xref: /minix3/sys/net/bpf.h (revision 37274f3cdbc3af02276b244b5057910ba92f7082)
1*37274f3cSDavid van Moolenbroek /*	$NetBSD: bpf.h,v 1.67 2015/09/05 20:01:21 dholland Exp $	*/
2*37274f3cSDavid van Moolenbroek 
3*37274f3cSDavid van Moolenbroek /*
4*37274f3cSDavid van Moolenbroek  * Copyright (c) 1990, 1991, 1993
5*37274f3cSDavid van Moolenbroek  *	The Regents of the University of California.  All rights reserved.
6*37274f3cSDavid van Moolenbroek  *
7*37274f3cSDavid van Moolenbroek  * This code is derived from the Stanford/CMU enet packet filter,
8*37274f3cSDavid van Moolenbroek  * (net/enet.c) distributed as part of 4.3BSD, and code contributed
9*37274f3cSDavid van Moolenbroek  * to Berkeley by Steven McCanne and Van Jacobson both of Lawrence
10*37274f3cSDavid van Moolenbroek  * Berkeley Laboratory.
11*37274f3cSDavid van Moolenbroek  *
12*37274f3cSDavid van Moolenbroek  * Redistribution and use in source and binary forms, with or without
13*37274f3cSDavid van Moolenbroek  * modification, are permitted provided that the following conditions
14*37274f3cSDavid van Moolenbroek  * are met:
15*37274f3cSDavid van Moolenbroek  * 1. Redistributions of source code must retain the above copyright
16*37274f3cSDavid van Moolenbroek  *    notice, this list of conditions and the following disclaimer.
17*37274f3cSDavid van Moolenbroek  * 2. Redistributions in binary form must reproduce the above copyright
18*37274f3cSDavid van Moolenbroek  *    notice, this list of conditions and the following disclaimer in the
19*37274f3cSDavid van Moolenbroek  *    documentation and/or other materials provided with the distribution.
20*37274f3cSDavid van Moolenbroek  * 3. Neither the name of the University nor the names of its contributors
21*37274f3cSDavid van Moolenbroek  *    may be used to endorse or promote products derived from this software
22*37274f3cSDavid van Moolenbroek  *    without specific prior written permission.
23*37274f3cSDavid van Moolenbroek  *
24*37274f3cSDavid van Moolenbroek  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
25*37274f3cSDavid van Moolenbroek  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
26*37274f3cSDavid van Moolenbroek  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
27*37274f3cSDavid van Moolenbroek  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
28*37274f3cSDavid van Moolenbroek  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
29*37274f3cSDavid van Moolenbroek  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
30*37274f3cSDavid van Moolenbroek  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
31*37274f3cSDavid van Moolenbroek  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
32*37274f3cSDavid van Moolenbroek  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
33*37274f3cSDavid van Moolenbroek  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
34*37274f3cSDavid van Moolenbroek  * SUCH DAMAGE.
35*37274f3cSDavid van Moolenbroek  *
36*37274f3cSDavid van Moolenbroek  *	@(#)bpf.h	8.2 (Berkeley) 1/9/95
37*37274f3cSDavid van Moolenbroek  * @(#) Header: bpf.h,v 1.36 97/06/12 14:29:53 leres Exp  (LBL)
38*37274f3cSDavid van Moolenbroek  */
39*37274f3cSDavid van Moolenbroek 
40*37274f3cSDavid van Moolenbroek #ifndef _NET_BPF_H_
41*37274f3cSDavid van Moolenbroek #define _NET_BPF_H_
42*37274f3cSDavid van Moolenbroek 
43*37274f3cSDavid van Moolenbroek #include <sys/ioccom.h>
44*37274f3cSDavid van Moolenbroek #include <sys/time.h>
45*37274f3cSDavid van Moolenbroek 
46*37274f3cSDavid van Moolenbroek /* BSD style release date */
47*37274f3cSDavid van Moolenbroek #define BPF_RELEASE 199606
48*37274f3cSDavid van Moolenbroek 
49*37274f3cSDavid van Moolenbroek /* Date when COP instructions and external memory have been released. */
50*37274f3cSDavid van Moolenbroek #define BPF_COP_EXTMEM_RELEASE 20140624
51*37274f3cSDavid van Moolenbroek 
52*37274f3cSDavid van Moolenbroek __BEGIN_DECLS
53*37274f3cSDavid van Moolenbroek 
54*37274f3cSDavid van Moolenbroek typedef	int bpf_int32;
55*37274f3cSDavid van Moolenbroek typedef	u_int bpf_u_int32;
56*37274f3cSDavid van Moolenbroek 
57*37274f3cSDavid van Moolenbroek /*
58*37274f3cSDavid van Moolenbroek  * Alignment macros.  BPF_WORDALIGN rounds up to the next
59*37274f3cSDavid van Moolenbroek  * even multiple of BPF_ALIGNMENT.
60*37274f3cSDavid van Moolenbroek  */
61*37274f3cSDavid van Moolenbroek #define BPF_ALIGNMENT sizeof(long)
62*37274f3cSDavid van Moolenbroek #define BPF_ALIGNMENT32 sizeof(int)
63*37274f3cSDavid van Moolenbroek 
64*37274f3cSDavid van Moolenbroek #define BPF_WORDALIGN(x) (((x)+(BPF_ALIGNMENT-1))&~(BPF_ALIGNMENT-1))
65*37274f3cSDavid van Moolenbroek #define BPF_WORDALIGN32(x) (((x)+(BPF_ALIGNMENT32-1))&~(BPF_ALIGNMENT32-1))
66*37274f3cSDavid van Moolenbroek 
67*37274f3cSDavid van Moolenbroek #define BPF_MAXINSNS 512
68*37274f3cSDavid van Moolenbroek #define BPF_DFLTBUFSIZE (1024*1024)	/* default static upper limit */
69*37274f3cSDavid van Moolenbroek #define BPF_MAXBUFSIZE (1024*1024*16)	/* hard limit on sysctl'able value */
70*37274f3cSDavid van Moolenbroek #define BPF_MINBUFSIZE 32
71*37274f3cSDavid van Moolenbroek 
72*37274f3cSDavid van Moolenbroek /*
73*37274f3cSDavid van Moolenbroek  *  Structure for BIOCSETF.
74*37274f3cSDavid van Moolenbroek  */
75*37274f3cSDavid van Moolenbroek struct bpf_program {
76*37274f3cSDavid van Moolenbroek 	u_int bf_len;
77*37274f3cSDavid van Moolenbroek 	struct bpf_insn *bf_insns;
78*37274f3cSDavid van Moolenbroek };
79*37274f3cSDavid van Moolenbroek 
80*37274f3cSDavid van Moolenbroek /*
81*37274f3cSDavid van Moolenbroek  * Struct returned by BIOCGSTATS and net.bpf.stats sysctl.
82*37274f3cSDavid van Moolenbroek  */
83*37274f3cSDavid van Moolenbroek struct bpf_stat {
84*37274f3cSDavid van Moolenbroek 	uint64_t bs_recv;	/* number of packets received */
85*37274f3cSDavid van Moolenbroek 	uint64_t bs_drop;	/* number of packets dropped */
86*37274f3cSDavid van Moolenbroek 	uint64_t bs_capt;	/* number of packets captured */
87*37274f3cSDavid van Moolenbroek 	uint64_t bs_padding[13];
88*37274f3cSDavid van Moolenbroek };
89*37274f3cSDavid van Moolenbroek 
90*37274f3cSDavid van Moolenbroek /*
91*37274f3cSDavid van Moolenbroek  * Struct returned by BIOCGSTATSOLD.
92*37274f3cSDavid van Moolenbroek  */
93*37274f3cSDavid van Moolenbroek struct bpf_stat_old {
94*37274f3cSDavid van Moolenbroek 	u_int bs_recv;		/* number of packets received */
95*37274f3cSDavid van Moolenbroek 	u_int bs_drop;		/* number of packets dropped */
96*37274f3cSDavid van Moolenbroek };
97*37274f3cSDavid van Moolenbroek 
98*37274f3cSDavid van Moolenbroek /*
99*37274f3cSDavid van Moolenbroek  * Struct return by BIOCVERSION.  This represents the version number of
100*37274f3cSDavid van Moolenbroek  * the filter language described by the instruction encodings below.
101*37274f3cSDavid van Moolenbroek  * bpf understands a program iff kernel_major == filter_major &&
102*37274f3cSDavid van Moolenbroek  * kernel_minor >= filter_minor, that is, if the value returned by the
103*37274f3cSDavid van Moolenbroek  * running kernel has the same major number and a minor number equal
104*37274f3cSDavid van Moolenbroek  * equal to or less than the filter being downloaded.  Otherwise, the
105*37274f3cSDavid van Moolenbroek  * results are undefined, meaning an error may be returned or packets
106*37274f3cSDavid van Moolenbroek  * may be accepted haphazardly.
107*37274f3cSDavid van Moolenbroek  * It has nothing to do with the source code version.
108*37274f3cSDavid van Moolenbroek  */
109*37274f3cSDavid van Moolenbroek struct bpf_version {
110*37274f3cSDavid van Moolenbroek 	u_short bv_major;
111*37274f3cSDavid van Moolenbroek 	u_short bv_minor;
112*37274f3cSDavid van Moolenbroek };
113*37274f3cSDavid van Moolenbroek /* Current version number of filter architecture. */
114*37274f3cSDavid van Moolenbroek #define BPF_MAJOR_VERSION 1
115*37274f3cSDavid van Moolenbroek #define BPF_MINOR_VERSION 1
116*37274f3cSDavid van Moolenbroek 
117*37274f3cSDavid van Moolenbroek /*
118*37274f3cSDavid van Moolenbroek  * BPF ioctls
119*37274f3cSDavid van Moolenbroek  *
120*37274f3cSDavid van Moolenbroek  * The first set is for compatibility with Sun's pcc style
121*37274f3cSDavid van Moolenbroek  * header files.  If your using gcc, we assume that you
122*37274f3cSDavid van Moolenbroek  * have run fixincludes so the latter set should work.
123*37274f3cSDavid van Moolenbroek  */
124*37274f3cSDavid van Moolenbroek #define BIOCGBLEN	 _IOR('B',102, u_int)
125*37274f3cSDavid van Moolenbroek #define BIOCSBLEN	_IOWR('B',102, u_int)
126*37274f3cSDavid van Moolenbroek #define BIOCSETF	 _IOW('B',103, struct bpf_program)
127*37274f3cSDavid van Moolenbroek #define BIOCFLUSH	  _IO('B',104)
128*37274f3cSDavid van Moolenbroek #define BIOCPROMISC	  _IO('B',105)
129*37274f3cSDavid van Moolenbroek #define BIOCGDLT	 _IOR('B',106, u_int)
130*37274f3cSDavid van Moolenbroek #define BIOCGETIF	 _IOR('B',107, struct ifreq)
131*37274f3cSDavid van Moolenbroek #define BIOCSETIF	 _IOW('B',108, struct ifreq)
132*37274f3cSDavid van Moolenbroek #ifdef COMPAT_50
133*37274f3cSDavid van Moolenbroek #include <compat/sys/time.h>
134*37274f3cSDavid van Moolenbroek #define BIOCSORTIMEOUT	 _IOW('B',109, struct timeval50)
135*37274f3cSDavid van Moolenbroek #define BIOCGORTIMEOUT	 _IOR('B',110, struct timeval50)
136*37274f3cSDavid van Moolenbroek #endif
137*37274f3cSDavid van Moolenbroek #define BIOCGSTATS	 _IOR('B',111, struct bpf_stat)
138*37274f3cSDavid van Moolenbroek #define BIOCGSTATSOLD	 _IOR('B',111, struct bpf_stat_old)
139*37274f3cSDavid van Moolenbroek #define BIOCIMMEDIATE	 _IOW('B',112, u_int)
140*37274f3cSDavid van Moolenbroek #define BIOCVERSION	 _IOR('B',113, struct bpf_version)
141*37274f3cSDavid van Moolenbroek #define BIOCSTCPF	 _IOW('B',114, struct bpf_program)
142*37274f3cSDavid van Moolenbroek #define BIOCSUDPF	 _IOW('B',115, struct bpf_program)
143*37274f3cSDavid van Moolenbroek #define BIOCGHDRCMPLT	 _IOR('B',116, u_int)
144*37274f3cSDavid van Moolenbroek #define BIOCSHDRCMPLT	 _IOW('B',117, u_int)
145*37274f3cSDavid van Moolenbroek #define BIOCSDLT	 _IOW('B',118, u_int)
146*37274f3cSDavid van Moolenbroek #define BIOCGDLTLIST	_IOWR('B',119, struct bpf_dltlist)
147*37274f3cSDavid van Moolenbroek #define BIOCGSEESENT	 _IOR('B',120, u_int)
148*37274f3cSDavid van Moolenbroek #define BIOCSSEESENT	 _IOW('B',121, u_int)
149*37274f3cSDavid van Moolenbroek #define BIOCSRTIMEOUT	 _IOW('B',122, struct timeval)
150*37274f3cSDavid van Moolenbroek #define BIOCGRTIMEOUT	 _IOR('B',123, struct timeval)
151*37274f3cSDavid van Moolenbroek #define BIOCGFEEDBACK	 _IOR('B',124, u_int)
152*37274f3cSDavid van Moolenbroek #define BIOCSFEEDBACK	 _IOW('B',125, u_int)
153*37274f3cSDavid van Moolenbroek #define BIOCFEEDBACK     BIOCSFEEDBACK		/* FreeBSD name */
154*37274f3cSDavid van Moolenbroek 
155*37274f3cSDavid van Moolenbroek /*
156*37274f3cSDavid van Moolenbroek  * Structure prepended to each packet. This is "wire" format, so we
157*37274f3cSDavid van Moolenbroek  * cannot change it unfortunately to 64 bit times on 32 bit systems [yet].
158*37274f3cSDavid van Moolenbroek  */
159*37274f3cSDavid van Moolenbroek struct bpf_timeval {
160*37274f3cSDavid van Moolenbroek 	long tv_sec;
161*37274f3cSDavid van Moolenbroek 	long tv_usec;
162*37274f3cSDavid van Moolenbroek };
163*37274f3cSDavid van Moolenbroek 
164*37274f3cSDavid van Moolenbroek struct bpf_timeval32 {
165*37274f3cSDavid van Moolenbroek 	int32_t tv_sec;
166*37274f3cSDavid van Moolenbroek 	int32_t tv_usec;
167*37274f3cSDavid van Moolenbroek };
168*37274f3cSDavid van Moolenbroek 
169*37274f3cSDavid van Moolenbroek struct bpf_hdr {
170*37274f3cSDavid van Moolenbroek 	struct bpf_timeval bh_tstamp;	/* time stamp */
171*37274f3cSDavid van Moolenbroek 	uint32_t	bh_caplen;	/* length of captured portion */
172*37274f3cSDavid van Moolenbroek 	uint32_t	bh_datalen;	/* original length of packet */
173*37274f3cSDavid van Moolenbroek 	uint16_t	bh_hdrlen;	/* length of bpf header (this struct
174*37274f3cSDavid van Moolenbroek 					   plus alignment padding) */
175*37274f3cSDavid van Moolenbroek };
176*37274f3cSDavid van Moolenbroek 
177*37274f3cSDavid van Moolenbroek struct bpf_hdr32 {
178*37274f3cSDavid van Moolenbroek 	struct bpf_timeval32 bh_tstamp;	/* time stamp */
179*37274f3cSDavid van Moolenbroek 	uint32_t	bh_caplen;	/* length of captured portion */
180*37274f3cSDavid van Moolenbroek 	uint32_t	bh_datalen;	/* original length of packet */
181*37274f3cSDavid van Moolenbroek 	uint16_t	bh_hdrlen;	/* length of bpf header (this struct
182*37274f3cSDavid van Moolenbroek 					   plus alignment padding) */
183*37274f3cSDavid van Moolenbroek };
184*37274f3cSDavid van Moolenbroek /*
185*37274f3cSDavid van Moolenbroek  * Because the structure above is not a multiple of 4 bytes, some compilers
186*37274f3cSDavid van Moolenbroek  * will insist on inserting padding; hence, sizeof(struct bpf_hdr) won't work.
187*37274f3cSDavid van Moolenbroek  * Only the kernel needs to know about it; applications use bh_hdrlen.
188*37274f3cSDavid van Moolenbroek  * XXX To save a few bytes on 32-bit machines, we avoid end-of-struct
189*37274f3cSDavid van Moolenbroek  * XXX padding by using the size of the header data elements.  This is
190*37274f3cSDavid van Moolenbroek  * XXX fail-safe: on new machines, we just use the 'safe' sizeof.
191*37274f3cSDavid van Moolenbroek  */
192*37274f3cSDavid van Moolenbroek #ifdef _KERNEL
193*37274f3cSDavid van Moolenbroek #if defined(__arm32__) || defined(__i386__) || defined(__m68k__) || \
194*37274f3cSDavid van Moolenbroek     defined(__mips__) || defined(__ns32k__) || defined(__vax__) || \
195*37274f3cSDavid van Moolenbroek     defined(__sh__) || (defined(__sparc__) && !defined(__sparc64__))
196*37274f3cSDavid van Moolenbroek #define SIZEOF_BPF_HDR 18
197*37274f3cSDavid van Moolenbroek #define SIZEOF_BPF_HDR32 18
198*37274f3cSDavid van Moolenbroek #else
199*37274f3cSDavid van Moolenbroek #define SIZEOF_BPF_HDR sizeof(struct bpf_hdr)
200*37274f3cSDavid van Moolenbroek #define SIZEOF_BPF_HDR32 sizeof(struct bpf_hdr32)
201*37274f3cSDavid van Moolenbroek #endif
202*37274f3cSDavid van Moolenbroek #endif
203*37274f3cSDavid van Moolenbroek 
204*37274f3cSDavid van Moolenbroek /* Pull in data-link level type codes. */
205*37274f3cSDavid van Moolenbroek #include <net/dlt.h>
206*37274f3cSDavid van Moolenbroek 
207*37274f3cSDavid van Moolenbroek /*
208*37274f3cSDavid van Moolenbroek  * The instruction encodings.
209*37274f3cSDavid van Moolenbroek  */
210*37274f3cSDavid van Moolenbroek /* instruction classes */
211*37274f3cSDavid van Moolenbroek #define BPF_CLASS(code) ((code) & 0x07)
212*37274f3cSDavid van Moolenbroek #define		BPF_LD		0x00
213*37274f3cSDavid van Moolenbroek #define		BPF_LDX		0x01
214*37274f3cSDavid van Moolenbroek #define		BPF_ST		0x02
215*37274f3cSDavid van Moolenbroek #define		BPF_STX		0x03
216*37274f3cSDavid van Moolenbroek #define		BPF_ALU		0x04
217*37274f3cSDavid van Moolenbroek #define		BPF_JMP		0x05
218*37274f3cSDavid van Moolenbroek #define		BPF_RET		0x06
219*37274f3cSDavid van Moolenbroek #define		BPF_MISC	0x07
220*37274f3cSDavid van Moolenbroek 
221*37274f3cSDavid van Moolenbroek /* ld/ldx fields */
222*37274f3cSDavid van Moolenbroek #define BPF_SIZE(code)	((code) & 0x18)
223*37274f3cSDavid van Moolenbroek #define		BPF_W		0x00
224*37274f3cSDavid van Moolenbroek #define		BPF_H		0x08
225*37274f3cSDavid van Moolenbroek #define		BPF_B		0x10
226*37274f3cSDavid van Moolenbroek /*				0x18	reserved; used by BSD/OS */
227*37274f3cSDavid van Moolenbroek #define BPF_MODE(code)	((code) & 0xe0)
228*37274f3cSDavid van Moolenbroek #define		BPF_IMM 	0x00
229*37274f3cSDavid van Moolenbroek #define		BPF_ABS		0x20
230*37274f3cSDavid van Moolenbroek #define		BPF_IND		0x40
231*37274f3cSDavid van Moolenbroek #define		BPF_MEM		0x60
232*37274f3cSDavid van Moolenbroek #define		BPF_LEN		0x80
233*37274f3cSDavid van Moolenbroek #define		BPF_MSH		0xa0
234*37274f3cSDavid van Moolenbroek /*				0xc0	reserved; used by BSD/OS */
235*37274f3cSDavid van Moolenbroek /*				0xe0	reserved; used by BSD/OS */
236*37274f3cSDavid van Moolenbroek 
237*37274f3cSDavid van Moolenbroek /* alu/jmp fields */
238*37274f3cSDavid van Moolenbroek #define BPF_OP(code)	((code) & 0xf0)
239*37274f3cSDavid van Moolenbroek #define		BPF_ADD		0x00
240*37274f3cSDavid van Moolenbroek #define		BPF_SUB		0x10
241*37274f3cSDavid van Moolenbroek #define		BPF_MUL		0x20
242*37274f3cSDavid van Moolenbroek #define		BPF_DIV		0x30
243*37274f3cSDavid van Moolenbroek #define		BPF_OR		0x40
244*37274f3cSDavid van Moolenbroek #define		BPF_AND		0x50
245*37274f3cSDavid van Moolenbroek #define		BPF_LSH		0x60
246*37274f3cSDavid van Moolenbroek #define		BPF_RSH		0x70
247*37274f3cSDavid van Moolenbroek #define		BPF_NEG		0x80
248*37274f3cSDavid van Moolenbroek #define		BPF_MOD		0x90
249*37274f3cSDavid van Moolenbroek #define		BPF_XOR		0xa0
250*37274f3cSDavid van Moolenbroek /*				0xb0	reserved */
251*37274f3cSDavid van Moolenbroek /*				0xc0	reserved */
252*37274f3cSDavid van Moolenbroek /*				0xd0	reserved */
253*37274f3cSDavid van Moolenbroek /*				0xe0	reserved */
254*37274f3cSDavid van Moolenbroek /*				0xf0	reserved */
255*37274f3cSDavid van Moolenbroek #define		BPF_JA		0x00
256*37274f3cSDavid van Moolenbroek #define		BPF_JEQ		0x10
257*37274f3cSDavid van Moolenbroek #define		BPF_JGT		0x20
258*37274f3cSDavid van Moolenbroek #define		BPF_JGE		0x30
259*37274f3cSDavid van Moolenbroek #define		BPF_JSET	0x40
260*37274f3cSDavid van Moolenbroek /*				0x50	reserved; used by BSD/OS */
261*37274f3cSDavid van Moolenbroek /*				0x60	reserved */
262*37274f3cSDavid van Moolenbroek /*				0x70	reserved */
263*37274f3cSDavid van Moolenbroek /*				0x80	reserved */
264*37274f3cSDavid van Moolenbroek /*				0x90	reserved */
265*37274f3cSDavid van Moolenbroek /*				0xa0	reserved */
266*37274f3cSDavid van Moolenbroek /*				0xb0	reserved */
267*37274f3cSDavid van Moolenbroek /*				0xc0	reserved */
268*37274f3cSDavid van Moolenbroek /*				0xd0	reserved */
269*37274f3cSDavid van Moolenbroek /*				0xe0	reserved */
270*37274f3cSDavid van Moolenbroek /*				0xf0	reserved */
271*37274f3cSDavid van Moolenbroek #define BPF_SRC(code)	((code) & 0x08)
272*37274f3cSDavid van Moolenbroek #define		BPF_K		0x00
273*37274f3cSDavid van Moolenbroek #define		BPF_X		0x08
274*37274f3cSDavid van Moolenbroek 
275*37274f3cSDavid van Moolenbroek /* ret - BPF_K and BPF_X also apply */
276*37274f3cSDavid van Moolenbroek #define BPF_RVAL(code)	((code) & 0x18)
277*37274f3cSDavid van Moolenbroek #define		BPF_A		0x10
278*37274f3cSDavid van Moolenbroek /*				0x18	reserved */
279*37274f3cSDavid van Moolenbroek 
280*37274f3cSDavid van Moolenbroek /* misc */
281*37274f3cSDavid van Moolenbroek #define BPF_MISCOP(code) ((code) & 0xf8)
282*37274f3cSDavid van Moolenbroek #define		BPF_TAX		0x00
283*37274f3cSDavid van Moolenbroek /*				0x10	reserved */
284*37274f3cSDavid van Moolenbroek /*				0x18	reserved */
285*37274f3cSDavid van Moolenbroek #define		BPF_COP		0x20
286*37274f3cSDavid van Moolenbroek /*				0x28	reserved */
287*37274f3cSDavid van Moolenbroek /*				0x30	reserved */
288*37274f3cSDavid van Moolenbroek /*				0x38	reserved */
289*37274f3cSDavid van Moolenbroek #define		BPF_COPX	0x40	/* XXX: also used by BSD/OS */
290*37274f3cSDavid van Moolenbroek /*				0x48	reserved */
291*37274f3cSDavid van Moolenbroek /*				0x50	reserved */
292*37274f3cSDavid van Moolenbroek /*				0x58	reserved */
293*37274f3cSDavid van Moolenbroek /*				0x60	reserved */
294*37274f3cSDavid van Moolenbroek /*				0x68	reserved */
295*37274f3cSDavid van Moolenbroek /*				0x70	reserved */
296*37274f3cSDavid van Moolenbroek /*				0x78	reserved */
297*37274f3cSDavid van Moolenbroek #define		BPF_TXA		0x80
298*37274f3cSDavid van Moolenbroek /*				0x88	reserved */
299*37274f3cSDavid van Moolenbroek /*				0x90	reserved */
300*37274f3cSDavid van Moolenbroek /*				0x98	reserved */
301*37274f3cSDavid van Moolenbroek /*				0xa0	reserved */
302*37274f3cSDavid van Moolenbroek /*				0xa8	reserved */
303*37274f3cSDavid van Moolenbroek /*				0xb0	reserved */
304*37274f3cSDavid van Moolenbroek /*				0xb8	reserved */
305*37274f3cSDavid van Moolenbroek /*				0xc0	reserved; used by BSD/OS */
306*37274f3cSDavid van Moolenbroek /*				0xc8	reserved */
307*37274f3cSDavid van Moolenbroek /*				0xd0	reserved */
308*37274f3cSDavid van Moolenbroek /*				0xd8	reserved */
309*37274f3cSDavid van Moolenbroek /*				0xe0	reserved */
310*37274f3cSDavid van Moolenbroek /*				0xe8	reserved */
311*37274f3cSDavid van Moolenbroek /*				0xf0	reserved */
312*37274f3cSDavid van Moolenbroek /*				0xf8	reserved */
313*37274f3cSDavid van Moolenbroek 
314*37274f3cSDavid van Moolenbroek /*
315*37274f3cSDavid van Moolenbroek  * The instruction data structure.
316*37274f3cSDavid van Moolenbroek  */
317*37274f3cSDavid van Moolenbroek struct bpf_insn {
318*37274f3cSDavid van Moolenbroek 	uint16_t  code;
319*37274f3cSDavid van Moolenbroek 	u_char 	  jt;
320*37274f3cSDavid van Moolenbroek 	u_char 	  jf;
321*37274f3cSDavid van Moolenbroek 	uint32_t  k;
322*37274f3cSDavid van Moolenbroek };
323*37274f3cSDavid van Moolenbroek 
324*37274f3cSDavid van Moolenbroek /*
325*37274f3cSDavid van Moolenbroek  * Macros for insn array initializers.
326*37274f3cSDavid van Moolenbroek  */
327*37274f3cSDavid van Moolenbroek #define BPF_STMT(code, k) { (uint16_t)(code), 0, 0, k }
328*37274f3cSDavid van Moolenbroek #define BPF_JUMP(code, k, jt, jf) { (uint16_t)(code), jt, jf, k }
329*37274f3cSDavid van Moolenbroek 
330*37274f3cSDavid van Moolenbroek /*
331*37274f3cSDavid van Moolenbroek  * Number of scratch memory words (for BPF_LD|BPF_MEM and BPF_ST).
332*37274f3cSDavid van Moolenbroek  */
333*37274f3cSDavid van Moolenbroek #define	BPF_MEMWORDS		16
334*37274f3cSDavid van Moolenbroek 
335*37274f3cSDavid van Moolenbroek /*
336*37274f3cSDavid van Moolenbroek  * bpf_memword_init_t: bits indicate which words in the external memory
337*37274f3cSDavid van Moolenbroek  * store will be initialised by the caller before BPF program execution.
338*37274f3cSDavid van Moolenbroek  */
339*37274f3cSDavid van Moolenbroek typedef uint32_t bpf_memword_init_t;
340*37274f3cSDavid van Moolenbroek #define	BPF_MEMWORD_INIT(k)	(UINT32_C(1) << (k))
341*37274f3cSDavid van Moolenbroek 
342*37274f3cSDavid van Moolenbroek /* Note: two most significant bits are reserved by bpfjit. */
343*37274f3cSDavid van Moolenbroek __CTASSERT(BPF_MEMWORDS + 2 <= sizeof(bpf_memword_init_t) * NBBY);
344*37274f3cSDavid van Moolenbroek 
345*37274f3cSDavid van Moolenbroek #ifdef _KERNEL
346*37274f3cSDavid van Moolenbroek /*
347*37274f3cSDavid van Moolenbroek  * Max number of external memory words (for BPF_LD|BPF_MEM and BPF_ST).
348*37274f3cSDavid van Moolenbroek  */
349*37274f3cSDavid van Moolenbroek #define	BPF_MAX_MEMWORDS	30
350*37274f3cSDavid van Moolenbroek 
351*37274f3cSDavid van Moolenbroek __CTASSERT(BPF_MAX_MEMWORDS >= BPF_MEMWORDS);
352*37274f3cSDavid van Moolenbroek __CTASSERT(BPF_MAX_MEMWORDS + 2 <= sizeof(bpf_memword_init_t) * NBBY);
353*37274f3cSDavid van Moolenbroek #endif
354*37274f3cSDavid van Moolenbroek 
355*37274f3cSDavid van Moolenbroek /*
356*37274f3cSDavid van Moolenbroek  * Structure to retrieve available DLTs for the interface.
357*37274f3cSDavid van Moolenbroek  */
358*37274f3cSDavid van Moolenbroek struct bpf_dltlist {
359*37274f3cSDavid van Moolenbroek 	u_int	bfl_len;	/* number of bfd_list array */
360*37274f3cSDavid van Moolenbroek 	u_int	*bfl_list;	/* array of DLTs */
361*37274f3cSDavid van Moolenbroek };
362*37274f3cSDavid van Moolenbroek 
363*37274f3cSDavid van Moolenbroek struct bpf_ctx;
364*37274f3cSDavid van Moolenbroek typedef struct bpf_ctx bpf_ctx_t;
365*37274f3cSDavid van Moolenbroek 
366*37274f3cSDavid van Moolenbroek typedef struct bpf_args {
367*37274f3cSDavid van Moolenbroek 	const uint8_t *	pkt;
368*37274f3cSDavid van Moolenbroek 	size_t		wirelen;
369*37274f3cSDavid van Moolenbroek 	size_t		buflen;
370*37274f3cSDavid van Moolenbroek 	/*
371*37274f3cSDavid van Moolenbroek 	 * The following arguments are used only by some kernel
372*37274f3cSDavid van Moolenbroek 	 * subsystems.
373*37274f3cSDavid van Moolenbroek 	 * They aren't required for classical bpf filter programs.
374*37274f3cSDavid van Moolenbroek 	 * For such programs, bpfjit generated code doesn't read
375*37274f3cSDavid van Moolenbroek 	 * those arguments at all. Note however that bpf interpreter
376*37274f3cSDavid van Moolenbroek 	 * always needs a pointer to memstore.
377*37274f3cSDavid van Moolenbroek 	 */
378*37274f3cSDavid van Moolenbroek 	uint32_t *	mem; /* pointer to external memory store */
379*37274f3cSDavid van Moolenbroek 	void *		arg; /* auxiliary argument for a copfunc */
380*37274f3cSDavid van Moolenbroek } bpf_args_t;
381*37274f3cSDavid van Moolenbroek 
382*37274f3cSDavid van Moolenbroek #if defined(_KERNEL) || defined(__BPF_PRIVATE)
383*37274f3cSDavid van Moolenbroek 
384*37274f3cSDavid van Moolenbroek typedef uint32_t (*bpf_copfunc_t)(const bpf_ctx_t *, bpf_args_t *, uint32_t);
385*37274f3cSDavid van Moolenbroek 
386*37274f3cSDavid van Moolenbroek struct bpf_ctx {
387*37274f3cSDavid van Moolenbroek 	/*
388*37274f3cSDavid van Moolenbroek 	 * BPF coprocessor functions and the number of them.
389*37274f3cSDavid van Moolenbroek 	 */
390*37274f3cSDavid van Moolenbroek 	const bpf_copfunc_t *	copfuncs;
391*37274f3cSDavid van Moolenbroek 	size_t			nfuncs;
392*37274f3cSDavid van Moolenbroek 
393*37274f3cSDavid van Moolenbroek 	/*
394*37274f3cSDavid van Moolenbroek 	 * The number of memory words in the external memory store.
395*37274f3cSDavid van Moolenbroek 	 * There may be up to BPF_MAX_MEMWORDS words; if zero is set,
396*37274f3cSDavid van Moolenbroek 	 * then the internal memory store is used which has a fixed
397*37274f3cSDavid van Moolenbroek 	 * number of words (BPF_MEMWORDS).
398*37274f3cSDavid van Moolenbroek 	 */
399*37274f3cSDavid van Moolenbroek 	size_t			extwords;
400*37274f3cSDavid van Moolenbroek 
401*37274f3cSDavid van Moolenbroek 	/*
402*37274f3cSDavid van Moolenbroek 	 * The bitmask indicating which words in the external memstore
403*37274f3cSDavid van Moolenbroek 	 * will be initialised by the caller.
404*37274f3cSDavid van Moolenbroek 	 */
405*37274f3cSDavid van Moolenbroek 	bpf_memword_init_t	preinited;
406*37274f3cSDavid van Moolenbroek };
407*37274f3cSDavid van Moolenbroek #endif
408*37274f3cSDavid van Moolenbroek 
409*37274f3cSDavid van Moolenbroek #ifdef _KERNEL
410*37274f3cSDavid van Moolenbroek #include <net/bpfjit.h>
411*37274f3cSDavid van Moolenbroek #include <net/if.h>
412*37274f3cSDavid van Moolenbroek 
413*37274f3cSDavid van Moolenbroek struct bpf_if;
414*37274f3cSDavid van Moolenbroek 
415*37274f3cSDavid van Moolenbroek struct bpf_ops {
416*37274f3cSDavid van Moolenbroek 	void (*bpf_attach)(struct ifnet *, u_int, u_int, struct bpf_if **);
417*37274f3cSDavid van Moolenbroek 	void (*bpf_detach)(struct ifnet *);
418*37274f3cSDavid van Moolenbroek 	void (*bpf_change_type)(struct ifnet *, u_int, u_int);
419*37274f3cSDavid van Moolenbroek 
420*37274f3cSDavid van Moolenbroek 	void (*bpf_tap)(struct bpf_if *, u_char *, u_int);
421*37274f3cSDavid van Moolenbroek 	void (*bpf_mtap)(struct bpf_if *, struct mbuf *);
422*37274f3cSDavid van Moolenbroek 	void (*bpf_mtap2)(struct bpf_if *, void *, u_int, struct mbuf *);
423*37274f3cSDavid van Moolenbroek 	void (*bpf_mtap_af)(struct bpf_if *, uint32_t, struct mbuf *);
424*37274f3cSDavid van Moolenbroek 	void (*bpf_mtap_sl_in)(struct bpf_if *, u_char *, struct mbuf **);
425*37274f3cSDavid van Moolenbroek 	void (*bpf_mtap_sl_out)(struct bpf_if *, u_char *, struct mbuf *);
426*37274f3cSDavid van Moolenbroek };
427*37274f3cSDavid van Moolenbroek 
428*37274f3cSDavid van Moolenbroek extern struct bpf_ops *bpf_ops;
429*37274f3cSDavid van Moolenbroek 
430*37274f3cSDavid van Moolenbroek static inline void
bpf_attach(struct ifnet * _ifp,u_int _dlt,u_int _hdrlen)431*37274f3cSDavid van Moolenbroek bpf_attach(struct ifnet *_ifp, u_int _dlt, u_int _hdrlen)
432*37274f3cSDavid van Moolenbroek {
433*37274f3cSDavid van Moolenbroek 	bpf_ops->bpf_attach(_ifp, _dlt, _hdrlen, &_ifp->if_bpf);
434*37274f3cSDavid van Moolenbroek }
435*37274f3cSDavid van Moolenbroek 
436*37274f3cSDavid van Moolenbroek static inline void
bpf_attach2(struct ifnet * _ifp,u_int _dlt,u_int _hdrlen,struct bpf_if ** _dp)437*37274f3cSDavid van Moolenbroek bpf_attach2(struct ifnet *_ifp, u_int _dlt, u_int _hdrlen, struct bpf_if **_dp)
438*37274f3cSDavid van Moolenbroek {
439*37274f3cSDavid van Moolenbroek 	bpf_ops->bpf_attach(_ifp, _dlt, _hdrlen, _dp);
440*37274f3cSDavid van Moolenbroek }
441*37274f3cSDavid van Moolenbroek 
442*37274f3cSDavid van Moolenbroek static inline void
bpf_tap(struct ifnet * _ifp,u_char * _pkt,u_int _len)443*37274f3cSDavid van Moolenbroek bpf_tap(struct ifnet *_ifp, u_char *_pkt, u_int _len)
444*37274f3cSDavid van Moolenbroek {
445*37274f3cSDavid van Moolenbroek 	if (_ifp->if_bpf)
446*37274f3cSDavid van Moolenbroek 		bpf_ops->bpf_tap(_ifp->if_bpf, _pkt, _len);
447*37274f3cSDavid van Moolenbroek }
448*37274f3cSDavid van Moolenbroek 
449*37274f3cSDavid van Moolenbroek static inline void
bpf_mtap(struct ifnet * _ifp,struct mbuf * _m)450*37274f3cSDavid van Moolenbroek bpf_mtap(struct ifnet *_ifp, struct mbuf *_m)
451*37274f3cSDavid van Moolenbroek {
452*37274f3cSDavid van Moolenbroek 	if (_ifp->if_bpf)
453*37274f3cSDavid van Moolenbroek 		bpf_ops->bpf_mtap(_ifp->if_bpf, _m);
454*37274f3cSDavid van Moolenbroek }
455*37274f3cSDavid van Moolenbroek 
456*37274f3cSDavid van Moolenbroek static inline void
bpf_mtap2(struct bpf_if * _bpf,void * _data,u_int _dlen,struct mbuf * _m)457*37274f3cSDavid van Moolenbroek bpf_mtap2(struct bpf_if *_bpf, void *_data, u_int _dlen, struct mbuf *_m)
458*37274f3cSDavid van Moolenbroek {
459*37274f3cSDavid van Moolenbroek 	bpf_ops->bpf_mtap2(_bpf, _data, _dlen, _m);
460*37274f3cSDavid van Moolenbroek }
461*37274f3cSDavid van Moolenbroek 
462*37274f3cSDavid van Moolenbroek static inline void
bpf_mtap3(struct bpf_if * _bpf,struct mbuf * _m)463*37274f3cSDavid van Moolenbroek bpf_mtap3(struct bpf_if *_bpf, struct mbuf *_m)
464*37274f3cSDavid van Moolenbroek {
465*37274f3cSDavid van Moolenbroek 	if (_bpf)
466*37274f3cSDavid van Moolenbroek 		bpf_ops->bpf_mtap(_bpf, _m);
467*37274f3cSDavid van Moolenbroek }
468*37274f3cSDavid van Moolenbroek 
469*37274f3cSDavid van Moolenbroek static inline void
bpf_mtap_af(struct ifnet * _ifp,uint32_t _af,struct mbuf * _m)470*37274f3cSDavid van Moolenbroek bpf_mtap_af(struct ifnet *_ifp, uint32_t _af, struct mbuf *_m)
471*37274f3cSDavid van Moolenbroek {
472*37274f3cSDavid van Moolenbroek 	if (_ifp->if_bpf)
473*37274f3cSDavid van Moolenbroek 		bpf_ops->bpf_mtap_af(_ifp->if_bpf, _af, _m);
474*37274f3cSDavid van Moolenbroek }
475*37274f3cSDavid van Moolenbroek 
476*37274f3cSDavid van Moolenbroek static inline void
bpf_change_type(struct ifnet * _ifp,u_int _dlt,u_int _hdrlen)477*37274f3cSDavid van Moolenbroek bpf_change_type(struct ifnet *_ifp, u_int _dlt, u_int _hdrlen)
478*37274f3cSDavid van Moolenbroek {
479*37274f3cSDavid van Moolenbroek 	bpf_ops->bpf_change_type(_ifp, _dlt, _hdrlen);
480*37274f3cSDavid van Moolenbroek }
481*37274f3cSDavid van Moolenbroek 
482*37274f3cSDavid van Moolenbroek static inline void
bpf_detach(struct ifnet * _ifp)483*37274f3cSDavid van Moolenbroek bpf_detach(struct ifnet *_ifp)
484*37274f3cSDavid van Moolenbroek {
485*37274f3cSDavid van Moolenbroek 	bpf_ops->bpf_detach(_ifp);
486*37274f3cSDavid van Moolenbroek }
487*37274f3cSDavid van Moolenbroek 
488*37274f3cSDavid van Moolenbroek static inline void
bpf_mtap_sl_in(struct ifnet * _ifp,u_char * _hdr,struct mbuf ** _m)489*37274f3cSDavid van Moolenbroek bpf_mtap_sl_in(struct ifnet *_ifp, u_char *_hdr, struct mbuf **_m)
490*37274f3cSDavid van Moolenbroek {
491*37274f3cSDavid van Moolenbroek 	bpf_ops->bpf_mtap_sl_in(_ifp->if_bpf, _hdr, _m);
492*37274f3cSDavid van Moolenbroek }
493*37274f3cSDavid van Moolenbroek 
494*37274f3cSDavid van Moolenbroek static inline void
bpf_mtap_sl_out(struct ifnet * _ifp,u_char * _hdr,struct mbuf * _m)495*37274f3cSDavid van Moolenbroek bpf_mtap_sl_out(struct ifnet *_ifp, u_char *_hdr, struct mbuf *_m)
496*37274f3cSDavid van Moolenbroek {
497*37274f3cSDavid van Moolenbroek 	if (_ifp->if_bpf)
498*37274f3cSDavid van Moolenbroek 		bpf_ops->bpf_mtap_sl_out(_ifp->if_bpf, _hdr, _m);
499*37274f3cSDavid van Moolenbroek }
500*37274f3cSDavid van Moolenbroek 
501*37274f3cSDavid van Moolenbroek 
502*37274f3cSDavid van Moolenbroek void	bpf_setops(void);
503*37274f3cSDavid van Moolenbroek 
504*37274f3cSDavid van Moolenbroek void	bpf_ops_handover_enter(struct bpf_ops *);
505*37274f3cSDavid van Moolenbroek void	bpf_ops_handover_exit(void);
506*37274f3cSDavid van Moolenbroek 
507*37274f3cSDavid van Moolenbroek void	bpfilterattach(int);
508*37274f3cSDavid van Moolenbroek 
509*37274f3cSDavid van Moolenbroek bpf_ctx_t *bpf_create(void);
510*37274f3cSDavid van Moolenbroek void	bpf_destroy(bpf_ctx_t *);
511*37274f3cSDavid van Moolenbroek 
512*37274f3cSDavid van Moolenbroek int	bpf_set_cop(bpf_ctx_t *, const bpf_copfunc_t *, size_t);
513*37274f3cSDavid van Moolenbroek int	bpf_set_extmem(bpf_ctx_t *, size_t, bpf_memword_init_t);
514*37274f3cSDavid van Moolenbroek u_int	bpf_filter_ext(const bpf_ctx_t *, const struct bpf_insn *, bpf_args_t *);
515*37274f3cSDavid van Moolenbroek int	bpf_validate_ext(const bpf_ctx_t *, const struct bpf_insn *, int);
516*37274f3cSDavid van Moolenbroek 
517*37274f3cSDavid van Moolenbroek bpfjit_func_t bpf_jit_generate(bpf_ctx_t *, void *, size_t);
518*37274f3cSDavid van Moolenbroek void	bpf_jit_freecode(bpfjit_func_t);
519*37274f3cSDavid van Moolenbroek 
520*37274f3cSDavid van Moolenbroek #endif
521*37274f3cSDavid van Moolenbroek 
522*37274f3cSDavid van Moolenbroek int	bpf_validate(const struct bpf_insn *, int);
523*37274f3cSDavid van Moolenbroek u_int	bpf_filter(const struct bpf_insn *, const u_char *, u_int, u_int);
524*37274f3cSDavid van Moolenbroek 
525*37274f3cSDavid van Moolenbroek __END_DECLS
526*37274f3cSDavid van Moolenbroek 
527*37274f3cSDavid van Moolenbroek #endif /* !_NET_BPF_H_ */
528