Sponsored Content
Full Discussion: Delegate zpool export
Operating Systems Solaris Delegate zpool export Post 302956560 by Peasant on Thursday 1st of October 2015 05:17:47 AM
Old 10-01-2015
To find out which privileges are required for a program on Solaris OS the command is
Code:
ppriv -eD zpool export db_tmp

Also truss can be handy.
Using Privileges (Tasks) - Oracle Solaris Administration: Security Services

Regards
Peasant.
 

9 More Discussions You Might Find Interesting

1. Solaris

need zpool to revert...

hi i have created a pool using zpool command for my /dev/dsk/c1d0s3 disk. The poolname is qwertyuiopasdfghjklmnbvcxzzxcvbnmasdfghjklqwertyuiopoiuytrewqasdfghjklkjhgfdsazxcvbnmmnbnbcxczxzassd ddddvfhfghgjjgjhgkhkljfjlhohihiuyuioyguioyguiowyuiogwyuigwrigywuigyguiyuiogyugiyguioyuyguiowygiuygui... (1 Reply)
Discussion started by: SankarV
1 Replies

2. Solaris

ZPOOL help..

hi ... i have added a physical disk to the pool with ""zpool add <poolname> diskname"""... after that i realized that i have to mirror it instead..then i tried to take that disk out of the pool but i m not able to do that.. i have gone through many unix help sites , nothing worked , so please... (6 Replies)
Discussion started by: yrajendergoud
6 Replies

3. UNIX for Dummies Questions & Answers

Sudo to delegate permission from non-root user to another non-root user

I've been through many threads before i decide to create a separate thread. I can't really find the solution to my (simple) problem. Here's what I'm trying to achieve: As "canar" user I want to run a command, let's say "/opt/ocaml/bin/ocaml" as "duck" user. The only to achieve this is to... (1 Reply)
Discussion started by: canar
1 Replies

4. Solaris

Zpool query

Hi, I have an X86pc with Solaris 10 and ZFS system. It has 8 similar disks. I need help in creating some zpools and changing the mount-point of a slice. Currently, the zpool in my system is like this: root@abcxxx>zpool status pool: rpool state: ONLINE scrub: none requested... (4 Replies)
Discussion started by: mystition
4 Replies

5. Solaris

How to tell what disks are used for a zpool?

Hello, Does anyone know how I can tell what disk are being not being used by a zpool? For example in Veritas Volume manager, I can run a "vxdisk list" and disks that are marked as "online invalid" are disk that are not used. I'm looking for a similar command in ZFS which will easily show... (5 Replies)
Discussion started by: robertinoau
5 Replies

6. Solaris

Shrinking zpool

Hello experts, I have a solaris 10 (SunOS 5.10 Generic_148888-05 sun4u sparc SUNW,SPARC-Enterprise) that by mistake I added a second san space of 700g to the pool. the whole pool is now 1.2T and, I need to take the space away from the pool and, make the pool 700g total. this is live oracle... (7 Replies)
Discussion started by: afadaghi
7 Replies

7. UNIX for Advanced & Expert Users

Solaris 10: I forgot to detach a zone before zpool export. Uninstall zone?

Dear all, recently, I migrated a solaris zone from one host to another. The zone was inside of a zpool. The zpool cotains two volumes. I did the following: host1: $ zlogin zone1 shutdown -y -g0 -i0 #Zone status changes from running to installed $ zpool export zone1 host2: $ zpool... (2 Replies)
Discussion started by: custos
2 Replies

8. Solaris

Zpool import/export error

A backup/clone script of ours was recently ran. It normally only clones the rpool and renames in rpoolA. Something must've changed as it found another one of our pools that it shouldn't have. It exported that pool unbeknownst to us. Later on when a coworker realized the other pool was missing he... (2 Replies)
Discussion started by: beantownmp
2 Replies

9. BSD

Zpool problem

Hi I have a problem with size on zfs filesystem on FreeBSD 9.2-RELEASE-p3. When I do this: free01# df -Th Filesystem Type Size Used Avail Capacity Mounted on /dev/ufs/FreeNASdde ufs 926M 826M 26M 97% / devfs devfs ... (1 Reply)
Discussion started by: primo102
1 Replies
ppriv(1)																  ppriv(1)

NAME
ppriv - inspect or modify process privilege sets and attributes SYNOPSIS
/usr/bin/ppriv -e [-D | -N] [-s spec] command [arg...] /usr/bin/ppriv [-v] [-S] [-D | -N] [-s spec] [pid | core] ... /usr/bin/ppriv -l [-v] [privilege-specification...] The first invocation of the ppriv command runs the command specified with the privilege sets and flags modified according to the arguments on the command line. The second invocation examines or changes the privilege state of running process and core files. The third invocation lists the privileges defined and information about specified privileges or privileges set specifications. The following options are supported: -D Turns on privilege debugging for the processes or command supplied. -e Interprets the remainder of the arguments as a command line and runs the command line with specified privilege attributes and sets. -l Lists all currently defined privileges on stdout. -N Turns off privilege debugging for the processes or command supplied. -s spec Modifies a process's privilege sets according to spec, a specification with the format [AEILP][+-=]privsetspec, containing no spa- ces, where: AEILP Indicates one or more letters indicating which privilege sets to change. These are case insensitive, for example, either a or A indicates all privilege sets. +-= Indicates a modifier to respectively add (+), remove (-), or assign (=) the listed privileges to the specified set(s) in privsetspec. privsetspec Indicates a comma-separated privilege set specification (priv1,priv2, and so on), as described in priv_str_to_set(3C). Modifying the same set with multiple -s options is possible as long as there is either precisely one assignment to an individual set or any number of additions and removals. That is, assignment and addition or removal for one set are mutually exclusive. -S Short. Reports the shortest possible output strings for sets. The default is portable output. See priv_str_to_set(3C). -v Verbose. Reports privilege sets using privilege names. The ppriv utility examines processes and core files and prints or changes their privilege sets. ppriv can run commands with privilege debugging on or off or with fewer privileges than the invoking process. When executing a sub process, the only sets that can be modified are L and I. Privileges can only be removed from L and I as ppriv starts with P=E=I. ppriv can also be used to remove privileges from processes or to convey privileges to other processes. In order to control a process, the effective set of the ppriv utility must be a super set of the controlled process's E, I, and P. The utility's limit set must be a super set of the target's limit set. If the target's process uids do not match, the {PRIV_PROC_OWNER} privilege must be asserted in the utility's effective set. If the controlled processes have any uid with the value 0, more restrictions may exist. See privileges(5). Example 1: Obtaining the Process Privileges of the Current Shell example$ ppriv $$ 387: -sh flags = <none> E: basic I: basic P: basic L: all Example 2: Removing a Privilege From Your Shell's Inheritable and Effective set example$ ppriv -s EI-proc_session $$ The subprocess can still inspect the parent shell but it can no longer influence the parent because the parent has more privileges in its Permitted set than the ppriv child process: example$ truss -p $$ truss: permission denied: 387 example$ ppriv $$ 387: -sh flags = <none> E: basic,!proc_session I: basic,!proc_session P: basic L: all Example 3: Running a Process with Privilege Debugging example$ ppriv -e -D cat /etc/shadow cat[418]: missing privilege "file_dac_read" (euid = 21782), needed at ufs_access+0x3c cat: cannot open /etc/shadow The privilege debugging error messages are sent to the controlling terminal of the current process. The "needed at" address specification is an artifact of the kernel implementation and it can be changed at any time after a software update. The system call number can be mapped to a system call using /etc/name_to_sysnum. Example 4: Listing the Privileges Available in the Current Zone This example lists the privileges available in the current zone (see zones(5)). When run in the global zone, all defined privileges are listed. example$ ppriv -l zone ... listing of all privileges elided ... Example 5: Examining a Privilege Aware Process The following example examines a privilege aware process: example$ ppriv -S `pgrep rpcbind` 928: /usr/sbin/rpcbind flags = PRIV_AWARE E: net_privaddr,proc_fork,sys_nfs I: none P: net_privaddr,proc_fork,sys_nfs L: none See setpflags(2) for explanations of the flags. The following exit values are returned: 0 Successful operation. non-zero An error has occurred. /proc/* Process files /etc/name_to_sysnum system call name to number mapping See attributes(5) for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Availability |SUNWesu | +-----------------------------+-----------------------------+ |Interface Stability |See below. | +-----------------------------+-----------------------------+ The invocation is Evolving. The output is Unstable. gcore(1), truss(1), setpflags(2), priv_str_to_set(3C), proc(4), attributes(5), privileges(5), zones(5) 15 Mar 2005 ppriv(1)
All times are GMT -4. The time now is 05:39 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy