]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/timesync/timesyncd-manager.c
tree-wide: remove Lennart's copyright lines
[thirdparty/systemd.git] / src / timesync / timesyncd-manager.c
CommitLineData
53e1b683 1/* SPDX-License-Identifier: LGPL-2.1+ */
84e51726 2/***
0c697941 3 Copyright 2014 Kay Sievers
84e51726
LP
4***/
5
84e51726 6#include <errno.h>
84e51726 7#include <math.h>
84e51726
LP
8#include <netinet/in.h>
9#include <netinet/ip.h>
07630cea
LP
10#include <resolv.h>
11#include <stdlib.h>
12#include <sys/socket.h>
84e51726
LP
13#include <sys/timerfd.h>
14#include <sys/timex.h>
84e51726 15#include <sys/types.h>
07630cea
LP
16#include <time.h>
17
18#include "sd-daemon.h"
84e51726 19
b5efdb8a 20#include "alloc-util.h"
dcb37458 21#include "dns-domain.h"
3ffd4af2 22#include "fd-util.h"
f4f15635 23#include "fs-util.h"
84e51726 24#include "list.h"
07630cea
LP
25#include "log.h"
26#include "missing.h"
27#include "network-util.h"
84e51726 28#include "ratelimit.h"
07630cea 29#include "socket-util.h"
07630cea 30#include "string-util.h"
84e51726 31#include "strv.h"
07630cea 32#include "time-util.h"
84e51726
LP
33#include "timesyncd-conf.h"
34#include "timesyncd-manager.h"
3ffd4af2 35#include "util.h"
84e51726
LP
36
37#ifndef ADJ_SETOFFSET
38#define ADJ_SETOFFSET 0x0100 /* add 'time' to current time */
39#endif
40
41/* expected accuracy of time synchronization; used to adjust the poll interval */
42#define NTP_ACCURACY_SEC 0.2
43
84e51726
LP
44/*
45 * Maximum delta in seconds which the system clock is gradually adjusted
a4465d0d 46 * (slewed) to approach the network time. Deltas larger that this are set by
84e51726
LP
47 * letting the system time jump. The kernel's limit for adjtime is 0.5s.
48 */
49#define NTP_MAX_ADJUST 0.4
50
a4465d0d 51/* Default of maximum acceptable root distance in microseconds. */
f907cc16 52#define NTP_MAX_ROOT_DISTANCE (5 * USEC_PER_SEC)
3af0442c 53
e8206972
ML
54/* Maximum number of missed replies before selecting another source. */
55#define NTP_MAX_MISSED_REPLIES 2
56
84e51726
LP
57#define RETRY_USEC (30*USEC_PER_SEC)
58#define RATELIMIT_INTERVAL_USEC (10*USEC_PER_SEC)
59#define RATELIMIT_BURST 10
60
61#define TIMEOUT_USEC (10*USEC_PER_SEC)
62
84e51726
LP
63static int manager_arm_timer(Manager *m, usec_t next);
64static int manager_clock_watch_setup(Manager *m);
7b628891 65static int manager_listen_setup(Manager *m);
f89c4e15 66static void manager_listen_stop(Manager *m);
84e51726 67
3af0442c
ML
68static double ntp_ts_short_to_d(const struct ntp_ts_short *ts) {
69 return be16toh(ts->sec) + (be16toh(ts->frac) / 65536.0);
70}
71
84e51726
LP
72static double ntp_ts_to_d(const struct ntp_ts *ts) {
73 return be32toh(ts->sec) + ((double)be32toh(ts->frac) / UINT_MAX);
74}
75
76static double ts_to_d(const struct timespec *ts) {
77 return ts->tv_sec + (1.0e-9 * ts->tv_nsec);
78}
79
84e51726
LP
80static int manager_timeout(sd_event_source *source, usec_t usec, void *userdata) {
81 _cleanup_free_ char *pretty = NULL;
82 Manager *m = userdata;
83
84 assert(m);
85 assert(m->current_server_name);
86 assert(m->current_server_address);
87
88 server_address_pretty(m->current_server_address, &pretty);
89 log_info("Timed out waiting for reply from %s (%s).", strna(pretty), m->current_server_name->string);
90
91 return manager_connect(m);
92}
93
94static int manager_send_request(Manager *m) {
95 _cleanup_free_ char *pretty = NULL;
96 struct ntp_msg ntpmsg = {
97 /*
98 * "The client initializes the NTP message header, sends the request
99 * to the server, and strips the time of day from the Transmit
100 * Timestamp field of the reply. For this purpose, all the NTP
101 * header fields are set to 0, except the Mode, VN, and optional
102 * Transmit Timestamp fields."
103 */
104 .field = NTP_FIELD(0, 4, NTP_MODE_CLIENT),
105 };
106 ssize_t len;
107 int r;
108
109 assert(m);
110 assert(m->current_server_name);
111 assert(m->current_server_address);
112
113 m->event_timeout = sd_event_source_unref(m->event_timeout);
114
f89c4e15
LP
115 r = manager_listen_setup(m);
116 if (r < 0)
117 return log_warning_errno(r, "Failed to setup connection socket: %m");
7b628891 118
84e51726
LP
119 /*
120 * Set transmit timestamp, remember it; the server will send that back
121 * as the origin timestamp and we have an indication that this is the
122 * matching answer to our request.
123 *
124 * The actual value does not matter, We do not care about the correct
125 * NTP UINT_MAX fraction; we just pass the plain nanosecond value.
126 */
127 assert_se(clock_gettime(clock_boottime_or_monotonic(), &m->trans_time_mon) >= 0);
128 assert_se(clock_gettime(CLOCK_REALTIME, &m->trans_time) >= 0);
129 ntpmsg.trans_time.sec = htobe32(m->trans_time.tv_sec + OFFSET_1900_1970);
130 ntpmsg.trans_time.frac = htobe32(m->trans_time.tv_nsec);
131
132 server_address_pretty(m->current_server_address, &pretty);
133
134 len = sendto(m->server_socket, &ntpmsg, sizeof(ntpmsg), MSG_DONTWAIT, &m->current_server_address->sockaddr.sa, m->current_server_address->socklen);
135 if (len == sizeof(ntpmsg)) {
136 m->pending = true;
137 log_debug("Sent NTP request to %s (%s).", strna(pretty), m->current_server_name->string);
138 } else {
56f64d95 139 log_debug_errno(errno, "Sending NTP request to %s (%s) failed: %m", strna(pretty), m->current_server_name->string);
84e51726
LP
140 return manager_connect(m);
141 }
142
ab4df227
KS
143 /* re-arm timer with increasing timeout, in case the packets never arrive back */
144 if (m->retry_interval > 0) {
a4465d0d 145 if (m->retry_interval < m->poll_interval_max_usec)
ab4df227
KS
146 m->retry_interval *= 2;
147 } else
a4465d0d 148 m->retry_interval = m->poll_interval_min_usec;
ab4df227
KS
149
150 r = manager_arm_timer(m, m->retry_interval);
f647962d
MS
151 if (r < 0)
152 return log_error_errno(r, "Failed to rearm timer: %m");
ab4df227 153
e8206972
ML
154 m->missed_replies++;
155 if (m->missed_replies > NTP_MAX_MISSED_REPLIES) {
156 r = sd_event_add_time(
157 m->event,
158 &m->event_timeout,
159 clock_boottime_or_monotonic(),
160 now(clock_boottime_or_monotonic()) + TIMEOUT_USEC, 0,
161 manager_timeout, m);
f647962d
MS
162 if (r < 0)
163 return log_error_errno(r, "Failed to arm timeout timer: %m");
84e51726
LP
164 }
165
166 return 0;
167}
168
169static int manager_timer(sd_event_source *source, usec_t usec, void *userdata) {
170 Manager *m = userdata;
171
172 assert(m);
173
174 return manager_send_request(m);
175}
176
177static int manager_arm_timer(Manager *m, usec_t next) {
178 int r;
179
180 assert(m);
84e51726
LP
181
182 if (next == 0) {
183 m->event_timer = sd_event_source_unref(m->event_timer);
184 return 0;
185 }
186
187 if (m->event_timer) {
188 r = sd_event_source_set_time(m->event_timer, now(clock_boottime_or_monotonic()) + next);
189 if (r < 0)
190 return r;
191
192 return sd_event_source_set_enabled(m->event_timer, SD_EVENT_ONESHOT);
193 }
194
195 return sd_event_add_time(
196 m->event,
197 &m->event_timer,
198 clock_boottime_or_monotonic(),
199 now(clock_boottime_or_monotonic()) + next, 0,
200 manager_timer, m);
201}
202
203static int manager_clock_watch(sd_event_source *source, int fd, uint32_t revents, void *userdata) {
204 Manager *m = userdata;
205
206 assert(m);
207
208 /* rearm timer */
209 manager_clock_watch_setup(m);
210
211 /* skip our own jumps */
212 if (m->jumped) {
213 m->jumped = false;
214 return 0;
215 }
216
217 /* resync */
7e3254b3 218 log_debug("System time changed. Resyncing.");
84e51726
LP
219 m->poll_resync = true;
220
221 return manager_send_request(m);
222}
223
224/* wake up when the system time changes underneath us */
225static int manager_clock_watch_setup(Manager *m) {
84e51726
LP
226 int r;
227
228 assert(m);
229
230 m->event_clock_watch = sd_event_source_unref(m->event_clock_watch);
231 safe_close(m->clock_watch_fd);
232
4f811d27 233 m->clock_watch_fd = time_change_fd();
4a62c710 234 if (m->clock_watch_fd < 0)
4f811d27 235 return log_error_errno(m->clock_watch_fd, "Failed to create timerfd: %m");
84e51726
LP
236
237 r = sd_event_add_io(m->event, &m->event_clock_watch, m->clock_watch_fd, EPOLLIN, manager_clock_watch, m);
f647962d
MS
238 if (r < 0)
239 return log_error_errno(r, "Failed to create clock watch event source: %m");
84e51726
LP
240
241 return 0;
242}
243
244static int manager_adjust_clock(Manager *m, double offset, int leap_sec) {
245 struct timex tmx = {};
246 int r;
247
248 assert(m);
249
250 /*
251 * For small deltas, tell the kernel to gradually adjust the system
252 * clock to the NTP time, larger deltas are just directly set.
253 */
254 if (fabs(offset) < NTP_MAX_ADJUST) {
255 tmx.modes = ADJ_STATUS | ADJ_NANO | ADJ_OFFSET | ADJ_TIMECONST | ADJ_MAXERROR | ADJ_ESTERROR;
256 tmx.status = STA_PLL;
257 tmx.offset = offset * NSEC_PER_SEC;
258 tmx.constant = log2i(m->poll_interval_usec / USEC_PER_SEC) - 4;
259 tmx.maxerror = 0;
260 tmx.esterror = 0;
ff49bc32 261 log_debug(" adjust (slew): %+.3f sec", offset);
84e51726 262 } else {
5f36e3d3 263 tmx.modes = ADJ_STATUS | ADJ_NANO | ADJ_SETOFFSET | ADJ_MAXERROR | ADJ_ESTERROR;
84e51726
LP
264
265 /* ADJ_NANO uses nanoseconds in the microseconds field */
266 tmx.time.tv_sec = (long)offset;
267 tmx.time.tv_usec = (offset - tmx.time.tv_sec) * NSEC_PER_SEC;
5f36e3d3
AK
268 tmx.maxerror = 0;
269 tmx.esterror = 0;
84e51726
LP
270
271 /* the kernel expects -0.3s as {-1, 7000.000.000} */
272 if (tmx.time.tv_usec < 0) {
273 tmx.time.tv_sec -= 1;
274 tmx.time.tv_usec += NSEC_PER_SEC;
275 }
276
277 m->jumped = true;
ff49bc32 278 log_debug(" adjust (jump): %+.3f sec", offset);
84e51726
LP
279 }
280
281 /*
282 * An unset STA_UNSYNC will enable the kernel's 11-minute mode,
283 * which syncs the system time periodically to the RTC.
284 *
285 * In case the RTC runs in local time, never touch the RTC,
286 * we have no way to properly handle daylight saving changes and
287 * mobile devices moving between time zones.
288 */
289 if (m->rtc_local_time)
290 tmx.status |= STA_UNSYNC;
291
292 switch (leap_sec) {
293 case 1:
294 tmx.status |= STA_INS;
295 break;
296 case -1:
297 tmx.status |= STA_DEL;
298 break;
299 }
300
301 r = clock_adjtime(CLOCK_REALTIME, &tmx);
302 if (r < 0)
6ff6f4d8 303 return -errno;
84e51726 304
baa33e79 305 /* If touch fails, there isn't much we can do. Maybe it'll work next time. */
53d133ea 306 (void) touch("/var/lib/systemd/timesync/clock");
2dd79846 307 (void) touch("/run/systemd/timesync/synchronized");
84e51726 308
66086a40 309 m->drift_freq = tmx.freq;
84e51726
LP
310
311 log_debug(" status : %04i %s\n"
0060bb8f 312 " time now : %"PRI_TIME".%03"PRI_USEC"\n"
3bd7ef83 313 " constant : %"PRI_TIMEX"\n"
84e51726 314 " offset : %+.3f sec\n"
66086a40 315 " freq offset : %+"PRI_TIMEX" (%+"PRI_TIMEX" ppm)\n",
84e51726 316 tmx.status, tmx.status & STA_UNSYNC ? "unsync" : "sync",
70887c5f 317 tmx.time.tv_sec, tmx.time.tv_usec / NSEC_PER_MSEC,
84e51726
LP
318 tmx.constant,
319 (double)tmx.offset / NSEC_PER_SEC,
66086a40 320 tmx.freq, tmx.freq / 65536);
84e51726
LP
321
322 return 0;
323}
324
325static bool manager_sample_spike_detection(Manager *m, double offset, double delay) {
326 unsigned int i, idx_cur, idx_new, idx_min;
327 double jitter;
328 double j;
329
330 assert(m);
331
332 m->packet_count++;
333
334 /* ignore initial sample */
335 if (m->packet_count == 1)
336 return false;
337
338 /* store the current data in our samples array */
339 idx_cur = m->samples_idx;
340 idx_new = (idx_cur + 1) % ELEMENTSOF(m->samples);
341 m->samples_idx = idx_new;
342 m->samples[idx_new].offset = offset;
343 m->samples[idx_new].delay = delay;
344
345 /* calculate new jitter value from the RMS differences relative to the lowest delay sample */
346 jitter = m->samples_jitter;
347 for (idx_min = idx_cur, i = 0; i < ELEMENTSOF(m->samples); i++)
348 if (m->samples[i].delay > 0 && m->samples[i].delay < m->samples[idx_min].delay)
349 idx_min = i;
350
351 j = 0;
352 for (i = 0; i < ELEMENTSOF(m->samples); i++)
fa66b606 353 j += pow(m->samples[i].offset - m->samples[idx_min].offset, 2);
84e51726
LP
354 m->samples_jitter = sqrt(j / (ELEMENTSOF(m->samples) - 1));
355
356 /* ignore samples when resyncing */
357 if (m->poll_resync)
358 return false;
359
360 /* always accept offset if we are farther off than the round-trip delay */
361 if (fabs(offset) > delay)
362 return false;
363
364 /* we need a few samples before looking at them */
365 if (m->packet_count < 4)
366 return false;
367
368 /* do not accept anything worse than the maximum possible error of the best sample */
369 if (fabs(offset) > m->samples[idx_min].delay)
370 return true;
371
372 /* compare the difference between the current offset to the previous offset and jitter */
373 return fabs(offset - m->samples[idx_cur].offset) > 3 * jitter;
374}
375
376static void manager_adjust_poll(Manager *m, double offset, bool spike) {
377 assert(m);
378
379 if (m->poll_resync) {
a4465d0d 380 m->poll_interval_usec = m->poll_interval_min_usec;
84e51726
LP
381 m->poll_resync = false;
382 return;
383 }
384
385 /* set to minimal poll interval */
386 if (!spike && fabs(offset) > NTP_ACCURACY_SEC) {
a4465d0d 387 m->poll_interval_usec = m->poll_interval_min_usec;
84e51726
LP
388 return;
389 }
390
391 /* increase polling interval */
392 if (fabs(offset) < NTP_ACCURACY_SEC * 0.25) {
a4465d0d 393 if (m->poll_interval_usec < m->poll_interval_max_usec)
84e51726
LP
394 m->poll_interval_usec *= 2;
395 return;
396 }
397
398 /* decrease polling interval */
399 if (spike || fabs(offset) > NTP_ACCURACY_SEC * 0.75) {
a4465d0d 400 if (m->poll_interval_usec > m->poll_interval_min_usec)
84e51726
LP
401 m->poll_interval_usec /= 2;
402 return;
403 }
404}
405
406static int manager_receive_response(sd_event_source *source, int fd, uint32_t revents, void *userdata) {
407 Manager *m = userdata;
408 struct ntp_msg ntpmsg;
409
410 struct iovec iov = {
411 .iov_base = &ntpmsg,
412 .iov_len = sizeof(ntpmsg),
413 };
414 union {
415 struct cmsghdr cmsghdr;
416 uint8_t buf[CMSG_SPACE(sizeof(struct timeval))];
417 } control;
418 union sockaddr_union server_addr;
419 struct msghdr msghdr = {
420 .msg_iov = &iov,
421 .msg_iovlen = 1,
422 .msg_control = &control,
423 .msg_controllen = sizeof(control),
424 .msg_name = &server_addr,
425 .msg_namelen = sizeof(server_addr),
426 };
427 struct cmsghdr *cmsg;
1cc6c93a 428 struct timespec *recv_time = NULL;
84e51726
LP
429 ssize_t len;
430 double origin, receive, trans, dest;
431 double delay, offset;
3af0442c 432 double root_distance;
84e51726
LP
433 bool spike;
434 int leap_sec;
435 int r;
436
437 assert(source);
438 assert(m);
439
440 if (revents & (EPOLLHUP|EPOLLERR)) {
441 log_warning("Server connection returned error.");
442 return manager_connect(m);
443 }
444
a38d9945 445 len = recvmsg(fd, &msghdr, MSG_DONTWAIT);
84e51726
LP
446 if (len < 0) {
447 if (errno == EAGAIN)
448 return 0;
449
450 log_warning("Error receiving message. Disconnecting.");
451 return manager_connect(m);
452 }
453
43fcd650
TM
454 /* Too short or too long packet? */
455 if (iov.iov_len < sizeof(struct ntp_msg) || (msghdr.msg_flags & MSG_TRUNC)) {
84e51726
LP
456 log_warning("Invalid response from server. Disconnecting.");
457 return manager_connect(m);
458 }
459
460 if (!m->current_server_name ||
461 !m->current_server_address ||
462 !sockaddr_equal(&server_addr, &m->current_server_address->sockaddr)) {
463 log_debug("Response from unknown server.");
464 return 0;
465 }
466
2a1288ff 467 CMSG_FOREACH(cmsg, &msghdr) {
84e51726
LP
468 if (cmsg->cmsg_level != SOL_SOCKET)
469 continue;
470
471 switch (cmsg->cmsg_type) {
487a3682
ML
472 case SCM_TIMESTAMPNS:
473 recv_time = (struct timespec *) CMSG_DATA(cmsg);
84e51726
LP
474 break;
475 }
476 }
477 if (!recv_time) {
478 log_error("Invalid packet timestamp.");
479 return -EINVAL;
480 }
481
482 if (!m->pending) {
483 log_debug("Unexpected reply. Ignoring.");
484 return 0;
485 }
486
e8206972
ML
487 m->missed_replies = 0;
488
84e51726
LP
489 /* check our "time cookie" (we just stored nanoseconds in the fraction field) */
490 if (be32toh(ntpmsg.origin_time.sec) != m->trans_time.tv_sec + OFFSET_1900_1970 ||
edd50d5e 491 be32toh(ntpmsg.origin_time.frac) != (unsigned long) m->trans_time.tv_nsec) {
84e51726
LP
492 log_debug("Invalid reply; not our transmit time. Ignoring.");
493 return 0;
494 }
495
496 m->event_timeout = sd_event_source_unref(m->event_timeout);
497
498 if (be32toh(ntpmsg.recv_time.sec) < TIME_EPOCH + OFFSET_1900_1970 ||
499 be32toh(ntpmsg.trans_time.sec) < TIME_EPOCH + OFFSET_1900_1970) {
500 log_debug("Invalid reply, returned times before epoch. Ignoring.");
501 return manager_connect(m);
502 }
503
07610e10
ML
504 if (NTP_FIELD_LEAP(ntpmsg.field) == NTP_LEAP_NOTINSYNC ||
505 ntpmsg.stratum == 0 || ntpmsg.stratum >= 16) {
84e51726
LP
506 log_debug("Server is not synchronized. Disconnecting.");
507 return manager_connect(m);
508 }
509
510 if (!IN_SET(NTP_FIELD_VERSION(ntpmsg.field), 3, 4)) {
511 log_debug("Response NTPv%d. Disconnecting.", NTP_FIELD_VERSION(ntpmsg.field));
512 return manager_connect(m);
513 }
514
515 if (NTP_FIELD_MODE(ntpmsg.field) != NTP_MODE_SERVER) {
516 log_debug("Unsupported mode %d. Disconnecting.", NTP_FIELD_MODE(ntpmsg.field));
517 return manager_connect(m);
518 }
519
3af0442c 520 root_distance = ntp_ts_short_to_d(&ntpmsg.root_delay) / 2 + ntp_ts_short_to_d(&ntpmsg.root_dispersion);
f907cc16 521 if (root_distance > (double) m->max_root_distance_usec / (double) USEC_PER_SEC) {
3af0442c
ML
522 log_debug("Server has too large root distance. Disconnecting.");
523 return manager_connect(m);
524 }
525
84e51726
LP
526 /* valid packet */
527 m->pending = false;
ab4df227 528 m->retry_interval = 0;
84e51726 529
7b628891 530 /* Stop listening */
f89c4e15 531 manager_listen_stop(m);
7b628891 532
84e51726
LP
533 /* announce leap seconds */
534 if (NTP_FIELD_LEAP(ntpmsg.field) & NTP_LEAP_PLUSSEC)
535 leap_sec = 1;
536 else if (NTP_FIELD_LEAP(ntpmsg.field) & NTP_LEAP_MINUSSEC)
537 leap_sec = -1;
538 else
539 leap_sec = 0;
540
541 /*
542 * "Timestamp Name ID When Generated
543 * ------------------------------------------------------------
544 * Originate Timestamp T1 time request sent by client
545 * Receive Timestamp T2 time request received by server
546 * Transmit Timestamp T3 time reply sent by server
547 * Destination Timestamp T4 time reply received by client
548 *
549 * The round-trip delay, d, and system clock offset, t, are defined as:
550 * d = (T4 - T1) - (T3 - T2) t = ((T2 - T1) + (T3 - T4)) / 2"
551 */
73c76e63 552 origin = ts_to_d(&m->trans_time) + OFFSET_1900_1970;
84e51726
LP
553 receive = ntp_ts_to_d(&ntpmsg.recv_time);
554 trans = ntp_ts_to_d(&ntpmsg.trans_time);
487a3682 555 dest = ts_to_d(recv_time) + OFFSET_1900_1970;
84e51726
LP
556
557 offset = ((receive - origin) + (trans - dest)) / 2;
558 delay = (dest - origin) - (trans - receive);
559
560 spike = manager_sample_spike_detection(m, offset, delay);
561
562 manager_adjust_poll(m, offset, spike);
563
564 log_debug("NTP response:\n"
565 " leap : %u\n"
566 " version : %u\n"
567 " mode : %u\n"
568 " stratum : %u\n"
569 " precision : %.6f sec (%d)\n"
3af0442c 570 " root distance: %.6f sec\n"
84e51726
LP
571 " reference : %.4s\n"
572 " origin : %.3f\n"
573 " receive : %.3f\n"
574 " transmit : %.3f\n"
575 " dest : %.3f\n"
576 " offset : %+.3f sec\n"
577 " delay : %+.3f sec\n"
578 " packet count : %"PRIu64"\n"
579 " jitter : %.3f%s\n"
580 " poll interval: " USEC_FMT "\n",
581 NTP_FIELD_LEAP(ntpmsg.field),
582 NTP_FIELD_VERSION(ntpmsg.field),
583 NTP_FIELD_MODE(ntpmsg.field),
584 ntpmsg.stratum,
585 exp2(ntpmsg.precision), ntpmsg.precision,
3af0442c 586 root_distance,
84e51726
LP
587 ntpmsg.stratum == 1 ? ntpmsg.refid : "n/a",
588 origin - OFFSET_1900_1970,
589 receive - OFFSET_1900_1970,
590 trans - OFFSET_1900_1970,
591 dest - OFFSET_1900_1970,
592 offset, delay,
593 m->packet_count,
594 m->samples_jitter, spike ? " spike" : "",
595 m->poll_interval_usec / USEC_PER_SEC);
596
597 if (!spike) {
598 m->sync = true;
599 r = manager_adjust_clock(m, offset, leap_sec);
600 if (r < 0)
6ff6f4d8 601 log_error_errno(r, "Failed to call clock_adjtime(): %m");
84e51726
LP
602 }
603
66086a40
YW
604 /* Save NTP response */
605 m->ntpmsg = ntpmsg;
606 m->origin_time = m->trans_time;
607 m->dest_time = *recv_time;
608 m->spike = spike;
609
610 log_debug("interval/delta/delay/jitter/drift " USEC_FMT "s/%+.3fs/%.3fs/%.3fs/%+"PRI_TIMEX"ppm%s",
611 m->poll_interval_usec / USEC_PER_SEC, offset, delay, m->samples_jitter, m->drift_freq / 65536,
7b5b3fc3 612 spike ? " (ignored)" : "");
84e51726 613
66086a40
YW
614 (void) sd_bus_emit_properties_changed(m->bus, "/org/freedesktop/timesync1", "org.freedesktop.timesync1.Manager", "NTPMessage", NULL);
615
481b3f9e
LP
616 if (!m->good) {
617 _cleanup_free_ char *pretty = NULL;
618
619 m->good = true;
620
621 server_address_pretty(m->current_server_address, &pretty);
622 log_info("Synchronized to time server %s (%s).", strna(pretty), m->current_server_name->string);
623 sd_notifyf(false, "STATUS=Synchronized to time server %s (%s).", strna(pretty), m->current_server_name->string);
624 }
625
84e51726 626 r = manager_arm_timer(m, m->poll_interval_usec);
f647962d
MS
627 if (r < 0)
628 return log_error_errno(r, "Failed to rearm timer: %m");
84e51726
LP
629
630 return 0;
631}
632
633static int manager_listen_setup(Manager *m) {
634 union sockaddr_union addr = {};
635 static const int tos = IPTOS_LOWDELAY;
636 static const int on = 1;
637 int r;
638
639 assert(m);
640
f89c4e15
LP
641 if (m->server_socket >= 0)
642 return 0;
643
84e51726
LP
644 assert(!m->event_receive);
645 assert(m->current_server_address);
646
647 addr.sa.sa_family = m->current_server_address->sockaddr.sa.sa_family;
648
649 m->server_socket = socket(addr.sa.sa_family, SOCK_DGRAM | SOCK_CLOEXEC, 0);
650 if (m->server_socket < 0)
651 return -errno;
652
653 r = bind(m->server_socket, &addr.sa, m->current_server_address->socklen);
654 if (r < 0)
655 return -errno;
656
487a3682 657 r = setsockopt(m->server_socket, SOL_SOCKET, SO_TIMESTAMPNS, &on, sizeof(on));
84e51726
LP
658 if (r < 0)
659 return -errno;
660
69f00817 661 (void) setsockopt(m->server_socket, IPPROTO_IP, IP_TOS, &tos, sizeof(tos));
84e51726
LP
662
663 return sd_event_add_io(m->event, &m->event_receive, m->server_socket, EPOLLIN, manager_receive_response, m);
664}
665
f89c4e15
LP
666static void manager_listen_stop(Manager *m) {
667 assert(m);
668
669 m->event_receive = sd_event_source_unref(m->event_receive);
670 m->server_socket = safe_close(m->server_socket);
671}
672
84e51726
LP
673static int manager_begin(Manager *m) {
674 _cleanup_free_ char *pretty = NULL;
675 int r;
676
677 assert(m);
678 assert_return(m->current_server_name, -EHOSTUNREACH);
679 assert_return(m->current_server_address, -EHOSTUNREACH);
680
481b3f9e 681 m->good = false;
e8206972 682 m->missed_replies = NTP_MAX_MISSED_REPLIES;
80cd2606 683 if (m->poll_interval_usec == 0)
a4465d0d 684 m->poll_interval_usec = m->poll_interval_min_usec;
84e51726
LP
685
686 server_address_pretty(m->current_server_address, &pretty);
481b3f9e
LP
687 log_debug("Connecting to time server %s (%s).", strna(pretty), m->current_server_name->string);
688 sd_notifyf(false, "STATUS=Connecting to time server %s (%s).", strna(pretty), m->current_server_name->string);
84e51726 689
84e51726
LP
690 r = manager_clock_watch_setup(m);
691 if (r < 0)
692 return r;
693
694 return manager_send_request(m);
695}
696
874ff7bf
LP
697void manager_set_server_name(Manager *m, ServerName *n) {
698 assert(m);
84e51726 699
874ff7bf
LP
700 if (m->current_server_name == n)
701 return;
84e51726 702
874ff7bf
LP
703 m->current_server_name = n;
704 m->current_server_address = NULL;
705
706 manager_disconnect(m);
84e51726 707
874ff7bf
LP
708 if (n)
709 log_debug("Selected server %s.", n->string);
710}
84e51726 711
874ff7bf 712void manager_set_server_address(Manager *m, ServerAddress *a) {
84e51726
LP
713 assert(m);
714
874ff7bf
LP
715 if (m->current_server_address == a)
716 return;
717
874ff7bf 718 m->current_server_address = a;
20f8d3cf
SN
719 /* If a is NULL, we are just clearing the address, without
720 * changing the name. Keep the existing name in that case. */
721 if (a)
722 m->current_server_name = a->name;
874ff7bf
LP
723
724 manager_disconnect(m);
725
726 if (a) {
727 _cleanup_free_ char *pretty = NULL;
728 server_address_pretty(a, &pretty);
729 log_debug("Selected address %s of server %s.", strna(pretty), a->name->string);
84e51726
LP
730 }
731}
732
733static int manager_resolve_handler(sd_resolve_query *q, int ret, const struct addrinfo *ai, void *userdata) {
734 Manager *m = userdata;
874ff7bf 735 int r;
84e51726
LP
736
737 assert(q);
738 assert(m);
739 assert(m->current_server_name);
740
741 m->resolve_query = sd_resolve_query_unref(m->resolve_query);
742
743 if (ret != 0) {
744 log_debug("Failed to resolve %s: %s", m->current_server_name->string, gai_strerror(ret));
745
746 /* Try next host */
747 return manager_connect(m);
748 }
749
84e51726
LP
750 for (; ai; ai = ai->ai_next) {
751 _cleanup_free_ char *pretty = NULL;
874ff7bf 752 ServerAddress *a;
84e51726
LP
753
754 assert(ai->ai_addr);
755 assert(ai->ai_addrlen >= offsetof(struct sockaddr, sa_data));
84e51726
LP
756
757 if (!IN_SET(ai->ai_addr->sa_family, AF_INET, AF_INET6)) {
758 log_warning("Unsuitable address protocol for %s", m->current_server_name->string);
759 continue;
760 }
761
874ff7bf 762 r = server_address_new(m->current_server_name, &a, (const union sockaddr_union*) ai->ai_addr, ai->ai_addrlen);
f647962d
MS
763 if (r < 0)
764 return log_error_errno(r, "Failed to add server address: %m");
84e51726 765
874ff7bf 766 server_address_pretty(a, &pretty);
84e51726
LP
767 log_debug("Resolved address %s for %s.", pretty, m->current_server_name->string);
768 }
769
770 if (!m->current_server_name->addresses) {
771 log_error("Failed to find suitable address for host %s.", m->current_server_name->string);
772
773 /* Try next host */
774 return manager_connect(m);
775 }
776
874ff7bf 777 manager_set_server_address(m, m->current_server_name->addresses);
84e51726
LP
778
779 return manager_begin(m);
780}
781
874ff7bf 782static int manager_retry_connect(sd_event_source *source, usec_t usec, void *userdata) {
84e51726
LP
783 Manager *m = userdata;
784
785 assert(m);
786
787 return manager_connect(m);
788}
789
790int manager_connect(Manager *m) {
84e51726
LP
791 int r;
792
793 assert(m);
794
795 manager_disconnect(m);
796
797 m->event_retry = sd_event_source_unref(m->event_retry);
7994ac1d 798 if (!ratelimit_below(&m->ratelimit)) {
84e51726
LP
799 log_debug("Slowing down attempts to contact servers.");
800
874ff7bf 801 r = sd_event_add_time(m->event, &m->event_retry, clock_boottime_or_monotonic(), now(clock_boottime_or_monotonic()) + RETRY_USEC, 0, manager_retry_connect, m);
f647962d
MS
802 if (r < 0)
803 return log_error_errno(r, "Failed to create retry timer: %m");
84e51726
LP
804
805 return 0;
806 }
807
808 /* If we already are operating on some address, switch to the
809 * next one. */
810 if (m->current_server_address && m->current_server_address->addresses_next)
874ff7bf 811 manager_set_server_address(m, m->current_server_address->addresses_next);
84e51726 812 else {
874ff7bf
LP
813 struct addrinfo hints = {
814 .ai_flags = AI_NUMERICSERV|AI_ADDRCONFIG,
815 .ai_socktype = SOCK_DGRAM,
816 };
84e51726 817
874ff7bf 818 /* Hmm, we are through all addresses, let's look for the next host instead */
84e51726 819 if (m->current_server_name && m->current_server_name->names_next)
874ff7bf 820 manager_set_server_name(m, m->current_server_name->names_next);
84e51726 821 else {
874ff7bf 822 ServerName *f;
63463bf0 823 bool restart = true;
874ff7bf
LP
824
825 /* Our current server name list is exhausted,
826 * let's find the next one to iterate. First
827 * we try the system list, then the link list.
828 * After having processed the link list we
829 * jump back to the system list. However, if
830 * both lists are empty, we change to the
831 * fallback list. */
832 if (!m->current_server_name || m->current_server_name->type == SERVER_LINK) {
833 f = m->system_servers;
834 if (!f)
835 f = m->link_servers;
836 } else {
837 f = m->link_servers;
838 if (!f)
839 f = m->system_servers;
63463bf0
ML
840 else
841 restart = false;
874ff7bf
LP
842 }
843
844 if (!f)
845 f = m->fallback_servers;
846
847 if (!f) {
848 manager_set_server_name(m, NULL);
84e51726
LP
849 log_debug("No server found.");
850 return 0;
851 }
852
63463bf0
ML
853 if (restart && !m->exhausted_servers && m->poll_interval_usec) {
854 log_debug("Waiting after exhausting servers.");
855 r = sd_event_add_time(m->event, &m->event_retry, clock_boottime_or_monotonic(), now(clock_boottime_or_monotonic()) + m->poll_interval_usec, 0, manager_retry_connect, m);
f647962d
MS
856 if (r < 0)
857 return log_error_errno(r, "Failed to create retry timer: %m");
63463bf0
ML
858
859 m->exhausted_servers = true;
860
861 /* Increase the polling interval */
a4465d0d 862 if (m->poll_interval_usec < m->poll_interval_max_usec)
63463bf0
ML
863 m->poll_interval_usec *= 2;
864
865 return 0;
866 }
867
868 m->exhausted_servers = false;
869
874ff7bf 870 manager_set_server_name(m, f);
84e51726
LP
871 }
872
873 /* Tell the resolver to reread /etc/resolv.conf, in
874 * case it changed. */
875 res_init();
876
874ff7bf
LP
877 /* Flush out any previously resolved addresses */
878 server_name_flush_addresses(m->current_server_name);
879
880 log_debug("Resolving %s...", m->current_server_name->string);
881
84e51726 882 r = sd_resolve_getaddrinfo(m->resolve, &m->resolve_query, m->current_server_name->string, "123", &hints, manager_resolve_handler, m);
f647962d
MS
883 if (r < 0)
884 return log_error_errno(r, "Failed to create resolver: %m");
84e51726
LP
885
886 return 1;
887 }
888
889 r = manager_begin(m);
890 if (r < 0)
891 return r;
892
893 return 1;
894}
895
84e51726
LP
896void manager_disconnect(Manager *m) {
897 assert(m);
898
899 m->resolve_query = sd_resolve_query_unref(m->resolve_query);
900
901 m->event_timer = sd_event_source_unref(m->event_timer);
902
f89c4e15 903 manager_listen_stop(m);
84e51726
LP
904
905 m->event_clock_watch = sd_event_source_unref(m->event_clock_watch);
906 m->clock_watch_fd = safe_close(m->clock_watch_fd);
907
908 m->event_timeout = sd_event_source_unref(m->event_timeout);
909
910 sd_notifyf(false, "STATUS=Idle.");
911}
912
874ff7bf
LP
913void manager_flush_server_names(Manager *m, ServerType t) {
914 assert(m);
915
916 if (t == SERVER_SYSTEM)
917 while (m->system_servers)
918 server_name_free(m->system_servers);
919
920 if (t == SERVER_LINK)
921 while (m->link_servers)
922 server_name_free(m->link_servers);
923
924 if (t == SERVER_FALLBACK)
925 while (m->fallback_servers)
926 server_name_free(m->fallback_servers);
927}
84e51726
LP
928
929void manager_free(Manager *m) {
930 if (!m)
931 return;
932
933 manager_disconnect(m);
874ff7bf
LP
934 manager_flush_server_names(m, SERVER_SYSTEM);
935 manager_flush_server_names(m, SERVER_LINK);
936 manager_flush_server_names(m, SERVER_FALLBACK);
84e51726
LP
937
938 sd_event_source_unref(m->event_retry);
939
940 sd_event_source_unref(m->network_event_source);
941 sd_network_monitor_unref(m->network_monitor);
942
943 sd_resolve_unref(m->resolve);
944 sd_event_unref(m->event);
945
e7dd3947
YW
946 sd_bus_unref(m->bus);
947
84e51726
LP
948 free(m);
949}
950
874ff7bf
LP
951static int manager_network_read_link_servers(Manager *m) {
952 _cleanup_strv_free_ char **ntp = NULL;
953 ServerName *n, *nx;
954 char **i;
3e85ec07 955 bool changed = false;
874ff7bf
LP
956 int r;
957
84e51726
LP
958 assert(m);
959
874ff7bf 960 r = sd_network_get_ntp(&ntp);
ba0c011e
YW
961 if (r < 0) {
962 if (r == -ENOMEM)
963 log_oom();
964 else
965 log_debug_errno(r, "Failed to get link NTP servers: %m");
874ff7bf 966 goto clear;
ba0c011e 967 }
874ff7bf
LP
968
969 LIST_FOREACH(names, n, m->link_servers)
970 n->marked = true;
971
972 STRV_FOREACH(i, ntp) {
973 bool found = false;
974
dcb37458
YW
975 r = dns_name_is_valid_or_address(*i);
976 if (r < 0) {
977 log_error_errno(r, "Failed to check validity of NTP server name or address '%s': %m", *i);
978 goto clear;
979 } else if (r == 0) {
980 log_error("Invalid NTP server name or address, ignoring: %s", *i);
981 continue;
982 }
983
874ff7bf
LP
984 LIST_FOREACH(names, n, m->link_servers)
985 if (streq(n->string, *i)) {
986 n->marked = false;
987 found = true;
988 break;
989 }
990
991 if (!found) {
992 r = server_name_new(m, NULL, SERVER_LINK, *i);
ba0c011e
YW
993 if (r < 0) {
994 log_oom();
874ff7bf 995 goto clear;
ba0c011e 996 }
3e85ec07
YW
997
998 changed = true;
874ff7bf
LP
999 }
1000 }
1001
1002 LIST_FOREACH_SAFE(names, n, nx, m->link_servers)
3e85ec07 1003 if (n->marked) {
874ff7bf 1004 server_name_free(n);
3e85ec07
YW
1005 changed = true;
1006 }
874ff7bf 1007
3e85ec07 1008 return changed;
874ff7bf
LP
1009
1010clear:
1011 manager_flush_server_names(m, SERVER_LINK);
1012 return r;
84e51726
LP
1013}
1014
0630eb1b
YW
1015static bool manager_is_connected(Manager *m) {
1016 /* Return true when the manager is sending a request, resolving a server name, or
1017 * in a poll interval. */
1018 return m->server_socket >= 0 || m->resolve_query || m->event_timer;
1019}
1020
84e51726
LP
1021static int manager_network_event_handler(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
1022 Manager *m = userdata;
3e85ec07 1023 bool changed, connected, online;
84e51726
LP
1024 int r;
1025
1026 assert(m);
1027
1028 sd_network_monitor_flush(m->network_monitor);
1029
ba0c011e 1030 /* When manager_network_read_link_servers() failed, we assume that the servers are changed. */
3e85ec07 1031 changed = !!manager_network_read_link_servers(m);
874ff7bf 1032
84e51726
LP
1033 /* check if the machine is online */
1034 online = network_is_online();
1035
1036 /* check if the client is currently connected */
0630eb1b 1037 connected = manager_is_connected(m);
84e51726
LP
1038
1039 if (connected && !online) {
1040 log_info("No network connectivity, watching for changes.");
1041 manager_disconnect(m);
1042
0630eb1b 1043 } else if ((!connected || changed) && online) {
84e51726
LP
1044 log_info("Network configuration changed, trying to establish connection.");
1045
1046 if (m->current_server_address)
1047 r = manager_begin(m);
1048 else
1049 r = manager_connect(m);
1050 if (r < 0)
1051 return r;
1052 }
1053
1054 return 0;
1055}
1056
1057static int manager_network_monitor_listen(Manager *m) {
1058 int r, fd, events;
1059
1060 assert(m);
1061
1062 r = sd_network_monitor_new(&m->network_monitor, NULL);
36484c03 1063 if (r == -ENOENT) {
f95b0be7 1064 log_info("systemd does not appear to be running, not listening for systemd-networkd events.");
36484c03
ZJS
1065 return 0;
1066 }
84e51726
LP
1067 if (r < 0)
1068 return r;
1069
1070 fd = sd_network_monitor_get_fd(m->network_monitor);
1071 if (fd < 0)
1072 return fd;
1073
1074 events = sd_network_monitor_get_events(m->network_monitor);
1075 if (events < 0)
1076 return events;
1077
1078 r = sd_event_add_io(m->event, &m->network_event_source, fd, events, manager_network_event_handler, m);
1079 if (r < 0)
1080 return r;
1081
1082 return 0;
1083}
1084
1085int manager_new(Manager **ret) {
1086 _cleanup_(manager_freep) Manager *m = NULL;
1087 int r;
1088
1089 assert(ret);
1090
1091 m = new0(Manager, 1);
1092 if (!m)
1093 return -ENOMEM;
1094
f907cc16 1095 m->max_root_distance_usec = NTP_MAX_ROOT_DISTANCE;
a4465d0d
YW
1096 m->poll_interval_min_usec = NTP_POLL_INTERVAL_MIN_USEC;
1097 m->poll_interval_max_usec = NTP_POLL_INTERVAL_MAX_USEC;
f907cc16 1098
84e51726
LP
1099 m->server_socket = m->clock_watch_fd = -1;
1100
1101 RATELIMIT_INIT(m->ratelimit, RATELIMIT_INTERVAL_USEC, RATELIMIT_BURST);
1102
84e51726
LP
1103 r = sd_event_default(&m->event);
1104 if (r < 0)
1105 return r;
1106
1107 sd_event_add_signal(m->event, NULL, SIGTERM, NULL, NULL);
1108 sd_event_add_signal(m->event, NULL, SIGINT, NULL, NULL);
1109
1110 sd_event_set_watchdog(m->event, true);
1111
1112 r = sd_resolve_default(&m->resolve);
1113 if (r < 0)
1114 return r;
1115
1116 r = sd_resolve_attach_event(m->resolve, m->event, 0);
1117 if (r < 0)
1118 return r;
1119
1120 r = manager_network_monitor_listen(m);
1121 if (r < 0)
1122 return r;
1123
ba0c011e 1124 (void) manager_network_read_link_servers(m);
874ff7bf 1125
1cc6c93a 1126 *ret = TAKE_PTR(m);
84e51726
LP
1127
1128 return 0;
1129}