seccompbpf
Seccomp-bpf, short for seccomp with Berkeley Packet Filter, is a Linux kernel feature that enables fine-grained sandboxing of a process by filtering system calls using a BPF program. It extends the original seccomp mechanism by allowing custom policies that inspect a syscall number and its arguments, enabling allow, deny, or trap actions. When a process is in seccomp-bpf mode, each attempted system call is evaluated by the loaded BPF program, and execution proceeds or is limited according to the policy.
Implementation and policy are centered on entering seccomp-bpf mode with a BPF program loaded into the kernel.
Applications and usage: Seccomp-bpf is widely used to isolate processes in container environments. Container runtimes such
Limitations and considerations: The effectiveness of seccomp-bpf depends on the correctness and completeness of the policy;