Provided by: systemtap-doc_2.3-1ubuntu1_all bug

NAME

       probe::netfilter.ip.forward - Called on an incoming IP packet addressed to some other
       computer

SYNOPSIS

       netfilter.ip.forward

VALUES

       outdev_name
           Name of network device packet will be routed to (if known)

       dport
           TCP or UDP destination port (ipv4 only)

       nf_repeat
           Constant used to signify a 'repeat' verdict

       nf_accept
           Constant used to signify an 'accept' verdict

       nf_stop
           Constant used to signify a 'stop' verdict

       saddr
           A string representing the source IP address

       outdev
           Address of net_device representing output device, 0 if unknown

       nf_drop
           Constant used to signify a 'drop' verdict

       family
           IP address family

       pf
           Protocol family -- either “ipv4” or “ipv6”

       urg
           TCP URG flag (if protocol is TCP; ipv4 only)

       ipproto_tcp
           Constant used to signify that the packet protocol is TCP

       length
           The length of the packet buffer contents, in bytes

       protocol
           Packet protocol from driver (ipv4 only)

       fin
           TCP FIN flag (if protocol is TCP; ipv4 only)

       ipproto_udp
           Constant used to signify that the packet protocol is UDP

       syn
           TCP SYN flag (if protocol is TCP; ipv4 only)

       nf_queue
           Constant used to signify a 'queue' verdict

       nf_stolen
           Constant used to signify a 'stolen' verdict

       iphdr
           Address of IP header

       indev_name
           Name of network device packet was received on (if known)

       psh
           TCP PSH flag (if protocol is TCP; ipv4 only)

       indev
           Address of net_device representing input device, 0 if unknown

       daddr
           A string representing the destination IP address

       ack
           TCP ACK flag (if protocol is TCP; ipv4 only)

       rst
           TCP RST flag (if protocol is TCP; ipv4 only)

       sport
           TCP or UDP source port (ipv4 only)