public inbox for linux-man@vger.kernel.org
 help / color / mirror / Atom feed
* [Bug 214705] New: execve(2) omits EACCES due to capabilities
@ 2021-10-13  2:36 bugzilla-daemon
  2021-10-15 22:10 ` [Bug 214705] " bugzilla-daemon
  2021-10-16 18:16 ` bugzilla-daemon
  0 siblings, 2 replies; 3+ messages in thread
From: bugzilla-daemon @ 2021-10-13  2:36 UTC (permalink / raw)
  To: linux-man

https://bugzilla.kernel.org/show_bug.cgi?id=214705

            Bug ID: 214705
           Summary: execve(2) omits EACCES due to capabilities
           Product: Documentation
           Version: unspecified
          Hardware: All
                OS: Linux
            Status: NEW
          Severity: normal
          Priority: P1
         Component: man-pages
          Assignee: documentation_man-pages@kernel-bugs.osdl.org
          Reporter: dspeyer@gmail.com
        Regression: No

The man page for execve lists only 4 reasons the syscall can fail with
errno==EACCES.  In fact, there is at least one more.  If the binary being
executed has a setfattr'ed capability such as CAP_IPC_LOCK which is not
supported in the caller's kernel namespace (docker container), execve will fail
with this error.

I just spent a great deal of frustrating effort searching for a non-existent
elf interpreter or mount-noexec issue because I trusted this man page.

-- 
You may reply to this email to add a comment.

You are receiving this mail because:
You are watching the assignee of the bug.

^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2021-10-16 18:16 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2021-10-13  2:36 [Bug 214705] New: execve(2) omits EACCES due to capabilities bugzilla-daemon
2021-10-15 22:10 ` [Bug 214705] " bugzilla-daemon
2021-10-16 18:16 ` bugzilla-daemon

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox