Skip to content

Commit

Permalink
Merge pull request #26 from netfoundry/v0.5.9_release_candidate_nf
Browse files Browse the repository at this point in the history
Added a fix when ebpf is enabled on the loopback to forward all traff…
  • Loading branch information
r-caamano authored Feb 10, 2024
2 parents 585305d + 301e0db commit 923172d
Show file tree
Hide file tree
Showing 3 changed files with 11 additions and 1 deletion.
8 changes: 8 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,6 +3,14 @@
All notable changes to this project will be documented in this file. The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/), and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html).

---
# [0.5.9] - 2024-02-09

###

- Fixed an issue where if an ingress tc filter is applied to the loopback interface traffic is dropped if it does not specifically
match a rule. The correct action is to pass all traffic to the loopback unless there is a rule explicitly redirecting.
the traffic to either a tproxy port or ziti(tun) interface.

# [0.5.8] - 2024-01-28

###
Expand Down
2 changes: 1 addition & 1 deletion src/zfw.c
Original file line number Diff line number Diff line change
Expand Up @@ -152,7 +152,7 @@ char *tc_interface;
char *log_file_name;
char *object_file;
char *direction_string;
const char *argp_program_version = "0.5.8";
const char *argp_program_version = "0.5.9";
struct ring_buffer *ring_buffer;

__u8 if_list[MAX_IF_LIST_ENTRIES];
Expand Down
2 changes: 2 additions & 0 deletions src/zfw_tc_ingress.c
Original file line number Diff line number Diff line change
Expand Up @@ -1289,6 +1289,8 @@ int bpf_sk_splice4(struct __sk_buff *skb){
if(dmask == 0x00000000){
if((tracked_key_data->count > 0)){
return TC_ACT_PIPE;
}else if(skb->ingress_ifindex == 1){
return TC_ACT_OK;
}
}
iterate_masks(&dmask, &dexponent);
Expand Down

0 comments on commit 923172d

Please sign in to comment.