OLD | NEW |
| (Empty) |
1 // Copyright (c) 2010 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "net/base/dns_reload_timer.h" | |
6 | |
7 #if defined(OS_POSIX) && !defined(OS_MACOSX) && !defined(OS_OPENBSD) | |
8 #include "base/lazy_instance.h" | |
9 #include "base/threading/thread_local_storage.h" | |
10 #include "base/time.h" | |
11 | |
12 namespace { | |
13 | |
14 // On Linux/BSD, changes to /etc/resolv.conf can go unnoticed thus resulting | |
15 // in DNS queries failing either because nameservers are unknown on startup | |
16 // or because nameserver info has changed as a result of e.g. connecting to | |
17 // a new network. Some distributions patch glibc to stat /etc/resolv.conf | |
18 // to try to automatically detect such changes but these patches are not | |
19 // universal and even patched systems such as Jaunty appear to need calls | |
20 // to res_ninit to reload the nameserver information in different threads. | |
21 // | |
22 // We adopt the Mozilla solution here which is to call res_ninit when | |
23 // lookups fail and to rate limit the reloading to once per second per | |
24 // thread. | |
25 // | |
26 // OpenBSD does not have thread-safe res_ninit/res_nclose so we can't do | |
27 // the same trick there. | |
28 | |
29 // Keep a timer per calling thread to rate limit the calling of res_ninit. | |
30 class DnsReloadTimer { | |
31 public: | |
32 // Check if the timer for the calling thread has expired. When no | |
33 // timer exists for the calling thread, create one. | |
34 bool Expired() { | |
35 const base::TimeDelta kRetryTime = base::TimeDelta::FromSeconds(1); | |
36 base::TimeTicks now = base::TimeTicks::Now(); | |
37 base::TimeTicks* timer_ptr = | |
38 static_cast<base::TimeTicks*>(tls_index_.Get()); | |
39 | |
40 if (!timer_ptr) { | |
41 timer_ptr = new base::TimeTicks(); | |
42 *timer_ptr = base::TimeTicks::Now(); | |
43 tls_index_.Set(timer_ptr); | |
44 // Return true to reload dns info on the first call for each thread. | |
45 return true; | |
46 } else if (now - *timer_ptr > kRetryTime) { | |
47 *timer_ptr = now; | |
48 return true; | |
49 } else { | |
50 return false; | |
51 } | |
52 } | |
53 | |
54 // Free the allocated timer. | |
55 static void SlotReturnFunction(void* data) { | |
56 base::TimeTicks* tls_data = static_cast<base::TimeTicks*>(data); | |
57 delete tls_data; | |
58 } | |
59 | |
60 private: | |
61 friend struct base::DefaultLazyInstanceTraits<DnsReloadTimer>; | |
62 | |
63 DnsReloadTimer() { | |
64 // During testing the DnsReloadTimer Singleton may be created and destroyed | |
65 // multiple times. Initialize the ThreadLocalStorage slot only once. | |
66 if (!tls_index_.initialized()) | |
67 tls_index_.Initialize(SlotReturnFunction); | |
68 } | |
69 | |
70 ~DnsReloadTimer() { | |
71 } | |
72 | |
73 // We use thread local storage to identify which base::TimeTicks to | |
74 // interact with. | |
75 static base::ThreadLocalStorage::Slot tls_index_ ; | |
76 | |
77 DISALLOW_COPY_AND_ASSIGN(DnsReloadTimer); | |
78 }; | |
79 | |
80 // A TLS slot to the TimeTicks for the current thread. | |
81 // static | |
82 base::ThreadLocalStorage::Slot DnsReloadTimer::tls_index_( | |
83 base::LINKER_INITIALIZED); | |
84 | |
85 base::LazyInstance<DnsReloadTimer, | |
86 base::LeakyLazyInstanceTraits<DnsReloadTimer> > | |
87 g_dns_reload_timer(base::LINKER_INITIALIZED); | |
88 | |
89 } // namespace | |
90 | |
91 namespace net { | |
92 | |
93 bool DnsReloadTimerHasExpired() { | |
94 DnsReloadTimer* dns_timer = g_dns_reload_timer.Pointer(); | |
95 return dns_timer->Expired(); | |
96 } | |
97 | |
98 } // namespace net | |
99 | |
100 #endif // defined(OS_POSIX) && !defined(OS_MACOSX) && !defined(OS_OPENBSD) | |
OLD | NEW |