ùISO8859-1Š5p:¦0á:9Mh‡<ð7- 9e =Ÿ 3Ý 6 AHBŠDÍ;(N(w' AÈ/ 5 :/ pM  4 î% #O I= ™5 ×/ 0 = ; n!5 ª"b à#S C$/ —%< Ç&; 'S @( ”)@ ´*= õ+@3,8t-B­.9ð/M*0<x1+µ2Dá3&&4-M5<{6d¸7?8P]99®:Zè;8C<=|=Tº>=?>M@GŒAGÔB]C2zD2­E[àF4<GEqHP·IhJWqKXÉL?"M2bN-•O9ÃPKýQ*IRMtS*ÂT3íUD!V-fW=”X+ÒY.þZ=-[4k\3 ]=Ô^8_)K`)ua,Ÿb#Ìc2ðd'#e'Kf'sg!›h0½i3îj<"k?_l2ŸmlÒn?o®Íp3|qm°r  s¦ ¿t©!fuX"v"iw8"x]"ºy<#z3#U{/#‰|.#¹}P#è~,$9+$f€*$’<$½‚X$úƒ.%S„,%‚…6%¯†7%æ‡9&ˆ8&X‰-&‘Š#&¿Allows a process to pass any non-SU privilege check. Equivalent to all Auditing privileges (PV_AU_*) combined. Allows a process to record/add an audit record. Allows a process to configure and query the audit system. Allows a process to read a file marked as an audit file. Allows a process to write or delete a file marked as an audit file, or to mark a file as an audit file. Allows a process to get or set an audit state of a process. Allows a process to modify the kernel security tables. Allows a process to retrieve the kernel security tables. Causes a process to pass authorization checks during exec(). Causes a process to pass all authorization checks. Equivalent to all DAC privileges (PV_DAC_*) combined. Allows a process to override DAC read permission on all objects. Allows a process to override DAC write permission on all objects. Allows a process to override DAC execute permission on all objects. Allows a process to override DAC ownership on all objects. Allows a process to change its user ID. Allows a process to set a new group ID. Allows a process to set a new role ID. Equivalent to all PROBEVUE_ privileges (PV_PROBEVUE_*) combined. Allows users to dynamically trace applications Allows users to dynamically trace their applications Allows users to dynamically trace system calls Allows users to dynamically trace system calls invoked by their applications Allows users to dynamically trace the entire system Allows probevue RAS events functions Allows users to update probevue parameters and query all the probevue sessions Equivalent to all File System privileges (PV_FS_*) combined. Allows a process to mount and unmount a file system. Allows a process to create a file of any type. Allows a process to change the owner of a file. Allows a process to manage disk quotas related operations. Allows a process to make a hard link to a directory. Allows a process to perform various control operations except extend and shrink on a file system. Allows a process to perform extend and shrink type of operations on a file system. Allows a process to change its root directory. Allows a process to make or set partitioned type directory. Equivalent to all Process privileges (PV_PROC_*) combined. Allows a process/thread to change priority, policy and other schedulig parameters. Allows a process to dump core. Allows a process create more processes than the per user limit. Allows to attach resource set (rset) to a process or thread. Allows a process to set user information in the user structure. Allows a process to checkpoint/restart another process. Allows a process to set new process credential during the exec(). Allows a process to send signal to an unrelated process. Allows a process to modify or view privilege sets associated with a process. Allows a process to submit and use fine granularity timers. Allows a process to access CPU-time clock. Allows a process to retrieve and update process tunable parameters. Allows a process to change REAL mode. Allows a process to execute another process. Allows a process to modify the kernel trusted library path. Indicates a process is a trusted path process and allows actions limited to trusted path processes. Allows a process to set or clear the kernel trusted path flag. Allows a process to perform checkpoint/restart operation in Workload partition. Equivalent to all Kernel privileges (PV_KER_*) combined. Allows a process to perform restricted operations pertaining to the accounting subsystem. Allows a process to invoke dynamic reconfig operations. Allows a process to modify the system clock and system time. Allows a process to use large (non-pageable) pages for the shared memory segments. Allows a process to initialize and modify WLM configuration. Allows a process to initialize or query the eWLM environment. Allows a process to examine or set kernel run-time tunable parameters. Allows a process to shut down the system using the reboot system call. Allows a process to configure or write RAS records, error logging, tracing, dumps functions. Allows a process to configure the LVM sub-system. Allows a process to configure the NFS sub-system. Allows a process to modify swap parameters and other VMM tunable parameters in the kernel. Allows a process to configure a Workload partition. Allows a process to perform various system configuration operations. Allows a process to perform various configuration tasks in a kernel extensions. Allows a process to raise the value of IPC message queue buffer and allow shmget with ranges to attach. Allows a process to read a IPC Message Queue, Semaphore Set, or Shared Memory Segment. Allows a process to write a IPC Message Queue, Semaphore Set, or Shared Memory Segment. Allows a process to override DAC ownership on all IPC objects. Allows a process to change Kernel Security Flags. Allows a process to patch kernel extensions. Allows a process to configure and utilize error logging. Allows a process to configure kernel extensions and devices in the system. Allows a process to query kernel modules. Allows a process to load/unload kernel extensions and devices in the system. Equivalent to all SU privileges combined. Grant the process all of the superuser privileges. If the UID is 0, grant the process all of the superuser privileges. Causes the getuid() system call to return 0. Equivalent to all Networking privileges (PV_NET_*) combined. Allows a process to modify network tables. Allows a process to bind to privileged ports. Allows a process to have direct access to the network layer. Allows a process to configure networking paramters. Allows a process to bypass integrity restrictions. Allows a process to bypass integrity clearance restrictions. Equivalent to all Label privileges (PV_LAB_*) combined. Allows a process to modify subject SCLs. Allows a process to modify subject TCLs. Allows a process to read labeling database. Allows a process to downgrade SLs. Allows a process to downgrade the SL of a packet. Allows a process to change object SLs. Allows a process to change subject SL. Allows a process to change its own SL. Allows a process to upgrade SLs. Allows a process to upgrade the SL of a packet. Allows a process to modify subject and object TLs. Equivalent to all other MAC privileges (PV_MAC_*) combined. Allows a process to bypass sensitivity clearance restrictions. Allows a process to bypass MAC read restrictions. Allows a process to bypass MAC read restrictions when the object's label is within the process's clearance. Allows a process to bypass MAC read restrictions when reading from a STREAM, provided that message's label is within the process' clearance. Allows a process to bypass MAC read restrictions when getting information about a process, provided that the target process's label is within the acting process's clearance. Allows a process to bypass MAC write restrictions. Allows a process to bypass MAC write restrictions when the object's label is within the process's clearance. Allows a process to bypass MAC write restrictions when the process label dominates the object's label and the object's label is within the process's clearance. Allows a process to bypass MAC write restrictions when the process label is dominated by the object's label and the object's label is within the process's clearance. Allows a process to bypass MAC write restrictions when sending a signal to a process, provided that the target process's label is within the acting process's clearance. Allows a process to bypass MAC restrictions for files flagged as being exempt from MAC. Privilege not defined. Allows a process to perform data management operations. Allows a process in a WPAR to load a kernel extension specified in the WPAR's configuration. Allows ASO user daemon access to ASO specific system calls. Allow a process to perform security library trace. Allows a process to enter into kernel cluster. Equivalent to all Domain privileges combined. Allows a process to bypass the domain checks and allow it to access the object. Allows a process to access domained object. Allows a process to change its own domain. Allows a process to change other domains. Allows a process to run operations specific to live update. Allows a process to attach a master context, download FPGA image, etc to a CAPI device. Allows a process to access a CAPI Flash disk. Allows a process to reserve NX/VAS credits. Equivalent to all PMU Privileges (PV_PMU_*) combined. Allows a process to use PMU for System wide profiling. Allows a process to use PMU for Process level profiling. Allows a process to use PMU for Thread level profiling. Allows a process to use PMU from user space. Allows a process to configure PMU.