%PDF- <> %âãÏÓ endobj 2 0 obj <> endobj 3 0 obj <>/ExtGState<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI] >>/Annots[ 28 0 R 29 0 R] /MediaBox[ 0 0 595.5 842.25] /Contents 4 0 R/Group<>/Tabs/S>> endobj ºaâÚÎΞ-ÌE1ÍØÄ÷{òò2ÿ ÛÖ^ÔÀá TÎ{¦?§®¥kuµùÕ5sLOšuY>endobj 2 0 obj<>endobj 2 0 obj<>endobj 2 0 obj<>endobj 2 0 obj<> endobj 2 0 obj<>endobj 2 0 obj<>es 3 0 R>> endobj 2 0 obj<> ox[ 0.000000 0.000000 609.600000 935.600000]/Fi endobj 3 0 obj<> endobj 7 1 obj<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI]>>/Subtype/Form>> stream
#!/bin/sh # Author: Jamie Strandboge <jamie@ubuntu.com> # Copyright (C) 2015 Canonical Ltd. # # This script is distributed under the terms and conditions of the GNU General # Public License, Version 3 or later. See http://www.gnu.org/copyleft/gpl.html # for details. set -e cat <<EOM This script has been replaced by snappy-debug. Please use: $ sudo snappy install snappy-debug $ sudo snappy-debug.security scanlog Alternatively, you can use 'scmp_sys_resolver' to resolve syscall numbers. Eg: $ scmp_sys_resolver 108 getegid You must use scmp_sys_resolver on the same architecture as the device where the seccomp denial was logged. EOM logfile="/var/log/syslog" usage() { cat <<EOM Usage: `basename $0` <logfile> If <logfile> is unspecified, use '$logfile'. If <logfile> is '-', use <stdin>. EOM }