![]() Server : Apache System : Linux server2.corals.io 4.18.0-348.2.1.el8_5.x86_64 #1 SMP Mon Nov 15 09:17:08 EST 2021 x86_64 User : corals ( 1002) PHP Version : 7.4.33 Disable Function : exec,passthru,shell_exec,system Directory : /proc/thread-self/root/opt/rh/gcc-toolset-11/root/usr/share/systemtap/examples/process/ |
#!/opt/rh/gcc-toolset-11/root/usr/bin/stap # Copyright (C) 2012 Red Hat, Inc. # # This program is free software; you can redistribute it and/or modify # it under the terms of the GNU General Public License version 2 as # published by the Free Software Foundation. # # If suspecting particular processes triggering audit records, # reinvoke with stap -d /bin/program -d /lib/library --ldd probe kernel.function("audit_log_end") { message_address = $ab->skb->head + 16; // audit data follows struct nlmsghdr message = kernel_string(message_address) printf("%s[%d] %s\n", execname(), tid(), message); print_ubacktrace(); }