Skip to main content
Redhat Developers  Logo
  • AI

    Get started with AI

    • Red Hat AI
      Accelerate the development and deployment of enterprise AI solutions.
    • AI learning hub
      Explore learning materials and tools, organized by task.
    • AI interactive demos
      Click through scenarios with Red Hat AI, including training LLMs and more.
    • AI/ML learning paths
      Expand your OpenShift AI knowledge using these learning resources.
    • AI quickstarts
      Focused AI use cases designed for fast deployment on Red Hat AI platforms.
    • No-cost AI training
      Foundational Red Hat AI training.

    Featured resources

    • OpenShift AI learning
    • Open source AI for developers
    • AI product application development
    • Open source-powered AI/ML for hybrid cloud
    • AI and Node.js cheat sheet

    Red Hat AI Factory with NVIDIA

    • Red Hat AI Factory with NVIDIA is a co-engineered, enterprise-grade AI solution for building, deploying, and managing AI at scale across hybrid cloud environments.
    • Explore the solution
  • Learn

    Self-guided

    • Documentation
      Find answers, get step-by-step guidance, and learn how to use Red Hat products.
    • Learning paths
      Explore curated walkthroughs for common development tasks.
    • See all learning

    Hands-on

    • Developer Sandbox
      Spin up Red Hat's products and technologies without setup or configuration.
    • Interactive labs
      Learn by doing in these hands-on, browser-based experiences.
    • Interactive demos
      Click through product features in these guided tours.

    Browse by topic

    • AI/ML
    • Automation
    • Java
    • Kubernetes
    • Linux
    • See all topics

    Training & certifications

    • Courses and exams
    • Certifications
    • Skills assessments
    • Red Hat Academy
    • Learning subscription
    • Explore training
  • Build

    Get started

    • Red Hat build of Podman Desktop
      A downloadable, local development hub to experiment with our products and builds.
    • Developer Sandbox
      Spin up Red Hat's products and technologies without setup or configuration.

    Download products

    • Access product downloads to start building and testing right away.
    • Red Hat Enterprise Linux
    • Red Hat AI
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    • See all products

    Featured

    • Red Hat build of OpenJDK
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenShift Dev Spaces
    • Red Hat Developer Toolset

    References

    • E-books
    • Documentation
    • Cheat sheets
    • Architecture center
  • Community

    Get involved

    • Events
    • Live AI events
    • Red Hat Summit
    • Red Hat Accelerators
    • Community discussions

    Follow along

    • Articles & blogs
    • Developer newsletter
    • Videos
    • Github

    Get help

    • Customer service
    • Customer support
    • Regional contacts
    • Find a partner

    Join the Red Hat Developer program

    • Download Red Hat products and project builds, access support documentation, learning content, and more.
    • Explore the benefits

Find what capabilities an application requires to successful run in a container

February 16, 2017
William Cohen
Related topics:
ContainersLinux
Related products:
Red Hat Enterprise Linux

    Many developers would like to run their existing applications in a container with restricted capabilities to improve security. However, it may not be clear which capabilities the application uses because the code uses libraries or other code developed elsewhere. The developer could run the application in an unrestricted container that allows all syscalls and capabilities to be used to avoid possible hard to diagnose failures caused by the application's use of forbidden capabilities or syscalls. Of course, this eliminates the enhanced security of restricted containers. At Red Hat, we have developed a SystemTap script (container_check.stp) to provide information about the capabilities that an application uses. Read the SystemTap Beginners Guide for information on how to setup SystemTap.

    Below is an example of the container_check.stp script monitoring a sudo command and the child processes it creates due to the strace and ping commands. The SystemTap "-c" option will setup the SystemTap instrumentation, run the specified command following the option, and shut down the SystemTap instrumentation once the command is complete. The expected output of the ping and strace commands are printed out followed by the output of the script. If the script warns about skipped probes, the number of active kretprobes allowed needs to be increased by using a larger number in the "-DKRETACTIVE=100" option on the command line.

    The container_check.stp script lists out the capabilities used by each executable. The first section of the script output for this example shows ping uses setuid and net_raw capabilities and the sudo uses setgid, setuid, and audit_write capabilities. The next section of the script output provides more details on the specific system calls using those capabilities for each executable. Thus, for this example to run in a container the setuid, setgid, net_raw, and audit_write capabilities would be required.

    $ ./container_check.stp -DKRETACTIVE=100 -c "sudo strace -c -f ping -c 1 people.redhat.com"
    starting container_check.stp. monitoring 20146
    PING people02.pubmisc.prod.ext.phx2.redhat.com (10.5.19.28) 56(84) bytes of data.
    64 bytes from people02.pubmisc.prod.ext.phx2.redhat.com (10.5.19.28): icmp_seq=1 ttl=57 time=46.3 ms
    
    --- people02.pubmisc.prod.ext.phx2.redhat.com ping statistics ---
    1 packets transmitted, 1 received, 0% packet loss, time 0ms
    rtt min/avg/max/mdev = 46.370/46.370/46.370/0.000 ms
    % time     seconds  usecs/call     calls    errors syscall
    ------ ----------- ----------- --------- --------- ----------------
     30.90    0.000623          69         9         2 socket
     13.69    0.000276          14        20         1 open
      7.84    0.000158           7        22           mprotect
      7.14    0.000144           5        31           mmap
      5.41    0.000109           5        24           close
      4.37    0.000088           4        20           fstat
      4.07    0.000082           4        20           read
      3.08    0.000062          12         5         2 connect
      3.03    0.000061          31         2           sendto
      2.48    0.000050           8         6           write
      2.18    0.000044          44         1           sendmmsg
      1.93    0.000039           6         7           setsockopt
      1.84    0.000037           7         5           poll
      1.84    0.000037          12         3           munmap
      1.44    0.000029           6         5           ioctl
      1.24    0.000025           4         7           capget
      0.99    0.000020          20         1           recvmsg
      0.94    0.000019           6         3           recvfrom
      0.74    0.000015           5         3           rt_sigaction
      0.74    0.000015           5         3           capset
      0.55    0.000011           6         2         2 access
      0.50    0.000010          10         1           setuid
      0.50    0.000010           5         2           prctl
      0.45    0.000009           3         3           brk
      0.35    0.000007           4         2           getuid
      0.30    0.000006           6         1           setitimer
      0.30    0.000006           6         1           getsockname
      0.30    0.000006           6         1           getsockopt
      0.25    0.000005           5         1           rt_sigprocmask
      0.25    0.000005           5         1           geteuid
      0.20    0.000004           4         1           getpid
      0.20    0.000004           4         1           arch_prctl
      0.00    0.000000           0         1           execve
    ------ ----------- ----------- --------- --------- ----------------
    100.00    0.002016                   215         7 total
    
    
    capabilities used by executables
          executable:      prob capability
    
                ping:           cap_setuid
                ping:          cap_net_raw
    
                sudo:           cap_setgid
                sudo:           cap_setuid
                sudo:      cap_audit_write
    
    
    
    capabilities used by syscalls
          executable,              syscall (       capability ) :            count
                ping,               socket (      cap_net_raw ) :                2
                ping,               setuid (       cap_setuid ) :                1
                sudo,            setresuid (       cap_setuid ) :               11
                sudo,            setresgid (       cap_setgid ) :               10
                sudo,            setgroups (       cap_setgid ) :                5
                sudo,               setgid (       cap_setgid ) :                1
                sudo,               setuid (       cap_setuid ) :                1
                sudo,               sendto (  cap_audit_write ) :                5
    
    
    forbidden syscalls
          executable,              syscall:            count
    
    
    failed syscalls
          executable,              syscall =            errno:            count
                ping,              connect =           ENOENT:                2
                ping,               socket =           EACCES:                2
                ping,               access =           ENOENT:                2
                ping,                 open =           ENOENT:                1
              stapio,               execve =           ENOENT:                5
              stapio,         rt_sigreturn =            EINTR:                1
              strace,                wait4 =           ECHILD:                1
              strace,               access =           ENOENT:                1
                sudo,                 read =           EAGAIN:                1
                sudo,                ioctl =           ENOTTY:                2
                sudo,              recvmsg =           EAGAIN:                3
                sudo,                 open =           ENOENT:               83
                sudo,                 stat =           ENOENT:                7
                sudo,               access =           ENOENT:                4
                sudo,                fstat =            EBADF:                1
                sudo,              connect =           ENOENT:               13
                sudo,                 poll =                 :                1
                sudo,         rt_sigreturn =            EINTR:                1
    

    You can also monitor already running processes by using the "-x " option and stopping the instrumentation with Ctl-C when the data collection is done. Below is an example monitoring Wireshark, showing the dumpcap executable using the setgid, setuid, and net_raw capabilities:

    $ pgrep wireshark
    19015
    $ ./container_check.stp -DKRETACTIVE=200 -x 19015starting container_check.stp. monitoring 19015
    ^C
    
    capabilities used by executables
          executable:      prob capability
    
             dumpcap:           cap_setgid
             dumpcap:           cap_setuid
             dumpcap:          cap_net_raw
    
    
    
    capabilities used by syscalls
          executable,              syscall (       capability ) :            count
             dumpcap,            setresgid (       cap_setgid ) :                1
             dumpcap,            setresuid (       cap_setuid ) :                1
             dumpcap,               socket (      cap_net_raw ) :                1
    
    
    forbidden syscalls
          executable,              syscall:            count
    
    
    failed syscalls
          executable,              syscall =            errno:            count
             dumpcap,               select =                 :                1
             dumpcap,         rt_sigreturn =            EINTR:                1
             dumpcap,           setsockopt =            EBUSY:                1
             dumpcap,                 stat =           ENOENT:                1
             dumpcap,               access =           ENOENT:                2
             dumpcap,                ioctl =       EOPNOTSUPP:                2
             dumpcap,             recvfrom =           EAGAIN:                1
           wireshark,              recvmsg =           EAGAIN:             2840
           wireshark,                ioctl =           EINVAL:                2
           wireshark,                 open =           ENOENT:               31
           wireshark,                 stat =           ENOENT:               57
    
    Last updated: March 20, 2023

    Recent Posts

    • Federated identity across the hybrid cloud using zero trust workload identity manager

    • Confidential virtual machine storage attack scenarios

    • Introducing virtualization platform autopilot

    • Integrate zero trust workload identity manager with Red Hat OpenShift GitOps

    • Best Practice Configuration and Tuning for Linux and Windows VMs

    Red Hat Developers logo LinkedIn YouTube Twitter Facebook

    Platforms

    • Red Hat AI
    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    • See all products

    Build

    • Developer Sandbox
    • Developer tools
    • Interactive tutorials
    • API catalog

    Quicklinks

    • Learning resources
    • E-books
    • Cheat sheets
    • Blog
    • Events
    • Newsletter

    Communicate

    • About us
    • Contact sales
    • Find a partner
    • Report a website issue
    • Site status dashboard
    • Report a security problem

    RED HAT DEVELOPER

    Build here. Go anywhere.

    We serve the builders. The problem solvers who create careers with code.

    Join us if you’re a developer, software engineer, web designer, front-end designer, UX designer, computer scientist, architect, tester, product manager, project manager or team lead.

    Sign me up

    Red Hat legal and privacy links

    • About Red Hat
    • Jobs
    • Events
    • Locations
    • Contact Red Hat
    • Red Hat Blog
    • Inclusion at Red Hat
    • Cool Stuff Store
    • Red Hat Summit
    © 2026 Red Hat

    Red Hat legal and privacy links

    • Privacy statement
    • Terms of use
    • All policies and guidelines
    • Digital accessibility

    Chat Support

    Please log in with your Red Hat account to access chat support.