Skip to content

Commit

Permalink
Removed the change in fwp_um.cpp
Browse files Browse the repository at this point in the history
  • Loading branch information
shpalani committed Mar 31, 2023
1 parent 043bea8 commit 0f4f09f
Showing 1 changed file with 1 addition and 4 deletions.
5 changes: 1 addition & 4 deletions netebpfext/user/fwp_um.cpp
Original file line number Diff line number Diff line change
@@ -1,7 +1,6 @@
// Copyright (c) Microsoft Corporation
// SPDX-License-Identifier: MIT

#include "ebpf_fault_injection.h"
#include "fwp_um.h"
#include "net_ebpf_ext_sock_addr.h"
#include "netebpfext_platform.h"
Expand All @@ -22,8 +21,6 @@ DEFINE_GUID(EBPF_DEFAULT_SUBLAYER, 0x7c7b3fb9, 0x3331, 0x436a, 0x98, 0xe1, 0xb9,

std::unique_ptr<_fwp_engine> _fwp_engine::_engine;

static bool fault_injection_enabled = ebpf_fault_injection_is_enabled();

// Attempt to classify a test packet at a given WFP layer on a given interface index.
// This is used to test the xdp hook.
FWP_ACTION_TYPE
Expand Down Expand Up @@ -272,7 +269,7 @@ _fwp_engine::test_cgroup_inet4_connect(_In_ fwp_classify_parameters_t* parameter

action = test_callout(
FWPS_LAYER_ALE_CONNECT_REDIRECT_V4, FWPM_LAYER_ALE_CONNECT_REDIRECT_V4, EBPF_DEFAULT_SUBLAYER, incoming_value);
ebpf_assert(action == FWP_ACTION_PERMIT || !fault_injection_enabled);
ebpf_assert(action == FWP_ACTION_PERMIT);

if (_fwp_um_connect_request != nullptr) {
redirected =
Expand Down

0 comments on commit 0f4f09f

Please sign in to comment.