NAME | SYNOPSIS | DESCRIPTION | RETURN VALUES | ERRORS | SUMMARY OF TRUSTED SOLARIS CHANGES | SEE ALSO
#include <sys/types.h> #include <unistd.h>offset_t llseek(int fildes, offset_t offset, int whence);
The llseek() function sets the 64-bit extended file pointer associated with the open file descriptor specified by fildes as follows:
If whence is SEEK_SET, the pointer is set to offset bytes.
If whence is SEEK_CUR, the pointer is set to its current location plus offset.
If whence is SEEK_END, the pointer is set to the size of the file plus offset.
On success, llseek() returns the resulting pointer location, measured in bytes from the beginning of the file.
Discretionary access checks have already been performed when fildes was opened.
Most mandatory access checks
have already been performed when fildes was opened. If fildes is open for writing, a check is made that the calling process has mandatory read access in case fildes is open for a write-up. The calling process may assert the PRIV_FILE_MAC_READ
privilege to bypass this check. If mandatory read access is not granted, this system call succeeds, but offset data is not returned.
Upon successful completion, llseek() returns the resulting pointer location as measured in bytes from the beginning of the file. Remote file descriptors are the only ones that allow negative file pointers. Otherwise, -1 is returned, the file pointer remains unchanged, and errno is set to indicate the error.
The llseek() function will fail if:
The fildes argument is not an open file descriptor.
The whence argument is not SEEK_SET, SEEK_CUR, or SEEK_END; the offset argument is not a valid offset for this file system type; or the fildes argument is not a remote file descriptor, and the resulting file pointer would be negative.
The fildes argument is associated with a pipe or FIFO.
Appropriate privilege is required to override access checks.
Discretionary access checks have already been performed when fildes was opened.
Most mandatory access checks have already been performed when fildes was opened. The calling process may assert the PRIV_FILE_MAC_READ
privilege to perform a write-up.
NAME | SYNOPSIS | DESCRIPTION | RETURN VALUES | ERRORS | SUMMARY OF TRUSTED SOLARIS CHANGES | SEE ALSO