Scroll to navigation

PROBE::NETFILTER.I(3stap) Networking Tapset PROBE::NETFILTER.I(3stap)

NAME

probe::netfilter.ip.forward - Called on an incoming IP packet addressed to some other computer

SYNOPSIS

netfilter.ip.forward 

VALUES

indev_name

Name of network device packet was received on (if known)

fin

TCP FIN flag (if protocol is TCP; ipv4 only)

indev

Address of net_device representing input device, 0 if unknown

urg

TCP URG flag (if protocol is TCP; ipv4 only)

data_str

A string representing the packet buffer contents

nf_queue

Constant used to signify a 'queue' verdict

iphdr

Address of IP header

dport

TCP or UDP destination port (ipv4 only)

outdev

Address of net_device representing output device, 0 if unknown

ipproto_udp

Constant used to signify that the packet protocol is UDP

nf_stolen

Constant used to signify a 'stolen' verdict

nf_drop

Constant used to signify a 'drop' verdict

psh

TCP PSH flag (if protocol is TCP; ipv4 only)

nf_accept

Constant used to signify an 'accept' verdict

data_hex

A hexadecimal string representing the packet buffer contents

syn

TCP SYN flag (if protocol is TCP; ipv4 only)

protocol

Packet protocol from driver (ipv4 only)

nf_repeat

Constant used to signify a 'repeat' verdict

length

The length of the packet buffer contents, in bytes

daddr

A string representing the destination IP address

sport

TCP or UDP source port (ipv4 only)

ipproto_tcp

Constant used to signify that the packet protocol is TCP

family

IP address family

pf

Protocol family -- either “ipv4” or “ipv6”

saddr

A string representing the source IP address

nf_stop

Constant used to signify a 'stop' verdict

outdev_name

Name of network device packet will be routed to (if known)

rst

TCP RST flag (if protocol is TCP; ipv4 only)

ack

TCP ACK flag (if protocol is TCP; ipv4 only)

SEE ALSO0

tapset::netfilter(3stap)

October 2018 SystemTap Tapset Reference