+ switch (code) {
+ case SIOCSIFADDR:
+ case SIOCGIFADDR:
+ PRINT_IFREQ_ADDR(tcp, ifr, ifr_addr);
+ break;
+ case SIOCSIFDSTADDR:
+ case SIOCGIFDSTADDR:
+ PRINT_IFREQ_ADDR(tcp, ifr, ifr_dstaddr);
+ break;
+ case SIOCSIFBRDADDR:
+ case SIOCGIFBRDADDR:
+ PRINT_IFREQ_ADDR(tcp, ifr, ifr_broadaddr);
+ break;
+ case SIOCSIFNETMASK:
+ case SIOCGIFNETMASK:
+ PRINT_IFREQ_ADDR(tcp, ifr, ifr_netmask);
+ break;
+ case SIOCSIFHWADDR:
+ case SIOCGIFHWADDR: {
+ /* XXX Are there other hardware addresses
+ than 6-byte MACs? */
+ const unsigned char *bytes =
+ (unsigned char *) &ifr->ifr_hwaddr.sa_data;
+ tprintf("ifr_hwaddr=%02x:%02x:%02x:%02x:%02x:%02x",
+ bytes[0], bytes[1], bytes[2],
+ bytes[3], bytes[4], bytes[5]);
+ break;
+ }
+ case SIOCSIFFLAGS:
+ case SIOCGIFFLAGS:
+ tprints("ifr_flags=");
+ printflags(iffflags, (unsigned short) ifr->ifr_flags, "IFF_???");
+ break;
+ case SIOCSIFMETRIC:
+ case SIOCGIFMETRIC:
+ tprintf("ifr_metric=%d", ifr->ifr_metric);
+ break;
+ case SIOCSIFMTU:
+ case SIOCGIFMTU:
+ tprintf("ifr_mtu=%d", ifr->ifr_mtu);
+ break;
+ case SIOCSIFSLAVE:
+ case SIOCGIFSLAVE:
+ tprints("ifr_slave=");
+ print_ifname(ifr->ifr_slave);
+ break;
+ case SIOCSIFTXQLEN:
+ case SIOCGIFTXQLEN:
+ tprintf("ifr_qlen=%d", ifr->ifr_qlen);
+ break;
+ case SIOCSIFMAP:
+ case SIOCGIFMAP:
+ tprintf("ifr_map={mem_start=%#" PRI_klx ", "
+ "mem_end=%#" PRI_klx ", base_addr=%#x, "
+ "irq=%u, dma=%u, port=%u}",
+ (kernel_ulong_t) ifr->ifr_map.mem_start,
+ (kernel_ulong_t) ifr->ifr_map.mem_end,
+ (unsigned) ifr->ifr_map.base_addr,
+ (unsigned) ifr->ifr_map.irq,
+ (unsigned) ifr->ifr_map.dma,
+ (unsigned) ifr->ifr_map.port);
+ break;
+ }
+}
+
+static unsigned int
+print_ifc_len(int len)
+{
+ const unsigned int n = (unsigned int) len / sizeof(struct_ifreq);
+
+ if (len < 0 || n * sizeof(struct_ifreq) != (unsigned int) len)
+ tprintf("%d", len);
+ else
+ tprintf("%u * sizeof(struct ifreq)", n);
+
+ return n;
+}
+
+static bool
+print_ifconf_ifreq(struct tcb *tcp, void *elem_buf, size_t elem_size,
+ void *dummy)
+{
+ struct_ifreq *ifr = elem_buf;
+
+ tprints("{ifr_name=");
+ print_ifname(ifr->ifr_name);
+ tprints(", ");
+ PRINT_IFREQ_ADDR(tcp, ifr, ifr_addr);
+ tprints("}");
+
+ return true;
+}
+
+/*
+ * There are two different modes of operation:
+ *
+ * - Get buffer size. In this case, the callee sets ifc_buf to NULL,
+ * and the kernel returns the buffer size in ifc_len.
+ * - Get actual data. In this case, the callee specifies the buffer address
+ * in ifc_buf and its size in ifc_len. The kernel fills the buffer with
+ * the data, and its amount is returned in ifc_len.
+ *
+ * Note that, technically, the whole struct ifconf is overwritten,
+ * so ifc_buf could be different on exit, but current ioctl handler
+ * implementation does not touch it.
+ */
+static int
+decode_ifconf(struct tcb *const tcp, const kernel_ulong_t addr)
+{
+ struct_ifconf *entering_ifc = NULL;
+ struct_ifconf *ifc =
+ entering(tcp) ? malloc(sizeof(*ifc)) : alloca(sizeof(*ifc));
+
+ if (exiting(tcp)) {
+ entering_ifc = get_tcb_priv_data(tcp);
+
+ if (!entering_ifc) {
+ error_msg("decode_ifconf: where is my ifconf?");
+ return 0;
+ }
+ }
+
+ if (!ifc || umove(tcp, addr, ifc) < 0) {
+ if (entering(tcp)) {
+ free(ifc);
+
+ tprints(", ");
+ printaddr(addr);
+ } else {
+ /*
+ * We failed to fetch the structure on exiting syscall,
+ * print whatever was fetched on entering syscall.
+ */
+ if (!entering_ifc->ifc_buf)
+ print_ifc_len(entering_ifc->ifc_len);
+
+ tprints(", ifc_buf=");
+ printaddr(ptr_to_kulong(entering_ifc->ifc_buf));
+
+ tprints("}");
+ }
+
+ return RVAL_DECODED | 1;
+ }