Lines Matching refs:file
9 * kernel_read_file() - read file contents into a kernel buffer
11 * @file: file to read from
18 * @file_size: if non-NULL, the full size of @file will be
21 * file contents being read (for LSMs to examine)
24 * (i.e. the caller must be expecting to read partial file contents
26 * will be able to determine when the entire file was read by
28 * file, though, since it is possible that the contents might
35 ssize_t kernel_read_file(struct file *file, loff_t offset, void **buf,
48 if (!S_ISREG(file_inode(file)->i_mode))
51 ret = deny_write_access(file);
55 i_size = i_size_read(file_inode(file));
60 /* The file is too big for sane activities. */
65 /* The entire file cannot be read in one buffer. */
72 ret = security_kernel_read_file(file, id, whole_file);
93 bytes = kernel_read(file, *buf + copied, wanted, &pos);
110 ret = security_kernel_post_read_file(file, *buf, i_size, id);
122 allow_write_access(file);
131 struct file *file;
137 file = filp_open(path, O_RDONLY, 0);
138 if (IS_ERR(file))
139 return PTR_ERR(file);
141 ret = kernel_read_file(file, offset, buf, buf_size, file_size, id);
142 fput(file);
152 struct file *file;
163 file = file_open_root(&root, path, O_RDONLY, 0);
165 if (IS_ERR(file))
166 return PTR_ERR(file);
168 ret = kernel_read_file(file, offset, buf, buf_size, file_size, id);
169 fput(file);
181 if (!f.file || !(f.file->f_mode & FMODE_READ))
184 ret = kernel_read_file(f.file, offset, buf, buf_size, file_size, id);