Provided by: manpages-posix-dev_2017a-2_all bug

PROLOG

       This  manual  page  is part of the POSIX Programmer's Manual.  The Linux implementation of this interface
       may differ (consult the corresponding Linux manual page for details of Linux behavior), or the  interface
       may not be implemented on Linux.

NAME

       access, faccessat — determine accessibility of a file descriptor

SYNOPSIS

       #include <unistd.h>

       int access(const char *path, int amode);

       #include <fcntl.h>

       int faccessat(int fd, const char *path, int amode, int flag);

DESCRIPTION

       The  access()  function  shall  check  the file named by the pathname pointed to by the path argument for
       accessibility according to the bit pattern contained in amode.  The checks for  accessibility  (including
       directory  permissions  checked  during pathname resolution) shall be performed using the real user ID in
       place of the effective user ID and the real group ID in place of the effective group ID.

       The value of amode is either the bitwise-inclusive OR of the access  permissions  to  be  checked  (R_OK,
       W_OK, X_OK) or the existence test (F_OK).

       If  any  access  permissions  are  checked,  each shall be checked individually, as described in the Base
       Definitions volume of POSIX.1‐2017,  Section  4.5,  File  Access  Permissions,  except  that  where  that
       description refers to execute permission for a process with appropriate privileges, an implementation may
       indicate success for X_OK even if execute permission is not granted to any user.

       The  faccessat()  function,  when  called  with a flag value of zero, shall be equivalent to the access()
       function, except in the case where  path  specifies  a  relative  path.  In  this  case  the  file  whose
       accessibility  is  to  be  determined shall be located relative to the directory associated with the file
       descriptor fd instead of the current working directory.  If the access mode of the open file  description
       associated  with the file descriptor is not O_SEARCH, the function shall check whether directory searches
       are permitted using the current permissions of the directory underlying  the  file  descriptor.   If  the
       access mode is O_SEARCH, the function shall not perform the check.

       If  faccessat()  is  passed the special value AT_FDCWD in the fd parameter, the current working directory
       shall be used and, if flag is zero, the behavior shall be identical to a call to access().

       Values for flag are constructed by a bitwise-inclusive OR of flags from the following  list,  defined  in
       <fcntl.h>:

       AT_EACCESS  The  checks  for  accessibility  (including  directory  permissions  checked  during pathname
                   resolution) shall be performed using the effective user ID and group ID instead of  the  real
                   user ID and group ID as required in a call to access().

RETURN VALUE

       Upon  successful  completion,  these functions shall return 0. Otherwise, these functions shall return -1
       and set errno to indicate the error.

ERRORS

       These functions shall fail if:

       EACCES Permission bits of the file mode do not permit the  requested  access,  or  search  permission  is
              denied on a component of the path prefix.

       ELOOP  A loop exists in symbolic links encountered during resolution of the path argument.

       ENAMETOOLONG
              The length of a component of a pathname is longer than {NAME_MAX}.

       ENOENT A component of path does not name an existing file or path is an empty string.

       ENOTDIR
              A  component  of the path prefix names an existing file that is neither a directory nor a symbolic
              link to a directory, or the path argument contains at least one  non-<slash>  character  and  ends
              with  one  or  more  trailing <slash> characters and the last pathname component names an existing
              file that is neither a directory nor a symbolic link to a directory.

       EROFS  Write access is requested for a file on a read-only file system.

       The faccessat() function shall fail if:

       EACCES The access mode of the  open  file  description  associated  with  fd  is  not  O_SEARCH  and  the
              permissions of the directory underlying fd do not permit directory searches.

       EBADF  The  path argument does not specify an absolute path and the fd argument is neither AT_FDCWD nor a
              valid file descriptor open for reading or searching.

       ENOTDIR
              The path argument is not an absolute path and fd is a  file  descriptor  associated  with  a  non-
              directory file.

       These functions may fail if:

       EINVAL The value of the amode argument is invalid.

       ELOOP  More than {SYMLOOP_MAX} symbolic links were encountered during resolution of the path argument.

       ENAMETOOLONG
              The length of a pathname exceeds {PATH_MAX}, or pathname resolution of a symbolic link produced an
              intermediate result with a length that exceeds {PATH_MAX}.

       ETXTBSY
              Write access is requested for a pure procedure (shared text) file that is being executed.

       The faccessat() function may fail if:

       EINVAL The value of the flag argument is not valid.

       The following sections are informative.

EXAMPLES

   Testing for the Existence of a File
       The following example tests whether a file named myfile exists in the /tmp directory.

           #include <unistd.h>
           ...
           int result;
           const char *pathname = "/tmp/myfile";

           result = access (pathname, F_OK);

APPLICATION USAGE

       Use  of  these  functions  is discouraged since by the time the returned information is acted upon, it is
       out-of-date. (That is, acting upon the information always leads to  a  time-of-check-to-time-of-use  race
       condition.)  An  application  should instead attempt the action itself and handle the [EACCES] error that
       occurs if the file is not accessible (with a change of effective  user  and  group  IDs  beforehand,  and
       perhaps  a change back afterwards, in the case where access() or faccessat() without AT_EACCES would have
       been used.)

       Historically, one of the uses of access() was in set-user-ID root programs  to  check  whether  the  user
       running  the  program  had  access to a file. This relied on ``super-user'' privileges which were granted
       based on the effective user ID being zero, so  that  when  access()  used  the  real  user  ID  to  check
       accessibility  those  privileges  were  not  taken into account. On newer systems where privileges can be
       assigned which have no association with user or group IDs,  if  a  program  with  such  privileges  calls
       access(),  the change of IDs has no effect on the privileges and therefore they are taken into account in
       the accessibility checks. Thus, access() (and faccessat()  with  flag  zero)  cannot  be  used  for  this
       historical  purpose  in  such  programs.  Likewise, if a system provides any additional or alternate file
       access control mechanisms that are not user ID-based, they will still be taken into account.

       If a relative pathname is used, no account is taken of whether the current directory  (or  the  directory
       associated  with  the  file  descriptor  fd)  is accessible via any absolute pathname. Applications using
       access(), or faccessat() without AT_EACCES, may consequently act as if the file would be accessible to  a
       user  with the real user ID and group ID of the process when such a user would not in practice be able to
       access the file because access would be denied  at  some  point  above  the  current  directory  (or  the
       directory associated with the file descriptor fd) in the file hierarchy.

       If  access()  or  faccessat()  is  used  with W_OK to check for write access to a directory which has the
       S_ISVTX bit set, a return value indicating the  directory  is  writable  can  be  misleading  since  some
       operations  on  files  in the directory would not be permitted based on the ownership of those files (see
       the Base Definitions volume of POSIX.1‐2017, Section 4.3, Directory Protection).

       Additional values of amode other than the set defined in the description may be valid; for example, if  a
       system has extended access controls.

       The use of the AT_EACCESS value for flag enables functionality not available in access().

RATIONALE

       In  early  proposals,  some  inadequacies  in  the  access() function led to the creation of an eaccess()
       function because:

        1. Historical implementations of access() do not test file access correctly when the process' real  user
           ID  is  superuser.  In  particular,  they always return zero when testing execute permissions without
           regard to whether the file is executable.

        2. The superuser has complete access to all files on a system. As a consequence, programs started by the
           superuser and switched to the effective user ID with lesser privileges cannot use  access()  to  test
           their file access permissions.

       However,  the  historical model of eaccess() does not resolve problem (1), so this volume of POSIX.1‐2017
       now allows access() to behave in the desired way  because  several  implementations  have  corrected  the
       problem.  It  was  also argued that problem (2) is more easily solved by using open(), chdir(), or one of
       the exec functions as appropriate and responding to the error, rather than creating a new  function  that
       would not be as reliable. Therefore, eaccess() is not included in this volume of POSIX.1‐2017.

       The sentence concerning appropriate privileges and execute permission bits reflects the two possibilities
       implemented by historical implementations when checking superuser access for X_OK.

       New  implementations  are discouraged from returning X_OK unless at least one execution permission bit is
       set.

       The purpose of the faccessat() function is to enable the  checking  of  the  accessibility  of  files  in
       directories other than the current working directory without exposure to race conditions. Any part of the
       path  of a file could be changed in parallel to a call to access(), resulting in unspecified behavior. By
       opening a file descriptor for the  target  directory  and  using  the  faccessat()  function  it  can  be
       guaranteed that the file tested for accessibility is located relative to the desired directory.

FUTURE DIRECTIONS

       These  functions may be formally deprecated (for example, by shading them OB) in a future version of this
       standard.

SEE ALSO

       chmod(), fstatat()

       The Base Definitions volume of POSIX.1‐2017, Section 4.5, File Access Permissions, <fcntl.h>, <unistd.h>

COPYRIGHT

       Portions of this text are reprinted and reproduced in electronic form from IEEE Std 1003.1-2017, Standard
       for Information  Technology  --  Portable  Operating  System  Interface  (POSIX),  The  Open  Group  Base
       Specifications  Issue  7, 2018 Edition, Copyright (C) 2018 by the Institute of Electrical and Electronics
       Engineers, Inc and The Open Group.  In the event of any discrepancy between this version and the original
       IEEE and The Open Group Standard, the original IEEE and The Open Group Standard is the referee  document.
       The original Standard can be obtained online at http://www.opengroup.org/unix/online.html .

       Any  typographical  or formatting errors that appear in this page are most likely to have been introduced
       during  the  conversion  of  the  source  files  to  man  page  format.  To  report  such   errors,   see
       https://www.kernel.org/doc/man-pages/reporting_bugs.html .

IEEE/The Open Group                                   2017                                        ACCESS(3POSIX)