> Thanks for the link; but this bit has to be set on the original executable.
> Is there any way a program in user mode can get around this or set the bit
> himself?
Ummm...now that would be a security violation, don't you think? If a
program can elevate it's own privileges, then whats the point of
having access control! :)
I think a user-space program will always need _some_ help from a
privileged user/program. Eg in the case of setuid, typically the root
user will be setting this bit (on a executable) so that an
unprivileged user can execute with temporarily elevated privileges.
CMIIW.
HTH,
-mandeep
----------
Good point, Mandeep :)
Since I am doing security testing, I want to see if there is any way - security loopholes - especially in the Android environment (which runs a branch of Linux)
that a program can access the device driver.
Anil
_______________________________________________ Kernelnewbies mailing list Kernelnewbies@xxxxxxxxxxxxxxxxx http://lists.kernelnewbies.org/mailman/listinfo/kernelnewbies