Show Table of Contents
probe::netfilter.arp.forward
Name
probe::netfilter.arp.forward — - Called for each ARP packet to be forwarded
Synopsis
netfilter.arp.forward
Values
ar_hln- Length of hardware address
nf_stop- Constant used to signify a 'stop' verdict
outdev_name- Name of network device packet will be routed to (if known)
ar_tha- Ethernet+IP only (ar_pro==0x800): target hardware (MAC) address
nf_accept- Constant used to signify an 'accept' verdict
ar_data- Address of ARP packet data region (after the header)
indev_name- Name of network device packet was received on (if known)
arphdr- Address of ARP header
outdev- Address of net_device representing output device, 0 if unknown
nf_repeat- Constant used to signify a 'repeat' verdict
length- The length of the packet buffer contents, in bytes
nf_stolen- Constant used to signify a 'stolen' verdict
ar_pln- Length of protocol address
pf- Protocol family -- always “arp”
ar_sha- Ethernet+IP only (ar_pro==0x800): source hardware (MAC) address
indev- Address of net_device representing input device, 0 if unknown
nf_drop- Constant used to signify a 'drop' verdict
ar_pro- Format of protocol address
ar_sip- Ethernet+IP only (ar_pro==0x800): source IP address
ar_tip- Ethernet+IP only (ar_pro==0x800): target IP address
ar_hrd- Format of hardware address
nf_queue- Constant used to signify a 'queue' verdict
ar_op- ARP opcode (command)

Where did the comment section go?
Red Hat's documentation publication system recently went through an upgrade to enable speedier, more mobile-friendly content. We decided to re-evaluate our commenting platform to ensure that it meets your expectations and serves as an optimal feedback mechanism. During this redesign, we invite your input on providing feedback on Red Hat documentation via the discussion platform.