Editing
Paper
(section)
From Linix VServer
Jump to navigation
Jump to search
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
==== Capability Overview ==== The list of POSIX Capabilities used with Linux is long, and the 32 available bits are almost used up. While the detailed list of all capabilities can be found in /usr/include/linux/capability.h on most Linux systems, an overview of important capabilities is given here. {| class="wikitablenowrap" ! [0] CAP_CHOWN | change file ownership and group. |- ! [5] CAP_KILL | send a signal to a process with a different real or effective user ID |- ! [6] CAP_SETGID | permit setgid(2), setgroups(2), and forged gids on socket credentials passing |- ! [7] CAP_SETUID | permit set*uid(2), and forged uids on socket credentials passing |- ! [8] CAP_SETPCAP | transfer/remove any capability in permitted set to/from any pid |- ! [9] CAP_LINUX_IMMUTABLE | allow modification of S_IMMUTABLE and S_APPEND file attributes |- ! [11] CAP_NET_BROADCAST | permit broadcasting and listening to multicast |- ! [12] CAP_NET_ADMIN | permit interface configuration, IP firewall, masquerading, accounting, socket debugging, routing tables, bind to any address, enter promiscuous mode, multicasting, ... |- ! [13] CAP_NET_RAW | permit usage of RAW and PACKET sockets |- ! [16] CAP_SYS_MODULE | insert and remove kernel modules |- ! [18] CAP_SYS_CHROOT | permit chroot(2) |- ! [19] CAP_SYS_PTRACE | permit ptrace() of any process |- ! [21] CAP_SYS_ADMIN | this list would be too long, it basically allows to do everything else, not mentioned in another capability. |- ! [22] CAP_SYS_BOOT | permit reboot(2) |- ! [23] CAP_SYS_NICE | allow raising priority and setting priority on other processes, modify scheduling |- ! [24] CAP_SYS_RESOURCE | override resource limits, quota, reserved space on fs, ... |- ! [27] CAP_MKNOD | permit the privileged aspects of mknod(2) |}
Summary:
Please note that all contributions to Linix VServer may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see
Linix VServer:Copyrights
for details).
Do not submit copyrighted work without permission!
Cancel
Editing help
(opens in new window)
Navigation menu
Page actions
Page
Discussion
Read
Edit
History
Page actions
Page
Discussion
More
Tools
Personal tools
Not logged in
Talk
Contributions
Create account
Log in
About
Overview
Paper
News
Developers
Donations
Search
Getting Started
Downloads
FAQs
Documentation
Support
Participate
How to participate
Report a Bug
Communicate
Teams/Projects
Hall of Fame
Resources
Archives
Recent Wiki Changes
Pastebin
Related Projects
VServer Hosting
Happy VServer Users
Tools
What links here
Related changes
Special pages
Page information