From mboxrd@z Thu Jan 1 00:00:00 1970 From: Kohei KaiGai Subject: How to track process invocation history using audit Date: Mon, 20 Jun 2011 17:51:10 +0200 Message-ID: Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Return-path: Received: from mx1.redhat.com (ext-mx14.extmail.prod.ext.phx2.redhat.com [10.5.110.19]) by int-mx02.intmail.prod.int.phx2.redhat.com (8.13.8/8.13.8) with ESMTP id p5KFpCvO022576 for ; Mon, 20 Jun 2011 11:51:12 -0400 Received: from mail-iy0-f174.google.com (mail-iy0-f174.google.com [209.85.210.174]) by mx1.redhat.com (8.14.4/8.14.4) with ESMTP id p5KFpAZr001350 for ; Mon, 20 Jun 2011 11:51:10 -0400 Received: by iyb12 with SMTP id 12so2830990iyb.33 for ; Mon, 20 Jun 2011 08:51:10 -0700 (PDT) List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: linux-audit-bounces@redhat.com Errors-To: linux-audit-bounces@redhat.com To: Linux-audit@redhat.com List-Id: linux-audit@redhat.com Hi, I tried to track what process launches what other programs using audit mechanism. Then, I want to write up a tree diagram using audit logs eventually. However, the auditctl does not work as I expected. I tried to track all the fork(2) system call to record relationship between ppid and pid on processes with a particular loginuid. [root@ls3029v0 ~]# auditctl -a task,always -F arch=b64 -S fork -F auid=1234 Error: syscall auditing being added to task list But, it does not works. I also tried to use 'exit' list, but it seems to me the following rule is ignored. (tail -f /var/log/audit/audit.log does not report anything) [root@ls3029v0 ~]# auditctl -a exit,always -F arch=b64 -S fork What is the best way to track process invocation history using audit mechanism? Thanks, -- KaiGai Kohei