Provided by: systemtap-doc_3.1-3ubuntu0.1_all bug

NAME

       probe::netfilter.arp.out - - Called for each outgoing ARP packet

SYNOPSIS

       netfilter.arp.out

VALUES

       nf_queue
           Constant used to signify a 'queue' verdict

       ar_tip
           Ethernet+IP only (ar_pro==0x800): target IP address

       nf_stolen
           Constant used to signify a 'stolen' verdict

       ar_data
           Address of ARP packet data region (after the header)

       ar_hln
           Length of hardware address

       nf_repeat
           Constant used to signify a 'repeat' verdict

       length
           The length of the packet buffer contents, in bytes

       ar_op
           ARP opcode (command)

       arphdr
           Address of ARP header

       indev_name
           Name of network device packet was received on (if known)

       ar_sip
           Ethernet+IP only (ar_pro==0x800): source IP address

       nf_drop
           Constant used to signify a 'drop' verdict

       ar_hrd
           Format of hardware address

       nf_stop
           Constant used to signify a 'stop' verdict

       outdev
           Address of net_device representing output device, 0 if unknown

       nf_accept
           Constant used to signify an 'accept' verdict

       outdev_name
           Name of network device packet will be routed to (if known)

       ar_pro
           Format of protocol address

       ar_tha
           Ethernet+IP only (ar_pro==0x800): target hardware (MAC) address

       pf
           Protocol family -- always “arp”

       ar_pln
           Length of protocol address

       indev
           Address of net_device representing input device, 0 if unknown

       ar_sha
           Ethernet+IP only (ar_pro==0x800): source hardware (MAC) address

SEE ALSO

       tapset::netfilter(3stap)