search
What is the use of linux uidMar 13, 2023 am 09:40 AM
linux uid

The function of linux uid is to identify a user, each user has a UID; there are three UID identifiers in Linux: 1. RUID, Real UID, actual user ID; 2. EUID, Effective UID, effective User ID; 3. SUID, Saved Set-user-ID, saved set user ID.

What is the use of linux uid

#The operating environment of this tutorial: linux5.9.8 system, Dell G3 computer.

What is the use of linux uid?

UID in Linux

In Linux, UID is used to identify a user (such as alice, bob, root)
In Android , UID is used to identify an application or system service

1. UID in Linux

1.1 Three UID values ​​for each process

Each user has a UID.

The kernel maintains 3 UID identifications for each process. The three UID identifiers are RUID (Real UID, actual user ID) , EUID (Effective UID, effective user ID) , SUID (Saved Set-user-ID , saved settings user ID).

  • RUID: Which user are we currently logged in as? The RUID of the process we run the program to generate is the UID of this user.
  • EUID: refers to which UID the current process actually runs as . Under normal circumstances, EUID is equal to RUID; but if the executable file corresponding to the process has SUID permission (that is, the s of rws), then the EUID of the process is the UID## of the owner of the executable file. #.
  • SUID: A copy of EUID, related to SUID permissions.

1.2 SUID permissions of binary files

Take the executable file passwd as an example.

The permissions of the password file are:
-rwsr-xr-x The owner of passwd is root, but other users also have execution permissions for passwd, and passwd itself has SUID permissions (s of rws) .
Then, when a non-root user executes the passwd executable file, the EUID
of the generated process is the UID of the root user. In other words, in this case, the process generated actually runs the binary file with the ID of the root user.

It should be noted that

SUID permissions are time-sensitive: is only valid during the execution of the file .

2. setuid and setresuid functions

##2.1 setuid functionFunction prototype: int setuid(uid_t uid);

In Linux, the execution steps of the setuid(uid) function are:

(1) If called by a Root privileged process (a process with EUID 0), set the RUID, EUID and SUID of the process. is uid, returns 0

(2) If called by a normal permission process, and uid is equal to RUID or uid is equal to SUID, set the EUID of the process to uid, and returns 0
(3) If called by a normal permission process , and uid is not equal to RUID or SUID, set errno to EPERM and return -1 (indicating execution failure)

In the above, the process of executing password, EUID is the UID of the owner of password, which is root The user's UID, which is 0. Therefore, it belongs to case (1). The

su file also has

-rwsr-xr-x

permissions. Therefore, in Android, when a normal process initiates a shell process through Runtime.getRuntime().exec("su") to execute su, it also falls into the situation (1).

2.2 setresuid function

Reference https://blog.csdn.net/damotiansheng/article/details/39674115

Function prototype: int setresuid(uid_t ruid, uid_t euid, uid_t suid);

When one of the following conditions

is met, setresuid is executed: ①The euid of the current process is root (AID_ROOT) ② Each of the three parameters ruid, euid, and suid is equal to a certain UID value of the current process

For example:

If the current process RUID=100, EUID=0, SUID=300
    then setresuid(200,300,100) can be executed because the original euid=0

  • If the current process's RUID=100, EUID=300, SUID=200
  • Then setresuid(200,300,100) can be executed, because these three parameters are all one of the current UID;
  • But setresuid(100,200,400) cannot be executed, because 400 is not equal to any of the current UID.

3. getuid and geteuid functions getuid returns the

RUID of the current process

geteuid returns the of the current process EUID
Related recommendations: "

Linux Video Tutorial

"

The above is the detailed content of What is the use of linux uid. For more information, please follow other related articles on the PHP Chinese website!

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Tutorial on finding keywords for common Linux commandsTutorial on finding keywords for common Linux commandsMar 05, 2025 am 11:45 AM

This tutorial demonstrates efficient keyword searching in Linux using the grep command family and related tools. It covers basic and advanced techniques, including regular expressions, recursive searches, and combining commands like awk, sed, and xa

Work content of Linux operation and maintenance engineers What does Linux operation and maintenance engineers do?Work content of Linux operation and maintenance engineers What does Linux operation and maintenance engineers do?Mar 05, 2025 am 11:37 AM

This article details the multifaceted role of a Linux system administrator, encompassing system maintenance, troubleshooting, security, and collaboration. It highlights essential technical and soft skills, salary expectations, and diverse career pr

How do I configure SELinux or AppArmor to enhance security in Linux?How do I configure SELinux or AppArmor to enhance security in Linux?Mar 12, 2025 pm 06:59 PM

This article compares SELinux and AppArmor, Linux kernel security modules providing mandatory access control. It details their configuration, highlighting the differences in approach (policy-based vs. profile-based) and potential performance impacts

How do I back up and restore a Linux system?How do I back up and restore a Linux system?Mar 12, 2025 pm 07:01 PM

This article details Linux system backup and restoration methods. It compares full system image backups with incremental backups, discusses optimal backup strategies (regularity, multiple locations, versioning, testing, security, rotation), and da

How do I use regular expressions (regex) in Linux for pattern matching?How do I use regular expressions (regex) in Linux for pattern matching?Mar 17, 2025 pm 05:25 PM

The article explains how to use regular expressions (regex) in Linux for pattern matching, file searching, and text manipulation, detailing syntax, commands, and tools like grep, sed, and awk.

How do I monitor system performance in Linux using tools like top, htop, and vmstat?How do I monitor system performance in Linux using tools like top, htop, and vmstat?Mar 17, 2025 pm 05:28 PM

The article discusses using top, htop, and vmstat for monitoring Linux system performance, detailing their unique features and customization options for effective system management.

How do I implement two-factor authentication (2FA) for SSH in Linux?How do I implement two-factor authentication (2FA) for SSH in Linux?Mar 17, 2025 pm 05:31 PM

The article provides a guide on setting up two-factor authentication (2FA) for SSH on Linux using Google Authenticator, detailing installation, configuration, and troubleshooting steps. It highlights the security benefits of 2FA, such as enhanced sec

Methods for uploading files for common Linux commandsMethods for uploading files for common Linux commandsMar 05, 2025 am 11:42 AM

This article compares Linux commands (scp, sftp, rsync, ftp) for uploading files. It emphasizes security (favoring SSH-based methods) and efficiency, highlighting rsync's delta transfer capabilities for large files. The choice depends on file size,

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
2 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
Repo: How To Revive Teammates
1 months agoBy尊渡假赌尊渡假赌尊渡假赌
Hello Kitty Island Adventure: How To Get Giant Seeds
4 weeks agoBy尊渡假赌尊渡假赌尊渡假赌

Hot Tools

SAP NetWeaver Server Adapter for Eclipse

SAP NetWeaver Server Adapter for Eclipse

Integrate Eclipse with SAP NetWeaver application server.

EditPlus Chinese cracked version

EditPlus Chinese cracked version

Small size, syntax highlighting, does not support code prompt function

Dreamweaver Mac version

Dreamweaver Mac version

Visual web development tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

VSCode Windows 64-bit Download

VSCode Windows 64-bit Download

A free and powerful IDE editor launched by Microsoft