I'm planning to use  seccomp to make a sandbox for untrusted code. 
Does the seccomp framework play nicely with a  utrace-based syscall
filter like the proof-of-concept seccomp  replacement Roland McGrath
published at the following URL?

  http://www.redhat.com/archives/utrace-devel/2009-March/msg00159.html

I'm  considering an arrangement like this because some vulnerabilities
which  affect seccomp have turned up
(http://www.redhat.com/archives/utrace-devel/2009-March/msg00159.html).
Most of them revolve around poorly  treated syscalls, so an
independent layer of syscall filtering seems prudent.  (This is in
addition to a restrictive linux container and AppArmor profile. 
Suggestions for further precautions are welcome.)

Sincerely,
Jason Rong

Reply via email to