1df8bae1dSRodney W. Grimes /* 2df8bae1dSRodney W. Grimes * Copyright (c) 1990, 1991, 1993 3df8bae1dSRodney W. Grimes * The Regents of the University of California. All rights reserved. 4df8bae1dSRodney W. Grimes * 5df8bae1dSRodney W. Grimes * This code is derived from the Stanford/CMU enet packet filter, 6df8bae1dSRodney W. Grimes * (net/enet.c) distributed as part of 4.3BSD, and code contributed 7df8bae1dSRodney W. Grimes * to Berkeley by Steven McCanne and Van Jacobson both of Lawrence 8df8bae1dSRodney W. Grimes * Berkeley Laboratory. 9df8bae1dSRodney W. Grimes * 10df8bae1dSRodney W. Grimes * Redistribution and use in source and binary forms, with or without 11df8bae1dSRodney W. Grimes * modification, are permitted provided that the following conditions 12df8bae1dSRodney W. Grimes * are met: 13df8bae1dSRodney W. Grimes * 1. Redistributions of source code must retain the above copyright 14df8bae1dSRodney W. Grimes * notice, this list of conditions and the following disclaimer. 15df8bae1dSRodney W. Grimes * 2. Redistributions in binary form must reproduce the above copyright 16df8bae1dSRodney W. Grimes * notice, this list of conditions and the following disclaimer in the 17df8bae1dSRodney W. Grimes * documentation and/or other materials provided with the distribution. 18df8bae1dSRodney W. Grimes * 3. All advertising materials mentioning features or use of this software 19df8bae1dSRodney W. Grimes * must display the following acknowledgement: 20df8bae1dSRodney W. Grimes * This product includes software developed by the University of 21df8bae1dSRodney W. Grimes * California, Berkeley and its contributors. 22df8bae1dSRodney W. Grimes * 4. Neither the name of the University nor the names of its contributors 23df8bae1dSRodney W. Grimes * may be used to endorse or promote products derived from this software 24df8bae1dSRodney W. Grimes * without specific prior written permission. 25df8bae1dSRodney W. Grimes * 26df8bae1dSRodney W. Grimes * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 27df8bae1dSRodney W. Grimes * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 28df8bae1dSRodney W. Grimes * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 29df8bae1dSRodney W. Grimes * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 30df8bae1dSRodney W. Grimes * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 31df8bae1dSRodney W. Grimes * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 32df8bae1dSRodney W. Grimes * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 33df8bae1dSRodney W. Grimes * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 34df8bae1dSRodney W. Grimes * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 35df8bae1dSRodney W. Grimes * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 36df8bae1dSRodney W. Grimes * SUCH DAMAGE. 37df8bae1dSRodney W. Grimes * 384f252c4dSRuslan Ermilov * @(#)bpf.c 8.4 (Berkeley) 1/9/95 39df8bae1dSRodney W. Grimes * 40c3aac50fSPeter Wemm * $FreeBSD$ 41df8bae1dSRodney W. Grimes */ 42df8bae1dSRodney W. Grimes 435bb5f2c9SPeter Wemm #include "opt_bpf.h" 4482f4445dSRobert Watson #include "opt_mac.h" 455bb5f2c9SPeter Wemm #include "opt_netgraph.h" 46df8bae1dSRodney W. Grimes 47df8bae1dSRodney W. Grimes #include <sys/param.h> 48df8bae1dSRodney W. Grimes #include <sys/systm.h> 49ce7609a4SBruce Evans #include <sys/conf.h> 5082f4445dSRobert Watson #include <sys/mac.h> 514d1d4912SBruce Evans #include <sys/malloc.h> 52df8bae1dSRodney W. Grimes #include <sys/mbuf.h> 53df8bae1dSRodney W. Grimes #include <sys/time.h> 54df8bae1dSRodney W. Grimes #include <sys/proc.h> 550310c19fSBruce Evans #include <sys/signalvar.h> 56528f627fSBruce Evans #include <sys/filio.h> 57528f627fSBruce Evans #include <sys/sockio.h> 58528f627fSBruce Evans #include <sys/ttycom.h> 59831d27a9SDon Lewis #include <sys/filedesc.h> 60df8bae1dSRodney W. Grimes 61243ac7d8SPeter Wemm #include <sys/poll.h> 62df8bae1dSRodney W. Grimes 63df8bae1dSRodney W. Grimes #include <sys/socket.h> 64fba9235dSBruce Evans #include <sys/vnode.h> 65df8bae1dSRodney W. Grimes 66fba9235dSBruce Evans #include <net/if.h> 67df8bae1dSRodney W. Grimes #include <net/bpf.h> 68df8bae1dSRodney W. Grimes #include <net/bpfdesc.h> 69df8bae1dSRodney W. Grimes 70df8bae1dSRodney W. Grimes #include <netinet/in.h> 71df8bae1dSRodney W. Grimes #include <netinet/if_ether.h> 72df8bae1dSRodney W. Grimes #include <sys/kernel.h> 73f708ef1bSPoul-Henning Kamp #include <sys/sysctl.h> 747b778b5eSEivind Eklund 75959b7375SPoul-Henning Kamp static MALLOC_DEFINE(M_BPF, "BPF", "BPF data"); 7687f6c662SJulian Elischer 775bb5f2c9SPeter Wemm #if defined(DEV_BPF) || defined(NETGRAPH_BPF) 7853ac6efbSJulian Elischer 79df8bae1dSRodney W. Grimes #define PRINET 26 /* interruptible */ 80df8bae1dSRodney W. Grimes 81df8bae1dSRodney W. Grimes /* 82df8bae1dSRodney W. Grimes * The default read buffer size is patchable. 83df8bae1dSRodney W. Grimes */ 84e7bb21b3SJonathan Lemon static int bpf_bufsize = 4096; 85f708ef1bSPoul-Henning Kamp SYSCTL_INT(_debug, OID_AUTO, bpf_bufsize, CTLFLAG_RW, 86f708ef1bSPoul-Henning Kamp &bpf_bufsize, 0, ""); 87eba2a1aeSPoul-Henning Kamp static int bpf_maxbufsize = BPF_MAXBUFSIZE; 88eba2a1aeSPoul-Henning Kamp SYSCTL_INT(_debug, OID_AUTO, bpf_maxbufsize, CTLFLAG_RW, 89eba2a1aeSPoul-Henning Kamp &bpf_maxbufsize, 0, ""); 90df8bae1dSRodney W. Grimes 91df8bae1dSRodney W. Grimes /* 92df8bae1dSRodney W. Grimes * bpf_iflist is the list of interfaces; each corresponds to an ifnet 93df8bae1dSRodney W. Grimes */ 94f708ef1bSPoul-Henning Kamp static struct bpf_if *bpf_iflist; 95e7bb21b3SJonathan Lemon static struct mtx bpf_mtx; /* bpf global lock */ 96df8bae1dSRodney W. Grimes 97929ddbbbSAlfred Perlstein static int bpf_allocbufs(struct bpf_d *); 98929ddbbbSAlfred Perlstein static void bpf_attachd(struct bpf_d *d, struct bpf_if *bp); 99929ddbbbSAlfred Perlstein static void bpf_detachd(struct bpf_d *d); 100929ddbbbSAlfred Perlstein static void bpf_freed(struct bpf_d *); 101929ddbbbSAlfred Perlstein static void bpf_mcopy(const void *, void *, size_t); 102929ddbbbSAlfred Perlstein static int bpf_movein(struct uio *, int, 103929ddbbbSAlfred Perlstein struct mbuf **, struct sockaddr *, int *); 104929ddbbbSAlfred Perlstein static int bpf_setif(struct bpf_d *, struct ifreq *); 105929ddbbbSAlfred Perlstein static void bpf_timed_out(void *); 106e7bb21b3SJonathan Lemon static __inline void 107929ddbbbSAlfred Perlstein bpf_wakeup(struct bpf_d *); 108929ddbbbSAlfred Perlstein static void catchpacket(struct bpf_d *, u_char *, u_int, 109929ddbbbSAlfred Perlstein u_int, void (*)(const void *, void *, size_t)); 110929ddbbbSAlfred Perlstein static void reset_d(struct bpf_d *); 111929ddbbbSAlfred Perlstein static int bpf_setf(struct bpf_d *, struct bpf_program *); 112df8bae1dSRodney W. Grimes 11387f6c662SJulian Elischer static d_open_t bpfopen; 11487f6c662SJulian Elischer static d_close_t bpfclose; 11587f6c662SJulian Elischer static d_read_t bpfread; 11687f6c662SJulian Elischer static d_write_t bpfwrite; 11787f6c662SJulian Elischer static d_ioctl_t bpfioctl; 118243ac7d8SPeter Wemm static d_poll_t bpfpoll; 11987f6c662SJulian Elischer 12087f6c662SJulian Elischer #define CDEV_MAJOR 23 1214e2f199eSPoul-Henning Kamp static struct cdevsw bpf_cdevsw = { 1224e2f199eSPoul-Henning Kamp /* open */ bpfopen, 1234e2f199eSPoul-Henning Kamp /* close */ bpfclose, 1244e2f199eSPoul-Henning Kamp /* read */ bpfread, 1254e2f199eSPoul-Henning Kamp /* write */ bpfwrite, 1264e2f199eSPoul-Henning Kamp /* ioctl */ bpfioctl, 1274e2f199eSPoul-Henning Kamp /* poll */ bpfpoll, 1284e2f199eSPoul-Henning Kamp /* mmap */ nommap, 1294e2f199eSPoul-Henning Kamp /* strategy */ nostrategy, 1304e2f199eSPoul-Henning Kamp /* name */ "bpf", 1314e2f199eSPoul-Henning Kamp /* maj */ CDEV_MAJOR, 1324e2f199eSPoul-Henning Kamp /* dump */ nodump, 1334e2f199eSPoul-Henning Kamp /* psize */ nopsize, 1344e2f199eSPoul-Henning Kamp /* flags */ 0, 1354e2f199eSPoul-Henning Kamp }; 13687f6c662SJulian Elischer 13787f6c662SJulian Elischer 138df8bae1dSRodney W. Grimes static int 139df8bae1dSRodney W. Grimes bpf_movein(uio, linktype, mp, sockp, datlen) 140df8bae1dSRodney W. Grimes register struct uio *uio; 141df8bae1dSRodney W. Grimes int linktype, *datlen; 142df8bae1dSRodney W. Grimes register struct mbuf **mp; 143df8bae1dSRodney W. Grimes register struct sockaddr *sockp; 144df8bae1dSRodney W. Grimes { 145df8bae1dSRodney W. Grimes struct mbuf *m; 146df8bae1dSRodney W. Grimes int error; 147df8bae1dSRodney W. Grimes int len; 148df8bae1dSRodney W. Grimes int hlen; 149df8bae1dSRodney W. Grimes 150df8bae1dSRodney W. Grimes /* 151df8bae1dSRodney W. Grimes * Build a sockaddr based on the data link layer type. 152df8bae1dSRodney W. Grimes * We do this at this level because the ethernet header 153df8bae1dSRodney W. Grimes * is copied directly into the data field of the sockaddr. 154df8bae1dSRodney W. Grimes * In the case of SLIP, there is no header and the packet 155df8bae1dSRodney W. Grimes * is forwarded as is. 156df8bae1dSRodney W. Grimes * Also, we are careful to leave room at the front of the mbuf 157df8bae1dSRodney W. Grimes * for the link level header. 158df8bae1dSRodney W. Grimes */ 159df8bae1dSRodney W. Grimes switch (linktype) { 160df8bae1dSRodney W. Grimes 161df8bae1dSRodney W. Grimes case DLT_SLIP: 162df8bae1dSRodney W. Grimes sockp->sa_family = AF_INET; 163df8bae1dSRodney W. Grimes hlen = 0; 164df8bae1dSRodney W. Grimes break; 165df8bae1dSRodney W. Grimes 166df8bae1dSRodney W. Grimes case DLT_EN10MB: 167df8bae1dSRodney W. Grimes sockp->sa_family = AF_UNSPEC; 168df8bae1dSRodney W. Grimes /* XXX Would MAXLINKHDR be better? */ 169df8bae1dSRodney W. Grimes hlen = sizeof(struct ether_header); 170df8bae1dSRodney W. Grimes break; 171df8bae1dSRodney W. Grimes 172df8bae1dSRodney W. Grimes case DLT_FDDI: 173d41f24e7SDavid Greenman sockp->sa_family = AF_IMPLINK; 174d41f24e7SDavid Greenman hlen = 0; 175df8bae1dSRodney W. Grimes break; 176df8bae1dSRodney W. Grimes 17722f05c43SAndrey A. Chernov case DLT_RAW: 178df8bae1dSRodney W. Grimes case DLT_NULL: 179df8bae1dSRodney W. Grimes sockp->sa_family = AF_UNSPEC; 180df8bae1dSRodney W. Grimes hlen = 0; 181df8bae1dSRodney W. Grimes break; 182df8bae1dSRodney W. Grimes 1834f53e3ccSKenjiro Cho case DLT_ATM_RFC1483: 1844f53e3ccSKenjiro Cho /* 1854f53e3ccSKenjiro Cho * en atm driver requires 4-byte atm pseudo header. 1864f53e3ccSKenjiro Cho * though it isn't standard, vpi:vci needs to be 1874f53e3ccSKenjiro Cho * specified anyway. 1884f53e3ccSKenjiro Cho */ 1894f53e3ccSKenjiro Cho sockp->sa_family = AF_UNSPEC; 1904f53e3ccSKenjiro Cho hlen = 12; /* XXX 4(ATM_PH) + 3(LLC) + 5(SNAP) */ 1914f53e3ccSKenjiro Cho break; 1924f53e3ccSKenjiro Cho 19330fa52a6SBrian Somers case DLT_PPP: 19430fa52a6SBrian Somers sockp->sa_family = AF_UNSPEC; 19530fa52a6SBrian Somers hlen = 4; /* This should match PPP_HDRLEN */ 19630fa52a6SBrian Somers break; 19730fa52a6SBrian Somers 198df8bae1dSRodney W. Grimes default: 199df8bae1dSRodney W. Grimes return (EIO); 200df8bae1dSRodney W. Grimes } 201df8bae1dSRodney W. Grimes 202df8bae1dSRodney W. Grimes len = uio->uio_resid; 203df8bae1dSRodney W. Grimes *datlen = len - hlen; 204df8bae1dSRodney W. Grimes if ((unsigned)len > MCLBYTES) 205df8bae1dSRodney W. Grimes return (EIO); 206df8bae1dSRodney W. Grimes 2072a0c503eSBosko Milekic MGETHDR(m, M_TRYWAIT, MT_DATA); 208df8bae1dSRodney W. Grimes if (m == 0) 209df8bae1dSRodney W. Grimes return (ENOBUFS); 210963e4c2aSGarrett Wollman if (len > MHLEN) { 2112a0c503eSBosko Milekic MCLGET(m, M_TRYWAIT); 212df8bae1dSRodney W. Grimes if ((m->m_flags & M_EXT) == 0) { 213df8bae1dSRodney W. Grimes error = ENOBUFS; 214df8bae1dSRodney W. Grimes goto bad; 215df8bae1dSRodney W. Grimes } 216df8bae1dSRodney W. Grimes } 217963e4c2aSGarrett Wollman m->m_pkthdr.len = m->m_len = len; 218963e4c2aSGarrett Wollman m->m_pkthdr.rcvif = NULL; 219df8bae1dSRodney W. Grimes *mp = m; 220df8bae1dSRodney W. Grimes /* 221df8bae1dSRodney W. Grimes * Make room for link header. 222df8bae1dSRodney W. Grimes */ 223df8bae1dSRodney W. Grimes if (hlen != 0) { 2244f079e2fSGarrett Wollman m->m_pkthdr.len -= hlen; 225df8bae1dSRodney W. Grimes m->m_len -= hlen; 226df8bae1dSRodney W. Grimes #if BSD >= 199103 227df8bae1dSRodney W. Grimes m->m_data += hlen; /* XXX */ 228df8bae1dSRodney W. Grimes #else 229df8bae1dSRodney W. Grimes m->m_off += hlen; 230df8bae1dSRodney W. Grimes #endif 231e7bb21b3SJonathan Lemon error = uiomove((caddr_t)sockp->sa_data, hlen, uio); 232df8bae1dSRodney W. Grimes if (error) 233df8bae1dSRodney W. Grimes goto bad; 234df8bae1dSRodney W. Grimes } 235e7bb21b3SJonathan Lemon error = uiomove(mtod(m, caddr_t), len - hlen, uio); 236df8bae1dSRodney W. Grimes if (!error) 237df8bae1dSRodney W. Grimes return (0); 238df8bae1dSRodney W. Grimes bad: 239df8bae1dSRodney W. Grimes m_freem(m); 240df8bae1dSRodney W. Grimes return (error); 241df8bae1dSRodney W. Grimes } 242df8bae1dSRodney W. Grimes 243df8bae1dSRodney W. Grimes /* 244df8bae1dSRodney W. Grimes * Attach file to the bpf interface, i.e. make d listen on bp. 245df8bae1dSRodney W. Grimes */ 246df8bae1dSRodney W. Grimes static void 247df8bae1dSRodney W. Grimes bpf_attachd(d, bp) 248df8bae1dSRodney W. Grimes struct bpf_d *d; 249df8bae1dSRodney W. Grimes struct bpf_if *bp; 250df8bae1dSRodney W. Grimes { 251df8bae1dSRodney W. Grimes /* 252df8bae1dSRodney W. Grimes * Point d at bp, and add d to the interface's list of listeners. 253df8bae1dSRodney W. Grimes * Finally, point the driver's bpf cookie at the interface so 254df8bae1dSRodney W. Grimes * it will divert packets to bpf. 255df8bae1dSRodney W. Grimes */ 256e7bb21b3SJonathan Lemon BPFIF_LOCK(bp); 257df8bae1dSRodney W. Grimes d->bd_bif = bp; 258df8bae1dSRodney W. Grimes d->bd_next = bp->bif_dlist; 259df8bae1dSRodney W. Grimes bp->bif_dlist = d; 260df8bae1dSRodney W. Grimes 2619b44ff22SGarrett Wollman bp->bif_ifp->if_bpf = bp; 262e7bb21b3SJonathan Lemon BPFIF_UNLOCK(bp); 263df8bae1dSRodney W. Grimes } 264df8bae1dSRodney W. Grimes 265df8bae1dSRodney W. Grimes /* 266df8bae1dSRodney W. Grimes * Detach a file from its interface. 267df8bae1dSRodney W. Grimes */ 268df8bae1dSRodney W. Grimes static void 269df8bae1dSRodney W. Grimes bpf_detachd(d) 270df8bae1dSRodney W. Grimes struct bpf_d *d; 271df8bae1dSRodney W. Grimes { 2726e891d64SPoul-Henning Kamp int error; 273df8bae1dSRodney W. Grimes struct bpf_d **p; 274df8bae1dSRodney W. Grimes struct bpf_if *bp; 275df8bae1dSRodney W. Grimes 276df8bae1dSRodney W. Grimes bp = d->bd_bif; 277df8bae1dSRodney W. Grimes /* 278df8bae1dSRodney W. Grimes * Check if this descriptor had requested promiscuous mode. 279df8bae1dSRodney W. Grimes * If so, turn it off. 280df8bae1dSRodney W. Grimes */ 281df8bae1dSRodney W. Grimes if (d->bd_promisc) { 282df8bae1dSRodney W. Grimes d->bd_promisc = 0; 2836e891d64SPoul-Henning Kamp error = ifpromisc(bp->bif_ifp, 0); 2846e891d64SPoul-Henning Kamp if (error != 0 && error != ENXIO) { 285df8bae1dSRodney W. Grimes /* 2866e891d64SPoul-Henning Kamp * ENXIO can happen if a pccard is unplugged 287df8bae1dSRodney W. Grimes * Something is really wrong if we were able to put 288df8bae1dSRodney W. Grimes * the driver into promiscuous mode, but can't 289df8bae1dSRodney W. Grimes * take it out. 290df8bae1dSRodney W. Grimes */ 2916e891d64SPoul-Henning Kamp printf("%s%d: ifpromisc failed %d\n", 2926e891d64SPoul-Henning Kamp bp->bif_ifp->if_name, bp->bif_ifp->if_unit, error); 2936e891d64SPoul-Henning Kamp } 294df8bae1dSRodney W. Grimes } 295df8bae1dSRodney W. Grimes /* Remove d from the interface's descriptor list. */ 296e7bb21b3SJonathan Lemon BPFIF_LOCK(bp); 297df8bae1dSRodney W. Grimes p = &bp->bif_dlist; 298df8bae1dSRodney W. Grimes while (*p != d) { 299df8bae1dSRodney W. Grimes p = &(*p)->bd_next; 300df8bae1dSRodney W. Grimes if (*p == 0) 301df8bae1dSRodney W. Grimes panic("bpf_detachd: descriptor not in list"); 302df8bae1dSRodney W. Grimes } 303df8bae1dSRodney W. Grimes *p = (*p)->bd_next; 304df8bae1dSRodney W. Grimes if (bp->bif_dlist == 0) 305df8bae1dSRodney W. Grimes /* 306df8bae1dSRodney W. Grimes * Let the driver know that there are no more listeners. 307df8bae1dSRodney W. Grimes */ 3089b44ff22SGarrett Wollman d->bd_bif->bif_ifp->if_bpf = 0; 309e7bb21b3SJonathan Lemon BPFIF_UNLOCK(bp); 310df8bae1dSRodney W. Grimes d->bd_bif = 0; 311df8bae1dSRodney W. Grimes } 312df8bae1dSRodney W. Grimes 313df8bae1dSRodney W. Grimes /* 314df8bae1dSRodney W. Grimes * Open ethernet device. Returns ENXIO for illegal minor device number, 315df8bae1dSRodney W. Grimes * EBUSY if file is open by another process. 316df8bae1dSRodney W. Grimes */ 317df8bae1dSRodney W. Grimes /* ARGSUSED */ 31887f6c662SJulian Elischer static int 319b40ce416SJulian Elischer bpfopen(dev, flags, fmt, td) 320df8bae1dSRodney W. Grimes dev_t dev; 32160039670SBruce Evans int flags; 32260039670SBruce Evans int fmt; 323b40ce416SJulian Elischer struct thread *td; 324df8bae1dSRodney W. Grimes { 325e7bb21b3SJonathan Lemon struct bpf_d *d; 326df8bae1dSRodney W. Grimes 327e7bb21b3SJonathan Lemon mtx_lock(&bpf_mtx); 328bd3a5320SPoul-Henning Kamp d = dev->si_drv1; 329df8bae1dSRodney W. Grimes /* 330df8bae1dSRodney W. Grimes * Each minor can be opened by only one process. If the requested 331df8bae1dSRodney W. Grimes * minor is in use, return EBUSY. 332df8bae1dSRodney W. Grimes */ 333e7bb21b3SJonathan Lemon if (d) { 334e7bb21b3SJonathan Lemon mtx_unlock(&bpf_mtx); 335df8bae1dSRodney W. Grimes return (EBUSY); 336e7bb21b3SJonathan Lemon } 337e7bb21b3SJonathan Lemon dev->si_drv1 = (struct bpf_d *)~0; /* mark device in use */ 338e7bb21b3SJonathan Lemon mtx_unlock(&bpf_mtx); 339e7bb21b3SJonathan Lemon 340d1d74c28SJohn Baldwin if ((dev->si_flags & SI_NAMED) == 0) 341b0d17ba6SPoul-Henning Kamp make_dev(&bpf_cdevsw, minor(dev), UID_ROOT, GID_WHEEL, 0600, 342b0d17ba6SPoul-Henning Kamp "bpf%d", dev2unit(dev)); 3437cc0979fSDavid Malone MALLOC(d, struct bpf_d *, sizeof(*d), M_BPF, M_WAITOK | M_ZERO); 344bd3a5320SPoul-Henning Kamp dev->si_drv1 = d; 345df8bae1dSRodney W. Grimes d->bd_bufsize = bpf_bufsize; 34600a83887SPaul Traina d->bd_sig = SIGIO; 3478ed3828cSRobert Watson d->bd_seesent = 1; 34882f4445dSRobert Watson #ifdef MAC 34982f4445dSRobert Watson mac_init_bpfdesc(d); 35082f4445dSRobert Watson mac_create_bpfdesc(td->td_ucred, d); 35182f4445dSRobert Watson #endif 3526008862bSJohn Baldwin mtx_init(&d->bd_mtx, devtoname(dev), "bpf cdev lock", MTX_DEF); 35381bda851SJohn Polstra callout_init(&d->bd_callout, 1); 354df8bae1dSRodney W. Grimes 355df8bae1dSRodney W. Grimes return (0); 356df8bae1dSRodney W. Grimes } 357df8bae1dSRodney W. Grimes 358df8bae1dSRodney W. Grimes /* 359df8bae1dSRodney W. Grimes * Close the descriptor by detaching it from its interface, 360df8bae1dSRodney W. Grimes * deallocating its buffers, and marking it free. 361df8bae1dSRodney W. Grimes */ 362df8bae1dSRodney W. Grimes /* ARGSUSED */ 36387f6c662SJulian Elischer static int 364b40ce416SJulian Elischer bpfclose(dev, flags, fmt, td) 365df8bae1dSRodney W. Grimes dev_t dev; 36660039670SBruce Evans int flags; 36760039670SBruce Evans int fmt; 368b40ce416SJulian Elischer struct thread *td; 369df8bae1dSRodney W. Grimes { 370e7bb21b3SJonathan Lemon struct bpf_d *d = dev->si_drv1; 371df8bae1dSRodney W. Grimes 37281bda851SJohn Polstra BPFD_LOCK(d); 37381bda851SJohn Polstra if (d->bd_state == BPF_WAITING) 37481bda851SJohn Polstra callout_stop(&d->bd_callout); 37581bda851SJohn Polstra d->bd_state = BPF_IDLE; 37681bda851SJohn Polstra BPFD_UNLOCK(d); 377e649887bSAlfred Perlstein funsetown(&d->bd_sigio); 378e7bb21b3SJonathan Lemon mtx_lock(&bpf_mtx); 379df8bae1dSRodney W. Grimes if (d->bd_bif) 380df8bae1dSRodney W. Grimes bpf_detachd(d); 381e7bb21b3SJonathan Lemon mtx_unlock(&bpf_mtx); 38282f4445dSRobert Watson #ifdef MAC 38382f4445dSRobert Watson mac_destroy_bpfdesc(d); 38482f4445dSRobert Watson #endif /* MAC */ 385df8bae1dSRodney W. Grimes bpf_freed(d); 386bd3a5320SPoul-Henning Kamp dev->si_drv1 = 0; 387d722be54SLuigi Rizzo free(d, M_BPF); 388df8bae1dSRodney W. Grimes 389df8bae1dSRodney W. Grimes return (0); 390df8bae1dSRodney W. Grimes } 391df8bae1dSRodney W. Grimes 392df8bae1dSRodney W. Grimes 393df8bae1dSRodney W. Grimes /* 394df8bae1dSRodney W. Grimes * Rotate the packet buffers in descriptor d. Move the store buffer 395df8bae1dSRodney W. Grimes * into the hold slot, and the free buffer into the store slot. 396df8bae1dSRodney W. Grimes * Zero the length of the new store buffer. 397df8bae1dSRodney W. Grimes */ 398df8bae1dSRodney W. Grimes #define ROTATE_BUFFERS(d) \ 399df8bae1dSRodney W. Grimes (d)->bd_hbuf = (d)->bd_sbuf; \ 400df8bae1dSRodney W. Grimes (d)->bd_hlen = (d)->bd_slen; \ 401df8bae1dSRodney W. Grimes (d)->bd_sbuf = (d)->bd_fbuf; \ 402df8bae1dSRodney W. Grimes (d)->bd_slen = 0; \ 403df8bae1dSRodney W. Grimes (d)->bd_fbuf = 0; 404df8bae1dSRodney W. Grimes /* 405df8bae1dSRodney W. Grimes * bpfread - read next chunk of packets from buffers 406df8bae1dSRodney W. Grimes */ 40787f6c662SJulian Elischer static int 40860039670SBruce Evans bpfread(dev, uio, ioflag) 409df8bae1dSRodney W. Grimes dev_t dev; 410df8bae1dSRodney W. Grimes register struct uio *uio; 41160039670SBruce Evans int ioflag; 412df8bae1dSRodney W. Grimes { 413e7bb21b3SJonathan Lemon struct bpf_d *d = dev->si_drv1; 41481bda851SJohn Polstra int timed_out; 415df8bae1dSRodney W. Grimes int error; 416df8bae1dSRodney W. Grimes 417df8bae1dSRodney W. Grimes /* 418df8bae1dSRodney W. Grimes * Restrict application to use a buffer the same size as 419df8bae1dSRodney W. Grimes * as kernel buffers. 420df8bae1dSRodney W. Grimes */ 421df8bae1dSRodney W. Grimes if (uio->uio_resid != d->bd_bufsize) 422df8bae1dSRodney W. Grimes return (EINVAL); 423df8bae1dSRodney W. Grimes 424e7bb21b3SJonathan Lemon BPFD_LOCK(d); 42581bda851SJohn Polstra if (d->bd_state == BPF_WAITING) 42681bda851SJohn Polstra callout_stop(&d->bd_callout); 42781bda851SJohn Polstra timed_out = (d->bd_state == BPF_TIMED_OUT); 42881bda851SJohn Polstra d->bd_state = BPF_IDLE; 429df8bae1dSRodney W. Grimes /* 430df8bae1dSRodney W. Grimes * If the hold buffer is empty, then do a timed sleep, which 431df8bae1dSRodney W. Grimes * ends when the timeout expires or when enough packets 432df8bae1dSRodney W. Grimes * have arrived to fill the store buffer. 433df8bae1dSRodney W. Grimes */ 434df8bae1dSRodney W. Grimes while (d->bd_hbuf == 0) { 43581bda851SJohn Polstra if ((d->bd_immediate || timed_out) && d->bd_slen != 0) { 436df8bae1dSRodney W. Grimes /* 437df8bae1dSRodney W. Grimes * A packet(s) either arrived since the previous 438df8bae1dSRodney W. Grimes * read or arrived while we were asleep. 439df8bae1dSRodney W. Grimes * Rotate the buffers and return what's here. 440df8bae1dSRodney W. Grimes */ 441df8bae1dSRodney W. Grimes ROTATE_BUFFERS(d); 442df8bae1dSRodney W. Grimes break; 443df8bae1dSRodney W. Grimes } 444de5d9935SRobert Watson 445de5d9935SRobert Watson /* 446de5d9935SRobert Watson * No data is available, check to see if the bpf device 447de5d9935SRobert Watson * is still pointed at a real interface. If not, return 448de5d9935SRobert Watson * ENXIO so that the userland process knows to rebind 449de5d9935SRobert Watson * it before using it again. 450de5d9935SRobert Watson */ 451de5d9935SRobert Watson if (d->bd_bif == NULL) { 452e7bb21b3SJonathan Lemon BPFD_UNLOCK(d); 453de5d9935SRobert Watson return (ENXIO); 454de5d9935SRobert Watson } 455de5d9935SRobert Watson 456fba3cfdeSJohn Polstra if (ioflag & IO_NDELAY) { 457e7bb21b3SJonathan Lemon BPFD_UNLOCK(d); 458fba3cfdeSJohn Polstra return (EWOULDBLOCK); 459fba3cfdeSJohn Polstra } 460e7bb21b3SJonathan Lemon error = msleep((caddr_t)d, &d->bd_mtx, PRINET|PCATCH, 461e7bb21b3SJonathan Lemon "bpf", d->bd_rtout); 462df8bae1dSRodney W. Grimes if (error == EINTR || error == ERESTART) { 463e7bb21b3SJonathan Lemon BPFD_UNLOCK(d); 464df8bae1dSRodney W. Grimes return (error); 465df8bae1dSRodney W. Grimes } 466df8bae1dSRodney W. Grimes if (error == EWOULDBLOCK) { 467df8bae1dSRodney W. Grimes /* 468df8bae1dSRodney W. Grimes * On a timeout, return what's in the buffer, 469df8bae1dSRodney W. Grimes * which may be nothing. If there is something 470df8bae1dSRodney W. Grimes * in the store buffer, we can rotate the buffers. 471df8bae1dSRodney W. Grimes */ 472df8bae1dSRodney W. Grimes if (d->bd_hbuf) 473df8bae1dSRodney W. Grimes /* 474df8bae1dSRodney W. Grimes * We filled up the buffer in between 475df8bae1dSRodney W. Grimes * getting the timeout and arriving 476df8bae1dSRodney W. Grimes * here, so we don't need to rotate. 477df8bae1dSRodney W. Grimes */ 478df8bae1dSRodney W. Grimes break; 479df8bae1dSRodney W. Grimes 480df8bae1dSRodney W. Grimes if (d->bd_slen == 0) { 481e7bb21b3SJonathan Lemon BPFD_UNLOCK(d); 482df8bae1dSRodney W. Grimes return (0); 483df8bae1dSRodney W. Grimes } 484df8bae1dSRodney W. Grimes ROTATE_BUFFERS(d); 485df8bae1dSRodney W. Grimes break; 486df8bae1dSRodney W. Grimes } 487df8bae1dSRodney W. Grimes } 488df8bae1dSRodney W. Grimes /* 489df8bae1dSRodney W. Grimes * At this point, we know we have something in the hold slot. 490df8bae1dSRodney W. Grimes */ 491e7bb21b3SJonathan Lemon BPFD_UNLOCK(d); 492df8bae1dSRodney W. Grimes 493df8bae1dSRodney W. Grimes /* 494df8bae1dSRodney W. Grimes * Move data from hold buffer into user space. 495df8bae1dSRodney W. Grimes * We know the entire buffer is transferred since 496df8bae1dSRodney W. Grimes * we checked above that the read buffer is bpf_bufsize bytes. 497df8bae1dSRodney W. Grimes */ 498e7bb21b3SJonathan Lemon error = uiomove(d->bd_hbuf, d->bd_hlen, uio); 499df8bae1dSRodney W. Grimes 500e7bb21b3SJonathan Lemon BPFD_LOCK(d); 501df8bae1dSRodney W. Grimes d->bd_fbuf = d->bd_hbuf; 502df8bae1dSRodney W. Grimes d->bd_hbuf = 0; 503df8bae1dSRodney W. Grimes d->bd_hlen = 0; 504e7bb21b3SJonathan Lemon BPFD_UNLOCK(d); 505df8bae1dSRodney W. Grimes 506df8bae1dSRodney W. Grimes return (error); 507df8bae1dSRodney W. Grimes } 508df8bae1dSRodney W. Grimes 509df8bae1dSRodney W. Grimes 510df8bae1dSRodney W. Grimes /* 511df8bae1dSRodney W. Grimes * If there are processes sleeping on this descriptor, wake them up. 512df8bae1dSRodney W. Grimes */ 513e7bb21b3SJonathan Lemon static __inline void 514df8bae1dSRodney W. Grimes bpf_wakeup(d) 515df8bae1dSRodney W. Grimes register struct bpf_d *d; 516df8bae1dSRodney W. Grimes { 51781bda851SJohn Polstra if (d->bd_state == BPF_WAITING) { 51881bda851SJohn Polstra callout_stop(&d->bd_callout); 51981bda851SJohn Polstra d->bd_state = BPF_IDLE; 52081bda851SJohn Polstra } 521df8bae1dSRodney W. Grimes wakeup((caddr_t)d); 522831d27a9SDon Lewis if (d->bd_async && d->bd_sig && d->bd_sigio) 523f1320723SAlfred Perlstein pgsigio(&d->bd_sigio, d->bd_sig, 0); 52400a83887SPaul Traina 525df8bae1dSRodney W. Grimes selwakeup(&d->bd_sel); 526df8bae1dSRodney W. Grimes } 527df8bae1dSRodney W. Grimes 52881bda851SJohn Polstra static void 52981bda851SJohn Polstra bpf_timed_out(arg) 53081bda851SJohn Polstra void *arg; 53181bda851SJohn Polstra { 53281bda851SJohn Polstra struct bpf_d *d = (struct bpf_d *)arg; 53381bda851SJohn Polstra 53481bda851SJohn Polstra BPFD_LOCK(d); 53581bda851SJohn Polstra if (d->bd_state == BPF_WAITING) { 53681bda851SJohn Polstra d->bd_state = BPF_TIMED_OUT; 53781bda851SJohn Polstra if (d->bd_slen != 0) 53881bda851SJohn Polstra bpf_wakeup(d); 53981bda851SJohn Polstra } 54081bda851SJohn Polstra BPFD_UNLOCK(d); 54181bda851SJohn Polstra } 54281bda851SJohn Polstra 54387f6c662SJulian Elischer static int 54460039670SBruce Evans bpfwrite(dev, uio, ioflag) 545df8bae1dSRodney W. Grimes dev_t dev; 546df8bae1dSRodney W. Grimes struct uio *uio; 54760039670SBruce Evans int ioflag; 548df8bae1dSRodney W. Grimes { 549e7bb21b3SJonathan Lemon struct bpf_d *d = dev->si_drv1; 550df8bae1dSRodney W. Grimes struct ifnet *ifp; 551df8bae1dSRodney W. Grimes struct mbuf *m; 552e7bb21b3SJonathan Lemon int error; 553df8bae1dSRodney W. Grimes static struct sockaddr dst; 554df8bae1dSRodney W. Grimes int datlen; 555df8bae1dSRodney W. Grimes 556df8bae1dSRodney W. Grimes if (d->bd_bif == 0) 557df8bae1dSRodney W. Grimes return (ENXIO); 558df8bae1dSRodney W. Grimes 559df8bae1dSRodney W. Grimes ifp = d->bd_bif->bif_ifp; 560df8bae1dSRodney W. Grimes 561df8bae1dSRodney W. Grimes if (uio->uio_resid == 0) 562df8bae1dSRodney W. Grimes return (0); 563df8bae1dSRodney W. Grimes 564df8bae1dSRodney W. Grimes error = bpf_movein(uio, (int)d->bd_bif->bif_dlt, &m, &dst, &datlen); 565df8bae1dSRodney W. Grimes if (error) 566df8bae1dSRodney W. Grimes return (error); 567df8bae1dSRodney W. Grimes 568df8bae1dSRodney W. Grimes if (datlen > ifp->if_mtu) 569df8bae1dSRodney W. Grimes return (EMSGSIZE); 570df8bae1dSRodney W. Grimes 571114ae644SMike Smith if (d->bd_hdrcmplt) 572114ae644SMike Smith dst.sa_family = pseudo_AF_HDRCMPLT; 573114ae644SMike Smith 574e7bb21b3SJonathan Lemon mtx_lock(&Giant); 57582f4445dSRobert Watson #ifdef MAC 57682f4445dSRobert Watson mac_create_mbuf_from_bpfdesc(d, m); 57782f4445dSRobert Watson #endif 578df8bae1dSRodney W. Grimes error = (*ifp->if_output)(ifp, m, &dst, (struct rtentry *)0); 579e7bb21b3SJonathan Lemon mtx_unlock(&Giant); 580df8bae1dSRodney W. Grimes /* 581df8bae1dSRodney W. Grimes * The driver frees the mbuf. 582df8bae1dSRodney W. Grimes */ 583df8bae1dSRodney W. Grimes return (error); 584df8bae1dSRodney W. Grimes } 585df8bae1dSRodney W. Grimes 586df8bae1dSRodney W. Grimes /* 587df8bae1dSRodney W. Grimes * Reset a descriptor by flushing its packet buffer and clearing the 588e7bb21b3SJonathan Lemon * receive and drop counts. 589df8bae1dSRodney W. Grimes */ 590df8bae1dSRodney W. Grimes static void 591df8bae1dSRodney W. Grimes reset_d(d) 592df8bae1dSRodney W. Grimes struct bpf_d *d; 593df8bae1dSRodney W. Grimes { 594e7bb21b3SJonathan Lemon 595e7bb21b3SJonathan Lemon mtx_assert(&d->bd_mtx, MA_OWNED); 596df8bae1dSRodney W. Grimes if (d->bd_hbuf) { 597df8bae1dSRodney W. Grimes /* Free the hold buffer. */ 598df8bae1dSRodney W. Grimes d->bd_fbuf = d->bd_hbuf; 599df8bae1dSRodney W. Grimes d->bd_hbuf = 0; 600df8bae1dSRodney W. Grimes } 601df8bae1dSRodney W. Grimes d->bd_slen = 0; 602df8bae1dSRodney W. Grimes d->bd_hlen = 0; 603df8bae1dSRodney W. Grimes d->bd_rcount = 0; 604df8bae1dSRodney W. Grimes d->bd_dcount = 0; 605df8bae1dSRodney W. Grimes } 606df8bae1dSRodney W. Grimes 607df8bae1dSRodney W. Grimes /* 608df8bae1dSRodney W. Grimes * FIONREAD Check for read packet available. 609df8bae1dSRodney W. Grimes * SIOCGIFADDR Get interface address - convenient hook to driver. 610df8bae1dSRodney W. Grimes * BIOCGBLEN Get buffer len [for read()]. 611df8bae1dSRodney W. Grimes * BIOCSETF Set ethernet read filter. 612df8bae1dSRodney W. Grimes * BIOCFLUSH Flush read packet buffer. 613df8bae1dSRodney W. Grimes * BIOCPROMISC Put interface into promiscuous mode. 614df8bae1dSRodney W. Grimes * BIOCGDLT Get link layer type. 615df8bae1dSRodney W. Grimes * BIOCGETIF Get interface name. 616df8bae1dSRodney W. Grimes * BIOCSETIF Set interface. 617df8bae1dSRodney W. Grimes * BIOCSRTIMEOUT Set read timeout. 618df8bae1dSRodney W. Grimes * BIOCGRTIMEOUT Get read timeout. 619df8bae1dSRodney W. Grimes * BIOCGSTATS Get packet stats. 620df8bae1dSRodney W. Grimes * BIOCIMMEDIATE Set immediate mode. 621df8bae1dSRodney W. Grimes * BIOCVERSION Get filter language version. 622114ae644SMike Smith * BIOCGHDRCMPLT Get "header already complete" flag 623114ae644SMike Smith * BIOCSHDRCMPLT Set "header already complete" flag 6248ed3828cSRobert Watson * BIOCGSEESENT Get "see packets sent" flag 6258ed3828cSRobert Watson * BIOCSSEESENT Set "see packets sent" flag 626df8bae1dSRodney W. Grimes */ 627df8bae1dSRodney W. Grimes /* ARGSUSED */ 62887f6c662SJulian Elischer static int 629b40ce416SJulian Elischer bpfioctl(dev, cmd, addr, flags, td) 630df8bae1dSRodney W. Grimes dev_t dev; 631ecbb00a2SDoug Rabson u_long cmd; 632df8bae1dSRodney W. Grimes caddr_t addr; 63360039670SBruce Evans int flags; 634b40ce416SJulian Elischer struct thread *td; 635df8bae1dSRodney W. Grimes { 636e7bb21b3SJonathan Lemon struct bpf_d *d = dev->si_drv1; 637e7bb21b3SJonathan Lemon int error = 0; 638df8bae1dSRodney W. Grimes 63981bda851SJohn Polstra BPFD_LOCK(d); 64081bda851SJohn Polstra if (d->bd_state == BPF_WAITING) 64181bda851SJohn Polstra callout_stop(&d->bd_callout); 64281bda851SJohn Polstra d->bd_state = BPF_IDLE; 64381bda851SJohn Polstra BPFD_UNLOCK(d); 64481bda851SJohn Polstra 645df8bae1dSRodney W. Grimes switch (cmd) { 646df8bae1dSRodney W. Grimes 647df8bae1dSRodney W. Grimes default: 648df8bae1dSRodney W. Grimes error = EINVAL; 649df8bae1dSRodney W. Grimes break; 650df8bae1dSRodney W. Grimes 651df8bae1dSRodney W. Grimes /* 652df8bae1dSRodney W. Grimes * Check for read packet available. 653df8bae1dSRodney W. Grimes */ 654df8bae1dSRodney W. Grimes case FIONREAD: 655df8bae1dSRodney W. Grimes { 656df8bae1dSRodney W. Grimes int n; 657df8bae1dSRodney W. Grimes 658e7bb21b3SJonathan Lemon BPFD_LOCK(d); 659df8bae1dSRodney W. Grimes n = d->bd_slen; 660df8bae1dSRodney W. Grimes if (d->bd_hbuf) 661df8bae1dSRodney W. Grimes n += d->bd_hlen; 662e7bb21b3SJonathan Lemon BPFD_UNLOCK(d); 663df8bae1dSRodney W. Grimes 664df8bae1dSRodney W. Grimes *(int *)addr = n; 665df8bae1dSRodney W. Grimes break; 666df8bae1dSRodney W. Grimes } 667df8bae1dSRodney W. Grimes 668df8bae1dSRodney W. Grimes case SIOCGIFADDR: 669df8bae1dSRodney W. Grimes { 670df8bae1dSRodney W. Grimes struct ifnet *ifp; 671df8bae1dSRodney W. Grimes 672df8bae1dSRodney W. Grimes if (d->bd_bif == 0) 673df8bae1dSRodney W. Grimes error = EINVAL; 674df8bae1dSRodney W. Grimes else { 675df8bae1dSRodney W. Grimes ifp = d->bd_bif->bif_ifp; 676df8bae1dSRodney W. Grimes error = (*ifp->if_ioctl)(ifp, cmd, addr); 677df8bae1dSRodney W. Grimes } 678df8bae1dSRodney W. Grimes break; 679df8bae1dSRodney W. Grimes } 680df8bae1dSRodney W. Grimes 681df8bae1dSRodney W. Grimes /* 682df8bae1dSRodney W. Grimes * Get buffer len [for read()]. 683df8bae1dSRodney W. Grimes */ 684df8bae1dSRodney W. Grimes case BIOCGBLEN: 685df8bae1dSRodney W. Grimes *(u_int *)addr = d->bd_bufsize; 686df8bae1dSRodney W. Grimes break; 687df8bae1dSRodney W. Grimes 688df8bae1dSRodney W. Grimes /* 689df8bae1dSRodney W. Grimes * Set buffer length. 690df8bae1dSRodney W. Grimes */ 691df8bae1dSRodney W. Grimes case BIOCSBLEN: 692df8bae1dSRodney W. Grimes if (d->bd_bif != 0) 693df8bae1dSRodney W. Grimes error = EINVAL; 694df8bae1dSRodney W. Grimes else { 695df8bae1dSRodney W. Grimes register u_int size = *(u_int *)addr; 696df8bae1dSRodney W. Grimes 697eba2a1aeSPoul-Henning Kamp if (size > bpf_maxbufsize) 698eba2a1aeSPoul-Henning Kamp *(u_int *)addr = size = bpf_maxbufsize; 699df8bae1dSRodney W. Grimes else if (size < BPF_MINBUFSIZE) 700df8bae1dSRodney W. Grimes *(u_int *)addr = size = BPF_MINBUFSIZE; 701df8bae1dSRodney W. Grimes d->bd_bufsize = size; 702df8bae1dSRodney W. Grimes } 703df8bae1dSRodney W. Grimes break; 704df8bae1dSRodney W. Grimes 705df8bae1dSRodney W. Grimes /* 706df8bae1dSRodney W. Grimes * Set link layer read filter. 707df8bae1dSRodney W. Grimes */ 708df8bae1dSRodney W. Grimes case BIOCSETF: 709df8bae1dSRodney W. Grimes error = bpf_setf(d, (struct bpf_program *)addr); 710df8bae1dSRodney W. Grimes break; 711df8bae1dSRodney W. Grimes 712df8bae1dSRodney W. Grimes /* 713df8bae1dSRodney W. Grimes * Flush read packet buffer. 714df8bae1dSRodney W. Grimes */ 715df8bae1dSRodney W. Grimes case BIOCFLUSH: 716e7bb21b3SJonathan Lemon BPFD_LOCK(d); 717df8bae1dSRodney W. Grimes reset_d(d); 718e7bb21b3SJonathan Lemon BPFD_UNLOCK(d); 719df8bae1dSRodney W. Grimes break; 720df8bae1dSRodney W. Grimes 721df8bae1dSRodney W. Grimes /* 722df8bae1dSRodney W. Grimes * Put interface into promiscuous mode. 723df8bae1dSRodney W. Grimes */ 724df8bae1dSRodney W. Grimes case BIOCPROMISC: 725df8bae1dSRodney W. Grimes if (d->bd_bif == 0) { 726df8bae1dSRodney W. Grimes /* 727df8bae1dSRodney W. Grimes * No interface attached yet. 728df8bae1dSRodney W. Grimes */ 729df8bae1dSRodney W. Grimes error = EINVAL; 730df8bae1dSRodney W. Grimes break; 731df8bae1dSRodney W. Grimes } 732df8bae1dSRodney W. Grimes if (d->bd_promisc == 0) { 733e7bb21b3SJonathan Lemon mtx_lock(&Giant); 734df8bae1dSRodney W. Grimes error = ifpromisc(d->bd_bif->bif_ifp, 1); 735e7bb21b3SJonathan Lemon mtx_unlock(&Giant); 736df8bae1dSRodney W. Grimes if (error == 0) 737df8bae1dSRodney W. Grimes d->bd_promisc = 1; 738df8bae1dSRodney W. Grimes } 739df8bae1dSRodney W. Grimes break; 740df8bae1dSRodney W. Grimes 741df8bae1dSRodney W. Grimes /* 742df8bae1dSRodney W. Grimes * Get device parameters. 743df8bae1dSRodney W. Grimes */ 744df8bae1dSRodney W. Grimes case BIOCGDLT: 745df8bae1dSRodney W. Grimes if (d->bd_bif == 0) 746df8bae1dSRodney W. Grimes error = EINVAL; 747df8bae1dSRodney W. Grimes else 748df8bae1dSRodney W. Grimes *(u_int *)addr = d->bd_bif->bif_dlt; 749df8bae1dSRodney W. Grimes break; 750df8bae1dSRodney W. Grimes 751df8bae1dSRodney W. Grimes /* 7521dd0feaaSArchie Cobbs * Get interface name. 753df8bae1dSRodney W. Grimes */ 754df8bae1dSRodney W. Grimes case BIOCGETIF: 755df8bae1dSRodney W. Grimes if (d->bd_bif == 0) 756df8bae1dSRodney W. Grimes error = EINVAL; 7571dd0feaaSArchie Cobbs else { 7581dd0feaaSArchie Cobbs struct ifnet *const ifp = d->bd_bif->bif_ifp; 7591dd0feaaSArchie Cobbs struct ifreq *const ifr = (struct ifreq *)addr; 7601dd0feaaSArchie Cobbs 7611dd0feaaSArchie Cobbs snprintf(ifr->ifr_name, sizeof(ifr->ifr_name), 7621dd0feaaSArchie Cobbs "%s%d", ifp->if_name, ifp->if_unit); 7631dd0feaaSArchie Cobbs } 764df8bae1dSRodney W. Grimes break; 765df8bae1dSRodney W. Grimes 766df8bae1dSRodney W. Grimes /* 767df8bae1dSRodney W. Grimes * Set interface. 768df8bae1dSRodney W. Grimes */ 769df8bae1dSRodney W. Grimes case BIOCSETIF: 770df8bae1dSRodney W. Grimes error = bpf_setif(d, (struct ifreq *)addr); 771df8bae1dSRodney W. Grimes break; 772df8bae1dSRodney W. Grimes 773df8bae1dSRodney W. Grimes /* 774df8bae1dSRodney W. Grimes * Set read timeout. 775df8bae1dSRodney W. Grimes */ 776df8bae1dSRodney W. Grimes case BIOCSRTIMEOUT: 777df8bae1dSRodney W. Grimes { 778df8bae1dSRodney W. Grimes struct timeval *tv = (struct timeval *)addr; 779df8bae1dSRodney W. Grimes 780bdc2cdc5SAlexander Langer /* 781bdc2cdc5SAlexander Langer * Subtract 1 tick from tvtohz() since this isn't 782bdc2cdc5SAlexander Langer * a one-shot timer. 783bdc2cdc5SAlexander Langer */ 784bdc2cdc5SAlexander Langer if ((error = itimerfix(tv)) == 0) 785bdc2cdc5SAlexander Langer d->bd_rtout = tvtohz(tv) - 1; 786df8bae1dSRodney W. Grimes break; 787df8bae1dSRodney W. Grimes } 788df8bae1dSRodney W. Grimes 789df8bae1dSRodney W. Grimes /* 790df8bae1dSRodney W. Grimes * Get read timeout. 791df8bae1dSRodney W. Grimes */ 792df8bae1dSRodney W. Grimes case BIOCGRTIMEOUT: 793df8bae1dSRodney W. Grimes { 794df8bae1dSRodney W. Grimes struct timeval *tv = (struct timeval *)addr; 795df8bae1dSRodney W. Grimes 796bdc2cdc5SAlexander Langer tv->tv_sec = d->bd_rtout / hz; 797bdc2cdc5SAlexander Langer tv->tv_usec = (d->bd_rtout % hz) * tick; 798df8bae1dSRodney W. Grimes break; 799df8bae1dSRodney W. Grimes } 800df8bae1dSRodney W. Grimes 801df8bae1dSRodney W. Grimes /* 802df8bae1dSRodney W. Grimes * Get packet stats. 803df8bae1dSRodney W. Grimes */ 804df8bae1dSRodney W. Grimes case BIOCGSTATS: 805df8bae1dSRodney W. Grimes { 806df8bae1dSRodney W. Grimes struct bpf_stat *bs = (struct bpf_stat *)addr; 807df8bae1dSRodney W. Grimes 808df8bae1dSRodney W. Grimes bs->bs_recv = d->bd_rcount; 809df8bae1dSRodney W. Grimes bs->bs_drop = d->bd_dcount; 810df8bae1dSRodney W. Grimes break; 811df8bae1dSRodney W. Grimes } 812df8bae1dSRodney W. Grimes 813df8bae1dSRodney W. Grimes /* 814df8bae1dSRodney W. Grimes * Set immediate mode. 815df8bae1dSRodney W. Grimes */ 816df8bae1dSRodney W. Grimes case BIOCIMMEDIATE: 817df8bae1dSRodney W. Grimes d->bd_immediate = *(u_int *)addr; 818df8bae1dSRodney W. Grimes break; 819df8bae1dSRodney W. Grimes 820df8bae1dSRodney W. Grimes case BIOCVERSION: 821df8bae1dSRodney W. Grimes { 822df8bae1dSRodney W. Grimes struct bpf_version *bv = (struct bpf_version *)addr; 823df8bae1dSRodney W. Grimes 824df8bae1dSRodney W. Grimes bv->bv_major = BPF_MAJOR_VERSION; 825df8bae1dSRodney W. Grimes bv->bv_minor = BPF_MINOR_VERSION; 826df8bae1dSRodney W. Grimes break; 827df8bae1dSRodney W. Grimes } 82800a83887SPaul Traina 829114ae644SMike Smith /* 830114ae644SMike Smith * Get "header already complete" flag 831114ae644SMike Smith */ 832114ae644SMike Smith case BIOCGHDRCMPLT: 833114ae644SMike Smith *(u_int *)addr = d->bd_hdrcmplt; 834114ae644SMike Smith break; 835114ae644SMike Smith 836114ae644SMike Smith /* 837114ae644SMike Smith * Set "header already complete" flag 838114ae644SMike Smith */ 839114ae644SMike Smith case BIOCSHDRCMPLT: 840114ae644SMike Smith d->bd_hdrcmplt = *(u_int *)addr ? 1 : 0; 841114ae644SMike Smith break; 842114ae644SMike Smith 8438ed3828cSRobert Watson /* 8448ed3828cSRobert Watson * Get "see sent packets" flag 8458ed3828cSRobert Watson */ 8468ed3828cSRobert Watson case BIOCGSEESENT: 8478ed3828cSRobert Watson *(u_int *)addr = d->bd_seesent; 8488ed3828cSRobert Watson break; 8498ed3828cSRobert Watson 8508ed3828cSRobert Watson /* 8518ed3828cSRobert Watson * Set "see sent packets" flag 8528ed3828cSRobert Watson */ 8538ed3828cSRobert Watson case BIOCSSEESENT: 8548ed3828cSRobert Watson d->bd_seesent = *(u_int *)addr; 8558ed3828cSRobert Watson break; 8568ed3828cSRobert Watson 85700a83887SPaul Traina case FIONBIO: /* Non-blocking I/O */ 85800a83887SPaul Traina break; 85900a83887SPaul Traina 86000a83887SPaul Traina case FIOASYNC: /* Send signal on receive packets */ 86100a83887SPaul Traina d->bd_async = *(int *)addr; 86200a83887SPaul Traina break; 86300a83887SPaul Traina 864831d27a9SDon Lewis case FIOSETOWN: 865831d27a9SDon Lewis error = fsetown(*(int *)addr, &d->bd_sigio); 86600a83887SPaul Traina break; 86700a83887SPaul Traina 868831d27a9SDon Lewis case FIOGETOWN: 869831d27a9SDon Lewis *(int *)addr = fgetown(d->bd_sigio); 870831d27a9SDon Lewis break; 871831d27a9SDon Lewis 872831d27a9SDon Lewis /* This is deprecated, FIOSETOWN should be used instead. */ 873831d27a9SDon Lewis case TIOCSPGRP: 874831d27a9SDon Lewis error = fsetown(-(*(int *)addr), &d->bd_sigio); 875831d27a9SDon Lewis break; 876831d27a9SDon Lewis 877831d27a9SDon Lewis /* This is deprecated, FIOGETOWN should be used instead. */ 87800a83887SPaul Traina case TIOCGPGRP: 879831d27a9SDon Lewis *(int *)addr = -fgetown(d->bd_sigio); 88000a83887SPaul Traina break; 88100a83887SPaul Traina 88200a83887SPaul Traina case BIOCSRSIG: /* Set receive signal */ 88300a83887SPaul Traina { 88400a83887SPaul Traina u_int sig; 88500a83887SPaul Traina 88600a83887SPaul Traina sig = *(u_int *)addr; 88700a83887SPaul Traina 88800a83887SPaul Traina if (sig >= NSIG) 88900a83887SPaul Traina error = EINVAL; 89000a83887SPaul Traina else 89100a83887SPaul Traina d->bd_sig = sig; 89200a83887SPaul Traina break; 89300a83887SPaul Traina } 89400a83887SPaul Traina case BIOCGRSIG: 89500a83887SPaul Traina *(u_int *)addr = d->bd_sig; 89600a83887SPaul Traina break; 897df8bae1dSRodney W. Grimes } 898df8bae1dSRodney W. Grimes return (error); 899df8bae1dSRodney W. Grimes } 900df8bae1dSRodney W. Grimes 901df8bae1dSRodney W. Grimes /* 902df8bae1dSRodney W. Grimes * Set d's packet filter program to fp. If this file already has a filter, 903df8bae1dSRodney W. Grimes * free it and replace it. Returns EINVAL for bogus requests. 904df8bae1dSRodney W. Grimes */ 905f708ef1bSPoul-Henning Kamp static int 906df8bae1dSRodney W. Grimes bpf_setf(d, fp) 907df8bae1dSRodney W. Grimes struct bpf_d *d; 908df8bae1dSRodney W. Grimes struct bpf_program *fp; 909df8bae1dSRodney W. Grimes { 910df8bae1dSRodney W. Grimes struct bpf_insn *fcode, *old; 911df8bae1dSRodney W. Grimes u_int flen, size; 912df8bae1dSRodney W. Grimes 913df8bae1dSRodney W. Grimes old = d->bd_filter; 914df8bae1dSRodney W. Grimes if (fp->bf_insns == 0) { 915df8bae1dSRodney W. Grimes if (fp->bf_len != 0) 916df8bae1dSRodney W. Grimes return (EINVAL); 917e7bb21b3SJonathan Lemon BPFD_LOCK(d); 918df8bae1dSRodney W. Grimes d->bd_filter = 0; 919df8bae1dSRodney W. Grimes reset_d(d); 920e7bb21b3SJonathan Lemon BPFD_UNLOCK(d); 921df8bae1dSRodney W. Grimes if (old != 0) 922bd3a5320SPoul-Henning Kamp free((caddr_t)old, M_BPF); 923df8bae1dSRodney W. Grimes return (0); 924df8bae1dSRodney W. Grimes } 925df8bae1dSRodney W. Grimes flen = fp->bf_len; 926df8bae1dSRodney W. Grimes if (flen > BPF_MAXINSNS) 927df8bae1dSRodney W. Grimes return (EINVAL); 928df8bae1dSRodney W. Grimes 929df8bae1dSRodney W. Grimes size = flen * sizeof(*fp->bf_insns); 930bd3a5320SPoul-Henning Kamp fcode = (struct bpf_insn *)malloc(size, M_BPF, M_WAITOK); 931df8bae1dSRodney W. Grimes if (copyin((caddr_t)fp->bf_insns, (caddr_t)fcode, size) == 0 && 932df8bae1dSRodney W. Grimes bpf_validate(fcode, (int)flen)) { 933e7bb21b3SJonathan Lemon BPFD_LOCK(d); 934df8bae1dSRodney W. Grimes d->bd_filter = fcode; 935df8bae1dSRodney W. Grimes reset_d(d); 936e7bb21b3SJonathan Lemon BPFD_UNLOCK(d); 937df8bae1dSRodney W. Grimes if (old != 0) 938bd3a5320SPoul-Henning Kamp free((caddr_t)old, M_BPF); 939df8bae1dSRodney W. Grimes 940df8bae1dSRodney W. Grimes return (0); 941df8bae1dSRodney W. Grimes } 942bd3a5320SPoul-Henning Kamp free((caddr_t)fcode, M_BPF); 943df8bae1dSRodney W. Grimes return (EINVAL); 944df8bae1dSRodney W. Grimes } 945df8bae1dSRodney W. Grimes 946df8bae1dSRodney W. Grimes /* 947df8bae1dSRodney W. Grimes * Detach a file from its current interface (if attached at all) and attach 948df8bae1dSRodney W. Grimes * to the interface indicated by the name stored in ifr. 949df8bae1dSRodney W. Grimes * Return an errno or 0. 950df8bae1dSRodney W. Grimes */ 951df8bae1dSRodney W. Grimes static int 952df8bae1dSRodney W. Grimes bpf_setif(d, ifr) 953df8bae1dSRodney W. Grimes struct bpf_d *d; 954df8bae1dSRodney W. Grimes struct ifreq *ifr; 955df8bae1dSRodney W. Grimes { 956df8bae1dSRodney W. Grimes struct bpf_if *bp; 957e7bb21b3SJonathan Lemon int error; 9589b44ff22SGarrett Wollman struct ifnet *theywant; 959df8bae1dSRodney W. Grimes 9609b44ff22SGarrett Wollman theywant = ifunit(ifr->ifr_name); 9619b44ff22SGarrett Wollman if (theywant == 0) 9629b44ff22SGarrett Wollman return ENXIO; 9639b44ff22SGarrett Wollman 964df8bae1dSRodney W. Grimes /* 965df8bae1dSRodney W. Grimes * Look through attached interfaces for the named one. 966df8bae1dSRodney W. Grimes */ 967e7bb21b3SJonathan Lemon mtx_lock(&bpf_mtx); 968df8bae1dSRodney W. Grimes for (bp = bpf_iflist; bp != 0; bp = bp->bif_next) { 969df8bae1dSRodney W. Grimes struct ifnet *ifp = bp->bif_ifp; 970df8bae1dSRodney W. Grimes 9719b44ff22SGarrett Wollman if (ifp == 0 || ifp != theywant) 972df8bae1dSRodney W. Grimes continue; 973e7bb21b3SJonathan Lemon 974e7bb21b3SJonathan Lemon mtx_unlock(&bpf_mtx); 975df8bae1dSRodney W. Grimes /* 976df8bae1dSRodney W. Grimes * We found the requested interface. 977df8bae1dSRodney W. Grimes * If it's not up, return an error. 978df8bae1dSRodney W. Grimes * Allocate the packet buffers if we need to. 979df8bae1dSRodney W. Grimes * If we're already attached to requested interface, 980df8bae1dSRodney W. Grimes * just flush the buffer. 981df8bae1dSRodney W. Grimes */ 982df8bae1dSRodney W. Grimes if ((ifp->if_flags & IFF_UP) == 0) 983df8bae1dSRodney W. Grimes return (ENETDOWN); 984df8bae1dSRodney W. Grimes 985df8bae1dSRodney W. Grimes if (d->bd_sbuf == 0) { 986df8bae1dSRodney W. Grimes error = bpf_allocbufs(d); 987df8bae1dSRodney W. Grimes if (error != 0) 988df8bae1dSRodney W. Grimes return (error); 989df8bae1dSRodney W. Grimes } 990df8bae1dSRodney W. Grimes if (bp != d->bd_bif) { 991df8bae1dSRodney W. Grimes if (d->bd_bif) 992df8bae1dSRodney W. Grimes /* 993df8bae1dSRodney W. Grimes * Detach if attached to something else. 994df8bae1dSRodney W. Grimes */ 995df8bae1dSRodney W. Grimes bpf_detachd(d); 996df8bae1dSRodney W. Grimes 997df8bae1dSRodney W. Grimes bpf_attachd(d, bp); 998df8bae1dSRodney W. Grimes } 999e7bb21b3SJonathan Lemon BPFD_LOCK(d); 1000df8bae1dSRodney W. Grimes reset_d(d); 1001e7bb21b3SJonathan Lemon BPFD_UNLOCK(d); 1002df8bae1dSRodney W. Grimes return (0); 1003df8bae1dSRodney W. Grimes } 1004e7bb21b3SJonathan Lemon mtx_unlock(&bpf_mtx); 1005df8bae1dSRodney W. Grimes /* Not found. */ 1006df8bae1dSRodney W. Grimes return (ENXIO); 1007df8bae1dSRodney W. Grimes } 1008df8bae1dSRodney W. Grimes 1009df8bae1dSRodney W. Grimes /* 1010243ac7d8SPeter Wemm * Support for select() and poll() system calls 1011df8bae1dSRodney W. Grimes * 1012df8bae1dSRodney W. Grimes * Return true iff the specific operation will not block indefinitely. 1013df8bae1dSRodney W. Grimes * Otherwise, return false but make a note that a selwakeup() must be done. 1014df8bae1dSRodney W. Grimes */ 1015df8bae1dSRodney W. Grimes int 1016b40ce416SJulian Elischer bpfpoll(dev, events, td) 1017df8bae1dSRodney W. Grimes register dev_t dev; 1018243ac7d8SPeter Wemm int events; 1019b40ce416SJulian Elischer struct thread *td; 1020df8bae1dSRodney W. Grimes { 1021e7bb21b3SJonathan Lemon struct bpf_d *d; 10220832fc64SGarance A Drosehn int revents; 1023df8bae1dSRodney W. Grimes 1024bd3a5320SPoul-Henning Kamp d = dev->si_drv1; 1025de5d9935SRobert Watson if (d->bd_bif == NULL) 1026de5d9935SRobert Watson return (ENXIO); 1027de5d9935SRobert Watson 10280832fc64SGarance A Drosehn revents = events & (POLLOUT | POLLWRNORM); 1029e7bb21b3SJonathan Lemon BPFD_LOCK(d); 103075c13541SPoul-Henning Kamp if (events & (POLLIN | POLLRDNORM)) { 10310832fc64SGarance A Drosehn /* 10320832fc64SGarance A Drosehn * An imitation of the FIONREAD ioctl code. 10330832fc64SGarance A Drosehn * XXX not quite. An exact imitation: 10340832fc64SGarance A Drosehn * if (d->b_slen != 0 || 10350832fc64SGarance A Drosehn * (d->bd_hbuf != NULL && d->bd_hlen != 0) 10360832fc64SGarance A Drosehn */ 103781bda851SJohn Polstra if (d->bd_hlen != 0 || 103881bda851SJohn Polstra ((d->bd_immediate || d->bd_state == BPF_TIMED_OUT) && 103981bda851SJohn Polstra d->bd_slen != 0)) 1040243ac7d8SPeter Wemm revents |= events & (POLLIN | POLLRDNORM); 104181bda851SJohn Polstra else { 1042ed01445dSJohn Baldwin selrecord(td, &d->bd_sel); 104381bda851SJohn Polstra /* Start the read timeout if necessary. */ 104481bda851SJohn Polstra if (d->bd_rtout > 0 && d->bd_state == BPF_IDLE) { 104581bda851SJohn Polstra callout_reset(&d->bd_callout, d->bd_rtout, 104681bda851SJohn Polstra bpf_timed_out, d); 104781bda851SJohn Polstra d->bd_state = BPF_WAITING; 104881bda851SJohn Polstra } 104981bda851SJohn Polstra } 105075c13541SPoul-Henning Kamp } 1051e7bb21b3SJonathan Lemon BPFD_UNLOCK(d); 1052243ac7d8SPeter Wemm return (revents); 1053df8bae1dSRodney W. Grimes } 1054df8bae1dSRodney W. Grimes 1055df8bae1dSRodney W. Grimes /* 1056df8bae1dSRodney W. Grimes * Incoming linkage from device drivers. Process the packet pkt, of length 1057df8bae1dSRodney W. Grimes * pktlen, which is stored in a contiguous buffer. The packet is parsed 1058df8bae1dSRodney W. Grimes * by each process' filter, and if accepted, stashed into the corresponding 1059df8bae1dSRodney W. Grimes * buffer. 1060df8bae1dSRodney W. Grimes */ 1061df8bae1dSRodney W. Grimes void 10629b44ff22SGarrett Wollman bpf_tap(ifp, pkt, pktlen) 10639b44ff22SGarrett Wollman struct ifnet *ifp; 1064df8bae1dSRodney W. Grimes register u_char *pkt; 1065df8bae1dSRodney W. Grimes register u_int pktlen; 1066df8bae1dSRodney W. Grimes { 1067df8bae1dSRodney W. Grimes struct bpf_if *bp; 1068df8bae1dSRodney W. Grimes register struct bpf_d *d; 1069df8bae1dSRodney W. Grimes register u_int slen; 1070e7bb21b3SJonathan Lemon 10719b44ff22SGarrett Wollman bp = ifp->if_bpf; 1072e7bb21b3SJonathan Lemon BPFIF_LOCK(bp); 1073df8bae1dSRodney W. Grimes for (d = bp->bif_dlist; d != 0; d = d->bd_next) { 1074e7bb21b3SJonathan Lemon BPFD_LOCK(d); 1075df8bae1dSRodney W. Grimes ++d->bd_rcount; 1076df8bae1dSRodney W. Grimes slen = bpf_filter(d->bd_filter, pkt, pktlen, pktlen); 1077ec272d87SRobert Watson if (slen != 0) { 1078ec272d87SRobert Watson #ifdef MAC 1079ec272d87SRobert Watson if (mac_check_bpfdesc_receive(d, ifp) == 0) 1080ec272d87SRobert Watson #endif 1081df8bae1dSRodney W. Grimes catchpacket(d, pkt, pktlen, slen, bcopy); 1082ec272d87SRobert Watson } 1083e7bb21b3SJonathan Lemon BPFD_UNLOCK(d); 1084df8bae1dSRodney W. Grimes } 1085e7bb21b3SJonathan Lemon BPFIF_UNLOCK(bp); 1086df8bae1dSRodney W. Grimes } 1087df8bae1dSRodney W. Grimes 1088df8bae1dSRodney W. Grimes /* 1089df8bae1dSRodney W. Grimes * Copy data from an mbuf chain into a buffer. This code is derived 1090df8bae1dSRodney W. Grimes * from m_copydata in sys/uipc_mbuf.c. 1091df8bae1dSRodney W. Grimes */ 1092df8bae1dSRodney W. Grimes static void 1093df8bae1dSRodney W. Grimes bpf_mcopy(src_arg, dst_arg, len) 1094df8bae1dSRodney W. Grimes const void *src_arg; 1095df8bae1dSRodney W. Grimes void *dst_arg; 10968bcbc7dfSAlexander Langer register size_t len; 1097df8bae1dSRodney W. Grimes { 1098df8bae1dSRodney W. Grimes register const struct mbuf *m; 1099df8bae1dSRodney W. Grimes register u_int count; 1100df8bae1dSRodney W. Grimes u_char *dst; 1101df8bae1dSRodney W. Grimes 1102df8bae1dSRodney W. Grimes m = src_arg; 1103df8bae1dSRodney W. Grimes dst = dst_arg; 1104df8bae1dSRodney W. Grimes while (len > 0) { 1105df8bae1dSRodney W. Grimes if (m == 0) 1106df8bae1dSRodney W. Grimes panic("bpf_mcopy"); 1107df8bae1dSRodney W. Grimes count = min(m->m_len, len); 11080453d3cbSBruce Evans bcopy(mtod(m, void *), dst, count); 1109df8bae1dSRodney W. Grimes m = m->m_next; 1110df8bae1dSRodney W. Grimes dst += count; 1111df8bae1dSRodney W. Grimes len -= count; 1112df8bae1dSRodney W. Grimes } 1113df8bae1dSRodney W. Grimes } 1114df8bae1dSRodney W. Grimes 1115df8bae1dSRodney W. Grimes /* 1116df8bae1dSRodney W. Grimes * Incoming linkage from device drivers, when packet is in an mbuf chain. 1117df8bae1dSRodney W. Grimes */ 1118df8bae1dSRodney W. Grimes void 11199b44ff22SGarrett Wollman bpf_mtap(ifp, m) 11209b44ff22SGarrett Wollman struct ifnet *ifp; 1121df8bae1dSRodney W. Grimes struct mbuf *m; 1122df8bae1dSRodney W. Grimes { 11239b44ff22SGarrett Wollman struct bpf_if *bp = ifp->if_bpf; 1124df8bae1dSRodney W. Grimes struct bpf_d *d; 1125df8bae1dSRodney W. Grimes u_int pktlen, slen; 1126df8bae1dSRodney W. Grimes 1127f0e2422bSPoul-Henning Kamp pktlen = m_length(m, NULL); 1128f0e2422bSPoul-Henning Kamp if (pktlen == m->m_len) 1129f0e2422bSPoul-Henning Kamp return(bpf_tap(ifp, mtod(m, u_char *), pktlen)); 1130df8bae1dSRodney W. Grimes 1131e7bb21b3SJonathan Lemon BPFIF_LOCK(bp); 1132df8bae1dSRodney W. Grimes for (d = bp->bif_dlist; d != 0; d = d->bd_next) { 11338ed3828cSRobert Watson if (!d->bd_seesent && (m->m_pkthdr.rcvif == NULL)) 11348ed3828cSRobert Watson continue; 1135e7bb21b3SJonathan Lemon BPFD_LOCK(d); 1136df8bae1dSRodney W. Grimes ++d->bd_rcount; 1137df8bae1dSRodney W. Grimes slen = bpf_filter(d->bd_filter, (u_char *)m, pktlen, 0); 1138df8bae1dSRodney W. Grimes if (slen != 0) 11390c7fb534SRobert Watson #ifdef MAC 11400c7fb534SRobert Watson if (mac_check_bpfdesc_receive(d, ifp) == 0) 11410c7fb534SRobert Watson #endif 11420c7fb534SRobert Watson catchpacket(d, (u_char *)m, pktlen, slen, 11430c7fb534SRobert Watson bpf_mcopy); 1144e7bb21b3SJonathan Lemon BPFD_UNLOCK(d); 1145df8bae1dSRodney W. Grimes } 1146e7bb21b3SJonathan Lemon BPFIF_UNLOCK(bp); 1147df8bae1dSRodney W. Grimes } 1148df8bae1dSRodney W. Grimes 1149df8bae1dSRodney W. Grimes /* 1150df8bae1dSRodney W. Grimes * Move the packet data from interface memory (pkt) into the 1151df8bae1dSRodney W. Grimes * store buffer. Return 1 if it's time to wakeup a listener (buffer full), 1152df8bae1dSRodney W. Grimes * otherwise 0. "copy" is the routine called to do the actual data 1153df8bae1dSRodney W. Grimes * transfer. bcopy is passed in to copy contiguous chunks, while 1154df8bae1dSRodney W. Grimes * bpf_mcopy is passed in to copy mbuf chains. In the latter case, 1155df8bae1dSRodney W. Grimes * pkt is really an mbuf. 1156df8bae1dSRodney W. Grimes */ 1157df8bae1dSRodney W. Grimes static void 1158df8bae1dSRodney W. Grimes catchpacket(d, pkt, pktlen, snaplen, cpfn) 1159df8bae1dSRodney W. Grimes register struct bpf_d *d; 1160df8bae1dSRodney W. Grimes register u_char *pkt; 1161df8bae1dSRodney W. Grimes register u_int pktlen, snaplen; 1162929ddbbbSAlfred Perlstein register void (*cpfn)(const void *, void *, size_t); 1163df8bae1dSRodney W. Grimes { 1164df8bae1dSRodney W. Grimes register struct bpf_hdr *hp; 1165df8bae1dSRodney W. Grimes register int totlen, curlen; 1166df8bae1dSRodney W. Grimes register int hdrlen = d->bd_bif->bif_hdrlen; 1167df8bae1dSRodney W. Grimes /* 1168df8bae1dSRodney W. Grimes * Figure out how many bytes to move. If the packet is 1169df8bae1dSRodney W. Grimes * greater or equal to the snapshot length, transfer that 1170df8bae1dSRodney W. Grimes * much. Otherwise, transfer the whole packet (unless 1171df8bae1dSRodney W. Grimes * we hit the buffer size limit). 1172df8bae1dSRodney W. Grimes */ 1173df8bae1dSRodney W. Grimes totlen = hdrlen + min(snaplen, pktlen); 1174df8bae1dSRodney W. Grimes if (totlen > d->bd_bufsize) 1175df8bae1dSRodney W. Grimes totlen = d->bd_bufsize; 1176df8bae1dSRodney W. Grimes 1177df8bae1dSRodney W. Grimes /* 1178df8bae1dSRodney W. Grimes * Round up the end of the previous packet to the next longword. 1179df8bae1dSRodney W. Grimes */ 1180df8bae1dSRodney W. Grimes curlen = BPF_WORDALIGN(d->bd_slen); 1181df8bae1dSRodney W. Grimes if (curlen + totlen > d->bd_bufsize) { 1182df8bae1dSRodney W. Grimes /* 1183df8bae1dSRodney W. Grimes * This packet will overflow the storage buffer. 1184df8bae1dSRodney W. Grimes * Rotate the buffers if we can, then wakeup any 1185df8bae1dSRodney W. Grimes * pending reads. 1186df8bae1dSRodney W. Grimes */ 1187df8bae1dSRodney W. Grimes if (d->bd_fbuf == 0) { 1188df8bae1dSRodney W. Grimes /* 1189df8bae1dSRodney W. Grimes * We haven't completed the previous read yet, 1190df8bae1dSRodney W. Grimes * so drop the packet. 1191df8bae1dSRodney W. Grimes */ 1192df8bae1dSRodney W. Grimes ++d->bd_dcount; 1193df8bae1dSRodney W. Grimes return; 1194df8bae1dSRodney W. Grimes } 1195df8bae1dSRodney W. Grimes ROTATE_BUFFERS(d); 1196df8bae1dSRodney W. Grimes bpf_wakeup(d); 1197df8bae1dSRodney W. Grimes curlen = 0; 1198df8bae1dSRodney W. Grimes } 119981bda851SJohn Polstra else if (d->bd_immediate || d->bd_state == BPF_TIMED_OUT) 1200df8bae1dSRodney W. Grimes /* 120181bda851SJohn Polstra * Immediate mode is set, or the read timeout has 120281bda851SJohn Polstra * already expired during a select call. A packet 120381bda851SJohn Polstra * arrived, so the reader should be woken up. 1204df8bae1dSRodney W. Grimes */ 1205df8bae1dSRodney W. Grimes bpf_wakeup(d); 1206df8bae1dSRodney W. Grimes 1207df8bae1dSRodney W. Grimes /* 1208df8bae1dSRodney W. Grimes * Append the bpf header. 1209df8bae1dSRodney W. Grimes */ 1210df8bae1dSRodney W. Grimes hp = (struct bpf_hdr *)(d->bd_sbuf + curlen); 1211df8bae1dSRodney W. Grimes microtime(&hp->bh_tstamp); 1212df8bae1dSRodney W. Grimes hp->bh_datalen = pktlen; 1213df8bae1dSRodney W. Grimes hp->bh_hdrlen = hdrlen; 1214df8bae1dSRodney W. Grimes /* 1215df8bae1dSRodney W. Grimes * Copy the packet data into the store buffer and update its length. 1216df8bae1dSRodney W. Grimes */ 1217df8bae1dSRodney W. Grimes (*cpfn)(pkt, (u_char *)hp + hdrlen, (hp->bh_caplen = totlen - hdrlen)); 1218df8bae1dSRodney W. Grimes d->bd_slen = curlen + totlen; 1219df8bae1dSRodney W. Grimes } 1220df8bae1dSRodney W. Grimes 1221df8bae1dSRodney W. Grimes /* 1222df8bae1dSRodney W. Grimes * Initialize all nonzero fields of a descriptor. 1223df8bae1dSRodney W. Grimes */ 1224df8bae1dSRodney W. Grimes static int 1225df8bae1dSRodney W. Grimes bpf_allocbufs(d) 1226df8bae1dSRodney W. Grimes register struct bpf_d *d; 1227df8bae1dSRodney W. Grimes { 1228bd3a5320SPoul-Henning Kamp d->bd_fbuf = (caddr_t)malloc(d->bd_bufsize, M_BPF, M_WAITOK); 1229df8bae1dSRodney W. Grimes if (d->bd_fbuf == 0) 1230df8bae1dSRodney W. Grimes return (ENOBUFS); 1231df8bae1dSRodney W. Grimes 1232bd3a5320SPoul-Henning Kamp d->bd_sbuf = (caddr_t)malloc(d->bd_bufsize, M_BPF, M_WAITOK); 1233df8bae1dSRodney W. Grimes if (d->bd_sbuf == 0) { 1234bd3a5320SPoul-Henning Kamp free(d->bd_fbuf, M_BPF); 1235df8bae1dSRodney W. Grimes return (ENOBUFS); 1236df8bae1dSRodney W. Grimes } 1237df8bae1dSRodney W. Grimes d->bd_slen = 0; 1238df8bae1dSRodney W. Grimes d->bd_hlen = 0; 1239df8bae1dSRodney W. Grimes return (0); 1240df8bae1dSRodney W. Grimes } 1241df8bae1dSRodney W. Grimes 1242df8bae1dSRodney W. Grimes /* 1243df8bae1dSRodney W. Grimes * Free buffers currently in use by a descriptor. 1244df8bae1dSRodney W. Grimes * Called on close. 1245df8bae1dSRodney W. Grimes */ 1246df8bae1dSRodney W. Grimes static void 1247df8bae1dSRodney W. Grimes bpf_freed(d) 1248df8bae1dSRodney W. Grimes register struct bpf_d *d; 1249df8bae1dSRodney W. Grimes { 1250df8bae1dSRodney W. Grimes /* 1251df8bae1dSRodney W. Grimes * We don't need to lock out interrupts since this descriptor has 1252df8bae1dSRodney W. Grimes * been detached from its interface and it yet hasn't been marked 1253df8bae1dSRodney W. Grimes * free. 1254df8bae1dSRodney W. Grimes */ 1255df8bae1dSRodney W. Grimes if (d->bd_sbuf != 0) { 1256bd3a5320SPoul-Henning Kamp free(d->bd_sbuf, M_BPF); 1257df8bae1dSRodney W. Grimes if (d->bd_hbuf != 0) 1258bd3a5320SPoul-Henning Kamp free(d->bd_hbuf, M_BPF); 1259df8bae1dSRodney W. Grimes if (d->bd_fbuf != 0) 1260bd3a5320SPoul-Henning Kamp free(d->bd_fbuf, M_BPF); 1261df8bae1dSRodney W. Grimes } 1262df8bae1dSRodney W. Grimes if (d->bd_filter) 1263bd3a5320SPoul-Henning Kamp free((caddr_t)d->bd_filter, M_BPF); 1264e7bb21b3SJonathan Lemon mtx_destroy(&d->bd_mtx); 1265df8bae1dSRodney W. Grimes } 1266df8bae1dSRodney W. Grimes 1267df8bae1dSRodney W. Grimes /* 126898ec4706SDima Dorfman * Attach an interface to bpf. ifp is a pointer to the structure 126998ec4706SDima Dorfman * defining the interface to be attached, dlt is the link layer type, 127098ec4706SDima Dorfman * and hdrlen is the fixed size of the link header (variable length 127198ec4706SDima Dorfman * headers are not yet supporrted). 1272df8bae1dSRodney W. Grimes */ 1273df8bae1dSRodney W. Grimes void 12749b44ff22SGarrett Wollman bpfattach(ifp, dlt, hdrlen) 1275df8bae1dSRodney W. Grimes struct ifnet *ifp; 1276df8bae1dSRodney W. Grimes u_int dlt, hdrlen; 1277df8bae1dSRodney W. Grimes { 1278df8bae1dSRodney W. Grimes struct bpf_if *bp; 12796a40ecceSJohn Baldwin bp = (struct bpf_if *)malloc(sizeof(*bp), M_BPF, M_NOWAIT | M_ZERO); 1280df8bae1dSRodney W. Grimes if (bp == 0) 1281df8bae1dSRodney W. Grimes panic("bpfattach"); 1282df8bae1dSRodney W. Grimes 1283df8bae1dSRodney W. Grimes bp->bif_ifp = ifp; 1284df8bae1dSRodney W. Grimes bp->bif_dlt = dlt; 12856008862bSJohn Baldwin mtx_init(&bp->bif_mtx, "bpf interface lock", NULL, MTX_DEF); 1286df8bae1dSRodney W. Grimes 1287e7bb21b3SJonathan Lemon mtx_lock(&bpf_mtx); 1288df8bae1dSRodney W. Grimes bp->bif_next = bpf_iflist; 1289df8bae1dSRodney W. Grimes bpf_iflist = bp; 1290e7bb21b3SJonathan Lemon mtx_unlock(&bpf_mtx); 1291df8bae1dSRodney W. Grimes 12929b44ff22SGarrett Wollman bp->bif_ifp->if_bpf = 0; 1293df8bae1dSRodney W. Grimes 1294df8bae1dSRodney W. Grimes /* 1295df8bae1dSRodney W. Grimes * Compute the length of the bpf header. This is not necessarily 1296df8bae1dSRodney W. Grimes * equal to SIZEOF_BPF_HDR because we want to insert spacing such 1297df8bae1dSRodney W. Grimes * that the network layer header begins on a longword boundary (for 1298df8bae1dSRodney W. Grimes * performance reasons and to alleviate alignment restrictions). 1299df8bae1dSRodney W. Grimes */ 1300df8bae1dSRodney W. Grimes bp->bif_hdrlen = BPF_WORDALIGN(hdrlen + SIZEOF_BPF_HDR) - hdrlen; 1301df8bae1dSRodney W. Grimes 13022eeab939SGarrett Wollman if (bootverbose) 1303df8bae1dSRodney W. Grimes printf("bpf: %s%d attached\n", ifp->if_name, ifp->if_unit); 1304df8bae1dSRodney W. Grimes } 130553ac6efbSJulian Elischer 1306de5d9935SRobert Watson /* 1307de5d9935SRobert Watson * Detach bpf from an interface. This involves detaching each descriptor 1308de5d9935SRobert Watson * associated with the interface, and leaving bd_bif NULL. Notify each 1309de5d9935SRobert Watson * descriptor as it's detached so that any sleepers wake up and get 1310de5d9935SRobert Watson * ENXIO. 1311de5d9935SRobert Watson */ 1312de5d9935SRobert Watson void 1313de5d9935SRobert Watson bpfdetach(ifp) 1314de5d9935SRobert Watson struct ifnet *ifp; 1315de5d9935SRobert Watson { 1316de5d9935SRobert Watson struct bpf_if *bp, *bp_prev; 1317de5d9935SRobert Watson struct bpf_d *d; 1318de5d9935SRobert Watson 1319e7bb21b3SJonathan Lemon mtx_lock(&bpf_mtx); 1320de5d9935SRobert Watson 1321de5d9935SRobert Watson /* Locate BPF interface information */ 1322de5d9935SRobert Watson bp_prev = NULL; 1323de5d9935SRobert Watson for (bp = bpf_iflist; bp != NULL; bp = bp->bif_next) { 1324de5d9935SRobert Watson if (ifp == bp->bif_ifp) 1325de5d9935SRobert Watson break; 1326de5d9935SRobert Watson bp_prev = bp; 1327de5d9935SRobert Watson } 1328de5d9935SRobert Watson 1329de5d9935SRobert Watson /* Interface wasn't attached */ 1330de5d9935SRobert Watson if (bp->bif_ifp == NULL) { 1331e7bb21b3SJonathan Lemon mtx_unlock(&bpf_mtx); 1332de5d9935SRobert Watson printf("bpfdetach: %s%d was not attached\n", ifp->if_name, 1333de5d9935SRobert Watson ifp->if_unit); 1334de5d9935SRobert Watson return; 1335de5d9935SRobert Watson } 1336de5d9935SRobert Watson 1337de5d9935SRobert Watson if (bp_prev) { 1338de5d9935SRobert Watson bp_prev->bif_next = bp->bif_next; 1339de5d9935SRobert Watson } else { 1340de5d9935SRobert Watson bpf_iflist = bp->bif_next; 1341de5d9935SRobert Watson } 1342de5d9935SRobert Watson 1343e7bb21b3SJonathan Lemon while ((d = bp->bif_dlist) != NULL) { 1344e7bb21b3SJonathan Lemon bpf_detachd(d); 1345e7bb21b3SJonathan Lemon BPFD_LOCK(d); 1346e7bb21b3SJonathan Lemon bpf_wakeup(d); 1347e7bb21b3SJonathan Lemon BPFD_UNLOCK(d); 1348e7bb21b3SJonathan Lemon } 1349e7bb21b3SJonathan Lemon 1350e7bb21b3SJonathan Lemon mtx_destroy(&bp->bif_mtx); 1351de5d9935SRobert Watson free(bp, M_BPF); 1352de5d9935SRobert Watson 1353e7bb21b3SJonathan Lemon mtx_unlock(&bpf_mtx); 1354de5d9935SRobert Watson } 1355de5d9935SRobert Watson 1356929ddbbbSAlfred Perlstein static void bpf_drvinit(void *unused); 1357bd3a5320SPoul-Henning Kamp 1358929ddbbbSAlfred Perlstein static void bpf_clone(void *arg, char *name, int namelen, dev_t *dev); 13593f54a085SPoul-Henning Kamp 13603f54a085SPoul-Henning Kamp static void 13613f54a085SPoul-Henning Kamp bpf_clone(arg, name, namelen, dev) 13623f54a085SPoul-Henning Kamp void *arg; 13633f54a085SPoul-Henning Kamp char *name; 13643f54a085SPoul-Henning Kamp int namelen; 13653f54a085SPoul-Henning Kamp dev_t *dev; 13663f54a085SPoul-Henning Kamp { 13673f54a085SPoul-Henning Kamp int u; 13683f54a085SPoul-Henning Kamp 13693f54a085SPoul-Henning Kamp if (*dev != NODEV) 13703f54a085SPoul-Henning Kamp return; 1371db901281SPoul-Henning Kamp if (dev_stdclone(name, NULL, "bpf", &u) != 1) 13723f54a085SPoul-Henning Kamp return; 1373b0d17ba6SPoul-Henning Kamp *dev = make_dev(&bpf_cdevsw, unit2minor(u), UID_ROOT, GID_WHEEL, 0600, 1374b0d17ba6SPoul-Henning Kamp "bpf%d", u); 1375b0d17ba6SPoul-Henning Kamp (*dev)->si_flags |= SI_CHEAPCLONE; 13763f54a085SPoul-Henning Kamp return; 13773f54a085SPoul-Henning Kamp } 13783f54a085SPoul-Henning Kamp 1379514ede09SBruce Evans static void 1380514ede09SBruce Evans bpf_drvinit(unused) 1381514ede09SBruce Evans void *unused; 138253ac6efbSJulian Elischer { 138353ac6efbSJulian Elischer 13846008862bSJohn Baldwin mtx_init(&bpf_mtx, "bpf global lock", NULL, MTX_DEF); 1385db901281SPoul-Henning Kamp EVENTHANDLER_REGISTER(dev_clone, bpf_clone, 0, 1000); 13862447bec8SPoul-Henning Kamp cdevsw_add(&bpf_cdevsw); 13877198bf47SJulian Elischer } 138853ac6efbSJulian Elischer 138953ac6efbSJulian Elischer SYSINIT(bpfdev,SI_SUB_DRIVERS,SI_ORDER_MIDDLE+CDEV_MAJOR,bpf_drvinit,NULL) 139053ac6efbSJulian Elischer 13915bb5f2c9SPeter Wemm #else /* !DEV_BPF && !NETGRAPH_BPF */ 1392f8dc4716SMike Smith /* 1393f8dc4716SMike Smith * NOP stubs to allow bpf-using drivers to load and function. 1394f8dc4716SMike Smith * 1395f8dc4716SMike Smith * A 'better' implementation would allow the core bpf functionality 1396f8dc4716SMike Smith * to be loaded at runtime. 1397f8dc4716SMike Smith */ 1398f8dc4716SMike Smith 1399f8dc4716SMike Smith void 1400f8dc4716SMike Smith bpf_tap(ifp, pkt, pktlen) 1401f8dc4716SMike Smith struct ifnet *ifp; 1402f8dc4716SMike Smith register u_char *pkt; 1403f8dc4716SMike Smith register u_int pktlen; 1404f8dc4716SMike Smith { 1405f8dc4716SMike Smith } 1406f8dc4716SMike Smith 1407f8dc4716SMike Smith void 1408f8dc4716SMike Smith bpf_mtap(ifp, m) 1409f8dc4716SMike Smith struct ifnet *ifp; 1410f8dc4716SMike Smith struct mbuf *m; 1411f8dc4716SMike Smith { 1412f8dc4716SMike Smith } 1413f8dc4716SMike Smith 1414f8dc4716SMike Smith void 1415f8dc4716SMike Smith bpfattach(ifp, dlt, hdrlen) 1416f8dc4716SMike Smith struct ifnet *ifp; 1417f8dc4716SMike Smith u_int dlt, hdrlen; 1418f8dc4716SMike Smith { 1419f8dc4716SMike Smith } 1420f8dc4716SMike Smith 1421da626c17SBill Paul void 1422da626c17SBill Paul bpfdetach(ifp) 1423da626c17SBill Paul struct ifnet *ifp; 1424da626c17SBill Paul { 1425da626c17SBill Paul } 1426da626c17SBill Paul 1427f8dc4716SMike Smith u_int 1428f8dc4716SMike Smith bpf_filter(pc, p, wirelen, buflen) 14291f8ffa4bSJulian Elischer register const struct bpf_insn *pc; 1430f8dc4716SMike Smith register u_char *p; 1431f8dc4716SMike Smith u_int wirelen; 1432f8dc4716SMike Smith register u_int buflen; 1433f8dc4716SMike Smith { 1434f8dc4716SMike Smith return -1; /* "no filter" behaviour */ 1435f8dc4716SMike Smith } 1436f8dc4716SMike Smith 14375bb5f2c9SPeter Wemm int 14385bb5f2c9SPeter Wemm bpf_validate(f, len) 14395bb5f2c9SPeter Wemm const struct bpf_insn *f; 14405bb5f2c9SPeter Wemm int len; 14415bb5f2c9SPeter Wemm { 14425bb5f2c9SPeter Wemm return 0; /* false */ 14435bb5f2c9SPeter Wemm } 14445bb5f2c9SPeter Wemm 14455bb5f2c9SPeter Wemm #endif /* !DEV_BPF && !NETGRAPH_BPF */ 1446