Conversation

Worth noting seccomp-bpf uses a small subset of cBPF (classic BPF) designed to minimize attack surface rather than eBPF. eBPF has a lot of attack surface and eBPF support for seccomp-bpf wasn't accepted. Exposing eBPF to unprivileged code substantially increases attack surface.
1
13
Applications / libraries can divide themselves up into sandboxed processes using seccomp-bpf. It's exposed to unprivileged code by design, as long as the no_new_privs flag is set. It makes sense to drop the ability to use it after initialization in an app putting in the effort.
1