Conversation

Worth noting seccomp-bpf uses a small subset of cBPF (classic BPF) designed to minimize attack surface rather than eBPF. eBPF has a lot of attack surface and eBPF support for seccomp-bpf wasn't accepted. Exposing eBPF to unprivileged code substantially increases attack surface.
1
13
It's available to an attacker outside of a very lean sandbox where loading a seccomp-bpf filter isn't allowed. It's both possible and sensible for seccomp-bpf filters to be layered. It makes sense to use a weak filter for a generic app sandbox and then proper strict ones inside.
1
1