1.\" Copyright (c) 1980, 1991, 1993 2.\" The Regents of the University of California. All rights reserved. 3.\" 4.\" Redistribution and use in source and binary forms, with or without 5.\" modification, are permitted provided that the following conditions 6.\" are met: 7.\" 1. Redistributions of source code must retain the above copyright 8.\" notice, this list of conditions and the following disclaimer. 9.\" 2. Redistributions in binary form must reproduce the above copyright 10.\" notice, this list of conditions and the following disclaimer in the 11.\" documentation and/or other materials provided with the distribution. 12.\" 3. Neither the name of the University nor the names of its contributors 13.\" may be used to endorse or promote products derived from this software 14.\" without specific prior written permission. 15.\" 16.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 17.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 18.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 19.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 20.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 21.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 22.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 23.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 24.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 25.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 26.\" SUCH DAMAGE. 27.\" 28.\" @(#)access.2 8.2 (Berkeley) 4/1/94 29.\" $FreeBSD$ 30.\" 31.Dd September 15, 2014 32.Dt ACCESS 2 33.Os 34.Sh NAME 35.Nm access , 36.Nm eaccess , 37.Nm faccessat 38.Nd check accessibility of a file 39.Sh LIBRARY 40.Lb libc 41.Sh SYNOPSIS 42.In unistd.h 43.Ft int 44.Fn access "const char *path" "int mode" 45.Ft int 46.Fn eaccess "const char *path" "int mode" 47.Ft int 48.Fn faccessat "int fd" "const char *path" "int mode" "int flag" 49.Sh DESCRIPTION 50The 51.Fn access 52and 53.Fn eaccess 54system calls check the accessibility of the 55file named by 56the 57.Fa path 58argument 59for the access permissions indicated by 60the 61.Fa mode 62argument. 63The value of 64.Fa mode 65is either the bitwise-inclusive OR of the access permissions to be 66checked 67.Dv ( R_OK 68for read permission, 69.Dv W_OK 70for write permission, and 71.Dv X_OK 72for execute/search permission), 73or the existence test 74.Pq Dv F_OK . 75.Pp 76For additional information, see the 77.Sx "File Access Permission" 78section of 79.Xr intro 2 . 80.Pp 81The 82.Fn eaccess 83system call uses 84the effective user ID and the group access list 85to authorize the request; 86the 87.Fn access 88system call uses 89the real user ID in place of the effective user ID, 90the real group ID in place of the effective group ID, 91and the rest of the group access list. 92.Pp 93The 94.Fn faccessat 95system call is equivalent to 96.Fn access 97except in the case where 98.Fa path 99specifies a relative path. 100In this case the file whose accessibility is to be determined is 101located relative to the directory associated with the file descriptor 102.Fa fd 103instead of the current working directory. 104If 105.Fn faccessat 106is passed the special value 107.Dv AT_FDCWD 108in the 109.Fa fd 110parameter, the current working directory is used and the behavior is 111identical to a call to 112.Fn access . 113Values for 114.Fa flag 115are constructed by a bitwise-inclusive OR of flags from the following 116list, defined in 117.In fcntl.h : 118.Bl -tag -width indent 119.It Dv AT_EACCESS 120The checks for accessibility are performed using the effective user and group 121IDs instead of the real user and group ID as required in a call to 122.Fn access . 123.El 124.Pp 125Even if a process's real or effective user has appropriate privileges 126and indicates success for 127.Dv X_OK , 128the file may not actually have execute permission bits set. 129Likewise for 130.Dv R_OK 131and 132.Dv W_OK . 133.Sh RETURN VALUES 134.Rv -std 135.Sh ERRORS 136.Fn access , 137.Fn eaccess , 138or 139.Fn faccessat 140will fail if: 141.Bl -tag -width Er 142.It Bq Er EINVAL 143The value of the 144.Fa mode 145argument is invalid. 146.It Bq Er ENOTDIR 147A component of the path prefix is not a directory. 148.It Bq Er ENAMETOOLONG 149A component of a pathname exceeded 255 characters, 150or an entire path name exceeded 1023 characters. 151.It Bq Er ENOENT 152The named file does not exist. 153.It Bq Er ELOOP 154Too many symbolic links were encountered in translating the pathname. 155.It Bq Er EROFS 156Write access is requested for a file on a read-only file system. 157.It Bq Er ETXTBSY 158Write access is requested for a pure procedure (shared text) 159file presently being executed. 160.It Bq Er EACCES 161Permission bits of the file mode do not permit the requested 162access, or search permission is denied on a component of the 163path prefix. 164.It Bq Er EFAULT 165The 166.Fa path 167argument 168points outside the process's allocated address space. 169.It Bq Er EIO 170An I/O error occurred while reading from or writing to the file system. 171.El 172.Pp 173Also, the 174.Fn faccessat 175system call may fail if: 176.Bl -tag -width Er 177.It Bq Er EBADF 178The 179.Fa path 180argument does not specify an absolute path and the 181.Fa fd 182argument is 183neither 184.Dv AT_FDCWD 185nor a valid file descriptor. 186.It Bq Er EINVAL 187The value of the 188.Fa flag 189argument is not valid. 190.It Bq Er ENOTDIR 191The 192.Fa path 193argument is not an absolute path and 194.Fa fd 195is neither 196.Dv AT_FDCWD 197nor a file descriptor associated with a directory. 198.El 199.Sh SEE ALSO 200.Xr chmod 2 , 201.Xr intro 2 , 202.Xr stat 2 203.Sh STANDARDS 204The 205.Fn access 206system call is expected to conform to 207.St -p1003.1-90 . 208The 209.Fn faccessat 210system call follows The Open Group Extended API Set 2 specification. 211.Sh HISTORY 212The 213.Fn access 214function appeared in 215.At v7 . 216The 217.Fn faccessat 218system call appeared in 219.Fx 8.0 . 220.Sh SECURITY CONSIDERATIONS 221The 222.Fn access 223system call 224is a potential security hole due to race conditions and 225should never be used. 226Set-user-ID and set-group-ID applications should restore the 227effective user or group ID, 228and perform actions directly rather than use 229.Fn access 230to simulate access checks for the real user or group ID. 231The 232.Fn eaccess 233system call 234likewise may be subject to races if used inappropriately. 235.Pp 236.Fn access 237remains useful for providing clues to users as to whether operations 238make sense for particular filesystem objects (e.g. 'delete' menu 239item only highlighted in a writable folder ... avoiding interpretation 240of the st_mode bits that the application might not understand -- 241e.g. in the case of AFS). 242It also allows a cheaper file existence test than 243.Xr stat 2 . 244