Name

probe::netfilter.ip.forward — Called on an incoming IP packet addressed to some other computer

Synopsis

netfilter.ip.forward 

Values

indev

Address of net_device representing input device, 0 if unknown

daddr

A string representing the destination IP address

sport

TCP or UDP source port (ipv4 only)

fin

TCP FIN flag (if protocol is TCP; ipv4 only)

iphdr

Address of IP header

nf_accept

Constant used to signify an 'accept' verdict

nf_stop

Constant used to signify a 'stop' verdict

pf

Protocol family -- either ipv4 or ipv6

ipproto_udp

Constant used to signify that the packet protocol is UDP

urg

TCP URG flag (if protocol is TCP; ipv4 only)

nf_queue

Constant used to signify a 'queue' verdict

nf_repeat

Constant used to signify a 'repeat' verdict

ipproto_tcp

Constant used to signify that the packet protocol is TCP

rst

TCP RST flag (if protocol is TCP; ipv4 only)

data_hex

A hexadecimal string representing the packet buffer contents

ack

TCP ACK flag (if protocol is TCP; ipv4 only)

saddr

A string representing the source IP address

dport

TCP or UDP destination port (ipv4 only)

psh

TCP PSH flag (if protocol is TCP; ipv4 only)

outdev_name

Name of network device packet will be routed to (if known)

family

IP address family

protocol

Packet protocol from driver (ipv4 only)

syn

TCP SYN flag (if protocol is TCP; ipv4 only)

nf_drop

Constant used to signify a 'drop' verdict

outdev

Address of net_device representing output device, 0 if unknown

length

The length of the packet buffer contents, in bytes

indev_name

Name of network device packet was received on (if known)

data_str

A string representing the packet buffer contents

nf_stolen

Constant used to signify a 'stolen' verdict