protect against concurrent use of Stream.Read (#3380)

This commit is contained in:
Marten Seemann 2022-04-25 11:58:11 +01:00 committed by GitHub
parent 823c609be4
commit ec118e440c
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
2 changed files with 48 additions and 1 deletions

View file

@ -4,6 +4,8 @@ import (
"errors"
"io"
"runtime"
"sync"
"sync/atomic"
"time"
"github.com/golang/mock/gomock"
@ -403,6 +405,43 @@ var _ = Describe("Receive Stream", func() {
Expect(n).To(BeZero())
Expect(err).To(MatchError(io.EOF))
})
// Calling Read concurrently doesn't make any sense (and is forbidden),
// but we still want to make sure that we don't complete the stream more than once
// if the user misuses our API.
// This would lead to an INTERNAL_ERROR ("tried to delete unknown outgoing stream"),
// which can be hard to debug.
// Note that even without the protection built into the receiveStream, this test
// is very timing-dependent, and would need to run a few hundred times to trigger the failure.
It("handles concurrent reads", func() {
mockFC.EXPECT().UpdateHighestReceived(protocol.ByteCount(6), gomock.Any()).AnyTimes()
var bytesRead protocol.ByteCount
mockFC.EXPECT().AddBytesRead(gomock.Any()).Do(func(n protocol.ByteCount) { bytesRead += n }).AnyTimes()
var numCompleted int32
mockSender.EXPECT().onStreamCompleted(streamID).Do(func(protocol.StreamID) {
atomic.AddInt32(&numCompleted, 1)
}).AnyTimes()
const num = 3
var wg sync.WaitGroup
wg.Add(num)
for i := 0; i < num; i++ {
go func() {
defer wg.Done()
defer GinkgoRecover()
_, err := str.Read(make([]byte, 8))
Expect(err).To(MatchError(io.EOF))
}()
}
str.handleStreamFrame(&wire.StreamFrame{
Offset: 0,
Data: []byte("foobar"),
Fin: true,
})
wg.Wait()
Expect(bytesRead).To(BeEquivalentTo(6))
Expect(atomic.LoadInt32(&numCompleted)).To(BeEquivalentTo(1))
})
})
It("closes when CloseRemote is called", func() {