Home | History | Annotate | Line # | Download | only in net
bpf.h revision 1.59.2.1
      1  1.59.2.1       tls /*	$NetBSD: bpf.h,v 1.59.2.1 2014/08/20 00:04:34 tls Exp $	*/
      2       1.6       cgd 
      3       1.5   mycroft /*
      4       1.5   mycroft  * Copyright (c) 1990, 1991, 1993
      5       1.5   mycroft  *	The Regents of the University of California.  All rights reserved.
      6       1.1       cgd  *
      7       1.1       cgd  * This code is derived from the Stanford/CMU enet packet filter,
      8       1.1       cgd  * (net/enet.c) distributed as part of 4.3BSD, and code contributed
      9       1.5   mycroft  * to Berkeley by Steven McCanne and Van Jacobson both of Lawrence
     10       1.2       cgd  * Berkeley Laboratory.
     11       1.1       cgd  *
     12       1.1       cgd  * Redistribution and use in source and binary forms, with or without
     13       1.1       cgd  * modification, are permitted provided that the following conditions
     14       1.1       cgd  * are met:
     15       1.1       cgd  * 1. Redistributions of source code must retain the above copyright
     16       1.1       cgd  *    notice, this list of conditions and the following disclaimer.
     17       1.1       cgd  * 2. Redistributions in binary form must reproduce the above copyright
     18       1.1       cgd  *    notice, this list of conditions and the following disclaimer in the
     19       1.1       cgd  *    documentation and/or other materials provided with the distribution.
     20      1.32       agc  * 3. Neither the name of the University nor the names of its contributors
     21       1.1       cgd  *    may be used to endorse or promote products derived from this software
     22       1.1       cgd  *    without specific prior written permission.
     23       1.1       cgd  *
     24       1.1       cgd  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
     25       1.1       cgd  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     26       1.1       cgd  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     27       1.1       cgd  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
     28       1.1       cgd  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     29       1.1       cgd  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     30       1.1       cgd  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     31       1.1       cgd  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     32       1.1       cgd  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     33       1.1       cgd  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     34       1.1       cgd  * SUCH DAMAGE.
     35       1.1       cgd  *
     36      1.19      fvdl  *	@(#)bpf.h	8.2 (Berkeley) 1/9/95
     37      1.17  christos  * @(#) Header: bpf.h,v 1.36 97/06/12 14:29:53 leres Exp  (LBL)
     38       1.1       cgd  */
     39       1.1       cgd 
     40       1.8       jtc #ifndef _NET_BPF_H_
     41       1.8       jtc #define _NET_BPF_H_
     42      1.27   thorpej 
     43      1.27   thorpej #include <sys/time.h>
     44       1.8       jtc 
     45      1.17  christos /* BSD style release date */
     46      1.17  christos #define BPF_RELEASE 199606
     47      1.18  christos 
     48  1.59.2.1       tls /* Date when COP instructions and external memory have been released. */
     49  1.59.2.1       tls #define BPF_COP_EXTMEM_RELEASE 20140624
     50  1.59.2.1       tls 
     51      1.59  christos __BEGIN_DECLS
     52      1.59  christos 
     53      1.18  christos typedef	int bpf_int32;
     54      1.18  christos typedef	u_int bpf_u_int32;
     55      1.17  christos 
     56       1.1       cgd /*
     57      1.42     perry  * Alignment macros.  BPF_WORDALIGN rounds up to the next
     58      1.42     perry  * even multiple of BPF_ALIGNMENT.
     59       1.1       cgd  */
     60       1.1       cgd #define BPF_ALIGNMENT sizeof(long)
     61      1.58    bouyer #define BPF_ALIGNMENT32 sizeof(int)
     62      1.58    bouyer 
     63       1.1       cgd #define BPF_WORDALIGN(x) (((x)+(BPF_ALIGNMENT-1))&~(BPF_ALIGNMENT-1))
     64      1.58    bouyer #define BPF_WORDALIGN32(x) (((x)+(BPF_ALIGNMENT32-1))&~(BPF_ALIGNMENT32-1))
     65       1.1       cgd 
     66       1.1       cgd #define BPF_MAXINSNS 512
     67      1.33  jonathan #define BPF_DFLTBUFSIZE (1024*1024)	/* default static upper limit */
     68      1.33  jonathan #define BPF_MAXBUFSIZE (1024*1024*16)	/* hard limit on sysctl'able value */
     69       1.2       cgd #define BPF_MINBUFSIZE 32
     70       1.1       cgd 
     71       1.1       cgd /*
     72       1.1       cgd  *  Structure for BIOCSETF.
     73       1.1       cgd  */
     74       1.1       cgd struct bpf_program {
     75       1.1       cgd 	u_int bf_len;
     76       1.1       cgd 	struct bpf_insn *bf_insns;
     77       1.1       cgd };
     78      1.42     perry 
     79       1.1       cgd /*
     80      1.43    rpaulo  * Struct returned by BIOCGSTATS and net.bpf.stats sysctl.
     81       1.1       cgd  */
     82       1.1       cgd struct bpf_stat {
     83      1.45    rpaulo 	uint64_t bs_recv;	/* number of packets received */
     84      1.45    rpaulo 	uint64_t bs_drop;	/* number of packets dropped */
     85      1.45    rpaulo 	uint64_t bs_capt;	/* number of packets captured */
     86      1.45    rpaulo 	uint64_t bs_padding[13];
     87      1.35   darrenr };
     88      1.42     perry 
     89      1.35   darrenr /*
     90      1.35   darrenr  * Struct returned by BIOCGSTATSOLD.
     91      1.35   darrenr  */
     92      1.35   darrenr struct bpf_stat_old {
     93       1.1       cgd 	u_int bs_recv;		/* number of packets received */
     94       1.1       cgd 	u_int bs_drop;		/* number of packets dropped */
     95       1.1       cgd };
     96       1.1       cgd 
     97       1.1       cgd /*
     98      1.42     perry  * Struct return by BIOCVERSION.  This represents the version number of
     99       1.2       cgd  * the filter language described by the instruction encodings below.
    100       1.2       cgd  * bpf understands a program iff kernel_major == filter_major &&
    101       1.2       cgd  * kernel_minor >= filter_minor, that is, if the value returned by the
    102       1.2       cgd  * running kernel has the same major number and a minor number equal
    103       1.2       cgd  * equal to or less than the filter being downloaded.  Otherwise, the
    104       1.2       cgd  * results are undefined, meaning an error may be returned or packets
    105       1.2       cgd  * may be accepted haphazardly.
    106       1.2       cgd  * It has nothing to do with the source code version.
    107       1.2       cgd  */
    108       1.2       cgd struct bpf_version {
    109       1.2       cgd 	u_short bv_major;
    110       1.2       cgd 	u_short bv_minor;
    111       1.2       cgd };
    112       1.9   mycroft /* Current version number of filter architecture. */
    113       1.2       cgd #define BPF_MAJOR_VERSION 1
    114       1.2       cgd #define BPF_MINOR_VERSION 1
    115       1.2       cgd 
    116       1.2       cgd /*
    117       1.1       cgd  * BPF ioctls
    118       1.1       cgd  *
    119       1.1       cgd  * The first set is for compatibility with Sun's pcc style
    120       1.1       cgd  * header files.  If your using gcc, we assume that you
    121       1.1       cgd  * have run fixincludes so the latter set should work.
    122       1.1       cgd  */
    123      1.34   darrenr #define BIOCGBLEN	 _IOR('B',102, u_int)
    124      1.34   darrenr #define BIOCSBLEN	_IOWR('B',102, u_int)
    125      1.34   darrenr #define BIOCSETF	 _IOW('B',103, struct bpf_program)
    126      1.34   darrenr #define BIOCFLUSH	  _IO('B',104)
    127      1.31   thorpej #define BIOCPROMISC	  _IO('B',105)
    128      1.34   darrenr #define BIOCGDLT	 _IOR('B',106, u_int)
    129      1.31   thorpej #define BIOCGETIF	 _IOR('B',107, struct ifreq)
    130      1.31   thorpej #define BIOCSETIF	 _IOW('B',108, struct ifreq)
    131      1.49  christos #ifdef COMPAT_50
    132      1.49  christos #include <compat/sys/time.h>
    133      1.49  christos #define BIOCSORTIMEOUT	 _IOW('B',109, struct timeval50)
    134      1.49  christos #define BIOCGORTIMEOUT	 _IOR('B',110, struct timeval50)
    135      1.49  christos #endif
    136      1.31   thorpej #define BIOCGSTATS	 _IOR('B',111, struct bpf_stat)
    137      1.35   darrenr #define BIOCGSTATSOLD	 _IOR('B',111, struct bpf_stat_old)
    138      1.31   thorpej #define BIOCIMMEDIATE	 _IOW('B',112, u_int)
    139      1.31   thorpej #define BIOCVERSION	 _IOR('B',113, struct bpf_version)
    140      1.31   thorpej #define BIOCSTCPF	 _IOW('B',114, struct bpf_program)
    141      1.31   thorpej #define BIOCSUDPF	 _IOW('B',115, struct bpf_program)
    142      1.34   darrenr #define BIOCGHDRCMPLT	 _IOR('B',116, u_int)
    143      1.34   darrenr #define BIOCSHDRCMPLT	 _IOW('B',117, u_int)
    144      1.34   darrenr #define BIOCSDLT	 _IOW('B',118, u_int)
    145      1.34   darrenr #define BIOCGDLTLIST	_IOWR('B',119, struct bpf_dltlist)
    146      1.34   darrenr #define BIOCGSEESENT	 _IOR('B',120, u_int)
    147      1.34   darrenr #define BIOCSSEESENT	 _IOW('B',121, u_int)
    148      1.49  christos #define BIOCSRTIMEOUT	 _IOW('B',122, struct timeval)
    149      1.49  christos #define BIOCGRTIMEOUT	 _IOR('B',123, struct timeval)
    150      1.54  christos #define BIOCGFEEDBACK	 _IOR('B',124, u_int)
    151      1.54  christos #define BIOCSFEEDBACK	 _IOW('B',125, u_int)
    152      1.54  christos #define BIOCFEEDBACK     BIOCSFEEDBACK		/* FreeBSD name */
    153       1.1       cgd 
    154       1.1       cgd /*
    155      1.49  christos  * Structure prepended to each packet. This is "wire" format, so we
    156      1.50  christos  * cannot change it unfortunately to 64 bit times on 32 bit systems [yet].
    157       1.1       cgd  */
    158      1.50  christos struct bpf_timeval {
    159      1.50  christos 	long tv_sec;
    160      1.50  christos 	long tv_usec;
    161      1.49  christos };
    162      1.50  christos 
    163      1.58    bouyer struct bpf_timeval32 {
    164      1.58    bouyer 	int32_t tv_sec;
    165      1.58    bouyer 	int32_t tv_usec;
    166      1.58    bouyer };
    167      1.58    bouyer 
    168       1.1       cgd struct bpf_hdr {
    169      1.50  christos 	struct bpf_timeval bh_tstamp;	/* time stamp */
    170      1.45    rpaulo 	uint32_t	bh_caplen;	/* length of captured portion */
    171      1.45    rpaulo 	uint32_t	bh_datalen;	/* original length of packet */
    172      1.45    rpaulo 	uint16_t	bh_hdrlen;	/* length of bpf header (this struct
    173       1.1       cgd 					   plus alignment padding) */
    174       1.1       cgd };
    175      1.58    bouyer 
    176      1.58    bouyer struct bpf_hdr32 {
    177      1.58    bouyer 	struct bpf_timeval32 bh_tstamp;	/* time stamp */
    178      1.58    bouyer 	uint32_t	bh_caplen;	/* length of captured portion */
    179      1.58    bouyer 	uint32_t	bh_datalen;	/* original length of packet */
    180      1.58    bouyer 	uint16_t	bh_hdrlen;	/* length of bpf header (this struct
    181      1.58    bouyer 					   plus alignment padding) */
    182      1.58    bouyer };
    183       1.1       cgd /*
    184       1.1       cgd  * Because the structure above is not a multiple of 4 bytes, some compilers
    185       1.1       cgd  * will insist on inserting padding; hence, sizeof(struct bpf_hdr) won't work.
    186       1.1       cgd  * Only the kernel needs to know about it; applications use bh_hdrlen.
    187      1.14       cgd  * XXX To save a few bytes on 32-bit machines, we avoid end-of-struct
    188      1.14       cgd  * XXX padding by using the size of the header data elements.  This is
    189      1.14       cgd  * XXX fail-safe: on new machines, we just use the 'safe' sizeof.
    190       1.1       cgd  */
    191      1.10       jtc #ifdef _KERNEL
    192      1.14       cgd #if defined(__arm32__) || defined(__i386__) || defined(__m68k__) || \
    193      1.26       eeh     defined(__mips__) || defined(__ns32k__) || defined(__vax__) || \
    194      1.29   thorpej     defined(__sh__) || (defined(__sparc__) && !defined(__sparc64__))
    195       1.1       cgd #define SIZEOF_BPF_HDR 18
    196      1.58    bouyer #define SIZEOF_BPF_HDR32 18
    197      1.14       cgd #else
    198      1.14       cgd #define SIZEOF_BPF_HDR sizeof(struct bpf_hdr)
    199      1.58    bouyer #define SIZEOF_BPF_HDR32 sizeof(struct bpf_hdr32)
    200      1.14       cgd #endif
    201       1.1       cgd #endif
    202       1.1       cgd 
    203      1.28   thorpej /* Pull in data-link level type codes. */
    204      1.28   thorpej #include <net/dlt.h>
    205      1.23   thorpej 
    206       1.1       cgd /*
    207      1.44    rpaulo  * The instruction encodings.
    208       1.1       cgd  */
    209       1.2       cgd /* instruction classes */
    210       1.1       cgd #define BPF_CLASS(code) ((code) & 0x07)
    211       1.1       cgd #define		BPF_LD		0x00
    212       1.1       cgd #define		BPF_LDX		0x01
    213       1.1       cgd #define		BPF_ST		0x02
    214       1.1       cgd #define		BPF_STX		0x03
    215       1.1       cgd #define		BPF_ALU		0x04
    216       1.1       cgd #define		BPF_JMP		0x05
    217       1.1       cgd #define		BPF_RET		0x06
    218       1.1       cgd #define		BPF_MISC	0x07
    219       1.1       cgd 
    220       1.1       cgd /* ld/ldx fields */
    221       1.1       cgd #define BPF_SIZE(code)	((code) & 0x18)
    222       1.1       cgd #define		BPF_W		0x00
    223       1.1       cgd #define		BPF_H		0x08
    224       1.1       cgd #define		BPF_B		0x10
    225       1.1       cgd #define BPF_MODE(code)	((code) & 0xe0)
    226       1.1       cgd #define		BPF_IMM 	0x00
    227       1.1       cgd #define		BPF_ABS		0x20
    228       1.1       cgd #define		BPF_IND		0x40
    229       1.1       cgd #define		BPF_MEM		0x60
    230       1.1       cgd #define		BPF_LEN		0x80
    231       1.1       cgd #define		BPF_MSH		0xa0
    232       1.1       cgd 
    233       1.1       cgd /* alu/jmp fields */
    234       1.1       cgd #define BPF_OP(code)	((code) & 0xf0)
    235       1.1       cgd #define		BPF_ADD		0x00
    236       1.1       cgd #define		BPF_SUB		0x10
    237       1.1       cgd #define		BPF_MUL		0x20
    238       1.1       cgd #define		BPF_DIV		0x30
    239       1.1       cgd #define		BPF_OR		0x40
    240       1.1       cgd #define		BPF_AND		0x50
    241       1.1       cgd #define		BPF_LSH		0x60
    242       1.1       cgd #define		BPF_RSH		0x70
    243       1.1       cgd #define		BPF_NEG		0x80
    244       1.1       cgd #define		BPF_JA		0x00
    245       1.1       cgd #define		BPF_JEQ		0x10
    246       1.1       cgd #define		BPF_JGT		0x20
    247       1.1       cgd #define		BPF_JGE		0x30
    248       1.1       cgd #define		BPF_JSET	0x40
    249       1.1       cgd #define BPF_SRC(code)	((code) & 0x08)
    250       1.1       cgd #define		BPF_K		0x00
    251       1.1       cgd #define		BPF_X		0x08
    252       1.1       cgd 
    253       1.1       cgd /* ret - BPF_K and BPF_X also apply */
    254       1.1       cgd #define BPF_RVAL(code)	((code) & 0x18)
    255       1.1       cgd #define		BPF_A		0x10
    256       1.1       cgd 
    257       1.1       cgd /* misc */
    258       1.1       cgd #define BPF_MISCOP(code) ((code) & 0xf8)
    259       1.1       cgd #define		BPF_TAX		0x00
    260  1.59.2.1       tls #define		BPF_COP		0x20
    261  1.59.2.1       tls #define		BPF_COPX	0x40
    262       1.1       cgd #define		BPF_TXA		0x80
    263       1.1       cgd 
    264       1.1       cgd /*
    265       1.1       cgd  * The instruction data structure.
    266       1.1       cgd  */
    267       1.1       cgd struct bpf_insn {
    268      1.45    rpaulo 	uint16_t  code;
    269      1.11       cgd 	u_char 	  jt;
    270      1.11       cgd 	u_char 	  jf;
    271      1.46    rpaulo 	uint32_t  k;
    272       1.1       cgd };
    273       1.1       cgd 
    274       1.1       cgd /*
    275       1.1       cgd  * Macros for insn array initializers.
    276       1.1       cgd  */
    277      1.45    rpaulo #define BPF_STMT(code, k) { (uint16_t)(code), 0, 0, k }
    278      1.45    rpaulo #define BPF_JUMP(code, k, jt, jf) { (uint16_t)(code), jt, jf, k }
    279       1.1       cgd 
    280      1.30      onoe /*
    281  1.59.2.1       tls  * Number of scratch memory words (for BPF_LD|BPF_MEM and BPF_ST).
    282  1.59.2.1       tls  */
    283  1.59.2.1       tls #define	BPF_MEMWORDS		16
    284  1.59.2.1       tls 
    285  1.59.2.1       tls /*
    286  1.59.2.1       tls  * bpf_memword_init_t: bits indicate which words in the external memory
    287  1.59.2.1       tls  * store will be initialised by the caller before BPF program execution.
    288  1.59.2.1       tls  */
    289  1.59.2.1       tls typedef uint32_t bpf_memword_init_t;
    290  1.59.2.1       tls #define	BPF_MEMWORD_INIT(k)	(UINT32_C(1) << (k))
    291  1.59.2.1       tls 
    292  1.59.2.1       tls /* Note: two most significant bits are reserved by bpfjit. */
    293  1.59.2.1       tls __CTASSERT(BPF_MEMWORDS + 2 <= sizeof(bpf_memword_init_t) * NBBY);
    294  1.59.2.1       tls 
    295  1.59.2.1       tls #ifdef _KERNEL
    296  1.59.2.1       tls /*
    297  1.59.2.1       tls  * Max number of external memory words (for BPF_LD|BPF_MEM and BPF_ST).
    298  1.59.2.1       tls  */
    299  1.59.2.1       tls #define	BPF_MAX_MEMWORDS	30
    300  1.59.2.1       tls 
    301  1.59.2.1       tls __CTASSERT(BPF_MAX_MEMWORDS >= BPF_MEMWORDS);
    302  1.59.2.1       tls __CTASSERT(BPF_MAX_MEMWORDS + 2 <= sizeof(bpf_memword_init_t) * NBBY);
    303  1.59.2.1       tls #endif
    304  1.59.2.1       tls 
    305  1.59.2.1       tls /*
    306      1.30      onoe  * Structure to retrieve available DLTs for the interface.
    307      1.30      onoe  */
    308      1.30      onoe struct bpf_dltlist {
    309      1.30      onoe 	u_int	bfl_len;	/* number of bfd_list array */
    310      1.30      onoe 	u_int	*bfl_list;	/* array of DLTs */
    311      1.30      onoe };
    312      1.30      onoe 
    313  1.59.2.1       tls struct bpf_ctx;
    314  1.59.2.1       tls typedef struct bpf_ctx bpf_ctx_t;
    315  1.59.2.1       tls 
    316  1.59.2.1       tls typedef struct bpf_args {
    317  1.59.2.1       tls 	const uint8_t *	pkt;
    318  1.59.2.1       tls 	size_t		wirelen;
    319  1.59.2.1       tls 	size_t		buflen;
    320  1.59.2.1       tls 	/*
    321  1.59.2.1       tls 	 * The following arguments are used only by some kernel
    322  1.59.2.1       tls 	 * subsystems.
    323  1.59.2.1       tls 	 * They aren't required for classical bpf filter programs.
    324  1.59.2.1       tls 	 * For such programs, bpfjit generated code doesn't read
    325  1.59.2.1       tls 	 * those arguments at all. Note however that bpf interpreter
    326  1.59.2.1       tls 	 * always needs a pointer to memstore.
    327  1.59.2.1       tls 	 */
    328  1.59.2.1       tls 	uint32_t *	mem; /* pointer to external memory store */
    329  1.59.2.1       tls 	void *		arg; /* auxiliary argument for a copfunc */
    330  1.59.2.1       tls } bpf_args_t;
    331  1.59.2.1       tls 
    332  1.59.2.1       tls #if defined(_KERNEL) || defined(__BPF_PRIVATE)
    333  1.59.2.1       tls 
    334  1.59.2.1       tls typedef uint32_t (*bpf_copfunc_t)(const bpf_ctx_t *, bpf_args_t *, uint32_t);
    335  1.59.2.1       tls 
    336  1.59.2.1       tls struct bpf_ctx {
    337  1.59.2.1       tls 	/*
    338  1.59.2.1       tls 	 * BPF coprocessor functions and the number of them.
    339  1.59.2.1       tls 	 */
    340  1.59.2.1       tls 	const bpf_copfunc_t *	copfuncs;
    341  1.59.2.1       tls 	size_t			nfuncs;
    342  1.59.2.1       tls 
    343  1.59.2.1       tls 	/*
    344  1.59.2.1       tls 	 * The number of memory words in the external memory store.
    345  1.59.2.1       tls 	 * There may be up to BPF_MAX_MEMWORDS words; if zero is set,
    346  1.59.2.1       tls 	 * then the internal memory store is used which has a fixed
    347  1.59.2.1       tls 	 * number of words (BPF_MEMWORDS).
    348  1.59.2.1       tls 	 */
    349  1.59.2.1       tls 	size_t			extwords;
    350  1.59.2.1       tls 
    351  1.59.2.1       tls 	/*
    352  1.59.2.1       tls 	 * The bitmask indicating which words in the external memstore
    353  1.59.2.1       tls 	 * will be initialised by the caller.
    354  1.59.2.1       tls 	 */
    355  1.59.2.1       tls 	bpf_memword_init_t	preinited;
    356  1.59.2.1       tls };
    357  1.59.2.1       tls #endif
    358  1.59.2.1       tls 
    359      1.10       jtc #ifdef _KERNEL
    360  1.59.2.1       tls #include <net/bpfjit.h>
    361      1.55     joerg #include <net/if.h>
    362  1.59.2.1       tls 
    363      1.51     pooka struct bpf_if;
    364      1.51     pooka 
    365      1.52     pooka struct bpf_ops {
    366      1.52     pooka 	void (*bpf_attach)(struct ifnet *, u_int, u_int, struct bpf_if **);
    367      1.52     pooka 	void (*bpf_detach)(struct ifnet *);
    368      1.52     pooka 	void (*bpf_change_type)(struct ifnet *, u_int, u_int);
    369      1.52     pooka 
    370      1.52     pooka 	void (*bpf_tap)(struct bpf_if *, u_char *, u_int);
    371      1.52     pooka 	void (*bpf_mtap)(struct bpf_if *, struct mbuf *);
    372      1.52     pooka 	void (*bpf_mtap2)(struct bpf_if *, void *, u_int, struct mbuf *);
    373      1.52     pooka 	void (*bpf_mtap_af)(struct bpf_if *, uint32_t, struct mbuf *);
    374      1.52     pooka 	void (*bpf_mtap_sl_in)(struct bpf_if *, u_char *, struct mbuf **);
    375      1.52     pooka 	void (*bpf_mtap_sl_out)(struct bpf_if *, u_char *, struct mbuf *);
    376      1.52     pooka };
    377      1.55     joerg 
    378      1.52     pooka extern struct bpf_ops *bpf_ops;
    379      1.55     joerg 
    380      1.55     joerg static inline void
    381      1.55     joerg bpf_attach(struct ifnet *_ifp, u_int _dlt, u_int _hdrlen)
    382      1.55     joerg {
    383      1.55     joerg 	bpf_ops->bpf_attach(_ifp, _dlt, _hdrlen, &_ifp->if_bpf);
    384      1.55     joerg }
    385      1.55     joerg 
    386      1.55     joerg static inline void
    387      1.55     joerg bpf_attach2(struct ifnet *_ifp, u_int _dlt, u_int _hdrlen, struct bpf_if **_dp)
    388      1.55     joerg {
    389      1.55     joerg 	bpf_ops->bpf_attach(_ifp, _dlt, _hdrlen, _dp);
    390      1.55     joerg }
    391      1.55     joerg 
    392      1.55     joerg static inline void
    393      1.55     joerg bpf_tap(struct ifnet *_ifp, u_char *_pkt, u_int _len)
    394      1.55     joerg {
    395      1.55     joerg 	if (_ifp->if_bpf)
    396      1.55     joerg 		bpf_ops->bpf_tap(_ifp->if_bpf, _pkt, _len);
    397      1.55     joerg }
    398      1.55     joerg 
    399      1.55     joerg static inline void
    400      1.55     joerg bpf_mtap(struct ifnet *_ifp, struct mbuf *_m)
    401      1.55     joerg {
    402      1.55     joerg 	if (_ifp->if_bpf)
    403      1.55     joerg 		bpf_ops->bpf_mtap(_ifp->if_bpf, _m);
    404      1.55     joerg }
    405      1.55     joerg 
    406      1.55     joerg static inline void
    407      1.55     joerg bpf_mtap2(struct bpf_if *_bpf, void *_data, u_int _dlen, struct mbuf *_m)
    408      1.55     joerg {
    409      1.55     joerg 	bpf_ops->bpf_mtap2(_bpf, _data, _dlen, _m);
    410      1.55     joerg }
    411      1.55     joerg 
    412      1.55     joerg static inline void
    413      1.55     joerg bpf_mtap3(struct bpf_if *_bpf, struct mbuf *_m)
    414      1.55     joerg {
    415      1.55     joerg 	if (_bpf)
    416      1.55     joerg 		bpf_ops->bpf_mtap(_bpf, _m);
    417      1.55     joerg }
    418      1.55     joerg 
    419      1.55     joerg static inline void
    420      1.55     joerg bpf_mtap_af(struct ifnet *_ifp, uint32_t _af, struct mbuf *_m)
    421      1.55     joerg {
    422      1.55     joerg 	if (_ifp->if_bpf)
    423      1.55     joerg 		bpf_ops->bpf_mtap_af(_ifp->if_bpf, _af, _m);
    424      1.55     joerg }
    425      1.55     joerg 
    426      1.55     joerg static inline void
    427      1.55     joerg bpf_change_type(struct ifnet *_ifp, u_int _dlt, u_int _hdrlen)
    428      1.55     joerg {
    429      1.55     joerg 	bpf_ops->bpf_change_type(_ifp, _dlt, _hdrlen);
    430      1.55     joerg }
    431      1.55     joerg 
    432      1.55     joerg static inline void
    433      1.55     joerg bpf_detach(struct ifnet *_ifp)
    434      1.55     joerg {
    435      1.55     joerg 	bpf_ops->bpf_detach(_ifp);
    436      1.55     joerg }
    437      1.55     joerg 
    438      1.55     joerg static inline void
    439      1.55     joerg bpf_mtap_sl_in(struct ifnet *_ifp, u_char *_hdr, struct mbuf **_m)
    440      1.55     joerg {
    441      1.55     joerg 	bpf_ops->bpf_mtap_sl_in(_ifp->if_bpf, _hdr, _m);
    442      1.55     joerg }
    443      1.55     joerg 
    444      1.55     joerg static inline void
    445      1.55     joerg bpf_mtap_sl_out(struct ifnet *_ifp, u_char *_hdr, struct mbuf *_m)
    446      1.55     joerg {
    447      1.55     joerg 	if (_ifp->if_bpf)
    448      1.55     joerg 		bpf_ops->bpf_mtap_sl_out(_ifp->if_bpf, _hdr, _m);
    449      1.55     joerg }
    450      1.55     joerg 
    451      1.55     joerg 
    452  1.59.2.1       tls void	bpf_setops(void);
    453  1.59.2.1       tls 
    454  1.59.2.1       tls void	bpf_ops_handover_enter(struct bpf_ops *);
    455  1.59.2.1       tls void	bpf_ops_handover_exit(void);
    456      1.52     pooka 
    457  1.59.2.1       tls void	bpfilterattach(int);
    458      1.53     pooka 
    459  1.59.2.1       tls bpf_ctx_t *bpf_create(void);
    460  1.59.2.1       tls void	bpf_destroy(bpf_ctx_t *);
    461  1.59.2.1       tls 
    462  1.59.2.1       tls int	bpf_set_cop(bpf_ctx_t *, const bpf_copfunc_t *, size_t);
    463  1.59.2.1       tls int	bpf_set_extmem(bpf_ctx_t *, size_t, bpf_memword_init_t);
    464  1.59.2.1       tls u_int	bpf_filter_ext(const bpf_ctx_t *, const struct bpf_insn *, bpf_args_t *);
    465  1.59.2.1       tls int	bpf_validate_ext(const bpf_ctx_t *, const struct bpf_insn *, int);
    466  1.59.2.1       tls 
    467  1.59.2.1       tls bpfjit_func_t bpf_jit_generate(bpf_ctx_t *, void *, size_t);
    468  1.59.2.1       tls void	bpf_jit_freecode(bpfjit_func_t);
    469      1.52     pooka 
    470      1.16  christos #endif
    471      1.16  christos 
    472  1.59.2.1       tls int	bpf_validate(const struct bpf_insn *, int);
    473  1.59.2.1       tls u_int	bpf_filter(const struct bpf_insn *, const u_char *, u_int, u_int);
    474       1.1       cgd 
    475      1.59  christos __END_DECLS
    476      1.59  christos 
    477      1.48      elad #endif /* !_NET_BPF_H_ */
    478