We can mark arch_get_ima_policy() as __init because it's only caller ima_init_arch_policy() is __init. We can then mark is_ppc_trustedboot_enabled() __init because its only caller is arch_get_ima_policy().
Signed-off-by: Michael Ellerman <[email protected]> --- arch/powerpc/kernel/ima_arch.c | 2 +- arch/powerpc/kernel/secure_boot.c | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/arch/powerpc/kernel/ima_arch.c b/arch/powerpc/kernel/ima_arch.c index 957abd592075..accd228ddc3d 100644 --- a/arch/powerpc/kernel/ima_arch.c +++ b/arch/powerpc/kernel/ima_arch.c @@ -60,7 +60,7 @@ static const char *const secure_and_trusted_rules[] = { * Returns the relevant IMA arch-specific policies based on the system secure * boot state. */ -const char *const *arch_get_ima_policy(void) +const char *const * __init arch_get_ima_policy(void) { if (is_ppc_secureboot_enabled()) { if (IS_ENABLED(CONFIG_MODULE_SIG)) diff --git a/arch/powerpc/kernel/secure_boot.c b/arch/powerpc/kernel/secure_boot.c index f9af305d9579..0adf0f61d3b2 100644 --- a/arch/powerpc/kernel/secure_boot.c +++ b/arch/powerpc/kernel/secure_boot.c @@ -41,7 +41,7 @@ bool is_ppc_secureboot_enabled(void) return enabled; } -bool is_ppc_trustedboot_enabled(void) +bool __init is_ppc_trustedboot_enabled(void) { struct device_node *node; bool enabled = false; -- 2.34.1
