OLD | NEW |
---|---|
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "net/base/host_resolver_impl.h" | 5 #include "net/base/host_resolver_impl.h" |
6 | 6 |
7 #if defined(OS_WIN) | 7 #if defined(OS_WIN) |
8 #include <Winsock2.h> | 8 #include <Winsock2.h> |
9 #elif defined(OS_POSIX) | 9 #elif defined(OS_POSIX) |
10 #include <netdb.h> | 10 #include <netdb.h> |
11 #endif | 11 #endif |
12 | 12 |
13 #include <cmath> | 13 #include <cmath> |
14 #include <deque> | 14 #include <utility> |
15 #include <vector> | 15 #include <vector> |
16 | 16 |
17 #include "base/basictypes.h" | 17 #include "base/basictypes.h" |
18 #include "base/bind.h" | 18 #include "base/bind.h" |
19 #include "base/bind_helpers.h" | 19 #include "base/bind_helpers.h" |
20 #include "base/callback.h" | |
20 #include "base/compiler_specific.h" | 21 #include "base/compiler_specific.h" |
21 #include "base/debug/debugger.h" | 22 #include "base/debug/debugger.h" |
22 #include "base/debug/stack_trace.h" | 23 #include "base/debug/stack_trace.h" |
23 #include "base/message_loop_proxy.h" | 24 #include "base/message_loop_proxy.h" |
24 #include "base/metrics/field_trial.h" | 25 #include "base/metrics/field_trial.h" |
25 #include "base/metrics/histogram.h" | 26 #include "base/metrics/histogram.h" |
26 #include "base/stl_util.h" | 27 #include "base/stl_util.h" |
27 #include "base/string_util.h" | 28 #include "base/string_util.h" |
28 #include "base/threading/worker_pool.h" | 29 #include "base/threading/worker_pool.h" |
29 #include "base/time.h" | 30 #include "base/time.h" |
(...skipping 89 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
119 | 120 |
120 // Ensure all errors are positive, as histogram only tracks positive values. | 121 // Ensure all errors are positive, as histogram only tracks positive values. |
121 for (size_t i = 0; i < arraysize(os_errors); ++i) { | 122 for (size_t i = 0; i < arraysize(os_errors); ++i) { |
122 os_errors[i] = std::abs(os_errors[i]); | 123 os_errors[i] = std::abs(os_errors[i]); |
123 } | 124 } |
124 | 125 |
125 return base::CustomHistogram::ArrayToCustomRanges(os_errors, | 126 return base::CustomHistogram::ArrayToCustomRanges(os_errors, |
126 arraysize(os_errors)); | 127 arraysize(os_errors)); |
127 } | 128 } |
128 | 129 |
129 } // anonymous namespace | 130 // Wraps call to SystemHostResolverProc as an instance of HostResolverProc. |
130 | 131 class CallSystemHostResolverProc : public HostResolverProc { |
131 // static | 132 public: |
132 HostResolver* CreateSystemHostResolver(size_t max_concurrent_resolves, | 133 CallSystemHostResolverProc() : HostResolverProc(NULL) {} |
133 size_t max_retry_attempts, | 134 virtual int Resolve(const std::string& hostname, |
134 NetLog* net_log) { | 135 AddressFamily address_family, |
135 // Maximum of 8 concurrent resolver threads. | 136 HostResolverFlags host_resolver_flags, |
136 // Some routers (or resolvers) appear to start to provide host-not-found if | 137 AddressList* addrlist, |
137 // too many simultaneous resolutions are pending. This number needs to be | 138 int* os_error) OVERRIDE { |
138 // further optimized, but 8 is what FF currently does. | 139 return SystemHostResolverProc(hostname, |
139 static const size_t kDefaultMaxJobs = 8u; | 140 address_family, |
140 | 141 host_resolver_flags, |
141 if (max_concurrent_resolves == HostResolver::kDefaultParallelism) | 142 addrlist, |
142 max_concurrent_resolves = kDefaultMaxJobs; | 143 os_error); |
mmenke
2012/01/26 16:54:10
Seems a little weird that SystemHostResolverProc i
szym
2012/01/27 04:58:12
I share your sentiment. I'll asses the necessary c
szym
2012/02/01 17:23:51
There are 6 locations, 3 in tests, 1 in mock. I'm
mmenke1
2012/02/01 18:19:22
You could still keep the current SystemHostResolve
| |
143 | |
144 HostResolverImpl* resolver = | |
145 new HostResolverImpl(NULL, HostCache::CreateDefaultCache(), | |
146 max_concurrent_resolves, max_retry_attempts, net_log); | |
147 | |
148 return resolver; | |
149 } | |
150 | |
151 static int ResolveAddrInfo(HostResolverProc* resolver_proc, | |
152 const std::string& host, | |
153 AddressFamily address_family, | |
154 HostResolverFlags host_resolver_flags, | |
155 AddressList* out, | |
156 int* os_error) { | |
157 if (resolver_proc) { | |
158 // Use the custom procedure. | |
159 return resolver_proc->Resolve(host, address_family, | |
160 host_resolver_flags, out, os_error); | |
161 } else { | |
162 // Use the system procedure (getaddrinfo). | |
163 return SystemHostResolverProc(host, address_family, | |
164 host_resolver_flags, out, os_error); | |
165 } | 144 } |
166 } | 145 }; |
167 | 146 |
168 // Extra parameters to attach to the NetLog when the resolve failed. | 147 // Extra parameters to attach to the NetLog when the resolve failed. |
169 class HostResolveFailedParams : public NetLog::EventParameters { | 148 class HostResolveFailedParams : public NetLog::EventParameters { |
170 public: | 149 public: |
171 HostResolveFailedParams(uint32 attempt_number, | 150 HostResolveFailedParams(uint32 attempt_number, |
172 int net_error, | 151 int net_error, |
173 int os_error) | 152 int os_error) |
174 : attempt_number_(attempt_number), | 153 : attempt_number_(attempt_number), |
175 net_error_(net_error), | 154 net_error_(net_error), |
176 os_error_(os_error) { | 155 os_error_(os_error) { |
177 } | 156 } |
178 | 157 |
179 virtual Value* ToValue() const { | 158 virtual Value* ToValue() const OVERRIDE { |
180 DictionaryValue* dict = new DictionaryValue(); | 159 DictionaryValue* dict = new DictionaryValue(); |
181 if (attempt_number_) | 160 if (attempt_number_) |
182 dict->SetInteger("attempt_number", attempt_number_); | 161 dict->SetInteger("attempt_number", attempt_number_); |
183 | 162 |
184 dict->SetInteger("net_error", net_error_); | 163 dict->SetInteger("net_error", net_error_); |
185 | 164 |
186 if (os_error_) { | 165 if (os_error_) { |
187 dict->SetInteger("os_error", os_error_); | 166 dict->SetInteger("os_error", os_error_); |
188 #if defined(OS_POSIX) | 167 #if defined(OS_POSIX) |
189 dict->SetString("os_error_string", gai_strerror(os_error_)); | 168 dict->SetString("os_error_string", gai_strerror(os_error_)); |
(...skipping 23 matching lines...) Expand all Loading... | |
213 }; | 192 }; |
214 | 193 |
215 // Parameters representing the information in a RequestInfo object, along with | 194 // Parameters representing the information in a RequestInfo object, along with |
216 // the associated NetLog::Source. | 195 // the associated NetLog::Source. |
217 class RequestInfoParameters : public NetLog::EventParameters { | 196 class RequestInfoParameters : public NetLog::EventParameters { |
218 public: | 197 public: |
219 RequestInfoParameters(const HostResolver::RequestInfo& info, | 198 RequestInfoParameters(const HostResolver::RequestInfo& info, |
220 const NetLog::Source& source) | 199 const NetLog::Source& source) |
221 : info_(info), source_(source) {} | 200 : info_(info), source_(source) {} |
222 | 201 |
223 virtual Value* ToValue() const { | 202 virtual Value* ToValue() const OVERRIDE { |
224 DictionaryValue* dict = new DictionaryValue(); | 203 DictionaryValue* dict = new DictionaryValue(); |
225 dict->SetString("host", info_.host_port_pair().ToString()); | 204 dict->SetString("host", info_.host_port_pair().ToString()); |
226 dict->SetInteger("address_family", | 205 dict->SetInteger("address_family", |
227 static_cast<int>(info_.address_family())); | 206 static_cast<int>(info_.address_family())); |
228 dict->SetBoolean("allow_cached_response", info_.allow_cached_response()); | 207 dict->SetBoolean("allow_cached_response", info_.allow_cached_response()); |
229 dict->SetBoolean("is_speculative", info_.is_speculative()); | 208 dict->SetBoolean("is_speculative", info_.is_speculative()); |
230 dict->SetInteger("priority", info_.priority()); | 209 dict->SetInteger("priority", info_.priority()); |
231 | 210 |
232 if (source_.is_valid()) | 211 if (source_.is_valid()) |
233 dict->Set("source_dependency", source_.ToValue()); | 212 dict->Set("source_dependency", source_.ToValue()); |
234 | 213 |
235 return dict; | 214 return dict; |
236 } | 215 } |
237 | 216 |
238 private: | 217 private: |
239 const HostResolver::RequestInfo info_; | 218 const HostResolver::RequestInfo info_; |
240 const NetLog::Source source_; | 219 const NetLog::Source source_; |
241 }; | 220 }; |
242 | 221 |
243 // Parameters associated with the creation of a HostResolverImpl::Job. | 222 // Parameters associated with the creation of a HostResolverImpl::Job |
223 // or a HostResolverImpl::ProcTask. | |
244 class JobCreationParameters : public NetLog::EventParameters { | 224 class JobCreationParameters : public NetLog::EventParameters { |
245 public: | 225 public: |
246 JobCreationParameters(const std::string& host, const NetLog::Source& source) | 226 JobCreationParameters(const std::string& host, |
227 const NetLog::Source& source) | |
247 : host_(host), source_(source) {} | 228 : host_(host), source_(source) {} |
248 | 229 |
249 virtual Value* ToValue() const { | 230 virtual Value* ToValue() const OVERRIDE { |
250 DictionaryValue* dict = new DictionaryValue(); | 231 DictionaryValue* dict = new DictionaryValue(); |
251 dict->SetString("host", host_); | 232 dict->SetString("host", host_); |
252 dict->Set("source_dependency", source_.ToValue()); | 233 dict->Set("source_dependency", source_.ToValue()); |
253 return dict; | 234 return dict; |
254 } | 235 } |
255 | 236 |
256 private: | 237 private: |
257 const std::string host_; | 238 const std::string host_; |
258 const NetLog::Source source_; | 239 const NetLog::Source source_; |
259 }; | 240 }; |
260 | 241 |
242 // Parameters of the HOST_RESOLVER_IMPL_JOB_ATTACH/DETACH event. | |
243 class JobAttachParameters : public NetLog::EventParameters { | |
244 public: | |
245 JobAttachParameters(const NetLog::Source& source, | |
246 RequestPriority priority) | |
247 : source_(source), priority_(priority) {} | |
248 | |
249 virtual Value* ToValue() const OVERRIDE { | |
250 DictionaryValue* dict = new DictionaryValue(); | |
251 dict->Set("source_dependency", source_.ToValue()); | |
252 dict->SetInteger("priority", priority_); | |
253 return dict; | |
254 } | |
255 | |
256 private: | |
257 const NetLog::Source source_; | |
258 const RequestPriority priority_; | |
259 }; | |
260 | |
261 // The logging routines are defined here because some requests are resolved | |
262 // without a Request object. | |
263 | |
264 // Logs when a request has just been started. | |
265 void LogStartRequest(const BoundNetLog& source_net_log, | |
266 const BoundNetLog& request_net_log, | |
267 const HostResolver::RequestInfo& info) { | |
268 source_net_log.BeginEvent( | |
269 NetLog::TYPE_HOST_RESOLVER_IMPL, | |
270 make_scoped_refptr(new NetLogSourceParameter( | |
271 "source_dependency", request_net_log.source()))); | |
272 | |
273 request_net_log.BeginEvent( | |
274 NetLog::TYPE_HOST_RESOLVER_IMPL_REQUEST, | |
275 make_scoped_refptr(new RequestInfoParameters( | |
276 info, source_net_log.source()))); | |
277 } | |
278 | |
279 // Logs when a request has just completed (before its callback is run). | |
280 void LogFinishRequest(const BoundNetLog& source_net_log, | |
281 const BoundNetLog& request_net_log, | |
282 const HostResolver::RequestInfo& info, | |
283 int net_error, | |
284 int os_error) { | |
285 scoped_refptr<NetLog::EventParameters> params; | |
286 if (net_error != OK) { | |
287 params = new HostResolveFailedParams(0, net_error, os_error); | |
288 } | |
289 | |
290 request_net_log.EndEvent(NetLog::TYPE_HOST_RESOLVER_IMPL_REQUEST, params); | |
291 source_net_log.EndEvent(NetLog::TYPE_HOST_RESOLVER_IMPL, NULL); | |
292 } | |
293 | |
294 // Logs when a request has been cancelled. | |
295 void LogCancelRequest(const BoundNetLog& source_net_log, | |
296 const BoundNetLog& request_net_log, | |
297 const HostResolverImpl::RequestInfo& info) { | |
298 request_net_log.AddEvent(NetLog::TYPE_CANCELLED, NULL); | |
299 request_net_log.EndEvent(NetLog::TYPE_HOST_RESOLVER_IMPL_REQUEST, NULL); | |
300 source_net_log.EndEvent(NetLog::TYPE_HOST_RESOLVER_IMPL, NULL); | |
301 } | |
302 | |
303 //----------------------------------------------------------------------------- | |
304 | |
305 // Keeps track of the highest priority. | |
306 class PriorityTracker { | |
307 public: | |
308 PriorityTracker() | |
309 : highest_priority_(IDLE), total_count_(0) { | |
310 memset(counts_, 0, sizeof(counts_)); | |
311 } | |
312 | |
313 RequestPriority highest_priority() const { | |
314 return highest_priority_; | |
315 } | |
316 | |
317 size_t total_count() const { | |
318 return total_count_; | |
319 } | |
320 | |
321 // Returns true if priority changed. | |
mmenke
2012/01/26 16:54:10
Fix comment.
| |
322 void Add(RequestPriority req_priority) { | |
323 ++total_count_; | |
324 ++counts_[req_priority]; | |
325 if (highest_priority_ > req_priority) | |
326 highest_priority_ = req_priority; | |
327 } | |
328 | |
329 // Returns true if priority changed. | |
mmenke
2012/01/26 16:54:10
Fix comment.
| |
330 void Remove(RequestPriority req_priority) { | |
331 DCHECK_GT(total_count_, 0u); | |
332 DCHECK_GT(counts_[req_priority], 0u); | |
333 --total_count_; | |
334 --counts_[req_priority]; | |
335 if ((counts_[req_priority] == 0u) && (highest_priority_ == req_priority)) { | |
mmenke
2012/01/26 16:54:10
This initial check doesn't gain us anything, since
mmenke
2012/01/27 04:12:37
Oops...that code is wrong. Anyways, seems like yo
szym
2012/01/27 04:58:12
You are correct. It saves only the assignment to |
| |
336 for (size_t i = highest_priority_; i < NUM_PRIORITIES; ++i) { | |
337 if (counts_[i] > 0) | |
338 highest_priority_ = static_cast<RequestPriority>(i); | |
339 } | |
340 DCHECK_EQ(0u, total_count_); | |
mmenke
2012/01/26 16:54:10
This DCHECK is incorrect, since you don't have a r
szym
2012/01/27 04:58:12
Good catch. Need a test for the case the last Requ
| |
341 // In absence of requests set default. | |
342 if (highest_priority_ != IDLE) | |
343 highest_priority_ = IDLE; | |
344 } | |
345 } | |
346 | |
347 private: | |
348 RequestPriority highest_priority_; | |
349 size_t total_count_; | |
350 size_t counts_[NUM_PRIORITIES]; | |
351 }; | |
352 | |
261 //----------------------------------------------------------------------------- | 353 //----------------------------------------------------------------------------- |
262 | 354 |
355 HostResolver* CreateHostResolver(size_t max_concurrent_resolves, | |
356 size_t max_retry_attempts, | |
357 bool use_cache, | |
358 NetLog* net_log) { | |
359 // Maximum of 8 concurrent resolver threads. | |
360 // Some routers (or resolvers) appear to start to provide host-not-found if | |
361 // too many simultaneous resolutions are pending. This number needs to be | |
362 // further optimized, but 8 is what FF currently does. | |
mmenke
2012/01/26 16:54:10
Does Firefox retry like we do, on different thread
szym
2012/01/27 04:58:12
This comment was moved without change, but you are
| |
363 static const size_t kDefaultMaxJobs = 8u; | |
mmenke
2012/01/26 16:54:10
nit: I suggest you put this in an anonymous names
| |
364 | |
365 if (max_concurrent_resolves == HostResolver::kDefaultParallelism) | |
366 max_concurrent_resolves = kDefaultMaxJobs; | |
367 | |
368 // TODO(szym): Add experiments with reserved slots for higher priority | |
369 // requests. | |
370 | |
371 PrioritizedDispatcher::Limits limits(NUM_PRIORITIES, max_concurrent_resolves); | |
372 | |
373 HostResolverImpl* resolver = new HostResolverImpl( | |
374 use_cache ? HostCache::CreateDefaultCache() : NULL, | |
375 limits, | |
376 HostResolverImpl::ProcTaskParams(NULL, max_retry_attempts), | |
377 net_log); | |
378 | |
379 return resolver; | |
380 } | |
381 | |
382 } // anonymous namespace | |
383 | |
384 //----------------------------------------------------------------------------- | |
385 | |
386 HostResolver* CreateSystemHostResolver(size_t max_concurrent_resolves, | |
387 size_t max_retry_attempts, | |
388 NetLog* net_log) { | |
389 return CreateHostResolver(max_concurrent_resolves, | |
390 max_retry_attempts, | |
391 true /* use_cache */, | |
392 net_log); | |
393 } | |
394 | |
395 HostResolver* CreateNonCachingSystemHostResolver(size_t max_concurrent_resolves, | |
396 size_t max_retry_attempts, | |
397 NetLog* net_log) { | |
398 return CreateHostResolver(max_concurrent_resolves, | |
399 max_retry_attempts, | |
400 false /* use_cache */, | |
401 net_log); | |
402 } | |
403 | |
404 //----------------------------------------------------------------------------- | |
405 | |
406 // Holds the data for a request that could not be completed synchronously. | |
407 // It is owned by a Job. Canceled Requests are only marked as canceled rather | |
408 // than removed from the Job's |requests_| list. | |
263 class HostResolverImpl::Request { | 409 class HostResolverImpl::Request { |
264 public: | 410 public: |
265 Request(const BoundNetLog& source_net_log, | 411 Request(const BoundNetLog& source_net_log, |
266 const BoundNetLog& request_net_log, | 412 const BoundNetLog& request_net_log, |
267 const RequestInfo& info, | 413 const RequestInfo& info, |
268 const CompletionCallback& callback, | 414 const CompletionCallback& callback, |
269 AddressList* addresses) | 415 AddressList* addresses) |
270 : source_net_log_(source_net_log), | 416 : source_net_log_(source_net_log), |
271 request_net_log_(request_net_log), | 417 request_net_log_(request_net_log), |
272 info_(info), | 418 info_(info), |
273 job_(NULL), | 419 job_(NULL), |
274 callback_(callback), | 420 callback_(callback), |
275 addresses_(addresses) { | 421 addresses_(addresses) { |
276 } | 422 } |
277 | 423 |
278 // Mark the request as cancelled. | 424 // Mark the request as canceled. |
279 void MarkAsCancelled() { | 425 void MarkAsCanceled() { |
280 job_ = NULL; | 426 job_ = NULL; |
281 addresses_ = NULL; | 427 addresses_ = NULL; |
282 callback_.Reset(); | 428 callback_.Reset(); |
283 } | 429 } |
284 | 430 |
285 bool was_cancelled() const { | 431 bool was_canceled() const { |
286 return callback_.is_null(); | 432 return callback_.is_null(); |
287 } | 433 } |
288 | 434 |
289 void set_job(Job* job) { | 435 void set_job(Job* job) { |
290 DCHECK(job != NULL); | 436 DCHECK(job); |
291 // Identify which job the request is waiting on. | 437 // Identify which job the request is waiting on. |
292 job_ = job; | 438 job_ = job; |
293 } | 439 } |
294 | 440 |
441 // Prepare final AddressList and call completion callback. | |
295 void OnComplete(int error, const AddressList& addrlist) { | 442 void OnComplete(int error, const AddressList& addrlist) { |
296 if (error == OK) | 443 if (error == OK) |
297 *addresses_ = CreateAddressListUsingPort(addrlist, port()); | 444 *addresses_ = CreateAddressListUsingPort(addrlist, info_.port()); |
298 CompletionCallback callback = callback_; | 445 CompletionCallback callback = callback_; |
299 MarkAsCancelled(); | 446 MarkAsCanceled(); |
300 callback.Run(error); | 447 callback.Run(error); |
301 } | 448 } |
302 | 449 |
303 int port() const { | |
304 return info_.port(); | |
305 } | |
306 | |
307 Job* job() const { | 450 Job* job() const { |
308 return job_; | 451 return job_; |
309 } | 452 } |
310 | 453 |
454 // NetLog for the source, passed in HostResolver::Resolve. | |
311 const BoundNetLog& source_net_log() { | 455 const BoundNetLog& source_net_log() { |
312 return source_net_log_; | 456 return source_net_log_; |
313 } | 457 } |
314 | 458 |
459 // NetLog for this request. | |
315 const BoundNetLog& request_net_log() { | 460 const BoundNetLog& request_net_log() { |
316 return request_net_log_; | 461 return request_net_log_; |
317 } | 462 } |
318 | 463 |
319 const RequestInfo& info() const { | 464 const RequestInfo& info() const { |
320 return info_; | 465 return info_; |
321 } | 466 } |
322 | 467 |
323 private: | 468 private: |
324 BoundNetLog source_net_log_; | 469 BoundNetLog source_net_log_; |
325 BoundNetLog request_net_log_; | 470 BoundNetLog request_net_log_; |
326 | 471 |
327 // The request info that started the request. | 472 // The request info that started the request. |
328 RequestInfo info_; | 473 RequestInfo info_; |
329 | 474 |
330 // The resolve job (running in worker pool) that this request is dependent on. | 475 // The resolve job that this request is dependent on. |
331 Job* job_; | 476 Job* job_; |
332 | 477 |
333 // The user's callback to invoke when the request completes. | 478 // The user's callback to invoke when the request completes. |
334 CompletionCallback callback_; | 479 CompletionCallback callback_; |
335 | 480 |
336 // The address list to save result into. | 481 // The address list to save result into. |
337 AddressList* addresses_; | 482 AddressList* addresses_; |
338 | 483 |
339 DISALLOW_COPY_AND_ASSIGN(Request); | 484 DISALLOW_COPY_AND_ASSIGN(Request); |
340 }; | 485 }; |
341 | 486 |
342 //------------------------------------------------------------------------------ | 487 //------------------------------------------------------------------------------ |
343 | 488 |
344 // Provide a common macro to simplify code and readability. We must use a | 489 // Provide a common macro to simplify code and readability. We must use a |
345 // macros as the underlying HISTOGRAM macro creates static varibles. | 490 // macros as the underlying HISTOGRAM macro creates static varibles. |
346 #define DNS_HISTOGRAM(name, time) UMA_HISTOGRAM_CUSTOM_TIMES(name, time, \ | 491 #define DNS_HISTOGRAM(name, time) UMA_HISTOGRAM_CUSTOM_TIMES(name, time, \ |
347 base::TimeDelta::FromMicroseconds(1), base::TimeDelta::FromHours(1), 100) | 492 base::TimeDelta::FromMicroseconds(1), base::TimeDelta::FromHours(1), 100) |
348 | 493 |
349 // This class represents a request to the worker pool for a "getaddrinfo()" | 494 // Calls HostResolverProc on the WorkerPool. Performs retries if necessary. |
350 // call. | 495 // |
351 class HostResolverImpl::Job | 496 // Whenever we try to resolve the host, we post a delayed task to check if host |
352 : public base::RefCountedThreadSafe<HostResolverImpl::Job> { | 497 // resolution (OnLookupComplete) is completed or not. If the original attempt |
498 // hasn't completed, then we start another attempt for host resolution. We take | |
499 // the results from the first attempt that finishes and ignore the results from | |
500 // all other attempts. | |
501 // | |
502 // TODO(szym): Move to separate source file for testing and mocking. | |
503 // | |
504 class HostResolverImpl::ProcTask | |
505 : public base::RefCountedThreadSafe<HostResolverImpl::ProcTask> { | |
353 public: | 506 public: |
354 Job(int id, | 507 typedef base::Callback<void(int, int, const AddressList&)> Callback; |
355 HostResolverImpl* resolver, | |
356 const Key& key, | |
357 const BoundNetLog& source_net_log, | |
358 NetLog* net_log) | |
359 : id_(id), | |
360 key_(key), | |
361 resolver_(resolver), | |
362 origin_loop_(base::MessageLoopProxy::current()), | |
363 resolver_proc_(resolver->effective_resolver_proc()), | |
364 unresponsive_delay_(resolver->unresponsive_delay()), | |
365 attempt_number_(0), | |
366 completed_attempt_number_(0), | |
367 completed_attempt_error_(ERR_UNEXPECTED), | |
368 had_non_speculative_request_(false), | |
369 net_log_(BoundNetLog::Make(net_log, | |
370 NetLog::SOURCE_HOST_RESOLVER_IMPL_JOB)) { | |
371 DCHECK(resolver); | |
372 net_log_.BeginEvent( | |
373 NetLog::TYPE_HOST_RESOLVER_IMPL_JOB, | |
374 make_scoped_refptr( | |
375 new JobCreationParameters(key.hostname, source_net_log.source()))); | |
376 } | |
377 | 508 |
378 // Attaches a request to this job. The job takes ownership of |req| and will | 509 ProcTask(const Key& key, |
379 // take care to delete it. | 510 const ProcTaskParams& params, |
380 void AddRequest(Request* req) { | 511 const Callback& callback, |
381 DCHECK(origin_loop_->BelongsToCurrentThread()); | 512 const BoundNetLog& job_net_log) |
382 req->request_net_log().BeginEvent( | 513 : key_(key), |
383 NetLog::TYPE_HOST_RESOLVER_IMPL_JOB_ATTACH, | 514 params_(params), |
384 make_scoped_refptr(new NetLogSourceParameter( | 515 callback_(callback), |
385 "source_dependency", net_log_.source()))); | 516 origin_loop_(base::MessageLoopProxy::current()), |
517 attempt_number_(0), | |
518 completed_attempt_number_(0), | |
519 completed_attempt_error_(ERR_UNEXPECTED), | |
520 had_non_speculative_request_(false), | |
521 net_log_(BoundNetLog::Make( | |
522 job_net_log.net_log(), | |
523 NetLog::SOURCE_HOST_RESOLVER_IMPL_PROC_TASK)) { | |
524 if (!params_.resolver_proc) | |
525 params_.resolver_proc = HostResolverProc::GetDefault(); | |
526 // If default is unset, use the system proc. | |
527 if (!params_.resolver_proc) | |
528 params_.resolver_proc = new CallSystemHostResolverProc(); | |
386 | 529 |
387 req->set_job(this); | 530 job_net_log.AddEvent(NetLog::TYPE_HOST_RESOLVER_IMPL_PROC_TASK, |
mmenke
2012/01/26 16:54:10
Elsewhere we generally use begin/end events for th
szym
2012/01/27 04:58:12
What concerned me was the possibility of overlap b
mmenke
2012/01/27 05:08:44
Even if we do both at once, it may still might act
mmenke
2012/01/27 05:11:32
Sorry, that should be it draws attention to the be
| |
388 requests_.push_back(req); | 531 new NetLogSourceParameter("source_dependency", |
532 net_log_.source())); | |
389 | 533 |
390 if (!req->info().is_speculative()) | 534 net_log_.BeginEvent(NetLog::TYPE_HOST_RESOLVER_IMPL_PROC_TASK, |
391 had_non_speculative_request_ = true; | 535 new JobCreationParameters(key_.hostname, |
536 job_net_log.source())); | |
392 } | 537 } |
393 | 538 |
394 void Start() { | 539 void Start() { |
395 DCHECK(origin_loop_->BelongsToCurrentThread()); | 540 DCHECK(origin_loop_->BelongsToCurrentThread()); |
396 StartLookupAttempt(); | 541 StartLookupAttempt(); |
397 } | 542 } |
398 | 543 |
544 // Cancels this ProcTask. It will be orphaned. Any outstanding resolve | |
545 // attempts running on worker threads will continue running. Only once all the | |
546 // attempts complete will the final reference to this ProcTask be released. | |
547 void Cancel() { | |
548 DCHECK(origin_loop_->BelongsToCurrentThread()); | |
549 | |
550 if (was_canceled()) | |
551 return; | |
552 | |
553 net_log_.AddEvent(NetLog::TYPE_CANCELLED, NULL); | |
554 | |
555 callback_.Reset(); | |
556 | |
557 net_log_.EndEvent(NetLog::TYPE_HOST_RESOLVER_IMPL_PROC_TASK, NULL); | |
558 } | |
559 | |
560 void set_had_non_speculative_request() { | |
561 DCHECK(origin_loop_->BelongsToCurrentThread()); | |
562 had_non_speculative_request_ = true; | |
563 } | |
564 | |
565 bool was_canceled() const { | |
566 DCHECK(origin_loop_->BelongsToCurrentThread()); | |
567 return callback_.is_null(); | |
568 } | |
569 | |
570 bool was_completed() const { | |
571 DCHECK(origin_loop_->BelongsToCurrentThread()); | |
572 return completed_attempt_number_ > 0; | |
573 } | |
574 | |
575 private: | |
399 void StartLookupAttempt() { | 576 void StartLookupAttempt() { |
400 DCHECK(origin_loop_->BelongsToCurrentThread()); | 577 DCHECK(origin_loop_->BelongsToCurrentThread()); |
401 base::TimeTicks start_time = base::TimeTicks::Now(); | 578 base::TimeTicks start_time = base::TimeTicks::Now(); |
402 ++attempt_number_; | 579 ++attempt_number_; |
403 // Dispatch the lookup attempt to a worker thread. | 580 // Dispatch the lookup attempt to a worker thread. |
404 if (!base::WorkerPool::PostTask( | 581 if (!base::WorkerPool::PostTask( |
405 FROM_HERE, | 582 FROM_HERE, |
406 base::Bind(&Job::DoLookup, this, start_time, attempt_number_), | 583 base::Bind(&ProcTask::DoLookup, this, start_time, attempt_number_), |
407 true)) { | 584 true)) { |
408 NOTREACHED(); | 585 NOTREACHED(); |
409 | 586 |
410 // Since we could be running within Resolve() right now, we can't just | 587 // Since we could be running within Resolve() right now, we can't just |
411 // call OnLookupComplete(). Instead we must wait until Resolve() has | 588 // call OnLookupComplete(). Instead we must wait until Resolve() has |
412 // returned (IO_PENDING). | 589 // returned (IO_PENDING). |
413 origin_loop_->PostTask( | 590 origin_loop_->PostTask( |
414 FROM_HERE, | 591 FROM_HERE, |
415 base::Bind(&Job::OnLookupComplete, this, AddressList(), | 592 base::Bind(&ProcTask::OnLookupComplete, this, AddressList(), |
416 start_time, attempt_number_, ERR_UNEXPECTED, 0)); | 593 start_time, attempt_number_, ERR_UNEXPECTED, 0)); |
417 return; | 594 return; |
418 } | 595 } |
419 | 596 |
420 net_log_.AddEvent( | 597 net_log_.AddEvent( |
421 NetLog::TYPE_HOST_RESOLVER_IMPL_ATTEMPT_STARTED, | 598 NetLog::TYPE_HOST_RESOLVER_IMPL_ATTEMPT_STARTED, |
422 make_scoped_refptr(new NetLogIntegerParameter( | 599 make_scoped_refptr(new NetLogIntegerParameter( |
423 "attempt_number", attempt_number_))); | 600 "attempt_number", attempt_number_))); |
424 | 601 |
425 // Post a task to check if we get the results within a given time. | 602 // Post a task to check if we get the results within a given time. |
426 // OnCheckForComplete has the potential for starting a new attempt on a | 603 // OnCheckForComplete has the potential for starting a new attempt on a |
427 // different worker thread if none of our outstanding attempts have | 604 // different worker thread if none of our outstanding attempts have |
428 // completed yet. | 605 // completed yet. |
429 if (attempt_number_ <= resolver_->max_retry_attempts()) { | 606 if (attempt_number_ <= params_.max_retry_attempts) { |
430 origin_loop_->PostDelayedTask( | 607 origin_loop_->PostDelayedTask( |
431 FROM_HERE, | 608 FROM_HERE, |
432 base::Bind(&Job::OnCheckForComplete, this), | 609 base::Bind(&ProcTask::OnCheckForComplete, this), |
433 unresponsive_delay_.InMilliseconds()); | 610 params_.unresponsive_delay.InMilliseconds()); |
434 } | 611 } |
435 } | 612 } |
436 | 613 |
437 // Cancels the current job. The Job will be orphaned. Any outstanding resolve | |
438 // attempts running on worker threads will continue running. Only once all the | |
439 // attempts complete will the final reference to this Job be released. | |
440 void Cancel() { | |
441 DCHECK(origin_loop_->BelongsToCurrentThread()); | |
442 net_log_.AddEvent(NetLog::TYPE_CANCELLED, NULL); | |
443 | |
444 HostResolver* resolver = resolver_; | |
445 resolver_ = NULL; | |
446 | |
447 // End here to prevent issues when a Job outlives the HostResolver that | |
448 // spawned it. | |
449 net_log_.EndEvent(NetLog::TYPE_HOST_RESOLVER_IMPL_JOB, NULL); | |
450 | |
451 // We will call HostResolverImpl::CancelRequest(Request*) on each one | |
452 // in order to notify any observers. | |
453 for (RequestsList::const_iterator it = requests_.begin(); | |
454 it != requests_.end(); ++it) { | |
455 HostResolverImpl::Request* req = *it; | |
456 if (!req->was_cancelled()) | |
457 resolver->CancelRequest(req); | |
458 } | |
459 } | |
460 | |
461 bool was_cancelled() const { | |
462 DCHECK(origin_loop_->BelongsToCurrentThread()); | |
463 return resolver_ == NULL; | |
464 } | |
465 | |
466 bool was_completed() const { | |
467 DCHECK(origin_loop_->BelongsToCurrentThread()); | |
468 return completed_attempt_number_ > 0; | |
469 } | |
470 | |
471 const Key& key() const { | |
472 DCHECK(origin_loop_->BelongsToCurrentThread()); | |
473 return key_; | |
474 } | |
475 | |
476 int id() const { | |
477 DCHECK(origin_loop_->BelongsToCurrentThread()); | |
478 return id_; | |
479 } | |
480 | |
481 const RequestsList& requests() const { | |
482 DCHECK(origin_loop_->BelongsToCurrentThread()); | |
483 return requests_; | |
484 } | |
485 | |
486 // Returns the first request attached to the job. | |
487 const Request* initial_request() const { | |
488 DCHECK(origin_loop_->BelongsToCurrentThread()); | |
489 DCHECK(!requests_.empty()); | |
490 return requests_[0]; | |
491 } | |
492 | |
493 // Returns true if |req_info| can be fulfilled by this job. | |
494 bool CanServiceRequest(const RequestInfo& req_info) const { | |
495 DCHECK(origin_loop_->BelongsToCurrentThread()); | |
496 return key_ == resolver_->GetEffectiveKeyForRequest(req_info); | |
497 } | |
498 | |
499 private: | |
500 friend class base::RefCountedThreadSafe<HostResolverImpl::Job>; | |
501 | |
502 ~Job() { | |
503 // Free the requests attached to this job. | |
504 STLDeleteElements(&requests_); | |
505 } | |
506 | |
507 // WARNING: This code runs inside a worker pool. The shutdown code cannot | 614 // WARNING: This code runs inside a worker pool. The shutdown code cannot |
508 // wait for it to finish, so we must be very careful here about using other | 615 // wait for it to finish, so we must be very careful here about using other |
509 // objects (like MessageLoops, Singletons, etc). During shutdown these objects | 616 // objects (like MessageLoops, Singletons, etc). During shutdown these objects |
510 // may no longer exist. Multiple DoLookups() could be running in parallel, so | 617 // may no longer exist. Multiple DoLookups() could be running in parallel, so |
511 // any state inside of |this| must not mutate . | 618 // any state inside of |this| must not mutate . |
512 void DoLookup(const base::TimeTicks& start_time, | 619 void DoLookup(const base::TimeTicks& start_time, |
513 const uint32 attempt_number) { | 620 const uint32 attempt_number) { |
514 AddressList results; | 621 AddressList results; |
515 int os_error = 0; | 622 int os_error = 0; |
516 // Running on the worker thread | 623 // Running on the worker thread |
517 int error = ResolveAddrInfo(resolver_proc_, | 624 |
518 key_.hostname, | 625 int error = params_.resolver_proc->Resolve(key_.hostname, |
519 key_.address_family, | 626 key_.address_family, |
520 key_.host_resolver_flags, | 627 key_.host_resolver_flags, |
521 &results, | 628 &results, |
522 &os_error); | 629 &os_error); |
523 | 630 |
524 origin_loop_->PostTask( | 631 origin_loop_->PostTask( |
525 FROM_HERE, | 632 FROM_HERE, |
526 base::Bind(&Job::OnLookupComplete, this, results, start_time, | 633 base::Bind(&ProcTask::OnLookupComplete, this, results, start_time, |
527 attempt_number, error, os_error)); | 634 attempt_number, error, os_error)); |
528 } | 635 } |
529 | 636 |
530 // Callback to see if DoLookup() has finished or not (runs on origin thread). | 637 // Callback to see if DoLookup() has finished or not (runs on origin thread). |
531 void OnCheckForComplete() { | 638 void OnCheckForComplete() { |
mmenke
2012/01/26 16:54:10
nit: While you're here, maybe rename this functio
| |
532 DCHECK(origin_loop_->BelongsToCurrentThread()); | 639 DCHECK(origin_loop_->BelongsToCurrentThread()); |
533 | 640 |
534 if (was_completed() || was_cancelled()) | 641 if (was_completed() || was_canceled()) |
535 return; | 642 return; |
536 | 643 |
537 DCHECK(resolver_); | 644 params_.unresponsive_delay *= params_.retry_factor; |
538 unresponsive_delay_ *= resolver_->retry_factor(); | |
539 StartLookupAttempt(); | 645 StartLookupAttempt(); |
540 } | 646 } |
541 | 647 |
542 // Callback for when DoLookup() completes (runs on origin thread). | 648 // Callback for when DoLookup() completes (runs on origin thread). |
543 void OnLookupComplete(const AddressList& results, | 649 void OnLookupComplete(const AddressList& results, |
544 const base::TimeTicks& start_time, | 650 const base::TimeTicks& start_time, |
545 const uint32 attempt_number, | 651 const uint32 attempt_number, |
546 int error, | 652 int error, |
547 const int os_error) { | 653 const int os_error) { |
548 DCHECK(origin_loop_->BelongsToCurrentThread()); | 654 DCHECK(origin_loop_->BelongsToCurrentThread()); |
549 DCHECK(error || results.head()); | 655 DCHECK(error || results.head()); |
550 | 656 |
551 bool was_retry_attempt = attempt_number > 1; | 657 bool was_retry_attempt = attempt_number > 1; |
552 | 658 |
553 if (!was_cancelled()) { | 659 if (!was_canceled()) { |
554 scoped_refptr<NetLog::EventParameters> params; | 660 scoped_refptr<NetLog::EventParameters> params; |
555 if (error != OK) { | 661 if (error != OK) { |
556 params = new HostResolveFailedParams(attempt_number, error, os_error); | 662 params = new HostResolveFailedParams(attempt_number, error, os_error); |
557 } else { | 663 } else { |
558 params = new NetLogIntegerParameter("attempt_number", attempt_number_); | 664 params = new NetLogIntegerParameter("attempt_number", attempt_number_); |
559 } | 665 } |
560 net_log_.AddEvent(NetLog::TYPE_HOST_RESOLVER_IMPL_ATTEMPT_FINISHED, | 666 net_log_.AddEvent(NetLog::TYPE_HOST_RESOLVER_IMPL_ATTEMPT_FINISHED, |
561 params); | 667 params); |
562 | 668 |
563 // If host is already resolved, then record data and return. | 669 // If host is already resolved, then record data and return. |
(...skipping 13 matching lines...) Expand all Loading... | |
577 completed_attempt_number_ = attempt_number; | 683 completed_attempt_number_ = attempt_number; |
578 completed_attempt_error_ = error; | 684 completed_attempt_error_ = error; |
579 } | 685 } |
580 | 686 |
581 // Ideally the following code would be part of host_resolver_proc.cc, | 687 // Ideally the following code would be part of host_resolver_proc.cc, |
582 // however it isn't safe to call NetworkChangeNotifier from worker | 688 // however it isn't safe to call NetworkChangeNotifier from worker |
583 // threads. So we do it here on the IO thread instead. | 689 // threads. So we do it here on the IO thread instead. |
584 if (error != OK && NetworkChangeNotifier::IsOffline()) | 690 if (error != OK && NetworkChangeNotifier::IsOffline()) |
585 error = ERR_INTERNET_DISCONNECTED; | 691 error = ERR_INTERNET_DISCONNECTED; |
586 | 692 |
587 // We will record data for the first attempt. Don't contaminate with retry | 693 // We will record data for the first attempt. Don't contaminate with retry |
mmenke
2012/01/26 16:54:10
Know this is old code, but I'd suggest a if (!was_
szym
2012/01/27 04:58:12
I feel this code should be simplified even further
| |
588 // attempt's data. | 694 // attempt's data. |
589 if (!was_retry_attempt) | 695 if (!was_retry_attempt) |
590 RecordPerformanceHistograms(start_time, error, os_error); | 696 RecordPerformanceHistograms(start_time, error, os_error); |
591 | 697 |
592 RecordAttemptHistograms(start_time, attempt_number, error, os_error); | 698 RecordAttemptHistograms(start_time, attempt_number, error, os_error); |
593 | 699 |
594 if (was_cancelled()) | 700 if (was_canceled()) |
595 return; | 701 return; |
596 | 702 |
597 if (was_retry_attempt) { | 703 if (was_retry_attempt) { |
598 // If retry attempt finishes before 1st attempt, then get stats on how | 704 // If retry attempt finishes before 1st attempt, then get stats on how |
599 // much time is saved by having spawned an extra attempt. | 705 // much time is saved by having spawned an extra attempt. |
600 retry_attempt_finished_time_ = base::TimeTicks::Now(); | 706 retry_attempt_finished_time_ = base::TimeTicks::Now(); |
601 } | 707 } |
602 | 708 |
603 scoped_refptr<NetLog::EventParameters> params; | 709 scoped_refptr<NetLog::EventParameters> params; |
604 if (error != OK) { | 710 if (error != OK) { |
605 params = new HostResolveFailedParams(0, error, os_error); | 711 params = new HostResolveFailedParams(0, error, os_error); |
606 } else { | 712 } else { |
607 params = new AddressListNetLogParam(results_); | 713 params = new AddressListNetLogParam(results_); |
608 } | 714 } |
609 | 715 |
610 // End here to prevent issues when a Job outlives the HostResolver that | 716 net_log_.EndEvent(NetLog::TYPE_HOST_RESOLVER_IMPL_PROC_TASK, params); |
611 // spawned it. | |
612 net_log_.EndEvent(NetLog::TYPE_HOST_RESOLVER_IMPL_JOB, params); | |
613 | 717 |
614 DCHECK(!requests_.empty()); | 718 callback_.Run(error, os_error, results_); |
615 | |
616 // Use the port number of the first request. | |
617 if (error == OK) | |
618 MutableSetPort(requests_[0]->port(), &results_); | |
619 | |
620 resolver_->OnJobComplete(this, error, os_error, results_); | |
621 } | 719 } |
622 | 720 |
623 void RecordPerformanceHistograms(const base::TimeTicks& start_time, | 721 void RecordPerformanceHistograms(const base::TimeTicks& start_time, |
624 const int error, | 722 const int error, |
625 const int os_error) const { | 723 const int os_error) const { |
626 DCHECK(origin_loop_->BelongsToCurrentThread()); | 724 DCHECK(origin_loop_->BelongsToCurrentThread()); |
627 enum Category { // Used in HISTOGRAM_ENUMERATION. | 725 enum Category { // Used in HISTOGRAM_ENUMERATION. |
628 RESOLVE_SUCCESS, | 726 RESOLVE_SUCCESS, |
629 RESOLVE_FAIL, | 727 RESOLVE_FAIL, |
630 RESOLVE_SPECULATIVE_SUCCESS, | 728 RESOLVE_SPECULATIVE_SUCCESS, |
(...skipping 75 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
706 DNS_HISTOGRAM(base::FieldTrial::MakeName("DNS.ResolveSuccess", | 804 DNS_HISTOGRAM(base::FieldTrial::MakeName("DNS.ResolveSuccess", |
707 "DnsParallelism"), duration); | 805 "DnsParallelism"), duration); |
708 } | 806 } |
709 } | 807 } |
710 } | 808 } |
711 | 809 |
712 void RecordAttemptHistograms(const base::TimeTicks& start_time, | 810 void RecordAttemptHistograms(const base::TimeTicks& start_time, |
713 const uint32 attempt_number, | 811 const uint32 attempt_number, |
714 const int error, | 812 const int error, |
715 const int os_error) const { | 813 const int os_error) const { |
814 DCHECK(origin_loop_->BelongsToCurrentThread()); | |
716 bool first_attempt_to_complete = | 815 bool first_attempt_to_complete = |
717 completed_attempt_number_ == attempt_number; | 816 completed_attempt_number_ == attempt_number; |
718 bool is_first_attempt = (attempt_number == 1); | 817 bool is_first_attempt = (attempt_number == 1); |
719 | 818 |
720 if (first_attempt_to_complete) { | 819 if (first_attempt_to_complete) { |
721 // If this was first attempt to complete, then record the resolution | 820 // If this was first attempt to complete, then record the resolution |
722 // status of the attempt. | 821 // status of the attempt. |
723 if (completed_attempt_error_ == OK) { | 822 if (completed_attempt_error_ == OK) { |
724 UMA_HISTOGRAM_ENUMERATION( | 823 UMA_HISTOGRAM_ENUMERATION( |
725 "DNS.AttemptFirstSuccess", attempt_number, 100); | 824 "DNS.AttemptFirstSuccess", attempt_number, 100); |
726 } else { | 825 } else { |
727 UMA_HISTOGRAM_ENUMERATION( | 826 UMA_HISTOGRAM_ENUMERATION( |
728 "DNS.AttemptFirstFailure", attempt_number, 100); | 827 "DNS.AttemptFirstFailure", attempt_number, 100); |
729 } | 828 } |
730 } | 829 } |
731 | 830 |
732 if (error == OK) | 831 if (error == OK) |
733 UMA_HISTOGRAM_ENUMERATION("DNS.AttemptSuccess", attempt_number, 100); | 832 UMA_HISTOGRAM_ENUMERATION("DNS.AttemptSuccess", attempt_number, 100); |
734 else | 833 else |
735 UMA_HISTOGRAM_ENUMERATION("DNS.AttemptFailure", attempt_number, 100); | 834 UMA_HISTOGRAM_ENUMERATION("DNS.AttemptFailure", attempt_number, 100); |
736 | 835 |
737 // If first attempt didn't finish before retry attempt, then calculate stats | 836 // If first attempt didn't finish before retry attempt, then calculate stats |
738 // on how much time is saved by having spawned an extra attempt. | 837 // on how much time is saved by having spawned an extra attempt. |
739 if (!first_attempt_to_complete && is_first_attempt && !was_cancelled()) { | 838 if (!first_attempt_to_complete && is_first_attempt && !was_canceled()) { |
740 DNS_HISTOGRAM("DNS.AttemptTimeSavedByRetry", | 839 DNS_HISTOGRAM("DNS.AttemptTimeSavedByRetry", |
741 base::TimeTicks::Now() - retry_attempt_finished_time_); | 840 base::TimeTicks::Now() - retry_attempt_finished_time_); |
742 } | 841 } |
743 | 842 |
744 if (was_cancelled() || !first_attempt_to_complete) { | 843 if (was_canceled() || !first_attempt_to_complete) { |
745 // Count those attempts which completed after the job was already canceled | 844 // Count those attempts which completed after the job was already canceled |
746 // OR after the job was already completed by an earlier attempt (so in | 845 // OR after the job was already completed by an earlier attempt (so in |
747 // effect). | 846 // effect). |
748 UMA_HISTOGRAM_ENUMERATION("DNS.AttemptDiscarded", attempt_number, 100); | 847 UMA_HISTOGRAM_ENUMERATION("DNS.AttemptDiscarded", attempt_number, 100); |
749 | 848 |
750 // Record if job is cancelled. | 849 // Record if job is canceled. |
751 if (was_cancelled()) | 850 if (was_canceled()) |
752 UMA_HISTOGRAM_ENUMERATION("DNS.AttemptCancelled", attempt_number, 100); | 851 UMA_HISTOGRAM_ENUMERATION("DNS.AttemptCancelled", attempt_number, 100); |
753 } | 852 } |
754 | 853 |
755 base::TimeDelta duration = base::TimeTicks::Now() - start_time; | 854 base::TimeDelta duration = base::TimeTicks::Now() - start_time; |
756 if (error == OK) | 855 if (error == OK) |
757 DNS_HISTOGRAM("DNS.AttemptSuccessDuration", duration); | 856 DNS_HISTOGRAM("DNS.AttemptSuccessDuration", duration); |
758 else | 857 else |
759 DNS_HISTOGRAM("DNS.AttemptFailDuration", duration); | 858 DNS_HISTOGRAM("DNS.AttemptFailDuration", duration); |
760 } | 859 } |
761 | 860 |
762 // Immutable. Can be read from either thread, | |
763 const int id_; | |
764 | |
765 // Set on the origin thread, read on the worker thread. | 861 // Set on the origin thread, read on the worker thread. |
766 Key key_; | 862 Key key_; |
767 | 863 |
768 // Only used on the origin thread (where Resolve was called). | 864 // Holds an owning reference to the HostResolverProc that we are going to use. |
769 HostResolverImpl* resolver_; | 865 // This may not be the current resolver procedure by the time we call |
770 RequestsList requests_; // The requests waiting on this job. | 866 // ResolveAddrInfo, but that's OK... we'll use it anyways, and the owning |
867 // reference ensures that it remains valid until we are done. | |
868 ProcTaskParams params_; | |
869 | |
870 // The listener to the results of this ProcTask. | |
871 Callback callback_; | |
771 | 872 |
772 // Used to post ourselves onto the origin thread. | 873 // Used to post ourselves onto the origin thread. |
773 scoped_refptr<base::MessageLoopProxy> origin_loop_; | 874 scoped_refptr<base::MessageLoopProxy> origin_loop_; |
774 | 875 |
775 // Hold an owning reference to the HostResolverProc that we are going to use. | |
776 // This may not be the current resolver procedure by the time we call | |
777 // ResolveAddrInfo, but that's OK... we'll use it anyways, and the owning | |
778 // reference ensures that it remains valid until we are done. | |
779 scoped_refptr<HostResolverProc> resolver_proc_; | |
780 | |
781 // The amount of time after starting a resolution attempt until deciding to | |
782 // retry. | |
783 base::TimeDelta unresponsive_delay_; | |
784 | |
785 // Keeps track of the number of attempts we have made so far to resolve the | 876 // Keeps track of the number of attempts we have made so far to resolve the |
786 // host. Whenever we start an attempt to resolve the host, we increase this | 877 // host. Whenever we start an attempt to resolve the host, we increase this |
787 // number. | 878 // number. |
788 uint32 attempt_number_; | 879 uint32 attempt_number_; |
789 | 880 |
790 // The index of the attempt which finished first (or 0 if the job is still in | 881 // The index of the attempt which finished first (or 0 if the job is still in |
791 // progress). | 882 // progress). |
792 uint32 completed_attempt_number_; | 883 uint32 completed_attempt_number_; |
793 | 884 |
794 // The result (a net error code) from the first attempt to complete. | 885 // The result (a net error code) from the first attempt to complete. |
795 int completed_attempt_error_; | 886 int completed_attempt_error_; |
796 | 887 |
797 // The time when retry attempt was finished. | 888 // The time when retry attempt was finished. |
798 base::TimeTicks retry_attempt_finished_time_; | 889 base::TimeTicks retry_attempt_finished_time_; |
799 | 890 |
800 // True if a non-speculative request was ever attached to this job | 891 // True if a non-speculative request was ever attached to this job |
801 // (regardless of whether or not it was later cancelled. | 892 // (regardless of whether or not it was later canceled. |
802 // This boolean is used for histogramming the duration of jobs used to | 893 // This boolean is used for histogramming the duration of jobs used to |
803 // service non-speculative requests. | 894 // service non-speculative requests. |
804 bool had_non_speculative_request_; | 895 bool had_non_speculative_request_; |
805 | 896 |
806 AddressList results_; | 897 AddressList results_; |
807 | 898 |
808 BoundNetLog net_log_; | 899 BoundNetLog net_log_; |
809 | 900 |
810 DISALLOW_COPY_AND_ASSIGN(Job); | 901 DISALLOW_COPY_AND_ASSIGN(ProcTask); |
811 }; | 902 }; |
812 | 903 |
813 //----------------------------------------------------------------------------- | 904 //----------------------------------------------------------------------------- |
814 | 905 |
815 // This class represents a request to the worker pool for a "probe for IPv6 | 906 // Represents a request to the worker pool for a "probe for IPv6 support" call. |
816 // support" call. | |
817 class HostResolverImpl::IPv6ProbeJob | 907 class HostResolverImpl::IPv6ProbeJob |
818 : public base::RefCountedThreadSafe<HostResolverImpl::IPv6ProbeJob> { | 908 : public base::RefCountedThreadSafe<HostResolverImpl::IPv6ProbeJob> { |
819 public: | 909 public: |
820 explicit IPv6ProbeJob(HostResolverImpl* resolver) | 910 explicit IPv6ProbeJob(HostResolverImpl* resolver) |
821 : resolver_(resolver), | 911 : resolver_(resolver), |
822 origin_loop_(base::MessageLoopProxy::current()) { | 912 origin_loop_(base::MessageLoopProxy::current()) { |
823 DCHECK(resolver); | 913 DCHECK(resolver); |
824 } | 914 } |
825 | 915 |
826 void Start() { | 916 void Start() { |
827 DCHECK(origin_loop_->BelongsToCurrentThread()); | 917 DCHECK(origin_loop_->BelongsToCurrentThread()); |
828 if (was_cancelled()) | 918 if (was_canceled()) |
829 return; | 919 return; |
830 const bool kIsSlow = true; | 920 const bool kIsSlow = true; |
831 base::WorkerPool::PostTask( | 921 base::WorkerPool::PostTask( |
832 FROM_HERE, base::Bind(&IPv6ProbeJob::DoProbe, this), kIsSlow); | 922 FROM_HERE, base::Bind(&IPv6ProbeJob::DoProbe, this), kIsSlow); |
833 } | 923 } |
834 | 924 |
835 // Cancels the current job. | 925 // Cancels the current job. |
836 void Cancel() { | 926 void Cancel() { |
837 DCHECK(origin_loop_->BelongsToCurrentThread()); | 927 DCHECK(origin_loop_->BelongsToCurrentThread()); |
838 if (was_cancelled()) | 928 if (was_canceled()) |
839 return; | 929 return; |
840 resolver_ = NULL; // Read/write ONLY on origin thread. | 930 resolver_ = NULL; // Read/write ONLY on origin thread. |
841 } | 931 } |
842 | 932 |
843 private: | 933 private: |
844 friend class base::RefCountedThreadSafe<HostResolverImpl::IPv6ProbeJob>; | 934 friend class base::RefCountedThreadSafe<HostResolverImpl::IPv6ProbeJob>; |
845 | 935 |
846 ~IPv6ProbeJob() { | 936 ~IPv6ProbeJob() { |
847 } | 937 } |
848 | 938 |
849 bool was_cancelled() const { | 939 bool was_canceled() const { |
850 DCHECK(origin_loop_->BelongsToCurrentThread()); | 940 DCHECK(origin_loop_->BelongsToCurrentThread()); |
851 return !resolver_; | 941 return !resolver_; |
852 } | 942 } |
853 | 943 |
854 // Run on worker thread. | 944 // Run on worker thread. |
855 void DoProbe() { | 945 void DoProbe() { |
856 // Do actual testing on this thread, as it takes 40-100ms. | 946 // Do actual testing on this thread, as it takes 40-100ms. |
857 AddressFamily family = IPv6Supported() ? ADDRESS_FAMILY_UNSPECIFIED | 947 AddressFamily family = IPv6Supported() ? ADDRESS_FAMILY_UNSPECIFIED |
858 : ADDRESS_FAMILY_IPV4; | 948 : ADDRESS_FAMILY_IPV4; |
859 | 949 |
860 origin_loop_->PostTask( | 950 origin_loop_->PostTask( |
861 FROM_HERE, | 951 FROM_HERE, |
862 base::Bind(&IPv6ProbeJob::OnProbeComplete, this, family)); | 952 base::Bind(&IPv6ProbeJob::OnProbeComplete, this, family)); |
863 } | 953 } |
864 | 954 |
865 // Callback for when DoProbe() completes. | 955 // Callback for when DoProbe() completes. |
866 void OnProbeComplete(AddressFamily address_family) { | 956 void OnProbeComplete(AddressFamily address_family) { |
867 DCHECK(origin_loop_->BelongsToCurrentThread()); | 957 DCHECK(origin_loop_->BelongsToCurrentThread()); |
868 if (was_cancelled()) | 958 if (was_canceled()) |
869 return; | 959 return; |
870 resolver_->IPv6ProbeSetDefaultAddressFamily(address_family); | 960 resolver_->IPv6ProbeSetDefaultAddressFamily(address_family); |
871 } | 961 } |
872 | 962 |
873 // Used/set only on origin thread. | 963 // Used/set only on origin thread. |
874 HostResolverImpl* resolver_; | 964 HostResolverImpl* resolver_; |
875 | 965 |
876 // Used to post ourselves onto the origin thread. | 966 // Used to post ourselves onto the origin thread. |
877 scoped_refptr<base::MessageLoopProxy> origin_loop_; | 967 scoped_refptr<base::MessageLoopProxy> origin_loop_; |
878 | 968 |
879 DISALLOW_COPY_AND_ASSIGN(IPv6ProbeJob); | 969 DISALLOW_COPY_AND_ASSIGN(IPv6ProbeJob); |
880 }; | 970 }; |
881 | 971 |
882 //----------------------------------------------------------------------------- | 972 //----------------------------------------------------------------------------- |
883 | 973 |
884 // We rely on the priority enum values being sequential having starting at 0, | 974 // Aggregates all Requests for the same Key. Dispatched via PriorityDispatch. |
885 // and increasing for lower priorities. | 975 // Spawns ProcTask when started. |
886 COMPILE_ASSERT(HIGHEST == 0u && | 976 class HostResolverImpl::Job : public PrioritizedDispatcher::Job { |
887 LOWEST > HIGHEST && | |
888 IDLE > LOWEST && | |
889 NUM_PRIORITIES > IDLE, | |
890 priority_indexes_incompatible); | |
891 | |
892 // JobPool contains all the information relating to queued requests, including | |
893 // the limits on how many jobs are allowed to be used for this category of | |
894 // requests. | |
895 class HostResolverImpl::JobPool { | |
896 public: | 977 public: |
897 JobPool(size_t max_outstanding_jobs, size_t max_pending_requests) | 978 // Creates new job for |key| where |request_net_log| is bound to the |
898 : num_outstanding_jobs_(0u) { | 979 // request that spawned it. |
899 SetConstraints(max_outstanding_jobs, max_pending_requests); | 980 Job(HostResolverImpl* resolver, |
900 } | 981 const Key& key, |
901 | 982 const BoundNetLog& request_net_log) |
902 ~JobPool() { | 983 : resolver_(resolver->AsWeakPtr()), |
903 // Free the pending requests. | 984 key_(key), |
904 for (size_t i = 0; i < arraysize(pending_requests_); ++i) | 985 had_non_speculative_request_(false), |
905 STLDeleteElements(&pending_requests_[i]); | 986 net_log_(BoundNetLog::Make(request_net_log.net_log(), |
906 } | 987 NetLog::SOURCE_HOST_RESOLVER_IMPL_JOB)), |
907 | 988 net_error_(ERR_IO_PENDING), |
908 // Sets the constraints for this pool. See SetPoolConstraints() for the | 989 os_error_(0) { |
909 // specific meaning of these parameters. | 990 request_net_log.AddEvent(NetLog::TYPE_HOST_RESOLVER_IMPL_CREATE_JOB, NULL); |
910 void SetConstraints(size_t max_outstanding_jobs, | 991 |
911 size_t max_pending_requests) { | 992 net_log_.BeginEvent( |
912 CHECK_NE(max_outstanding_jobs, 0u); | 993 NetLog::TYPE_HOST_RESOLVER_IMPL_JOB, |
913 max_outstanding_jobs_ = max_outstanding_jobs; | 994 make_scoped_refptr(new JobCreationParameters( |
914 max_pending_requests_ = max_pending_requests; | 995 key_.hostname, request_net_log.source()))); |
915 } | 996 } |
916 | 997 |
917 // Returns the number of pending requests enqueued to this pool. | 998 virtual ~Job() { |
918 // A pending request is one waiting to be attached to a job. | 999 if (net_error_ == ERR_IO_PENDING) { |
919 size_t GetNumPendingRequests() const { | 1000 if (is_running()) { |
920 size_t total = 0u; | 1001 proc_task_->Cancel(); |
921 for (size_t i = 0u; i < arraysize(pending_requests_); ++i) | 1002 proc_task_ = NULL; |
922 total += pending_requests_[i].size(); | |
923 return total; | |
924 } | |
925 | |
926 bool HasPendingRequests() const { | |
927 return GetNumPendingRequests() > 0u; | |
928 } | |
929 | |
930 // Enqueues a request to this pool. As a result of enqueing this request, | |
931 // the queue may have reached its maximum size. In this case, a request is | |
932 // evicted from the queue, and returned. Otherwise returns NULL. The caller | |
933 // is responsible for freeing the evicted request. | |
934 Request* InsertPendingRequest(Request* req) { | |
935 req->request_net_log().BeginEvent( | |
936 NetLog::TYPE_HOST_RESOLVER_IMPL_JOB_POOL_QUEUE, | |
937 NULL); | |
938 | |
939 PendingRequestsQueue& q = pending_requests_[req->info().priority()]; | |
940 q.push_back(req); | |
941 | |
942 // If the queue is too big, kick out the lowest priority oldest request. | |
943 if (GetNumPendingRequests() > max_pending_requests_) { | |
944 // Iterate over the queues from lowest priority to highest priority. | |
945 for (int i = static_cast<int>(arraysize(pending_requests_)) - 1; | |
946 i >= 0; --i) { | |
947 PendingRequestsQueue& q = pending_requests_[i]; | |
948 if (!q.empty()) { | |
949 Request* req = q.front(); | |
950 q.pop_front(); | |
951 req->request_net_log().AddEvent( | |
952 NetLog::TYPE_HOST_RESOLVER_IMPL_JOB_POOL_QUEUE_EVICTED, NULL); | |
953 req->request_net_log().EndEvent( | |
954 NetLog::TYPE_HOST_RESOLVER_IMPL_JOB_POOL_QUEUE, NULL); | |
955 return req; | |
956 } | |
957 } | 1003 } |
1004 net_log_.AddEvent(NetLog::TYPE_CANCELLED, NULL); | |
mmenke
2012/01/26 16:54:10
nit: Since you're already logging ERR_ABORTED, no
| |
1005 for (RequestsList::const_iterator it = requests_.begin(); | |
1006 it != requests_.end(); ++it) { | |
1007 Request* req = *it; | |
1008 if (req->was_canceled()) | |
1009 continue; | |
1010 DCHECK_EQ(this, req->job()); | |
1011 LogCancelRequest(req->source_net_log(), req->request_net_log(), | |
1012 req->info()); | |
1013 } | |
1014 net_error_ = ERR_ABORTED; | |
958 } | 1015 } |
959 | 1016 net_log_.EndEventWithNetErrorCode(NetLog::TYPE_HOST_RESOLVER_IMPL_JOB, |
960 return NULL; | 1017 net_error_); |
961 } | 1018 STLDeleteElements(&requests_); |
962 | 1019 } |
963 // Erases |req| from this container. Caller is responsible for freeing | 1020 |
964 // |req| afterwards. | 1021 HostResolverImpl* resolver() const { |
965 void RemovePendingRequest(Request* req) { | 1022 return resolver_; |
966 PendingRequestsQueue& q = pending_requests_[req->info().priority()]; | 1023 } |
967 PendingRequestsQueue::iterator it = std::find(q.begin(), q.end(), req); | 1024 |
968 DCHECK(it != q.end()); | 1025 RequestPriority priority() const { |
969 q.erase(it); | 1026 return priority_tracker_.highest_priority(); |
970 req->request_net_log().EndEvent( | 1027 } |
971 NetLog::TYPE_HOST_RESOLVER_IMPL_JOB_POOL_QUEUE, NULL); | 1028 |
972 } | 1029 // Number of non-canceled requests in |requests_|. |
973 | 1030 size_t num_active_requests() const { |
974 // Removes and returns the highest priority pending request. | 1031 return priority_tracker_.total_count(); |
975 Request* RemoveTopPendingRequest() { | 1032 } |
976 DCHECK(HasPendingRequests()); | 1033 |
977 | 1034 const Key& key() const { |
978 for (size_t i = 0u; i < arraysize(pending_requests_); ++i) { | 1035 return key_; |
979 PendingRequestsQueue& q = pending_requests_[i]; | 1036 } |
980 if (!q.empty()) { | 1037 |
981 Request* req = q.front(); | 1038 int net_error() const { |
982 q.pop_front(); | 1039 return net_error_; |
983 req->request_net_log().EndEvent( | 1040 } |
984 NetLog::TYPE_HOST_RESOLVER_IMPL_JOB_POOL_QUEUE, NULL); | 1041 |
985 return req; | 1042 // Used by HostResolverImpl with |dispatcher_|. |
986 } | 1043 const PrioritizedDispatcher::Handle& handle() const { |
1044 return handle_; | |
1045 } | |
1046 | |
1047 void set_handle(const PrioritizedDispatcher::Handle& handle) { | |
1048 handle_ = handle; | |
1049 } | |
1050 | |
1051 // The Job will own |req| and destroy it in ~Job. | |
1052 void AddRequest(Request* req) { | |
1053 DCHECK_EQ(key_.hostname, req->info().hostname()); | |
1054 | |
1055 req->set_job(this); | |
1056 requests_.push_back(req); | |
1057 | |
1058 priority_tracker_.Add(req->info().priority()); | |
1059 | |
1060 req->request_net_log().AddEvent( | |
1061 NetLog::TYPE_HOST_RESOLVER_IMPL_JOB_ATTACH, | |
1062 make_scoped_refptr(new NetLogSourceParameter( | |
1063 "source_dependency", net_log_.source()))); | |
1064 | |
1065 net_log_.AddEvent( | |
1066 NetLog::TYPE_HOST_RESOLVER_IMPL_JOB_ATTACH, | |
1067 make_scoped_refptr(new JobAttachParameters( | |
1068 req->request_net_log().source(), priority()))); | |
1069 | |
1070 // TODO(szym): Check if this is still needed. | |
1071 if (!req->info().is_speculative()) { | |
1072 had_non_speculative_request_ = true; | |
1073 if (proc_task_) | |
1074 proc_task_->set_had_non_speculative_request(); | |
987 } | 1075 } |
988 | 1076 } |
989 NOTREACHED(); | 1077 |
990 return NULL; | 1078 void CancelRequest(Request* req) { |
991 } | 1079 DCHECK_EQ(key_.hostname, req->info().hostname()); |
992 | 1080 DCHECK(!req->was_canceled()); |
993 // Keeps track of a job that was just added/removed, and belongs to this pool. | 1081 // Don't remove it from |requests_| just mark it canceled. |
994 void AdjustNumOutstandingJobs(int offset) { | 1082 req->MarkAsCanceled(); |
995 DCHECK(offset == 1 || (offset == -1 && num_outstanding_jobs_ > 0u)); | 1083 LogCancelRequest(req->source_net_log(), req->request_net_log(), |
996 num_outstanding_jobs_ += offset; | 1084 req->info()); |
997 } | 1085 priority_tracker_.Remove(req->info().priority()); |
998 | 1086 net_log_.AddEvent( |
999 void ResetNumOutstandingJobs() { | 1087 NetLog::TYPE_HOST_RESOLVER_IMPL_JOB_DETACH, |
1000 num_outstanding_jobs_ = 0; | 1088 make_scoped_refptr(new JobAttachParameters( |
1001 } | 1089 req->request_net_log().source(), priority()))); |
1002 | 1090 } |
1003 // Returns true if a new job can be created for this pool. | 1091 |
1004 bool CanCreateJob() const { | 1092 // Aborts and destroys the job, completes all requests as aborted. |
1005 return num_outstanding_jobs_ + 1u <= max_outstanding_jobs_; | 1093 void Abort() { |
1006 } | 1094 // Job should only be aborted if it's running. |
1007 | 1095 DCHECK(is_running()); |
1008 // Removes any pending requests from the queue which are for the | 1096 proc_task_->Cancel(); |
1009 // same (hostname / effective address-family) as |job|, and attaches them to | 1097 proc_task_ = NULL; |
1010 // |job|. | 1098 net_error_ = ERR_ABORTED; |
1011 void MoveRequestsToJob(Job* job) { | 1099 os_error_ = 0; |
1012 for (size_t i = 0u; i < arraysize(pending_requests_); ++i) { | 1100 CompleteRequests(AddressList()); |
1013 PendingRequestsQueue& q = pending_requests_[i]; | 1101 } |
1014 PendingRequestsQueue::iterator req_it = q.begin(); | 1102 |
1015 while (req_it != q.end()) { | 1103 bool is_running() const { |
1016 Request* req = *req_it; | 1104 return proc_task_.get() != NULL; |
1017 if (job->CanServiceRequest(req->info())) { | 1105 } |
1018 // Job takes ownership of |req|. | 1106 |
1019 job->AddRequest(req); | 1107 // Called by HostResolverImpl when this job is evicted due to queue overflow. |
1020 req_it = q.erase(req_it); | 1108 void OnEvicted() { |
1021 } else { | 1109 // Must not be running. |
1022 ++req_it; | 1110 DCHECK(!is_running()); |
1023 } | 1111 handle_ = PrioritizedDispatcher::Handle(); |
1024 } | 1112 |
1113 net_log_.AddEvent(NetLog::TYPE_HOST_RESOLVER_IMPL_JOB_EVICTED, NULL); | |
1114 | |
1115 // This signals to CompleteRequests that this job never ran. | |
1116 net_error_ = ERR_HOST_RESOLVER_QUEUE_TOO_LARGE; | |
1117 os_error_ = 0; | |
1118 CompleteRequests(AddressList()); | |
1119 } | |
1120 | |
1121 // PriorityDispatch::Job interface. | |
1122 virtual void Start() OVERRIDE { | |
1123 DCHECK(!is_running()); | |
1124 handle_ = PrioritizedDispatcher::Handle(); | |
1125 | |
1126 net_log_.AddEvent(NetLog::TYPE_HOST_RESOLVER_IMPL_JOB_STARTED, NULL); | |
1127 | |
1128 proc_task_ = new ProcTask( | |
1129 key_, | |
1130 resolver_->proc_params_, | |
1131 base::Bind(&Job::OnProcTaskComplete, base::Unretained(this)), | |
1132 net_log_); | |
1133 | |
1134 if (had_non_speculative_request_) | |
1135 proc_task_->set_had_non_speculative_request(); | |
1136 // Start() could be called from within Resolve(), hence it must NOT directly | |
1137 // call OnProcTaskComplete, for example, on synchronous failure. | |
1138 proc_task_->Start(); | |
1139 } | |
1140 | |
1141 private: | |
1142 // Called by ProcTask when it completes. | |
1143 void OnProcTaskComplete(int net_error, int os_error, | |
1144 const AddressList& addrlist) { | |
1145 DCHECK(is_running()); | |
1146 proc_task_ = NULL; | |
1147 net_error_ = net_error; | |
1148 os_error_ = os_error; | |
1149 | |
1150 // We are the only consumer of |addrlist|, so we can safely change the port | |
1151 // without copy-on-write. This pays off, when job has only one request. | |
1152 AddressList list = addrlist; | |
1153 if (net_error == OK && !requests_.empty()) | |
1154 MutableSetPort(requests_.front()->info().port(), &list); | |
1155 CompleteRequests(list); | |
1156 } | |
1157 | |
1158 // Completes all Requests. Calls OnJobFinished and deletes self. | |
1159 void CompleteRequests(const AddressList& addrlist) { | |
1160 CHECK(resolver_); | |
1161 | |
1162 // This job must be removed from resolver's |jobs_| now to make room for a | |
1163 // new job with the same key in case one of the OnComplete callbacks decides | |
1164 // to spawn one. Consequently, the job deletes itself when CompleteRequests | |
1165 // is done. | |
1166 scoped_ptr<Job> self_deleter(this); | |
1167 resolver_->OnJobFinished(this, addrlist); | |
1168 | |
1169 // Complete all of the requests that were attached to the job. | |
1170 for (RequestsList::const_iterator it = requests_.begin(); | |
1171 it != requests_.end(); ++it) { | |
1172 Request* req = *it; | |
1173 | |
1174 if (req->was_canceled()) | |
1175 continue; | |
1176 | |
1177 DCHECK_EQ(this, req->job()); | |
1178 // Update the net log and notify registered observers. | |
1179 LogFinishRequest(req->source_net_log(), req->request_net_log(), | |
1180 req->info(), net_error_, os_error_); | |
1181 | |
1182 req->OnComplete(net_error_, addrlist); | |
1183 | |
1184 // Check if the resolver was destroyed as a result of running the | |
1185 // callback. If it was, we could continue, but we choose to bail. | |
1186 if (!resolver_) | |
1187 return; | |
1025 } | 1188 } |
1026 } | 1189 } |
1027 | 1190 |
1028 private: | 1191 // Used to call OnJobFinished and RemoveJob. |
1029 typedef std::deque<Request*> PendingRequestsQueue; | 1192 base::WeakPtr<HostResolverImpl> resolver_; |
1030 | 1193 |
1031 // Maximum number of concurrent jobs allowed to be started for requests | 1194 Key key_; |
1032 // belonging to this pool. | 1195 |
1033 size_t max_outstanding_jobs_; | 1196 // Tracks the highest priority across |requests_|. |
1034 | 1197 PriorityTracker priority_tracker_; |
1035 // The current number of running jobs that were started for requests | 1198 |
1036 // belonging to this pool. | 1199 bool had_non_speculative_request_; |
1037 size_t num_outstanding_jobs_; | 1200 |
1038 | 1201 BoundNetLog net_log_; |
1039 // The maximum number of requests we allow to be waiting on a job, | 1202 |
1040 // for this pool. | 1203 // Store result here in case the job fails fast in Resolve(). |
1041 size_t max_pending_requests_; | 1204 int net_error_; |
1042 | 1205 int os_error_; |
1043 // The requests which are waiting to be started for this pool. | 1206 |
1044 PendingRequestsQueue pending_requests_[NUM_PRIORITIES]; | 1207 // A ProcTask created and started when this Job is dispatched.. |
1208 scoped_refptr<ProcTask> proc_task_; | |
1209 | |
1210 // All Requests waiting for the result of this Job. Some can be canceled. | |
1211 RequestsList requests_; | |
1212 | |
1213 // A handle used by HostResolverImpl in |dispatcher_|. | |
1214 PrioritizedDispatcher::Handle handle_; | |
1045 }; | 1215 }; |
1046 | 1216 |
1047 //----------------------------------------------------------------------------- | 1217 //----------------------------------------------------------------------------- |
1048 | 1218 |
1219 HostResolverImpl::ProcTaskParams::ProcTaskParams( | |
1220 HostResolverProc* resolver_proc, | |
1221 size_t max_retry_attempts) | |
1222 : resolver_proc(resolver_proc), | |
1223 max_retry_attempts(max_retry_attempts), | |
1224 unresponsive_delay(base::TimeDelta::FromMilliseconds(6000)), | |
1225 retry_factor(2) { | |
1226 } | |
1227 | |
1228 HostResolverImpl::ProcTaskParams::~ProcTaskParams() {} | |
1229 | |
1049 HostResolverImpl::HostResolverImpl( | 1230 HostResolverImpl::HostResolverImpl( |
1050 HostResolverProc* resolver_proc, | |
1051 HostCache* cache, | 1231 HostCache* cache, |
1052 size_t max_jobs, | 1232 const PrioritizedDispatcher::Limits& job_limits, |
1053 size_t max_retry_attempts, | 1233 const ProcTaskParams& proc_params, |
1054 NetLog* net_log) | 1234 NetLog* net_log) |
1055 : cache_(cache), | 1235 : cache_(cache), |
1056 max_jobs_(max_jobs), | 1236 dispatcher_(job_limits), |
1057 max_retry_attempts_(max_retry_attempts), | 1237 max_queued_jobs_(job_limits.total_jobs * 100u), |
1058 unresponsive_delay_(base::TimeDelta::FromMilliseconds(6000)), | 1238 proc_params_(proc_params), |
1059 retry_factor_(2), | |
1060 next_job_id_(0), | |
1061 resolver_proc_(resolver_proc), | |
1062 default_address_family_(ADDRESS_FAMILY_UNSPECIFIED), | 1239 default_address_family_(ADDRESS_FAMILY_UNSPECIFIED), |
1063 ipv6_probe_monitoring_(false), | 1240 ipv6_probe_monitoring_(false), |
1064 additional_resolver_flags_(0), | 1241 additional_resolver_flags_(0), |
1065 net_log_(net_log) { | 1242 net_log_(net_log) { |
1066 DCHECK_GT(max_jobs, 0u); | 1243 |
1244 DCHECK_GE(dispatcher_.num_priorities(), static_cast<size_t>(NUM_PRIORITIES)); | |
1067 | 1245 |
1068 // Maximum of 4 retry attempts for host resolution. | 1246 // Maximum of 4 retry attempts for host resolution. |
1069 static const size_t kDefaultMaxRetryAttempts = 4u; | 1247 static const size_t kDefaultMaxRetryAttempts = 4u; |
1070 | 1248 |
1071 if (max_retry_attempts_ == HostResolver::kDefaultRetryAttempts) | 1249 if (proc_params_.max_retry_attempts == HostResolver::kDefaultRetryAttempts) |
1072 max_retry_attempts_ = kDefaultMaxRetryAttempts; | 1250 proc_params_.max_retry_attempts = kDefaultMaxRetryAttempts; |
1073 | |
1074 // It is cumbersome to expose all of the constraints in the constructor, | |
1075 // so we choose some defaults, which users can override later. | |
1076 job_pools_[POOL_NORMAL] = new JobPool(max_jobs, 100u * max_jobs); | |
1077 | 1251 |
1078 #if defined(OS_WIN) | 1252 #if defined(OS_WIN) |
1079 EnsureWinsockInit(); | 1253 EnsureWinsockInit(); |
1080 #endif | 1254 #endif |
1081 #if defined(OS_POSIX) && !defined(OS_MACOSX) | 1255 #if defined(OS_POSIX) && !defined(OS_MACOSX) |
1082 if (HaveOnlyLoopbackAddresses()) | 1256 if (HaveOnlyLoopbackAddresses()) |
1083 additional_resolver_flags_ |= HOST_RESOLVER_LOOPBACK_ONLY; | 1257 additional_resolver_flags_ |= HOST_RESOLVER_LOOPBACK_ONLY; |
1084 #endif | 1258 #endif |
1085 NetworkChangeNotifier::AddIPAddressObserver(this); | 1259 NetworkChangeNotifier::AddIPAddressObserver(this); |
1086 #if defined(OS_POSIX) && !defined(OS_MACOSX) && !defined(OS_OPENBSD) | 1260 #if defined(OS_POSIX) && !defined(OS_MACOSX) && !defined(OS_OPENBSD) |
1087 #if !defined(OS_ANDROID) | 1261 #if !defined(OS_ANDROID) |
1088 EnsureDnsReloaderInit(); | 1262 EnsureDnsReloaderInit(); |
1089 #endif | 1263 #endif |
1090 NetworkChangeNotifier::AddDNSObserver(this); | 1264 NetworkChangeNotifier::AddDNSObserver(this); |
1091 #endif | 1265 #endif |
1092 } | 1266 } |
1093 | 1267 |
1094 HostResolverImpl::~HostResolverImpl() { | 1268 HostResolverImpl::~HostResolverImpl() { |
1095 // Cancel the outstanding jobs. Those jobs may contain several attached | |
1096 // requests, which will also be cancelled. | |
1097 DiscardIPv6ProbeJob(); | 1269 DiscardIPv6ProbeJob(); |
1098 | 1270 |
1099 CancelAllJobs(); | 1271 // This will also cancel all outstanding requests. |
1100 | 1272 STLDeleteValues(&jobs_); |
1101 // In case we are being deleted during the processing of a callback. | |
1102 if (cur_completing_job_) | |
1103 cur_completing_job_->Cancel(); | |
1104 | 1273 |
1105 NetworkChangeNotifier::RemoveIPAddressObserver(this); | 1274 NetworkChangeNotifier::RemoveIPAddressObserver(this); |
1106 #if defined(OS_POSIX) && !defined(OS_MACOSX) && !defined(OS_OPENBSD) | 1275 #if defined(OS_POSIX) && !defined(OS_MACOSX) && !defined(OS_OPENBSD) |
1107 NetworkChangeNotifier::RemoveDNSObserver(this); | 1276 NetworkChangeNotifier::RemoveDNSObserver(this); |
1108 #endif | 1277 #endif |
1109 | |
1110 // Delete the job pools. | |
1111 for (size_t i = 0u; i < arraysize(job_pools_); ++i) | |
1112 delete job_pools_[i]; | |
1113 } | 1278 } |
1114 | 1279 |
1115 void HostResolverImpl::SetPoolConstraints(JobPoolIndex pool_index, | 1280 void HostResolverImpl::SetMaxQueuedJobs(size_t value) { |
1116 size_t max_outstanding_jobs, | 1281 DCHECK_EQ(0u, dispatcher_.num_queued_jobs()); |
1117 size_t max_pending_requests) { | 1282 DCHECK_GT(value, 0u); |
1118 DCHECK(CalledOnValidThread()); | 1283 max_queued_jobs_ = value; |
1119 CHECK_GE(pool_index, 0); | |
1120 CHECK_LT(pool_index, POOL_COUNT); | |
1121 CHECK(jobs_.empty()) << "Can only set constraints during setup"; | |
1122 JobPool* pool = job_pools_[pool_index]; | |
1123 pool->SetConstraints(max_outstanding_jobs, max_pending_requests); | |
1124 } | 1284 } |
1125 | 1285 |
1126 int HostResolverImpl::Resolve(const RequestInfo& info, | 1286 int HostResolverImpl::Resolve(const RequestInfo& info, |
1127 AddressList* addresses, | 1287 AddressList* addresses, |
1128 const CompletionCallback& callback, | 1288 const CompletionCallback& callback, |
1129 RequestHandle* out_req, | 1289 RequestHandle* out_req, |
1130 const BoundNetLog& source_net_log) { | 1290 const BoundNetLog& source_net_log) { |
1131 DCHECK(addresses); | 1291 DCHECK(addresses); |
1132 DCHECK(CalledOnValidThread()); | 1292 DCHECK(CalledOnValidThread()); |
1133 DCHECK_EQ(false, callback.is_null()); | 1293 DCHECK_EQ(false, callback.is_null()); |
1134 | 1294 |
1135 // Make a log item for the request. | 1295 // Make a log item for the request. |
1136 BoundNetLog request_net_log = BoundNetLog::Make(net_log_, | 1296 BoundNetLog request_net_log = BoundNetLog::Make(net_log_, |
1137 NetLog::SOURCE_HOST_RESOLVER_IMPL_REQUEST); | 1297 NetLog::SOURCE_HOST_RESOLVER_IMPL_REQUEST); |
1138 | 1298 |
1139 // Update the net log and notify registered observers. | 1299 LogStartRequest(source_net_log, request_net_log, info); |
1140 OnStartRequest(source_net_log, request_net_log, info); | |
1141 | 1300 |
1142 // Build a key that identifies the request in the cache and in the | 1301 // Build a key that identifies the request in the cache and in the |
1143 // outstanding jobs map. | 1302 // outstanding jobs map. |
1144 Key key = GetEffectiveKeyForRequest(info); | 1303 Key key = GetEffectiveKeyForRequest(info); |
1145 | 1304 |
1146 int rv = ResolveHelper(key, info, addresses, request_net_log); | 1305 int rv = ResolveHelper(key, info, addresses, request_net_log); |
1147 if (rv != ERR_DNS_CACHE_MISS) { | 1306 if (rv != ERR_DNS_CACHE_MISS) { |
1148 OnFinishRequest(source_net_log, request_net_log, info, | 1307 LogFinishRequest(source_net_log, request_net_log, info, rv, |
1149 rv, | 1308 0 /* os_error (unknown since from cache) */); |
1150 0 /* os_error (unknown since from cache) */); | |
1151 return rv; | 1309 return rv; |
1152 } | 1310 } |
1153 | 1311 |
1154 // Create a handle for this request, and pass it back to the user if they | 1312 // Next we need to attach our request to a "job". This job is responsible for |
1155 // asked for it (out_req != NULL). | 1313 // calling "getaddrinfo(hostname)" on a worker thread. |
1156 Request* req = new Request(source_net_log, request_net_log, info, | 1314 |
1157 callback, addresses); | 1315 JobMap::iterator jobit = jobs_.find(key); |
1316 Job* job; | |
1317 if (jobit == jobs_.end()) { | |
1318 // Create new Job. | |
1319 job = new Job(this, key, request_net_log); | |
1320 job->set_handle(dispatcher_.Add(job, info.priority())); | |
1321 | |
1322 // Check for queue overflow. | |
1323 if (dispatcher_.num_queued_jobs() > max_queued_jobs_) { | |
1324 Job* evicted = static_cast<Job*>(dispatcher_.EvictOldestLowest()); | |
1325 DCHECK(evicted); | |
1326 if (evicted == job) { | |
1327 delete job; | |
1328 rv = ERR_HOST_RESOLVER_QUEUE_TOO_LARGE; | |
1329 LogFinishRequest(source_net_log, request_net_log, info, rv, 0); | |
1330 return rv; | |
1331 } | |
1332 evicted->OnEvicted(); // Deletes |evicted|. | |
1333 } | |
1334 | |
1335 jobs_.insert(jobit, std::make_pair(key, job)); | |
1336 } else { | |
1337 job = jobit->second; | |
1338 } | |
1339 | |
1340 // Can't complete synchronously. Create and attach request. | |
1341 Request* req = new Request(source_net_log, request_net_log, info, callback, | |
1342 addresses); | |
1343 job->AddRequest(req); | |
1344 if (!job->handle().is_null()) | |
1345 job->set_handle(dispatcher_.ChangePriority(job->handle(), job->priority())); | |
1158 if (out_req) | 1346 if (out_req) |
1159 *out_req = reinterpret_cast<RequestHandle>(req); | 1347 *out_req = reinterpret_cast<RequestHandle>(req); |
1160 | 1348 |
1161 // Next we need to attach our request to a "job". This job is responsible for | 1349 DCHECK_EQ(ERR_IO_PENDING, job->net_error()); |
1162 // calling "getaddrinfo(hostname)" on a worker thread. | 1350 // Completion happens during Job::CompleteRequests(). |
1163 scoped_refptr<Job> job; | |
1164 | |
1165 // If there is already an outstanding job to resolve |key|, use | |
1166 // it. This prevents starting concurrent resolves for the same hostname. | |
1167 job = FindOutstandingJob(key); | |
1168 if (job) { | |
1169 job->AddRequest(req); | |
1170 } else { | |
1171 JobPool* pool = GetPoolForRequest(req); | |
1172 if (CanCreateJobForPool(*pool)) { | |
1173 CreateAndStartJob(req); | |
1174 } else { | |
1175 return EnqueueRequest(pool, req); | |
1176 } | |
1177 } | |
1178 | |
1179 // Completion happens during OnJobComplete(Job*). | |
1180 return ERR_IO_PENDING; | 1351 return ERR_IO_PENDING; |
1181 } | 1352 } |
1182 | 1353 |
1183 int HostResolverImpl::ResolveHelper(const Key& key, | 1354 int HostResolverImpl::ResolveHelper(const Key& key, |
1184 const RequestInfo& info, | 1355 const RequestInfo& info, |
1185 AddressList* addresses, | 1356 AddressList* addresses, |
1186 const BoundNetLog& request_net_log) { | 1357 const BoundNetLog& request_net_log) { |
1187 // The result of |getaddrinfo| for empty hosts is inconsistent across systems. | 1358 // The result of |getaddrinfo| for empty hosts is inconsistent across systems. |
1188 // On Windows it gives the default interface's address, whereas on Linux it | 1359 // On Windows it gives the default interface's address, whereas on Linux it |
1189 // gives an error. We will make it fail on all platforms for consistency. | 1360 // gives an error. We will make it fail on all platforms for consistency. |
(...skipping 12 matching lines...) Expand all Loading... | |
1202 AddressList* addresses, | 1373 AddressList* addresses, |
1203 const BoundNetLog& source_net_log) { | 1374 const BoundNetLog& source_net_log) { |
1204 DCHECK(CalledOnValidThread()); | 1375 DCHECK(CalledOnValidThread()); |
1205 DCHECK(addresses); | 1376 DCHECK(addresses); |
1206 | 1377 |
1207 // Make a log item for the request. | 1378 // Make a log item for the request. |
1208 BoundNetLog request_net_log = BoundNetLog::Make(net_log_, | 1379 BoundNetLog request_net_log = BoundNetLog::Make(net_log_, |
1209 NetLog::SOURCE_HOST_RESOLVER_IMPL_REQUEST); | 1380 NetLog::SOURCE_HOST_RESOLVER_IMPL_REQUEST); |
1210 | 1381 |
1211 // Update the net log and notify registered observers. | 1382 // Update the net log and notify registered observers. |
1212 OnStartRequest(source_net_log, request_net_log, info); | 1383 LogStartRequest(source_net_log, request_net_log, info); |
1213 | 1384 |
1214 // Build a key that identifies the request in the cache and in the | |
1215 // outstanding jobs map. | |
1216 Key key = GetEffectiveKeyForRequest(info); | 1385 Key key = GetEffectiveKeyForRequest(info); |
1217 | 1386 |
1218 int rv = ResolveHelper(key, info, addresses, request_net_log); | 1387 int rv = ResolveHelper(key, info, addresses, request_net_log); |
1219 OnFinishRequest(source_net_log, request_net_log, info, | 1388 LogFinishRequest(source_net_log, request_net_log, info, rv, |
1220 rv, | 1389 0 /* os_error (unknown since from cache) */); |
1221 0 /* os_error (unknown since from cache) */); | |
1222 return rv; | 1390 return rv; |
1223 } | 1391 } |
1224 | 1392 |
1225 // See OnJobComplete(Job*) for why it is important not to clean out | |
1226 // cancelled requests from Job::requests_. | |
1227 void HostResolverImpl::CancelRequest(RequestHandle req_handle) { | 1393 void HostResolverImpl::CancelRequest(RequestHandle req_handle) { |
1228 DCHECK(CalledOnValidThread()); | 1394 DCHECK(CalledOnValidThread()); |
1229 Request* req = reinterpret_cast<Request*>(req_handle); | 1395 Request* req = reinterpret_cast<Request*>(req_handle); |
1230 DCHECK(req); | 1396 DCHECK(req); |
1231 | 1397 |
1232 scoped_ptr<Request> request_deleter; // Frees at end of function. | 1398 Job* job = req->job(); |
1399 DCHECK(job); | |
1233 | 1400 |
1234 if (!req->job()) { | 1401 job->CancelRequest(req); |
1235 // If the request was not attached to a job yet, it must have been | 1402 |
1236 // enqueued into a pool. Remove it from that pool's queue. | 1403 if (!job->handle().is_null()) { |
1237 // Otherwise if it was attached to a job, the job is responsible for | 1404 // Still in queue. |
1238 // deleting it. | 1405 if (job->num_active_requests()) { |
1239 JobPool* pool = GetPoolForRequest(req); | 1406 job->set_handle(dispatcher_.ChangePriority(job->handle(), |
1240 pool->RemovePendingRequest(req); | 1407 job->priority())); |
1241 request_deleter.reset(req); | 1408 } else { |
1409 dispatcher_.Cancel(job->handle()); | |
1410 RemoveJob(job); | |
1411 delete job; | |
1412 } | |
1242 } else { | 1413 } else { |
1243 req->request_net_log().EndEvent( | 1414 // Job is running (and could be in CompleteRequests right now). |
1244 NetLog::TYPE_HOST_RESOLVER_IMPL_JOB_ATTACH, NULL); | 1415 // But to be in Request::OnComplete we would have to have a non-canceled |
1416 // request. So it is safe to Abort it if it has no more active requests. | |
1417 if (!job->num_active_requests()) { | |
1418 job->Abort(); | |
1419 } | |
1245 } | 1420 } |
1246 | |
1247 // NULL out the fields of req, to mark it as cancelled. | |
1248 req->MarkAsCancelled(); | |
1249 OnCancelRequest(req->source_net_log(), req->request_net_log(), req->info()); | |
1250 } | 1421 } |
1251 | 1422 |
1252 void HostResolverImpl::SetDefaultAddressFamily(AddressFamily address_family) { | 1423 void HostResolverImpl::SetDefaultAddressFamily(AddressFamily address_family) { |
1253 DCHECK(CalledOnValidThread()); | 1424 DCHECK(CalledOnValidThread()); |
1254 ipv6_probe_monitoring_ = false; | 1425 ipv6_probe_monitoring_ = false; |
1255 DiscardIPv6ProbeJob(); | 1426 DiscardIPv6ProbeJob(); |
1256 default_address_family_ = address_family; | 1427 default_address_family_ = address_family; |
1257 } | 1428 } |
1258 | 1429 |
1259 AddressFamily HostResolverImpl::GetDefaultAddressFamily() const { | 1430 AddressFamily HostResolverImpl::GetDefaultAddressFamily() const { |
(...skipping 18 matching lines...) Expand all Loading... | |
1278 DCHECK(addresses); | 1449 DCHECK(addresses); |
1279 DCHECK(net_error); | 1450 DCHECK(net_error); |
1280 IPAddressNumber ip_number; | 1451 IPAddressNumber ip_number; |
1281 if (!ParseIPLiteralToNumber(key.hostname, &ip_number)) | 1452 if (!ParseIPLiteralToNumber(key.hostname, &ip_number)) |
1282 return false; | 1453 return false; |
1283 | 1454 |
1284 DCHECK_EQ(key.host_resolver_flags & | 1455 DCHECK_EQ(key.host_resolver_flags & |
1285 ~(HOST_RESOLVER_CANONNAME | HOST_RESOLVER_LOOPBACK_ONLY | | 1456 ~(HOST_RESOLVER_CANONNAME | HOST_RESOLVER_LOOPBACK_ONLY | |
1286 HOST_RESOLVER_DEFAULT_FAMILY_SET_DUE_TO_NO_IPV6), | 1457 HOST_RESOLVER_DEFAULT_FAMILY_SET_DUE_TO_NO_IPV6), |
1287 0) << " Unhandled flag"; | 1458 0) << " Unhandled flag"; |
1288 bool ipv6_disabled = default_address_family_ == ADDRESS_FAMILY_IPV4 && | 1459 bool ipv6_disabled = (default_address_family_ == ADDRESS_FAMILY_IPV4) && |
1289 !ipv6_probe_monitoring_; | 1460 !ipv6_probe_monitoring_; |
1290 *net_error = OK; | 1461 *net_error = OK; |
1291 if (ip_number.size() == 16 && ipv6_disabled) { | 1462 if ((ip_number.size() == kIPv6AddressSize) && ipv6_disabled) { |
1292 *net_error = ERR_NAME_NOT_RESOLVED; | 1463 *net_error = ERR_NAME_NOT_RESOLVED; |
1293 } else { | 1464 } else { |
1294 *addresses = AddressList::CreateFromIPAddressWithCname( | 1465 *addresses = AddressList::CreateFromIPAddressWithCname( |
1295 ip_number, info.port(), | 1466 ip_number, info.port(), |
1296 (key.host_resolver_flags & HOST_RESOLVER_CANONNAME)); | 1467 (key.host_resolver_flags & HOST_RESOLVER_CANONNAME)); |
1297 } | 1468 } |
1298 return true; | 1469 return true; |
1299 } | 1470 } |
1300 | 1471 |
1301 bool HostResolverImpl::ServeFromCache(const Key& key, | 1472 bool HostResolverImpl::ServeFromCache(const Key& key, |
(...skipping 11 matching lines...) Expand all Loading... | |
1313 if (!cache_entry) | 1484 if (!cache_entry) |
1314 return false; | 1485 return false; |
1315 | 1486 |
1316 request_net_log.AddEvent(NetLog::TYPE_HOST_RESOLVER_IMPL_CACHE_HIT, NULL); | 1487 request_net_log.AddEvent(NetLog::TYPE_HOST_RESOLVER_IMPL_CACHE_HIT, NULL); |
1317 *net_error = cache_entry->error; | 1488 *net_error = cache_entry->error; |
1318 if (*net_error == OK) | 1489 if (*net_error == OK) |
1319 *addresses = CreateAddressListUsingPort(cache_entry->addrlist, info.port()); | 1490 *addresses = CreateAddressListUsingPort(cache_entry->addrlist, info.port()); |
1320 return true; | 1491 return true; |
1321 } | 1492 } |
1322 | 1493 |
1323 void HostResolverImpl::AddOutstandingJob(Job* job) { | 1494 void HostResolverImpl::OnJobFinished(Job* job, const AddressList& addrlist) { |
1324 scoped_refptr<Job>& found_job = jobs_[job->key()]; | 1495 DCHECK(job); |
1325 DCHECK(!found_job); | 1496 DCHECK(job->handle().is_null()); |
1326 found_job = job; | 1497 RemoveJob(job); |
1327 | 1498 if (job->net_error() != ERR_HOST_RESOLVER_QUEUE_TOO_LARGE) |
1328 JobPool* pool = GetPoolForRequest(job->initial_request()); | 1499 // Signal dispatcher that a slot has opened. |
1329 pool->AdjustNumOutstandingJobs(1); | 1500 dispatcher_.OnJobFinished(); |
1501 if (job->net_error() == ERR_ABORTED) | |
mmenke
2012/01/26 16:54:10
If we're not writing ERR_ABORTED to the cache, it'
| |
1502 return; | |
1503 // Write result to the cache. | |
1504 if (cache_.get()) | |
1505 cache_->Set(job->key(), job->net_error(), addrlist, | |
1506 base::TimeTicks::Now()); | |
1330 } | 1507 } |
1331 | 1508 |
1332 HostResolverImpl::Job* HostResolverImpl::FindOutstandingJob(const Key& key) { | 1509 void HostResolverImpl::RemoveJob(Job* job) { |
1333 JobMap::iterator it = jobs_.find(key); | 1510 DCHECK(job); |
1334 if (it != jobs_.end()) | 1511 jobs_.erase(job->key()); |
1335 return it->second; | |
1336 return NULL; | |
1337 } | |
1338 | |
1339 void HostResolverImpl::RemoveOutstandingJob(Job* job) { | |
1340 JobMap::iterator it = jobs_.find(job->key()); | |
1341 DCHECK(it != jobs_.end()); | |
1342 DCHECK_EQ(it->second.get(), job); | |
1343 jobs_.erase(it); | |
1344 | |
1345 JobPool* pool = GetPoolForRequest(job->initial_request()); | |
1346 pool->AdjustNumOutstandingJobs(-1); | |
1347 } | |
1348 | |
1349 void HostResolverImpl::OnJobComplete(Job* job, | |
1350 int net_error, | |
1351 int os_error, | |
1352 const AddressList& addrlist) { | |
1353 RemoveOutstandingJob(job); | |
1354 | |
1355 // Write result to the cache. | |
1356 if (cache_.get()) | |
1357 cache_->Set(job->key(), net_error, addrlist, base::TimeTicks::Now()); | |
1358 | |
1359 OnJobCompleteInternal(job, net_error, os_error, addrlist); | |
1360 } | |
1361 | |
1362 void HostResolverImpl::AbortJob(Job* job) { | |
1363 OnJobCompleteInternal(job, ERR_ABORTED, 0 /* no os_error */, AddressList()); | |
1364 } | |
1365 | |
1366 void HostResolverImpl::OnJobCompleteInternal( | |
1367 Job* job, | |
1368 int net_error, | |
1369 int os_error, | |
1370 const AddressList& addrlist) { | |
1371 // Make a note that we are executing within OnJobComplete() in case the | |
1372 // HostResolver is deleted by a callback invocation. | |
1373 DCHECK(!cur_completing_job_); | |
1374 cur_completing_job_ = job; | |
1375 | |
1376 // Try to start any queued requests now that a job-slot has freed up. | |
1377 ProcessQueuedRequests(); | |
1378 | |
1379 // Complete all of the requests that were attached to the job. | |
1380 for (RequestsList::const_iterator it = job->requests().begin(); | |
1381 it != job->requests().end(); ++it) { | |
1382 Request* req = *it; | |
1383 if (!req->was_cancelled()) { | |
1384 DCHECK_EQ(job, req->job()); | |
1385 req->request_net_log().EndEvent( | |
1386 NetLog::TYPE_HOST_RESOLVER_IMPL_JOB_ATTACH, NULL); | |
1387 | |
1388 // Update the net log and notify registered observers. | |
1389 OnFinishRequest(req->source_net_log(), req->request_net_log(), | |
1390 req->info(), net_error, os_error); | |
1391 | |
1392 req->OnComplete(net_error, addrlist); | |
1393 | |
1394 // Check if the job was cancelled as a result of running the callback. | |
1395 // (Meaning that |this| was deleted). | |
1396 if (job->was_cancelled()) | |
1397 return; | |
1398 } | |
1399 } | |
1400 | |
1401 cur_completing_job_ = NULL; | |
1402 } | |
1403 | |
1404 void HostResolverImpl::OnStartRequest(const BoundNetLog& source_net_log, | |
1405 const BoundNetLog& request_net_log, | |
1406 const RequestInfo& info) { | |
1407 source_net_log.BeginEvent( | |
1408 NetLog::TYPE_HOST_RESOLVER_IMPL, | |
1409 make_scoped_refptr(new NetLogSourceParameter( | |
1410 "source_dependency", request_net_log.source()))); | |
1411 | |
1412 request_net_log.BeginEvent( | |
1413 NetLog::TYPE_HOST_RESOLVER_IMPL_REQUEST, | |
1414 make_scoped_refptr(new RequestInfoParameters( | |
1415 info, source_net_log.source()))); | |
1416 } | |
1417 | |
1418 void HostResolverImpl::OnFinishRequest(const BoundNetLog& source_net_log, | |
1419 const BoundNetLog& request_net_log, | |
1420 const RequestInfo& info, | |
1421 int net_error, | |
1422 int os_error) { | |
1423 bool was_resolved = net_error == OK; | |
1424 | |
1425 // Log some extra parameters on failure for synchronous requests. | |
1426 scoped_refptr<NetLog::EventParameters> params; | |
1427 if (!was_resolved) { | |
1428 params = new HostResolveFailedParams(0, net_error, os_error); | |
1429 } | |
1430 | |
1431 request_net_log.EndEvent(NetLog::TYPE_HOST_RESOLVER_IMPL_REQUEST, params); | |
1432 source_net_log.EndEvent(NetLog::TYPE_HOST_RESOLVER_IMPL, NULL); | |
1433 } | |
1434 | |
1435 void HostResolverImpl::OnCancelRequest(const BoundNetLog& source_net_log, | |
1436 const BoundNetLog& request_net_log, | |
1437 const RequestInfo& info) { | |
1438 request_net_log.AddEvent(NetLog::TYPE_CANCELLED, NULL); | |
1439 request_net_log.EndEvent(NetLog::TYPE_HOST_RESOLVER_IMPL_REQUEST, NULL); | |
1440 source_net_log.EndEvent(NetLog::TYPE_HOST_RESOLVER_IMPL, NULL); | |
1441 } | 1512 } |
1442 | 1513 |
1443 void HostResolverImpl::DiscardIPv6ProbeJob() { | 1514 void HostResolverImpl::DiscardIPv6ProbeJob() { |
1444 if (ipv6_probe_job_.get()) { | 1515 if (ipv6_probe_job_.get()) { |
1445 ipv6_probe_job_->Cancel(); | 1516 ipv6_probe_job_->Cancel(); |
1446 ipv6_probe_job_ = NULL; | 1517 ipv6_probe_job_ = NULL; |
1447 } | 1518 } |
1448 } | 1519 } |
1449 | 1520 |
1450 void HostResolverImpl::IPv6ProbeSetDefaultAddressFamily( | 1521 void HostResolverImpl::IPv6ProbeSetDefaultAddressFamily( |
1451 AddressFamily address_family) { | 1522 AddressFamily address_family) { |
1452 DCHECK(address_family == ADDRESS_FAMILY_UNSPECIFIED || | 1523 DCHECK(address_family == ADDRESS_FAMILY_UNSPECIFIED || |
1453 address_family == ADDRESS_FAMILY_IPV4); | 1524 address_family == ADDRESS_FAMILY_IPV4); |
1454 if (default_address_family_ != address_family) { | 1525 if (default_address_family_ != address_family) { |
1455 VLOG(1) << "IPv6Probe forced AddressFamily setting to " | 1526 VLOG(1) << "IPv6Probe forced AddressFamily setting to " |
1456 << ((address_family == ADDRESS_FAMILY_UNSPECIFIED) ? | 1527 << ((address_family == ADDRESS_FAMILY_UNSPECIFIED) ? |
1457 "ADDRESS_FAMILY_UNSPECIFIED" : "ADDRESS_FAMILY_IPV4"); | 1528 "ADDRESS_FAMILY_UNSPECIFIED" : "ADDRESS_FAMILY_IPV4"); |
1458 } | 1529 } |
1459 default_address_family_ = address_family; | 1530 default_address_family_ = address_family; |
1460 // Drop reference since the job has called us back. | 1531 // Drop reference since the job has called us back. |
1461 DiscardIPv6ProbeJob(); | 1532 DiscardIPv6ProbeJob(); |
1462 } | 1533 } |
1463 | 1534 |
1464 bool HostResolverImpl::CanCreateJobForPool(const JobPool& pool) const { | |
1465 DCHECK_LE(jobs_.size(), max_jobs_); | |
1466 | |
1467 // We can't create another job if it would exceed the global total. | |
1468 if (jobs_.size() + 1 > max_jobs_) | |
1469 return false; | |
1470 | |
1471 // Check whether the pool's constraints are met. | |
1472 return pool.CanCreateJob(); | |
1473 } | |
1474 | |
1475 // static | |
1476 HostResolverImpl::JobPoolIndex HostResolverImpl::GetJobPoolIndexForRequest( | |
1477 const Request* req) { | |
1478 return POOL_NORMAL; | |
1479 } | |
1480 | |
1481 void HostResolverImpl::ProcessQueuedRequests() { | |
1482 // Find the highest priority request that can be scheduled. | |
1483 Request* top_req = NULL; | |
1484 for (size_t i = 0; i < arraysize(job_pools_); ++i) { | |
1485 JobPool* pool = job_pools_[i]; | |
1486 if (pool->HasPendingRequests() && CanCreateJobForPool(*pool)) { | |
1487 top_req = pool->RemoveTopPendingRequest(); | |
1488 break; | |
1489 } | |
1490 } | |
1491 | |
1492 if (!top_req) | |
1493 return; | |
1494 | |
1495 scoped_refptr<Job> job(CreateAndStartJob(top_req)); | |
1496 | |
1497 // Search for any other pending request which can piggy-back off this job. | |
1498 for (size_t pool_i = 0; pool_i < POOL_COUNT; ++pool_i) { | |
1499 JobPool* pool = job_pools_[pool_i]; | |
1500 pool->MoveRequestsToJob(job); | |
1501 } | |
1502 } | |
1503 | |
1504 HostResolverImpl::Key HostResolverImpl::GetEffectiveKeyForRequest( | 1535 HostResolverImpl::Key HostResolverImpl::GetEffectiveKeyForRequest( |
1505 const RequestInfo& info) const { | 1536 const RequestInfo& info) const { |
1506 HostResolverFlags effective_flags = | 1537 HostResolverFlags effective_flags = |
1507 info.host_resolver_flags() | additional_resolver_flags_; | 1538 info.host_resolver_flags() | additional_resolver_flags_; |
1508 AddressFamily effective_address_family = info.address_family(); | 1539 AddressFamily effective_address_family = info.address_family(); |
1509 if (effective_address_family == ADDRESS_FAMILY_UNSPECIFIED && | 1540 if (effective_address_family == ADDRESS_FAMILY_UNSPECIFIED && |
1510 default_address_family_ != ADDRESS_FAMILY_UNSPECIFIED) { | 1541 default_address_family_ != ADDRESS_FAMILY_UNSPECIFIED) { |
1511 effective_address_family = default_address_family_; | 1542 effective_address_family = default_address_family_; |
1512 if (ipv6_probe_monitoring_) | 1543 if (ipv6_probe_monitoring_) |
1513 effective_flags |= HOST_RESOLVER_DEFAULT_FAMILY_SET_DUE_TO_NO_IPV6; | 1544 effective_flags |= HOST_RESOLVER_DEFAULT_FAMILY_SET_DUE_TO_NO_IPV6; |
1514 } | 1545 } |
1515 return Key(info.hostname(), effective_address_family, effective_flags); | 1546 return Key(info.hostname(), effective_address_family, effective_flags); |
1516 } | 1547 } |
1517 | 1548 |
1518 HostResolverImpl::Job* HostResolverImpl::CreateAndStartJob(Request* req) { | |
1519 DCHECK(CanCreateJobForPool(*GetPoolForRequest(req))); | |
1520 Key key = GetEffectiveKeyForRequest(req->info()); | |
1521 | |
1522 req->request_net_log().AddEvent(NetLog::TYPE_HOST_RESOLVER_IMPL_CREATE_JOB, | |
1523 NULL); | |
1524 | |
1525 scoped_refptr<Job> job(new Job(next_job_id_++, this, key, | |
1526 req->request_net_log(), net_log_)); | |
1527 job->AddRequest(req); | |
1528 AddOutstandingJob(job); | |
1529 job->Start(); | |
1530 | |
1531 return job.get(); | |
1532 } | |
1533 | |
1534 int HostResolverImpl::EnqueueRequest(JobPool* pool, Request* req) { | |
1535 scoped_ptr<Request> req_evicted_from_queue( | |
1536 pool->InsertPendingRequest(req)); | |
1537 | |
1538 // If the queue has become too large, we need to kick something out. | |
1539 if (req_evicted_from_queue.get()) { | |
1540 Request* r = req_evicted_from_queue.get(); | |
1541 int error = ERR_HOST_RESOLVER_QUEUE_TOO_LARGE; | |
1542 | |
1543 OnFinishRequest(r->source_net_log(), r->request_net_log(), r->info(), error, | |
1544 0 /* os_error (not applicable) */); | |
1545 | |
1546 if (r == req) | |
1547 return error; | |
1548 | |
1549 r->OnComplete(error, AddressList()); | |
1550 } | |
1551 | |
1552 return ERR_IO_PENDING; | |
1553 } | |
1554 | |
1555 void HostResolverImpl::CancelAllJobs() { | |
1556 JobMap jobs; | |
1557 jobs.swap(jobs_); | |
1558 for (JobMap::iterator it = jobs.begin(); it != jobs.end(); ++it) | |
1559 it->second->Cancel(); | |
1560 } | |
1561 | |
1562 void HostResolverImpl::AbortAllInProgressJobs() { | 1549 void HostResolverImpl::AbortAllInProgressJobs() { |
1563 for (size_t i = 0; i < arraysize(job_pools_); ++i) | 1550 base::WeakPtr<HostResolverImpl> self = AsWeakPtr(); |
1564 job_pools_[i]->ResetNumOutstandingJobs(); | 1551 // Scan |jobs_| for running jobs and abort them. |
1565 JobMap jobs; | 1552 for (JobMap::iterator it = jobs_.begin(); it != jobs_.end(); ) { |
1566 jobs.swap(jobs_); | 1553 Job* job = it->second; |
1567 for (JobMap::iterator it = jobs.begin(); it != jobs.end(); ++it) { | 1554 // Advance the iterator before we might erase it. |
1568 AbortJob(it->second); | 1555 ++it; |
1569 it->second->Cancel(); | 1556 if (job->is_running()) { |
1557 job->Abort(); | |
1558 // Check if resolver was deleted in a request callback. | |
1559 if (!self) | |
1560 return; | |
1561 } else { | |
1562 // Keep it in |dispatch_|. | |
1563 DCHECK(!job->handle().is_null()); | |
1564 } | |
1570 } | 1565 } |
1571 } | 1566 } |
1572 | 1567 |
1573 void HostResolverImpl::OnIPAddressChanged() { | 1568 void HostResolverImpl::OnIPAddressChanged() { |
1574 if (cache_.get()) | 1569 if (cache_.get()) |
1575 cache_->clear(); | 1570 cache_->clear(); |
1576 if (ipv6_probe_monitoring_) { | 1571 if (ipv6_probe_monitoring_) { |
1577 DiscardIPv6ProbeJob(); | 1572 DiscardIPv6ProbeJob(); |
1578 ipv6_probe_job_ = new IPv6ProbeJob(this); | 1573 ipv6_probe_job_ = new IPv6ProbeJob(this); |
1579 ipv6_probe_job_->Start(); | 1574 ipv6_probe_job_->Start(); |
(...skipping 16 matching lines...) Expand all Loading... | |
1596 // resolv.conf changes so we don't need to do anything to clear that cache. | 1591 // resolv.conf changes so we don't need to do anything to clear that cache. |
1597 if (cache_.get()) | 1592 if (cache_.get()) |
1598 cache_->clear(); | 1593 cache_->clear(); |
1599 // Existing jobs will have been sent to the original server so they need to | 1594 // Existing jobs will have been sent to the original server so they need to |
1600 // be aborted. TODO(Craig): Should these jobs be restarted? | 1595 // be aborted. TODO(Craig): Should these jobs be restarted? |
1601 AbortAllInProgressJobs(); | 1596 AbortAllInProgressJobs(); |
1602 // |this| may be deleted inside AbortAllInProgressJobs(). | 1597 // |this| may be deleted inside AbortAllInProgressJobs(). |
1603 } | 1598 } |
1604 | 1599 |
1605 } // namespace net | 1600 } // namespace net |
OLD | NEW |