go-seccomp-bpf is a library for Go (golang) for loading a system call filter on Linux 3.17 and later by taking advantage of secure computing mode, also known as seccomp. Seccomp restricts the system calls that a process can invoke.
The kernel exposes a large number of system calls that are not used by most processes. By installing a seccomp filter, you can limit the total kernel surface exposed to a process (principle of least privilege). This minimizes the impact of unknown vulnerabilities that might be found in the process.
The filter is expressed as a Berkeley Packet Filter (BPF) program. The BPF program is generated based on a filter policy created by you.
- Requires Linux 3.17 because it uses the
seccomp
syscall in order to take advantage of theSECCOMP_FILTER_FLAG_TSYNC
flag to sync the filter to all threads.
- Pure Go and does not have a libseccomp dependency.
- Filters are customizable and can be written as an allowlist or blocklist.
- Supports system call argument filtering.
- Uses
SECCOMP_FILTER_FLAG_TSYNC
to sync the filter to all threads created by the Go runtime. - Invokes
prctl(PR_SET_NO_NEW_PRIVS, 1)
to set the threadsno_new_privs
bit which is generally required before loading a seccomp filter. - seccomp-profiler tool for automatically generating a allowlist policy based on the system calls that a binary uses.
- System call tables are only implemented for 386, amd64, arm and arm64. (More system call table generation code should be added to arch/mk_syscalls_linux.go.)
- GoDoc Package Example
sandbox
example in cmd/sandbox.
This package contains a list of syscall numbers that are generated from the Linux sources. Update the git tag here and then run this command to generate the code.
docker run -it --rm -v `pwd`:/go-seccomp-bpf -w /go-seccomp-bpf/arch golang:1.18 go generate
Please open a PR to submit your project.