wgengine: ensure pingers are gone before returning from Close

We canceled the pingers in Close, but didn't wait around for their
goroutines to be cleaned up. This caused the ipn/e2e_test to catch
pingers in its resource leak check.

This commit introduces an object, but also simplifies the semantics
around the pinger's cancel functions. They no longer need to be called
while holding the mutex.

Signed-off-by: David Crawshaw <crawshaw@tailscale.com>
This commit is contained in:
David Crawshaw 2020-05-29 15:38:26 +10:00 committed by David Crawshaw
parent 004780b312
commit cf5d25e15b

View File

@ -66,7 +66,7 @@ type userspaceEngine struct {
statusCallback StatusCallback statusCallback StatusCallback
peerSequence []wgcfg.Key peerSequence []wgcfg.Key
endpoints []string endpoints []string
pingers map[wgcfg.Key]context.CancelFunc // mu must be held to call CancelFunc pingers map[wgcfg.Key]*pinger
linkState *interfaces.State linkState *interfaces.State
// Lock ordering: wgLock, then mu. // Lock ordering: wgLock, then mu.
@ -128,7 +128,7 @@ func newUserspaceEngineAdvanced(logf logger.Logf, tundev *tstun.TUN, routerGen R
reqCh: make(chan struct{}, 1), reqCh: make(chan struct{}, 1),
waitCh: make(chan struct{}), waitCh: make(chan struct{}),
tundev: tundev, tundev: tundev,
pingers: make(map[wgcfg.Key]context.CancelFunc), pingers: make(map[wgcfg.Key]*pinger),
} }
e.linkState, _ = getLinkState() e.linkState, _ = getLinkState()
@ -259,28 +259,29 @@ func newUserspaceEngineAdvanced(logf logger.Logf, tundev *tstun.TUN, routerGen R
// //
// These generated packets are used to ensure we trigger the spray logic in // These generated packets are used to ensure we trigger the spray logic in
// the magicsock package for NAT traversal. // the magicsock package for NAT traversal.
func (e *userspaceEngine) pinger(peerKey wgcfg.Key, ips []wgcfg.IP) { type pinger struct {
e.logf("generating initial ping traffic to %s (%v)", peerKey.ShortString(), ips) e *userspaceEngine
var srcIP packet.IP done chan struct{} // closed after shutdown (not the ctx.Done() chan)
cancel context.CancelFunc
}
e.wgLock.Lock() // close cleans up pinger and removes it from the userspaceEngine.pingers map.
if len(e.lastCfg.Addresses) > 0 { // It cannot be called while p.e.mu is held.
srcIP = packet.NewIP(e.lastCfg.Addresses[0].IP.IP()) func (p *pinger) close() {
} p.cancel()
e.wgLock.Unlock() <-p.done
}
if srcIP == 0 { func (p *pinger) run(ctx context.Context, peerKey wgcfg.Key, ips []wgcfg.IP, srcIP packet.IP) {
e.logf("generating initial ping traffic: no source IP") defer func() {
return p.e.mu.Lock()
} if p.e.pingers[peerKey] == p {
delete(p.e.pingers, peerKey)
}
p.e.mu.Unlock()
e.mu.Lock() close(p.done)
if cancel := e.pingers[peerKey]; cancel != nil { }()
cancel()
}
ctx, cancel := context.WithCancel(context.Background())
e.pingers[peerKey] = cancel
e.mu.Unlock()
// sendFreq is slightly longer than sprayFreq in magicsock to ensure // sendFreq is slightly longer than sprayFreq in magicsock to ensure
// that if these ping packets are the only source of early packets // that if these ping packets are the only source of early packets
@ -296,19 +297,6 @@ func (e *userspaceEngine) pinger(peerKey wgcfg.Key, ips []wgcfg.IP) {
payload := []byte("magicsock_spray") // no meaning payload := []byte("magicsock_spray") // no meaning
defer func() {
e.mu.Lock()
defer e.mu.Unlock()
select {
case <-ctx.Done():
return
default:
}
// If the pinger context is not done, then the
// CancelFunc is still in the pingers map.
delete(e.pingers, peerKey)
}()
ipid := uint16(1) ipid := uint16(1)
t := time.NewTicker(sendFreq) t := time.NewTicker(sendFreq)
defer t.Stop() defer t.Stop()
@ -323,10 +311,52 @@ func (e *userspaceEngine) pinger(peerKey wgcfg.Key, ips []wgcfg.IP) {
} }
for _, dstIP := range dstIPs { for _, dstIP := range dstIPs {
b := packet.GenICMP(srcIP, dstIP, ipid, packet.ICMPEchoRequest, 0, payload) b := packet.GenICMP(srcIP, dstIP, ipid, packet.ICMPEchoRequest, 0, payload)
e.tundev.InjectOutbound(b) p.e.tundev.InjectOutbound(b)
} }
ipid++ ipid++
} }
}
// pinger sends ping packets for a few seconds.
//
// These generated packets are used to ensure we trigger the spray logic in
// the magicsock package for NAT traversal.
func (e *userspaceEngine) pinger(peerKey wgcfg.Key, ips []wgcfg.IP) {
e.logf("generating initial ping traffic to %s (%v)", peerKey.ShortString(), ips)
var srcIP packet.IP
e.wgLock.Lock()
if len(e.lastCfg.Addresses) > 0 {
srcIP = packet.NewIP(e.lastCfg.Addresses[0].IP.IP())
}
e.wgLock.Unlock()
if srcIP == 0 {
e.logf("generating initial ping traffic: no source IP")
return
}
ctx, cancel := context.WithCancel(context.Background())
p := &pinger{
e: e,
done: make(chan struct{}),
cancel: cancel,
}
e.mu.Lock()
if e.closing {
e.mu.Unlock()
return
}
oldPinger := e.pingers[peerKey]
e.pingers[peerKey] = p
e.mu.Unlock()
if oldPinger != nil {
oldPinger.close()
}
p.run(ctx, peerKey, ips, srcIP)
} }
func configSignature(cfg *wgcfg.Config, routerCfg *router.Config) (string, error) { func configSignature(cfg *wgcfg.Config, routerCfg *router.Config) (string, error) {
@ -565,15 +595,16 @@ func (e *userspaceEngine) RequestStatus() {
} }
func (e *userspaceEngine) Close() { func (e *userspaceEngine) Close() {
var pingers []*pinger
e.mu.Lock() e.mu.Lock()
if e.closing { if e.closing {
e.mu.Unlock() e.mu.Unlock()
return return
} }
e.closing = true e.closing = true
for key, cancel := range e.pingers { for _, pinger := range e.pingers {
delete(e.pingers, key) pingers = append(pingers, pinger)
cancel()
} }
e.mu.Unlock() e.mu.Unlock()
@ -583,6 +614,13 @@ func (e *userspaceEngine) Close() {
e.linkMon.Close() e.linkMon.Close()
e.router.Close() e.router.Close()
e.magicConn.Close() e.magicConn.Close()
// Shut down pingers after tundev is closed (by e.wgdev.Close) so the
// synchronous close does not get stuck on InjectOutbound.
for _, pinger := range pingers {
pinger.close()
}
close(e.waitCh) close(e.waitCh)
} }