plm               377 security/selinux/selinuxfs.c 	struct policy_load_memory *plm = NULL;
plm               395 security/selinux/selinuxfs.c 	plm = kzalloc(sizeof(*plm), GFP_KERNEL);
plm               396 security/selinux/selinuxfs.c 	if (!plm)
plm               405 security/selinux/selinuxfs.c 	rc = security_read_policy(state, &plm->data, &plm->len);
plm               411 security/selinux/selinuxfs.c 	filp->private_data = plm;
plm               419 security/selinux/selinuxfs.c 	if (plm)
plm               420 security/selinux/selinuxfs.c 		vfree(plm->data);
plm               421 security/selinux/selinuxfs.c 	kfree(plm);
plm               428 security/selinux/selinuxfs.c 	struct policy_load_memory *plm = filp->private_data;
plm               430 security/selinux/selinuxfs.c 	BUG_ON(!plm);
plm               434 security/selinux/selinuxfs.c 	vfree(plm->data);
plm               435 security/selinux/selinuxfs.c 	kfree(plm);
plm               443 security/selinux/selinuxfs.c 	struct policy_load_memory *plm = filp->private_data;
plm               452 security/selinux/selinuxfs.c 	return simple_read_from_buffer(buf, count, ppos, plm->data, plm->len);
plm               457 security/selinux/selinuxfs.c 	struct policy_load_memory *plm = vmf->vma->vm_file->private_data;
plm               465 security/selinux/selinuxfs.c 	if (offset >= roundup(plm->len, PAGE_SIZE))
plm               468 security/selinux/selinuxfs.c 	page = vmalloc_to_page(plm->data + offset);