]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/timesync/timesyncd-manager.c
Merge pull request #8824 from keszybz/analyze-show-config
[thirdparty/systemd.git] / src / timesync / timesyncd-manager.c
1 /* SPDX-License-Identifier: LGPL-2.1+ */
2 /***
3 This file is part of systemd.
4
5 Copyright 2014 Kay Sievers, Lennart Poettering
6 ***/
7
8 #include <errno.h>
9 #include <math.h>
10 #include <netinet/in.h>
11 #include <netinet/ip.h>
12 #include <resolv.h>
13 #include <stdlib.h>
14 #include <sys/socket.h>
15 #include <sys/timerfd.h>
16 #include <sys/timex.h>
17 #include <sys/types.h>
18 #include <time.h>
19
20 #include "sd-daemon.h"
21
22 #include "alloc-util.h"
23 #include "fd-util.h"
24 #include "fs-util.h"
25 #include "list.h"
26 #include "log.h"
27 #include "missing.h"
28 #include "network-util.h"
29 #include "ratelimit.h"
30 #include "socket-util.h"
31 #include "string-util.h"
32 #include "strv.h"
33 #include "time-util.h"
34 #include "timesyncd-conf.h"
35 #include "timesyncd-manager.h"
36 #include "util.h"
37
38 #ifndef ADJ_SETOFFSET
39 #define ADJ_SETOFFSET 0x0100 /* add 'time' to current time */
40 #endif
41
42 /* expected accuracy of time synchronization; used to adjust the poll interval */
43 #define NTP_ACCURACY_SEC 0.2
44
45 /*
46 * Maximum delta in seconds which the system clock is gradually adjusted
47 * (slewed) to approach the network time. Deltas larger that this are set by
48 * letting the system time jump. The kernel's limit for adjtime is 0.5s.
49 */
50 #define NTP_MAX_ADJUST 0.4
51
52 /* Default of maximum acceptable root distance in microseconds. */
53 #define NTP_MAX_ROOT_DISTANCE (5 * USEC_PER_SEC)
54
55 /* Maximum number of missed replies before selecting another source. */
56 #define NTP_MAX_MISSED_REPLIES 2
57
58 #define RETRY_USEC (30*USEC_PER_SEC)
59 #define RATELIMIT_INTERVAL_USEC (10*USEC_PER_SEC)
60 #define RATELIMIT_BURST 10
61
62 #define TIMEOUT_USEC (10*USEC_PER_SEC)
63
64 static int manager_arm_timer(Manager *m, usec_t next);
65 static int manager_clock_watch_setup(Manager *m);
66 static int manager_listen_setup(Manager *m);
67 static void manager_listen_stop(Manager *m);
68
69 static double ntp_ts_short_to_d(const struct ntp_ts_short *ts) {
70 return be16toh(ts->sec) + (be16toh(ts->frac) / 65536.0);
71 }
72
73 static double ntp_ts_to_d(const struct ntp_ts *ts) {
74 return be32toh(ts->sec) + ((double)be32toh(ts->frac) / UINT_MAX);
75 }
76
77 static double ts_to_d(const struct timespec *ts) {
78 return ts->tv_sec + (1.0e-9 * ts->tv_nsec);
79 }
80
81 static int manager_timeout(sd_event_source *source, usec_t usec, void *userdata) {
82 _cleanup_free_ char *pretty = NULL;
83 Manager *m = userdata;
84
85 assert(m);
86 assert(m->current_server_name);
87 assert(m->current_server_address);
88
89 server_address_pretty(m->current_server_address, &pretty);
90 log_info("Timed out waiting for reply from %s (%s).", strna(pretty), m->current_server_name->string);
91
92 return manager_connect(m);
93 }
94
95 static int manager_send_request(Manager *m) {
96 _cleanup_free_ char *pretty = NULL;
97 struct ntp_msg ntpmsg = {
98 /*
99 * "The client initializes the NTP message header, sends the request
100 * to the server, and strips the time of day from the Transmit
101 * Timestamp field of the reply. For this purpose, all the NTP
102 * header fields are set to 0, except the Mode, VN, and optional
103 * Transmit Timestamp fields."
104 */
105 .field = NTP_FIELD(0, 4, NTP_MODE_CLIENT),
106 };
107 ssize_t len;
108 int r;
109
110 assert(m);
111 assert(m->current_server_name);
112 assert(m->current_server_address);
113
114 m->event_timeout = sd_event_source_unref(m->event_timeout);
115
116 r = manager_listen_setup(m);
117 if (r < 0)
118 return log_warning_errno(r, "Failed to setup connection socket: %m");
119
120 /*
121 * Set transmit timestamp, remember it; the server will send that back
122 * as the origin timestamp and we have an indication that this is the
123 * matching answer to our request.
124 *
125 * The actual value does not matter, We do not care about the correct
126 * NTP UINT_MAX fraction; we just pass the plain nanosecond value.
127 */
128 assert_se(clock_gettime(clock_boottime_or_monotonic(), &m->trans_time_mon) >= 0);
129 assert_se(clock_gettime(CLOCK_REALTIME, &m->trans_time) >= 0);
130 ntpmsg.trans_time.sec = htobe32(m->trans_time.tv_sec + OFFSET_1900_1970);
131 ntpmsg.trans_time.frac = htobe32(m->trans_time.tv_nsec);
132
133 server_address_pretty(m->current_server_address, &pretty);
134
135 len = sendto(m->server_socket, &ntpmsg, sizeof(ntpmsg), MSG_DONTWAIT, &m->current_server_address->sockaddr.sa, m->current_server_address->socklen);
136 if (len == sizeof(ntpmsg)) {
137 m->pending = true;
138 log_debug("Sent NTP request to %s (%s).", strna(pretty), m->current_server_name->string);
139 } else {
140 log_debug_errno(errno, "Sending NTP request to %s (%s) failed: %m", strna(pretty), m->current_server_name->string);
141 return manager_connect(m);
142 }
143
144 /* re-arm timer with increasing timeout, in case the packets never arrive back */
145 if (m->retry_interval > 0) {
146 if (m->retry_interval < m->poll_interval_max_usec)
147 m->retry_interval *= 2;
148 } else
149 m->retry_interval = m->poll_interval_min_usec;
150
151 r = manager_arm_timer(m, m->retry_interval);
152 if (r < 0)
153 return log_error_errno(r, "Failed to rearm timer: %m");
154
155 m->missed_replies++;
156 if (m->missed_replies > NTP_MAX_MISSED_REPLIES) {
157 r = sd_event_add_time(
158 m->event,
159 &m->event_timeout,
160 clock_boottime_or_monotonic(),
161 now(clock_boottime_or_monotonic()) + TIMEOUT_USEC, 0,
162 manager_timeout, m);
163 if (r < 0)
164 return log_error_errno(r, "Failed to arm timeout timer: %m");
165 }
166
167 return 0;
168 }
169
170 static int manager_timer(sd_event_source *source, usec_t usec, void *userdata) {
171 Manager *m = userdata;
172
173 assert(m);
174
175 return manager_send_request(m);
176 }
177
178 static int manager_arm_timer(Manager *m, usec_t next) {
179 int r;
180
181 assert(m);
182
183 if (next == 0) {
184 m->event_timer = sd_event_source_unref(m->event_timer);
185 return 0;
186 }
187
188 if (m->event_timer) {
189 r = sd_event_source_set_time(m->event_timer, now(clock_boottime_or_monotonic()) + next);
190 if (r < 0)
191 return r;
192
193 return sd_event_source_set_enabled(m->event_timer, SD_EVENT_ONESHOT);
194 }
195
196 return sd_event_add_time(
197 m->event,
198 &m->event_timer,
199 clock_boottime_or_monotonic(),
200 now(clock_boottime_or_monotonic()) + next, 0,
201 manager_timer, m);
202 }
203
204 static int manager_clock_watch(sd_event_source *source, int fd, uint32_t revents, void *userdata) {
205 Manager *m = userdata;
206
207 assert(m);
208
209 /* rearm timer */
210 manager_clock_watch_setup(m);
211
212 /* skip our own jumps */
213 if (m->jumped) {
214 m->jumped = false;
215 return 0;
216 }
217
218 /* resync */
219 log_debug("System time changed. Resyncing.");
220 m->poll_resync = true;
221
222 return manager_send_request(m);
223 }
224
225 /* wake up when the system time changes underneath us */
226 static int manager_clock_watch_setup(Manager *m) {
227
228 struct itimerspec its = {
229 .it_value.tv_sec = TIME_T_MAX
230 };
231
232 int r;
233
234 assert(m);
235
236 m->event_clock_watch = sd_event_source_unref(m->event_clock_watch);
237 safe_close(m->clock_watch_fd);
238
239 m->clock_watch_fd = timerfd_create(CLOCK_REALTIME, TFD_NONBLOCK|TFD_CLOEXEC);
240 if (m->clock_watch_fd < 0)
241 return log_error_errno(errno, "Failed to create timerfd: %m");
242
243 if (timerfd_settime(m->clock_watch_fd, TFD_TIMER_ABSTIME|TFD_TIMER_CANCEL_ON_SET, &its, NULL) < 0)
244 return log_error_errno(errno, "Failed to set up timerfd: %m");
245
246 r = sd_event_add_io(m->event, &m->event_clock_watch, m->clock_watch_fd, EPOLLIN, manager_clock_watch, m);
247 if (r < 0)
248 return log_error_errno(r, "Failed to create clock watch event source: %m");
249
250 return 0;
251 }
252
253 static int manager_adjust_clock(Manager *m, double offset, int leap_sec) {
254 struct timex tmx = {};
255 int r;
256
257 assert(m);
258
259 /*
260 * For small deltas, tell the kernel to gradually adjust the system
261 * clock to the NTP time, larger deltas are just directly set.
262 */
263 if (fabs(offset) < NTP_MAX_ADJUST) {
264 tmx.modes = ADJ_STATUS | ADJ_NANO | ADJ_OFFSET | ADJ_TIMECONST | ADJ_MAXERROR | ADJ_ESTERROR;
265 tmx.status = STA_PLL;
266 tmx.offset = offset * NSEC_PER_SEC;
267 tmx.constant = log2i(m->poll_interval_usec / USEC_PER_SEC) - 4;
268 tmx.maxerror = 0;
269 tmx.esterror = 0;
270 log_debug(" adjust (slew): %+.3f sec", offset);
271 } else {
272 tmx.modes = ADJ_STATUS | ADJ_NANO | ADJ_SETOFFSET | ADJ_MAXERROR | ADJ_ESTERROR;
273
274 /* ADJ_NANO uses nanoseconds in the microseconds field */
275 tmx.time.tv_sec = (long)offset;
276 tmx.time.tv_usec = (offset - tmx.time.tv_sec) * NSEC_PER_SEC;
277 tmx.maxerror = 0;
278 tmx.esterror = 0;
279
280 /* the kernel expects -0.3s as {-1, 7000.000.000} */
281 if (tmx.time.tv_usec < 0) {
282 tmx.time.tv_sec -= 1;
283 tmx.time.tv_usec += NSEC_PER_SEC;
284 }
285
286 m->jumped = true;
287 log_debug(" adjust (jump): %+.3f sec", offset);
288 }
289
290 /*
291 * An unset STA_UNSYNC will enable the kernel's 11-minute mode,
292 * which syncs the system time periodically to the RTC.
293 *
294 * In case the RTC runs in local time, never touch the RTC,
295 * we have no way to properly handle daylight saving changes and
296 * mobile devices moving between time zones.
297 */
298 if (m->rtc_local_time)
299 tmx.status |= STA_UNSYNC;
300
301 switch (leap_sec) {
302 case 1:
303 tmx.status |= STA_INS;
304 break;
305 case -1:
306 tmx.status |= STA_DEL;
307 break;
308 }
309
310 r = clock_adjtime(CLOCK_REALTIME, &tmx);
311 if (r < 0)
312 return -errno;
313
314 /* If touch fails, there isn't much we can do. Maybe it'll work next time. */
315 (void) touch("/var/lib/systemd/timesync/clock");
316 (void) touch("/run/systemd/timesync/synchronized");
317
318 m->drift_freq = tmx.freq;
319
320 log_debug(" status : %04i %s\n"
321 " time now : %"PRI_TIME".%03"PRI_USEC"\n"
322 " constant : %"PRI_TIMEX"\n"
323 " offset : %+.3f sec\n"
324 " freq offset : %+"PRI_TIMEX" (%+"PRI_TIMEX" ppm)\n",
325 tmx.status, tmx.status & STA_UNSYNC ? "unsync" : "sync",
326 tmx.time.tv_sec, tmx.time.tv_usec / NSEC_PER_MSEC,
327 tmx.constant,
328 (double)tmx.offset / NSEC_PER_SEC,
329 tmx.freq, tmx.freq / 65536);
330
331 return 0;
332 }
333
334 static bool manager_sample_spike_detection(Manager *m, double offset, double delay) {
335 unsigned int i, idx_cur, idx_new, idx_min;
336 double jitter;
337 double j;
338
339 assert(m);
340
341 m->packet_count++;
342
343 /* ignore initial sample */
344 if (m->packet_count == 1)
345 return false;
346
347 /* store the current data in our samples array */
348 idx_cur = m->samples_idx;
349 idx_new = (idx_cur + 1) % ELEMENTSOF(m->samples);
350 m->samples_idx = idx_new;
351 m->samples[idx_new].offset = offset;
352 m->samples[idx_new].delay = delay;
353
354 /* calculate new jitter value from the RMS differences relative to the lowest delay sample */
355 jitter = m->samples_jitter;
356 for (idx_min = idx_cur, i = 0; i < ELEMENTSOF(m->samples); i++)
357 if (m->samples[i].delay > 0 && m->samples[i].delay < m->samples[idx_min].delay)
358 idx_min = i;
359
360 j = 0;
361 for (i = 0; i < ELEMENTSOF(m->samples); i++)
362 j += pow(m->samples[i].offset - m->samples[idx_min].offset, 2);
363 m->samples_jitter = sqrt(j / (ELEMENTSOF(m->samples) - 1));
364
365 /* ignore samples when resyncing */
366 if (m->poll_resync)
367 return false;
368
369 /* always accept offset if we are farther off than the round-trip delay */
370 if (fabs(offset) > delay)
371 return false;
372
373 /* we need a few samples before looking at them */
374 if (m->packet_count < 4)
375 return false;
376
377 /* do not accept anything worse than the maximum possible error of the best sample */
378 if (fabs(offset) > m->samples[idx_min].delay)
379 return true;
380
381 /* compare the difference between the current offset to the previous offset and jitter */
382 return fabs(offset - m->samples[idx_cur].offset) > 3 * jitter;
383 }
384
385 static void manager_adjust_poll(Manager *m, double offset, bool spike) {
386 assert(m);
387
388 if (m->poll_resync) {
389 m->poll_interval_usec = m->poll_interval_min_usec;
390 m->poll_resync = false;
391 return;
392 }
393
394 /* set to minimal poll interval */
395 if (!spike && fabs(offset) > NTP_ACCURACY_SEC) {
396 m->poll_interval_usec = m->poll_interval_min_usec;
397 return;
398 }
399
400 /* increase polling interval */
401 if (fabs(offset) < NTP_ACCURACY_SEC * 0.25) {
402 if (m->poll_interval_usec < m->poll_interval_max_usec)
403 m->poll_interval_usec *= 2;
404 return;
405 }
406
407 /* decrease polling interval */
408 if (spike || fabs(offset) > NTP_ACCURACY_SEC * 0.75) {
409 if (m->poll_interval_usec > m->poll_interval_min_usec)
410 m->poll_interval_usec /= 2;
411 return;
412 }
413 }
414
415 static int manager_receive_response(sd_event_source *source, int fd, uint32_t revents, void *userdata) {
416 Manager *m = userdata;
417 struct ntp_msg ntpmsg;
418
419 struct iovec iov = {
420 .iov_base = &ntpmsg,
421 .iov_len = sizeof(ntpmsg),
422 };
423 union {
424 struct cmsghdr cmsghdr;
425 uint8_t buf[CMSG_SPACE(sizeof(struct timeval))];
426 } control;
427 union sockaddr_union server_addr;
428 struct msghdr msghdr = {
429 .msg_iov = &iov,
430 .msg_iovlen = 1,
431 .msg_control = &control,
432 .msg_controllen = sizeof(control),
433 .msg_name = &server_addr,
434 .msg_namelen = sizeof(server_addr),
435 };
436 struct cmsghdr *cmsg;
437 struct timespec *recv_time = NULL;
438 ssize_t len;
439 double origin, receive, trans, dest;
440 double delay, offset;
441 double root_distance;
442 bool spike;
443 int leap_sec;
444 int r;
445
446 assert(source);
447 assert(m);
448
449 if (revents & (EPOLLHUP|EPOLLERR)) {
450 log_warning("Server connection returned error.");
451 return manager_connect(m);
452 }
453
454 len = recvmsg(fd, &msghdr, MSG_DONTWAIT);
455 if (len < 0) {
456 if (errno == EAGAIN)
457 return 0;
458
459 log_warning("Error receiving message. Disconnecting.");
460 return manager_connect(m);
461 }
462
463 /* Too short or too long packet? */
464 if (iov.iov_len < sizeof(struct ntp_msg) || (msghdr.msg_flags & MSG_TRUNC)) {
465 log_warning("Invalid response from server. Disconnecting.");
466 return manager_connect(m);
467 }
468
469 if (!m->current_server_name ||
470 !m->current_server_address ||
471 !sockaddr_equal(&server_addr, &m->current_server_address->sockaddr)) {
472 log_debug("Response from unknown server.");
473 return 0;
474 }
475
476 CMSG_FOREACH(cmsg, &msghdr) {
477 if (cmsg->cmsg_level != SOL_SOCKET)
478 continue;
479
480 switch (cmsg->cmsg_type) {
481 case SCM_TIMESTAMPNS:
482 recv_time = (struct timespec *) CMSG_DATA(cmsg);
483 break;
484 }
485 }
486 if (!recv_time) {
487 log_error("Invalid packet timestamp.");
488 return -EINVAL;
489 }
490
491 if (!m->pending) {
492 log_debug("Unexpected reply. Ignoring.");
493 return 0;
494 }
495
496 m->missed_replies = 0;
497
498 /* check our "time cookie" (we just stored nanoseconds in the fraction field) */
499 if (be32toh(ntpmsg.origin_time.sec) != m->trans_time.tv_sec + OFFSET_1900_1970 ||
500 be32toh(ntpmsg.origin_time.frac) != (unsigned long) m->trans_time.tv_nsec) {
501 log_debug("Invalid reply; not our transmit time. Ignoring.");
502 return 0;
503 }
504
505 m->event_timeout = sd_event_source_unref(m->event_timeout);
506
507 if (be32toh(ntpmsg.recv_time.sec) < TIME_EPOCH + OFFSET_1900_1970 ||
508 be32toh(ntpmsg.trans_time.sec) < TIME_EPOCH + OFFSET_1900_1970) {
509 log_debug("Invalid reply, returned times before epoch. Ignoring.");
510 return manager_connect(m);
511 }
512
513 if (NTP_FIELD_LEAP(ntpmsg.field) == NTP_LEAP_NOTINSYNC ||
514 ntpmsg.stratum == 0 || ntpmsg.stratum >= 16) {
515 log_debug("Server is not synchronized. Disconnecting.");
516 return manager_connect(m);
517 }
518
519 if (!IN_SET(NTP_FIELD_VERSION(ntpmsg.field), 3, 4)) {
520 log_debug("Response NTPv%d. Disconnecting.", NTP_FIELD_VERSION(ntpmsg.field));
521 return manager_connect(m);
522 }
523
524 if (NTP_FIELD_MODE(ntpmsg.field) != NTP_MODE_SERVER) {
525 log_debug("Unsupported mode %d. Disconnecting.", NTP_FIELD_MODE(ntpmsg.field));
526 return manager_connect(m);
527 }
528
529 root_distance = ntp_ts_short_to_d(&ntpmsg.root_delay) / 2 + ntp_ts_short_to_d(&ntpmsg.root_dispersion);
530 if (root_distance > (double) m->max_root_distance_usec / (double) USEC_PER_SEC) {
531 log_debug("Server has too large root distance. Disconnecting.");
532 return manager_connect(m);
533 }
534
535 /* valid packet */
536 m->pending = false;
537 m->retry_interval = 0;
538
539 /* Stop listening */
540 manager_listen_stop(m);
541
542 /* announce leap seconds */
543 if (NTP_FIELD_LEAP(ntpmsg.field) & NTP_LEAP_PLUSSEC)
544 leap_sec = 1;
545 else if (NTP_FIELD_LEAP(ntpmsg.field) & NTP_LEAP_MINUSSEC)
546 leap_sec = -1;
547 else
548 leap_sec = 0;
549
550 /*
551 * "Timestamp Name ID When Generated
552 * ------------------------------------------------------------
553 * Originate Timestamp T1 time request sent by client
554 * Receive Timestamp T2 time request received by server
555 * Transmit Timestamp T3 time reply sent by server
556 * Destination Timestamp T4 time reply received by client
557 *
558 * The round-trip delay, d, and system clock offset, t, are defined as:
559 * d = (T4 - T1) - (T3 - T2) t = ((T2 - T1) + (T3 - T4)) / 2"
560 */
561 origin = ts_to_d(&m->trans_time) + OFFSET_1900_1970;
562 receive = ntp_ts_to_d(&ntpmsg.recv_time);
563 trans = ntp_ts_to_d(&ntpmsg.trans_time);
564 dest = ts_to_d(recv_time) + OFFSET_1900_1970;
565
566 offset = ((receive - origin) + (trans - dest)) / 2;
567 delay = (dest - origin) - (trans - receive);
568
569 spike = manager_sample_spike_detection(m, offset, delay);
570
571 manager_adjust_poll(m, offset, spike);
572
573 log_debug("NTP response:\n"
574 " leap : %u\n"
575 " version : %u\n"
576 " mode : %u\n"
577 " stratum : %u\n"
578 " precision : %.6f sec (%d)\n"
579 " root distance: %.6f sec\n"
580 " reference : %.4s\n"
581 " origin : %.3f\n"
582 " receive : %.3f\n"
583 " transmit : %.3f\n"
584 " dest : %.3f\n"
585 " offset : %+.3f sec\n"
586 " delay : %+.3f sec\n"
587 " packet count : %"PRIu64"\n"
588 " jitter : %.3f%s\n"
589 " poll interval: " USEC_FMT "\n",
590 NTP_FIELD_LEAP(ntpmsg.field),
591 NTP_FIELD_VERSION(ntpmsg.field),
592 NTP_FIELD_MODE(ntpmsg.field),
593 ntpmsg.stratum,
594 exp2(ntpmsg.precision), ntpmsg.precision,
595 root_distance,
596 ntpmsg.stratum == 1 ? ntpmsg.refid : "n/a",
597 origin - OFFSET_1900_1970,
598 receive - OFFSET_1900_1970,
599 trans - OFFSET_1900_1970,
600 dest - OFFSET_1900_1970,
601 offset, delay,
602 m->packet_count,
603 m->samples_jitter, spike ? " spike" : "",
604 m->poll_interval_usec / USEC_PER_SEC);
605
606 if (!spike) {
607 m->sync = true;
608 r = manager_adjust_clock(m, offset, leap_sec);
609 if (r < 0)
610 log_error_errno(r, "Failed to call clock_adjtime(): %m");
611 }
612
613 /* Save NTP response */
614 m->ntpmsg = ntpmsg;
615 m->origin_time = m->trans_time;
616 m->dest_time = *recv_time;
617 m->spike = spike;
618
619 log_debug("interval/delta/delay/jitter/drift " USEC_FMT "s/%+.3fs/%.3fs/%.3fs/%+"PRI_TIMEX"ppm%s",
620 m->poll_interval_usec / USEC_PER_SEC, offset, delay, m->samples_jitter, m->drift_freq / 65536,
621 spike ? " (ignored)" : "");
622
623 (void) sd_bus_emit_properties_changed(m->bus, "/org/freedesktop/timesync1", "org.freedesktop.timesync1.Manager", "NTPMessage", NULL);
624
625 if (!m->good) {
626 _cleanup_free_ char *pretty = NULL;
627
628 m->good = true;
629
630 server_address_pretty(m->current_server_address, &pretty);
631 log_info("Synchronized to time server %s (%s).", strna(pretty), m->current_server_name->string);
632 sd_notifyf(false, "STATUS=Synchronized to time server %s (%s).", strna(pretty), m->current_server_name->string);
633 }
634
635 r = manager_arm_timer(m, m->poll_interval_usec);
636 if (r < 0)
637 return log_error_errno(r, "Failed to rearm timer: %m");
638
639 return 0;
640 }
641
642 static int manager_listen_setup(Manager *m) {
643 union sockaddr_union addr = {};
644 static const int tos = IPTOS_LOWDELAY;
645 static const int on = 1;
646 int r;
647
648 assert(m);
649
650 if (m->server_socket >= 0)
651 return 0;
652
653 assert(!m->event_receive);
654 assert(m->current_server_address);
655
656 addr.sa.sa_family = m->current_server_address->sockaddr.sa.sa_family;
657
658 m->server_socket = socket(addr.sa.sa_family, SOCK_DGRAM | SOCK_CLOEXEC, 0);
659 if (m->server_socket < 0)
660 return -errno;
661
662 r = bind(m->server_socket, &addr.sa, m->current_server_address->socklen);
663 if (r < 0)
664 return -errno;
665
666 r = setsockopt(m->server_socket, SOL_SOCKET, SO_TIMESTAMPNS, &on, sizeof(on));
667 if (r < 0)
668 return -errno;
669
670 (void) setsockopt(m->server_socket, IPPROTO_IP, IP_TOS, &tos, sizeof(tos));
671
672 return sd_event_add_io(m->event, &m->event_receive, m->server_socket, EPOLLIN, manager_receive_response, m);
673 }
674
675 static void manager_listen_stop(Manager *m) {
676 assert(m);
677
678 m->event_receive = sd_event_source_unref(m->event_receive);
679 m->server_socket = safe_close(m->server_socket);
680 }
681
682 static int manager_begin(Manager *m) {
683 _cleanup_free_ char *pretty = NULL;
684 int r;
685
686 assert(m);
687 assert_return(m->current_server_name, -EHOSTUNREACH);
688 assert_return(m->current_server_address, -EHOSTUNREACH);
689
690 m->good = false;
691 m->missed_replies = NTP_MAX_MISSED_REPLIES;
692 if (m->poll_interval_usec == 0)
693 m->poll_interval_usec = m->poll_interval_min_usec;
694
695 server_address_pretty(m->current_server_address, &pretty);
696 log_debug("Connecting to time server %s (%s).", strna(pretty), m->current_server_name->string);
697 sd_notifyf(false, "STATUS=Connecting to time server %s (%s).", strna(pretty), m->current_server_name->string);
698
699 r = manager_clock_watch_setup(m);
700 if (r < 0)
701 return r;
702
703 return manager_send_request(m);
704 }
705
706 void manager_set_server_name(Manager *m, ServerName *n) {
707 assert(m);
708
709 if (m->current_server_name == n)
710 return;
711
712 m->current_server_name = n;
713 m->current_server_address = NULL;
714
715 manager_disconnect(m);
716
717 if (n)
718 log_debug("Selected server %s.", n->string);
719 }
720
721 void manager_set_server_address(Manager *m, ServerAddress *a) {
722 assert(m);
723
724 if (m->current_server_address == a)
725 return;
726
727 m->current_server_address = a;
728 /* If a is NULL, we are just clearing the address, without
729 * changing the name. Keep the existing name in that case. */
730 if (a)
731 m->current_server_name = a->name;
732
733 manager_disconnect(m);
734
735 if (a) {
736 _cleanup_free_ char *pretty = NULL;
737 server_address_pretty(a, &pretty);
738 log_debug("Selected address %s of server %s.", strna(pretty), a->name->string);
739 }
740 }
741
742 static int manager_resolve_handler(sd_resolve_query *q, int ret, const struct addrinfo *ai, void *userdata) {
743 Manager *m = userdata;
744 int r;
745
746 assert(q);
747 assert(m);
748 assert(m->current_server_name);
749
750 m->resolve_query = sd_resolve_query_unref(m->resolve_query);
751
752 if (ret != 0) {
753 log_debug("Failed to resolve %s: %s", m->current_server_name->string, gai_strerror(ret));
754
755 /* Try next host */
756 return manager_connect(m);
757 }
758
759 for (; ai; ai = ai->ai_next) {
760 _cleanup_free_ char *pretty = NULL;
761 ServerAddress *a;
762
763 assert(ai->ai_addr);
764 assert(ai->ai_addrlen >= offsetof(struct sockaddr, sa_data));
765
766 if (!IN_SET(ai->ai_addr->sa_family, AF_INET, AF_INET6)) {
767 log_warning("Unsuitable address protocol for %s", m->current_server_name->string);
768 continue;
769 }
770
771 r = server_address_new(m->current_server_name, &a, (const union sockaddr_union*) ai->ai_addr, ai->ai_addrlen);
772 if (r < 0)
773 return log_error_errno(r, "Failed to add server address: %m");
774
775 server_address_pretty(a, &pretty);
776 log_debug("Resolved address %s for %s.", pretty, m->current_server_name->string);
777 }
778
779 if (!m->current_server_name->addresses) {
780 log_error("Failed to find suitable address for host %s.", m->current_server_name->string);
781
782 /* Try next host */
783 return manager_connect(m);
784 }
785
786 manager_set_server_address(m, m->current_server_name->addresses);
787
788 return manager_begin(m);
789 }
790
791 static int manager_retry_connect(sd_event_source *source, usec_t usec, void *userdata) {
792 Manager *m = userdata;
793
794 assert(m);
795
796 return manager_connect(m);
797 }
798
799 int manager_connect(Manager *m) {
800 int r;
801
802 assert(m);
803
804 manager_disconnect(m);
805
806 m->event_retry = sd_event_source_unref(m->event_retry);
807 if (!ratelimit_test(&m->ratelimit)) {
808 log_debug("Slowing down attempts to contact servers.");
809
810 r = sd_event_add_time(m->event, &m->event_retry, clock_boottime_or_monotonic(), now(clock_boottime_or_monotonic()) + RETRY_USEC, 0, manager_retry_connect, m);
811 if (r < 0)
812 return log_error_errno(r, "Failed to create retry timer: %m");
813
814 return 0;
815 }
816
817 /* If we already are operating on some address, switch to the
818 * next one. */
819 if (m->current_server_address && m->current_server_address->addresses_next)
820 manager_set_server_address(m, m->current_server_address->addresses_next);
821 else {
822 struct addrinfo hints = {
823 .ai_flags = AI_NUMERICSERV|AI_ADDRCONFIG,
824 .ai_socktype = SOCK_DGRAM,
825 };
826
827 /* Hmm, we are through all addresses, let's look for the next host instead */
828 if (m->current_server_name && m->current_server_name->names_next)
829 manager_set_server_name(m, m->current_server_name->names_next);
830 else {
831 ServerName *f;
832 bool restart = true;
833
834 /* Our current server name list is exhausted,
835 * let's find the next one to iterate. First
836 * we try the system list, then the link list.
837 * After having processed the link list we
838 * jump back to the system list. However, if
839 * both lists are empty, we change to the
840 * fallback list. */
841 if (!m->current_server_name || m->current_server_name->type == SERVER_LINK) {
842 f = m->system_servers;
843 if (!f)
844 f = m->link_servers;
845 } else {
846 f = m->link_servers;
847 if (!f)
848 f = m->system_servers;
849 else
850 restart = false;
851 }
852
853 if (!f)
854 f = m->fallback_servers;
855
856 if (!f) {
857 manager_set_server_name(m, NULL);
858 log_debug("No server found.");
859 return 0;
860 }
861
862 if (restart && !m->exhausted_servers && m->poll_interval_usec) {
863 log_debug("Waiting after exhausting servers.");
864 r = sd_event_add_time(m->event, &m->event_retry, clock_boottime_or_monotonic(), now(clock_boottime_or_monotonic()) + m->poll_interval_usec, 0, manager_retry_connect, m);
865 if (r < 0)
866 return log_error_errno(r, "Failed to create retry timer: %m");
867
868 m->exhausted_servers = true;
869
870 /* Increase the polling interval */
871 if (m->poll_interval_usec < m->poll_interval_max_usec)
872 m->poll_interval_usec *= 2;
873
874 return 0;
875 }
876
877 m->exhausted_servers = false;
878
879 manager_set_server_name(m, f);
880 }
881
882 /* Tell the resolver to reread /etc/resolv.conf, in
883 * case it changed. */
884 res_init();
885
886 /* Flush out any previously resolved addresses */
887 server_name_flush_addresses(m->current_server_name);
888
889 log_debug("Resolving %s...", m->current_server_name->string);
890
891 r = sd_resolve_getaddrinfo(m->resolve, &m->resolve_query, m->current_server_name->string, "123", &hints, manager_resolve_handler, m);
892 if (r < 0)
893 return log_error_errno(r, "Failed to create resolver: %m");
894
895 return 1;
896 }
897
898 r = manager_begin(m);
899 if (r < 0)
900 return r;
901
902 return 1;
903 }
904
905 void manager_disconnect(Manager *m) {
906 assert(m);
907
908 m->resolve_query = sd_resolve_query_unref(m->resolve_query);
909
910 m->event_timer = sd_event_source_unref(m->event_timer);
911
912 manager_listen_stop(m);
913
914 m->event_clock_watch = sd_event_source_unref(m->event_clock_watch);
915 m->clock_watch_fd = safe_close(m->clock_watch_fd);
916
917 m->event_timeout = sd_event_source_unref(m->event_timeout);
918
919 sd_notifyf(false, "STATUS=Idle.");
920 }
921
922 void manager_flush_server_names(Manager *m, ServerType t) {
923 assert(m);
924
925 if (t == SERVER_SYSTEM)
926 while (m->system_servers)
927 server_name_free(m->system_servers);
928
929 if (t == SERVER_LINK)
930 while (m->link_servers)
931 server_name_free(m->link_servers);
932
933 if (t == SERVER_FALLBACK)
934 while (m->fallback_servers)
935 server_name_free(m->fallback_servers);
936 }
937
938 void manager_free(Manager *m) {
939 if (!m)
940 return;
941
942 manager_disconnect(m);
943 manager_flush_server_names(m, SERVER_SYSTEM);
944 manager_flush_server_names(m, SERVER_LINK);
945 manager_flush_server_names(m, SERVER_FALLBACK);
946
947 sd_event_source_unref(m->event_retry);
948
949 sd_event_source_unref(m->network_event_source);
950 sd_network_monitor_unref(m->network_monitor);
951
952 sd_resolve_unref(m->resolve);
953 sd_event_unref(m->event);
954
955 sd_bus_unref(m->bus);
956
957 free(m);
958 }
959
960 static int manager_network_read_link_servers(Manager *m) {
961 _cleanup_strv_free_ char **ntp = NULL;
962 ServerName *n, *nx;
963 char **i;
964 bool changed = false;
965 int r;
966
967 assert(m);
968
969 r = sd_network_get_ntp(&ntp);
970 if (r < 0)
971 goto clear;
972
973 LIST_FOREACH(names, n, m->link_servers)
974 n->marked = true;
975
976 STRV_FOREACH(i, ntp) {
977 bool found = false;
978
979 LIST_FOREACH(names, n, m->link_servers)
980 if (streq(n->string, *i)) {
981 n->marked = false;
982 found = true;
983 break;
984 }
985
986 if (!found) {
987 r = server_name_new(m, NULL, SERVER_LINK, *i);
988 if (r < 0)
989 goto clear;
990
991 changed = true;
992 }
993 }
994
995 LIST_FOREACH_SAFE(names, n, nx, m->link_servers)
996 if (n->marked) {
997 server_name_free(n);
998 changed = true;
999 }
1000
1001 return changed;
1002
1003 clear:
1004 manager_flush_server_names(m, SERVER_LINK);
1005 return r;
1006 }
1007
1008 static bool manager_is_connected(Manager *m) {
1009 /* Return true when the manager is sending a request, resolving a server name, or
1010 * in a poll interval. */
1011 return m->server_socket >= 0 || m->resolve_query || m->event_timer;
1012 }
1013
1014 static int manager_network_event_handler(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
1015 Manager *m = userdata;
1016 bool changed, connected, online;
1017 int r;
1018
1019 assert(m);
1020
1021 sd_network_monitor_flush(m->network_monitor);
1022
1023 changed = !!manager_network_read_link_servers(m);
1024
1025 /* check if the machine is online */
1026 online = network_is_online();
1027
1028 /* check if the client is currently connected */
1029 connected = manager_is_connected(m);
1030
1031 if (connected && !online) {
1032 log_info("No network connectivity, watching for changes.");
1033 manager_disconnect(m);
1034
1035 } else if ((!connected || changed) && online) {
1036 log_info("Network configuration changed, trying to establish connection.");
1037
1038 if (m->current_server_address)
1039 r = manager_begin(m);
1040 else
1041 r = manager_connect(m);
1042 if (r < 0)
1043 return r;
1044 }
1045
1046 return 0;
1047 }
1048
1049 static int manager_network_monitor_listen(Manager *m) {
1050 int r, fd, events;
1051
1052 assert(m);
1053
1054 r = sd_network_monitor_new(&m->network_monitor, NULL);
1055 if (r == -ENOENT) {
1056 log_info("systemd does not appear to be running, not listening for systemd-networkd events.");
1057 return 0;
1058 }
1059 if (r < 0)
1060 return r;
1061
1062 fd = sd_network_monitor_get_fd(m->network_monitor);
1063 if (fd < 0)
1064 return fd;
1065
1066 events = sd_network_monitor_get_events(m->network_monitor);
1067 if (events < 0)
1068 return events;
1069
1070 r = sd_event_add_io(m->event, &m->network_event_source, fd, events, manager_network_event_handler, m);
1071 if (r < 0)
1072 return r;
1073
1074 return 0;
1075 }
1076
1077 int manager_new(Manager **ret) {
1078 _cleanup_(manager_freep) Manager *m = NULL;
1079 int r;
1080
1081 assert(ret);
1082
1083 m = new0(Manager, 1);
1084 if (!m)
1085 return -ENOMEM;
1086
1087 m->max_root_distance_usec = NTP_MAX_ROOT_DISTANCE;
1088 m->poll_interval_min_usec = NTP_POLL_INTERVAL_MIN_USEC;
1089 m->poll_interval_max_usec = NTP_POLL_INTERVAL_MAX_USEC;
1090
1091 m->server_socket = m->clock_watch_fd = -1;
1092
1093 RATELIMIT_INIT(m->ratelimit, RATELIMIT_INTERVAL_USEC, RATELIMIT_BURST);
1094
1095 r = sd_event_default(&m->event);
1096 if (r < 0)
1097 return r;
1098
1099 sd_event_add_signal(m->event, NULL, SIGTERM, NULL, NULL);
1100 sd_event_add_signal(m->event, NULL, SIGINT, NULL, NULL);
1101
1102 sd_event_set_watchdog(m->event, true);
1103
1104 r = sd_resolve_default(&m->resolve);
1105 if (r < 0)
1106 return r;
1107
1108 r = sd_resolve_attach_event(m->resolve, m->event, 0);
1109 if (r < 0)
1110 return r;
1111
1112 r = manager_network_monitor_listen(m);
1113 if (r < 0)
1114 return r;
1115
1116 manager_network_read_link_servers(m);
1117
1118 *ret = TAKE_PTR(m);
1119
1120 return 0;
1121 }