accessx()--Determine File Accessibility for a Class of Users


  Syntax
 #include <unistd.h>

 int accessx(const char *path, int amode, int who);  
  Service Program Name: QP0LLIB1

  Default Public Authority: *USE

  Threadsafe: Conditional; see Usage Notes.

The accessx() function determines whether a file can be accessed by a specified class of users in a particular manner. The caller must have authority to all components in the path name prefix. Adopted authority is not used.


Parameters

path
(Input) A pointer to the null-terminated path name for the file to be checked for accessibility.

This parameter is assumed to be represented in the CCSID (coded character set identifier) currently in effect for the job. If the CCSID of the job is 65535, this parameter is assumed to be represented in the default CCSID of the job.

const char *path is the name of the file whose accessibility you want to determine. If the named file is a symbolic link, accessx() resolves the symbolic link.

See QlgAccessx-- Determine File Accessibility for Class of Users (using NLS-enabled path name) for a description and an example of supplying the path in any CCSID.


amode
(Input) A bitwise representation of the access permissions to be checked.

The following symbols, which are defined in the <unistd.h> header file, can be used in amode:

F_OK
(x'00') Tests whether the file exists
R_OK
(x'04') Tests whether the file can be accessed for reading
W_OK
(x'02') Tests whether the file can be accessed for writing
X_OK
(x'01') Tests whether the file can be accessed for execution

You can take the bitwise inclusive OR of any or all of the last three symbols to test several access modes at once. If you are using F_OK to test for the existence of the file, you cannot use OR with any of the other symbols. If any other bits are set in amode, accessx() returns the [EINVAL] error.


who
(Input) The class of users whose authority is to be checked.

The following symbols, which are defined in the <unistd.h> header file, can be used in who:

ACC_SELF
(x'00') Determines if specified access is permitted for the current thread. The effective user and group IDs are used.

Note: If the real and effective user ID are the same and the real and effective group ID are the same, the request is treated as ACC_INVOKER. See the Usage Notes for more details.

ACC_INVOKER
(x'01') Determines if specified access is permitted for the current thread. The real user and group IDs are used.

Note: The expression access(path, amode) is equivalent to accessx(path, amode, ACC_INVOKER)

ACC_OTHERS
(x'08') Determines if specified access is permitted for any user other than the object owner. Only one of R_OK, W_OK, and X_OK is permitted when who is ACC_OTHERS. Privileged users (users with *ALLOBJ special authority) are not considered in this check.

ACC_ALL
(x'20') Determines if specified access is permitted for all users. Only one of R_OK, W_OK, and X_OK is permitted when who is ACC_ALL. Privileged users (users with *ALLOBJ special authority) are not considered in this check.

Authorities


Authorization Required to Path Prefix for accessx()

Object Referred to Authority Required errno
Each directory in the path name preceding the object to be tested *X EACCES

The following authorities are required if the who parameter is ACC_SELF or ACC_INVOKER. If ACC_SELF is specified, the effective UID and GID of the caller are used. If ACC_INVOKER is used, the real UID and GID of the caller are used.

Authorization Required to Object for accessx()

Object Referred to Authority Required errno
Object when R_OK is specified *R EACCES
Object when W_OK is specified *W EACCES
Object when X_OK is specified *X EACCES
Object when R_OK | W_OK is specified *RW EACCES
Object when R_OK | X_OK is specified *RX EACCES
Object when W_OK | X_OK is specified *WX EACCES
Object when R_OK | W_OK | X_OK is specified *RWX EACCES
Object when F_OK is specified None None

If the thread has *ALLOBJ special authority, accessx() with ACC_SELF or ACC_INVOKER will indicate success for R_OK, W_OK, or X_OK even if none of the permission bits are set.


Return Value

0
accessx() was successful.
-1
accessx() was not successful (or the specified access is not permitted for the class of users being checked). The errno global variable is set to indicate the error.

Error Conditions

If access() is not successful, errno usually indicates one of the following errors. Under some conditions, errno could indicate an error other than those listed here.

Error condition Additional information
[EACCES]

The class of users specified by the who parameter does not have the permission indicated by the amode parameter.

If you are accessing a remote file through the Network File System, update operations to file permissions at the server are not reflected at the client until updates to data that is stored locally by the Network File System take place. (Several options on the Add Mounted File System (ADDMFS) command determine the time between refresh operations of local data.) Access to a remote file may also fail due to different mappings of user IDs (UID) or group IDs (GID) on the local and remote systems.

[EAGAIN]  
[EBADFID]  
[EBADNAME]  
[EBUSY]  
[ECONVERT]  
[EDAMAGE]  
[EFAULT]  
[EFILECVT]  
[EINVAL]  
[EIO]  
[EINTR]  
[ELOOP]  
[ENAMETOOLONG]  
[ENOENT]  
[ENOSPC]  
[ENOTAVAIL]  
[ENOTDIR]  
[ENOTSAFE]  
[ENOTSUP]  
[EROOBJ]  
[ESTALE]

If you are accessing a remote file through the Network File System, the file may have been deleted at the server.

[ETXTBSY]  
[EUNKNOWN]  

If interaction with a file server is required to access the object, errno could indicate one of the following errors:

Error condition Additional information
[EADDRNOTAVAIL]  
[ECONNABORTED]  
[ECONNREFUSED]  
[ECONNRESET]  
[EHOSTDOWN]  
[EHOSTUNREACH]  
[ENETDOWN]  
[ENETRESET]  
[ENETUNREACH]  
[ESTALE]

If you are accessing a remote file through the Network File System, the file may have been deleted at the server.

[ETIMEDOUT]  
[EUNATCH]  


Error Messages

The following messages may be sent from this function:

Message ID Error Message Text
CPE3418 E Possible APAR condition or hardware failure.
CPFA0D4 E File system error occurred. Error number &1.
CPF3CF2 E Error(s) occurred during running of &1 API.
CPF9872 E Program or service program &1 in library &2 ended. Reason code &3.


Usage Notes

  1. This function will fail with error code [ENOTSAFE] when both of the following conditions occur:
  2. ACC_SELF Mapped to ACC_INVOKER

    Some physical file systems do not support ACC_SELF for the who parameter. Therefore, accessx() will change the who parameter from ACC_SELF to ACC_INVOKER if the caller's real and effective user ID are equal, and the caller's real and effective group ID are equal.


  3. Network File System Differences

    The Network File System will only support the value ACC_INVOKER for the who parameter. If accessx() is called on a file in a mounted Network File System directory with a value for who other than ACC_INVOKER, the call will return -1 and errno ENOTSUP. Note: If the value for who has been mapped from ACC_SELF to ACC_INVOKER as previously described, then ENOTSUP will not be returned.

    Local access to remote files through the Network File System may produce unexpected results due to conditions at the server. Once a file is open, subsequent requests to perform operations on the file can fail because file attributes are checked at the server on each request. If permissions on the file are made more restrictive at the server or the file is unlinked or made unavailable by the server for another client, your operation on an open file descriptor will fail when the local Network File System receives these updates. The local Network File System also impacts operations that retrieve file attributes. Recent changes at the server may not be available at your client yet, and old values may be returned from operations. (Several options on the Add Mounted File System (ADDMFS) command determine the time between refresh operations of local data.)


  4. QNTC File System Differences

    The QNTC File System will only support the value ACC_INVOKER for the who parameter. If accessx() is called on a file in the QNTC File System with a value for who other than ACC_INVOKER, the call will return -1 and errno ENOTSUP. Note: If the value for who has been mapped from ACC_SELF to ACC_INVOKER as previously described, then ENOTSUP will not be returned.


  5. QOPT File System Differences

    If the object exists on a volume formatted in Universal Disk Format (UDF), the authorization that is checked for the object and preceding directories in the path name follows the rules described in the previous table, Authorization Required to Object for accessx(). If the object exists on a volume formatted in some other media format, no authorization checks are made on the object or preceding directories. The volume authorization list is checked for the requested authority regardless of the volume media format.


  6. QFileSvr.400 File System Differences

    The QFileSvr.400 File System will only support the value ACC_INVOKER for the who parameter. If accessx() is called on a file in the QFileSvr.400 File System with a value for who other than ACC_INVOKER, the call will return -1 and errno ENOTSUP. Note: If the value for who has been mapped from ACC_SELF to ACC_INVOKER as previously described, then ENOTSUP will not be returned.



Related Information


Example

The following example determines how a file is accessed.

Note: By using the code examples, you agree to the terms of the Code license and disclaimer information.

#include <stdio.h>
#include <unistd.h>

main() {
  char path[]="/myfile";

  if (accessx(path, R_OK, ACC_OTHERS) == 0)
    printf("Someone besides the owner has read access to '%s'\n", path);
  if (accessx(path, W_OK, ACC_OTHERS) == 0)
    printf("Someone besides the owner has write access to '%s'\n", path);
  if (accessx(path, X_OK, ACC_OTHERS) == 0)
    printf("Someone besides the owner has search access to '%s'\n", path);
}

Output:

In this example accessx() was called on '/myfile'. The following would be the output if someone other than the owner has *R authority, someone besides the owner has *W authority, and noone other than the owner has *X authority.


Someone besides the owner has read access to '/'
Someone besides the owner has write access to '/'



API introduced: V5R2

[ Back to top | UNIX-Type APIs | APIs by category ]