Home | History | Annotate | Line # | Download | only in net
bpf.h revision 1.72.2.1
      1  1.72.2.1  christos /*	$NetBSD: bpf.h,v 1.72.2.1 2019/06/10 22:09:45 christos Exp $	*/
      2       1.6       cgd 
      3       1.5   mycroft /*
      4       1.5   mycroft  * Copyright (c) 1990, 1991, 1993
      5       1.5   mycroft  *	The Regents of the University of California.  All rights reserved.
      6       1.1       cgd  *
      7       1.1       cgd  * This code is derived from the Stanford/CMU enet packet filter,
      8       1.1       cgd  * (net/enet.c) distributed as part of 4.3BSD, and code contributed
      9       1.5   mycroft  * to Berkeley by Steven McCanne and Van Jacobson both of Lawrence
     10       1.2       cgd  * Berkeley Laboratory.
     11       1.1       cgd  *
     12       1.1       cgd  * Redistribution and use in source and binary forms, with or without
     13       1.1       cgd  * modification, are permitted provided that the following conditions
     14       1.1       cgd  * are met:
     15       1.1       cgd  * 1. Redistributions of source code must retain the above copyright
     16       1.1       cgd  *    notice, this list of conditions and the following disclaimer.
     17       1.1       cgd  * 2. Redistributions in binary form must reproduce the above copyright
     18       1.1       cgd  *    notice, this list of conditions and the following disclaimer in the
     19       1.1       cgd  *    documentation and/or other materials provided with the distribution.
     20      1.32       agc  * 3. Neither the name of the University nor the names of its contributors
     21       1.1       cgd  *    may be used to endorse or promote products derived from this software
     22       1.1       cgd  *    without specific prior written permission.
     23       1.1       cgd  *
     24       1.1       cgd  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
     25       1.1       cgd  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     26       1.1       cgd  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     27       1.1       cgd  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
     28       1.1       cgd  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     29       1.1       cgd  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     30       1.1       cgd  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     31       1.1       cgd  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     32       1.1       cgd  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     33       1.1       cgd  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     34       1.1       cgd  * SUCH DAMAGE.
     35       1.1       cgd  *
     36      1.19      fvdl  *	@(#)bpf.h	8.2 (Berkeley) 1/9/95
     37      1.17  christos  * @(#) Header: bpf.h,v 1.36 97/06/12 14:29:53 leres Exp  (LBL)
     38       1.1       cgd  */
     39       1.1       cgd 
     40       1.8       jtc #ifndef _NET_BPF_H_
     41       1.8       jtc #define _NET_BPF_H_
     42      1.27   thorpej 
     43      1.67  dholland #include <sys/ioccom.h>
     44      1.27   thorpej #include <sys/time.h>
     45       1.8       jtc 
     46      1.17  christos /* BSD style release date */
     47      1.17  christos #define BPF_RELEASE 199606
     48      1.18  christos 
     49      1.64     alnsn /* Date when COP instructions and external memory have been released. */
     50      1.64     alnsn #define BPF_COP_EXTMEM_RELEASE 20140624
     51      1.64     alnsn 
     52      1.59  christos __BEGIN_DECLS
     53      1.59  christos 
     54      1.18  christos typedef	int bpf_int32;
     55      1.18  christos typedef	u_int bpf_u_int32;
     56      1.17  christos 
     57       1.1       cgd /*
     58      1.42     perry  * Alignment macros.  BPF_WORDALIGN rounds up to the next
     59      1.42     perry  * even multiple of BPF_ALIGNMENT.
     60       1.1       cgd  */
     61       1.1       cgd #define BPF_ALIGNMENT sizeof(long)
     62      1.58    bouyer #define BPF_ALIGNMENT32 sizeof(int)
     63      1.58    bouyer 
     64       1.1       cgd #define BPF_WORDALIGN(x) (((x)+(BPF_ALIGNMENT-1))&~(BPF_ALIGNMENT-1))
     65      1.58    bouyer #define BPF_WORDALIGN32(x) (((x)+(BPF_ALIGNMENT32-1))&~(BPF_ALIGNMENT32-1))
     66       1.1       cgd 
     67       1.1       cgd #define BPF_MAXINSNS 512
     68      1.33  jonathan #define BPF_DFLTBUFSIZE (1024*1024)	/* default static upper limit */
     69      1.33  jonathan #define BPF_MAXBUFSIZE (1024*1024*16)	/* hard limit on sysctl'able value */
     70       1.2       cgd #define BPF_MINBUFSIZE 32
     71       1.1       cgd 
     72       1.1       cgd /*
     73       1.1       cgd  *  Structure for BIOCSETF.
     74       1.1       cgd  */
     75       1.1       cgd struct bpf_program {
     76       1.1       cgd 	u_int bf_len;
     77       1.1       cgd 	struct bpf_insn *bf_insns;
     78       1.1       cgd };
     79      1.42     perry 
     80       1.1       cgd /*
     81      1.43    rpaulo  * Struct returned by BIOCGSTATS and net.bpf.stats sysctl.
     82       1.1       cgd  */
     83       1.1       cgd struct bpf_stat {
     84      1.45    rpaulo 	uint64_t bs_recv;	/* number of packets received */
     85      1.45    rpaulo 	uint64_t bs_drop;	/* number of packets dropped */
     86      1.45    rpaulo 	uint64_t bs_capt;	/* number of packets captured */
     87      1.45    rpaulo 	uint64_t bs_padding[13];
     88      1.35   darrenr };
     89      1.42     perry 
     90      1.35   darrenr /*
     91      1.35   darrenr  * Struct returned by BIOCGSTATSOLD.
     92      1.35   darrenr  */
     93      1.35   darrenr struct bpf_stat_old {
     94       1.1       cgd 	u_int bs_recv;		/* number of packets received */
     95       1.1       cgd 	u_int bs_drop;		/* number of packets dropped */
     96       1.1       cgd };
     97       1.1       cgd 
     98       1.1       cgd /*
     99      1.42     perry  * Struct return by BIOCVERSION.  This represents the version number of
    100       1.2       cgd  * the filter language described by the instruction encodings below.
    101       1.2       cgd  * bpf understands a program iff kernel_major == filter_major &&
    102       1.2       cgd  * kernel_minor >= filter_minor, that is, if the value returned by the
    103       1.2       cgd  * running kernel has the same major number and a minor number equal
    104       1.2       cgd  * equal to or less than the filter being downloaded.  Otherwise, the
    105       1.2       cgd  * results are undefined, meaning an error may be returned or packets
    106       1.2       cgd  * may be accepted haphazardly.
    107       1.2       cgd  * It has nothing to do with the source code version.
    108       1.2       cgd  */
    109       1.2       cgd struct bpf_version {
    110       1.2       cgd 	u_short bv_major;
    111       1.2       cgd 	u_short bv_minor;
    112       1.2       cgd };
    113       1.9   mycroft /* Current version number of filter architecture. */
    114       1.2       cgd #define BPF_MAJOR_VERSION 1
    115       1.2       cgd #define BPF_MINOR_VERSION 1
    116       1.2       cgd 
    117       1.2       cgd /*
    118       1.1       cgd  * BPF ioctls
    119       1.1       cgd  *
    120       1.1       cgd  * The first set is for compatibility with Sun's pcc style
    121       1.1       cgd  * header files.  If your using gcc, we assume that you
    122       1.1       cgd  * have run fixincludes so the latter set should work.
    123       1.1       cgd  */
    124  1.72.2.1  christos #define BIOCGBLEN	 _IOR('B', 102, u_int)
    125  1.72.2.1  christos #define BIOCSBLEN	_IOWR('B', 102, u_int)
    126  1.72.2.1  christos #define BIOCSETF	 _IOW('B', 103, struct bpf_program)
    127  1.72.2.1  christos #define BIOCFLUSH	  _IO('B', 104)
    128  1.72.2.1  christos #define BIOCPROMISC	  _IO('B', 105)
    129  1.72.2.1  christos #define BIOCGDLT	 _IOR('B', 106, u_int)
    130  1.72.2.1  christos #define BIOCGETIF	 _IOR('B', 107, struct ifreq)
    131  1.72.2.1  christos #define BIOCSETIF	 _IOW('B', 108, struct ifreq)
    132      1.49  christos #ifdef COMPAT_50
    133      1.49  christos #include <compat/sys/time.h>
    134  1.72.2.1  christos #define BIOCSORTIMEOUT	 _IOW('B', 109, struct timeval50)
    135  1.72.2.1  christos #define BIOCGORTIMEOUT	 _IOR('B', 110, struct timeval50)
    136      1.49  christos #endif
    137  1.72.2.1  christos #define BIOCGSTATS	 _IOR('B', 111, struct bpf_stat)
    138  1.72.2.1  christos #define BIOCGSTATSOLD	 _IOR('B', 111, struct bpf_stat_old)
    139  1.72.2.1  christos #define BIOCIMMEDIATE	 _IOW('B', 112, u_int)
    140  1.72.2.1  christos #define BIOCVERSION	 _IOR('B', 113, struct bpf_version)
    141  1.72.2.1  christos #define BIOCSTCPF	 _IOW('B', 114, struct bpf_program)
    142  1.72.2.1  christos #define BIOCSUDPF	 _IOW('B', 115, struct bpf_program)
    143  1.72.2.1  christos #define BIOCGHDRCMPLT	 _IOR('B', 116, u_int)
    144  1.72.2.1  christos #define BIOCSHDRCMPLT	 _IOW('B', 117, u_int)
    145  1.72.2.1  christos #define BIOCSDLT	 _IOW('B', 118, u_int)
    146  1.72.2.1  christos #define BIOCGDLTLIST	_IOWR('B', 119, struct bpf_dltlist)
    147  1.72.2.1  christos #define BIOCGDIRECTION	 _IOR('B', 120, u_int)
    148  1.72.2.1  christos #define BIOCSDIRECTION	 _IOW('B', 121, u_int)
    149  1.72.2.1  christos #define BIOCSRTIMEOUT	 _IOW('B', 122, struct timeval)
    150  1.72.2.1  christos #define BIOCGRTIMEOUT	 _IOR('B', 123, struct timeval)
    151  1.72.2.1  christos #define BIOCGFEEDBACK	 _IOR('B', 124, u_int)
    152  1.72.2.1  christos #define BIOCSFEEDBACK	 _IOW('B', 125, u_int)
    153      1.54  christos #define BIOCFEEDBACK     BIOCSFEEDBACK		/* FreeBSD name */
    154       1.1       cgd 
    155      1.72   msaitoh /* Obsolete */
    156      1.72   msaitoh #define	BIOCGSEESENT	BIOCGDIRECTION
    157      1.72   msaitoh #define	BIOCSSEESENT	BIOCSDIRECTION
    158      1.72   msaitoh 
    159      1.72   msaitoh /*
    160      1.72   msaitoh  * Packet directions.
    161      1.72   msaitoh  * BPF_D_IN = 0, BPF_D_INOUT =1 for backward compatibility of BIOC[GS]SEESENT.
    162      1.72   msaitoh  */
    163      1.72   msaitoh #define	BPF_D_IN	0	/* See incoming packets */
    164      1.72   msaitoh #define	BPF_D_INOUT	1	/* See incoming and outgoing packets */
    165      1.72   msaitoh #define	BPF_D_OUT	2	/* See outgoing packets */
    166      1.72   msaitoh 
    167       1.1       cgd /*
    168      1.49  christos  * Structure prepended to each packet. This is "wire" format, so we
    169      1.50  christos  * cannot change it unfortunately to 64 bit times on 32 bit systems [yet].
    170       1.1       cgd  */
    171      1.50  christos struct bpf_timeval {
    172      1.50  christos 	long tv_sec;
    173      1.50  christos 	long tv_usec;
    174      1.49  christos };
    175      1.50  christos 
    176      1.58    bouyer struct bpf_timeval32 {
    177      1.58    bouyer 	int32_t tv_sec;
    178      1.58    bouyer 	int32_t tv_usec;
    179      1.58    bouyer };
    180      1.58    bouyer 
    181       1.1       cgd struct bpf_hdr {
    182      1.50  christos 	struct bpf_timeval bh_tstamp;	/* time stamp */
    183      1.45    rpaulo 	uint32_t	bh_caplen;	/* length of captured portion */
    184      1.45    rpaulo 	uint32_t	bh_datalen;	/* original length of packet */
    185      1.45    rpaulo 	uint16_t	bh_hdrlen;	/* length of bpf header (this struct
    186       1.1       cgd 					   plus alignment padding) */
    187       1.1       cgd };
    188      1.58    bouyer 
    189      1.58    bouyer struct bpf_hdr32 {
    190      1.58    bouyer 	struct bpf_timeval32 bh_tstamp;	/* time stamp */
    191      1.58    bouyer 	uint32_t	bh_caplen;	/* length of captured portion */
    192      1.58    bouyer 	uint32_t	bh_datalen;	/* original length of packet */
    193      1.58    bouyer 	uint16_t	bh_hdrlen;	/* length of bpf header (this struct
    194      1.58    bouyer 					   plus alignment padding) */
    195      1.58    bouyer };
    196       1.1       cgd /*
    197       1.1       cgd  * Because the structure above is not a multiple of 4 bytes, some compilers
    198       1.1       cgd  * will insist on inserting padding; hence, sizeof(struct bpf_hdr) won't work.
    199       1.1       cgd  * Only the kernel needs to know about it; applications use bh_hdrlen.
    200      1.14       cgd  * XXX To save a few bytes on 32-bit machines, we avoid end-of-struct
    201      1.14       cgd  * XXX padding by using the size of the header data elements.  This is
    202      1.14       cgd  * XXX fail-safe: on new machines, we just use the 'safe' sizeof.
    203       1.1       cgd  */
    204      1.10       jtc #ifdef _KERNEL
    205      1.14       cgd #if defined(__arm32__) || defined(__i386__) || defined(__m68k__) || \
    206      1.26       eeh     defined(__mips__) || defined(__ns32k__) || defined(__vax__) || \
    207      1.29   thorpej     defined(__sh__) || (defined(__sparc__) && !defined(__sparc64__))
    208       1.1       cgd #define SIZEOF_BPF_HDR 18
    209      1.58    bouyer #define SIZEOF_BPF_HDR32 18
    210      1.14       cgd #else
    211      1.14       cgd #define SIZEOF_BPF_HDR sizeof(struct bpf_hdr)
    212      1.58    bouyer #define SIZEOF_BPF_HDR32 sizeof(struct bpf_hdr32)
    213      1.14       cgd #endif
    214       1.1       cgd #endif
    215       1.1       cgd 
    216      1.28   thorpej /* Pull in data-link level type codes. */
    217      1.28   thorpej #include <net/dlt.h>
    218      1.23   thorpej 
    219       1.1       cgd /*
    220      1.44    rpaulo  * The instruction encodings.
    221       1.1       cgd  */
    222       1.2       cgd /* instruction classes */
    223       1.1       cgd #define BPF_CLASS(code) ((code) & 0x07)
    224       1.1       cgd #define		BPF_LD		0x00
    225       1.1       cgd #define		BPF_LDX		0x01
    226       1.1       cgd #define		BPF_ST		0x02
    227       1.1       cgd #define		BPF_STX		0x03
    228       1.1       cgd #define		BPF_ALU		0x04
    229       1.1       cgd #define		BPF_JMP		0x05
    230       1.1       cgd #define		BPF_RET		0x06
    231       1.1       cgd #define		BPF_MISC	0x07
    232       1.1       cgd 
    233       1.1       cgd /* ld/ldx fields */
    234       1.1       cgd #define BPF_SIZE(code)	((code) & 0x18)
    235       1.1       cgd #define		BPF_W		0x00
    236       1.1       cgd #define		BPF_H		0x08
    237       1.1       cgd #define		BPF_B		0x10
    238      1.66  christos /*				0x18	reserved; used by BSD/OS */
    239       1.1       cgd #define BPF_MODE(code)	((code) & 0xe0)
    240       1.1       cgd #define		BPF_IMM 	0x00
    241       1.1       cgd #define		BPF_ABS		0x20
    242       1.1       cgd #define		BPF_IND		0x40
    243       1.1       cgd #define		BPF_MEM		0x60
    244       1.1       cgd #define		BPF_LEN		0x80
    245       1.1       cgd #define		BPF_MSH		0xa0
    246      1.66  christos /*				0xc0	reserved; used by BSD/OS */
    247      1.66  christos /*				0xe0	reserved; used by BSD/OS */
    248       1.1       cgd 
    249       1.1       cgd /* alu/jmp fields */
    250       1.1       cgd #define BPF_OP(code)	((code) & 0xf0)
    251       1.1       cgd #define		BPF_ADD		0x00
    252       1.1       cgd #define		BPF_SUB		0x10
    253       1.1       cgd #define		BPF_MUL		0x20
    254       1.1       cgd #define		BPF_DIV		0x30
    255       1.1       cgd #define		BPF_OR		0x40
    256       1.1       cgd #define		BPF_AND		0x50
    257       1.1       cgd #define		BPF_LSH		0x60
    258       1.1       cgd #define		BPF_RSH		0x70
    259       1.1       cgd #define		BPF_NEG		0x80
    260      1.66  christos #define		BPF_MOD		0x90
    261      1.66  christos #define		BPF_XOR		0xa0
    262      1.66  christos /*				0xb0	reserved */
    263      1.66  christos /*				0xc0	reserved */
    264      1.66  christos /*				0xd0	reserved */
    265      1.66  christos /*				0xe0	reserved */
    266      1.66  christos /*				0xf0	reserved */
    267       1.1       cgd #define		BPF_JA		0x00
    268       1.1       cgd #define		BPF_JEQ		0x10
    269       1.1       cgd #define		BPF_JGT		0x20
    270       1.1       cgd #define		BPF_JGE		0x30
    271       1.1       cgd #define		BPF_JSET	0x40
    272      1.66  christos /*				0x50	reserved; used by BSD/OS */
    273      1.66  christos /*				0x60	reserved */
    274      1.66  christos /*				0x70	reserved */
    275      1.66  christos /*				0x80	reserved */
    276      1.66  christos /*				0x90	reserved */
    277      1.66  christos /*				0xa0	reserved */
    278      1.66  christos /*				0xb0	reserved */
    279      1.66  christos /*				0xc0	reserved */
    280      1.66  christos /*				0xd0	reserved */
    281      1.66  christos /*				0xe0	reserved */
    282      1.66  christos /*				0xf0	reserved */
    283       1.1       cgd #define BPF_SRC(code)	((code) & 0x08)
    284       1.1       cgd #define		BPF_K		0x00
    285       1.1       cgd #define		BPF_X		0x08
    286       1.1       cgd 
    287       1.1       cgd /* ret - BPF_K and BPF_X also apply */
    288       1.1       cgd #define BPF_RVAL(code)	((code) & 0x18)
    289       1.1       cgd #define		BPF_A		0x10
    290      1.66  christos /*				0x18	reserved */
    291       1.1       cgd 
    292       1.1       cgd /* misc */
    293       1.1       cgd #define BPF_MISCOP(code) ((code) & 0xf8)
    294       1.1       cgd #define		BPF_TAX		0x00
    295      1.66  christos /*				0x10	reserved */
    296      1.66  christos /*				0x18	reserved */
    297      1.60     rmind #define		BPF_COP		0x20
    298      1.66  christos /*				0x28	reserved */
    299      1.66  christos /*				0x30	reserved */
    300      1.66  christos /*				0x38	reserved */
    301      1.66  christos #define		BPF_COPX	0x40	/* XXX: also used by BSD/OS */
    302      1.66  christos /*				0x48	reserved */
    303      1.66  christos /*				0x50	reserved */
    304      1.66  christos /*				0x58	reserved */
    305      1.66  christos /*				0x60	reserved */
    306      1.66  christos /*				0x68	reserved */
    307      1.66  christos /*				0x70	reserved */
    308      1.66  christos /*				0x78	reserved */
    309       1.1       cgd #define		BPF_TXA		0x80
    310      1.66  christos /*				0x88	reserved */
    311      1.66  christos /*				0x90	reserved */
    312      1.66  christos /*				0x98	reserved */
    313      1.66  christos /*				0xa0	reserved */
    314      1.66  christos /*				0xa8	reserved */
    315      1.66  christos /*				0xb0	reserved */
    316      1.66  christos /*				0xb8	reserved */
    317      1.66  christos /*				0xc0	reserved; used by BSD/OS */
    318      1.66  christos /*				0xc8	reserved */
    319      1.66  christos /*				0xd0	reserved */
    320      1.66  christos /*				0xd8	reserved */
    321      1.66  christos /*				0xe0	reserved */
    322      1.66  christos /*				0xe8	reserved */
    323      1.66  christos /*				0xf0	reserved */
    324      1.66  christos /*				0xf8	reserved */
    325       1.1       cgd 
    326       1.1       cgd /*
    327       1.1       cgd  * The instruction data structure.
    328       1.1       cgd  */
    329       1.1       cgd struct bpf_insn {
    330      1.45    rpaulo 	uint16_t  code;
    331      1.11       cgd 	u_char 	  jt;
    332      1.11       cgd 	u_char 	  jf;
    333      1.46    rpaulo 	uint32_t  k;
    334       1.1       cgd };
    335       1.1       cgd 
    336       1.1       cgd /*
    337  1.72.2.1  christos  * Auxiliary data, for use when interpreting a filter intended for the
    338  1.72.2.1  christos  * Linux kernel when the kernel rejects the filter (requiring us to
    339  1.72.2.1  christos  * run it in userland).  It contains VLAN tag information.
    340  1.72.2.1  christos  */
    341  1.72.2.1  christos struct bpf_aux_data {
    342  1.72.2.1  christos 	u_short vlan_tag_present;
    343  1.72.2.1  christos 	u_short vlan_tag;
    344  1.72.2.1  christos };
    345  1.72.2.1  christos 
    346  1.72.2.1  christos /*
    347       1.1       cgd  * Macros for insn array initializers.
    348       1.1       cgd  */
    349      1.45    rpaulo #define BPF_STMT(code, k) { (uint16_t)(code), 0, 0, k }
    350      1.45    rpaulo #define BPF_JUMP(code, k, jt, jf) { (uint16_t)(code), jt, jf, k }
    351       1.1       cgd 
    352      1.30      onoe /*
    353      1.63     rmind  * Number of scratch memory words (for BPF_LD|BPF_MEM and BPF_ST).
    354      1.63     rmind  */
    355      1.65     rmind #define	BPF_MEMWORDS		16
    356      1.63     rmind 
    357      1.63     rmind /*
    358      1.65     rmind  * bpf_memword_init_t: bits indicate which words in the external memory
    359      1.65     rmind  * store will be initialised by the caller before BPF program execution.
    360      1.64     alnsn  */
    361      1.64     alnsn typedef uint32_t bpf_memword_init_t;
    362      1.65     rmind #define	BPF_MEMWORD_INIT(k)	(UINT32_C(1) << (k))
    363      1.64     alnsn 
    364      1.65     rmind /* Note: two most significant bits are reserved by bpfjit. */
    365      1.64     alnsn __CTASSERT(BPF_MEMWORDS + 2 <= sizeof(bpf_memword_init_t) * NBBY);
    366      1.64     alnsn 
    367      1.64     alnsn #ifdef _KERNEL
    368      1.64     alnsn /*
    369      1.64     alnsn  * Max number of external memory words (for BPF_LD|BPF_MEM and BPF_ST).
    370      1.64     alnsn  */
    371      1.64     alnsn #define	BPF_MAX_MEMWORDS	30
    372      1.65     rmind 
    373      1.64     alnsn __CTASSERT(BPF_MAX_MEMWORDS >= BPF_MEMWORDS);
    374      1.64     alnsn __CTASSERT(BPF_MAX_MEMWORDS + 2 <= sizeof(bpf_memword_init_t) * NBBY);
    375      1.64     alnsn #endif
    376      1.64     alnsn 
    377      1.64     alnsn /*
    378      1.30      onoe  * Structure to retrieve available DLTs for the interface.
    379      1.30      onoe  */
    380      1.30      onoe struct bpf_dltlist {
    381      1.30      onoe 	u_int	bfl_len;	/* number of bfd_list array */
    382      1.30      onoe 	u_int	*bfl_list;	/* array of DLTs */
    383      1.30      onoe };
    384      1.30      onoe 
    385      1.63     rmind struct bpf_ctx;
    386      1.63     rmind typedef struct bpf_ctx bpf_ctx_t;
    387      1.63     rmind 
    388      1.65     rmind typedef struct bpf_args {
    389      1.64     alnsn 	const uint8_t *	pkt;
    390      1.64     alnsn 	size_t		wirelen;
    391      1.64     alnsn 	size_t		buflen;
    392      1.64     alnsn 	/*
    393      1.64     alnsn 	 * The following arguments are used only by some kernel
    394      1.64     alnsn 	 * subsystems.
    395      1.64     alnsn 	 * They aren't required for classical bpf filter programs.
    396      1.64     alnsn 	 * For such programs, bpfjit generated code doesn't read
    397      1.64     alnsn 	 * those arguments at all. Note however that bpf interpreter
    398      1.64     alnsn 	 * always needs a pointer to memstore.
    399      1.64     alnsn 	 */
    400      1.64     alnsn 	uint32_t *	mem; /* pointer to external memory store */
    401      1.64     alnsn 	void *		arg; /* auxiliary argument for a copfunc */
    402      1.65     rmind } bpf_args_t;
    403      1.63     rmind 
    404      1.64     alnsn #if defined(_KERNEL) || defined(__BPF_PRIVATE)
    405      1.65     rmind 
    406      1.64     alnsn typedef uint32_t (*bpf_copfunc_t)(const bpf_ctx_t *, bpf_args_t *, uint32_t);
    407      1.64     alnsn 
    408      1.63     rmind struct bpf_ctx {
    409      1.65     rmind 	/*
    410      1.65     rmind 	 * BPF coprocessor functions and the number of them.
    411      1.65     rmind 	 */
    412      1.63     rmind 	const bpf_copfunc_t *	copfuncs;
    413      1.63     rmind 	size_t			nfuncs;
    414      1.65     rmind 
    415      1.64     alnsn 	/*
    416      1.65     rmind 	 * The number of memory words in the external memory store.
    417      1.65     rmind 	 * There may be up to BPF_MAX_MEMWORDS words; if zero is set,
    418      1.65     rmind 	 * then the internal memory store is used which has a fixed
    419      1.65     rmind 	 * number of words (BPF_MEMWORDS).
    420      1.64     alnsn 	 */
    421      1.64     alnsn 	size_t			extwords;
    422      1.65     rmind 
    423      1.65     rmind 	/*
    424      1.65     rmind 	 * The bitmask indicating which words in the external memstore
    425      1.65     rmind 	 * will be initialised by the caller.
    426      1.65     rmind 	 */
    427      1.65     rmind 	bpf_memword_init_t	preinited;
    428      1.63     rmind };
    429      1.63     rmind #endif
    430      1.63     rmind 
    431      1.10       jtc #ifdef _KERNEL
    432      1.63     rmind #include <net/bpfjit.h>
    433      1.55     joerg #include <net/if.h>
    434      1.63     rmind 
    435      1.51     pooka struct bpf_if;
    436      1.51     pooka 
    437      1.52     pooka struct bpf_ops {
    438      1.52     pooka 	void (*bpf_attach)(struct ifnet *, u_int, u_int, struct bpf_if **);
    439      1.52     pooka 	void (*bpf_detach)(struct ifnet *);
    440      1.52     pooka 	void (*bpf_change_type)(struct ifnet *, u_int, u_int);
    441      1.52     pooka 
    442      1.72   msaitoh 	void (*bpf_mtap)(struct bpf_if *, struct mbuf *, u_int);
    443      1.72   msaitoh 	void (*bpf_mtap2)(struct bpf_if *, void *, u_int, struct mbuf *,
    444      1.72   msaitoh 	    u_int);
    445      1.72   msaitoh 	void (*bpf_mtap_af)(struct bpf_if *, uint32_t, struct mbuf *, u_int);
    446      1.52     pooka 	void (*bpf_mtap_sl_in)(struct bpf_if *, u_char *, struct mbuf **);
    447      1.52     pooka 	void (*bpf_mtap_sl_out)(struct bpf_if *, u_char *, struct mbuf *);
    448      1.69     ozaki 
    449      1.69     ozaki 	void (*bpf_mtap_softint_init)(struct ifnet *);
    450      1.69     ozaki 	void (*bpf_mtap_softint)(struct ifnet *, struct mbuf *);
    451      1.52     pooka };
    452      1.55     joerg 
    453      1.52     pooka extern struct bpf_ops *bpf_ops;
    454      1.55     joerg 
    455      1.70  christos static __inline void
    456      1.55     joerg bpf_attach(struct ifnet *_ifp, u_int _dlt, u_int _hdrlen)
    457      1.55     joerg {
    458      1.55     joerg 	bpf_ops->bpf_attach(_ifp, _dlt, _hdrlen, &_ifp->if_bpf);
    459      1.55     joerg }
    460      1.55     joerg 
    461      1.70  christos static __inline void
    462      1.55     joerg bpf_attach2(struct ifnet *_ifp, u_int _dlt, u_int _hdrlen, struct bpf_if **_dp)
    463      1.55     joerg {
    464      1.55     joerg 	bpf_ops->bpf_attach(_ifp, _dlt, _hdrlen, _dp);
    465      1.55     joerg }
    466      1.55     joerg 
    467      1.70  christos static __inline void
    468      1.72   msaitoh bpf_mtap(struct ifnet *_ifp, struct mbuf *_m, u_int _direction)
    469      1.55     joerg {
    470      1.55     joerg 	if (_ifp->if_bpf)
    471      1.72   msaitoh 		bpf_ops->bpf_mtap(_ifp->if_bpf, _m, _direction);
    472      1.55     joerg }
    473      1.55     joerg 
    474      1.70  christos static __inline void
    475      1.72   msaitoh bpf_mtap2(struct bpf_if *_bpf, void *_data, u_int _dlen, struct mbuf *_m,
    476      1.72   msaitoh 	u_int _direction)
    477      1.55     joerg {
    478      1.72   msaitoh 	bpf_ops->bpf_mtap2(_bpf, _data, _dlen, _m, _direction);
    479      1.55     joerg }
    480      1.55     joerg 
    481      1.70  christos static __inline void
    482      1.72   msaitoh bpf_mtap3(struct bpf_if *_bpf, struct mbuf *_m, u_int _direction)
    483      1.55     joerg {
    484      1.55     joerg 	if (_bpf)
    485      1.72   msaitoh 		bpf_ops->bpf_mtap(_bpf, _m, _direction);
    486      1.55     joerg }
    487      1.55     joerg 
    488      1.70  christos static __inline void
    489      1.72   msaitoh bpf_mtap_af(struct ifnet *_ifp, uint32_t _af, struct mbuf *_m,
    490      1.72   msaitoh     u_int _direction)
    491      1.55     joerg {
    492      1.55     joerg 	if (_ifp->if_bpf)
    493      1.72   msaitoh 		bpf_ops->bpf_mtap_af(_ifp->if_bpf, _af, _m, _direction);
    494      1.55     joerg }
    495      1.55     joerg 
    496      1.70  christos static __inline void
    497      1.55     joerg bpf_change_type(struct ifnet *_ifp, u_int _dlt, u_int _hdrlen)
    498      1.55     joerg {
    499      1.55     joerg 	bpf_ops->bpf_change_type(_ifp, _dlt, _hdrlen);
    500      1.55     joerg }
    501      1.55     joerg 
    502      1.70  christos static __inline void
    503      1.55     joerg bpf_detach(struct ifnet *_ifp)
    504      1.55     joerg {
    505      1.55     joerg 	bpf_ops->bpf_detach(_ifp);
    506      1.55     joerg }
    507      1.55     joerg 
    508      1.70  christos static __inline void
    509      1.55     joerg bpf_mtap_sl_in(struct ifnet *_ifp, u_char *_hdr, struct mbuf **_m)
    510      1.55     joerg {
    511      1.55     joerg 	bpf_ops->bpf_mtap_sl_in(_ifp->if_bpf, _hdr, _m);
    512      1.55     joerg }
    513      1.55     joerg 
    514      1.70  christos static __inline void
    515      1.55     joerg bpf_mtap_sl_out(struct ifnet *_ifp, u_char *_hdr, struct mbuf *_m)
    516      1.55     joerg {
    517      1.55     joerg 	if (_ifp->if_bpf)
    518      1.55     joerg 		bpf_ops->bpf_mtap_sl_out(_ifp->if_bpf, _hdr, _m);
    519      1.55     joerg }
    520      1.55     joerg 
    521      1.70  christos static __inline void
    522      1.69     ozaki bpf_mtap_softint_init(struct ifnet *_ifp)
    523      1.69     ozaki {
    524      1.69     ozaki 
    525      1.69     ozaki 	bpf_ops->bpf_mtap_softint_init(_ifp);
    526      1.69     ozaki }
    527      1.69     ozaki 
    528      1.70  christos static __inline void
    529      1.69     ozaki bpf_mtap_softint(struct ifnet *_ifp, struct mbuf *_m)
    530      1.69     ozaki {
    531      1.69     ozaki 
    532      1.69     ozaki 	if (_ifp->if_bpf)
    533      1.69     ozaki 		bpf_ops->bpf_mtap_softint(_ifp, _m);
    534      1.69     ozaki }
    535      1.55     joerg 
    536      1.65     rmind void	bpf_setops(void);
    537      1.52     pooka 
    538      1.65     rmind void	bpf_ops_handover_enter(struct bpf_ops *);
    539      1.65     rmind void	bpf_ops_handover_exit(void);
    540      1.53     pooka 
    541      1.65     rmind void	bpfilterattach(int);
    542      1.52     pooka 
    543      1.60     rmind bpf_ctx_t *bpf_create(void);
    544      1.60     rmind void	bpf_destroy(bpf_ctx_t *);
    545      1.60     rmind 
    546      1.65     rmind int	bpf_set_cop(bpf_ctx_t *, const bpf_copfunc_t *, size_t);
    547      1.65     rmind int	bpf_set_extmem(bpf_ctx_t *, size_t, bpf_memword_init_t);
    548      1.65     rmind u_int	bpf_filter_ext(const bpf_ctx_t *, const struct bpf_insn *, bpf_args_t *);
    549      1.65     rmind int	bpf_validate_ext(const bpf_ctx_t *, const struct bpf_insn *, int);
    550      1.60     rmind 
    551      1.63     rmind bpfjit_func_t bpf_jit_generate(bpf_ctx_t *, void *, size_t);
    552      1.63     rmind void	bpf_jit_freecode(bpfjit_func_t);
    553      1.63     rmind 
    554      1.62     rmind #endif
    555      1.60     rmind 
    556      1.60     rmind int	bpf_validate(const struct bpf_insn *, int);
    557      1.60     rmind u_int	bpf_filter(const struct bpf_insn *, const u_char *, u_int, u_int);
    558      1.60     rmind 
    559  1.72.2.1  christos u_int	bpf_filter_with_aux_data(const struct bpf_insn *, const u_char *, u_int, u_int, const struct bpf_aux_data *);
    560  1.72.2.1  christos 
    561  1.72.2.1  christos 
    562      1.59  christos __END_DECLS
    563      1.59  christos 
    564      1.48      elad #endif /* !_NET_BPF_H_ */
    565