Real and effective IDs

We understand from the preceding section that both the shared object that is being worked upon (here, the file myfile) and the process that is performing some access (rwx) on the object (here, the echo process) matter in terms of permissions.

Let's zoom deeper into the process attributes with respect to the permissions model. So far, we have learned that each process is associated with a UID and a GID, thereby allowing the kernel to run its internal algorithms and determine whether access to a resource (or object) should be allowed.

If we look deeper, we find that each process UID is actually not a single integer value, but two values:

  • The Real User ID (RUID)
  • The Effective User ID (EUID)

Similarly, the group information ...

Get Hands-On System Programming with Linux now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.