<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.vmssoftware.com/index.php?action=history&amp;feed=atom&amp;title=SYSPRV</id>
	<title>SYSPRV - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.vmssoftware.com/index.php?action=history&amp;feed=atom&amp;title=SYSPRV"/>
	<link rel="alternate" type="text/html" href="https://wiki.vmssoftware.com/index.php?title=SYSPRV&amp;action=history"/>
	<updated>2026-05-02T13:53:59Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.43.3</generator>
	<entry>
		<id>https://wiki.vmssoftware.com/index.php?title=SYSPRV&amp;diff=1231&amp;oldid=prev</id>
		<title>Darya.zelenina: Created page with &quot;&#039;&#039;&#039;SYSPRV&#039;&#039;&#039; is a privilege that lets a process access protected objects by the system protection field and also read and modify the owner (UIC), the UIC-based...&quot;</title>
		<link rel="alternate" type="text/html" href="https://wiki.vmssoftware.com/index.php?title=SYSPRV&amp;diff=1231&amp;oldid=prev"/>
		<updated>2019-07-21T04:53:39Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;&amp;#039;&amp;#039;&amp;#039;SYSPRV&amp;#039;&amp;#039;&amp;#039; is a &lt;a href=&quot;/Privileges&quot; title=&quot;Privileges&quot;&gt;privilege&lt;/a&gt; that lets a process access protected objects by the system protection field and also read and modify the owner (UIC), the UIC-based...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&amp;#039;&amp;#039;&amp;#039;SYSPRV&amp;#039;&amp;#039;&amp;#039; is a [[Privileges|privilege]] that lets a process access protected objects by the system protection field and also read and modify the owner (UIC), the UIC-based protection code, and the ACL of an object. Due to its potential to control the system, SYSPRV belongs to the All group of privileges. Even if an object is protected against system access, a process with SYSPRV privilege can change the object&amp;#039;s protection to gain access to it. Any process with SYSPRV privilege can add, modify, or delete entries in the system user authorization file ([[SYSUAF.DAT]]).&lt;br /&gt;
Exercise caution when granting this privilege. Normally, grant this privilege only to system managers and security administrators. If unqualified users have system access rights, the operating system and service to others can be easily disrupted. Such disruptions can include failure of the system, destruction of all system and user data, and exposure of confidential information.&lt;br /&gt;
The SYSPRV privilege also lets a process perform the following tasks:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! colspan=&amp;quot;col&amp;quot; | Task &lt;br /&gt;
! colspan=&amp;quot;col&amp;quot; | Interface&lt;br /&gt;
|-&lt;br /&gt;
| Modify a file&amp;#039;s expiration date &lt;br /&gt;
| [[SET FILE]]/EXPIRATION&lt;br /&gt;
|-&lt;br /&gt;
| Modify the number of interlocked queue retries &lt;br /&gt;
| [[$QIO]] request to an Ethernet 802 driver (DEBNA/NI)&lt;br /&gt;
|-&lt;br /&gt;
| Set the spin-wait time on the port command register&lt;br /&gt;
| $QIO request to an Ethernet 802 driver (DEBNA)&lt;br /&gt;
|-&lt;br /&gt;
| Set the FROM field in a mail message &lt;br /&gt;
| MAIL routines&lt;br /&gt;
|-&lt;br /&gt;
| Access a MAIL maintenance record &lt;br /&gt;
| MAIL&lt;br /&gt;
|-&lt;br /&gt;
| Modify or delete a MAIL database record &lt;br /&gt;
| MAIL&lt;br /&gt;
|-&lt;br /&gt;
| Modify the group number and password of a local area cluster&lt;br /&gt;
| CLUSTER_AUTHORIZE component of SYSMAN&lt;br /&gt;
|-&lt;br /&gt;
| Perform transaction recovery, join a transaction as coordinator, transition a transaction&lt;br /&gt;
| [[DECdtm]] software&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
A process whose group [[UIC]] is less than or equal to the system parameter [[MAXSYSGRP]] has implied SYSPRV. When a process has SYSPRV or implied SYSPRV, it can also perform the following tasks:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! colspan=&amp;quot;col&amp;quot; | Task &lt;br /&gt;
! colspan=&amp;quot;col&amp;quot; | Interface&lt;br /&gt;
|-&lt;br /&gt;
| Initialize a magnetic tape &lt;br /&gt;
| [[$INIT_VOL]]&lt;br /&gt;
|-&lt;br /&gt;
| Override creation of an owner [[ACL|ACE]] on a newly created file&lt;br /&gt;
| [[$QIO]] request to F11BXQP&lt;br /&gt;
|-&lt;br /&gt;
| Clear the directory bit in a directory&amp;#039;s file header &lt;br /&gt;
| [[$QIO]] request to the F11BXQP, [[SET FILE]]/NODIRECTORY&lt;br /&gt;
|-&lt;br /&gt;
| Acquire or release a volume lock &lt;br /&gt;
| [[$QIO]] request to F11BXQP&lt;br /&gt;
|-&lt;br /&gt;
| Force mount verification on a volume &lt;br /&gt;
| [[$QIO]] request to F11BXQP&lt;br /&gt;
|-&lt;br /&gt;
| Create a file access window with the no access lock bit set&lt;br /&gt;
| [[$QIO]] request to F11BXQP&lt;br /&gt;
|-&lt;br /&gt;
| Specify null lock mode for a volume lock &lt;br /&gt;
| [[$QIO]] request to F11BXQP&lt;br /&gt;
|-&lt;br /&gt;
| Access a locked file &lt;br /&gt;
| [[$QIO]] request to F11BXQP&lt;br /&gt;
|-&lt;br /&gt;
| Disable [[Disk Quota|disk quotas]] on volume &lt;br /&gt;
| [[$QIO]] request to F11BXQP&lt;br /&gt;
|-&lt;br /&gt;
| Enable disk quotas on volume &lt;br /&gt;
| [[$QIO]] request to F11BXQP&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:All Privileges]]&lt;/div&gt;</summary>
		<author><name>Darya.zelenina</name></author>
	</entry>
</feed>