| From 1f85572a62a39799a9bac846d46965d9a57a1e24 Mon Sep 17 00:00:00 2001 |
| From: Sam Shih <sam.shih@mediatek.com> |
| Date: Fri, 2 Jun 2023 13:06:28 +0800 |
| Subject: [PATCH] |
| [networking][999-2704-netfilter_optional_tcp_window_check.patch] |
| |
| --- |
| net/netfilter/nf_conntrack_proto_tcp.c | 8 +++++++- |
| net/netfilter/nf_conntrack_standalone.c | 11 +++++++++++ |
| 2 files changed, 18 insertions(+), 1 deletion(-) |
| |
| diff --git a/net/netfilter/nf_conntrack_proto_tcp.c b/net/netfilter/nf_conntrack_proto_tcp.c |
| index aed967e2f..e219b6f34 100644 |
| --- a/net/netfilter/nf_conntrack_proto_tcp.c |
| +++ b/net/netfilter/nf_conntrack_proto_tcp.c |
| @@ -31,6 +31,9 @@ |
| #include <net/netfilter/ipv4/nf_conntrack_ipv4.h> |
| #include <net/netfilter/ipv6/nf_conntrack_ipv6.h> |
| |
| +/* Do not check the TCP window for incoming packets */ |
| +static int nf_ct_tcp_no_window_check __read_mostly = 1; |
| + |
| /* "Be conservative in what you do, |
| be liberal in what you accept from others." |
| If it's non-zero, we mark only out of window RST segments as INVALID. */ |
| @@ -476,6 +479,9 @@ static bool tcp_in_window(const struct nf_conn *ct, |
| s32 receiver_offset; |
| bool res, in_recv_win; |
| |
| + if (nf_ct_tcp_no_window_check) |
| + return true; |
| + |
| /* |
| * Get the required data from the packet. |
| */ |
| @@ -1139,7 +1145,7 @@ int nf_conntrack_tcp_packet(struct nf_conn *ct, |
| IP_CT_TCP_FLAG_DATA_UNACKNOWLEDGED && |
| timeouts[new_state] > timeouts[TCP_CONNTRACK_UNACK]) |
| timeout = timeouts[TCP_CONNTRACK_UNACK]; |
| - else if (ct->proto.tcp.last_win == 0 && |
| + else if (!nf_ct_tcp_no_window_check && ct->proto.tcp.last_win == 0 && |
| timeouts[new_state] > timeouts[TCP_CONNTRACK_RETRANS]) |
| timeout = timeouts[TCP_CONNTRACK_RETRANS]; |
| else |
| diff --git a/net/netfilter/nf_conntrack_standalone.c b/net/netfilter/nf_conntrack_standalone.c |
| index 73415bf51..236954e4f 100644 |
| --- a/net/netfilter/nf_conntrack_standalone.c |
| +++ b/net/netfilter/nf_conntrack_standalone.c |
| @@ -25,6 +25,9 @@ |
| #include <net/netfilter/nf_conntrack_timestamp.h> |
| #include <linux/rculist_nulls.h> |
| |
| +/* Do not check the TCP window for incoming packets */ |
| +static int nf_ct_tcp_no_window_check __read_mostly = 1; |
| + |
| static bool enable_hooks __read_mostly; |
| MODULE_PARM_DESC(enable_hooks, "Always enable conntrack hooks"); |
| module_param(enable_hooks, bool, 0000); |
| @@ -649,6 +652,7 @@ enum nf_ct_sysctl_index { |
| NF_SYSCTL_CT_PROTO_TIMEOUT_GRE_STREAM, |
| #endif |
| |
| + NF_SYSCTL_CT_PROTO_TCP_NO_WINDOW_CHECK, |
| __NF_SYSCTL_CT_LAST_SYSCTL, |
| }; |
| |
| @@ -969,6 +973,13 @@ static struct ctl_table nf_ct_sysctl_table[] = { |
| .proc_handler = proc_dointvec_jiffies, |
| }, |
| #endif |
| + [NF_SYSCTL_CT_PROTO_TCP_NO_WINDOW_CHECK] = { |
| + .procname = "nf_conntrack_tcp_no_window_check", |
| + .data = &nf_ct_tcp_no_window_check, |
| + .maxlen = sizeof(unsigned int), |
| + .mode = 0644, |
| + .proc_handler = proc_dointvec, |
| + }, |
| {} |
| }; |
| |
| -- |
| 2.34.1 |
| |