Home | History | Annotate | Line # | Download | only in net
bpf.h revision 1.54.2.2
      1  1.54.2.2     rmind /*	$NetBSD: bpf.h,v 1.54.2.2 2011/03/05 20:55:51 rmind Exp $	*/
      2       1.6       cgd 
      3       1.5   mycroft /*
      4       1.5   mycroft  * Copyright (c) 1990, 1991, 1993
      5       1.5   mycroft  *	The Regents of the University of California.  All rights reserved.
      6       1.1       cgd  *
      7       1.1       cgd  * This code is derived from the Stanford/CMU enet packet filter,
      8       1.1       cgd  * (net/enet.c) distributed as part of 4.3BSD, and code contributed
      9       1.5   mycroft  * to Berkeley by Steven McCanne and Van Jacobson both of Lawrence
     10       1.2       cgd  * Berkeley Laboratory.
     11       1.1       cgd  *
     12       1.1       cgd  * Redistribution and use in source and binary forms, with or without
     13       1.1       cgd  * modification, are permitted provided that the following conditions
     14       1.1       cgd  * are met:
     15       1.1       cgd  * 1. Redistributions of source code must retain the above copyright
     16       1.1       cgd  *    notice, this list of conditions and the following disclaimer.
     17       1.1       cgd  * 2. Redistributions in binary form must reproduce the above copyright
     18       1.1       cgd  *    notice, this list of conditions and the following disclaimer in the
     19       1.1       cgd  *    documentation and/or other materials provided with the distribution.
     20      1.32       agc  * 3. Neither the name of the University nor the names of its contributors
     21       1.1       cgd  *    may be used to endorse or promote products derived from this software
     22       1.1       cgd  *    without specific prior written permission.
     23       1.1       cgd  *
     24       1.1       cgd  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
     25       1.1       cgd  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     26       1.1       cgd  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     27       1.1       cgd  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
     28       1.1       cgd  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     29       1.1       cgd  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     30       1.1       cgd  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     31       1.1       cgd  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     32       1.1       cgd  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     33       1.1       cgd  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     34       1.1       cgd  * SUCH DAMAGE.
     35       1.1       cgd  *
     36      1.19      fvdl  *	@(#)bpf.h	8.2 (Berkeley) 1/9/95
     37      1.17  christos  * @(#) Header: bpf.h,v 1.36 97/06/12 14:29:53 leres Exp  (LBL)
     38       1.1       cgd  */
     39       1.1       cgd 
     40       1.8       jtc #ifndef _NET_BPF_H_
     41       1.8       jtc #define _NET_BPF_H_
     42      1.27   thorpej 
     43      1.27   thorpej #include <sys/time.h>
     44       1.8       jtc 
     45      1.17  christos /* BSD style release date */
     46      1.17  christos #define BPF_RELEASE 199606
     47      1.18  christos 
     48      1.18  christos typedef	int bpf_int32;
     49      1.18  christos typedef	u_int bpf_u_int32;
     50      1.17  christos 
     51       1.1       cgd /*
     52      1.42     perry  * Alignment macros.  BPF_WORDALIGN rounds up to the next
     53      1.42     perry  * even multiple of BPF_ALIGNMENT.
     54       1.1       cgd  */
     55       1.1       cgd #define BPF_ALIGNMENT sizeof(long)
     56       1.1       cgd #define BPF_WORDALIGN(x) (((x)+(BPF_ALIGNMENT-1))&~(BPF_ALIGNMENT-1))
     57       1.1       cgd 
     58       1.1       cgd #define BPF_MAXINSNS 512
     59      1.33  jonathan #define BPF_DFLTBUFSIZE (1024*1024)	/* default static upper limit */
     60      1.33  jonathan #define BPF_MAXBUFSIZE (1024*1024*16)	/* hard limit on sysctl'able value */
     61       1.2       cgd #define BPF_MINBUFSIZE 32
     62       1.1       cgd 
     63       1.1       cgd /*
     64       1.1       cgd  *  Structure for BIOCSETF.
     65       1.1       cgd  */
     66       1.1       cgd struct bpf_program {
     67       1.1       cgd 	u_int bf_len;
     68       1.1       cgd 	struct bpf_insn *bf_insns;
     69       1.1       cgd };
     70      1.42     perry 
     71       1.1       cgd /*
     72      1.43    rpaulo  * Struct returned by BIOCGSTATS and net.bpf.stats sysctl.
     73       1.1       cgd  */
     74       1.1       cgd struct bpf_stat {
     75      1.45    rpaulo 	uint64_t bs_recv;	/* number of packets received */
     76      1.45    rpaulo 	uint64_t bs_drop;	/* number of packets dropped */
     77      1.45    rpaulo 	uint64_t bs_capt;	/* number of packets captured */
     78      1.45    rpaulo 	uint64_t bs_padding[13];
     79      1.35   darrenr };
     80      1.42     perry 
     81      1.35   darrenr /*
     82      1.35   darrenr  * Struct returned by BIOCGSTATSOLD.
     83      1.35   darrenr  */
     84      1.35   darrenr struct bpf_stat_old {
     85       1.1       cgd 	u_int bs_recv;		/* number of packets received */
     86       1.1       cgd 	u_int bs_drop;		/* number of packets dropped */
     87       1.1       cgd };
     88       1.1       cgd 
     89       1.1       cgd /*
     90      1.42     perry  * Struct return by BIOCVERSION.  This represents the version number of
     91       1.2       cgd  * the filter language described by the instruction encodings below.
     92       1.2       cgd  * bpf understands a program iff kernel_major == filter_major &&
     93       1.2       cgd  * kernel_minor >= filter_minor, that is, if the value returned by the
     94       1.2       cgd  * running kernel has the same major number and a minor number equal
     95       1.2       cgd  * equal to or less than the filter being downloaded.  Otherwise, the
     96       1.2       cgd  * results are undefined, meaning an error may be returned or packets
     97       1.2       cgd  * may be accepted haphazardly.
     98       1.2       cgd  * It has nothing to do with the source code version.
     99       1.2       cgd  */
    100       1.2       cgd struct bpf_version {
    101       1.2       cgd 	u_short bv_major;
    102       1.2       cgd 	u_short bv_minor;
    103       1.2       cgd };
    104       1.9   mycroft /* Current version number of filter architecture. */
    105       1.2       cgd #define BPF_MAJOR_VERSION 1
    106       1.2       cgd #define BPF_MINOR_VERSION 1
    107       1.2       cgd 
    108       1.2       cgd /*
    109       1.1       cgd  * BPF ioctls
    110       1.1       cgd  *
    111       1.1       cgd  * The first set is for compatibility with Sun's pcc style
    112       1.1       cgd  * header files.  If your using gcc, we assume that you
    113       1.1       cgd  * have run fixincludes so the latter set should work.
    114       1.1       cgd  */
    115      1.34   darrenr #define BIOCGBLEN	 _IOR('B',102, u_int)
    116      1.34   darrenr #define BIOCSBLEN	_IOWR('B',102, u_int)
    117      1.34   darrenr #define BIOCSETF	 _IOW('B',103, struct bpf_program)
    118      1.34   darrenr #define BIOCFLUSH	  _IO('B',104)
    119      1.31   thorpej #define BIOCPROMISC	  _IO('B',105)
    120      1.34   darrenr #define BIOCGDLT	 _IOR('B',106, u_int)
    121      1.31   thorpej #define BIOCGETIF	 _IOR('B',107, struct ifreq)
    122      1.31   thorpej #define BIOCSETIF	 _IOW('B',108, struct ifreq)
    123      1.49  christos #ifdef COMPAT_50
    124      1.49  christos #include <compat/sys/time.h>
    125      1.49  christos #define BIOCSORTIMEOUT	 _IOW('B',109, struct timeval50)
    126      1.49  christos #define BIOCGORTIMEOUT	 _IOR('B',110, struct timeval50)
    127      1.49  christos #endif
    128      1.31   thorpej #define BIOCGSTATS	 _IOR('B',111, struct bpf_stat)
    129      1.35   darrenr #define BIOCGSTATSOLD	 _IOR('B',111, struct bpf_stat_old)
    130      1.31   thorpej #define BIOCIMMEDIATE	 _IOW('B',112, u_int)
    131      1.31   thorpej #define BIOCVERSION	 _IOR('B',113, struct bpf_version)
    132      1.31   thorpej #define BIOCSTCPF	 _IOW('B',114, struct bpf_program)
    133      1.31   thorpej #define BIOCSUDPF	 _IOW('B',115, struct bpf_program)
    134      1.34   darrenr #define BIOCGHDRCMPLT	 _IOR('B',116, u_int)
    135      1.34   darrenr #define BIOCSHDRCMPLT	 _IOW('B',117, u_int)
    136      1.34   darrenr #define BIOCSDLT	 _IOW('B',118, u_int)
    137      1.34   darrenr #define BIOCGDLTLIST	_IOWR('B',119, struct bpf_dltlist)
    138      1.34   darrenr #define BIOCGSEESENT	 _IOR('B',120, u_int)
    139      1.34   darrenr #define BIOCSSEESENT	 _IOW('B',121, u_int)
    140      1.49  christos #define BIOCSRTIMEOUT	 _IOW('B',122, struct timeval)
    141      1.49  christos #define BIOCGRTIMEOUT	 _IOR('B',123, struct timeval)
    142      1.54  christos #define BIOCGFEEDBACK	 _IOR('B',124, u_int)
    143      1.54  christos #define BIOCSFEEDBACK	 _IOW('B',125, u_int)
    144      1.54  christos #define BIOCFEEDBACK     BIOCSFEEDBACK		/* FreeBSD name */
    145       1.1       cgd 
    146       1.1       cgd /*
    147      1.49  christos  * Structure prepended to each packet. This is "wire" format, so we
    148      1.50  christos  * cannot change it unfortunately to 64 bit times on 32 bit systems [yet].
    149       1.1       cgd  */
    150      1.50  christos struct bpf_timeval {
    151      1.50  christos 	long tv_sec;
    152      1.50  christos 	long tv_usec;
    153      1.49  christos };
    154      1.50  christos 
    155       1.1       cgd struct bpf_hdr {
    156      1.50  christos 	struct bpf_timeval bh_tstamp;	/* time stamp */
    157      1.45    rpaulo 	uint32_t	bh_caplen;	/* length of captured portion */
    158      1.45    rpaulo 	uint32_t	bh_datalen;	/* original length of packet */
    159      1.45    rpaulo 	uint16_t	bh_hdrlen;	/* length of bpf header (this struct
    160       1.1       cgd 					   plus alignment padding) */
    161       1.1       cgd };
    162       1.1       cgd /*
    163       1.1       cgd  * Because the structure above is not a multiple of 4 bytes, some compilers
    164       1.1       cgd  * will insist on inserting padding; hence, sizeof(struct bpf_hdr) won't work.
    165       1.1       cgd  * Only the kernel needs to know about it; applications use bh_hdrlen.
    166      1.14       cgd  * XXX To save a few bytes on 32-bit machines, we avoid end-of-struct
    167      1.14       cgd  * XXX padding by using the size of the header data elements.  This is
    168      1.14       cgd  * XXX fail-safe: on new machines, we just use the 'safe' sizeof.
    169       1.1       cgd  */
    170      1.10       jtc #ifdef _KERNEL
    171      1.14       cgd #if defined(__arm32__) || defined(__i386__) || defined(__m68k__) || \
    172      1.26       eeh     defined(__mips__) || defined(__ns32k__) || defined(__vax__) || \
    173      1.29   thorpej     defined(__sh__) || (defined(__sparc__) && !defined(__sparc64__))
    174       1.1       cgd #define SIZEOF_BPF_HDR 18
    175      1.14       cgd #else
    176      1.14       cgd #define SIZEOF_BPF_HDR sizeof(struct bpf_hdr)
    177      1.14       cgd #endif
    178       1.1       cgd #endif
    179       1.1       cgd 
    180      1.28   thorpej /* Pull in data-link level type codes. */
    181      1.28   thorpej #include <net/dlt.h>
    182      1.23   thorpej 
    183       1.1       cgd /*
    184      1.44    rpaulo  * The instruction encodings.
    185       1.1       cgd  */
    186       1.2       cgd /* instruction classes */
    187       1.1       cgd #define BPF_CLASS(code) ((code) & 0x07)
    188       1.1       cgd #define		BPF_LD		0x00
    189       1.1       cgd #define		BPF_LDX		0x01
    190       1.1       cgd #define		BPF_ST		0x02
    191       1.1       cgd #define		BPF_STX		0x03
    192       1.1       cgd #define		BPF_ALU		0x04
    193       1.1       cgd #define		BPF_JMP		0x05
    194       1.1       cgd #define		BPF_RET		0x06
    195       1.1       cgd #define		BPF_MISC	0x07
    196       1.1       cgd 
    197       1.1       cgd /* ld/ldx fields */
    198       1.1       cgd #define BPF_SIZE(code)	((code) & 0x18)
    199       1.1       cgd #define		BPF_W		0x00
    200       1.1       cgd #define		BPF_H		0x08
    201       1.1       cgd #define		BPF_B		0x10
    202       1.1       cgd #define BPF_MODE(code)	((code) & 0xe0)
    203       1.1       cgd #define		BPF_IMM 	0x00
    204       1.1       cgd #define		BPF_ABS		0x20
    205       1.1       cgd #define		BPF_IND		0x40
    206       1.1       cgd #define		BPF_MEM		0x60
    207       1.1       cgd #define		BPF_LEN		0x80
    208       1.1       cgd #define		BPF_MSH		0xa0
    209       1.1       cgd 
    210       1.1       cgd /* alu/jmp fields */
    211       1.1       cgd #define BPF_OP(code)	((code) & 0xf0)
    212       1.1       cgd #define		BPF_ADD		0x00
    213       1.1       cgd #define		BPF_SUB		0x10
    214       1.1       cgd #define		BPF_MUL		0x20
    215       1.1       cgd #define		BPF_DIV		0x30
    216       1.1       cgd #define		BPF_OR		0x40
    217       1.1       cgd #define		BPF_AND		0x50
    218       1.1       cgd #define		BPF_LSH		0x60
    219       1.1       cgd #define		BPF_RSH		0x70
    220       1.1       cgd #define		BPF_NEG		0x80
    221       1.1       cgd #define		BPF_JA		0x00
    222       1.1       cgd #define		BPF_JEQ		0x10
    223       1.1       cgd #define		BPF_JGT		0x20
    224       1.1       cgd #define		BPF_JGE		0x30
    225       1.1       cgd #define		BPF_JSET	0x40
    226       1.1       cgd #define BPF_SRC(code)	((code) & 0x08)
    227       1.1       cgd #define		BPF_K		0x00
    228       1.1       cgd #define		BPF_X		0x08
    229       1.1       cgd 
    230       1.1       cgd /* ret - BPF_K and BPF_X also apply */
    231       1.1       cgd #define BPF_RVAL(code)	((code) & 0x18)
    232       1.1       cgd #define		BPF_A		0x10
    233       1.1       cgd 
    234       1.1       cgd /* misc */
    235       1.1       cgd #define BPF_MISCOP(code) ((code) & 0xf8)
    236       1.1       cgd #define		BPF_TAX		0x00
    237       1.1       cgd #define		BPF_TXA		0x80
    238       1.1       cgd 
    239       1.1       cgd /*
    240       1.1       cgd  * The instruction data structure.
    241       1.1       cgd  */
    242       1.1       cgd struct bpf_insn {
    243      1.45    rpaulo 	uint16_t  code;
    244      1.11       cgd 	u_char 	  jt;
    245      1.11       cgd 	u_char 	  jf;
    246      1.46    rpaulo 	uint32_t  k;
    247       1.1       cgd };
    248       1.1       cgd 
    249       1.1       cgd /*
    250       1.1       cgd  * Macros for insn array initializers.
    251       1.1       cgd  */
    252      1.45    rpaulo #define BPF_STMT(code, k) { (uint16_t)(code), 0, 0, k }
    253      1.45    rpaulo #define BPF_JUMP(code, k, jt, jf) { (uint16_t)(code), jt, jf, k }
    254       1.1       cgd 
    255      1.30      onoe /*
    256      1.30      onoe  * Structure to retrieve available DLTs for the interface.
    257      1.30      onoe  */
    258      1.30      onoe struct bpf_dltlist {
    259      1.30      onoe 	u_int	bfl_len;	/* number of bfd_list array */
    260      1.30      onoe 	u_int	*bfl_list;	/* array of DLTs */
    261      1.30      onoe };
    262      1.30      onoe 
    263      1.10       jtc #ifdef _KERNEL
    264  1.54.2.1     rmind #include <net/if.h>
    265      1.51     pooka struct bpf_if;
    266      1.51     pooka 
    267      1.52     pooka struct bpf_ops {
    268      1.52     pooka 	void (*bpf_attach)(struct ifnet *, u_int, u_int, struct bpf_if **);
    269      1.52     pooka 	void (*bpf_detach)(struct ifnet *);
    270      1.52     pooka 	void (*bpf_change_type)(struct ifnet *, u_int, u_int);
    271      1.52     pooka 
    272      1.52     pooka 	void (*bpf_tap)(struct bpf_if *, u_char *, u_int);
    273      1.52     pooka 	void (*bpf_mtap)(struct bpf_if *, struct mbuf *);
    274      1.52     pooka 	void (*bpf_mtap2)(struct bpf_if *, void *, u_int, struct mbuf *);
    275      1.52     pooka 	void (*bpf_mtap_af)(struct bpf_if *, uint32_t, struct mbuf *);
    276      1.52     pooka 	void (*bpf_mtap_sl_in)(struct bpf_if *, u_char *, struct mbuf **);
    277      1.52     pooka 	void (*bpf_mtap_sl_out)(struct bpf_if *, u_char *, struct mbuf *);
    278      1.52     pooka };
    279  1.54.2.1     rmind 
    280      1.52     pooka extern struct bpf_ops *bpf_ops;
    281  1.54.2.1     rmind 
    282  1.54.2.1     rmind static inline void
    283  1.54.2.1     rmind bpf_attach(struct ifnet *_ifp, u_int _dlt, u_int _hdrlen)
    284  1.54.2.1     rmind {
    285  1.54.2.1     rmind 	bpf_ops->bpf_attach(_ifp, _dlt, _hdrlen, &_ifp->if_bpf);
    286  1.54.2.1     rmind }
    287  1.54.2.1     rmind 
    288  1.54.2.1     rmind static inline void
    289  1.54.2.1     rmind bpf_attach2(struct ifnet *_ifp, u_int _dlt, u_int _hdrlen, struct bpf_if **_dp)
    290  1.54.2.1     rmind {
    291  1.54.2.1     rmind 	bpf_ops->bpf_attach(_ifp, _dlt, _hdrlen, _dp);
    292  1.54.2.1     rmind }
    293  1.54.2.1     rmind 
    294  1.54.2.1     rmind static inline void
    295  1.54.2.1     rmind bpf_tap(struct ifnet *_ifp, u_char *_pkt, u_int _len)
    296  1.54.2.1     rmind {
    297  1.54.2.1     rmind 	if (_ifp->if_bpf)
    298  1.54.2.1     rmind 		bpf_ops->bpf_tap(_ifp->if_bpf, _pkt, _len);
    299  1.54.2.1     rmind }
    300  1.54.2.1     rmind 
    301  1.54.2.1     rmind static inline void
    302  1.54.2.1     rmind bpf_mtap(struct ifnet *_ifp, struct mbuf *_m)
    303  1.54.2.1     rmind {
    304  1.54.2.1     rmind 	if (_ifp->if_bpf)
    305  1.54.2.1     rmind 		bpf_ops->bpf_mtap(_ifp->if_bpf, _m);
    306  1.54.2.1     rmind }
    307  1.54.2.1     rmind 
    308  1.54.2.1     rmind static inline void
    309  1.54.2.1     rmind bpf_mtap2(struct bpf_if *_bpf, void *_data, u_int _dlen, struct mbuf *_m)
    310  1.54.2.1     rmind {
    311  1.54.2.1     rmind 	bpf_ops->bpf_mtap2(_bpf, _data, _dlen, _m);
    312  1.54.2.1     rmind }
    313  1.54.2.1     rmind 
    314  1.54.2.1     rmind static inline void
    315  1.54.2.1     rmind bpf_mtap3(struct bpf_if *_bpf, struct mbuf *_m)
    316  1.54.2.1     rmind {
    317  1.54.2.1     rmind 	if (_bpf)
    318  1.54.2.1     rmind 		bpf_ops->bpf_mtap(_bpf, _m);
    319  1.54.2.1     rmind }
    320  1.54.2.1     rmind 
    321  1.54.2.1     rmind static inline void
    322  1.54.2.1     rmind bpf_mtap_af(struct ifnet *_ifp, uint32_t _af, struct mbuf *_m)
    323  1.54.2.1     rmind {
    324  1.54.2.1     rmind 	if (_ifp->if_bpf)
    325  1.54.2.1     rmind 		bpf_ops->bpf_mtap_af(_ifp->if_bpf, _af, _m);
    326  1.54.2.1     rmind }
    327  1.54.2.1     rmind 
    328  1.54.2.1     rmind static inline void
    329  1.54.2.1     rmind bpf_change_type(struct ifnet *_ifp, u_int _dlt, u_int _hdrlen)
    330  1.54.2.1     rmind {
    331  1.54.2.1     rmind 	bpf_ops->bpf_change_type(_ifp, _dlt, _hdrlen);
    332  1.54.2.1     rmind }
    333  1.54.2.1     rmind 
    334  1.54.2.1     rmind static inline void
    335  1.54.2.1     rmind bpf_detach(struct ifnet *_ifp)
    336  1.54.2.1     rmind {
    337  1.54.2.1     rmind 	bpf_ops->bpf_detach(_ifp);
    338  1.54.2.1     rmind }
    339  1.54.2.1     rmind 
    340  1.54.2.1     rmind static inline void
    341  1.54.2.1     rmind bpf_mtap_sl_in(struct ifnet *_ifp, u_char *_hdr, struct mbuf **_m)
    342  1.54.2.1     rmind {
    343  1.54.2.1     rmind 	bpf_ops->bpf_mtap_sl_in(_ifp->if_bpf, _hdr, _m);
    344  1.54.2.1     rmind }
    345  1.54.2.1     rmind 
    346  1.54.2.1     rmind static inline void
    347  1.54.2.1     rmind bpf_mtap_sl_out(struct ifnet *_ifp, u_char *_hdr, struct mbuf *_m)
    348  1.54.2.1     rmind {
    349  1.54.2.1     rmind 	if (_ifp->if_bpf)
    350  1.54.2.1     rmind 		bpf_ops->bpf_mtap_sl_out(_ifp->if_bpf, _hdr, _m);
    351  1.54.2.1     rmind }
    352  1.54.2.1     rmind 
    353  1.54.2.1     rmind 
    354      1.52     pooka void     bpf_setops(void);
    355      1.52     pooka 
    356      1.53     pooka void     bpf_ops_handover_enter(struct bpf_ops *);
    357      1.53     pooka void     bpf_ops_handover_exit(void);
    358      1.53     pooka 
    359      1.52     pooka void	 bpfilterattach(int);
    360      1.52     pooka 
    361      1.16  christos #endif
    362      1.16  christos 
    363  1.54.2.2     rmind int	 bpf_validate(const struct bpf_insn *, int);
    364  1.54.2.2     rmind u_int	 bpf_filter(const struct bpf_insn *, const u_char *, u_int, u_int);
    365       1.1       cgd 
    366       1.1       cgd /*
    367       1.1       cgd  * Number of scratch memory words (for BPF_LD|BPF_MEM and BPF_ST).
    368       1.1       cgd  */
    369       1.1       cgd #define BPF_MEMWORDS 16
    370       1.2       cgd 
    371      1.48      elad #endif /* !_NET_BPF_H_ */
    372