blob: eb34bace6c0172dd5147bb47c326010a75dec3e3 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
|
Policy: /usr/bin/lynx, Emulation: native Policy: /usr/bin/lynx, Emulation: native
> native-issetugid: permit
> native-mprotect: permit
> native-mmap: permit
native-__sysctl: permit native-__sysctl: permit
> native-fsread: filename eq "/var/run/ld.so.hints" then pe
> native-fstat: permit
native-close: permit native-close: permit
native-connect: sockaddr eq "inet-[127.0.0.1]:53" then | native-fsread: filename match "/usr/lib/libssl.so.*" then
native-connect: sockaddr match "inet-\\\[*\\\]:80" then | native-read: permit
native-exit: permit | native-fsread: filename match "/usr/lib/libcrypto.so.*" t
native-fcntl: cmd eq "F_SETFD" then permit | native-fsread: filename match "/usr/lib/libncurses.so.*"
native-fsread: filename eq "/" then permit | native-fsread: filename match "/usr/lib/libc.so.*" then p
native-fsread: filename match "/<non-existent filename> | native-munmap: permit
native-fsread: filename eq "/etc/lynx.cfg" then permit | native-sigprocmask: permit
native-fsread: filename eq "/etc/malloc.conf" then perm native-fsread: filename eq "/etc/malloc.conf" then permit
native-fsread: filename eq "/etc/resolv.conf" then perm | native-getpid: permit
native-fsread: filename eq "/etc/utmp" then permit <
native-fsread: filename eq "/home" then permit <
native-fsread: filename eq "$HOME" then permit <
native-fsread: filename eq "$HOME/.lynx-keymaps" then p <
native-fsread: filename eq "$HOME/.lynxrc" then permit <
native-fsread: filename eq "$HOME/.mailcap" then permit <
native-fsread: filename eq "$HOME/.mime.types" then per <
native-fsread: filename eq "$HOME/.terminfo" then permi <
native-fsread: filename eq "$HOME/.terminfo.db" then pe <
native-fsread: filename eq "/obj" then permit <
native-fsread: filename eq "/tmp" then permit native-fsread: filename eq "/tmp" then permit
> native-fswrite: filename match "/tmp/lynx-*" then permit
native-fsread: filename match "/tmp/lynx-*/." then perm native-fsread: filename match "/tmp/lynx-*/." then permit
> native-fsread: filename eq "$HOME" then permit
> native-fsread: filename eq "/etc/lynx.cfg" then permit
> native-fsread: filename eq "/" then permit
> native-fsread: filename eq "/usr/obj/bin/systrace/." then
> native-fsread: filename eq "/usr/obj/bin" then permit
> native-fcntl: permit
> native-getdirentries: permit
> native-lseek: permit
> native-fsread: filename eq "/usr/obj" then permit
native-fsread: filename eq "/usr" then permit native-fsread: filename eq "/usr" then permit
native-fsread: filename eq "/usr/bin" then permit native-fsread: filename eq "/usr/bin" then permit
native-fsread: filename eq "/usr/games" then permit native-fsread: filename eq "/usr/games" then permit
native-fsread: filename eq "/usr/include" then permit native-fsread: filename eq "/usr/include" then permit
native-fsread: filename eq "/usr/lib" then permit native-fsread: filename eq "/usr/lib" then permit
native-fsread: filename match "/usr/lib/libc.so.*" then <
native-fsread: filename match "/usr/lib/libcrypto.so.*" <
native-fsread: filename match "/usr/lib/libncurses.so.* <
native-fsread: filename match "/usr/lib/libssl.so.*" th <
native-fsread: filename eq "/usr/libdata" then permit native-fsread: filename eq "/usr/libdata" then permit
native-fsread: filename eq "/usr/libexec" then permit native-fsread: filename eq "/usr/libexec" then permit
native-fsread: filename eq "/usr/lkm" then permit native-fsread: filename eq "/usr/lkm" then permit
native-fsread: filename eq "/usr/local" then permit native-fsread: filename eq "/usr/local" then permit
native-fsread: filename eq "/usr/mdec" then permit native-fsread: filename eq "/usr/mdec" then permit
native-fsread: filename eq "/usr/obj" then permit | native-fsread: filename eq "/home" then permit
native-fsread: filename eq "/usr/obj/bin" then permit | native-fsread: filename eq "/obj" then permit
native-fsread: filename eq "/usr/obj/bin/systrace/." th | native-fsread: filename eq "$HOME/.lynxrc" then permit
> native-fsread: filename match "/<non-existent filename>:
native-fsread: filename eq "/usr/obj/bin/systrace/.mail native-fsread: filename eq "/usr/obj/bin/systrace/.mailca
> native-fsread: filename eq "$HOME/.mailcap" then permit
native-fsread: filename eq "/usr/obj/bin/systrace/.mime native-fsread: filename eq "/usr/obj/bin/systrace/.mime.t
> native-fsread: filename eq "$HOME/.mime.types" then permi
> native-sigaction: permit
> native-ioctl: permit
> native-fsread: filename eq "$HOME/.terminfo.db" then perm
> native-fsread: filename eq "$HOME/.terminfo" then permit
native-fsread: filename eq "/usr/share/misc/terminfo.db native-fsread: filename eq "/usr/share/misc/terminfo.db"
> native-pread: permit
> native-write: permit
> native-fsread: filename eq "$HOME/.lynx-keymaps" then per
native-fsread: filename eq "/var/run/dev.db" then permi native-fsread: filename eq "/var/run/dev.db" then permit
native-fsread: filename eq "/var/run/ld.so.hints" then | native-fsread: filename eq "/etc/utmp" then permit
native-fstat: permit <
native-fswrite: filename match "/tmp/lynx-*" then permi <
native-getdirentries: permit <
native-getpid: permit <
native-gettimeofday: permit <
native-ioctl: permit <
native-issetugid: permit <
native-lseek: permit <
native-mmap: permit <
native-mprotect: prot eq "PROT_READ" then permit <
native-mprotect: prot eq "PROT_READ|PROT_EXEC" then per <
native-mprotect: prot eq "PROT_READ|PROT_WRITE" then pe <
native-mprotect: prot eq "PROT_READ|PROT_WRITE|PROT_EXE <
native-munmap: permit <
native-nanosleep: permit <
native-poll: permit native-poll: permit
native-pread: permit | native-nanosleep: permit
native-read: permit | native-gettimeofday: permit
native-recvfrom: permit | native-fsread: filename eq "/etc/resolv.conf" then permit
native-select: permit <
native-sendto: true then permit <
native-sigaction: permit <
native-sigprocmask: permit <
native-socket: sockdom eq "AF_INET" and socktype eq "SO native-socket: sockdom eq "AF_INET" and socktype eq "SOCK
> native-connect: sockaddr eq "inet-[127.0.0.1]:53" then pe
> native-sendto: true then permit
> native-select: permit
> native-recvfrom: permit
native-socket: sockdom eq "AF_INET" and socktype eq "SO native-socket: sockdom eq "AF_INET" and socktype eq "SOCK
native-write: permit | native-connect: sockaddr match "inet-\\\[*\\\]:80" then p
> native-exit: permit
|