| // Copyright (c) 2010 The Chromium Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include "net/base/host_resolver_proc.h" |
| |
| #include "build/build_config.h" |
| |
| #if defined(OS_POSIX) && !defined(OS_MACOSX) |
| #include <resolv.h> |
| #endif |
| |
| #include "base/logging.h" |
| #include "base/time.h" |
| #include "net/base/address_list.h" |
| #include "net/base/net_errors.h" |
| #include "net/base/sys_addrinfo.h" |
| |
| #if defined(OS_POSIX) && !defined(OS_MACOSX) |
| #include "base/singleton.h" |
| #include "base/thread_local_storage.h" |
| #endif |
| |
| namespace net { |
| |
| HostResolverProc* HostResolverProc::default_proc_ = NULL; |
| |
| HostResolverProc::HostResolverProc(HostResolverProc* previous) { |
| SetPreviousProc(previous); |
| |
| // Implicitly fall-back to the global default procedure. |
| if (!previous) |
| SetPreviousProc(default_proc_); |
| } |
| |
| void HostResolverProc::SetPreviousProc(HostResolverProc* proc) { |
| HostResolverProc* current_previous = previous_proc_; |
| previous_proc_ = NULL; |
| // Now that we've guaranteed |this| is the last proc in a chain, we can |
| // detect potential cycles using GetLastProc(). |
| previous_proc_ = (GetLastProc(proc) == this) ? current_previous : proc; |
| } |
| |
| void HostResolverProc::SetLastProc(HostResolverProc* proc) { |
| GetLastProc(this)->SetPreviousProc(proc); |
| } |
| |
| // static |
| HostResolverProc* HostResolverProc::GetLastProc(HostResolverProc* proc) { |
| if (proc == NULL) |
| return NULL; |
| HostResolverProc* last_proc = proc; |
| while (last_proc->previous_proc_ != NULL) |
| last_proc = last_proc->previous_proc_; |
| return last_proc; |
| } |
| |
| // static |
| HostResolverProc* HostResolverProc::SetDefault(HostResolverProc* proc) { |
| HostResolverProc* old = default_proc_; |
| default_proc_ = proc; |
| return old; |
| } |
| |
| // static |
| HostResolverProc* HostResolverProc::GetDefault() { |
| return default_proc_; |
| } |
| |
| int HostResolverProc::ResolveUsingPrevious(const std::string& host, |
| AddressFamily address_family, |
| AddressList* addrlist) { |
| if (previous_proc_) |
| return previous_proc_->Resolve(host, address_family, addrlist); |
| |
| // Final fallback is the system resolver. |
| return SystemHostResolverProc(host, address_family, addrlist); |
| } |
| |
| #if defined(OS_POSIX) && !defined(OS_MACOSX) && !defined(OS_OPENBSD) |
| // On Linux/BSD, changes to /etc/resolv.conf can go unnoticed thus resulting |
| // in DNS queries failing either because nameservers are unknown on startup |
| // or because nameserver info has changed as a result of e.g. connecting to |
| // a new network. Some distributions patch glibc to stat /etc/resolv.conf |
| // to try to automatically detect such changes but these patches are not |
| // universal and even patched systems such as Jaunty appear to need calls |
| // to res_ninit to reload the nameserver information in different threads. |
| // |
| // We adopt the Mozilla solution here which is to call res_ninit when |
| // lookups fail and to rate limit the reloading to once per second per |
| // thread. |
| // |
| // OpenBSD does not have thread-safe res_ninit/res_nclose so we can't do |
| // the same trick there. |
| |
| // Keep a timer per calling thread to rate limit the calling of res_ninit. |
| class DnsReloadTimer { |
| public: |
| // Check if the timer for the calling thread has expired. When no |
| // timer exists for the calling thread, create one. |
| bool Expired() { |
| const base::TimeDelta kRetryTime = base::TimeDelta::FromSeconds(1); |
| base::TimeTicks now = base::TimeTicks::Now(); |
| base::TimeTicks* timer_ptr = |
| static_cast<base::TimeTicks*>(tls_index_.Get()); |
| |
| if (!timer_ptr) { |
| timer_ptr = new base::TimeTicks(); |
| *timer_ptr = base::TimeTicks::Now(); |
| tls_index_.Set(timer_ptr); |
| // Return true to reload dns info on the first call for each thread. |
| return true; |
| } else if (now - *timer_ptr > kRetryTime) { |
| *timer_ptr = now; |
| return true; |
| } else { |
| return false; |
| } |
| } |
| |
| // Free the allocated timer. |
| static void SlotReturnFunction(void* data) { |
| base::TimeTicks* tls_data = static_cast<base::TimeTicks*>(data); |
| delete tls_data; |
| } |
| |
| private: |
| friend struct DefaultSingletonTraits<DnsReloadTimer>; |
| |
| DnsReloadTimer() { |
| // During testing the DnsReloadTimer Singleton may be created and destroyed |
| // multiple times. Initialize the ThreadLocalStorage slot only once. |
| if (!tls_index_.initialized()) |
| tls_index_.Initialize(SlotReturnFunction); |
| } |
| |
| ~DnsReloadTimer() { |
| } |
| |
| // We use thread local storage to identify which base::TimeTicks to |
| // interact with. |
| static ThreadLocalStorage::Slot tls_index_ ; |
| |
| DISALLOW_COPY_AND_ASSIGN(DnsReloadTimer); |
| }; |
| |
| // A TLS slot to the TimeTicks for the current thread. |
| // static |
| ThreadLocalStorage::Slot DnsReloadTimer::tls_index_(base::LINKER_INITIALIZED); |
| |
| #endif // defined(OS_POSIX) && !defined(OS_MACOSX) && !defined(OS_OPENBSD) |
| |
| int SystemHostResolverProc(const std::string& host, |
| AddressFamily address_family, |
| AddressList* addrlist) { |
| // The result of |getaddrinfo| for empty hosts is inconsistent across systems. |
| // On Windows it gives the default interface's address, whereas on Linux it |
| // gives an error. We will make it fail on all platforms for consistency. |
| if (host.empty()) |
| return ERR_NAME_NOT_RESOLVED; |
| |
| struct addrinfo* ai = NULL; |
| struct addrinfo hints = {0}; |
| |
| switch (address_family) { |
| case ADDRESS_FAMILY_IPV4: |
| hints.ai_family = AF_INET; |
| break; |
| case ADDRESS_FAMILY_IPV6: |
| hints.ai_family = AF_INET6; |
| break; |
| case ADDRESS_FAMILY_UNSPECIFIED: |
| hints.ai_family = AF_UNSPEC; |
| break; |
| default: |
| NOTREACHED(); |
| hints.ai_family = AF_UNSPEC; |
| } |
| |
| #if defined(OS_WIN) || defined(OS_OPENBSD) |
| // DO NOT USE AI_ADDRCONFIG ON WINDOWS. |
| // |
| // The following comment in <winsock2.h> is the best documentation I found |
| // on AI_ADDRCONFIG for Windows: |
| // Flags used in "hints" argument to getaddrinfo() |
| // - AI_ADDRCONFIG is supported starting with Vista |
| // - default is AI_ADDRCONFIG ON whether the flag is set or not |
| // because the performance penalty in not having ADDRCONFIG in |
| // the multi-protocol stack environment is severe; |
| // this defaulting may be disabled by specifying the AI_ALL flag, |
| // in that case AI_ADDRCONFIG must be EXPLICITLY specified to |
| // enable ADDRCONFIG behavior |
| // |
| // Not only is AI_ADDRCONFIG unnecessary, but it can be harmful. If the |
| // computer is not connected to a network, AI_ADDRCONFIG causes getaddrinfo |
| // to fail with WSANO_DATA (11004) for "localhost", probably because of the |
| // following note on AI_ADDRCONFIG in the MSDN getaddrinfo page: |
| // The IPv4 or IPv6 loopback address is not considered a valid global |
| // address. |
| // See http://crbug.com/5234. |
| // |
| // OpenBSD does not support it, either. |
| hints.ai_flags = 0; |
| #else |
| hints.ai_flags = AI_ADDRCONFIG; |
| #endif |
| |
| // Restrict result set to only this socket type to avoid duplicates. |
| hints.ai_socktype = SOCK_STREAM; |
| |
| int err = getaddrinfo(host.c_str(), NULL, &hints, &ai); |
| #if defined(OS_POSIX) && !defined(OS_MACOSX) && !defined(OS_OPENBSD) |
| net::DnsReloadTimer* dns_timer = Singleton<net::DnsReloadTimer>::get(); |
| // If we fail, re-initialise the resolver just in case there have been any |
| // changes to /etc/resolv.conf and retry. See http://crbug.com/11380 for info. |
| if (err && dns_timer->Expired()) { |
| res_nclose(&_res); |
| if (!res_ninit(&_res)) |
| err = getaddrinfo(host.c_str(), NULL, &hints, &ai); |
| } |
| #endif |
| |
| if (err) |
| return ERR_NAME_NOT_RESOLVED; |
| |
| addrlist->Adopt(ai); |
| return OK; |
| } |
| |
| } // namespace net |