PROBE::NETFILTER.I(3stap) | Networking Tapset | PROBE::NETFILTER.I(3stap) |
NAME¶
probe::netfilter.ip.forward - Called on an incoming IP packet addressed to some other computer
SYNOPSIS¶
netfilter.ip.forward
VALUES¶
indev_name
Name of network device packet was received on (if
known)
fin
TCP FIN flag (if protocol is TCP; ipv4 only)
indev
Address of net_device representing input device, 0 if
unknown
urg
TCP URG flag (if protocol is TCP; ipv4 only)
data_str
A string representing the packet buffer contents
nf_queue
Constant used to signify a 'queue' verdict
iphdr
Address of IP header
dport
TCP or UDP destination port (ipv4 only)
outdev
Address of net_device representing output device, 0 if
unknown
ipproto_udp
Constant used to signify that the packet protocol is
UDP
nf_stolen
Constant used to signify a 'stolen' verdict
nf_drop
Constant used to signify a 'drop' verdict
psh
TCP PSH flag (if protocol is TCP; ipv4 only)
nf_accept
Constant used to signify an 'accept' verdict
data_hex
A hexadecimal string representing the packet buffer
contents
syn
TCP SYN flag (if protocol is TCP; ipv4 only)
protocol
Packet protocol from driver (ipv4 only)
nf_repeat
Constant used to signify a 'repeat' verdict
length
The length of the packet buffer contents, in bytes
daddr
A string representing the destination IP address
sport
TCP or UDP source port (ipv4 only)
ipproto_tcp
Constant used to signify that the packet protocol is
TCP
family
IP address family
pf
Protocol family -- either “ipv4” or
“ipv6”
saddr
A string representing the source IP address
nf_stop
Constant used to signify a 'stop' verdict
outdev_name
Name of network device packet will be routed to (if
known)
rst
TCP RST flag (if protocol is TCP; ipv4 only)
ack
TCP ACK flag (if protocol is TCP; ipv4 only)
SEE ALSO0¶
tapset::netfilter(3stap)
October 2018 | SystemTap Tapset Reference |