Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(718)

Side by Side Diff: net/base/host_resolver_impl.cc

Issue 9101011: [net/dns] Refactoring of job dispatch in HostResolverImpl in preparation for DnsTransactionFactory. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Addressed review: introduced CallSystemHostResolverProc, moved statics to anon namespace, ...' Created 8 years, 11 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "net/base/host_resolver_impl.h" 5 #include "net/base/host_resolver_impl.h"
6 6
7 #if defined(OS_WIN) 7 #if defined(OS_WIN)
8 #include <Winsock2.h> 8 #include <Winsock2.h>
9 #elif defined(OS_POSIX) 9 #elif defined(OS_POSIX)
10 #include <netdb.h> 10 #include <netdb.h>
11 #endif 11 #endif
12 12
13 #include <cmath> 13 #include <cmath>
14 #include <deque> 14 #include <utility>
15 #include <vector> 15 #include <vector>
16 16
17 #include "base/basictypes.h" 17 #include "base/basictypes.h"
18 #include "base/bind.h" 18 #include "base/bind.h"
19 #include "base/bind_helpers.h" 19 #include "base/bind_helpers.h"
20 #include "base/callback.h"
20 #include "base/compiler_specific.h" 21 #include "base/compiler_specific.h"
21 #include "base/debug/debugger.h" 22 #include "base/debug/debugger.h"
22 #include "base/debug/stack_trace.h" 23 #include "base/debug/stack_trace.h"
23 #include "base/message_loop_proxy.h" 24 #include "base/message_loop_proxy.h"
24 #include "base/metrics/field_trial.h" 25 #include "base/metrics/field_trial.h"
25 #include "base/metrics/histogram.h" 26 #include "base/metrics/histogram.h"
26 #include "base/stl_util.h" 27 #include "base/stl_util.h"
27 #include "base/string_util.h" 28 #include "base/string_util.h"
28 #include "base/threading/worker_pool.h" 29 #include "base/threading/worker_pool.h"
29 #include "base/time.h" 30 #include "base/time.h"
(...skipping 89 matching lines...) Expand 10 before | Expand all | Expand 10 after
119 120
120 // Ensure all errors are positive, as histogram only tracks positive values. 121 // Ensure all errors are positive, as histogram only tracks positive values.
121 for (size_t i = 0; i < arraysize(os_errors); ++i) { 122 for (size_t i = 0; i < arraysize(os_errors); ++i) {
122 os_errors[i] = std::abs(os_errors[i]); 123 os_errors[i] = std::abs(os_errors[i]);
123 } 124 }
124 125
125 return base::CustomHistogram::ArrayToCustomRanges(os_errors, 126 return base::CustomHistogram::ArrayToCustomRanges(os_errors,
126 arraysize(os_errors)); 127 arraysize(os_errors));
127 } 128 }
128 129
129 } // anonymous namespace 130 // Wraps call to SystemHostResolverProc as an instance of HostResolverProc.
130 131 class CallSystemHostResolverProc : public HostResolverProc {
131 // static 132 public:
132 HostResolver* CreateSystemHostResolver(size_t max_concurrent_resolves, 133 CallSystemHostResolverProc() : HostResolverProc(NULL) {}
133 size_t max_retry_attempts, 134 virtual int Resolve(const std::string& hostname,
134 NetLog* net_log) { 135 AddressFamily address_family,
135 // Maximum of 8 concurrent resolver threads. 136 HostResolverFlags host_resolver_flags,
136 // Some routers (or resolvers) appear to start to provide host-not-found if 137 AddressList* addrlist,
137 // too many simultaneous resolutions are pending. This number needs to be 138 int* os_error) OVERRIDE {
138 // further optimized, but 8 is what FF currently does. 139 return SystemHostResolverProc(hostname,
139 static const size_t kDefaultMaxJobs = 8u; 140 address_family,
140 141 host_resolver_flags,
141 if (max_concurrent_resolves == HostResolver::kDefaultParallelism) 142 addrlist,
142 max_concurrent_resolves = kDefaultMaxJobs; 143 os_error);
mmenke 2012/01/26 16:54:10 Seems a little weird that SystemHostResolverProc i
szym 2012/01/27 04:58:12 I share your sentiment. I'll asses the necessary c
szym 2012/02/01 17:23:51 There are 6 locations, 3 in tests, 1 in mock. I'm
mmenke1 2012/02/01 18:19:22 You could still keep the current SystemHostResolve
143
144 HostResolverImpl* resolver =
145 new HostResolverImpl(NULL, HostCache::CreateDefaultCache(),
146 max_concurrent_resolves, max_retry_attempts, net_log);
147
148 return resolver;
149 }
150
151 static int ResolveAddrInfo(HostResolverProc* resolver_proc,
152 const std::string& host,
153 AddressFamily address_family,
154 HostResolverFlags host_resolver_flags,
155 AddressList* out,
156 int* os_error) {
157 if (resolver_proc) {
158 // Use the custom procedure.
159 return resolver_proc->Resolve(host, address_family,
160 host_resolver_flags, out, os_error);
161 } else {
162 // Use the system procedure (getaddrinfo).
163 return SystemHostResolverProc(host, address_family,
164 host_resolver_flags, out, os_error);
165 } 144 }
166 } 145 };
167 146
168 // Extra parameters to attach to the NetLog when the resolve failed. 147 // Extra parameters to attach to the NetLog when the resolve failed.
169 class HostResolveFailedParams : public NetLog::EventParameters { 148 class HostResolveFailedParams : public NetLog::EventParameters {
170 public: 149 public:
171 HostResolveFailedParams(uint32 attempt_number, 150 HostResolveFailedParams(uint32 attempt_number,
172 int net_error, 151 int net_error,
173 int os_error) 152 int os_error)
174 : attempt_number_(attempt_number), 153 : attempt_number_(attempt_number),
175 net_error_(net_error), 154 net_error_(net_error),
176 os_error_(os_error) { 155 os_error_(os_error) {
177 } 156 }
178 157
179 virtual Value* ToValue() const { 158 virtual Value* ToValue() const OVERRIDE {
180 DictionaryValue* dict = new DictionaryValue(); 159 DictionaryValue* dict = new DictionaryValue();
181 if (attempt_number_) 160 if (attempt_number_)
182 dict->SetInteger("attempt_number", attempt_number_); 161 dict->SetInteger("attempt_number", attempt_number_);
183 162
184 dict->SetInteger("net_error", net_error_); 163 dict->SetInteger("net_error", net_error_);
185 164
186 if (os_error_) { 165 if (os_error_) {
187 dict->SetInteger("os_error", os_error_); 166 dict->SetInteger("os_error", os_error_);
188 #if defined(OS_POSIX) 167 #if defined(OS_POSIX)
189 dict->SetString("os_error_string", gai_strerror(os_error_)); 168 dict->SetString("os_error_string", gai_strerror(os_error_));
(...skipping 23 matching lines...) Expand all
213 }; 192 };
214 193
215 // Parameters representing the information in a RequestInfo object, along with 194 // Parameters representing the information in a RequestInfo object, along with
216 // the associated NetLog::Source. 195 // the associated NetLog::Source.
217 class RequestInfoParameters : public NetLog::EventParameters { 196 class RequestInfoParameters : public NetLog::EventParameters {
218 public: 197 public:
219 RequestInfoParameters(const HostResolver::RequestInfo& info, 198 RequestInfoParameters(const HostResolver::RequestInfo& info,
220 const NetLog::Source& source) 199 const NetLog::Source& source)
221 : info_(info), source_(source) {} 200 : info_(info), source_(source) {}
222 201
223 virtual Value* ToValue() const { 202 virtual Value* ToValue() const OVERRIDE {
224 DictionaryValue* dict = new DictionaryValue(); 203 DictionaryValue* dict = new DictionaryValue();
225 dict->SetString("host", info_.host_port_pair().ToString()); 204 dict->SetString("host", info_.host_port_pair().ToString());
226 dict->SetInteger("address_family", 205 dict->SetInteger("address_family",
227 static_cast<int>(info_.address_family())); 206 static_cast<int>(info_.address_family()));
228 dict->SetBoolean("allow_cached_response", info_.allow_cached_response()); 207 dict->SetBoolean("allow_cached_response", info_.allow_cached_response());
229 dict->SetBoolean("is_speculative", info_.is_speculative()); 208 dict->SetBoolean("is_speculative", info_.is_speculative());
230 dict->SetInteger("priority", info_.priority()); 209 dict->SetInteger("priority", info_.priority());
231 210
232 if (source_.is_valid()) 211 if (source_.is_valid())
233 dict->Set("source_dependency", source_.ToValue()); 212 dict->Set("source_dependency", source_.ToValue());
234 213
235 return dict; 214 return dict;
236 } 215 }
237 216
238 private: 217 private:
239 const HostResolver::RequestInfo info_; 218 const HostResolver::RequestInfo info_;
240 const NetLog::Source source_; 219 const NetLog::Source source_;
241 }; 220 };
242 221
243 // Parameters associated with the creation of a HostResolverImpl::Job. 222 // Parameters associated with the creation of a HostResolverImpl::Job
223 // or a HostResolverImpl::ProcTask.
244 class JobCreationParameters : public NetLog::EventParameters { 224 class JobCreationParameters : public NetLog::EventParameters {
245 public: 225 public:
246 JobCreationParameters(const std::string& host, const NetLog::Source& source) 226 JobCreationParameters(const std::string& host,
227 const NetLog::Source& source)
247 : host_(host), source_(source) {} 228 : host_(host), source_(source) {}
248 229
249 virtual Value* ToValue() const { 230 virtual Value* ToValue() const OVERRIDE {
250 DictionaryValue* dict = new DictionaryValue(); 231 DictionaryValue* dict = new DictionaryValue();
251 dict->SetString("host", host_); 232 dict->SetString("host", host_);
252 dict->Set("source_dependency", source_.ToValue()); 233 dict->Set("source_dependency", source_.ToValue());
253 return dict; 234 return dict;
254 } 235 }
255 236
256 private: 237 private:
257 const std::string host_; 238 const std::string host_;
258 const NetLog::Source source_; 239 const NetLog::Source source_;
259 }; 240 };
260 241
242 // Parameters of the HOST_RESOLVER_IMPL_JOB_ATTACH/DETACH event.
243 class JobAttachParameters : public NetLog::EventParameters {
244 public:
245 JobAttachParameters(const NetLog::Source& source,
246 RequestPriority priority)
247 : source_(source), priority_(priority) {}
248
249 virtual Value* ToValue() const OVERRIDE {
250 DictionaryValue* dict = new DictionaryValue();
251 dict->Set("source_dependency", source_.ToValue());
252 dict->SetInteger("priority", priority_);
253 return dict;
254 }
255
256 private:
257 const NetLog::Source source_;
258 const RequestPriority priority_;
259 };
260
261 // The logging routines are defined here because some requests are resolved
262 // without a Request object.
263
264 // Logs when a request has just been started.
265 void LogStartRequest(const BoundNetLog& source_net_log,
266 const BoundNetLog& request_net_log,
267 const HostResolver::RequestInfo& info) {
268 source_net_log.BeginEvent(
269 NetLog::TYPE_HOST_RESOLVER_IMPL,
270 make_scoped_refptr(new NetLogSourceParameter(
271 "source_dependency", request_net_log.source())));
272
273 request_net_log.BeginEvent(
274 NetLog::TYPE_HOST_RESOLVER_IMPL_REQUEST,
275 make_scoped_refptr(new RequestInfoParameters(
276 info, source_net_log.source())));
277 }
278
279 // Logs when a request has just completed (before its callback is run).
280 void LogFinishRequest(const BoundNetLog& source_net_log,
281 const BoundNetLog& request_net_log,
282 const HostResolver::RequestInfo& info,
283 int net_error,
284 int os_error) {
285 scoped_refptr<NetLog::EventParameters> params;
286 if (net_error != OK) {
287 params = new HostResolveFailedParams(0, net_error, os_error);
288 }
289
290 request_net_log.EndEvent(NetLog::TYPE_HOST_RESOLVER_IMPL_REQUEST, params);
291 source_net_log.EndEvent(NetLog::TYPE_HOST_RESOLVER_IMPL, NULL);
292 }
293
294 // Logs when a request has been cancelled.
295 void LogCancelRequest(const BoundNetLog& source_net_log,
296 const BoundNetLog& request_net_log,
297 const HostResolverImpl::RequestInfo& info) {
298 request_net_log.AddEvent(NetLog::TYPE_CANCELLED, NULL);
299 request_net_log.EndEvent(NetLog::TYPE_HOST_RESOLVER_IMPL_REQUEST, NULL);
300 source_net_log.EndEvent(NetLog::TYPE_HOST_RESOLVER_IMPL, NULL);
301 }
302
303 //-----------------------------------------------------------------------------
304
305 // Keeps track of the highest priority.
306 class PriorityTracker {
307 public:
308 PriorityTracker()
309 : highest_priority_(IDLE), total_count_(0) {
310 memset(counts_, 0, sizeof(counts_));
311 }
312
313 RequestPriority highest_priority() const {
314 return highest_priority_;
315 }
316
317 size_t total_count() const {
318 return total_count_;
319 }
320
321 // Returns true if priority changed.
mmenke 2012/01/26 16:54:10 Fix comment.
322 void Add(RequestPriority req_priority) {
323 ++total_count_;
324 ++counts_[req_priority];
325 if (highest_priority_ > req_priority)
326 highest_priority_ = req_priority;
327 }
328
329 // Returns true if priority changed.
mmenke 2012/01/26 16:54:10 Fix comment.
330 void Remove(RequestPriority req_priority) {
331 DCHECK_GT(total_count_, 0u);
332 DCHECK_GT(counts_[req_priority], 0u);
333 --total_count_;
334 --counts_[req_priority];
335 if ((counts_[req_priority] == 0u) && (highest_priority_ == req_priority)) {
mmenke 2012/01/26 16:54:10 This initial check doesn't gain us anything, since
mmenke 2012/01/27 04:12:37 Oops...that code is wrong. Anyways, seems like yo
szym 2012/01/27 04:58:12 You are correct. It saves only the assignment to |
336 for (size_t i = highest_priority_; i < NUM_PRIORITIES; ++i) {
337 if (counts_[i] > 0)
338 highest_priority_ = static_cast<RequestPriority>(i);
339 }
340 DCHECK_EQ(0u, total_count_);
mmenke 2012/01/26 16:54:10 This DCHECK is incorrect, since you don't have a r
szym 2012/01/27 04:58:12 Good catch. Need a test for the case the last Requ
341 // In absence of requests set default.
342 if (highest_priority_ != IDLE)
343 highest_priority_ = IDLE;
344 }
345 }
346
347 private:
348 RequestPriority highest_priority_;
349 size_t total_count_;
350 size_t counts_[NUM_PRIORITIES];
351 };
352
261 //----------------------------------------------------------------------------- 353 //-----------------------------------------------------------------------------
262 354
355 HostResolver* CreateHostResolver(size_t max_concurrent_resolves,
356 size_t max_retry_attempts,
357 bool use_cache,
358 NetLog* net_log) {
359 // Maximum of 8 concurrent resolver threads.
360 // Some routers (or resolvers) appear to start to provide host-not-found if
361 // too many simultaneous resolutions are pending. This number needs to be
362 // further optimized, but 8 is what FF currently does.
mmenke 2012/01/26 16:54:10 Does Firefox retry like we do, on different thread
szym 2012/01/27 04:58:12 This comment was moved without change, but you are
363 static const size_t kDefaultMaxJobs = 8u;
mmenke 2012/01/26 16:54:10 nit: I suggest you put this in an anonymous names
364
365 if (max_concurrent_resolves == HostResolver::kDefaultParallelism)
366 max_concurrent_resolves = kDefaultMaxJobs;
367
368 // TODO(szym): Add experiments with reserved slots for higher priority
369 // requests.
370
371 PrioritizedDispatcher::Limits limits(NUM_PRIORITIES, max_concurrent_resolves);
372
373 HostResolverImpl* resolver = new HostResolverImpl(
374 use_cache ? HostCache::CreateDefaultCache() : NULL,
375 limits,
376 HostResolverImpl::ProcTaskParams(NULL, max_retry_attempts),
377 net_log);
378
379 return resolver;
380 }
381
382 } // anonymous namespace
383
384 //-----------------------------------------------------------------------------
385
386 HostResolver* CreateSystemHostResolver(size_t max_concurrent_resolves,
387 size_t max_retry_attempts,
388 NetLog* net_log) {
389 return CreateHostResolver(max_concurrent_resolves,
390 max_retry_attempts,
391 true /* use_cache */,
392 net_log);
393 }
394
395 HostResolver* CreateNonCachingSystemHostResolver(size_t max_concurrent_resolves,
396 size_t max_retry_attempts,
397 NetLog* net_log) {
398 return CreateHostResolver(max_concurrent_resolves,
399 max_retry_attempts,
400 false /* use_cache */,
401 net_log);
402 }
403
404 //-----------------------------------------------------------------------------
405
406 // Holds the data for a request that could not be completed synchronously.
407 // It is owned by a Job. Canceled Requests are only marked as canceled rather
408 // than removed from the Job's |requests_| list.
263 class HostResolverImpl::Request { 409 class HostResolverImpl::Request {
264 public: 410 public:
265 Request(const BoundNetLog& source_net_log, 411 Request(const BoundNetLog& source_net_log,
266 const BoundNetLog& request_net_log, 412 const BoundNetLog& request_net_log,
267 const RequestInfo& info, 413 const RequestInfo& info,
268 const CompletionCallback& callback, 414 const CompletionCallback& callback,
269 AddressList* addresses) 415 AddressList* addresses)
270 : source_net_log_(source_net_log), 416 : source_net_log_(source_net_log),
271 request_net_log_(request_net_log), 417 request_net_log_(request_net_log),
272 info_(info), 418 info_(info),
273 job_(NULL), 419 job_(NULL),
274 callback_(callback), 420 callback_(callback),
275 addresses_(addresses) { 421 addresses_(addresses) {
276 } 422 }
277 423
278 // Mark the request as cancelled. 424 // Mark the request as canceled.
279 void MarkAsCancelled() { 425 void MarkAsCanceled() {
280 job_ = NULL; 426 job_ = NULL;
281 addresses_ = NULL; 427 addresses_ = NULL;
282 callback_.Reset(); 428 callback_.Reset();
283 } 429 }
284 430
285 bool was_cancelled() const { 431 bool was_canceled() const {
286 return callback_.is_null(); 432 return callback_.is_null();
287 } 433 }
288 434
289 void set_job(Job* job) { 435 void set_job(Job* job) {
290 DCHECK(job != NULL); 436 DCHECK(job);
291 // Identify which job the request is waiting on. 437 // Identify which job the request is waiting on.
292 job_ = job; 438 job_ = job;
293 } 439 }
294 440
441 // Prepare final AddressList and call completion callback.
295 void OnComplete(int error, const AddressList& addrlist) { 442 void OnComplete(int error, const AddressList& addrlist) {
296 if (error == OK) 443 if (error == OK)
297 *addresses_ = CreateAddressListUsingPort(addrlist, port()); 444 *addresses_ = CreateAddressListUsingPort(addrlist, info_.port());
298 CompletionCallback callback = callback_; 445 CompletionCallback callback = callback_;
299 MarkAsCancelled(); 446 MarkAsCanceled();
300 callback.Run(error); 447 callback.Run(error);
301 } 448 }
302 449
303 int port() const {
304 return info_.port();
305 }
306
307 Job* job() const { 450 Job* job() const {
308 return job_; 451 return job_;
309 } 452 }
310 453
454 // NetLog for the source, passed in HostResolver::Resolve.
311 const BoundNetLog& source_net_log() { 455 const BoundNetLog& source_net_log() {
312 return source_net_log_; 456 return source_net_log_;
313 } 457 }
314 458
459 // NetLog for this request.
315 const BoundNetLog& request_net_log() { 460 const BoundNetLog& request_net_log() {
316 return request_net_log_; 461 return request_net_log_;
317 } 462 }
318 463
319 const RequestInfo& info() const { 464 const RequestInfo& info() const {
320 return info_; 465 return info_;
321 } 466 }
322 467
323 private: 468 private:
324 BoundNetLog source_net_log_; 469 BoundNetLog source_net_log_;
325 BoundNetLog request_net_log_; 470 BoundNetLog request_net_log_;
326 471
327 // The request info that started the request. 472 // The request info that started the request.
328 RequestInfo info_; 473 RequestInfo info_;
329 474
330 // The resolve job (running in worker pool) that this request is dependent on. 475 // The resolve job that this request is dependent on.
331 Job* job_; 476 Job* job_;
332 477
333 // The user's callback to invoke when the request completes. 478 // The user's callback to invoke when the request completes.
334 CompletionCallback callback_; 479 CompletionCallback callback_;
335 480
336 // The address list to save result into. 481 // The address list to save result into.
337 AddressList* addresses_; 482 AddressList* addresses_;
338 483
339 DISALLOW_COPY_AND_ASSIGN(Request); 484 DISALLOW_COPY_AND_ASSIGN(Request);
340 }; 485 };
341 486
342 //------------------------------------------------------------------------------ 487 //------------------------------------------------------------------------------
343 488
344 // Provide a common macro to simplify code and readability. We must use a 489 // Provide a common macro to simplify code and readability. We must use a
345 // macros as the underlying HISTOGRAM macro creates static varibles. 490 // macros as the underlying HISTOGRAM macro creates static varibles.
346 #define DNS_HISTOGRAM(name, time) UMA_HISTOGRAM_CUSTOM_TIMES(name, time, \ 491 #define DNS_HISTOGRAM(name, time) UMA_HISTOGRAM_CUSTOM_TIMES(name, time, \
347 base::TimeDelta::FromMicroseconds(1), base::TimeDelta::FromHours(1), 100) 492 base::TimeDelta::FromMicroseconds(1), base::TimeDelta::FromHours(1), 100)
348 493
349 // This class represents a request to the worker pool for a "getaddrinfo()" 494 // Calls HostResolverProc on the WorkerPool. Performs retries if necessary.
350 // call. 495 //
351 class HostResolverImpl::Job 496 // Whenever we try to resolve the host, we post a delayed task to check if host
352 : public base::RefCountedThreadSafe<HostResolverImpl::Job> { 497 // resolution (OnLookupComplete) is completed or not. If the original attempt
498 // hasn't completed, then we start another attempt for host resolution. We take
499 // the results from the first attempt that finishes and ignore the results from
500 // all other attempts.
501 //
502 // TODO(szym): Move to separate source file for testing and mocking.
503 //
504 class HostResolverImpl::ProcTask
505 : public base::RefCountedThreadSafe<HostResolverImpl::ProcTask> {
353 public: 506 public:
354 Job(int id, 507 typedef base::Callback<void(int, int, const AddressList&)> Callback;
355 HostResolverImpl* resolver,
356 const Key& key,
357 const BoundNetLog& source_net_log,
358 NetLog* net_log)
359 : id_(id),
360 key_(key),
361 resolver_(resolver),
362 origin_loop_(base::MessageLoopProxy::current()),
363 resolver_proc_(resolver->effective_resolver_proc()),
364 unresponsive_delay_(resolver->unresponsive_delay()),
365 attempt_number_(0),
366 completed_attempt_number_(0),
367 completed_attempt_error_(ERR_UNEXPECTED),
368 had_non_speculative_request_(false),
369 net_log_(BoundNetLog::Make(net_log,
370 NetLog::SOURCE_HOST_RESOLVER_IMPL_JOB)) {
371 DCHECK(resolver);
372 net_log_.BeginEvent(
373 NetLog::TYPE_HOST_RESOLVER_IMPL_JOB,
374 make_scoped_refptr(
375 new JobCreationParameters(key.hostname, source_net_log.source())));
376 }
377 508
378 // Attaches a request to this job. The job takes ownership of |req| and will 509 ProcTask(const Key& key,
379 // take care to delete it. 510 const ProcTaskParams& params,
380 void AddRequest(Request* req) { 511 const Callback& callback,
381 DCHECK(origin_loop_->BelongsToCurrentThread()); 512 const BoundNetLog& job_net_log)
382 req->request_net_log().BeginEvent( 513 : key_(key),
383 NetLog::TYPE_HOST_RESOLVER_IMPL_JOB_ATTACH, 514 params_(params),
384 make_scoped_refptr(new NetLogSourceParameter( 515 callback_(callback),
385 "source_dependency", net_log_.source()))); 516 origin_loop_(base::MessageLoopProxy::current()),
517 attempt_number_(0),
518 completed_attempt_number_(0),
519 completed_attempt_error_(ERR_UNEXPECTED),
520 had_non_speculative_request_(false),
521 net_log_(BoundNetLog::Make(
522 job_net_log.net_log(),
523 NetLog::SOURCE_HOST_RESOLVER_IMPL_PROC_TASK)) {
524 if (!params_.resolver_proc)
525 params_.resolver_proc = HostResolverProc::GetDefault();
526 // If default is unset, use the system proc.
527 if (!params_.resolver_proc)
528 params_.resolver_proc = new CallSystemHostResolverProc();
386 529
387 req->set_job(this); 530 job_net_log.AddEvent(NetLog::TYPE_HOST_RESOLVER_IMPL_PROC_TASK,
mmenke 2012/01/26 16:54:10 Elsewhere we generally use begin/end events for th
szym 2012/01/27 04:58:12 What concerned me was the possibility of overlap b
mmenke 2012/01/27 05:08:44 Even if we do both at once, it may still might act
mmenke 2012/01/27 05:11:32 Sorry, that should be it draws attention to the be
388 requests_.push_back(req); 531 new NetLogSourceParameter("source_dependency",
532 net_log_.source()));
389 533
390 if (!req->info().is_speculative()) 534 net_log_.BeginEvent(NetLog::TYPE_HOST_RESOLVER_IMPL_PROC_TASK,
391 had_non_speculative_request_ = true; 535 new JobCreationParameters(key_.hostname,
536 job_net_log.source()));
392 } 537 }
393 538
394 void Start() { 539 void Start() {
395 DCHECK(origin_loop_->BelongsToCurrentThread()); 540 DCHECK(origin_loop_->BelongsToCurrentThread());
396 StartLookupAttempt(); 541 StartLookupAttempt();
397 } 542 }
398 543
544 // Cancels this ProcTask. It will be orphaned. Any outstanding resolve
545 // attempts running on worker threads will continue running. Only once all the
546 // attempts complete will the final reference to this ProcTask be released.
547 void Cancel() {
548 DCHECK(origin_loop_->BelongsToCurrentThread());
549
550 if (was_canceled())
551 return;
552
553 net_log_.AddEvent(NetLog::TYPE_CANCELLED, NULL);
554
555 callback_.Reset();
556
557 net_log_.EndEvent(NetLog::TYPE_HOST_RESOLVER_IMPL_PROC_TASK, NULL);
558 }
559
560 void set_had_non_speculative_request() {
561 DCHECK(origin_loop_->BelongsToCurrentThread());
562 had_non_speculative_request_ = true;
563 }
564
565 bool was_canceled() const {
566 DCHECK(origin_loop_->BelongsToCurrentThread());
567 return callback_.is_null();
568 }
569
570 bool was_completed() const {
571 DCHECK(origin_loop_->BelongsToCurrentThread());
572 return completed_attempt_number_ > 0;
573 }
574
575 private:
399 void StartLookupAttempt() { 576 void StartLookupAttempt() {
400 DCHECK(origin_loop_->BelongsToCurrentThread()); 577 DCHECK(origin_loop_->BelongsToCurrentThread());
401 base::TimeTicks start_time = base::TimeTicks::Now(); 578 base::TimeTicks start_time = base::TimeTicks::Now();
402 ++attempt_number_; 579 ++attempt_number_;
403 // Dispatch the lookup attempt to a worker thread. 580 // Dispatch the lookup attempt to a worker thread.
404 if (!base::WorkerPool::PostTask( 581 if (!base::WorkerPool::PostTask(
405 FROM_HERE, 582 FROM_HERE,
406 base::Bind(&Job::DoLookup, this, start_time, attempt_number_), 583 base::Bind(&ProcTask::DoLookup, this, start_time, attempt_number_),
407 true)) { 584 true)) {
408 NOTREACHED(); 585 NOTREACHED();
409 586
410 // Since we could be running within Resolve() right now, we can't just 587 // Since we could be running within Resolve() right now, we can't just
411 // call OnLookupComplete(). Instead we must wait until Resolve() has 588 // call OnLookupComplete(). Instead we must wait until Resolve() has
412 // returned (IO_PENDING). 589 // returned (IO_PENDING).
413 origin_loop_->PostTask( 590 origin_loop_->PostTask(
414 FROM_HERE, 591 FROM_HERE,
415 base::Bind(&Job::OnLookupComplete, this, AddressList(), 592 base::Bind(&ProcTask::OnLookupComplete, this, AddressList(),
416 start_time, attempt_number_, ERR_UNEXPECTED, 0)); 593 start_time, attempt_number_, ERR_UNEXPECTED, 0));
417 return; 594 return;
418 } 595 }
419 596
420 net_log_.AddEvent( 597 net_log_.AddEvent(
421 NetLog::TYPE_HOST_RESOLVER_IMPL_ATTEMPT_STARTED, 598 NetLog::TYPE_HOST_RESOLVER_IMPL_ATTEMPT_STARTED,
422 make_scoped_refptr(new NetLogIntegerParameter( 599 make_scoped_refptr(new NetLogIntegerParameter(
423 "attempt_number", attempt_number_))); 600 "attempt_number", attempt_number_)));
424 601
425 // Post a task to check if we get the results within a given time. 602 // Post a task to check if we get the results within a given time.
426 // OnCheckForComplete has the potential for starting a new attempt on a 603 // OnCheckForComplete has the potential for starting a new attempt on a
427 // different worker thread if none of our outstanding attempts have 604 // different worker thread if none of our outstanding attempts have
428 // completed yet. 605 // completed yet.
429 if (attempt_number_ <= resolver_->max_retry_attempts()) { 606 if (attempt_number_ <= params_.max_retry_attempts) {
430 origin_loop_->PostDelayedTask( 607 origin_loop_->PostDelayedTask(
431 FROM_HERE, 608 FROM_HERE,
432 base::Bind(&Job::OnCheckForComplete, this), 609 base::Bind(&ProcTask::OnCheckForComplete, this),
433 unresponsive_delay_.InMilliseconds()); 610 params_.unresponsive_delay.InMilliseconds());
434 } 611 }
435 } 612 }
436 613
437 // Cancels the current job. The Job will be orphaned. Any outstanding resolve
438 // attempts running on worker threads will continue running. Only once all the
439 // attempts complete will the final reference to this Job be released.
440 void Cancel() {
441 DCHECK(origin_loop_->BelongsToCurrentThread());
442 net_log_.AddEvent(NetLog::TYPE_CANCELLED, NULL);
443
444 HostResolver* resolver = resolver_;
445 resolver_ = NULL;
446
447 // End here to prevent issues when a Job outlives the HostResolver that
448 // spawned it.
449 net_log_.EndEvent(NetLog::TYPE_HOST_RESOLVER_IMPL_JOB, NULL);
450
451 // We will call HostResolverImpl::CancelRequest(Request*) on each one
452 // in order to notify any observers.
453 for (RequestsList::const_iterator it = requests_.begin();
454 it != requests_.end(); ++it) {
455 HostResolverImpl::Request* req = *it;
456 if (!req->was_cancelled())
457 resolver->CancelRequest(req);
458 }
459 }
460
461 bool was_cancelled() const {
462 DCHECK(origin_loop_->BelongsToCurrentThread());
463 return resolver_ == NULL;
464 }
465
466 bool was_completed() const {
467 DCHECK(origin_loop_->BelongsToCurrentThread());
468 return completed_attempt_number_ > 0;
469 }
470
471 const Key& key() const {
472 DCHECK(origin_loop_->BelongsToCurrentThread());
473 return key_;
474 }
475
476 int id() const {
477 DCHECK(origin_loop_->BelongsToCurrentThread());
478 return id_;
479 }
480
481 const RequestsList& requests() const {
482 DCHECK(origin_loop_->BelongsToCurrentThread());
483 return requests_;
484 }
485
486 // Returns the first request attached to the job.
487 const Request* initial_request() const {
488 DCHECK(origin_loop_->BelongsToCurrentThread());
489 DCHECK(!requests_.empty());
490 return requests_[0];
491 }
492
493 // Returns true if |req_info| can be fulfilled by this job.
494 bool CanServiceRequest(const RequestInfo& req_info) const {
495 DCHECK(origin_loop_->BelongsToCurrentThread());
496 return key_ == resolver_->GetEffectiveKeyForRequest(req_info);
497 }
498
499 private:
500 friend class base::RefCountedThreadSafe<HostResolverImpl::Job>;
501
502 ~Job() {
503 // Free the requests attached to this job.
504 STLDeleteElements(&requests_);
505 }
506
507 // WARNING: This code runs inside a worker pool. The shutdown code cannot 614 // WARNING: This code runs inside a worker pool. The shutdown code cannot
508 // wait for it to finish, so we must be very careful here about using other 615 // wait for it to finish, so we must be very careful here about using other
509 // objects (like MessageLoops, Singletons, etc). During shutdown these objects 616 // objects (like MessageLoops, Singletons, etc). During shutdown these objects
510 // may no longer exist. Multiple DoLookups() could be running in parallel, so 617 // may no longer exist. Multiple DoLookups() could be running in parallel, so
511 // any state inside of |this| must not mutate . 618 // any state inside of |this| must not mutate .
512 void DoLookup(const base::TimeTicks& start_time, 619 void DoLookup(const base::TimeTicks& start_time,
513 const uint32 attempt_number) { 620 const uint32 attempt_number) {
514 AddressList results; 621 AddressList results;
515 int os_error = 0; 622 int os_error = 0;
516 // Running on the worker thread 623 // Running on the worker thread
517 int error = ResolveAddrInfo(resolver_proc_, 624
518 key_.hostname, 625 int error = params_.resolver_proc->Resolve(key_.hostname,
519 key_.address_family, 626 key_.address_family,
520 key_.host_resolver_flags, 627 key_.host_resolver_flags,
521 &results, 628 &results,
522 &os_error); 629 &os_error);
523 630
524 origin_loop_->PostTask( 631 origin_loop_->PostTask(
525 FROM_HERE, 632 FROM_HERE,
526 base::Bind(&Job::OnLookupComplete, this, results, start_time, 633 base::Bind(&ProcTask::OnLookupComplete, this, results, start_time,
527 attempt_number, error, os_error)); 634 attempt_number, error, os_error));
528 } 635 }
529 636
530 // Callback to see if DoLookup() has finished or not (runs on origin thread). 637 // Callback to see if DoLookup() has finished or not (runs on origin thread).
531 void OnCheckForComplete() { 638 void OnCheckForComplete() {
mmenke 2012/01/26 16:54:10 nit: While you're here, maybe rename this functio
532 DCHECK(origin_loop_->BelongsToCurrentThread()); 639 DCHECK(origin_loop_->BelongsToCurrentThread());
533 640
534 if (was_completed() || was_cancelled()) 641 if (was_completed() || was_canceled())
535 return; 642 return;
536 643
537 DCHECK(resolver_); 644 params_.unresponsive_delay *= params_.retry_factor;
538 unresponsive_delay_ *= resolver_->retry_factor();
539 StartLookupAttempt(); 645 StartLookupAttempt();
540 } 646 }
541 647
542 // Callback for when DoLookup() completes (runs on origin thread). 648 // Callback for when DoLookup() completes (runs on origin thread).
543 void OnLookupComplete(const AddressList& results, 649 void OnLookupComplete(const AddressList& results,
544 const base::TimeTicks& start_time, 650 const base::TimeTicks& start_time,
545 const uint32 attempt_number, 651 const uint32 attempt_number,
546 int error, 652 int error,
547 const int os_error) { 653 const int os_error) {
548 DCHECK(origin_loop_->BelongsToCurrentThread()); 654 DCHECK(origin_loop_->BelongsToCurrentThread());
549 DCHECK(error || results.head()); 655 DCHECK(error || results.head());
550 656
551 bool was_retry_attempt = attempt_number > 1; 657 bool was_retry_attempt = attempt_number > 1;
552 658
553 if (!was_cancelled()) { 659 if (!was_canceled()) {
554 scoped_refptr<NetLog::EventParameters> params; 660 scoped_refptr<NetLog::EventParameters> params;
555 if (error != OK) { 661 if (error != OK) {
556 params = new HostResolveFailedParams(attempt_number, error, os_error); 662 params = new HostResolveFailedParams(attempt_number, error, os_error);
557 } else { 663 } else {
558 params = new NetLogIntegerParameter("attempt_number", attempt_number_); 664 params = new NetLogIntegerParameter("attempt_number", attempt_number_);
559 } 665 }
560 net_log_.AddEvent(NetLog::TYPE_HOST_RESOLVER_IMPL_ATTEMPT_FINISHED, 666 net_log_.AddEvent(NetLog::TYPE_HOST_RESOLVER_IMPL_ATTEMPT_FINISHED,
561 params); 667 params);
562 668
563 // If host is already resolved, then record data and return. 669 // If host is already resolved, then record data and return.
(...skipping 13 matching lines...) Expand all
577 completed_attempt_number_ = attempt_number; 683 completed_attempt_number_ = attempt_number;
578 completed_attempt_error_ = error; 684 completed_attempt_error_ = error;
579 } 685 }
580 686
581 // Ideally the following code would be part of host_resolver_proc.cc, 687 // Ideally the following code would be part of host_resolver_proc.cc,
582 // however it isn't safe to call NetworkChangeNotifier from worker 688 // however it isn't safe to call NetworkChangeNotifier from worker
583 // threads. So we do it here on the IO thread instead. 689 // threads. So we do it here on the IO thread instead.
584 if (error != OK && NetworkChangeNotifier::IsOffline()) 690 if (error != OK && NetworkChangeNotifier::IsOffline())
585 error = ERR_INTERNET_DISCONNECTED; 691 error = ERR_INTERNET_DISCONNECTED;
586 692
587 // We will record data for the first attempt. Don't contaminate with retry 693 // We will record data for the first attempt. Don't contaminate with retry
mmenke 2012/01/26 16:54:10 Know this is old code, but I'd suggest a if (!was_
szym 2012/01/27 04:58:12 I feel this code should be simplified even further
588 // attempt's data. 694 // attempt's data.
589 if (!was_retry_attempt) 695 if (!was_retry_attempt)
590 RecordPerformanceHistograms(start_time, error, os_error); 696 RecordPerformanceHistograms(start_time, error, os_error);
591 697
592 RecordAttemptHistograms(start_time, attempt_number, error, os_error); 698 RecordAttemptHistograms(start_time, attempt_number, error, os_error);
593 699
594 if (was_cancelled()) 700 if (was_canceled())
595 return; 701 return;
596 702
597 if (was_retry_attempt) { 703 if (was_retry_attempt) {
598 // If retry attempt finishes before 1st attempt, then get stats on how 704 // If retry attempt finishes before 1st attempt, then get stats on how
599 // much time is saved by having spawned an extra attempt. 705 // much time is saved by having spawned an extra attempt.
600 retry_attempt_finished_time_ = base::TimeTicks::Now(); 706 retry_attempt_finished_time_ = base::TimeTicks::Now();
601 } 707 }
602 708
603 scoped_refptr<NetLog::EventParameters> params; 709 scoped_refptr<NetLog::EventParameters> params;
604 if (error != OK) { 710 if (error != OK) {
605 params = new HostResolveFailedParams(0, error, os_error); 711 params = new HostResolveFailedParams(0, error, os_error);
606 } else { 712 } else {
607 params = new AddressListNetLogParam(results_); 713 params = new AddressListNetLogParam(results_);
608 } 714 }
609 715
610 // End here to prevent issues when a Job outlives the HostResolver that 716 net_log_.EndEvent(NetLog::TYPE_HOST_RESOLVER_IMPL_PROC_TASK, params);
611 // spawned it.
612 net_log_.EndEvent(NetLog::TYPE_HOST_RESOLVER_IMPL_JOB, params);
613 717
614 DCHECK(!requests_.empty()); 718 callback_.Run(error, os_error, results_);
615
616 // Use the port number of the first request.
617 if (error == OK)
618 MutableSetPort(requests_[0]->port(), &results_);
619
620 resolver_->OnJobComplete(this, error, os_error, results_);
621 } 719 }
622 720
623 void RecordPerformanceHistograms(const base::TimeTicks& start_time, 721 void RecordPerformanceHistograms(const base::TimeTicks& start_time,
624 const int error, 722 const int error,
625 const int os_error) const { 723 const int os_error) const {
626 DCHECK(origin_loop_->BelongsToCurrentThread()); 724 DCHECK(origin_loop_->BelongsToCurrentThread());
627 enum Category { // Used in HISTOGRAM_ENUMERATION. 725 enum Category { // Used in HISTOGRAM_ENUMERATION.
628 RESOLVE_SUCCESS, 726 RESOLVE_SUCCESS,
629 RESOLVE_FAIL, 727 RESOLVE_FAIL,
630 RESOLVE_SPECULATIVE_SUCCESS, 728 RESOLVE_SPECULATIVE_SUCCESS,
(...skipping 75 matching lines...) Expand 10 before | Expand all | Expand 10 after
706 DNS_HISTOGRAM(base::FieldTrial::MakeName("DNS.ResolveSuccess", 804 DNS_HISTOGRAM(base::FieldTrial::MakeName("DNS.ResolveSuccess",
707 "DnsParallelism"), duration); 805 "DnsParallelism"), duration);
708 } 806 }
709 } 807 }
710 } 808 }
711 809
712 void RecordAttemptHistograms(const base::TimeTicks& start_time, 810 void RecordAttemptHistograms(const base::TimeTicks& start_time,
713 const uint32 attempt_number, 811 const uint32 attempt_number,
714 const int error, 812 const int error,
715 const int os_error) const { 813 const int os_error) const {
814 DCHECK(origin_loop_->BelongsToCurrentThread());
716 bool first_attempt_to_complete = 815 bool first_attempt_to_complete =
717 completed_attempt_number_ == attempt_number; 816 completed_attempt_number_ == attempt_number;
718 bool is_first_attempt = (attempt_number == 1); 817 bool is_first_attempt = (attempt_number == 1);
719 818
720 if (first_attempt_to_complete) { 819 if (first_attempt_to_complete) {
721 // If this was first attempt to complete, then record the resolution 820 // If this was first attempt to complete, then record the resolution
722 // status of the attempt. 821 // status of the attempt.
723 if (completed_attempt_error_ == OK) { 822 if (completed_attempt_error_ == OK) {
724 UMA_HISTOGRAM_ENUMERATION( 823 UMA_HISTOGRAM_ENUMERATION(
725 "DNS.AttemptFirstSuccess", attempt_number, 100); 824 "DNS.AttemptFirstSuccess", attempt_number, 100);
726 } else { 825 } else {
727 UMA_HISTOGRAM_ENUMERATION( 826 UMA_HISTOGRAM_ENUMERATION(
728 "DNS.AttemptFirstFailure", attempt_number, 100); 827 "DNS.AttemptFirstFailure", attempt_number, 100);
729 } 828 }
730 } 829 }
731 830
732 if (error == OK) 831 if (error == OK)
733 UMA_HISTOGRAM_ENUMERATION("DNS.AttemptSuccess", attempt_number, 100); 832 UMA_HISTOGRAM_ENUMERATION("DNS.AttemptSuccess", attempt_number, 100);
734 else 833 else
735 UMA_HISTOGRAM_ENUMERATION("DNS.AttemptFailure", attempt_number, 100); 834 UMA_HISTOGRAM_ENUMERATION("DNS.AttemptFailure", attempt_number, 100);
736 835
737 // If first attempt didn't finish before retry attempt, then calculate stats 836 // If first attempt didn't finish before retry attempt, then calculate stats
738 // on how much time is saved by having spawned an extra attempt. 837 // on how much time is saved by having spawned an extra attempt.
739 if (!first_attempt_to_complete && is_first_attempt && !was_cancelled()) { 838 if (!first_attempt_to_complete && is_first_attempt && !was_canceled()) {
740 DNS_HISTOGRAM("DNS.AttemptTimeSavedByRetry", 839 DNS_HISTOGRAM("DNS.AttemptTimeSavedByRetry",
741 base::TimeTicks::Now() - retry_attempt_finished_time_); 840 base::TimeTicks::Now() - retry_attempt_finished_time_);
742 } 841 }
743 842
744 if (was_cancelled() || !first_attempt_to_complete) { 843 if (was_canceled() || !first_attempt_to_complete) {
745 // Count those attempts which completed after the job was already canceled 844 // Count those attempts which completed after the job was already canceled
746 // OR after the job was already completed by an earlier attempt (so in 845 // OR after the job was already completed by an earlier attempt (so in
747 // effect). 846 // effect).
748 UMA_HISTOGRAM_ENUMERATION("DNS.AttemptDiscarded", attempt_number, 100); 847 UMA_HISTOGRAM_ENUMERATION("DNS.AttemptDiscarded", attempt_number, 100);
749 848
750 // Record if job is cancelled. 849 // Record if job is canceled.
751 if (was_cancelled()) 850 if (was_canceled())
752 UMA_HISTOGRAM_ENUMERATION("DNS.AttemptCancelled", attempt_number, 100); 851 UMA_HISTOGRAM_ENUMERATION("DNS.AttemptCancelled", attempt_number, 100);
753 } 852 }
754 853
755 base::TimeDelta duration = base::TimeTicks::Now() - start_time; 854 base::TimeDelta duration = base::TimeTicks::Now() - start_time;
756 if (error == OK) 855 if (error == OK)
757 DNS_HISTOGRAM("DNS.AttemptSuccessDuration", duration); 856 DNS_HISTOGRAM("DNS.AttemptSuccessDuration", duration);
758 else 857 else
759 DNS_HISTOGRAM("DNS.AttemptFailDuration", duration); 858 DNS_HISTOGRAM("DNS.AttemptFailDuration", duration);
760 } 859 }
761 860
762 // Immutable. Can be read from either thread,
763 const int id_;
764
765 // Set on the origin thread, read on the worker thread. 861 // Set on the origin thread, read on the worker thread.
766 Key key_; 862 Key key_;
767 863
768 // Only used on the origin thread (where Resolve was called). 864 // Holds an owning reference to the HostResolverProc that we are going to use.
769 HostResolverImpl* resolver_; 865 // This may not be the current resolver procedure by the time we call
770 RequestsList requests_; // The requests waiting on this job. 866 // ResolveAddrInfo, but that's OK... we'll use it anyways, and the owning
867 // reference ensures that it remains valid until we are done.
868 ProcTaskParams params_;
869
870 // The listener to the results of this ProcTask.
871 Callback callback_;
771 872
772 // Used to post ourselves onto the origin thread. 873 // Used to post ourselves onto the origin thread.
773 scoped_refptr<base::MessageLoopProxy> origin_loop_; 874 scoped_refptr<base::MessageLoopProxy> origin_loop_;
774 875
775 // Hold an owning reference to the HostResolverProc that we are going to use.
776 // This may not be the current resolver procedure by the time we call
777 // ResolveAddrInfo, but that's OK... we'll use it anyways, and the owning
778 // reference ensures that it remains valid until we are done.
779 scoped_refptr<HostResolverProc> resolver_proc_;
780
781 // The amount of time after starting a resolution attempt until deciding to
782 // retry.
783 base::TimeDelta unresponsive_delay_;
784
785 // Keeps track of the number of attempts we have made so far to resolve the 876 // Keeps track of the number of attempts we have made so far to resolve the
786 // host. Whenever we start an attempt to resolve the host, we increase this 877 // host. Whenever we start an attempt to resolve the host, we increase this
787 // number. 878 // number.
788 uint32 attempt_number_; 879 uint32 attempt_number_;
789 880
790 // The index of the attempt which finished first (or 0 if the job is still in 881 // The index of the attempt which finished first (or 0 if the job is still in
791 // progress). 882 // progress).
792 uint32 completed_attempt_number_; 883 uint32 completed_attempt_number_;
793 884
794 // The result (a net error code) from the first attempt to complete. 885 // The result (a net error code) from the first attempt to complete.
795 int completed_attempt_error_; 886 int completed_attempt_error_;
796 887
797 // The time when retry attempt was finished. 888 // The time when retry attempt was finished.
798 base::TimeTicks retry_attempt_finished_time_; 889 base::TimeTicks retry_attempt_finished_time_;
799 890
800 // True if a non-speculative request was ever attached to this job 891 // True if a non-speculative request was ever attached to this job
801 // (regardless of whether or not it was later cancelled. 892 // (regardless of whether or not it was later canceled.
802 // This boolean is used for histogramming the duration of jobs used to 893 // This boolean is used for histogramming the duration of jobs used to
803 // service non-speculative requests. 894 // service non-speculative requests.
804 bool had_non_speculative_request_; 895 bool had_non_speculative_request_;
805 896
806 AddressList results_; 897 AddressList results_;
807 898
808 BoundNetLog net_log_; 899 BoundNetLog net_log_;
809 900
810 DISALLOW_COPY_AND_ASSIGN(Job); 901 DISALLOW_COPY_AND_ASSIGN(ProcTask);
811 }; 902 };
812 903
813 //----------------------------------------------------------------------------- 904 //-----------------------------------------------------------------------------
814 905
815 // This class represents a request to the worker pool for a "probe for IPv6 906 // Represents a request to the worker pool for a "probe for IPv6 support" call.
816 // support" call.
817 class HostResolverImpl::IPv6ProbeJob 907 class HostResolverImpl::IPv6ProbeJob
818 : public base::RefCountedThreadSafe<HostResolverImpl::IPv6ProbeJob> { 908 : public base::RefCountedThreadSafe<HostResolverImpl::IPv6ProbeJob> {
819 public: 909 public:
820 explicit IPv6ProbeJob(HostResolverImpl* resolver) 910 explicit IPv6ProbeJob(HostResolverImpl* resolver)
821 : resolver_(resolver), 911 : resolver_(resolver),
822 origin_loop_(base::MessageLoopProxy::current()) { 912 origin_loop_(base::MessageLoopProxy::current()) {
823 DCHECK(resolver); 913 DCHECK(resolver);
824 } 914 }
825 915
826 void Start() { 916 void Start() {
827 DCHECK(origin_loop_->BelongsToCurrentThread()); 917 DCHECK(origin_loop_->BelongsToCurrentThread());
828 if (was_cancelled()) 918 if (was_canceled())
829 return; 919 return;
830 const bool kIsSlow = true; 920 const bool kIsSlow = true;
831 base::WorkerPool::PostTask( 921 base::WorkerPool::PostTask(
832 FROM_HERE, base::Bind(&IPv6ProbeJob::DoProbe, this), kIsSlow); 922 FROM_HERE, base::Bind(&IPv6ProbeJob::DoProbe, this), kIsSlow);
833 } 923 }
834 924
835 // Cancels the current job. 925 // Cancels the current job.
836 void Cancel() { 926 void Cancel() {
837 DCHECK(origin_loop_->BelongsToCurrentThread()); 927 DCHECK(origin_loop_->BelongsToCurrentThread());
838 if (was_cancelled()) 928 if (was_canceled())
839 return; 929 return;
840 resolver_ = NULL; // Read/write ONLY on origin thread. 930 resolver_ = NULL; // Read/write ONLY on origin thread.
841 } 931 }
842 932
843 private: 933 private:
844 friend class base::RefCountedThreadSafe<HostResolverImpl::IPv6ProbeJob>; 934 friend class base::RefCountedThreadSafe<HostResolverImpl::IPv6ProbeJob>;
845 935
846 ~IPv6ProbeJob() { 936 ~IPv6ProbeJob() {
847 } 937 }
848 938
849 bool was_cancelled() const { 939 bool was_canceled() const {
850 DCHECK(origin_loop_->BelongsToCurrentThread()); 940 DCHECK(origin_loop_->BelongsToCurrentThread());
851 return !resolver_; 941 return !resolver_;
852 } 942 }
853 943
854 // Run on worker thread. 944 // Run on worker thread.
855 void DoProbe() { 945 void DoProbe() {
856 // Do actual testing on this thread, as it takes 40-100ms. 946 // Do actual testing on this thread, as it takes 40-100ms.
857 AddressFamily family = IPv6Supported() ? ADDRESS_FAMILY_UNSPECIFIED 947 AddressFamily family = IPv6Supported() ? ADDRESS_FAMILY_UNSPECIFIED
858 : ADDRESS_FAMILY_IPV4; 948 : ADDRESS_FAMILY_IPV4;
859 949
860 origin_loop_->PostTask( 950 origin_loop_->PostTask(
861 FROM_HERE, 951 FROM_HERE,
862 base::Bind(&IPv6ProbeJob::OnProbeComplete, this, family)); 952 base::Bind(&IPv6ProbeJob::OnProbeComplete, this, family));
863 } 953 }
864 954
865 // Callback for when DoProbe() completes. 955 // Callback for when DoProbe() completes.
866 void OnProbeComplete(AddressFamily address_family) { 956 void OnProbeComplete(AddressFamily address_family) {
867 DCHECK(origin_loop_->BelongsToCurrentThread()); 957 DCHECK(origin_loop_->BelongsToCurrentThread());
868 if (was_cancelled()) 958 if (was_canceled())
869 return; 959 return;
870 resolver_->IPv6ProbeSetDefaultAddressFamily(address_family); 960 resolver_->IPv6ProbeSetDefaultAddressFamily(address_family);
871 } 961 }
872 962
873 // Used/set only on origin thread. 963 // Used/set only on origin thread.
874 HostResolverImpl* resolver_; 964 HostResolverImpl* resolver_;
875 965
876 // Used to post ourselves onto the origin thread. 966 // Used to post ourselves onto the origin thread.
877 scoped_refptr<base::MessageLoopProxy> origin_loop_; 967 scoped_refptr<base::MessageLoopProxy> origin_loop_;
878 968
879 DISALLOW_COPY_AND_ASSIGN(IPv6ProbeJob); 969 DISALLOW_COPY_AND_ASSIGN(IPv6ProbeJob);
880 }; 970 };
881 971
882 //----------------------------------------------------------------------------- 972 //-----------------------------------------------------------------------------
883 973
884 // We rely on the priority enum values being sequential having starting at 0, 974 // Aggregates all Requests for the same Key. Dispatched via PriorityDispatch.
885 // and increasing for lower priorities. 975 // Spawns ProcTask when started.
886 COMPILE_ASSERT(HIGHEST == 0u && 976 class HostResolverImpl::Job : public PrioritizedDispatcher::Job {
887 LOWEST > HIGHEST &&
888 IDLE > LOWEST &&
889 NUM_PRIORITIES > IDLE,
890 priority_indexes_incompatible);
891
892 // JobPool contains all the information relating to queued requests, including
893 // the limits on how many jobs are allowed to be used for this category of
894 // requests.
895 class HostResolverImpl::JobPool {
896 public: 977 public:
897 JobPool(size_t max_outstanding_jobs, size_t max_pending_requests) 978 // Creates new job for |key| where |request_net_log| is bound to the
898 : num_outstanding_jobs_(0u) { 979 // request that spawned it.
899 SetConstraints(max_outstanding_jobs, max_pending_requests); 980 Job(HostResolverImpl* resolver,
900 } 981 const Key& key,
901 982 const BoundNetLog& request_net_log)
902 ~JobPool() { 983 : resolver_(resolver->AsWeakPtr()),
903 // Free the pending requests. 984 key_(key),
904 for (size_t i = 0; i < arraysize(pending_requests_); ++i) 985 had_non_speculative_request_(false),
905 STLDeleteElements(&pending_requests_[i]); 986 net_log_(BoundNetLog::Make(request_net_log.net_log(),
906 } 987 NetLog::SOURCE_HOST_RESOLVER_IMPL_JOB)),
907 988 net_error_(ERR_IO_PENDING),
908 // Sets the constraints for this pool. See SetPoolConstraints() for the 989 os_error_(0) {
909 // specific meaning of these parameters. 990 request_net_log.AddEvent(NetLog::TYPE_HOST_RESOLVER_IMPL_CREATE_JOB, NULL);
910 void SetConstraints(size_t max_outstanding_jobs, 991
911 size_t max_pending_requests) { 992 net_log_.BeginEvent(
912 CHECK_NE(max_outstanding_jobs, 0u); 993 NetLog::TYPE_HOST_RESOLVER_IMPL_JOB,
913 max_outstanding_jobs_ = max_outstanding_jobs; 994 make_scoped_refptr(new JobCreationParameters(
914 max_pending_requests_ = max_pending_requests; 995 key_.hostname, request_net_log.source())));
915 } 996 }
916 997
917 // Returns the number of pending requests enqueued to this pool. 998 virtual ~Job() {
918 // A pending request is one waiting to be attached to a job. 999 if (net_error_ == ERR_IO_PENDING) {
919 size_t GetNumPendingRequests() const { 1000 if (is_running()) {
920 size_t total = 0u; 1001 proc_task_->Cancel();
921 for (size_t i = 0u; i < arraysize(pending_requests_); ++i) 1002 proc_task_ = NULL;
922 total += pending_requests_[i].size();
923 return total;
924 }
925
926 bool HasPendingRequests() const {
927 return GetNumPendingRequests() > 0u;
928 }
929
930 // Enqueues a request to this pool. As a result of enqueing this request,
931 // the queue may have reached its maximum size. In this case, a request is
932 // evicted from the queue, and returned. Otherwise returns NULL. The caller
933 // is responsible for freeing the evicted request.
934 Request* InsertPendingRequest(Request* req) {
935 req->request_net_log().BeginEvent(
936 NetLog::TYPE_HOST_RESOLVER_IMPL_JOB_POOL_QUEUE,
937 NULL);
938
939 PendingRequestsQueue& q = pending_requests_[req->info().priority()];
940 q.push_back(req);
941
942 // If the queue is too big, kick out the lowest priority oldest request.
943 if (GetNumPendingRequests() > max_pending_requests_) {
944 // Iterate over the queues from lowest priority to highest priority.
945 for (int i = static_cast<int>(arraysize(pending_requests_)) - 1;
946 i >= 0; --i) {
947 PendingRequestsQueue& q = pending_requests_[i];
948 if (!q.empty()) {
949 Request* req = q.front();
950 q.pop_front();
951 req->request_net_log().AddEvent(
952 NetLog::TYPE_HOST_RESOLVER_IMPL_JOB_POOL_QUEUE_EVICTED, NULL);
953 req->request_net_log().EndEvent(
954 NetLog::TYPE_HOST_RESOLVER_IMPL_JOB_POOL_QUEUE, NULL);
955 return req;
956 }
957 } 1003 }
1004 net_log_.AddEvent(NetLog::TYPE_CANCELLED, NULL);
mmenke 2012/01/26 16:54:10 nit: Since you're already logging ERR_ABORTED, no
1005 for (RequestsList::const_iterator it = requests_.begin();
1006 it != requests_.end(); ++it) {
1007 Request* req = *it;
1008 if (req->was_canceled())
1009 continue;
1010 DCHECK_EQ(this, req->job());
1011 LogCancelRequest(req->source_net_log(), req->request_net_log(),
1012 req->info());
1013 }
1014 net_error_ = ERR_ABORTED;
958 } 1015 }
959 1016 net_log_.EndEventWithNetErrorCode(NetLog::TYPE_HOST_RESOLVER_IMPL_JOB,
960 return NULL; 1017 net_error_);
961 } 1018 STLDeleteElements(&requests_);
962 1019 }
963 // Erases |req| from this container. Caller is responsible for freeing 1020
964 // |req| afterwards. 1021 HostResolverImpl* resolver() const {
965 void RemovePendingRequest(Request* req) { 1022 return resolver_;
966 PendingRequestsQueue& q = pending_requests_[req->info().priority()]; 1023 }
967 PendingRequestsQueue::iterator it = std::find(q.begin(), q.end(), req); 1024
968 DCHECK(it != q.end()); 1025 RequestPriority priority() const {
969 q.erase(it); 1026 return priority_tracker_.highest_priority();
970 req->request_net_log().EndEvent( 1027 }
971 NetLog::TYPE_HOST_RESOLVER_IMPL_JOB_POOL_QUEUE, NULL); 1028
972 } 1029 // Number of non-canceled requests in |requests_|.
973 1030 size_t num_active_requests() const {
974 // Removes and returns the highest priority pending request. 1031 return priority_tracker_.total_count();
975 Request* RemoveTopPendingRequest() { 1032 }
976 DCHECK(HasPendingRequests()); 1033
977 1034 const Key& key() const {
978 for (size_t i = 0u; i < arraysize(pending_requests_); ++i) { 1035 return key_;
979 PendingRequestsQueue& q = pending_requests_[i]; 1036 }
980 if (!q.empty()) { 1037
981 Request* req = q.front(); 1038 int net_error() const {
982 q.pop_front(); 1039 return net_error_;
983 req->request_net_log().EndEvent( 1040 }
984 NetLog::TYPE_HOST_RESOLVER_IMPL_JOB_POOL_QUEUE, NULL); 1041
985 return req; 1042 // Used by HostResolverImpl with |dispatcher_|.
986 } 1043 const PrioritizedDispatcher::Handle& handle() const {
1044 return handle_;
1045 }
1046
1047 void set_handle(const PrioritizedDispatcher::Handle& handle) {
1048 handle_ = handle;
1049 }
1050
1051 // The Job will own |req| and destroy it in ~Job.
1052 void AddRequest(Request* req) {
1053 DCHECK_EQ(key_.hostname, req->info().hostname());
1054
1055 req->set_job(this);
1056 requests_.push_back(req);
1057
1058 priority_tracker_.Add(req->info().priority());
1059
1060 req->request_net_log().AddEvent(
1061 NetLog::TYPE_HOST_RESOLVER_IMPL_JOB_ATTACH,
1062 make_scoped_refptr(new NetLogSourceParameter(
1063 "source_dependency", net_log_.source())));
1064
1065 net_log_.AddEvent(
1066 NetLog::TYPE_HOST_RESOLVER_IMPL_JOB_ATTACH,
1067 make_scoped_refptr(new JobAttachParameters(
1068 req->request_net_log().source(), priority())));
1069
1070 // TODO(szym): Check if this is still needed.
1071 if (!req->info().is_speculative()) {
1072 had_non_speculative_request_ = true;
1073 if (proc_task_)
1074 proc_task_->set_had_non_speculative_request();
987 } 1075 }
988 1076 }
989 NOTREACHED(); 1077
990 return NULL; 1078 void CancelRequest(Request* req) {
991 } 1079 DCHECK_EQ(key_.hostname, req->info().hostname());
992 1080 DCHECK(!req->was_canceled());
993 // Keeps track of a job that was just added/removed, and belongs to this pool. 1081 // Don't remove it from |requests_| just mark it canceled.
994 void AdjustNumOutstandingJobs(int offset) { 1082 req->MarkAsCanceled();
995 DCHECK(offset == 1 || (offset == -1 && num_outstanding_jobs_ > 0u)); 1083 LogCancelRequest(req->source_net_log(), req->request_net_log(),
996 num_outstanding_jobs_ += offset; 1084 req->info());
997 } 1085 priority_tracker_.Remove(req->info().priority());
998 1086 net_log_.AddEvent(
999 void ResetNumOutstandingJobs() { 1087 NetLog::TYPE_HOST_RESOLVER_IMPL_JOB_DETACH,
1000 num_outstanding_jobs_ = 0; 1088 make_scoped_refptr(new JobAttachParameters(
1001 } 1089 req->request_net_log().source(), priority())));
1002 1090 }
1003 // Returns true if a new job can be created for this pool. 1091
1004 bool CanCreateJob() const { 1092 // Aborts and destroys the job, completes all requests as aborted.
1005 return num_outstanding_jobs_ + 1u <= max_outstanding_jobs_; 1093 void Abort() {
1006 } 1094 // Job should only be aborted if it's running.
1007 1095 DCHECK(is_running());
1008 // Removes any pending requests from the queue which are for the 1096 proc_task_->Cancel();
1009 // same (hostname / effective address-family) as |job|, and attaches them to 1097 proc_task_ = NULL;
1010 // |job|. 1098 net_error_ = ERR_ABORTED;
1011 void MoveRequestsToJob(Job* job) { 1099 os_error_ = 0;
1012 for (size_t i = 0u; i < arraysize(pending_requests_); ++i) { 1100 CompleteRequests(AddressList());
1013 PendingRequestsQueue& q = pending_requests_[i]; 1101 }
1014 PendingRequestsQueue::iterator req_it = q.begin(); 1102
1015 while (req_it != q.end()) { 1103 bool is_running() const {
1016 Request* req = *req_it; 1104 return proc_task_.get() != NULL;
1017 if (job->CanServiceRequest(req->info())) { 1105 }
1018 // Job takes ownership of |req|. 1106
1019 job->AddRequest(req); 1107 // Called by HostResolverImpl when this job is evicted due to queue overflow.
1020 req_it = q.erase(req_it); 1108 void OnEvicted() {
1021 } else { 1109 // Must not be running.
1022 ++req_it; 1110 DCHECK(!is_running());
1023 } 1111 handle_ = PrioritizedDispatcher::Handle();
1024 } 1112
1113 net_log_.AddEvent(NetLog::TYPE_HOST_RESOLVER_IMPL_JOB_EVICTED, NULL);
1114
1115 // This signals to CompleteRequests that this job never ran.
1116 net_error_ = ERR_HOST_RESOLVER_QUEUE_TOO_LARGE;
1117 os_error_ = 0;
1118 CompleteRequests(AddressList());
1119 }
1120
1121 // PriorityDispatch::Job interface.
1122 virtual void Start() OVERRIDE {
1123 DCHECK(!is_running());
1124 handle_ = PrioritizedDispatcher::Handle();
1125
1126 net_log_.AddEvent(NetLog::TYPE_HOST_RESOLVER_IMPL_JOB_STARTED, NULL);
1127
1128 proc_task_ = new ProcTask(
1129 key_,
1130 resolver_->proc_params_,
1131 base::Bind(&Job::OnProcTaskComplete, base::Unretained(this)),
1132 net_log_);
1133
1134 if (had_non_speculative_request_)
1135 proc_task_->set_had_non_speculative_request();
1136 // Start() could be called from within Resolve(), hence it must NOT directly
1137 // call OnProcTaskComplete, for example, on synchronous failure.
1138 proc_task_->Start();
1139 }
1140
1141 private:
1142 // Called by ProcTask when it completes.
1143 void OnProcTaskComplete(int net_error, int os_error,
1144 const AddressList& addrlist) {
1145 DCHECK(is_running());
1146 proc_task_ = NULL;
1147 net_error_ = net_error;
1148 os_error_ = os_error;
1149
1150 // We are the only consumer of |addrlist|, so we can safely change the port
1151 // without copy-on-write. This pays off, when job has only one request.
1152 AddressList list = addrlist;
1153 if (net_error == OK && !requests_.empty())
1154 MutableSetPort(requests_.front()->info().port(), &list);
1155 CompleteRequests(list);
1156 }
1157
1158 // Completes all Requests. Calls OnJobFinished and deletes self.
1159 void CompleteRequests(const AddressList& addrlist) {
1160 CHECK(resolver_);
1161
1162 // This job must be removed from resolver's |jobs_| now to make room for a
1163 // new job with the same key in case one of the OnComplete callbacks decides
1164 // to spawn one. Consequently, the job deletes itself when CompleteRequests
1165 // is done.
1166 scoped_ptr<Job> self_deleter(this);
1167 resolver_->OnJobFinished(this, addrlist);
1168
1169 // Complete all of the requests that were attached to the job.
1170 for (RequestsList::const_iterator it = requests_.begin();
1171 it != requests_.end(); ++it) {
1172 Request* req = *it;
1173
1174 if (req->was_canceled())
1175 continue;
1176
1177 DCHECK_EQ(this, req->job());
1178 // Update the net log and notify registered observers.
1179 LogFinishRequest(req->source_net_log(), req->request_net_log(),
1180 req->info(), net_error_, os_error_);
1181
1182 req->OnComplete(net_error_, addrlist);
1183
1184 // Check if the resolver was destroyed as a result of running the
1185 // callback. If it was, we could continue, but we choose to bail.
1186 if (!resolver_)
1187 return;
1025 } 1188 }
1026 } 1189 }
1027 1190
1028 private: 1191 // Used to call OnJobFinished and RemoveJob.
1029 typedef std::deque<Request*> PendingRequestsQueue; 1192 base::WeakPtr<HostResolverImpl> resolver_;
1030 1193
1031 // Maximum number of concurrent jobs allowed to be started for requests 1194 Key key_;
1032 // belonging to this pool. 1195
1033 size_t max_outstanding_jobs_; 1196 // Tracks the highest priority across |requests_|.
1034 1197 PriorityTracker priority_tracker_;
1035 // The current number of running jobs that were started for requests 1198
1036 // belonging to this pool. 1199 bool had_non_speculative_request_;
1037 size_t num_outstanding_jobs_; 1200
1038 1201 BoundNetLog net_log_;
1039 // The maximum number of requests we allow to be waiting on a job, 1202
1040 // for this pool. 1203 // Store result here in case the job fails fast in Resolve().
1041 size_t max_pending_requests_; 1204 int net_error_;
1042 1205 int os_error_;
1043 // The requests which are waiting to be started for this pool. 1206
1044 PendingRequestsQueue pending_requests_[NUM_PRIORITIES]; 1207 // A ProcTask created and started when this Job is dispatched..
1208 scoped_refptr<ProcTask> proc_task_;
1209
1210 // All Requests waiting for the result of this Job. Some can be canceled.
1211 RequestsList requests_;
1212
1213 // A handle used by HostResolverImpl in |dispatcher_|.
1214 PrioritizedDispatcher::Handle handle_;
1045 }; 1215 };
1046 1216
1047 //----------------------------------------------------------------------------- 1217 //-----------------------------------------------------------------------------
1048 1218
1219 HostResolverImpl::ProcTaskParams::ProcTaskParams(
1220 HostResolverProc* resolver_proc,
1221 size_t max_retry_attempts)
1222 : resolver_proc(resolver_proc),
1223 max_retry_attempts(max_retry_attempts),
1224 unresponsive_delay(base::TimeDelta::FromMilliseconds(6000)),
1225 retry_factor(2) {
1226 }
1227
1228 HostResolverImpl::ProcTaskParams::~ProcTaskParams() {}
1229
1049 HostResolverImpl::HostResolverImpl( 1230 HostResolverImpl::HostResolverImpl(
1050 HostResolverProc* resolver_proc,
1051 HostCache* cache, 1231 HostCache* cache,
1052 size_t max_jobs, 1232 const PrioritizedDispatcher::Limits& job_limits,
1053 size_t max_retry_attempts, 1233 const ProcTaskParams& proc_params,
1054 NetLog* net_log) 1234 NetLog* net_log)
1055 : cache_(cache), 1235 : cache_(cache),
1056 max_jobs_(max_jobs), 1236 dispatcher_(job_limits),
1057 max_retry_attempts_(max_retry_attempts), 1237 max_queued_jobs_(job_limits.total_jobs * 100u),
1058 unresponsive_delay_(base::TimeDelta::FromMilliseconds(6000)), 1238 proc_params_(proc_params),
1059 retry_factor_(2),
1060 next_job_id_(0),
1061 resolver_proc_(resolver_proc),
1062 default_address_family_(ADDRESS_FAMILY_UNSPECIFIED), 1239 default_address_family_(ADDRESS_FAMILY_UNSPECIFIED),
1063 ipv6_probe_monitoring_(false), 1240 ipv6_probe_monitoring_(false),
1064 additional_resolver_flags_(0), 1241 additional_resolver_flags_(0),
1065 net_log_(net_log) { 1242 net_log_(net_log) {
1066 DCHECK_GT(max_jobs, 0u); 1243
1244 DCHECK_GE(dispatcher_.num_priorities(), static_cast<size_t>(NUM_PRIORITIES));
1067 1245
1068 // Maximum of 4 retry attempts for host resolution. 1246 // Maximum of 4 retry attempts for host resolution.
1069 static const size_t kDefaultMaxRetryAttempts = 4u; 1247 static const size_t kDefaultMaxRetryAttempts = 4u;
1070 1248
1071 if (max_retry_attempts_ == HostResolver::kDefaultRetryAttempts) 1249 if (proc_params_.max_retry_attempts == HostResolver::kDefaultRetryAttempts)
1072 max_retry_attempts_ = kDefaultMaxRetryAttempts; 1250 proc_params_.max_retry_attempts = kDefaultMaxRetryAttempts;
1073
1074 // It is cumbersome to expose all of the constraints in the constructor,
1075 // so we choose some defaults, which users can override later.
1076 job_pools_[POOL_NORMAL] = new JobPool(max_jobs, 100u * max_jobs);
1077 1251
1078 #if defined(OS_WIN) 1252 #if defined(OS_WIN)
1079 EnsureWinsockInit(); 1253 EnsureWinsockInit();
1080 #endif 1254 #endif
1081 #if defined(OS_POSIX) && !defined(OS_MACOSX) 1255 #if defined(OS_POSIX) && !defined(OS_MACOSX)
1082 if (HaveOnlyLoopbackAddresses()) 1256 if (HaveOnlyLoopbackAddresses())
1083 additional_resolver_flags_ |= HOST_RESOLVER_LOOPBACK_ONLY; 1257 additional_resolver_flags_ |= HOST_RESOLVER_LOOPBACK_ONLY;
1084 #endif 1258 #endif
1085 NetworkChangeNotifier::AddIPAddressObserver(this); 1259 NetworkChangeNotifier::AddIPAddressObserver(this);
1086 #if defined(OS_POSIX) && !defined(OS_MACOSX) && !defined(OS_OPENBSD) 1260 #if defined(OS_POSIX) && !defined(OS_MACOSX) && !defined(OS_OPENBSD)
1087 #if !defined(OS_ANDROID) 1261 #if !defined(OS_ANDROID)
1088 EnsureDnsReloaderInit(); 1262 EnsureDnsReloaderInit();
1089 #endif 1263 #endif
1090 NetworkChangeNotifier::AddDNSObserver(this); 1264 NetworkChangeNotifier::AddDNSObserver(this);
1091 #endif 1265 #endif
1092 } 1266 }
1093 1267
1094 HostResolverImpl::~HostResolverImpl() { 1268 HostResolverImpl::~HostResolverImpl() {
1095 // Cancel the outstanding jobs. Those jobs may contain several attached
1096 // requests, which will also be cancelled.
1097 DiscardIPv6ProbeJob(); 1269 DiscardIPv6ProbeJob();
1098 1270
1099 CancelAllJobs(); 1271 // This will also cancel all outstanding requests.
1100 1272 STLDeleteValues(&jobs_);
1101 // In case we are being deleted during the processing of a callback.
1102 if (cur_completing_job_)
1103 cur_completing_job_->Cancel();
1104 1273
1105 NetworkChangeNotifier::RemoveIPAddressObserver(this); 1274 NetworkChangeNotifier::RemoveIPAddressObserver(this);
1106 #if defined(OS_POSIX) && !defined(OS_MACOSX) && !defined(OS_OPENBSD) 1275 #if defined(OS_POSIX) && !defined(OS_MACOSX) && !defined(OS_OPENBSD)
1107 NetworkChangeNotifier::RemoveDNSObserver(this); 1276 NetworkChangeNotifier::RemoveDNSObserver(this);
1108 #endif 1277 #endif
1109
1110 // Delete the job pools.
1111 for (size_t i = 0u; i < arraysize(job_pools_); ++i)
1112 delete job_pools_[i];
1113 } 1278 }
1114 1279
1115 void HostResolverImpl::SetPoolConstraints(JobPoolIndex pool_index, 1280 void HostResolverImpl::SetMaxQueuedJobs(size_t value) {
1116 size_t max_outstanding_jobs, 1281 DCHECK_EQ(0u, dispatcher_.num_queued_jobs());
1117 size_t max_pending_requests) { 1282 DCHECK_GT(value, 0u);
1118 DCHECK(CalledOnValidThread()); 1283 max_queued_jobs_ = value;
1119 CHECK_GE(pool_index, 0);
1120 CHECK_LT(pool_index, POOL_COUNT);
1121 CHECK(jobs_.empty()) << "Can only set constraints during setup";
1122 JobPool* pool = job_pools_[pool_index];
1123 pool->SetConstraints(max_outstanding_jobs, max_pending_requests);
1124 } 1284 }
1125 1285
1126 int HostResolverImpl::Resolve(const RequestInfo& info, 1286 int HostResolverImpl::Resolve(const RequestInfo& info,
1127 AddressList* addresses, 1287 AddressList* addresses,
1128 const CompletionCallback& callback, 1288 const CompletionCallback& callback,
1129 RequestHandle* out_req, 1289 RequestHandle* out_req,
1130 const BoundNetLog& source_net_log) { 1290 const BoundNetLog& source_net_log) {
1131 DCHECK(addresses); 1291 DCHECK(addresses);
1132 DCHECK(CalledOnValidThread()); 1292 DCHECK(CalledOnValidThread());
1133 DCHECK_EQ(false, callback.is_null()); 1293 DCHECK_EQ(false, callback.is_null());
1134 1294
1135 // Make a log item for the request. 1295 // Make a log item for the request.
1136 BoundNetLog request_net_log = BoundNetLog::Make(net_log_, 1296 BoundNetLog request_net_log = BoundNetLog::Make(net_log_,
1137 NetLog::SOURCE_HOST_RESOLVER_IMPL_REQUEST); 1297 NetLog::SOURCE_HOST_RESOLVER_IMPL_REQUEST);
1138 1298
1139 // Update the net log and notify registered observers. 1299 LogStartRequest(source_net_log, request_net_log, info);
1140 OnStartRequest(source_net_log, request_net_log, info);
1141 1300
1142 // Build a key that identifies the request in the cache and in the 1301 // Build a key that identifies the request in the cache and in the
1143 // outstanding jobs map. 1302 // outstanding jobs map.
1144 Key key = GetEffectiveKeyForRequest(info); 1303 Key key = GetEffectiveKeyForRequest(info);
1145 1304
1146 int rv = ResolveHelper(key, info, addresses, request_net_log); 1305 int rv = ResolveHelper(key, info, addresses, request_net_log);
1147 if (rv != ERR_DNS_CACHE_MISS) { 1306 if (rv != ERR_DNS_CACHE_MISS) {
1148 OnFinishRequest(source_net_log, request_net_log, info, 1307 LogFinishRequest(source_net_log, request_net_log, info, rv,
1149 rv, 1308 0 /* os_error (unknown since from cache) */);
1150 0 /* os_error (unknown since from cache) */);
1151 return rv; 1309 return rv;
1152 } 1310 }
1153 1311
1154 // Create a handle for this request, and pass it back to the user if they 1312 // Next we need to attach our request to a "job". This job is responsible for
1155 // asked for it (out_req != NULL). 1313 // calling "getaddrinfo(hostname)" on a worker thread.
1156 Request* req = new Request(source_net_log, request_net_log, info, 1314
1157 callback, addresses); 1315 JobMap::iterator jobit = jobs_.find(key);
1316 Job* job;
1317 if (jobit == jobs_.end()) {
1318 // Create new Job.
1319 job = new Job(this, key, request_net_log);
1320 job->set_handle(dispatcher_.Add(job, info.priority()));
1321
1322 // Check for queue overflow.
1323 if (dispatcher_.num_queued_jobs() > max_queued_jobs_) {
1324 Job* evicted = static_cast<Job*>(dispatcher_.EvictOldestLowest());
1325 DCHECK(evicted);
1326 if (evicted == job) {
1327 delete job;
1328 rv = ERR_HOST_RESOLVER_QUEUE_TOO_LARGE;
1329 LogFinishRequest(source_net_log, request_net_log, info, rv, 0);
1330 return rv;
1331 }
1332 evicted->OnEvicted(); // Deletes |evicted|.
1333 }
1334
1335 jobs_.insert(jobit, std::make_pair(key, job));
1336 } else {
1337 job = jobit->second;
1338 }
1339
1340 // Can't complete synchronously. Create and attach request.
1341 Request* req = new Request(source_net_log, request_net_log, info, callback,
1342 addresses);
1343 job->AddRequest(req);
1344 if (!job->handle().is_null())
1345 job->set_handle(dispatcher_.ChangePriority(job->handle(), job->priority()));
1158 if (out_req) 1346 if (out_req)
1159 *out_req = reinterpret_cast<RequestHandle>(req); 1347 *out_req = reinterpret_cast<RequestHandle>(req);
1160 1348
1161 // Next we need to attach our request to a "job". This job is responsible for 1349 DCHECK_EQ(ERR_IO_PENDING, job->net_error());
1162 // calling "getaddrinfo(hostname)" on a worker thread. 1350 // Completion happens during Job::CompleteRequests().
1163 scoped_refptr<Job> job;
1164
1165 // If there is already an outstanding job to resolve |key|, use
1166 // it. This prevents starting concurrent resolves for the same hostname.
1167 job = FindOutstandingJob(key);
1168 if (job) {
1169 job->AddRequest(req);
1170 } else {
1171 JobPool* pool = GetPoolForRequest(req);
1172 if (CanCreateJobForPool(*pool)) {
1173 CreateAndStartJob(req);
1174 } else {
1175 return EnqueueRequest(pool, req);
1176 }
1177 }
1178
1179 // Completion happens during OnJobComplete(Job*).
1180 return ERR_IO_PENDING; 1351 return ERR_IO_PENDING;
1181 } 1352 }
1182 1353
1183 int HostResolverImpl::ResolveHelper(const Key& key, 1354 int HostResolverImpl::ResolveHelper(const Key& key,
1184 const RequestInfo& info, 1355 const RequestInfo& info,
1185 AddressList* addresses, 1356 AddressList* addresses,
1186 const BoundNetLog& request_net_log) { 1357 const BoundNetLog& request_net_log) {
1187 // The result of |getaddrinfo| for empty hosts is inconsistent across systems. 1358 // The result of |getaddrinfo| for empty hosts is inconsistent across systems.
1188 // On Windows it gives the default interface's address, whereas on Linux it 1359 // On Windows it gives the default interface's address, whereas on Linux it
1189 // gives an error. We will make it fail on all platforms for consistency. 1360 // gives an error. We will make it fail on all platforms for consistency.
(...skipping 12 matching lines...) Expand all
1202 AddressList* addresses, 1373 AddressList* addresses,
1203 const BoundNetLog& source_net_log) { 1374 const BoundNetLog& source_net_log) {
1204 DCHECK(CalledOnValidThread()); 1375 DCHECK(CalledOnValidThread());
1205 DCHECK(addresses); 1376 DCHECK(addresses);
1206 1377
1207 // Make a log item for the request. 1378 // Make a log item for the request.
1208 BoundNetLog request_net_log = BoundNetLog::Make(net_log_, 1379 BoundNetLog request_net_log = BoundNetLog::Make(net_log_,
1209 NetLog::SOURCE_HOST_RESOLVER_IMPL_REQUEST); 1380 NetLog::SOURCE_HOST_RESOLVER_IMPL_REQUEST);
1210 1381
1211 // Update the net log and notify registered observers. 1382 // Update the net log and notify registered observers.
1212 OnStartRequest(source_net_log, request_net_log, info); 1383 LogStartRequest(source_net_log, request_net_log, info);
1213 1384
1214 // Build a key that identifies the request in the cache and in the
1215 // outstanding jobs map.
1216 Key key = GetEffectiveKeyForRequest(info); 1385 Key key = GetEffectiveKeyForRequest(info);
1217 1386
1218 int rv = ResolveHelper(key, info, addresses, request_net_log); 1387 int rv = ResolveHelper(key, info, addresses, request_net_log);
1219 OnFinishRequest(source_net_log, request_net_log, info, 1388 LogFinishRequest(source_net_log, request_net_log, info, rv,
1220 rv, 1389 0 /* os_error (unknown since from cache) */);
1221 0 /* os_error (unknown since from cache) */);
1222 return rv; 1390 return rv;
1223 } 1391 }
1224 1392
1225 // See OnJobComplete(Job*) for why it is important not to clean out
1226 // cancelled requests from Job::requests_.
1227 void HostResolverImpl::CancelRequest(RequestHandle req_handle) { 1393 void HostResolverImpl::CancelRequest(RequestHandle req_handle) {
1228 DCHECK(CalledOnValidThread()); 1394 DCHECK(CalledOnValidThread());
1229 Request* req = reinterpret_cast<Request*>(req_handle); 1395 Request* req = reinterpret_cast<Request*>(req_handle);
1230 DCHECK(req); 1396 DCHECK(req);
1231 1397
1232 scoped_ptr<Request> request_deleter; // Frees at end of function. 1398 Job* job = req->job();
1399 DCHECK(job);
1233 1400
1234 if (!req->job()) { 1401 job->CancelRequest(req);
1235 // If the request was not attached to a job yet, it must have been 1402
1236 // enqueued into a pool. Remove it from that pool's queue. 1403 if (!job->handle().is_null()) {
1237 // Otherwise if it was attached to a job, the job is responsible for 1404 // Still in queue.
1238 // deleting it. 1405 if (job->num_active_requests()) {
1239 JobPool* pool = GetPoolForRequest(req); 1406 job->set_handle(dispatcher_.ChangePriority(job->handle(),
1240 pool->RemovePendingRequest(req); 1407 job->priority()));
1241 request_deleter.reset(req); 1408 } else {
1409 dispatcher_.Cancel(job->handle());
1410 RemoveJob(job);
1411 delete job;
1412 }
1242 } else { 1413 } else {
1243 req->request_net_log().EndEvent( 1414 // Job is running (and could be in CompleteRequests right now).
1244 NetLog::TYPE_HOST_RESOLVER_IMPL_JOB_ATTACH, NULL); 1415 // But to be in Request::OnComplete we would have to have a non-canceled
1416 // request. So it is safe to Abort it if it has no more active requests.
1417 if (!job->num_active_requests()) {
1418 job->Abort();
1419 }
1245 } 1420 }
1246
1247 // NULL out the fields of req, to mark it as cancelled.
1248 req->MarkAsCancelled();
1249 OnCancelRequest(req->source_net_log(), req->request_net_log(), req->info());
1250 } 1421 }
1251 1422
1252 void HostResolverImpl::SetDefaultAddressFamily(AddressFamily address_family) { 1423 void HostResolverImpl::SetDefaultAddressFamily(AddressFamily address_family) {
1253 DCHECK(CalledOnValidThread()); 1424 DCHECK(CalledOnValidThread());
1254 ipv6_probe_monitoring_ = false; 1425 ipv6_probe_monitoring_ = false;
1255 DiscardIPv6ProbeJob(); 1426 DiscardIPv6ProbeJob();
1256 default_address_family_ = address_family; 1427 default_address_family_ = address_family;
1257 } 1428 }
1258 1429
1259 AddressFamily HostResolverImpl::GetDefaultAddressFamily() const { 1430 AddressFamily HostResolverImpl::GetDefaultAddressFamily() const {
(...skipping 18 matching lines...) Expand all
1278 DCHECK(addresses); 1449 DCHECK(addresses);
1279 DCHECK(net_error); 1450 DCHECK(net_error);
1280 IPAddressNumber ip_number; 1451 IPAddressNumber ip_number;
1281 if (!ParseIPLiteralToNumber(key.hostname, &ip_number)) 1452 if (!ParseIPLiteralToNumber(key.hostname, &ip_number))
1282 return false; 1453 return false;
1283 1454
1284 DCHECK_EQ(key.host_resolver_flags & 1455 DCHECK_EQ(key.host_resolver_flags &
1285 ~(HOST_RESOLVER_CANONNAME | HOST_RESOLVER_LOOPBACK_ONLY | 1456 ~(HOST_RESOLVER_CANONNAME | HOST_RESOLVER_LOOPBACK_ONLY |
1286 HOST_RESOLVER_DEFAULT_FAMILY_SET_DUE_TO_NO_IPV6), 1457 HOST_RESOLVER_DEFAULT_FAMILY_SET_DUE_TO_NO_IPV6),
1287 0) << " Unhandled flag"; 1458 0) << " Unhandled flag";
1288 bool ipv6_disabled = default_address_family_ == ADDRESS_FAMILY_IPV4 && 1459 bool ipv6_disabled = (default_address_family_ == ADDRESS_FAMILY_IPV4) &&
1289 !ipv6_probe_monitoring_; 1460 !ipv6_probe_monitoring_;
1290 *net_error = OK; 1461 *net_error = OK;
1291 if (ip_number.size() == 16 && ipv6_disabled) { 1462 if ((ip_number.size() == kIPv6AddressSize) && ipv6_disabled) {
1292 *net_error = ERR_NAME_NOT_RESOLVED; 1463 *net_error = ERR_NAME_NOT_RESOLVED;
1293 } else { 1464 } else {
1294 *addresses = AddressList::CreateFromIPAddressWithCname( 1465 *addresses = AddressList::CreateFromIPAddressWithCname(
1295 ip_number, info.port(), 1466 ip_number, info.port(),
1296 (key.host_resolver_flags & HOST_RESOLVER_CANONNAME)); 1467 (key.host_resolver_flags & HOST_RESOLVER_CANONNAME));
1297 } 1468 }
1298 return true; 1469 return true;
1299 } 1470 }
1300 1471
1301 bool HostResolverImpl::ServeFromCache(const Key& key, 1472 bool HostResolverImpl::ServeFromCache(const Key& key,
(...skipping 11 matching lines...) Expand all
1313 if (!cache_entry) 1484 if (!cache_entry)
1314 return false; 1485 return false;
1315 1486
1316 request_net_log.AddEvent(NetLog::TYPE_HOST_RESOLVER_IMPL_CACHE_HIT, NULL); 1487 request_net_log.AddEvent(NetLog::TYPE_HOST_RESOLVER_IMPL_CACHE_HIT, NULL);
1317 *net_error = cache_entry->error; 1488 *net_error = cache_entry->error;
1318 if (*net_error == OK) 1489 if (*net_error == OK)
1319 *addresses = CreateAddressListUsingPort(cache_entry->addrlist, info.port()); 1490 *addresses = CreateAddressListUsingPort(cache_entry->addrlist, info.port());
1320 return true; 1491 return true;
1321 } 1492 }
1322 1493
1323 void HostResolverImpl::AddOutstandingJob(Job* job) { 1494 void HostResolverImpl::OnJobFinished(Job* job, const AddressList& addrlist) {
1324 scoped_refptr<Job>& found_job = jobs_[job->key()]; 1495 DCHECK(job);
1325 DCHECK(!found_job); 1496 DCHECK(job->handle().is_null());
1326 found_job = job; 1497 RemoveJob(job);
1327 1498 if (job->net_error() != ERR_HOST_RESOLVER_QUEUE_TOO_LARGE)
1328 JobPool* pool = GetPoolForRequest(job->initial_request()); 1499 // Signal dispatcher that a slot has opened.
1329 pool->AdjustNumOutstandingJobs(1); 1500 dispatcher_.OnJobFinished();
1501 if (job->net_error() == ERR_ABORTED)
mmenke 2012/01/26 16:54:10 If we're not writing ERR_ABORTED to the cache, it'
1502 return;
1503 // Write result to the cache.
1504 if (cache_.get())
1505 cache_->Set(job->key(), job->net_error(), addrlist,
1506 base::TimeTicks::Now());
1330 } 1507 }
1331 1508
1332 HostResolverImpl::Job* HostResolverImpl::FindOutstandingJob(const Key& key) { 1509 void HostResolverImpl::RemoveJob(Job* job) {
1333 JobMap::iterator it = jobs_.find(key); 1510 DCHECK(job);
1334 if (it != jobs_.end()) 1511 jobs_.erase(job->key());
1335 return it->second;
1336 return NULL;
1337 }
1338
1339 void HostResolverImpl::RemoveOutstandingJob(Job* job) {
1340 JobMap::iterator it = jobs_.find(job->key());
1341 DCHECK(it != jobs_.end());
1342 DCHECK_EQ(it->second.get(), job);
1343 jobs_.erase(it);
1344
1345 JobPool* pool = GetPoolForRequest(job->initial_request());
1346 pool->AdjustNumOutstandingJobs(-1);
1347 }
1348
1349 void HostResolverImpl::OnJobComplete(Job* job,
1350 int net_error,
1351 int os_error,
1352 const AddressList& addrlist) {
1353 RemoveOutstandingJob(job);
1354
1355 // Write result to the cache.
1356 if (cache_.get())
1357 cache_->Set(job->key(), net_error, addrlist, base::TimeTicks::Now());
1358
1359 OnJobCompleteInternal(job, net_error, os_error, addrlist);
1360 }
1361
1362 void HostResolverImpl::AbortJob(Job* job) {
1363 OnJobCompleteInternal(job, ERR_ABORTED, 0 /* no os_error */, AddressList());
1364 }
1365
1366 void HostResolverImpl::OnJobCompleteInternal(
1367 Job* job,
1368 int net_error,
1369 int os_error,
1370 const AddressList& addrlist) {
1371 // Make a note that we are executing within OnJobComplete() in case the
1372 // HostResolver is deleted by a callback invocation.
1373 DCHECK(!cur_completing_job_);
1374 cur_completing_job_ = job;
1375
1376 // Try to start any queued requests now that a job-slot has freed up.
1377 ProcessQueuedRequests();
1378
1379 // Complete all of the requests that were attached to the job.
1380 for (RequestsList::const_iterator it = job->requests().begin();
1381 it != job->requests().end(); ++it) {
1382 Request* req = *it;
1383 if (!req->was_cancelled()) {
1384 DCHECK_EQ(job, req->job());
1385 req->request_net_log().EndEvent(
1386 NetLog::TYPE_HOST_RESOLVER_IMPL_JOB_ATTACH, NULL);
1387
1388 // Update the net log and notify registered observers.
1389 OnFinishRequest(req->source_net_log(), req->request_net_log(),
1390 req->info(), net_error, os_error);
1391
1392 req->OnComplete(net_error, addrlist);
1393
1394 // Check if the job was cancelled as a result of running the callback.
1395 // (Meaning that |this| was deleted).
1396 if (job->was_cancelled())
1397 return;
1398 }
1399 }
1400
1401 cur_completing_job_ = NULL;
1402 }
1403
1404 void HostResolverImpl::OnStartRequest(const BoundNetLog& source_net_log,
1405 const BoundNetLog& request_net_log,
1406 const RequestInfo& info) {
1407 source_net_log.BeginEvent(
1408 NetLog::TYPE_HOST_RESOLVER_IMPL,
1409 make_scoped_refptr(new NetLogSourceParameter(
1410 "source_dependency", request_net_log.source())));
1411
1412 request_net_log.BeginEvent(
1413 NetLog::TYPE_HOST_RESOLVER_IMPL_REQUEST,
1414 make_scoped_refptr(new RequestInfoParameters(
1415 info, source_net_log.source())));
1416 }
1417
1418 void HostResolverImpl::OnFinishRequest(const BoundNetLog& source_net_log,
1419 const BoundNetLog& request_net_log,
1420 const RequestInfo& info,
1421 int net_error,
1422 int os_error) {
1423 bool was_resolved = net_error == OK;
1424
1425 // Log some extra parameters on failure for synchronous requests.
1426 scoped_refptr<NetLog::EventParameters> params;
1427 if (!was_resolved) {
1428 params = new HostResolveFailedParams(0, net_error, os_error);
1429 }
1430
1431 request_net_log.EndEvent(NetLog::TYPE_HOST_RESOLVER_IMPL_REQUEST, params);
1432 source_net_log.EndEvent(NetLog::TYPE_HOST_RESOLVER_IMPL, NULL);
1433 }
1434
1435 void HostResolverImpl::OnCancelRequest(const BoundNetLog& source_net_log,
1436 const BoundNetLog& request_net_log,
1437 const RequestInfo& info) {
1438 request_net_log.AddEvent(NetLog::TYPE_CANCELLED, NULL);
1439 request_net_log.EndEvent(NetLog::TYPE_HOST_RESOLVER_IMPL_REQUEST, NULL);
1440 source_net_log.EndEvent(NetLog::TYPE_HOST_RESOLVER_IMPL, NULL);
1441 } 1512 }
1442 1513
1443 void HostResolverImpl::DiscardIPv6ProbeJob() { 1514 void HostResolverImpl::DiscardIPv6ProbeJob() {
1444 if (ipv6_probe_job_.get()) { 1515 if (ipv6_probe_job_.get()) {
1445 ipv6_probe_job_->Cancel(); 1516 ipv6_probe_job_->Cancel();
1446 ipv6_probe_job_ = NULL; 1517 ipv6_probe_job_ = NULL;
1447 } 1518 }
1448 } 1519 }
1449 1520
1450 void HostResolverImpl::IPv6ProbeSetDefaultAddressFamily( 1521 void HostResolverImpl::IPv6ProbeSetDefaultAddressFamily(
1451 AddressFamily address_family) { 1522 AddressFamily address_family) {
1452 DCHECK(address_family == ADDRESS_FAMILY_UNSPECIFIED || 1523 DCHECK(address_family == ADDRESS_FAMILY_UNSPECIFIED ||
1453 address_family == ADDRESS_FAMILY_IPV4); 1524 address_family == ADDRESS_FAMILY_IPV4);
1454 if (default_address_family_ != address_family) { 1525 if (default_address_family_ != address_family) {
1455 VLOG(1) << "IPv6Probe forced AddressFamily setting to " 1526 VLOG(1) << "IPv6Probe forced AddressFamily setting to "
1456 << ((address_family == ADDRESS_FAMILY_UNSPECIFIED) ? 1527 << ((address_family == ADDRESS_FAMILY_UNSPECIFIED) ?
1457 "ADDRESS_FAMILY_UNSPECIFIED" : "ADDRESS_FAMILY_IPV4"); 1528 "ADDRESS_FAMILY_UNSPECIFIED" : "ADDRESS_FAMILY_IPV4");
1458 } 1529 }
1459 default_address_family_ = address_family; 1530 default_address_family_ = address_family;
1460 // Drop reference since the job has called us back. 1531 // Drop reference since the job has called us back.
1461 DiscardIPv6ProbeJob(); 1532 DiscardIPv6ProbeJob();
1462 } 1533 }
1463 1534
1464 bool HostResolverImpl::CanCreateJobForPool(const JobPool& pool) const {
1465 DCHECK_LE(jobs_.size(), max_jobs_);
1466
1467 // We can't create another job if it would exceed the global total.
1468 if (jobs_.size() + 1 > max_jobs_)
1469 return false;
1470
1471 // Check whether the pool's constraints are met.
1472 return pool.CanCreateJob();
1473 }
1474
1475 // static
1476 HostResolverImpl::JobPoolIndex HostResolverImpl::GetJobPoolIndexForRequest(
1477 const Request* req) {
1478 return POOL_NORMAL;
1479 }
1480
1481 void HostResolverImpl::ProcessQueuedRequests() {
1482 // Find the highest priority request that can be scheduled.
1483 Request* top_req = NULL;
1484 for (size_t i = 0; i < arraysize(job_pools_); ++i) {
1485 JobPool* pool = job_pools_[i];
1486 if (pool->HasPendingRequests() && CanCreateJobForPool(*pool)) {
1487 top_req = pool->RemoveTopPendingRequest();
1488 break;
1489 }
1490 }
1491
1492 if (!top_req)
1493 return;
1494
1495 scoped_refptr<Job> job(CreateAndStartJob(top_req));
1496
1497 // Search for any other pending request which can piggy-back off this job.
1498 for (size_t pool_i = 0; pool_i < POOL_COUNT; ++pool_i) {
1499 JobPool* pool = job_pools_[pool_i];
1500 pool->MoveRequestsToJob(job);
1501 }
1502 }
1503
1504 HostResolverImpl::Key HostResolverImpl::GetEffectiveKeyForRequest( 1535 HostResolverImpl::Key HostResolverImpl::GetEffectiveKeyForRequest(
1505 const RequestInfo& info) const { 1536 const RequestInfo& info) const {
1506 HostResolverFlags effective_flags = 1537 HostResolverFlags effective_flags =
1507 info.host_resolver_flags() | additional_resolver_flags_; 1538 info.host_resolver_flags() | additional_resolver_flags_;
1508 AddressFamily effective_address_family = info.address_family(); 1539 AddressFamily effective_address_family = info.address_family();
1509 if (effective_address_family == ADDRESS_FAMILY_UNSPECIFIED && 1540 if (effective_address_family == ADDRESS_FAMILY_UNSPECIFIED &&
1510 default_address_family_ != ADDRESS_FAMILY_UNSPECIFIED) { 1541 default_address_family_ != ADDRESS_FAMILY_UNSPECIFIED) {
1511 effective_address_family = default_address_family_; 1542 effective_address_family = default_address_family_;
1512 if (ipv6_probe_monitoring_) 1543 if (ipv6_probe_monitoring_)
1513 effective_flags |= HOST_RESOLVER_DEFAULT_FAMILY_SET_DUE_TO_NO_IPV6; 1544 effective_flags |= HOST_RESOLVER_DEFAULT_FAMILY_SET_DUE_TO_NO_IPV6;
1514 } 1545 }
1515 return Key(info.hostname(), effective_address_family, effective_flags); 1546 return Key(info.hostname(), effective_address_family, effective_flags);
1516 } 1547 }
1517 1548
1518 HostResolverImpl::Job* HostResolverImpl::CreateAndStartJob(Request* req) {
1519 DCHECK(CanCreateJobForPool(*GetPoolForRequest(req)));
1520 Key key = GetEffectiveKeyForRequest(req->info());
1521
1522 req->request_net_log().AddEvent(NetLog::TYPE_HOST_RESOLVER_IMPL_CREATE_JOB,
1523 NULL);
1524
1525 scoped_refptr<Job> job(new Job(next_job_id_++, this, key,
1526 req->request_net_log(), net_log_));
1527 job->AddRequest(req);
1528 AddOutstandingJob(job);
1529 job->Start();
1530
1531 return job.get();
1532 }
1533
1534 int HostResolverImpl::EnqueueRequest(JobPool* pool, Request* req) {
1535 scoped_ptr<Request> req_evicted_from_queue(
1536 pool->InsertPendingRequest(req));
1537
1538 // If the queue has become too large, we need to kick something out.
1539 if (req_evicted_from_queue.get()) {
1540 Request* r = req_evicted_from_queue.get();
1541 int error = ERR_HOST_RESOLVER_QUEUE_TOO_LARGE;
1542
1543 OnFinishRequest(r->source_net_log(), r->request_net_log(), r->info(), error,
1544 0 /* os_error (not applicable) */);
1545
1546 if (r == req)
1547 return error;
1548
1549 r->OnComplete(error, AddressList());
1550 }
1551
1552 return ERR_IO_PENDING;
1553 }
1554
1555 void HostResolverImpl::CancelAllJobs() {
1556 JobMap jobs;
1557 jobs.swap(jobs_);
1558 for (JobMap::iterator it = jobs.begin(); it != jobs.end(); ++it)
1559 it->second->Cancel();
1560 }
1561
1562 void HostResolverImpl::AbortAllInProgressJobs() { 1549 void HostResolverImpl::AbortAllInProgressJobs() {
1563 for (size_t i = 0; i < arraysize(job_pools_); ++i) 1550 base::WeakPtr<HostResolverImpl> self = AsWeakPtr();
1564 job_pools_[i]->ResetNumOutstandingJobs(); 1551 // Scan |jobs_| for running jobs and abort them.
1565 JobMap jobs; 1552 for (JobMap::iterator it = jobs_.begin(); it != jobs_.end(); ) {
1566 jobs.swap(jobs_); 1553 Job* job = it->second;
1567 for (JobMap::iterator it = jobs.begin(); it != jobs.end(); ++it) { 1554 // Advance the iterator before we might erase it.
1568 AbortJob(it->second); 1555 ++it;
1569 it->second->Cancel(); 1556 if (job->is_running()) {
1557 job->Abort();
1558 // Check if resolver was deleted in a request callback.
1559 if (!self)
1560 return;
1561 } else {
1562 // Keep it in |dispatch_|.
1563 DCHECK(!job->handle().is_null());
1564 }
1570 } 1565 }
1571 } 1566 }
1572 1567
1573 void HostResolverImpl::OnIPAddressChanged() { 1568 void HostResolverImpl::OnIPAddressChanged() {
1574 if (cache_.get()) 1569 if (cache_.get())
1575 cache_->clear(); 1570 cache_->clear();
1576 if (ipv6_probe_monitoring_) { 1571 if (ipv6_probe_monitoring_) {
1577 DiscardIPv6ProbeJob(); 1572 DiscardIPv6ProbeJob();
1578 ipv6_probe_job_ = new IPv6ProbeJob(this); 1573 ipv6_probe_job_ = new IPv6ProbeJob(this);
1579 ipv6_probe_job_->Start(); 1574 ipv6_probe_job_->Start();
(...skipping 16 matching lines...) Expand all
1596 // resolv.conf changes so we don't need to do anything to clear that cache. 1591 // resolv.conf changes so we don't need to do anything to clear that cache.
1597 if (cache_.get()) 1592 if (cache_.get())
1598 cache_->clear(); 1593 cache_->clear();
1599 // Existing jobs will have been sent to the original server so they need to 1594 // Existing jobs will have been sent to the original server so they need to
1600 // be aborted. TODO(Craig): Should these jobs be restarted? 1595 // be aborted. TODO(Craig): Should these jobs be restarted?
1601 AbortAllInProgressJobs(); 1596 AbortAllInProgressJobs();
1602 // |this| may be deleted inside AbortAllInProgressJobs(). 1597 // |this| may be deleted inside AbortAllInProgressJobs().
1603 } 1598 }
1604 1599
1605 } // namespace net 1600 } // namespace net
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698