97 lines
9.4 KiB
Text
97 lines
9.4 KiB
Text
|
Policy: /usr/bin/lynx, Emulation: native Policy: /usr/bin/lynx, Emulation: native
|
||
|
native-issetugid: permit <
|
||
|
native-mprotect: permit <
|
||
|
native-mmap: permit <
|
||
|
native-__sysctl: permit native-__sysctl: permit
|
||
|
native-fsread: filename eq "/var/run/ld.so.hints" then pe <
|
||
|
native-fstat: permit <
|
||
|
native-close: permit native-close: permit
|
||
|
native-fsread: filename match "/usr/lib/libssl.so.*" then | native-connect: sockaddr eq "inet-[127.0.0.1]:53" then pe
|
||
|
native-read: permit | native-connect: sockaddr match "inet-\\\[*\\\]:80" then p
|
||
|
native-fsread: filename match "/usr/lib/libcrypto.so.*" t | native-exit: permit
|
||
|
native-fsread: filename match "/usr/lib/libncurses.so.*" | native-fcntl: cmd eq "F_SETFD" then permit
|
||
|
native-fsread: filename match "/usr/lib/libc.so.*" then p | native-fsread: filename eq "/" then permit
|
||
|
native-munmap: permit | native-fsread: filename match "/<non-existent filename>:
|
||
|
native-sigprocmask: permit | native-fsread: filename eq "/etc/lynx.cfg" then permit
|
||
|
native-fsread: filename eq "/etc/malloc.conf" then permit native-fsread: filename eq "/etc/malloc.conf" then permit
|
||
|
native-getpid: permit | native-fsread: filename eq "/etc/resolv.conf" then permit
|
||
|
> native-fsread: filename eq "/etc/utmp" then permit
|
||
|
> native-fsread: filename eq "/home" then permit
|
||
|
> native-fsread: filename eq "$HOME" then permit
|
||
|
> native-fsread: filename eq "$HOME/.lynx-keymaps" then per
|
||
|
> native-fsread: filename eq "$HOME/.lynxrc" then permit
|
||
|
> native-fsread: filename eq "$HOME/.mailcap" then permit
|
||
|
> native-fsread: filename eq "$HOME/.mime.types" then permi
|
||
|
> native-fsread: filename eq "$HOME/.terminfo" then permit
|
||
|
> native-fsread: filename eq "$HOME/.terminfo.db" then perm
|
||
|
> native-fsread: filename eq "/obj" then permit
|
||
|
native-fsread: filename eq "/tmp" then permit native-fsread: filename eq "/tmp" then permit
|
||
|
native-fswrite: filename match "/tmp/lynx-*" then permit native-fsread: filename match "/tmp/lynx-*/." then permit
|
||
|
native-fsread: filename match "/tmp/lynx-*/." then permit (
|
||
|
native-fsread: filename eq "$HOME" then permit <
|
||
|
native-fsread: filename eq "/etc/lynx.cfg" then permit <
|
||
|
native-fsread: filename eq "/" then permit <
|
||
|
native-fsread: filename eq "/usr/obj/bin/systrace/." then <
|
||
|
native-fsread: filename eq "/usr/obj/bin" then permit <
|
||
|
native-fcntl: permit <
|
||
|
native-getdirentries: permit <
|
||
|
native-lseek: permit <
|
||
|
native-fsread: filename eq "/usr/obj" then permit <
|
||
|
native-fsread: filename eq "/usr" then permit native-fsread: filename eq "/usr" then permit
|
||
|
native-fsread: filename eq "/usr/bin" then permit native-fsread: filename eq "/usr/bin" then permit
|
||
|
native-fsread: filename eq "/usr/games" then permit native-fsread: filename eq "/usr/games" then permit
|
||
|
native-fsread: filename eq "/usr/include" then permit native-fsread: filename eq "/usr/include" then permit
|
||
|
native-fsread: filename eq "/usr/lib" then permit native-fsread: filename eq "/usr/lib" then permit
|
||
|
native-fsread: filename eq "/usr/libdata" then permit native-fsread: filename match "/usr/lib/libc.so.*" then p
|
||
|
native-fsread: filename eq "/usr/libexec" then permit native-fsread: filename match "/usr/lib/libcrypto.so.*" t
|
||
|
native-fsread: filename eq "/usr/lkm" then permit native-fsread: filename match "/usr/lib/libncurses.so.*"
|
||
|
native-fsread: filename eq "/usr/local" then permit native-fsread: filename match "/usr/lib/libssl.so.*" then
|
||
|
native-fsread: filename eq "/usr/mdec" then permit native-fsread: filename eq "/usr/libdata" then permit
|
||
|
native-fsread: filename eq "/home" then permit native-fsread: filename eq "/usr/libexec" then permit
|
||
|
native-fsread: filename eq "/obj" then permit native-fsread: filename eq "/usr/lkm" then permit
|
||
|
native-fsread: filename eq "$HOME/.lynxrc" then permit native-fsread: filename eq "/usr/local" then permit
|
||
|
native-fsread: filename match "/<non-existent filename>: native-fsread: filename eq "/usr/mdec" then permit
|
||
|
native-fsread: filename eq "/usr/obj/bin/systrace/.mailca native-fsread: filename eq "/usr/obj" then permit
|
||
|
native-fsread: filename eq "$HOME/.mailcap" then permit native-fsread: filename eq "/usr/obj/bin" then permit
|
||
|
native-fsread: filename eq "/usr/obj/bin/systrace/.mime.t native-fsread: filename eq "/usr/obj/bin/systrace/." then
|
||
|
) native-fsread: filename eq "/usr/obj/bin/systrace/.mailca
|
||
|
) native-fsread: filename eq "/usr/obj/bin/systrace/.mime.t
|
||
|
native-fsread: filename eq "$HOME/.mime.types" then permi <
|
||
|
native-sigaction: permit <
|
||
|
native-ioctl: permit <
|
||
|
native-fsread: filename eq "$HOME/.terminfo.db" then perm <
|
||
|
native-fsread: filename eq "$HOME/.terminfo" then permit <
|
||
|
native-fsread: filename eq "/usr/share/misc/terminfo.db" native-fsread: filename eq "/usr/share/misc/terminfo.db"
|
||
|
native-pread: permit <
|
||
|
native-write: permit <
|
||
|
native-fsread: filename eq "$HOME/.lynx-keymaps" then per <
|
||
|
native-fsread: filename eq "/var/run/dev.db" then permit native-fsread: filename eq "/var/run/dev.db" then permit
|
||
|
native-fsread: filename eq "/etc/utmp" then permit | native-fsread: filename eq "/var/run/ld.so.hints" then pe
|
||
|
native-poll: permit | native-fstat: permit
|
||
|
native-nanosleep: permit | native-fswrite: filename match "/tmp/lynx-*" then permit
|
||
|
> native-getdirentries: permit
|
||
|
> native-getpid: permit
|
||
|
native-gettimeofday: permit native-gettimeofday: permit
|
||
|
native-fsread: filename eq "/etc/resolv.conf" then permit | native-ioctl: permit
|
||
|
native-socket: sockdom eq "AF_INET" and socktype eq "SOCK | native-issetugid: permit
|
||
|
native-connect: sockaddr eq "inet-[127.0.0.1]:53" then pe | native-lseek: permit
|
||
|
native-sendto: true then permit | native-mmap: permit
|
||
|
native-select: permit | native-mprotect: prot eq "PROT_READ" then permit
|
||
|
> native-mprotect: prot eq "PROT_READ|PROT_EXEC" then permi
|
||
|
> native-mprotect: prot eq "PROT_READ|PROT_WRITE" then perm
|
||
|
> native-mprotect: prot eq "PROT_READ|PROT_WRITE|PROT_EXEC"
|
||
|
> native-munmap: permit
|
||
|
> native-nanosleep: permit
|
||
|
> native-poll: permit
|
||
|
> native-pread: permit
|
||
|
> native-read: permit
|
||
|
native-recvfrom: permit native-recvfrom: permit
|
||
|
> native-select: permit
|
||
|
> native-sendto: true then permit
|
||
|
> native-sigaction: permit
|
||
|
> native-sigprocmask: permit
|
||
|
> native-socket: sockdom eq "AF_INET" and socktype eq "SOCK
|
||
|
native-socket: sockdom eq "AF_INET" and socktype eq "SOCK native-socket: sockdom eq "AF_INET" and socktype eq "SOCK
|
||
|
native-connect: sockaddr match "inet-\\\[*\\\]:80" then p | native-write: permit
|
||
|
native-exit: permit <
|