Scroll to navigation

setuids.bt(8) System Manager's Manual setuids.bt(8)

NAME

setuids.bt - Trace setuid family of syscalls. Uses bpftrace/eBPF.

SYNOPSIS

setuids.bt

DESCRIPTION

This tool traces privilege escalation via setuid syscalls, and can be used for debugging, whitelist creation, and intrusion detection.

It works by tracing the setuid(2), setfsuid(2), and retresuid(2) syscalls using the syscall tracepoints.

Since this uses BPF, only the root user can use this tool.

REQUIREMENTS

CONFIG_BPF and bpftrace.

EXAMPLES

# setuids.bt

FIELDS

The calling process ID.
The calling process (thread) name.
The UID of the caller.
The syscall name.
The arguments to the syscall
(RET)
The return value for the syscall: 0 == success, other numbers indicate an error code.

OVERHEAD

setuid calls are expected to be low frequency (<< 100/s), so the overhead of this tool is expected to be negligible.

SOURCE

This tool originated from the book "BPF Performance Tools", published by Addison Wesley (2019):

http://www.brendangregg.com/bpf-performance-tools-book.html

See the book for more documentation on this tool.

This version is in the bpftrace repository:

https://github.com/iovisor/bpftrace

Also look in the bpftrace distribution for a companion _examples.txt file containing example usage, output, and commentary for this tool.

OS

Linux

STABILITY

Unstable - in development.

AUTHOR

Brendan Gregg

SEE ALSO

capable.bt(8)

2019-07-05 USER COMMANDS