// Copyright (c) 2010 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "net/base/dns_reload_timer.h"
#if defined(OS_POSIX) && !defined(OS_MACOSX) && !defined(OS_OPENBSD)
#include "base/lazy_instance.h"
#include "base/threading/thread_local_storage.h"
#include "base/time.h"
namespace {
// On Linux/BSD, changes to /etc/resolv.conf can go unnoticed thus resulting
// in DNS queries failing either because nameservers are unknown on startup
// or because nameserver info has changed as a result of e.g. connecting to
// a new network. Some distributions patch glibc to stat /etc/resolv.conf
// to try to automatically detect such changes but these patches are not
// universal and even patched systems such as Jaunty appear to need calls
// to res_ninit to reload the nameserver information in different threads.
//
// We adopt the Mozilla solution here which is to call res_ninit when
// lookups fail and to rate limit the reloading to once per second per
// thread.
//
// OpenBSD does not have thread-safe res_ninit/res_nclose so we can't do
// the same trick there.
// Keep a timer per calling thread to rate limit the calling of res_ninit.
class DnsReloadTimer {
public:
// Check if the timer for the calling thread has expired. When no
// timer exists for the calling thread, create one.
bool Expired() {
const base::TimeDelta kRetryTime = base::TimeDelta::FromSeconds(1);
base::TimeTicks now = base::TimeTicks::Now();
base::TimeTicks* timer_ptr =
static_cast<base::TimeTicks*>(tls_index_.Get());
if (!timer_ptr) {
timer_ptr = new base::TimeTicks();
*timer_ptr = base::TimeTicks::Now();
tls_index_.Set(timer_ptr);
// Return true to reload dns info on the first call for each thread.
return true;
} else if (now - *timer_ptr > kRetryTime) {
*timer_ptr = now;
return true;
} else {
return false;
}
}
// Free the allocated timer.
static void SlotReturnFunction(void* data) {
base::TimeTicks* tls_data = static_cast<base::TimeTicks*>(data);
delete tls_data;
}
private:
friend struct base::DefaultLazyInstanceTraits<DnsReloadTimer>;
DnsReloadTimer() {
// During testing the DnsReloadTimer Singleton may be created and destroyed
// multiple times. Initialize the ThreadLocalStorage slot only once.
if (!tls_index_.initialized())
tls_index_.Initialize(SlotReturnFunction);
}
~DnsReloadTimer() {
}
// We use thread local storage to identify which base::TimeTicks to
// interact with.
static base::ThreadLocalStorage::Slot tls_index_ ;
DISALLOW_COPY_AND_ASSIGN(DnsReloadTimer);
};
// A TLS slot to the TimeTicks for the current thread.
// static
base::ThreadLocalStorage::Slot DnsReloadTimer::tls_index_(
base::LINKER_INITIALIZED);
base::LazyInstance<DnsReloadTimer,
base::LeakyLazyInstanceTraits<DnsReloadTimer> >
g_dns_reload_timer(base::LINKER_INITIALIZED);
} // namespace
namespace net {
bool DnsReloadTimerHasExpired() {
DnsReloadTimer* dns_timer = g_dns_reload_timer.Pointer();
return dns_timer->Expired();
}
} // namespace net
#endif // defined(OS_POSIX) && !defined(OS_MACOSX) && !defined(OS_OPENBSD)