-
Notifications
You must be signed in to change notification settings - Fork 20
icmp: workaround for gvisor's fake ICMP echo #142
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: n2
Are you sure you want to change the base?
Conversation
Thanks. I wonder if this forceful default handling of ICMP is a bug on gvisor upstream despite having set a ICMP handler? It was working as I'd expect it to in previous (believe a year or so ago) gvisor version. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Pull Request Overview
This PR introduces a workaround for gvisor's fake ICMP echo by modifying the ICMP packet types and recalculating checksums for both ICMPv6 and ICMPv4 before processing.
- Adds a new ICMPHackTarget and associated Action method for intercepting and modifying ICMP packets.
- Implements restore functions to revert the experimental packet type changes and adjusts the outbound handler to invoke the hack.
Comments suppressed due to low confidence (2)
intra/netstack/icmp.go:36
- [nitpick] Consider replacing the magic number 200 with a clearly named constant (e.g., ICMPv6ExperimentalType) for improved readability and maintenance.
icmp6Hdr.SetType(200)
intra/netstack/icmp.go:56
- [nitpick] Replace the magic number 253 with a named constant (e.g., ICMPv4ExperimentalType) to enhance clarity and consistency.
icmp4Hdr.SetType(253)
🤔Will current handler work if these lines are deleted? |
I have a theory that these lines were written for inbound ICMP echo requests (packet sockets can receive them). @kevinGC |
Sorry, what's the specific question? I'm missing some context and not sure what 'fake' means in the title here. I don't remember any recent changes to ICMP handling. If you've set a custom handler for ICMP packets and the stack is still doing its own ICMP handling, I think that's because ICMP handling is tightly coupled to the ipv4 and ipv6 packages. Nobody has tried to split them AFAIK, so there's no easy way to turn off just ICMP. Packet sockets should get ICMP messages regardless of the code in the ipv4 and ipv6 packages; it happens earlier in packaet processing (around nic.go:DeliverLinkPacket). BTW @nybidari is the gVisor networking lead these days. |
Netstack replies to ICMP messages on its own and does not wait on the Handler set via I should note that Netstack we use is setup with Spoofing and is Promiscuous (ref), in addition to being the default gateway (
This happens even today. The Handler does get those packets, but Netstack replies to those packets before the Handler has had the chance. Like @Lanius-collaris points out, ICMP is handled internally (here) before being delivered to the Handler (here?)? For us, it is enough if ICMP requests ( |
"packet sockets" here mean sockets created with
I have tried and succeeded. 😆 |
bf17d71
to
04fe473
Compare
intra/netstack/icmp.go
Outdated
rules[index].Filter.Protocol = header.ICMPv6ProtocolNumber | ||
rules[index].Filter.CheckProtocol = true | ||
rules[index].Target = target | ||
ipt.ReplaceTable(stack.MangleID, table, true) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I tried bumping gvisor for my gvisor-playground, found that new gvisor requires ForceReplaceTable() to work. All rules in iptables become useless if shouldSkipOrPopulateTables() returns true……
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Are you saying, for the current changes to work, firestack would have to be pinned to its current gvisor@go version v0.0.0-20250816201027-ba3b9ca85f20
?
Line 27 in 96bf8e8
gvisor.dev/gvisor v0.0.0-20250816201027-ba3b9ca85f20 |
(I never really got the hang of the gvisor/netstack internals at all...)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I tried bumping gvisor for my gvisor-playground, found that new gvisor requires ForceReplaceTable() to work. All rules in iptables become useless if shouldSkipOrPopulateTables() returns true……
Are you saying, for the current changes to work, firestack would have to be pinned to its current gvisor@go version
v0.0.0-20250816201027-ba3b9ca85f20
?
I mean that shouldSkipOrPopulateTables()
return true ( https://github.com/google/gvisor/blob/fd370915f22e/pkg/tcpip/stack/iptables.go#L315 in some cases gvisor thinks modified iptables are not modified ) so 2cc55a2 doesn't work, but IPTables.ForceReplaceTable()
solves this problem, IPTables.ReplaceTable()
in gvisor v0.0.0-20231023213702-2691a8f9b1cf ( used by my gvisor-playground ) always works.
The comment about gvisor v0.0.0-20250816201027-ba3b9ca85f20 means that firestack's handler is not called after stack.SetTransportProtocolHandler(icmp.ProtocolNumber6, …)
…lify icmpForwarder.reply4() and icmpForwarder.reply6()
Can we create a bool |
Even if gvisor changes the behavior ( in |
Gotcha.
Recompiling firestack is no big deal? Each commit batch has a compiled artifact pushed to GitHub Packages and Maven Central... and we've managed to upgrade the gvisor@go module from upstream without much fanfare (at least until now). |
I means rethink app can't call |
Not working. I'm trying inserting code in other positions.