plm 377 security/selinux/selinuxfs.c struct policy_load_memory *plm = NULL; plm 395 security/selinux/selinuxfs.c plm = kzalloc(sizeof(*plm), GFP_KERNEL); plm 396 security/selinux/selinuxfs.c if (!plm) plm 405 security/selinux/selinuxfs.c rc = security_read_policy(state, &plm->data, &plm->len); plm 411 security/selinux/selinuxfs.c filp->private_data = plm; plm 419 security/selinux/selinuxfs.c if (plm) plm 420 security/selinux/selinuxfs.c vfree(plm->data); plm 421 security/selinux/selinuxfs.c kfree(plm); plm 428 security/selinux/selinuxfs.c struct policy_load_memory *plm = filp->private_data; plm 430 security/selinux/selinuxfs.c BUG_ON(!plm); plm 434 security/selinux/selinuxfs.c vfree(plm->data); plm 435 security/selinux/selinuxfs.c kfree(plm); plm 443 security/selinux/selinuxfs.c struct policy_load_memory *plm = filp->private_data; plm 452 security/selinux/selinuxfs.c return simple_read_from_buffer(buf, count, ppos, plm->data, plm->len); plm 457 security/selinux/selinuxfs.c struct policy_load_memory *plm = vmf->vma->vm_file->private_data; plm 465 security/selinux/selinuxfs.c if (offset >= roundup(plm->len, PAGE_SIZE)) plm 468 security/selinux/selinuxfs.c page = vmalloc_to_page(plm->data + offset);