ID BPF_PROG BPF_PROG_AUX BPF_PROG_TYPE TAG USED_MAPS 15 ffffba37c00d1000 ffff9e11ad0f2800 CGROUP_SKB 6deef7357e7b4530 XLATED: 64 JITED: 66 MEMLOCK: 4096 LOAD_TIME: Wed May 20 15:46:24 2020 GPL_COMPATIBLE: yes NAME: (unused) UID: 0 0xffffffffc025f1b4: nopl 0x0(%rax,%rax,1) 0xffffffffc025f1b9: push %rbp 0xffffffffc025f1ba: mov %rsp,%rbp 0xffffffffc025f1bd: sub $0x0,%rsp 0xffffffffc025f1c4: push %rbx 0xffffffffc025f1c5: push %r13 0xffffffffc025f1c7: push %r14 0xffffffffc025f1c9: push %r15 0xffffffffc025f1cb: pushq $0x0 0xffffffffc025f1cd: mov %rdi,%rbx 0xffffffffc025f1d0: movzwq 0xb0(%rbx),%r13 0xffffffffc025f1d8: xor %r14d,%r14d 0xffffffffc025f1db: or $0x2,%r14d 0xffffffffc025f1df: mov $0x1,%eax 0xffffffffc025f1e4: cmp $0x2,%r14 0xffffffffc025f1e8: jne 0xffffffffc025f1ec 0xffffffffc025f1ea: xor %eax,%eax 0xffffffffc025f1ec: pop %rbx 0xffffffffc025f1ed: pop %r15 0xffffffffc025f1ef: pop %r14 0xffffffffc025f1f1: pop %r13 0xffffffffc025f1f3: pop %rbx 0xffffffffc025f1f4: leaveq 0xffffffffc025f1f5: retq 0: (bf) r6 = r1 bf 16 00 00 00 00 00 00 1: (69) r7 = *(u16 *)(r6 +176) 69 67 b0 00 00 00 00 00 2: (b4) (u32) r8 = (u32) 0 b4 08 00 00 00 00 00 00 3: (44) (u32) r8 |= (u32) 2 44 08 00 00 02 00 00 00 4: (b7) r0 = 1 b7 00 00 00 01 00 00 00 5: (55) if r8 != 0x2 goto pc+1 55 08 01 00 02 00 00 00 6: (b7) r0 = 0 b7 00 00 00 00 00 00 00 7: (95) exit 95 00 00 00 00 00 00 00 struct bpf_prog { pages = 1, jited = 1, jit_requested = 1, gpl_compatible = 1, cb_access = 0, dst_needed = 0, blinded = 0, is_func = 0, kprobe_override = 0, has_callchain_buf = 0, enforce_expected_attach_type = 0, type = BPF_PROG_TYPE_CGROUP_SKB, expected_attach_type = BPF_CGROUP_INET_INGRESS, len = 8, jited_len = 66, tag = "m\356\367\065~{E0", aux = 0xffff9e11ad0f2800, orig_prog = 0x0, bpf_func = 0xffffffffc025f1b4, { insns = 0xffffba37c00d1038, insnsi = 0xffffba37c00d1038 } } struct bpf_prog_aux { refcnt = { counter = 2 }, used_map_cnt = 0, max_ctx_offset = 20, max_pkt_offset = 0, max_tp_access = 0, stack_depth = 0, id = 15, func_cnt = 0, func_idx = 0, attach_btf_id = 0, linked_prog = 0x0, verifier_zext = false, offload_requested = false, attach_btf_trace = false, func_proto_unreliable = false, trampoline_prog_type = BPF_TRAMP_FENTRY, trampoline = 0x0, tramp_hlist = { next = 0x0, pprev = 0x0 }, attach_func_proto = 0x0, attach_func_name = 0x0, func = 0x0, jit_data = 0x0, poke_tab = 0x0, size_poke_tab = 0, ksym = { start = 18446744072638296500, end = 18446744072638300160, name = "bpf_prog_6deef7357e7b4530\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000", lnode = { next = 0xffff9e11ad0f2118, prev = 0xffffffff82c72600 }, tnode = { node = {{ __rb_parent_color = 18446636397487923497, rb_right = 0x0, rb_left = 0x0 }, { __rb_parent_color = 18446636397487923521, rb_right = 0x0, rb_left = 0x0 }} }, prog = true }, ops = 0xffffffff82747930, used_maps = 0x0, prog = 0xffffba37c00d1000, user = 0xffffffff82c45180, load_time = 13573742983, cgroup_storage = {0x0, 0x0}, name = "\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000", security = 0x0, offload = 0x0, btf = 0x0, func_info = 0x0, func_info_aux = 0x0, linfo = 0x0, jited_linfo = 0x0, func_info_cnt = 0, nr_linfo = 0, linfo_idx = 0, num_exentries = 0, extable = 0xffffffffc025f1f8, stats = 0x3c2607c22870, { work = { data = { counter = 0 }, entry = { next = 0x0, prev = 0x0 }, func = 0x0 }, rcu = { next = 0x0, func = 0x0 } } } ID BPF_PROG BPF_PROG_AUX BPF_PROG_TYPE TAG USED_MAPS 16 ffffba37c00c9000 ffff9e11ad0f2000 CGROUP_SKB 6deef7357e7b4530 XLATED: 64 JITED: 66 MEMLOCK: 4096 LOAD_TIME: Wed May 20 15:46:24 2020 GPL_COMPATIBLE: yes NAME: (unused) UID: 0 0xffffffffc0261820: nopl 0x0(%rax,%rax,1) 0xffffffffc0261825: push %rbp 0xffffffffc0261826: mov %rsp,%rbp 0xffffffffc0261829: sub $0x0,%rsp 0xffffffffc0261830: push %rbx 0xffffffffc0261831: push %r13 0xffffffffc0261833: push %r14 0xffffffffc0261835: push %r15 0xffffffffc0261837: pushq $0x0 0xffffffffc0261839: mov %rdi,%rbx 0xffffffffc026183c: movzwq 0xb0(%rbx),%r13 0xffffffffc0261844: xor %r14d,%r14d 0xffffffffc0261847: or $0x2,%r14d 0xffffffffc026184b: mov $0x1,%eax 0xffffffffc0261850: cmp $0x2,%r14 0xffffffffc0261854: jne 0xffffffffc0261858 0xffffffffc0261856: xor %eax,%eax 0xffffffffc0261858: pop %rbx 0xffffffffc0261859: pop %r15 0xffffffffc026185b: pop %r14 0xffffffffc026185d: pop %r13 0xffffffffc026185f: pop %rbx 0xffffffffc0261860: leaveq 0xffffffffc0261861: retq 0: (bf) r6 = r1 bf 16 00 00 00 00 00 00 1: (69) r7 = *(u16 *)(r6 +176) 69 67 b0 00 00 00 00 00 2: (b4) (u32) r8 = (u32) 0 b4 08 00 00 00 00 00 00 3: (44) (u32) r8 |= (u32) 2 44 08 00 00 02 00 00 00 4: (b7) r0 = 1 b7 00 00 00 01 00 00 00 5: (55) if r8 != 0x2 goto pc+1 55 08 01 00 02 00 00 00 6: (b7) r0 = 0 b7 00 00 00 00 00 00 00 7: (95) exit 95 00 00 00 00 00 00 00 struct bpf_prog { pages = 1, jited = 1, jit_requested = 1, gpl_compatible = 1, cb_access = 0, dst_needed = 0, blinded = 0, is_func = 0, kprobe_override = 0, has_callchain_buf = 0, enforce_expected_attach_type = 0, type = BPF_PROG_TYPE_CGROUP_SKB, expected_attach_type = BPF_CGROUP_INET_INGRESS, len = 8, jited_len = 66, tag = "m\356\367\065~{E0", aux = 0xffff9e11ad0f2000, orig_prog = 0x0, bpf_func = 0xffffffffc0261820, { insns = 0xffffba37c00c9038, insnsi = 0xffffba37c00c9038 } } struct bpf_prog_aux { refcnt = { counter = 2 }, used_map_cnt = 0, max_ctx_offset = 20, max_pkt_offset = 0, max_tp_access = 0, stack_depth = 0, id = 16, func_cnt = 0, func_idx = 0, attach_btf_id = 0, linked_prog = 0x0, verifier_zext = false, offload_requested = false, attach_btf_trace = false, func_proto_unreliable = false, trampoline_prog_type = BPF_TRAMP_FENTRY, trampoline = 0x0, tramp_hlist = { next = 0x0, pprev = 0x0 }, attach_func_proto = 0x0, attach_func_name = 0x0, func = 0x0, jit_data = 0x0, poke_tab = 0x0, size_poke_tab = 0, ksym = { start = 18446744072638306336, end = 18446744072638308352, name = "bpf_prog_6deef7357e7b4530\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000", lnode = { next = 0xffff9e11acc98118, prev = 0xffff9e11ad0f2918 }, tnode = { node = {{ __rb_parent_color = 18446636397642527016, rb_right = 0xffff9e11acc98128, rb_left = 0xffff9e11ad0f2928 }, { __rb_parent_color = 18446636397642527040, rb_right = 0xffff9e11acc98140, rb_left = 0xffff9e11ad0f2940 }} }, prog = true }, ops = 0xffffffff82747930, used_maps = 0x0, prog = 0xffffba37c00c9000, user = 0xffffffff82c45180, load_time = 13574333762, cgroup_storage = {0x0, 0x0}, name = "\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000", security = 0x0, offload = 0x0, btf = 0x0, func_info = 0x0, func_info_aux = 0x0, linfo = 0x0, jited_linfo = 0x0, func_info_cnt = 0, nr_linfo = 0, linfo_idx = 0, num_exentries = 0, extable = 0xffffffffc0261864, stats = 0x3c2607c22980, { work = { data = { counter = 0 }, entry = { next = 0x0, prev = 0x0 }, func = 0x0 }, rcu = { next = 0x0, func = 0x0 } } } ID BPF_PROG BPF_PROG_AUX BPF_PROG_TYPE TAG USED_MAPS 17 ffffba37c017d000 ffff9e11acc98000 CGROUP_SKB 6deef7357e7b4530 XLATED: 64 JITED: 66 MEMLOCK: 4096 LOAD_TIME: Wed May 20 15:46:24 2020 GPL_COMPATIBLE: yes NAME: (unused) UID: 0 0xffffffffc02be5c0: nopl 0x0(%rax,%rax,1) 0xffffffffc02be5c5: push %rbp 0xffffffffc02be5c6: mov %rsp,%rbp 0xffffffffc02be5c9: sub $0x0,%rsp 0xffffffffc02be5d0: push %rbx 0xffffffffc02be5d1: push %r13 0xffffffffc02be5d3: push %r14 0xffffffffc02be5d5: push %r15 0xffffffffc02be5d7: pushq $0x0 0xffffffffc02be5d9: mov %rdi,%rbx 0xffffffffc02be5dc: movzwq 0xb0(%rbx),%r13 0xffffffffc02be5e4: xor %r14d,%r14d 0xffffffffc02be5e7: or $0x2,%r14d 0xffffffffc02be5eb: mov $0x1,%eax 0xffffffffc02be5f0: cmp $0x2,%r14 0xffffffffc02be5f4: jne 0xffffffffc02be5f8 0xffffffffc02be5f6: xor %eax,%eax 0xffffffffc02be5f8: pop %rbx 0xffffffffc02be5f9: pop %r15 0xffffffffc02be5fb: pop %r14 0xffffffffc02be5fd: pop %r13 0xffffffffc02be5ff: pop %rbx 0xffffffffc02be600: leaveq 0xffffffffc02be601: retq 0: (bf) r6 = r1 bf 16 00 00 00 00 00 00 1: (69) r7 = *(u16 *)(r6 +176) 69 67 b0 00 00 00 00 00 2: (b4) (u32) r8 = (u32) 0 b4 08 00 00 00 00 00 00 3: (44) (u32) r8 |= (u32) 2 44 08 00 00 02 00 00 00 4: (b7) r0 = 1 b7 00 00 00 01 00 00 00 5: (55) if r8 != 0x2 goto pc+1 55 08 01 00 02 00 00 00 6: (b7) r0 = 0 b7 00 00 00 00 00 00 00 7: (95) exit 95 00 00 00 00 00 00 00 struct bpf_prog { pages = 1, jited = 1, jit_requested = 1, gpl_compatible = 1, cb_access = 0, dst_needed = 0, blinded = 0, is_func = 0, kprobe_override = 0, has_callchain_buf = 0, enforce_expected_attach_type = 0, type = BPF_PROG_TYPE_CGROUP_SKB, expected_attach_type = BPF_CGROUP_INET_INGRESS, len = 8, jited_len = 66, tag = "m\356\367\065~{E0", aux = 0xffff9e11acc98000, orig_prog = 0x0, bpf_func = 0xffffffffc02be5c0, { insns = 0xffffba37c017d038, insnsi = 0xffffba37c017d038 } } struct bpf_prog_aux { refcnt = { counter = 2 }, used_map_cnt = 0, max_ctx_offset = 20, max_pkt_offset = 0, max_tp_access = 0, stack_depth = 0, id = 17, func_cnt = 0, func_idx = 0, attach_btf_id = 0, linked_prog = 0x0, verifier_zext = false, offload_requested = false, attach_btf_trace = false, func_proto_unreliable = false, trampoline_prog_type = BPF_TRAMP_FENTRY, trampoline = 0x0, tramp_hlist = { next = 0x0, pprev = 0x0 }, attach_func_proto = 0x0, attach_func_name = 0x0, func = 0x0, jit_data = 0x0, poke_tab = 0x0, size_poke_tab = 0, ksym = { start = 18446744072638686656, end = 18446744072638689280, name = "bpf_prog_6deef7357e7b4530\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000", lnode = { next = 0xffff9e11b6463118, prev = 0xffff9e11ad0f2118 }, tnode = { node = {{ __rb_parent_color = 18446636397487923497, rb_right = 0x0, rb_left = 0x0 }, { __rb_parent_color = 18446636397487923521, rb_right = 0x0, rb_left = 0x0 }} }, prog = true }, ops = 0xffffffff82747930, used_maps = 0x0, prog = 0xffffba37c017d000, user = 0xffffffff82c45180, load_time = 14842127635, cgroup_storage = {0x0, 0x0}, name = "\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000", security = 0x0, offload = 0x0, btf = 0x0, func_info = 0x0, func_info_aux = 0x0, linfo = 0x0, jited_linfo = 0x0, func_info_cnt = 0, nr_linfo = 0, linfo_idx = 0, num_exentries = 0, extable = 0xffffffffc02be604, stats = 0x3c2607c209d0, { work = { data = { counter = 0 }, entry = { next = 0x0, prev = 0x0 }, func = 0x0 }, rcu = { next = 0x0, func = 0x0 } } } ID BPF_PROG BPF_PROG_AUX BPF_PROG_TYPE TAG USED_MAPS 18 ffffba37c0185000 ffff9e11b6463000 CGROUP_SKB 6deef7357e7b4530 XLATED: 64 JITED: 66 MEMLOCK: 4096 LOAD_TIME: Wed May 20 15:46:25 2020 GPL_COMPATIBLE: yes NAME: (unused) UID: 0 0xffffffffc02c5308: nopl 0x0(%rax,%rax,1) 0xffffffffc02c530d: push %rbp 0xffffffffc02c530e: mov %rsp,%rbp 0xffffffffc02c5311: sub $0x0,%rsp 0xffffffffc02c5318: push %rbx 0xffffffffc02c5319: push %r13 0xffffffffc02c531b: push %r14 0xffffffffc02c531d: push %r15 0xffffffffc02c531f: pushq $0x0 0xffffffffc02c5321: mov %rdi,%rbx 0xffffffffc02c5324: movzwq 0xb0(%rbx),%r13 0xffffffffc02c532c: xor %r14d,%r14d 0xffffffffc02c532f: or $0x2,%r14d 0xffffffffc02c5333: mov $0x1,%eax 0xffffffffc02c5338: cmp $0x2,%r14 0xffffffffc02c533c: jne 0xffffffffc02c5340 0xffffffffc02c533e: xor %eax,%eax 0xffffffffc02c5340: pop %rbx 0xffffffffc02c5341: pop %r15 0xffffffffc02c5343: pop %r14 0xffffffffc02c5345: pop %r13 0xffffffffc02c5347: pop %rbx 0xffffffffc02c5348: leaveq 0xffffffffc02c5349: retq 0: (bf) r6 = r1 bf 16 00 00 00 00 00 00 1: (69) r7 = *(u16 *)(r6 +176) 69 67 b0 00 00 00 00 00 2: (b4) (u32) r8 = (u32) 0 b4 08 00 00 00 00 00 00 3: (44) (u32) r8 |= (u32) 2 44 08 00 00 02 00 00 00 4: (b7) r0 = 1 b7 00 00 00 01 00 00 00 5: (55) if r8 != 0x2 goto pc+1 55 08 01 00 02 00 00 00 6: (b7) r0 = 0 b7 00 00 00 00 00 00 00 7: (95) exit 95 00 00 00 00 00 00 00 struct bpf_prog { pages = 1, jited = 1, jit_requested = 1, gpl_compatible = 1, cb_access = 0, dst_needed = 0, blinded = 0, is_func = 0, kprobe_override = 0, has_callchain_buf = 0, enforce_expected_attach_type = 0, type = BPF_PROG_TYPE_CGROUP_SKB, expected_attach_type = BPF_CGROUP_INET_INGRESS, len = 8, jited_len = 66, tag = "m\356\367\065~{E0", aux = 0xffff9e11b6463000, orig_prog = 0x0, bpf_func = 0xffffffffc02c5308, { insns = 0xffffba37c0185038, insnsi = 0xffffba37c0185038 } } struct bpf_prog_aux { refcnt = { counter = 2 }, used_map_cnt = 0, max_ctx_offset = 20, max_pkt_offset = 0, max_tp_access = 0, stack_depth = 0, id = 18, func_cnt = 0, func_idx = 0, attach_btf_id = 0, linked_prog = 0x0, verifier_zext = false, offload_requested = false, attach_btf_trace = false, func_proto_unreliable = false, trampoline_prog_type = BPF_TRAMP_FENTRY, trampoline = 0x0, tramp_hlist = { next = 0x0, pprev = 0x0 }, attach_func_proto = 0x0, attach_func_name = 0x0, func = 0x0, jit_data = 0x0, poke_tab = 0x0, size_poke_tab = 0, ksym = { start = 18446744072638714632, end = 18446744072638717952, name = "bpf_prog_6deef7357e7b4530\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000", lnode = { next = 0xffff9e11b327d518, prev = 0xffff9e11acc98118 }, tnode = { node = {{ __rb_parent_color = 1, rb_right = 0xffff9e11b327d528, rb_left = 0xffff9e11ad0f2128 }, { __rb_parent_color = 1, rb_right = 0xffff9e11b327d540, rb_left = 0xffff9e11ad0f2140 }} }, prog = true }, ops = 0xffffffff82747930, used_maps = 0x0, prog = 0xffffba37c0185000, user = 0xffffffff82c45180, load_time = 14842334179, cgroup_storage = {0x0, 0x0}, name = "\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000", security = 0x0, offload = 0x0, btf = 0x0, func_info = 0x0, func_info_aux = 0x0, linfo = 0x0, jited_linfo = 0x0, func_info_cnt = 0, nr_linfo = 0, linfo_idx = 0, num_exentries = 0, extable = 0xffffffffc02c534c, stats = 0x3c2607c20b50, { work = { data = { counter = 0 }, entry = { next = 0x0, prev = 0x0 }, func = 0x0 }, rcu = { next = 0x0, func = 0x0 } } } ID BPF_PROG BPF_PROG_AUX BPF_PROG_TYPE TAG USED_MAPS 19 ffffba37c0059000 ffff9e11b327d400 CGROUP_SKB 6deef7357e7b4530 XLATED: 64 JITED: 66 MEMLOCK: 4096 LOAD_TIME: Wed May 20 15:46:35 2020 GPL_COMPATIBLE: yes NAME: (unused) UID: 0 0xffffffffc0fe3948: nopl 0x0(%rax,%rax,1) 0xffffffffc0fe394d: push %rbp 0xffffffffc0fe394e: mov %rsp,%rbp 0xffffffffc0fe3951: sub $0x0,%rsp 0xffffffffc0fe3958: push %rbx 0xffffffffc0fe3959: push %r13 0xffffffffc0fe395b: push %r14 0xffffffffc0fe395d: push %r15 0xffffffffc0fe395f: pushq $0x0 0xffffffffc0fe3961: mov %rdi,%rbx 0xffffffffc0fe3964: movzwq 0xb0(%rbx),%r13 0xffffffffc0fe396c: xor %r14d,%r14d 0xffffffffc0fe396f: or $0x2,%r14d 0xffffffffc0fe3973: mov $0x1,%eax 0xffffffffc0fe3978: cmp $0x2,%r14 0xffffffffc0fe397c: jne 0xffffffffc0fe3980 0xffffffffc0fe397e: xor %eax,%eax 0xffffffffc0fe3980: pop %rbx 0xffffffffc0fe3981: pop %r15 0xffffffffc0fe3983: pop %r14 0xffffffffc0fe3985: pop %r13 0xffffffffc0fe3987: pop %rbx 0xffffffffc0fe3988: leaveq 0xffffffffc0fe3989: retq 0: (bf) r6 = r1 bf 16 00 00 00 00 00 00 1: (69) r7 = *(u16 *)(r6 +176) 69 67 b0 00 00 00 00 00 2: (b4) (u32) r8 = (u32) 0 b4 08 00 00 00 00 00 00 3: (44) (u32) r8 |= (u32) 2 44 08 00 00 02 00 00 00 4: (b7) r0 = 1 b7 00 00 00 01 00 00 00 5: (55) if r8 != 0x2 goto pc+1 55 08 01 00 02 00 00 00 6: (b7) r0 = 0 b7 00 00 00 00 00 00 00 7: (95) exit 95 00 00 00 00 00 00 00 struct bpf_prog { pages = 1, jited = 1, jit_requested = 1, gpl_compatible = 1, cb_access = 0, dst_needed = 0, blinded = 0, is_func = 0, kprobe_override = 0, has_callchain_buf = 0, enforce_expected_attach_type = 0, type = BPF_PROG_TYPE_CGROUP_SKB, expected_attach_type = BPF_CGROUP_INET_INGRESS, len = 8, jited_len = 66, tag = "m\356\367\065~{E0", aux = 0xffff9e11b327d400, orig_prog = 0x0, bpf_func = 0xffffffffc0fe3948, { insns = 0xffffba37c0059038, insnsi = 0xffffba37c0059038 } } struct bpf_prog_aux { refcnt = { counter = 2 }, used_map_cnt = 0, max_ctx_offset = 20, max_pkt_offset = 0, max_tp_access = 0, stack_depth = 0, id = 19, func_cnt = 0, func_idx = 0, attach_btf_id = 0, linked_prog = 0x0, verifier_zext = false, offload_requested = false, attach_btf_trace = false, func_proto_unreliable = false, trampoline_prog_type = BPF_TRAMP_FENTRY, trampoline = 0x0, tramp_hlist = { next = 0x0, pprev = 0x0 }, attach_func_proto = 0x0, attach_func_name = 0x0, func = 0x0, jit_data = 0x0, poke_tab = 0x0, size_poke_tab = 0, ksym = { start = 18446744072652470600, end = 18446744072652472320, name = "bpf_prog_6deef7357e7b4530\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000", lnode = { next = 0xffff9e11b327e118, prev = 0xffff9e11b6463118 }, tnode = { node = {{ __rb_parent_color = 18446636397642527016, rb_right = 0xffff9e10ce108928, rb_left = 0xffff9e11b327e128 }, { __rb_parent_color = 18446636397642527040, rb_right = 0xffff9e10ce108940, rb_left = 0xffff9e11b327e140 }} }, prog = true }, ops = 0xffffffff82747930, used_maps = 0x0, prog = 0xffffba37c0059000, user = 0xffffffff82c45180, load_time = 24298143016, cgroup_storage = {0x0, 0x0}, name = "\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000", security = 0x0, offload = 0x0, btf = 0x0, func_info = 0x0, func_info_aux = 0x0, linfo = 0x0, jited_linfo = 0x0, func_info_cnt = 0, nr_linfo = 0, linfo_idx = 0, num_exentries = 0, extable = 0xffffffffc0fe398c, stats = 0x3c2607c4b9a0, { work = { data = { counter = 0 }, entry = { next = 0x0, prev = 0x0 }, func = 0x0 }, rcu = { next = 0x0, func = 0x0 } } } ID BPF_PROG BPF_PROG_AUX BPF_PROG_TYPE TAG USED_MAPS 20 ffffba37c059b000 ffff9e11b327e000 CGROUP_SKB 6deef7357e7b4530 XLATED: 64 JITED: 66 MEMLOCK: 4096 LOAD_TIME: Wed May 20 15:46:35 2020 GPL_COMPATIBLE: yes NAME: (unused) UID: 0 0xffffffffc0fd8cb4: nopl 0x0(%rax,%rax,1) 0xffffffffc0fd8cb9: push %rbp 0xffffffffc0fd8cba: mov %rsp,%rbp 0xffffffffc0fd8cbd: sub $0x0,%rsp 0xffffffffc0fd8cc4: push %rbx 0xffffffffc0fd8cc5: push %r13 0xffffffffc0fd8cc7: push %r14 0xffffffffc0fd8cc9: push %r15 0xffffffffc0fd8ccb: pushq $0x0 0xffffffffc0fd8ccd: mov %rdi,%rbx 0xffffffffc0fd8cd0: movzwq 0xb0(%rbx),%r13 0xffffffffc0fd8cd8: xor %r14d,%r14d 0xffffffffc0fd8cdb: or $0x2,%r14d 0xffffffffc0fd8cdf: mov $0x1,%eax 0xffffffffc0fd8ce4: cmp $0x2,%r14 0xffffffffc0fd8ce8: jne 0xffffffffc0fd8cec 0xffffffffc0fd8cea: xor %eax,%eax 0xffffffffc0fd8cec: pop %rbx 0xffffffffc0fd8ced: pop %r15 0xffffffffc0fd8cef: pop %r14 0xffffffffc0fd8cf1: pop %r13 0xffffffffc0fd8cf3: pop %rbx 0xffffffffc0fd8cf4: leaveq 0xffffffffc0fd8cf5: retq 0: (bf) r6 = r1 bf 16 00 00 00 00 00 00 1: (69) r7 = *(u16 *)(r6 +176) 69 67 b0 00 00 00 00 00 2: (b4) (u32) r8 = (u32) 0 b4 08 00 00 00 00 00 00 3: (44) (u32) r8 |= (u32) 2 44 08 00 00 02 00 00 00 4: (b7) r0 = 1 b7 00 00 00 01 00 00 00 5: (55) if r8 != 0x2 goto pc+1 55 08 01 00 02 00 00 00 6: (b7) r0 = 0 b7 00 00 00 00 00 00 00 7: (95) exit 95 00 00 00 00 00 00 00 struct bpf_prog { pages = 1, jited = 1, jit_requested = 1, gpl_compatible = 1, cb_access = 0, dst_needed = 0, blinded = 0, is_func = 0, kprobe_override = 0, has_callchain_buf = 0, enforce_expected_attach_type = 0, type = BPF_PROG_TYPE_CGROUP_SKB, expected_attach_type = BPF_CGROUP_INET_INGRESS, len = 8, jited_len = 66, tag = "m\356\367\065~{E0", aux = 0xffff9e11b327e000, orig_prog = 0x0, bpf_func = 0xffffffffc0fd8cb4, { insns = 0xffffba37c059b038, insnsi = 0xffffba37c059b038 } } struct bpf_prog_aux { refcnt = { counter = 2 }, used_map_cnt = 0, max_ctx_offset = 20, max_pkt_offset = 0, max_tp_access = 0, stack_depth = 0, id = 20, func_cnt = 0, func_idx = 0, attach_btf_id = 0, linked_prog = 0x0, verifier_zext = false, offload_requested = false, attach_btf_trace = false, func_proto_unreliable = false, trampoline_prog_type = BPF_TRAMP_FENTRY, trampoline = 0x0, tramp_hlist = { next = 0x0, pprev = 0x0 }, attach_func_proto = 0x0, attach_func_name = 0x0, func = 0x0, jit_data = 0x0, poke_tab = 0x0, size_poke_tab = 0, ksym = { start = 18446744072652426420, end = 18446744072652427264, name = "bpf_prog_6deef7357e7b4530\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000", lnode = { next = 0xffffffff82d16eb0, prev = 0xffff9e11b327d518 }, tnode = { node = {{ __rb_parent_color = 18446636397590205737, rb_right = 0x0, rb_left = 0x0 }, { __rb_parent_color = 18446636397590205761, rb_right = 0x0, rb_left = 0x0 }} }, prog = true }, ops = 0xffffffff82747930, used_maps = 0x0, prog = 0xffffba37c059b000, user = 0xffffffff82c45180, load_time = 24298430619, cgroup_storage = {0x0, 0x0}, name = "\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000", security = 0x0, offload = 0x0, btf = 0x0, func_info = 0x0, func_info_aux = 0x0, linfo = 0x0, jited_linfo = 0x0, func_info_cnt = 0, nr_linfo = 0, linfo_idx = 0, num_exentries = 0, extable = 0xffffffffc0fd8cf8, stats = 0x3c2607c4b9b0, { work = { data = { counter = 0 }, entry = { next = 0x0, prev = 0x0 }, func = 0x0 }, rcu = { next = 0x0, func = 0x0 } } } ID BPF_PROG BPF_PROG_AUX BPF_PROG_TYPE TAG USED_MAPS 43 ffffba37c0443000 ffff9e10ce10b800 CGROUP_SKB 6deef7357e7b4530 XLATED: 64 JITED: 66 MEMLOCK: 4096 LOAD_TIME: Wed May 20 18:27:50 2020 GPL_COMPATIBLE: yes NAME: (unused) UID: 0 0xffffffffc10d51d4: nopl 0x0(%rax,%rax,1) 0xffffffffc10d51d9: push %rbp 0xffffffffc10d51da: mov %rsp,%rbp 0xffffffffc10d51dd: sub $0x0,%rsp 0xffffffffc10d51e4: push %rbx 0xffffffffc10d51e5: push %r13 0xffffffffc10d51e7: push %r14 0xffffffffc10d51e9: push %r15 0xffffffffc10d51eb: pushq $0x0 0xffffffffc10d51ed: mov %rdi,%rbx 0xffffffffc10d51f0: movzwq 0xb0(%rbx),%r13 0xffffffffc10d51f8: xor %r14d,%r14d 0xffffffffc10d51fb: or $0x2,%r14d 0xffffffffc10d51ff: mov $0x1,%eax 0xffffffffc10d5204: cmp $0x2,%r14 0xffffffffc10d5208: jne 0xffffffffc10d520c 0xffffffffc10d520a: xor %eax,%eax 0xffffffffc10d520c: pop %rbx 0xffffffffc10d520d: pop %r15 0xffffffffc10d520f: pop %r14 0xffffffffc10d5211: pop %r13 0xffffffffc10d5213: pop %rbx 0xffffffffc10d5214: leaveq 0xffffffffc10d5215: retq 0: (bf) r6 = r1 bf 16 00 00 00 00 00 00 1: (69) r7 = *(u16 *)(r6 +176) 69 67 b0 00 00 00 00 00 2: (b4) (u32) r8 = (u32) 0 b4 08 00 00 00 00 00 00 3: (44) (u32) r8 |= (u32) 2 44 08 00 00 02 00 00 00 4: (b7) r0 = 1 b7 00 00 00 01 00 00 00 5: (55) if r8 != 0x2 goto pc+1 55 08 01 00 02 00 00 00 6: (b7) r0 = 0 b7 00 00 00 00 00 00 00 7: (95) exit 95 00 00 00 00 00 00 00 struct bpf_prog { pages = 1, jited = 1, jit_requested = 1, gpl_compatible = 1, cb_access = 0, dst_needed = 0, blinded = 0, is_func = 0, kprobe_override = 0, has_callchain_buf = 0, enforce_expected_attach_type = 0, type = BPF_PROG_TYPE_CGROUP_SKB, expected_attach_type = BPF_CGROUP_INET_INGRESS, len = 8, jited_len = 66, tag = "m\356\367\065~{E0", aux = 0xffff9e10ce10b800, orig_prog = 0x0, bpf_func = 0xffffffffc10d51d4, { insns = 0xffffba37c0443038, insnsi = 0xffffba37c0443038 } } struct bpf_prog_aux { refcnt = { counter = 2 }, used_map_cnt = 0, max_ctx_offset = 20, max_pkt_offset = 0, max_tp_access = 0, stack_depth = 0, id = 43, func_cnt = 0, func_idx = 0, attach_btf_id = 0, linked_prog = 0x0, verifier_zext = false, offload_requested = false, attach_btf_trace = false, func_proto_unreliable = false, trampoline_prog_type = BPF_TRAMP_FENTRY, trampoline = 0x0, tramp_hlist = { next = 0x0, pprev = 0x0 }, attach_func_proto = 0x0, attach_func_name = 0x0, func = 0x0, jit_data = 0x0, poke_tab = 0x0, size_poke_tab = 0, ksym = { start = 18446744072653459924, end = 18446744072653463552, name = "bpf_prog_6deef7357e7b4530\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000", lnode = { next = 0xffff9e10ce108918, prev = 0xffffffff82d16eb0 }, tnode = { node = {{ __rb_parent_color = 18446636393746696488, rb_right = 0x0, rb_left = 0x0 }, { __rb_parent_color = 18446636393746696512, rb_right = 0x0, rb_left = 0x0 }} }, prog = true }, ops = 0xffffffff82747930, used_maps = 0x0, prog = 0xffffba37c0443000, user = 0xffffffff82c45180, load_time = 9699943359504, cgroup_storage = {0x0, 0x0}, name = "\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000", security = 0x0, offload = 0x0, btf = 0x0, func_info = 0x0, func_info_aux = 0x0, linfo = 0x0, jited_linfo = 0x0, func_info_cnt = 0, nr_linfo = 0, linfo_idx = 0, num_exentries = 0, extable = 0xffffffffc10d5218, stats = 0x3c2607a41fb0, { work = { data = { counter = 0 }, entry = { next = 0x0, prev = 0x0 }, func = 0x0 }, rcu = { next = 0x0, func = 0x0 } } } ID BPF_PROG BPF_PROG_AUX BPF_PROG_TYPE TAG USED_MAPS 44 ffffba37c0053000 ffff9e10ce108800 CGROUP_SKB 6deef7357e7b4530 XLATED: 64 JITED: 66 MEMLOCK: 4096 LOAD_TIME: Wed May 20 18:27:49 2020 GPL_COMPATIBLE: yes NAME: (unused) UID: 0 0xffffffffc10e07f0: nopl 0x0(%rax,%rax,1) 0xffffffffc10e07f5: push %rbp 0xffffffffc10e07f6: mov %rsp,%rbp 0xffffffffc10e07f9: sub $0x0,%rsp 0xffffffffc10e0800: push %rbx 0xffffffffc10e0801: push %r13 0xffffffffc10e0803: push %r14 0xffffffffc10e0805: push %r15 0xffffffffc10e0807: pushq $0x0 0xffffffffc10e0809: mov %rdi,%rbx 0xffffffffc10e080c: movzwq 0xb0(%rbx),%r13 0xffffffffc10e0814: xor %r14d,%r14d 0xffffffffc10e0817: or $0x2,%r14d 0xffffffffc10e081b: mov $0x1,%eax 0xffffffffc10e0820: cmp $0x2,%r14 0xffffffffc10e0824: jne 0xffffffffc10e0828 0xffffffffc10e0826: xor %eax,%eax 0xffffffffc10e0828: pop %rbx 0xffffffffc10e0829: pop %r15 0xffffffffc10e082b: pop %r14 0xffffffffc10e082d: pop %r13 0xffffffffc10e082f: pop %rbx 0xffffffffc10e0830: leaveq 0xffffffffc10e0831: retq 0: (bf) r6 = r1 bf 16 00 00 00 00 00 00 1: (69) r7 = *(u16 *)(r6 +176) 69 67 b0 00 00 00 00 00 2: (b4) (u32) r8 = (u32) 0 b4 08 00 00 00 00 00 00 3: (44) (u32) r8 |= (u32) 2 44 08 00 00 02 00 00 00 4: (b7) r0 = 1 b7 00 00 00 01 00 00 00 5: (55) if r8 != 0x2 goto pc+1 55 08 01 00 02 00 00 00 6: (b7) r0 = 0 b7 00 00 00 00 00 00 00 7: (95) exit 95 00 00 00 00 00 00 00 struct bpf_prog { pages = 1, jited = 1, jit_requested = 1, gpl_compatible = 1, cb_access = 0, dst_needed = 0, blinded = 0, is_func = 0, kprobe_override = 0, has_callchain_buf = 0, enforce_expected_attach_type = 0, type = BPF_PROG_TYPE_CGROUP_SKB, expected_attach_type = BPF_CGROUP_INET_INGRESS, len = 8, jited_len = 66, tag = "m\356\367\065~{E0", aux = 0xffff9e10ce108800, orig_prog = 0x0, bpf_func = 0xffffffffc10e07f0, { insns = 0xffffba37c0053038, insnsi = 0xffffba37c0053038 } } struct bpf_prog_aux { refcnt = { counter = 2 }, used_map_cnt = 0, max_ctx_offset = 20, max_pkt_offset = 0, max_tp_access = 0, stack_depth = 0, id = 44, func_cnt = 0, func_idx = 0, attach_btf_id = 0, linked_prog = 0x0, verifier_zext = false, offload_requested = false, attach_btf_trace = false, func_proto_unreliable = false, trampoline_prog_type = BPF_TRAMP_FENTRY, trampoline = 0x0, tramp_hlist = { next = 0x0, pprev = 0x0 }, attach_func_proto = 0x0, attach_func_name = 0x0, func = 0x0, jit_data = 0x0, poke_tab = 0x0, size_poke_tab = 0, ksym = { start = 18446744072653506544, end = 18446744072653508608, name = "bpf_prog_6deef7357e7b4530\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000", lnode = { next = 0xffffffff82c72600, prev = 0xffff9e10ce10b918 }, tnode = { node = {{ __rb_parent_color = 18446636397590205737, rb_right = 0xffffffff82d16ec0, rb_left = 0xffff9e10ce10b928 }, { __rb_parent_color = 18446636397590205761, rb_right = 0xffffffff82d16ed8, rb_left = 0xffff9e10ce10b940 }} }, prog = true }, ops = 0xffffffff82747930, used_maps = 0x0, prog = 0xffffba37c0053000, user = 0xffffffff82c45180, load_time = 9699946059392, cgroup_storage = {0x0, 0x0}, name = "\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000", security = 0x0, offload = 0x0, btf = 0x0, func_info = 0x0, func_info_aux = 0x0, linfo = 0x0, jited_linfo = 0x0, func_info_cnt = 0, nr_linfo = 0, linfo_idx = 0, num_exentries = 0, extable = 0xffffffffc10e0834, stats = 0x3c2607a41fe0, { work = { data = { counter = 0 }, entry = { next = 0x0, prev = 0x0 }, func = 0x0 }, rcu = { next = 0x0, func = 0x0 } } } ID BPF_MAP BPF_MAP_TYPE MAP_FLAGS 1 ffff9e11b55d7400 HASH 00000001 KEY_SIZE: 4 VALUE_SIZE: 1 MAX_ENTRIES: 65535 MEMLOCK: 5246976 NAME: "calico_failsafe" UID: 0 struct bpf_map { ops = 0xffffffff8264f900, inner_map_meta = 0x0, security = 0x0, map_type = BPF_MAP_TYPE_HASH, key_size = 4, value_size = 1, max_entries = 65535, map_flags = 1, spin_lock_off = -22, id = 1, numa_node = -1, btf_key_type_id = 0, btf_value_type_id = 0, btf = 0x0, memory = { pages = 1281, user = 0xffffffff82c45180 }, name = "calico_failsafe", btf_vmlinux_value_type_id = 0, unpriv_array = false, frozen = false, refcnt = { counter = 1 }, usercnt = { counter = 1 }, work = { data = { counter = 0 }, entry = { next = 0x0, prev = 0x0 }, func = 0x0 }, freeze_mutex = { owner = { counter = 0 }, wait_lock = { { rlock = { raw_lock = { { val = { counter = 0 }, { locked = 0 '\000', pending = 0 '\000' }, { locked_pending = 0, tail = 0 } } } } } }, osq = { tail = { counter = 0 } }, wait_list = { next = 0xffff9e11b55d74c0, prev = 0xffff9e11b55d74c0 } }, writecnt = 0 }