@@ -274,6 +274,7 @@ void ima_add_violation(struct file *file, const unsigned char *filename,
struct ima_iint_cache *iint, const char *op,
const char *cause);
int ima_init_crypto(void);
+void ima_free_tfm(struct crypto_shash *tfm);
unsigned long ima_pcr_invalidated_banks(u32 pcr);
void ima_putc(struct seq_file *m, void *data, int datalen);
void ima_print_digest(struct seq_file *m, u8 *digest, u32 size);
@@ -213,7 +213,7 @@ int __init ima_init_crypto(void)
return rc;
}
-static void ima_free_tfm(struct crypto_shash *tfm)
+void ima_free_tfm(struct crypto_shash *tfm)
{
int i;
Upon recognizing previously unmaintained PCR banks at __init after kexec, a subsequent commit will make IMA to disable the corresponding hashes for the current boot as well. For this, access to ima_free_tfm() from outside its compilation unit is needed. Make its linkage extern. Signed-off-by: Nicolai Stange <nstange@suse.de> --- security/integrity/ima/ima.h | 1 + security/integrity/ima/ima_crypto.c | 2 +- 2 files changed, 2 insertions(+), 1 deletion(-)