Re: Unable to trace nf_nat function using kprobe with latest kernel 6.1.66-1

2024-01-02 Thread P K
sure. function was available in /proc/kallsyms. Any suggestion how to track source IP and natted IP in bpf after NAT masquerade? Basically I wanted to know the Source IP and source Port after NAT IP using 5 tuple lookup? -- PK On Tue, Jan 2, 2024 at 8:00 PM Steven Rostedt wrote: > > On Tue, 2 J

Re: Unable to trace nf_nat function using kprobe with latest kernel 6.1.66-1

2024-01-02 Thread Steven Rostedt
On Tue, 2 Jan 2024 11:23:54 +0530 P K wrote: > Hi, > > I am unable to trace nf_nat functions using kprobe with the latest kernel. > Previously in kernel 6.1.55-1 it was working fine. > Can someone please check if it's broken with the latest commit or i > have to use it differently? > Note, at