access.2 (17906) | access.2 (20097) |
---|---|
1.\" Copyright (c) 1980, 1991, 1993 2.\" The Regents of the University of California. All rights reserved. 3.\" 4.\" Redistribution and use in source and binary forms, with or without 5.\" modification, are permitted provided that the following conditions 6.\" are met: 7.\" 1. Redistributions of source code must retain the above copyright 8.\" notice, this list of conditions and the following disclaimer. --- 16 unchanged lines hidden (view full) --- 25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30.\" SUCH DAMAGE. 31.\" 32.\" @(#)access.2 8.2 (Berkeley) 4/1/94 | 1.\" Copyright (c) 1980, 1991, 1993 2.\" The Regents of the University of California. All rights reserved. 3.\" 4.\" Redistribution and use in source and binary forms, with or without 5.\" modification, are permitted provided that the following conditions 6.\" are met: 7.\" 1. Redistributions of source code must retain the above copyright 8.\" notice, this list of conditions and the following disclaimer. --- 16 unchanged lines hidden (view full) --- 25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30.\" SUCH DAMAGE. 31.\" 32.\" @(#)access.2 8.2 (Berkeley) 4/1/94 |
33.\" $Id$ | 33.\" $Id: access.2,v 1.2 1996/08/29 21:23:53 wosch Exp $ |
34.\" 35.Dd April 1, 1994 36.Dt ACCESS 2 37.Os BSD 4 38.Sh NAME 39.Nm access 40.Nd check access permissions of a file or pathname 41.Sh SYNOPSIS --- 75 unchanged lines hidden (view full) --- 117points outside the process's allocated address space. 118.It Bq Er EIO 119An I/O error occurred while reading from or writing to the file system. 120.El 121.Sh SEE ALSO 122.Xr chmod 2 , 123.Xr stat 2 124.Sh STANDARDS | 34.\" 35.Dd April 1, 1994 36.Dt ACCESS 2 37.Os BSD 4 38.Sh NAME 39.Nm access 40.Nd check access permissions of a file or pathname 41.Sh SYNOPSIS --- 75 unchanged lines hidden (view full) --- 117points outside the process's allocated address space. 118.It Bq Er EIO 119An I/O error occurred while reading from or writing to the file system. 120.El 121.Sh SEE ALSO 122.Xr chmod 2 , 123.Xr stat 2 124.Sh STANDARDS |
125.Fn Access 126conforms to IEEE Std 1003.1-1988 127.Pq Dq Tn POSIX . | 125The 126.Fn access 127function call is expected to conform to 128.St -p1003.1-90 . |
128.Sh CAVEAT 129.Fn Access 130is a potential security hole and 131should never be used. 132.Sh HISTORY 133An 134.Fn access 135function call appeared in 136.At v7 . | 129.Sh CAVEAT 130.Fn Access 131is a potential security hole and 132should never be used. 133.Sh HISTORY 134An 135.Fn access 136function call appeared in 137.At v7 . |