Другие разрешения, кроме доступа к файловой системе

Si su interfaz se llama wlan0Entonces puede agregar esta línea

Run Wireless "wlan0" [ "-t", "<essid>" ] 10

a su lista de comandos.

Acceda a él en la cadena de plantilla a través de%wlan0wi%

2
25.03.2019, 03:53
1 ответ

Эффективные идентификаторы используются для целого ряда целей.

Отправка сигнала, как описано в kill (2):

   For  a process to have permission to send a signal, it must either
   be privileged (under Linux: have the CAP_KILL  capability  in  the
   user  namespace  of  the target process), or the real or effective
   user ID of the sending process must equal the real or  saved  set-
   user-ID  of  the  target process.  In the case of SIGCONT, it suf‐
   fices when the sending and receiving processes belong to the  same
   session.

При создании объектов System V IPC, как описано в (, например)msgctl (2):

   If a new message queue is created, then its associated data struc‐
   ture msqid_ds (see msgctl(2)) is initialized as follows:

          msg_perm.cuid  and  msg_perm.uid  are  set to the effective
          user ID of the calling process.

          msg_perm.cgid and msg_perm.gid are  set  to  the  effective
          group ID of the calling process.

При установке значения приятного процесса, как описано в setpriority (2):

   EPERM  A  process  was  located, but its effective user ID did not
          match either the effective or the real user ID of the call‐
          er,  and  was  not  privileged  (on Linux: did not have the
          CAP_SYS_NICE capability).  But see NOTES below.

Аналогично, при настройке привязки ЦП с помощью sched _setaffinity (2):

   EPERM  (sched_setaffinity()) The  calling  thread  does  not  have
          appropriate privileges.  The caller needs an effective user
          ID equal to the real user ID or effective user  ID  of  the
          thread   identified   by   pid,  or  it  must  possess  the
          CAP_SYS_NICE capability in the user namespace of the thread
          pid.

Другие примеры включают следующие системные вызовы:prlimit (2)и keyctl (2).

1
27.01.2020, 22:17

Теги

Похожие вопросы