bpf.c revision 1.1 1 1.1 cgd /*-
2 1.1 cgd * Copyright (c) 1991 The Regents of the University of California.
3 1.1 cgd * All rights reserved.
4 1.1 cgd *
5 1.1 cgd * This code is derived from the Stanford/CMU enet packet filter,
6 1.1 cgd * (net/enet.c) distributed as part of 4.3BSD, and code contributed
7 1.1 cgd * to Berkeley by Steven McCanne of Lawrence Berkeley Laboratory.
8 1.1 cgd *
9 1.1 cgd * Redistribution and use in source and binary forms, with or without
10 1.1 cgd * modification, are permitted provided that the following conditions
11 1.1 cgd * are met:
12 1.1 cgd * 1. Redistributions of source code must retain the above copyright
13 1.1 cgd * notice, this list of conditions and the following disclaimer.
14 1.1 cgd * 2. Redistributions in binary form must reproduce the above copyright
15 1.1 cgd * notice, this list of conditions and the following disclaimer in the
16 1.1 cgd * documentation and/or other materials provided with the distribution.
17 1.1 cgd * 3. All advertising materials mentioning features or use of this software
18 1.1 cgd * must display the following acknowledgement:
19 1.1 cgd * This product includes software developed by the University of
20 1.1 cgd * California, Berkeley and its contributors.
21 1.1 cgd * 4. Neither the name of the University nor the names of its contributors
22 1.1 cgd * may be used to endorse or promote products derived from this software
23 1.1 cgd * without specific prior written permission.
24 1.1 cgd *
25 1.1 cgd * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
26 1.1 cgd * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
27 1.1 cgd * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
28 1.1 cgd * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
29 1.1 cgd * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
30 1.1 cgd * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
31 1.1 cgd * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
32 1.1 cgd * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
33 1.1 cgd * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
34 1.1 cgd * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
35 1.1 cgd * SUCH DAMAGE.
36 1.1 cgd *
37 1.1 cgd * @(#)bpf.c 7.4 (Berkeley) 6/17/91
38 1.1 cgd *
39 1.1 cgd * static char rcsid[] =
40 1.1 cgd * "$Header: /tank/opengrok/rsync2/NetBSD/src/sys/net/bpf.c,v 1.1 1993/03/21 09:45:37 cgd Exp $";
41 1.1 cgd */
42 1.1 cgd
43 1.1 cgd #include "bpfilter.h"
44 1.1 cgd
45 1.1 cgd #if (NBPFILTER > 0)
46 1.1 cgd
47 1.1 cgd #include <sys/param.h>
48 1.1 cgd #include <sys/systm.h>
49 1.1 cgd #include <sys/mbuf.h>
50 1.1 cgd #include <sys/buf.h>
51 1.1 cgd #include <sys/dir.h>
52 1.1 cgd #include <sys/proc.h>
53 1.1 cgd #include <sys/user.h>
54 1.1 cgd #include <sys/ioctl.h>
55 1.1 cgd
56 1.1 cgd #include <sys/file.h>
57 1.1 cgd #ifdef sparc
58 1.1 cgd #include <sys/stream.h>
59 1.1 cgd #endif
60 1.1 cgd #include <sys/tty.h>
61 1.1 cgd #include <sys/uio.h>
62 1.1 cgd
63 1.1 cgd #include <sys/protosw.h>
64 1.1 cgd #include <sys/socket.h>
65 1.1 cgd #include <net/if.h>
66 1.1 cgd
67 1.1 cgd #include <net/bpf.h>
68 1.1 cgd #include <net/bpfdesc.h>
69 1.1 cgd
70 1.1 cgd #include <sys/errno.h>
71 1.1 cgd
72 1.1 cgd #include <netinet/in.h>
73 1.1 cgd #include <netinet/if_ether.h>
74 1.1 cgd #include <sys/kernel.h>
75 1.1 cgd
76 1.1 cgd #define PRINET 26 /* interruptible */
77 1.1 cgd
78 1.1 cgd /*
79 1.1 cgd * The default read buffer size is patchable.
80 1.1 cgd */
81 1.1 cgd int bpf_bufsize = MCLBYTES;
82 1.1 cgd
83 1.1 cgd /*
84 1.1 cgd * bpf_iflist is the list of interfaces; each corresponds to an ifnet
85 1.1 cgd * bpf_dtab holds the descriptors, indexed by minor device #
86 1.1 cgd *
87 1.1 cgd * We really don't need NBPFILTER bpf_if entries, but this eliminates
88 1.1 cgd * the need to account for all possible drivers here.
89 1.1 cgd * This problem will go away when these structures are allocated dynamically.
90 1.1 cgd */
91 1.1 cgd static struct bpf_if *bpf_iflist;
92 1.1 cgd static struct bpf_d bpf_dtab[NBPFILTER];
93 1.1 cgd
94 1.1 cgd static void bpf_ifname();
95 1.1 cgd static void catchpacket();
96 1.1 cgd static int bpf_setif();
97 1.1 cgd static int bpf_initd();
98 1.1 cgd
99 1.1 cgd static int
100 1.1 cgd bpf_movein(uio, linktype, mp, sockp)
101 1.1 cgd register struct uio *uio;
102 1.1 cgd int linktype;
103 1.1 cgd register struct mbuf **mp;
104 1.1 cgd register struct sockaddr *sockp;
105 1.1 cgd {
106 1.1 cgd struct mbuf *m;
107 1.1 cgd int error;
108 1.1 cgd int len;
109 1.1 cgd int hlen;
110 1.1 cgd
111 1.1 cgd /*
112 1.1 cgd * Build a sockaddr based on the data link layer type.
113 1.1 cgd * We do this at this level because the ethernet header
114 1.1 cgd * is copied directly into the data field of the sockaddr.
115 1.1 cgd * In the case of SLIP, there is no header and the packet
116 1.1 cgd * is forwarded as is.
117 1.1 cgd * Also, we are careful to leave room at the front of the mbuf
118 1.1 cgd * for the link level header.
119 1.1 cgd */
120 1.1 cgd switch (linktype) {
121 1.1 cgd case DLT_SLIP:
122 1.1 cgd sockp->sa_family = AF_INET;
123 1.1 cgd hlen = 0;
124 1.1 cgd break;
125 1.1 cgd
126 1.1 cgd case DLT_EN10MB:
127 1.1 cgd sockp->sa_family = AF_UNSPEC;
128 1.1 cgd /* XXX Would MAXLINKHDR be better? */
129 1.1 cgd hlen = sizeof(struct ether_header);
130 1.1 cgd break;
131 1.1 cgd
132 1.1 cgd case DLT_FDDI:
133 1.1 cgd sockp->sa_family = AF_UNSPEC;
134 1.1 cgd /* XXX 4(FORMAC)+6(dst)+6(src)+3(LLC)+5(SNAP) */
135 1.1 cgd hlen = 24;
136 1.1 cgd break;
137 1.1 cgd
138 1.1 cgd default:
139 1.1 cgd return (EIO);
140 1.1 cgd }
141 1.1 cgd
142 1.1 cgd len = uio->uio_resid;
143 1.1 cgd if ((unsigned)len > MCLBYTES)
144 1.1 cgd return (EIO);
145 1.1 cgd
146 1.1 cgd MGET(m, M_WAIT, MT_DATA);
147 1.1 cgd if (m == 0)
148 1.1 cgd return (ENOBUFS);
149 1.1 cgd if (len > MLEN) {
150 1.1 cgd MCLGET(m, M_WAIT);
151 1.1 cgd if ((m->m_flags & M_EXT) == 0) {
152 1.1 cgd error = ENOBUFS;
153 1.1 cgd goto bad;
154 1.1 cgd }
155 1.1 cgd }
156 1.1 cgd m->m_len = len;
157 1.1 cgd *mp = m;
158 1.1 cgd /*
159 1.1 cgd * Make room for link header.
160 1.1 cgd */
161 1.1 cgd if (hlen) {
162 1.1 cgd m->m_len -= hlen;
163 1.1 cgd m->m_data += hlen; /* XXX */
164 1.1 cgd
165 1.1 cgd error = uiomove((caddr_t)sockp->sa_data, hlen, uio);
166 1.1 cgd if (error)
167 1.1 cgd goto bad;
168 1.1 cgd }
169 1.1 cgd error = uiomove(mtod(m, caddr_t), len - hlen, uio);
170 1.1 cgd if (!error)
171 1.1 cgd return (0);
172 1.1 cgd bad:
173 1.1 cgd m_freem(m);
174 1.1 cgd return (error);
175 1.1 cgd }
176 1.1 cgd
177 1.1 cgd /*
178 1.1 cgd * Attach 'd' to the bpf interface 'bp', i.e. make 'd' listen on 'bp'.
179 1.1 cgd * Must be called at splimp.
180 1.1 cgd */
181 1.1 cgd static void
182 1.1 cgd bpf_attachd(d, bp)
183 1.1 cgd struct bpf_d *d;
184 1.1 cgd struct bpf_if *bp;
185 1.1 cgd {
186 1.1 cgd /* Point d at bp. */
187 1.1 cgd d->bd_bif = bp;
188 1.1 cgd
189 1.1 cgd /* Add d to bp's list of listeners. */
190 1.1 cgd d->bd_next = bp->bif_dlist;
191 1.1 cgd bp->bif_dlist = d;
192 1.1 cgd
193 1.1 cgd /*
194 1.1 cgd * Let the driver know we're here (if it doesn't already).
195 1.1 cgd */
196 1.1 cgd *bp->bif_driverp = bp;
197 1.1 cgd }
198 1.1 cgd
199 1.1 cgd static void
200 1.1 cgd bpf_detachd(d)
201 1.1 cgd struct bpf_d *d;
202 1.1 cgd {
203 1.1 cgd struct bpf_d **p;
204 1.1 cgd struct bpf_if *bp;
205 1.1 cgd
206 1.1 cgd bp = d->bd_bif;
207 1.1 cgd /*
208 1.1 cgd * Check if this descriptor had requested promiscuous mode.
209 1.1 cgd * If so, turn it off.
210 1.1 cgd */
211 1.1 cgd if (d->bd_promisc) {
212 1.1 cgd d->bd_promisc = 0;
213 1.1 cgd if (ifpromisc(bp->bif_ifp, 0))
214 1.1 cgd /*
215 1.1 cgd * Something is really wrong if we were able to put
216 1.1 cgd * the driver into promiscuous mode, but can't
217 1.1 cgd * take it out.
218 1.1 cgd */
219 1.1 cgd panic("bpf_detachd: ifpromisc failed");
220 1.1 cgd }
221 1.1 cgd /* Remove 'd' from the interface's descriptor list. */
222 1.1 cgd p = &bp->bif_dlist;
223 1.1 cgd while (*p != d) {
224 1.1 cgd p = &(*p)->bd_next;
225 1.1 cgd if (*p == 0)
226 1.1 cgd panic("bpf_detachd: descriptor not in list");
227 1.1 cgd }
228 1.1 cgd *p = (*p)->bd_next;
229 1.1 cgd if (bp->bif_dlist == 0)
230 1.1 cgd /*
231 1.1 cgd * Let the driver know that there are no more listeners.
232 1.1 cgd */
233 1.1 cgd *d->bd_bif->bif_driverp = 0;
234 1.1 cgd d->bd_bif = 0;
235 1.1 cgd }
236 1.1 cgd
237 1.1 cgd
238 1.1 cgd /*
239 1.1 cgd * Mark a descriptor free by making it point to itself.
240 1.1 cgd * This is probably cheaper than marking with a constant since
241 1.1 cgd * the address should be in a register anyway.
242 1.1 cgd */
243 1.1 cgd #define D_ISFREE(d) ((d) == (d)->bd_next)
244 1.1 cgd #define D_MARKFREE(d) ((d)->bd_next = (d))
245 1.1 cgd #define D_MARKUSED(d) ((d)->bd_next = 0)
246 1.1 cgd
247 1.1 cgd /*
248 1.1 cgd * bpfopen - open ethernet device
249 1.1 cgd *
250 1.1 cgd * Errors: ENXIO - illegal minor device number
251 1.1 cgd * EBUSY - too many files open
252 1.1 cgd */
253 1.1 cgd /* ARGSUSED */
254 1.1 cgd int
255 1.1 cgd bpfopen(dev, flag)
256 1.1 cgd dev_t dev;
257 1.1 cgd int flag;
258 1.1 cgd {
259 1.1 cgd int error, s;
260 1.1 cgd register struct bpf_d *d;
261 1.1 cgd
262 1.1 cgd if (minor(dev) >= NBPFILTER)
263 1.1 cgd return (ENXIO);
264 1.1 cgd
265 1.1 cgd /*
266 1.1 cgd * Each minor can be opened by only one process. If the requested
267 1.1 cgd * minor is in use, return EBUSY.
268 1.1 cgd */
269 1.1 cgd s = splimp();
270 1.1 cgd d = &bpf_dtab[minor(dev)];
271 1.1 cgd if (!D_ISFREE(d)) {
272 1.1 cgd splx(s);
273 1.1 cgd return (EBUSY);
274 1.1 cgd } else
275 1.1 cgd /* Mark "free" and do most initialization. */
276 1.1 cgd bzero((char *)d, sizeof(*d));
277 1.1 cgd splx(s);
278 1.1 cgd
279 1.1 cgd error = bpf_initd(d);
280 1.1 cgd if (error) {
281 1.1 cgd D_MARKFREE(d);
282 1.1 cgd return (error);
283 1.1 cgd }
284 1.1 cgd return (0);
285 1.1 cgd }
286 1.1 cgd
287 1.1 cgd /*
288 1.1 cgd * Close the descriptor by detaching it from its interface,
289 1.1 cgd * deallocating its buffers, and marking it free.
290 1.1 cgd */
291 1.1 cgd /* ARGSUSED */
292 1.1 cgd bpfclose(dev, flag)
293 1.1 cgd dev_t dev;
294 1.1 cgd int flag;
295 1.1 cgd {
296 1.1 cgd register struct bpf_d *d = &bpf_dtab[minor(dev)];
297 1.1 cgd int s;
298 1.1 cgd
299 1.1 cgd s = splimp();
300 1.1 cgd if (d->bd_bif)
301 1.1 cgd bpf_detachd(d);
302 1.1 cgd splx(s);
303 1.1 cgd
304 1.1 cgd /* Free the buffer space. */
305 1.1 cgd if (d->bd_hbuf)
306 1.1 cgd free(d->bd_hbuf, M_DEVBUF);
307 1.1 cgd if (d->bd_fbuf)
308 1.1 cgd free(d->bd_fbuf, M_DEVBUF);
309 1.1 cgd free(d->bd_sbuf, M_DEVBUF);
310 1.1 cgd if (d->bd_filter)
311 1.1 cgd free((caddr_t)d->bd_filter, M_DEVBUF);
312 1.1 cgd
313 1.1 cgd D_MARKFREE(d);
314 1.1 cgd }
315 1.1 cgd
316 1.1 cgd /*
317 1.1 cgd * Rotate the packet buffers in descriptor d. Move the store buffer
318 1.1 cgd * into the hold slot, and the free buffer into the store slot.
319 1.1 cgd * Zero the length of the new store buffer.
320 1.1 cgd */
321 1.1 cgd #define ROTATE_BUFFERS(d) \
322 1.1 cgd (d)->bd_hbuf = (d)->bd_sbuf; \
323 1.1 cgd (d)->bd_hlen = (d)->bd_slen; \
324 1.1 cgd (d)->bd_sbuf = (d)->bd_fbuf; \
325 1.1 cgd (d)->bd_slen = 0; \
326 1.1 cgd (d)->bd_fbuf = 0;
327 1.1 cgd /*
328 1.1 cgd * bpfread - read next chunk of packets from buffers
329 1.1 cgd */
330 1.1 cgd int
331 1.1 cgd bpfread(dev, uio)
332 1.1 cgd dev_t dev;
333 1.1 cgd register struct uio *uio;
334 1.1 cgd {
335 1.1 cgd register struct bpf_d *d = &bpf_dtab[minor(dev)];
336 1.1 cgd int error;
337 1.1 cgd int s;
338 1.1 cgd
339 1.1 cgd /*
340 1.1 cgd * Restrict application to use a buffer the same size as
341 1.1 cgd * as kernel buffers.
342 1.1 cgd */
343 1.1 cgd if (uio->uio_resid != d->bd_bufsize)
344 1.1 cgd return (EINVAL);
345 1.1 cgd
346 1.1 cgd s = splimp();
347 1.1 cgd /*
348 1.1 cgd * If the hold buffer is empty, then set a timer and sleep
349 1.1 cgd * until either the timeout has occurred or enough packets have
350 1.1 cgd * arrived to fill the store buffer.
351 1.1 cgd */
352 1.1 cgd while (d->bd_hbuf == 0) {
353 1.1 cgd if (d->bd_immediate && d->bd_slen != 0) {
354 1.1 cgd /*
355 1.1 cgd * A packet(s) either arrived since the previous
356 1.1 cgd * read or arrived while we were asleep.
357 1.1 cgd * Rotate the buffers and return what's here.
358 1.1 cgd */
359 1.1 cgd ROTATE_BUFFERS(d);
360 1.1 cgd break;
361 1.1 cgd }
362 1.1 cgd error = tsleep((caddr_t)d, PRINET|PCATCH, "bpf", d->bd_rtout);
363 1.1 cgd if (error == EINTR || error == ERESTART) {
364 1.1 cgd splx(s);
365 1.1 cgd return (error);
366 1.1 cgd }
367 1.1 cgd if (error == EWOULDBLOCK) {
368 1.1 cgd /*
369 1.1 cgd * On a timeout, return what's in the buffer,
370 1.1 cgd * which may be nothing. If there is something
371 1.1 cgd * in the store buffer, we can rotate the buffers.
372 1.1 cgd */
373 1.1 cgd if (d->bd_hbuf)
374 1.1 cgd /*
375 1.1 cgd * We filled up the buffer in between
376 1.1 cgd * getting the timeout and arriving
377 1.1 cgd * here, so we don't need to rotate.
378 1.1 cgd */
379 1.1 cgd break;
380 1.1 cgd
381 1.1 cgd if (d->bd_slen == 0) {
382 1.1 cgd splx(s);
383 1.1 cgd return (0);
384 1.1 cgd }
385 1.1 cgd ROTATE_BUFFERS(d);
386 1.1 cgd break;
387 1.1 cgd }
388 1.1 cgd }
389 1.1 cgd /*
390 1.1 cgd * At this point, we know we have something in the hold slot.
391 1.1 cgd */
392 1.1 cgd splx(s);
393 1.1 cgd
394 1.1 cgd /*
395 1.1 cgd * Move data from hold buffer into user space.
396 1.1 cgd * We know the entire buffer is transferred since
397 1.1 cgd * we checked above that the read buffer is bpf_bufsize bytes.
398 1.1 cgd */
399 1.1 cgd error = uiomove(d->bd_hbuf, d->bd_hlen, uio);
400 1.1 cgd
401 1.1 cgd s = splimp();
402 1.1 cgd d->bd_fbuf = d->bd_hbuf;
403 1.1 cgd d->bd_hbuf = 0;
404 1.1 cgd splx(s);
405 1.1 cgd
406 1.1 cgd return (error);
407 1.1 cgd }
408 1.1 cgd
409 1.1 cgd
410 1.1 cgd /*
411 1.1 cgd * If there are processes sleeping on this descriptor, wake them up.
412 1.1 cgd */
413 1.1 cgd static inline void
414 1.1 cgd bpf_wakeup(d)
415 1.1 cgd register struct bpf_d *d;
416 1.1 cgd {
417 1.1 cgd wakeup((caddr_t)d);
418 1.1 cgd if (d->bd_selproc) {
419 1.1 cgd selwakeup(d->bd_selproc, (int)d->bd_selcoll);
420 1.1 cgd d->bd_selcoll = 0;
421 1.1 cgd d->bd_selproc = 0;
422 1.1 cgd }
423 1.1 cgd }
424 1.1 cgd
425 1.1 cgd int
426 1.1 cgd bpfwrite(dev, uio)
427 1.1 cgd dev_t dev;
428 1.1 cgd struct uio *uio;
429 1.1 cgd {
430 1.1 cgd register struct bpf_d *d = &bpf_dtab[minor(dev)];
431 1.1 cgd struct ifnet *ifp;
432 1.1 cgd struct mbuf *m;
433 1.1 cgd int error, s;
434 1.1 cgd static struct sockaddr dst;
435 1.1 cgd
436 1.1 cgd if (d->bd_bif == 0)
437 1.1 cgd return (ENXIO);
438 1.1 cgd
439 1.1 cgd ifp = d->bd_bif->bif_ifp;
440 1.1 cgd
441 1.1 cgd if (uio->uio_resid == 0)
442 1.1 cgd return (0);
443 1.1 cgd if (uio->uio_resid > ifp->if_mtu)
444 1.1 cgd return (EMSGSIZE);
445 1.1 cgd
446 1.1 cgd error = bpf_movein(uio, (int)d->bd_bif->bif_dlt, &m, &dst);
447 1.1 cgd if (error)
448 1.1 cgd return (error);
449 1.1 cgd
450 1.1 cgd s = splnet();
451 1.1 cgd error = (*ifp->if_output)(ifp, m, &dst);
452 1.1 cgd splx(s);
453 1.1 cgd /*
454 1.1 cgd * The driver frees the mbuf.
455 1.1 cgd */
456 1.1 cgd return (error);
457 1.1 cgd }
458 1.1 cgd
459 1.1 cgd /*
460 1.1 cgd * Reset a descriptor by flushing its packet bufferand clearing the receive
461 1.1 cgd * and drop counts. Should be called at splimp.
462 1.1 cgd */
463 1.1 cgd static void
464 1.1 cgd reset_d(d)
465 1.1 cgd struct bpf_d *d;
466 1.1 cgd {
467 1.1 cgd if (d->bd_hbuf) {
468 1.1 cgd /* Free the hold buffer. */
469 1.1 cgd d->bd_fbuf = d->bd_hbuf;
470 1.1 cgd d->bd_hbuf = 0;
471 1.1 cgd }
472 1.1 cgd d->bd_slen = 0;
473 1.1 cgd d->bd_rcount = 0;
474 1.1 cgd d->bd_dcount = 0;
475 1.1 cgd }
476 1.1 cgd
477 1.1 cgd /*
478 1.1 cgd * FIONREAD Check for read packet available.
479 1.1 cgd * SIOCGIFADDR Get interface address - convenient hook to driver.
480 1.1 cgd * BIOCGFLEN Get max filter len.
481 1.1 cgd * BIOCGBLEN Get buffer len [for read()].
482 1.1 cgd * BIOCSETF Set ethernet read filter.
483 1.1 cgd * BIOCFLUSH Flush read packet buffer.
484 1.1 cgd * BIOCPROMISC Put interface into promiscuous mode.
485 1.1 cgd * BIOCGDLT Get link layer type.
486 1.1 cgd * BIOCGETIF Get interface name.
487 1.1 cgd * BIOCSETIF Set interface.
488 1.1 cgd * BIOCSRTIMEOUT Set read timeout.
489 1.1 cgd * BIOCGRTIMEOUT Get read timeout.
490 1.1 cgd * BIOCGSTATS Get packet stats.
491 1.1 cgd * BIOCIMMEDIATE Set immediate mode.
492 1.1 cgd */
493 1.1 cgd /* ARGSUSED */
494 1.1 cgd int
495 1.1 cgd bpfioctl(dev, cmd, addr, flag)
496 1.1 cgd dev_t dev;
497 1.1 cgd int cmd;
498 1.1 cgd caddr_t addr;
499 1.1 cgd int flag;
500 1.1 cgd {
501 1.1 cgd register struct bpf_d *d = &bpf_dtab[minor(dev)];
502 1.1 cgd int s, error = 0;
503 1.1 cgd
504 1.1 cgd switch (cmd) {
505 1.1 cgd
506 1.1 cgd default:
507 1.1 cgd error = EINVAL;
508 1.1 cgd break;
509 1.1 cgd
510 1.1 cgd /*
511 1.1 cgd * Check for read packet available.
512 1.1 cgd */
513 1.1 cgd case FIONREAD:
514 1.1 cgd {
515 1.1 cgd int n;
516 1.1 cgd
517 1.1 cgd s = splimp();
518 1.1 cgd n = d->bd_slen;
519 1.1 cgd if (d->bd_hbuf)
520 1.1 cgd n += d->bd_hlen;
521 1.1 cgd splx(s);
522 1.1 cgd
523 1.1 cgd *(int *)addr = n;
524 1.1 cgd break;
525 1.1 cgd }
526 1.1 cgd
527 1.1 cgd case SIOCGIFADDR:
528 1.1 cgd {
529 1.1 cgd struct ifnet *ifp;
530 1.1 cgd
531 1.1 cgd if (d->bd_bif == 0)
532 1.1 cgd error = EINVAL;
533 1.1 cgd else {
534 1.1 cgd ifp = d->bd_bif->bif_ifp;
535 1.1 cgd error = (*ifp->if_ioctl)(ifp, cmd, addr);
536 1.1 cgd }
537 1.1 cgd break;
538 1.1 cgd }
539 1.1 cgd
540 1.1 cgd /*
541 1.1 cgd * Get max filter len.
542 1.1 cgd */
543 1.1 cgd case BIOCGFLEN:
544 1.1 cgd *(u_int *)addr = BPF_MAXINSNS;
545 1.1 cgd break;
546 1.1 cgd /*
547 1.1 cgd * Get buffer len [for read()].
548 1.1 cgd */
549 1.1 cgd case BIOCGBLEN:
550 1.1 cgd *(u_int *)addr = d->bd_bufsize;
551 1.1 cgd break;
552 1.1 cgd
553 1.1 cgd /*
554 1.1 cgd * Set ethernet read filter.
555 1.1 cgd */
556 1.1 cgd case BIOCSETF:
557 1.1 cgd error = bpf_setf(d, (struct bpf_program *)addr);
558 1.1 cgd break;
559 1.1 cgd
560 1.1 cgd /*
561 1.1 cgd * Flush read packet buffer.
562 1.1 cgd */
563 1.1 cgd case BIOCFLUSH:
564 1.1 cgd s = splimp();
565 1.1 cgd reset_d(d);
566 1.1 cgd splx(s);
567 1.1 cgd break;
568 1.1 cgd
569 1.1 cgd /*
570 1.1 cgd * Put interface into promiscuous mode.
571 1.1 cgd */
572 1.1 cgd case BIOCPROMISC:
573 1.1 cgd if (d->bd_bif == 0) {
574 1.1 cgd /*
575 1.1 cgd * No interface attached yet.
576 1.1 cgd */
577 1.1 cgd error = EINVAL;
578 1.1 cgd break;
579 1.1 cgd }
580 1.1 cgd s = splimp();
581 1.1 cgd if (d->bd_promisc == 0) {
582 1.1 cgd d->bd_promisc = 1;
583 1.1 cgd error = ifpromisc(d->bd_bif->bif_ifp, 1);
584 1.1 cgd }
585 1.1 cgd splx(s);
586 1.1 cgd break;
587 1.1 cgd
588 1.1 cgd /*
589 1.1 cgd * Get device parameters.
590 1.1 cgd */
591 1.1 cgd case BIOCGDLT:
592 1.1 cgd if (d->bd_bif == 0)
593 1.1 cgd error = EINVAL;
594 1.1 cgd else
595 1.1 cgd *(u_int *)addr = d->bd_bif->bif_dlt;
596 1.1 cgd break;
597 1.1 cgd
598 1.1 cgd /*
599 1.1 cgd * Set interface name.
600 1.1 cgd */
601 1.1 cgd case BIOCGETIF:
602 1.1 cgd if (d->bd_bif == 0)
603 1.1 cgd error = EINVAL;
604 1.1 cgd else
605 1.1 cgd bpf_ifname(d->bd_bif->bif_ifp, (struct ifreq *)addr);
606 1.1 cgd break;
607 1.1 cgd
608 1.1 cgd /*
609 1.1 cgd * Set interface.
610 1.1 cgd */
611 1.1 cgd case BIOCSETIF:
612 1.1 cgd error = bpf_setif(d, (struct ifreq *)addr);
613 1.1 cgd break;
614 1.1 cgd
615 1.1 cgd /*
616 1.1 cgd * Set read timeout.
617 1.1 cgd */
618 1.1 cgd case BIOCSRTIMEOUT:
619 1.1 cgd {
620 1.1 cgd struct timeval *tv = (struct timeval *)addr;
621 1.1 cgd u_long msec;
622 1.1 cgd
623 1.1 cgd /* Compute number of milliseconds. */
624 1.1 cgd msec = tv->tv_sec * 1000 + tv->tv_usec / 1000;
625 1.1 cgd /* Scale milliseconds to ticks. Assume hard
626 1.1 cgd clock has millisecond or greater resolution
627 1.1 cgd (i.e. tick >= 1000). For 10ms hardclock,
628 1.1 cgd tick/1000 = 10, so rtout<-msec/10. */
629 1.1 cgd d->bd_rtout = msec / (tick / 1000);
630 1.1 cgd break;
631 1.1 cgd }
632 1.1 cgd
633 1.1 cgd /*
634 1.1 cgd * Get read timeout.
635 1.1 cgd */
636 1.1 cgd case BIOCGRTIMEOUT:
637 1.1 cgd {
638 1.1 cgd struct timeval *tv = (struct timeval *)addr;
639 1.1 cgd u_long msec = d->bd_rtout;
640 1.1 cgd
641 1.1 cgd msec *= tick / 1000;
642 1.1 cgd tv->tv_sec = msec / 1000;
643 1.1 cgd tv->tv_usec = msec % 1000;
644 1.1 cgd break;
645 1.1 cgd }
646 1.1 cgd
647 1.1 cgd /*
648 1.1 cgd * Get packet stats.
649 1.1 cgd */
650 1.1 cgd case BIOCGSTATS:
651 1.1 cgd {
652 1.1 cgd struct bpf_stat *bs = (struct bpf_stat *)addr;
653 1.1 cgd
654 1.1 cgd bs->bs_recv = d->bd_rcount;
655 1.1 cgd bs->bs_drop = d->bd_dcount;
656 1.1 cgd break;
657 1.1 cgd }
658 1.1 cgd
659 1.1 cgd /*
660 1.1 cgd * Set immediate mode.
661 1.1 cgd */
662 1.1 cgd case BIOCIMMEDIATE:
663 1.1 cgd d->bd_immediate = *(u_int *)addr;
664 1.1 cgd break;
665 1.1 cgd }
666 1.1 cgd return (error);
667 1.1 cgd }
668 1.1 cgd
669 1.1 cgd /*
670 1.1 cgd * Set d's packet filter program to 'fp'. If 'd' already has a filter,
671 1.1 cgd * free it and replace it. Returns EINVAL for bogus requests.
672 1.1 cgd */
673 1.1 cgd int
674 1.1 cgd bpf_setf(d, fp)
675 1.1 cgd struct bpf_d *d;
676 1.1 cgd struct bpf_program *fp;
677 1.1 cgd {
678 1.1 cgd struct bpf_insn *fcode, *old;
679 1.1 cgd u_int flen, size;
680 1.1 cgd int s;
681 1.1 cgd
682 1.1 cgd old = d->bd_filter;
683 1.1 cgd if (fp->bf_insns == 0) {
684 1.1 cgd if (fp->bf_len != 0)
685 1.1 cgd return (EINVAL);
686 1.1 cgd s = splimp();
687 1.1 cgd d->bd_filter = 0;
688 1.1 cgd reset_d(d);
689 1.1 cgd splx(s);
690 1.1 cgd if (old != 0)
691 1.1 cgd free((caddr_t)old, M_DEVBUF);
692 1.1 cgd return (0);
693 1.1 cgd }
694 1.1 cgd flen = fp->bf_len;
695 1.1 cgd if (flen > BPF_MAXINSNS)
696 1.1 cgd return (EINVAL);
697 1.1 cgd
698 1.1 cgd size = flen * sizeof(*fp->bf_insns);
699 1.1 cgd fcode = (struct bpf_insn *)malloc(size, M_DEVBUF, M_WAITOK);
700 1.1 cgd if (copyin((caddr_t)fp->bf_insns, (caddr_t)fcode, size))
701 1.1 cgd return (EINVAL);
702 1.1 cgd
703 1.1 cgd if (bpf_validate(fcode, (int)flen)) {
704 1.1 cgd s = splimp();
705 1.1 cgd d->bd_filter = fcode;
706 1.1 cgd reset_d(d);
707 1.1 cgd splx(s);
708 1.1 cgd if (old != 0)
709 1.1 cgd free((caddr_t)old, M_DEVBUF);
710 1.1 cgd
711 1.1 cgd return (0);
712 1.1 cgd }
713 1.1 cgd free((caddr_t)fcode, M_DEVBUF);
714 1.1 cgd return (EINVAL);
715 1.1 cgd }
716 1.1 cgd
717 1.1 cgd /*
718 1.1 cgd * Detach 'd' from its current interface (if attached at all) and attach to
719 1.1 cgd * the interface named 'name'. Return ioctl error code or 0.
720 1.1 cgd */
721 1.1 cgd static int
722 1.1 cgd bpf_setif(d, ifr)
723 1.1 cgd struct bpf_d *d;
724 1.1 cgd struct ifreq *ifr;
725 1.1 cgd {
726 1.1 cgd struct bpf_if *bp;
727 1.1 cgd char *cp;
728 1.1 cgd int unit, s;
729 1.1 cgd
730 1.1 cgd /*
731 1.1 cgd * Separate string into name part and unit number. Put a null
732 1.1 cgd * byte at the end of the name part, and compute the number.
733 1.1 cgd * If the a unit number is unspecified, the default is 0,
734 1.1 cgd * as initialized above. XXX This should be common code.
735 1.1 cgd */
736 1.1 cgd unit = 0;
737 1.1 cgd cp = ifr->ifr_name;
738 1.1 cgd cp[sizeof(ifr->ifr_name) - 1] = '\0';
739 1.1 cgd while (*cp++) {
740 1.1 cgd if (*cp >= '0' && *cp <= '9') {
741 1.1 cgd unit = *cp - '0';
742 1.1 cgd *cp++ = '\0';
743 1.1 cgd while (*cp)
744 1.1 cgd unit = 10 * unit + *cp++ - '0';
745 1.1 cgd break;
746 1.1 cgd }
747 1.1 cgd }
748 1.1 cgd /*
749 1.1 cgd * Look through attached interfaces for the named one.
750 1.1 cgd */
751 1.1 cgd for (bp = bpf_iflist; bp != 0; bp = bp->bif_next) {
752 1.1 cgd struct ifnet *ifp = bp->bif_ifp;
753 1.1 cgd
754 1.1 cgd if (ifp == 0 || unit != ifp->if_unit
755 1.1 cgd || strcmp(ifp->if_name, ifr->ifr_name) != 0)
756 1.1 cgd continue;
757 1.1 cgd /*
758 1.1 cgd * We found the requested interface. If we're
759 1.1 cgd * already attached to it, just flush the buffer.
760 1.1 cgd * If it's not up, return an error.
761 1.1 cgd */
762 1.1 cgd if ((ifp->if_flags & IFF_UP) == 0)
763 1.1 cgd return (ENETDOWN);
764 1.1 cgd s = splimp();
765 1.1 cgd if (bp != d->bd_bif) {
766 1.1 cgd if (d->bd_bif)
767 1.1 cgd /*
768 1.1 cgd * Detach if attached to something else.
769 1.1 cgd */
770 1.1 cgd bpf_detachd(d);
771 1.1 cgd
772 1.1 cgd bpf_attachd(d, bp);
773 1.1 cgd }
774 1.1 cgd reset_d(d);
775 1.1 cgd splx(s);
776 1.1 cgd return (0);
777 1.1 cgd }
778 1.1 cgd /* Not found. */
779 1.1 cgd return (ENXIO);
780 1.1 cgd }
781 1.1 cgd
782 1.1 cgd /*
783 1.1 cgd * Lookup the name of the 'ifp' interface and return it in 'ifr->ifr_name'.
784 1.1 cgd * We augment the ifp's base name with its unit number.
785 1.1 cgd */
786 1.1 cgd static void
787 1.1 cgd bpf_ifname(ifp, ifr)
788 1.1 cgd struct ifnet *ifp;
789 1.1 cgd struct ifreq *ifr;
790 1.1 cgd {
791 1.1 cgd char *s = ifp->if_name;
792 1.1 cgd char *d = ifr->ifr_name;
793 1.1 cgd
794 1.1 cgd while (*d++ = *s++)
795 1.1 cgd ;
796 1.1 cgd /* XXX Assume that unit number is less than 10. */
797 1.1 cgd *d++ = ifp->if_unit + '0';
798 1.1 cgd *d = '\0';
799 1.1 cgd }
800 1.1 cgd
801 1.1 cgd /*
802 1.1 cgd * Support for select() system call
803 1.1 cgd * Inspired by the code in tty.c for the same purpose.
804 1.1 cgd *
805 1.1 cgd * bpfselect - returns true iff the specific operation
806 1.1 cgd * will not block indefinitely. Otherwise, return
807 1.1 cgd * false but make a note that a selwakeup() must be done.
808 1.1 cgd */
809 1.1 cgd int
810 1.1 cgd bpfselect(dev, rw, p)
811 1.1 cgd register dev_t dev;
812 1.1 cgd int rw;
813 1.1 cgd struct proc *p;
814 1.1 cgd {
815 1.1 cgd register struct bpf_d *d;
816 1.1 cgd register int s;
817 1.1 cgd
818 1.1 cgd if (rw != FREAD)
819 1.1 cgd return (0);
820 1.1 cgd /*
821 1.1 cgd * An imitation of the FIONREAD ioctl code.
822 1.1 cgd */
823 1.1 cgd d = &bpf_dtab[minor(dev)];
824 1.1 cgd
825 1.1 cgd s = splimp();
826 1.1 cgd if (d->bd_hlen != 0 || (d->bd_immediate && d->bd_slen != 0)) {
827 1.1 cgd /*
828 1.1 cgd * There is data waiting.
829 1.1 cgd */
830 1.1 cgd splx(s);
831 1.1 cgd return (1);
832 1.1 cgd }
833 1.1 cgd /*
834 1.1 cgd * No data ready. If there's already a select() waiting on this
835 1.1 cgd * minor device then this is a collision. This shouldn't happen
836 1.1 cgd * because minors really should not be shared, but if a process
837 1.1 cgd * forks while one of these is open, it is possible that both
838 1.1 cgd * processes could select on the same descriptor.
839 1.1 cgd */
840 1.1 cgd if (d->bd_selproc && d->bd_selproc->p_wchan == (caddr_t)&selwait)
841 1.1 cgd d->bd_selcoll = 1;
842 1.1 cgd else
843 1.1 cgd d->bd_selproc = p;
844 1.1 cgd
845 1.1 cgd splx(s);
846 1.1 cgd return (0);
847 1.1 cgd }
848 1.1 cgd
849 1.1 cgd /*
850 1.1 cgd * bpf_tap - incoming linkage from device drivers
851 1.1 cgd */
852 1.1 cgd void
853 1.1 cgd bpf_tap(arg, pkt, pktlen)
854 1.1 cgd caddr_t arg;
855 1.1 cgd register u_char *pkt;
856 1.1 cgd register u_int pktlen;
857 1.1 cgd {
858 1.1 cgd struct bpf_if *bp;
859 1.1 cgd register struct bpf_d *d;
860 1.1 cgd register u_int slen;
861 1.1 cgd /*
862 1.1 cgd * Note that the ipl does not have to be raised at this point.
863 1.1 cgd * The only problem that could arise here is that if two different
864 1.1 cgd * interfaces shared any data. This is not the case.
865 1.1 cgd */
866 1.1 cgd bp = (struct bpf_if *)arg;
867 1.1 cgd for (d = bp->bif_dlist; d != 0; d = d->bd_next) {
868 1.1 cgd ++d->bd_rcount;
869 1.1 cgd slen = bpf_filter(d->bd_filter, pkt, pktlen, pktlen);
870 1.1 cgd if (slen != 0)
871 1.1 cgd catchpacket(d, pkt, pktlen, slen, bcopy);
872 1.1 cgd }
873 1.1 cgd }
874 1.1 cgd
875 1.1 cgd /*
876 1.1 cgd * Copy data from an mbuf chain into a buffer. This code is derived
877 1.1 cgd * from m_copydata in sys/uipc_mbuf.c.
878 1.1 cgd */
879 1.1 cgd static void
880 1.1 cgd bpf_mcopy(src, dst, len)
881 1.1 cgd u_char *src;
882 1.1 cgd u_char *dst;
883 1.1 cgd register int len;
884 1.1 cgd {
885 1.1 cgd register struct mbuf *m = (struct mbuf *)src;
886 1.1 cgd register unsigned count;
887 1.1 cgd
888 1.1 cgd while (len > 0) {
889 1.1 cgd if (m == 0)
890 1.1 cgd panic("bpf_mcopy");
891 1.1 cgd count = MIN(m->m_len, len);
892 1.1 cgd bcopy(mtod(m, caddr_t), (caddr_t)dst, count);
893 1.1 cgd m = m->m_next;
894 1.1 cgd dst += count;
895 1.1 cgd len -= count;
896 1.1 cgd }
897 1.1 cgd }
898 1.1 cgd
899 1.1 cgd /*
900 1.1 cgd * bpf_mtap - incoming linkage from device drivers, when packet
901 1.1 cgd * is in an mbuf chain
902 1.1 cgd */
903 1.1 cgd void
904 1.1 cgd bpf_mtap(arg, m)
905 1.1 cgd caddr_t arg;
906 1.1 cgd struct mbuf *m;
907 1.1 cgd {
908 1.1 cgd struct bpf_if *bp = (struct bpf_if *)arg;
909 1.1 cgd struct bpf_d *d;
910 1.1 cgd u_int pktlen, slen;
911 1.1 cgd struct mbuf *m0;
912 1.1 cgd
913 1.1 cgd pktlen = 0;
914 1.1 cgd for (m0 = m; m0 != m; m0 = m0->m_next)
915 1.1 cgd pktlen += m0->m_len;
916 1.1 cgd
917 1.1 cgd for (d = bp->bif_dlist; d != 0; d = d->bd_next) {
918 1.1 cgd ++d->bd_rcount;
919 1.1 cgd slen = bpf_filter(d->bd_filter, (u_char *)m, pktlen, 0);
920 1.1 cgd if (slen != 0)
921 1.1 cgd catchpacket(d, (u_char *)m, pktlen, slen, bpf_mcopy);
922 1.1 cgd }
923 1.1 cgd }
924 1.1 cgd
925 1.1 cgd /*
926 1.1 cgd * Move the packet data from interface memory (pkt) into the
927 1.1 cgd * store buffer. Return 1 if it's time to wakeup a listener (buffer full),
928 1.1 cgd * otherwise 0. 'copy' is the routine called to do the actual data
929 1.1 cgd * transfer. 'bcopy' is passed in to copy contiguous chunks, while
930 1.1 cgd * 'bpf_mcopy' is passed in to copy mbuf chains. In the latter
931 1.1 cgd * case, 'pkt' is really an mbuf.
932 1.1 cgd */
933 1.1 cgd static void
934 1.1 cgd catchpacket(d, pkt, pktlen, snaplen, cpfn)
935 1.1 cgd register struct bpf_d *d;
936 1.1 cgd register u_char *pkt;
937 1.1 cgd register u_int pktlen, snaplen;
938 1.1 cgd register void (*cpfn)();
939 1.1 cgd {
940 1.1 cgd register struct bpf_hdr *hp;
941 1.1 cgd register int totlen, curlen;
942 1.1 cgd register int hdrlen = d->bd_bif->bif_hdrlen;
943 1.1 cgd /*
944 1.1 cgd * Figure out how many bytes to move. If the packet is
945 1.1 cgd * greater or equal to the snapshot length, transfer that
946 1.1 cgd * much. Otherwise, transfer the whole packet (unless
947 1.1 cgd * we hit the buffer size limit).
948 1.1 cgd */
949 1.1 cgd totlen = hdrlen + MIN(snaplen, pktlen);
950 1.1 cgd if (totlen > d->bd_bufsize)
951 1.1 cgd totlen = d->bd_bufsize;
952 1.1 cgd
953 1.1 cgd /*
954 1.1 cgd * Round up the end of the previous packet to the next longword.
955 1.1 cgd */
956 1.1 cgd curlen = BPF_WORDALIGN(d->bd_slen);
957 1.1 cgd if (curlen + totlen > d->bd_bufsize) {
958 1.1 cgd /*
959 1.1 cgd * This packet will overflow the storage buffer.
960 1.1 cgd * Rotate the buffers if we can, then wakeup any
961 1.1 cgd * pending reads.
962 1.1 cgd */
963 1.1 cgd if (d->bd_fbuf == 0) {
964 1.1 cgd /*
965 1.1 cgd * We haven't completed the previous read yet,
966 1.1 cgd * so drop the packet.
967 1.1 cgd */
968 1.1 cgd ++d->bd_dcount;
969 1.1 cgd return;
970 1.1 cgd }
971 1.1 cgd ROTATE_BUFFERS(d);
972 1.1 cgd bpf_wakeup(d);
973 1.1 cgd curlen = 0;
974 1.1 cgd }
975 1.1 cgd else if (d->bd_immediate)
976 1.1 cgd /*
977 1.1 cgd * Immediate mode is set. A packet arrived so any
978 1.1 cgd * reads should be woken up.
979 1.1 cgd */
980 1.1 cgd bpf_wakeup(d);
981 1.1 cgd
982 1.1 cgd /*
983 1.1 cgd * Append the bpf header.
984 1.1 cgd */
985 1.1 cgd hp = (struct bpf_hdr *)(d->bd_sbuf + curlen);
986 1.1 cgd #ifdef sun
987 1.1 cgd uniqtime(&hp->bh_tstamp);
988 1.1 cgd #else
989 1.1 cgd #ifdef hp300
990 1.1 cgd microtime(&hp->bh_tstamp);
991 1.1 cgd #else
992 1.1 cgd hp->bh_tstamp = time;
993 1.1 cgd #endif
994 1.1 cgd #endif
995 1.1 cgd hp->bh_datalen = pktlen;
996 1.1 cgd hp->bh_hdrlen = hdrlen;
997 1.1 cgd /*
998 1.1 cgd * Copy the packet data into the store buffer and update its length.
999 1.1 cgd */
1000 1.1 cgd (*cpfn)(pkt, (u_char *)hp + hdrlen, (hp->bh_caplen = totlen - hdrlen));
1001 1.1 cgd d->bd_slen = curlen + totlen;
1002 1.1 cgd }
1003 1.1 cgd
1004 1.1 cgd /*
1005 1.1 cgd * Initialize all nonzero fields of a descriptor.
1006 1.1 cgd */
1007 1.1 cgd static int
1008 1.1 cgd bpf_initd(d)
1009 1.1 cgd register struct bpf_d *d;
1010 1.1 cgd {
1011 1.1 cgd d->bd_bufsize = bpf_bufsize;
1012 1.1 cgd d->bd_fbuf = (caddr_t)malloc(d->bd_bufsize, M_DEVBUF, M_WAITOK);
1013 1.1 cgd if (d->bd_fbuf == 0)
1014 1.1 cgd return (ENOBUFS);
1015 1.1 cgd
1016 1.1 cgd d->bd_sbuf = (caddr_t)malloc(d->bd_bufsize, M_DEVBUF, M_WAITOK);
1017 1.1 cgd if (d->bd_sbuf == 0) {
1018 1.1 cgd free(d->bd_fbuf, M_DEVBUF);
1019 1.1 cgd return (ENOBUFS);
1020 1.1 cgd }
1021 1.1 cgd d->bd_slen = 0;
1022 1.1 cgd d->bd_hlen = 0;
1023 1.1 cgd return (0);
1024 1.1 cgd }
1025 1.1 cgd
1026 1.1 cgd /*
1027 1.1 cgd * Register 'ifp' with bpf. XXX
1028 1.1 cgd * and 'driverp' is a pointer to the 'struct bpf_if *' in the driver's softc.
1029 1.1 cgd */
1030 1.1 cgd void
1031 1.1 cgd bpfattach(driverp, ifp, dlt, hdrlen)
1032 1.1 cgd caddr_t *driverp;
1033 1.1 cgd struct ifnet *ifp;
1034 1.1 cgd u_int dlt, hdrlen;
1035 1.1 cgd {
1036 1.1 cgd struct bpf_if *bp;
1037 1.1 cgd int i;
1038 1.1 cgd
1039 1.1 cgd bp = (struct bpf_if *)malloc(sizeof(*bp), M_DEVBUF, M_DONTWAIT);
1040 1.1 cgd if (bp == 0)
1041 1.1 cgd panic("bpfattach");
1042 1.1 cgd
1043 1.1 cgd bp->bif_dlist = 0;
1044 1.1 cgd bp->bif_driverp = (struct bpf_if **)driverp;
1045 1.1 cgd bp->bif_ifp = ifp;
1046 1.1 cgd bp->bif_dlt = dlt;
1047 1.1 cgd
1048 1.1 cgd bp->bif_next = bpf_iflist;
1049 1.1 cgd bpf_iflist = bp;
1050 1.1 cgd
1051 1.1 cgd *bp->bif_driverp = 0;
1052 1.1 cgd
1053 1.1 cgd /*
1054 1.1 cgd * Compute the length of the bpf header. This is not necessarily
1055 1.1 cgd * equal to SIZEOF_BPF_HDR because we want to insert spacing such
1056 1.1 cgd * that the network layer header begins on a longword boundary (for
1057 1.1 cgd * performance reasons and to alleviate alignment restrictions).
1058 1.1 cgd */
1059 1.1 cgd bp->bif_hdrlen = BPF_WORDALIGN(hdrlen + SIZEOF_BPF_HDR) - hdrlen;
1060 1.1 cgd
1061 1.1 cgd /*
1062 1.1 cgd * Mark all the descriptors free if this hasn't been done.
1063 1.1 cgd */
1064 1.1 cgd if (!D_ISFREE(&bpf_dtab[0]))
1065 1.1 cgd for (i = 0; i < NBPFILTER; ++i)
1066 1.1 cgd D_MARKFREE(&bpf_dtab[i]);
1067 1.1 cgd
1068 1.1 cgd printf("bpf: %s%d attached\n", ifp->if_name, ifp->if_unit);
1069 1.1 cgd }
1070 1.1 cgd
1071 1.1 cgd /* XXX This routine belongs in net/if.c. */
1072 1.1 cgd /*
1073 1.1 cgd * Set/clear promiscuous mode on interface ifp based on the truth value`
1074 1.1 cgd * of pswitch. The calls are reference counted so that only the first
1075 1.1 cgd * on request actually has an effect, as does the final off request.
1076 1.1 cgd * Results are undefined if the off and on requests are not matched.
1077 1.1 cgd */
1078 1.1 cgd int
1079 1.1 cgd ifpromisc(ifp, pswitch)
1080 1.1 cgd struct ifnet *ifp;
1081 1.1 cgd int pswitch;
1082 1.1 cgd {
1083 1.1 cgd struct ifreq ifr;
1084 1.1 cgd /*
1085 1.1 cgd * If the device is not configured up, we cannot put it in
1086 1.1 cgd * promiscuous mode.
1087 1.1 cgd */
1088 1.1 cgd if ((ifp->if_flags & IFF_UP) == 0)
1089 1.1 cgd return (ENETDOWN);
1090 1.1 cgd
1091 1.1 cgd if (pswitch) {
1092 1.1 cgd if (ifp->if_pcount++ != 0)
1093 1.1 cgd return (0);
1094 1.1 cgd ifp->if_flags |= IFF_PROMISC;
1095 1.1 cgd } else {
1096 1.1 cgd if (--ifp->if_pcount > 0)
1097 1.1 cgd return (0);
1098 1.1 cgd ifp->if_flags &= ~IFF_PROMISC;
1099 1.1 cgd }
1100 1.1 cgd ifr.ifr_flags = ifp->if_flags;
1101 1.1 cgd return ((*ifp->if_ioctl)(ifp, SIOCSIFFLAGS, (caddr_t)&ifr));
1102 1.1 cgd }
1103 1.1 cgd
1104 1.1 cgd #endif (NBPFILTER > 0)
1105