xref: /netbsd-src/sys/net/bpf.h (revision 6f96d21f980d4f579b9c88bf0ab10de74abb9817)
1 /*	$NetBSD: bpf.h,v 1.82 2023/08/23 13:21:17 rin Exp $	*/
2 
3 /*
4  * Copyright (c) 1990, 1991, 1993
5  *	The Regents of the University of California.  All rights reserved.
6  *
7  * This code is derived from the Stanford/CMU enet packet filter,
8  * (net/enet.c) distributed as part of 4.3BSD, and code contributed
9  * to Berkeley by Steven McCanne and Van Jacobson both of Lawrence
10  * Berkeley Laboratory.
11  *
12  * Redistribution and use in source and binary forms, with or without
13  * modification, are permitted provided that the following conditions
14  * are met:
15  * 1. Redistributions of source code must retain the above copyright
16  *    notice, this list of conditions and the following disclaimer.
17  * 2. Redistributions in binary form must reproduce the above copyright
18  *    notice, this list of conditions and the following disclaimer in the
19  *    documentation and/or other materials provided with the distribution.
20  * 3. Neither the name of the University nor the names of its contributors
21  *    may be used to endorse or promote products derived from this software
22  *    without specific prior written permission.
23  *
24  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
25  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
26  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
27  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
28  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
29  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
30  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
31  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
32  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
33  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
34  * SUCH DAMAGE.
35  *
36  *	@(#)bpf.h	8.2 (Berkeley) 1/9/95
37  * @(#) Header: bpf.h,v 1.36 97/06/12 14:29:53 leres Exp  (LBL)
38  */
39 
40 #ifndef _NET_BPF_H_
41 #define _NET_BPF_H_
42 
43 #include <sys/ioccom.h>
44 #include <sys/time.h>
45 
46 /* BSD style release date */
47 #define BPF_RELEASE 199606
48 
49 /* Date when COP instructions and external memory have been released. */
50 #define BPF_COP_EXTMEM_RELEASE 20140624
51 
52 __BEGIN_DECLS
53 
54 typedef	int bpf_int32;
55 typedef	u_int bpf_u_int32;
56 
57 /*
58  * Alignment macros.  BPF_WORDALIGN rounds up to the next
59  * even multiple of BPF_ALIGNMENT.
60  */
61 #define BPF_ALIGNMENT sizeof(long)
62 #define BPF_ALIGNMENT32 sizeof(int)
63 
64 #define BPF_WORDALIGN(x) (((x)+(BPF_ALIGNMENT-1))&~(BPF_ALIGNMENT-1))
65 #define BPF_WORDALIGN32(x) (((x)+(BPF_ALIGNMENT32-1))&~(BPF_ALIGNMENT32-1))
66 
67 #define BPF_MAXINSNS 512
68 #define BPF_DFLTBUFSIZE (1024*1024)	/* default static upper limit */
69 #define BPF_MAXBUFSIZE (1024*1024*16)	/* hard limit on sysctl'able value */
70 #define BPF_MINBUFSIZE 32
71 
72 /*
73  *  Structure for BIOCSETF.
74  */
75 struct bpf_program {
76 	u_int bf_len;
77 	struct bpf_insn *bf_insns;
78 };
79 
80 /*
81  * Struct returned by BIOCGSTATS and net.bpf.stats sysctl.
82  */
83 struct bpf_stat {
84 	uint64_t bs_recv;	/* number of packets received */
85 	uint64_t bs_drop;	/* number of packets dropped */
86 	uint64_t bs_capt;	/* number of packets captured */
87 	uint64_t bs_padding[13];
88 };
89 
90 /*
91  * Struct returned by BIOCGSTATS_30.
92  */
93 struct bpf_stat30 {
94 	u_int bs_recv;		/* number of packets received */
95 	u_int bs_drop;		/* number of packets dropped */
96 };
97 
98 /*
99  * Struct return by BIOCVERSION.  This represents the version number of
100  * the filter language described by the instruction encodings below.
101  * bpf understands a program iff kernel_major == filter_major &&
102  * kernel_minor >= filter_minor, that is, if the value returned by the
103  * running kernel has the same major number and a minor number equal
104  * equal to or less than the filter being downloaded.  Otherwise, the
105  * results are undefined, meaning an error may be returned or packets
106  * may be accepted haphazardly.
107  * It has nothing to do with the source code version.
108  */
109 struct bpf_version {
110 	u_short bv_major;
111 	u_short bv_minor;
112 };
113 /* Current version number of filter architecture. */
114 #define BPF_MAJOR_VERSION 1
115 #define BPF_MINOR_VERSION 1
116 
117 /*
118  * BPF ioctls
119  *
120  * The first set is for compatibility with Sun's pcc style
121  * header files.  If your using gcc, we assume that you
122  * have run fixincludes so the latter set should work.
123  */
124 #define BIOCGBLEN	 _IOR('B', 102, u_int)
125 #define BIOCSBLEN	_IOWR('B', 102, u_int)
126 #define BIOCSETF	 _IOW('B', 103, struct bpf_program)
127 #define BIOCFLUSH	  _IO('B', 104)
128 #define BIOCPROMISC	  _IO('B', 105)
129 #define BIOCGDLT	 _IOR('B', 106, u_int)
130 #define BIOCGETIF	 _IOR('B', 107, struct ifreq)
131 #define BIOCSETIF	 _IOW('B', 108, struct ifreq)
132 #ifdef COMPAT_50
133 #include <compat/sys/time.h>
134 #define BIOCSORTIMEOUT	 _IOW('B', 109, struct timeval50)
135 #define BIOCGORTIMEOUT	 _IOR('B', 110, struct timeval50)
136 #endif
137 #define BIOCGSTATS	 _IOR('B', 111, struct bpf_stat)
138 #define BIOCGSTATS_30	 _IOR('B', 111, struct bpf_stat30)
139 #define BIOCIMMEDIATE	 _IOW('B', 112, u_int)
140 #define BIOCVERSION	 _IOR('B', 113, struct bpf_version)
141 #define BIOCSTCPF	 _IOW('B', 114, struct bpf_program)
142 #define BIOCSUDPF	 _IOW('B', 115, struct bpf_program)
143 #define BIOCGHDRCMPLT	 _IOR('B', 116, u_int)
144 #define BIOCSHDRCMPLT	 _IOW('B', 117, u_int)
145 #define BIOCSDLT	 _IOW('B', 118, u_int)
146 #define BIOCGDLTLIST	_IOWR('B', 119, struct bpf_dltlist)
147 #define BIOCGDIRECTION	 _IOR('B', 120, u_int)
148 #define BIOCSDIRECTION	 _IOW('B', 121, u_int)
149 #define BIOCSRTIMEOUT	 _IOW('B', 122, struct timeval)
150 #define BIOCGRTIMEOUT	 _IOR('B', 123, struct timeval)
151 #define BIOCGFEEDBACK	 _IOR('B', 124, u_int)
152 #define BIOCSFEEDBACK	 _IOW('B', 125, u_int)
153 #define BIOCFEEDBACK     BIOCSFEEDBACK		/* FreeBSD name */
154 #define BIOCLOCK	  _IO('B', 126)
155 #define BIOCSETWF	 _IOW('B', 127, struct bpf_program)
156 
157 /* Obsolete */
158 #define	BIOCGSEESENT	BIOCGDIRECTION
159 #define	BIOCSSEESENT	BIOCSDIRECTION
160 
161 /*
162  * Packet directions.
163  * BPF_D_IN = 0, BPF_D_INOUT =1 for backward compatibility of BIOC[GS]SEESENT.
164  */
165 #define	BPF_D_IN	0	/* See incoming packets */
166 #define	BPF_D_INOUT	1	/* See incoming and outgoing packets */
167 #define	BPF_D_OUT	2	/* See outgoing packets */
168 
169 /*
170  * Structure prepended to each packet. This is "wire" format, so we
171  * cannot change it unfortunately to 64 bit times on 32 bit systems [yet].
172  */
173 struct bpf_timeval {
174 	long tv_sec;
175 	long tv_usec;
176 };
177 
178 struct bpf_timeval32 {
179 	int32_t tv_sec;
180 	int32_t tv_usec;
181 };
182 
183 struct bpf_hdr {
184 	struct bpf_timeval bh_tstamp;	/* time stamp */
185 	uint32_t	bh_caplen;	/* length of captured portion */
186 	uint32_t	bh_datalen;	/* original length of packet */
187 	uint16_t	bh_hdrlen;	/* length of bpf header (this struct
188 					   plus alignment padding) */
189 };
190 
191 struct bpf_hdr32 {
192 	struct bpf_timeval32 bh_tstamp;	/* time stamp */
193 	uint32_t	bh_caplen;	/* length of captured portion */
194 	uint32_t	bh_datalen;	/* original length of packet */
195 	uint16_t	bh_hdrlen;	/* length of bpf header (this struct
196 					   plus alignment padding) */
197 };
198 /*
199  * Because the structure above is not a multiple of 4 bytes, some compilers
200  * will insist on inserting padding; hence, sizeof(struct bpf_hdr) won't work.
201  * Only the kernel needs to know about it; applications use bh_hdrlen.
202  * XXX To save a few bytes on 32-bit machines, we avoid end-of-struct
203  * XXX padding by using the size of the header data elements.  This is
204  * XXX fail-safe: on new machines, we just use the 'safe' sizeof.
205  */
206 #ifdef _KERNEL
207 #if defined(__mips64)
208 #define SIZEOF_BPF_HDR sizeof(struct bpf_hdr)
209 #define SIZEOF_BPF_HDR32 18
210 #elif defined(__arm32__) || defined(__i386__) || defined(__m68k__) || \
211     defined(__mips__) || defined(__ns32k__) || defined(__vax__) || \
212     defined(__sh__) || (defined(__sparc__) && !defined(__sparc64__))
213 #define SIZEOF_BPF_HDR 18
214 #define SIZEOF_BPF_HDR32 18
215 #else
216 #define SIZEOF_BPF_HDR sizeof(struct bpf_hdr)
217 #define SIZEOF_BPF_HDR32 sizeof(struct bpf_hdr32)
218 #endif
219 #endif
220 
221 /* Pull in data-link level type codes. */
222 #include <net/dlt.h>
223 
224 /*
225  * The instruction encodings.
226  */
227 /* instruction classes */
228 #define BPF_CLASS(code) ((code) & 0x07)
229 #define		BPF_LD		0x00
230 #define		BPF_LDX		0x01
231 #define		BPF_ST		0x02
232 #define		BPF_STX		0x03
233 #define		BPF_ALU		0x04
234 #define		BPF_JMP		0x05
235 #define		BPF_RET		0x06
236 #define		BPF_MISC	0x07
237 
238 /* ld/ldx fields */
239 #define BPF_SIZE(code)	((code) & 0x18)
240 #define		BPF_W		0x00
241 #define		BPF_H		0x08
242 #define		BPF_B		0x10
243 /*				0x18	reserved; used by BSD/OS */
244 #define BPF_MODE(code)	((code) & 0xe0)
245 #define		BPF_IMM 	0x00
246 #define		BPF_ABS		0x20
247 #define		BPF_IND		0x40
248 #define		BPF_MEM		0x60
249 #define		BPF_LEN		0x80
250 #define		BPF_MSH		0xa0
251 /*				0xc0	reserved; used by BSD/OS */
252 /*				0xe0	reserved; used by BSD/OS */
253 
254 /* alu/jmp fields */
255 #define BPF_OP(code)	((code) & 0xf0)
256 #define		BPF_ADD		0x00
257 #define		BPF_SUB		0x10
258 #define		BPF_MUL		0x20
259 #define		BPF_DIV		0x30
260 #define		BPF_OR		0x40
261 #define		BPF_AND		0x50
262 #define		BPF_LSH		0x60
263 #define		BPF_RSH		0x70
264 #define		BPF_NEG		0x80
265 #define		BPF_MOD		0x90
266 #define		BPF_XOR		0xa0
267 /*				0xb0	reserved */
268 /*				0xc0	reserved */
269 /*				0xd0	reserved */
270 /*				0xe0	reserved */
271 /*				0xf0	reserved */
272 #define		BPF_JA		0x00
273 #define		BPF_JEQ		0x10
274 #define		BPF_JGT		0x20
275 #define		BPF_JGE		0x30
276 #define		BPF_JSET	0x40
277 /*				0x50	reserved; used by BSD/OS */
278 /*				0x60	reserved */
279 /*				0x70	reserved */
280 /*				0x80	reserved */
281 /*				0x90	reserved */
282 /*				0xa0	reserved */
283 /*				0xb0	reserved */
284 /*				0xc0	reserved */
285 /*				0xd0	reserved */
286 /*				0xe0	reserved */
287 /*				0xf0	reserved */
288 #define BPF_SRC(code)	((code) & 0x08)
289 #define		BPF_K		0x00
290 #define		BPF_X		0x08
291 
292 /* ret - BPF_K and BPF_X also apply */
293 #define BPF_RVAL(code)	((code) & 0x18)
294 #define		BPF_A		0x10
295 /*				0x18	reserved */
296 
297 /* misc */
298 #define BPF_MISCOP(code) ((code) & 0xf8)
299 #define		BPF_TAX		0x00
300 /*				0x10	reserved */
301 /*				0x18	reserved */
302 #define		BPF_COP		0x20
303 /*				0x28	reserved */
304 /*				0x30	reserved */
305 /*				0x38	reserved */
306 #define		BPF_COPX	0x40	/* XXX: also used by BSD/OS */
307 /*				0x48	reserved */
308 /*				0x50	reserved */
309 /*				0x58	reserved */
310 /*				0x60	reserved */
311 /*				0x68	reserved */
312 /*				0x70	reserved */
313 /*				0x78	reserved */
314 #define		BPF_TXA		0x80
315 /*				0x88	reserved */
316 /*				0x90	reserved */
317 /*				0x98	reserved */
318 /*				0xa0	reserved */
319 /*				0xa8	reserved */
320 /*				0xb0	reserved */
321 /*				0xb8	reserved */
322 /*				0xc0	reserved; used by BSD/OS */
323 /*				0xc8	reserved */
324 /*				0xd0	reserved */
325 /*				0xd8	reserved */
326 /*				0xe0	reserved */
327 /*				0xe8	reserved */
328 /*				0xf0	reserved */
329 /*				0xf8	reserved */
330 
331 /*
332  * The instruction data structure.
333  */
334 struct bpf_insn {
335 	uint16_t  code;
336 	u_char 	  jt;
337 	u_char 	  jf;
338 	uint32_t  k;
339 };
340 
341 /*
342  * Auxiliary data, for use when interpreting a filter intended for the
343  * Linux kernel when the kernel rejects the filter (requiring us to
344  * run it in userland).  It contains VLAN tag information.
345  */
346 struct bpf_aux_data {
347 	u_short vlan_tag_present;
348 	u_short vlan_tag;
349 };
350 
351 /*
352  * Macros for insn array initializers.
353  */
354 #define BPF_STMT(code, k) { (uint16_t)(code), 0, 0, k }
355 #define BPF_JUMP(code, k, jt, jf) { (uint16_t)(code), jt, jf, k }
356 
357 /*
358  * Number of scratch memory words (for BPF_LD|BPF_MEM and BPF_ST).
359  */
360 #define	BPF_MEMWORDS		16
361 
362 /*
363  * bpf_memword_init_t: bits indicate which words in the external memory
364  * store will be initialised by the caller before BPF program execution.
365  */
366 typedef uint32_t bpf_memword_init_t;
367 #define	BPF_MEMWORD_INIT(k)	(UINT32_C(1) << (k))
368 
369 /* Note: two most significant bits are reserved by bpfjit. */
370 __CTASSERT(BPF_MEMWORDS + 2 <= sizeof(bpf_memword_init_t) * NBBY);
371 
372 #ifdef _KERNEL
373 /*
374  * Max number of external memory words (for BPF_LD|BPF_MEM and BPF_ST).
375  */
376 #define	BPF_MAX_MEMWORDS	30
377 
378 __CTASSERT(BPF_MAX_MEMWORDS >= BPF_MEMWORDS);
379 __CTASSERT(BPF_MAX_MEMWORDS + 2 <= sizeof(bpf_memword_init_t) * NBBY);
380 #endif
381 
382 /*
383  * Structure to retrieve available DLTs for the interface.
384  */
385 struct bpf_dltlist {
386 	u_int	bfl_len;	/* number of bfd_list array */
387 	u_int	*bfl_list;	/* array of DLTs */
388 };
389 
390 struct bpf_ctx;
391 typedef struct bpf_ctx bpf_ctx_t;
392 
393 typedef struct bpf_args {
394 	const uint8_t *	pkt;
395 	size_t		wirelen;
396 	size_t		buflen;
397 	/*
398 	 * The following arguments are used only by some kernel
399 	 * subsystems.
400 	 * They aren't required for classical bpf filter programs.
401 	 * For such programs, bpfjit generated code doesn't read
402 	 * those arguments at all. Note however that bpf interpreter
403 	 * always needs a pointer to memstore.
404 	 */
405 	uint32_t *	mem; /* pointer to external memory store */
406 	void *		arg; /* auxiliary argument for a copfunc */
407 } bpf_args_t;
408 
409 #if defined(_KERNEL) || defined(__BPF_PRIVATE)
410 
411 typedef uint32_t (*bpf_copfunc_t)(const bpf_ctx_t *, bpf_args_t *, uint32_t);
412 
413 struct bpf_ctx {
414 	/*
415 	 * BPF coprocessor functions and the number of them.
416 	 */
417 	const bpf_copfunc_t *	copfuncs;
418 	size_t			nfuncs;
419 
420 	/*
421 	 * The number of memory words in the external memory store.
422 	 * There may be up to BPF_MAX_MEMWORDS words; if zero is set,
423 	 * then the internal memory store is used which has a fixed
424 	 * number of words (BPF_MEMWORDS).
425 	 */
426 	size_t			extwords;
427 
428 	/*
429 	 * The bitmask indicating which words in the external memstore
430 	 * will be initialised by the caller.
431 	 */
432 	bpf_memword_init_t	preinited;
433 };
434 #endif
435 
436 #ifdef _KERNEL
437 #include <net/bpfjit.h>
438 #include <net/if.h>
439 
440 struct bpf_if;
441 
442 struct bpf_ops {
443 	void (*bpf_attach)(struct ifnet *, u_int, u_int, struct bpf_if **);
444 	void (*bpf_detach)(struct ifnet *);
445 	void (*bpf_change_type)(struct ifnet *, u_int, u_int);
446 
447 	void (*bpf_mtap)(struct bpf_if *, struct mbuf *, u_int);
448 	void (*bpf_mtap2)(struct bpf_if *, void *, u_int, struct mbuf *,
449 	    u_int);
450 	void (*bpf_mtap_af)(struct bpf_if *, uint32_t, struct mbuf *, u_int);
451 	void (*bpf_mtap_sl_in)(struct bpf_if *, u_char *, struct mbuf **);
452 	void (*bpf_mtap_sl_out)(struct bpf_if *, u_char *, struct mbuf *);
453 
454 	void (*bpf_mtap_softint_init)(struct ifnet *);
455 	void (*bpf_mtap_softint)(struct ifnet *, struct mbuf *);
456 
457 	int (*bpf_register_track_event)(struct bpf_if **,
458 	    void (*)(struct bpf_if *, struct ifnet *, int, int));
459 	int (*bpf_deregister_track_event)(struct bpf_if **,
460 	    void (*)(struct bpf_if *, struct ifnet *, int, int));
461 };
462 
463 extern struct bpf_ops *bpf_ops;
464 
465 static __inline void
bpf_attach(struct ifnet * _ifp,u_int _dlt,u_int _hdrlen)466 bpf_attach(struct ifnet *_ifp, u_int _dlt, u_int _hdrlen)
467 {
468 	bpf_ops->bpf_attach(_ifp, _dlt, _hdrlen, &_ifp->if_bpf);
469 }
470 
471 static __inline void
bpf_attach2(struct ifnet * _ifp,u_int _dlt,u_int _hdrlen,struct bpf_if ** _dp)472 bpf_attach2(struct ifnet *_ifp, u_int _dlt, u_int _hdrlen, struct bpf_if **_dp)
473 {
474 	bpf_ops->bpf_attach(_ifp, _dlt, _hdrlen, _dp);
475 }
476 
477 static __inline void
bpf_mtap(struct ifnet * _ifp,struct mbuf * _m,u_int _direction)478 bpf_mtap(struct ifnet *_ifp, struct mbuf *_m, u_int _direction)
479 {
480 	if (_ifp->if_bpf) {
481 		if (_ifp->if_bpf_mtap) {
482 			_ifp->if_bpf_mtap(_ifp->if_bpf, _m, _direction);
483 		} else {
484 			bpf_ops->bpf_mtap(_ifp->if_bpf, _m, _direction);
485 		}
486 	}
487 }
488 
489 static __inline void
bpf_mtap2(struct bpf_if * _bpf,void * _data,u_int _dlen,struct mbuf * _m,u_int _direction)490 bpf_mtap2(struct bpf_if *_bpf, void *_data, u_int _dlen, struct mbuf *_m,
491 	u_int _direction)
492 {
493 	bpf_ops->bpf_mtap2(_bpf, _data, _dlen, _m, _direction);
494 }
495 
496 static __inline void
bpf_mtap3(struct bpf_if * _bpf,struct mbuf * _m,u_int _direction)497 bpf_mtap3(struct bpf_if *_bpf, struct mbuf *_m, u_int _direction)
498 {
499 	if (_bpf)
500 		bpf_ops->bpf_mtap(_bpf, _m, _direction);
501 }
502 
503 static __inline void
bpf_mtap_af(struct ifnet * _ifp,uint32_t _af,struct mbuf * _m,u_int _direction)504 bpf_mtap_af(struct ifnet *_ifp, uint32_t _af, struct mbuf *_m,
505     u_int _direction)
506 {
507 	if (_ifp->if_bpf)
508 		bpf_ops->bpf_mtap_af(_ifp->if_bpf, _af, _m, _direction);
509 }
510 
511 static __inline void
bpf_change_type(struct ifnet * _ifp,u_int _dlt,u_int _hdrlen)512 bpf_change_type(struct ifnet *_ifp, u_int _dlt, u_int _hdrlen)
513 {
514 	bpf_ops->bpf_change_type(_ifp, _dlt, _hdrlen);
515 }
516 
517 static __inline bool
bpf_peers_present(struct bpf_if * dp)518 bpf_peers_present(struct bpf_if *dp)
519 {
520 	/*
521 	 * Our code makes sure the driver visible pointer is NULL
522 	 * whenever there is no listener on this tap.
523 	 */
524 	return dp != NULL;
525 }
526 
527 static __inline void
bpf_detach(struct ifnet * _ifp)528 bpf_detach(struct ifnet *_ifp)
529 {
530 	bpf_ops->bpf_detach(_ifp);
531 }
532 
533 static __inline void
bpf_mtap_sl_in(struct ifnet * _ifp,u_char * _hdr,struct mbuf ** _m)534 bpf_mtap_sl_in(struct ifnet *_ifp, u_char *_hdr, struct mbuf **_m)
535 {
536 	bpf_ops->bpf_mtap_sl_in(_ifp->if_bpf, _hdr, _m);
537 }
538 
539 static __inline void
bpf_mtap_sl_out(struct ifnet * _ifp,u_char * _hdr,struct mbuf * _m)540 bpf_mtap_sl_out(struct ifnet *_ifp, u_char *_hdr, struct mbuf *_m)
541 {
542 	if (_ifp->if_bpf)
543 		bpf_ops->bpf_mtap_sl_out(_ifp->if_bpf, _hdr, _m);
544 }
545 
546 static __inline void
bpf_mtap_softint_init(struct ifnet * _ifp)547 bpf_mtap_softint_init(struct ifnet *_ifp)
548 {
549 
550 	bpf_ops->bpf_mtap_softint_init(_ifp);
551 }
552 
553 static __inline void
bpf_mtap_softint(struct ifnet * _ifp,struct mbuf * _m)554 bpf_mtap_softint(struct ifnet *_ifp, struct mbuf *_m)
555 {
556 
557 	if (_ifp->if_bpf)
558 		bpf_ops->bpf_mtap_softint(_ifp, _m);
559 }
560 
561 static __inline int
bpf_register_track_event(struct bpf_if ** _dp,void (* _fun)(struct bpf_if *,struct ifnet *,int,int))562 bpf_register_track_event(struct bpf_if **_dp,
563 	    void (*_fun)(struct bpf_if *, struct ifnet *, int, int))
564 {
565 	if (bpf_ops->bpf_register_track_event == NULL)
566 		return ENXIO;
567 	return bpf_ops->bpf_register_track_event(_dp, _fun);
568 }
569 
570 static __inline int
bpf_deregister_track_event(struct bpf_if ** _dp,void (* _fun)(struct bpf_if *,struct ifnet *,int,int))571 bpf_deregister_track_event(struct bpf_if **_dp,
572 	    void (*_fun)(struct bpf_if *, struct ifnet *, int, int))
573 {
574 	if (bpf_ops->bpf_deregister_track_event == NULL)
575 		return ENXIO;
576 	return bpf_ops->bpf_deregister_track_event(_dp, _fun);
577 }
578 
579 void	bpf_setops(void);
580 
581 void	bpf_ops_handover_enter(struct bpf_ops *);
582 void	bpf_ops_handover_exit(void);
583 
584 void	bpfilterattach(int);
585 
586 bpf_ctx_t *bpf_create(void);
587 void	bpf_destroy(bpf_ctx_t *);
588 
589 int	bpf_set_cop(bpf_ctx_t *, const bpf_copfunc_t *, size_t);
590 int	bpf_set_extmem(bpf_ctx_t *, size_t, bpf_memword_init_t);
591 u_int	bpf_filter_ext(const bpf_ctx_t *, const struct bpf_insn *, bpf_args_t *);
592 int	bpf_validate_ext(const bpf_ctx_t *, const struct bpf_insn *, int);
593 
594 bpfjit_func_t bpf_jit_generate(bpf_ctx_t *, void *, size_t);
595 void	bpf_jit_freecode(bpfjit_func_t);
596 
597 #endif
598 
599 int	bpf_validate(const struct bpf_insn *, int);
600 u_int	bpf_filter(const struct bpf_insn *, const u_char *, u_int, u_int);
601 
602 u_int	bpf_filter_with_aux_data(const struct bpf_insn *, const u_char *, u_int, u_int, const struct bpf_aux_data *);
603 
604 /*
605  * events to be tracked by bpf_register_track_event callbacks
606  */
607 #define	BPF_TRACK_EVENT_ATTACH	1
608 #define	BPF_TRACK_EVENT_DETACH	2
609 
610 void bpf_dump(const struct bpf_program *, int);
611 char  *bpf_image(const struct bpf_insn *, int);
612 
613 __END_DECLS
614 
615 #if 1  /* XXX: remove me, for the benefit of sanitizers */
616 #define BIOCGSTATSOLD BIOCGSTATS_30
617 #define bpf_stat_old bpf_stat30
618 #endif
619 
620 #endif /* !_NET_BPF_H_ */
621