diff options
| -rw-r--r-- | security/integrity/ima/ima_main.c | 4 |
1 files changed, 0 insertions, 4 deletions
diff --git a/security/integrity/ima/ima_main.c b/security/integrity/ima/ima_main.c index 09baa335ebc7..cf1c3696c72e 100644 --- a/security/integrity/ima/ima_main.c +++ b/security/integrity/ima/ima_main.c | |||
| @@ -88,8 +88,6 @@ static void ima_rdwr_violation_check(struct file *file) | |||
| 88 | if (!S_ISREG(inode->i_mode) || !ima_initialized) | 88 | if (!S_ISREG(inode->i_mode) || !ima_initialized) |
| 89 | return; | 89 | return; |
| 90 | 90 | ||
| 91 | mutex_lock(&inode->i_mutex); /* file metadata: permissions, xattr */ | ||
| 92 | |||
| 93 | if (mode & FMODE_WRITE) { | 91 | if (mode & FMODE_WRITE) { |
| 94 | if (atomic_read(&inode->i_readcount) && IS_IMA(inode)) { | 92 | if (atomic_read(&inode->i_readcount) && IS_IMA(inode)) { |
| 95 | struct integrity_iint_cache *iint; | 93 | struct integrity_iint_cache *iint; |
| @@ -104,8 +102,6 @@ static void ima_rdwr_violation_check(struct file *file) | |||
| 104 | send_writers = true; | 102 | send_writers = true; |
| 105 | } | 103 | } |
| 106 | 104 | ||
| 107 | mutex_unlock(&inode->i_mutex); | ||
| 108 | |||
| 109 | if (!send_tomtou && !send_writers) | 105 | if (!send_tomtou && !send_writers) |
| 110 | return; | 106 | return; |
| 111 | 107 | ||
