RTFM ;-)
>From access(2) man page:
The check is done with the process's real uid and gid,
rather than with the effective ids as is done when actu-
ally attempting an operation. This is to allow set-UID
programs to easily determine the invoking user's author-
ity.
--- Henrik Nordström - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.rutgers.edu