probe::netfilter.ip.forward — Called on an incoming IP packet addressed to some other computer
netfilter.ip.forward
indev_name
Name of network device packet was received on (if known)
outdev
Address of net_device representing output device, 0 if unknown
fin
TCP FIN flag (if protocol is TCP; ipv4 only)
indev
Address of net_device representing input device, 0 if unknown
urg
TCP URG flag (if protocol is TCP; ipv4 only)
rst
TCP RST flag (if protocol is TCP; ipv4 only)
length
The length of the packet buffer contents, in bytes
nf_stolen
Constant used to signify a 'stolen' verdict
ack
TCP ACK flag (if protocol is TCP; ipv4 only)
nf_accept
Constant used to signify an 'accept' verdict
nf_drop
Constant used to signify a 'drop' verdict
psh
TCP PSH flag (if protocol is TCP; ipv4 only)
pf
Protocol family -- either “ipv4” or “ipv6”
iphdr
Address of IP header
nf_repeat
Constant used to signify a 'repeat' verdict
nf_queue
Constant used to signify a 'queue' verdict
outdev_name
Name of network device packet will be routed to (if known)
sport
TCP or UDP source port (ipv4 only)
saddr
A string representing the source IP address
family
IP address family
protocol
Packet protocol from driver (ipv4 only)
syn
TCP SYN flag (if protocol is TCP; ipv4 only)
data_hex
A hexadecimal string representing the packet buffer contents
daddr
A string representing the destination IP address
ipproto_udp
Constant used to signify that the packet protocol is UDP
dport
TCP or UDP destination port (ipv4 only)
nf_stop
Constant used to signify a 'stop' verdict
data_str
A string representing the packet buffer contents
ipproto_tcp
Constant used to signify that the packet protocol is TCP