HP-UX Containers (SRP) A.03.01.003 Release Notes (5900-2312, May 2012)
13
1.11.2 Disallowed privileges in system containers
A set of privileges is disallowed in each system container to prevent users from performing
administrative tasks that might have an impact on system wide resources or operations. Commands
and system calls performing the administrative tasks that are disallowed in a system container will
return an error. The following privileges (see privileges(5)) are disallowed within a system
container:
ACCOUNTING
Allows a process to control the process accounting system. Example: acct(1M), acctsh(1M)
AUDCONTROL
Allows a process to start, modify, and stop the auditing system. Example: audsys(1M)
CHANGECMPT
Grants a process the ability to change its compartment. Example: privrun (1M)
CMPTREAD
Allows a process to open a file or directory for reading, executing, or searching, bypassing
compartment rules.
CMPTWRITE
Allows a process to write to a file or directory, bypassing compartment rules.
COMMALLOWED
Allows a process to override compartment rules in the IPC and network subsystems.
CORESYSATTR
Allows a process to manage system attributes such as kernel tunables and system time.
Example: kctune(1M), date(1M)
DLKM
Allows a process to load a kernel module, change the global search path for DLKM.
Example: kcmodule(1M)
FSS, FSSTHREAD
Allows a process/thread to configure fair share scheduler.
MKNOD
Allows a process to create character or block special files. Example: mknod(1M)
MPCTL
Allows a process to change processor binding, locality domain binding,
or launch policy of a process.
NETADMIN
Allows a process to perform network administrative operations such as configuring IP
address and routing tables. Example: Add, delete, update options of ifconfig(1M),
netstat(1M), route(1M)
NETPROMISCUOUS
Allows a process to configure an interface to listen in promiscuous mode.
Example: tcpdump