Name

probe::netfilter.ip.forward — Called on an incoming IP packet addressed to some other computer

Synopsis

netfilter.ip.forward 

Values

indev_name

Name of network device packet was received on (if known)

rst

TCP RST flag (if protocol is TCP; ipv4 only)

daddr

A string representing the destination IP address

saddr

A string representing the source IP address

protocol

Packet protocol from driver (ipv4 only)

syn

TCP SYN flag (if protocol is TCP; ipv4 only)

fin

TCP FIN flag (if protocol is TCP; ipv4 only)

data_hex

A hexadecimal string representing the packet buffer contents

indev

Address of net_device representing input device, 0 if unknown

nf_stolen

Constant used to signify a 'stolen' verdict

nf_stop

Constant used to signify a 'stop' verdict

nf_accept

Constant used to signify an 'accept' verdict

ipproto_tcp

Constant used to signify that the packet protocol is TCP

data_str

A string representing the packet buffer contents

dport

TCP or UDP destination port (ipv4 only)

urg

TCP URG flag (if protocol is TCP; ipv4 only)

sport

TCP or UDP source port (ipv4 only)

nf_queue

Constant used to signify a 'queue' verdict

psh

TCP PSH flag (if protocol is TCP; ipv4 only)

ipproto_udp

Constant used to signify that the packet protocol is UDP

nf_drop

Constant used to signify a 'drop' verdict

nf_repeat

Constant used to signify a 'repeat' verdict

outdev_name

Name of network device packet will be routed to (if known)

length

The length of the packet buffer contents, in bytes

family

IP address family

ack

TCP ACK flag (if protocol is TCP; ipv4 only)

outdev

Address of net_device representing output device, 0 if unknown

pf

Protocol family -- either ipv4 or ipv6

iphdr

Address of IP header