probe::netfilter.arp.out(3stap) — Linux manual page

NAME | SYNOPSIS | VALUES | SEE ALSO | COLOPHON

PROBE::NETFILTER.A(3stap)   Networking Tapset  PROBE::NETFILTER.A(3stap)

NAME         top

       probe::netfilter.arp.out - - Called for each outgoing ARP packet

SYNOPSIS         top

       netfilter.arp.out

VALUES         top

       nf_accept
           Constant used to signify an 'accept' verdict

       data_str
           A string representing the packet buffer contents

       ar_sip
           Ethernet+IP only (ar_pro==0x800): source IP address

       ar_pln
           Length of protocol address

       nf_drop
           Constant used to signify a 'drop' verdict

       pf
           Protocol family -- always “arp”

       ar_pro
           Format of protocol address

       ar_sha
           Ethernet+IP only (ar_pro==0x800): source hardware (MAC)
           address

       ar_op
           ARP opcode (command)

       arphdr
           Address of ARP header

       nf_stop
           Constant used to signify a 'stop' verdict

       length
           The length of the packet buffer contents, in bytes

       ar_tip
           Ethernet+IP only (ar_pro==0x800): target IP address

       ar_hrd
           Format of hardware address

       nf_repeat
           Constant used to signify a 'repeat' verdict

       ar_hln
           Length of hardware address

       data_hex
           A hexadecimal string representing the packet buffer contents

       outdev_name
           Name of network device packet will be routed to (if known)

       ar_data
           Address of ARP packet data region (after the header)

       nf_stolen
           Constant used to signify a 'stolen' verdict

       nf_queue
           Constant used to signify a 'queue' verdict

       outdev
           Address of net_device representing output device, 0 if
           unknown

       ar_tha
           Ethernet+IP only (ar_pro==0x800): target hardware (MAC)
           address

       indev_name
           Name of network device packet was received on (if known)

       indev
           Address of net_device representing input device, 0 if unknown

SEE ALSO         top

       tapset::netfilter(3stap)

COLOPHON         top

       This page is part of the systemtap (a tracing and live-system
       analysis tool) project.  Information about the project can be
       found at ⟨https://sourceware.org/systemtap/⟩.  If you have a bug
       report for this manual page, send it to systemtap@sourceware.org.
       This page was obtained from the project's upstream Git repository
       ⟨git://sourceware.org/git/systemtap.git⟩ on 2023-12-22.  (At that
       time, the date of the most recent commit that was found in the
       repository was 2023-12-21.)  If you discover any rendering
       problems in this HTML version of the page, or you believe there
       is a better or more up-to-date source for the page, or you have
       corrections or improvements to the information in this COLOPHON
       (which is not part of the original manual page), send a mail to
       man-pages@man7.org

SystemTap Tapset Reference    November 2023    PROBE::NETFILTER.A(3stap)