From the Hardening Mosys design doc: https://docs.google.com/document/d/1MkBUhp6KURhB2HArB7QYcrMpU8z1PQgknU-hx8c4K2k/edit
This feature bug will track adding a transparent wrapper (in compiled binary form) that will minijail mosys when running as root. The binary will need bindings to minijail and will also need to have a seccomp-bpf filter derived and installed with the jail.
The filter can be derived by using a new-ish feature: SECCOMP_RET_LOG. This will give us a list of syscalls issued on a particular platform. We probably need to write an Autotest or Tast test to gather this on all hardware.
Comment 1 by jclinton@chromium.org
, Dec 18 2017