Provided by: systemtap-doc_4.8-1_amd64 bug

NAME

       probe::netfilter.arp.in - - Called for each incoming ARP packet

SYNOPSIS

       netfilter.arp.in

VALUES

       ar_data
           Address of ARP packet data region (after the header)

       ar_sip
           Ethernet+IP only (ar_pro==0x800): source IP address

       ar_hrd
           Format of hardware address

       outdev
           Address of net_device representing output device, 0 if unknown

       data_hex
           A hexadecimal string representing the packet buffer contents

       indev
           Address of net_device representing input device, 0 if unknown

       ar_pro
           Format of protocol address

       ar_tip
           Ethernet+IP only (ar_pro==0x800): target IP address

       nf_accept
           Constant used to signify an 'accept' verdict

       nf_repeat
           Constant used to signify a 'repeat' verdict

       ar_op
           ARP opcode (command)

       ar_pln
           Length of protocol address

       nf_stolen
           Constant used to signify a 'stolen' verdict

       arphdr
           Address of ARP header

       indev_name
           Name of network device packet was received on (if known)

       ar_sha
           Ethernet+IP only (ar_pro==0x800): source hardware (MAC) address

       ar_hln
           Length of hardware address

       nf_drop
           Constant used to signify a 'drop' verdict

       data_str
           A string representing the packet buffer contents

       length
           The length of the packet buffer contents, in bytes

       nf_queue
           Constant used to signify a 'queue' verdict

       nf_stop
           Constant used to signify a 'stop' verdict

       outdev_name
           Name of network device packet will be routed to (if known)

       pf
           Protocol family -- always “arp”

       ar_tha
           Ethernet+IP only (ar_pro==0x800): target hardware (MAC) address

SEE ALSO

       tapset::netfilter(3stap)