Linux compatibility
How Peios projects Linux credentials from tokens and neutralizes DAC so the token-based security model governs all access.
ConceptWhy UID 0 carries no security authority on Peios and how specific privileges replace root's monolithic powers.
How-toRunning unmodified Linux applications on Peios, handling root-refusing software, and diagnosing UID-related differences.
ConceptHow Peios projects token identity onto Linux UID/GID surfaces, why getuid and current_fsuid can return different numbers during impersonation, and why fsuid is the trustworthy view of effective identity.
ConceptHow the Linux setuid family, the setuid bit on exec, and PR_SET_NO_NEW_PRIVS behave on Peios — all the calls that traditionally mutate identity, all of them either silently no-op or cosmetically present-and-not-authoritative.
ConceptHow Peios reinterprets the 41 Linux capabilities — which are always allowed (DAC bypass), which map to a Peios Privilege, and which are denied outright.