1 > native-issetugid: permit 2 > native-mprotect: permit 3 > native-mmap: permit 4 > native-fsread: filename eq "/var/run/ld.so.hints" then perm 5 > native-fstat: permit 6 native-connect: sockaddr eq "inet-[127.0.0.1]:53" then perm | native-fsread: filename match "/usr/lib/libssl.so.*" then p 7 native-connect: sockaddr match "inet-\\\[*\\\]:80" then per | native-read: permit 8 native-exit: permit | native-fsread: filename match "/usr/lib/libcrypto.so.*" the 9 native-fcntl: cmd eq "F_SETFD" then permit | native-fsread: filename match "/usr/lib/libncurses.so.*" th 10 native-fsread: filename eq "/" then permit | native-fsread: filename match "/usr/lib/libc.so.*" then per 11 native-fsread: filename match "/<non-existent filename>: *" | native-munmap: permit 12 native-fsread: filename eq "/etc/lynx.cfg" then permit | native-sigprocmask: permit 13 native-fsread: filename eq "/etc/resolv.conf" then permit | native-getpid: permit 14 native-fsread: filename eq "/etc/utmp" then permit < 15 native-fsread: filename eq "/home" then permit < 16 native-fsread: filename eq "$HOME" then permit < 17 native-fsread: filename eq "$HOME/.lynx-keymaps" then permi < 18 native-fsread: filename eq "$HOME/.lynxrc" then permit < 19 native-fsread: filename eq "$HOME/.mailcap" then permit < 20 native-fsread: filename eq "$HOME/.mime.types" then permit < 21 native-fsread: filename eq "$HOME/.terminfo" then permit < 22 native-fsread: filename eq "$HOME/.terminfo.db" then permit < 23 native-fsread: filename eq "/obj" then permit < 24 > native-fswrite: filename match "/tmp/lynx-*" then permit 25 > native-fsread: filename eq "$HOME" then permit 26 > native-fsread: filename eq "/etc/lynx.cfg" then permit 27 > native-fsread: filename eq "/" then permit 28 > native-fsread: filename eq "/usr/obj/bin/systrace/." then p 29 > native-fsread: filename eq "/usr/obj/bin" then permit 30 > native-fcntl: permit 31 > native-getdirentries: permit 32 > native-lseek: permit 33 > native-fsread: filename eq "/usr/obj" then permit 34 native-fsread: filename match "/usr/lib/libc.so.*" then per < 35 native-fsread: filename match "/usr/lib/libcrypto.so.*" the < 36 native-fsread: filename match "/usr/lib/libncurses.so.*" th < 37 native-fsread: filename match "/usr/lib/libssl.so.*" then p < 38 native-fsread: filename eq "/usr/obj" then permit | native-fsread: filename eq "/home" then permit 39 native-fsread: filename eq "/usr/obj/bin" then permit | native-fsread: filename eq "/obj" then permit 40 native-fsread: filename eq "/usr/obj/bin/systrace/." then p | native-fsread: filename eq "$HOME/.lynxrc" then permit 41 > native-fsread: filename match "/<non-existent filename>: *" 42 > native-fsread: filename eq "$HOME/.mailcap" then permit 43 > native-fsread: filename eq "$HOME/.mime.types" then permit 44 > native-sigaction: permit 45 > native-ioctl: permit 46 > native-fsread: filename eq "$HOME/.terminfo.db" then permit 47 > native-fsread: filename eq "$HOME/.terminfo" then permit 48 > native-pread: permit 49 > native-write: permit 50 > native-fsread: filename eq "$HOME/.lynx-keymaps" then permi 51 native-fsread: filename eq "/var/run/ld.so.hints" then perm | native-fsread: filename eq "/etc/utmp" then permit 52 native-fstat: permit < 53 native-fswrite: filename match "/tmp/lynx-*" then permit < 54 native-getdirentries: permit < 55 native-getpid: permit < 56 native-gettimeofday: permit < 57 native-ioctl: permit < 58 native-issetugid: permit < 59 native-lseek: permit < 60 native-mmap: permit < 61 native-mprotect: prot eq "PROT_READ" then permit < 62 native-mprotect: prot eq "PROT_READ|PROT_EXEC" then permit < 63 native-mprotect: prot eq "PROT_READ|PROT_WRITE" then permit < 64 native-mprotect: prot eq "PROT_READ|PROT_WRITE|PROT_EXEC" t < 65 native-munmap: permit < 66 native-nanosleep: permit < 67 native-pread: permit | native-nanosleep: permit 68 native-read: permit | native-gettimeofday: permit 69 native-recvfrom: permit | native-fsread: filename eq "/etc/resolv.conf" then permit 70 native-select: permit < 71 native-sendto: true then permit < 72 native-sigaction: permit < 73 native-sigprocmask: permit < 74 > native-connect: sockaddr eq "inet-[127.0.0.1]:53" then perm 75 > native-sendto: true then permit 76 > native-select: permit 77 > native-recvfrom: permit 78 native-write: permit | native-connect: sockaddr match "inet-\\\[*\\\]:80" then per 79 > native-exit: permit 80