@@ -557,7 +557,7 @@ func (p *EBPFProbe) getRawPacketMaps() (rawPacketEventMap, routerMap *lib.Map, e
557
557
return rawPacketEventMap , routerMap , nil
558
558
}
559
559
560
- func (p * EBPFProbe ) enableRawPacket (enable bool ) err {
560
+ func (p * EBPFProbe ) enableRawPacket (enable bool ) error {
561
561
enabledMap , _ , err := p .Manager .GetMap ("raw_packet_enabled" )
562
562
if err != nil {
563
563
return err
@@ -615,8 +615,6 @@ func (p *EBPFProbe) setupRawPacketProgs(progSpecs []*lib.ProgramSpec, progKey ui
615
615
616
616
// setup tail calls
617
617
for i , progSpec := range progSpecs {
618
- fmt .Printf ("PROG!!!!!!! : %d => %s\n " , progKey + uint32 (i ), progSpec .Name )
619
-
620
618
if err := p .Manager .UpdateTailCallRoutes (manager.TailCallRoute {
621
619
Program : col .Programs [progSpec .Name ],
622
620
Key : progKey + uint32 (i ),
@@ -662,8 +660,6 @@ func (p *EBPFProbe) setupRawPacketFilters(rs *rules.RuleSet) error {
662
660
if err != nil {
663
661
return err
664
662
}
665
- } else {
666
- p .enableRawPacket (false )
667
663
}
668
664
669
665
// add or close if none
@@ -701,8 +697,7 @@ func (p *EBPFProbe) applyRawPacketActionFilters() error {
701
697
}
702
698
703
699
func (p * EBPFProbe ) addRawPacketActionFilter (actionFilter rawpacket.Filter ) error {
704
-
705
- fmt .Printf ("addRawPacketActionFilter: %+v\n " , actionFilter )
700
+ seclog .Infof ("add raw packet action filter: %+v\n " , actionFilter )
706
701
707
702
if slices .ContainsFunc (p .rawPacketActionFilters , func (af rawpacket.Filter ) bool {
708
703
return actionFilter .RuleID == af .RuleID
@@ -711,7 +706,6 @@ func (p *EBPFProbe) addRawPacketActionFilter(actionFilter rawpacket.Filter) erro
711
706
}
712
707
p .rawPacketActionFilters = append (p .rawPacketActionFilters , actionFilter )
713
708
714
- fmt .Printf ("p.rawPacketActionFilters: %+v\n " , p .rawPacketActionFilters )
715
709
return p .applyRawPacketActionFilters ()
716
710
}
717
711
@@ -806,11 +800,6 @@ func (p *EBPFProbe) AddActivityDumpHandler(handler backend.ActivityDumpHandler)
806
800
func (p * EBPFProbe ) DispatchEvent (event * model.Event , notifyConsumers bool ) {
807
801
logTraceEvent (event .GetEventType (), event )
808
802
809
- if event .GetEventType () == model .RawPacketActionEventType {
810
- fmt .Printf ("!!!!!!!!!!!!!!!!!!!!!!!!!: %+v\n " , event )
811
- return
812
- }
813
-
814
803
// filter out event if already present on a profile
815
804
p .profileManager .LookupEventInProfiles (event )
816
805
@@ -2242,6 +2231,9 @@ func (p *EBPFProbe) ApplyRuleSet(rs *rules.RuleSet) (*kfilters.FilterReport, err
2242
2231
}
2243
2232
2244
2233
if p .probe .IsNetworkRawPacketEnabled () {
2234
+ // disable first, and let the following code enable it if needed
2235
+ p .enableRawPacket (false )
2236
+
2245
2237
if err := p .setupRawPacketFilters (rs ); err != nil {
2246
2238
seclog .Errorf ("unable to load raw packet filter programs: %v" , err )
2247
2239
}
0 commit comments