]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/timesync/timesyncd-manager.c
Merge pull request #11457 from grooverdan/sendsigkill_no
[thirdparty/systemd.git] / src / timesync / timesyncd-manager.c
1 /* SPDX-License-Identifier: LGPL-2.1+ */
2
3 #include <errno.h>
4 #include <math.h>
5 #include <netinet/in.h>
6 #include <netinet/ip.h>
7 #include <resolv.h>
8 #include <stdlib.h>
9 #include <sys/socket.h>
10 #include <sys/timerfd.h>
11 #include <sys/timex.h>
12 #include <sys/types.h>
13 #include <time.h>
14
15 #include "sd-daemon.h"
16
17 #include "alloc-util.h"
18 #include "dns-domain.h"
19 #include "fd-util.h"
20 #include "fs-util.h"
21 #include "list.h"
22 #include "log.h"
23 #include "missing.h"
24 #include "network-util.h"
25 #include "ratelimit.h"
26 #include "resolve-private.h"
27 #include "socket-util.h"
28 #include "string-util.h"
29 #include "strv.h"
30 #include "time-util.h"
31 #include "timesyncd-conf.h"
32 #include "timesyncd-manager.h"
33 #include "util.h"
34
35 #ifndef ADJ_SETOFFSET
36 #define ADJ_SETOFFSET 0x0100 /* add 'time' to current time */
37 #endif
38
39 /* expected accuracy of time synchronization; used to adjust the poll interval */
40 #define NTP_ACCURACY_SEC 0.2
41
42 /*
43 * Maximum delta in seconds which the system clock is gradually adjusted
44 * (slewed) to approach the network time. Deltas larger that this are set by
45 * letting the system time jump. The kernel's limit for adjtime is 0.5s.
46 */
47 #define NTP_MAX_ADJUST 0.4
48
49 /* Default of maximum acceptable root distance in microseconds. */
50 #define NTP_MAX_ROOT_DISTANCE (5 * USEC_PER_SEC)
51
52 /* Maximum number of missed replies before selecting another source. */
53 #define NTP_MAX_MISSED_REPLIES 2
54
55 #define RETRY_USEC (30*USEC_PER_SEC)
56 #define RATELIMIT_INTERVAL_USEC (10*USEC_PER_SEC)
57 #define RATELIMIT_BURST 10
58
59 #define TIMEOUT_USEC (10*USEC_PER_SEC)
60
61 static int manager_arm_timer(Manager *m, usec_t next);
62 static int manager_clock_watch_setup(Manager *m);
63 static int manager_listen_setup(Manager *m);
64 static void manager_listen_stop(Manager *m);
65
66 static double ntp_ts_short_to_d(const struct ntp_ts_short *ts) {
67 return be16toh(ts->sec) + (be16toh(ts->frac) / 65536.0);
68 }
69
70 static double ntp_ts_to_d(const struct ntp_ts *ts) {
71 return be32toh(ts->sec) + ((double)be32toh(ts->frac) / UINT_MAX);
72 }
73
74 static double ts_to_d(const struct timespec *ts) {
75 return ts->tv_sec + (1.0e-9 * ts->tv_nsec);
76 }
77
78 static int manager_timeout(sd_event_source *source, usec_t usec, void *userdata) {
79 _cleanup_free_ char *pretty = NULL;
80 Manager *m = userdata;
81
82 assert(m);
83 assert(m->current_server_name);
84 assert(m->current_server_address);
85
86 server_address_pretty(m->current_server_address, &pretty);
87 log_info("Timed out waiting for reply from %s (%s).", strna(pretty), m->current_server_name->string);
88
89 return manager_connect(m);
90 }
91
92 static int manager_send_request(Manager *m) {
93 _cleanup_free_ char *pretty = NULL;
94 struct ntp_msg ntpmsg = {
95 /*
96 * "The client initializes the NTP message header, sends the request
97 * to the server, and strips the time of day from the Transmit
98 * Timestamp field of the reply. For this purpose, all the NTP
99 * header fields are set to 0, except the Mode, VN, and optional
100 * Transmit Timestamp fields."
101 */
102 .field = NTP_FIELD(0, 4, NTP_MODE_CLIENT),
103 };
104 ssize_t len;
105 int r;
106
107 assert(m);
108 assert(m->current_server_name);
109 assert(m->current_server_address);
110
111 m->event_timeout = sd_event_source_unref(m->event_timeout);
112
113 r = manager_listen_setup(m);
114 if (r < 0)
115 return log_warning_errno(r, "Failed to setup connection socket: %m");
116
117 /*
118 * Set transmit timestamp, remember it; the server will send that back
119 * as the origin timestamp and we have an indication that this is the
120 * matching answer to our request.
121 *
122 * The actual value does not matter, We do not care about the correct
123 * NTP UINT_MAX fraction; we just pass the plain nanosecond value.
124 */
125 assert_se(clock_gettime(clock_boottime_or_monotonic(), &m->trans_time_mon) >= 0);
126 assert_se(clock_gettime(CLOCK_REALTIME, &m->trans_time) >= 0);
127 ntpmsg.trans_time.sec = htobe32(m->trans_time.tv_sec + OFFSET_1900_1970);
128 ntpmsg.trans_time.frac = htobe32(m->trans_time.tv_nsec);
129
130 server_address_pretty(m->current_server_address, &pretty);
131
132 len = sendto(m->server_socket, &ntpmsg, sizeof(ntpmsg), MSG_DONTWAIT, &m->current_server_address->sockaddr.sa, m->current_server_address->socklen);
133 if (len == sizeof(ntpmsg)) {
134 m->pending = true;
135 log_debug("Sent NTP request to %s (%s).", strna(pretty), m->current_server_name->string);
136 } else {
137 log_debug_errno(errno, "Sending NTP request to %s (%s) failed: %m", strna(pretty), m->current_server_name->string);
138 return manager_connect(m);
139 }
140
141 /* re-arm timer with increasing timeout, in case the packets never arrive back */
142 if (m->retry_interval > 0) {
143 if (m->retry_interval < m->poll_interval_max_usec)
144 m->retry_interval *= 2;
145 } else
146 m->retry_interval = m->poll_interval_min_usec;
147
148 r = manager_arm_timer(m, m->retry_interval);
149 if (r < 0)
150 return log_error_errno(r, "Failed to rearm timer: %m");
151
152 m->missed_replies++;
153 if (m->missed_replies > NTP_MAX_MISSED_REPLIES) {
154 r = sd_event_add_time(
155 m->event,
156 &m->event_timeout,
157 clock_boottime_or_monotonic(),
158 now(clock_boottime_or_monotonic()) + TIMEOUT_USEC, 0,
159 manager_timeout, m);
160 if (r < 0)
161 return log_error_errno(r, "Failed to arm timeout timer: %m");
162 }
163
164 return 0;
165 }
166
167 static int manager_timer(sd_event_source *source, usec_t usec, void *userdata) {
168 Manager *m = userdata;
169
170 assert(m);
171
172 return manager_send_request(m);
173 }
174
175 static int manager_arm_timer(Manager *m, usec_t next) {
176 int r;
177
178 assert(m);
179
180 if (next == 0) {
181 m->event_timer = sd_event_source_unref(m->event_timer);
182 return 0;
183 }
184
185 if (m->event_timer) {
186 r = sd_event_source_set_time(m->event_timer, now(clock_boottime_or_monotonic()) + next);
187 if (r < 0)
188 return r;
189
190 return sd_event_source_set_enabled(m->event_timer, SD_EVENT_ONESHOT);
191 }
192
193 return sd_event_add_time(
194 m->event,
195 &m->event_timer,
196 clock_boottime_or_monotonic(),
197 now(clock_boottime_or_monotonic()) + next, 0,
198 manager_timer, m);
199 }
200
201 static int manager_clock_watch(sd_event_source *source, int fd, uint32_t revents, void *userdata) {
202 Manager *m = userdata;
203
204 assert(m);
205
206 /* rearm timer */
207 manager_clock_watch_setup(m);
208
209 /* skip our own jumps */
210 if (m->jumped) {
211 m->jumped = false;
212 return 0;
213 }
214
215 /* resync */
216 log_debug("System time changed. Resyncing.");
217 m->poll_resync = true;
218
219 return manager_send_request(m);
220 }
221
222 /* wake up when the system time changes underneath us */
223 static int manager_clock_watch_setup(Manager *m) {
224 int r;
225
226 assert(m);
227
228 m->event_clock_watch = sd_event_source_unref(m->event_clock_watch);
229 safe_close(m->clock_watch_fd);
230
231 m->clock_watch_fd = time_change_fd();
232 if (m->clock_watch_fd < 0)
233 return log_error_errno(m->clock_watch_fd, "Failed to create timerfd: %m");
234
235 r = sd_event_add_io(m->event, &m->event_clock_watch, m->clock_watch_fd, EPOLLIN, manager_clock_watch, m);
236 if (r < 0)
237 return log_error_errno(r, "Failed to create clock watch event source: %m");
238
239 return 0;
240 }
241
242 static int manager_adjust_clock(Manager *m, double offset, int leap_sec) {
243 struct timex tmx = {};
244 int r;
245
246 assert(m);
247
248 /*
249 * For small deltas, tell the kernel to gradually adjust the system
250 * clock to the NTP time, larger deltas are just directly set.
251 */
252 if (fabs(offset) < NTP_MAX_ADJUST) {
253 tmx.modes = ADJ_STATUS | ADJ_NANO | ADJ_OFFSET | ADJ_TIMECONST | ADJ_MAXERROR | ADJ_ESTERROR;
254 tmx.status = STA_PLL;
255 tmx.offset = offset * NSEC_PER_SEC;
256 tmx.constant = log2i(m->poll_interval_usec / USEC_PER_SEC) - 4;
257 tmx.maxerror = 0;
258 tmx.esterror = 0;
259 log_debug(" adjust (slew): %+.3f sec", offset);
260 } else {
261 tmx.modes = ADJ_STATUS | ADJ_NANO | ADJ_SETOFFSET | ADJ_MAXERROR | ADJ_ESTERROR;
262
263 /* ADJ_NANO uses nanoseconds in the microseconds field */
264 tmx.time.tv_sec = (long)offset;
265 tmx.time.tv_usec = (offset - tmx.time.tv_sec) * NSEC_PER_SEC;
266 tmx.maxerror = 0;
267 tmx.esterror = 0;
268
269 /* the kernel expects -0.3s as {-1, 7000.000.000} */
270 if (tmx.time.tv_usec < 0) {
271 tmx.time.tv_sec -= 1;
272 tmx.time.tv_usec += NSEC_PER_SEC;
273 }
274
275 m->jumped = true;
276 log_debug(" adjust (jump): %+.3f sec", offset);
277 }
278
279 /*
280 * An unset STA_UNSYNC will enable the kernel's 11-minute mode,
281 * which syncs the system time periodically to the RTC.
282 *
283 * In case the RTC runs in local time, never touch the RTC,
284 * we have no way to properly handle daylight saving changes and
285 * mobile devices moving between time zones.
286 */
287 if (m->rtc_local_time)
288 tmx.status |= STA_UNSYNC;
289
290 switch (leap_sec) {
291 case 1:
292 tmx.status |= STA_INS;
293 break;
294 case -1:
295 tmx.status |= STA_DEL;
296 break;
297 }
298
299 r = clock_adjtime(CLOCK_REALTIME, &tmx);
300 if (r < 0)
301 return -errno;
302
303 /* If touch fails, there isn't much we can do. Maybe it'll work next time. */
304 (void) touch("/var/lib/systemd/timesync/clock");
305 (void) touch("/run/systemd/timesync/synchronized");
306
307 m->drift_freq = tmx.freq;
308
309 log_debug(" status : %04i %s\n"
310 " time now : %"PRI_TIME".%03"PRI_USEC"\n"
311 " constant : %"PRI_TIMEX"\n"
312 " offset : %+.3f sec\n"
313 " freq offset : %+"PRI_TIMEX" (%+"PRI_TIMEX" ppm)\n",
314 tmx.status, tmx.status & STA_UNSYNC ? "unsync" : "sync",
315 tmx.time.tv_sec, tmx.time.tv_usec / NSEC_PER_MSEC,
316 tmx.constant,
317 (double)tmx.offset / NSEC_PER_SEC,
318 tmx.freq, tmx.freq / 65536);
319
320 return 0;
321 }
322
323 static bool manager_sample_spike_detection(Manager *m, double offset, double delay) {
324 unsigned i, idx_cur, idx_new, idx_min;
325 double jitter;
326 double j;
327
328 assert(m);
329
330 m->packet_count++;
331
332 /* ignore initial sample */
333 if (m->packet_count == 1)
334 return false;
335
336 /* store the current data in our samples array */
337 idx_cur = m->samples_idx;
338 idx_new = (idx_cur + 1) % ELEMENTSOF(m->samples);
339 m->samples_idx = idx_new;
340 m->samples[idx_new].offset = offset;
341 m->samples[idx_new].delay = delay;
342
343 /* calculate new jitter value from the RMS differences relative to the lowest delay sample */
344 jitter = m->samples_jitter;
345 for (idx_min = idx_cur, i = 0; i < ELEMENTSOF(m->samples); i++)
346 if (m->samples[i].delay > 0 && m->samples[i].delay < m->samples[idx_min].delay)
347 idx_min = i;
348
349 j = 0;
350 for (i = 0; i < ELEMENTSOF(m->samples); i++)
351 j += pow(m->samples[i].offset - m->samples[idx_min].offset, 2);
352 m->samples_jitter = sqrt(j / (ELEMENTSOF(m->samples) - 1));
353
354 /* ignore samples when resyncing */
355 if (m->poll_resync)
356 return false;
357
358 /* always accept offset if we are farther off than the round-trip delay */
359 if (fabs(offset) > delay)
360 return false;
361
362 /* we need a few samples before looking at them */
363 if (m->packet_count < 4)
364 return false;
365
366 /* do not accept anything worse than the maximum possible error of the best sample */
367 if (fabs(offset) > m->samples[idx_min].delay)
368 return true;
369
370 /* compare the difference between the current offset to the previous offset and jitter */
371 return fabs(offset - m->samples[idx_cur].offset) > 3 * jitter;
372 }
373
374 static void manager_adjust_poll(Manager *m, double offset, bool spike) {
375 assert(m);
376
377 if (m->poll_resync) {
378 m->poll_interval_usec = m->poll_interval_min_usec;
379 m->poll_resync = false;
380 return;
381 }
382
383 /* set to minimal poll interval */
384 if (!spike && fabs(offset) > NTP_ACCURACY_SEC) {
385 m->poll_interval_usec = m->poll_interval_min_usec;
386 return;
387 }
388
389 /* increase polling interval */
390 if (fabs(offset) < NTP_ACCURACY_SEC * 0.25) {
391 if (m->poll_interval_usec < m->poll_interval_max_usec)
392 m->poll_interval_usec *= 2;
393 return;
394 }
395
396 /* decrease polling interval */
397 if (spike || fabs(offset) > NTP_ACCURACY_SEC * 0.75) {
398 if (m->poll_interval_usec > m->poll_interval_min_usec)
399 m->poll_interval_usec /= 2;
400 return;
401 }
402 }
403
404 static int manager_receive_response(sd_event_source *source, int fd, uint32_t revents, void *userdata) {
405 Manager *m = userdata;
406 struct ntp_msg ntpmsg;
407
408 struct iovec iov = {
409 .iov_base = &ntpmsg,
410 .iov_len = sizeof(ntpmsg),
411 };
412 union {
413 struct cmsghdr cmsghdr;
414 uint8_t buf[CMSG_SPACE(sizeof(struct timeval))];
415 } control;
416 union sockaddr_union server_addr;
417 struct msghdr msghdr = {
418 .msg_iov = &iov,
419 .msg_iovlen = 1,
420 .msg_control = &control,
421 .msg_controllen = sizeof(control),
422 .msg_name = &server_addr,
423 .msg_namelen = sizeof(server_addr),
424 };
425 struct cmsghdr *cmsg;
426 struct timespec *recv_time = NULL;
427 ssize_t len;
428 double origin, receive, trans, dest;
429 double delay, offset;
430 double root_distance;
431 bool spike;
432 int leap_sec;
433 int r;
434
435 assert(source);
436 assert(m);
437
438 if (revents & (EPOLLHUP|EPOLLERR)) {
439 log_warning("Server connection returned error.");
440 return manager_connect(m);
441 }
442
443 len = recvmsg(fd, &msghdr, MSG_DONTWAIT);
444 if (len < 0) {
445 if (errno == EAGAIN)
446 return 0;
447
448 log_warning("Error receiving message. Disconnecting.");
449 return manager_connect(m);
450 }
451
452 /* Too short or too long packet? */
453 if (iov.iov_len < sizeof(struct ntp_msg) || (msghdr.msg_flags & MSG_TRUNC)) {
454 log_warning("Invalid response from server. Disconnecting.");
455 return manager_connect(m);
456 }
457
458 if (!m->current_server_name ||
459 !m->current_server_address ||
460 !sockaddr_equal(&server_addr, &m->current_server_address->sockaddr)) {
461 log_debug("Response from unknown server.");
462 return 0;
463 }
464
465 CMSG_FOREACH(cmsg, &msghdr) {
466 if (cmsg->cmsg_level != SOL_SOCKET)
467 continue;
468
469 switch (cmsg->cmsg_type) {
470 case SCM_TIMESTAMPNS:
471 recv_time = (struct timespec *) CMSG_DATA(cmsg);
472 break;
473 }
474 }
475 if (!recv_time)
476 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
477 "Invalid packet timestamp.");
478
479 if (!m->pending) {
480 log_debug("Unexpected reply. Ignoring.");
481 return 0;
482 }
483
484 m->missed_replies = 0;
485
486 /* check our "time cookie" (we just stored nanoseconds in the fraction field) */
487 if (be32toh(ntpmsg.origin_time.sec) != m->trans_time.tv_sec + OFFSET_1900_1970 ||
488 be32toh(ntpmsg.origin_time.frac) != (unsigned long) m->trans_time.tv_nsec) {
489 log_debug("Invalid reply; not our transmit time. Ignoring.");
490 return 0;
491 }
492
493 m->event_timeout = sd_event_source_unref(m->event_timeout);
494
495 if (be32toh(ntpmsg.recv_time.sec) < TIME_EPOCH + OFFSET_1900_1970 ||
496 be32toh(ntpmsg.trans_time.sec) < TIME_EPOCH + OFFSET_1900_1970) {
497 log_debug("Invalid reply, returned times before epoch. Ignoring.");
498 return manager_connect(m);
499 }
500
501 if (NTP_FIELD_LEAP(ntpmsg.field) == NTP_LEAP_NOTINSYNC ||
502 ntpmsg.stratum == 0 || ntpmsg.stratum >= 16) {
503 log_debug("Server is not synchronized. Disconnecting.");
504 return manager_connect(m);
505 }
506
507 if (!IN_SET(NTP_FIELD_VERSION(ntpmsg.field), 3, 4)) {
508 log_debug("Response NTPv%d. Disconnecting.", NTP_FIELD_VERSION(ntpmsg.field));
509 return manager_connect(m);
510 }
511
512 if (NTP_FIELD_MODE(ntpmsg.field) != NTP_MODE_SERVER) {
513 log_debug("Unsupported mode %d. Disconnecting.", NTP_FIELD_MODE(ntpmsg.field));
514 return manager_connect(m);
515 }
516
517 root_distance = ntp_ts_short_to_d(&ntpmsg.root_delay) / 2 + ntp_ts_short_to_d(&ntpmsg.root_dispersion);
518 if (root_distance > (double) m->max_root_distance_usec / (double) USEC_PER_SEC) {
519 log_debug("Server has too large root distance. Disconnecting.");
520 return manager_connect(m);
521 }
522
523 /* valid packet */
524 m->pending = false;
525 m->retry_interval = 0;
526
527 /* Stop listening */
528 manager_listen_stop(m);
529
530 /* announce leap seconds */
531 if (NTP_FIELD_LEAP(ntpmsg.field) & NTP_LEAP_PLUSSEC)
532 leap_sec = 1;
533 else if (NTP_FIELD_LEAP(ntpmsg.field) & NTP_LEAP_MINUSSEC)
534 leap_sec = -1;
535 else
536 leap_sec = 0;
537
538 /*
539 * "Timestamp Name ID When Generated
540 * ------------------------------------------------------------
541 * Originate Timestamp T1 time request sent by client
542 * Receive Timestamp T2 time request received by server
543 * Transmit Timestamp T3 time reply sent by server
544 * Destination Timestamp T4 time reply received by client
545 *
546 * The round-trip delay, d, and system clock offset, t, are defined as:
547 * d = (T4 - T1) - (T3 - T2) t = ((T2 - T1) + (T3 - T4)) / 2"
548 */
549 origin = ts_to_d(&m->trans_time) + OFFSET_1900_1970;
550 receive = ntp_ts_to_d(&ntpmsg.recv_time);
551 trans = ntp_ts_to_d(&ntpmsg.trans_time);
552 dest = ts_to_d(recv_time) + OFFSET_1900_1970;
553
554 offset = ((receive - origin) + (trans - dest)) / 2;
555 delay = (dest - origin) - (trans - receive);
556
557 spike = manager_sample_spike_detection(m, offset, delay);
558
559 manager_adjust_poll(m, offset, spike);
560
561 log_debug("NTP response:\n"
562 " leap : %u\n"
563 " version : %u\n"
564 " mode : %u\n"
565 " stratum : %u\n"
566 " precision : %.6f sec (%d)\n"
567 " root distance: %.6f sec\n"
568 " reference : %.4s\n"
569 " origin : %.3f\n"
570 " receive : %.3f\n"
571 " transmit : %.3f\n"
572 " dest : %.3f\n"
573 " offset : %+.3f sec\n"
574 " delay : %+.3f sec\n"
575 " packet count : %"PRIu64"\n"
576 " jitter : %.3f%s\n"
577 " poll interval: " USEC_FMT "\n",
578 NTP_FIELD_LEAP(ntpmsg.field),
579 NTP_FIELD_VERSION(ntpmsg.field),
580 NTP_FIELD_MODE(ntpmsg.field),
581 ntpmsg.stratum,
582 exp2(ntpmsg.precision), ntpmsg.precision,
583 root_distance,
584 ntpmsg.stratum == 1 ? ntpmsg.refid : "n/a",
585 origin - OFFSET_1900_1970,
586 receive - OFFSET_1900_1970,
587 trans - OFFSET_1900_1970,
588 dest - OFFSET_1900_1970,
589 offset, delay,
590 m->packet_count,
591 m->samples_jitter, spike ? " spike" : "",
592 m->poll_interval_usec / USEC_PER_SEC);
593
594 if (!spike) {
595 m->sync = true;
596 r = manager_adjust_clock(m, offset, leap_sec);
597 if (r < 0)
598 log_error_errno(r, "Failed to call clock_adjtime(): %m");
599 }
600
601 /* Save NTP response */
602 m->ntpmsg = ntpmsg;
603 m->origin_time = m->trans_time;
604 m->dest_time = *recv_time;
605 m->spike = spike;
606
607 log_debug("interval/delta/delay/jitter/drift " USEC_FMT "s/%+.3fs/%.3fs/%.3fs/%+"PRIi64"ppm%s",
608 m->poll_interval_usec / USEC_PER_SEC, offset, delay, m->samples_jitter, m->drift_freq / 65536,
609 spike ? " (ignored)" : "");
610
611 (void) sd_bus_emit_properties_changed(m->bus, "/org/freedesktop/timesync1", "org.freedesktop.timesync1.Manager", "NTPMessage", NULL);
612
613 if (!m->good) {
614 _cleanup_free_ char *pretty = NULL;
615
616 m->good = true;
617
618 server_address_pretty(m->current_server_address, &pretty);
619 /* "for the first time", as further successful syncs will not be logged. */
620 log_info("Synchronized to time server for the first time %s (%s).", strna(pretty), m->current_server_name->string);
621 sd_notifyf(false, "STATUS=Synchronized to time server for the first time %s (%s).", strna(pretty), m->current_server_name->string);
622 }
623
624 r = manager_arm_timer(m, m->poll_interval_usec);
625 if (r < 0)
626 return log_error_errno(r, "Failed to rearm timer: %m");
627
628 return 0;
629 }
630
631 static int manager_listen_setup(Manager *m) {
632 union sockaddr_union addr = {};
633 int r;
634
635 assert(m);
636
637 if (m->server_socket >= 0)
638 return 0;
639
640 assert(!m->event_receive);
641 assert(m->current_server_address);
642
643 addr.sa.sa_family = m->current_server_address->sockaddr.sa.sa_family;
644
645 m->server_socket = socket(addr.sa.sa_family, SOCK_DGRAM | SOCK_CLOEXEC, 0);
646 if (m->server_socket < 0)
647 return -errno;
648
649 r = bind(m->server_socket, &addr.sa, m->current_server_address->socklen);
650 if (r < 0)
651 return -errno;
652
653 r = setsockopt_int(m->server_socket, SOL_SOCKET, SO_TIMESTAMPNS, true);
654 if (r < 0)
655 return r;
656
657 (void) setsockopt_int(m->server_socket, IPPROTO_IP, IP_TOS, IPTOS_LOWDELAY);
658
659 return sd_event_add_io(m->event, &m->event_receive, m->server_socket, EPOLLIN, manager_receive_response, m);
660 }
661
662 static void manager_listen_stop(Manager *m) {
663 assert(m);
664
665 m->event_receive = sd_event_source_unref(m->event_receive);
666 m->server_socket = safe_close(m->server_socket);
667 }
668
669 static int manager_begin(Manager *m) {
670 _cleanup_free_ char *pretty = NULL;
671 int r;
672
673 assert(m);
674 assert_return(m->current_server_name, -EHOSTUNREACH);
675 assert_return(m->current_server_address, -EHOSTUNREACH);
676
677 m->good = false;
678 m->missed_replies = NTP_MAX_MISSED_REPLIES;
679 if (m->poll_interval_usec == 0)
680 m->poll_interval_usec = m->poll_interval_min_usec;
681
682 server_address_pretty(m->current_server_address, &pretty);
683 log_debug("Connecting to time server %s (%s).", strna(pretty), m->current_server_name->string);
684 sd_notifyf(false, "STATUS=Connecting to time server %s (%s).", strna(pretty), m->current_server_name->string);
685
686 r = manager_clock_watch_setup(m);
687 if (r < 0)
688 return r;
689
690 return manager_send_request(m);
691 }
692
693 void manager_set_server_name(Manager *m, ServerName *n) {
694 assert(m);
695
696 if (m->current_server_name == n)
697 return;
698
699 m->current_server_name = n;
700 m->current_server_address = NULL;
701
702 manager_disconnect(m);
703
704 if (n)
705 log_debug("Selected server %s.", n->string);
706 }
707
708 void manager_set_server_address(Manager *m, ServerAddress *a) {
709 assert(m);
710
711 if (m->current_server_address == a)
712 return;
713
714 m->current_server_address = a;
715 /* If a is NULL, we are just clearing the address, without
716 * changing the name. Keep the existing name in that case. */
717 if (a)
718 m->current_server_name = a->name;
719
720 manager_disconnect(m);
721
722 if (a) {
723 _cleanup_free_ char *pretty = NULL;
724 server_address_pretty(a, &pretty);
725 log_debug("Selected address %s of server %s.", strna(pretty), a->name->string);
726 }
727 }
728
729 static int manager_resolve_handler(sd_resolve_query *q, int ret, const struct addrinfo *ai, Manager *m) {
730 int r;
731
732 assert(q);
733 assert(m);
734 assert(m->current_server_name);
735
736 m->resolve_query = sd_resolve_query_unref(m->resolve_query);
737
738 if (ret != 0) {
739 log_debug("Failed to resolve %s: %s", m->current_server_name->string, gai_strerror(ret));
740
741 /* Try next host */
742 return manager_connect(m);
743 }
744
745 for (; ai; ai = ai->ai_next) {
746 _cleanup_free_ char *pretty = NULL;
747 ServerAddress *a;
748
749 assert(ai->ai_addr);
750 assert(ai->ai_addrlen >= offsetof(struct sockaddr, sa_data));
751
752 if (!IN_SET(ai->ai_addr->sa_family, AF_INET, AF_INET6)) {
753 log_warning("Unsuitable address protocol for %s", m->current_server_name->string);
754 continue;
755 }
756
757 r = server_address_new(m->current_server_name, &a, (const union sockaddr_union*) ai->ai_addr, ai->ai_addrlen);
758 if (r < 0)
759 return log_error_errno(r, "Failed to add server address: %m");
760
761 server_address_pretty(a, &pretty);
762 log_debug("Resolved address %s for %s.", pretty, m->current_server_name->string);
763 }
764
765 if (!m->current_server_name->addresses) {
766 log_error("Failed to find suitable address for host %s.", m->current_server_name->string);
767
768 /* Try next host */
769 return manager_connect(m);
770 }
771
772 manager_set_server_address(m, m->current_server_name->addresses);
773
774 return manager_begin(m);
775 }
776
777 static int manager_retry_connect(sd_event_source *source, usec_t usec, void *userdata) {
778 Manager *m = userdata;
779
780 assert(m);
781
782 return manager_connect(m);
783 }
784
785 int manager_connect(Manager *m) {
786 int r;
787
788 assert(m);
789
790 manager_disconnect(m);
791
792 m->event_retry = sd_event_source_unref(m->event_retry);
793 if (!ratelimit_below(&m->ratelimit)) {
794 log_debug("Delaying attempts to contact servers.");
795
796 r = sd_event_add_time(m->event, &m->event_retry, clock_boottime_or_monotonic(), now(clock_boottime_or_monotonic()) + RETRY_USEC, 0, manager_retry_connect, m);
797 if (r < 0)
798 return log_error_errno(r, "Failed to create retry timer: %m");
799
800 return 0;
801 }
802
803 /* If we already are operating on some address, switch to the
804 * next one. */
805 if (m->current_server_address && m->current_server_address->addresses_next)
806 manager_set_server_address(m, m->current_server_address->addresses_next);
807 else {
808 struct addrinfo hints = {
809 .ai_flags = AI_NUMERICSERV|AI_ADDRCONFIG,
810 .ai_socktype = SOCK_DGRAM,
811 };
812
813 /* Hmm, we are through all addresses, let's look for the next host instead */
814 if (m->current_server_name && m->current_server_name->names_next)
815 manager_set_server_name(m, m->current_server_name->names_next);
816 else {
817 ServerName *f;
818 bool restart = true;
819
820 /* Our current server name list is exhausted,
821 * let's find the next one to iterate. First
822 * we try the system list, then the link list.
823 * After having processed the link list we
824 * jump back to the system list. However, if
825 * both lists are empty, we change to the
826 * fallback list. */
827 if (!m->current_server_name || m->current_server_name->type == SERVER_LINK) {
828 f = m->system_servers;
829 if (!f)
830 f = m->link_servers;
831 } else {
832 f = m->link_servers;
833 if (!f)
834 f = m->system_servers;
835 else
836 restart = false;
837 }
838
839 if (!f)
840 f = m->fallback_servers;
841
842 if (!f) {
843 manager_set_server_name(m, NULL);
844 log_debug("No server found.");
845 return 0;
846 }
847
848 if (restart && !m->exhausted_servers && m->poll_interval_usec) {
849 log_debug("Waiting after exhausting servers.");
850 r = sd_event_add_time(m->event, &m->event_retry, clock_boottime_or_monotonic(), now(clock_boottime_or_monotonic()) + m->poll_interval_usec, 0, manager_retry_connect, m);
851 if (r < 0)
852 return log_error_errno(r, "Failed to create retry timer: %m");
853
854 m->exhausted_servers = true;
855
856 /* Increase the polling interval */
857 if (m->poll_interval_usec < m->poll_interval_max_usec)
858 m->poll_interval_usec *= 2;
859
860 return 0;
861 }
862
863 m->exhausted_servers = false;
864
865 manager_set_server_name(m, f);
866 }
867
868 /* Tell the resolver to reread /etc/resolv.conf, in
869 * case it changed. */
870 res_init();
871
872 /* Flush out any previously resolved addresses */
873 server_name_flush_addresses(m->current_server_name);
874
875 log_debug("Resolving %s...", m->current_server_name->string);
876
877 r = resolve_getaddrinfo(m->resolve, &m->resolve_query, m->current_server_name->string, "123", &hints, manager_resolve_handler, NULL, m);
878 if (r < 0)
879 return log_error_errno(r, "Failed to create resolver: %m");
880
881 return 1;
882 }
883
884 r = manager_begin(m);
885 if (r < 0)
886 return r;
887
888 return 1;
889 }
890
891 void manager_disconnect(Manager *m) {
892 assert(m);
893
894 m->resolve_query = sd_resolve_query_unref(m->resolve_query);
895
896 m->event_timer = sd_event_source_unref(m->event_timer);
897
898 manager_listen_stop(m);
899
900 m->event_clock_watch = sd_event_source_unref(m->event_clock_watch);
901 m->clock_watch_fd = safe_close(m->clock_watch_fd);
902
903 m->event_timeout = sd_event_source_unref(m->event_timeout);
904
905 sd_notifyf(false, "STATUS=Idle.");
906 }
907
908 void manager_flush_server_names(Manager *m, ServerType t) {
909 assert(m);
910
911 if (t == SERVER_SYSTEM)
912 while (m->system_servers)
913 server_name_free(m->system_servers);
914
915 if (t == SERVER_LINK)
916 while (m->link_servers)
917 server_name_free(m->link_servers);
918
919 if (t == SERVER_FALLBACK)
920 while (m->fallback_servers)
921 server_name_free(m->fallback_servers);
922 }
923
924 void manager_free(Manager *m) {
925 if (!m)
926 return;
927
928 manager_disconnect(m);
929 manager_flush_server_names(m, SERVER_SYSTEM);
930 manager_flush_server_names(m, SERVER_LINK);
931 manager_flush_server_names(m, SERVER_FALLBACK);
932
933 sd_event_source_unref(m->event_retry);
934
935 sd_event_source_unref(m->network_event_source);
936 sd_network_monitor_unref(m->network_monitor);
937
938 sd_resolve_unref(m->resolve);
939 sd_event_unref(m->event);
940
941 sd_bus_flush_close_unref(m->bus);
942
943 free(m);
944 }
945
946 static int manager_network_read_link_servers(Manager *m) {
947 _cleanup_strv_free_ char **ntp = NULL;
948 ServerName *n, *nx;
949 char **i;
950 bool changed = false;
951 int r;
952
953 assert(m);
954
955 r = sd_network_get_ntp(&ntp);
956 if (r < 0) {
957 if (r == -ENOMEM)
958 log_oom();
959 else
960 log_debug_errno(r, "Failed to get link NTP servers: %m");
961 goto clear;
962 }
963
964 LIST_FOREACH(names, n, m->link_servers)
965 n->marked = true;
966
967 STRV_FOREACH(i, ntp) {
968 bool found = false;
969
970 r = dns_name_is_valid_or_address(*i);
971 if (r < 0) {
972 log_error_errno(r, "Failed to check validity of NTP server name or address '%s': %m", *i);
973 goto clear;
974 } else if (r == 0) {
975 log_error("Invalid NTP server name or address, ignoring: %s", *i);
976 continue;
977 }
978
979 LIST_FOREACH(names, n, m->link_servers)
980 if (streq(n->string, *i)) {
981 n->marked = false;
982 found = true;
983 break;
984 }
985
986 if (!found) {
987 r = server_name_new(m, NULL, SERVER_LINK, *i);
988 if (r < 0) {
989 log_oom();
990 goto clear;
991 }
992
993 changed = true;
994 }
995 }
996
997 LIST_FOREACH_SAFE(names, n, nx, m->link_servers)
998 if (n->marked) {
999 server_name_free(n);
1000 changed = true;
1001 }
1002
1003 return changed;
1004
1005 clear:
1006 manager_flush_server_names(m, SERVER_LINK);
1007 return r;
1008 }
1009
1010 static bool manager_is_connected(Manager *m) {
1011 /* Return true when the manager is sending a request, resolving a server name, or
1012 * in a poll interval. */
1013 return m->server_socket >= 0 || m->resolve_query || m->event_timer;
1014 }
1015
1016 static int manager_network_event_handler(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
1017 Manager *m = userdata;
1018 bool changed, connected, online;
1019 int r;
1020
1021 assert(m);
1022
1023 sd_network_monitor_flush(m->network_monitor);
1024
1025 /* When manager_network_read_link_servers() failed, we assume that the servers are changed. */
1026 changed = !!manager_network_read_link_servers(m);
1027
1028 /* check if the machine is online */
1029 online = network_is_online();
1030
1031 /* check if the client is currently connected */
1032 connected = manager_is_connected(m);
1033
1034 if (connected && !online) {
1035 log_info("No network connectivity, watching for changes.");
1036 manager_disconnect(m);
1037
1038 } else if ((!connected || changed) && online) {
1039 log_info("Network configuration changed, trying to establish connection.");
1040
1041 if (m->current_server_address)
1042 r = manager_begin(m);
1043 else
1044 r = manager_connect(m);
1045 if (r < 0)
1046 return r;
1047 }
1048
1049 return 0;
1050 }
1051
1052 static int manager_network_monitor_listen(Manager *m) {
1053 int r, fd, events;
1054
1055 assert(m);
1056
1057 r = sd_network_monitor_new(&m->network_monitor, NULL);
1058 if (r == -ENOENT) {
1059 log_info("systemd does not appear to be running, not listening for systemd-networkd events.");
1060 return 0;
1061 }
1062 if (r < 0)
1063 return r;
1064
1065 fd = sd_network_monitor_get_fd(m->network_monitor);
1066 if (fd < 0)
1067 return fd;
1068
1069 events = sd_network_monitor_get_events(m->network_monitor);
1070 if (events < 0)
1071 return events;
1072
1073 r = sd_event_add_io(m->event, &m->network_event_source, fd, events, manager_network_event_handler, m);
1074 if (r < 0)
1075 return r;
1076
1077 return 0;
1078 }
1079
1080 int manager_new(Manager **ret) {
1081 _cleanup_(manager_freep) Manager *m = NULL;
1082 int r;
1083
1084 assert(ret);
1085
1086 m = new0(Manager, 1);
1087 if (!m)
1088 return -ENOMEM;
1089
1090 m->max_root_distance_usec = NTP_MAX_ROOT_DISTANCE;
1091 m->poll_interval_min_usec = NTP_POLL_INTERVAL_MIN_USEC;
1092 m->poll_interval_max_usec = NTP_POLL_INTERVAL_MAX_USEC;
1093
1094 m->server_socket = m->clock_watch_fd = -1;
1095
1096 RATELIMIT_INIT(m->ratelimit, RATELIMIT_INTERVAL_USEC, RATELIMIT_BURST);
1097
1098 r = sd_event_default(&m->event);
1099 if (r < 0)
1100 return r;
1101
1102 (void) sd_event_add_signal(m->event, NULL, SIGTERM, NULL, NULL);
1103 (void) sd_event_add_signal(m->event, NULL, SIGINT, NULL, NULL);
1104
1105 (void) sd_event_set_watchdog(m->event, true);
1106
1107 r = sd_resolve_default(&m->resolve);
1108 if (r < 0)
1109 return r;
1110
1111 r = sd_resolve_attach_event(m->resolve, m->event, 0);
1112 if (r < 0)
1113 return r;
1114
1115 r = manager_network_monitor_listen(m);
1116 if (r < 0)
1117 return r;
1118
1119 (void) manager_network_read_link_servers(m);
1120
1121 *ret = TAKE_PTR(m);
1122
1123 return 0;
1124 }