| Name | Description | Default |
|---|---|---|
| Transfer any capability in your permitted set to any process ID; remove any capability in your permitted set from any process ID. | off |
| Allows the modification of the | on |
| Allows to bind to sockets with numbers below 1024. | on |
| Allows network broadcasting and multicast access. | on |
| Allows the administration of IP firewalls and accounting. | off |
| Allows to use the RAW and PACKET sockets. | on |
| Allows to lock shared memory segments and | on |
| Overrides IPC ownership checks. | on |
| Insert and remove kernel modules. Be very careful with setting this capability on for a container; if a user has the permission of inserting kernel modules, this user has essentially full control over the hardware node. | off |
| Allows to use | on |
| Allows to trace any process. | on |
| Allows to configure process accounting. | on |
| In charge of many system administrator tasks such as swapping, administering APM BIOS, and so on. Shall be set to off for containers. | off |
| This capability currently has no effect on the container behaviour. | on |
| Allows to raise priority and to set priority for other processes. | on |
| Override resource limits (not to be confused with user beancounters). | on |
| Allows to change the system time. | off |
| Allows to configure TTY devices. | on |
| Allows the privileged aspects of | on |
| Allows to take leases of files. | on |