What are root permissions in linux
In Linux, root authority is the highest management authority of the super administrator user; root authority can transcend any user and user group to read, modify or delete files or directories; Linux uses UID to distinguish user authority levels , the user with UID 0 is recognized by the system as having super permissions, that is, root permissions.
#The operating environment of this tutorial: linux7.3 system, Dell G3 computer.
What is the root permission of Linux?
Root permission is a type of system permission. It can be understood as the same concept as SYSTEM permission, but it is higher than Administrator permission. Root is in Linux and unix systems. The super administrator user account has supreme power over the entire system and can operate all objects.
In the Linux operating system, root has the highest authority and is also called the owner of super authority. . Operations that cannot be performed by ordinary users can be completed by the root user, so it is also called a super administrative user.
In the system, every file, directory and process belongs to a certain user. Without the user's permission, other ordinary users cannot operate it, except for root. The privileges of the root user are also reflected in the fact that root can transcend any user and user group to read, modify or delete files or directories (within the normal permission range of the system); execute and terminate executable programs; and modify hardware devices. Add, create and remove, etc.; You can also modify the owners and permissions of files and directories to suit the needs of system management (because root is the most privileged user in the system);
Understanding of super users and ordinary users;
What is a super user;
In all Linux systems, the system distinguishes user permission levels through UID, and UID is User 0 is agreed by the system to have super permissions. The super user has the highest authority agreed upon by the system to operate within the park, so the super user can complete all tools for system management; we can use /etc/passwd to find out that the user with UID 0 is root, and only the UID corresponding to root is is 0. From this point of view, the root user has irreplaceable supremacy and unlimited authority in the system. The root user is the super user in the system;
Understand the corresponding relationship between UID and user
When the system is installed by default, the system user and UID have a one-to-one relationship, that is to say, a UID corresponds to a user. We know that user identity is confirmed through UID. We mentioned in the explanation of UID in "Detailed Explanation of User and User Group Configuration Files" that "UID is the identifier for confirming user permissions. The user logs in to the system. The role of the user is realized through UID, not user name; it is dangerous for several users to share the same UID. For example, if we change the UID of the ordinary user to 0 and share the same UID with root, this will actually cause the system to break down. The confusion of management permissions. If we want to use root permissions, we can do it through su or sudo; we must not let a user share the same UID with root at will; "
Super user (permissions) in system management Role
What role does the super privileged user (user with UID 0) play in system management? Mainly reflected in the following two points;
1. Perform operations on any file, directory or process Operation;
But it is worth noting that this operation is within the highest permission range of the system; some operations cannot be completed even by root with super privileges;
For example, the /proc directory, / proc is used to reflect the real-time status information of the system running, so even root cannot do anything; its permissions are as follows
The code is as follows:
[root@localhost ~]# pwd /root [root@localhost ~]# cd / [root@localhost /]# ls -ld /proc/ dr-xr-xr-x 134 root root 0 2005-10-27 /proc/
It is this directory, which can only be read and executed permission, but there is absolutely no write permission; even if we open the write permission of the /proc directory to root, the root user cannot perform write operations;
The code is as follows:
[root@localhost ~]# chmod 755 /proc [root@localhost /]# ls -ld /proc/ drwxr-xr-x 134 root root 0 2005-10-27 /proc/ [root@localhost /]# cd /proc/ [root@localhost proc]# mkdir testdir
mkdir: Unable to create Directory 'testdir': No such file or directory
Recommended learning:Linux video tutorial
The above is the detailed content of What are root permissions in linux. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

DeepSeek is a powerful intelligent search and analysis tool that provides two access methods: web version and official website. The web version is convenient and efficient, and can be used without installation; the official website provides comprehensive product information, download resources and support services. Whether individuals or corporate users, they can easily obtain and analyze massive data through DeepSeek to improve work efficiency, assist decision-making and promote innovation.

There are many ways to install DeepSeek, including: compile from source (for experienced developers) using precompiled packages (for Windows users) using Docker containers (for most convenient, no need to worry about compatibility) No matter which method you choose, Please read the official documents carefully and prepare them fully to avoid unnecessary trouble.

Ouyi OKX, the world's leading digital asset exchange, has now launched an official installation package to provide a safe and convenient trading experience. The OKX installation package of Ouyi does not need to be accessed through a browser. It can directly install independent applications on the device, creating a stable and efficient trading platform for users. The installation process is simple and easy to understand. Users only need to download the latest version of the installation package and follow the prompts to complete the installation step by step.

BITGet is a cryptocurrency exchange that provides a variety of trading services including spot trading, contract trading and derivatives. Founded in 2018, the exchange is headquartered in Singapore and is committed to providing users with a safe and reliable trading platform. BITGet offers a variety of trading pairs, including BTC/USDT, ETH/USDT and XRP/USDT. Additionally, the exchange has a reputation for security and liquidity and offers a variety of features such as premium order types, leveraged trading and 24/7 customer support.

Gate.io is a popular cryptocurrency exchange that users can use by downloading its installation package and installing it on their devices. The steps to obtain the installation package are as follows: Visit the official website of Gate.io, click "Download", select the corresponding operating system (Windows, Mac or Linux), and download the installation package to your computer. It is recommended to temporarily disable antivirus software or firewall during installation to ensure smooth installation. After completion, the user needs to create a Gate.io account to start using it.

Ouyi, also known as OKX, is a world-leading cryptocurrency trading platform. The article provides a download portal for Ouyi's official installation package, which facilitates users to install Ouyi client on different devices. This installation package supports Windows, Mac, Android and iOS systems. Users can choose the corresponding version to download according to their device type. After the installation is completed, users can register or log in to the Ouyi account, start trading cryptocurrencies and enjoy other services provided by the platform.

Solution to permission issues when viewing Python version in Linux terminal When you try to view Python version in Linux terminal, enter python...

How to automatically set the permissions of unixsocket after the system restarts. Every time the system restarts, we need to execute the following command to modify the permissions of unixsocket: sudo...
