tailscale/cmd
James Tucker 8d6793fd70 wgengine/router,util/kmod: load & log xt_mark
Attempt to load the xt_mark kernel module when it is not present. If the
load fails, log error information.

It may be tempting to promote this failure to an error once it has been
in use for some time, so as to avoid reaching an error with the iptables
invocation, however, there are conditions under which the two stages may
disagree - this change adds more useful breadcrumbs.

Example new output from tailscaled running under my WSL2:

```
router: ensure module xt_mark: "/usr/sbin/modprobe xt_mark" failed: exit status 1; modprobe: FATAL: Module xt_mark not found in directory /lib/modules/5.10.43.3-microsoft-standard-WSL2
```

Background:

There are two places to lookup modules, one is `/proc/modules` "old",
the other is `/sys/module/` "new".

There was query_modules(2) in linux <2.6, alas, it is gone.

In a docker container in the default configuration, you would get
/proc/modules and /sys/module/ both populated. lsmod may work file,
modprobe will fail with EPERM at `finit_module()` for an unpriviliged
container.

In a priviliged container the load may *succeed*, if some conditions are
met. This condition should be avoided, but the code landing in this
change does not attempt to avoid this scenario as it is both difficult
to detect, and has a very uncertain impact.

In an nspawn container `/proc/modules` is populated, but `/sys/module`
does not exist. Modern `lsmod` versions will fail to gather most module
information, without sysfs being populated with module information.

In WSL2 modules are likely missing, as the in-use kernel typically is
not provided by the distribution filesystem, and WSL does not mount in a
module filesystem of its own. Notably the WSL2 kernel supports iptables
marks without listing the xt_mark module in /sys/module, and
/proc/modules is empty.

On a recent kernel, we can ask the capabilities system about SYS_MODULE,
that will help to disambiguate between the non-privileged container case
and just being root. On older kernels these calls may fail.

Update #4329

Signed-off-by: James Tucker <james@tailscale.com>
2022-04-20 22:21:35 -07:00
..
addlicense cmd/addlicense: add command to add licenseheaders to generated code 2021-07-19 15:31:56 -07:00
cloner all: use any instead of interface{} 2022-03-17 11:35:09 -07:00
derper cmd/derper: add --stun-port flag 2022-03-08 07:19:33 -08:00
derpprobe all: use any instead of interface{} 2022-03-17 11:35:09 -07:00
hello all: use strings.Cut even more 2022-03-19 13:02:38 -07:00
mkpkg cmd/mkpkg: use package flag (#4373) 2022-04-07 16:38:33 -04:00
nginx-auth cmd/nginx-auth: maintainer scripts and tailnet checking (#4460) 2022-04-20 13:06:05 -04:00
printdep cmd/printdep: add flag to print out Go toolchain tarball URL 2022-01-06 08:44:17 -08:00
proxy-to-grafana cmd/proxy-to-grafana: prevent premature termination 2022-04-19 13:31:36 -07:00
speedtest cmd: upgrade to ffcli v3 2021-09-14 13:21:55 -07:00
tailscale cmd/tailscale: add "debug via" subcommand to do CIDR math for via ranges 2022-04-20 14:47:48 -07:00
tailscaled wgengine/router,util/kmod: load & log xt_mark 2022-04-20 22:21:35 -07:00
testcontrol all: use any instead of interface{} 2022-03-17 11:35:09 -07:00
tsshd tempfork: temporarily fork gliderlabs/ssh and x/crypto/ssh 2022-03-26 21:07:01 -07:00