ID BPF_PROG BPF_PROG_AUX BPF_PROG_TYPE TAG USED_MAPS 19 ffffb3cf80091000 ffff9b3a2d782c00 CGROUP_SKB 6deef7357e7b4530 XLATED: 64 JITED: 66 MEMLOCK: 4096 LOAD_TIME: Wed May 20 15:46:24 2020 GPL_COMPATIBLE: yes NAME: (unused) UID: 0 0xffffffffc01899a8: nopl 0x0(%rax,%rax,1) 0xffffffffc01899ad: push %rbp 0xffffffffc01899ae: mov %rsp,%rbp 0xffffffffc01899b1: sub $0x0,%rsp 0xffffffffc01899b8: push %rbx 0xffffffffc01899b9: push %r13 0xffffffffc01899bb: push %r14 0xffffffffc01899bd: push %r15 0xffffffffc01899bf: pushq $0x0 0xffffffffc01899c1: mov %rdi,%rbx 0xffffffffc01899c4: movzwq 0xb0(%rbx),%r13 0xffffffffc01899cc: xor %r14d,%r14d 0xffffffffc01899cf: or $0x2,%r14d 0xffffffffc01899d3: mov $0x1,%eax 0xffffffffc01899d8: cmp $0x2,%r14 0xffffffffc01899dc: jne 0xffffffffc01899e0 0xffffffffc01899de: xor %eax,%eax 0xffffffffc01899e0: pop %rbx 0xffffffffc01899e1: pop %r15 0xffffffffc01899e3: pop %r14 0xffffffffc01899e5: pop %r13 0xffffffffc01899e7: pop %rbx 0xffffffffc01899e8: leaveq 0xffffffffc01899e9: retq 0: (bf) r6 = r1 bf 16 00 00 00 00 00 00 1: (69) r7 = *(u16 *)(r6 +176) 69 67 b0 00 00 00 00 00 2: (b4) (u32) r8 = (u32) 0 b4 08 00 00 00 00 00 00 3: (44) (u32) r8 |= (u32) 2 44 08 00 00 02 00 00 00 4: (b7) r0 = 1 b7 00 00 00 01 00 00 00 5: (55) if r8 != 0x2 goto pc+1 55 08 01 00 02 00 00 00 6: (b7) r0 = 0 b7 00 00 00 00 00 00 00 7: (95) exit 95 00 00 00 00 00 00 00 struct bpf_prog { pages = 1, jited = 1, jit_requested = 1, gpl_compatible = 1, cb_access = 0, dst_needed = 0, blinded = 0, is_func = 0, kprobe_override = 0, has_callchain_buf = 0, enforce_expected_attach_type = 0, type = BPF_PROG_TYPE_CGROUP_SKB, expected_attach_type = BPF_CGROUP_INET_INGRESS, len = 8, jited_len = 66, tag = "m\356\367\065~{E0", aux = 0xffff9b3a2d782c00, orig_prog = 0x0, bpf_func = 0xffffffffc01899a8, { insns = 0xffffb3cf80091038, insnsi = 0xffffb3cf80091038 } } struct bpf_prog_aux { refcnt = { counter = 2 }, used_map_cnt = 0, max_ctx_offset = 20, max_pkt_offset = 0, max_tp_access = 0, stack_depth = 0, id = 19, func_cnt = 0, func_idx = 0, attach_btf_id = 0, linked_prog = 0x0, verifier_zext = false, offload_requested = false, attach_btf_trace = false, func_proto_unreliable = false, trampoline_prog_type = BPF_TRAMP_FENTRY, trampoline = 0x0, tramp_hlist = { next = 0x0, pprev = 0x0 }, attach_func_proto = 0x0, attach_func_name = 0x0, func = 0x0, jit_data = 0x0, poke_tab = 0x0, size_poke_tab = 0, ksym = { start = 18446744072637421992, end = 18446744072637423616, name = "bpf_prog_6deef7357e7b4530\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000", lnode = { next = 0xffff9b3a2d780d18, prev = 0xffffffff96472600 }, tnode = { node = {{ __rb_parent_color = 18446633272906091817, rb_right = 0x0, rb_left = 0x0 }, { __rb_parent_color = 18446633272906091841, rb_right = 0x0, rb_left = 0x0 }} }, prog = true }, ops = 0xffffffff95f47930, used_maps = 0x0, prog = 0xffffb3cf80091000, user = 0xffffffff96445180, load_time = 13687527260, cgroup_storage = {0x0, 0x0}, name = "\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000", security = 0x0, offload = 0x0, btf = 0x0, func_info = 0x0, func_info_aux = 0x0, linfo = 0x0, jited_linfo = 0x0, func_info_cnt = 0, nr_linfo = 0, linfo_idx = 0, num_exentries = 0, extable = 0xffffffffc01899ec, stats = 0x389547c228a0, { work = { data = { counter = 0 }, entry = { next = 0x0, prev = 0x0 }, func = 0x0 }, rcu = { next = 0x0, func = 0x0 } } } ID BPF_PROG BPF_PROG_AUX BPF_PROG_TYPE TAG USED_MAPS 20 ffffb3cf800c1000 ffff9b3a2d780c00 CGROUP_SKB 6deef7357e7b4530 XLATED: 64 JITED: 66 MEMLOCK: 4096 LOAD_TIME: Wed May 20 15:46:24 2020 GPL_COMPATIBLE: yes NAME: (unused) UID: 0 0xffffffffc018bec8: nopl 0x0(%rax,%rax,1) 0xffffffffc018becd: push %rbp 0xffffffffc018bece: mov %rsp,%rbp 0xffffffffc018bed1: sub $0x0,%rsp 0xffffffffc018bed8: push %rbx 0xffffffffc018bed9: push %r13 0xffffffffc018bedb: push %r14 0xffffffffc018bedd: push %r15 0xffffffffc018bedf: pushq $0x0 0xffffffffc018bee1: mov %rdi,%rbx 0xffffffffc018bee4: movzwq 0xb0(%rbx),%r13 0xffffffffc018beec: xor %r14d,%r14d 0xffffffffc018beef: or $0x2,%r14d 0xffffffffc018bef3: mov $0x1,%eax 0xffffffffc018bef8: cmp $0x2,%r14 0xffffffffc018befc: jne 0xffffffffc018bf00 0xffffffffc018befe: xor %eax,%eax 0xffffffffc018bf00: pop %rbx 0xffffffffc018bf01: pop %r15 0xffffffffc018bf03: pop %r14 0xffffffffc018bf05: pop %r13 0xffffffffc018bf07: pop %rbx 0xffffffffc018bf08: leaveq 0xffffffffc018bf09: retq 0: (bf) r6 = r1 bf 16 00 00 00 00 00 00 1: (69) r7 = *(u16 *)(r6 +176) 69 67 b0 00 00 00 00 00 2: (b4) (u32) r8 = (u32) 0 b4 08 00 00 00 00 00 00 3: (44) (u32) r8 |= (u32) 2 44 08 00 00 02 00 00 00 4: (b7) r0 = 1 b7 00 00 00 01 00 00 00 5: (55) if r8 != 0x2 goto pc+1 55 08 01 00 02 00 00 00 6: (b7) r0 = 0 b7 00 00 00 00 00 00 00 7: (95) exit 95 00 00 00 00 00 00 00 struct bpf_prog { pages = 1, jited = 1, jit_requested = 1, gpl_compatible = 1, cb_access = 0, dst_needed = 0, blinded = 0, is_func = 0, kprobe_override = 0, has_callchain_buf = 0, enforce_expected_attach_type = 0, type = BPF_PROG_TYPE_CGROUP_SKB, expected_attach_type = BPF_CGROUP_INET_INGRESS, len = 8, jited_len = 66, tag = "m\356\367\065~{E0", aux = 0xffff9b3a2d780c00, orig_prog = 0x0, bpf_func = 0xffffffffc018bec8, { insns = 0xffffb3cf800c1038, insnsi = 0xffffb3cf800c1038 } } struct bpf_prog_aux { refcnt = { counter = 2 }, used_map_cnt = 0, max_ctx_offset = 20, max_pkt_offset = 0, max_tp_access = 0, stack_depth = 0, id = 20, func_cnt = 0, func_idx = 0, attach_btf_id = 0, linked_prog = 0x0, verifier_zext = false, offload_requested = false, attach_btf_trace = false, func_proto_unreliable = false, trampoline_prog_type = BPF_TRAMP_FENTRY, trampoline = 0x0, tramp_hlist = { next = 0x0, pprev = 0x0 }, attach_func_proto = 0x0, attach_func_name = 0x0, func = 0x0, jit_data = 0x0, poke_tab = 0x0, size_poke_tab = 0, ksym = { start = 18446744072637431496, end = 18446744072637431808, name = "bpf_prog_6deef7357e7b4530\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000", lnode = { next = 0xffff9b3a2cc3e118, prev = 0xffff9b3a2d782d18 }, tnode = { node = {{ __rb_parent_color = 18446633273052944680, rb_right = 0xffff9b3a2cc3e128, rb_left = 0xffff9b3a2d782d28 }, { __rb_parent_color = 18446633273052944704, rb_right = 0xffff9b3a2cc3e140, rb_left = 0xffff9b3a2d782d40 }} }, prog = true }, ops = 0xffffffff95f47930, used_maps = 0x0, prog = 0xffffb3cf800c1000, user = 0xffffffff96445180, load_time = 13688241735, cgroup_storage = {0x0, 0x0}, name = "\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000", security = 0x0, offload = 0x0, btf = 0x0, func_info = 0x0, func_info_aux = 0x0, linfo = 0x0, jited_linfo = 0x0, func_info_cnt = 0, nr_linfo = 0, linfo_idx = 0, num_exentries = 0, extable = 0xffffffffc018bf0c, stats = 0x389547c228b0, { work = { data = { counter = 0 }, entry = { next = 0x0, prev = 0x0 }, func = 0x0 }, rcu = { next = 0x0, func = 0x0 } } } ID BPF_PROG BPF_PROG_AUX BPF_PROG_TYPE TAG USED_MAPS 21 ffffb3cf8017d000 ffff9b3a2cc3e000 CGROUP_SKB 6deef7357e7b4530 XLATED: 64 JITED: 66 MEMLOCK: 4096 LOAD_TIME: Wed May 20 15:46:25 2020 GPL_COMPATIBLE: yes NAME: (unused) UID: 0 0xffffffffc0249328: nopl 0x0(%rax,%rax,1) 0xffffffffc024932d: push %rbp 0xffffffffc024932e: mov %rsp,%rbp 0xffffffffc0249331: sub $0x0,%rsp 0xffffffffc0249338: push %rbx 0xffffffffc0249339: push %r13 0xffffffffc024933b: push %r14 0xffffffffc024933d: push %r15 0xffffffffc024933f: pushq $0x0 0xffffffffc0249341: mov %rdi,%rbx 0xffffffffc0249344: movzwq 0xb0(%rbx),%r13 0xffffffffc024934c: xor %r14d,%r14d 0xffffffffc024934f: or $0x2,%r14d 0xffffffffc0249353: mov $0x1,%eax 0xffffffffc0249358: cmp $0x2,%r14 0xffffffffc024935c: jne 0xffffffffc0249360 0xffffffffc024935e: xor %eax,%eax 0xffffffffc0249360: pop %rbx 0xffffffffc0249361: pop %r15 0xffffffffc0249363: pop %r14 0xffffffffc0249365: pop %r13 0xffffffffc0249367: pop %rbx 0xffffffffc0249368: leaveq 0xffffffffc0249369: retq 0: (bf) r6 = r1 bf 16 00 00 00 00 00 00 1: (69) r7 = *(u16 *)(r6 +176) 69 67 b0 00 00 00 00 00 2: (b4) (u32) r8 = (u32) 0 b4 08 00 00 00 00 00 00 3: (44) (u32) r8 |= (u32) 2 44 08 00 00 02 00 00 00 4: (b7) r0 = 1 b7 00 00 00 01 00 00 00 5: (55) if r8 != 0x2 goto pc+1 55 08 01 00 02 00 00 00 6: (b7) r0 = 0 b7 00 00 00 00 00 00 00 7: (95) exit 95 00 00 00 00 00 00 00 struct bpf_prog { pages = 1, jited = 1, jit_requested = 1, gpl_compatible = 1, cb_access = 0, dst_needed = 0, blinded = 0, is_func = 0, kprobe_override = 0, has_callchain_buf = 0, enforce_expected_attach_type = 0, type = BPF_PROG_TYPE_CGROUP_SKB, expected_attach_type = BPF_CGROUP_INET_INGRESS, len = 8, jited_len = 66, tag = "m\356\367\065~{E0", aux = 0xffff9b3a2cc3e000, orig_prog = 0x0, bpf_func = 0xffffffffc0249328, { insns = 0xffffb3cf8017d038, insnsi = 0xffffb3cf8017d038 } } struct bpf_prog_aux { refcnt = { counter = 2 }, used_map_cnt = 0, max_ctx_offset = 20, max_pkt_offset = 0, max_tp_access = 0, stack_depth = 0, id = 21, func_cnt = 0, func_idx = 0, attach_btf_id = 0, linked_prog = 0x0, verifier_zext = false, offload_requested = false, attach_btf_trace = false, func_proto_unreliable = false, trampoline_prog_type = BPF_TRAMP_FENTRY, trampoline = 0x0, tramp_hlist = { next = 0x0, pprev = 0x0 }, attach_func_proto = 0x0, attach_func_name = 0x0, func = 0x0, jit_data = 0x0, poke_tab = 0x0, size_poke_tab = 0, ksym = { start = 18446744072638206760, end = 18446744072638210048, name = "bpf_prog_6deef7357e7b4530\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000", lnode = { next = 0xffff9b3a3638d918, prev = 0xffff9b3a2d780d18 }, tnode = { node = {{ __rb_parent_color = 18446633272906091817, rb_right = 0x0, rb_left = 0x0 }, { __rb_parent_color = 18446633272906091841, rb_right = 0x0, rb_left = 0x0 }} }, prog = true }, ops = 0xffffffff95f47930, used_maps = 0x0, prog = 0xffffb3cf8017d000, user = 0xffffffff96445180, load_time = 14822436174, cgroup_storage = {0x0, 0x0}, name = "\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000", security = 0x0, offload = 0x0, btf = 0x0, func_info = 0x0, func_info_aux = 0x0, linfo = 0x0, jited_linfo = 0x0, func_info_cnt = 0, nr_linfo = 0, linfo_idx = 0, num_exentries = 0, extable = 0xffffffffc024936c, stats = 0x389547c26a60, { work = { data = { counter = 0 }, entry = { next = 0x0, prev = 0x0 }, func = 0x0 }, rcu = { next = 0x0, func = 0x0 } } } ID BPF_PROG BPF_PROG_AUX BPF_PROG_TYPE TAG USED_MAPS 22 ffffb3cf80185000 ffff9b3a3638d800 CGROUP_SKB 6deef7357e7b4530 XLATED: 64 JITED: 66 MEMLOCK: 4096 LOAD_TIME: Wed May 20 15:46:25 2020 GPL_COMPATIBLE: yes NAME: (unused) UID: 0 0xffffffffc0252f4c: nopl 0x0(%rax,%rax,1) 0xffffffffc0252f51: push %rbp 0xffffffffc0252f52: mov %rsp,%rbp 0xffffffffc0252f55: sub $0x0,%rsp 0xffffffffc0252f5c: push %rbx 0xffffffffc0252f5d: push %r13 0xffffffffc0252f5f: push %r14 0xffffffffc0252f61: push %r15 0xffffffffc0252f63: pushq $0x0 0xffffffffc0252f65: mov %rdi,%rbx 0xffffffffc0252f68: movzwq 0xb0(%rbx),%r13 0xffffffffc0252f70: xor %r14d,%r14d 0xffffffffc0252f73: or $0x2,%r14d 0xffffffffc0252f77: mov $0x1,%eax 0xffffffffc0252f7c: cmp $0x2,%r14 0xffffffffc0252f80: jne 0xffffffffc0252f84 0xffffffffc0252f82: xor %eax,%eax 0xffffffffc0252f84: pop %rbx 0xffffffffc0252f85: pop %r15 0xffffffffc0252f87: pop %r14 0xffffffffc0252f89: pop %r13 0xffffffffc0252f8b: pop %rbx 0xffffffffc0252f8c: leaveq 0xffffffffc0252f8d: retq 0: (bf) r6 = r1 bf 16 00 00 00 00 00 00 1: (69) r7 = *(u16 *)(r6 +176) 69 67 b0 00 00 00 00 00 2: (b4) (u32) r8 = (u32) 0 b4 08 00 00 00 00 00 00 3: (44) (u32) r8 |= (u32) 2 44 08 00 00 02 00 00 00 4: (b7) r0 = 1 b7 00 00 00 01 00 00 00 5: (55) if r8 != 0x2 goto pc+1 55 08 01 00 02 00 00 00 6: (b7) r0 = 0 b7 00 00 00 00 00 00 00 7: (95) exit 95 00 00 00 00 00 00 00 struct bpf_prog { pages = 1, jited = 1, jit_requested = 1, gpl_compatible = 1, cb_access = 0, dst_needed = 0, blinded = 0, is_func = 0, kprobe_override = 0, has_callchain_buf = 0, enforce_expected_attach_type = 0, type = BPF_PROG_TYPE_CGROUP_SKB, expected_attach_type = BPF_CGROUP_INET_INGRESS, len = 8, jited_len = 66, tag = "m\356\367\065~{E0", aux = 0xffff9b3a3638d800, orig_prog = 0x0, bpf_func = 0xffffffffc0252f4c, { insns = 0xffffb3cf80185038, insnsi = 0xffffb3cf80185038 } } struct bpf_prog_aux { refcnt = { counter = 2 }, used_map_cnt = 0, max_ctx_offset = 20, max_pkt_offset = 0, max_tp_access = 0, stack_depth = 0, id = 22, func_cnt = 0, func_idx = 0, attach_btf_id = 0, linked_prog = 0x0, verifier_zext = false, offload_requested = false, attach_btf_trace = false, func_proto_unreliable = false, trampoline_prog_type = BPF_TRAMP_FENTRY, trampoline = 0x0, tramp_hlist = { next = 0x0, pprev = 0x0 }, attach_func_proto = 0x0, attach_func_name = 0x0, func = 0x0, jit_data = 0x0, poke_tab = 0x0, size_poke_tab = 0, ksym = { start = 18446744072638246732, end = 18446744072638246912, name = "bpf_prog_6deef7357e7b4530\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000", lnode = { next = 0xffff9b3a33112918, prev = 0xffff9b3a2cc3e118 }, tnode = { node = {{ __rb_parent_color = 1, rb_right = 0xffff9b3a351ff928, rb_left = 0xffff9b3a2d780d28 }, { __rb_parent_color = 1, rb_right = 0xffff9b3a351ff940, rb_left = 0xffff9b3a2d780d40 }} }, prog = true }, ops = 0xffffffff95f47930, used_maps = 0x0, prog = 0xffffb3cf80185000, user = 0xffffffff96445180, load_time = 14822642022, cgroup_storage = {0x0, 0x0}, name = "\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000", security = 0x0, offload = 0x0, btf = 0x0, func_info = 0x0, func_info_aux = 0x0, linfo = 0x0, jited_linfo = 0x0, func_info_cnt = 0, nr_linfo = 0, linfo_idx = 0, num_exentries = 0, extable = 0xffffffffc0252f90, stats = 0x389547c26a70, { work = { data = { counter = 0 }, entry = { next = 0x0, prev = 0x0 }, func = 0x0 }, rcu = { next = 0x0, func = 0x0 } } } ID BPF_PROG BPF_PROG_AUX BPF_PROG_TYPE TAG USED_MAPS 23 ffffb3cf805bd000 ffff9b3a33112800 CGROUP_SKB 6deef7357e7b4530 XLATED: 64 JITED: 66 MEMLOCK: 4096 LOAD_TIME: Wed May 20 15:46:35 2020 GPL_COMPATIBLE: yes NAME: (unused) UID: 0 0xffffffffc11a49b0: nopl 0x0(%rax,%rax,1) 0xffffffffc11a49b5: push %rbp 0xffffffffc11a49b6: mov %rsp,%rbp 0xffffffffc11a49b9: sub $0x0,%rsp 0xffffffffc11a49c0: push %rbx 0xffffffffc11a49c1: push %r13 0xffffffffc11a49c3: push %r14 0xffffffffc11a49c5: push %r15 0xffffffffc11a49c7: pushq $0x0 0xffffffffc11a49c9: mov %rdi,%rbx 0xffffffffc11a49cc: movzwq 0xb0(%rbx),%r13 0xffffffffc11a49d4: xor %r14d,%r14d 0xffffffffc11a49d7: or $0x2,%r14d 0xffffffffc11a49db: mov $0x1,%eax 0xffffffffc11a49e0: cmp $0x2,%r14 0xffffffffc11a49e4: jne 0xffffffffc11a49e8 0xffffffffc11a49e6: xor %eax,%eax 0xffffffffc11a49e8: pop %rbx 0xffffffffc11a49e9: pop %r15 0xffffffffc11a49eb: pop %r14 0xffffffffc11a49ed: pop %r13 0xffffffffc11a49ef: pop %rbx 0xffffffffc11a49f0: leaveq 0xffffffffc11a49f1: retq 0: (bf) r6 = r1 bf 16 00 00 00 00 00 00 1: (69) r7 = *(u16 *)(r6 +176) 69 67 b0 00 00 00 00 00 2: (b4) (u32) r8 = (u32) 0 b4 08 00 00 00 00 00 00 3: (44) (u32) r8 |= (u32) 2 44 08 00 00 02 00 00 00 4: (b7) r0 = 1 b7 00 00 00 01 00 00 00 5: (55) if r8 != 0x2 goto pc+1 55 08 01 00 02 00 00 00 6: (b7) r0 = 0 b7 00 00 00 00 00 00 00 7: (95) exit 95 00 00 00 00 00 00 00 struct bpf_prog { pages = 1, jited = 1, jit_requested = 1, gpl_compatible = 1, cb_access = 0, dst_needed = 0, blinded = 0, is_func = 0, kprobe_override = 0, has_callchain_buf = 0, enforce_expected_attach_type = 0, type = BPF_PROG_TYPE_CGROUP_SKB, expected_attach_type = BPF_CGROUP_INET_INGRESS, len = 8, jited_len = 66, tag = "m\356\367\065~{E0", aux = 0xffff9b3a33112800, orig_prog = 0x0, bpf_func = 0xffffffffc11a49b0, { insns = 0xffffb3cf805bd038, insnsi = 0xffffb3cf805bd038 } } struct bpf_prog_aux { refcnt = { counter = 2 }, used_map_cnt = 0, max_ctx_offset = 20, max_pkt_offset = 0, max_tp_access = 0, stack_depth = 0, id = 23, func_cnt = 0, func_idx = 0, attach_btf_id = 0, linked_prog = 0x0, verifier_zext = false, offload_requested = false, attach_btf_trace = false, func_proto_unreliable = false, trampoline_prog_type = BPF_TRAMP_FENTRY, trampoline = 0x0, tramp_hlist = { next = 0x0, pprev = 0x0 }, attach_func_proto = 0x0, attach_func_name = 0x0, func = 0x0, jit_data = 0x0, poke_tab = 0x0, size_poke_tab = 0, ksym = { start = 18446744072654309808, end = 18446744072654311424, name = "bpf_prog_6deef7357e7b4530\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000", lnode = { next = 0xffff9b3a351ff918, prev = 0xffff9b3a3638d918 }, tnode = { node = {{ __rb_parent_color = 18446633273034537257, rb_right = 0x0, rb_left = 0x0 }, { __rb_parent_color = 18446633273034537281, rb_right = 0x0, rb_left = 0x0 }} }, prog = true }, ops = 0xffffffff95f47930, used_maps = 0x0, prog = 0xffffb3cf805bd000, user = 0xffffffff96445180, load_time = 24716313126, cgroup_storage = {0x0, 0x0}, name = "\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000", security = 0x0, offload = 0x0, btf = 0x0, func_info = 0x0, func_info_aux = 0x0, linfo = 0x0, jited_linfo = 0x0, func_info_cnt = 0, nr_linfo = 0, linfo_idx = 0, num_exentries = 0, extable = 0xffffffffc11a49f4, stats = 0x389547c4b7b0, { work = { data = { counter = 0 }, entry = { next = 0x0, prev = 0x0 }, func = 0x0 }, rcu = { next = 0x0, func = 0x0 } } } ID BPF_PROG BPF_PROG_AUX BPF_PROG_TYPE TAG USED_MAPS 24 ffffb3cf805c5000 ffff9b3a351ff800 CGROUP_SKB 6deef7357e7b4530 XLATED: 64 JITED: 66 MEMLOCK: 4096 LOAD_TIME: Wed May 20 15:46:34 2020 GPL_COMPATIBLE: yes NAME: (unused) UID: 0 0xffffffffc11a65ec: nopl 0x0(%rax,%rax,1) 0xffffffffc11a65f1: push %rbp 0xffffffffc11a65f2: mov %rsp,%rbp 0xffffffffc11a65f5: sub $0x0,%rsp 0xffffffffc11a65fc: push %rbx 0xffffffffc11a65fd: push %r13 0xffffffffc11a65ff: push %r14 0xffffffffc11a6601: push %r15 0xffffffffc11a6603: pushq $0x0 0xffffffffc11a6605: mov %rdi,%rbx 0xffffffffc11a6608: movzwq 0xb0(%rbx),%r13 0xffffffffc11a6610: xor %r14d,%r14d 0xffffffffc11a6613: or $0x2,%r14d 0xffffffffc11a6617: mov $0x1,%eax 0xffffffffc11a661c: cmp $0x2,%r14 0xffffffffc11a6620: jne 0xffffffffc11a6624 0xffffffffc11a6622: xor %eax,%eax 0xffffffffc11a6624: pop %rbx 0xffffffffc11a6625: pop %r15 0xffffffffc11a6627: pop %r14 0xffffffffc11a6629: pop %r13 0xffffffffc11a662b: pop %rbx 0xffffffffc11a662c: leaveq 0xffffffffc11a662d: retq 0: (bf) r6 = r1 bf 16 00 00 00 00 00 00 1: (69) r7 = *(u16 *)(r6 +176) 69 67 b0 00 00 00 00 00 2: (b4) (u32) r8 = (u32) 0 b4 08 00 00 00 00 00 00 3: (44) (u32) r8 |= (u32) 2 44 08 00 00 02 00 00 00 4: (b7) r0 = 1 b7 00 00 00 01 00 00 00 5: (55) if r8 != 0x2 goto pc+1 55 08 01 00 02 00 00 00 6: (b7) r0 = 0 b7 00 00 00 00 00 00 00 7: (95) exit 95 00 00 00 00 00 00 00 struct bpf_prog { pages = 1, jited = 1, jit_requested = 1, gpl_compatible = 1, cb_access = 0, dst_needed = 0, blinded = 0, is_func = 0, kprobe_override = 0, has_callchain_buf = 0, enforce_expected_attach_type = 0, type = BPF_PROG_TYPE_CGROUP_SKB, expected_attach_type = BPF_CGROUP_INET_INGRESS, len = 8, jited_len = 66, tag = "m\356\367\065~{E0", aux = 0xffff9b3a351ff800, orig_prog = 0x0, bpf_func = 0xffffffffc11a65ec, { insns = 0xffffb3cf805c5038, insnsi = 0xffffb3cf805c5038 } } struct bpf_prog_aux { refcnt = { counter = 2 }, used_map_cnt = 0, max_ctx_offset = 20, max_pkt_offset = 0, max_tp_access = 0, stack_depth = 0, id = 24, func_cnt = 0, func_idx = 0, attach_btf_id = 0, linked_prog = 0x0, verifier_zext = false, offload_requested = false, attach_btf_trace = false, func_proto_unreliable = false, trampoline_prog_type = BPF_TRAMP_FENTRY, trampoline = 0x0, tramp_hlist = { next = 0x0, pprev = 0x0 }, attach_func_proto = 0x0, attach_func_name = 0x0, func = 0x0, jit_data = 0x0, poke_tab = 0x0, size_poke_tab = 0, ksym = { start = 18446744072654317036, end = 18446744072654319616, name = "bpf_prog_6deef7357e7b4530\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000", lnode = { next = 0xffffffff96516eb0, prev = 0xffff9b3a33112918 }, tnode = { node = {{ __rb_parent_color = 18446633273052944680, rb_right = 0xffff9b398ab53128, rb_left = 0xffff9b3a33112928 }, { __rb_parent_color = 18446633273052944704, rb_right = 0xffff9b398ab53140, rb_left = 0xffff9b3a33112940 }} }, prog = true }, ops = 0xffffffff95f47930, used_maps = 0x0, prog = 0xffffb3cf805c5000, user = 0xffffffff96445180, load_time = 24716751446, cgroup_storage = {0x0, 0x0}, name = "\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000", security = 0x0, offload = 0x0, btf = 0x0, func_info = 0x0, func_info_aux = 0x0, linfo = 0x0, jited_linfo = 0x0, func_info_cnt = 0, nr_linfo = 0, linfo_idx = 0, num_exentries = 0, extable = 0xffffffffc11a6630, stats = 0x389547c4b940, { work = { data = { counter = 0 }, entry = { next = 0x0, prev = 0x0 }, func = 0x0 }, rcu = { next = 0x0, func = 0x0 } } } ID BPF_PROG BPF_PROG_AUX BPF_PROG_TYPE TAG USED_MAPS 47 ffffb3cf80063000 ffff9b398ab51800 CGROUP_SKB 6deef7357e7b4530 XLATED: 64 JITED: 66 MEMLOCK: 4096 LOAD_TIME: Wed May 20 19:24:34 2020 GPL_COMPATIBLE: yes NAME: (unused) UID: 0 0xffffffffc129b680: nopl 0x0(%rax,%rax,1) 0xffffffffc129b685: push %rbp 0xffffffffc129b686: mov %rsp,%rbp 0xffffffffc129b689: sub $0x0,%rsp 0xffffffffc129b690: push %rbx 0xffffffffc129b691: push %r13 0xffffffffc129b693: push %r14 0xffffffffc129b695: push %r15 0xffffffffc129b697: pushq $0x0 0xffffffffc129b699: mov %rdi,%rbx 0xffffffffc129b69c: movzwq 0xb0(%rbx),%r13 0xffffffffc129b6a4: xor %r14d,%r14d 0xffffffffc129b6a7: or $0x2,%r14d 0xffffffffc129b6ab: mov $0x1,%eax 0xffffffffc129b6b0: cmp $0x2,%r14 0xffffffffc129b6b4: jne 0xffffffffc129b6b8 0xffffffffc129b6b6: xor %eax,%eax 0xffffffffc129b6b8: pop %rbx 0xffffffffc129b6b9: pop %r15 0xffffffffc129b6bb: pop %r14 0xffffffffc129b6bd: pop %r13 0xffffffffc129b6bf: pop %rbx 0xffffffffc129b6c0: leaveq 0xffffffffc129b6c1: retq 0: (bf) r6 = r1 bf 16 00 00 00 00 00 00 1: (69) r7 = *(u16 *)(r6 +176) 69 67 b0 00 00 00 00 00 2: (b4) (u32) r8 = (u32) 0 b4 08 00 00 00 00 00 00 3: (44) (u32) r8 |= (u32) 2 44 08 00 00 02 00 00 00 4: (b7) r0 = 1 b7 00 00 00 01 00 00 00 5: (55) if r8 != 0x2 goto pc+1 55 08 01 00 02 00 00 00 6: (b7) r0 = 0 b7 00 00 00 00 00 00 00 7: (95) exit 95 00 00 00 00 00 00 00 struct bpf_prog { pages = 1, jited = 1, jit_requested = 1, gpl_compatible = 1, cb_access = 0, dst_needed = 0, blinded = 0, is_func = 0, kprobe_override = 0, has_callchain_buf = 0, enforce_expected_attach_type = 0, type = BPF_PROG_TYPE_CGROUP_SKB, expected_attach_type = BPF_CGROUP_INET_INGRESS, len = 8, jited_len = 66, tag = "m\356\367\065~{E0", aux = 0xffff9b398ab51800, orig_prog = 0x0, bpf_func = 0xffffffffc129b680, { insns = 0xffffb3cf80063038, insnsi = 0xffffb3cf80063038 } } struct bpf_prog_aux { refcnt = { counter = 2 }, used_map_cnt = 0, max_ctx_offset = 20, max_pkt_offset = 0, max_tp_access = 0, stack_depth = 0, id = 47, func_cnt = 0, func_idx = 0, attach_btf_id = 0, linked_prog = 0x0, verifier_zext = false, offload_requested = false, attach_btf_trace = false, func_proto_unreliable = false, trampoline_prog_type = BPF_TRAMP_FENTRY, trampoline = 0x0, tramp_hlist = { next = 0x0, pprev = 0x0 }, attach_func_proto = 0x0, attach_func_name = 0x0, func = 0x0, jit_data = 0x0, poke_tab = 0x0, size_poke_tab = 0, ksym = { start = 18446744072655320704, end = 18446744072655323136, name = "bpf_prog_6deef7357e7b4530\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000", lnode = { next = 0xffff9b398ab53118, prev = 0xffffffff96516eb0 }, tnode = { node = {{ __rb_parent_color = 18446633270175412520, rb_right = 0x0, rb_left = 0x0 }, { __rb_parent_color = 18446633270175412544, rb_right = 0x0, rb_left = 0x0 }} }, prog = true }, ops = 0xffffffff95f47930, used_maps = 0x0, prog = 0xffffb3cf80063000, user = 0xffffffff96445180, load_time = 13104738277625, cgroup_storage = {0x0, 0x0}, name = "\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000", security = 0x0, offload = 0x0, btf = 0x0, func_info = 0x0, func_info_aux = 0x0, linfo = 0x0, jited_linfo = 0x0, func_info_cnt = 0, nr_linfo = 0, linfo_idx = 0, num_exentries = 0, extable = 0xffffffffc129b6c4, stats = 0x389547a41690, { work = { data = { counter = 0 }, entry = { next = 0x0, prev = 0x0 }, func = 0x0 }, rcu = { next = 0x0, func = 0x0 } } } ID BPF_PROG BPF_PROG_AUX BPF_PROG_TYPE TAG USED_MAPS 48 ffffb3cf80053000 ffff9b398ab53000 CGROUP_SKB 6deef7357e7b4530 XLATED: 64 JITED: 66 MEMLOCK: 4096 LOAD_TIME: Wed May 20 19:24:35 2020 GPL_COMPATIBLE: yes NAME: (unused) UID: 0 0xffffffffc12a2198: nopl 0x0(%rax,%rax,1) 0xffffffffc12a219d: push %rbp 0xffffffffc12a219e: mov %rsp,%rbp 0xffffffffc12a21a1: sub $0x0,%rsp 0xffffffffc12a21a8: push %rbx 0xffffffffc12a21a9: push %r13 0xffffffffc12a21ab: push %r14 0xffffffffc12a21ad: push %r15 0xffffffffc12a21af: pushq $0x0 0xffffffffc12a21b1: mov %rdi,%rbx 0xffffffffc12a21b4: movzwq 0xb0(%rbx),%r13 0xffffffffc12a21bc: xor %r14d,%r14d 0xffffffffc12a21bf: or $0x2,%r14d 0xffffffffc12a21c3: mov $0x1,%eax 0xffffffffc12a21c8: cmp $0x2,%r14 0xffffffffc12a21cc: jne 0xffffffffc12a21d0 0xffffffffc12a21ce: xor %eax,%eax 0xffffffffc12a21d0: pop %rbx 0xffffffffc12a21d1: pop %r15 0xffffffffc12a21d3: pop %r14 0xffffffffc12a21d5: pop %r13 0xffffffffc12a21d7: pop %rbx 0xffffffffc12a21d8: leaveq 0xffffffffc12a21d9: retq 0: (bf) r6 = r1 bf 16 00 00 00 00 00 00 1: (69) r7 = *(u16 *)(r6 +176) 69 67 b0 00 00 00 00 00 2: (b4) (u32) r8 = (u32) 0 b4 08 00 00 00 00 00 00 3: (44) (u32) r8 |= (u32) 2 44 08 00 00 02 00 00 00 4: (b7) r0 = 1 b7 00 00 00 01 00 00 00 5: (55) if r8 != 0x2 goto pc+1 55 08 01 00 02 00 00 00 6: (b7) r0 = 0 b7 00 00 00 00 00 00 00 7: (95) exit 95 00 00 00 00 00 00 00 struct bpf_prog { pages = 1, jited = 1, jit_requested = 1, gpl_compatible = 1, cb_access = 0, dst_needed = 0, blinded = 0, is_func = 0, kprobe_override = 0, has_callchain_buf = 0, enforce_expected_attach_type = 0, type = BPF_PROG_TYPE_CGROUP_SKB, expected_attach_type = BPF_CGROUP_INET_INGRESS, len = 8, jited_len = 66, tag = "m\356\367\065~{E0", aux = 0xffff9b398ab53000, orig_prog = 0x0, bpf_func = 0xffffffffc12a2198, { insns = 0xffffb3cf80053038, insnsi = 0xffffb3cf80053038 } } struct bpf_prog_aux { refcnt = { counter = 2 }, used_map_cnt = 0, max_ctx_offset = 20, max_pkt_offset = 0, max_tp_access = 0, stack_depth = 0, id = 48, func_cnt = 0, func_idx = 0, attach_btf_id = 0, linked_prog = 0x0, verifier_zext = false, offload_requested = false, attach_btf_trace = false, func_proto_unreliable = false, trampoline_prog_type = BPF_TRAMP_FENTRY, trampoline = 0x0, tramp_hlist = { next = 0x0, pprev = 0x0 }, attach_func_proto = 0x0, attach_func_name = 0x0, func = 0x0, jit_data = 0x0, poke_tab = 0x0, size_poke_tab = 0, ksym = { start = 18446744072655348120, end = 18446744072655351808, name = "bpf_prog_6deef7357e7b4530\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000", lnode = { next = 0xffffffff96472600, prev = 0xffff9b398ab51918 }, tnode = { node = {{ __rb_parent_color = 18446633273034537257, rb_right = 0xffffffff96516ec0, rb_left = 0xffff9b398ab51928 }, { __rb_parent_color = 18446633273034537281, rb_right = 0xffffffff96516ed8, rb_left = 0xffff9b398ab51940 }} }, prog = true }, ops = 0xffffffff95f47930, used_maps = 0x0, prog = 0xffffb3cf80053000, user = 0xffffffff96445180, load_time = 13104738670931, cgroup_storage = {0x0, 0x0}, name = "\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000", security = 0x0, offload = 0x0, btf = 0x0, func_info = 0x0, func_info_aux = 0x0, linfo = 0x0, jited_linfo = 0x0, func_info_cnt = 0, nr_linfo = 0, linfo_idx = 0, num_exentries = 0, extable = 0xffffffffc12a21dc, stats = 0x389547a416a0, { work = { data = { counter = 0 }, entry = { next = 0x0, prev = 0x0 }, func = 0x0 }, rcu = { next = 0x0, func = 0x0 } } } ID BPF_MAP BPF_MAP_TYPE MAP_FLAGS 1 ffff9b3a07b04000 HASH 00000001 KEY_SIZE: 4 VALUE_SIZE: 1 MAX_ENTRIES: 65535 MEMLOCK: 5246976 NAME: "calico_failsafe" UID: 0 struct bpf_map { ops = 0xffffffff95e4f900, inner_map_meta = 0x0, security = 0x0, map_type = BPF_MAP_TYPE_HASH, key_size = 4, value_size = 1, max_entries = 65535, map_flags = 1, spin_lock_off = -22, id = 1, numa_node = -1, btf_key_type_id = 0, btf_value_type_id = 0, btf = 0x0, memory = { pages = 1281, user = 0xffffffff96445180 }, name = "calico_failsafe", btf_vmlinux_value_type_id = 0, unpriv_array = false, frozen = false, refcnt = { counter = 1 }, usercnt = { counter = 1 }, work = { data = { counter = 0 }, entry = { next = 0x0, prev = 0x0 }, func = 0x0 }, freeze_mutex = { owner = { counter = 0 }, wait_lock = { { rlock = { raw_lock = { { val = { counter = 0 }, { locked = 0 '\000', pending = 0 '\000' }, { locked_pending = 0, tail = 0 } } } } } }, osq = { tail = { counter = 0 } }, wait_list = { next = 0xffff9b3a07b040c0, prev = 0xffff9b3a07b040c0 } }, writecnt = 0 }