Home | History | Annotate | Line # | Download | only in net
bpf.c revision 1.92
      1  1.92   darrenr /*	$NetBSD: bpf.c,v 1.92 2004/04/11 01:41:01 darrenr Exp $	*/
      2  1.13       cgd 
      3  1.12   mycroft /*
      4  1.12   mycroft  * Copyright (c) 1990, 1991, 1993
      5  1.12   mycroft  *	The Regents of the University of California.  All rights reserved.
      6   1.1       cgd  *
      7   1.1       cgd  * This code is derived from the Stanford/CMU enet packet filter,
      8   1.1       cgd  * (net/enet.c) distributed as part of 4.3BSD, and code contributed
      9  1.36  christos  * to Berkeley by Steven McCanne and Van Jacobson both of Lawrence
     10   1.2       cgd  * Berkeley Laboratory.
     11   1.1       cgd  *
     12   1.1       cgd  * Redistribution and use in source and binary forms, with or without
     13   1.1       cgd  * modification, are permitted provided that the following conditions
     14   1.1       cgd  * are met:
     15   1.1       cgd  * 1. Redistributions of source code must retain the above copyright
     16   1.1       cgd  *    notice, this list of conditions and the following disclaimer.
     17   1.1       cgd  * 2. Redistributions in binary form must reproduce the above copyright
     18   1.1       cgd  *    notice, this list of conditions and the following disclaimer in the
     19   1.1       cgd  *    documentation and/or other materials provided with the distribution.
     20  1.83       agc  * 3. Neither the name of the University nor the names of its contributors
     21   1.1       cgd  *    may be used to endorse or promote products derived from this software
     22   1.1       cgd  *    without specific prior written permission.
     23   1.1       cgd  *
     24   1.1       cgd  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
     25   1.1       cgd  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     26   1.1       cgd  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     27   1.1       cgd  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
     28   1.1       cgd  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     29   1.1       cgd  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     30   1.1       cgd  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     31   1.1       cgd  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     32   1.1       cgd  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     33   1.1       cgd  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     34   1.1       cgd  * SUCH DAMAGE.
     35   1.1       cgd  *
     36  1.39      fvdl  *	@(#)bpf.c	8.4 (Berkeley) 1/9/95
     37  1.36  christos  * static char rcsid[] =
     38  1.36  christos  * "Header: bpf.c,v 1.67 96/09/26 22:00:52 leres Exp ";
     39   1.1       cgd  */
     40  1.63     lukem 
     41  1.63     lukem #include <sys/cdefs.h>
     42  1.92   darrenr __KERNEL_RCSID(0, "$NetBSD: bpf.c,v 1.92 2004/04/11 01:41:01 darrenr Exp $");
     43   1.1       cgd 
     44   1.1       cgd #include "bpfilter.h"
     45   1.1       cgd 
     46   1.1       cgd #include <sys/param.h>
     47   1.1       cgd #include <sys/systm.h>
     48   1.1       cgd #include <sys/mbuf.h>
     49   1.1       cgd #include <sys/buf.h>
     50  1.12   mycroft #include <sys/time.h>
     51   1.1       cgd #include <sys/proc.h>
     52   1.1       cgd #include <sys/user.h>
     53   1.1       cgd #include <sys/ioctl.h>
     54  1.25  christos #include <sys/conf.h>
     55  1.51     enami #include <sys/vnode.h>
     56  1.11   deraadt 
     57   1.1       cgd #include <sys/file.h>
     58   1.1       cgd #include <sys/tty.h>
     59   1.1       cgd #include <sys/uio.h>
     60  1.11   deraadt 
     61   1.1       cgd #include <sys/protosw.h>
     62   1.1       cgd #include <sys/socket.h>
     63  1.30   mycroft #include <sys/errno.h>
     64  1.30   mycroft #include <sys/kernel.h>
     65  1.30   mycroft #include <sys/poll.h>
     66  1.89  jonathan #include <sys/sysctl.h>
     67  1.30   mycroft 
     68  1.11   deraadt #include <net/if.h>
     69   1.8   mycroft 
     70   1.1       cgd #include <net/bpf.h>
     71   1.1       cgd #include <net/bpfdesc.h>
     72   1.1       cgd 
     73  1.35    scottr #include <net/if_arc.h>
     74  1.34        is #include <net/if_ether.h>
     75  1.34        is 
     76  1.12   mycroft #include <netinet/in.h>
     77  1.34        is #include <netinet/if_inarp.h>
     78  1.65  wrstuden 
     79  1.65  wrstuden #if defined(_KERNEL_OPT)
     80  1.84  wrstuden #include "opt_bpf.h"
     81  1.65  wrstuden #endif
     82  1.11   deraadt 
     83  1.55  jonathan #ifndef BPF_BUFSIZE
     84  1.87  jonathan /*
     85  1.87  jonathan  * 4096 is too small for FDDI frames. 8192 is too small for gigabit Ethernet
     86  1.87  jonathan  * jumbos (circa 9k), ATM, or Intel gig/10gig ethernet jumbos (16k).
     87  1.87  jonathan  */
     88  1.87  jonathan # define BPF_BUFSIZE 32768
     89  1.55  jonathan #endif
     90   1.1       cgd 
     91  1.12   mycroft #define PRINET  26			/* interruptible */
     92   1.2       cgd 
     93   1.1       cgd /*
     94  1.89  jonathan  * The default read buffer size, and limit for BIOCSBLEN, is sysctl'able.
     95  1.89  jonathan  * XXX the default values should be computed dynamically based
     96  1.89  jonathan  * on available memory size and available mbuf clusters.
     97   1.1       cgd  */
     98   1.2       cgd int bpf_bufsize = BPF_BUFSIZE;
     99  1.89  jonathan int bpf_maxbufsize = BPF_DFLTBUFSIZE;	/* XXX set dynamically, see above */
    100   1.1       cgd 
    101   1.1       cgd /*
    102   1.1       cgd  *  bpf_iflist is the list of interfaces; each corresponds to an ifnet
    103   1.1       cgd  *  bpf_dtab holds the descriptors, indexed by minor device #
    104   1.1       cgd  */
    105  1.12   mycroft struct bpf_if	*bpf_iflist;
    106   1.2       cgd struct bpf_d	bpf_dtab[NBPFILTER];
    107   1.1       cgd 
    108  1.12   mycroft static int	bpf_allocbufs __P((struct bpf_d *));
    109  1.12   mycroft static void	bpf_freed __P((struct bpf_d *));
    110  1.12   mycroft static void	bpf_ifname __P((struct ifnet *, struct ifreq *));
    111  1.43     perry static void	*bpf_mcpy __P((void *, const void *, size_t));
    112  1.36  christos static int	bpf_movein __P((struct uio *, int, int,
    113  1.24  christos 			        struct mbuf **, struct sockaddr *));
    114  1.24  christos static void	bpf_attachd __P((struct bpf_d *, struct bpf_if *));
    115  1.24  christos static void	bpf_detachd __P((struct bpf_d *));
    116  1.12   mycroft static int	bpf_setif __P((struct bpf_d *, struct ifreq *));
    117  1.91   darrenr static void	bpf_timed_out __P((void *));
    118  1.15       cgd static __inline void
    119  1.12   mycroft 		bpf_wakeup __P((struct bpf_d *));
    120  1.36  christos static void	catchpacket __P((struct bpf_d *, u_char *, u_int, u_int,
    121  1.43     perry 				 void *(*)(void *, const void *, size_t)));
    122  1.12   mycroft static void	reset_d __P((struct bpf_d *));
    123  1.66      onoe static int	bpf_getdltlist __P((struct bpf_d *, struct bpf_dltlist *));
    124  1.66      onoe static int	bpf_setdlt __P((struct bpf_d *, u_int));
    125  1.12   mycroft 
    126  1.67   gehenna dev_type_open(bpfopen);
    127  1.67   gehenna dev_type_close(bpfclose);
    128  1.67   gehenna dev_type_read(bpfread);
    129  1.67   gehenna dev_type_write(bpfwrite);
    130  1.67   gehenna dev_type_ioctl(bpfioctl);
    131  1.67   gehenna dev_type_poll(bpfpoll);
    132  1.75  jdolecek dev_type_kqfilter(bpfkqfilter);
    133  1.67   gehenna 
    134  1.67   gehenna const struct cdevsw bpf_cdevsw = {
    135  1.67   gehenna 	bpfopen, bpfclose, bpfread, bpfwrite, bpfioctl,
    136  1.75  jdolecek 	nostop, notty, bpfpoll, nommap, bpfkqfilter,
    137  1.67   gehenna };
    138  1.67   gehenna 
    139  1.12   mycroft static int
    140  1.36  christos bpf_movein(uio, linktype, mtu, mp, sockp)
    141  1.53  augustss 	struct uio *uio;
    142  1.20   mycroft 	int linktype;
    143  1.36  christos 	int mtu;
    144  1.53  augustss 	struct mbuf **mp;
    145  1.53  augustss 	struct sockaddr *sockp;
    146  1.12   mycroft {
    147  1.12   mycroft 	struct mbuf *m;
    148  1.12   mycroft 	int error;
    149  1.12   mycroft 	int len;
    150  1.12   mycroft 	int hlen;
    151  1.36  christos 	int align;
    152  1.12   mycroft 
    153  1.12   mycroft 	/*
    154  1.12   mycroft 	 * Build a sockaddr based on the data link layer type.
    155  1.12   mycroft 	 * We do this at this level because the ethernet header
    156  1.12   mycroft 	 * is copied directly into the data field of the sockaddr.
    157  1.12   mycroft 	 * In the case of SLIP, there is no header and the packet
    158  1.12   mycroft 	 * is forwarded as is.
    159  1.12   mycroft 	 * Also, we are careful to leave room at the front of the mbuf
    160  1.12   mycroft 	 * for the link level header.
    161  1.12   mycroft 	 */
    162  1.12   mycroft 	switch (linktype) {
    163  1.12   mycroft 
    164  1.12   mycroft 	case DLT_SLIP:
    165  1.12   mycroft 		sockp->sa_family = AF_INET;
    166  1.12   mycroft 		hlen = 0;
    167  1.36  christos 		align = 0;
    168  1.12   mycroft 		break;
    169  1.12   mycroft 
    170  1.12   mycroft 	case DLT_PPP:
    171  1.12   mycroft 		sockp->sa_family = AF_UNSPEC;
    172  1.12   mycroft 		hlen = 0;
    173  1.36  christos 		align = 0;
    174  1.12   mycroft 		break;
    175  1.12   mycroft 
    176  1.12   mycroft 	case DLT_EN10MB:
    177  1.12   mycroft 		sockp->sa_family = AF_UNSPEC;
    178  1.12   mycroft 		/* XXX Would MAXLINKHDR be better? */
    179  1.36  christos  		/* 6(dst)+6(src)+2(type) */
    180  1.12   mycroft 		hlen = sizeof(struct ether_header);
    181  1.36  christos 		align = 2;
    182  1.17     glass 		break;
    183  1.17     glass 
    184  1.17     glass 	case DLT_ARCNET:
    185  1.17     glass 		sockp->sa_family = AF_UNSPEC;
    186  1.17     glass 		hlen = ARC_HDRLEN;
    187  1.36  christos 		align = 5;
    188  1.12   mycroft 		break;
    189  1.12   mycroft 
    190  1.12   mycroft 	case DLT_FDDI:
    191  1.56      matt 		sockp->sa_family = AF_LINK;
    192  1.56      matt 		/* XXX 4(FORMAC)+6(dst)+6(src) */
    193  1.56      matt 		hlen = 16;
    194  1.36  christos 		align = 0;
    195  1.62     bjh21 		break;
    196  1.62     bjh21 
    197  1.62     bjh21 	case DLT_ECONET:
    198  1.62     bjh21 		sockp->sa_family = AF_UNSPEC;
    199  1.62     bjh21 		hlen = 6;
    200  1.62     bjh21 		align = 2;
    201  1.12   mycroft 		break;
    202  1.12   mycroft 
    203  1.12   mycroft 	case DLT_NULL:
    204  1.12   mycroft 		sockp->sa_family = AF_UNSPEC;
    205  1.12   mycroft 		hlen = 0;
    206  1.36  christos 		align = 0;
    207  1.12   mycroft 		break;
    208  1.12   mycroft 
    209  1.12   mycroft 	default:
    210  1.12   mycroft 		return (EIO);
    211  1.12   mycroft 	}
    212  1.12   mycroft 
    213  1.12   mycroft 	len = uio->uio_resid;
    214  1.36  christos 	/*
    215  1.36  christos 	 * If there aren't enough bytes for a link level header or the
    216  1.36  christos 	 * packet length exceeds the interface mtu, return an error.
    217  1.36  christos 	 */
    218  1.36  christos 	if (len < hlen || len - hlen > mtu)
    219  1.36  christos 		return (EMSGSIZE);
    220  1.36  christos 
    221  1.36  christos 	/*
    222  1.36  christos 	 * XXX Avoid complicated buffer chaining ---
    223  1.36  christos 	 * bail if it won't fit in a single mbuf.
    224  1.36  christos 	 * (Take into account possible alignment bytes)
    225  1.36  christos 	 */
    226  1.36  christos 	if ((unsigned)len > MCLBYTES - align)
    227  1.12   mycroft 		return (EIO);
    228  1.12   mycroft 
    229  1.77      matt 	m = m_gethdr(M_WAIT, MT_DATA);
    230  1.20   mycroft 	m->m_pkthdr.rcvif = 0;
    231  1.20   mycroft 	m->m_pkthdr.len = len - hlen;
    232  1.36  christos 	if (len > MHLEN - align) {
    233  1.77      matt 		m_clget(m, M_WAIT);
    234  1.12   mycroft 		if ((m->m_flags & M_EXT) == 0) {
    235  1.12   mycroft 			error = ENOBUFS;
    236  1.12   mycroft 			goto bad;
    237  1.12   mycroft 		}
    238  1.12   mycroft 	}
    239  1.36  christos 
    240  1.36  christos 	/* Insure the data is properly aligned */
    241  1.36  christos 	if (align > 0) {
    242  1.36  christos 		m->m_data += align;
    243  1.36  christos 		m->m_len -= align;
    244  1.36  christos 	}
    245  1.36  christos 
    246  1.54       chs 	error = uiomove(mtod(m, caddr_t), len, uio);
    247  1.36  christos 	if (error)
    248  1.36  christos 		goto bad;
    249  1.12   mycroft 	if (hlen != 0) {
    250  1.41     perry 		memcpy(sockp->sa_data, mtod(m, caddr_t), hlen);
    251  1.12   mycroft 		m->m_data += hlen; /* XXX */
    252  1.36  christos 		len -= hlen;
    253  1.12   mycroft 	}
    254  1.36  christos 	m->m_len = len;
    255  1.36  christos 	*mp = m;
    256  1.38   mycroft 	return (0);
    257  1.38   mycroft 
    258  1.38   mycroft bad:
    259  1.12   mycroft 	m_freem(m);
    260  1.12   mycroft 	return (error);
    261  1.12   mycroft }
    262   1.1       cgd 
    263   1.1       cgd /*
    264   1.2       cgd  * Attach file to the bpf interface, i.e. make d listen on bp.
    265  1.61   thorpej  * Must be called at splnet.
    266   1.1       cgd  */
    267   1.1       cgd static void
    268   1.1       cgd bpf_attachd(d, bp)
    269   1.1       cgd 	struct bpf_d *d;
    270   1.1       cgd 	struct bpf_if *bp;
    271   1.1       cgd {
    272   1.2       cgd 	/*
    273   1.2       cgd 	 * Point d at bp, and add d to the interface's list of listeners.
    274   1.2       cgd 	 * Finally, point the driver's bpf cookie at the interface so
    275   1.2       cgd 	 * it will divert packets to bpf.
    276   1.2       cgd 	 */
    277   1.1       cgd 	d->bd_bif = bp;
    278   1.1       cgd 	d->bd_next = bp->bif_dlist;
    279   1.1       cgd 	bp->bif_dlist = d;
    280   1.1       cgd 
    281   1.1       cgd 	*bp->bif_driverp = bp;
    282   1.1       cgd }
    283   1.1       cgd 
    284   1.2       cgd /*
    285   1.2       cgd  * Detach a file from its interface.
    286   1.2       cgd  */
    287   1.1       cgd static void
    288   1.1       cgd bpf_detachd(d)
    289   1.1       cgd 	struct bpf_d *d;
    290   1.1       cgd {
    291   1.1       cgd 	struct bpf_d **p;
    292   1.1       cgd 	struct bpf_if *bp;
    293   1.1       cgd 
    294   1.1       cgd 	bp = d->bd_bif;
    295   1.1       cgd 	/*
    296   1.1       cgd 	 * Check if this descriptor had requested promiscuous mode.
    297   1.1       cgd 	 * If so, turn it off.
    298   1.1       cgd 	 */
    299   1.1       cgd 	if (d->bd_promisc) {
    300  1.18   mycroft 		int error;
    301  1.18   mycroft 
    302   1.1       cgd 		d->bd_promisc = 0;
    303  1.36  christos 		/*
    304  1.36  christos 		 * Take device out of promiscuous mode.  Since we were
    305  1.36  christos 		 * able to enter promiscuous mode, we should be able
    306  1.36  christos 		 * to turn it off.  But we can get an error if
    307  1.36  christos 		 * the interface was configured down, so only panic
    308  1.36  christos 		 * if we don't get an unexpected error.
    309  1.36  christos 		 */
    310  1.36  christos   		error = ifpromisc(bp->bif_ifp, 0);
    311  1.18   mycroft 		if (error && error != EINVAL)
    312   1.2       cgd 			panic("bpf: ifpromisc failed");
    313   1.1       cgd 	}
    314   1.2       cgd 	/* Remove d from the interface's descriptor list. */
    315   1.1       cgd 	p = &bp->bif_dlist;
    316   1.1       cgd 	while (*p != d) {
    317   1.1       cgd 		p = &(*p)->bd_next;
    318   1.1       cgd 		if (*p == 0)
    319   1.1       cgd 			panic("bpf_detachd: descriptor not in list");
    320   1.1       cgd 	}
    321   1.1       cgd 	*p = (*p)->bd_next;
    322   1.1       cgd 	if (bp->bif_dlist == 0)
    323   1.1       cgd 		/*
    324   1.1       cgd 		 * Let the driver know that there are no more listeners.
    325   1.1       cgd 		 */
    326   1.1       cgd 		*d->bd_bif->bif_driverp = 0;
    327   1.1       cgd 	d->bd_bif = 0;
    328   1.1       cgd }
    329   1.1       cgd 
    330   1.1       cgd 
    331   1.1       cgd /*
    332  1.12   mycroft  * Mark a descriptor free by making it point to itself.
    333   1.1       cgd  * This is probably cheaper than marking with a constant since
    334   1.1       cgd  * the address should be in a register anyway.
    335   1.1       cgd  */
    336   1.1       cgd #define D_ISFREE(d) ((d) == (d)->bd_next)
    337   1.1       cgd #define D_MARKFREE(d) ((d)->bd_next = (d))
    338   1.1       cgd #define D_MARKUSED(d) ((d)->bd_next = 0)
    339   1.1       cgd 
    340   1.1       cgd /*
    341  1.46    bouyer  * bpfilterattach() is called at boot time.
    342  1.46    bouyer  */
    343  1.46    bouyer /* ARGSUSED */
    344  1.46    bouyer void
    345  1.46    bouyer bpfilterattach(n)
    346  1.46    bouyer 	int n;
    347  1.46    bouyer {
    348  1.46    bouyer 	int i;
    349  1.46    bouyer 	/*
    350  1.46    bouyer 	 * Mark all the descriptors free.
    351  1.46    bouyer 	 */
    352  1.46    bouyer 	for (i = 0; i < NBPFILTER; ++i)
    353  1.46    bouyer 		D_MARKFREE(&bpf_dtab[i]);
    354  1.46    bouyer 
    355  1.46    bouyer }
    356  1.46    bouyer 
    357  1.46    bouyer /*
    358   1.2       cgd  * Open ethernet device.  Returns ENXIO for illegal minor device number,
    359   1.2       cgd  * EBUSY if file is open by another process.
    360   1.1       cgd  */
    361   1.1       cgd /* ARGSUSED */
    362   1.1       cgd int
    363  1.82      fvdl bpfopen(dev, flag, mode, p)
    364   1.1       cgd 	dev_t dev;
    365   1.1       cgd 	int flag;
    366  1.24  christos 	int mode;
    367  1.82      fvdl 	struct proc *p;
    368   1.1       cgd {
    369  1.53  augustss 	struct bpf_d *d;
    370  1.12   mycroft 
    371   1.1       cgd 	if (minor(dev) >= NBPFILTER)
    372   1.1       cgd 		return (ENXIO);
    373   1.1       cgd 	/*
    374   1.1       cgd 	 * Each minor can be opened by only one process.  If the requested
    375   1.1       cgd 	 * minor is in use, return EBUSY.
    376   1.1       cgd 	 */
    377   1.1       cgd 	d = &bpf_dtab[minor(dev)];
    378   1.2       cgd 	if (!D_ISFREE(d))
    379   1.1       cgd 		return (EBUSY);
    380   1.2       cgd 
    381   1.2       cgd 	/* Mark "free" and do most initialization. */
    382  1.41     perry 	memset((char *)d, 0, sizeof(*d));
    383   1.2       cgd 	d->bd_bufsize = bpf_bufsize;
    384  1.91   darrenr 	d->bd_seesent = 1;
    385  1.91   darrenr 	callout_init(&d->bd_callout);
    386   1.1       cgd 
    387   1.1       cgd 	return (0);
    388   1.1       cgd }
    389   1.1       cgd 
    390   1.1       cgd /*
    391   1.1       cgd  * Close the descriptor by detaching it from its interface,
    392   1.1       cgd  * deallocating its buffers, and marking it free.
    393   1.1       cgd  */
    394   1.1       cgd /* ARGSUSED */
    395   1.2       cgd int
    396  1.82      fvdl bpfclose(dev, flag, mode, p)
    397   1.1       cgd 	dev_t dev;
    398   1.1       cgd 	int flag;
    399  1.24  christos 	int mode;
    400  1.82      fvdl 	struct proc *p;
    401   1.1       cgd {
    402  1.53  augustss 	struct bpf_d *d = &bpf_dtab[minor(dev)];
    403  1.53  augustss 	int s;
    404   1.1       cgd 
    405  1.61   thorpej 	s = splnet();
    406  1.91   darrenr 	if (d->bd_state == BPF_WAITING)
    407  1.91   darrenr 		callout_stop(&d->bd_callout);
    408  1.91   darrenr 	d->bd_state = BPF_IDLE;
    409   1.1       cgd 	if (d->bd_bif)
    410   1.1       cgd 		bpf_detachd(d);
    411   1.1       cgd 	splx(s);
    412   1.2       cgd 	bpf_freed(d);
    413   1.2       cgd 
    414   1.2       cgd 	return (0);
    415   1.2       cgd }
    416   1.2       cgd 
    417   1.2       cgd /*
    418   1.1       cgd  * Rotate the packet buffers in descriptor d.  Move the store buffer
    419  1.12   mycroft  * into the hold slot, and the free buffer into the store slot.
    420   1.1       cgd  * Zero the length of the new store buffer.
    421   1.1       cgd  */
    422   1.1       cgd #define ROTATE_BUFFERS(d) \
    423   1.1       cgd 	(d)->bd_hbuf = (d)->bd_sbuf; \
    424   1.1       cgd 	(d)->bd_hlen = (d)->bd_slen; \
    425   1.1       cgd 	(d)->bd_sbuf = (d)->bd_fbuf; \
    426   1.1       cgd 	(d)->bd_slen = 0; \
    427  1.12   mycroft 	(d)->bd_fbuf = 0;
    428   1.1       cgd /*
    429   1.1       cgd  *  bpfread - read next chunk of packets from buffers
    430   1.1       cgd  */
    431   1.1       cgd int
    432  1.24  christos bpfread(dev, uio, ioflag)
    433   1.1       cgd 	dev_t dev;
    434  1.53  augustss 	struct uio *uio;
    435  1.24  christos 	int ioflag;
    436   1.1       cgd {
    437  1.53  augustss 	struct bpf_d *d = &bpf_dtab[minor(dev)];
    438  1.91   darrenr 	int timed_out;
    439   1.1       cgd 	int error;
    440   1.1       cgd 	int s;
    441   1.1       cgd 
    442   1.1       cgd 	/*
    443  1.12   mycroft 	 * Restrict application to use a buffer the same size as
    444   1.1       cgd 	 * as kernel buffers.
    445   1.1       cgd 	 */
    446   1.1       cgd 	if (uio->uio_resid != d->bd_bufsize)
    447   1.1       cgd 		return (EINVAL);
    448   1.1       cgd 
    449  1.61   thorpej 	s = splnet();
    450  1.91   darrenr 	if (d->bd_state == BPF_WAITING)
    451  1.91   darrenr 		callout_stop(&d->bd_callout);
    452  1.91   darrenr 	timed_out = (d->bd_state == BPF_TIMED_OUT);
    453  1.91   darrenr 	d->bd_state = BPF_IDLE;
    454   1.1       cgd 	/*
    455   1.2       cgd 	 * If the hold buffer is empty, then do a timed sleep, which
    456   1.2       cgd 	 * ends when the timeout expires or when enough packets
    457   1.2       cgd 	 * have arrived to fill the store buffer.
    458   1.1       cgd 	 */
    459   1.1       cgd 	while (d->bd_hbuf == 0) {
    460  1.91   darrenr 		if ((d->bd_immediate || timed_out) && d->bd_slen != 0) {
    461   1.1       cgd 			/*
    462   1.1       cgd 			 * A packet(s) either arrived since the previous
    463   1.1       cgd 			 * read or arrived while we were asleep.
    464   1.1       cgd 			 * Rotate the buffers and return what's here.
    465   1.1       cgd 			 */
    466   1.1       cgd 			ROTATE_BUFFERS(d);
    467   1.1       cgd 			break;
    468   1.1       cgd 		}
    469  1.23   thorpej 		if (d->bd_rtout != -1)
    470  1.54       chs 			error = tsleep((caddr_t)d, PRINET|PCATCH, "bpf",
    471  1.23   thorpej 					  d->bd_rtout);
    472  1.60   thorpej 		else {
    473  1.91   darrenr 			/* User requested non-blocking I/O */
    474  1.91   darrenr 			error = EWOULDBLOCK;
    475  1.60   thorpej 		}
    476  1.12   mycroft 		if (error == EINTR || error == ERESTART) {
    477  1.12   mycroft 			splx(s);
    478  1.12   mycroft 			return (error);
    479  1.12   mycroft 		}
    480  1.12   mycroft 		if (error == EWOULDBLOCK) {
    481  1.12   mycroft 			/*
    482  1.12   mycroft 			 * On a timeout, return what's in the buffer,
    483  1.12   mycroft 			 * which may be nothing.  If there is something
    484  1.12   mycroft 			 * in the store buffer, we can rotate the buffers.
    485  1.12   mycroft 			 */
    486  1.12   mycroft 			if (d->bd_hbuf)
    487   1.1       cgd 				/*
    488  1.12   mycroft 				 * We filled up the buffer in between
    489  1.12   mycroft 				 * getting the timeout and arriving
    490  1.12   mycroft 				 * here, so we don't need to rotate.
    491   1.1       cgd 				 */
    492   1.1       cgd 				break;
    493  1.12   mycroft 
    494  1.12   mycroft 			if (d->bd_slen == 0) {
    495  1.12   mycroft 				splx(s);
    496  1.12   mycroft 				return (0);
    497   1.1       cgd 			}
    498  1.12   mycroft 			ROTATE_BUFFERS(d);
    499  1.12   mycroft 			break;
    500   1.1       cgd 		}
    501  1.36  christos 		if (error != 0)
    502  1.36  christos 			goto done;
    503   1.1       cgd 	}
    504   1.1       cgd 	/*
    505   1.1       cgd 	 * At this point, we know we have something in the hold slot.
    506   1.1       cgd 	 */
    507   1.1       cgd 	splx(s);
    508  1.12   mycroft 
    509  1.12   mycroft 	/*
    510   1.1       cgd 	 * Move data from hold buffer into user space.
    511   1.1       cgd 	 * We know the entire buffer is transferred since
    512   1.1       cgd 	 * we checked above that the read buffer is bpf_bufsize bytes.
    513   1.1       cgd 	 */
    514  1.54       chs 	error = uiomove(d->bd_hbuf, d->bd_hlen, uio);
    515   1.1       cgd 
    516  1.61   thorpej 	s = splnet();
    517   1.1       cgd 	d->bd_fbuf = d->bd_hbuf;
    518   1.1       cgd 	d->bd_hbuf = 0;
    519   1.2       cgd 	d->bd_hlen = 0;
    520  1.36  christos done:
    521   1.1       cgd 	splx(s);
    522   1.1       cgd 	return (error);
    523   1.1       cgd }
    524   1.1       cgd 
    525   1.1       cgd 
    526   1.1       cgd /*
    527  1.12   mycroft  * If there are processes sleeping on this descriptor, wake them up.
    528   1.1       cgd  */
    529  1.15       cgd static __inline void
    530   1.1       cgd bpf_wakeup(d)
    531  1.53  augustss 	struct bpf_d *d;
    532   1.1       cgd {
    533   1.1       cgd 	wakeup((caddr_t)d);
    534  1.85  jdolecek 	if (d->bd_async)
    535  1.86  christos 		fownsignal(d->bd_pgid, SIGIO, 0, 0, NULL);
    536  1.23   thorpej 
    537  1.75  jdolecek 	selnotify(&d->bd_sel, 0);
    538   1.2       cgd 	/* XXX */
    539  1.76  christos 	d->bd_sel.sel_pid = 0;
    540   1.1       cgd }
    541   1.1       cgd 
    542  1.91   darrenr 
    543  1.91   darrenr static void
    544  1.91   darrenr bpf_timed_out(arg)
    545  1.91   darrenr 	void *arg;
    546  1.91   darrenr {
    547  1.91   darrenr 	struct bpf_d *d = (struct bpf_d *)arg;
    548  1.91   darrenr 	int s;
    549  1.91   darrenr 
    550  1.91   darrenr 	s = splnet();
    551  1.91   darrenr 	if (d->bd_state == BPF_WAITING) {
    552  1.91   darrenr 		d->bd_state = BPF_TIMED_OUT;
    553  1.91   darrenr 		if (d->bd_slen != 0)
    554  1.91   darrenr 			bpf_wakeup(d);
    555  1.91   darrenr 	}
    556  1.91   darrenr 	splx(s);
    557  1.91   darrenr }
    558  1.91   darrenr 
    559  1.91   darrenr 
    560   1.1       cgd int
    561  1.24  christos bpfwrite(dev, uio, ioflag)
    562   1.1       cgd 	dev_t dev;
    563   1.1       cgd 	struct uio *uio;
    564  1.24  christos 	int ioflag;
    565   1.1       cgd {
    566  1.53  augustss 	struct bpf_d *d = &bpf_dtab[minor(dev)];
    567  1.12   mycroft 	struct ifnet *ifp;
    568  1.12   mycroft 	struct mbuf *m;
    569  1.12   mycroft 	int error, s;
    570  1.56      matt 	static struct sockaddr_storage dst;
    571   1.1       cgd 
    572  1.12   mycroft 	if (d->bd_bif == 0)
    573   1.1       cgd 		return (ENXIO);
    574   1.1       cgd 
    575  1.12   mycroft 	ifp = d->bd_bif->bif_ifp;
    576  1.11   deraadt 
    577  1.12   mycroft 	if (uio->uio_resid == 0)
    578  1.12   mycroft 		return (0);
    579  1.11   deraadt 
    580  1.56      matt 	error = bpf_movein(uio, (int)d->bd_bif->bif_dlt, ifp->if_mtu, &m,
    581  1.56      matt 		(struct sockaddr *) &dst);
    582  1.12   mycroft 	if (error)
    583  1.12   mycroft 		return (error);
    584  1.11   deraadt 
    585  1.20   mycroft 	if (m->m_pkthdr.len > ifp->if_mtu)
    586   1.1       cgd 		return (EMSGSIZE);
    587   1.1       cgd 
    588  1.40   thorpej 	if (d->bd_hdrcmplt)
    589  1.56      matt 		dst.ss_family = pseudo_AF_HDRCMPLT;
    590  1.40   thorpej 
    591  1.21   mycroft 	s = splsoftnet();
    592  1.56      matt 	error = (*ifp->if_output)(ifp, m, (struct sockaddr *) &dst, NULL);
    593   1.1       cgd 	splx(s);
    594   1.1       cgd 	/*
    595  1.12   mycroft 	 * The driver frees the mbuf.
    596   1.1       cgd 	 */
    597   1.1       cgd 	return (error);
    598   1.1       cgd }
    599   1.1       cgd 
    600   1.1       cgd /*
    601   1.2       cgd  * Reset a descriptor by flushing its packet buffer and clearing the
    602  1.61   thorpej  * receive and drop counts.  Should be called at splnet.
    603   1.1       cgd  */
    604   1.1       cgd static void
    605   1.1       cgd reset_d(d)
    606   1.1       cgd 	struct bpf_d *d;
    607   1.1       cgd {
    608   1.1       cgd 	if (d->bd_hbuf) {
    609   1.1       cgd 		/* Free the hold buffer. */
    610   1.1       cgd 		d->bd_fbuf = d->bd_hbuf;
    611   1.1       cgd 		d->bd_hbuf = 0;
    612   1.1       cgd 	}
    613   1.1       cgd 	d->bd_slen = 0;
    614   1.2       cgd 	d->bd_hlen = 0;
    615   1.1       cgd 	d->bd_rcount = 0;
    616   1.1       cgd 	d->bd_dcount = 0;
    617   1.1       cgd }
    618   1.1       cgd 
    619  1.36  christos #ifdef BPF_KERN_FILTER
    620  1.36  christos extern struct bpf_insn *bpf_tcp_filter;
    621  1.36  christos extern struct bpf_insn *bpf_udp_filter;
    622  1.36  christos #endif
    623  1.36  christos 
    624   1.1       cgd /*
    625   1.1       cgd  *  FIONREAD		Check for read packet available.
    626   1.1       cgd  *  BIOCGBLEN		Get buffer len [for read()].
    627   1.1       cgd  *  BIOCSETF		Set ethernet read filter.
    628   1.1       cgd  *  BIOCFLUSH		Flush read packet buffer.
    629   1.1       cgd  *  BIOCPROMISC		Put interface into promiscuous mode.
    630   1.1       cgd  *  BIOCGDLT		Get link layer type.
    631   1.1       cgd  *  BIOCGETIF		Get interface name.
    632   1.1       cgd  *  BIOCSETIF		Set interface.
    633   1.1       cgd  *  BIOCSRTIMEOUT	Set read timeout.
    634   1.1       cgd  *  BIOCGRTIMEOUT	Get read timeout.
    635   1.1       cgd  *  BIOCGSTATS		Get packet stats.
    636   1.1       cgd  *  BIOCIMMEDIATE	Set immediate mode.
    637   1.2       cgd  *  BIOCVERSION		Get filter language version.
    638  1.40   thorpej  *  BIOGHDRCMPLT	Get "header already complete" flag.
    639  1.40   thorpej  *  BIOSHDRCMPLT	Set "header already complete" flag.
    640   1.1       cgd  */
    641   1.1       cgd /* ARGSUSED */
    642   1.1       cgd int
    643  1.82      fvdl bpfioctl(dev, cmd, addr, flag, p)
    644   1.1       cgd 	dev_t dev;
    645  1.16       cgd 	u_long cmd;
    646   1.1       cgd 	caddr_t addr;
    647   1.1       cgd 	int flag;
    648  1.82      fvdl 	struct proc *p;
    649   1.1       cgd {
    650  1.53  augustss 	struct bpf_d *d = &bpf_dtab[minor(dev)];
    651   1.1       cgd 	int s, error = 0;
    652  1.36  christos #ifdef BPF_KERN_FILTER
    653  1.53  augustss 	struct bpf_insn **p;
    654  1.36  christos #endif
    655   1.1       cgd 
    656  1.91   darrenr 	s = splnet();
    657  1.91   darrenr 	if (d->bd_state == BPF_WAITING)
    658  1.91   darrenr 		callout_stop(&d->bd_callout);
    659  1.91   darrenr 	d->bd_state = BPF_IDLE;
    660  1.91   darrenr 	splx(s);
    661  1.91   darrenr 
    662   1.1       cgd 	switch (cmd) {
    663   1.1       cgd 
    664   1.1       cgd 	default:
    665   1.1       cgd 		error = EINVAL;
    666   1.1       cgd 		break;
    667   1.1       cgd 
    668   1.1       cgd 	/*
    669   1.1       cgd 	 * Check for read packet available.
    670   1.1       cgd 	 */
    671   1.1       cgd 	case FIONREAD:
    672   1.1       cgd 		{
    673   1.1       cgd 			int n;
    674  1.12   mycroft 
    675  1.61   thorpej 			s = splnet();
    676   1.1       cgd 			n = d->bd_slen;
    677  1.12   mycroft 			if (d->bd_hbuf)
    678   1.1       cgd 				n += d->bd_hlen;
    679   1.1       cgd 			splx(s);
    680   1.1       cgd 
    681   1.1       cgd 			*(int *)addr = n;
    682   1.1       cgd 			break;
    683   1.1       cgd 		}
    684   1.1       cgd 
    685   1.1       cgd 	/*
    686   1.2       cgd 	 * Get buffer len [for read()].
    687   1.1       cgd 	 */
    688   1.2       cgd 	case BIOCGBLEN:
    689   1.2       cgd 		*(u_int *)addr = d->bd_bufsize;
    690   1.1       cgd 		break;
    691   1.2       cgd 
    692   1.1       cgd 	/*
    693   1.2       cgd 	 * Set buffer length.
    694   1.1       cgd 	 */
    695   1.2       cgd 	case BIOCSBLEN:
    696   1.2       cgd 		if (d->bd_bif != 0)
    697   1.2       cgd 			error = EINVAL;
    698   1.2       cgd 		else {
    699  1.53  augustss 			u_int size = *(u_int *)addr;
    700   1.2       cgd 
    701  1.87  jonathan 			if (size > bpf_maxbufsize)
    702  1.87  jonathan 				*(u_int *)addr = size = bpf_maxbufsize;
    703   1.2       cgd 			else if (size < BPF_MINBUFSIZE)
    704   1.2       cgd 				*(u_int *)addr = size = BPF_MINBUFSIZE;
    705   1.2       cgd 			d->bd_bufsize = size;
    706   1.2       cgd 		}
    707   1.1       cgd 		break;
    708   1.1       cgd 
    709   1.1       cgd 	/*
    710   1.2       cgd 	 * Set link layer read filter.
    711   1.1       cgd 	 */
    712  1.12   mycroft 	case BIOCSETF:
    713   1.1       cgd 		error = bpf_setf(d, (struct bpf_program *)addr);
    714   1.1       cgd 		break;
    715   1.1       cgd 
    716  1.36  christos #ifdef BPF_KERN_FILTER
    717  1.36  christos 	/*
    718  1.36  christos 	 * Set TCP or UDP reject filter.
    719  1.36  christos 	 */
    720  1.36  christos 	case BIOCSTCPF:
    721  1.36  christos 	case BIOCSUDPF:
    722  1.36  christos 		if (!suser()) {
    723  1.36  christos 			error = EPERM;
    724  1.36  christos 			break;
    725  1.36  christos 		}
    726  1.36  christos 
    727  1.36  christos 		/* Validate and store filter */
    728  1.36  christos 		error = bpf_setf(d, (struct bpf_program *)addr);
    729  1.36  christos 
    730  1.36  christos 		/* Free possible old filter */
    731  1.36  christos 		if (cmd == BIOCSTCPF)
    732  1.36  christos 			p = &bpf_tcp_filter;
    733  1.36  christos 		else
    734  1.36  christos 			p = &bpf_udp_filter;
    735  1.36  christos 		if (*p != NULL)
    736  1.36  christos 			free((caddr_t)*p, M_DEVBUF);
    737  1.36  christos 
    738  1.36  christos 		/* Steal new filter (noop if error) */
    739  1.61   thorpej 		s = splnet();
    740  1.36  christos 		*p = d->bd_filter;
    741  1.36  christos 		d->bd_filter = NULL;
    742  1.36  christos 		splx(s);
    743  1.36  christos 		break;
    744  1.36  christos #endif
    745  1.36  christos 
    746   1.1       cgd 	/*
    747   1.1       cgd 	 * Flush read packet buffer.
    748   1.1       cgd 	 */
    749   1.1       cgd 	case BIOCFLUSH:
    750  1.61   thorpej 		s = splnet();
    751   1.1       cgd 		reset_d(d);
    752   1.1       cgd 		splx(s);
    753   1.1       cgd 		break;
    754   1.1       cgd 
    755   1.1       cgd 	/*
    756   1.1       cgd 	 * Put interface into promiscuous mode.
    757   1.1       cgd 	 */
    758   1.1       cgd 	case BIOCPROMISC:
    759   1.1       cgd 		if (d->bd_bif == 0) {
    760   1.1       cgd 			/*
    761   1.1       cgd 			 * No interface attached yet.
    762   1.1       cgd 			 */
    763   1.1       cgd 			error = EINVAL;
    764   1.1       cgd 			break;
    765   1.1       cgd 		}
    766  1.61   thorpej 		s = splnet();
    767   1.1       cgd 		if (d->bd_promisc == 0) {
    768   1.1       cgd 			error = ifpromisc(d->bd_bif->bif_ifp, 1);
    769   1.2       cgd 			if (error == 0)
    770   1.2       cgd 				d->bd_promisc = 1;
    771   1.1       cgd 		}
    772   1.1       cgd 		splx(s);
    773   1.1       cgd 		break;
    774   1.1       cgd 
    775   1.1       cgd 	/*
    776   1.1       cgd 	 * Get device parameters.
    777   1.1       cgd 	 */
    778   1.1       cgd 	case BIOCGDLT:
    779   1.1       cgd 		if (d->bd_bif == 0)
    780   1.1       cgd 			error = EINVAL;
    781   1.1       cgd 		else
    782   1.1       cgd 			*(u_int *)addr = d->bd_bif->bif_dlt;
    783   1.1       cgd 		break;
    784   1.1       cgd 
    785   1.1       cgd 	/*
    786  1.66      onoe 	 * Get a list of supported device parameters.
    787  1.66      onoe 	 */
    788  1.66      onoe 	case BIOCGDLTLIST:
    789  1.66      onoe 		if (d->bd_bif == 0)
    790  1.66      onoe 			error = EINVAL;
    791  1.66      onoe 		else
    792  1.66      onoe 			error = bpf_getdltlist(d, (struct bpf_dltlist *)addr);
    793  1.66      onoe 		break;
    794  1.66      onoe 
    795  1.66      onoe 	/*
    796  1.66      onoe 	 * Set device parameters.
    797  1.66      onoe 	 */
    798  1.66      onoe 	case BIOCSDLT:
    799  1.66      onoe 		if (d->bd_bif == 0)
    800  1.66      onoe 			error = EINVAL;
    801  1.66      onoe 		else
    802  1.66      onoe 			error = bpf_setdlt(d, *(u_int *)addr);
    803  1.66      onoe 		break;
    804  1.66      onoe 
    805  1.66      onoe 	/*
    806   1.1       cgd 	 * Set interface name.
    807   1.1       cgd 	 */
    808   1.1       cgd 	case BIOCGETIF:
    809   1.1       cgd 		if (d->bd_bif == 0)
    810   1.1       cgd 			error = EINVAL;
    811   1.1       cgd 		else
    812   1.1       cgd 			bpf_ifname(d->bd_bif->bif_ifp, (struct ifreq *)addr);
    813   1.1       cgd 		break;
    814   1.1       cgd 
    815   1.1       cgd 	/*
    816   1.1       cgd 	 * Set interface.
    817   1.1       cgd 	 */
    818   1.1       cgd 	case BIOCSETIF:
    819   1.1       cgd 		error = bpf_setif(d, (struct ifreq *)addr);
    820   1.1       cgd 		break;
    821   1.1       cgd 
    822   1.1       cgd 	/*
    823   1.1       cgd 	 * Set read timeout.
    824   1.1       cgd 	 */
    825  1.12   mycroft 	case BIOCSRTIMEOUT:
    826   1.1       cgd 		{
    827   1.1       cgd 			struct timeval *tv = (struct timeval *)addr;
    828   1.1       cgd 
    829  1.19       cgd 			/* Compute number of ticks. */
    830  1.19       cgd 			d->bd_rtout = tv->tv_sec * hz + tv->tv_usec / tick;
    831  1.33   thorpej 			if ((d->bd_rtout == 0) && (tv->tv_usec != 0))
    832  1.33   thorpej 				d->bd_rtout = 1;
    833   1.1       cgd 			break;
    834   1.1       cgd 		}
    835   1.1       cgd 
    836   1.1       cgd 	/*
    837   1.1       cgd 	 * Get read timeout.
    838   1.1       cgd 	 */
    839  1.12   mycroft 	case BIOCGRTIMEOUT:
    840   1.1       cgd 		{
    841   1.1       cgd 			struct timeval *tv = (struct timeval *)addr;
    842   1.1       cgd 
    843  1.19       cgd 			tv->tv_sec = d->bd_rtout / hz;
    844  1.19       cgd 			tv->tv_usec = (d->bd_rtout % hz) * tick;
    845   1.1       cgd 			break;
    846   1.1       cgd 		}
    847   1.1       cgd 
    848   1.1       cgd 	/*
    849   1.1       cgd 	 * Get packet stats.
    850   1.1       cgd 	 */
    851   1.1       cgd 	case BIOCGSTATS:
    852   1.1       cgd 		{
    853   1.1       cgd 			struct bpf_stat *bs = (struct bpf_stat *)addr;
    854   1.1       cgd 
    855   1.1       cgd 			bs->bs_recv = d->bd_rcount;
    856   1.1       cgd 			bs->bs_drop = d->bd_dcount;
    857   1.1       cgd 			break;
    858   1.1       cgd 		}
    859   1.1       cgd 
    860   1.1       cgd 	/*
    861   1.1       cgd 	 * Set immediate mode.
    862   1.1       cgd 	 */
    863   1.1       cgd 	case BIOCIMMEDIATE:
    864   1.1       cgd 		d->bd_immediate = *(u_int *)addr;
    865   1.1       cgd 		break;
    866   1.2       cgd 
    867   1.2       cgd 	case BIOCVERSION:
    868   1.2       cgd 		{
    869   1.2       cgd 			struct bpf_version *bv = (struct bpf_version *)addr;
    870   1.2       cgd 
    871   1.2       cgd 			bv->bv_major = BPF_MAJOR_VERSION;
    872   1.2       cgd 			bv->bv_minor = BPF_MINOR_VERSION;
    873   1.2       cgd 			break;
    874  1.12   mycroft 		}
    875  1.23   thorpej 
    876  1.40   thorpej 	case BIOCGHDRCMPLT:	/* get "header already complete" flag */
    877  1.40   thorpej 		*(u_int *)addr = d->bd_hdrcmplt;
    878  1.40   thorpej 		break;
    879  1.40   thorpej 
    880  1.40   thorpej 	case BIOCSHDRCMPLT:	/* set "header already complete" flag */
    881  1.40   thorpej 		d->bd_hdrcmplt = *(u_int *)addr ? 1 : 0;
    882  1.40   thorpej 		break;
    883  1.23   thorpej 
    884  1.91   darrenr 	/*
    885  1.91   darrenr 	 * Get "see sent packets" flag
    886  1.91   darrenr 	 */
    887  1.91   darrenr 	case BIOCGSEESENT:
    888  1.91   darrenr 		*(u_int *)addr = d->bd_seesent;
    889  1.91   darrenr 		break;
    890  1.91   darrenr 
    891  1.91   darrenr 	/*
    892  1.91   darrenr 	 * Set "see sent" packets flag
    893  1.91   darrenr 	 */
    894  1.91   darrenr 	case BIOCSSEESENT:
    895  1.91   darrenr 		d->bd_seesent = *(u_int *)addr;
    896  1.91   darrenr 		break;
    897  1.91   darrenr 
    898  1.23   thorpej 	case FIONBIO:		/* Non-blocking I/O */
    899  1.23   thorpej 		if (*(int *)addr)
    900  1.23   thorpej 			d->bd_rtout = -1;
    901  1.23   thorpej 		else
    902  1.23   thorpej 			d->bd_rtout = 0;
    903  1.23   thorpej 		break;
    904  1.23   thorpej 
    905  1.23   thorpej 	case FIOASYNC:		/* Send signal on receive packets */
    906  1.23   thorpej 		d->bd_async = *(int *)addr;
    907  1.23   thorpej 		break;
    908  1.23   thorpej 
    909  1.23   thorpej 	case TIOCSPGRP:		/* Process or group to send signals to */
    910  1.85  jdolecek 	case FIOSETOWN:
    911  1.85  jdolecek 		error = fsetown(p, &d->bd_pgid, cmd, addr);
    912  1.23   thorpej 		break;
    913  1.23   thorpej 
    914  1.23   thorpej 	case TIOCGPGRP:
    915  1.85  jdolecek 	case FIOGETOWN:
    916  1.85  jdolecek 		error = fgetown(p, d->bd_pgid, cmd, addr);
    917  1.23   thorpej 		break;
    918   1.1       cgd 	}
    919   1.1       cgd 	return (error);
    920   1.1       cgd }
    921   1.1       cgd 
    922  1.12   mycroft /*
    923   1.2       cgd  * Set d's packet filter program to fp.  If this file already has a filter,
    924   1.1       cgd  * free it and replace it.  Returns EINVAL for bogus requests.
    925   1.1       cgd  */
    926   1.1       cgd int
    927   1.1       cgd bpf_setf(d, fp)
    928   1.1       cgd 	struct bpf_d *d;
    929   1.1       cgd 	struct bpf_program *fp;
    930   1.1       cgd {
    931   1.1       cgd 	struct bpf_insn *fcode, *old;
    932   1.1       cgd 	u_int flen, size;
    933   1.1       cgd 	int s;
    934   1.1       cgd 
    935   1.1       cgd 	old = d->bd_filter;
    936   1.1       cgd 	if (fp->bf_insns == 0) {
    937   1.1       cgd 		if (fp->bf_len != 0)
    938   1.1       cgd 			return (EINVAL);
    939  1.61   thorpej 		s = splnet();
    940   1.1       cgd 		d->bd_filter = 0;
    941   1.1       cgd 		reset_d(d);
    942   1.1       cgd 		splx(s);
    943   1.1       cgd 		if (old != 0)
    944   1.1       cgd 			free((caddr_t)old, M_DEVBUF);
    945   1.1       cgd 		return (0);
    946   1.1       cgd 	}
    947   1.1       cgd 	flen = fp->bf_len;
    948   1.1       cgd 	if (flen > BPF_MAXINSNS)
    949   1.1       cgd 		return (EINVAL);
    950   1.1       cgd 
    951   1.1       cgd 	size = flen * sizeof(*fp->bf_insns);
    952   1.1       cgd 	fcode = (struct bpf_insn *)malloc(size, M_DEVBUF, M_WAITOK);
    953   1.2       cgd 	if (copyin((caddr_t)fp->bf_insns, (caddr_t)fcode, size) == 0 &&
    954   1.2       cgd 	    bpf_validate(fcode, (int)flen)) {
    955  1.61   thorpej 		s = splnet();
    956   1.1       cgd 		d->bd_filter = fcode;
    957   1.1       cgd 		reset_d(d);
    958   1.1       cgd 		splx(s);
    959   1.1       cgd 		if (old != 0)
    960   1.1       cgd 			free((caddr_t)old, M_DEVBUF);
    961   1.1       cgd 
    962   1.1       cgd 		return (0);
    963   1.1       cgd 	}
    964   1.1       cgd 	free((caddr_t)fcode, M_DEVBUF);
    965   1.1       cgd 	return (EINVAL);
    966   1.1       cgd }
    967   1.1       cgd 
    968   1.1       cgd /*
    969   1.2       cgd  * Detach a file from its current interface (if attached at all) and attach
    970   1.2       cgd  * to the interface indicated by the name stored in ifr.
    971   1.2       cgd  * Return an errno or 0.
    972   1.1       cgd  */
    973   1.1       cgd static int
    974   1.1       cgd bpf_setif(d, ifr)
    975   1.1       cgd 	struct bpf_d *d;
    976   1.1       cgd 	struct ifreq *ifr;
    977   1.1       cgd {
    978   1.1       cgd 	struct bpf_if *bp;
    979   1.1       cgd 	char *cp;
    980  1.26   thorpej 	int unit_seen, i, s, error;
    981   1.1       cgd 
    982   1.1       cgd 	/*
    983  1.26   thorpej 	 * Make sure the provided name has a unit number, and default
    984  1.26   thorpej 	 * it to '0' if not specified.
    985  1.26   thorpej 	 * XXX This is ugly ... do this differently?
    986   1.1       cgd 	 */
    987  1.26   thorpej 	unit_seen = 0;
    988   1.1       cgd 	cp = ifr->ifr_name;
    989  1.26   thorpej 	cp[sizeof(ifr->ifr_name) - 1] = '\0';	/* sanity */
    990  1.26   thorpej 	while (*cp++)
    991  1.26   thorpej 		if (*cp >= '0' && *cp <= '9')
    992  1.26   thorpej 			unit_seen = 1;
    993  1.26   thorpej 	if (!unit_seen) {
    994  1.26   thorpej 		/* Make sure to leave room for the '\0'. */
    995  1.26   thorpej 		for (i = 0; i < (IFNAMSIZ - 1); ++i) {
    996  1.26   thorpej 			if ((ifr->ifr_name[i] >= 'a' &&
    997  1.26   thorpej 			     ifr->ifr_name[i] <= 'z') ||
    998  1.26   thorpej 			    (ifr->ifr_name[i] >= 'A' &&
    999  1.26   thorpej 			     ifr->ifr_name[i] <= 'Z'))
   1000  1.26   thorpej 				continue;
   1001  1.26   thorpej 			ifr->ifr_name[i] = '0';
   1002   1.1       cgd 		}
   1003   1.1       cgd 	}
   1004  1.26   thorpej 
   1005   1.1       cgd 	/*
   1006   1.1       cgd 	 * Look through attached interfaces for the named one.
   1007   1.1       cgd 	 */
   1008   1.1       cgd 	for (bp = bpf_iflist; bp != 0; bp = bp->bif_next) {
   1009   1.1       cgd 		struct ifnet *ifp = bp->bif_ifp;
   1010   1.1       cgd 
   1011  1.26   thorpej 		if (ifp == 0 ||
   1012  1.26   thorpej 		    strcmp(ifp->if_xname, ifr->ifr_name) != 0)
   1013   1.1       cgd 			continue;
   1014  1.66      onoe 		/* skip additional entry */
   1015  1.66      onoe 		if (bp->bif_driverp != (struct bpf_if **)&ifp->if_bpf)
   1016  1.66      onoe 			continue;
   1017   1.1       cgd 		/*
   1018   1.2       cgd 		 * We found the requested interface.
   1019   1.1       cgd 		 * If it's not up, return an error.
   1020   1.2       cgd 		 * Allocate the packet buffers if we need to.
   1021   1.2       cgd 		 * If we're already attached to requested interface,
   1022   1.2       cgd 		 * just flush the buffer.
   1023   1.1       cgd 		 */
   1024   1.1       cgd 		if ((ifp->if_flags & IFF_UP) == 0)
   1025   1.1       cgd 			return (ENETDOWN);
   1026   1.2       cgd 
   1027   1.2       cgd 		if (d->bd_sbuf == 0) {
   1028   1.2       cgd 			error = bpf_allocbufs(d);
   1029   1.2       cgd 			if (error != 0)
   1030   1.2       cgd 				return (error);
   1031   1.2       cgd 		}
   1032  1.61   thorpej 		s = splnet();
   1033   1.1       cgd 		if (bp != d->bd_bif) {
   1034   1.1       cgd 			if (d->bd_bif)
   1035  1.12   mycroft 				/*
   1036   1.1       cgd 				 * Detach if attached to something else.
   1037   1.1       cgd 				 */
   1038   1.1       cgd 				bpf_detachd(d);
   1039   1.1       cgd 
   1040   1.1       cgd 			bpf_attachd(d, bp);
   1041   1.1       cgd 		}
   1042   1.1       cgd 		reset_d(d);
   1043   1.1       cgd 		splx(s);
   1044   1.1       cgd 		return (0);
   1045   1.1       cgd 	}
   1046   1.1       cgd 	/* Not found. */
   1047   1.1       cgd 	return (ENXIO);
   1048   1.1       cgd }
   1049   1.1       cgd 
   1050   1.1       cgd /*
   1051  1.26   thorpej  * Copy the interface name to the ifreq.
   1052   1.1       cgd  */
   1053   1.1       cgd static void
   1054   1.1       cgd bpf_ifname(ifp, ifr)
   1055   1.1       cgd 	struct ifnet *ifp;
   1056   1.1       cgd 	struct ifreq *ifr;
   1057   1.1       cgd {
   1058   1.1       cgd 
   1059  1.41     perry 	memcpy(ifr->ifr_name, ifp->if_xname, IFNAMSIZ);
   1060   1.1       cgd }
   1061   1.1       cgd 
   1062   1.1       cgd /*
   1063  1.36  christos  * Support for poll() system call
   1064   1.1       cgd  *
   1065  1.64   darrenr  * Return true iff the specific operation will not block indefinitely - with
   1066  1.64   darrenr  * the assumption that it is safe to positively acknowledge a request for the
   1067  1.64   darrenr  * ability to write to the BPF device.
   1068   1.2       cgd  * Otherwise, return false but make a note that a selwakeup() must be done.
   1069   1.1       cgd  */
   1070   1.1       cgd int
   1071  1.82      fvdl bpfpoll(dev, events, p)
   1072  1.53  augustss 	dev_t dev;
   1073  1.30   mycroft 	int events;
   1074  1.82      fvdl 	struct proc *p;
   1075   1.1       cgd {
   1076  1.53  augustss 	struct bpf_d *d = &bpf_dtab[minor(dev)];
   1077  1.61   thorpej 	int s = splnet();
   1078  1.64   darrenr 	int revents;
   1079  1.12   mycroft 
   1080  1.64   darrenr 	revents = events & (POLLOUT | POLLWRNORM);
   1081  1.44   thorpej 	if (events & (POLLIN | POLLRDNORM)) {
   1082  1.64   darrenr 		/*
   1083  1.64   darrenr 		 * An imitation of the FIONREAD ioctl code.
   1084  1.64   darrenr 		 */
   1085  1.91   darrenr 		if (d->bd_hlen != 0 ||
   1086  1.92   darrenr 		    ((d->bd_immediate && d->bd_slen != 0) ||
   1087  1.92   darrenr 		    d->bd_state == BPF_TIMED_OUT)) {
   1088  1.30   mycroft 			revents |= events & (POLLIN | POLLRDNORM);
   1089  1.92   darrenr 		} else {
   1090  1.82      fvdl 			selrecord(p, &d->bd_sel);
   1091  1.91   darrenr 			/* Start the read timeout if necessary */
   1092  1.91   darrenr 			if (d->bd_rtout > 0 && d->bd_state == BPF_IDLE) {
   1093  1.91   darrenr 				callout_reset(&d->bd_callout, d->bd_rtout,
   1094  1.91   darrenr 					      bpf_timed_out, d);
   1095  1.91   darrenr 				d->bd_state = BPF_WAITING;
   1096  1.91   darrenr 			}
   1097  1.91   darrenr 		}
   1098  1.44   thorpej 	}
   1099  1.12   mycroft 
   1100  1.12   mycroft 	splx(s);
   1101  1.30   mycroft 	return (revents);
   1102  1.75  jdolecek }
   1103  1.75  jdolecek 
   1104  1.75  jdolecek static void
   1105  1.75  jdolecek filt_bpfrdetach(struct knote *kn)
   1106  1.75  jdolecek {
   1107  1.75  jdolecek 	struct bpf_d *d = kn->kn_hook;
   1108  1.75  jdolecek 	int s;
   1109  1.75  jdolecek 
   1110  1.75  jdolecek 	s = splnet();
   1111  1.76  christos 	SLIST_REMOVE(&d->bd_sel.sel_klist, kn, knote, kn_selnext);
   1112  1.75  jdolecek 	splx(s);
   1113  1.75  jdolecek }
   1114  1.75  jdolecek 
   1115  1.75  jdolecek static int
   1116  1.75  jdolecek filt_bpfread(struct knote *kn, long hint)
   1117  1.75  jdolecek {
   1118  1.75  jdolecek 	struct bpf_d *d = kn->kn_hook;
   1119  1.75  jdolecek 
   1120  1.75  jdolecek 	kn->kn_data = d->bd_hlen;
   1121  1.75  jdolecek 	if (d->bd_immediate)
   1122  1.75  jdolecek 		kn->kn_data += d->bd_slen;
   1123  1.75  jdolecek 	return (kn->kn_data > 0);
   1124  1.75  jdolecek }
   1125  1.75  jdolecek 
   1126  1.75  jdolecek static const struct filterops bpfread_filtops =
   1127  1.75  jdolecek 	{ 1, NULL, filt_bpfrdetach, filt_bpfread };
   1128  1.75  jdolecek 
   1129  1.75  jdolecek int
   1130  1.75  jdolecek bpfkqfilter(dev, kn)
   1131  1.75  jdolecek 	dev_t dev;
   1132  1.75  jdolecek 	struct knote *kn;
   1133  1.75  jdolecek {
   1134  1.75  jdolecek 	struct bpf_d *d = &bpf_dtab[minor(dev)];
   1135  1.75  jdolecek 	struct klist *klist;
   1136  1.75  jdolecek 	int s;
   1137  1.75  jdolecek 
   1138  1.75  jdolecek 	switch (kn->kn_filter) {
   1139  1.75  jdolecek 	case EVFILT_READ:
   1140  1.76  christos 		klist = &d->bd_sel.sel_klist;
   1141  1.75  jdolecek 		kn->kn_fop = &bpfread_filtops;
   1142  1.75  jdolecek 		break;
   1143  1.75  jdolecek 
   1144  1.75  jdolecek 	default:
   1145  1.75  jdolecek 		return (1);
   1146  1.75  jdolecek 	}
   1147  1.75  jdolecek 
   1148  1.75  jdolecek 	kn->kn_hook = d;
   1149  1.75  jdolecek 
   1150  1.75  jdolecek 	s = splnet();
   1151  1.75  jdolecek 	SLIST_INSERT_HEAD(klist, kn, kn_selnext);
   1152  1.75  jdolecek 	splx(s);
   1153  1.75  jdolecek 
   1154  1.75  jdolecek 	return (0);
   1155   1.1       cgd }
   1156   1.1       cgd 
   1157   1.1       cgd /*
   1158   1.2       cgd  * Incoming linkage from device drivers.  Process the packet pkt, of length
   1159   1.2       cgd  * pktlen, which is stored in a contiguous buffer.  The packet is parsed
   1160   1.2       cgd  * by each process' filter, and if accepted, stashed into the corresponding
   1161   1.2       cgd  * buffer.
   1162   1.1       cgd  */
   1163   1.1       cgd void
   1164   1.1       cgd bpf_tap(arg, pkt, pktlen)
   1165   1.1       cgd 	caddr_t arg;
   1166  1.53  augustss 	u_char *pkt;
   1167  1.53  augustss 	u_int pktlen;
   1168   1.1       cgd {
   1169   1.1       cgd 	struct bpf_if *bp;
   1170  1.53  augustss 	struct bpf_d *d;
   1171  1.53  augustss 	u_int slen;
   1172   1.1       cgd 	/*
   1173   1.1       cgd 	 * Note that the ipl does not have to be raised at this point.
   1174   1.1       cgd 	 * The only problem that could arise here is that if two different
   1175   1.1       cgd 	 * interfaces shared any data.  This is not the case.
   1176   1.1       cgd 	 */
   1177   1.1       cgd 	bp = (struct bpf_if *)arg;
   1178   1.1       cgd 	for (d = bp->bif_dlist; d != 0; d = d->bd_next) {
   1179   1.1       cgd 		++d->bd_rcount;
   1180   1.1       cgd 		slen = bpf_filter(d->bd_filter, pkt, pktlen, pktlen);
   1181   1.1       cgd 		if (slen != 0)
   1182  1.41     perry 			catchpacket(d, pkt, pktlen, slen, memcpy);
   1183   1.1       cgd 	}
   1184   1.1       cgd }
   1185   1.1       cgd 
   1186   1.1       cgd /*
   1187   1.1       cgd  * Copy data from an mbuf chain into a buffer.  This code is derived
   1188   1.1       cgd  * from m_copydata in sys/uipc_mbuf.c.
   1189   1.1       cgd  */
   1190  1.43     perry static void *
   1191  1.41     perry bpf_mcpy(dst_arg, src_arg, len)
   1192  1.41     perry 	void *dst_arg;
   1193  1.12   mycroft 	const void *src_arg;
   1194  1.53  augustss 	size_t len;
   1195  1.12   mycroft {
   1196  1.53  augustss 	const struct mbuf *m;
   1197  1.53  augustss 	u_int count;
   1198   1.1       cgd 	u_char *dst;
   1199   1.1       cgd 
   1200  1.12   mycroft 	m = src_arg;
   1201  1.12   mycroft 	dst = dst_arg;
   1202   1.1       cgd 	while (len > 0) {
   1203   1.1       cgd 		if (m == 0)
   1204  1.41     perry 			panic("bpf_mcpy");
   1205  1.12   mycroft 		count = min(m->m_len, len);
   1206  1.41     perry 		memcpy((caddr_t)dst, mtod(m, caddr_t), count);
   1207   1.1       cgd 		m = m->m_next;
   1208   1.1       cgd 		dst += count;
   1209   1.1       cgd 		len -= count;
   1210   1.1       cgd 	}
   1211  1.68    itojun 	return (dst_arg);
   1212   1.1       cgd }
   1213   1.1       cgd 
   1214   1.1       cgd /*
   1215   1.2       cgd  * Incoming linkage from device drivers, when packet is in an mbuf chain.
   1216   1.1       cgd  */
   1217   1.1       cgd void
   1218   1.1       cgd bpf_mtap(arg, m)
   1219   1.1       cgd 	caddr_t arg;
   1220   1.1       cgd 	struct mbuf *m;
   1221   1.1       cgd {
   1222  1.91   darrenr 	void *(*cpfn) __P((void *, const void *, size_t));
   1223   1.1       cgd 	struct bpf_if *bp = (struct bpf_if *)arg;
   1224   1.1       cgd 	struct bpf_d *d;
   1225  1.91   darrenr 	u_int pktlen, slen, buflen;
   1226   1.1       cgd 	struct mbuf *m0;
   1227  1.91   darrenr 	void *marg;
   1228   1.1       cgd 
   1229  1.73    itojun 	pktlen = 0;
   1230  1.73    itojun 	for (m0 = m; m0 != 0; m0 = m0->m_next)
   1231  1.73    itojun 		pktlen += m0->m_len;
   1232   1.1       cgd 
   1233  1.91   darrenr 	if (pktlen == m->m_len) {
   1234  1.91   darrenr 		cpfn = memcpy;
   1235  1.91   darrenr 		marg = mtod(m, void *);
   1236  1.91   darrenr 		buflen = pktlen;
   1237  1.91   darrenr 	} else {
   1238  1.91   darrenr 		cpfn = bpf_mcpy;
   1239  1.91   darrenr 		marg = m;
   1240  1.91   darrenr 		buflen = 0;
   1241  1.91   darrenr 	}
   1242  1.91   darrenr 
   1243   1.1       cgd 	for (d = bp->bif_dlist; d != 0; d = d->bd_next) {
   1244  1.91   darrenr 		if (!d->bd_seesent && (m->m_pkthdr.rcvif == NULL))
   1245  1.91   darrenr 			continue;
   1246   1.1       cgd 		++d->bd_rcount;
   1247  1.91   darrenr 		slen = bpf_filter(d->bd_filter, marg, pktlen, buflen);
   1248   1.1       cgd 		if (slen != 0)
   1249  1.91   darrenr 			catchpacket(d, marg, pktlen, slen, cpfn);
   1250   1.1       cgd 	}
   1251   1.1       cgd }
   1252   1.1       cgd 
   1253   1.1       cgd /*
   1254   1.1       cgd  * Move the packet data from interface memory (pkt) into the
   1255   1.1       cgd  * store buffer.  Return 1 if it's time to wakeup a listener (buffer full),
   1256   1.2       cgd  * otherwise 0.  "copy" is the routine called to do the actual data
   1257  1.41     perry  * transfer.  memcpy is passed in to copy contiguous chunks, while
   1258  1.41     perry  * bpf_mcpy is passed in to copy mbuf chains.  In the latter case,
   1259   1.2       cgd  * pkt is really an mbuf.
   1260   1.1       cgd  */
   1261   1.1       cgd static void
   1262   1.1       cgd catchpacket(d, pkt, pktlen, snaplen, cpfn)
   1263  1.53  augustss 	struct bpf_d *d;
   1264  1.53  augustss 	u_char *pkt;
   1265  1.53  augustss 	u_int pktlen, snaplen;
   1266  1.53  augustss 	void *(*cpfn) __P((void *, const void *, size_t));
   1267  1.53  augustss {
   1268  1.53  augustss 	struct bpf_hdr *hp;
   1269  1.53  augustss 	int totlen, curlen;
   1270  1.53  augustss 	int hdrlen = d->bd_bif->bif_hdrlen;
   1271   1.1       cgd 	/*
   1272   1.1       cgd 	 * Figure out how many bytes to move.  If the packet is
   1273   1.1       cgd 	 * greater or equal to the snapshot length, transfer that
   1274   1.1       cgd 	 * much.  Otherwise, transfer the whole packet (unless
   1275   1.1       cgd 	 * we hit the buffer size limit).
   1276   1.1       cgd 	 */
   1277  1.12   mycroft 	totlen = hdrlen + min(snaplen, pktlen);
   1278   1.1       cgd 	if (totlen > d->bd_bufsize)
   1279   1.1       cgd 		totlen = d->bd_bufsize;
   1280   1.1       cgd 
   1281   1.1       cgd 	/*
   1282   1.1       cgd 	 * Round up the end of the previous packet to the next longword.
   1283   1.1       cgd 	 */
   1284   1.1       cgd 	curlen = BPF_WORDALIGN(d->bd_slen);
   1285   1.1       cgd 	if (curlen + totlen > d->bd_bufsize) {
   1286   1.1       cgd 		/*
   1287   1.1       cgd 		 * This packet will overflow the storage buffer.
   1288   1.1       cgd 		 * Rotate the buffers if we can, then wakeup any
   1289   1.1       cgd 		 * pending reads.
   1290   1.1       cgd 		 */
   1291   1.1       cgd 		if (d->bd_fbuf == 0) {
   1292  1.12   mycroft 			/*
   1293  1.12   mycroft 			 * We haven't completed the previous read yet,
   1294   1.1       cgd 			 * so drop the packet.
   1295   1.1       cgd 			 */
   1296   1.1       cgd 			++d->bd_dcount;
   1297   1.1       cgd 			return;
   1298   1.1       cgd 		}
   1299   1.1       cgd 		ROTATE_BUFFERS(d);
   1300   1.1       cgd 		bpf_wakeup(d);
   1301   1.1       cgd 		curlen = 0;
   1302  1.91   darrenr 	} else if (d->bd_immediate || d->bd_state == BPF_TIMED_OUT)
   1303  1.91   darrenr 		/*
   1304  1.91   darrenr 		 * Immediate mode is set, or the read timeout has
   1305  1.91   darrenr 		 * already expired during a select call.  A packet
   1306  1.91   darrenr 		 * arrived, so the reader should be woken up.
   1307  1.91   darrenr 		 */
   1308  1.91   darrenr 		bpf_wakeup(d);
   1309   1.1       cgd 
   1310   1.1       cgd 	/*
   1311   1.1       cgd 	 * Append the bpf header.
   1312   1.1       cgd 	 */
   1313   1.1       cgd 	hp = (struct bpf_hdr *)(d->bd_sbuf + curlen);
   1314   1.2       cgd 	microtime(&hp->bh_tstamp);
   1315   1.1       cgd 	hp->bh_datalen = pktlen;
   1316   1.1       cgd 	hp->bh_hdrlen = hdrlen;
   1317   1.1       cgd 	/*
   1318   1.1       cgd 	 * Copy the packet data into the store buffer and update its length.
   1319   1.1       cgd 	 */
   1320  1.41     perry 	(*cpfn)((u_char *)hp + hdrlen, pkt, (hp->bh_caplen = totlen - hdrlen));
   1321   1.1       cgd 	d->bd_slen = curlen + totlen;
   1322   1.1       cgd }
   1323   1.1       cgd 
   1324  1.12   mycroft /*
   1325   1.1       cgd  * Initialize all nonzero fields of a descriptor.
   1326   1.1       cgd  */
   1327   1.1       cgd static int
   1328   1.2       cgd bpf_allocbufs(d)
   1329  1.53  augustss 	struct bpf_d *d;
   1330   1.1       cgd {
   1331  1.50     enami 
   1332  1.79    itojun 	d->bd_fbuf = (caddr_t)malloc(d->bd_bufsize, M_DEVBUF, M_NOWAIT);
   1333  1.79    itojun 	if (!d->bd_fbuf)
   1334  1.79    itojun 		return (ENOBUFS);
   1335  1.79    itojun 	d->bd_sbuf = (caddr_t)malloc(d->bd_bufsize, M_DEVBUF, M_NOWAIT);
   1336  1.79    itojun 	if (!d->bd_sbuf) {
   1337  1.79    itojun 		free(d->bd_fbuf, M_DEVBUF);
   1338  1.79    itojun 		return (ENOBUFS);
   1339  1.79    itojun 	}
   1340   1.1       cgd 	d->bd_slen = 0;
   1341   1.1       cgd 	d->bd_hlen = 0;
   1342   1.1       cgd 	return (0);
   1343   1.1       cgd }
   1344   1.1       cgd 
   1345   1.1       cgd /*
   1346   1.2       cgd  * Free buffers currently in use by a descriptor.
   1347   1.2       cgd  * Called on close.
   1348   1.2       cgd  */
   1349   1.2       cgd static void
   1350   1.2       cgd bpf_freed(d)
   1351  1.53  augustss 	struct bpf_d *d;
   1352   1.2       cgd {
   1353   1.2       cgd 	/*
   1354   1.2       cgd 	 * We don't need to lock out interrupts since this descriptor has
   1355   1.2       cgd 	 * been detached from its interface and it yet hasn't been marked
   1356   1.2       cgd 	 * free.
   1357   1.2       cgd 	 */
   1358   1.2       cgd 	if (d->bd_sbuf != 0) {
   1359   1.2       cgd 		free(d->bd_sbuf, M_DEVBUF);
   1360   1.2       cgd 		if (d->bd_hbuf != 0)
   1361   1.2       cgd 			free(d->bd_hbuf, M_DEVBUF);
   1362   1.2       cgd 		if (d->bd_fbuf != 0)
   1363   1.2       cgd 			free(d->bd_fbuf, M_DEVBUF);
   1364   1.2       cgd 	}
   1365   1.2       cgd 	if (d->bd_filter)
   1366   1.2       cgd 		free((caddr_t)d->bd_filter, M_DEVBUF);
   1367   1.2       cgd 
   1368   1.2       cgd 	D_MARKFREE(d);
   1369   1.2       cgd }
   1370   1.2       cgd 
   1371   1.2       cgd /*
   1372  1.60   thorpej  * Attach an interface to bpf.  dlt is the link layer type; hdrlen is the
   1373  1.60   thorpej  * fixed size of the link header (variable length headers not yet supported).
   1374   1.1       cgd  */
   1375   1.1       cgd void
   1376  1.59   thorpej bpfattach(ifp, dlt, hdrlen)
   1377   1.1       cgd 	struct ifnet *ifp;
   1378   1.1       cgd 	u_int dlt, hdrlen;
   1379   1.1       cgd {
   1380  1.66      onoe 
   1381  1.66      onoe 	bpfattach2(ifp, dlt, hdrlen, &ifp->if_bpf);
   1382  1.66      onoe }
   1383  1.66      onoe 
   1384  1.66      onoe /*
   1385  1.66      onoe  * Attach additional dlt for a interface to bpf.  dlt is the link layer type;
   1386  1.66      onoe  * hdrlen is the fixed size of the link header for the specified dlt
   1387  1.66      onoe  * (variable length headers not yet supported).
   1388  1.66      onoe  */
   1389  1.66      onoe void
   1390  1.66      onoe bpfattach2(ifp, dlt, hdrlen, driverp)
   1391  1.66      onoe 	struct ifnet *ifp;
   1392  1.66      onoe 	u_int dlt, hdrlen;
   1393  1.66      onoe 	caddr_t *driverp;
   1394  1.66      onoe {
   1395   1.1       cgd 	struct bpf_if *bp;
   1396   1.1       cgd 	bp = (struct bpf_if *)malloc(sizeof(*bp), M_DEVBUF, M_DONTWAIT);
   1397  1.12   mycroft 	if (bp == 0)
   1398  1.12   mycroft 		panic("bpfattach");
   1399  1.12   mycroft 
   1400   1.1       cgd 	bp->bif_dlist = 0;
   1401  1.66      onoe 	bp->bif_driverp = (struct bpf_if **)driverp;
   1402   1.1       cgd 	bp->bif_ifp = ifp;
   1403   1.1       cgd 	bp->bif_dlt = dlt;
   1404   1.1       cgd 
   1405   1.1       cgd 	bp->bif_next = bpf_iflist;
   1406   1.1       cgd 	bpf_iflist = bp;
   1407   1.1       cgd 
   1408   1.1       cgd 	*bp->bif_driverp = 0;
   1409   1.1       cgd 
   1410   1.1       cgd 	/*
   1411   1.1       cgd 	 * Compute the length of the bpf header.  This is not necessarily
   1412  1.12   mycroft 	 * equal to SIZEOF_BPF_HDR because we want to insert spacing such
   1413  1.12   mycroft 	 * that the network layer header begins on a longword boundary (for
   1414   1.1       cgd 	 * performance reasons and to alleviate alignment restrictions).
   1415   1.1       cgd 	 */
   1416   1.1       cgd 	bp->bif_hdrlen = BPF_WORDALIGN(hdrlen + SIZEOF_BPF_HDR) - hdrlen;
   1417   1.1       cgd 
   1418  1.11   deraadt #if 0
   1419  1.32  christos 	printf("bpf: %s attached\n", ifp->if_xname);
   1420  1.11   deraadt #endif
   1421  1.48   thorpej }
   1422  1.48   thorpej 
   1423  1.48   thorpej /*
   1424  1.48   thorpej  * Remove an interface from bpf.
   1425  1.48   thorpej  */
   1426  1.48   thorpej void
   1427  1.48   thorpej bpfdetach(ifp)
   1428  1.48   thorpej 	struct ifnet *ifp;
   1429  1.48   thorpej {
   1430  1.48   thorpej 	struct bpf_if *bp, **pbp;
   1431  1.51     enami 	struct bpf_d *d;
   1432  1.51     enami 	int i, s, cmaj;
   1433  1.51     enami 
   1434  1.51     enami 	/* locate the major number */
   1435  1.67   gehenna 	cmaj = cdevsw_lookup_major(&bpf_cdevsw);
   1436  1.51     enami 
   1437  1.52     soren 	/* Nuke the vnodes for any open instances */
   1438  1.51     enami 	for (i = 0; i < NBPFILTER; ++i) {
   1439  1.51     enami 		d = &bpf_dtab[i];
   1440  1.51     enami 		if (!D_ISFREE(d) && d->bd_bif != NULL &&
   1441  1.51     enami 		    d->bd_bif->bif_ifp == ifp) {
   1442  1.51     enami 			/*
   1443  1.51     enami 			 * Detach the descriptor from an interface now.
   1444  1.51     enami 			 * It will be free'ed later by close routine.
   1445  1.51     enami 			 */
   1446  1.61   thorpej 			s = splnet();
   1447  1.51     enami 			d->bd_promisc = 0;	/* we can't touch device. */
   1448  1.51     enami 			bpf_detachd(d);
   1449  1.51     enami 			splx(s);
   1450  1.51     enami 			vdevgone(cmaj, i, i, VCHR);
   1451  1.51     enami 		}
   1452  1.51     enami 	}
   1453  1.48   thorpej 
   1454  1.66      onoe   again:
   1455  1.48   thorpej 	for (bp = bpf_iflist, pbp = &bpf_iflist;
   1456  1.48   thorpej 	     bp != NULL; pbp = &bp->bif_next, bp = bp->bif_next) {
   1457  1.48   thorpej 		if (bp->bif_ifp == ifp) {
   1458  1.48   thorpej 			*pbp = bp->bif_next;
   1459  1.48   thorpej 			free(bp, M_DEVBUF);
   1460  1.66      onoe 			goto again;
   1461  1.48   thorpej 		}
   1462  1.48   thorpej 	}
   1463  1.47   thorpej }
   1464  1.47   thorpej 
   1465  1.47   thorpej /*
   1466  1.66      onoe  * Change the data link type of a interface.
   1467  1.47   thorpej  */
   1468  1.47   thorpej void
   1469  1.59   thorpej bpf_change_type(ifp, dlt, hdrlen)
   1470  1.59   thorpej 	struct ifnet *ifp;
   1471  1.47   thorpej 	u_int dlt, hdrlen;
   1472  1.47   thorpej {
   1473  1.47   thorpej 	struct bpf_if *bp;
   1474  1.47   thorpej 
   1475  1.47   thorpej 	for (bp = bpf_iflist; bp != NULL; bp = bp->bif_next) {
   1476  1.59   thorpej 		if (bp->bif_driverp == (struct bpf_if **)&ifp->if_bpf)
   1477  1.47   thorpej 			break;
   1478  1.47   thorpej 	}
   1479  1.47   thorpej 	if (bp == NULL)
   1480  1.47   thorpej 		panic("bpf_change_type");
   1481  1.47   thorpej 
   1482  1.47   thorpej 	bp->bif_dlt = dlt;
   1483  1.47   thorpej 
   1484  1.47   thorpej 	/*
   1485  1.47   thorpej 	 * Compute the length of the bpf header.  This is not necessarily
   1486  1.47   thorpej 	 * equal to SIZEOF_BPF_HDR because we want to insert spacing such
   1487  1.47   thorpej 	 * that the network layer header begins on a longword boundary (for
   1488  1.47   thorpej 	 * performance reasons and to alleviate alignment restrictions).
   1489  1.47   thorpej 	 */
   1490  1.47   thorpej 	bp->bif_hdrlen = BPF_WORDALIGN(hdrlen + SIZEOF_BPF_HDR) - hdrlen;
   1491  1.66      onoe }
   1492  1.66      onoe 
   1493  1.66      onoe /*
   1494  1.66      onoe  * Get a list of available data link type of the interface.
   1495  1.66      onoe  */
   1496  1.66      onoe static int
   1497  1.66      onoe bpf_getdltlist(d, bfl)
   1498  1.66      onoe 	struct bpf_d *d;
   1499  1.66      onoe 	struct bpf_dltlist *bfl;
   1500  1.66      onoe {
   1501  1.66      onoe 	int n, error;
   1502  1.66      onoe 	struct ifnet *ifp;
   1503  1.66      onoe 	struct bpf_if *bp;
   1504  1.66      onoe 
   1505  1.66      onoe 	ifp = d->bd_bif->bif_ifp;
   1506  1.66      onoe 	n = 0;
   1507  1.66      onoe 	error = 0;
   1508  1.66      onoe 	for (bp = bpf_iflist; bp != NULL; bp = bp->bif_next) {
   1509  1.66      onoe 		if (bp->bif_ifp != ifp)
   1510  1.66      onoe 			continue;
   1511  1.66      onoe 		if (bfl->bfl_list != NULL) {
   1512  1.66      onoe 			if (n >= bfl->bfl_len)
   1513  1.66      onoe 				return ENOMEM;
   1514  1.66      onoe 			error = copyout(&bp->bif_dlt,
   1515  1.66      onoe 			    bfl->bfl_list + n, sizeof(u_int));
   1516  1.66      onoe 		}
   1517  1.66      onoe 		n++;
   1518  1.66      onoe 	}
   1519  1.66      onoe 	bfl->bfl_len = n;
   1520  1.66      onoe 	return error;
   1521  1.66      onoe }
   1522  1.66      onoe 
   1523  1.66      onoe /*
   1524  1.66      onoe  * Set the data link type of a BPF instance.
   1525  1.66      onoe  */
   1526  1.66      onoe static int
   1527  1.66      onoe bpf_setdlt(d, dlt)
   1528  1.66      onoe 	struct bpf_d *d;
   1529  1.66      onoe 	u_int dlt;
   1530  1.66      onoe {
   1531  1.69   thorpej 	int s, error, opromisc;
   1532  1.66      onoe 	struct ifnet *ifp;
   1533  1.66      onoe 	struct bpf_if *bp;
   1534  1.66      onoe 
   1535  1.66      onoe 	if (d->bd_bif->bif_dlt == dlt)
   1536  1.66      onoe 		return 0;
   1537  1.66      onoe 	ifp = d->bd_bif->bif_ifp;
   1538  1.66      onoe 	for (bp = bpf_iflist; bp != NULL; bp = bp->bif_next) {
   1539  1.66      onoe 		if (bp->bif_ifp == ifp && bp->bif_dlt == dlt)
   1540  1.66      onoe 			break;
   1541  1.66      onoe 	}
   1542  1.66      onoe 	if (bp == NULL)
   1543  1.66      onoe 		return EINVAL;
   1544  1.66      onoe 	s = splnet();
   1545  1.69   thorpej 	opromisc = d->bd_promisc;
   1546  1.66      onoe 	bpf_detachd(d);
   1547  1.66      onoe 	bpf_attachd(d, bp);
   1548  1.66      onoe 	reset_d(d);
   1549  1.69   thorpej 	if (opromisc) {
   1550  1.69   thorpej 		error = ifpromisc(bp->bif_ifp, 1);
   1551  1.69   thorpej 		if (error)
   1552  1.69   thorpej 			printf("%s: bpf_setdlt: ifpromisc failed (%d)\n",
   1553  1.69   thorpej 			    bp->bif_ifp->if_xname, error);
   1554  1.69   thorpej 		else
   1555  1.69   thorpej 			d->bd_promisc = 1;
   1556  1.69   thorpej 	}
   1557  1.66      onoe 	splx(s);
   1558  1.66      onoe 	return 0;
   1559   1.1       cgd }
   1560  1.89  jonathan 
   1561  1.89  jonathan static int
   1562  1.89  jonathan sysctl_net_bpf_maxbufsize(SYSCTLFN_ARGS)
   1563  1.89  jonathan {
   1564  1.89  jonathan 	int newsize, error;
   1565  1.89  jonathan 	struct sysctlnode node;
   1566  1.89  jonathan 
   1567  1.89  jonathan 	node = *rnode;
   1568  1.89  jonathan 	node.sysctl_data = &newsize;
   1569  1.89  jonathan 	newsize = bpf_maxbufsize;
   1570  1.89  jonathan 	error = sysctl_lookup(SYSCTLFN_CALL(&node));
   1571  1.89  jonathan 	if (error || newp == NULL)
   1572  1.89  jonathan 		return (error);
   1573  1.89  jonathan 
   1574  1.89  jonathan 	if (newsize < BPF_MINBUFSIZE || newsize > BPF_MAXBUFSIZE)
   1575  1.89  jonathan 		return (EINVAL);
   1576  1.89  jonathan 
   1577  1.89  jonathan 	bpf_maxbufsize = newsize;
   1578  1.89  jonathan 
   1579  1.89  jonathan 	return (0);
   1580  1.89  jonathan }
   1581  1.89  jonathan 
   1582  1.89  jonathan SYSCTL_SETUP(sysctl_net_bfp_setup, "sysctl net.bpf subtree setup")
   1583  1.89  jonathan {
   1584  1.89  jonathan 	struct sysctlnode *node;
   1585  1.89  jonathan 
   1586  1.90    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1587  1.90    atatat 		       CTLFLAG_PERMANENT,
   1588  1.89  jonathan 		       CTLTYPE_NODE, "net", NULL,
   1589  1.89  jonathan 		       NULL, 0, NULL, 0,
   1590  1.89  jonathan 		       CTL_NET, CTL_EOL);
   1591  1.89  jonathan 
   1592  1.89  jonathan 	node = NULL;
   1593  1.90    atatat 	sysctl_createv(clog, 0, NULL, &node,
   1594  1.90    atatat 		       CTLFLAG_PERMANENT,
   1595  1.90    atatat 		       CTLTYPE_NODE, "bpf", NULL,
   1596  1.89  jonathan 		       NULL, 0, NULL, 0,
   1597  1.89  jonathan 		       CTL_NET, CTL_CREATE, CTL_EOL);
   1598  1.89  jonathan 	if (node != NULL)
   1599  1.90    atatat 		sysctl_createv(clog, 0, NULL, NULL,
   1600  1.90    atatat 			CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1601  1.89  jonathan 			CTLTYPE_INT, "maxbufsize", NULL,
   1602  1.89  jonathan 			sysctl_net_bpf_maxbufsize, 0, &bpf_maxbufsize, 0,
   1603  1.89  jonathan 			CTL_NET, node->sysctl_num, CTL_CREATE, CTL_EOL);
   1604  1.89  jonathan }
   1605