1
0
mirror of https://git.zx2c4.com/wireguard-go synced 2024-11-15 01:05:15 +01:00

device: overhaul device state management

This commit simplifies device state management.
It creates a single unified state variable and documents its semantics.

It also makes state changes more atomic.
As an example of the sort of bug that occurred due to non-atomic state changes,
the following sequence of events used to occur approximately every 2.5 million test runs:

* RoutineTUNEventReader received an EventDown event.
* It called device.Down, which called device.setUpDown.
* That set device.state.changing, but did not yet attempt to lock device.state.Mutex.
* Test completion called device.Close.
* device.Close locked device.state.Mutex.
* device.Close blocked on a call to device.state.stopping.Wait.
* device.setUpDown then attempted to lock device.state.Mutex and blocked.

Deadlock results. setUpDown cannot progress because device.state.Mutex is locked.
Until setUpDown returns, RoutineTUNEventReader cannot call device.state.stopping.Done.
Until device.state.stopping.Done gets called, device.state.stopping.Wait is blocked.
As long as device.state.stopping.Wait is blocked, device.state.Mutex cannot be unlocked.
This commit fixes that deadlock by holding device.state.mu
when checking that the device is not closed.

Signed-off-by: Josh Bleecher Snyder <josh@tailscale.com>
This commit is contained in:
Josh Bleecher Snyder 2021-01-19 09:02:16 -08:00
parent da95677203
commit 0bcb822e5b
8 changed files with 195 additions and 146 deletions

View File

@ -21,17 +21,26 @@ import (
) )
type Device struct { type Device struct {
isUp AtomicBool // device is (going) up log *Logger
isClosed AtomicBool // device is closed? (acting as guard)
log *Logger
// synchronized resources (locks acquired in order) // synchronized resources (locks acquired in order)
state struct { state struct {
// state holds the device's state. It is accessed atomically.
// Use the device.deviceState method to read it.
// If state.mu is (r)locked, state is the current state of the device.
// Without state.mu (r)locked, state is either the current state
// of the device or the intended future state of the device.
// For example, while executing a call to Up, state will be deviceStateUp.
// There is no guarantee that that intended future state of the device
// will become the actual state; Up can fail.
// The device can also change state multiple times between time of check and time of use.
// Unsynchronized uses of state must therefore be advisory/best-effort only.
state uint32 // actually a deviceState, but typed uint32 for conveniene
// stopping blocks until all inputs to Device have been closed.
stopping sync.WaitGroup stopping sync.WaitGroup
sync.Mutex // mu protects state changes.
changing AtomicBool mu sync.Mutex
current bool
} }
net struct { net struct {
@ -87,6 +96,43 @@ type Device struct {
closed chan struct{} closed chan struct{}
} }
// deviceState represents the state of a Device.
// There are four states: new, down, up, closed.
// However, state new should never be observable.
// Transitions:
//
// new -> down -----+
// ↑↓ ↓
// up -> closed
//
type deviceState uint32
//go:generate stringer -type deviceState -trimprefix=deviceState
const (
deviceStateNew deviceState = iota
deviceStateDown
deviceStateUp
deviceStateClosed
)
// deviceState returns device.state.state as a deviceState
// See those docs for how to interpret this value.
func (device *Device) deviceState() deviceState {
return deviceState(atomic.LoadUint32(&device.state.state))
}
// isClosed reports whether the device is closed (or is closing).
// See device.state.state comments for how to interpret this value.
func (device *Device) isClosed() bool {
return device.deviceState() == deviceStateClosed
}
// isUp reports whether the device is up (or is attempting to come up).
// See device.state.state comments for how to interpret this value.
func (device *Device) isUp() bool {
return device.deviceState() == deviceStateUp
}
// An outboundQueue is a channel of QueueOutboundElements awaiting encryption. // An outboundQueue is a channel of QueueOutboundElements awaiting encryption.
// An outboundQueue is ref-counted using its wg field. // An outboundQueue is ref-counted using its wg field.
// An outboundQueue created with newOutboundQueue has one reference. // An outboundQueue created with newOutboundQueue has one reference.
@ -154,91 +200,82 @@ func newHandshakeQueue() *handshakeQueue {
* Must hold device.peers.Mutex * Must hold device.peers.Mutex
*/ */
func unsafeRemovePeer(device *Device, peer *Peer, key NoisePublicKey) { func unsafeRemovePeer(device *Device, peer *Peer, key NoisePublicKey) {
// stop routing and processing of packets // stop routing and processing of packets
device.allowedips.RemoveByPeer(peer) device.allowedips.RemoveByPeer(peer)
peer.Stop() peer.Stop()
// remove from peer map // remove from peer map
delete(device.peers.keyMap, key) delete(device.peers.keyMap, key)
device.peers.empty.Set(len(device.peers.keyMap) == 0) device.peers.empty.Set(len(device.peers.keyMap) == 0)
} }
func deviceUpdateState(device *Device) { // changeState attempts to change the device state to match want.
func (device *Device) changeState(want deviceState) {
// check if state already being updated (guard) device.state.mu.Lock()
defer device.state.mu.Unlock()
if device.state.changing.Swap(true) { old := device.deviceState()
if old == deviceStateClosed {
// once closed, always closed
device.log.Verbosef("Interface closed, ignored requested state %s", want)
return return
} }
switch want {
// compare to current state of device case old:
device.log.Verbosef("Interface already in state %s", want)
device.state.Lock()
newIsUp := device.isUp.Get()
if newIsUp == device.state.current {
device.state.changing.Set(false)
device.state.Unlock()
return return
} case deviceStateUp:
atomic.StoreUint32(&device.state.state, uint32(deviceStateUp))
// change state of device if ok := device.upLocked(); ok {
switch newIsUp {
case true:
if err := device.BindUpdate(); err != nil {
device.log.Errorf("Unable to update bind: %v", err)
device.isUp.Set(false)
break break
} }
device.peers.RLock() fallthrough // up failed; bring the device all the way back down
for _, peer := range device.peers.keyMap { case deviceStateDown:
peer.Start() atomic.StoreUint32(&device.state.state, uint32(deviceStateDown))
if atomic.LoadUint32(&peer.persistentKeepaliveInterval) > 0 { device.downLocked()
peer.SendKeepalive() }
} device.log.Verbosef("Interface state was %s, requested %s, now %s", old, want, device.deviceState())
} }
device.peers.RUnlock()
case false: // upLocked attempts to bring the device up and reports whether it succeeded.
device.BindClose() // The caller must hold device.state.mu and is responsible for updating device.state.state.
device.peers.RLock() func (device *Device) upLocked() bool {
for _, peer := range device.peers.keyMap { if err := device.BindUpdate(); err != nil {
peer.Stop() device.log.Errorf("Unable to update bind: %v", err)
} return false
device.peers.RUnlock()
} }
// update state variables device.peers.RLock()
for _, peer := range device.peers.keyMap {
peer.Start()
if atomic.LoadUint32(&peer.persistentKeepaliveInterval) > 0 {
peer.SendKeepalive()
}
}
device.peers.RUnlock()
return true
}
device.state.current = newIsUp // downLocked attempts to bring the device down.
device.state.changing.Set(false) // The caller must hold device.state.mu and is responsible for updating device.state.state.
device.state.Unlock() func (device *Device) downLocked() {
err := device.BindClose()
if err != nil {
device.log.Errorf("Bind close failed: %v", err)
}
// check for state change in the mean time device.peers.RLock()
for _, peer := range device.peers.keyMap {
deviceUpdateState(device) peer.Stop()
}
device.peers.RUnlock()
} }
func (device *Device) Up() { func (device *Device) Up() {
device.changeState(deviceStateUp)
// closed device cannot be brought up
if device.isClosed.Get() {
return
}
device.isUp.Set(true)
deviceUpdateState(device)
} }
func (device *Device) Down() { func (device *Device) Down() {
device.isUp.Set(false) device.changeState(deviceStateDown)
deviceUpdateState(device)
} }
func (device *Device) IsUnderLoad() bool { func (device *Device) IsUnderLoad() bool {
@ -310,6 +347,7 @@ func (device *Device) SetPrivateKey(sk NoisePrivateKey) error {
func NewDevice(tunDevice tun.Device, logger *Logger) *Device { func NewDevice(tunDevice tun.Device, logger *Logger) *Device {
device := new(Device) device := new(Device)
device.state.state = uint32(deviceStateDown)
device.closed = make(chan struct{}) device.closed = make(chan struct{})
device.log = logger device.log = logger
device.tun.device = tunDevice device.tun.device = tunDevice
@ -382,19 +420,16 @@ func (device *Device) RemoveAllPeers() {
} }
func (device *Device) Close() { func (device *Device) Close() {
if device.isClosed.Swap(true) { device.state.mu.Lock()
defer device.state.mu.Unlock()
if device.isClosed() {
return return
} }
atomic.StoreUint32(&device.state.state, uint32(deviceStateClosed))
device.log.Verbosef("Device closing") device.log.Verbosef("Device closing")
device.state.changing.Set(true)
device.state.Lock()
defer device.state.Unlock()
device.tun.device.Close() device.tun.device.Close()
device.BindClose() device.downLocked()
device.isUp.Set(false)
// Remove peers before closing queues, // Remove peers before closing queues,
// because peers assume that queues are active. // because peers assume that queues are active.
@ -410,8 +445,7 @@ func (device *Device) Close() {
device.rate.limiter.Close() device.rate.limiter.Close()
device.state.changing.Set(false) device.log.Verbosef("Device closed")
device.log.Verbosef("Interface closed")
close(device.closed) close(device.closed)
} }
@ -420,7 +454,7 @@ func (device *Device) Wait() chan struct{} {
} }
func (device *Device) SendKeepalivesToPeersWithCurrentKeypair() { func (device *Device) SendKeepalivesToPeersWithCurrentKeypair() {
if device.isClosed.Get() { if !device.isUp() {
return return
} }
@ -457,27 +491,23 @@ func (device *Device) Bind() conn.Bind {
} }
func (device *Device) BindSetMark(mark uint32) error { func (device *Device) BindSetMark(mark uint32) error {
device.net.Lock() device.net.Lock()
defer device.net.Unlock() defer device.net.Unlock()
// check if modified // check if modified
if device.net.fwmark == mark { if device.net.fwmark == mark {
return nil return nil
} }
// update fwmark on existing bind // update fwmark on existing bind
device.net.fwmark = mark device.net.fwmark = mark
if device.isUp.Get() && device.net.bind != nil { if device.isUp() && device.net.bind != nil {
if err := device.net.bind.SetMark(mark); err != nil { if err := device.net.bind.SetMark(mark); err != nil {
return err return err
} }
} }
// clear cached source addresses // clear cached source addresses
device.peers.RLock() device.peers.RLock()
for _, peer := range device.peers.keyMap { for _, peer := range device.peers.keyMap {
peer.Lock() peer.Lock()
@ -492,70 +522,63 @@ func (device *Device) BindSetMark(mark uint32) error {
} }
func (device *Device) BindUpdate() error { func (device *Device) BindUpdate() error {
device.net.Lock() device.net.Lock()
defer device.net.Unlock() defer device.net.Unlock()
// close existing sockets // close existing sockets
if err := unsafeCloseBind(device); err != nil { if err := unsafeCloseBind(device); err != nil {
return err return err
} }
// open new sockets // open new sockets
if !device.isUp() {
if device.isUp.Get() { return nil
// bind to new port
var err error
netc := &device.net
netc.bind, netc.port, err = conn.CreateBind(netc.port)
if err != nil {
netc.bind = nil
netc.port = 0
return err
}
netc.netlinkCancel, err = device.startRouteListener(netc.bind)
if err != nil {
netc.bind.Close()
netc.bind = nil
netc.port = 0
return err
}
// set fwmark
if netc.fwmark != 0 {
err = netc.bind.SetMark(netc.fwmark)
if err != nil {
return err
}
}
// clear cached source addresses
device.peers.RLock()
for _, peer := range device.peers.keyMap {
peer.Lock()
defer peer.Unlock()
if peer.endpoint != nil {
peer.endpoint.ClearSrc()
}
}
device.peers.RUnlock()
// start receiving routines
device.net.stopping.Add(2)
device.queue.decryption.wg.Add(2) // each RoutineReceiveIncoming goroutine writes to device.queue.decryption
device.queue.handshake.wg.Add(2) // each RoutineReceiveIncoming goroutine writes to device.queue.handshake
go device.RoutineReceiveIncoming(ipv4.Version, netc.bind)
go device.RoutineReceiveIncoming(ipv6.Version, netc.bind)
device.log.Verbosef("UDP bind has been updated")
} }
// bind to new port
var err error
netc := &device.net
netc.bind, netc.port, err = conn.CreateBind(netc.port)
if err != nil {
netc.bind = nil
netc.port = 0
return err
}
netc.netlinkCancel, err = device.startRouteListener(netc.bind)
if err != nil {
netc.bind.Close()
netc.bind = nil
netc.port = 0
return err
}
// set fwmark
if netc.fwmark != 0 {
err = netc.bind.SetMark(netc.fwmark)
if err != nil {
return err
}
}
// clear cached source addresses
device.peers.RLock()
for _, peer := range device.peers.keyMap {
peer.Lock()
defer peer.Unlock()
if peer.endpoint != nil {
peer.endpoint.ClearSrc()
}
}
device.peers.RUnlock()
// start receiving routines
device.net.stopping.Add(2)
device.queue.decryption.wg.Add(2) // each RoutineReceiveIncoming goroutine writes to device.queue.decryption
device.queue.handshake.wg.Add(2) // each RoutineReceiveIncoming goroutine writes to device.queue.handshake
go device.RoutineReceiveIncoming(ipv4.Version, netc.bind)
go device.RoutineReceiveIncoming(ipv6.Version, netc.bind)
device.log.Verbosef("UDP bind has been updated")
return nil return nil
} }

View File

@ -172,7 +172,7 @@ NextAttempt:
// The device might still not be up, e.g. due to an error // The device might still not be up, e.g. due to an error
// in RoutineTUNEventReader's call to dev.Up that got swallowed. // in RoutineTUNEventReader's call to dev.Up that got swallowed.
// Assume it's due to a transient error (port in use), and retry. // Assume it's due to a transient error (port in use), and retry.
if !p.dev.isUp.Get() { if !p.dev.isUp() {
tb.Logf("device %d did not come up, trying again", i) tb.Logf("device %d did not come up, trying again", i)
p.dev.Close() p.dev.Close()
continue NextAttempt continue NextAttempt

View File

@ -0,0 +1,26 @@
// Code generated by "stringer -type deviceState -trimprefix=deviceState"; DO NOT EDIT.
package device
import "strconv"
func _() {
// An "invalid array index" compiler error signifies that the constant values have changed.
// Re-run the stringer command to generate them again.
var x [1]struct{}
_ = x[deviceStateNew-0]
_ = x[deviceStateDown-1]
_ = x[deviceStateUp-2]
_ = x[deviceStateClosed-3]
}
const _deviceState_name = "NewDownUpClosed"
var _deviceState_index = [...]uint8{0, 3, 7, 9, 15}
func (i deviceState) String() string {
if i >= deviceState(len(_deviceState_index)-1) {
return "deviceState(" + strconv.FormatInt(int64(i), 10) + ")"
}
return _deviceState_name[_deviceState_index[i]:_deviceState_index[i+1]]
}

View File

@ -62,7 +62,7 @@ type Peer struct {
} }
func (device *Device) NewPeer(pk NoisePublicKey) (*Peer, error) { func (device *Device) NewPeer(pk NoisePublicKey) (*Peer, error) {
if device.isClosed.Get() { if device.isClosed() {
return nil, errors.New("device closed") return nil, errors.New("device closed")
} }
@ -107,7 +107,7 @@ func (device *Device) NewPeer(pk NoisePublicKey) (*Peer, error) {
device.peers.empty.Set(false) device.peers.empty.Set(false)
// start peer // start peer
if peer.device.isUp.Get() { if peer.device.isUp() {
peer.Start() peer.Start()
} }
@ -121,7 +121,7 @@ func (peer *Peer) SendBuffer(buffer []byte) error {
if peer.device.net.bind == nil { if peer.device.net.bind == nil {
// Packets can leak through to SendBuffer while the device is closing. // Packets can leak through to SendBuffer while the device is closing.
// When that happens, drop them silently to avoid spurious errors. // When that happens, drop them silently to avoid spurious errors.
if peer.device.isClosed.Get() { if peer.device.isClosed() {
return nil return nil
} }
return errors.New("no bind") return errors.New("no bind")
@ -152,7 +152,7 @@ func (peer *Peer) String() string {
func (peer *Peer) Start() { func (peer *Peer) Start() {
// should never start a peer on a closed device // should never start a peer on a closed device
if peer.device.isClosed.Get() { if peer.device.isClosed() {
return return
} }

View File

@ -474,7 +474,7 @@ func (peer *Peer) RoutineSequentialReceiver() {
} }
_, err = device.tun.device.Write(elem.buffer[:MessageTransportOffsetContent+len(elem.packet)], MessageTransportOffsetContent) _, err = device.tun.device.Write(elem.buffer[:MessageTransportOffsetContent+len(elem.packet)], MessageTransportOffsetContent)
if err != nil && !device.isClosed.Get() { if err != nil && !device.isClosed() {
device.log.Errorf("Failed to write packet to TUN device: %v", err) device.log.Errorf("Failed to write packet to TUN device: %v", err)
} }
if len(peer.queue.inbound) == 0 { if len(peer.queue.inbound) == 0 {

View File

@ -225,7 +225,7 @@ func (device *Device) RoutineReadFromTUN() {
size, err := device.tun.device.Read(elem.buffer[:], offset) size, err := device.tun.device.Read(elem.buffer[:], offset)
if err != nil { if err != nil {
if !device.isClosed.Get() { if !device.isClosed() {
device.log.Errorf("Failed to read packet from TUN device: %v", err) device.log.Errorf("Failed to read packet from TUN device: %v", err)
device.Close() device.Close()
} }
@ -291,7 +291,7 @@ func (peer *Peer) StagePacket(elem *QueueOutboundElement) {
func (peer *Peer) SendStagedPackets() { func (peer *Peer) SendStagedPackets() {
top: top:
if len(peer.queue.staged) == 0 || !peer.device.isUp.Get() { if len(peer.queue.staged) == 0 || !peer.device.isUp() {
return return
} }

View File

@ -73,7 +73,7 @@ func (timer *Timer) IsPending() bool {
} }
func (peer *Peer) timersActive() bool { func (peer *Peer) timersActive() bool {
return peer.isRunning.Get() && peer.device != nil && peer.device.isUp.Get() && !peer.device.peers.empty.Get() return peer.isRunning.Get() && peer.device != nil && peer.device.isUp() && !peer.device.peers.empty.Get()
} }
func expiredRetransmitHandshake(peer *Peer) { func expiredRetransmitHandshake(peer *Peer) {

View File

@ -258,7 +258,7 @@ type ipcSetPeer struct {
} }
func (peer *ipcSetPeer) handlePostConfig() { func (peer *ipcSetPeer) handlePostConfig() {
if peer.Peer != nil && !peer.dummy && peer.Peer.device.isUp.Get() { if peer.Peer != nil && !peer.dummy && peer.Peer.device.isUp() {
peer.SendStagedPackets() peer.SendStagedPackets()
} }
} }
@ -354,7 +354,7 @@ func (device *Device) handlePeerLine(peer *ipcSetPeer, key, value string) error
if err != nil { if err != nil {
return ipcErrorf(ipc.IpcErrorIO, "failed to get tun device status: %w", err) return ipcErrorf(ipc.IpcErrorIO, "failed to get tun device status: %w", err)
} }
if device.isUp.Get() && !peer.dummy { if device.isUp() && !peer.dummy {
peer.SendKeepalive() peer.SendKeepalive()
} }
} }