From f4b36e80321379c4917c7ab9c9b3bbcfad05899f Mon Sep 17 00:00:00 2001 From: rusty-snake <41237666+rusty-snake@users.noreply.github.com> Date: Wed, 4 Aug 2021 16:29:41 +0200 Subject: Profile fixes - Fix #4157 -- [Feature] Should rmenv GitHub auth tokens There are still more token variables from other program that should be added. - Fix #4093 -- darktable needs read access to liblua* - Fix #4383 -- move noblacklist ${HOME}/.bogofilter to email-common.profile for claws-mail (and other mailers) - Fix xournalpp.profile - syscalls.txt: ausyscall i386 -> firejail --debug-syscalls32 --- etc/templates/syscalls.txt | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) (limited to 'etc/templates') diff --git a/etc/templates/syscalls.txt b/etc/templates/syscalls.txt index 38f789923..827b075e5 100644 --- a/etc/templates/syscalls.txt +++ b/etc/templates/syscalls.txt @@ -95,7 +95,7 @@ Now switch back to the first terminal (where `journalctl` is running) and look for the numbers of the blocked syscall(s) (`syscall=`). As soon as you have found them, you can stop `journalctl` (^C) and execute `firejail --debug-syscalls | grep NUMBER` to get the name of the syscall. -In the particular case that it is a 32bit syscall on a 64bit system, use `ausyscall i386 NUMBER`. +In the particular case that it is a 32bit syscall on a 64bit system, use `firejail --debug-syscalls32 | grep NUMBER`. Now you can add a seccomp exception using `seccomp !NAME`. If the blocked syscall is ptrace, consider to add allow-debuggers to the profile. -- cgit v1.2.3-54-g00ecf