bpf.h revision 1.62 1 1.62 rmind /* $NetBSD: bpf.h,v 1.62 2013/09/18 23:34:55 rmind Exp $ */
2 1.6 cgd
3 1.5 mycroft /*
4 1.5 mycroft * Copyright (c) 1990, 1991, 1993
5 1.5 mycroft * The Regents of the University of California. All rights reserved.
6 1.1 cgd *
7 1.1 cgd * This code is derived from the Stanford/CMU enet packet filter,
8 1.1 cgd * (net/enet.c) distributed as part of 4.3BSD, and code contributed
9 1.5 mycroft * to Berkeley by Steven McCanne and Van Jacobson both of Lawrence
10 1.2 cgd * Berkeley Laboratory.
11 1.1 cgd *
12 1.1 cgd * Redistribution and use in source and binary forms, with or without
13 1.1 cgd * modification, are permitted provided that the following conditions
14 1.1 cgd * are met:
15 1.1 cgd * 1. Redistributions of source code must retain the above copyright
16 1.1 cgd * notice, this list of conditions and the following disclaimer.
17 1.1 cgd * 2. Redistributions in binary form must reproduce the above copyright
18 1.1 cgd * notice, this list of conditions and the following disclaimer in the
19 1.1 cgd * documentation and/or other materials provided with the distribution.
20 1.32 agc * 3. Neither the name of the University nor the names of its contributors
21 1.1 cgd * may be used to endorse or promote products derived from this software
22 1.1 cgd * without specific prior written permission.
23 1.1 cgd *
24 1.1 cgd * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
25 1.1 cgd * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
26 1.1 cgd * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
27 1.1 cgd * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
28 1.1 cgd * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
29 1.1 cgd * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
30 1.1 cgd * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
31 1.1 cgd * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
32 1.1 cgd * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
33 1.1 cgd * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
34 1.1 cgd * SUCH DAMAGE.
35 1.1 cgd *
36 1.19 fvdl * @(#)bpf.h 8.2 (Berkeley) 1/9/95
37 1.17 christos * @(#) Header: bpf.h,v 1.36 97/06/12 14:29:53 leres Exp (LBL)
38 1.1 cgd */
39 1.1 cgd
40 1.8 jtc #ifndef _NET_BPF_H_
41 1.8 jtc #define _NET_BPF_H_
42 1.27 thorpej
43 1.27 thorpej #include <sys/time.h>
44 1.8 jtc
45 1.17 christos /* BSD style release date */
46 1.17 christos #define BPF_RELEASE 199606
47 1.18 christos
48 1.59 christos __BEGIN_DECLS
49 1.59 christos
50 1.18 christos typedef int bpf_int32;
51 1.18 christos typedef u_int bpf_u_int32;
52 1.17 christos
53 1.1 cgd /*
54 1.42 perry * Alignment macros. BPF_WORDALIGN rounds up to the next
55 1.42 perry * even multiple of BPF_ALIGNMENT.
56 1.1 cgd */
57 1.1 cgd #define BPF_ALIGNMENT sizeof(long)
58 1.58 bouyer #define BPF_ALIGNMENT32 sizeof(int)
59 1.58 bouyer
60 1.1 cgd #define BPF_WORDALIGN(x) (((x)+(BPF_ALIGNMENT-1))&~(BPF_ALIGNMENT-1))
61 1.58 bouyer #define BPF_WORDALIGN32(x) (((x)+(BPF_ALIGNMENT32-1))&~(BPF_ALIGNMENT32-1))
62 1.1 cgd
63 1.1 cgd #define BPF_MAXINSNS 512
64 1.33 jonathan #define BPF_DFLTBUFSIZE (1024*1024) /* default static upper limit */
65 1.33 jonathan #define BPF_MAXBUFSIZE (1024*1024*16) /* hard limit on sysctl'able value */
66 1.2 cgd #define BPF_MINBUFSIZE 32
67 1.1 cgd
68 1.1 cgd /*
69 1.1 cgd * Structure for BIOCSETF.
70 1.1 cgd */
71 1.1 cgd struct bpf_program {
72 1.1 cgd u_int bf_len;
73 1.1 cgd struct bpf_insn *bf_insns;
74 1.1 cgd };
75 1.42 perry
76 1.1 cgd /*
77 1.43 rpaulo * Struct returned by BIOCGSTATS and net.bpf.stats sysctl.
78 1.1 cgd */
79 1.1 cgd struct bpf_stat {
80 1.45 rpaulo uint64_t bs_recv; /* number of packets received */
81 1.45 rpaulo uint64_t bs_drop; /* number of packets dropped */
82 1.45 rpaulo uint64_t bs_capt; /* number of packets captured */
83 1.45 rpaulo uint64_t bs_padding[13];
84 1.35 darrenr };
85 1.42 perry
86 1.35 darrenr /*
87 1.35 darrenr * Struct returned by BIOCGSTATSOLD.
88 1.35 darrenr */
89 1.35 darrenr struct bpf_stat_old {
90 1.1 cgd u_int bs_recv; /* number of packets received */
91 1.1 cgd u_int bs_drop; /* number of packets dropped */
92 1.1 cgd };
93 1.1 cgd
94 1.1 cgd /*
95 1.42 perry * Struct return by BIOCVERSION. This represents the version number of
96 1.2 cgd * the filter language described by the instruction encodings below.
97 1.2 cgd * bpf understands a program iff kernel_major == filter_major &&
98 1.2 cgd * kernel_minor >= filter_minor, that is, if the value returned by the
99 1.2 cgd * running kernel has the same major number and a minor number equal
100 1.2 cgd * equal to or less than the filter being downloaded. Otherwise, the
101 1.2 cgd * results are undefined, meaning an error may be returned or packets
102 1.2 cgd * may be accepted haphazardly.
103 1.2 cgd * It has nothing to do with the source code version.
104 1.2 cgd */
105 1.2 cgd struct bpf_version {
106 1.2 cgd u_short bv_major;
107 1.2 cgd u_short bv_minor;
108 1.2 cgd };
109 1.9 mycroft /* Current version number of filter architecture. */
110 1.2 cgd #define BPF_MAJOR_VERSION 1
111 1.2 cgd #define BPF_MINOR_VERSION 1
112 1.2 cgd
113 1.2 cgd /*
114 1.1 cgd * BPF ioctls
115 1.1 cgd *
116 1.1 cgd * The first set is for compatibility with Sun's pcc style
117 1.1 cgd * header files. If your using gcc, we assume that you
118 1.1 cgd * have run fixincludes so the latter set should work.
119 1.1 cgd */
120 1.34 darrenr #define BIOCGBLEN _IOR('B',102, u_int)
121 1.34 darrenr #define BIOCSBLEN _IOWR('B',102, u_int)
122 1.34 darrenr #define BIOCSETF _IOW('B',103, struct bpf_program)
123 1.34 darrenr #define BIOCFLUSH _IO('B',104)
124 1.31 thorpej #define BIOCPROMISC _IO('B',105)
125 1.34 darrenr #define BIOCGDLT _IOR('B',106, u_int)
126 1.31 thorpej #define BIOCGETIF _IOR('B',107, struct ifreq)
127 1.31 thorpej #define BIOCSETIF _IOW('B',108, struct ifreq)
128 1.49 christos #ifdef COMPAT_50
129 1.49 christos #include <compat/sys/time.h>
130 1.49 christos #define BIOCSORTIMEOUT _IOW('B',109, struct timeval50)
131 1.49 christos #define BIOCGORTIMEOUT _IOR('B',110, struct timeval50)
132 1.49 christos #endif
133 1.31 thorpej #define BIOCGSTATS _IOR('B',111, struct bpf_stat)
134 1.35 darrenr #define BIOCGSTATSOLD _IOR('B',111, struct bpf_stat_old)
135 1.31 thorpej #define BIOCIMMEDIATE _IOW('B',112, u_int)
136 1.31 thorpej #define BIOCVERSION _IOR('B',113, struct bpf_version)
137 1.31 thorpej #define BIOCSTCPF _IOW('B',114, struct bpf_program)
138 1.31 thorpej #define BIOCSUDPF _IOW('B',115, struct bpf_program)
139 1.34 darrenr #define BIOCGHDRCMPLT _IOR('B',116, u_int)
140 1.34 darrenr #define BIOCSHDRCMPLT _IOW('B',117, u_int)
141 1.34 darrenr #define BIOCSDLT _IOW('B',118, u_int)
142 1.34 darrenr #define BIOCGDLTLIST _IOWR('B',119, struct bpf_dltlist)
143 1.34 darrenr #define BIOCGSEESENT _IOR('B',120, u_int)
144 1.34 darrenr #define BIOCSSEESENT _IOW('B',121, u_int)
145 1.49 christos #define BIOCSRTIMEOUT _IOW('B',122, struct timeval)
146 1.49 christos #define BIOCGRTIMEOUT _IOR('B',123, struct timeval)
147 1.54 christos #define BIOCGFEEDBACK _IOR('B',124, u_int)
148 1.54 christos #define BIOCSFEEDBACK _IOW('B',125, u_int)
149 1.54 christos #define BIOCFEEDBACK BIOCSFEEDBACK /* FreeBSD name */
150 1.1 cgd
151 1.1 cgd /*
152 1.49 christos * Structure prepended to each packet. This is "wire" format, so we
153 1.50 christos * cannot change it unfortunately to 64 bit times on 32 bit systems [yet].
154 1.1 cgd */
155 1.50 christos struct bpf_timeval {
156 1.50 christos long tv_sec;
157 1.50 christos long tv_usec;
158 1.49 christos };
159 1.50 christos
160 1.58 bouyer struct bpf_timeval32 {
161 1.58 bouyer int32_t tv_sec;
162 1.58 bouyer int32_t tv_usec;
163 1.58 bouyer };
164 1.58 bouyer
165 1.1 cgd struct bpf_hdr {
166 1.50 christos struct bpf_timeval bh_tstamp; /* time stamp */
167 1.45 rpaulo uint32_t bh_caplen; /* length of captured portion */
168 1.45 rpaulo uint32_t bh_datalen; /* original length of packet */
169 1.45 rpaulo uint16_t bh_hdrlen; /* length of bpf header (this struct
170 1.1 cgd plus alignment padding) */
171 1.1 cgd };
172 1.58 bouyer
173 1.58 bouyer struct bpf_hdr32 {
174 1.58 bouyer struct bpf_timeval32 bh_tstamp; /* time stamp */
175 1.58 bouyer uint32_t bh_caplen; /* length of captured portion */
176 1.58 bouyer uint32_t bh_datalen; /* original length of packet */
177 1.58 bouyer uint16_t bh_hdrlen; /* length of bpf header (this struct
178 1.58 bouyer plus alignment padding) */
179 1.58 bouyer };
180 1.1 cgd /*
181 1.1 cgd * Because the structure above is not a multiple of 4 bytes, some compilers
182 1.1 cgd * will insist on inserting padding; hence, sizeof(struct bpf_hdr) won't work.
183 1.1 cgd * Only the kernel needs to know about it; applications use bh_hdrlen.
184 1.14 cgd * XXX To save a few bytes on 32-bit machines, we avoid end-of-struct
185 1.14 cgd * XXX padding by using the size of the header data elements. This is
186 1.14 cgd * XXX fail-safe: on new machines, we just use the 'safe' sizeof.
187 1.1 cgd */
188 1.10 jtc #ifdef _KERNEL
189 1.14 cgd #if defined(__arm32__) || defined(__i386__) || defined(__m68k__) || \
190 1.26 eeh defined(__mips__) || defined(__ns32k__) || defined(__vax__) || \
191 1.29 thorpej defined(__sh__) || (defined(__sparc__) && !defined(__sparc64__))
192 1.1 cgd #define SIZEOF_BPF_HDR 18
193 1.58 bouyer #define SIZEOF_BPF_HDR32 18
194 1.14 cgd #else
195 1.14 cgd #define SIZEOF_BPF_HDR sizeof(struct bpf_hdr)
196 1.58 bouyer #define SIZEOF_BPF_HDR32 sizeof(struct bpf_hdr32)
197 1.14 cgd #endif
198 1.1 cgd #endif
199 1.1 cgd
200 1.28 thorpej /* Pull in data-link level type codes. */
201 1.28 thorpej #include <net/dlt.h>
202 1.23 thorpej
203 1.1 cgd /*
204 1.44 rpaulo * The instruction encodings.
205 1.1 cgd */
206 1.2 cgd /* instruction classes */
207 1.1 cgd #define BPF_CLASS(code) ((code) & 0x07)
208 1.1 cgd #define BPF_LD 0x00
209 1.1 cgd #define BPF_LDX 0x01
210 1.1 cgd #define BPF_ST 0x02
211 1.1 cgd #define BPF_STX 0x03
212 1.1 cgd #define BPF_ALU 0x04
213 1.1 cgd #define BPF_JMP 0x05
214 1.1 cgd #define BPF_RET 0x06
215 1.1 cgd #define BPF_MISC 0x07
216 1.1 cgd
217 1.1 cgd /* ld/ldx fields */
218 1.1 cgd #define BPF_SIZE(code) ((code) & 0x18)
219 1.1 cgd #define BPF_W 0x00
220 1.1 cgd #define BPF_H 0x08
221 1.1 cgd #define BPF_B 0x10
222 1.1 cgd #define BPF_MODE(code) ((code) & 0xe0)
223 1.1 cgd #define BPF_IMM 0x00
224 1.1 cgd #define BPF_ABS 0x20
225 1.1 cgd #define BPF_IND 0x40
226 1.1 cgd #define BPF_MEM 0x60
227 1.1 cgd #define BPF_LEN 0x80
228 1.1 cgd #define BPF_MSH 0xa0
229 1.1 cgd
230 1.1 cgd /* alu/jmp fields */
231 1.1 cgd #define BPF_OP(code) ((code) & 0xf0)
232 1.1 cgd #define BPF_ADD 0x00
233 1.1 cgd #define BPF_SUB 0x10
234 1.1 cgd #define BPF_MUL 0x20
235 1.1 cgd #define BPF_DIV 0x30
236 1.1 cgd #define BPF_OR 0x40
237 1.1 cgd #define BPF_AND 0x50
238 1.1 cgd #define BPF_LSH 0x60
239 1.1 cgd #define BPF_RSH 0x70
240 1.1 cgd #define BPF_NEG 0x80
241 1.1 cgd #define BPF_JA 0x00
242 1.1 cgd #define BPF_JEQ 0x10
243 1.1 cgd #define BPF_JGT 0x20
244 1.1 cgd #define BPF_JGE 0x30
245 1.1 cgd #define BPF_JSET 0x40
246 1.1 cgd #define BPF_SRC(code) ((code) & 0x08)
247 1.1 cgd #define BPF_K 0x00
248 1.1 cgd #define BPF_X 0x08
249 1.1 cgd
250 1.1 cgd /* ret - BPF_K and BPF_X also apply */
251 1.1 cgd #define BPF_RVAL(code) ((code) & 0x18)
252 1.1 cgd #define BPF_A 0x10
253 1.1 cgd
254 1.1 cgd /* misc */
255 1.1 cgd #define BPF_MISCOP(code) ((code) & 0xf8)
256 1.1 cgd #define BPF_TAX 0x00
257 1.60 rmind #define BPF_COP 0x20
258 1.60 rmind #define BPF_COPX 0x40
259 1.1 cgd #define BPF_TXA 0x80
260 1.1 cgd
261 1.1 cgd /*
262 1.1 cgd * The instruction data structure.
263 1.1 cgd */
264 1.1 cgd struct bpf_insn {
265 1.45 rpaulo uint16_t code;
266 1.11 cgd u_char jt;
267 1.11 cgd u_char jf;
268 1.46 rpaulo uint32_t k;
269 1.1 cgd };
270 1.1 cgd
271 1.1 cgd /*
272 1.1 cgd * Macros for insn array initializers.
273 1.1 cgd */
274 1.45 rpaulo #define BPF_STMT(code, k) { (uint16_t)(code), 0, 0, k }
275 1.45 rpaulo #define BPF_JUMP(code, k, jt, jf) { (uint16_t)(code), jt, jf, k }
276 1.1 cgd
277 1.30 onoe /*
278 1.30 onoe * Structure to retrieve available DLTs for the interface.
279 1.30 onoe */
280 1.30 onoe struct bpf_dltlist {
281 1.30 onoe u_int bfl_len; /* number of bfd_list array */
282 1.30 onoe u_int *bfl_list; /* array of DLTs */
283 1.30 onoe };
284 1.30 onoe
285 1.10 jtc #ifdef _KERNEL
286 1.55 joerg #include <net/if.h>
287 1.51 pooka struct bpf_if;
288 1.51 pooka
289 1.52 pooka struct bpf_ops {
290 1.52 pooka void (*bpf_attach)(struct ifnet *, u_int, u_int, struct bpf_if **);
291 1.52 pooka void (*bpf_detach)(struct ifnet *);
292 1.52 pooka void (*bpf_change_type)(struct ifnet *, u_int, u_int);
293 1.52 pooka
294 1.52 pooka void (*bpf_tap)(struct bpf_if *, u_char *, u_int);
295 1.52 pooka void (*bpf_mtap)(struct bpf_if *, struct mbuf *);
296 1.52 pooka void (*bpf_mtap2)(struct bpf_if *, void *, u_int, struct mbuf *);
297 1.52 pooka void (*bpf_mtap_af)(struct bpf_if *, uint32_t, struct mbuf *);
298 1.52 pooka void (*bpf_mtap_sl_in)(struct bpf_if *, u_char *, struct mbuf **);
299 1.52 pooka void (*bpf_mtap_sl_out)(struct bpf_if *, u_char *, struct mbuf *);
300 1.52 pooka };
301 1.55 joerg
302 1.52 pooka extern struct bpf_ops *bpf_ops;
303 1.55 joerg
304 1.55 joerg static inline void
305 1.55 joerg bpf_attach(struct ifnet *_ifp, u_int _dlt, u_int _hdrlen)
306 1.55 joerg {
307 1.55 joerg bpf_ops->bpf_attach(_ifp, _dlt, _hdrlen, &_ifp->if_bpf);
308 1.55 joerg }
309 1.55 joerg
310 1.55 joerg static inline void
311 1.55 joerg bpf_attach2(struct ifnet *_ifp, u_int _dlt, u_int _hdrlen, struct bpf_if **_dp)
312 1.55 joerg {
313 1.55 joerg bpf_ops->bpf_attach(_ifp, _dlt, _hdrlen, _dp);
314 1.55 joerg }
315 1.55 joerg
316 1.55 joerg static inline void
317 1.55 joerg bpf_tap(struct ifnet *_ifp, u_char *_pkt, u_int _len)
318 1.55 joerg {
319 1.55 joerg if (_ifp->if_bpf)
320 1.55 joerg bpf_ops->bpf_tap(_ifp->if_bpf, _pkt, _len);
321 1.55 joerg }
322 1.55 joerg
323 1.55 joerg static inline void
324 1.55 joerg bpf_mtap(struct ifnet *_ifp, struct mbuf *_m)
325 1.55 joerg {
326 1.55 joerg if (_ifp->if_bpf)
327 1.55 joerg bpf_ops->bpf_mtap(_ifp->if_bpf, _m);
328 1.55 joerg }
329 1.55 joerg
330 1.55 joerg static inline void
331 1.55 joerg bpf_mtap2(struct bpf_if *_bpf, void *_data, u_int _dlen, struct mbuf *_m)
332 1.55 joerg {
333 1.55 joerg bpf_ops->bpf_mtap2(_bpf, _data, _dlen, _m);
334 1.55 joerg }
335 1.55 joerg
336 1.55 joerg static inline void
337 1.55 joerg bpf_mtap3(struct bpf_if *_bpf, struct mbuf *_m)
338 1.55 joerg {
339 1.55 joerg if (_bpf)
340 1.55 joerg bpf_ops->bpf_mtap(_bpf, _m);
341 1.55 joerg }
342 1.55 joerg
343 1.55 joerg static inline void
344 1.55 joerg bpf_mtap_af(struct ifnet *_ifp, uint32_t _af, struct mbuf *_m)
345 1.55 joerg {
346 1.55 joerg if (_ifp->if_bpf)
347 1.55 joerg bpf_ops->bpf_mtap_af(_ifp->if_bpf, _af, _m);
348 1.55 joerg }
349 1.55 joerg
350 1.55 joerg static inline void
351 1.55 joerg bpf_change_type(struct ifnet *_ifp, u_int _dlt, u_int _hdrlen)
352 1.55 joerg {
353 1.55 joerg bpf_ops->bpf_change_type(_ifp, _dlt, _hdrlen);
354 1.55 joerg }
355 1.55 joerg
356 1.55 joerg static inline void
357 1.55 joerg bpf_detach(struct ifnet *_ifp)
358 1.55 joerg {
359 1.55 joerg bpf_ops->bpf_detach(_ifp);
360 1.55 joerg }
361 1.55 joerg
362 1.55 joerg static inline void
363 1.55 joerg bpf_mtap_sl_in(struct ifnet *_ifp, u_char *_hdr, struct mbuf **_m)
364 1.55 joerg {
365 1.55 joerg bpf_ops->bpf_mtap_sl_in(_ifp->if_bpf, _hdr, _m);
366 1.55 joerg }
367 1.55 joerg
368 1.55 joerg static inline void
369 1.55 joerg bpf_mtap_sl_out(struct ifnet *_ifp, u_char *_hdr, struct mbuf *_m)
370 1.55 joerg {
371 1.55 joerg if (_ifp->if_bpf)
372 1.55 joerg bpf_ops->bpf_mtap_sl_out(_ifp->if_bpf, _hdr, _m);
373 1.55 joerg }
374 1.55 joerg
375 1.55 joerg
376 1.52 pooka void bpf_setops(void);
377 1.52 pooka
378 1.53 pooka void bpf_ops_handover_enter(struct bpf_ops *);
379 1.53 pooka void bpf_ops_handover_exit(void);
380 1.53 pooka
381 1.52 pooka void bpfilterattach(int);
382 1.52 pooka
383 1.60 rmind struct bpf_ctx;
384 1.60 rmind typedef struct bpf_ctx bpf_ctx_t;
385 1.61 rmind typedef uint32_t (*bpf_copfunc_t)(const struct mbuf *, void *,
386 1.61 rmind uint32_t, uint32_t *);
387 1.60 rmind
388 1.60 rmind bpf_ctx_t *bpf_create(void);
389 1.60 rmind void bpf_destroy(bpf_ctx_t *);
390 1.60 rmind
391 1.60 rmind int bpf_set_cop(bpf_ctx_t *, const bpf_copfunc_t *, size_t);
392 1.62 rmind u_int bpf_filter_ext(bpf_ctx_t *, void *, const struct bpf_insn *,
393 1.60 rmind const u_char *, u_int, u_int);
394 1.62 rmind int bpf_validate_ext(bpf_ctx_t *, const struct bpf_insn *, int);
395 1.60 rmind
396 1.62 rmind #endif
397 1.60 rmind
398 1.60 rmind int bpf_validate(const struct bpf_insn *, int);
399 1.60 rmind u_int bpf_filter(const struct bpf_insn *, const u_char *, u_int, u_int);
400 1.60 rmind
401 1.59 christos __END_DECLS
402 1.59 christos
403 1.1 cgd /*
404 1.1 cgd * Number of scratch memory words (for BPF_LD|BPF_MEM and BPF_ST).
405 1.1 cgd */
406 1.1 cgd #define BPF_MEMWORDS 16
407 1.2 cgd
408 1.48 elad #endif /* !_NET_BPF_H_ */
409