The function of linux uid is to identify a user, each user has a UID; there are three UID identifiers in Linux: 1. RUID, Real UID, actual user ID; 2. EUID, Effective UID, effective User ID; 3. SUID, Saved Set-user-ID, saved set user ID.
#The operating environment of this tutorial: linux5.9.8 system, Dell G3 computer.
What is the use of linux uid?
UID in Linux
In Linux, UID is used to identify a user (such as alice, bob, root)
In Android , UID is used to identify an application or system service
1. UID in Linux
1.1 Three UID values for each process
Each user has a UID.
The kernel maintains 3 UID identifications for each process. The three UID identifiers are RUID (Real UID, actual user ID) , EUID (Effective UID, effective user ID) , SUID (Saved Set-user-ID , saved settings user ID).
- RUID: Which user are we currently logged in as? The RUID of the process we run the program to generate is the UID of this user.
- EUID: refers to which UID the current process actually runs as . Under normal circumstances, EUID is equal to RUID; but if the executable file corresponding to the process has SUID permission (that is, the s of rws), then the EUID of the process is the UID## of the owner of the executable file. #.
- SUID: A copy of EUID, related to SUID permissions.
1.2 SUID permissions of binary files
Take the executable file passwd as an example. The permissions of the password file are:
-rwsr-xr-x The owner of passwd is root, but other users also have execution permissions for passwd, and passwd itself has SUID permissions (s of rws) .
Then, when a non-root user executes the passwd executable file, the EUID
of the generated process is the UID of the root user. In other words, in this case, the process generated actually runs the binary file with the ID of the root user.
SUID permissions are time-sensitive: is only valid during the execution of the file .
2. setuid and setresuid functions
##2.1 setuid functionFunction prototype: int setuid(uid_t uid);
In Linux, the execution steps of the setuid(uid) function are:
(1) If called by a Root privileged process (a process with EUID 0), set the RUID, EUID and SUID of the process. is uid, returns 0 (2) If called by a normal permission process, and uid is equal to RUID or uid is equal to SUID, set the EUID of the process to uid, and returns 0
(3) If called by a normal permission process , and uid is not equal to RUID or SUID, set errno to EPERM and return -1 (indicating execution failure)
In the above, the process of executing password, EUID is the UID of the owner of password, which is root The user's UID, which is 0. Therefore, it belongs to case (1). The
su file also has
-rwsr-xr-x permissions. Therefore, in Android, when a normal process initiates a shell process through Runtime.getRuntime().exec("su") to execute su, it also falls into the situation (1).
2.2 setresuid function
Reference https://blog.csdn.net/damotiansheng/article/details/39674115Function prototype: int setresuid(uid_t ruid, uid_t euid, uid_t suid);
When one of the following conditions
is met, setresuid is executed: ①The euid of the current process is root (AID_ROOT) ② Each of the three parameters ruid, euid, and suid is equal to a certain UID value of the current process
For example:
- then setresuid(200,300,100) can be executed because the original euid=0
-
If the current process's RUID=100, EUID=300, SUID=200 Then setresuid(200,300,100) can be executed, because these three parameters are all one of the current UID; - But setresuid(100,200,400) cannot be executed, because 400 is not equal to any of the current UID.
3. getuid and geteuid functions getuid returns the
RUID of the current process geteuid returns the of the current process EUID
Related recommendations: "
The above is the detailed content of What is the use of linux uid. For more information, please follow other related articles on the PHP Chinese website!

This tutorial demonstrates efficient keyword searching in Linux using the grep command family and related tools. It covers basic and advanced techniques, including regular expressions, recursive searches, and combining commands like awk, sed, and xa

This article details the multifaceted role of a Linux system administrator, encompassing system maintenance, troubleshooting, security, and collaboration. It highlights essential technical and soft skills, salary expectations, and diverse career pr

This article compares SELinux and AppArmor, Linux kernel security modules providing mandatory access control. It details their configuration, highlighting the differences in approach (policy-based vs. profile-based) and potential performance impacts

This article details Linux system backup and restoration methods. It compares full system image backups with incremental backups, discusses optimal backup strategies (regularity, multiple locations, versioning, testing, security, rotation), and da

The article explains how to use regular expressions (regex) in Linux for pattern matching, file searching, and text manipulation, detailing syntax, commands, and tools like grep, sed, and awk.

The article discusses using top, htop, and vmstat for monitoring Linux system performance, detailing their unique features and customization options for effective system management.

The article provides a guide on setting up two-factor authentication (2FA) for SSH on Linux using Google Authenticator, detailing installation, configuration, and troubleshooting steps. It highlights the security benefits of 2FA, such as enhanced sec

This article compares Linux commands (scp, sftp, rsync, ftp) for uploading files. It emphasizes security (favoring SSH-based methods) and efficiency, highlighting rsync's delta transfer capabilities for large files. The choice depends on file size,


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

SAP NetWeaver Server Adapter for Eclipse
Integrate Eclipse with SAP NetWeaver application server.

EditPlus Chinese cracked version
Small size, syntax highlighting, does not support code prompt function

Dreamweaver Mac version
Visual web development tools

Notepad++7.3.1
Easy-to-use and free code editor

VSCode Windows 64-bit Download
A free and powerful IDE editor launched by Microsoft
