1.\" Copyright (c) 1990 The Regents of the University of California. 2.\" All rights reserved. 3.\" 4.\" Redistribution and use in source and binary forms, with or without 5.\" modification, are permitted provided that: (1) source code distributions 6.\" retain the above copyright notice and this paragraph in its entirety, (2) 7.\" distributions including binary code include the above copyright notice and 8.\" this paragraph in its entirety in the documentation or other materials 9.\" provided with the distribution, and (3) all advertising materials mentioning 10.\" features or use of this software display the following acknowledgement: 11.\" ``This product includes software developed by the University of California, 12.\" Lawrence Berkeley Laboratory and its contributors.'' Neither the name of 13.\" the University nor the names of its contributors may be used to endorse 14.\" or promote products derived from this software without specific prior 15.\" written permission. 16.\" THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED 17.\" WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF 18.\" MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. 19.\" 20.\" This document is derived in part from the enet man page (enet.4) 21.\" distributed with 4.3BSD Unix. 22.\" 23.\" $FreeBSD$ 24.\" 25.Dd January 16, 1996 26.Dt BPF 4 27.Os 28.Sh NAME 29.Nm bpf 30.Nd Berkeley Packet Filter 31.Sh SYNOPSIS 32.Cd device bpf 33.Sh DESCRIPTION 34The Berkeley Packet Filter 35provides a raw interface to data link layers in a protocol 36independent fashion. 37All packets on the network, even those destined for other hosts, 38are accessible through this mechanism. 39.Pp 40The packet filter appears as a character special device, 41.Pa /dev/bpf0 , 42.Pa /dev/bpf1 , 43etc. 44After opening the device, the file descriptor must be bound to a 45specific network interface with the 46.Dv BIOCSETIF 47ioctl. 48A given interface can be shared by multiple listeners, and the filter 49underlying each descriptor will see an identical packet stream. 50.Pp 51A separate device file is required for each minor device. 52If a file is in use, the open will fail and 53.Va errno 54will be set to 55.Er EBUSY . 56.Pp 57Associated with each open instance of a 58.Nm 59file is a user-settable packet filter. 60Whenever a packet is received by an interface, 61all file descriptors listening on that interface apply their filter. 62Each descriptor that accepts the packet receives its own copy. 63.Pp 64Reads from these files return the next group of packets 65that have matched the filter. 66To improve performance, the buffer passed to read must be 67the same size as the buffers used internally by 68.Nm . 69This size is returned by the 70.Dv BIOCGBLEN 71ioctl (see below), and 72can be set with 73.Dv BIOCSBLEN . 74Note that an individual packet larger than this size is necessarily 75truncated. 76.Pp 77The packet filter will support any link level protocol that has fixed length 78headers. Currently, only Ethernet, 79.Tn SLIP , 80and 81.Tn PPP 82drivers have been modified to interact with 83.Nm . 84.Pp 85Since packet data is in network byte order, applications should use the 86.Xr byteorder 3 87macros to extract multi-byte values. 88.Pp 89A packet can be sent out on the network by writing to a 90.Nm 91file descriptor. The writes are unbuffered, meaning only one 92packet can be processed per write. 93Currently, only writes to Ethernets and 94.Tn SLIP 95links are supported. 96.Sh IOCTLS 97The 98.Xr ioctl 2 99command codes below are defined in 100.Aq Pa net/bpf.h . 101All commands require 102these includes: 103.Bd -literal 104 #include <sys/types.h> 105 #include <sys/time.h> 106 #include <sys/ioctl.h> 107 #include <net/bpf.h> 108.Ed 109.Pp 110Additionally, 111.Dv BIOCGETIF 112and 113.Dv BIOCSETIF 114require 115.Aq Pa sys/socket.h 116and 117.Aq Pa net/if.h . 118.Pp 119In addition to 120.Dv FIONREAD 121and 122.Dv SIOCGIFADDR , 123the following commands may be applied to any open 124.Nm 125file. 126The (third) argument to 127.Xr ioctl 2 128should be a pointer to the type indicated. 129.Bl -tag -width BIOCGRTIMEOUT 130.It Dv BIOCGBLEN 131.Pq Li u_int 132Returns the required buffer length for reads on 133.Nm 134files. 135.It Dv BIOCSBLEN 136.Pq Li u_int 137Sets the buffer length for reads on 138.Nm 139files. The buffer must be set before the file is attached to an interface 140with 141.Dv BIOCSETIF . 142If the requested buffer size cannot be accommodated, the closest 143allowable size will be set and returned in the argument. 144A read call will result in 145.Er EIO 146if it is passed a buffer that is not this size. 147.It Dv BIOCGDLT 148.Pq Li u_int 149Returns the type of the data link layer underlying the attached interface. 150.Er EINVAL 151is returned if no interface has been specified. 152The device types, prefixed with 153.Dq Li DLT_ , 154are defined in 155.Aq Pa net/bpf.h . 156.It Dv BIOCPROMISC 157Forces the interface into promiscuous mode. 158All packets, not just those destined for the local host, are processed. 159Since more than one file can be listening on a given interface, 160a listener that opened its interface non-promiscuously may receive 161packets promiscuously. This problem can be remedied with an 162appropriate filter. 163.It Dv BIOCFLUSH 164Flushes the buffer of incoming packets, 165and resets the statistics that are returned by BIOCGSTATS. 166.It Dv BIOCGETIF 167.Pq Li "struct ifreq" 168Returns the name of the hardware interface that the file is listening on. 169The name is returned in the ifr_name field of 170the 171.Li ifreq 172structure. 173All other fields are undefined. 174.It Dv BIOCSETIF 175.Pq Li "struct ifreq" 176Sets the hardware interface associate with the file. This 177command must be performed before any packets can be read. 178The device is indicated by name using the 179.Li ifr_name 180field of the 181.Li ifreq 182structure. 183Additionally, performs the actions of 184.Dv BIOCFLUSH . 185.It Dv BIOCSRTIMEOUT 186.It Dv BIOCGRTIMEOUT 187.Pq Li "struct timeval" 188Set or get the read timeout parameter. 189The argument 190specifies the length of time to wait before timing 191out on a read request. 192This parameter is initialized to zero by 193.Xr open 2 , 194indicating no timeout. 195.It Dv BIOCGSTATS 196.Pq Li "struct bpf_stat" 197Returns the following structure of packet statistics: 198.Bd -literal 199struct bpf_stat { 200 u_int bs_recv; /* number of packets received */ 201 u_int bs_drop; /* number of packets dropped */ 202}; 203.Ed 204.Pp 205The fields are: 206.Bl -hang -offset indent 207.It Li bs_recv 208the number of packets received by the descriptor since opened or reset 209(including any buffered since the last read call); 210and 211.It Li bs_drop 212the number of packets which were accepted by the filter but dropped by the 213kernel because of buffer overflows 214(i.e., the application's reads aren't keeping up with the packet traffic). 215.El 216.It Dv BIOCIMMEDIATE 217.Pq Li u_int 218Enable or disable 219.Dq immediate mode , 220based on the truth value of the argument. 221When immediate mode is enabled, reads return immediately upon packet 222reception. Otherwise, a read will block until either the kernel buffer 223becomes full or a timeout occurs. 224This is useful for programs like 225.Xr rarpd 8 226which must respond to messages in real time. 227The default for a new file is off. 228.It Dv BIOCSETF 229.Pq Li "struct bpf_program" 230Sets the filter program used by the kernel to discard uninteresting 231packets. An array of instructions and its length is passed in using 232the following structure: 233.Bd -literal 234struct bpf_program { 235 int bf_len; 236 struct bpf_insn *bf_insns; 237}; 238.Ed 239.Pp 240The filter program is pointed to by the 241.Li bf_insns 242field while its length in units of 243.Sq Li struct bpf_insn 244is given by the 245.Li bf_len 246field. 247Also, the actions of 248.Dv BIOCFLUSH 249are performed. 250See section 251.Sx "FILTER MACHINE" 252for an explanation of the filter language. 253.It Dv BIOCVERSION 254.Pq Li "struct bpf_version" 255Returns the major and minor version numbers of the filter language currently 256recognized by the kernel. Before installing a filter, applications must check 257that the current version is compatible with the running kernel. Version 258numbers are compatible if the major numbers match and the application minor 259is less than or equal to the kernel minor. The kernel version number is 260returned in the following structure: 261.Bd -literal 262struct bpf_version { 263 u_short bv_major; 264 u_short bv_minor; 265}; 266.Ed 267.Pp 268The current version numbers are given by 269.Dv BPF_MAJOR_VERSION 270and 271.Dv BPF_MINOR_VERSION 272from 273.Aq Pa net/bpf.h . 274An incompatible filter 275may result in undefined behavior (most likely, an error returned by 276.Fn ioctl 277or haphazard packet matching). 278.It Dv BIOCSHDRCMPLT 279.It Dv BIOCGHDRCMPLT 280.Pq Li u_int 281Set or get the status of the 282.Dq header complete 283flag. 284Set to zero if the link level source address should be filled in automatically 285by the interface output routine. Set to one if the link level source 286address will be written, as provided, to the wire. This flag is initialized 287to zero by default. 288.It Dv BIOCSSEESENT 289.It Dv BIOCGSEESENT 290.Pq Li u_int 291Set or get the flag determining whether locally generated packets on the 292interface should be returned by BPF. Set to zero to see only incoming 293packets on the interface. Set to one to see packets originating 294locally and remotely on the interface. This flag is initialized to one by 295default. 296.El 297.Sh BPF HEADER 298The following structure is prepended to each packet returned by 299.Xr read 2 : 300.Bd -literal 301struct bpf_hdr { 302 struct timeval bh_tstamp; /* time stamp */ 303 u_long bh_caplen; /* length of captured portion */ 304 u_long bh_datalen; /* original length of packet */ 305 u_short bh_hdrlen; /* length of bpf header (this struct 306 plus alignment padding */ 307}; 308.Ed 309.Pp 310The fields, whose values are stored in host order, and are: 311.Pp 312.Bl -tag -compact -width bh_datalen 313.It Li bh_tstamp 314The time at which the packet was processed by the packet filter. 315.It Li bh_caplen 316The length of the captured portion of the packet. This is the minimum of 317the truncation amount specified by the filter and the length of the packet. 318.It Li bh_datalen 319The length of the packet off the wire. 320This value is independent of the truncation amount specified by the filter. 321.It Li bh_hdrlen 322The length of the 323.Nm 324header, which may not be equal to 325.\" XXX - not really a function call 326.Fn sizeof "struct bpf_hdr" . 327.El 328.Pp 329The 330.Li bh_hdrlen 331field exists to account for 332padding between the header and the link level protocol. 333The purpose here is to guarantee proper alignment of the packet 334data structures, which is required on alignment sensitive 335architectures and improves performance on many other architectures. 336The packet filter insures that the 337.Li bpf_hdr 338and the network layer 339header will be word aligned. Suitable precautions 340must be taken when accessing the link layer protocol fields on alignment 341restricted machines. (This isn't a problem on an Ethernet, since 342the type field is a short falling on an even offset, 343and the addresses are probably accessed in a bytewise fashion). 344.Pp 345Additionally, individual packets are padded so that each starts 346on a word boundary. This requires that an application 347has some knowledge of how to get from packet to packet. 348The macro 349.Dv BPF_WORDALIGN 350is defined in 351.Aq Pa net/bpf.h 352to facilitate 353this process. It rounds up its argument 354to the nearest word aligned value (where a word is 355.Dv BPF_ALIGNMENT 356bytes wide). 357.Pp 358For example, if 359.Sq Li p 360points to the start of a packet, this expression 361will advance it to the next packet: 362.Dl p = (char *)p + BPF_WORDALIGN(p->bh_hdrlen + p->bh_caplen) 363.Pp 364For the alignment mechanisms to work properly, the 365buffer passed to 366.Xr read 2 367must itself be word aligned. 368The 369.Xr malloc 3 370function 371will always return an aligned buffer. 372.Sh FILTER MACHINE 373A filter program is an array of instructions, with all branches forwardly 374directed, terminated by a 375.Em return 376instruction. 377Each instruction performs some action on the pseudo-machine state, 378which consists of an accumulator, index register, scratch memory store, 379and implicit program counter. 380.Pp 381The following structure defines the instruction format: 382.Bd -literal 383struct bpf_insn { 384 u_short code; 385 u_char jt; 386 u_char jf; 387 u_long k; 388}; 389.Ed 390.Pp 391The 392.Li k 393field is used in different ways by different instructions, 394and the 395.Li jt 396and 397.Li jf 398fields are used as offsets 399by the branch instructions. 400The opcodes are encoded in a semi-hierarchical fashion. 401There are eight classes of instructions: 402.Dv BPF_LD , 403.Dv BPF_LDX , 404.Dv BPF_ST , 405.Dv BPF_STX , 406.Dv BPF_ALU , 407.Dv BPF_JMP , 408.Dv BPF_RET , 409and 410.Dv BPF_MISC . 411Various other mode and 412operator bits are or'd into the class to give the actual instructions. 413The classes and modes are defined in 414.Aq Pa net/bpf.h . 415.Pp 416Below are the semantics for each defined 417.Nm 418instruction. 419We use the convention that A is the accumulator, X is the index register, 420P[] packet data, and M[] scratch memory store. 421P[i:n] gives the data at byte offset 422.Dq i 423in the packet, 424interpreted as a word (n=4), 425unsigned halfword (n=2), or unsigned byte (n=1). 426M[i] gives the i'th word in the scratch memory store, which is only 427addressed in word units. The memory store is indexed from 0 to 428.Dv BPF_MEMWORDS 429- 1. 430.Li k , 431.Li jt , 432and 433.Li jf 434are the corresponding fields in the 435instruction definition. 436.Dq len 437refers to the length of the packet. 438.Pp 439.Bl -tag -width BPF_STXx 440.It Dv BPF_LD 441These instructions copy a value into the accumulator. The type of the 442source operand is specified by an 443.Dq addressing mode 444and can be a constant 445.Pq Dv BPF_IMM , 446packet data at a fixed offset 447.Pq Dv BPF_ABS , 448packet data at a variable offset 449.Pq Dv BPF_IND , 450the packet length 451.Pq Dv BPF_LEN , 452or a word in the scratch memory store 453.Pq Dv BPF_MEM . 454For 455.Dv BPF_IND 456and 457.Dv BPF_ABS , 458the data size must be specified as a word 459.Pq Dv BPF_W , 460halfword 461.Pq Dv BPF_H , 462or byte 463.Pq Dv BPF_B . 464The semantics of all the recognized 465.Dv BPF_LD 466instructions follow. 467.Pp 468.Bl -tag -width "BPF_LD+BPF_W+BPF_IND" -compact 469.It Li BPF_LD+BPF_W+BPF_ABS 470A <- P[k:4] 471.It Li BPF_LD+BPF_H+BPF_ABS 472A <- P[k:2] 473.It Li BPF_LD+BPF_B+BPF_ABS 474A <- P[k:1] 475.It Li BPF_LD+BPF_W+BPF_IND 476A <- P[X+k:4] 477.It Li BPF_LD+BPF_H+BPF_IND 478A <- P[X+k:2] 479.It Li BPF_LD+BPF_B+BPF_IND 480A <- P[X+k:1] 481.It Li BPF_LD+BPF_W+BPF_LEN 482A <- len 483.It Li BPF_LD+BPF_IMM 484A <- k 485.It Li BPF_LD+BPF_MEM 486A <- M[k] 487.El 488.It Dv BPF_LDX 489These instructions load a value into the index register. Note that 490the addressing modes are more restrictive than those of the accumulator loads, 491but they include 492.Dv BPF_MSH , 493a hack for efficiently loading the IP header length. 494.Pp 495.Bl -tag -width "BPF_LDX+BPF_W+BPF_MEM" -compact 496.It Li BPF_LDX+BPF_W+BPF_IMM 497X <- k 498.It Li BPF_LDX+BPF_W+BPF_MEM 499X <- M[k] 500.It Li BPF_LDX+BPF_W+BPF_LEN 501X <- len 502.It Li BPF_LDX+BPF_B+BPF_MSH 503X <- 4*(P[k:1]&0xf) 504.El 505.It Dv BPF_ST 506This instruction stores the accumulator into the scratch memory. 507We do not need an addressing mode since there is only one possibility 508for the destination. 509.Pp 510.Bl -tag -width "BPF_ST" -compact 511.It Li BPF_ST 512M[k] <- A 513.El 514.It Dv BPF_STX 515This instruction stores the index register in the scratch memory store. 516.Pp 517.Bl -tag -width "BPF_STX" -compact 518.It Li BPF_STX 519M[k] <- X 520.El 521.It Dv BPF_ALU 522The alu instructions perform operations between the accumulator and 523index register or constant, and store the result back in the accumulator. 524For binary operations, a source mode is required 525.Dv ( BPF_K 526or 527.Dv BPF_X ) . 528.Pp 529.Bl -tag -width "BPF_ALU+BPF_MUL+BPF_K" -compact 530.It Li BPF_ALU+BPF_ADD+BPF_K 531A <- A + k 532.It Li BPF_ALU+BPF_SUB+BPF_K 533A <- A - k 534.It Li BPF_ALU+BPF_MUL+BPF_K 535A <- A * k 536.It Li BPF_ALU+BPF_DIV+BPF_K 537A <- A / k 538.It Li BPF_ALU+BPF_AND+BPF_K 539A <- A & k 540.It Li BPF_ALU+BPF_OR+BPF_K 541A <- A | k 542.It Li BPF_ALU+BPF_LSH+BPF_K 543A <- A << k 544.It Li BPF_ALU+BPF_RSH+BPF_K 545A <- A >> k 546.It Li BPF_ALU+BPF_ADD+BPF_X 547A <- A + X 548.It Li BPF_ALU+BPF_SUB+BPF_X 549A <- A - X 550.It Li BPF_ALU+BPF_MUL+BPF_X 551A <- A * X 552.It Li BPF_ALU+BPF_DIV+BPF_X 553A <- A / X 554.It Li BPF_ALU+BPF_AND+BPF_X 555A <- A & X 556.It Li BPF_ALU+BPF_OR+BPF_X 557A <- A | X 558.It Li BPF_ALU+BPF_LSH+BPF_X 559A <- A << X 560.It Li BPF_ALU+BPF_RSH+BPF_X 561A <- A >> X 562.It Li BPF_ALU+BPF_NEG 563A <- -A 564.El 565.It Dv BPF_JMP 566The jump instructions alter flow of control. Conditional jumps 567compare the accumulator against a constant 568.Pq Dv BPF_K 569or the index register 570.Pq Dv BPF_X . 571If the result is true (or non-zero), 572the true branch is taken, otherwise the false branch is taken. 573Jump offsets are encoded in 8 bits so the longest jump is 256 instructions. 574However, the jump always 575.Pq Dv BPF_JA 576opcode uses the 32 bit 577.Li k 578field as the offset, allowing arbitrarily distant destinations. 579All conditionals use unsigned comparison conventions. 580.Pp 581.Bl -tag -width "BPF_JMP+BPF_KSET+BPF_X" -compact 582.It Li BPF_JMP+BPF_JA 583pc += k 584.It Li BPF_JMP+BPF_JGT+BPF_K 585pc += (A > k) ? jt : jf 586.It Li BPF_JMP+BPF_JGE+BPF_K 587pc += (A >= k) ? jt : jf 588.It Li BPF_JMP+BPF_JEQ+BPF_K 589pc += (A == k) ? jt : jf 590.It Li BPF_JMP+BPF_JSET+BPF_K 591pc += (A & k) ? jt : jf 592.It Li BPF_JMP+BPF_JGT+BPF_X 593pc += (A > X) ? jt : jf 594.It Li BPF_JMP+BPF_JGE+BPF_X 595pc += (A >= X) ? jt : jf 596.It Li BPF_JMP+BPF_JEQ+BPF_X 597pc += (A == X) ? jt : jf 598.It Li BPF_JMP+BPF_JSET+BPF_X 599pc += (A & X) ? jt : jf 600.El 601.It Dv BPF_RET 602The return instructions terminate the filter program and specify the amount 603of packet to accept (i.e., they return the truncation amount). A return 604value of zero indicates that the packet should be ignored. 605The return value is either a constant 606.Pq Dv BPF_K 607or the accumulator 608.Pq Dv BPF_A . 609.Pp 610.Bl -tag -width "BPF_RET+BPF_K" -compact 611.It Li BPF_RET+BPF_A 612accept A bytes 613.It Li BPF_RET+BPF_K 614accept k bytes 615.El 616.It Dv BPF_MISC 617The miscellaneous category was created for anything that doesn't 618fit into the above classes, and for any new instructions that might need to 619be added. Currently, these are the register transfer instructions 620that copy the index register to the accumulator or vice versa. 621.Pp 622.Bl -tag -width "BPF_MISC+BPF_TAX" -compact 623.It Li BPF_MISC+BPF_TAX 624X <- A 625.It Li BPF_MISC+BPF_TXA 626A <- X 627.El 628.El 629.Pp 630The 631.Nm 632interface provides the following macros to facilitate 633array initializers: 634.Fn BPF_STMT opcode operand 635and 636.Fn BPF_JUMP opcode operand true_offset false_offset . 637.Sh EXAMPLES 638The following filter is taken from the Reverse ARP Daemon. It accepts 639only Reverse ARP requests. 640.Bd -literal 641struct bpf_insn insns[] = { 642 BPF_STMT(BPF_LD+BPF_H+BPF_ABS, 12), 643 BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, ETHERTYPE_REVARP, 0, 3), 644 BPF_STMT(BPF_LD+BPF_H+BPF_ABS, 20), 645 BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, REVARP_REQUEST, 0, 1), 646 BPF_STMT(BPF_RET+BPF_K, sizeof(struct ether_arp) + 647 sizeof(struct ether_header)), 648 BPF_STMT(BPF_RET+BPF_K, 0), 649}; 650.Ed 651.Pp 652This filter accepts only IP packets between host 128.3.112.15 and 653128.3.112.35. 654.Bd -literal 655struct bpf_insn insns[] = { 656 BPF_STMT(BPF_LD+BPF_H+BPF_ABS, 12), 657 BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, ETHERTYPE_IP, 0, 8), 658 BPF_STMT(BPF_LD+BPF_W+BPF_ABS, 26), 659 BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 0x8003700f, 0, 2), 660 BPF_STMT(BPF_LD+BPF_W+BPF_ABS, 30), 661 BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 0x80037023, 3, 4), 662 BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 0x80037023, 0, 3), 663 BPF_STMT(BPF_LD+BPF_W+BPF_ABS, 30), 664 BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 0x8003700f, 0, 1), 665 BPF_STMT(BPF_RET+BPF_K, (u_int)-1), 666 BPF_STMT(BPF_RET+BPF_K, 0), 667}; 668.Ed 669.Pp 670Finally, this filter returns only TCP finger packets. We must parse 671the IP header to reach the TCP header. The 672.Dv BPF_JSET 673instruction 674checks that the IP fragment offset is 0 so we are sure 675that we have a TCP header. 676.Bd -literal 677struct bpf_insn insns[] = { 678 BPF_STMT(BPF_LD+BPF_H+BPF_ABS, 12), 679 BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, ETHERTYPE_IP, 0, 10), 680 BPF_STMT(BPF_LD+BPF_B+BPF_ABS, 23), 681 BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, IPPROTO_TCP, 0, 8), 682 BPF_STMT(BPF_LD+BPF_H+BPF_ABS, 20), 683 BPF_JUMP(BPF_JMP+BPF_JSET+BPF_K, 0x1fff, 6, 0), 684 BPF_STMT(BPF_LDX+BPF_B+BPF_MSH, 14), 685 BPF_STMT(BPF_LD+BPF_H+BPF_IND, 14), 686 BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 79, 2, 0), 687 BPF_STMT(BPF_LD+BPF_H+BPF_IND, 16), 688 BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 79, 0, 1), 689 BPF_STMT(BPF_RET+BPF_K, (u_int)-1), 690 BPF_STMT(BPF_RET+BPF_K, 0), 691}; 692.Ed 693.Sh SEE ALSO 694.Xr tcpdump 1 , 695.Xr ioctl 2 , 696.Xr byteorder 3 , 697.Xr ng_bpf 4 698.Rs 699.%A McCanne, S. 700.%A Jacobson V. 701.%T "An efficient, extensible, and portable network monitor" 702.Re 703.Sh FILES 704.Bl -tag -compact -width /dev/bpfXXX 705.It Pa /dev/bpf Ns Sy n 706the packet filter device 707.El 708.Sh BUGS 709The read buffer must be of a fixed size (returned by the 710.Dv BIOCGBLEN 711ioctl). 712.Pp 713A file that does not request promiscuous mode may receive promiscuously 714received packets as a side effect of another file requesting this 715mode on the same hardware interface. This could be fixed in the kernel 716with additional processing overhead. However, we favor the model where 717all files must assume that the interface is promiscuous, and if 718so desired, must utilize a filter to reject foreign packets. 719.Pp 720Data link protocols with variable length headers are not currently supported. 721.Pp 722The 723.Dv SEESENT 724flag has been observed to work incorrectly on some interface 725types, including those with hardware loopback rather than software loopback, 726and point-to-point interfaces. It appears to function correctly on a 727broad range of ethernet-style interfaces. 728.Sh HISTORY 729The Enet packet filter was created in 1980 by Mike Accetta and 730Rick Rashid at Carnegie-Mellon University. Jeffrey Mogul, at 731Stanford, ported the code to 732.Bx 733and continued its development from 7341983 on. Since then, it has evolved into the Ultrix Packet Filter 735at 736.Tn DEC , 737a 738.Tn STREAMS 739.Tn NIT 740module under 741.Tn SunOS 4.1 , 742and 743.Tn BPF . 744.Sh AUTHORS 745.An -nosplit 746.An Steven McCanne , 747of Lawrence Berkeley Laboratory, implemented BPF in 748Summer 1990. Much of the design is due to 749.An Van Jacobson . 750