Provided by: systemtap-doc_5.1-4.1_amd64 

NAME
probe::netfilter.ip.forward - Called on an incoming IP packet addressed to some other computer
SYNOPSIS
netfilter.ip.forward
VALUES
ipproto_tcp Constant used to signify that the packet protocol is TCP dport TCP or UDP destination port (ipv4 only) syn TCP SYN flag (if protocol is TCP; ipv4 only) nf_stolen Constant used to signify a 'stolen' verdict family IP address family indev Address of net_device representing input device, 0 if unknown pf Protocol family -- either “ipv4” or “ipv6” outdev Address of net_device representing output device, 0 if unknown sport TCP or UDP source port (ipv4 only) rst TCP RST flag (if protocol is TCP; ipv4 only) nf_drop Constant used to signify a 'drop' verdict indev_name Name of network device packet was received on (if known) urg TCP URG flag (if protocol is TCP; ipv4 only) nf_repeat Constant used to signify a 'repeat' verdict length The length of the packet buffer contents, in bytes data_hex A hexadecimal string representing the packet buffer contents nf_accept Constant used to signify an 'accept' verdict psh TCP PSH flag (if protocol is TCP; ipv4 only) iphdr Address of IP header data_str A string representing the packet buffer contents ipproto_udp Constant used to signify that the packet protocol is UDP fin TCP FIN flag (if protocol is TCP; ipv4 only) outdev_name Name of network device packet will be routed to (if known) ack TCP ACK flag (if protocol is TCP; ipv4 only) saddr A string representing the source IP address protocol Packet protocol from driver (ipv4 only) daddr A string representing the destination IP address nf_queue Constant used to signify a 'queue' verdict nf_stop Constant used to signify a 'stop' verdict
SEE ALSO
tapset::netfilter(3stap) SystemTap Tapset Reference April 2024 PROBE::NETFILTER.I(3stap)