> Thanks for the link; but this bit has to be set on the original executable. > Is there any way a program in user mode can get around this or set the bit > himself? Ummm...now that would be a security violation, don't you think? If a program can elevate it's own privileges, then whats the point of having access control! :) I think a user-space program will always need _some_ help from a privileged user/program. Eg in the case of setuid, typically the root user will be setting this bit (on a executable) so that an unprivileged user can execute with temporarily elevated privileges. CMIIW. HTH, -mandeep > Anil > > _______________________________________________ > Kernelnewbies mailing list > Kernelnewbies@xxxxxxxxxxxxxxxxx > http://lists.kernelnewbies.org/mailman/listinfo/kernelnewbies > > _______________________________________________ Kernelnewbies mailing list Kernelnewbies@xxxxxxxxxxxxxxxxx http://lists.kernelnewbies.org/mailman/listinfo/kernelnewbies