Spamworldpro Mini Shell
Spamworldpro


Server : Apache
System : Linux server2.corals.io 4.18.0-348.2.1.el8_5.x86_64 #1 SMP Mon Nov 15 09:17:08 EST 2021 x86_64
User : corals ( 1002)
PHP Version : 7.4.33
Disable Function : exec,passthru,shell_exec,system
Directory :  /opt/rh/gcc-toolset-11/root/usr/share/systemtap/examples/process/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Current File : //opt/rh/gcc-toolset-11/root/usr/share/systemtap/examples/process/pstrace_exec.stp
#!/opt/rh/gcc-toolset-11/root/usr/bin/stap
# Copyright (C) 2012 Red Hat, Inc.
# by William Cohen <[email protected]>
#
# pstrace_exec prints out the chain of processes from the current process
# back to the init process whenever an exec matches the argument.
#
# Run the script with:
#   stap pstrace_exec.stp "command_to_match"
#
# control-c to exit data collection

probe kprocess.exec
{
  if (isinstr(filename, @1)) {
    printf("process traceback:\n %s\n", pstrace(task_current()))
  }
}

Spamworldpro Mini