Name

probe::netfilter.ip.forward — Called on an incoming IP packet addressed to some other computer

Synopsis

netfilter.ip.forward 

Values

protocol

Packet protocol from driver (ipv4 only)

iphdr

Address of IP header

urg

TCP URG flag (if protocol is TCP; ipv4 only)

indev_name

Name of network device packet was received on (if known)

psh

TCP PSH flag (if protocol is TCP; ipv4 only)

nf_queue

Constant used to signify a 'queue' verdict

indev

Address of net_device representing input device, 0 if unknown

nf_repeat

Constant used to signify a 'repeat' verdict

data_hex

A hexadecimal string representing the packet buffer contents

family

IP address family

nf_stolen

Constant used to signify a 'stolen' verdict

syn

TCP SYN flag (if protocol is TCP; ipv4 only)

nf_drop

Constant used to signify a 'drop' verdict

ipproto_udp

Constant used to signify that the packet protocol is UDP

outdev_name

Name of network device packet will be routed to (if known)

fin

TCP FIN flag (if protocol is TCP; ipv4 only)

daddr

A string representing the destination IP address

pf

Protocol family -- either ipv4 or ipv6

sport

TCP or UDP source port (ipv4 only)

length

The length of the packet buffer contents, in bytes

outdev

Address of net_device representing output device, 0 if unknown

ipproto_tcp

Constant used to signify that the packet protocol is TCP

ack

TCP ACK flag (if protocol is TCP; ipv4 only)

saddr

A string representing the source IP address

data_str

A string representing the packet buffer contents

dport

TCP or UDP destination port (ipv4 only)

nf_accept

Constant used to signify an 'accept' verdict

nf_stop

Constant used to signify a 'stop' verdict

rst

TCP RST flag (if protocol is TCP; ipv4 only)