File:Firejail seccomp example.png

From Gentoo Wiki
Jump to:navigation Jump to:search

Original file(1,280 × 512 pixels, file size: 88 KB, MIME type: image/png)

Summary

Screenshot of an xterm running in a xephyr window (started using firejail from the command line in parent desktop), in which "chroot / /bin/bash" is attempted, to illustrate firejail's seccomp-bpf syscall filter (shows message written to audit log, and that the chroot process itself dumps core, with a "Bad system call" message). Uploaded for use in a forthcoming mini-guide on X11 sandboxing (an addendum to Sakaki's EFI Install Guide).

Licensing

IconLicense.png
This asset is licensed under the terms of the Creative Commons Attribution-ShareAlike 4.0 International license.
You are free to share (copy, distribute and transmit the work) and remix (adapt the work), but you must attribute the author and distribute any derivative works you create under a similar license.

File history

Click on a date/time to view the file as it appeared at that time.

Date/TimeThumbnailDimensionsUserComment
current19:03, 28 November 2017Thumbnail for version as of 19:03, 28 November 20171,280 × 512 (88 KB)Sakaki (talk | contribs)Screenshot of an xterm running in a xephyr window (started using firejail from the command line in parent desktop), in which "chroot / /bin/bash" is attempted, to illustrate firejail's seccomp-bpf syscall filter (shows message written to audit log, and...