File: access.c

package info (click to toggle)
glibc 2.28-10
  • links: PTS, VCS
  • area: main
  • in suites: buster, buster-backports
  • size: 272,168 kB
  • sloc: ansic: 1,008,602; asm: 259,607; makefile: 11,271; sh: 10,477; python: 6,910; cpp: 4,992; perl: 2,258; awk: 2,005; yacc: 290; pascal: 182; sed: 73
file content (82 lines) | stat: -rw-r--r-- 2,358 bytes parent folder | download | duplicates (19)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
/* Copyright (C) 2009 Free Software Foundation, Inc.
   This file is part of the GNU C Library.

   The GNU C Library is free software; you can redistribute it and/or
   modify it under the terms of the GNU Lesser General Public
   License as published by the Free Software Foundation; either
   version 2.1 of the License, or (at your option) any later version.

   The GNU C Library is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
   Lesser General Public License for more details.

   You should have received a copy of the GNU Lesser General Public
   License along with the GNU C Library; if not, write to the Free
   Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA
   02111-1307 USA.  */

#include <errno.h>
#include <fcntl.h>
#include <stddef.h>
#include <stdio.h>
#include <string.h>
#include <unistd.h>
#include <sys/types.h>
#include <sys/user.h>
#include <sysdep.h>

/*
   The FreeBSD kernel do not test file access correctly when the 
   process' real user ID is superuser. In particular, they always return
   zero when testing execute permissions without regard to whether the 
   file is executable.

   While this behaviour conforms to POSIX.1-2008, it is explicitely 
   discouraged. This wrapper implements the recommended behaviour.
 */

extern int __syscall_access (const char *path, int mode);
libc_hidden_proto (__syscall_access)

int
__access (const char *path, int mode)
{
  struct stat64 stats;

  if ((__getuid() != 0) || !(mode & X_OK))
    return __syscall_access (path, mode);

  /* Althought the super-user can read and write any file, 
     the file-system might be i.e. read-only. Do the check. */
     
  if (__syscall_access (path, mode))
    return -1;
    
  if (stat64 (path, &stats))
    return -1;

  /* The super-user can execute any file that anyone can execute. */
  if (stats.st_mode & (S_IXUSR | S_IXGRP | S_IXOTH))
    return 0;

  __set_errno (EACCES);
  return -1;
}


/* Test for access to FILE by our real user and group IDs without setting
   errno.  */
int
__access_noerrno (const char *file, int type)
{
  int ret;
  int saved_errno = errno;

  ret = __access (file, type);

  __set_errno(saved_errno);
  return ret;
}

weak_alias (__access, access)