upstream has added a new feature:
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=64e90a8acb8590c2468c919f803652f081e3a4bf
this would allow us to filter all usermode programs the kernel calls and reject any that had been messed with. we've been bitten before when things like /proc/sys/kernel/modprobe were modified to point elsewhere.
we'll have to:
(1) backport that patch to all our kernels (looks pretty easy)
(2) write a new program that would whitelist specific binaries (and exec them) and log+crash on all others
(3) write an ebuild for it & include it in the base OS
(4) turn it on in all our kernel configs
Comment 1 by bugdroid1@chromium.org
, Nov 23 2017