Linux Security Concepts: Difference between revisions
Jump to navigation
Jump to search
Line 3: | Line 3: | ||
=Privileged Process= | =Privileged Process= | ||
Traditional UNIX implementations distinguish two categories of processes for the purpose of performing permission checks: privileged processes and [[#Unprivileged_Process|unprivileged processes]]. A privileged process is a process with its [[#Effective_User_ID|effective user ID]] is 0, referred to as superuser or root. | Traditional UNIX implementations distinguish two categories of processes for the purpose of performing permission checks: privileged processes and [[#Unprivileged_Process|unprivileged processes]]. A privileged process is a process with its [[#Effective_User_ID|effective user ID]] is 0, referred to as superuser or root. Privileged processes bypass all kernel permission checks. | ||
=Unprivileged Process= | =Unprivileged Process= |
Revision as of 21:28, 1 March 2021
Internal
Privileged Process
Traditional UNIX implementations distinguish two categories of processes for the purpose of performing permission checks: privileged processes and unprivileged processes. A privileged process is a process with its effective user ID is 0, referred to as superuser or root. Privileged processes bypass all kernel permission checks.
Unprivileged Process
An unprivileged process is a process with a non-zero its effective user ID.