ntpd: implement -x. shrink code a bit. -69 bytes

Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
This commit is contained in:
Denys Vlasenko 2009-12-02 23:17:45 +01:00
parent 4bd5189370
commit 907647fb15
2 changed files with 159 additions and 178 deletions

View File

@ -3217,9 +3217,8 @@
"\nOptions:" \ "\nOptions:" \
"\n -d Verbose" \ "\n -d Verbose" \
"\n -n Do not daemonize" \ "\n -n Do not daemonize" \
"\n -g Set system time even if offset is > 1000 sec" \
"\n -q Quit after clock is set" \ "\n -q Quit after clock is set" \
/* -N exists for mostly compat reasons, thus Not essential to inform */ \ /* -N exists for mostly compat reasons, thus not essential to inform */ \
/* the user that it exists: user may use nice as well */ \ /* the user that it exists: user may use nice as well */ \
/* "\n -N Run at high priority" */ \ /* "\n -N Run at high priority" */ \
"\n -l Run as server on port 123" \ "\n -l Run as server on port 123" \

View File

@ -14,11 +14,14 @@
# error "Sorry, your kernel has to support IP_PKTINFO" # error "Sorry, your kernel has to support IP_PKTINFO"
#endif #endif
#define INTERVAL_QUERY_NORMAL 30 /* sync to peers every n secs */
/* Sync to peers every N secs */
#define INTERVAL_QUERY_NORMAL 30
#define INTERVAL_QUERY_PATHETIC 60 #define INTERVAL_QUERY_PATHETIC 60
#define INTERVAL_QUERY_AGRESSIVE 5 #define INTERVAL_QUERY_AGRESSIVE 5
#define TRUSTLEVEL_BADPEER 6 /* bad if *less than* TRUSTLEVEL_BADPEER */ /* Bad if *less than* TRUSTLEVEL_BADPEER */
#define TRUSTLEVEL_BADPEER 6
#define TRUSTLEVEL_PATHETIC 2 #define TRUSTLEVEL_PATHETIC 2
#define TRUSTLEVEL_AGRESSIVE 8 #define TRUSTLEVEL_AGRESSIVE 8
#define TRUSTLEVEL_MAX 10 #define TRUSTLEVEL_MAX 10
@ -26,30 +29,11 @@
#define QSCALE_OFF_MIN 0.05 #define QSCALE_OFF_MIN 0.05
#define QSCALE_OFF_MAX 0.50 #define QSCALE_OFF_MAX 0.50
#define QUERYTIME_MAX 15 /* single query might take n secs max */ /* Single query might take n secs max */
#define OFFSET_ARRAY_SIZE 8 #define QUERYTIME_MAX 15
#define SETTIME_MIN_OFFSET 180 /* min offset for settime at start */ /* Min offset for settime at start. "man ntpd" says it's 128 ms */
#define SETTIME_TIMEOUT 15 /* max seconds to wait with -s */ #define STEPTIME_MIN_OFFSET 0.128
/* Style borrowed from NTP ref/tcpdump and updated for SNTPv4 (RFC2030). */
/*
* RFC Section 3
*
* 0 1 2 3
* 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
* +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
* | Integer Part |
* +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
* | Fraction Part |
* +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
*
* 0 1 2 3
* 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
* +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
* | Integer Part | Fraction Part |
* +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
*/
typedef struct { typedef struct {
uint32_t int_partl; uint32_t int_partl;
uint32_t fractionl; uint32_t fractionl;
@ -85,7 +69,7 @@ typedef struct {
enum { enum {
NTP_VERSION = 4, NTP_VERSION = 4,
NTP_MAXSTRATUM = 15, NTP_MAXSTRATUM = 15,
/* Leap Second Codes (high order two bits) */ /* Leap Second Codes (high order two bits of m_status) */
LI_NOWARNING = (0 << 6), /* no warning */ LI_NOWARNING = (0 << 6), /* no warning */
LI_PLUSSEC = (1 << 6), /* add a second (61 seconds) */ LI_PLUSSEC = (1 << 6), /* add a second (61 seconds) */
LI_MINUSSEC = (2 << 6), /* minus a second (59 seconds) */ LI_MINUSSEC = (2 << 6), /* minus a second (59 seconds) */
@ -121,33 +105,28 @@ typedef struct {
uint8_t o_good; uint8_t o_good;
} ntp_offset_t; } ntp_offset_t;
#define OFFSET_ARRAY_SIZE 8
typedef struct { typedef struct {
//TODO: periodically re-resolve DNS names?
len_and_sockaddr *lsa; len_and_sockaddr *lsa;
char *hostname;
char *dotted; char *dotted;
double xmttime; /* When to send new query (if fd == -1)
time_t next; * or when receive times out (if fd >= 0): */
time_t deadline; time_t next_action_time;
int fd; int fd;
uint8_t state;
uint8_t shift; uint8_t shift;
uint8_t trustlevel; uint8_t trustlevel;
ntp_msg_t msg; ntp_msg_t msg;
double xmttime;
ntp_offset_t update; ntp_offset_t update;
ntp_offset_t reply[OFFSET_ARRAY_SIZE]; ntp_offset_t reply[OFFSET_ARRAY_SIZE];
} ntp_peer_t; } ntp_peer_t;
/* for ntp_peer_t::state */
enum {
STATE_NONE,
STATE_QUERY_SENT,
STATE_REPLY_RECEIVED,
};
enum { enum {
OPT_n = (1 << 0), OPT_n = (1 << 0),
OPT_g = (1 << 1), OPT_q = (1 << 1),
OPT_q = (1 << 2), OPT_N = (1 << 2),
OPT_N = (1 << 3), OPT_x = (1 << 3),
/* Insert new options above this line. */ /* Insert new options above this line. */
/* Non-compat options: */ /* Non-compat options: */
OPT_p = (1 << 4), OPT_p = (1 << 4),
@ -164,12 +143,13 @@ struct globals {
#endif #endif
unsigned verbose; unsigned verbose;
unsigned peer_cnt; unsigned peer_cnt;
unsigned scale;
uint32_t refid; uint32_t refid;
uint32_t refid4; uint32_t refid4;
uint32_t scale;
uint8_t synced; uint8_t synced;
uint8_t leap; uint8_t leap;
int8_t precision; #define G_precision -6
// int8_t precision;
uint8_t stratum; uint8_t stratum;
uint8_t time_is_stepped; uint8_t time_is_stepped;
uint8_t first_adj_done; uint8_t first_adj_done;
@ -183,32 +163,28 @@ static const int const_IPTOS_LOWDELAY = IPTOS_LOWDELAY;
static void static void
set_next(ntp_peer_t *p, unsigned t) set_next(ntp_peer_t *p, unsigned t)
{ {
p->next = time(NULL) + t; p->next_action_time = time(NULL) + t;
p->deadline = 0;
} }
static void static void
add_peers(const char *s) add_peers(char *s)
{ {
ntp_peer_t *p; ntp_peer_t *p;
p = xzalloc(sizeof(*p)); p = xzalloc(sizeof(*p));
//TODO: big ntpd uses all IPs, not just 1st, do we need to mimic that? p->hostname = s;
p->lsa = xhost2sockaddr(s, 123); p->dotted = s;
p->dotted = xmalloc_sockaddr2dotted_noport(&p->lsa->u.sa);
p->fd = -1; p->fd = -1;
p->msg.m_status = MODE_CLIENT | (NTP_VERSION << 3); p->msg.m_status = MODE_CLIENT | (NTP_VERSION << 3);
if (STATE_NONE != 0)
p->state = STATE_NONE;
p->trustlevel = TRUSTLEVEL_PATHETIC; p->trustlevel = TRUSTLEVEL_PATHETIC;
set_next(p, 0); p->next_action_time = time(NULL); /* = set_next(p, 0); */
llist_add_to(&G.ntp_peers, p); llist_add_to(&G.ntp_peers, p);
G.peer_cnt++; G.peer_cnt++;
} }
static double static double
gettime1900fp(void) gettime1900d(void)
{ {
struct timeval tv; struct timeval tv;
gettimeofday(&tv, NULL); /* never fails */ gettimeofday(&tv, NULL); /* never fails */
@ -268,13 +244,6 @@ d_to_sfp(double d)
} }
#endif #endif
static void
set_deadline(ntp_peer_t *p, time_t t)
{
p->deadline = time(NULL) + t;
p->next = 0;
}
static unsigned static unsigned
error_interval(void) error_interval(void)
{ {
@ -328,8 +297,18 @@ send_query_to_peer(ntp_peer_t *p)
int fd, family; int fd, family;
len_and_sockaddr *local_lsa; len_and_sockaddr *local_lsa;
//TODO: big ntpd uses all IPs, not just 1st, do we need to mimic that?
//TODO: periodically re-resolve DNS names?
if (!p->lsa) {
p->lsa = host2sockaddr(p->hostname, 123);
if (!p->lsa) {
set_next(p, INTERVAL_QUERY_PATHETIC);
return -1;
}
p->dotted = xmalloc_sockaddr2dotted_noport(&p->lsa->u.sa);
}
family = p->lsa->u.sa.sa_family; family = p->lsa->u.sa.sa_family;
//was: p->fd = xsocket(family, SOCK_DGRAM, 0);
p->fd = fd = xsocket_type(&local_lsa, family, SOCK_DGRAM); p->fd = fd = xsocket_type(&local_lsa, family, SOCK_DGRAM);
/* local_lsa has "null" address and port 0 now. /* local_lsa has "null" address and port 0 now.
* bind() ensures we have a *particular port* selected by kernel * bind() ensures we have a *particular port* selected by kernel
@ -362,23 +341,70 @@ send_query_to_peer(ntp_peer_t *p)
p->msg.m_xmttime.int_partl = random(); p->msg.m_xmttime.int_partl = random();
p->msg.m_xmttime.fractionl = random(); p->msg.m_xmttime.fractionl = random();
p->xmttime = gettime1900fp(); p->xmttime = gettime1900d();
if (do_sendto(p->fd, /*from:*/ NULL, /*to:*/ &p->lsa->u.sa, /*addrlen:*/ p->lsa->len, if (do_sendto(p->fd, /*from:*/ NULL, /*to:*/ &p->lsa->u.sa, /*addrlen:*/ p->lsa->len,
&p->msg, NTP_MSGSIZE_NOAUTH) == -1 &p->msg, NTP_MSGSIZE_NOAUTH) == -1
) { ) {
close(p->fd);
p->fd = -1;
set_next(p, INTERVAL_QUERY_PATHETIC); set_next(p, INTERVAL_QUERY_PATHETIC);
return -1; return -1;
} }
if (G.verbose) if (G.verbose)
bb_error_msg("sent query to %s", p->dotted); bb_error_msg("sent query to %s", p->dotted);
p->state = STATE_QUERY_SENT; set_next(p, QUERYTIME_MAX);
set_deadline(p, QUERYTIME_MAX);
return 0; return 0;
} }
/* Time is stepped only once, when the first packet from a peer is received.
*/
static void
step_time_once(double offset)
{
llist_t *item;
struct timeval tv;
char buf[80];
time_t tval;
if (G.time_is_stepped)
goto bail;
G.time_is_stepped = 1;
/* if the offset is small, don't step, slew (later) */
if (offset < STEPTIME_MIN_OFFSET && offset > -STEPTIME_MIN_OFFSET)
goto bail;
gettimeofday(&tv, NULL); /* never fails */
offset += tv.tv_sec;
offset += 1.0e-6 * tv.tv_usec;
d_to_tv(offset, &tv);
if (settimeofday(&tv, NULL) == -1)
bb_perror_msg_and_die("settimeofday");
tval = tv.tv_sec;
strftime(buf, sizeof(buf), "%a %b %e %H:%M:%S %Z %Y", localtime(&tval));
bb_error_msg("setting clock to %s (offset %fs)", buf, offset);
for (item = G.ntp_peers; item != NULL; item = item->link) {
ntp_peer_t *p = (ntp_peer_t *) item->data;
p->next_action_time -= offset;
}
bail:
if (option_mask32 & OPT_q)
exit(0);
}
/* Time is periodically slewed when we collect enough
* good data points.
*/
static int static int
compare_offsets(const void *aa, const void *bb) compare_offsets(const void *aa, const void *bb)
{ {
@ -388,8 +414,7 @@ compare_offsets(const void *aa, const void *bb)
return -1; return -1;
return ((*a)->update.o_offset > (*b)->update.o_offset); return ((*a)->update.o_offset > (*b)->update.o_offset);
} }
static unsigned
static uint32_t
updated_scale(double offset) updated_scale(double offset)
{ {
if (offset < 0) if (offset < 0)
@ -400,7 +425,6 @@ updated_scale(double offset)
return QSCALE_OFF_MAX / QSCALE_OFF_MIN; return QSCALE_OFF_MAX / QSCALE_OFF_MIN;
return QSCALE_OFF_MAX / offset; return QSCALE_OFF_MAX / offset;
} }
static void static void
slew_time(void) slew_time(void)
{ {
@ -409,7 +433,6 @@ slew_time(void)
struct timeval tv; struct timeval tv;
{ {
len_and_sockaddr *lsa;
ntp_peer_t **peers = xzalloc(sizeof(peers[0]) * G.peer_cnt); ntp_peer_t **peers = xzalloc(sizeof(peers[0]) * G.peer_cnt);
unsigned goodpeer_cnt = 0; unsigned goodpeer_cnt = 0;
unsigned middle; unsigned middle;
@ -418,8 +441,10 @@ slew_time(void)
ntp_peer_t *p = (ntp_peer_t *) item->data; ntp_peer_t *p = (ntp_peer_t *) item->data;
if (p->trustlevel < TRUSTLEVEL_BADPEER) if (p->trustlevel < TRUSTLEVEL_BADPEER)
continue; continue;
if (!p->update.o_good) if (!p->update.o_good) {
free(peers);
return; return;
}
peers[goodpeer_cnt++] = p; peers[goodpeer_cnt++] = p;
} }
@ -442,38 +467,38 @@ slew_time(void)
} }
G.leap = peers[middle]->update.o_leap; G.leap = peers[middle]->update.o_leap;
G.refid4 = peers[middle]->update.o_refid4; G.refid4 = peers[middle]->update.o_refid4;
lsa = peers[middle]->lsa;
G.refid = G.refid =
#if ENABLE_FEATURE_IPV6 #if ENABLE_FEATURE_IPV6
lsa->u.sa.sa_family != AF_INET ? peers[middle]->lsa->u.sa.sa_family != AF_INET ?
G.refid4 : G.refid4 :
#endif #endif
lsa->u.sin.sin_addr.s_addr; peers[middle]->lsa->u.sin.sin_addr.s_addr;
free(peers); free(peers);
} }
//TODO: if (offset_median > BIG) step_time(offset_median)?
bb_error_msg("adjusting clock by %fs, our stratum is %u", offset_median, G.stratum); G.scale = updated_scale(offset_median);
bb_error_msg("adjusting clock by %fs, our stratum is %u, time scale %u",
offset_median, G.stratum, G.scale);
errno = 0; errno = 0;
d_to_tv(offset_median, &tv); d_to_tv(offset_median, &tv);
if (adjtime(&tv, &tv) == -1) { if (adjtime(&tv, &tv) == -1)
bb_perror_msg("adjtime failed"); //TODO: maybe _and_die? bb_perror_msg_and_die("adjtime failed");
} else { if (G.verbose >= 2)
if (G.verbose >= 2) bb_error_msg("old adjust: %d.%06u", (int)tv.tv_sec, (unsigned)tv.tv_usec);
bb_error_msg("old adjust: %d.%06u", (int)tv.tv_sec, (unsigned)tv.tv_usec);
if (G.first_adj_done) {
uint8_t synced = (tv.tv_sec == 0 && tv.tv_usec == 0);
if (synced != G.synced) {
G.synced = synced;
bb_error_msg("clock is %ssynced", synced ? "" : "un");
}
}
G.first_adj_done = 1;
}
G.reftime = gettime1900fp(); if (G.first_adj_done) {
//TODO: log if G.scale changed? uint8_t synced = (tv.tv_sec == 0 && tv.tv_usec == 0);
G.scale = updated_scale(offset_median); if (synced != G.synced) {
G.synced = synced;
bb_error_msg("clock is %ssynced", synced ? "" : "un");
}
}
G.first_adj_done = 1;
G.reftime = gettime1900d();
clear_good: clear_good:
for (item = G.ntp_peers; item != NULL; item = item->link) { for (item = G.ntp_peers; item != NULL; item = item->link) {
@ -482,52 +507,6 @@ slew_time(void)
} }
} }
static void
step_time_once(double offset)
{
ntp_peer_t *p;
llist_t *item;
struct timeval tv;
char buf[80];
time_t tval;
if (G.time_is_stepped)
goto bail;
G.time_is_stepped = 1;
/* if the offset is small, don't call settimeofday */
if (offset < SETTIME_MIN_OFFSET && offset > -SETTIME_MIN_OFFSET)
goto bail;
gettimeofday(&tv, NULL); /* never fails */
offset += tv.tv_sec;
offset += 1.0e-6 * tv.tv_usec;
d_to_tv(offset, &tv);
if (settimeofday(&tv, NULL) == -1) {
bb_perror_msg("settimeofday");
goto bail;
}
tval = tv.tv_sec;
strftime(buf, sizeof(buf), "%a %b %e %H:%M:%S %Z %Y", localtime(&tval));
// Do we want to print message below to system log when daemonized?
bb_error_msg("setting clock to %s (offset %fs)", buf, offset);
for (item = G.ntp_peers; item != NULL; item = item->link) {
p = (ntp_peer_t *) item->data;
if (p->next)
p->next -= offset;
if (p->deadline)
p->deadline -= offset;
}
bail:
if (option_mask32 & OPT_q)
exit(0);
}
static void static void
update_peer_data(ntp_peer_t *p) update_peer_data(ntp_peer_t *p)
{ {
@ -567,7 +546,6 @@ scale_interval(unsigned requested)
r = (unsigned)random() % (unsigned)(MAX(5, interval / 10)); r = (unsigned)random() % (unsigned)(MAX(5, interval / 10));
return (interval + r); return (interval + r);
} }
static void static void
recv_and_process_peer_pkt(ntp_peer_t *p) recv_and_process_peer_pkt(ntp_peer_t *p)
{ {
@ -631,7 +609,7 @@ recv_and_process_peer_pkt(ntp_peer_t *p)
* d = (T4 - T1) - (T3 - T2) t = ((T2 - T1) + (T3 - T4)) / 2. * d = (T4 - T1) - (T3 - T2) t = ((T2 - T1) + (T3 - T4)) / 2.
*/ */
T4 = gettime1900fp(); T4 = gettime1900d();
T1 = p->xmttime; T1 = p->xmttime;
T2 = lfp_to_d(msg.m_rectime); T2 = lfp_to_d(msg.m_rectime);
T3 = lfp_to_d(msg.m_xmttime); T3 = lfp_to_d(msg.m_xmttime);
@ -668,7 +646,6 @@ recv_and_process_peer_pkt(ntp_peer_t *p)
interval = scale_interval(INTERVAL_QUERY_NORMAL); interval = scale_interval(INTERVAL_QUERY_NORMAL);
set_next(p, interval); set_next(p, interval);
p->state = STATE_REPLY_RECEIVED;
/* every received reply which we do not discard increases trust */ /* every received reply which we do not discard increases trust */
if (p->trustlevel < TRUSTLEVEL_MAX) { if (p->trustlevel < TRUSTLEVEL_MAX) {
@ -690,7 +667,7 @@ recv_and_process_peer_pkt(ntp_peer_t *p)
p->shift = 0; p->shift = 0;
close_sock: close_sock:
/* We do not expect any more packets for now. /* We do not expect any more packets from this peer for now.
* Closing the socket informs kernel about it. * Closing the socket informs kernel about it.
* We open a new socket when we send a new query. * We open a new socket when we send a new query.
*/ */
@ -723,10 +700,10 @@ recv_and_process_client_pkt(void /*int fd*/)
if (size < 0) { if (size < 0) {
if (errno == EAGAIN) if (errno == EAGAIN)
goto bail; goto bail;
bb_perror_msg_and_die("recv_from_to"); bb_perror_msg_and_die("recv");
} }
addr = xmalloc_sockaddr2dotted_noport(from); addr = xmalloc_sockaddr2dotted_noport(from);
bb_error_msg("malformed packet received from %s", addr); bb_error_msg("malformed packet received from %s: size %u", addr, (int)size);
free(addr); free(addr);
goto bail; goto bail;
} }
@ -743,11 +720,11 @@ recv_and_process_client_pkt(void /*int fd*/)
MODE_SERVER : MODE_SYM_PAS; MODE_SERVER : MODE_SYM_PAS;
msg.m_stratum = G.stratum; msg.m_stratum = G.stratum;
msg.m_ppoll = query_ppoll; msg.m_ppoll = query_ppoll;
msg.m_precision = G.precision; msg.m_precision = G_precision;
rectime = gettime1900fp(); rectime = gettime1900d();
msg.m_xmttime = msg.m_rectime = d_to_lfp(rectime); msg.m_xmttime = msg.m_rectime = d_to_lfp(rectime);
msg.m_reftime = d_to_lfp(G.reftime); msg.m_reftime = d_to_lfp(G.reftime);
//msg.m_xmttime = d_to_lfp(gettime1900fp()); // = msg.m_rectime //msg.m_xmttime = d_to_lfp(gettime1900d()); // = msg.m_rectime
msg.m_orgtime = query_xmttime; msg.m_orgtime = query_xmttime;
msg.m_rootdelay = d_to_sfp(G.rootdelay); msg.m_rootdelay = d_to_sfp(G.rootdelay);
version = (query_status & VERSION_MASK); /* ... >> VERSION_SHIFT - done below instead */ version = (query_status & VERSION_MASK); /* ... >> VERSION_SHIFT - done below instead */
@ -859,7 +836,6 @@ static NOINLINE void ntp_init(char **argv)
llist_t *peers; llist_t *peers;
srandom(getpid()); srandom(getpid());
/* tzset(); - why? it's called automatically when needed, no? */
if (getuid()) if (getuid())
bb_error_msg_and_die(bb_msg_you_must_be_root); bb_error_msg_and_die(bb_msg_you_must_be_root);
@ -867,16 +843,15 @@ static NOINLINE void ntp_init(char **argv)
peers = NULL; peers = NULL;
opt_complementary = "dd:p::"; /* d: counter, p: list */ opt_complementary = "dd:p::"; /* d: counter, p: list */
opts = getopt32(argv, opts = getopt32(argv,
"ngqN" /* compat */ "nqNx" /* compat */
"p:"IF_FEATURE_NTPD_SERVER("l") /* NOT compat */ "p:"IF_FEATURE_NTPD_SERVER("l") /* NOT compat */
"d" /* compat */ "d" /* compat */
"46aAbLx", /* compat, ignored */ "46aAbgL", /* compat, ignored */
&peers, &G.verbose); &peers, &G.verbose);
if (!(opts & (OPT_p|OPT_l))) if (!(opts & (OPT_p|OPT_l)))
bb_show_usage(); bb_show_usage();
//WRONG if (opts & OPT_x) /* disable stepping, only slew is allowed */
// if (opts & OPT_g) G.time_is_stepped = 1;
// G.time_is_stepped = 1;
while (peers) while (peers)
add_peers(llist_pop(&peers)); add_peers(llist_pop(&peers));
if (!(opts & OPT_n)) { if (!(opts & OPT_n)) {
@ -896,23 +871,28 @@ static NOINLINE void ntp_init(char **argv)
setpriority(PRIO_PROCESS, 0, -15); setpriority(PRIO_PROCESS, 0, -15);
/* Set some globals */ /* Set some globals */
#if 0
/* With constant b = 100, G.precision is also constant -6.
* Uncomment this and you'll see */
{ {
int prec = 0; int prec = 0;
int b; int b;
#if 0 # if 0
struct timespec tp; struct timespec tp;
/* We can use sys_clock_getres but assuming 10ms tick should be fine */ /* We can use sys_clock_getres but assuming 10ms tick should be fine */
clock_getres(CLOCK_REALTIME, &tp); clock_getres(CLOCK_REALTIME, &tp);
tp.tv_sec = 0; tp.tv_sec = 0;
tp.tv_nsec = 10000000; tp.tv_nsec = 10000000;
b = 1000000000 / tp.tv_nsec; /* convert to Hz */ b = 1000000000 / tp.tv_nsec; /* convert to Hz */
#else # else
b = 100; /* b = 1000000000/10000000 = 100 */ b = 100; /* b = 1000000000/10000000 = 100 */
#endif # endif
while (b > 1) while (b > 1)
prec--, b >>= 1; prec--, b >>= 1;
G.precision = prec; //G.precision = prec;
bb_error_msg("G.precision:%d", prec); /* -6 */
} }
#endif
G.scale = 1; G.scale = 1;
bb_signals((1 << SIGTERM) | (1 << SIGINT), record_signo); bb_signals((1 << SIGTERM) | (1 << SIGINT), record_signo);
@ -963,31 +943,33 @@ int ntpd_main(int argc UNUSED_PARAM, char **argv)
for (item = g.ntp_peers; item != NULL; item = item->link) { for (item = g.ntp_peers; item != NULL; item = item->link) {
ntp_peer_t *p = (ntp_peer_t *) item->data; ntp_peer_t *p = (ntp_peer_t *) item->data;
if (p->next != 0 && p->next <= cur_time) { /* Overflow-safe "if (p->next_action_time <= cur_time) ..." */
/* Time to send new req */ if ((int)(cur_time - p->next_action_time) >= 0) {
trial_cnt++; if (p->fd == -1) {
if (send_query_to_peer(p) == 0) /* Time to send new req */
sent_cnt++; trial_cnt++;
} if (send_query_to_peer(p) == 0)
if (p->deadline != 0 && p->deadline <= cur_time) { sent_cnt++;
/* Timed out waiting for reply */ } else {
timeout = error_interval(); /* Timed out waiting for reply */
bb_error_msg("timed out waiting for %s, " close(p->fd);
"next query in %us", p->dotted, timeout); p->fd = -1;
if (p->trustlevel >= TRUSTLEVEL_BADPEER) { timeout = error_interval();
p->trustlevel /= 2; bb_error_msg("timed out waiting for %s, "
if (p->trustlevel < TRUSTLEVEL_BADPEER) "next query in %us", p->dotted, timeout);
bb_error_msg("peer %s now invalid", p->dotted); if (p->trustlevel >= TRUSTLEVEL_BADPEER) {
p->trustlevel /= 2;
if (p->trustlevel < TRUSTLEVEL_BADPEER)
bb_error_msg("peer %s now invalid", p->dotted);
}
set_next(p, timeout);
} }
set_next(p, timeout);
} }
if (p->next != 0 && p->next < nextaction) if (p->next_action_time < nextaction)
nextaction = p->next; nextaction = p->next_action_time;
if (p->deadline != 0 && p->deadline < nextaction)
nextaction = p->deadline;
if (p->state == STATE_QUERY_SENT) { if (p->fd >= 0) {
/* Wait for reply from this peer */ /* Wait for reply from this peer */
pfd[i].fd = p->fd; pfd[i].fd = p->fd;
pfd[i].events = POLLIN; pfd[i].events = POLLIN;
@ -1005,7 +987,7 @@ int ntpd_main(int argc UNUSED_PARAM, char **argv)
/* Here we may block */ /* Here we may block */
if (g.verbose >= 2) if (g.verbose >= 2)
bb_error_msg("poll %u sec, sockets:%u", timeout, i); bb_error_msg("poll %us, sockets:%u", timeout, i);
nfds = poll(pfd, i, timeout * 1000); nfds = poll(pfd, i, timeout * 1000);
if (nfds <= 0) if (nfds <= 0)
continue; continue;