diff options
| author | Eric Paris <eparis@redhat.com> | 2009-05-21 15:43:32 -0400 |
|---|---|---|
| committer | James Morris <jmorris@namei.org> | 2009-05-21 19:34:21 -0400 |
| commit | 932995f0ce52525b32ff5127b522c2c164de3810 (patch) | |
| tree | 648cfe2ac09025eb3922d2a84ed983a7ac70a060 /security/integrity | |
| parent | 5789ba3bd0a3cd20df5980ebf03358f2eb44fd67 (diff) | |
IMA: Add __init notation to ima functions
A number of IMA functions only used during init are not marked with __init.
Add those notations so they are freed automatically.
Signed-off-by: Eric Paris <eparis@redhat.com>
Acked-by: Mimi Zohar <zohar@us.ibm.com>
Signed-off-by: James Morris <jmorris@namei.org>
Diffstat (limited to 'security/integrity')
| -rw-r--r-- | security/integrity/ima/ima_crypto.c | 4 | ||||
| -rw-r--r-- | security/integrity/ima/ima_fs.c | 2 | ||||
| -rw-r--r-- | security/integrity/ima/ima_iint.c | 2 | ||||
| -rw-r--r-- | security/integrity/ima/ima_init.c | 4 | ||||
| -rw-r--r-- | security/integrity/ima/ima_policy.c | 2 |
5 files changed, 7 insertions, 7 deletions
diff --git a/security/integrity/ima/ima_crypto.c b/security/integrity/ima/ima_crypto.c index 50d572b74caf..63003a63aaee 100644 --- a/security/integrity/ima/ima_crypto.c +++ b/security/integrity/ima/ima_crypto.c | |||
| @@ -103,7 +103,7 @@ int ima_calc_template_hash(int template_len, void *template, char *digest) | |||
| 103 | return rc; | 103 | return rc; |
| 104 | } | 104 | } |
| 105 | 105 | ||
| 106 | static void ima_pcrread(int idx, u8 *pcr) | 106 | static void __init ima_pcrread(int idx, u8 *pcr) |
| 107 | { | 107 | { |
| 108 | if (!ima_used_chip) | 108 | if (!ima_used_chip) |
| 109 | return; | 109 | return; |
| @@ -115,7 +115,7 @@ static void ima_pcrread(int idx, u8 *pcr) | |||
| 115 | /* | 115 | /* |
| 116 | * Calculate the boot aggregate hash | 116 | * Calculate the boot aggregate hash |
| 117 | */ | 117 | */ |
| 118 | int ima_calc_boot_aggregate(char *digest) | 118 | int __init ima_calc_boot_aggregate(char *digest) |
| 119 | { | 119 | { |
| 120 | struct hash_desc desc; | 120 | struct hash_desc desc; |
| 121 | struct scatterlist sg; | 121 | struct scatterlist sg; |
diff --git a/security/integrity/ima/ima_fs.c b/security/integrity/ima/ima_fs.c index 3305a9615863..7039b14e1f73 100644 --- a/security/integrity/ima/ima_fs.c +++ b/security/integrity/ima/ima_fs.c | |||
| @@ -319,7 +319,7 @@ static struct file_operations ima_measure_policy_ops = { | |||
| 319 | .release = ima_release_policy | 319 | .release = ima_release_policy |
| 320 | }; | 320 | }; |
| 321 | 321 | ||
| 322 | int ima_fs_init(void) | 322 | int __init ima_fs_init(void) |
| 323 | { | 323 | { |
| 324 | ima_dir = securityfs_create_dir("ima", NULL); | 324 | ima_dir = securityfs_create_dir("ima", NULL); |
| 325 | if (IS_ERR(ima_dir)) | 325 | if (IS_ERR(ima_dir)) |
diff --git a/security/integrity/ima/ima_iint.c b/security/integrity/ima/ima_iint.c index ec79f1ee992c..b8dd693f8790 100644 --- a/security/integrity/ima/ima_iint.c +++ b/security/integrity/ima/ima_iint.c | |||
| @@ -196,7 +196,7 @@ static void init_once(void *foo) | |||
| 196 | kref_set(&iint->refcount, 1); | 196 | kref_set(&iint->refcount, 1); |
| 197 | } | 197 | } |
| 198 | 198 | ||
| 199 | void ima_iintcache_init(void) | 199 | void __init ima_iintcache_init(void) |
| 200 | { | 200 | { |
| 201 | iint_cache = | 201 | iint_cache = |
| 202 | kmem_cache_create("iint_cache", sizeof(struct ima_iint_cache), 0, | 202 | kmem_cache_create("iint_cache", sizeof(struct ima_iint_cache), 0, |
diff --git a/security/integrity/ima/ima_init.c b/security/integrity/ima/ima_init.c index 0b0bb8c978cc..a40da7ae5900 100644 --- a/security/integrity/ima/ima_init.c +++ b/security/integrity/ima/ima_init.c | |||
| @@ -38,7 +38,7 @@ int ima_used_chip; | |||
| 38 | * a different value.) Violations add a zero entry to the measurement | 38 | * a different value.) Violations add a zero entry to the measurement |
| 39 | * list and extend the aggregate PCR value with ff...ff's. | 39 | * list and extend the aggregate PCR value with ff...ff's. |
| 40 | */ | 40 | */ |
| 41 | static void ima_add_boot_aggregate(void) | 41 | static void __init ima_add_boot_aggregate(void) |
| 42 | { | 42 | { |
| 43 | struct ima_template_entry *entry; | 43 | struct ima_template_entry *entry; |
| 44 | const char *op = "add_boot_aggregate"; | 44 | const char *op = "add_boot_aggregate"; |
| @@ -71,7 +71,7 @@ err_out: | |||
| 71 | audit_cause, result, 0); | 71 | audit_cause, result, 0); |
| 72 | } | 72 | } |
| 73 | 73 | ||
| 74 | int ima_init(void) | 74 | int __init ima_init(void) |
| 75 | { | 75 | { |
| 76 | u8 pcr_i[IMA_DIGEST_SIZE]; | 76 | u8 pcr_i[IMA_DIGEST_SIZE]; |
| 77 | int rc; | 77 | int rc; |
diff --git a/security/integrity/ima/ima_policy.c b/security/integrity/ima/ima_policy.c index 4719bbf1641a..e1278399b345 100644 --- a/security/integrity/ima/ima_policy.c +++ b/security/integrity/ima/ima_policy.c | |||
| @@ -178,7 +178,7 @@ int ima_match_policy(struct inode *inode, enum ima_hooks func, int mask) | |||
| 178 | * ima_measure points to either the measure_default_rules or the | 178 | * ima_measure points to either the measure_default_rules or the |
| 179 | * the new measure_policy_rules. | 179 | * the new measure_policy_rules. |
| 180 | */ | 180 | */ |
| 181 | void ima_init_policy(void) | 181 | void __init ima_init_policy(void) |
| 182 | { | 182 | { |
| 183 | int i, entries; | 183 | int i, entries; |
| 184 | 184 | ||
