Policy: /usr/bin/lynx, Emulation: native Policy: /usr/bin/lynx, Emulation: native > native-issetugid: permit > native-mprotect: permit > native-mmap: permit native-__sysctl: permit native-__sysctl: permit > native-fsread: filename eq "/var/run/ld.so.hints" then pe > native-fstat: permit native-close: permit native-close: permit native-connect: sockaddr eq "inet-[127.0.0.1]:53" then pe | native-fsread: filename match "/usr/lib/libssl.so.*" then native-connect: sockaddr match "inet-\\\[*\\\]:80" then p | native-read: permit native-exit: permit | native-fsread: filename match "/usr/lib/libcrypto.so.*" t native-fcntl: cmd eq "F_SETFD" then permit | native-fsread: filename match "/usr/lib/libncurses.so.*" native-fsread: filename eq "/" then permit | native-fsread: filename match "/usr/lib/libc.so.*" then p native-fsread: filename match "/: | native-munmap: permit native-fsread: filename eq "/etc/lynx.cfg" then permit | native-sigprocmask: permit native-fsread: filename eq "/etc/malloc.conf" then permit native-fsread: filename eq "/etc/malloc.conf" then permit native-fsread: filename eq "/etc/resolv.conf" then permit | native-getpid: permit native-fsread: filename eq "/etc/utmp" then permit < native-fsread: filename eq "/home" then permit < native-fsread: filename eq "$HOME" then permit < native-fsread: filename eq "$HOME/.lynx-keymaps" then per < native-fsread: filename eq "$HOME/.lynxrc" then permit < native-fsread: filename eq "$HOME/.mailcap" then permit < native-fsread: filename eq "$HOME/.mime.types" then permi < native-fsread: filename eq "$HOME/.terminfo" then permit < native-fsread: filename eq "$HOME/.terminfo.db" then perm < native-fsread: filename eq "/obj" then permit < native-fsread: filename eq "/tmp" then permit native-fsread: filename eq "/tmp" then permit native-fsread: filename match "/tmp/lynx-*/." then permit native-fswrite: filename match "/tmp/lynx-*" then permit ) native-fsread: filename match "/tmp/lynx-*/." then permit > native-fsread: filename eq "$HOME" then permit > native-fsread: filename eq "/etc/lynx.cfg" then permit > native-fsread: filename eq "/" then permit > native-fsread: filename eq "/usr/obj/bin/systrace/." then > native-fsread: filename eq "/usr/obj/bin" then permit > native-fcntl: permit > native-getdirentries: permit > native-lseek: permit > native-fsread: filename eq "/usr/obj" then permit native-fsread: filename eq "/usr" then permit native-fsread: filename eq "/usr" then permit native-fsread: filename eq "/usr/bin" then permit native-fsread: filename eq "/usr/bin" then permit native-fsread: filename eq "/usr/games" then permit native-fsread: filename eq "/usr/games" then permit native-fsread: filename eq "/usr/include" then permit native-fsread: filename eq "/usr/include" then permit native-fsread: filename eq "/usr/lib" then permit native-fsread: filename eq "/usr/lib" then permit native-fsread: filename match "/usr/lib/libc.so.*" then p native-fsread: filename eq "/usr/libdata" then permit native-fsread: filename match "/usr/lib/libcrypto.so.*" t native-fsread: filename eq "/usr/libexec" then permit native-fsread: filename match "/usr/lib/libncurses.so.*" native-fsread: filename eq "/usr/lkm" then permit native-fsread: filename match "/usr/lib/libssl.so.*" then native-fsread: filename eq "/usr/local" then permit native-fsread: filename eq "/usr/libdata" then permit native-fsread: filename eq "/usr/mdec" then permit native-fsread: filename eq "/usr/libexec" then permit native-fsread: filename eq "/home" then permit native-fsread: filename eq "/usr/lkm" then permit native-fsread: filename eq "/obj" then permit native-fsread: filename eq "/usr/local" then permit native-fsread: filename eq "$HOME/.lynxrc" then permit native-fsread: filename eq "/usr/mdec" then permit native-fsread: filename match "/: native-fsread: filename eq "/usr/obj" then permit native-fsread: filename eq "/usr/obj/bin/systrace/.mailca native-fsread: filename eq "/usr/obj/bin" then permit native-fsread: filename eq "$HOME/.mailcap" then permit native-fsread: filename eq "/usr/obj/bin/systrace/." then native-fsread: filename eq "/usr/obj/bin/systrace/.mime.t native-fsread: filename eq "/usr/obj/bin/systrace/.mailca ( native-fsread: filename eq "/usr/obj/bin/systrace/.mime.t ( > native-fsread: filename eq "$HOME/.mime.types" then permi > native-sigaction: permit > native-ioctl: permit > native-fsread: filename eq "$HOME/.terminfo.db" then perm > native-fsread: filename eq "$HOME/.terminfo" then permit native-fsread: filename eq "/usr/share/misc/terminfo.db" native-fsread: filename eq "/usr/share/misc/terminfo.db" > native-pread: permit > native-write: permit > native-fsread: filename eq "$HOME/.lynx-keymaps" then per native-fsread: filename eq "/var/run/dev.db" then permit native-fsread: filename eq "/var/run/dev.db" then permit native-fsread: filename eq "/var/run/ld.so.hints" then pe | native-fsread: filename eq "/etc/utmp" then permit native-fstat: permit < native-fswrite: filename match "/tmp/lynx-*" then permit < native-getdirentries: permit < native-getpid: permit < native-gettimeofday: permit < native-ioctl: permit < native-issetugid: permit < native-lseek: permit < native-mmap: permit < native-mprotect: prot eq "PROT_READ" then permit < native-mprotect: prot eq "PROT_READ|PROT_EXEC" then permi < native-mprotect: prot eq "PROT_READ|PROT_WRITE" then perm < native-mprotect: prot eq "PROT_READ|PROT_WRITE|PROT_EXEC" < native-munmap: permit < native-nanosleep: permit < native-poll: permit native-poll: permit native-pread: permit | native-nanosleep: permit native-read: permit | native-gettimeofday: permit native-recvfrom: permit | native-fsread: filename eq "/etc/resolv.conf" then permit native-select: permit < native-sendto: true then permit < native-sigaction: permit < native-sigprocmask: permit < native-socket: sockdom eq "AF_INET" and socktype eq "SOCK native-socket: sockdom eq "AF_INET" and socktype eq "SOCK > native-connect: sockaddr eq "inet-[127.0.0.1]:53" then pe > native-sendto: true then permit > native-select: permit > native-recvfrom: permit native-socket: sockdom eq "AF_INET" and socktype eq "SOCK native-socket: sockdom eq "AF_INET" and socktype eq "SOCK native-write: permit | native-connect: sockaddr match "inet-\\\[*\\\]:80" then p > native-exit: permit