Provided by: systemtap-doc_4.2-3ubuntu0.1_all
NAME
probe::netfilter.arp.forward - - Called for each ARP packet to be forwarded
SYNOPSIS
netfilter.arp.forward
VALUES
ar_sip Ethernet+IP only (ar_pro==0x800): source IP address pf Protocol family -- always “arp” indev_name Name of network device packet was received on (if known) ar_data Address of ARP packet data region (after the header) ar_tip Ethernet+IP only (ar_pro==0x800): target IP address ar_pro Format of protocol address indev Address of net_device representing input device, 0 if unknown nf_stolen Constant used to signify a 'stolen' verdict outdev Address of net_device representing output device, 0 if unknown nf_stop Constant used to signify a 'stop' verdict nf_accept Constant used to signify an 'accept' verdict length The length of the packet buffer contents, in bytes nf_queue Constant used to signify a 'queue' verdict nf_repeat Constant used to signify a 'repeat' verdict ar_hln Length of hardware address ar_hrd Format of hardware address ar_op ARP opcode (command) data_hex A hexadecimal string representing the packet buffer contents outdev_name Name of network device packet will be routed to (if known) data_str A string representing the packet buffer contents arphdr Address of ARP header ar_tha Ethernet+IP only (ar_pro==0x800): target hardware (MAC) address ar_pln Length of protocol address ar_sha Ethernet+IP only (ar_pro==0x800): source hardware (MAC) address nf_drop Constant used to signify a 'drop' verdict
SEE ALSO
tapset::netfilter(3stap)