]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/timesync/timesyncd-manager.c
time-wait-sync: use watchfile to coordinate with timesyncd
[thirdparty/systemd.git] / src / timesync / timesyncd-manager.c
CommitLineData
53e1b683 1/* SPDX-License-Identifier: LGPL-2.1+ */
84e51726
LP
2/***
3 This file is part of systemd.
4
5 Copyright 2014 Kay Sievers, Lennart Poettering
84e51726
LP
6***/
7
84e51726 8#include <errno.h>
84e51726 9#include <math.h>
84e51726
LP
10#include <netinet/in.h>
11#include <netinet/ip.h>
07630cea
LP
12#include <resolv.h>
13#include <stdlib.h>
14#include <sys/socket.h>
84e51726
LP
15#include <sys/timerfd.h>
16#include <sys/timex.h>
84e51726 17#include <sys/types.h>
07630cea
LP
18#include <time.h>
19
20#include "sd-daemon.h"
84e51726 21
b5efdb8a 22#include "alloc-util.h"
3ffd4af2 23#include "fd-util.h"
f4f15635 24#include "fs-util.h"
84e51726 25#include "list.h"
07630cea
LP
26#include "log.h"
27#include "missing.h"
28#include "network-util.h"
84e51726 29#include "ratelimit.h"
07630cea
LP
30#include "socket-util.h"
31#include "sparse-endian.h"
32#include "string-util.h"
84e51726 33#include "strv.h"
07630cea 34#include "time-util.h"
84e51726
LP
35#include "timesyncd-conf.h"
36#include "timesyncd-manager.h"
3ffd4af2 37#include "util.h"
84e51726
LP
38
39#ifndef ADJ_SETOFFSET
40#define ADJ_SETOFFSET 0x0100 /* add 'time' to current time */
41#endif
42
43/* expected accuracy of time synchronization; used to adjust the poll interval */
44#define NTP_ACCURACY_SEC 0.2
45
84e51726
LP
46/*
47 * Maximum delta in seconds which the system clock is gradually adjusted
a4465d0d 48 * (slewed) to approach the network time. Deltas larger that this are set by
84e51726
LP
49 * letting the system time jump. The kernel's limit for adjtime is 0.5s.
50 */
51#define NTP_MAX_ADJUST 0.4
52
53/* NTP protocol, packet header */
54#define NTP_LEAP_PLUSSEC 1
55#define NTP_LEAP_MINUSSEC 2
56#define NTP_LEAP_NOTINSYNC 3
57#define NTP_MODE_CLIENT 3
58#define NTP_MODE_SERVER 4
59#define NTP_FIELD_LEAP(f) (((f) >> 6) & 3)
60#define NTP_FIELD_VERSION(f) (((f) >> 3) & 7)
61#define NTP_FIELD_MODE(f) ((f) & 7)
62#define NTP_FIELD(l, v, m) (((l) << 6) | ((v) << 3) | (m))
63
a4465d0d 64/* Default of maximum acceptable root distance in microseconds. */
f907cc16 65#define NTP_MAX_ROOT_DISTANCE (5 * USEC_PER_SEC)
3af0442c 66
e8206972
ML
67/* Maximum number of missed replies before selecting another source. */
68#define NTP_MAX_MISSED_REPLIES 2
69
84e51726
LP
70/*
71 * "NTP timestamps are represented as a 64-bit unsigned fixed-point number,
72 * in seconds relative to 0h on 1 January 1900."
73 */
625b3b71 74#define OFFSET_1900_1970 UINT64_C(2208988800)
84e51726
LP
75
76#define RETRY_USEC (30*USEC_PER_SEC)
77#define RATELIMIT_INTERVAL_USEC (10*USEC_PER_SEC)
78#define RATELIMIT_BURST 10
79
80#define TIMEOUT_USEC (10*USEC_PER_SEC)
81
82struct ntp_ts {
83 be32_t sec;
84 be32_t frac;
85} _packed_;
86
87struct ntp_ts_short {
88 be16_t sec;
89 be16_t frac;
90} _packed_;
91
92struct ntp_msg {
93 uint8_t field;
94 uint8_t stratum;
95 int8_t poll;
96 int8_t precision;
97 struct ntp_ts_short root_delay;
98 struct ntp_ts_short root_dispersion;
99 char refid[4];
100 struct ntp_ts reference_time;
101 struct ntp_ts origin_time;
102 struct ntp_ts recv_time;
103 struct ntp_ts trans_time;
104} _packed_;
105
106static int manager_arm_timer(Manager *m, usec_t next);
107static int manager_clock_watch_setup(Manager *m);
7b628891 108static int manager_listen_setup(Manager *m);
f89c4e15 109static void manager_listen_stop(Manager *m);
84e51726 110
3af0442c
ML
111static double ntp_ts_short_to_d(const struct ntp_ts_short *ts) {
112 return be16toh(ts->sec) + (be16toh(ts->frac) / 65536.0);
113}
114
84e51726
LP
115static double ntp_ts_to_d(const struct ntp_ts *ts) {
116 return be32toh(ts->sec) + ((double)be32toh(ts->frac) / UINT_MAX);
117}
118
119static double ts_to_d(const struct timespec *ts) {
120 return ts->tv_sec + (1.0e-9 * ts->tv_nsec);
121}
122
84e51726
LP
123static int manager_timeout(sd_event_source *source, usec_t usec, void *userdata) {
124 _cleanup_free_ char *pretty = NULL;
125 Manager *m = userdata;
126
127 assert(m);
128 assert(m->current_server_name);
129 assert(m->current_server_address);
130
131 server_address_pretty(m->current_server_address, &pretty);
132 log_info("Timed out waiting for reply from %s (%s).", strna(pretty), m->current_server_name->string);
133
134 return manager_connect(m);
135}
136
137static int manager_send_request(Manager *m) {
138 _cleanup_free_ char *pretty = NULL;
139 struct ntp_msg ntpmsg = {
140 /*
141 * "The client initializes the NTP message header, sends the request
142 * to the server, and strips the time of day from the Transmit
143 * Timestamp field of the reply. For this purpose, all the NTP
144 * header fields are set to 0, except the Mode, VN, and optional
145 * Transmit Timestamp fields."
146 */
147 .field = NTP_FIELD(0, 4, NTP_MODE_CLIENT),
148 };
149 ssize_t len;
150 int r;
151
152 assert(m);
153 assert(m->current_server_name);
154 assert(m->current_server_address);
155
156 m->event_timeout = sd_event_source_unref(m->event_timeout);
157
f89c4e15
LP
158 r = manager_listen_setup(m);
159 if (r < 0)
160 return log_warning_errno(r, "Failed to setup connection socket: %m");
7b628891 161
84e51726
LP
162 /*
163 * Set transmit timestamp, remember it; the server will send that back
164 * as the origin timestamp and we have an indication that this is the
165 * matching answer to our request.
166 *
167 * The actual value does not matter, We do not care about the correct
168 * NTP UINT_MAX fraction; we just pass the plain nanosecond value.
169 */
170 assert_se(clock_gettime(clock_boottime_or_monotonic(), &m->trans_time_mon) >= 0);
171 assert_se(clock_gettime(CLOCK_REALTIME, &m->trans_time) >= 0);
172 ntpmsg.trans_time.sec = htobe32(m->trans_time.tv_sec + OFFSET_1900_1970);
173 ntpmsg.trans_time.frac = htobe32(m->trans_time.tv_nsec);
174
175 server_address_pretty(m->current_server_address, &pretty);
176
177 len = sendto(m->server_socket, &ntpmsg, sizeof(ntpmsg), MSG_DONTWAIT, &m->current_server_address->sockaddr.sa, m->current_server_address->socklen);
178 if (len == sizeof(ntpmsg)) {
179 m->pending = true;
180 log_debug("Sent NTP request to %s (%s).", strna(pretty), m->current_server_name->string);
181 } else {
56f64d95 182 log_debug_errno(errno, "Sending NTP request to %s (%s) failed: %m", strna(pretty), m->current_server_name->string);
84e51726
LP
183 return manager_connect(m);
184 }
185
ab4df227
KS
186 /* re-arm timer with increasing timeout, in case the packets never arrive back */
187 if (m->retry_interval > 0) {
a4465d0d 188 if (m->retry_interval < m->poll_interval_max_usec)
ab4df227
KS
189 m->retry_interval *= 2;
190 } else
a4465d0d 191 m->retry_interval = m->poll_interval_min_usec;
ab4df227
KS
192
193 r = manager_arm_timer(m, m->retry_interval);
f647962d
MS
194 if (r < 0)
195 return log_error_errno(r, "Failed to rearm timer: %m");
ab4df227 196
e8206972
ML
197 m->missed_replies++;
198 if (m->missed_replies > NTP_MAX_MISSED_REPLIES) {
199 r = sd_event_add_time(
200 m->event,
201 &m->event_timeout,
202 clock_boottime_or_monotonic(),
203 now(clock_boottime_or_monotonic()) + TIMEOUT_USEC, 0,
204 manager_timeout, m);
f647962d
MS
205 if (r < 0)
206 return log_error_errno(r, "Failed to arm timeout timer: %m");
84e51726
LP
207 }
208
209 return 0;
210}
211
212static int manager_timer(sd_event_source *source, usec_t usec, void *userdata) {
213 Manager *m = userdata;
214
215 assert(m);
216
217 return manager_send_request(m);
218}
219
220static int manager_arm_timer(Manager *m, usec_t next) {
221 int r;
222
223 assert(m);
84e51726
LP
224
225 if (next == 0) {
226 m->event_timer = sd_event_source_unref(m->event_timer);
227 return 0;
228 }
229
230 if (m->event_timer) {
231 r = sd_event_source_set_time(m->event_timer, now(clock_boottime_or_monotonic()) + next);
232 if (r < 0)
233 return r;
234
235 return sd_event_source_set_enabled(m->event_timer, SD_EVENT_ONESHOT);
236 }
237
238 return sd_event_add_time(
239 m->event,
240 &m->event_timer,
241 clock_boottime_or_monotonic(),
242 now(clock_boottime_or_monotonic()) + next, 0,
243 manager_timer, m);
244}
245
246static int manager_clock_watch(sd_event_source *source, int fd, uint32_t revents, void *userdata) {
247 Manager *m = userdata;
248
249 assert(m);
250
251 /* rearm timer */
252 manager_clock_watch_setup(m);
253
254 /* skip our own jumps */
255 if (m->jumped) {
256 m->jumped = false;
257 return 0;
258 }
259
260 /* resync */
7e3254b3 261 log_debug("System time changed. Resyncing.");
84e51726
LP
262 m->poll_resync = true;
263
264 return manager_send_request(m);
265}
266
267/* wake up when the system time changes underneath us */
268static int manager_clock_watch_setup(Manager *m) {
269
270 struct itimerspec its = {
271 .it_value.tv_sec = TIME_T_MAX
272 };
273
274 int r;
275
276 assert(m);
277
278 m->event_clock_watch = sd_event_source_unref(m->event_clock_watch);
279 safe_close(m->clock_watch_fd);
280
281 m->clock_watch_fd = timerfd_create(CLOCK_REALTIME, TFD_NONBLOCK|TFD_CLOEXEC);
4a62c710
MS
282 if (m->clock_watch_fd < 0)
283 return log_error_errno(errno, "Failed to create timerfd: %m");
84e51726 284
4a62c710
MS
285 if (timerfd_settime(m->clock_watch_fd, TFD_TIMER_ABSTIME|TFD_TIMER_CANCEL_ON_SET, &its, NULL) < 0)
286 return log_error_errno(errno, "Failed to set up timerfd: %m");
84e51726
LP
287
288 r = sd_event_add_io(m->event, &m->event_clock_watch, m->clock_watch_fd, EPOLLIN, manager_clock_watch, m);
f647962d
MS
289 if (r < 0)
290 return log_error_errno(r, "Failed to create clock watch event source: %m");
84e51726
LP
291
292 return 0;
293}
294
295static int manager_adjust_clock(Manager *m, double offset, int leap_sec) {
296 struct timex tmx = {};
297 int r;
298
299 assert(m);
300
301 /*
302 * For small deltas, tell the kernel to gradually adjust the system
303 * clock to the NTP time, larger deltas are just directly set.
304 */
305 if (fabs(offset) < NTP_MAX_ADJUST) {
306 tmx.modes = ADJ_STATUS | ADJ_NANO | ADJ_OFFSET | ADJ_TIMECONST | ADJ_MAXERROR | ADJ_ESTERROR;
307 tmx.status = STA_PLL;
308 tmx.offset = offset * NSEC_PER_SEC;
309 tmx.constant = log2i(m->poll_interval_usec / USEC_PER_SEC) - 4;
310 tmx.maxerror = 0;
311 tmx.esterror = 0;
ff49bc32 312 log_debug(" adjust (slew): %+.3f sec", offset);
84e51726 313 } else {
5f36e3d3 314 tmx.modes = ADJ_STATUS | ADJ_NANO | ADJ_SETOFFSET | ADJ_MAXERROR | ADJ_ESTERROR;
84e51726
LP
315
316 /* ADJ_NANO uses nanoseconds in the microseconds field */
317 tmx.time.tv_sec = (long)offset;
318 tmx.time.tv_usec = (offset - tmx.time.tv_sec) * NSEC_PER_SEC;
5f36e3d3
AK
319 tmx.maxerror = 0;
320 tmx.esterror = 0;
84e51726
LP
321
322 /* the kernel expects -0.3s as {-1, 7000.000.000} */
323 if (tmx.time.tv_usec < 0) {
324 tmx.time.tv_sec -= 1;
325 tmx.time.tv_usec += NSEC_PER_SEC;
326 }
327
328 m->jumped = true;
ff49bc32 329 log_debug(" adjust (jump): %+.3f sec", offset);
84e51726
LP
330 }
331
332 /*
333 * An unset STA_UNSYNC will enable the kernel's 11-minute mode,
334 * which syncs the system time periodically to the RTC.
335 *
336 * In case the RTC runs in local time, never touch the RTC,
337 * we have no way to properly handle daylight saving changes and
338 * mobile devices moving between time zones.
339 */
340 if (m->rtc_local_time)
341 tmx.status |= STA_UNSYNC;
342
343 switch (leap_sec) {
344 case 1:
345 tmx.status |= STA_INS;
346 break;
347 case -1:
348 tmx.status |= STA_DEL;
349 break;
350 }
351
352 r = clock_adjtime(CLOCK_REALTIME, &tmx);
353 if (r < 0)
6ff6f4d8 354 return -errno;
84e51726 355
baa33e79 356 /* If touch fails, there isn't much we can do. Maybe it'll work next time. */
53d133ea 357 (void) touch("/var/lib/systemd/timesync/clock");
2dd79846 358 (void) touch("/run/systemd/timesync/synchronized");
84e51726
LP
359
360 m->drift_ppm = tmx.freq / 65536;
361
362 log_debug(" status : %04i %s\n"
0060bb8f 363 " time now : %"PRI_TIME".%03"PRI_USEC"\n"
3bd7ef83 364 " constant : %"PRI_TIMEX"\n"
84e51726 365 " offset : %+.3f sec\n"
3bd7ef83 366 " freq offset : %+"PRI_TIMEX" (%i ppm)\n",
84e51726 367 tmx.status, tmx.status & STA_UNSYNC ? "unsync" : "sync",
70887c5f 368 tmx.time.tv_sec, tmx.time.tv_usec / NSEC_PER_MSEC,
84e51726
LP
369 tmx.constant,
370 (double)tmx.offset / NSEC_PER_SEC,
371 tmx.freq, m->drift_ppm);
372
373 return 0;
374}
375
376static bool manager_sample_spike_detection(Manager *m, double offset, double delay) {
377 unsigned int i, idx_cur, idx_new, idx_min;
378 double jitter;
379 double j;
380
381 assert(m);
382
383 m->packet_count++;
384
385 /* ignore initial sample */
386 if (m->packet_count == 1)
387 return false;
388
389 /* store the current data in our samples array */
390 idx_cur = m->samples_idx;
391 idx_new = (idx_cur + 1) % ELEMENTSOF(m->samples);
392 m->samples_idx = idx_new;
393 m->samples[idx_new].offset = offset;
394 m->samples[idx_new].delay = delay;
395
396 /* calculate new jitter value from the RMS differences relative to the lowest delay sample */
397 jitter = m->samples_jitter;
398 for (idx_min = idx_cur, i = 0; i < ELEMENTSOF(m->samples); i++)
399 if (m->samples[i].delay > 0 && m->samples[i].delay < m->samples[idx_min].delay)
400 idx_min = i;
401
402 j = 0;
403 for (i = 0; i < ELEMENTSOF(m->samples); i++)
fa66b606 404 j += pow(m->samples[i].offset - m->samples[idx_min].offset, 2);
84e51726
LP
405 m->samples_jitter = sqrt(j / (ELEMENTSOF(m->samples) - 1));
406
407 /* ignore samples when resyncing */
408 if (m->poll_resync)
409 return false;
410
411 /* always accept offset if we are farther off than the round-trip delay */
412 if (fabs(offset) > delay)
413 return false;
414
415 /* we need a few samples before looking at them */
416 if (m->packet_count < 4)
417 return false;
418
419 /* do not accept anything worse than the maximum possible error of the best sample */
420 if (fabs(offset) > m->samples[idx_min].delay)
421 return true;
422
423 /* compare the difference between the current offset to the previous offset and jitter */
424 return fabs(offset - m->samples[idx_cur].offset) > 3 * jitter;
425}
426
427static void manager_adjust_poll(Manager *m, double offset, bool spike) {
428 assert(m);
429
430 if (m->poll_resync) {
a4465d0d 431 m->poll_interval_usec = m->poll_interval_min_usec;
84e51726
LP
432 m->poll_resync = false;
433 return;
434 }
435
436 /* set to minimal poll interval */
437 if (!spike && fabs(offset) > NTP_ACCURACY_SEC) {
a4465d0d 438 m->poll_interval_usec = m->poll_interval_min_usec;
84e51726
LP
439 return;
440 }
441
442 /* increase polling interval */
443 if (fabs(offset) < NTP_ACCURACY_SEC * 0.25) {
a4465d0d 444 if (m->poll_interval_usec < m->poll_interval_max_usec)
84e51726
LP
445 m->poll_interval_usec *= 2;
446 return;
447 }
448
449 /* decrease polling interval */
450 if (spike || fabs(offset) > NTP_ACCURACY_SEC * 0.75) {
a4465d0d 451 if (m->poll_interval_usec > m->poll_interval_min_usec)
84e51726
LP
452 m->poll_interval_usec /= 2;
453 return;
454 }
455}
456
457static int manager_receive_response(sd_event_source *source, int fd, uint32_t revents, void *userdata) {
458 Manager *m = userdata;
459 struct ntp_msg ntpmsg;
460
461 struct iovec iov = {
462 .iov_base = &ntpmsg,
463 .iov_len = sizeof(ntpmsg),
464 };
465 union {
466 struct cmsghdr cmsghdr;
467 uint8_t buf[CMSG_SPACE(sizeof(struct timeval))];
468 } control;
469 union sockaddr_union server_addr;
470 struct msghdr msghdr = {
471 .msg_iov = &iov,
472 .msg_iovlen = 1,
473 .msg_control = &control,
474 .msg_controllen = sizeof(control),
475 .msg_name = &server_addr,
476 .msg_namelen = sizeof(server_addr),
477 };
478 struct cmsghdr *cmsg;
1cc6c93a 479 struct timespec *recv_time = NULL;
84e51726
LP
480 ssize_t len;
481 double origin, receive, trans, dest;
482 double delay, offset;
3af0442c 483 double root_distance;
84e51726
LP
484 bool spike;
485 int leap_sec;
486 int r;
487
488 assert(source);
489 assert(m);
490
491 if (revents & (EPOLLHUP|EPOLLERR)) {
492 log_warning("Server connection returned error.");
493 return manager_connect(m);
494 }
495
a38d9945 496 len = recvmsg(fd, &msghdr, MSG_DONTWAIT);
84e51726
LP
497 if (len < 0) {
498 if (errno == EAGAIN)
499 return 0;
500
501 log_warning("Error receiving message. Disconnecting.");
502 return manager_connect(m);
503 }
504
43fcd650
TM
505 /* Too short or too long packet? */
506 if (iov.iov_len < sizeof(struct ntp_msg) || (msghdr.msg_flags & MSG_TRUNC)) {
84e51726
LP
507 log_warning("Invalid response from server. Disconnecting.");
508 return manager_connect(m);
509 }
510
511 if (!m->current_server_name ||
512 !m->current_server_address ||
513 !sockaddr_equal(&server_addr, &m->current_server_address->sockaddr)) {
514 log_debug("Response from unknown server.");
515 return 0;
516 }
517
2a1288ff 518 CMSG_FOREACH(cmsg, &msghdr) {
84e51726
LP
519 if (cmsg->cmsg_level != SOL_SOCKET)
520 continue;
521
522 switch (cmsg->cmsg_type) {
487a3682
ML
523 case SCM_TIMESTAMPNS:
524 recv_time = (struct timespec *) CMSG_DATA(cmsg);
84e51726
LP
525 break;
526 }
527 }
528 if (!recv_time) {
529 log_error("Invalid packet timestamp.");
530 return -EINVAL;
531 }
532
533 if (!m->pending) {
534 log_debug("Unexpected reply. Ignoring.");
535 return 0;
536 }
537
e8206972
ML
538 m->missed_replies = 0;
539
84e51726
LP
540 /* check our "time cookie" (we just stored nanoseconds in the fraction field) */
541 if (be32toh(ntpmsg.origin_time.sec) != m->trans_time.tv_sec + OFFSET_1900_1970 ||
edd50d5e 542 be32toh(ntpmsg.origin_time.frac) != (unsigned long) m->trans_time.tv_nsec) {
84e51726
LP
543 log_debug("Invalid reply; not our transmit time. Ignoring.");
544 return 0;
545 }
546
547 m->event_timeout = sd_event_source_unref(m->event_timeout);
548
549 if (be32toh(ntpmsg.recv_time.sec) < TIME_EPOCH + OFFSET_1900_1970 ||
550 be32toh(ntpmsg.trans_time.sec) < TIME_EPOCH + OFFSET_1900_1970) {
551 log_debug("Invalid reply, returned times before epoch. Ignoring.");
552 return manager_connect(m);
553 }
554
07610e10
ML
555 if (NTP_FIELD_LEAP(ntpmsg.field) == NTP_LEAP_NOTINSYNC ||
556 ntpmsg.stratum == 0 || ntpmsg.stratum >= 16) {
84e51726
LP
557 log_debug("Server is not synchronized. Disconnecting.");
558 return manager_connect(m);
559 }
560
561 if (!IN_SET(NTP_FIELD_VERSION(ntpmsg.field), 3, 4)) {
562 log_debug("Response NTPv%d. Disconnecting.", NTP_FIELD_VERSION(ntpmsg.field));
563 return manager_connect(m);
564 }
565
566 if (NTP_FIELD_MODE(ntpmsg.field) != NTP_MODE_SERVER) {
567 log_debug("Unsupported mode %d. Disconnecting.", NTP_FIELD_MODE(ntpmsg.field));
568 return manager_connect(m);
569 }
570
3af0442c 571 root_distance = ntp_ts_short_to_d(&ntpmsg.root_delay) / 2 + ntp_ts_short_to_d(&ntpmsg.root_dispersion);
f907cc16 572 if (root_distance > (double) m->max_root_distance_usec / (double) USEC_PER_SEC) {
3af0442c
ML
573 log_debug("Server has too large root distance. Disconnecting.");
574 return manager_connect(m);
575 }
576
84e51726
LP
577 /* valid packet */
578 m->pending = false;
ab4df227 579 m->retry_interval = 0;
84e51726 580
7b628891 581 /* Stop listening */
f89c4e15 582 manager_listen_stop(m);
7b628891 583
84e51726
LP
584 /* announce leap seconds */
585 if (NTP_FIELD_LEAP(ntpmsg.field) & NTP_LEAP_PLUSSEC)
586 leap_sec = 1;
587 else if (NTP_FIELD_LEAP(ntpmsg.field) & NTP_LEAP_MINUSSEC)
588 leap_sec = -1;
589 else
590 leap_sec = 0;
591
592 /*
593 * "Timestamp Name ID When Generated
594 * ------------------------------------------------------------
595 * Originate Timestamp T1 time request sent by client
596 * Receive Timestamp T2 time request received by server
597 * Transmit Timestamp T3 time reply sent by server
598 * Destination Timestamp T4 time reply received by client
599 *
600 * The round-trip delay, d, and system clock offset, t, are defined as:
601 * d = (T4 - T1) - (T3 - T2) t = ((T2 - T1) + (T3 - T4)) / 2"
602 */
73c76e63 603 origin = ts_to_d(&m->trans_time) + OFFSET_1900_1970;
84e51726
LP
604 receive = ntp_ts_to_d(&ntpmsg.recv_time);
605 trans = ntp_ts_to_d(&ntpmsg.trans_time);
487a3682 606 dest = ts_to_d(recv_time) + OFFSET_1900_1970;
84e51726
LP
607
608 offset = ((receive - origin) + (trans - dest)) / 2;
609 delay = (dest - origin) - (trans - receive);
610
611 spike = manager_sample_spike_detection(m, offset, delay);
612
613 manager_adjust_poll(m, offset, spike);
614
615 log_debug("NTP response:\n"
616 " leap : %u\n"
617 " version : %u\n"
618 " mode : %u\n"
619 " stratum : %u\n"
620 " precision : %.6f sec (%d)\n"
3af0442c 621 " root distance: %.6f sec\n"
84e51726
LP
622 " reference : %.4s\n"
623 " origin : %.3f\n"
624 " receive : %.3f\n"
625 " transmit : %.3f\n"
626 " dest : %.3f\n"
627 " offset : %+.3f sec\n"
628 " delay : %+.3f sec\n"
629 " packet count : %"PRIu64"\n"
630 " jitter : %.3f%s\n"
631 " poll interval: " USEC_FMT "\n",
632 NTP_FIELD_LEAP(ntpmsg.field),
633 NTP_FIELD_VERSION(ntpmsg.field),
634 NTP_FIELD_MODE(ntpmsg.field),
635 ntpmsg.stratum,
636 exp2(ntpmsg.precision), ntpmsg.precision,
3af0442c 637 root_distance,
84e51726
LP
638 ntpmsg.stratum == 1 ? ntpmsg.refid : "n/a",
639 origin - OFFSET_1900_1970,
640 receive - OFFSET_1900_1970,
641 trans - OFFSET_1900_1970,
642 dest - OFFSET_1900_1970,
643 offset, delay,
644 m->packet_count,
645 m->samples_jitter, spike ? " spike" : "",
646 m->poll_interval_usec / USEC_PER_SEC);
647
648 if (!spike) {
649 m->sync = true;
650 r = manager_adjust_clock(m, offset, leap_sec);
651 if (r < 0)
6ff6f4d8 652 log_error_errno(r, "Failed to call clock_adjtime(): %m");
84e51726
LP
653 }
654
7b5b3fc3
LP
655 log_debug("interval/delta/delay/jitter/drift " USEC_FMT "s/%+.3fs/%.3fs/%.3fs/%+ippm%s",
656 m->poll_interval_usec / USEC_PER_SEC, offset, delay, m->samples_jitter, m->drift_ppm,
657 spike ? " (ignored)" : "");
84e51726 658
481b3f9e
LP
659 if (!m->good) {
660 _cleanup_free_ char *pretty = NULL;
661
662 m->good = true;
663
664 server_address_pretty(m->current_server_address, &pretty);
665 log_info("Synchronized to time server %s (%s).", strna(pretty), m->current_server_name->string);
666 sd_notifyf(false, "STATUS=Synchronized to time server %s (%s).", strna(pretty), m->current_server_name->string);
667 }
668
84e51726 669 r = manager_arm_timer(m, m->poll_interval_usec);
f647962d
MS
670 if (r < 0)
671 return log_error_errno(r, "Failed to rearm timer: %m");
84e51726
LP
672
673 return 0;
674}
675
676static int manager_listen_setup(Manager *m) {
677 union sockaddr_union addr = {};
678 static const int tos = IPTOS_LOWDELAY;
679 static const int on = 1;
680 int r;
681
682 assert(m);
683
f89c4e15
LP
684 if (m->server_socket >= 0)
685 return 0;
686
84e51726
LP
687 assert(!m->event_receive);
688 assert(m->current_server_address);
689
690 addr.sa.sa_family = m->current_server_address->sockaddr.sa.sa_family;
691
692 m->server_socket = socket(addr.sa.sa_family, SOCK_DGRAM | SOCK_CLOEXEC, 0);
693 if (m->server_socket < 0)
694 return -errno;
695
696 r = bind(m->server_socket, &addr.sa, m->current_server_address->socklen);
697 if (r < 0)
698 return -errno;
699
487a3682 700 r = setsockopt(m->server_socket, SOL_SOCKET, SO_TIMESTAMPNS, &on, sizeof(on));
84e51726
LP
701 if (r < 0)
702 return -errno;
703
69f00817 704 (void) setsockopt(m->server_socket, IPPROTO_IP, IP_TOS, &tos, sizeof(tos));
84e51726
LP
705
706 return sd_event_add_io(m->event, &m->event_receive, m->server_socket, EPOLLIN, manager_receive_response, m);
707}
708
f89c4e15
LP
709static void manager_listen_stop(Manager *m) {
710 assert(m);
711
712 m->event_receive = sd_event_source_unref(m->event_receive);
713 m->server_socket = safe_close(m->server_socket);
714}
715
84e51726
LP
716static int manager_begin(Manager *m) {
717 _cleanup_free_ char *pretty = NULL;
718 int r;
719
720 assert(m);
721 assert_return(m->current_server_name, -EHOSTUNREACH);
722 assert_return(m->current_server_address, -EHOSTUNREACH);
723
481b3f9e 724 m->good = false;
e8206972 725 m->missed_replies = NTP_MAX_MISSED_REPLIES;
80cd2606 726 if (m->poll_interval_usec == 0)
a4465d0d 727 m->poll_interval_usec = m->poll_interval_min_usec;
84e51726
LP
728
729 server_address_pretty(m->current_server_address, &pretty);
481b3f9e
LP
730 log_debug("Connecting to time server %s (%s).", strna(pretty), m->current_server_name->string);
731 sd_notifyf(false, "STATUS=Connecting to time server %s (%s).", strna(pretty), m->current_server_name->string);
84e51726 732
84e51726
LP
733 r = manager_clock_watch_setup(m);
734 if (r < 0)
735 return r;
736
737 return manager_send_request(m);
738}
739
874ff7bf
LP
740void manager_set_server_name(Manager *m, ServerName *n) {
741 assert(m);
84e51726 742
874ff7bf
LP
743 if (m->current_server_name == n)
744 return;
84e51726 745
874ff7bf
LP
746 m->current_server_name = n;
747 m->current_server_address = NULL;
748
749 manager_disconnect(m);
84e51726 750
874ff7bf
LP
751 if (n)
752 log_debug("Selected server %s.", n->string);
753}
84e51726 754
874ff7bf 755void manager_set_server_address(Manager *m, ServerAddress *a) {
84e51726
LP
756 assert(m);
757
874ff7bf
LP
758 if (m->current_server_address == a)
759 return;
760
874ff7bf 761 m->current_server_address = a;
20f8d3cf
SN
762 /* If a is NULL, we are just clearing the address, without
763 * changing the name. Keep the existing name in that case. */
764 if (a)
765 m->current_server_name = a->name;
874ff7bf
LP
766
767 manager_disconnect(m);
768
769 if (a) {
770 _cleanup_free_ char *pretty = NULL;
771 server_address_pretty(a, &pretty);
772 log_debug("Selected address %s of server %s.", strna(pretty), a->name->string);
84e51726
LP
773 }
774}
775
776static int manager_resolve_handler(sd_resolve_query *q, int ret, const struct addrinfo *ai, void *userdata) {
777 Manager *m = userdata;
874ff7bf 778 int r;
84e51726
LP
779
780 assert(q);
781 assert(m);
782 assert(m->current_server_name);
783
784 m->resolve_query = sd_resolve_query_unref(m->resolve_query);
785
786 if (ret != 0) {
787 log_debug("Failed to resolve %s: %s", m->current_server_name->string, gai_strerror(ret));
788
789 /* Try next host */
790 return manager_connect(m);
791 }
792
84e51726
LP
793 for (; ai; ai = ai->ai_next) {
794 _cleanup_free_ char *pretty = NULL;
874ff7bf 795 ServerAddress *a;
84e51726
LP
796
797 assert(ai->ai_addr);
798 assert(ai->ai_addrlen >= offsetof(struct sockaddr, sa_data));
84e51726
LP
799
800 if (!IN_SET(ai->ai_addr->sa_family, AF_INET, AF_INET6)) {
801 log_warning("Unsuitable address protocol for %s", m->current_server_name->string);
802 continue;
803 }
804
874ff7bf 805 r = server_address_new(m->current_server_name, &a, (const union sockaddr_union*) ai->ai_addr, ai->ai_addrlen);
f647962d
MS
806 if (r < 0)
807 return log_error_errno(r, "Failed to add server address: %m");
84e51726 808
874ff7bf 809 server_address_pretty(a, &pretty);
84e51726
LP
810 log_debug("Resolved address %s for %s.", pretty, m->current_server_name->string);
811 }
812
813 if (!m->current_server_name->addresses) {
814 log_error("Failed to find suitable address for host %s.", m->current_server_name->string);
815
816 /* Try next host */
817 return manager_connect(m);
818 }
819
874ff7bf 820 manager_set_server_address(m, m->current_server_name->addresses);
84e51726
LP
821
822 return manager_begin(m);
823}
824
874ff7bf 825static int manager_retry_connect(sd_event_source *source, usec_t usec, void *userdata) {
84e51726
LP
826 Manager *m = userdata;
827
828 assert(m);
829
830 return manager_connect(m);
831}
832
833int manager_connect(Manager *m) {
84e51726
LP
834 int r;
835
836 assert(m);
837
838 manager_disconnect(m);
839
840 m->event_retry = sd_event_source_unref(m->event_retry);
841 if (!ratelimit_test(&m->ratelimit)) {
842 log_debug("Slowing down attempts to contact servers.");
843
874ff7bf 844 r = sd_event_add_time(m->event, &m->event_retry, clock_boottime_or_monotonic(), now(clock_boottime_or_monotonic()) + RETRY_USEC, 0, manager_retry_connect, m);
f647962d
MS
845 if (r < 0)
846 return log_error_errno(r, "Failed to create retry timer: %m");
84e51726
LP
847
848 return 0;
849 }
850
851 /* If we already are operating on some address, switch to the
852 * next one. */
853 if (m->current_server_address && m->current_server_address->addresses_next)
874ff7bf 854 manager_set_server_address(m, m->current_server_address->addresses_next);
84e51726 855 else {
874ff7bf
LP
856 struct addrinfo hints = {
857 .ai_flags = AI_NUMERICSERV|AI_ADDRCONFIG,
858 .ai_socktype = SOCK_DGRAM,
859 };
84e51726 860
874ff7bf 861 /* Hmm, we are through all addresses, let's look for the next host instead */
84e51726 862 if (m->current_server_name && m->current_server_name->names_next)
874ff7bf 863 manager_set_server_name(m, m->current_server_name->names_next);
84e51726 864 else {
874ff7bf 865 ServerName *f;
63463bf0 866 bool restart = true;
874ff7bf
LP
867
868 /* Our current server name list is exhausted,
869 * let's find the next one to iterate. First
870 * we try the system list, then the link list.
871 * After having processed the link list we
872 * jump back to the system list. However, if
873 * both lists are empty, we change to the
874 * fallback list. */
875 if (!m->current_server_name || m->current_server_name->type == SERVER_LINK) {
876 f = m->system_servers;
877 if (!f)
878 f = m->link_servers;
879 } else {
880 f = m->link_servers;
881 if (!f)
882 f = m->system_servers;
63463bf0
ML
883 else
884 restart = false;
874ff7bf
LP
885 }
886
887 if (!f)
888 f = m->fallback_servers;
889
890 if (!f) {
891 manager_set_server_name(m, NULL);
84e51726
LP
892 log_debug("No server found.");
893 return 0;
894 }
895
63463bf0
ML
896 if (restart && !m->exhausted_servers && m->poll_interval_usec) {
897 log_debug("Waiting after exhausting servers.");
898 r = sd_event_add_time(m->event, &m->event_retry, clock_boottime_or_monotonic(), now(clock_boottime_or_monotonic()) + m->poll_interval_usec, 0, manager_retry_connect, m);
f647962d
MS
899 if (r < 0)
900 return log_error_errno(r, "Failed to create retry timer: %m");
63463bf0
ML
901
902 m->exhausted_servers = true;
903
904 /* Increase the polling interval */
a4465d0d 905 if (m->poll_interval_usec < m->poll_interval_max_usec)
63463bf0
ML
906 m->poll_interval_usec *= 2;
907
908 return 0;
909 }
910
911 m->exhausted_servers = false;
912
874ff7bf 913 manager_set_server_name(m, f);
84e51726
LP
914 }
915
916 /* Tell the resolver to reread /etc/resolv.conf, in
917 * case it changed. */
918 res_init();
919
874ff7bf
LP
920 /* Flush out any previously resolved addresses */
921 server_name_flush_addresses(m->current_server_name);
922
923 log_debug("Resolving %s...", m->current_server_name->string);
924
84e51726 925 r = sd_resolve_getaddrinfo(m->resolve, &m->resolve_query, m->current_server_name->string, "123", &hints, manager_resolve_handler, m);
f647962d
MS
926 if (r < 0)
927 return log_error_errno(r, "Failed to create resolver: %m");
84e51726
LP
928
929 return 1;
930 }
931
932 r = manager_begin(m);
933 if (r < 0)
934 return r;
935
936 return 1;
937}
938
84e51726
LP
939void manager_disconnect(Manager *m) {
940 assert(m);
941
942 m->resolve_query = sd_resolve_query_unref(m->resolve_query);
943
944 m->event_timer = sd_event_source_unref(m->event_timer);
945
f89c4e15 946 manager_listen_stop(m);
84e51726
LP
947
948 m->event_clock_watch = sd_event_source_unref(m->event_clock_watch);
949 m->clock_watch_fd = safe_close(m->clock_watch_fd);
950
951 m->event_timeout = sd_event_source_unref(m->event_timeout);
952
953 sd_notifyf(false, "STATUS=Idle.");
954}
955
874ff7bf
LP
956void manager_flush_server_names(Manager *m, ServerType t) {
957 assert(m);
958
959 if (t == SERVER_SYSTEM)
960 while (m->system_servers)
961 server_name_free(m->system_servers);
962
963 if (t == SERVER_LINK)
964 while (m->link_servers)
965 server_name_free(m->link_servers);
966
967 if (t == SERVER_FALLBACK)
968 while (m->fallback_servers)
969 server_name_free(m->fallback_servers);
970}
84e51726
LP
971
972void manager_free(Manager *m) {
973 if (!m)
974 return;
975
976 manager_disconnect(m);
874ff7bf
LP
977 manager_flush_server_names(m, SERVER_SYSTEM);
978 manager_flush_server_names(m, SERVER_LINK);
979 manager_flush_server_names(m, SERVER_FALLBACK);
84e51726
LP
980
981 sd_event_source_unref(m->event_retry);
982
983 sd_event_source_unref(m->network_event_source);
984 sd_network_monitor_unref(m->network_monitor);
985
986 sd_resolve_unref(m->resolve);
987 sd_event_unref(m->event);
988
989 free(m);
990}
991
874ff7bf
LP
992static int manager_network_read_link_servers(Manager *m) {
993 _cleanup_strv_free_ char **ntp = NULL;
994 ServerName *n, *nx;
995 char **i;
3e85ec07 996 bool changed = false;
874ff7bf
LP
997 int r;
998
84e51726
LP
999 assert(m);
1000
874ff7bf
LP
1001 r = sd_network_get_ntp(&ntp);
1002 if (r < 0)
1003 goto clear;
1004
1005 LIST_FOREACH(names, n, m->link_servers)
1006 n->marked = true;
1007
1008 STRV_FOREACH(i, ntp) {
1009 bool found = false;
1010
1011 LIST_FOREACH(names, n, m->link_servers)
1012 if (streq(n->string, *i)) {
1013 n->marked = false;
1014 found = true;
1015 break;
1016 }
1017
1018 if (!found) {
1019 r = server_name_new(m, NULL, SERVER_LINK, *i);
1020 if (r < 0)
1021 goto clear;
3e85ec07
YW
1022
1023 changed = true;
874ff7bf
LP
1024 }
1025 }
1026
1027 LIST_FOREACH_SAFE(names, n, nx, m->link_servers)
3e85ec07 1028 if (n->marked) {
874ff7bf 1029 server_name_free(n);
3e85ec07
YW
1030 changed = true;
1031 }
874ff7bf 1032
3e85ec07 1033 return changed;
874ff7bf
LP
1034
1035clear:
1036 manager_flush_server_names(m, SERVER_LINK);
1037 return r;
84e51726
LP
1038}
1039
1040static int manager_network_event_handler(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
1041 Manager *m = userdata;
3e85ec07 1042 bool changed, connected, online;
84e51726
LP
1043 int r;
1044
1045 assert(m);
1046
1047 sd_network_monitor_flush(m->network_monitor);
1048
3e85ec07 1049 changed = !!manager_network_read_link_servers(m);
874ff7bf 1050
84e51726
LP
1051 /* check if the machine is online */
1052 online = network_is_online();
1053
1054 /* check if the client is currently connected */
63463bf0 1055 connected = m->server_socket >= 0 || m->resolve_query || m->exhausted_servers;
84e51726
LP
1056
1057 if (connected && !online) {
1058 log_info("No network connectivity, watching for changes.");
1059 manager_disconnect(m);
1060
3e85ec07 1061 } else if (!connected && online && changed) {
84e51726
LP
1062 log_info("Network configuration changed, trying to establish connection.");
1063
1064 if (m->current_server_address)
1065 r = manager_begin(m);
1066 else
1067 r = manager_connect(m);
1068 if (r < 0)
1069 return r;
1070 }
1071
1072 return 0;
1073}
1074
1075static int manager_network_monitor_listen(Manager *m) {
1076 int r, fd, events;
1077
1078 assert(m);
1079
1080 r = sd_network_monitor_new(&m->network_monitor, NULL);
36484c03 1081 if (r == -ENOENT) {
f95b0be7 1082 log_info("systemd does not appear to be running, not listening for systemd-networkd events.");
36484c03
ZJS
1083 return 0;
1084 }
84e51726
LP
1085 if (r < 0)
1086 return r;
1087
1088 fd = sd_network_monitor_get_fd(m->network_monitor);
1089 if (fd < 0)
1090 return fd;
1091
1092 events = sd_network_monitor_get_events(m->network_monitor);
1093 if (events < 0)
1094 return events;
1095
1096 r = sd_event_add_io(m->event, &m->network_event_source, fd, events, manager_network_event_handler, m);
1097 if (r < 0)
1098 return r;
1099
1100 return 0;
1101}
1102
1103int manager_new(Manager **ret) {
1104 _cleanup_(manager_freep) Manager *m = NULL;
1105 int r;
1106
1107 assert(ret);
1108
1109 m = new0(Manager, 1);
1110 if (!m)
1111 return -ENOMEM;
1112
f907cc16 1113 m->max_root_distance_usec = NTP_MAX_ROOT_DISTANCE;
a4465d0d
YW
1114 m->poll_interval_min_usec = NTP_POLL_INTERVAL_MIN_USEC;
1115 m->poll_interval_max_usec = NTP_POLL_INTERVAL_MAX_USEC;
f907cc16 1116
84e51726
LP
1117 m->server_socket = m->clock_watch_fd = -1;
1118
1119 RATELIMIT_INIT(m->ratelimit, RATELIMIT_INTERVAL_USEC, RATELIMIT_BURST);
1120
84e51726
LP
1121 r = sd_event_default(&m->event);
1122 if (r < 0)
1123 return r;
1124
1125 sd_event_add_signal(m->event, NULL, SIGTERM, NULL, NULL);
1126 sd_event_add_signal(m->event, NULL, SIGINT, NULL, NULL);
1127
1128 sd_event_set_watchdog(m->event, true);
1129
1130 r = sd_resolve_default(&m->resolve);
1131 if (r < 0)
1132 return r;
1133
1134 r = sd_resolve_attach_event(m->resolve, m->event, 0);
1135 if (r < 0)
1136 return r;
1137
1138 r = manager_network_monitor_listen(m);
1139 if (r < 0)
1140 return r;
1141
c572db3c 1142 manager_network_read_link_servers(m);
874ff7bf 1143
1cc6c93a 1144 *ret = TAKE_PTR(m);
84e51726
LP
1145
1146 return 0;
1147}