Can you check /proc/self/status to see the capabilities mask
you have.
[root@fedora2 ~]# cat /proc/self/status | grep ^Cap
CapInh: 0000000000000000
CapPrm: 0000001db5feffff
CapEff: 0000001db5feffff
CapBnd: 0000001db5feffff
[root@fedora2 ~]# capsh --print
Current: =ep cap_sys_module,cap_sys_time,cap_mknod,cap_audit_control,cap_mac_admin-ep
Bounding set
=cap_chown,cap_dac_override,cap_dac_read_search,cap_fowner,cap_fsetid,cap_kill,cap_setgid,cap_setuid,cap_setpcap,cap_linux_immutable,cap_net_bind_service,cap_net_broadcast,cap_net_admin,cap_net_raw,cap_ipc_lock,cap_ipc_owner,cap_sys_rawio,cap_sys_chroot,cap_sys_ptrace,cap_sys_pacct,cap_sys_admin,cap_sys_boot,cap_sys_nice,cap_sys_resource,cap_sys_tty_config,cap_lease,cap_audit_write,cap_setfcap,cap_mac_override,cap_syslog,35,36
Securebits: 00/0x0/1'b0
secure-noroot: no (unlocked)
secure-no-suid-fixup: no (unlocked)
secure-keep-caps: no (unlocked)
uid=0(root)
gid=0(root)
groups=
Also what kernel version are you using ? I'd pretty much be
expecting
this to just work already.
[root@nuhost105 ~]# uname -r
3.13.2-3.el6.x86_64
/stephan
--
Software is like sex, it's better when it's free!