bpf.h revision 1.82 1 1.82 rin /* $NetBSD: bpf.h,v 1.82 2023/08/23 13:21:17 rin Exp $ */
2 1.6 cgd
3 1.5 mycroft /*
4 1.5 mycroft * Copyright (c) 1990, 1991, 1993
5 1.5 mycroft * The Regents of the University of California. All rights reserved.
6 1.1 cgd *
7 1.1 cgd * This code is derived from the Stanford/CMU enet packet filter,
8 1.1 cgd * (net/enet.c) distributed as part of 4.3BSD, and code contributed
9 1.5 mycroft * to Berkeley by Steven McCanne and Van Jacobson both of Lawrence
10 1.2 cgd * Berkeley Laboratory.
11 1.1 cgd *
12 1.1 cgd * Redistribution and use in source and binary forms, with or without
13 1.1 cgd * modification, are permitted provided that the following conditions
14 1.1 cgd * are met:
15 1.1 cgd * 1. Redistributions of source code must retain the above copyright
16 1.1 cgd * notice, this list of conditions and the following disclaimer.
17 1.1 cgd * 2. Redistributions in binary form must reproduce the above copyright
18 1.1 cgd * notice, this list of conditions and the following disclaimer in the
19 1.1 cgd * documentation and/or other materials provided with the distribution.
20 1.32 agc * 3. Neither the name of the University nor the names of its contributors
21 1.1 cgd * may be used to endorse or promote products derived from this software
22 1.1 cgd * without specific prior written permission.
23 1.1 cgd *
24 1.1 cgd * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
25 1.1 cgd * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
26 1.1 cgd * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
27 1.1 cgd * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
28 1.1 cgd * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
29 1.1 cgd * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
30 1.1 cgd * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
31 1.1 cgd * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
32 1.1 cgd * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
33 1.1 cgd * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
34 1.1 cgd * SUCH DAMAGE.
35 1.1 cgd *
36 1.19 fvdl * @(#)bpf.h 8.2 (Berkeley) 1/9/95
37 1.17 christos * @(#) Header: bpf.h,v 1.36 97/06/12 14:29:53 leres Exp (LBL)
38 1.1 cgd */
39 1.1 cgd
40 1.8 jtc #ifndef _NET_BPF_H_
41 1.8 jtc #define _NET_BPF_H_
42 1.27 thorpej
43 1.67 dholland #include <sys/ioccom.h>
44 1.27 thorpej #include <sys/time.h>
45 1.8 jtc
46 1.17 christos /* BSD style release date */
47 1.17 christos #define BPF_RELEASE 199606
48 1.18 christos
49 1.64 alnsn /* Date when COP instructions and external memory have been released. */
50 1.64 alnsn #define BPF_COP_EXTMEM_RELEASE 20140624
51 1.64 alnsn
52 1.59 christos __BEGIN_DECLS
53 1.59 christos
54 1.18 christos typedef int bpf_int32;
55 1.18 christos typedef u_int bpf_u_int32;
56 1.17 christos
57 1.1 cgd /*
58 1.42 perry * Alignment macros. BPF_WORDALIGN rounds up to the next
59 1.42 perry * even multiple of BPF_ALIGNMENT.
60 1.1 cgd */
61 1.1 cgd #define BPF_ALIGNMENT sizeof(long)
62 1.58 bouyer #define BPF_ALIGNMENT32 sizeof(int)
63 1.58 bouyer
64 1.1 cgd #define BPF_WORDALIGN(x) (((x)+(BPF_ALIGNMENT-1))&~(BPF_ALIGNMENT-1))
65 1.58 bouyer #define BPF_WORDALIGN32(x) (((x)+(BPF_ALIGNMENT32-1))&~(BPF_ALIGNMENT32-1))
66 1.1 cgd
67 1.1 cgd #define BPF_MAXINSNS 512
68 1.33 jonathan #define BPF_DFLTBUFSIZE (1024*1024) /* default static upper limit */
69 1.33 jonathan #define BPF_MAXBUFSIZE (1024*1024*16) /* hard limit on sysctl'able value */
70 1.2 cgd #define BPF_MINBUFSIZE 32
71 1.1 cgd
72 1.1 cgd /*
73 1.1 cgd * Structure for BIOCSETF.
74 1.1 cgd */
75 1.1 cgd struct bpf_program {
76 1.1 cgd u_int bf_len;
77 1.1 cgd struct bpf_insn *bf_insns;
78 1.1 cgd };
79 1.42 perry
80 1.1 cgd /*
81 1.43 rpaulo * Struct returned by BIOCGSTATS and net.bpf.stats sysctl.
82 1.1 cgd */
83 1.1 cgd struct bpf_stat {
84 1.45 rpaulo uint64_t bs_recv; /* number of packets received */
85 1.45 rpaulo uint64_t bs_drop; /* number of packets dropped */
86 1.45 rpaulo uint64_t bs_capt; /* number of packets captured */
87 1.45 rpaulo uint64_t bs_padding[13];
88 1.35 darrenr };
89 1.42 perry
90 1.35 darrenr /*
91 1.79 christos * Struct returned by BIOCGSTATS_30.
92 1.35 darrenr */
93 1.79 christos struct bpf_stat30 {
94 1.1 cgd u_int bs_recv; /* number of packets received */
95 1.1 cgd u_int bs_drop; /* number of packets dropped */
96 1.1 cgd };
97 1.1 cgd
98 1.1 cgd /*
99 1.42 perry * Struct return by BIOCVERSION. This represents the version number of
100 1.2 cgd * the filter language described by the instruction encodings below.
101 1.2 cgd * bpf understands a program iff kernel_major == filter_major &&
102 1.2 cgd * kernel_minor >= filter_minor, that is, if the value returned by the
103 1.2 cgd * running kernel has the same major number and a minor number equal
104 1.2 cgd * equal to or less than the filter being downloaded. Otherwise, the
105 1.2 cgd * results are undefined, meaning an error may be returned or packets
106 1.2 cgd * may be accepted haphazardly.
107 1.2 cgd * It has nothing to do with the source code version.
108 1.2 cgd */
109 1.2 cgd struct bpf_version {
110 1.2 cgd u_short bv_major;
111 1.2 cgd u_short bv_minor;
112 1.2 cgd };
113 1.9 mycroft /* Current version number of filter architecture. */
114 1.2 cgd #define BPF_MAJOR_VERSION 1
115 1.2 cgd #define BPF_MINOR_VERSION 1
116 1.2 cgd
117 1.2 cgd /*
118 1.1 cgd * BPF ioctls
119 1.1 cgd *
120 1.1 cgd * The first set is for compatibility with Sun's pcc style
121 1.1 cgd * header files. If your using gcc, we assume that you
122 1.1 cgd * have run fixincludes so the latter set should work.
123 1.1 cgd */
124 1.74 msaitoh #define BIOCGBLEN _IOR('B', 102, u_int)
125 1.74 msaitoh #define BIOCSBLEN _IOWR('B', 102, u_int)
126 1.74 msaitoh #define BIOCSETF _IOW('B', 103, struct bpf_program)
127 1.74 msaitoh #define BIOCFLUSH _IO('B', 104)
128 1.74 msaitoh #define BIOCPROMISC _IO('B', 105)
129 1.74 msaitoh #define BIOCGDLT _IOR('B', 106, u_int)
130 1.74 msaitoh #define BIOCGETIF _IOR('B', 107, struct ifreq)
131 1.74 msaitoh #define BIOCSETIF _IOW('B', 108, struct ifreq)
132 1.49 christos #ifdef COMPAT_50
133 1.49 christos #include <compat/sys/time.h>
134 1.74 msaitoh #define BIOCSORTIMEOUT _IOW('B', 109, struct timeval50)
135 1.74 msaitoh #define BIOCGORTIMEOUT _IOR('B', 110, struct timeval50)
136 1.49 christos #endif
137 1.74 msaitoh #define BIOCGSTATS _IOR('B', 111, struct bpf_stat)
138 1.79 christos #define BIOCGSTATS_30 _IOR('B', 111, struct bpf_stat30)
139 1.74 msaitoh #define BIOCIMMEDIATE _IOW('B', 112, u_int)
140 1.74 msaitoh #define BIOCVERSION _IOR('B', 113, struct bpf_version)
141 1.74 msaitoh #define BIOCSTCPF _IOW('B', 114, struct bpf_program)
142 1.74 msaitoh #define BIOCSUDPF _IOW('B', 115, struct bpf_program)
143 1.74 msaitoh #define BIOCGHDRCMPLT _IOR('B', 116, u_int)
144 1.74 msaitoh #define BIOCSHDRCMPLT _IOW('B', 117, u_int)
145 1.74 msaitoh #define BIOCSDLT _IOW('B', 118, u_int)
146 1.74 msaitoh #define BIOCGDLTLIST _IOWR('B', 119, struct bpf_dltlist)
147 1.74 msaitoh #define BIOCGDIRECTION _IOR('B', 120, u_int)
148 1.74 msaitoh #define BIOCSDIRECTION _IOW('B', 121, u_int)
149 1.74 msaitoh #define BIOCSRTIMEOUT _IOW('B', 122, struct timeval)
150 1.74 msaitoh #define BIOCGRTIMEOUT _IOR('B', 123, struct timeval)
151 1.74 msaitoh #define BIOCGFEEDBACK _IOR('B', 124, u_int)
152 1.74 msaitoh #define BIOCSFEEDBACK _IOW('B', 125, u_int)
153 1.54 christos #define BIOCFEEDBACK BIOCSFEEDBACK /* FreeBSD name */
154 1.75 roy #define BIOCLOCK _IO('B', 126)
155 1.75 roy #define BIOCSETWF _IOW('B', 127, struct bpf_program)
156 1.1 cgd
157 1.72 msaitoh /* Obsolete */
158 1.72 msaitoh #define BIOCGSEESENT BIOCGDIRECTION
159 1.72 msaitoh #define BIOCSSEESENT BIOCSDIRECTION
160 1.72 msaitoh
161 1.72 msaitoh /*
162 1.72 msaitoh * Packet directions.
163 1.72 msaitoh * BPF_D_IN = 0, BPF_D_INOUT =1 for backward compatibility of BIOC[GS]SEESENT.
164 1.72 msaitoh */
165 1.72 msaitoh #define BPF_D_IN 0 /* See incoming packets */
166 1.72 msaitoh #define BPF_D_INOUT 1 /* See incoming and outgoing packets */
167 1.72 msaitoh #define BPF_D_OUT 2 /* See outgoing packets */
168 1.72 msaitoh
169 1.1 cgd /*
170 1.49 christos * Structure prepended to each packet. This is "wire" format, so we
171 1.50 christos * cannot change it unfortunately to 64 bit times on 32 bit systems [yet].
172 1.1 cgd */
173 1.50 christos struct bpf_timeval {
174 1.50 christos long tv_sec;
175 1.50 christos long tv_usec;
176 1.49 christos };
177 1.50 christos
178 1.58 bouyer struct bpf_timeval32 {
179 1.58 bouyer int32_t tv_sec;
180 1.58 bouyer int32_t tv_usec;
181 1.58 bouyer };
182 1.58 bouyer
183 1.1 cgd struct bpf_hdr {
184 1.50 christos struct bpf_timeval bh_tstamp; /* time stamp */
185 1.45 rpaulo uint32_t bh_caplen; /* length of captured portion */
186 1.45 rpaulo uint32_t bh_datalen; /* original length of packet */
187 1.45 rpaulo uint16_t bh_hdrlen; /* length of bpf header (this struct
188 1.1 cgd plus alignment padding) */
189 1.1 cgd };
190 1.58 bouyer
191 1.58 bouyer struct bpf_hdr32 {
192 1.58 bouyer struct bpf_timeval32 bh_tstamp; /* time stamp */
193 1.58 bouyer uint32_t bh_caplen; /* length of captured portion */
194 1.58 bouyer uint32_t bh_datalen; /* original length of packet */
195 1.58 bouyer uint16_t bh_hdrlen; /* length of bpf header (this struct
196 1.58 bouyer plus alignment padding) */
197 1.58 bouyer };
198 1.1 cgd /*
199 1.1 cgd * Because the structure above is not a multiple of 4 bytes, some compilers
200 1.1 cgd * will insist on inserting padding; hence, sizeof(struct bpf_hdr) won't work.
201 1.1 cgd * Only the kernel needs to know about it; applications use bh_hdrlen.
202 1.14 cgd * XXX To save a few bytes on 32-bit machines, we avoid end-of-struct
203 1.14 cgd * XXX padding by using the size of the header data elements. This is
204 1.14 cgd * XXX fail-safe: on new machines, we just use the 'safe' sizeof.
205 1.1 cgd */
206 1.10 jtc #ifdef _KERNEL
207 1.82 rin #if defined(__mips64)
208 1.82 rin #define SIZEOF_BPF_HDR sizeof(struct bpf_hdr)
209 1.82 rin #define SIZEOF_BPF_HDR32 18
210 1.82 rin #elif defined(__arm32__) || defined(__i386__) || defined(__m68k__) || \
211 1.26 eeh defined(__mips__) || defined(__ns32k__) || defined(__vax__) || \
212 1.29 thorpej defined(__sh__) || (defined(__sparc__) && !defined(__sparc64__))
213 1.1 cgd #define SIZEOF_BPF_HDR 18
214 1.58 bouyer #define SIZEOF_BPF_HDR32 18
215 1.14 cgd #else
216 1.14 cgd #define SIZEOF_BPF_HDR sizeof(struct bpf_hdr)
217 1.58 bouyer #define SIZEOF_BPF_HDR32 sizeof(struct bpf_hdr32)
218 1.14 cgd #endif
219 1.1 cgd #endif
220 1.1 cgd
221 1.28 thorpej /* Pull in data-link level type codes. */
222 1.28 thorpej #include <net/dlt.h>
223 1.23 thorpej
224 1.1 cgd /*
225 1.44 rpaulo * The instruction encodings.
226 1.1 cgd */
227 1.2 cgd /* instruction classes */
228 1.1 cgd #define BPF_CLASS(code) ((code) & 0x07)
229 1.1 cgd #define BPF_LD 0x00
230 1.1 cgd #define BPF_LDX 0x01
231 1.1 cgd #define BPF_ST 0x02
232 1.1 cgd #define BPF_STX 0x03
233 1.1 cgd #define BPF_ALU 0x04
234 1.1 cgd #define BPF_JMP 0x05
235 1.1 cgd #define BPF_RET 0x06
236 1.1 cgd #define BPF_MISC 0x07
237 1.1 cgd
238 1.1 cgd /* ld/ldx fields */
239 1.1 cgd #define BPF_SIZE(code) ((code) & 0x18)
240 1.1 cgd #define BPF_W 0x00
241 1.1 cgd #define BPF_H 0x08
242 1.1 cgd #define BPF_B 0x10
243 1.66 christos /* 0x18 reserved; used by BSD/OS */
244 1.1 cgd #define BPF_MODE(code) ((code) & 0xe0)
245 1.1 cgd #define BPF_IMM 0x00
246 1.1 cgd #define BPF_ABS 0x20
247 1.1 cgd #define BPF_IND 0x40
248 1.1 cgd #define BPF_MEM 0x60
249 1.1 cgd #define BPF_LEN 0x80
250 1.1 cgd #define BPF_MSH 0xa0
251 1.66 christos /* 0xc0 reserved; used by BSD/OS */
252 1.66 christos /* 0xe0 reserved; used by BSD/OS */
253 1.1 cgd
254 1.1 cgd /* alu/jmp fields */
255 1.1 cgd #define BPF_OP(code) ((code) & 0xf0)
256 1.1 cgd #define BPF_ADD 0x00
257 1.1 cgd #define BPF_SUB 0x10
258 1.1 cgd #define BPF_MUL 0x20
259 1.1 cgd #define BPF_DIV 0x30
260 1.1 cgd #define BPF_OR 0x40
261 1.1 cgd #define BPF_AND 0x50
262 1.1 cgd #define BPF_LSH 0x60
263 1.1 cgd #define BPF_RSH 0x70
264 1.1 cgd #define BPF_NEG 0x80
265 1.66 christos #define BPF_MOD 0x90
266 1.66 christos #define BPF_XOR 0xa0
267 1.66 christos /* 0xb0 reserved */
268 1.66 christos /* 0xc0 reserved */
269 1.66 christos /* 0xd0 reserved */
270 1.66 christos /* 0xe0 reserved */
271 1.66 christos /* 0xf0 reserved */
272 1.1 cgd #define BPF_JA 0x00
273 1.1 cgd #define BPF_JEQ 0x10
274 1.1 cgd #define BPF_JGT 0x20
275 1.1 cgd #define BPF_JGE 0x30
276 1.1 cgd #define BPF_JSET 0x40
277 1.66 christos /* 0x50 reserved; used by BSD/OS */
278 1.66 christos /* 0x60 reserved */
279 1.66 christos /* 0x70 reserved */
280 1.66 christos /* 0x80 reserved */
281 1.66 christos /* 0x90 reserved */
282 1.66 christos /* 0xa0 reserved */
283 1.66 christos /* 0xb0 reserved */
284 1.66 christos /* 0xc0 reserved */
285 1.66 christos /* 0xd0 reserved */
286 1.66 christos /* 0xe0 reserved */
287 1.66 christos /* 0xf0 reserved */
288 1.1 cgd #define BPF_SRC(code) ((code) & 0x08)
289 1.1 cgd #define BPF_K 0x00
290 1.1 cgd #define BPF_X 0x08
291 1.1 cgd
292 1.1 cgd /* ret - BPF_K and BPF_X also apply */
293 1.1 cgd #define BPF_RVAL(code) ((code) & 0x18)
294 1.1 cgd #define BPF_A 0x10
295 1.66 christos /* 0x18 reserved */
296 1.1 cgd
297 1.1 cgd /* misc */
298 1.1 cgd #define BPF_MISCOP(code) ((code) & 0xf8)
299 1.1 cgd #define BPF_TAX 0x00
300 1.66 christos /* 0x10 reserved */
301 1.66 christos /* 0x18 reserved */
302 1.60 rmind #define BPF_COP 0x20
303 1.66 christos /* 0x28 reserved */
304 1.66 christos /* 0x30 reserved */
305 1.66 christos /* 0x38 reserved */
306 1.66 christos #define BPF_COPX 0x40 /* XXX: also used by BSD/OS */
307 1.66 christos /* 0x48 reserved */
308 1.66 christos /* 0x50 reserved */
309 1.66 christos /* 0x58 reserved */
310 1.66 christos /* 0x60 reserved */
311 1.66 christos /* 0x68 reserved */
312 1.66 christos /* 0x70 reserved */
313 1.66 christos /* 0x78 reserved */
314 1.1 cgd #define BPF_TXA 0x80
315 1.66 christos /* 0x88 reserved */
316 1.66 christos /* 0x90 reserved */
317 1.66 christos /* 0x98 reserved */
318 1.66 christos /* 0xa0 reserved */
319 1.66 christos /* 0xa8 reserved */
320 1.66 christos /* 0xb0 reserved */
321 1.66 christos /* 0xb8 reserved */
322 1.66 christos /* 0xc0 reserved; used by BSD/OS */
323 1.66 christos /* 0xc8 reserved */
324 1.66 christos /* 0xd0 reserved */
325 1.66 christos /* 0xd8 reserved */
326 1.66 christos /* 0xe0 reserved */
327 1.66 christos /* 0xe8 reserved */
328 1.66 christos /* 0xf0 reserved */
329 1.66 christos /* 0xf8 reserved */
330 1.1 cgd
331 1.1 cgd /*
332 1.1 cgd * The instruction data structure.
333 1.1 cgd */
334 1.1 cgd struct bpf_insn {
335 1.45 rpaulo uint16_t code;
336 1.11 cgd u_char jt;
337 1.11 cgd u_char jf;
338 1.46 rpaulo uint32_t k;
339 1.1 cgd };
340 1.1 cgd
341 1.1 cgd /*
342 1.73 christos * Auxiliary data, for use when interpreting a filter intended for the
343 1.73 christos * Linux kernel when the kernel rejects the filter (requiring us to
344 1.73 christos * run it in userland). It contains VLAN tag information.
345 1.73 christos */
346 1.73 christos struct bpf_aux_data {
347 1.73 christos u_short vlan_tag_present;
348 1.73 christos u_short vlan_tag;
349 1.73 christos };
350 1.73 christos
351 1.73 christos /*
352 1.1 cgd * Macros for insn array initializers.
353 1.1 cgd */
354 1.45 rpaulo #define BPF_STMT(code, k) { (uint16_t)(code), 0, 0, k }
355 1.45 rpaulo #define BPF_JUMP(code, k, jt, jf) { (uint16_t)(code), jt, jf, k }
356 1.1 cgd
357 1.30 onoe /*
358 1.63 rmind * Number of scratch memory words (for BPF_LD|BPF_MEM and BPF_ST).
359 1.63 rmind */
360 1.65 rmind #define BPF_MEMWORDS 16
361 1.63 rmind
362 1.63 rmind /*
363 1.65 rmind * bpf_memword_init_t: bits indicate which words in the external memory
364 1.65 rmind * store will be initialised by the caller before BPF program execution.
365 1.64 alnsn */
366 1.64 alnsn typedef uint32_t bpf_memword_init_t;
367 1.65 rmind #define BPF_MEMWORD_INIT(k) (UINT32_C(1) << (k))
368 1.64 alnsn
369 1.65 rmind /* Note: two most significant bits are reserved by bpfjit. */
370 1.64 alnsn __CTASSERT(BPF_MEMWORDS + 2 <= sizeof(bpf_memword_init_t) * NBBY);
371 1.64 alnsn
372 1.64 alnsn #ifdef _KERNEL
373 1.64 alnsn /*
374 1.64 alnsn * Max number of external memory words (for BPF_LD|BPF_MEM and BPF_ST).
375 1.64 alnsn */
376 1.64 alnsn #define BPF_MAX_MEMWORDS 30
377 1.65 rmind
378 1.64 alnsn __CTASSERT(BPF_MAX_MEMWORDS >= BPF_MEMWORDS);
379 1.64 alnsn __CTASSERT(BPF_MAX_MEMWORDS + 2 <= sizeof(bpf_memword_init_t) * NBBY);
380 1.64 alnsn #endif
381 1.64 alnsn
382 1.64 alnsn /*
383 1.30 onoe * Structure to retrieve available DLTs for the interface.
384 1.30 onoe */
385 1.30 onoe struct bpf_dltlist {
386 1.30 onoe u_int bfl_len; /* number of bfd_list array */
387 1.30 onoe u_int *bfl_list; /* array of DLTs */
388 1.30 onoe };
389 1.30 onoe
390 1.63 rmind struct bpf_ctx;
391 1.63 rmind typedef struct bpf_ctx bpf_ctx_t;
392 1.63 rmind
393 1.65 rmind typedef struct bpf_args {
394 1.64 alnsn const uint8_t * pkt;
395 1.64 alnsn size_t wirelen;
396 1.64 alnsn size_t buflen;
397 1.64 alnsn /*
398 1.64 alnsn * The following arguments are used only by some kernel
399 1.64 alnsn * subsystems.
400 1.64 alnsn * They aren't required for classical bpf filter programs.
401 1.64 alnsn * For such programs, bpfjit generated code doesn't read
402 1.64 alnsn * those arguments at all. Note however that bpf interpreter
403 1.64 alnsn * always needs a pointer to memstore.
404 1.64 alnsn */
405 1.64 alnsn uint32_t * mem; /* pointer to external memory store */
406 1.64 alnsn void * arg; /* auxiliary argument for a copfunc */
407 1.65 rmind } bpf_args_t;
408 1.63 rmind
409 1.64 alnsn #if defined(_KERNEL) || defined(__BPF_PRIVATE)
410 1.65 rmind
411 1.64 alnsn typedef uint32_t (*bpf_copfunc_t)(const bpf_ctx_t *, bpf_args_t *, uint32_t);
412 1.64 alnsn
413 1.63 rmind struct bpf_ctx {
414 1.65 rmind /*
415 1.65 rmind * BPF coprocessor functions and the number of them.
416 1.65 rmind */
417 1.63 rmind const bpf_copfunc_t * copfuncs;
418 1.63 rmind size_t nfuncs;
419 1.65 rmind
420 1.64 alnsn /*
421 1.65 rmind * The number of memory words in the external memory store.
422 1.65 rmind * There may be up to BPF_MAX_MEMWORDS words; if zero is set,
423 1.65 rmind * then the internal memory store is used which has a fixed
424 1.65 rmind * number of words (BPF_MEMWORDS).
425 1.64 alnsn */
426 1.64 alnsn size_t extwords;
427 1.65 rmind
428 1.65 rmind /*
429 1.65 rmind * The bitmask indicating which words in the external memstore
430 1.65 rmind * will be initialised by the caller.
431 1.65 rmind */
432 1.65 rmind bpf_memword_init_t preinited;
433 1.63 rmind };
434 1.63 rmind #endif
435 1.63 rmind
436 1.10 jtc #ifdef _KERNEL
437 1.63 rmind #include <net/bpfjit.h>
438 1.55 joerg #include <net/if.h>
439 1.63 rmind
440 1.51 pooka struct bpf_if;
441 1.51 pooka
442 1.52 pooka struct bpf_ops {
443 1.52 pooka void (*bpf_attach)(struct ifnet *, u_int, u_int, struct bpf_if **);
444 1.52 pooka void (*bpf_detach)(struct ifnet *);
445 1.52 pooka void (*bpf_change_type)(struct ifnet *, u_int, u_int);
446 1.52 pooka
447 1.72 msaitoh void (*bpf_mtap)(struct bpf_if *, struct mbuf *, u_int);
448 1.72 msaitoh void (*bpf_mtap2)(struct bpf_if *, void *, u_int, struct mbuf *,
449 1.72 msaitoh u_int);
450 1.72 msaitoh void (*bpf_mtap_af)(struct bpf_if *, uint32_t, struct mbuf *, u_int);
451 1.52 pooka void (*bpf_mtap_sl_in)(struct bpf_if *, u_char *, struct mbuf **);
452 1.52 pooka void (*bpf_mtap_sl_out)(struct bpf_if *, u_char *, struct mbuf *);
453 1.69 ozaki
454 1.69 ozaki void (*bpf_mtap_softint_init)(struct ifnet *);
455 1.69 ozaki void (*bpf_mtap_softint)(struct ifnet *, struct mbuf *);
456 1.77 martin
457 1.77 martin int (*bpf_register_track_event)(struct bpf_if **,
458 1.77 martin void (*)(struct bpf_if *, struct ifnet *, int, int));
459 1.77 martin int (*bpf_deregister_track_event)(struct bpf_if **,
460 1.77 martin void (*)(struct bpf_if *, struct ifnet *, int, int));
461 1.52 pooka };
462 1.55 joerg
463 1.52 pooka extern struct bpf_ops *bpf_ops;
464 1.55 joerg
465 1.70 christos static __inline void
466 1.55 joerg bpf_attach(struct ifnet *_ifp, u_int _dlt, u_int _hdrlen)
467 1.55 joerg {
468 1.55 joerg bpf_ops->bpf_attach(_ifp, _dlt, _hdrlen, &_ifp->if_bpf);
469 1.55 joerg }
470 1.55 joerg
471 1.70 christos static __inline void
472 1.55 joerg bpf_attach2(struct ifnet *_ifp, u_int _dlt, u_int _hdrlen, struct bpf_if **_dp)
473 1.55 joerg {
474 1.55 joerg bpf_ops->bpf_attach(_ifp, _dlt, _hdrlen, _dp);
475 1.55 joerg }
476 1.55 joerg
477 1.70 christos static __inline void
478 1.72 msaitoh bpf_mtap(struct ifnet *_ifp, struct mbuf *_m, u_int _direction)
479 1.55 joerg {
480 1.78 yamaguch if (_ifp->if_bpf) {
481 1.78 yamaguch if (_ifp->if_bpf_mtap) {
482 1.78 yamaguch _ifp->if_bpf_mtap(_ifp->if_bpf, _m, _direction);
483 1.78 yamaguch } else {
484 1.78 yamaguch bpf_ops->bpf_mtap(_ifp->if_bpf, _m, _direction);
485 1.78 yamaguch }
486 1.78 yamaguch }
487 1.55 joerg }
488 1.55 joerg
489 1.70 christos static __inline void
490 1.72 msaitoh bpf_mtap2(struct bpf_if *_bpf, void *_data, u_int _dlen, struct mbuf *_m,
491 1.72 msaitoh u_int _direction)
492 1.55 joerg {
493 1.72 msaitoh bpf_ops->bpf_mtap2(_bpf, _data, _dlen, _m, _direction);
494 1.55 joerg }
495 1.55 joerg
496 1.70 christos static __inline void
497 1.72 msaitoh bpf_mtap3(struct bpf_if *_bpf, struct mbuf *_m, u_int _direction)
498 1.55 joerg {
499 1.55 joerg if (_bpf)
500 1.72 msaitoh bpf_ops->bpf_mtap(_bpf, _m, _direction);
501 1.55 joerg }
502 1.55 joerg
503 1.70 christos static __inline void
504 1.72 msaitoh bpf_mtap_af(struct ifnet *_ifp, uint32_t _af, struct mbuf *_m,
505 1.72 msaitoh u_int _direction)
506 1.55 joerg {
507 1.55 joerg if (_ifp->if_bpf)
508 1.72 msaitoh bpf_ops->bpf_mtap_af(_ifp->if_bpf, _af, _m, _direction);
509 1.55 joerg }
510 1.55 joerg
511 1.70 christos static __inline void
512 1.55 joerg bpf_change_type(struct ifnet *_ifp, u_int _dlt, u_int _hdrlen)
513 1.55 joerg {
514 1.55 joerg bpf_ops->bpf_change_type(_ifp, _dlt, _hdrlen);
515 1.55 joerg }
516 1.55 joerg
517 1.76 martin static __inline bool
518 1.76 martin bpf_peers_present(struct bpf_if *dp)
519 1.76 martin {
520 1.76 martin /*
521 1.76 martin * Our code makes sure the driver visible pointer is NULL
522 1.76 martin * whenever there is no listener on this tap.
523 1.76 martin */
524 1.76 martin return dp != NULL;
525 1.76 martin }
526 1.76 martin
527 1.70 christos static __inline void
528 1.55 joerg bpf_detach(struct ifnet *_ifp)
529 1.55 joerg {
530 1.55 joerg bpf_ops->bpf_detach(_ifp);
531 1.55 joerg }
532 1.55 joerg
533 1.70 christos static __inline void
534 1.55 joerg bpf_mtap_sl_in(struct ifnet *_ifp, u_char *_hdr, struct mbuf **_m)
535 1.55 joerg {
536 1.55 joerg bpf_ops->bpf_mtap_sl_in(_ifp->if_bpf, _hdr, _m);
537 1.55 joerg }
538 1.55 joerg
539 1.70 christos static __inline void
540 1.55 joerg bpf_mtap_sl_out(struct ifnet *_ifp, u_char *_hdr, struct mbuf *_m)
541 1.55 joerg {
542 1.55 joerg if (_ifp->if_bpf)
543 1.55 joerg bpf_ops->bpf_mtap_sl_out(_ifp->if_bpf, _hdr, _m);
544 1.55 joerg }
545 1.55 joerg
546 1.70 christos static __inline void
547 1.69 ozaki bpf_mtap_softint_init(struct ifnet *_ifp)
548 1.69 ozaki {
549 1.69 ozaki
550 1.69 ozaki bpf_ops->bpf_mtap_softint_init(_ifp);
551 1.69 ozaki }
552 1.69 ozaki
553 1.70 christos static __inline void
554 1.69 ozaki bpf_mtap_softint(struct ifnet *_ifp, struct mbuf *_m)
555 1.69 ozaki {
556 1.69 ozaki
557 1.69 ozaki if (_ifp->if_bpf)
558 1.69 ozaki bpf_ops->bpf_mtap_softint(_ifp, _m);
559 1.69 ozaki }
560 1.55 joerg
561 1.77 martin static __inline int
562 1.77 martin bpf_register_track_event(struct bpf_if **_dp,
563 1.77 martin void (*_fun)(struct bpf_if *, struct ifnet *, int, int))
564 1.77 martin {
565 1.77 martin if (bpf_ops->bpf_register_track_event == NULL)
566 1.77 martin return ENXIO;
567 1.77 martin return bpf_ops->bpf_register_track_event(_dp, _fun);
568 1.77 martin }
569 1.77 martin
570 1.77 martin static __inline int
571 1.77 martin bpf_deregister_track_event(struct bpf_if **_dp,
572 1.77 martin void (*_fun)(struct bpf_if *, struct ifnet *, int, int))
573 1.77 martin {
574 1.77 martin if (bpf_ops->bpf_deregister_track_event == NULL)
575 1.77 martin return ENXIO;
576 1.77 martin return bpf_ops->bpf_deregister_track_event(_dp, _fun);
577 1.77 martin }
578 1.77 martin
579 1.65 rmind void bpf_setops(void);
580 1.52 pooka
581 1.65 rmind void bpf_ops_handover_enter(struct bpf_ops *);
582 1.65 rmind void bpf_ops_handover_exit(void);
583 1.53 pooka
584 1.65 rmind void bpfilterattach(int);
585 1.52 pooka
586 1.60 rmind bpf_ctx_t *bpf_create(void);
587 1.60 rmind void bpf_destroy(bpf_ctx_t *);
588 1.60 rmind
589 1.65 rmind int bpf_set_cop(bpf_ctx_t *, const bpf_copfunc_t *, size_t);
590 1.65 rmind int bpf_set_extmem(bpf_ctx_t *, size_t, bpf_memword_init_t);
591 1.65 rmind u_int bpf_filter_ext(const bpf_ctx_t *, const struct bpf_insn *, bpf_args_t *);
592 1.65 rmind int bpf_validate_ext(const bpf_ctx_t *, const struct bpf_insn *, int);
593 1.60 rmind
594 1.63 rmind bpfjit_func_t bpf_jit_generate(bpf_ctx_t *, void *, size_t);
595 1.63 rmind void bpf_jit_freecode(bpfjit_func_t);
596 1.63 rmind
597 1.62 rmind #endif
598 1.60 rmind
599 1.60 rmind int bpf_validate(const struct bpf_insn *, int);
600 1.60 rmind u_int bpf_filter(const struct bpf_insn *, const u_char *, u_int, u_int);
601 1.60 rmind
602 1.73 christos u_int bpf_filter_with_aux_data(const struct bpf_insn *, const u_char *, u_int, u_int, const struct bpf_aux_data *);
603 1.73 christos
604 1.77 martin /*
605 1.77 martin * events to be tracked by bpf_register_track_event callbacks
606 1.77 martin */
607 1.77 martin #define BPF_TRACK_EVENT_ATTACH 1
608 1.77 martin #define BPF_TRACK_EVENT_DETACH 2
609 1.77 martin
610 1.81 christos void bpf_dump(const struct bpf_program *, int);
611 1.81 christos char *bpf_image(const struct bpf_insn *, int);
612 1.73 christos
613 1.59 christos __END_DECLS
614 1.59 christos
615 1.80 christos #if 1 /* XXX: remove me, for the benefit of sanitizers */
616 1.80 christos #define BIOCGSTATSOLD BIOCGSTATS_30
617 1.80 christos #define bpf_stat_old bpf_stat30
618 1.80 christos #endif
619 1.80 christos
620 1.48 elad #endif /* !_NET_BPF_H_ */
621