So I stumbled across a program in C that uses seccomp to filter out a few syscalls. Is there anyway, other than bruteforcing, to find out the syscalls that are actually allowed.
Thanks in advance
So I stumbled across a program in C that uses seccomp to filter out a few syscalls. Is there anyway, other than bruteforcing, to find out the syscalls that are actually allowed.
Thanks in advance
On
You can refer to Kafel, write a policy and disassemble the generated eBPF code with its dump_policy_bpf tool.
If you can compile the C program, you can call seccomp_export_pfc function.