1 1.82 rin /* $NetBSD: bpf.h,v 1.82 2023/08/23 13:21:17 rin Exp $ */ 2 1.6 cgd 3 1.5 mycroft /* 4 1.5 mycroft * Copyright (c) 1990, 1991, 1993 5 1.5 mycroft * The Regents of the University of California. All rights reserved. 6 1.1 cgd * 7 1.1 cgd * This code is derived from the Stanford/CMU enet packet filter, 8 1.1 cgd * (net/enet.c) distributed as part of 4.3BSD, and code contributed 9 1.5 mycroft * to Berkeley by Steven McCanne and Van Jacobson both of Lawrence 10 1.2 cgd * Berkeley Laboratory. 11 1.1 cgd * 12 1.1 cgd * Redistribution and use in source and binary forms, with or without 13 1.1 cgd * modification, are permitted provided that the following conditions 14 1.1 cgd * are met: 15 1.1 cgd * 1. Redistributions of source code must retain the above copyright 16 1.1 cgd * notice, this list of conditions and the following disclaimer. 17 1.1 cgd * 2. Redistributions in binary form must reproduce the above copyright 18 1.1 cgd * notice, this list of conditions and the following disclaimer in the 19 1.1 cgd * documentation and/or other materials provided with the distribution. 20 1.32 agc * 3. Neither the name of the University nor the names of its contributors 21 1.1 cgd * may be used to endorse or promote products derived from this software 22 1.1 cgd * without specific prior written permission. 23 1.1 cgd * 24 1.1 cgd * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 25 1.1 cgd * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 26 1.1 cgd * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 27 1.1 cgd * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 28 1.1 cgd * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 29 1.1 cgd * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 30 1.1 cgd * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 31 1.1 cgd * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 32 1.1 cgd * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 33 1.1 cgd * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 34 1.1 cgd * SUCH DAMAGE. 35 1.1 cgd * 36 1.19 fvdl * @(#)bpf.h 8.2 (Berkeley) 1/9/95 37 1.17 christos * @(#) Header: bpf.h,v 1.36 97/06/12 14:29:53 leres Exp (LBL) 38 1.1 cgd */ 39 1.1 cgd 40 1.8 jtc #ifndef _NET_BPF_H_ 41 1.8 jtc #define _NET_BPF_H_ 42 1.27 thorpej 43 1.67 dholland #include <sys/ioccom.h> 44 1.27 thorpej #include <sys/time.h> 45 1.8 jtc 46 1.17 christos /* BSD style release date */ 47 1.17 christos #define BPF_RELEASE 199606 48 1.18 christos 49 1.64 alnsn /* Date when COP instructions and external memory have been released. */ 50 1.64 alnsn #define BPF_COP_EXTMEM_RELEASE 20140624 51 1.64 alnsn 52 1.59 christos __BEGIN_DECLS 53 1.59 christos 54 1.18 christos typedef int bpf_int32; 55 1.18 christos typedef u_int bpf_u_int32; 56 1.17 christos 57 1.1 cgd /* 58 1.42 perry * Alignment macros. BPF_WORDALIGN rounds up to the next 59 1.42 perry * even multiple of BPF_ALIGNMENT. 60 1.1 cgd */ 61 1.1 cgd #define BPF_ALIGNMENT sizeof(long) 62 1.58 bouyer #define BPF_ALIGNMENT32 sizeof(int) 63 1.58 bouyer 64 1.1 cgd #define BPF_WORDALIGN(x) (((x)+(BPF_ALIGNMENT-1))&~(BPF_ALIGNMENT-1)) 65 1.58 bouyer #define BPF_WORDALIGN32(x) (((x)+(BPF_ALIGNMENT32-1))&~(BPF_ALIGNMENT32-1)) 66 1.1 cgd 67 1.1 cgd #define BPF_MAXINSNS 512 68 1.33 jonathan #define BPF_DFLTBUFSIZE (1024*1024) /* default static upper limit */ 69 1.33 jonathan #define BPF_MAXBUFSIZE (1024*1024*16) /* hard limit on sysctl'able value */ 70 1.2 cgd #define BPF_MINBUFSIZE 32 71 1.1 cgd 72 1.1 cgd /* 73 1.1 cgd * Structure for BIOCSETF. 74 1.1 cgd */ 75 1.1 cgd struct bpf_program { 76 1.1 cgd u_int bf_len; 77 1.1 cgd struct bpf_insn *bf_insns; 78 1.1 cgd }; 79 1.42 perry 80 1.1 cgd /* 81 1.43 rpaulo * Struct returned by BIOCGSTATS and net.bpf.stats sysctl. 82 1.1 cgd */ 83 1.1 cgd struct bpf_stat { 84 1.45 rpaulo uint64_t bs_recv; /* number of packets received */ 85 1.45 rpaulo uint64_t bs_drop; /* number of packets dropped */ 86 1.45 rpaulo uint64_t bs_capt; /* number of packets captured */ 87 1.45 rpaulo uint64_t bs_padding[13]; 88 1.35 darrenr }; 89 1.42 perry 90 1.35 darrenr /* 91 1.79 christos * Struct returned by BIOCGSTATS_30. 92 1.35 darrenr */ 93 1.79 christos struct bpf_stat30 { 94 1.1 cgd u_int bs_recv; /* number of packets received */ 95 1.1 cgd u_int bs_drop; /* number of packets dropped */ 96 1.1 cgd }; 97 1.1 cgd 98 1.1 cgd /* 99 1.42 perry * Struct return by BIOCVERSION. This represents the version number of 100 1.2 cgd * the filter language described by the instruction encodings below. 101 1.2 cgd * bpf understands a program iff kernel_major == filter_major && 102 1.2 cgd * kernel_minor >= filter_minor, that is, if the value returned by the 103 1.2 cgd * running kernel has the same major number and a minor number equal 104 1.2 cgd * equal to or less than the filter being downloaded. Otherwise, the 105 1.2 cgd * results are undefined, meaning an error may be returned or packets 106 1.2 cgd * may be accepted haphazardly. 107 1.2 cgd * It has nothing to do with the source code version. 108 1.2 cgd */ 109 1.2 cgd struct bpf_version { 110 1.2 cgd u_short bv_major; 111 1.2 cgd u_short bv_minor; 112 1.2 cgd }; 113 1.9 mycroft /* Current version number of filter architecture. */ 114 1.2 cgd #define BPF_MAJOR_VERSION 1 115 1.2 cgd #define BPF_MINOR_VERSION 1 116 1.2 cgd 117 1.2 cgd /* 118 1.1 cgd * BPF ioctls 119 1.1 cgd * 120 1.1 cgd * The first set is for compatibility with Sun's pcc style 121 1.1 cgd * header files. If your using gcc, we assume that you 122 1.1 cgd * have run fixincludes so the latter set should work. 123 1.1 cgd */ 124 1.74 msaitoh #define BIOCGBLEN _IOR('B', 102, u_int) 125 1.74 msaitoh #define BIOCSBLEN _IOWR('B', 102, u_int) 126 1.74 msaitoh #define BIOCSETF _IOW('B', 103, struct bpf_program) 127 1.74 msaitoh #define BIOCFLUSH _IO('B', 104) 128 1.74 msaitoh #define BIOCPROMISC _IO('B', 105) 129 1.74 msaitoh #define BIOCGDLT _IOR('B', 106, u_int) 130 1.74 msaitoh #define BIOCGETIF _IOR('B', 107, struct ifreq) 131 1.74 msaitoh #define BIOCSETIF _IOW('B', 108, struct ifreq) 132 1.49 christos #ifdef COMPAT_50 133 1.49 christos #include <compat/sys/time.h> 134 1.74 msaitoh #define BIOCSORTIMEOUT _IOW('B', 109, struct timeval50) 135 1.74 msaitoh #define BIOCGORTIMEOUT _IOR('B', 110, struct timeval50) 136 1.49 christos #endif 137 1.74 msaitoh #define BIOCGSTATS _IOR('B', 111, struct bpf_stat) 138 1.79 christos #define BIOCGSTATS_30 _IOR('B', 111, struct bpf_stat30) 139 1.74 msaitoh #define BIOCIMMEDIATE _IOW('B', 112, u_int) 140 1.74 msaitoh #define BIOCVERSION _IOR('B', 113, struct bpf_version) 141 1.74 msaitoh #define BIOCSTCPF _IOW('B', 114, struct bpf_program) 142 1.74 msaitoh #define BIOCSUDPF _IOW('B', 115, struct bpf_program) 143 1.74 msaitoh #define BIOCGHDRCMPLT _IOR('B', 116, u_int) 144 1.74 msaitoh #define BIOCSHDRCMPLT _IOW('B', 117, u_int) 145 1.74 msaitoh #define BIOCSDLT _IOW('B', 118, u_int) 146 1.74 msaitoh #define BIOCGDLTLIST _IOWR('B', 119, struct bpf_dltlist) 147 1.74 msaitoh #define BIOCGDIRECTION _IOR('B', 120, u_int) 148 1.74 msaitoh #define BIOCSDIRECTION _IOW('B', 121, u_int) 149 1.74 msaitoh #define BIOCSRTIMEOUT _IOW('B', 122, struct timeval) 150 1.74 msaitoh #define BIOCGRTIMEOUT _IOR('B', 123, struct timeval) 151 1.74 msaitoh #define BIOCGFEEDBACK _IOR('B', 124, u_int) 152 1.74 msaitoh #define BIOCSFEEDBACK _IOW('B', 125, u_int) 153 1.54 christos #define BIOCFEEDBACK BIOCSFEEDBACK /* FreeBSD name */ 154 1.75 roy #define BIOCLOCK _IO('B', 126) 155 1.75 roy #define BIOCSETWF _IOW('B', 127, struct bpf_program) 156 1.1 cgd 157 1.72 msaitoh /* Obsolete */ 158 1.72 msaitoh #define BIOCGSEESENT BIOCGDIRECTION 159 1.72 msaitoh #define BIOCSSEESENT BIOCSDIRECTION 160 1.72 msaitoh 161 1.72 msaitoh /* 162 1.72 msaitoh * Packet directions. 163 1.72 msaitoh * BPF_D_IN = 0, BPF_D_INOUT =1 for backward compatibility of BIOC[GS]SEESENT. 164 1.72 msaitoh */ 165 1.72 msaitoh #define BPF_D_IN 0 /* See incoming packets */ 166 1.72 msaitoh #define BPF_D_INOUT 1 /* See incoming and outgoing packets */ 167 1.72 msaitoh #define BPF_D_OUT 2 /* See outgoing packets */ 168 1.72 msaitoh 169 1.1 cgd /* 170 1.49 christos * Structure prepended to each packet. This is "wire" format, so we 171 1.50 christos * cannot change it unfortunately to 64 bit times on 32 bit systems [yet]. 172 1.1 cgd */ 173 1.50 christos struct bpf_timeval { 174 1.50 christos long tv_sec; 175 1.50 christos long tv_usec; 176 1.49 christos }; 177 1.50 christos 178 1.58 bouyer struct bpf_timeval32 { 179 1.58 bouyer int32_t tv_sec; 180 1.58 bouyer int32_t tv_usec; 181 1.58 bouyer }; 182 1.58 bouyer 183 1.1 cgd struct bpf_hdr { 184 1.50 christos struct bpf_timeval bh_tstamp; /* time stamp */ 185 1.45 rpaulo uint32_t bh_caplen; /* length of captured portion */ 186 1.45 rpaulo uint32_t bh_datalen; /* original length of packet */ 187 1.45 rpaulo uint16_t bh_hdrlen; /* length of bpf header (this struct 188 1.1 cgd plus alignment padding) */ 189 1.1 cgd }; 190 1.58 bouyer 191 1.58 bouyer struct bpf_hdr32 { 192 1.58 bouyer struct bpf_timeval32 bh_tstamp; /* time stamp */ 193 1.58 bouyer uint32_t bh_caplen; /* length of captured portion */ 194 1.58 bouyer uint32_t bh_datalen; /* original length of packet */ 195 1.58 bouyer uint16_t bh_hdrlen; /* length of bpf header (this struct 196 1.58 bouyer plus alignment padding) */ 197 1.58 bouyer }; 198 1.1 cgd /* 199 1.1 cgd * Because the structure above is not a multiple of 4 bytes, some compilers 200 1.1 cgd * will insist on inserting padding; hence, sizeof(struct bpf_hdr) won't work. 201 1.1 cgd * Only the kernel needs to know about it; applications use bh_hdrlen. 202 1.14 cgd * XXX To save a few bytes on 32-bit machines, we avoid end-of-struct 203 1.14 cgd * XXX padding by using the size of the header data elements. This is 204 1.14 cgd * XXX fail-safe: on new machines, we just use the 'safe' sizeof. 205 1.1 cgd */ 206 1.10 jtc #ifdef _KERNEL 207 1.82 rin #if defined(__mips64) 208 1.82 rin #define SIZEOF_BPF_HDR sizeof(struct bpf_hdr) 209 1.82 rin #define SIZEOF_BPF_HDR32 18 210 1.82 rin #elif defined(__arm32__) || defined(__i386__) || defined(__m68k__) || \ 211 1.26 eeh defined(__mips__) || defined(__ns32k__) || defined(__vax__) || \ 212 1.29 thorpej defined(__sh__) || (defined(__sparc__) && !defined(__sparc64__)) 213 1.1 cgd #define SIZEOF_BPF_HDR 18 214 1.58 bouyer #define SIZEOF_BPF_HDR32 18 215 1.14 cgd #else 216 1.14 cgd #define SIZEOF_BPF_HDR sizeof(struct bpf_hdr) 217 1.58 bouyer #define SIZEOF_BPF_HDR32 sizeof(struct bpf_hdr32) 218 1.14 cgd #endif 219 1.1 cgd #endif 220 1.1 cgd 221 1.28 thorpej /* Pull in data-link level type codes. */ 222 1.28 thorpej #include <net/dlt.h> 223 1.23 thorpej 224 1.1 cgd /* 225 1.44 rpaulo * The instruction encodings. 226 1.1 cgd */ 227 1.2 cgd /* instruction classes */ 228 1.1 cgd #define BPF_CLASS(code) ((code) & 0x07) 229 1.1 cgd #define BPF_LD 0x00 230 1.1 cgd #define BPF_LDX 0x01 231 1.1 cgd #define BPF_ST 0x02 232 1.1 cgd #define BPF_STX 0x03 233 1.1 cgd #define BPF_ALU 0x04 234 1.1 cgd #define BPF_JMP 0x05 235 1.1 cgd #define BPF_RET 0x06 236 1.1 cgd #define BPF_MISC 0x07 237 1.1 cgd 238 1.1 cgd /* ld/ldx fields */ 239 1.1 cgd #define BPF_SIZE(code) ((code) & 0x18) 240 1.1 cgd #define BPF_W 0x00 241 1.1 cgd #define BPF_H 0x08 242 1.1 cgd #define BPF_B 0x10 243 1.66 christos /* 0x18 reserved; used by BSD/OS */ 244 1.1 cgd #define BPF_MODE(code) ((code) & 0xe0) 245 1.1 cgd #define BPF_IMM 0x00 246 1.1 cgd #define BPF_ABS 0x20 247 1.1 cgd #define BPF_IND 0x40 248 1.1 cgd #define BPF_MEM 0x60 249 1.1 cgd #define BPF_LEN 0x80 250 1.1 cgd #define BPF_MSH 0xa0 251 1.66 christos /* 0xc0 reserved; used by BSD/OS */ 252 1.66 christos /* 0xe0 reserved; used by BSD/OS */ 253 1.1 cgd 254 1.1 cgd /* alu/jmp fields */ 255 1.1 cgd #define BPF_OP(code) ((code) & 0xf0) 256 1.1 cgd #define BPF_ADD 0x00 257 1.1 cgd #define BPF_SUB 0x10 258 1.1 cgd #define BPF_MUL 0x20 259 1.1 cgd #define BPF_DIV 0x30 260 1.1 cgd #define BPF_OR 0x40 261 1.1 cgd #define BPF_AND 0x50 262 1.1 cgd #define BPF_LSH 0x60 263 1.1 cgd #define BPF_RSH 0x70 264 1.1 cgd #define BPF_NEG 0x80 265 1.66 christos #define BPF_MOD 0x90 266 1.66 christos #define BPF_XOR 0xa0 267 1.66 christos /* 0xb0 reserved */ 268 1.66 christos /* 0xc0 reserved */ 269 1.66 christos /* 0xd0 reserved */ 270 1.66 christos /* 0xe0 reserved */ 271 1.66 christos /* 0xf0 reserved */ 272 1.1 cgd #define BPF_JA 0x00 273 1.1 cgd #define BPF_JEQ 0x10 274 1.1 cgd #define BPF_JGT 0x20 275 1.1 cgd #define BPF_JGE 0x30 276 1.1 cgd #define BPF_JSET 0x40 277 1.66 christos /* 0x50 reserved; used by BSD/OS */ 278 1.66 christos /* 0x60 reserved */ 279 1.66 christos /* 0x70 reserved */ 280 1.66 christos /* 0x80 reserved */ 281 1.66 christos /* 0x90 reserved */ 282 1.66 christos /* 0xa0 reserved */ 283 1.66 christos /* 0xb0 reserved */ 284 1.66 christos /* 0xc0 reserved */ 285 1.66 christos /* 0xd0 reserved */ 286 1.66 christos /* 0xe0 reserved */ 287 1.66 christos /* 0xf0 reserved */ 288 1.1 cgd #define BPF_SRC(code) ((code) & 0x08) 289 1.1 cgd #define BPF_K 0x00 290 1.1 cgd #define BPF_X 0x08 291 1.1 cgd 292 1.1 cgd /* ret - BPF_K and BPF_X also apply */ 293 1.1 cgd #define BPF_RVAL(code) ((code) & 0x18) 294 1.1 cgd #define BPF_A 0x10 295 1.66 christos /* 0x18 reserved */ 296 1.1 cgd 297 1.1 cgd /* misc */ 298 1.1 cgd #define BPF_MISCOP(code) ((code) & 0xf8) 299 1.1 cgd #define BPF_TAX 0x00 300 1.66 christos /* 0x10 reserved */ 301 1.66 christos /* 0x18 reserved */ 302 1.60 rmind #define BPF_COP 0x20 303 1.66 christos /* 0x28 reserved */ 304 1.66 christos /* 0x30 reserved */ 305 1.66 christos /* 0x38 reserved */ 306 1.66 christos #define BPF_COPX 0x40 /* XXX: also used by BSD/OS */ 307 1.66 christos /* 0x48 reserved */ 308 1.66 christos /* 0x50 reserved */ 309 1.66 christos /* 0x58 reserved */ 310 1.66 christos /* 0x60 reserved */ 311 1.66 christos /* 0x68 reserved */ 312 1.66 christos /* 0x70 reserved */ 313 1.66 christos /* 0x78 reserved */ 314 1.1 cgd #define BPF_TXA 0x80 315 1.66 christos /* 0x88 reserved */ 316 1.66 christos /* 0x90 reserved */ 317 1.66 christos /* 0x98 reserved */ 318 1.66 christos /* 0xa0 reserved */ 319 1.66 christos /* 0xa8 reserved */ 320 1.66 christos /* 0xb0 reserved */ 321 1.66 christos /* 0xb8 reserved */ 322 1.66 christos /* 0xc0 reserved; used by BSD/OS */ 323 1.66 christos /* 0xc8 reserved */ 324 1.66 christos /* 0xd0 reserved */ 325 1.66 christos /* 0xd8 reserved */ 326 1.66 christos /* 0xe0 reserved */ 327 1.66 christos /* 0xe8 reserved */ 328 1.66 christos /* 0xf0 reserved */ 329 1.66 christos /* 0xf8 reserved */ 330 1.1 cgd 331 1.1 cgd /* 332 1.1 cgd * The instruction data structure. 333 1.1 cgd */ 334 1.1 cgd struct bpf_insn { 335 1.45 rpaulo uint16_t code; 336 1.11 cgd u_char jt; 337 1.11 cgd u_char jf; 338 1.46 rpaulo uint32_t k; 339 1.1 cgd }; 340 1.1 cgd 341 1.1 cgd /* 342 1.73 christos * Auxiliary data, for use when interpreting a filter intended for the 343 1.73 christos * Linux kernel when the kernel rejects the filter (requiring us to 344 1.73 christos * run it in userland). It contains VLAN tag information. 345 1.73 christos */ 346 1.73 christos struct bpf_aux_data { 347 1.73 christos u_short vlan_tag_present; 348 1.73 christos u_short vlan_tag; 349 1.73 christos }; 350 1.73 christos 351 1.73 christos /* 352 1.1 cgd * Macros for insn array initializers. 353 1.1 cgd */ 354 1.45 rpaulo #define BPF_STMT(code, k) { (uint16_t)(code), 0, 0, k } 355 1.45 rpaulo #define BPF_JUMP(code, k, jt, jf) { (uint16_t)(code), jt, jf, k } 356 1.1 cgd 357 1.30 onoe /* 358 1.63 rmind * Number of scratch memory words (for BPF_LD|BPF_MEM and BPF_ST). 359 1.63 rmind */ 360 1.65 rmind #define BPF_MEMWORDS 16 361 1.63 rmind 362 1.63 rmind /* 363 1.65 rmind * bpf_memword_init_t: bits indicate which words in the external memory 364 1.65 rmind * store will be initialised by the caller before BPF program execution. 365 1.64 alnsn */ 366 1.64 alnsn typedef uint32_t bpf_memword_init_t; 367 1.65 rmind #define BPF_MEMWORD_INIT(k) (UINT32_C(1) << (k)) 368 1.64 alnsn 369 1.65 rmind /* Note: two most significant bits are reserved by bpfjit. */ 370 1.64 alnsn __CTASSERT(BPF_MEMWORDS + 2 <= sizeof(bpf_memword_init_t) * NBBY); 371 1.64 alnsn 372 1.64 alnsn #ifdef _KERNEL 373 1.64 alnsn /* 374 1.64 alnsn * Max number of external memory words (for BPF_LD|BPF_MEM and BPF_ST). 375 1.64 alnsn */ 376 1.64 alnsn #define BPF_MAX_MEMWORDS 30 377 1.65 rmind 378 1.64 alnsn __CTASSERT(BPF_MAX_MEMWORDS >= BPF_MEMWORDS); 379 1.64 alnsn __CTASSERT(BPF_MAX_MEMWORDS + 2 <= sizeof(bpf_memword_init_t) * NBBY); 380 1.64 alnsn #endif 381 1.64 alnsn 382 1.64 alnsn /* 383 1.30 onoe * Structure to retrieve available DLTs for the interface. 384 1.30 onoe */ 385 1.30 onoe struct bpf_dltlist { 386 1.30 onoe u_int bfl_len; /* number of bfd_list array */ 387 1.30 onoe u_int *bfl_list; /* array of DLTs */ 388 1.30 onoe }; 389 1.30 onoe 390 1.63 rmind struct bpf_ctx; 391 1.63 rmind typedef struct bpf_ctx bpf_ctx_t; 392 1.63 rmind 393 1.65 rmind typedef struct bpf_args { 394 1.64 alnsn const uint8_t * pkt; 395 1.64 alnsn size_t wirelen; 396 1.64 alnsn size_t buflen; 397 1.64 alnsn /* 398 1.64 alnsn * The following arguments are used only by some kernel 399 1.64 alnsn * subsystems. 400 1.64 alnsn * They aren't required for classical bpf filter programs. 401 1.64 alnsn * For such programs, bpfjit generated code doesn't read 402 1.64 alnsn * those arguments at all. Note however that bpf interpreter 403 1.64 alnsn * always needs a pointer to memstore. 404 1.64 alnsn */ 405 1.64 alnsn uint32_t * mem; /* pointer to external memory store */ 406 1.64 alnsn void * arg; /* auxiliary argument for a copfunc */ 407 1.65 rmind } bpf_args_t; 408 1.63 rmind 409 1.64 alnsn #if defined(_KERNEL) || defined(__BPF_PRIVATE) 410 1.65 rmind 411 1.64 alnsn typedef uint32_t (*bpf_copfunc_t)(const bpf_ctx_t *, bpf_args_t *, uint32_t); 412 1.64 alnsn 413 1.63 rmind struct bpf_ctx { 414 1.65 rmind /* 415 1.65 rmind * BPF coprocessor functions and the number of them. 416 1.65 rmind */ 417 1.63 rmind const bpf_copfunc_t * copfuncs; 418 1.63 rmind size_t nfuncs; 419 1.65 rmind 420 1.64 alnsn /* 421 1.65 rmind * The number of memory words in the external memory store. 422 1.65 rmind * There may be up to BPF_MAX_MEMWORDS words; if zero is set, 423 1.65 rmind * then the internal memory store is used which has a fixed 424 1.65 rmind * number of words (BPF_MEMWORDS). 425 1.64 alnsn */ 426 1.64 alnsn size_t extwords; 427 1.65 rmind 428 1.65 rmind /* 429 1.65 rmind * The bitmask indicating which words in the external memstore 430 1.65 rmind * will be initialised by the caller. 431 1.65 rmind */ 432 1.65 rmind bpf_memword_init_t preinited; 433 1.63 rmind }; 434 1.63 rmind #endif 435 1.63 rmind 436 1.10 jtc #ifdef _KERNEL 437 1.63 rmind #include <net/bpfjit.h> 438 1.55 joerg #include <net/if.h> 439 1.63 rmind 440 1.51 pooka struct bpf_if; 441 1.51 pooka 442 1.52 pooka struct bpf_ops { 443 1.52 pooka void (*bpf_attach)(struct ifnet *, u_int, u_int, struct bpf_if **); 444 1.52 pooka void (*bpf_detach)(struct ifnet *); 445 1.52 pooka void (*bpf_change_type)(struct ifnet *, u_int, u_int); 446 1.52 pooka 447 1.72 msaitoh void (*bpf_mtap)(struct bpf_if *, struct mbuf *, u_int); 448 1.72 msaitoh void (*bpf_mtap2)(struct bpf_if *, void *, u_int, struct mbuf *, 449 1.72 msaitoh u_int); 450 1.72 msaitoh void (*bpf_mtap_af)(struct bpf_if *, uint32_t, struct mbuf *, u_int); 451 1.52 pooka void (*bpf_mtap_sl_in)(struct bpf_if *, u_char *, struct mbuf **); 452 1.52 pooka void (*bpf_mtap_sl_out)(struct bpf_if *, u_char *, struct mbuf *); 453 1.69 ozaki 454 1.69 ozaki void (*bpf_mtap_softint_init)(struct ifnet *); 455 1.69 ozaki void (*bpf_mtap_softint)(struct ifnet *, struct mbuf *); 456 1.77 martin 457 1.77 martin int (*bpf_register_track_event)(struct bpf_if **, 458 1.77 martin void (*)(struct bpf_if *, struct ifnet *, int, int)); 459 1.77 martin int (*bpf_deregister_track_event)(struct bpf_if **, 460 1.77 martin void (*)(struct bpf_if *, struct ifnet *, int, int)); 461 1.52 pooka }; 462 1.55 joerg 463 1.52 pooka extern struct bpf_ops *bpf_ops; 464 1.55 joerg 465 1.70 christos static __inline void 466 1.55 joerg bpf_attach(struct ifnet *_ifp, u_int _dlt, u_int _hdrlen) 467 1.55 joerg { 468 1.55 joerg bpf_ops->bpf_attach(_ifp, _dlt, _hdrlen, &_ifp->if_bpf); 469 1.55 joerg } 470 1.55 joerg 471 1.70 christos static __inline void 472 1.55 joerg bpf_attach2(struct ifnet *_ifp, u_int _dlt, u_int _hdrlen, struct bpf_if **_dp) 473 1.55 joerg { 474 1.55 joerg bpf_ops->bpf_attach(_ifp, _dlt, _hdrlen, _dp); 475 1.55 joerg } 476 1.55 joerg 477 1.70 christos static __inline void 478 1.72 msaitoh bpf_mtap(struct ifnet *_ifp, struct mbuf *_m, u_int _direction) 479 1.55 joerg { 480 1.78 yamaguch if (_ifp->if_bpf) { 481 1.78 yamaguch if (_ifp->if_bpf_mtap) { 482 1.78 yamaguch _ifp->if_bpf_mtap(_ifp->if_bpf, _m, _direction); 483 1.78 yamaguch } else { 484 1.78 yamaguch bpf_ops->bpf_mtap(_ifp->if_bpf, _m, _direction); 485 1.78 yamaguch } 486 1.78 yamaguch } 487 1.55 joerg } 488 1.55 joerg 489 1.70 christos static __inline void 490 1.72 msaitoh bpf_mtap2(struct bpf_if *_bpf, void *_data, u_int _dlen, struct mbuf *_m, 491 1.72 msaitoh u_int _direction) 492 1.55 joerg { 493 1.72 msaitoh bpf_ops->bpf_mtap2(_bpf, _data, _dlen, _m, _direction); 494 1.55 joerg } 495 1.55 joerg 496 1.70 christos static __inline void 497 1.72 msaitoh bpf_mtap3(struct bpf_if *_bpf, struct mbuf *_m, u_int _direction) 498 1.55 joerg { 499 1.55 joerg if (_bpf) 500 1.72 msaitoh bpf_ops->bpf_mtap(_bpf, _m, _direction); 501 1.55 joerg } 502 1.55 joerg 503 1.70 christos static __inline void 504 1.72 msaitoh bpf_mtap_af(struct ifnet *_ifp, uint32_t _af, struct mbuf *_m, 505 1.72 msaitoh u_int _direction) 506 1.55 joerg { 507 1.55 joerg if (_ifp->if_bpf) 508 1.72 msaitoh bpf_ops->bpf_mtap_af(_ifp->if_bpf, _af, _m, _direction); 509 1.55 joerg } 510 1.55 joerg 511 1.70 christos static __inline void 512 1.55 joerg bpf_change_type(struct ifnet *_ifp, u_int _dlt, u_int _hdrlen) 513 1.55 joerg { 514 1.55 joerg bpf_ops->bpf_change_type(_ifp, _dlt, _hdrlen); 515 1.55 joerg } 516 1.55 joerg 517 1.76 martin static __inline bool 518 1.76 martin bpf_peers_present(struct bpf_if *dp) 519 1.76 martin { 520 1.76 martin /* 521 1.76 martin * Our code makes sure the driver visible pointer is NULL 522 1.76 martin * whenever there is no listener on this tap. 523 1.76 martin */ 524 1.76 martin return dp != NULL; 525 1.76 martin } 526 1.76 martin 527 1.70 christos static __inline void 528 1.55 joerg bpf_detach(struct ifnet *_ifp) 529 1.55 joerg { 530 1.55 joerg bpf_ops->bpf_detach(_ifp); 531 1.55 joerg } 532 1.55 joerg 533 1.70 christos static __inline void 534 1.55 joerg bpf_mtap_sl_in(struct ifnet *_ifp, u_char *_hdr, struct mbuf **_m) 535 1.55 joerg { 536 1.55 joerg bpf_ops->bpf_mtap_sl_in(_ifp->if_bpf, _hdr, _m); 537 1.55 joerg } 538 1.55 joerg 539 1.70 christos static __inline void 540 1.55 joerg bpf_mtap_sl_out(struct ifnet *_ifp, u_char *_hdr, struct mbuf *_m) 541 1.55 joerg { 542 1.55 joerg if (_ifp->if_bpf) 543 1.55 joerg bpf_ops->bpf_mtap_sl_out(_ifp->if_bpf, _hdr, _m); 544 1.55 joerg } 545 1.55 joerg 546 1.70 christos static __inline void 547 1.69 ozaki bpf_mtap_softint_init(struct ifnet *_ifp) 548 1.69 ozaki { 549 1.69 ozaki 550 1.69 ozaki bpf_ops->bpf_mtap_softint_init(_ifp); 551 1.69 ozaki } 552 1.69 ozaki 553 1.70 christos static __inline void 554 1.69 ozaki bpf_mtap_softint(struct ifnet *_ifp, struct mbuf *_m) 555 1.69 ozaki { 556 1.69 ozaki 557 1.69 ozaki if (_ifp->if_bpf) 558 1.69 ozaki bpf_ops->bpf_mtap_softint(_ifp, _m); 559 1.69 ozaki } 560 1.55 joerg 561 1.77 martin static __inline int 562 1.77 martin bpf_register_track_event(struct bpf_if **_dp, 563 1.77 martin void (*_fun)(struct bpf_if *, struct ifnet *, int, int)) 564 1.77 martin { 565 1.77 martin if (bpf_ops->bpf_register_track_event == NULL) 566 1.77 martin return ENXIO; 567 1.77 martin return bpf_ops->bpf_register_track_event(_dp, _fun); 568 1.77 martin } 569 1.77 martin 570 1.77 martin static __inline int 571 1.77 martin bpf_deregister_track_event(struct bpf_if **_dp, 572 1.77 martin void (*_fun)(struct bpf_if *, struct ifnet *, int, int)) 573 1.77 martin { 574 1.77 martin if (bpf_ops->bpf_deregister_track_event == NULL) 575 1.77 martin return ENXIO; 576 1.77 martin return bpf_ops->bpf_deregister_track_event(_dp, _fun); 577 1.77 martin } 578 1.77 martin 579 1.65 rmind void bpf_setops(void); 580 1.52 pooka 581 1.65 rmind void bpf_ops_handover_enter(struct bpf_ops *); 582 1.65 rmind void bpf_ops_handover_exit(void); 583 1.53 pooka 584 1.65 rmind void bpfilterattach(int); 585 1.52 pooka 586 1.60 rmind bpf_ctx_t *bpf_create(void); 587 1.60 rmind void bpf_destroy(bpf_ctx_t *); 588 1.60 rmind 589 1.65 rmind int bpf_set_cop(bpf_ctx_t *, const bpf_copfunc_t *, size_t); 590 1.65 rmind int bpf_set_extmem(bpf_ctx_t *, size_t, bpf_memword_init_t); 591 1.65 rmind u_int bpf_filter_ext(const bpf_ctx_t *, const struct bpf_insn *, bpf_args_t *); 592 1.65 rmind int bpf_validate_ext(const bpf_ctx_t *, const struct bpf_insn *, int); 593 1.60 rmind 594 1.63 rmind bpfjit_func_t bpf_jit_generate(bpf_ctx_t *, void *, size_t); 595 1.63 rmind void bpf_jit_freecode(bpfjit_func_t); 596 1.63 rmind 597 1.62 rmind #endif 598 1.60 rmind 599 1.60 rmind int bpf_validate(const struct bpf_insn *, int); 600 1.60 rmind u_int bpf_filter(const struct bpf_insn *, const u_char *, u_int, u_int); 601 1.60 rmind 602 1.73 christos u_int bpf_filter_with_aux_data(const struct bpf_insn *, const u_char *, u_int, u_int, const struct bpf_aux_data *); 603 1.73 christos 604 1.77 martin /* 605 1.77 martin * events to be tracked by bpf_register_track_event callbacks 606 1.77 martin */ 607 1.77 martin #define BPF_TRACK_EVENT_ATTACH 1 608 1.77 martin #define BPF_TRACK_EVENT_DETACH 2 609 1.77 martin 610 1.81 christos void bpf_dump(const struct bpf_program *, int); 611 1.81 christos char *bpf_image(const struct bpf_insn *, int); 612 1.73 christos 613 1.59 christos __END_DECLS 614 1.59 christos 615 1.80 christos #if 1 /* XXX: remove me, for the benefit of sanitizers */ 616 1.80 christos #define BIOCGSTATSOLD BIOCGSTATS_30 617 1.80 christos #define bpf_stat_old bpf_stat30 618 1.80 christos #endif 619 1.80 christos 620 1.48 elad #endif /* !_NET_BPF_H_ */ 621