1 /* 2 * 3 * Copyright 2017 gRPC authors. 4 * 5 * Licensed under the Apache License, Version 2.0 (the "License"); 6 * you may not use this file except in compliance with the License. 7 * You may obtain a copy of the License at 8 * 9 * http://www.apache.org/licenses/LICENSE-2.0 10 * 11 * Unless required by applicable law or agreed to in writing, software 12 * distributed under the License is distributed on an "AS IS" BASIS, 13 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 14 * See the License for the specific language governing permissions and 15 * limitations under the License. 16 * 17 */ 18 19 #include <grpc/support/port_platform.h> 20 21 #include <grpc/grpc.h> 22 #include <grpc/support/alloc.h> 23 #include <grpc/support/log.h> 24 #include <grpc/support/string_util.h> 25 #include <grpc/support/sync.h> 26 #include <grpc/support/time.h> 27 28 #include <string.h> 29 30 #include <errno.h> 31 #include <fcntl.h> 32 #include <gflags/gflags.h> 33 #include <gmock/gmock.h> 34 #include <thread> 35 #include <vector> 36 37 #include "test/cpp/util/subprocess.h" 38 #include "test/cpp/util/test_config.h" 39 40 #include "src/core/ext/filters/client_channel/client_channel.h" 41 #include "src/core/ext/filters/client_channel/resolver.h" 42 #include "src/core/ext/filters/client_channel/resolver/dns/c_ares/grpc_ares_wrapper.h" 43 #include "src/core/ext/filters/client_channel/resolver_registry.h" 44 #include "src/core/lib/channel/channel_args.h" 45 #include "src/core/lib/gpr/env.h" 46 #include "src/core/lib/gpr/host_port.h" 47 #include "src/core/lib/gpr/string.h" 48 #include "src/core/lib/gprpp/orphanable.h" 49 #include "src/core/lib/iomgr/combiner.h" 50 #include "src/core/lib/iomgr/executor.h" 51 #include "src/core/lib/iomgr/iomgr.h" 52 #include "src/core/lib/iomgr/resolve_address.h" 53 #include "src/core/lib/iomgr/sockaddr_utils.h" 54 #include "test/core/util/port.h" 55 #include "test/core/util/test_config.h" 56 57 // TODO: pull in different headers when enabling this 58 // test on windows. Also set BAD_SOCKET_RETURN_VAL 59 // to INVALID_SOCKET on windows. 60 #ifdef GPR_WINDOWS 61 #include "src/core/lib/iomgr/sockaddr_windows.h" 62 #include "src/core/lib/iomgr/socket_windows.h" 63 #include "src/core/lib/iomgr/tcp_windows.h" 64 #define BAD_SOCKET_RETURN_VAL INVALID_SOCKET 65 #else 66 #include "src/core/lib/iomgr/sockaddr_posix.h" 67 #define BAD_SOCKET_RETURN_VAL -1 68 #endif 69 70 using grpc::SubProcess; 71 using std::vector; 72 using testing::UnorderedElementsAreArray; 73 74 // Hack copied from "test/cpp/end2end/server_crash_test_client.cc"! 75 // In some distros, gflags is in the namespace google, and in some others, 76 // in gflags. This hack is enabling us to find both. 77 namespace google {} 78 namespace gflags {} 79 using namespace google; 80 using namespace gflags; 81 82 DEFINE_string(target_name, "", "Target name to resolve."); 83 DEFINE_string(expected_addrs, "", 84 "List of expected backend or balancer addresses in the form " 85 "'<ip0:port0>,<is_balancer0>;<ip1:port1>,<is_balancer1>;...'. " 86 "'is_balancer' should be bool, i.e. true or false."); 87 DEFINE_string(expected_chosen_service_config, "", 88 "Expected service config json string that gets chosen (no " 89 "whitespace). Empty for none."); 90 DEFINE_string( 91 local_dns_server_address, "", 92 "Optional. This address is placed as the uri authority if present."); 93 DEFINE_string(expected_lb_policy, "", 94 "Expected lb policy name that appears in resolver result channel " 95 "arg. Empty for none."); 96 97 namespace { 98 99 class GrpcLBAddress final { 100 public: 101 GrpcLBAddress(std::string address, bool is_balancer) 102 : is_balancer(is_balancer), address(std::move(address)) {} 103 104 bool operator==(const GrpcLBAddress& other) const { 105 return this->is_balancer == other.is_balancer && 106 this->address == other.address; 107 } 108 109 bool operator!=(const GrpcLBAddress& other) const { 110 return !(*this == other); 111 } 112 113 bool is_balancer; 114 std::string address; 115 }; 116 117 vector<GrpcLBAddress> ParseExpectedAddrs(std::string expected_addrs) { 118 std::vector<GrpcLBAddress> out; 119 while (expected_addrs.size() != 0) { 120 // get the next <ip>,<port> (v4 or v6) 121 size_t next_comma = expected_addrs.find(','); 122 if (next_comma == std::string::npos) { 123 gpr_log(GPR_ERROR, 124 "Missing ','. Expected_addrs arg should be a semicolon-separated " 125 "list of <ip-port>,<bool> pairs. Left-to-be-parsed arg is |%s|", 126 expected_addrs.c_str()); 127 abort(); 128 } 129 std::string next_addr = expected_addrs.substr(0, next_comma); 130 expected_addrs = expected_addrs.substr(next_comma + 1, std::string::npos); 131 // get the next is_balancer 'bool' associated with this address 132 size_t next_semicolon = expected_addrs.find(';'); 133 bool is_balancer = 134 gpr_is_true(expected_addrs.substr(0, next_semicolon).c_str()); 135 out.emplace_back(GrpcLBAddress(next_addr, is_balancer)); 136 if (next_semicolon == std::string::npos) { 137 break; 138 } 139 expected_addrs = 140 expected_addrs.substr(next_semicolon + 1, std::string::npos); 141 } 142 if (out.size() == 0) { 143 gpr_log(GPR_ERROR, 144 "expected_addrs arg should be a semicolon-separated list of " 145 "<ip-port>,<bool> pairs"); 146 abort(); 147 } 148 return out; 149 } 150 151 gpr_timespec TestDeadline(void) { 152 return grpc_timeout_seconds_to_deadline(100); 153 } 154 155 struct ArgsStruct { 156 gpr_event ev; 157 gpr_atm done_atm; 158 gpr_mu* mu; 159 grpc_pollset* pollset; 160 grpc_pollset_set* pollset_set; 161 grpc_combiner* lock; 162 grpc_channel_args* channel_args; 163 vector<GrpcLBAddress> expected_addrs; 164 std::string expected_service_config_string; 165 std::string expected_lb_policy; 166 }; 167 168 void ArgsInit(ArgsStruct* args) { 169 gpr_event_init(&args->ev); 170 args->pollset = (grpc_pollset*)gpr_zalloc(grpc_pollset_size()); 171 grpc_pollset_init(args->pollset, &args->mu); 172 args->pollset_set = grpc_pollset_set_create(); 173 grpc_pollset_set_add_pollset(args->pollset_set, args->pollset); 174 args->lock = grpc_combiner_create(); 175 gpr_atm_rel_store(&args->done_atm, 0); 176 args->channel_args = nullptr; 177 } 178 179 void DoNothing(void* arg, grpc_error* error) {} 180 181 void ArgsFinish(ArgsStruct* args) { 182 GPR_ASSERT(gpr_event_wait(&args->ev, TestDeadline())); 183 grpc_pollset_set_del_pollset(args->pollset_set, args->pollset); 184 grpc_pollset_set_destroy(args->pollset_set); 185 grpc_closure DoNothing_cb; 186 GRPC_CLOSURE_INIT(&DoNothing_cb, DoNothing, nullptr, 187 grpc_schedule_on_exec_ctx); 188 grpc_pollset_shutdown(args->pollset, &DoNothing_cb); 189 // exec_ctx needs to be flushed before calling grpc_pollset_destroy() 190 grpc_channel_args_destroy(args->channel_args); 191 grpc_core::ExecCtx::Get()->Flush(); 192 grpc_pollset_destroy(args->pollset); 193 gpr_free(args->pollset); 194 GRPC_COMBINER_UNREF(args->lock, nullptr); 195 } 196 197 gpr_timespec NSecondDeadline(int seconds) { 198 return gpr_time_add(gpr_now(GPR_CLOCK_REALTIME), 199 gpr_time_from_seconds(seconds, GPR_TIMESPAN)); 200 } 201 202 void PollPollsetUntilRequestDone(ArgsStruct* args) { 203 gpr_timespec deadline = NSecondDeadline(10); 204 while (true) { 205 bool done = gpr_atm_acq_load(&args->done_atm) != 0; 206 if (done) { 207 break; 208 } 209 gpr_timespec time_left = 210 gpr_time_sub(deadline, gpr_now(GPR_CLOCK_REALTIME)); 211 gpr_log(GPR_DEBUG, "done=%d, time_left=%" PRId64 ".%09d", done, 212 time_left.tv_sec, time_left.tv_nsec); 213 GPR_ASSERT(gpr_time_cmp(time_left, gpr_time_0(GPR_TIMESPAN)) >= 0); 214 grpc_pollset_worker* worker = nullptr; 215 grpc_core::ExecCtx exec_ctx; 216 gpr_mu_lock(args->mu); 217 GRPC_LOG_IF_ERROR("pollset_work", 218 grpc_pollset_work(args->pollset, &worker, 219 grpc_timespec_to_millis_round_up( 220 NSecondDeadline(1)))); 221 gpr_mu_unlock(args->mu); 222 } 223 gpr_event_set(&args->ev, (void*)1); 224 } 225 226 void CheckServiceConfigResultLocked(grpc_channel_args* channel_args, 227 ArgsStruct* args) { 228 const grpc_arg* service_config_arg = 229 grpc_channel_args_find(channel_args, GRPC_ARG_SERVICE_CONFIG); 230 if (args->expected_service_config_string != "") { 231 GPR_ASSERT(service_config_arg != nullptr); 232 GPR_ASSERT(service_config_arg->type == GRPC_ARG_STRING); 233 EXPECT_EQ(service_config_arg->value.string, 234 args->expected_service_config_string); 235 } else { 236 GPR_ASSERT(service_config_arg == nullptr); 237 } 238 } 239 240 void CheckLBPolicyResultLocked(grpc_channel_args* channel_args, 241 ArgsStruct* args) { 242 const grpc_arg* lb_policy_arg = 243 grpc_channel_args_find(channel_args, GRPC_ARG_LB_POLICY_NAME); 244 if (args->expected_lb_policy != "") { 245 GPR_ASSERT(lb_policy_arg != nullptr); 246 GPR_ASSERT(lb_policy_arg->type == GRPC_ARG_STRING); 247 EXPECT_EQ(lb_policy_arg->value.string, args->expected_lb_policy); 248 } else { 249 GPR_ASSERT(lb_policy_arg == nullptr); 250 } 251 } 252 253 #ifdef GPR_WINDOWS 254 void OpenAndCloseSocketsStressLoop(int dummy_port, gpr_event* done_ev) { 255 sockaddr_in6 addr; 256 memset(&addr, 0, sizeof(addr)); 257 addr.sin6_family = AF_INET6; 258 addr.sin6_port = htons(dummy_port); 259 ((char*)&addr.sin6_addr)[15] = 1; 260 for (;;) { 261 if (gpr_event_get(done_ev)) { 262 return; 263 } 264 std::vector<int> sockets; 265 for (size_t i = 0; i < 50; i++) { 266 SOCKET s = WSASocket(AF_INET6, SOCK_STREAM, IPPROTO_TCP, nullptr, 0, 267 WSA_FLAG_OVERLAPPED); 268 ASSERT_TRUE(s != BAD_SOCKET_RETURN_VAL) 269 << "Failed to create TCP ipv6 socket"; 270 gpr_log(GPR_DEBUG, "Opened socket: %d", s); 271 char val = 1; 272 ASSERT_TRUE(setsockopt(s, SOL_SOCKET, SO_REUSEADDR, &val, sizeof(val)) != 273 SOCKET_ERROR) 274 << "Failed to set socketopt reuseaddr. WSA error: " + 275 std::to_string(WSAGetLastError()); 276 ASSERT_TRUE(grpc_tcp_set_non_block(s) == GRPC_ERROR_NONE) 277 << "Failed to set socket non-blocking"; 278 ASSERT_TRUE(bind(s, (const sockaddr*)&addr, sizeof(addr)) != SOCKET_ERROR) 279 << "Failed to bind socket " + std::to_string(s) + 280 " to [::1]:" + std::to_string(dummy_port) + 281 ". WSA error: " + std::to_string(WSAGetLastError()); 282 ASSERT_TRUE(listen(s, 1) != SOCKET_ERROR) 283 << "Failed to listen on socket " + std::to_string(s) + 284 ". WSA error: " + std::to_string(WSAGetLastError()); 285 sockets.push_back(s); 286 } 287 // Do a non-blocking accept followed by a close on all of those sockets. 288 // Do this in a separate loop to try to induce a time window to hit races. 289 for (size_t i = 0; i < sockets.size(); i++) { 290 gpr_log(GPR_DEBUG, "non-blocking accept then close on %d", sockets[i]); 291 ASSERT_TRUE(accept(sockets[i], nullptr, nullptr) == INVALID_SOCKET) 292 << "Accept on dummy socket unexpectedly accepted actual connection."; 293 ASSERT_TRUE(WSAGetLastError() == WSAEWOULDBLOCK) 294 << "OpenAndCloseSocketsStressLoop accept on socket " + 295 std::to_string(sockets[i]) + 296 " failed in " 297 "an unexpected way. " 298 "WSA error: " + 299 std::to_string(WSAGetLastError()) + 300 ". Socket use-after-close bugs are likely."; 301 ASSERT_TRUE(closesocket(sockets[i]) != SOCKET_ERROR) 302 << "Failed to close socket: " + std::to_string(sockets[i]) + 303 ". WSA error: " + std::to_string(WSAGetLastError()); 304 } 305 } 306 return; 307 } 308 #else 309 void OpenAndCloseSocketsStressLoop(int dummy_port, gpr_event* done_ev) { 310 // The goal of this loop is to catch socket 311 // "use after close" bugs within the c-ares resolver by acting 312 // like some separate thread doing I/O. 313 // It's goal is to try to hit race conditions whereby: 314 // 1) The c-ares resolver closes a socket. 315 // 2) This loop opens a socket with (coincidentally) the same handle. 316 // 3) the c-ares resolver mistakenly uses that same socket without 317 // realizing that its closed. 318 // 4) This loop performs an operation on that socket that should 319 // succeed but instead fails because of what the c-ares 320 // resolver did in the meantime. 321 sockaddr_in6 addr; 322 memset(&addr, 0, sizeof(addr)); 323 addr.sin6_family = AF_INET6; 324 addr.sin6_port = htons(dummy_port); 325 ((char*)&addr.sin6_addr)[15] = 1; 326 for (;;) { 327 if (gpr_event_get(done_ev)) { 328 return; 329 } 330 std::vector<int> sockets; 331 // First open a bunch of sockets, bind and listen 332 // '50' is an arbitrary number that, experimentally, 333 // has a good chance of catching bugs. 334 for (size_t i = 0; i < 50; i++) { 335 int s = socket(AF_INET6, SOCK_STREAM, 0); 336 int val = 1; 337 ASSERT_TRUE(setsockopt(s, SOL_SOCKET, SO_REUSEPORT, &val, sizeof(val)) == 338 0) 339 << "Failed to set socketopt reuseport"; 340 ASSERT_TRUE(setsockopt(s, SOL_SOCKET, SO_REUSEADDR, &val, sizeof(val)) == 341 0) 342 << "Failed to set socket reuseaddr"; 343 ASSERT_TRUE(fcntl(s, F_SETFL, O_NONBLOCK) == 0) 344 << "Failed to set socket non-blocking"; 345 ASSERT_TRUE(s != BAD_SOCKET_RETURN_VAL) 346 << "Failed to create TCP ipv6 socket"; 347 gpr_log(GPR_DEBUG, "Opened fd: %d", s); 348 ASSERT_TRUE(bind(s, (const sockaddr*)&addr, sizeof(addr)) == 0) 349 << "Failed to bind socket " + std::to_string(s) + 350 " to [::1]:" + std::to_string(dummy_port) + 351 ". errno: " + std::to_string(errno); 352 ASSERT_TRUE(listen(s, 1) == 0) << "Failed to listen on socket " + 353 std::to_string(s) + 354 ". errno: " + std::to_string(errno); 355 sockets.push_back(s); 356 } 357 // Do a non-blocking accept followed by a close on all of those sockets. 358 // Do this in a separate loop to try to induce a time window to hit races. 359 for (size_t i = 0; i < sockets.size(); i++) { 360 gpr_log(GPR_DEBUG, "non-blocking accept then close on %d", sockets[i]); 361 if (accept(sockets[i], nullptr, nullptr)) { 362 // If e.g. a "shutdown" was called on this fd from another thread, 363 // then this accept call should fail with an unexpected error. 364 ASSERT_TRUE(errno == EAGAIN || errno == EWOULDBLOCK) 365 << "OpenAndCloseSocketsStressLoop accept on socket " + 366 std::to_string(sockets[i]) + 367 " failed in " 368 "an unexpected way. " 369 "errno: " + 370 std::to_string(errno) + 371 ". Socket use-after-close bugs are likely."; 372 } 373 ASSERT_TRUE(close(sockets[i]) == 0) 374 << "Failed to close socket: " + std::to_string(sockets[i]) + 375 ". errno: " + std::to_string(errno); 376 } 377 } 378 } 379 #endif 380 381 void CheckResolverResultLocked(void* argsp, grpc_error* err) { 382 EXPECT_EQ(err, GRPC_ERROR_NONE); 383 ArgsStruct* args = (ArgsStruct*)argsp; 384 grpc_channel_args* channel_args = args->channel_args; 385 const grpc_arg* channel_arg = 386 grpc_channel_args_find(channel_args, GRPC_ARG_LB_ADDRESSES); 387 GPR_ASSERT(channel_arg != nullptr); 388 GPR_ASSERT(channel_arg->type == GRPC_ARG_POINTER); 389 grpc_lb_addresses* addresses = 390 (grpc_lb_addresses*)channel_arg->value.pointer.p; 391 gpr_log(GPR_INFO, "num addrs found: %" PRIdPTR ". expected %" PRIdPTR, 392 addresses->num_addresses, args->expected_addrs.size()); 393 GPR_ASSERT(addresses->num_addresses == args->expected_addrs.size()); 394 std::vector<GrpcLBAddress> found_lb_addrs; 395 for (size_t i = 0; i < addresses->num_addresses; i++) { 396 grpc_lb_address addr = addresses->addresses[i]; 397 char* str; 398 grpc_sockaddr_to_string(&str, &addr.address, 1 /* normalize */); 399 gpr_log(GPR_INFO, "%s", str); 400 found_lb_addrs.emplace_back( 401 GrpcLBAddress(std::string(str), addr.is_balancer)); 402 gpr_free(str); 403 } 404 if (args->expected_addrs.size() != found_lb_addrs.size()) { 405 gpr_log(GPR_DEBUG, 406 "found lb addrs size is: %" PRIdPTR 407 ". expected addrs size is %" PRIdPTR, 408 found_lb_addrs.size(), args->expected_addrs.size()); 409 abort(); 410 } 411 EXPECT_THAT(args->expected_addrs, UnorderedElementsAreArray(found_lb_addrs)); 412 CheckServiceConfigResultLocked(channel_args, args); 413 if (args->expected_service_config_string == "") { 414 CheckLBPolicyResultLocked(channel_args, args); 415 } 416 gpr_atm_rel_store(&args->done_atm, 1); 417 gpr_mu_lock(args->mu); 418 GRPC_LOG_IF_ERROR("pollset_kick", grpc_pollset_kick(args->pollset, nullptr)); 419 gpr_mu_unlock(args->mu); 420 } 421 422 void CheckResolvedWithoutErrorLocked(void* argsp, grpc_error* err) { 423 EXPECT_EQ(err, GRPC_ERROR_NONE); 424 ArgsStruct* args = (ArgsStruct*)argsp; 425 gpr_atm_rel_store(&args->done_atm, 1); 426 gpr_mu_lock(args->mu); 427 GRPC_LOG_IF_ERROR("pollset_kick", grpc_pollset_kick(args->pollset, nullptr)); 428 gpr_mu_unlock(args->mu); 429 } 430 431 void RunResolvesRelevantRecordsTest(void (*OnDoneLocked)(void* arg, 432 grpc_error* error)) { 433 grpc_core::ExecCtx exec_ctx; 434 ArgsStruct args; 435 ArgsInit(&args); 436 args.expected_addrs = ParseExpectedAddrs(FLAGS_expected_addrs); 437 args.expected_service_config_string = FLAGS_expected_chosen_service_config; 438 args.expected_lb_policy = FLAGS_expected_lb_policy; 439 // maybe build the address with an authority 440 char* whole_uri = nullptr; 441 GPR_ASSERT(gpr_asprintf(&whole_uri, "dns://%s/%s", 442 FLAGS_local_dns_server_address.c_str(), 443 FLAGS_target_name.c_str())); 444 // create resolver and resolve 445 grpc_core::OrphanablePtr<grpc_core::Resolver> resolver = 446 grpc_core::ResolverRegistry::CreateResolver(whole_uri, nullptr, 447 args.pollset_set, args.lock); 448 gpr_free(whole_uri); 449 grpc_closure on_resolver_result_changed; 450 GRPC_CLOSURE_INIT(&on_resolver_result_changed, OnDoneLocked, (void*)&args, 451 grpc_combiner_scheduler(args.lock)); 452 resolver->NextLocked(&args.channel_args, &on_resolver_result_changed); 453 grpc_core::ExecCtx::Get()->Flush(); 454 PollPollsetUntilRequestDone(&args); 455 ArgsFinish(&args); 456 } 457 458 TEST(ResolverComponentTest, TestResolvesRelevantRecords) { 459 RunResolvesRelevantRecordsTest(CheckResolverResultLocked); 460 } 461 462 TEST(ResolverComponentTest, TestResolvesRelevantRecordsWithConcurrentFdStress) { 463 // Start up background stress thread 464 int dummy_port = grpc_pick_unused_port_or_die(); 465 gpr_event done_ev; 466 gpr_event_init(&done_ev); 467 std::thread socket_stress_thread(OpenAndCloseSocketsStressLoop, dummy_port, 468 &done_ev); 469 // Run the resolver test 470 RunResolvesRelevantRecordsTest(CheckResolvedWithoutErrorLocked); 471 // Shutdown and join stress thread 472 gpr_event_set(&done_ev, (void*)1); 473 socket_stress_thread.join(); 474 } 475 476 } // namespace 477 478 int main(int argc, char** argv) { 479 grpc_init(); 480 grpc_test_init(argc, argv); 481 ::testing::InitGoogleTest(&argc, argv); 482 ParseCommandLineFlags(&argc, &argv, true); 483 if (FLAGS_target_name == "") { 484 gpr_log(GPR_ERROR, "Missing target_name param."); 485 abort(); 486 } 487 if (FLAGS_local_dns_server_address != "") { 488 gpr_log(GPR_INFO, "Specifying authority in uris to: %s", 489 FLAGS_local_dns_server_address.c_str()); 490 } 491 auto result = RUN_ALL_TESTS(); 492 grpc_shutdown(); 493 return result; 494 } 495