1 Policy: /usr/bin/lynx, Emulation: native (
2 native-issetugid: permit <
3 native-mprotect: permit <
5 native-__sysctl: permit (
6 native-fsread: filename eq "/var/run/ld.so.hints" then pe <
9 native-fsread: filename match "/usr/lib/libssl.so.*" then | native-connect: sockaddr eq "inet-[127.0.0.1]:53" then pe
10 native-read: permit | native-connect: sockaddr match "inet-\\\[*\\\]:80" then p
11 native-fsread: filename match "/usr/lib/libcrypto.so.*" t | native-exit: permit
12 native-fsread: filename match "/usr/lib/libncurses.so.*" | native-fcntl: cmd eq "F_SETFD" then permit
13 native-fsread: filename match "/usr/lib/libc.so.*" then p | native-fsread: filename eq "/" then permit
14 native-munmap: permit | native-fsread: filename match "/<non-existent filename>:
15 native-sigprocmask: permit | native-fsread: filename eq "/etc/lynx.cfg" then permit
16 native-fsread: filename eq "/etc/malloc.conf" then permit (
17 native-getpid: permit | native-fsread: filename eq "/etc/resolv.conf" then permit
18 > native-fsread: filename eq "/etc/utmp" then permit
19 > native-fsread: filename eq "/home" then permit
20 > native-fsread: filename eq "$HOME" then permit
21 > native-fsread: filename eq "$HOME/.lynx-keymaps" then per
22 > native-fsread: filename eq "$HOME/.lynxrc" then permit
23 > native-fsread: filename eq "$HOME/.mailcap" then permit
24 > native-fsread: filename eq "$HOME/.mime.types" then permi
25 > native-fsread: filename eq "$HOME/.terminfo" then permit
26 > native-fsread: filename eq "$HOME/.terminfo.db" then perm
27 > native-fsread: filename eq "/obj" then permit
28 native-fsread: filename eq "/tmp" then permit (
29 native-fswrite: filename match "/tmp/lynx-*" then permit (
30 native-fsread: filename match "/tmp/lynx-*/." then permit (
31 native-fsread: filename eq "$HOME" then permit <
32 native-fsread: filename eq "/etc/lynx.cfg" then permit <
33 native-fsread: filename eq "/" then permit <
34 native-fsread: filename eq "/usr/obj/bin/systrace/." then <
35 native-fsread: filename eq "/usr/obj/bin" then permit <
36 native-fcntl: permit <
37 native-getdirentries: permit <
38 native-lseek: permit <
39 native-fsread: filename eq "/usr/obj" then permit <
40 native-fsread: filename eq "/usr" then permit (
41 native-fsread: filename eq "/usr/bin" then permit (
42 native-fsread: filename eq "/usr/games" then permit (
43 native-fsread: filename eq "/usr/include" then permit (
44 native-fsread: filename eq "/usr/lib" then permit (
45 native-fsread: filename eq "/usr/libdata" then permit (
46 native-fsread: filename eq "/usr/libexec" then permit (
47 native-fsread: filename eq "/usr/lkm" then permit (
48 native-fsread: filename eq "/usr/local" then permit (
49 native-fsread: filename eq "/usr/mdec" then permit (
50 native-fsread: filename eq "/home" then permit (
51 native-fsread: filename eq "/obj" then permit (
52 native-fsread: filename eq "$HOME/.lynxrc" then permit (
53 native-fsread: filename match "/<non-existent filename>: (
54 native-fsread: filename eq "/usr/obj/bin/systrace/.mailca (
55 native-fsread: filename eq "$HOME/.mailcap" then permit (
56 native-fsread: filename eq "/usr/obj/bin/systrace/.mime.t (
57 native-fsread: filename eq "$HOME/.mime.types" then permi <
58 native-sigaction: permit <
59 native-ioctl: permit <
60 native-fsread: filename eq "$HOME/.terminfo.db" then perm <
61 native-fsread: filename eq "$HOME/.terminfo" then permit <
62 native-fsread: filename eq "/usr/share/misc/terminfo.db" (
63 native-pread: permit <
64 native-write: permit <
65 native-fsread: filename eq "$HOME/.lynx-keymaps" then per <
66 native-fsread: filename eq "/var/run/dev.db" then permit (
67 native-fsread: filename eq "/etc/utmp" then permit | native-fsread: filename eq "/var/run/ld.so.hints" then pe
68 native-poll: permit | native-fstat: permit
69 native-nanosleep: permit | native-fswrite: filename match "/tmp/lynx-*" then permit
70 > native-getdirentries: permit
71 > native-getpid: permit
72 native-gettimeofday: permit (
73 native-fsread: filename eq "/etc/resolv.conf" then permit | native-ioctl: permit
74 native-socket: sockdom eq "AF_INET" and socktype eq "SOCK | native-issetugid: permit
75 native-connect: sockaddr eq "inet-[127.0.0.1]:53" then pe | native-lseek: permit
76 native-sendto: true then permit | native-mmap: permit
77 native-select: permit | native-mprotect: prot eq "PROT_READ" then permit
78 > native-mprotect: prot eq "PROT_READ|PROT_EXEC" then permi
79 > native-mprotect: prot eq "PROT_READ|PROT_WRITE" then perm
80 > native-mprotect: prot eq "PROT_READ|PROT_WRITE|PROT_EXEC"
81 > native-munmap: permit
82 > native-nanosleep: permit
84 > native-pread: permit
86 native-recvfrom: permit (
87 > native-select: permit
88 > native-sendto: true then permit
89 > native-sigaction: permit
90 > native-sigprocmask: permit
91 > native-socket: sockdom eq "AF_INET" and socktype eq "SOCK
92 native-socket: sockdom eq "AF_INET" and socktype eq "SOCK (
93 native-connect: sockaddr match "inet-\\\[*\\\]:80" then p | native-write: permit