home *** CD-ROM | disk | FTP | other *** search
/ IRIX Base Documentation 2002 November / SGI IRIX Base Documentation 2002 November.iso / usr / share / catman / p_man / cat2 / standard / access.z / access
Encoding:
Text File  |  2002-10-03  |  6.1 KB  |  133 lines

  1.  
  2.  
  3.  
  4. aaaacccccccceeeessssssss((((2222))))                                                            aaaacccccccceeeessssssss((((2222))))
  5.  
  6.  
  7.  
  8. NNNNAAAAMMMMEEEE
  9.      _aaaa_cccc_cccc_eeee_ssss_ssss - determine accessibility of a file
  10.  
  11. SSSSYYYYNNNNOOOOPPPPSSSSIIIISSSS
  12.      _####_iiii_nnnn_cccc_llll_uuuu_dddd_eeee _<<<<_uuuu_nnnn_iiii_ssss_tttt_dddd_...._hhhh_>>>>
  13.  
  14.      _iiii_nnnn_tttt _aaaa_cccc_cccc_eeee_ssss_ssss_((((_cccc_oooo_nnnn_ssss_tttt _cccc_hhhh_aaaa_rrrr _****_pppp_aaaa_tttt_hhhh_,,,, _iiii_nnnn_tttt _aaaa_mmmm_oooo_dddd_eeee_))))_;;;;
  15.  
  16. DDDDEEEESSSSCCCCRRRRIIIIPPPPTTTTIIIIOOOONNNN
  17.      _p_a_t_h points to a path name naming a file.  _aaaa_cccc_cccc_eeee_ssss_ssss checks the named file
  18.      for accessibility according to the bit pattern contained in _a_m_o_d_e, using
  19.      the real user ID in place of the effective user ID and the real group ID
  20.      in place of the effective group ID.  The bit pattern contained in _a_m_o_d_e
  21.      is constructed by an OR of the following constants (defined in
  22.      <_uuuu_nnnn_iiii_ssss_tttt_dddd_...._hhhh>):
  23.  
  24.           _RRRR______OOOO_KKKK      test for read permission
  25.           _WWWW______OOOO_KKKK      test for write permission
  26.           _XXXX______OOOO_KKKK      test for execute (search) permission
  27.           _FFFF______OOOO_KKKK      test for existence of file
  28.           _EEEE_XXXX______OOOO_KKKK          test for regular, executable file
  29.           _EEEE_FFFF_FFFF______OOOO_NNNN_LLLL_YYYY______OOOO_KKKK    test using effective IDs
  30.  
  31.      Note that successful checking of the _EEEE_XXXX______OOOO_KKKK file does not imply that the
  32.      _eeee_xxxx_eeee_cccc(2) system call will succeed on the file named by _p_a_t_h, since the
  33.      check succeeds if at least one execute bit is set;  there are also
  34.      additional checks made for execute permission by _eeee_xxxx_eeee_cccc.
  35.  
  36.      Access to the file is denied if one or more of the following are true:
  37.  
  38.      _EEEE_AAAA_CCCC_CCCC_EEEE_SSSS              Search permission is denied on a component of the
  39.                          path prefix.
  40.  
  41.      _EEEE_AAAA_CCCC_CCCC_EEEE_SSSS              Access permission is denied.
  42.  
  43.      _EEEE_AAAA_CCCC_CCCC_EEEE_SSSS              The file is not a regular file.
  44.  
  45.      _EEEE_FFFF_AAAA_UUUU_LLLL_TTTT              _p_a_t_h points outside the allocated address space for
  46.                          the process.
  47.  
  48.      _EEEE_IIII_NNNN_TTTT_RRRR               A signal was caught during the _aaaa_cccc_cccc_eeee_ssss_ssss system call.
  49.  
  50.      _EEEE_IIII_NNNN_VVVV_AAAA_LLLL              _a_m_o_d_e is invalid.
  51.  
  52.      _EEEE_LLLL_OOOO_OOOO_PPPP               Too many symbolic links were encountered in
  53.                          translating _p_a_t_h.
  54.  
  55.      _EEEE_MMMM_UUUU_LLLL_TTTT_IIII_HHHH_OOOO_PPPP           Components of _p_a_t_h require hopping to multiple remote
  56.                          machines.
  57.  
  58.  
  59.  
  60.  
  61.  
  62.  
  63.                                                                         PPPPaaaaggggeeee 1111
  64.  
  65.  
  66.  
  67.  
  68.  
  69.  
  70. aaaacccccccceeeessssssss((((2222))))                                                            aaaacccccccceeeessssssss((((2222))))
  71.  
  72.  
  73.  
  74.      _EEEE_NNNN_AAAA_MMMM_EEEE_TTTT_OOOO_OOOO_LLLL_OOOO_NNNN_GGGG        The length of the _p_a_t_h argument exceeds {_PPPP_AAAA_TTTT_HHHH______MMMM_AAAA_XXXX},
  75.                          or the length of a _p_a_t_h component exceeds {_NNNN_AAAA_MMMM_EEEE______MMMM_AAAA_XXXX}
  76.                          while ______PPPP_OOOO_SSSS_IIII_XXXX______NNNN_OOOO______TTTT_RRRR_UUUU_NNNN_CCCC is in effect.
  77.  
  78.      _EEEE_NNNN_OOOO_TTTT_DDDD_IIII_RRRR             A component of the path prefix is not a directory.
  79.  
  80.      _EEEE_NNNN_OOOO_EEEE_NNNN_TTTT              Read, write, or execute (search) permission is
  81.                          requested for a null path name.
  82.  
  83.      _EEEE_NNNN_OOOO_EEEE_NNNN_TTTT              The named file does not exist.
  84.  
  85.      _EEEE_NNNN_OOOO_LLLL_IIII_NNNN_KKKK             _p_a_t_h points to a remote machine and the link to that
  86.                          machine is no longer active.
  87.  
  88.      _EEEE_TTTT_IIII_MMMM_EEEE_DDDD_OOOO_UUUU_TTTT           The named file is located on a remote file system
  89.                          which is not available [see _iiii_nnnn_tttt_rrrr_oooo(2)].
  90.  
  91.      _EEEE_RRRR_OOOO_FFFF_SSSS               Write access is requested for a file on a read-only
  92.                          file system.
  93.  
  94. SSSSEEEEEEEE AAAALLLLSSSSOOOO
  95.      _cccc_hhhh_mmmm_oooo_dddd(2), _ssss_tttt_aaaa_tttt(2)
  96.      ``File Access Permission'' in _iiii_nnnn_tttt_rrrr_oooo(2)
  97.  
  98. DDDDIIIIAAAAGGGGNNNNOOOOSSSSTTTTIIIICCCCSSSS
  99.      If the requested access is permitted, a value of 0 is returned.
  100.      Otherwise, a value of -1 is returned and _eeee_rrrr_rrrr_nnnn_oooo is set to indicate the
  101.      error.
  102.  
  103.  
  104.  
  105.  
  106.  
  107.  
  108.  
  109.  
  110.  
  111.  
  112.  
  113.  
  114.  
  115.  
  116.  
  117.  
  118.  
  119.  
  120.  
  121.  
  122.  
  123.  
  124.  
  125.  
  126.  
  127.  
  128.  
  129.                                                                         PPPPaaaaggggeeee 2222
  130.  
  131.  
  132.  
  133.