Linux Secure Computing (Seccomp) course outline
- Course Introduction
- Seccomp
- Introduction and history
- Seccomp filtering and BPF
- The BPF virtual machine and BPF instructions
- BPF filter return values
- BPF programs
- Checking the architecture
- Productivity aids (libseccomp and other tools)
- Seccomp: Further Details
- Caveats
- Discovering the system calls made by a program
- Further details on seccomp filters
- Extended BPF (eBPF)
- Further details on BPF programs
- Recent seccomp features
- User-space notification
- Audit logging of filter actions (*)
(*) Topics marked with an asterisk may be
covered, if time permits.
Return to the course overview