Various clarifications and wording improvements.

This commit is contained in:
Michael Kerrisk 2006-04-19 08:58:01 +00:00
parent c75ec721fb
commit dc278bcdce
1 changed files with 15 additions and 14 deletions

View File

@ -135,9 +135,9 @@ when this setting is missing.
contains the port in network byte order.
The port numbers below 1024 are called
.IR "reserved ports" .
Only processes with effective user ID 0 or the
Only privileged processes (i.e., those having the
.B CAP_NET_BIND_SERVICE
capability may
capability) may
.BR bind (2)
to these sockets.
Note that the raw IPv4 protocol as such has no concept of a
@ -149,12 +149,13 @@ and
.I sin_addr
is the IP host address.
The
.I addr
.I s_addr
member of
.I struct in_addr
contains the host interface address in network order.
.I in_addr
should be only accessed using the
should be assigned one of the INADDR_* values (e.g., INADDR_ANY)
or set using the
.BR inet_aton (3),
.BR inet_addr (3),
.BR inet_makeaddr (3)
@ -336,9 +337,9 @@ Linux sends
datagrams first by default,
but the exact behaviour depends on the configured queueing discipline.
.\" FIXME elaborate on this
Some high priority levels may require an effective user ID of 0 or the
Some high priority levels may require superuser privileges (the
.B CAP_NET_ADMIN
capability.
capability).
The priority can also be set in a protocol independent way by the
.RB ( SOL_SOCKET ", " SO_PRIORITY )
socket option (see
@ -847,18 +848,18 @@ Datagram is bigger than an MTU on the path and it cannot be fragmented.
.B EACCES
The user tried to execute an operation without the necessary permissions.
These include:
Sending a packet to a broadcast address without having the
sending a packet to a broadcast address without having the
.B SO_BROADCAST
flag set.
Sending a packet via a
flag set;
sending a packet via a
.I prohibit
route.
Modifying firewall settings without
route;
modifying firewall settings without superuser privileges (the
.B CAP_NET_ADMIN
or effective user ID 0.
Binding to a reserved port without the
capability);
binding to a reserved port without superuser privileges (the
.B CAP_NET_BIND_SERVICE
capability or effective user ID 0.
capability).
.TP
.B EADDRINUSE