Linux Security Concepts: Difference between revisions
Jump to navigation
Jump to search
Line 1: | Line 1: | ||
=Internal= | =Internal= | ||
* [[Linux_Security#Concepts|Linux Security Concepts]] | * [[Linux_Security#Concepts|Linux Security Concepts]] | ||
=Privileged Mode= | |||
=Privileged Process= | =Privileged Process= |
Revision as of 00:20, 2 March 2021
Internal
Privileged Mode
Privileged Process
Traditional UNIX implementations distinguish two categories of processes for the purpose of performing permission checks: privileged processes and unprivileged processes. A privileged process is a process with its effective user ID is 0, referred to as superuser or root. Privileged processes bypass all kernel permission checks.
TODO reconcile https://kb.novaordis.com/index.php/Docker_Security#Privileged_Container
Unprivileged Process
An unprivileged process is a process with a non-zero its effective user ID. Unprivileged processes are subject to full permission checking based on the process' credentials: effective UID, effective GID and supplementary group list.