Home | History | Annotate | Line # | Download | only in net
bpf.h revision 1.75.6.1
      1  1.75.6.1   thorpej /*	$NetBSD: bpf.h,v 1.75.6.1 2021/06/17 04:46:34 thorpej Exp $	*/
      2       1.6       cgd 
      3       1.5   mycroft /*
      4       1.5   mycroft  * Copyright (c) 1990, 1991, 1993
      5       1.5   mycroft  *	The Regents of the University of California.  All rights reserved.
      6       1.1       cgd  *
      7       1.1       cgd  * This code is derived from the Stanford/CMU enet packet filter,
      8       1.1       cgd  * (net/enet.c) distributed as part of 4.3BSD, and code contributed
      9       1.5   mycroft  * to Berkeley by Steven McCanne and Van Jacobson both of Lawrence
     10       1.2       cgd  * Berkeley Laboratory.
     11       1.1       cgd  *
     12       1.1       cgd  * Redistribution and use in source and binary forms, with or without
     13       1.1       cgd  * modification, are permitted provided that the following conditions
     14       1.1       cgd  * are met:
     15       1.1       cgd  * 1. Redistributions of source code must retain the above copyright
     16       1.1       cgd  *    notice, this list of conditions and the following disclaimer.
     17       1.1       cgd  * 2. Redistributions in binary form must reproduce the above copyright
     18       1.1       cgd  *    notice, this list of conditions and the following disclaimer in the
     19       1.1       cgd  *    documentation and/or other materials provided with the distribution.
     20      1.32       agc  * 3. Neither the name of the University nor the names of its contributors
     21       1.1       cgd  *    may be used to endorse or promote products derived from this software
     22       1.1       cgd  *    without specific prior written permission.
     23       1.1       cgd  *
     24       1.1       cgd  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
     25       1.1       cgd  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     26       1.1       cgd  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     27       1.1       cgd  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
     28       1.1       cgd  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     29       1.1       cgd  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     30       1.1       cgd  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     31       1.1       cgd  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     32       1.1       cgd  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     33       1.1       cgd  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     34       1.1       cgd  * SUCH DAMAGE.
     35       1.1       cgd  *
     36      1.19      fvdl  *	@(#)bpf.h	8.2 (Berkeley) 1/9/95
     37      1.17  christos  * @(#) Header: bpf.h,v 1.36 97/06/12 14:29:53 leres Exp  (LBL)
     38       1.1       cgd  */
     39       1.1       cgd 
     40       1.8       jtc #ifndef _NET_BPF_H_
     41       1.8       jtc #define _NET_BPF_H_
     42      1.27   thorpej 
     43      1.67  dholland #include <sys/ioccom.h>
     44      1.27   thorpej #include <sys/time.h>
     45       1.8       jtc 
     46      1.17  christos /* BSD style release date */
     47      1.17  christos #define BPF_RELEASE 199606
     48      1.18  christos 
     49      1.64     alnsn /* Date when COP instructions and external memory have been released. */
     50      1.64     alnsn #define BPF_COP_EXTMEM_RELEASE 20140624
     51      1.64     alnsn 
     52      1.59  christos __BEGIN_DECLS
     53      1.59  christos 
     54      1.18  christos typedef	int bpf_int32;
     55      1.18  christos typedef	u_int bpf_u_int32;
     56      1.17  christos 
     57       1.1       cgd /*
     58      1.42     perry  * Alignment macros.  BPF_WORDALIGN rounds up to the next
     59      1.42     perry  * even multiple of BPF_ALIGNMENT.
     60       1.1       cgd  */
     61       1.1       cgd #define BPF_ALIGNMENT sizeof(long)
     62      1.58    bouyer #define BPF_ALIGNMENT32 sizeof(int)
     63      1.58    bouyer 
     64       1.1       cgd #define BPF_WORDALIGN(x) (((x)+(BPF_ALIGNMENT-1))&~(BPF_ALIGNMENT-1))
     65      1.58    bouyer #define BPF_WORDALIGN32(x) (((x)+(BPF_ALIGNMENT32-1))&~(BPF_ALIGNMENT32-1))
     66       1.1       cgd 
     67       1.1       cgd #define BPF_MAXINSNS 512
     68      1.33  jonathan #define BPF_DFLTBUFSIZE (1024*1024)	/* default static upper limit */
     69      1.33  jonathan #define BPF_MAXBUFSIZE (1024*1024*16)	/* hard limit on sysctl'able value */
     70       1.2       cgd #define BPF_MINBUFSIZE 32
     71       1.1       cgd 
     72       1.1       cgd /*
     73       1.1       cgd  *  Structure for BIOCSETF.
     74       1.1       cgd  */
     75       1.1       cgd struct bpf_program {
     76       1.1       cgd 	u_int bf_len;
     77       1.1       cgd 	struct bpf_insn *bf_insns;
     78       1.1       cgd };
     79      1.42     perry 
     80       1.1       cgd /*
     81      1.43    rpaulo  * Struct returned by BIOCGSTATS and net.bpf.stats sysctl.
     82       1.1       cgd  */
     83       1.1       cgd struct bpf_stat {
     84      1.45    rpaulo 	uint64_t bs_recv;	/* number of packets received */
     85      1.45    rpaulo 	uint64_t bs_drop;	/* number of packets dropped */
     86      1.45    rpaulo 	uint64_t bs_capt;	/* number of packets captured */
     87      1.45    rpaulo 	uint64_t bs_padding[13];
     88      1.35   darrenr };
     89      1.42     perry 
     90      1.35   darrenr /*
     91      1.35   darrenr  * Struct returned by BIOCGSTATSOLD.
     92      1.35   darrenr  */
     93      1.35   darrenr struct bpf_stat_old {
     94       1.1       cgd 	u_int bs_recv;		/* number of packets received */
     95       1.1       cgd 	u_int bs_drop;		/* number of packets dropped */
     96       1.1       cgd };
     97       1.1       cgd 
     98       1.1       cgd /*
     99      1.42     perry  * Struct return by BIOCVERSION.  This represents the version number of
    100       1.2       cgd  * the filter language described by the instruction encodings below.
    101       1.2       cgd  * bpf understands a program iff kernel_major == filter_major &&
    102       1.2       cgd  * kernel_minor >= filter_minor, that is, if the value returned by the
    103       1.2       cgd  * running kernel has the same major number and a minor number equal
    104       1.2       cgd  * equal to or less than the filter being downloaded.  Otherwise, the
    105       1.2       cgd  * results are undefined, meaning an error may be returned or packets
    106       1.2       cgd  * may be accepted haphazardly.
    107       1.2       cgd  * It has nothing to do with the source code version.
    108       1.2       cgd  */
    109       1.2       cgd struct bpf_version {
    110       1.2       cgd 	u_short bv_major;
    111       1.2       cgd 	u_short bv_minor;
    112       1.2       cgd };
    113       1.9   mycroft /* Current version number of filter architecture. */
    114       1.2       cgd #define BPF_MAJOR_VERSION 1
    115       1.2       cgd #define BPF_MINOR_VERSION 1
    116       1.2       cgd 
    117       1.2       cgd /*
    118       1.1       cgd  * BPF ioctls
    119       1.1       cgd  *
    120       1.1       cgd  * The first set is for compatibility with Sun's pcc style
    121       1.1       cgd  * header files.  If your using gcc, we assume that you
    122       1.1       cgd  * have run fixincludes so the latter set should work.
    123       1.1       cgd  */
    124      1.74   msaitoh #define BIOCGBLEN	 _IOR('B', 102, u_int)
    125      1.74   msaitoh #define BIOCSBLEN	_IOWR('B', 102, u_int)
    126      1.74   msaitoh #define BIOCSETF	 _IOW('B', 103, struct bpf_program)
    127      1.74   msaitoh #define BIOCFLUSH	  _IO('B', 104)
    128      1.74   msaitoh #define BIOCPROMISC	  _IO('B', 105)
    129      1.74   msaitoh #define BIOCGDLT	 _IOR('B', 106, u_int)
    130      1.74   msaitoh #define BIOCGETIF	 _IOR('B', 107, struct ifreq)
    131      1.74   msaitoh #define BIOCSETIF	 _IOW('B', 108, struct ifreq)
    132      1.49  christos #ifdef COMPAT_50
    133      1.49  christos #include <compat/sys/time.h>
    134      1.74   msaitoh #define BIOCSORTIMEOUT	 _IOW('B', 109, struct timeval50)
    135      1.74   msaitoh #define BIOCGORTIMEOUT	 _IOR('B', 110, struct timeval50)
    136      1.49  christos #endif
    137      1.74   msaitoh #define BIOCGSTATS	 _IOR('B', 111, struct bpf_stat)
    138      1.74   msaitoh #define BIOCGSTATSOLD	 _IOR('B', 111, struct bpf_stat_old)
    139      1.74   msaitoh #define BIOCIMMEDIATE	 _IOW('B', 112, u_int)
    140      1.74   msaitoh #define BIOCVERSION	 _IOR('B', 113, struct bpf_version)
    141      1.74   msaitoh #define BIOCSTCPF	 _IOW('B', 114, struct bpf_program)
    142      1.74   msaitoh #define BIOCSUDPF	 _IOW('B', 115, struct bpf_program)
    143      1.74   msaitoh #define BIOCGHDRCMPLT	 _IOR('B', 116, u_int)
    144      1.74   msaitoh #define BIOCSHDRCMPLT	 _IOW('B', 117, u_int)
    145      1.74   msaitoh #define BIOCSDLT	 _IOW('B', 118, u_int)
    146      1.74   msaitoh #define BIOCGDLTLIST	_IOWR('B', 119, struct bpf_dltlist)
    147      1.74   msaitoh #define BIOCGDIRECTION	 _IOR('B', 120, u_int)
    148      1.74   msaitoh #define BIOCSDIRECTION	 _IOW('B', 121, u_int)
    149      1.74   msaitoh #define BIOCSRTIMEOUT	 _IOW('B', 122, struct timeval)
    150      1.74   msaitoh #define BIOCGRTIMEOUT	 _IOR('B', 123, struct timeval)
    151      1.74   msaitoh #define BIOCGFEEDBACK	 _IOR('B', 124, u_int)
    152      1.74   msaitoh #define BIOCSFEEDBACK	 _IOW('B', 125, u_int)
    153      1.54  christos #define BIOCFEEDBACK     BIOCSFEEDBACK		/* FreeBSD name */
    154      1.75       roy #define BIOCLOCK	  _IO('B', 126)
    155      1.75       roy #define BIOCSETWF	 _IOW('B', 127, struct bpf_program)
    156       1.1       cgd 
    157      1.72   msaitoh /* Obsolete */
    158      1.72   msaitoh #define	BIOCGSEESENT	BIOCGDIRECTION
    159      1.72   msaitoh #define	BIOCSSEESENT	BIOCSDIRECTION
    160      1.72   msaitoh 
    161      1.72   msaitoh /*
    162      1.72   msaitoh  * Packet directions.
    163      1.72   msaitoh  * BPF_D_IN = 0, BPF_D_INOUT =1 for backward compatibility of BIOC[GS]SEESENT.
    164      1.72   msaitoh  */
    165      1.72   msaitoh #define	BPF_D_IN	0	/* See incoming packets */
    166      1.72   msaitoh #define	BPF_D_INOUT	1	/* See incoming and outgoing packets */
    167      1.72   msaitoh #define	BPF_D_OUT	2	/* See outgoing packets */
    168      1.72   msaitoh 
    169       1.1       cgd /*
    170      1.49  christos  * Structure prepended to each packet. This is "wire" format, so we
    171      1.50  christos  * cannot change it unfortunately to 64 bit times on 32 bit systems [yet].
    172       1.1       cgd  */
    173      1.50  christos struct bpf_timeval {
    174      1.50  christos 	long tv_sec;
    175      1.50  christos 	long tv_usec;
    176      1.49  christos };
    177      1.50  christos 
    178      1.58    bouyer struct bpf_timeval32 {
    179      1.58    bouyer 	int32_t tv_sec;
    180      1.58    bouyer 	int32_t tv_usec;
    181      1.58    bouyer };
    182      1.58    bouyer 
    183       1.1       cgd struct bpf_hdr {
    184      1.50  christos 	struct bpf_timeval bh_tstamp;	/* time stamp */
    185      1.45    rpaulo 	uint32_t	bh_caplen;	/* length of captured portion */
    186      1.45    rpaulo 	uint32_t	bh_datalen;	/* original length of packet */
    187      1.45    rpaulo 	uint16_t	bh_hdrlen;	/* length of bpf header (this struct
    188       1.1       cgd 					   plus alignment padding) */
    189       1.1       cgd };
    190      1.58    bouyer 
    191      1.58    bouyer struct bpf_hdr32 {
    192      1.58    bouyer 	struct bpf_timeval32 bh_tstamp;	/* time stamp */
    193      1.58    bouyer 	uint32_t	bh_caplen;	/* length of captured portion */
    194      1.58    bouyer 	uint32_t	bh_datalen;	/* original length of packet */
    195      1.58    bouyer 	uint16_t	bh_hdrlen;	/* length of bpf header (this struct
    196      1.58    bouyer 					   plus alignment padding) */
    197      1.58    bouyer };
    198       1.1       cgd /*
    199       1.1       cgd  * Because the structure above is not a multiple of 4 bytes, some compilers
    200       1.1       cgd  * will insist on inserting padding; hence, sizeof(struct bpf_hdr) won't work.
    201       1.1       cgd  * Only the kernel needs to know about it; applications use bh_hdrlen.
    202      1.14       cgd  * XXX To save a few bytes on 32-bit machines, we avoid end-of-struct
    203      1.14       cgd  * XXX padding by using the size of the header data elements.  This is
    204      1.14       cgd  * XXX fail-safe: on new machines, we just use the 'safe' sizeof.
    205       1.1       cgd  */
    206      1.10       jtc #ifdef _KERNEL
    207      1.14       cgd #if defined(__arm32__) || defined(__i386__) || defined(__m68k__) || \
    208      1.26       eeh     defined(__mips__) || defined(__ns32k__) || defined(__vax__) || \
    209      1.29   thorpej     defined(__sh__) || (defined(__sparc__) && !defined(__sparc64__))
    210       1.1       cgd #define SIZEOF_BPF_HDR 18
    211      1.58    bouyer #define SIZEOF_BPF_HDR32 18
    212      1.14       cgd #else
    213      1.14       cgd #define SIZEOF_BPF_HDR sizeof(struct bpf_hdr)
    214      1.58    bouyer #define SIZEOF_BPF_HDR32 sizeof(struct bpf_hdr32)
    215      1.14       cgd #endif
    216       1.1       cgd #endif
    217       1.1       cgd 
    218      1.28   thorpej /* Pull in data-link level type codes. */
    219      1.28   thorpej #include <net/dlt.h>
    220      1.23   thorpej 
    221       1.1       cgd /*
    222      1.44    rpaulo  * The instruction encodings.
    223       1.1       cgd  */
    224       1.2       cgd /* instruction classes */
    225       1.1       cgd #define BPF_CLASS(code) ((code) & 0x07)
    226       1.1       cgd #define		BPF_LD		0x00
    227       1.1       cgd #define		BPF_LDX		0x01
    228       1.1       cgd #define		BPF_ST		0x02
    229       1.1       cgd #define		BPF_STX		0x03
    230       1.1       cgd #define		BPF_ALU		0x04
    231       1.1       cgd #define		BPF_JMP		0x05
    232       1.1       cgd #define		BPF_RET		0x06
    233       1.1       cgd #define		BPF_MISC	0x07
    234       1.1       cgd 
    235       1.1       cgd /* ld/ldx fields */
    236       1.1       cgd #define BPF_SIZE(code)	((code) & 0x18)
    237       1.1       cgd #define		BPF_W		0x00
    238       1.1       cgd #define		BPF_H		0x08
    239       1.1       cgd #define		BPF_B		0x10
    240      1.66  christos /*				0x18	reserved; used by BSD/OS */
    241       1.1       cgd #define BPF_MODE(code)	((code) & 0xe0)
    242       1.1       cgd #define		BPF_IMM 	0x00
    243       1.1       cgd #define		BPF_ABS		0x20
    244       1.1       cgd #define		BPF_IND		0x40
    245       1.1       cgd #define		BPF_MEM		0x60
    246       1.1       cgd #define		BPF_LEN		0x80
    247       1.1       cgd #define		BPF_MSH		0xa0
    248      1.66  christos /*				0xc0	reserved; used by BSD/OS */
    249      1.66  christos /*				0xe0	reserved; used by BSD/OS */
    250       1.1       cgd 
    251       1.1       cgd /* alu/jmp fields */
    252       1.1       cgd #define BPF_OP(code)	((code) & 0xf0)
    253       1.1       cgd #define		BPF_ADD		0x00
    254       1.1       cgd #define		BPF_SUB		0x10
    255       1.1       cgd #define		BPF_MUL		0x20
    256       1.1       cgd #define		BPF_DIV		0x30
    257       1.1       cgd #define		BPF_OR		0x40
    258       1.1       cgd #define		BPF_AND		0x50
    259       1.1       cgd #define		BPF_LSH		0x60
    260       1.1       cgd #define		BPF_RSH		0x70
    261       1.1       cgd #define		BPF_NEG		0x80
    262      1.66  christos #define		BPF_MOD		0x90
    263      1.66  christos #define		BPF_XOR		0xa0
    264      1.66  christos /*				0xb0	reserved */
    265      1.66  christos /*				0xc0	reserved */
    266      1.66  christos /*				0xd0	reserved */
    267      1.66  christos /*				0xe0	reserved */
    268      1.66  christos /*				0xf0	reserved */
    269       1.1       cgd #define		BPF_JA		0x00
    270       1.1       cgd #define		BPF_JEQ		0x10
    271       1.1       cgd #define		BPF_JGT		0x20
    272       1.1       cgd #define		BPF_JGE		0x30
    273       1.1       cgd #define		BPF_JSET	0x40
    274      1.66  christos /*				0x50	reserved; used by BSD/OS */
    275      1.66  christos /*				0x60	reserved */
    276      1.66  christos /*				0x70	reserved */
    277      1.66  christos /*				0x80	reserved */
    278      1.66  christos /*				0x90	reserved */
    279      1.66  christos /*				0xa0	reserved */
    280      1.66  christos /*				0xb0	reserved */
    281      1.66  christos /*				0xc0	reserved */
    282      1.66  christos /*				0xd0	reserved */
    283      1.66  christos /*				0xe0	reserved */
    284      1.66  christos /*				0xf0	reserved */
    285       1.1       cgd #define BPF_SRC(code)	((code) & 0x08)
    286       1.1       cgd #define		BPF_K		0x00
    287       1.1       cgd #define		BPF_X		0x08
    288       1.1       cgd 
    289       1.1       cgd /* ret - BPF_K and BPF_X also apply */
    290       1.1       cgd #define BPF_RVAL(code)	((code) & 0x18)
    291       1.1       cgd #define		BPF_A		0x10
    292      1.66  christos /*				0x18	reserved */
    293       1.1       cgd 
    294       1.1       cgd /* misc */
    295       1.1       cgd #define BPF_MISCOP(code) ((code) & 0xf8)
    296       1.1       cgd #define		BPF_TAX		0x00
    297      1.66  christos /*				0x10	reserved */
    298      1.66  christos /*				0x18	reserved */
    299      1.60     rmind #define		BPF_COP		0x20
    300      1.66  christos /*				0x28	reserved */
    301      1.66  christos /*				0x30	reserved */
    302      1.66  christos /*				0x38	reserved */
    303      1.66  christos #define		BPF_COPX	0x40	/* XXX: also used by BSD/OS */
    304      1.66  christos /*				0x48	reserved */
    305      1.66  christos /*				0x50	reserved */
    306      1.66  christos /*				0x58	reserved */
    307      1.66  christos /*				0x60	reserved */
    308      1.66  christos /*				0x68	reserved */
    309      1.66  christos /*				0x70	reserved */
    310      1.66  christos /*				0x78	reserved */
    311       1.1       cgd #define		BPF_TXA		0x80
    312      1.66  christos /*				0x88	reserved */
    313      1.66  christos /*				0x90	reserved */
    314      1.66  christos /*				0x98	reserved */
    315      1.66  christos /*				0xa0	reserved */
    316      1.66  christos /*				0xa8	reserved */
    317      1.66  christos /*				0xb0	reserved */
    318      1.66  christos /*				0xb8	reserved */
    319      1.66  christos /*				0xc0	reserved; used by BSD/OS */
    320      1.66  christos /*				0xc8	reserved */
    321      1.66  christos /*				0xd0	reserved */
    322      1.66  christos /*				0xd8	reserved */
    323      1.66  christos /*				0xe0	reserved */
    324      1.66  christos /*				0xe8	reserved */
    325      1.66  christos /*				0xf0	reserved */
    326      1.66  christos /*				0xf8	reserved */
    327       1.1       cgd 
    328       1.1       cgd /*
    329       1.1       cgd  * The instruction data structure.
    330       1.1       cgd  */
    331       1.1       cgd struct bpf_insn {
    332      1.45    rpaulo 	uint16_t  code;
    333      1.11       cgd 	u_char 	  jt;
    334      1.11       cgd 	u_char 	  jf;
    335      1.46    rpaulo 	uint32_t  k;
    336       1.1       cgd };
    337       1.1       cgd 
    338       1.1       cgd /*
    339      1.73  christos  * Auxiliary data, for use when interpreting a filter intended for the
    340      1.73  christos  * Linux kernel when the kernel rejects the filter (requiring us to
    341      1.73  christos  * run it in userland).  It contains VLAN tag information.
    342      1.73  christos  */
    343      1.73  christos struct bpf_aux_data {
    344      1.73  christos 	u_short vlan_tag_present;
    345      1.73  christos 	u_short vlan_tag;
    346      1.73  christos };
    347      1.73  christos 
    348      1.73  christos /*
    349       1.1       cgd  * Macros for insn array initializers.
    350       1.1       cgd  */
    351      1.45    rpaulo #define BPF_STMT(code, k) { (uint16_t)(code), 0, 0, k }
    352      1.45    rpaulo #define BPF_JUMP(code, k, jt, jf) { (uint16_t)(code), jt, jf, k }
    353       1.1       cgd 
    354      1.30      onoe /*
    355      1.63     rmind  * Number of scratch memory words (for BPF_LD|BPF_MEM and BPF_ST).
    356      1.63     rmind  */
    357      1.65     rmind #define	BPF_MEMWORDS		16
    358      1.63     rmind 
    359      1.63     rmind /*
    360      1.65     rmind  * bpf_memword_init_t: bits indicate which words in the external memory
    361      1.65     rmind  * store will be initialised by the caller before BPF program execution.
    362      1.64     alnsn  */
    363      1.64     alnsn typedef uint32_t bpf_memword_init_t;
    364      1.65     rmind #define	BPF_MEMWORD_INIT(k)	(UINT32_C(1) << (k))
    365      1.64     alnsn 
    366      1.65     rmind /* Note: two most significant bits are reserved by bpfjit. */
    367      1.64     alnsn __CTASSERT(BPF_MEMWORDS + 2 <= sizeof(bpf_memword_init_t) * NBBY);
    368      1.64     alnsn 
    369      1.64     alnsn #ifdef _KERNEL
    370      1.64     alnsn /*
    371      1.64     alnsn  * Max number of external memory words (for BPF_LD|BPF_MEM and BPF_ST).
    372      1.64     alnsn  */
    373      1.64     alnsn #define	BPF_MAX_MEMWORDS	30
    374      1.65     rmind 
    375      1.64     alnsn __CTASSERT(BPF_MAX_MEMWORDS >= BPF_MEMWORDS);
    376      1.64     alnsn __CTASSERT(BPF_MAX_MEMWORDS + 2 <= sizeof(bpf_memword_init_t) * NBBY);
    377      1.64     alnsn #endif
    378      1.64     alnsn 
    379      1.64     alnsn /*
    380      1.30      onoe  * Structure to retrieve available DLTs for the interface.
    381      1.30      onoe  */
    382      1.30      onoe struct bpf_dltlist {
    383      1.30      onoe 	u_int	bfl_len;	/* number of bfd_list array */
    384      1.30      onoe 	u_int	*bfl_list;	/* array of DLTs */
    385      1.30      onoe };
    386      1.30      onoe 
    387      1.63     rmind struct bpf_ctx;
    388      1.63     rmind typedef struct bpf_ctx bpf_ctx_t;
    389      1.63     rmind 
    390      1.65     rmind typedef struct bpf_args {
    391      1.64     alnsn 	const uint8_t *	pkt;
    392      1.64     alnsn 	size_t		wirelen;
    393      1.64     alnsn 	size_t		buflen;
    394      1.64     alnsn 	/*
    395      1.64     alnsn 	 * The following arguments are used only by some kernel
    396      1.64     alnsn 	 * subsystems.
    397      1.64     alnsn 	 * They aren't required for classical bpf filter programs.
    398      1.64     alnsn 	 * For such programs, bpfjit generated code doesn't read
    399      1.64     alnsn 	 * those arguments at all. Note however that bpf interpreter
    400      1.64     alnsn 	 * always needs a pointer to memstore.
    401      1.64     alnsn 	 */
    402      1.64     alnsn 	uint32_t *	mem; /* pointer to external memory store */
    403      1.64     alnsn 	void *		arg; /* auxiliary argument for a copfunc */
    404      1.65     rmind } bpf_args_t;
    405      1.63     rmind 
    406      1.64     alnsn #if defined(_KERNEL) || defined(__BPF_PRIVATE)
    407      1.65     rmind 
    408      1.64     alnsn typedef uint32_t (*bpf_copfunc_t)(const bpf_ctx_t *, bpf_args_t *, uint32_t);
    409      1.64     alnsn 
    410      1.63     rmind struct bpf_ctx {
    411      1.65     rmind 	/*
    412      1.65     rmind 	 * BPF coprocessor functions and the number of them.
    413      1.65     rmind 	 */
    414      1.63     rmind 	const bpf_copfunc_t *	copfuncs;
    415      1.63     rmind 	size_t			nfuncs;
    416      1.65     rmind 
    417      1.64     alnsn 	/*
    418      1.65     rmind 	 * The number of memory words in the external memory store.
    419      1.65     rmind 	 * There may be up to BPF_MAX_MEMWORDS words; if zero is set,
    420      1.65     rmind 	 * then the internal memory store is used which has a fixed
    421      1.65     rmind 	 * number of words (BPF_MEMWORDS).
    422      1.64     alnsn 	 */
    423      1.64     alnsn 	size_t			extwords;
    424      1.65     rmind 
    425      1.65     rmind 	/*
    426      1.65     rmind 	 * The bitmask indicating which words in the external memstore
    427      1.65     rmind 	 * will be initialised by the caller.
    428      1.65     rmind 	 */
    429      1.65     rmind 	bpf_memword_init_t	preinited;
    430      1.63     rmind };
    431      1.63     rmind #endif
    432      1.63     rmind 
    433      1.10       jtc #ifdef _KERNEL
    434      1.63     rmind #include <net/bpfjit.h>
    435      1.55     joerg #include <net/if.h>
    436      1.63     rmind 
    437      1.51     pooka struct bpf_if;
    438      1.51     pooka 
    439      1.52     pooka struct bpf_ops {
    440      1.52     pooka 	void (*bpf_attach)(struct ifnet *, u_int, u_int, struct bpf_if **);
    441      1.52     pooka 	void (*bpf_detach)(struct ifnet *);
    442      1.52     pooka 	void (*bpf_change_type)(struct ifnet *, u_int, u_int);
    443      1.52     pooka 
    444      1.72   msaitoh 	void (*bpf_mtap)(struct bpf_if *, struct mbuf *, u_int);
    445      1.72   msaitoh 	void (*bpf_mtap2)(struct bpf_if *, void *, u_int, struct mbuf *,
    446      1.72   msaitoh 	    u_int);
    447      1.72   msaitoh 	void (*bpf_mtap_af)(struct bpf_if *, uint32_t, struct mbuf *, u_int);
    448      1.52     pooka 	void (*bpf_mtap_sl_in)(struct bpf_if *, u_char *, struct mbuf **);
    449      1.52     pooka 	void (*bpf_mtap_sl_out)(struct bpf_if *, u_char *, struct mbuf *);
    450      1.69     ozaki 
    451      1.69     ozaki 	void (*bpf_mtap_softint_init)(struct ifnet *);
    452      1.69     ozaki 	void (*bpf_mtap_softint)(struct ifnet *, struct mbuf *);
    453  1.75.6.1   thorpej 
    454  1.75.6.1   thorpej 	int (*bpf_register_track_event)(struct bpf_if **,
    455  1.75.6.1   thorpej 	    void (*)(struct bpf_if *, struct ifnet *, int, int));
    456  1.75.6.1   thorpej 	int (*bpf_deregister_track_event)(struct bpf_if **,
    457  1.75.6.1   thorpej 	    void (*)(struct bpf_if *, struct ifnet *, int, int));
    458      1.52     pooka };
    459      1.55     joerg 
    460      1.52     pooka extern struct bpf_ops *bpf_ops;
    461      1.55     joerg 
    462      1.70  christos static __inline void
    463      1.55     joerg bpf_attach(struct ifnet *_ifp, u_int _dlt, u_int _hdrlen)
    464      1.55     joerg {
    465      1.55     joerg 	bpf_ops->bpf_attach(_ifp, _dlt, _hdrlen, &_ifp->if_bpf);
    466      1.55     joerg }
    467      1.55     joerg 
    468      1.70  christos static __inline void
    469      1.55     joerg bpf_attach2(struct ifnet *_ifp, u_int _dlt, u_int _hdrlen, struct bpf_if **_dp)
    470      1.55     joerg {
    471      1.55     joerg 	bpf_ops->bpf_attach(_ifp, _dlt, _hdrlen, _dp);
    472      1.55     joerg }
    473      1.55     joerg 
    474      1.70  christos static __inline void
    475      1.72   msaitoh bpf_mtap(struct ifnet *_ifp, struct mbuf *_m, u_int _direction)
    476      1.55     joerg {
    477      1.55     joerg 	if (_ifp->if_bpf)
    478      1.72   msaitoh 		bpf_ops->bpf_mtap(_ifp->if_bpf, _m, _direction);
    479      1.55     joerg }
    480      1.55     joerg 
    481      1.70  christos static __inline void
    482      1.72   msaitoh bpf_mtap2(struct bpf_if *_bpf, void *_data, u_int _dlen, struct mbuf *_m,
    483      1.72   msaitoh 	u_int _direction)
    484      1.55     joerg {
    485      1.72   msaitoh 	bpf_ops->bpf_mtap2(_bpf, _data, _dlen, _m, _direction);
    486      1.55     joerg }
    487      1.55     joerg 
    488      1.70  christos static __inline void
    489      1.72   msaitoh bpf_mtap3(struct bpf_if *_bpf, struct mbuf *_m, u_int _direction)
    490      1.55     joerg {
    491      1.55     joerg 	if (_bpf)
    492      1.72   msaitoh 		bpf_ops->bpf_mtap(_bpf, _m, _direction);
    493      1.55     joerg }
    494      1.55     joerg 
    495      1.70  christos static __inline void
    496      1.72   msaitoh bpf_mtap_af(struct ifnet *_ifp, uint32_t _af, struct mbuf *_m,
    497      1.72   msaitoh     u_int _direction)
    498      1.55     joerg {
    499      1.55     joerg 	if (_ifp->if_bpf)
    500      1.72   msaitoh 		bpf_ops->bpf_mtap_af(_ifp->if_bpf, _af, _m, _direction);
    501      1.55     joerg }
    502      1.55     joerg 
    503      1.70  christos static __inline void
    504      1.55     joerg bpf_change_type(struct ifnet *_ifp, u_int _dlt, u_int _hdrlen)
    505      1.55     joerg {
    506      1.55     joerg 	bpf_ops->bpf_change_type(_ifp, _dlt, _hdrlen);
    507      1.55     joerg }
    508      1.55     joerg 
    509  1.75.6.1   thorpej static __inline bool
    510  1.75.6.1   thorpej bpf_peers_present(struct bpf_if *dp)
    511  1.75.6.1   thorpej {
    512  1.75.6.1   thorpej 	/*
    513  1.75.6.1   thorpej 	 * Our code makes sure the driver visible pointer is NULL
    514  1.75.6.1   thorpej 	 * whenever there is no listener on this tap.
    515  1.75.6.1   thorpej 	 */
    516  1.75.6.1   thorpej 	return dp != NULL;
    517  1.75.6.1   thorpej }
    518  1.75.6.1   thorpej 
    519      1.70  christos static __inline void
    520      1.55     joerg bpf_detach(struct ifnet *_ifp)
    521      1.55     joerg {
    522      1.55     joerg 	bpf_ops->bpf_detach(_ifp);
    523      1.55     joerg }
    524      1.55     joerg 
    525      1.70  christos static __inline void
    526      1.55     joerg bpf_mtap_sl_in(struct ifnet *_ifp, u_char *_hdr, struct mbuf **_m)
    527      1.55     joerg {
    528      1.55     joerg 	bpf_ops->bpf_mtap_sl_in(_ifp->if_bpf, _hdr, _m);
    529      1.55     joerg }
    530      1.55     joerg 
    531      1.70  christos static __inline void
    532      1.55     joerg bpf_mtap_sl_out(struct ifnet *_ifp, u_char *_hdr, struct mbuf *_m)
    533      1.55     joerg {
    534      1.55     joerg 	if (_ifp->if_bpf)
    535      1.55     joerg 		bpf_ops->bpf_mtap_sl_out(_ifp->if_bpf, _hdr, _m);
    536      1.55     joerg }
    537      1.55     joerg 
    538      1.70  christos static __inline void
    539      1.69     ozaki bpf_mtap_softint_init(struct ifnet *_ifp)
    540      1.69     ozaki {
    541      1.69     ozaki 
    542      1.69     ozaki 	bpf_ops->bpf_mtap_softint_init(_ifp);
    543      1.69     ozaki }
    544      1.69     ozaki 
    545      1.70  christos static __inline void
    546      1.69     ozaki bpf_mtap_softint(struct ifnet *_ifp, struct mbuf *_m)
    547      1.69     ozaki {
    548      1.69     ozaki 
    549      1.69     ozaki 	if (_ifp->if_bpf)
    550      1.69     ozaki 		bpf_ops->bpf_mtap_softint(_ifp, _m);
    551      1.69     ozaki }
    552      1.55     joerg 
    553  1.75.6.1   thorpej static __inline int
    554  1.75.6.1   thorpej bpf_register_track_event(struct bpf_if **_dp,
    555  1.75.6.1   thorpej 	    void (*_fun)(struct bpf_if *, struct ifnet *, int, int))
    556  1.75.6.1   thorpej {
    557  1.75.6.1   thorpej 	if (bpf_ops->bpf_register_track_event == NULL)
    558  1.75.6.1   thorpej 		return ENXIO;
    559  1.75.6.1   thorpej 	return bpf_ops->bpf_register_track_event(_dp, _fun);
    560  1.75.6.1   thorpej }
    561  1.75.6.1   thorpej 
    562  1.75.6.1   thorpej static __inline int
    563  1.75.6.1   thorpej bpf_deregister_track_event(struct bpf_if **_dp,
    564  1.75.6.1   thorpej 	    void (*_fun)(struct bpf_if *, struct ifnet *, int, int))
    565  1.75.6.1   thorpej {
    566  1.75.6.1   thorpej 	if (bpf_ops->bpf_deregister_track_event == NULL)
    567  1.75.6.1   thorpej 		return ENXIO;
    568  1.75.6.1   thorpej 	return bpf_ops->bpf_deregister_track_event(_dp, _fun);
    569  1.75.6.1   thorpej }
    570  1.75.6.1   thorpej 
    571      1.65     rmind void	bpf_setops(void);
    572      1.52     pooka 
    573      1.65     rmind void	bpf_ops_handover_enter(struct bpf_ops *);
    574      1.65     rmind void	bpf_ops_handover_exit(void);
    575      1.53     pooka 
    576      1.65     rmind void	bpfilterattach(int);
    577      1.52     pooka 
    578      1.60     rmind bpf_ctx_t *bpf_create(void);
    579      1.60     rmind void	bpf_destroy(bpf_ctx_t *);
    580      1.60     rmind 
    581      1.65     rmind int	bpf_set_cop(bpf_ctx_t *, const bpf_copfunc_t *, size_t);
    582      1.65     rmind int	bpf_set_extmem(bpf_ctx_t *, size_t, bpf_memword_init_t);
    583      1.65     rmind u_int	bpf_filter_ext(const bpf_ctx_t *, const struct bpf_insn *, bpf_args_t *);
    584      1.65     rmind int	bpf_validate_ext(const bpf_ctx_t *, const struct bpf_insn *, int);
    585      1.60     rmind 
    586      1.63     rmind bpfjit_func_t bpf_jit_generate(bpf_ctx_t *, void *, size_t);
    587      1.63     rmind void	bpf_jit_freecode(bpfjit_func_t);
    588      1.63     rmind 
    589      1.62     rmind #endif
    590      1.60     rmind 
    591      1.60     rmind int	bpf_validate(const struct bpf_insn *, int);
    592      1.60     rmind u_int	bpf_filter(const struct bpf_insn *, const u_char *, u_int, u_int);
    593      1.60     rmind 
    594      1.73  christos u_int	bpf_filter_with_aux_data(const struct bpf_insn *, const u_char *, u_int, u_int, const struct bpf_aux_data *);
    595      1.73  christos 
    596  1.75.6.1   thorpej /*
    597  1.75.6.1   thorpej  * events to be tracked by bpf_register_track_event callbacks
    598  1.75.6.1   thorpej  */
    599  1.75.6.1   thorpej #define	BPF_TRACK_EVENT_ATTACH	1
    600  1.75.6.1   thorpej #define	BPF_TRACK_EVENT_DETACH	2
    601  1.75.6.1   thorpej 
    602      1.73  christos 
    603      1.59  christos __END_DECLS
    604      1.59  christos 
    605      1.48      elad #endif /* !_NET_BPF_H_ */
    606