting.");
453 return manager_connect(m);
454 }
455
43fcd650
TM
456 /* Too short or too long packet? */
457 if (iov.iov_len < sizeof(struct ntp_msg) || (msghdr.msg_flags & MSG_TRUNC)) {
84e51726
LP
458 log_warning("Invalid response from server. Disconnecting.");
459 return manager_connect(m);
460 }
461
462 if (!m->current_server_name ||
463 !m->current_server_address ||
464 !sockaddr_equal(&server_addr, &m->current_server_address->sockaddr)) {
465 log_debug("Response from unknown server.");
466 return 0;
467 }
468
2a1288ff 469 CMSG_FOREACH(cmsg, &msghdr) {
84e51726
LP
470 if (cmsg->cmsg_level != SOL_SOCKET)
471 continue;
472
473 switch (cmsg->cmsg_type) {
487a3682
ML
474 case SCM_TIMESTAMPNS:
475 recv_time = (struct timespec *) CMSG_DATA(cmsg);
84e51726
LP
476 break;
477 }
478 }
479 if (!recv_time) {
480 log_error("Invalid packet timestamp.");
481 return -EINVAL;
482 }
483
484 if (!m->pending) {
485 log_debug("Unexpected reply. Ignoring.");
486 return 0;
487 }
488
e8206972
ML
489 m->missed_replies = 0;
490
84e51726
LP
491 /* check our "time cookie" (we just stored nanoseconds in the fraction field) */
492 if (be32toh(ntpmsg.origin_time.sec) != m->trans_time.tv_sec + OFFSET_1900_1970 ||
edd50d5e 493 be32toh(ntpmsg.origin_time.frac) != (unsigned long) m->trans_time.tv_nsec) {
84e51726
LP
494 log_debug("Invalid reply; not our transmit time. Ignoring.");
495 return 0;
496 }
497
498 m->event_timeout = sd_event_source_unref(m->event_timeout);
499
500 if (be32toh(ntpmsg.recv_time.sec) < TIME_EPOCH + OFFSET_1900_1970 ||
501 be32toh(ntpmsg.trans_time.sec) < TIME_EPOCH + OFFSET_1900_1970) {
502 log_debug("Invalid reply, returned times before epoch. Ignoring.");
503 return manager_connect(m);
504 }
505
07610e10
ML
506 if (NTP_FIELD_LEAP(ntpmsg.field) == NTP_LEAP_NOTINSYNC ||
507 ntpmsg.stratum == 0 || ntpmsg.stratum >= 16) {
84e51726
LP
508 log_debug("Server is not synchronized. Disconnecting.");
509 return manager_connect(m);
510 }
511
512 if (!IN_SET(NTP_FIELD_VERSION(ntpmsg.field), 3, 4)) {
513 log_debug("Response NTPv%d. Disconnecting.", NTP_FIELD_VERSION(ntpmsg.field));
514 return manager_connect(m);
515 }
516
517 if (NTP_FIELD_MODE(ntpmsg.field) != NTP_MODE_SERVER) {
518 log_debug("Unsupported mode %d. Disconnecting.", NTP_FIELD_MODE(ntpmsg.field));
519 return manager_connect(m);
520 }
521
3af0442c 522 root_distance = ntp_ts_short_to_d(&ntpmsg.root_delay) / 2 + ntp_ts_short_to_d(&ntpmsg.root_dispersion);
f907cc16 523 if (root_distance > (double) m->max_root_distance_usec / (double) USEC_PER_SEC) {
3af0442c
ML
524 log_debug("Server has too large root distance. Disconnecting.");
525 return manager_connect(m);
526 }
527
84e51726
LP
528 /* valid packet */
529 m->pending = false;
ab4df227 530 m->retry_interval = 0;
84e51726 531
7b628891 532 /* Stop listening */
f89c4e15 533 manager_listen_stop(m);
7b628891 534
84e51726
LP
535 /* announce leap seconds */
536 if (NTP_FIELD_LEAP(ntpmsg.field) & NTP_LEAP_PLUSSEC)
537 leap_sec = 1;
538 else if (NTP_FIELD_LEAP(ntpmsg.field) & NTP_LEAP_MINUSSEC)
539 leap_sec = -1;
540 else
541 leap_sec = 0;
542
543 /*
544 * "Timestamp Name ID When Generated
545 * ------------------------------------------------------------
546 * Originate Timestamp T1 time request sent by client
547 * Receive Timestamp T2 time request received by server
548 * Transmit Timestamp T3 time reply sent by server
549 * Destination Timestamp T4 time reply received by client
550 *
551 * The round-trip delay, d, and system clock offset, t, are defined as:
552 * d = (T4 - T1) - (T3 - T2) t = ((T2 - T1) + (T3 - T4)) / 2"
553 */
73c76e63 554 origin = ts_to_d(&m->trans_time) + OFFSET_1900_1970;
84e51726
LP
555 receive = ntp_ts_to_d(&ntpmsg.recv_time);
556 trans = ntp_ts_to_d(&ntpmsg.trans_time);
487a3682 557 dest = ts_to_d(recv_time) + OFFSET_1900_1970;
84e51726
LP
558
559 offset = ((receive - origin) + (trans - dest)) / 2;
560 delay = (dest - origin) - (trans - receive);
561
562 spike = manager_sample_spike_detection(m, offset, delay);
563
564 manager_adjust_poll(m, offset, spike);
565
566 log_debug("NTP response:\n"
567 " leap : %u\n"
568 " version : %u\n"
569 " mode : %u\n"
570 " stratum : %u\n"
571 " precision : %.6f sec (%d)\n"
3af0442c 572 " root distance: %.6f sec\n"
84e51726
LP
573 " reference : %.4s\n"
574 " origin : %.3f\n"
575 " receive : %.3f\n"
576 " transmit : %.3f\n"
577 " dest : %.3f\n"
578 " offset : %+.3f sec\n"
579 " delay : %+.3f sec\n"
580 " packet count : %"PRIu64"\n"
581 " jitter : %.3f%s\n"
582 " poll interval: " USEC_FMT "\n",
583 NTP_FIELD_LEAP(ntpmsg.field),
584 NTP_FIELD_VERSION(ntpmsg.field),
585 NTP_FIELD_MODE(ntpmsg.field),
586 ntpmsg.stratum,
587 exp2(ntpmsg.precision), ntpmsg.precision,
3af0442c 588 root_distance,
84e51726
LP
589 ntpmsg.stratum == 1 ? ntpmsg.refid : "n/a",
590 origin - OFFSET_1900_1970,
591 receive - OFFSET_1900_1970,
592 trans - OFFSET_1900_1970,
593 dest - OFFSET_1900_1970,
594 offset, delay,
595 m->packet_count,
596 m->samples_jitter, spike ? " spike" : "",
597 m->poll_interval_usec / USEC_PER_SEC);
598
599 if (!spike) {
600 m->sync = true;
601 r = manager_adjust_clock(m, offset, leap_sec);
602 if (r < 0)
6ff6f4d8 603 log_error_errno(r, "Failed to call clock_adjtime(): %m");
84e51726
LP
604 }
605
66086a40
YW
606 /* Save NTP response */
607 m->ntpmsg = ntpmsg;
608 m->origin_time = m->trans_time;
609 m->dest_time = *recv_time;
610 m->spike = spike;
611
612 log_debug("interval/delta/delay/jitter/drift " USEC_FMT "s/%+.3fs/%.3fs/%.3fs/%+"PRI_TIMEX"ppm%s",
613 m->poll_interval_usec / USEC_PER_SEC, offset, delay, m->samples_jitter, m->drift_freq / 65536,
7b5b3fc3 614 spike ? " (ignored)" : "");
84e51726 615
66086a40
YW
616 (void) sd_bus_emit_properties_changed(m->bus, "/org/freedesktop/timesync1", "org.freedesktop.timesync1.Manager", "NTPMessage", NULL);
617
481b3f9e
LP
618 if (!m->good) {
619 _cleanup_free_ char *pretty = NULL;
620
621 m->good = true;
622
623 server_address_pretty(m->current_server_address, &pretty);
624 log_info("Synchronized to time server %s (%s).", strna(pretty), m->current_server_name->string);
625 sd_notifyf(false, "STATUS=Synchronized to time server %s (%s).", strna(pretty), m->current_server_name->string);
626 }
627
84e51726 628 r = manager_arm_timer(m, m->poll_interval_usec);
f647962d
MS
629 if (r < 0)
630 return log_error_errno(r, "Failed to rearm timer: %m");
84e51726
LP
631
632 return 0;
633}
634
635static int manager_listen_setup(Manager *m) {
636 union sockaddr_union addr = {};
637 static const int tos = IPTOS_LOWDELAY;
638 static const int on = 1;
639 int r;
640
641 assert(m);
642
f89c4e15
LP
643 if (m->server_socket >= 0)
644 return 0;
645
84e51726
LP
646 assert(!m->event_receive);
647 assert(m->current_server_address);
648
649 addr.sa.sa_family = m->current_server_address->sockaddr.sa.sa_family;
650
651 m->server_socket = socket(addr.sa.sa_family, SOCK_DGRAM | SOCK_CLOEXEC, 0);
652 if (m->server_socket < 0)
653 return -errno;
654
655 r = bind(m->server_socket, &addr.sa, m->current_server_address->socklen);
656 if (r < 0)
657 return -errno;
658
487a3682 659 r = setsockopt(m->server_socket, SOL_SOCKET, SO_TIMESTAMPNS, &on, sizeof(on));
84e51726
LP
660 if (r < 0)
661 return -errno;
662
69f00817 663 (void) setsockopt(m->server_socket, IPPROTO_IP, IP_TOS, &tos, sizeof(tos));
84e51726
LP
664
665 return sd_event_add_io(m->event, &m->event_receive, m->server_socket, EPOLLIN, manager_receive_response, m);
666}
667
f89c4e15
LP
668static void manager_listen_stop(Manager *m) {
669 assert(m);
670
671 m->event_receive = sd_event_source_unref(m->event_receive);
672 m->server_socket = safe_close(m->server_socket);
673}
674
84e51726
LP
675static int manager_begin(Manager *m) {
676 _cleanup_free_ char *pretty = NULL;
677 int r;
678
679 assert(m);
680 assert_return(m->current_server_name, -EHOSTUNREACH);
681 assert_return(m->current_server_address, -EHOSTUNREACH);
682
481b3f9e 683 m->good = false;
e8206972 684 m->missed_replies = NTP_MAX_MISSED_REPLIES;
80cd2606 685 if (m->poll_interval_usec == 0)
a4465d0d 686 m->poll_interval_usec = m->poll_interval_min_usec;
84e51726
LP
687
688 server_address_pretty(m->current_server_address, &pretty);
481b3f9e
LP
689 log_debug("Connecting to time server %s (%s).", strna(pretty), m->current_server_name->string);
690 sd_notifyf(false, "STATUS=Connecting to time server %s (%s).", strna(pretty), m->current_server_name->string);
84e51726 691
84e51726
LP
692 r = manager_clock_watch_setup(m);
693 if (r < 0)
694 return r;
695
696 return manager_send_request(m);
697}
698
874ff7bf
LP
699void manager_set_server_name(Manager *m, ServerName *n) {
700 assert(m);
84e51726 701
874ff7bf
LP
702 if (m->current_server_name == n)
703 return;
84e51726 704
874ff7bf
LP
705 m->current_server_name = n;
706 m->current_server_address = NULL;
707
708 manager_disconnect(m);
84e51726 709
874ff7bf
LP
710 if (n)
711 log_debug("Selected server %s.", n->string);
712}
84e51726 713
874ff7bf 714void manager_set_server_address(Manager *m, ServerAddress *a) {
84e51726
LP
715 assert(m);
716
874ff7bf
LP
717 if (m->current_server_address == a)
718 return;
719
874ff7bf 720 m->current_server_address = a;
20f8d3cf
SN
721 /* If a is NULL, we are just clearing the address, without
722 * changing the name. Keep the existing name in that case. */
723 if (a)
724 m->current_server_name = a->name;
874ff7bf
LP
725
726 manager_disconnect(m);
727
728 if (a) {
729 _cleanup_free_ char *pretty = NULL;
730 server_address_pretty(a, &pretty);
731 log_debug("Selected address %s of server %s.", strna(pretty), a->name->string);
84e51726
LP
732 }
733}
734
735static int manager_resolve_handler(sd_resolve_query *q, int ret, const struct addrinfo *ai, void *userdata) {
736 Manager *m = userdata;
874ff7bf 737 int r;
84e51726
LP
738
739 assert(q);
740 assert(m);
741 assert(m->current_server_name);
742
743 m->resolve_query = sd_resolve_query_unref(m->resolve_query);
744
745 if (ret != 0) {
746 log_debug("Failed to resolve %s: %s", m->current_server_name->string, gai_strerror(ret));
747
748 /* Try next host */
749 return manager_connect(m);
750 }
751
84e51726
LP
752 for (; ai; ai = ai->ai_next) {
753 _cleanup_free_ char *pretty = NULL;
874ff7bf 754 ServerAddress *a;
84e51726
LP
755
756 assert(ai->ai_addr);
757 assert(ai->ai_addrlen >= offsetof(struct sockaddr, sa_data));
84e51726
LP
758
759 if (!IN_SET(ai->ai_addr->sa_family, AF_INET, AF_INET6)) {
760 log_warning("Unsuitable address protocol for %s", m->current_server_name->string);
761 continue;
762 }
763
874ff7bf 764 r = server_address_new(m->current_server_name, &a, (const union sockaddr_union*) ai->ai_addr, ai->ai_addrlen);
f647962d
MS
765 if (r < 0)
766 return log_error_errno(r, "Failed to add server address: %m");
84e51726 767
874ff7bf 768 server_address_pretty(a, &pretty);
84e51726
LP
769 log_debug("Resolved address %s for %s.", pretty, m->current_server_name->string);
770 }
771
772 if (!m->current_server_name->addresses) {
773 log_error("Failed to find suitable address for host %s.", m->current_server_name->string);
774
775 /* Try next host */
776 return manager_connect(m);
777 }
778
874ff7bf 779 manager_set_server_address(m, m->current_server_name->addresses);
84e51726
LP
780
781 return manager_begin(m);
782}
783
874ff7bf 784static int manager_retry_connect(sd_event_source *source, usec_t usec, void *userdata) {
84e51726
LP
785 Manager *m = userdata;
786
787 assert(m);
788
789 return manager_connect(m);
790}
791
792int manager_connect(Manager *m) {
84e51726
LP
793 int r;
794
795 assert(m);
796
797 manager_disconnect(m);
798
799 m->event_retry = sd_event_source_unref(m->event_retry);
7994ac1d 800 if (!ratelimit_below(&m->ratelimit)) {
84e51726
LP
801 log_debug("Slowing down attempts to contact servers.");
802
874ff7bf 803 r = sd_event_add_time(m->event, &m->event_retry, clock_boottime_or_monotonic(), now(clock_boottime_or_monotonic()) + RETRY_USEC, 0, manager_retry_connect, m);
f647962d
MS
804 if (r < 0)
805 return log_error_errno(r, "Failed to create retry timer: %m");
84e51726
LP
806
807 return 0;
808 }
809
810 /* If we already are operating on some address, switch to the
811 * next one. */
812 if (m->current_server_address && m->current_server_address->addresses_next)
874ff7bf 813 manager_set_server_address(m, m->current_server_address->addresses_next);
84e51726 814 else {
874ff7bf
LP
815 struct addrinfo hints = {
816 .ai_flags = AI_NUMERICSERV|AI_ADDRCONFIG,
817 .ai_socktype = SOCK_DGRAM,
818 };
84e51726 819
874ff7bf 820 /* Hmm, we are through all addresses, let's look for the next host instead */
84e51726 821 if (m->current_server_name && m->current_server_name->names_next)
874ff7bf 822 manager_set_server_name(m, m->current_server_name->names_next);
84e51726 823 else {
874ff7bf 824 ServerName *f;
63463bf0 825 bool restart = true;
874ff7bf
LP
826
827 /* Our current server name list is exhausted,
828 * let's find the next one to iterate. First
829 * we try the system list, then the link list.
830 * After having processed the link list we
831 * jump back to the system list. However, if
832 * both lists are empty, we change to the
833 * fallback list. */
834 if (!m->current_server_name || m->current_server_name->type == SERVER_LINK) {
835 f = m->system_servers;
836 if (!f)
837 f = m->link_servers;
838 } else {
839 f = m->link_servers;
840 if (!f)
841 f = m->system_servers;
63463bf0
ML
842 else
843 restart = false;
874ff7bf
LP
844 }
845
846 if (!f)
847 f = m->fallback_servers;
848
849 if (!f) {
850 manager_set_server_name(m, NULL);
84e51726
LP
851 log_debug("No server found.");
852 return 0;
853 }
854
63463bf0
ML
855 if (restart && !m->exhausted_servers && m->poll_interval_usec) {
856 log_debug("Waiting after exhausting servers.");
857 r = sd_event_add_time(m->event, &m->event_retry, clock_boottime_or_monotonic(), now(clock_boottime_or_monotonic()) + m->poll_interval_usec, 0, manager_retry_connect, m);
f647962d
MS
858 if (r < 0)
859 return log_error_errno(r, "Failed to create retry timer: %m");
63463bf0
ML
860
861 m->exhausted_servers = true;
862
863 /* Increase the polling interval */
a4465d0d 864 if (m->poll_interval_usec < m->poll_interval_max_usec)
63463bf0
ML
865 m->poll_interval_usec *= 2;
866
867 return 0;
868 }
869
870 m->exhausted_servers = false;
871
874ff7bf 872 manager_set_server_name(m, f);
84e51726
LP
873 }
874
875 /* Tell the resolver to reread /etc/resolv.conf, in
876 * case it changed. */
877 res_init();
878
874ff7bf
LP
879 /* Flush out any previously resolved addresses */
880 server_name_flush_addresses(m->current_server_name);
881
882 log_debug("Resolving %s...", m->current_server_name->string);
883
84e51726 884 r = sd_resolve_getaddrinfo(m->resolve, &m->resolve_query, m->current_server_name->string, "123", &hints, manager_resolve_handler, m);
f647962d
MS
885 if (r < 0)
886 return log_error_errno(r, "Failed to create resolver: %m");
84e51726
LP
887
888 return 1;
889 }
890
891 r = manager_begin(m);
892 if (r < 0)
893 return r;
894
895 return 1;
896}
897
84e51726
LP
898void manager_disconnect(Manager *m) {
899 assert(m);
900
901 m->resolve_query = sd_resolve_query_unref(m->resolve_query);
902
903 m->event_timer = sd_event_source_unref(m->event_timer);
904
f89c4e15 905 manager_listen_stop(m);
84e51726
LP
906
907 m->event_clock_watch = sd_event_source_unref(m->event_clock_watch);
908 m->clock_watch_fd = safe_close(m->clock_watch_fd);
909
910 m->event_timeout = sd_event_source_unref(m->event_timeout);
911
912 sd_notifyf(false, "STATUS=Idle.");
913}
914
874ff7bf
LP
915void manager_flush_server_names(Manager *m, ServerType t) {
916 assert(m);
917
918 if (t == SERVER_SYSTEM)
919 while (m->system_servers)
920 server_name_free(m->system_servers);
921
922 if (t == SERVER_LINK)
923 while (m->link_servers)
924 server_name_free(m->link_servers);
925
926 if (t == SERVER_FALLBACK)
927 while (m->fallback_servers)
928 server_name_free(m->fallback_servers);
929}
84e51726
LP
930
931void manager_free(Manager *m) {
932 if (!m)
933 return;
934
935 manager_disconnect(m);
874ff7bf
LP
936 manager_flush_server_names(m, SERVER_SYSTEM);
937 manager_flush_server_names(m, SERVER_LINK);
938 manager_flush_server_names(m, SERVER_FALLBACK);
84e51726
LP
939
940 sd_event_source_unref(m->event_retry);
941
942 sd_event_source_unref(m->network_event_source);
943 sd_network_monitor_unref(m->network_monitor);
944
945 sd_resolve_unref(m->resolve);
946 sd_event_unref(m->event);
947
e7dd3947
YW
948 sd_bus_unref(m->bus);
949
84e51726
LP
950 free(m);
951}
952
874ff7bf
LP
953static int manager_network_read_link_servers(Manager *m) {
954 _cleanup_strv_free_ char **ntp = NULL;
955 ServerName *n, *nx;
956 char **i;
3e85ec07 957 bool changed = false;
874ff7bf
LP
958 int r;
959
84e51726
LP
960 assert(m);
961
874ff7bf 962 r = sd_network_get_ntp(&ntp);
ba0c011e
YW
963 if (r < 0) {
964 if (r == -ENOMEM)
965 log_oom();
966 else
967 log_debug_errno(r, "Failed to get link NTP servers: %m");
874ff7bf 968 goto clear;
ba0c011e 969 }
874ff7bf
LP
970
971 LIST_FOREACH(names, n, m->link_servers)
972 n->marked = true;
973
974 STRV_FOREACH(i, ntp) {
975 bool found = false;
976
dcb37458
YW
977 r = dns_name_is_valid_or_address(*i);
978 if (r < 0) {
979 log_error_errno(r, "Failed to check validity of NTP server name or address '%s': %m", *i);
980 goto clear;
981 } else if (r == 0) {
982 log_error("Invalid NTP server name or address, ignoring: %s", *i);
983 continue;
984 }
985
874ff7bf
LP
986 LIST_FOREACH(names, n, m->link_servers)
987 if (streq(n->string, *i)) {
988 n->marked = false;
989 found = true;
990 break;
991 }
992
993 if (!found) {
994 r = server_name_new(m, NULL, SERVER_LINK, *i);
ba0c011e
YW
995 if (r < 0) {
996 log_oom();
874ff7bf 997 goto clear;
ba0c011e 998 }
3e85ec07
YW
999
1000 changed = true;
874ff7bf
LP
1001 }
1002 }
1003
1004 LIST_FOREACH_SAFE(names, n, nx, m->link_servers)
3e85ec07 1005 if (n->marked) {
874ff7bf 1006 server_name_free(n);
3e85ec07
YW
1007 changed = true;
1008 }
874ff7bf 1009
3e85ec07 1010 return changed;
874ff7bf
LP
1011
1012clear:
1013 manager_flush_server_names(m, SERVER_LINK);
1014 return r;
84e51726
LP
1015}
1016
0630eb1b
YW
1017static bool manager_is_connected(Manager *m) {
1018 /* Return true when the manager is sending a request, resolving a server name, or
1019 * in a poll interval. */
1020 return m->server_socket >= 0 || m->resolve_query || m->event_timer;
1021}
1022
84e51726
LP
1023static int manager_network_event_handler(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
1024 Manager *m = userdata;
3e85ec07 1025 bool changed, connected, online;
84e51726
LP
1026 int r;
1027
1028 assert(m);
1029
1030 sd_network_monitor_flush(m->network_monitor);
1031
ba0c011e 1032 /* When manager_network_read_link_servers() failed, we assume that the servers are changed. */
3e85ec07 1033 changed = !!manager_network_read_link_servers(m);
874ff7bf 1034
84e51726
LP
1035 /* check if the machine is online */
1036 online = network_is_online();
1037
1038 /* check if the client is currently connected */
0630eb1b 1039 connected = manager_is_connected(m);
84e51726
LP
1040
1041 if (connected && !online) {
1042 log_info("No network connectivity, watching for changes.");
1043 manager_disconnect(m);
1044
0630eb1b 1045 } else if ((!connected || changed) && online) {
84e51726
LP
1046 log_info("Network configuration changed, trying to establish connection.");
1047
1048 if (m->current_server_address)
1049 r = manager_begin(m);
1050 else
1051 r = manager_connect(m);
1052 if (r < 0)
1053 return r;
1054 }
1055
1056 return 0;
1057}
1058
1059static int manager_network_monitor_listen(Manager *m) {
1060 int r, fd, events;
1061
1062 assert(m);
1063
1064 r = sd_network_monitor_new(&m->network_monitor, NULL);
36484c03 1065 if (r == -ENOENT) {
f95b0be7 1066 log_info("systemd does not appear to be running, not listening for systemd-networkd events.");
36484c03
ZJS
1067 return 0;
1068 }
84e51726
LP
1069 if (r < 0)
1070 return r;
1071
1072 fd = sd_network_monitor_get_fd(m->network_monitor);
1073 if (fd < 0)
1074 return fd;
1075
1076 events = sd_network_monitor_get_events(m->network_monitor);
1077 if (events < 0)
1078 return events;
1079
1080 r = sd_event_add_io(m->event, &m->network_event_source, fd, events, manager_network_event_handler, m);
1081 if (r < 0)
1082 return r;
1083
1084 return 0;
1085}
1086
1087int manager_new(Manager **ret) {
1088 _cleanup_(manager_freep) Manager *m = NULL;
1089 int r;
1090
1091 assert(ret);
1092
1093 m = new0(Manager, 1);
1094 if (!m)
1095 return -ENOMEM;
1096
f907cc16 1097 m->max_root_distance_usec = NTP_MAX_ROOT_DISTANCE;
a4465d0d
YW
1098 m->poll_interval_min_usec = NTP_POLL_INTERVAL_MIN_USEC;
1099 m->poll_interval_max_usec = NTP_POLL_INTERVAL_MAX_USEC;
f907cc16 1100
84e51726
LP
1101 m->server_socket = m->clock_watch_fd = -1;
1102
1103 RATELIMIT_INIT(m->ratelimit, RATELIMIT_INTERVAL_USEC, RATELIMIT_BURST);
1104
84e51726
LP
1105 r = sd_event_default(&m->event);
1106 if (r < 0)
1107 return r;
1108
1109 sd_event_add_signal(m->event, NULL, SIGTERM, NULL, NULL);
1110 sd_event_add_signal(m->event, NULL, SIGINT, NULL, NULL);
1111
1112 sd_event_set_watchdog(m->event, true);
1113
1114 r = sd_resolve_default(&m->resolve);
1115 if (r < 0)
1116 return r;
1117
1118 r = sd_resolve_attach_event(m->resolve, m->event, 0);
1119 if (r < 0)
1120 return r;
1121
1122 r = manager_network_monitor_listen(m);
1123 if (r < 0)
1124 return r;
1125
ba0c011e 1126 (void) manager_network_read_link_servers(m);
874ff7bf 1127
1cc6c93a 1128 *ret = TAKE_PTR(m);
84e51726
LP
1129
1130 return 0;
1131}