@ -18,20 +18,44 @@
# include <algorithm>
# include <algorithm>
# include <chrono>
# include <chrono>
# include <limits>
# include <ratio>
# include <ratio>
# include <type_traits>
# include <vector>
# include <vector>
# include "absl/memory/memory.h"
# include "absl/strings/str_cat.h"
# include <grpc/event_engine/slice.h>
# include <grpc/support/log.h>
# include <grpc/support/log.h>
# include <grpc/support/time.h>
# include <grpc/support/time.h>
# include "src/core/lib/event_engine/tcp_socket_utils.h"
# include "src/core/lib/gprpp/time.h"
# include "src/core/lib/gprpp/time.h"
# include "test/core/event_engine/fuzzing_event_engine/fuzzing_event_engine.pb.h"
# include "test/core/event_engine/fuzzing_event_engine/fuzzing_event_engine.pb.h"
# include "test/core/util/port.h"
// IWYU pragma: no_include <sys/socket.h>
extern gpr_timespec ( * gpr_now_impl ) ( gpr_clock_type clock_type ) ;
extern gpr_timespec ( * gpr_now_impl ) ( gpr_clock_type clock_type ) ;
namespace grpc_event_engine {
namespace grpc_event_engine {
namespace experimental {
namespace experimental {
namespace {
// Inside the fuzzing event engine we consider everything is bound to a single
// loopback device. It cannot reach any other devices, and shares all ports
// between ipv4 and ipv6.
EventEngine : : ResolvedAddress PortToAddress ( int port ) {
return URIToResolvedAddress ( absl : : StrCat ( " ipv4:127.0.0.1: " , port ) ) . value ( ) ;
}
} // namespace
grpc_core : : NoDestruct < grpc_core : : Mutex > FuzzingEventEngine : : mu_ ;
namespace {
namespace {
const intptr_t kTaskHandleSalt = 12345 ;
const intptr_t kTaskHandleSalt = 12345 ;
FuzzingEventEngine * g_fuzzing_event_engine = nullptr ;
FuzzingEventEngine * g_fuzzing_event_engine = nullptr ;
@ -53,6 +77,22 @@ FuzzingEventEngine::FuzzingEventEngine(
// epoch to allow for some fancy atomic stuff.
// epoch to allow for some fancy atomic stuff.
now_ = Time ( ) + std : : chrono : : seconds ( 5 ) ;
now_ = Time ( ) + std : : chrono : : seconds ( 5 ) ;
// Allow the fuzzer to assign ports.
// Once this list is exhausted, we fall back to a deterministic algorithm.
for ( auto port : actions . assign_ports ( ) ) {
free_ports_ . push ( port ) ;
fuzzer_mentioned_ports_ . insert ( port ) ;
}
// Fill the write sizes queue for future connections.
for ( const auto & connection : actions . connections ( ) ) {
std : : queue < size_t > write_sizes ;
for ( auto size : connection . write_size ( ) ) {
write_sizes . push ( size ) ;
}
write_sizes_for_future_connections_ . emplace ( std : : move ( write_sizes ) ) ;
}
// Whilst a fuzzing EventEngine is active we override grpc's now function.
// Whilst a fuzzing EventEngine is active we override grpc's now function.
grpc_core : : TestOnlySetProcessEpoch ( NowAsTimespec ( GPR_CLOCK_MONOTONIC ) ) ;
grpc_core : : TestOnlySetProcessEpoch ( NowAsTimespec ( GPR_CLOCK_MONOTONIC ) ) ;
@ -78,10 +118,21 @@ FuzzingEventEngine::FuzzingEventEngine(
for ( const auto & delay : actions . run_delay ( ) ) {
for ( const auto & delay : actions . run_delay ( ) ) {
update_delay ( & task_delays_ , delay , std : : chrono : : seconds ( 30 ) ) ;
update_delay ( & task_delays_ , delay , std : : chrono : : seconds ( 30 ) ) ;
}
}
GPR_ASSERT ( g_fuzzing_event_engine = = nullptr ) ;
g_fuzzing_event_engine = this ;
g_orig_gpr_now_impl = gpr_now_impl ;
gpr_now_impl = GlobalNowImpl ;
previous_pick_port_functions_ = grpc_set_pick_port_functions (
grpc_pick_port_functions { + [ ] ( ) - > int {
grpc_core : : MutexLock lock ( & * mu_ ) ;
return g_fuzzing_event_engine - > AllocatePort ( ) ;
} ,
+ [ ] ( int ) { } } ) ;
}
}
void FuzzingEventEngine : : FuzzingDone ( ) {
void FuzzingEventEngine : : FuzzingDone ( ) {
grpc_core : : MutexLock lock ( & mu_ ) ;
grpc_core : : MutexLock lock ( & * mu_ ) ;
tick_increments_ . clear ( ) ;
tick_increments_ . clear ( ) ;
}
}
@ -97,7 +148,7 @@ gpr_timespec FuzzingEventEngine::NowAsTimespec(gpr_clock_type clock_type) {
void FuzzingEventEngine : : Tick ( ) {
void FuzzingEventEngine : : Tick ( ) {
std : : vector < absl : : AnyInvocable < void ( ) > > to_run ;
std : : vector < absl : : AnyInvocable < void ( ) > > to_run ;
{
{
grpc_core : : MutexLock lock ( & mu_ ) ;
grpc_core : : MutexLock lock ( & * mu_ ) ;
// Increment time
// Increment time
auto tick_it = tick_increments_ . find ( current_tick_ ) ;
auto tick_it = tick_increments_ . find ( current_tick_ ) ;
if ( tick_it ! = tick_increments_ . end ( ) ) {
if ( tick_it ! = tick_increments_ . end ( ) ) {
@ -125,25 +176,270 @@ void FuzzingEventEngine::Tick() {
}
}
FuzzingEventEngine : : Time FuzzingEventEngine : : Now ( ) {
FuzzingEventEngine : : Time FuzzingEventEngine : : Now ( ) {
grpc_core : : MutexLock lock ( & mu_ ) ;
grpc_core : : MutexLock lock ( & * mu_ ) ;
return now_ ;
return now_ ;
}
}
int FuzzingEventEngine : : AllocatePort ( ) {
// If the fuzzer selected some port orderings, do that first.
if ( ! free_ports_ . empty ( ) ) {
int p = free_ports_ . front ( ) ;
free_ports_ . pop ( ) ;
return p ;
}
// Otherwise just scan through starting at one and skipping any ports
// that were in the fuzzers initial list.
while ( true ) {
int p = next_free_port_ + + ;
if ( fuzzer_mentioned_ports_ . count ( p ) = = 0 ) {
return p ;
}
}
}
absl : : StatusOr < std : : unique_ptr < EventEngine : : Listener > >
absl : : StatusOr < std : : unique_ptr < EventEngine : : Listener > >
FuzzingEventEngine : : CreateListener ( Listener : : AcceptCallback ,
FuzzingEventEngine : : CreateListener (
absl : : AnyInvocable < void ( absl : : Status ) > ,
Listener : : AcceptCallback on_accept ,
const EndpointConfig & ,
absl : : AnyInvocable < void ( absl : : Status ) > on_shutdown , const EndpointConfig & ,
std : : unique_ptr < MemoryAllocatorFactory > ) {
std : : unique_ptr < MemoryAllocatorFactory > memory_allocator_factory ) {
abort ( ) ;
grpc_core : : MutexLock lock ( & * mu_ ) ;
// Create a listener and register it into the set of listener info in the
// event engine.
return absl : : make_unique < FuzzingListener > (
* listeners_
. emplace ( std : : make_shared < ListenerInfo > (
std : : move ( on_accept ) , std : : move ( on_shutdown ) ,
std : : move ( memory_allocator_factory ) ) )
. first ) ;
}
FuzzingEventEngine : : FuzzingListener : : ~ FuzzingListener ( ) {
grpc_core : : MutexLock lock ( & * mu_ ) ;
g_fuzzing_event_engine - > listeners_ . erase ( info_ ) ;
}
bool FuzzingEventEngine : : IsPortUsed ( int port ) {
// Return true if a port is bound to a listener.
for ( const auto & listener : listeners_ ) {
if ( std : : find ( listener - > ports . begin ( ) , listener - > ports . end ( ) , port ) ! =
listener - > ports . end ( ) ) {
return true ;
}
}
return false ;
}
absl : : StatusOr < int > FuzzingEventEngine : : FuzzingListener : : Bind (
const ResolvedAddress & addr ) {
// Extract the port from the address (or fail if non-localhost).
auto port = ResolvedAddressGetPort ( addr ) ;
grpc_core : : MutexLock lock ( & * mu_ ) ;
// Check that the listener hasn't already been started.
if ( info_ - > started ) return absl : : InternalError ( " Already started " ) ;
if ( port ! = 0 ) {
// If the port is non-zero, check that it's not already in use.
if ( g_fuzzing_event_engine - > IsPortUsed ( port ) ) {
return absl : : InternalError ( " Port in use " ) ;
}
} else {
// If the port is zero, allocate a new one.
do {
port = g_fuzzing_event_engine - > AllocatePort ( ) ;
} while ( g_fuzzing_event_engine - > IsPortUsed ( port ) ) ;
}
// Add the port to the listener.
info_ - > ports . push_back ( port ) ;
return port ;
}
absl : : Status FuzzingEventEngine : : FuzzingListener : : Start ( ) {
// Start the listener or fail if it's already started.
grpc_core : : MutexLock lock ( & * mu_ ) ;
if ( info_ - > started ) return absl : : InternalError ( " Already started " ) ;
info_ - > started = true ;
return absl : : OkStatus ( ) ;
}
}
bool FuzzingEventEngine : : EndpointMiddle : : Write ( SliceBuffer * data , int index ) {
GPR_ASSERT ( ! closed ) ;
const int peer_index = 1 - index ;
if ( data - > Length ( ) = = 0 ) return true ;
size_t write_len = std : : numeric_limits < size_t > : : max ( ) ;
// Check the write_sizes queue for fuzzer imposed restrictions on this write
// size. This allows the fuzzer to force small writes to be seen by the
// reader.
if ( ! write_sizes [ index ] . empty ( ) ) {
write_len = write_sizes [ index ] . front ( ) ;
write_sizes [ index ] . pop ( ) ;
}
if ( write_len > data - > Length ( ) ) {
write_len = data - > Length ( ) ;
}
// If the write_len is zero, we still need to write something, so we write one
// byte.
if ( write_len = = 0 ) write_len = 1 ;
// Expand the pending buffer.
size_t prev_len = pending [ index ] . size ( ) ;
pending [ index ] . resize ( prev_len + write_len ) ;
// Move bytes from the to-write data into the pending buffer.
data - > MoveFirstNBytesIntoBuffer ( write_len , pending [ index ] . data ( ) + prev_len ) ;
// If there was a pending read, then we can fulfill it.
if ( pending_read [ peer_index ] . has_value ( ) ) {
pending_read [ peer_index ] - > buffer - > Append (
Slice : : FromCopiedBuffer ( pending [ index ] ) ) ;
pending [ index ] . clear ( ) ;
g_fuzzing_event_engine - > RunLocked (
[ cb = std : : move ( pending_read [ peer_index ] - > on_read ) ] ( ) mutable {
cb ( absl : : OkStatus ( ) ) ;
} ) ;
pending_read [ peer_index ] . reset ( ) ;
}
return data - > Length ( ) = = 0 ;
}
bool FuzzingEventEngine : : FuzzingEndpoint : : Write (
absl : : AnyInvocable < void ( absl : : Status ) > on_writable , SliceBuffer * data ,
const WriteArgs * ) {
grpc_core : : MutexLock lock ( & * mu_ ) ;
// If the endpoint is closed, then we fail the write.
if ( middle_ - > closed ) {
g_fuzzing_event_engine - > RunLocked (
[ on_writable = std : : move ( on_writable ) ] ( ) mutable {
on_writable ( absl : : InternalError ( " Endpoint closed " ) ) ;
} ) ;
return false ;
}
// If the write succeeds immediately, then we return true.
if ( middle_ - > Write ( data , my_index ( ) ) ) return true ;
ScheduleDelayedWrite ( middle_ , my_index ( ) , std : : move ( on_writable ) , data ) ;
return false ;
}
void FuzzingEventEngine : : FuzzingEndpoint : : ScheduleDelayedWrite (
std : : shared_ptr < EndpointMiddle > middle , int index ,
absl : : AnyInvocable < void ( absl : : Status ) > on_writable , SliceBuffer * data ) {
g_fuzzing_event_engine - > RunLocked (
[ middle = std : : move ( middle ) , index , data ,
on_writable = std : : move ( on_writable ) ] ( ) mutable {
grpc_core : : MutexLock lock ( & * mu_ ) ;
if ( middle - > closed ) {
g_fuzzing_event_engine - > RunLocked (
[ on_writable = std : : move ( on_writable ) ] ( ) mutable {
on_writable ( absl : : InternalError ( " Endpoint closed " ) ) ;
} ) ;
return ;
}
if ( middle - > Write ( data , index ) ) {
on_writable ( absl : : OkStatus ( ) ) ;
return ;
}
ScheduleDelayedWrite ( std : : move ( middle ) , index , std : : move ( on_writable ) ,
data ) ;
} ) ;
}
FuzzingEventEngine : : FuzzingEndpoint : : ~ FuzzingEndpoint ( ) {
grpc_core : : MutexLock lock ( & * mu_ ) ;
middle_ - > closed = true ;
for ( int i = 0 ; i < 2 ; i + + ) {
if ( middle_ - > pending_read [ i ] . has_value ( ) ) {
g_fuzzing_event_engine - > RunLocked (
[ cb = std : : move ( middle_ - > pending_read [ i ] - > on_read ) ] ( ) mutable {
cb ( absl : : InternalError ( " Endpoint closed " ) ) ;
} ) ;
middle_ - > pending_read [ i ] . reset ( ) ;
}
}
}
bool FuzzingEventEngine : : FuzzingEndpoint : : Read (
absl : : AnyInvocable < void ( absl : : Status ) > on_read , SliceBuffer * buffer ,
const ReadArgs * ) {
buffer - > Clear ( ) ;
grpc_core : : MutexLock lock ( & * mu_ ) ;
// If the endpoint is closed, fail asynchronously.
if ( middle_ - > closed ) {
g_fuzzing_event_engine - > RunLocked ( [ on_read = std : : move ( on_read ) ] ( ) mutable {
on_read ( absl : : InternalError ( " Endpoint closed " ) ) ;
} ) ;
return false ;
}
if ( middle_ - > pending [ peer_index ( ) ] . empty ( ) ) {
// If the endpoint has no pending data, then we need to wait for a write.
middle_ - > pending_read [ my_index ( ) ] = PendingRead { std : : move ( on_read ) , buffer } ;
return false ;
} else {
// If the endpoint has pending data, then we can fulfill the read
// immediately.
buffer - > Append ( Slice : : FromCopiedBuffer ( middle_ - > pending [ peer_index ( ) ] ) ) ;
middle_ - > pending [ peer_index ( ) ] . clear ( ) ;
return true ;
}
}
std : : queue < size_t > FuzzingEventEngine : : WriteSizesForConnection ( ) {
if ( write_sizes_for_future_connections_ . empty ( ) ) return std : : queue < size_t > ( ) ;
auto ret = std : : move ( write_sizes_for_future_connections_ . front ( ) ) ;
write_sizes_for_future_connections_ . pop ( ) ;
return ret ;
}
FuzzingEventEngine : : EndpointMiddle : : EndpointMiddle ( int listener_port ,
int client_port )
: addrs { PortToAddress ( listener_port ) , PortToAddress ( client_port ) } ,
write_sizes { g_fuzzing_event_engine - > WriteSizesForConnection ( ) ,
g_fuzzing_event_engine - > WriteSizesForConnection ( ) } { }
EventEngine : : ConnectionHandle FuzzingEventEngine : : Connect (
EventEngine : : ConnectionHandle FuzzingEventEngine : : Connect (
OnConnectCallback , const ResolvedAddress & , const EndpointConfig & ,
OnConnectCallback on_connect , const ResolvedAddress & addr ,
MemoryAllocator , Duration ) {
const EndpointConfig & , MemoryAllocator , Duration ) {
abort ( ) ;
// TODO(ctiller): do something with the timeout
// Schedule a timer to run (with some fuzzer selected delay) the on_connect
// callback.
auto task_handle = RunAfter (
Duration ( 0 ) , [ this , addr , on_connect = std : : move ( on_connect ) ] ( ) mutable {
// Check for a legal address and extract the target port number.
auto port = ResolvedAddressGetPort ( addr ) ;
grpc_core : : MutexLock lock ( & * mu_ ) ;
// Find the listener that is listening on the target port.
for ( auto it = listeners_ . begin ( ) ; it ! = listeners_ . end ( ) ; + + it ) {
const auto & listener = * it ;
// Listener must be started.
if ( ! listener - > started ) continue ;
for ( int listener_port : listener - > ports ) {
if ( port = = listener_port ) {
// Port matches on a started listener: create an endpoint, call
// on_accept for the listener and on_connect for the client.
auto middle = std : : make_shared < EndpointMiddle > (
listener_port , g_fuzzing_event_engine - > AllocatePort ( ) ) ;
auto ep1 = std : : make_unique < FuzzingEndpoint > ( middle , 0 ) ;
auto ep2 = std : : make_unique < FuzzingEndpoint > ( middle , 1 ) ;
RunLocked ( [ listener , ep1 = std : : move ( ep1 ) ] ( ) mutable {
listener - > on_accept (
std : : move ( ep1 ) ,
listener - > memory_allocator_factory - > CreateMemoryAllocator (
" fuzzing " ) ) ;
} ) ;
RunLocked ( [ on_connect = std : : move ( on_connect ) ,
ep2 = std : : move ( ep2 ) ] ( ) mutable {
on_connect ( std : : move ( ep2 ) ) ;
} ) ;
return ;
}
}
}
// Fail: no such listener.
RunLocked ( [ on_connect = std : : move ( on_connect ) ] ( ) mutable {
on_connect ( absl : : InvalidArgumentError ( " No listener found " ) ) ;
} ) ;
} ) ;
return ConnectionHandle { { task_handle . keys [ 0 ] , task_handle . keys [ 1 ] } } ;
}
}
bool FuzzingEventEngine : : CancelConnect ( ConnectionHandle ) { abort ( ) ; }
bool FuzzingEventEngine : : CancelConnect ( ConnectionHandle connection_handle ) {
return Cancel (
TaskHandle { { connection_handle . keys [ 0 ] , connection_handle . keys [ 1 ] } } ) ;
}
bool FuzzingEventEngine : : IsWorkerThread ( ) { abort ( ) ; }
bool FuzzingEventEngine : : IsWorkerThread ( ) { abort ( ) ; }
@ -167,7 +463,12 @@ EventEngine::TaskHandle FuzzingEventEngine::RunAfter(Duration when,
EventEngine : : TaskHandle FuzzingEventEngine : : RunAfter (
EventEngine : : TaskHandle FuzzingEventEngine : : RunAfter (
Duration when , absl : : AnyInvocable < void ( ) > closure ) {
Duration when , absl : : AnyInvocable < void ( ) > closure ) {
grpc_core : : MutexLock lock ( & mu_ ) ;
grpc_core : : MutexLock lock ( & * mu_ ) ;
return RunAfterLocked ( when , std : : move ( closure ) ) ;
}
EventEngine : : TaskHandle FuzzingEventEngine : : RunAfterLocked (
Duration when , absl : : AnyInvocable < void ( ) > closure ) {
const intptr_t id = next_task_id_ ;
const intptr_t id = next_task_id_ ;
+ + next_task_id_ ;
+ + next_task_id_ ;
const auto delay_it = task_delays_ . find ( id ) ;
const auto delay_it = task_delays_ . find ( id ) ;
@ -183,7 +484,7 @@ EventEngine::TaskHandle FuzzingEventEngine::RunAfter(
}
}
bool FuzzingEventEngine : : Cancel ( TaskHandle handle ) {
bool FuzzingEventEngine : : Cancel ( TaskHandle handle ) {
grpc_core : : MutexLock lock ( & mu_ ) ;
grpc_core : : MutexLock lock ( & * mu_ ) ;
GPR_ASSERT ( handle . keys [ 1 ] = = kTaskHandleSalt ) ;
GPR_ASSERT ( handle . keys [ 1 ] = = kTaskHandleSalt ) ;
const intptr_t id = handle . keys [ 0 ] ;
const intptr_t id = handle . keys [ 0 ] ;
auto it = tasks_by_id_ . find ( id ) ;
auto it = tasks_by_id_ . find ( id ) ;
@ -202,22 +503,25 @@ gpr_timespec FuzzingEventEngine::GlobalNowImpl(gpr_clock_type clock_type) {
return gpr_inf_future ( clock_type ) ;
return gpr_inf_future ( clock_type ) ;
}
}
GPR_ASSERT ( g_fuzzing_event_engine ! = nullptr ) ;
GPR_ASSERT ( g_fuzzing_event_engine ! = nullptr ) ;
grpc_core : : MutexLock lock ( & g_fuzzing_event_engine - > mu_ ) ;
grpc_core : : MutexLock lock ( & * mu_ ) ;
return g_fuzzing_event_engine - > NowAsTimespec ( clock_type ) ;
return g_fuzzing_event_engine - > NowAsTimespec ( clock_type ) ;
}
}
void FuzzingEventEngine : : SetGlobalNowImplEngine ( FuzzingEventEngine * engine ) {
void FuzzingEventEngine : : UnsetGlobalHooks ( ) {
GPR_ASSERT ( g_fuzzing_event_engine = = nullptr ) ;
if ( g_fuzzing_event_engine ! = this ) return ;
g_fuzzing_event_engine = engine ;
g_orig_gpr_now_impl = gpr_now_impl ;
gpr_now_impl = GlobalNowImpl ;
}
void FuzzingEventEngine : : UnsetGlobalNowImplEngine ( FuzzingEventEngine * engine ) {
GPR_ASSERT ( g_fuzzing_event_engine = = engine ) ;
g_fuzzing_event_engine = nullptr ;
g_fuzzing_event_engine = nullptr ;
gpr_now_impl = g_orig_gpr_now_impl ;
gpr_now_impl = g_orig_gpr_now_impl ;
g_orig_gpr_now_impl = nullptr ;
g_orig_gpr_now_impl = nullptr ;
grpc_set_pick_port_functions ( previous_pick_port_functions_ ) ;
}
FuzzingEventEngine : : ListenerInfo : : ~ ListenerInfo ( ) {
GPR_ASSERT ( g_fuzzing_event_engine ! = nullptr ) ;
g_fuzzing_event_engine - > Run (
[ on_shutdown = std : : move ( on_shutdown ) ,
shutdown_status = std : : move ( shutdown_status ) ] ( ) mutable {
on_shutdown ( std : : move ( shutdown_status ) ) ;
} ) ;
}
}
} // namespace experimental
} // namespace experimental