// Copyright (c) 2010 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "net/base/dns_reload_timer.h" #if defined(OS_POSIX) && !defined(OS_MACOSX) && !defined(OS_OPENBSD) #include "base/lazy_instance.h" #include "base/threading/thread_local_storage.h" #include "base/time.h" namespace { // On Linux/BSD, changes to /etc/resolv.conf can go unnoticed thus resulting // in DNS queries failing either because nameservers are unknown on startup // or because nameserver info has changed as a result of e.g. connecting to // a new network. Some distributions patch glibc to stat /etc/resolv.conf // to try to automatically detect such changes but these patches are not // universal and even patched systems such as Jaunty appear to need calls // to res_ninit to reload the nameserver information in different threads. // // We adopt the Mozilla solution here which is to call res_ninit when // lookups fail and to rate limit the reloading to once per second per // thread. // // OpenBSD does not have thread-safe res_ninit/res_nclose so we can't do // the same trick there. // Keep a timer per calling thread to rate limit the calling of res_ninit. class DnsReloadTimer { public: // Check if the timer for the calling thread has expired. When no // timer exists for the calling thread, create one. bool Expired() { const base::TimeDelta kRetryTime = base::TimeDelta::FromSeconds(1); base::TimeTicks now = base::TimeTicks::Now(); base::TimeTicks* timer_ptr = static_cast<base::TimeTicks*>(tls_index_.Get()); if (!timer_ptr) { timer_ptr = new base::TimeTicks(); *timer_ptr = base::TimeTicks::Now(); tls_index_.Set(timer_ptr); // Return true to reload dns info on the first call for each thread. return true; } else if (now - *timer_ptr > kRetryTime) { *timer_ptr = now; return true; } else { return false; } } // Free the allocated timer. static void SlotReturnFunction(void* data) { base::TimeTicks* tls_data = static_cast<base::TimeTicks*>(data); delete tls_data; } private: friend struct base::DefaultLazyInstanceTraits<DnsReloadTimer>; DnsReloadTimer() { // During testing the DnsReloadTimer Singleton may be created and destroyed // multiple times. Initialize the ThreadLocalStorage slot only once. if (!tls_index_.initialized()) tls_index_.Initialize(SlotReturnFunction); } ~DnsReloadTimer() { } // We use thread local storage to identify which base::TimeTicks to // interact with. static base::ThreadLocalStorage::Slot tls_index_ ; DISALLOW_COPY_AND_ASSIGN(DnsReloadTimer); }; // A TLS slot to the TimeTicks for the current thread. // static base::ThreadLocalStorage::Slot DnsReloadTimer::tls_index_( base::LINKER_INITIALIZED); base::LazyInstance<DnsReloadTimer, base::LeakyLazyInstanceTraits<DnsReloadTimer> > g_dns_reload_timer(base::LINKER_INITIALIZED); } // namespace namespace net { bool DnsReloadTimerHasExpired() { DnsReloadTimer* dns_timer = g_dns_reload_timer.Pointer(); return dns_timer->Expired(); } } // namespace net #endif // defined(OS_POSIX) && !defined(OS_MACOSX) && !defined(OS_OPENBSD)