wgengine/router: fix checkIPRuleSupportsV6 to actually use IPv6

Updates #3358 (should fix it)
Updates #391

Change-Id: Ia62437dfa81247b0b5994d554cf279c3d540e4e7
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com>
pull/3282/head
Brad Fitzpatrick 3 years ago committed by Brad Fitzpatrick
parent 9259377a7f
commit 946dfec98a

@ -119,7 +119,7 @@ func newUserspaceRouter(logf logger.Logf, tunDev tun.Device, linkMon *monitor.Mo
return nil, err return nil, err
} }
v6err := checkIPv6() v6err := checkIPv6(logf)
if v6err != nil { if v6err != nil {
logf("disabling tunneled IPv6 due to system IPv6 config: %v", v6err) logf("disabling tunneled IPv6 due to system IPv6 config: %v", v6err)
} }
@ -169,7 +169,7 @@ func newUserspaceRouterAdvanced(logf logger.Logf, tunname string, linkMon *monit
r.logf("error querying IP rules (does kernel have IP_MULTIPLE_TABLES?): %v", err) r.logf("error querying IP rules (does kernel have IP_MULTIPLE_TABLES?): %v", err)
r.logf("warning: running without policy routing") r.logf("warning: running without policy routing")
} else { } else {
r.logf("policy routing available; found %d rules", len(rules)) r.logf("[v1] policy routing available; found %d rules", len(rules))
r.ipRuleAvailable = true r.ipRuleAvailable = true
} }
} }
@ -1492,7 +1492,7 @@ func cleanup(logf logger.Logf, interfaceName string) {
// missing. It does not check that IPv6 is currently functional or // missing. It does not check that IPv6 is currently functional or
// that there's a global address, just that the system would support // that there's a global address, just that the system would support
// IPv6 if it were on an IPv6 network. // IPv6 if it were on an IPv6 network.
func checkIPv6() error { func checkIPv6(logf logger.Logf) error {
_, err := os.Stat("/proc/sys/net/ipv6") _, err := os.Stat("/proc/sys/net/ipv6")
if os.IsNotExist(err) { if os.IsNotExist(err) {
return err return err
@ -1524,7 +1524,7 @@ func checkIPv6() error {
} }
} }
if err := checkIPRuleSupportsV6(); err != nil { if err := checkIPRuleSupportsV6(logf); err != nil {
return fmt.Errorf("kernel doesn't support IPv6 policy routing: %w", err) return fmt.Errorf("kernel doesn't support IPv6 policy routing: %w", err)
} }
@ -1552,11 +1552,24 @@ func supportsV6NAT() bool {
return bytes.Contains(bs, []byte("nat\n")) return bytes.Contains(bs, []byte("nat\n"))
} }
func checkIPRuleSupportsV6() error { func checkIPRuleSupportsV6(logf logger.Logf) error {
// First try just a read-only operation to ideally avoid
// having to modify any state.
if rules, err := netlink.RuleList(netlink.FAMILY_V6); err != nil {
return fmt.Errorf("querying IPv6 policy routing rules: %w", err)
} else {
if len(rules) > 0 {
logf("[v1] kernel supports IPv6 policy routing (found %d rules)", len(rules))
return nil
}
}
// Try to actually create & delete one as a test.
rule := netlink.NewRule() rule := netlink.NewRule()
rule.Priority = 1234 rule.Priority = 1234
rule.Mark = tailscaleBypassMarkNum rule.Mark = tailscaleBypassMarkNum
rule.Table = tailscaleRouteTable.num rule.Table = tailscaleRouteTable.num
rule.Family = netlink.FAMILY_V6
// First delete the rule unconditionally, and don't check for // First delete the rule unconditionally, and don't check for
// errors. This is just cleaning up anything that might be already // errors. This is just cleaning up anything that might be already
// there. // there.

@ -803,7 +803,7 @@ func TestDebugListRules(t *testing.T) {
} }
func TestCheckIPRuleSupportsV6(t *testing.T) { func TestCheckIPRuleSupportsV6(t *testing.T) {
err := checkIPRuleSupportsV6() err := checkIPRuleSupportsV6(t.Logf)
if err != nil && os.Getuid() != 0 { if err != nil && os.Getuid() != 0 {
t.Skipf("skipping, error when not root: %v", err) t.Skipf("skipping, error when not root: %v", err)
} }

Loading…
Cancel
Save