3

So I stumbled across a program in C that uses seccomp to filter out a few syscalls. Is there anyway, other than bruteforcing, to find out the syscalls that are actually allowed.

Thanks in advance

2 Answers2

1

If you can compile the C program, you can call seccomp_export_pfc function.

Mathieu
  • 8,840
  • 7
  • 32
  • 45
0

You can refer to Kafel, write a policy and disassemble the generated eBPF code with its dump_policy_bpf tool.

tinytaro
  • 380
  • 2
  • 8