Reputation: 159
So I stumbled across a program in C that uses seccomp to filter out a few syscalls. Is there anyway, other than bruteforcing, to find out the syscalls that are actually allowed.
Thanks in advance
Upvotes: 3
Views: 219
Reputation: 390
You can refer to Kafel, write a policy and disassemble the generated eBPF code with its dump_policy_bpf tool.
Upvotes: 0
Reputation: 9659
If you can compile the C program, you can call seccomp_export_pfc function.
Upvotes: 1