device: overhaul device state management
This commit simplifies device state management. It creates a single unified state variable and documents its semantics. It also makes state changes more atomic. As an example of the sort of bug that occurred due to non-atomic state changes, the following sequence of events used to occur approximately every 2.5 million test runs: * RoutineTUNEventReader received an EventDown event. * It called device.Down, which called device.setUpDown. * That set device.state.changing, but did not yet attempt to lock device.state.Mutex. * Test completion called device.Close. * device.Close locked device.state.Mutex. * device.Close blocked on a call to device.state.stopping.Wait. * device.setUpDown then attempted to lock device.state.Mutex and blocked. Deadlock results. setUpDown cannot progress because device.state.Mutex is locked. Until setUpDown returns, RoutineTUNEventReader cannot call device.state.stopping.Done. Until device.state.stopping.Done gets called, device.state.stopping.Wait is blocked. As long as device.state.stopping.Wait is blocked, device.state.Mutex cannot be unlocked. This commit fixes that deadlock by holding device.state.mu when checking that the device is not closed. Signed-off-by: Josh Bleecher Snyder <josh@tailscale.com>
This commit is contained in:
parent
da95677203
commit
0bcb822e5b
293
device/device.go
293
device/device.go
@ -21,17 +21,26 @@ import (
|
|||||||
)
|
)
|
||||||
|
|
||||||
type Device struct {
|
type Device struct {
|
||||||
isUp AtomicBool // device is (going) up
|
log *Logger
|
||||||
isClosed AtomicBool // device is closed? (acting as guard)
|
|
||||||
log *Logger
|
|
||||||
|
|
||||||
// synchronized resources (locks acquired in order)
|
// synchronized resources (locks acquired in order)
|
||||||
|
|
||||||
state struct {
|
state struct {
|
||||||
|
// state holds the device's state. It is accessed atomically.
|
||||||
|
// Use the device.deviceState method to read it.
|
||||||
|
// If state.mu is (r)locked, state is the current state of the device.
|
||||||
|
// Without state.mu (r)locked, state is either the current state
|
||||||
|
// of the device or the intended future state of the device.
|
||||||
|
// For example, while executing a call to Up, state will be deviceStateUp.
|
||||||
|
// There is no guarantee that that intended future state of the device
|
||||||
|
// will become the actual state; Up can fail.
|
||||||
|
// The device can also change state multiple times between time of check and time of use.
|
||||||
|
// Unsynchronized uses of state must therefore be advisory/best-effort only.
|
||||||
|
state uint32 // actually a deviceState, but typed uint32 for conveniene
|
||||||
|
// stopping blocks until all inputs to Device have been closed.
|
||||||
stopping sync.WaitGroup
|
stopping sync.WaitGroup
|
||||||
sync.Mutex
|
// mu protects state changes.
|
||||||
changing AtomicBool
|
mu sync.Mutex
|
||||||
current bool
|
|
||||||
}
|
}
|
||||||
|
|
||||||
net struct {
|
net struct {
|
||||||
@ -87,6 +96,43 @@ type Device struct {
|
|||||||
closed chan struct{}
|
closed chan struct{}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// deviceState represents the state of a Device.
|
||||||
|
// There are four states: new, down, up, closed.
|
||||||
|
// However, state new should never be observable.
|
||||||
|
// Transitions:
|
||||||
|
//
|
||||||
|
// new -> down -----+
|
||||||
|
// ↑↓ ↓
|
||||||
|
// up -> closed
|
||||||
|
//
|
||||||
|
type deviceState uint32
|
||||||
|
|
||||||
|
//go:generate stringer -type deviceState -trimprefix=deviceState
|
||||||
|
const (
|
||||||
|
deviceStateNew deviceState = iota
|
||||||
|
deviceStateDown
|
||||||
|
deviceStateUp
|
||||||
|
deviceStateClosed
|
||||||
|
)
|
||||||
|
|
||||||
|
// deviceState returns device.state.state as a deviceState
|
||||||
|
// See those docs for how to interpret this value.
|
||||||
|
func (device *Device) deviceState() deviceState {
|
||||||
|
return deviceState(atomic.LoadUint32(&device.state.state))
|
||||||
|
}
|
||||||
|
|
||||||
|
// isClosed reports whether the device is closed (or is closing).
|
||||||
|
// See device.state.state comments for how to interpret this value.
|
||||||
|
func (device *Device) isClosed() bool {
|
||||||
|
return device.deviceState() == deviceStateClosed
|
||||||
|
}
|
||||||
|
|
||||||
|
// isUp reports whether the device is up (or is attempting to come up).
|
||||||
|
// See device.state.state comments for how to interpret this value.
|
||||||
|
func (device *Device) isUp() bool {
|
||||||
|
return device.deviceState() == deviceStateUp
|
||||||
|
}
|
||||||
|
|
||||||
// An outboundQueue is a channel of QueueOutboundElements awaiting encryption.
|
// An outboundQueue is a channel of QueueOutboundElements awaiting encryption.
|
||||||
// An outboundQueue is ref-counted using its wg field.
|
// An outboundQueue is ref-counted using its wg field.
|
||||||
// An outboundQueue created with newOutboundQueue has one reference.
|
// An outboundQueue created with newOutboundQueue has one reference.
|
||||||
@ -154,91 +200,82 @@ func newHandshakeQueue() *handshakeQueue {
|
|||||||
* Must hold device.peers.Mutex
|
* Must hold device.peers.Mutex
|
||||||
*/
|
*/
|
||||||
func unsafeRemovePeer(device *Device, peer *Peer, key NoisePublicKey) {
|
func unsafeRemovePeer(device *Device, peer *Peer, key NoisePublicKey) {
|
||||||
|
|
||||||
// stop routing and processing of packets
|
// stop routing and processing of packets
|
||||||
|
|
||||||
device.allowedips.RemoveByPeer(peer)
|
device.allowedips.RemoveByPeer(peer)
|
||||||
peer.Stop()
|
peer.Stop()
|
||||||
|
|
||||||
// remove from peer map
|
// remove from peer map
|
||||||
|
|
||||||
delete(device.peers.keyMap, key)
|
delete(device.peers.keyMap, key)
|
||||||
device.peers.empty.Set(len(device.peers.keyMap) == 0)
|
device.peers.empty.Set(len(device.peers.keyMap) == 0)
|
||||||
}
|
}
|
||||||
|
|
||||||
func deviceUpdateState(device *Device) {
|
// changeState attempts to change the device state to match want.
|
||||||
|
func (device *Device) changeState(want deviceState) {
|
||||||
// check if state already being updated (guard)
|
device.state.mu.Lock()
|
||||||
|
defer device.state.mu.Unlock()
|
||||||
if device.state.changing.Swap(true) {
|
old := device.deviceState()
|
||||||
|
if old == deviceStateClosed {
|
||||||
|
// once closed, always closed
|
||||||
|
device.log.Verbosef("Interface closed, ignored requested state %s", want)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
switch want {
|
||||||
// compare to current state of device
|
case old:
|
||||||
|
device.log.Verbosef("Interface already in state %s", want)
|
||||||
device.state.Lock()
|
|
||||||
|
|
||||||
newIsUp := device.isUp.Get()
|
|
||||||
|
|
||||||
if newIsUp == device.state.current {
|
|
||||||
device.state.changing.Set(false)
|
|
||||||
device.state.Unlock()
|
|
||||||
return
|
return
|
||||||
}
|
case deviceStateUp:
|
||||||
|
atomic.StoreUint32(&device.state.state, uint32(deviceStateUp))
|
||||||
// change state of device
|
if ok := device.upLocked(); ok {
|
||||||
|
|
||||||
switch newIsUp {
|
|
||||||
case true:
|
|
||||||
if err := device.BindUpdate(); err != nil {
|
|
||||||
device.log.Errorf("Unable to update bind: %v", err)
|
|
||||||
device.isUp.Set(false)
|
|
||||||
break
|
break
|
||||||
}
|
}
|
||||||
device.peers.RLock()
|
fallthrough // up failed; bring the device all the way back down
|
||||||
for _, peer := range device.peers.keyMap {
|
case deviceStateDown:
|
||||||
peer.Start()
|
atomic.StoreUint32(&device.state.state, uint32(deviceStateDown))
|
||||||
if atomic.LoadUint32(&peer.persistentKeepaliveInterval) > 0 {
|
device.downLocked()
|
||||||
peer.SendKeepalive()
|
}
|
||||||
}
|
device.log.Verbosef("Interface state was %s, requested %s, now %s", old, want, device.deviceState())
|
||||||
}
|
}
|
||||||
device.peers.RUnlock()
|
|
||||||
|
|
||||||
case false:
|
// upLocked attempts to bring the device up and reports whether it succeeded.
|
||||||
device.BindClose()
|
// The caller must hold device.state.mu and is responsible for updating device.state.state.
|
||||||
device.peers.RLock()
|
func (device *Device) upLocked() bool {
|
||||||
for _, peer := range device.peers.keyMap {
|
if err := device.BindUpdate(); err != nil {
|
||||||
peer.Stop()
|
device.log.Errorf("Unable to update bind: %v", err)
|
||||||
}
|
return false
|
||||||
device.peers.RUnlock()
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// update state variables
|
device.peers.RLock()
|
||||||
|
for _, peer := range device.peers.keyMap {
|
||||||
|
peer.Start()
|
||||||
|
if atomic.LoadUint32(&peer.persistentKeepaliveInterval) > 0 {
|
||||||
|
peer.SendKeepalive()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
device.peers.RUnlock()
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
|
||||||
device.state.current = newIsUp
|
// downLocked attempts to bring the device down.
|
||||||
device.state.changing.Set(false)
|
// The caller must hold device.state.mu and is responsible for updating device.state.state.
|
||||||
device.state.Unlock()
|
func (device *Device) downLocked() {
|
||||||
|
err := device.BindClose()
|
||||||
|
if err != nil {
|
||||||
|
device.log.Errorf("Bind close failed: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
// check for state change in the mean time
|
device.peers.RLock()
|
||||||
|
for _, peer := range device.peers.keyMap {
|
||||||
deviceUpdateState(device)
|
peer.Stop()
|
||||||
|
}
|
||||||
|
device.peers.RUnlock()
|
||||||
}
|
}
|
||||||
|
|
||||||
func (device *Device) Up() {
|
func (device *Device) Up() {
|
||||||
|
device.changeState(deviceStateUp)
|
||||||
// closed device cannot be brought up
|
|
||||||
|
|
||||||
if device.isClosed.Get() {
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
device.isUp.Set(true)
|
|
||||||
deviceUpdateState(device)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (device *Device) Down() {
|
func (device *Device) Down() {
|
||||||
device.isUp.Set(false)
|
device.changeState(deviceStateDown)
|
||||||
deviceUpdateState(device)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (device *Device) IsUnderLoad() bool {
|
func (device *Device) IsUnderLoad() bool {
|
||||||
@ -310,6 +347,7 @@ func (device *Device) SetPrivateKey(sk NoisePrivateKey) error {
|
|||||||
|
|
||||||
func NewDevice(tunDevice tun.Device, logger *Logger) *Device {
|
func NewDevice(tunDevice tun.Device, logger *Logger) *Device {
|
||||||
device := new(Device)
|
device := new(Device)
|
||||||
|
device.state.state = uint32(deviceStateDown)
|
||||||
device.closed = make(chan struct{})
|
device.closed = make(chan struct{})
|
||||||
device.log = logger
|
device.log = logger
|
||||||
device.tun.device = tunDevice
|
device.tun.device = tunDevice
|
||||||
@ -382,19 +420,16 @@ func (device *Device) RemoveAllPeers() {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (device *Device) Close() {
|
func (device *Device) Close() {
|
||||||
if device.isClosed.Swap(true) {
|
device.state.mu.Lock()
|
||||||
|
defer device.state.mu.Unlock()
|
||||||
|
if device.isClosed() {
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
atomic.StoreUint32(&device.state.state, uint32(deviceStateClosed))
|
||||||
device.log.Verbosef("Device closing")
|
device.log.Verbosef("Device closing")
|
||||||
device.state.changing.Set(true)
|
|
||||||
device.state.Lock()
|
|
||||||
defer device.state.Unlock()
|
|
||||||
|
|
||||||
device.tun.device.Close()
|
device.tun.device.Close()
|
||||||
device.BindClose()
|
device.downLocked()
|
||||||
|
|
||||||
device.isUp.Set(false)
|
|
||||||
|
|
||||||
// Remove peers before closing queues,
|
// Remove peers before closing queues,
|
||||||
// because peers assume that queues are active.
|
// because peers assume that queues are active.
|
||||||
@ -410,8 +445,7 @@ func (device *Device) Close() {
|
|||||||
|
|
||||||
device.rate.limiter.Close()
|
device.rate.limiter.Close()
|
||||||
|
|
||||||
device.state.changing.Set(false)
|
device.log.Verbosef("Device closed")
|
||||||
device.log.Verbosef("Interface closed")
|
|
||||||
close(device.closed)
|
close(device.closed)
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -420,7 +454,7 @@ func (device *Device) Wait() chan struct{} {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (device *Device) SendKeepalivesToPeersWithCurrentKeypair() {
|
func (device *Device) SendKeepalivesToPeersWithCurrentKeypair() {
|
||||||
if device.isClosed.Get() {
|
if !device.isUp() {
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -457,27 +491,23 @@ func (device *Device) Bind() conn.Bind {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (device *Device) BindSetMark(mark uint32) error {
|
func (device *Device) BindSetMark(mark uint32) error {
|
||||||
|
|
||||||
device.net.Lock()
|
device.net.Lock()
|
||||||
defer device.net.Unlock()
|
defer device.net.Unlock()
|
||||||
|
|
||||||
// check if modified
|
// check if modified
|
||||||
|
|
||||||
if device.net.fwmark == mark {
|
if device.net.fwmark == mark {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// update fwmark on existing bind
|
// update fwmark on existing bind
|
||||||
|
|
||||||
device.net.fwmark = mark
|
device.net.fwmark = mark
|
||||||
if device.isUp.Get() && device.net.bind != nil {
|
if device.isUp() && device.net.bind != nil {
|
||||||
if err := device.net.bind.SetMark(mark); err != nil {
|
if err := device.net.bind.SetMark(mark); err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// clear cached source addresses
|
// clear cached source addresses
|
||||||
|
|
||||||
device.peers.RLock()
|
device.peers.RLock()
|
||||||
for _, peer := range device.peers.keyMap {
|
for _, peer := range device.peers.keyMap {
|
||||||
peer.Lock()
|
peer.Lock()
|
||||||
@ -492,70 +522,63 @@ func (device *Device) BindSetMark(mark uint32) error {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (device *Device) BindUpdate() error {
|
func (device *Device) BindUpdate() error {
|
||||||
|
|
||||||
device.net.Lock()
|
device.net.Lock()
|
||||||
defer device.net.Unlock()
|
defer device.net.Unlock()
|
||||||
|
|
||||||
// close existing sockets
|
// close existing sockets
|
||||||
|
|
||||||
if err := unsafeCloseBind(device); err != nil {
|
if err := unsafeCloseBind(device); err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
// open new sockets
|
// open new sockets
|
||||||
|
if !device.isUp() {
|
||||||
if device.isUp.Get() {
|
return nil
|
||||||
|
|
||||||
// bind to new port
|
|
||||||
|
|
||||||
var err error
|
|
||||||
netc := &device.net
|
|
||||||
netc.bind, netc.port, err = conn.CreateBind(netc.port)
|
|
||||||
if err != nil {
|
|
||||||
netc.bind = nil
|
|
||||||
netc.port = 0
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
netc.netlinkCancel, err = device.startRouteListener(netc.bind)
|
|
||||||
if err != nil {
|
|
||||||
netc.bind.Close()
|
|
||||||
netc.bind = nil
|
|
||||||
netc.port = 0
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
// set fwmark
|
|
||||||
|
|
||||||
if netc.fwmark != 0 {
|
|
||||||
err = netc.bind.SetMark(netc.fwmark)
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// clear cached source addresses
|
|
||||||
|
|
||||||
device.peers.RLock()
|
|
||||||
for _, peer := range device.peers.keyMap {
|
|
||||||
peer.Lock()
|
|
||||||
defer peer.Unlock()
|
|
||||||
if peer.endpoint != nil {
|
|
||||||
peer.endpoint.ClearSrc()
|
|
||||||
}
|
|
||||||
}
|
|
||||||
device.peers.RUnlock()
|
|
||||||
|
|
||||||
// start receiving routines
|
|
||||||
|
|
||||||
device.net.stopping.Add(2)
|
|
||||||
device.queue.decryption.wg.Add(2) // each RoutineReceiveIncoming goroutine writes to device.queue.decryption
|
|
||||||
device.queue.handshake.wg.Add(2) // each RoutineReceiveIncoming goroutine writes to device.queue.handshake
|
|
||||||
go device.RoutineReceiveIncoming(ipv4.Version, netc.bind)
|
|
||||||
go device.RoutineReceiveIncoming(ipv6.Version, netc.bind)
|
|
||||||
|
|
||||||
device.log.Verbosef("UDP bind has been updated")
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// bind to new port
|
||||||
|
var err error
|
||||||
|
netc := &device.net
|
||||||
|
netc.bind, netc.port, err = conn.CreateBind(netc.port)
|
||||||
|
if err != nil {
|
||||||
|
netc.bind = nil
|
||||||
|
netc.port = 0
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
netc.netlinkCancel, err = device.startRouteListener(netc.bind)
|
||||||
|
if err != nil {
|
||||||
|
netc.bind.Close()
|
||||||
|
netc.bind = nil
|
||||||
|
netc.port = 0
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// set fwmark
|
||||||
|
if netc.fwmark != 0 {
|
||||||
|
err = netc.bind.SetMark(netc.fwmark)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// clear cached source addresses
|
||||||
|
device.peers.RLock()
|
||||||
|
for _, peer := range device.peers.keyMap {
|
||||||
|
peer.Lock()
|
||||||
|
defer peer.Unlock()
|
||||||
|
if peer.endpoint != nil {
|
||||||
|
peer.endpoint.ClearSrc()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
device.peers.RUnlock()
|
||||||
|
|
||||||
|
// start receiving routines
|
||||||
|
device.net.stopping.Add(2)
|
||||||
|
device.queue.decryption.wg.Add(2) // each RoutineReceiveIncoming goroutine writes to device.queue.decryption
|
||||||
|
device.queue.handshake.wg.Add(2) // each RoutineReceiveIncoming goroutine writes to device.queue.handshake
|
||||||
|
go device.RoutineReceiveIncoming(ipv4.Version, netc.bind)
|
||||||
|
go device.RoutineReceiveIncoming(ipv6.Version, netc.bind)
|
||||||
|
|
||||||
|
device.log.Verbosef("UDP bind has been updated")
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -172,7 +172,7 @@ NextAttempt:
|
|||||||
// The device might still not be up, e.g. due to an error
|
// The device might still not be up, e.g. due to an error
|
||||||
// in RoutineTUNEventReader's call to dev.Up that got swallowed.
|
// in RoutineTUNEventReader's call to dev.Up that got swallowed.
|
||||||
// Assume it's due to a transient error (port in use), and retry.
|
// Assume it's due to a transient error (port in use), and retry.
|
||||||
if !p.dev.isUp.Get() {
|
if !p.dev.isUp() {
|
||||||
tb.Logf("device %d did not come up, trying again", i)
|
tb.Logf("device %d did not come up, trying again", i)
|
||||||
p.dev.Close()
|
p.dev.Close()
|
||||||
continue NextAttempt
|
continue NextAttempt
|
||||||
|
26
device/devicestate_string.go
Normal file
26
device/devicestate_string.go
Normal file
@ -0,0 +1,26 @@
|
|||||||
|
// Code generated by "stringer -type deviceState -trimprefix=deviceState"; DO NOT EDIT.
|
||||||
|
|
||||||
|
package device
|
||||||
|
|
||||||
|
import "strconv"
|
||||||
|
|
||||||
|
func _() {
|
||||||
|
// An "invalid array index" compiler error signifies that the constant values have changed.
|
||||||
|
// Re-run the stringer command to generate them again.
|
||||||
|
var x [1]struct{}
|
||||||
|
_ = x[deviceStateNew-0]
|
||||||
|
_ = x[deviceStateDown-1]
|
||||||
|
_ = x[deviceStateUp-2]
|
||||||
|
_ = x[deviceStateClosed-3]
|
||||||
|
}
|
||||||
|
|
||||||
|
const _deviceState_name = "NewDownUpClosed"
|
||||||
|
|
||||||
|
var _deviceState_index = [...]uint8{0, 3, 7, 9, 15}
|
||||||
|
|
||||||
|
func (i deviceState) String() string {
|
||||||
|
if i >= deviceState(len(_deviceState_index)-1) {
|
||||||
|
return "deviceState(" + strconv.FormatInt(int64(i), 10) + ")"
|
||||||
|
}
|
||||||
|
return _deviceState_name[_deviceState_index[i]:_deviceState_index[i+1]]
|
||||||
|
}
|
@ -62,7 +62,7 @@ type Peer struct {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (device *Device) NewPeer(pk NoisePublicKey) (*Peer, error) {
|
func (device *Device) NewPeer(pk NoisePublicKey) (*Peer, error) {
|
||||||
if device.isClosed.Get() {
|
if device.isClosed() {
|
||||||
return nil, errors.New("device closed")
|
return nil, errors.New("device closed")
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -107,7 +107,7 @@ func (device *Device) NewPeer(pk NoisePublicKey) (*Peer, error) {
|
|||||||
device.peers.empty.Set(false)
|
device.peers.empty.Set(false)
|
||||||
|
|
||||||
// start peer
|
// start peer
|
||||||
if peer.device.isUp.Get() {
|
if peer.device.isUp() {
|
||||||
peer.Start()
|
peer.Start()
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -121,7 +121,7 @@ func (peer *Peer) SendBuffer(buffer []byte) error {
|
|||||||
if peer.device.net.bind == nil {
|
if peer.device.net.bind == nil {
|
||||||
// Packets can leak through to SendBuffer while the device is closing.
|
// Packets can leak through to SendBuffer while the device is closing.
|
||||||
// When that happens, drop them silently to avoid spurious errors.
|
// When that happens, drop them silently to avoid spurious errors.
|
||||||
if peer.device.isClosed.Get() {
|
if peer.device.isClosed() {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
return errors.New("no bind")
|
return errors.New("no bind")
|
||||||
@ -152,7 +152,7 @@ func (peer *Peer) String() string {
|
|||||||
|
|
||||||
func (peer *Peer) Start() {
|
func (peer *Peer) Start() {
|
||||||
// should never start a peer on a closed device
|
// should never start a peer on a closed device
|
||||||
if peer.device.isClosed.Get() {
|
if peer.device.isClosed() {
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -474,7 +474,7 @@ func (peer *Peer) RoutineSequentialReceiver() {
|
|||||||
}
|
}
|
||||||
|
|
||||||
_, err = device.tun.device.Write(elem.buffer[:MessageTransportOffsetContent+len(elem.packet)], MessageTransportOffsetContent)
|
_, err = device.tun.device.Write(elem.buffer[:MessageTransportOffsetContent+len(elem.packet)], MessageTransportOffsetContent)
|
||||||
if err != nil && !device.isClosed.Get() {
|
if err != nil && !device.isClosed() {
|
||||||
device.log.Errorf("Failed to write packet to TUN device: %v", err)
|
device.log.Errorf("Failed to write packet to TUN device: %v", err)
|
||||||
}
|
}
|
||||||
if len(peer.queue.inbound) == 0 {
|
if len(peer.queue.inbound) == 0 {
|
||||||
|
@ -225,7 +225,7 @@ func (device *Device) RoutineReadFromTUN() {
|
|||||||
size, err := device.tun.device.Read(elem.buffer[:], offset)
|
size, err := device.tun.device.Read(elem.buffer[:], offset)
|
||||||
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
if !device.isClosed.Get() {
|
if !device.isClosed() {
|
||||||
device.log.Errorf("Failed to read packet from TUN device: %v", err)
|
device.log.Errorf("Failed to read packet from TUN device: %v", err)
|
||||||
device.Close()
|
device.Close()
|
||||||
}
|
}
|
||||||
@ -291,7 +291,7 @@ func (peer *Peer) StagePacket(elem *QueueOutboundElement) {
|
|||||||
|
|
||||||
func (peer *Peer) SendStagedPackets() {
|
func (peer *Peer) SendStagedPackets() {
|
||||||
top:
|
top:
|
||||||
if len(peer.queue.staged) == 0 || !peer.device.isUp.Get() {
|
if len(peer.queue.staged) == 0 || !peer.device.isUp() {
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -73,7 +73,7 @@ func (timer *Timer) IsPending() bool {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (peer *Peer) timersActive() bool {
|
func (peer *Peer) timersActive() bool {
|
||||||
return peer.isRunning.Get() && peer.device != nil && peer.device.isUp.Get() && !peer.device.peers.empty.Get()
|
return peer.isRunning.Get() && peer.device != nil && peer.device.isUp() && !peer.device.peers.empty.Get()
|
||||||
}
|
}
|
||||||
|
|
||||||
func expiredRetransmitHandshake(peer *Peer) {
|
func expiredRetransmitHandshake(peer *Peer) {
|
||||||
|
@ -258,7 +258,7 @@ type ipcSetPeer struct {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (peer *ipcSetPeer) handlePostConfig() {
|
func (peer *ipcSetPeer) handlePostConfig() {
|
||||||
if peer.Peer != nil && !peer.dummy && peer.Peer.device.isUp.Get() {
|
if peer.Peer != nil && !peer.dummy && peer.Peer.device.isUp() {
|
||||||
peer.SendStagedPackets()
|
peer.SendStagedPackets()
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -354,7 +354,7 @@ func (device *Device) handlePeerLine(peer *ipcSetPeer, key, value string) error
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
return ipcErrorf(ipc.IpcErrorIO, "failed to get tun device status: %w", err)
|
return ipcErrorf(ipc.IpcErrorIO, "failed to get tun device status: %w", err)
|
||||||
}
|
}
|
||||||
if device.isUp.Get() && !peer.dummy {
|
if device.isUp() && !peer.dummy {
|
||||||
peer.SendKeepalive()
|
peer.SendKeepalive()
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
Loading…
Reference in New Issue
Block a user