PROBE::NETFILTER.I(3stap) | Networking Tapset | PROBE::NETFILTER.I(3stap) |
NAME¶
probe::netfilter.ip.forward - Called on an incoming IP packet addressed to some other computer
SYNOPSIS¶
netfilter.ip.forward
VALUES¶
ipproto_udp
Constant used to signify that the packet protocol is
UDP
indev_name
Name of network device packet was received on (if
known)
nf_stop
Constant used to signify a 'stop' verdict
protocol
Packet protocol from driver (ipv4 only)
data_str
A string representing the packet buffer contents
dport
TCP or UDP destination port (ipv4 only)
ack
TCP ACK flag (if protocol is TCP; ipv4 only)
family
IP address family
saddr
A string representing the source IP address
pf
Protocol family -- either “ipv4” or
“ipv6”
ipproto_tcp
Constant used to signify that the packet protocol is
TCP
nf_queue
Constant used to signify a 'queue' verdict
data_hex
A hexadecimal string representing the packet buffer
contents
rst
TCP RST flag (if protocol is TCP; ipv4 only)
length
The length of the packet buffer contents, in bytes
nf_stolen
Constant used to signify a 'stolen' verdict
iphdr
Address of IP header
outdev
Address of net_device representing output device, 0 if
unknown
daddr
A string representing the destination IP address
outdev_name
Name of network device packet will be routed to (if
known)
sport
TCP or UDP source port (ipv4 only)
nf_drop
Constant used to signify a 'drop' verdict
syn
TCP SYN flag (if protocol is TCP; ipv4 only)
nf_repeat
Constant used to signify a 'repeat' verdict
fin
TCP FIN flag (if protocol is TCP; ipv4 only)
urg
TCP URG flag (if protocol is TCP; ipv4 only)
indev
Address of net_device representing input device, 0 if
unknown
nf_accept
Constant used to signify an 'accept' verdict
psh
TCP PSH flag (if protocol is TCP; ipv4 only)
SEE ALSO0¶
tapset::netfilter(3stap)
April 2023 | SystemTap Tapset Reference |