summaryrefslogtreecommitdiff
path: root/sys/dev/ed
diff options
context:
space:
mode:
authorPoul-Henning Kamp <phk@FreeBSD.org>1999-09-25 12:06:01 +0000
committerPoul-Henning Kamp <phk@FreeBSD.org>1999-09-25 12:06:01 +0000
commit46783fb897761a099b5d9629afd30bb97cdeed5e (patch)
treeefd419464a05c5c9549c3ea5cc49e8d61c143e27 /sys/dev/ed
parent40bc58df9a215b74d944ee58d146f6b2f3107568 (diff)
Notes
Diffstat (limited to 'sys/dev/ed')
-rw-r--r--sys/dev/ed/if_ed.c15
1 files changed, 0 insertions, 15 deletions
diff --git a/sys/dev/ed/if_ed.c b/sys/dev/ed/if_ed.c
index 95160ee5cfcb..97d04d30ae07 100644
--- a/sys/dev/ed/if_ed.c
+++ b/sys/dev/ed/if_ed.c
@@ -42,7 +42,6 @@
#include <i386/isa/if_ed.c> /* PCCARD version */
#else
-#include "bpf.h"
#include <sys/param.h>
#include <sys/systm.h>
@@ -66,9 +65,7 @@
#include <net/if_dl.h>
#include <net/if_mib.h>
-#if NBPF > 0
#include <net/bpf.h>
-#endif
#include "opt_bdg.h"
#ifdef BRIDGE
#include <net/bridge.h>
@@ -1858,9 +1855,7 @@ ed_attach(sc, unit, flags)
/*
* If BPF is in the kernel, call the attach for it
*/
-#if NBPF > 0
bpfattach(ifp, DLT_EN10MB, sizeof(struct ether_header));
-#endif
return (0);
}
@@ -2337,11 +2332,9 @@ outloop:
/*
* Tap off here if there is a bpf listener.
*/
-#if NBPF > 0
if (ifp->if_bpf) {
bpf_mtap(ifp, m0);
}
-#endif
m_freem(m0);
@@ -2773,13 +2766,10 @@ ed_ioctl(ifp, command, data)
}
}
-#if NBPF > 0
-
/*
* Promiscuous flag may have changed, so reprogram the RCR.
*/
ed_setrcr(sc);
-#endif
/*
* An unfortunate hack to provide the (required) software
@@ -2904,13 +2894,11 @@ ed_get_packet(sc, buf, len, multicast)
struct ifnet *ifp ;
int need_more = 1 ; /* in case not bpf */
-#if NBPF > 0
if (sc->arpcom.ac_if.if_bpf) {
need_more = 0 ;
ed_ring_copy(sc, buf, (char *)eh, len);
bpf_mtap(&sc->arpcom.ac_if, m);
} else
-#endif
ed_ring_copy(sc, buf, (char *)eh, 14);
ifp = bridge_in(m);
if (ifp == BDG_DROP) {
@@ -2935,15 +2923,12 @@ ed_get_packet(sc, buf, len, multicast)
*/
ed_ring_copy(sc, buf, (char *)eh, len);
-#if NBPF > 0
-
/*
* Check if there's a BPF listener on this interface. If so, hand off
* the raw packet to bpf.
*/
if (sc->arpcom.ac_if.if_bpf)
bpf_mtap(&sc->arpcom.ac_if, m);
-#endif
/*
* If we are in promiscuous mode, we have to check whether
* this packet is really for us.