Hi Chris, You may find the tips at https://github.com/snapcore/snapd/wiki/Security. You may use the command like:
$ scmp_sys_resolver 983045 set_tls to find out the security violation. Best regards, XiaoGuo On Sun, Nov 13, 2016 at 7:13 AM, Chris <cpoll...@embarqmail.com> wrote: > Has anyone gotten this snap to run? The install went fine AFAICT but > when executed nothing happens. Syslog shows > > Nov 12 17:00:55 localhost /usr/lib/snapd/snapd[844]: daemon.go:174: > DEBUG: uid=1000;@ GET /v2/snaps 31.184976ms 200 > > Nov 12 17:00:55 localhost kernel: [250160.993225] audit: type=1326 > audit(1478991655.666:65): auid=1000 uid=1000 gid=1000 ses=3 pid=10201 > comm="cliqz" exe="/snap/cliqz/6/opt/CLIQZ/CLIQZ" sig=31 arch=c000003e > syscall=272 compat=0 ip=0x7f5d82721c19 code=0x0 > > When executed from the cli > > chris@localhost:~$ cliqz > Bad system call > > -- > Chris > KeyID 0xE372A7DA98E6705C > 31.11972; -97.90167 (Elev. 1092 ft) > 16:59:51 up 2 days, 21:28, 1 user, load average: 0.32, 0.37, 0.36 > Ubuntu 16.04.1 LTS, kernel 4.4.0-47-generic #68-Ubuntu SMP Wed Oct 26 > 19:39:52 UTC 2016 > > -- > Snapcraft mailing list > Snapcraft@lists.snapcraft.io > Modify settings or unsubscribe at: https://lists.ubuntu.com/ > mailman/listinfo/snapcraft > > -- XiaoGuo, Liu
-- Snapcraft mailing list Snapcraft@lists.snapcraft.io Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/snapcraft