cc: Added inline to Tile::IsReadyToDraw
[chromium-blink-merge.git] / net / base / network_change_notifier_win.cc
blobd53b346c440b75cef7bca97494d043eeaaabbf15
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "net/base/network_change_notifier_win.h"
7 #include <iphlpapi.h>
8 #include <winsock2.h>
10 #include "base/bind.h"
11 #include "base/logging.h"
12 #include "base/metrics/histogram.h"
13 #include "base/threading/thread.h"
14 #include "base/time/time.h"
15 #include "net/base/winsock_init.h"
16 #include "net/dns/dns_config_service.h"
18 #pragma comment(lib, "iphlpapi.lib")
20 namespace net {
22 namespace {
24 // Time between NotifyAddrChange retries, on failure.
25 const int kWatchForAddressChangeRetryIntervalMs = 500;
27 } // namespace
29 // Thread on which we can run DnsConfigService, which requires AssertIOAllowed
30 // to open registry keys and to handle FilePathWatcher updates.
31 class NetworkChangeNotifierWin::DnsConfigServiceThread : public base::Thread {
32 public:
33 DnsConfigServiceThread() : base::Thread("DnsConfigService") {}
35 virtual ~DnsConfigServiceThread() {
36 Stop();
39 virtual void Init() OVERRIDE {
40 service_ = DnsConfigService::CreateSystemService();
41 service_->WatchConfig(base::Bind(&NetworkChangeNotifier::SetDnsConfig));
44 virtual void CleanUp() OVERRIDE {
45 service_.reset();
48 private:
49 scoped_ptr<DnsConfigService> service_;
51 DISALLOW_COPY_AND_ASSIGN(DnsConfigServiceThread);
54 NetworkChangeNotifierWin::NetworkChangeNotifierWin()
55 : NetworkChangeNotifier(NetworkChangeCalculatorParamsWin()),
56 is_watching_(false),
57 sequential_failures_(0),
58 weak_factory_(this),
59 dns_config_service_thread_(new DnsConfigServiceThread()),
60 last_announced_offline_(IsOffline()) {
61 memset(&addr_overlapped_, 0, sizeof addr_overlapped_);
62 addr_overlapped_.hEvent = WSACreateEvent();
63 dns_config_service_thread_->StartWithOptions(
64 base::Thread::Options(base::MessageLoop::TYPE_IO, 0));
67 NetworkChangeNotifierWin::~NetworkChangeNotifierWin() {
68 if (is_watching_) {
69 CancelIPChangeNotify(&addr_overlapped_);
70 addr_watcher_.StopWatching();
72 WSACloseEvent(addr_overlapped_.hEvent);
75 // static
76 NetworkChangeNotifier::NetworkChangeCalculatorParams
77 NetworkChangeNotifierWin::NetworkChangeCalculatorParamsWin() {
78 NetworkChangeCalculatorParams params;
79 // Delay values arrived at by simple experimentation and adjusted so as to
80 // produce a single signal when switching between network connections.
81 params.ip_address_offline_delay_ = base::TimeDelta::FromMilliseconds(1500);
82 params.ip_address_online_delay_ = base::TimeDelta::FromMilliseconds(1500);
83 params.connection_type_offline_delay_ =
84 base::TimeDelta::FromMilliseconds(1500);
85 params.connection_type_online_delay_ = base::TimeDelta::FromMilliseconds(500);
86 return params;
89 // This implementation does not return the actual connection type but merely
90 // determines if the user is "online" (in which case it returns
91 // CONNECTION_UNKNOWN) or "offline" (and then it returns CONNECTION_NONE).
92 // This is challenging since the only thing we can test with certainty is
93 // whether a *particular* host is reachable.
95 // While we can't conclusively determine when a user is "online", we can at
96 // least reliably recognize some of the situtations when they are clearly
97 // "offline". For example, if the user's laptop is not plugged into an ethernet
98 // network and is not connected to any wireless networks, it must be offline.
100 // There are a number of different ways to implement this on Windows, each with
101 // their pros and cons. Here is a comparison of various techniques considered:
103 // (1) Use InternetGetConnectedState (wininet.dll). This function is really easy
104 // to use (literally a one-liner), and runs quickly. The drawback is it adds a
105 // dependency on the wininet DLL.
107 // (2) Enumerate all of the network interfaces using GetAdaptersAddresses
108 // (iphlpapi.dll), and assume we are "online" if there is at least one interface
109 // that is connected, and that interface is not a loopback or tunnel.
111 // Safari on Windows has a fairly simple implementation that does this:
112 // http://trac.webkit.org/browser/trunk/WebCore/platform/network/win/NetworkStateNotifierWin.cpp.
114 // Mozilla similarly uses this approach:
115 // http://mxr.mozilla.org/mozilla1.9.2/source/netwerk/system/win32/nsNotifyAddrListener.cpp
117 // The biggest drawback to this approach is it is quite complicated.
118 // WebKit's implementation for example doesn't seem to test for ICS gateways
119 // (internet connection sharing), whereas Mozilla's implementation has extra
120 // code to guess that.
122 // (3) The method used in this file comes from google talk, and is similar to
123 // method (2). The main difference is it enumerates the winsock namespace
124 // providers rather than the actual adapters.
126 // I ran some benchmarks comparing the performance of each on my Windows 7
127 // workstation. Here is what I found:
128 // * Approach (1) was pretty much zero-cost after the initial call.
129 // * Approach (2) took an average of 3.25 milliseconds to enumerate the
130 // adapters.
131 // * Approach (3) took an average of 0.8 ms to enumerate the providers.
133 // In terms of correctness, all three approaches were comparable for the simple
134 // experiments I ran... However none of them correctly returned "offline" when
135 // executing 'ipconfig /release'.
137 NetworkChangeNotifier::ConnectionType
138 NetworkChangeNotifierWin::GetCurrentConnectionType() const {
140 // TODO(eroman): We could cache this value, and only re-calculate it on
141 // network changes. For now we recompute it each time asked,
142 // since it is relatively fast (sub 1ms) and not called often.
144 EnsureWinsockInit();
146 // The following code was adapted from:
147 // http://src.chromium.org/viewvc/chrome/trunk/src/chrome/common/net/notifier/base/win/async_network_alive_win32.cc?view=markup&pathrev=47343
148 // The main difference is we only call WSALookupServiceNext once, whereas
149 // the earlier code would traverse the entire list and pass LUP_FLUSHPREVIOUS
150 // to skip past the large results.
152 HANDLE ws_handle;
153 WSAQUERYSET query_set = {0};
154 query_set.dwSize = sizeof(WSAQUERYSET);
155 query_set.dwNameSpace = NS_NLA;
156 // Initiate a client query to iterate through the
157 // currently connected networks.
158 if (0 != WSALookupServiceBegin(&query_set, LUP_RETURN_ALL,
159 &ws_handle)) {
160 LOG(ERROR) << "WSALookupServiceBegin failed with: " << WSAGetLastError();
161 return NetworkChangeNotifier::CONNECTION_UNKNOWN;
164 bool found_connection = false;
166 // Retrieve the first available network. In this function, we only
167 // need to know whether or not there is network connection.
168 // Allocate 256 bytes for name, it should be enough for most cases.
169 // If the name is longer, it is OK as we will check the code returned and
170 // set correct network status.
171 char result_buffer[sizeof(WSAQUERYSET) + 256] = {0};
172 DWORD length = sizeof(result_buffer);
173 reinterpret_cast<WSAQUERYSET*>(&result_buffer[0])->dwSize =
174 sizeof(WSAQUERYSET);
175 int result = WSALookupServiceNext(
176 ws_handle,
177 LUP_RETURN_NAME,
178 &length,
179 reinterpret_cast<WSAQUERYSET*>(&result_buffer[0]));
181 if (result == 0) {
182 // Found a connection!
183 found_connection = true;
184 } else {
185 DCHECK_EQ(SOCKET_ERROR, result);
186 result = WSAGetLastError();
188 // Error code WSAEFAULT means there is a network connection but the
189 // result_buffer size is too small to contain the results. The
190 // variable "length" returned from WSALookupServiceNext is the minimum
191 // number of bytes required. We do not need to retrieve detail info,
192 // it is enough knowing there was a connection.
193 if (result == WSAEFAULT) {
194 found_connection = true;
195 } else if (result == WSA_E_NO_MORE || result == WSAENOMORE) {
196 // There was nothing to iterate over!
197 } else {
198 LOG(WARNING) << "WSALookupServiceNext() failed with:" << result;
202 result = WSALookupServiceEnd(ws_handle);
203 LOG_IF(ERROR, result != 0)
204 << "WSALookupServiceEnd() failed with: " << result;
206 // TODO(droger): Return something more detailed than CONNECTION_UNKNOWN.
207 return found_connection ? NetworkChangeNotifier::CONNECTION_UNKNOWN :
208 NetworkChangeNotifier::CONNECTION_NONE;
211 void NetworkChangeNotifierWin::OnObjectSignaled(HANDLE object) {
212 DCHECK(CalledOnValidThread());
213 DCHECK(is_watching_);
214 is_watching_ = false;
216 // Start watching for the next address change.
217 WatchForAddressChange();
219 NotifyObservers();
222 void NetworkChangeNotifierWin::NotifyObservers() {
223 DCHECK(CalledOnValidThread());
224 NotifyObserversOfIPAddressChange();
226 // Calling GetConnectionType() at this very moment is likely to give
227 // the wrong result, so we delay that until a little bit later.
229 // The one second delay chosen here was determined experimentally
230 // by adamk on Windows 7.
231 // If after one second we determine we are still offline, we will
232 // delay again.
233 offline_polls_ = 0;
234 timer_.Start(FROM_HERE, base::TimeDelta::FromSeconds(1), this,
235 &NetworkChangeNotifierWin::NotifyParentOfConnectionTypeChange);
238 void NetworkChangeNotifierWin::WatchForAddressChange() {
239 DCHECK(CalledOnValidThread());
240 DCHECK(!is_watching_);
242 // NotifyAddrChange occasionally fails with ERROR_OPEN_FAILED for unknown
243 // reasons. More rarely, it's also been observed failing with
244 // ERROR_NO_SYSTEM_RESOURCES. When either of these happens, we retry later.
245 if (!WatchForAddressChangeInternal()) {
246 ++sequential_failures_;
248 // TODO(mmenke): If the UMA histograms indicate that this fixes
249 // http://crbug.com/69198, remove this histogram and consider reducing the
250 // retry interval.
251 if (sequential_failures_ == 2000) {
252 UMA_HISTOGRAM_COUNTS_10000("Net.NotifyAddrChangeFailures",
253 sequential_failures_);
256 base::MessageLoop::current()->PostDelayedTask(
257 FROM_HERE,
258 base::Bind(&NetworkChangeNotifierWin::WatchForAddressChange,
259 weak_factory_.GetWeakPtr()),
260 base::TimeDelta::FromMilliseconds(
261 kWatchForAddressChangeRetryIntervalMs));
262 return;
265 // Treat the transition from NotifyAddrChange failing to succeeding as a
266 // network change event, since network changes were not being observed in
267 // that interval.
268 if (sequential_failures_ > 0)
269 NotifyObservers();
271 if (sequential_failures_ < 2000) {
272 UMA_HISTOGRAM_COUNTS_10000("Net.NotifyAddrChangeFailures",
273 sequential_failures_);
276 is_watching_ = true;
277 sequential_failures_ = 0;
280 bool NetworkChangeNotifierWin::WatchForAddressChangeInternal() {
281 DCHECK(CalledOnValidThread());
282 HANDLE handle = NULL;
283 DWORD ret = NotifyAddrChange(&handle, &addr_overlapped_);
284 if (ret != ERROR_IO_PENDING)
285 return false;
287 addr_watcher_.StartWatching(addr_overlapped_.hEvent, this);
288 return true;
291 void NetworkChangeNotifierWin::NotifyParentOfConnectionTypeChange() {
292 bool current_offline = IsOffline();
293 offline_polls_++;
294 // If we continue to appear offline, delay sending out the notification in
295 // case we appear to go online within 20 seconds. UMA histogram data shows
296 // we may not detect the transition to online state after 1 second but within
297 // 20 seconds we generally do.
298 if (last_announced_offline_ && current_offline && offline_polls_ <= 20) {
299 timer_.Start(FROM_HERE, base::TimeDelta::FromSeconds(1), this,
300 &NetworkChangeNotifierWin::NotifyParentOfConnectionTypeChange);
301 return;
303 if (last_announced_offline_)
304 UMA_HISTOGRAM_CUSTOM_COUNTS("NCN.OfflinePolls", offline_polls_, 1, 50, 50);
305 last_announced_offline_ = current_offline;
307 NotifyObserversOfConnectionTypeChange();
310 } // namespace net