diff options
Diffstat (limited to 'net/sunrpc/auth.c')
-rw-r--r-- | net/sunrpc/auth.c | 22 |
1 files changed, 12 insertions, 10 deletions
diff --git a/net/sunrpc/auth.c b/net/sunrpc/auth.c index 2156327da45b..4d7c78b05d1e 100644 --- a/net/sunrpc/auth.c +++ b/net/sunrpc/auth.c | |||
@@ -190,8 +190,8 @@ rpcauth_prune_expired(struct rpc_auth *auth, struct rpc_cred *cred, struct hlist | |||
190 | if (atomic_read(&cred->cr_count) != 1) | 190 | if (atomic_read(&cred->cr_count) != 1) |
191 | return; | 191 | return; |
192 | if (time_after(jiffies, cred->cr_expire + auth->au_credcache->expire)) | 192 | if (time_after(jiffies, cred->cr_expire + auth->au_credcache->expire)) |
193 | cred->cr_flags &= ~RPCAUTH_CRED_UPTODATE; | 193 | clear_bit(RPCAUTH_CRED_UPTODATE, &cred->cr_flags); |
194 | if (!(cred->cr_flags & RPCAUTH_CRED_UPTODATE)) { | 194 | if (test_bit(RPCAUTH_CRED_UPTODATE, &cred->cr_flags) == 0) { |
195 | __hlist_del(&cred->cr_hash); | 195 | __hlist_del(&cred->cr_hash); |
196 | hlist_add_head(&cred->cr_hash, free); | 196 | hlist_add_head(&cred->cr_hash, free); |
197 | } | 197 | } |
@@ -267,7 +267,7 @@ retry: | |||
267 | if (!IS_ERR(new)) | 267 | if (!IS_ERR(new)) |
268 | goto retry; | 268 | goto retry; |
269 | cred = new; | 269 | cred = new; |
270 | } else if ((cred->cr_flags & RPCAUTH_CRED_NEW) | 270 | } else if (test_bit(RPCAUTH_CRED_NEW, &cred->cr_flags) |
271 | && cred->cr_ops->cr_init != NULL | 271 | && cred->cr_ops->cr_init != NULL |
272 | && !(flags & RPCAUTH_LOOKUP_NEW)) { | 272 | && !(flags & RPCAUTH_LOOKUP_NEW)) { |
273 | int res = cred->cr_ops->cr_init(auth, cred); | 273 | int res = cred->cr_ops->cr_init(auth, cred); |
@@ -440,17 +440,19 @@ rpcauth_refreshcred(struct rpc_task *task) | |||
440 | void | 440 | void |
441 | rpcauth_invalcred(struct rpc_task *task) | 441 | rpcauth_invalcred(struct rpc_task *task) |
442 | { | 442 | { |
443 | struct rpc_cred *cred = task->tk_msg.rpc_cred; | ||
444 | |||
443 | dprintk("RPC: %5u invalidating %s cred %p\n", | 445 | dprintk("RPC: %5u invalidating %s cred %p\n", |
444 | task->tk_pid, task->tk_auth->au_ops->au_name, task->tk_msg.rpc_cred); | 446 | task->tk_pid, task->tk_auth->au_ops->au_name, cred); |
445 | spin_lock(&rpc_credcache_lock); | 447 | if (cred) |
446 | if (task->tk_msg.rpc_cred) | 448 | clear_bit(RPCAUTH_CRED_UPTODATE, &cred->cr_flags); |
447 | task->tk_msg.rpc_cred->cr_flags &= ~RPCAUTH_CRED_UPTODATE; | ||
448 | spin_unlock(&rpc_credcache_lock); | ||
449 | } | 449 | } |
450 | 450 | ||
451 | int | 451 | int |
452 | rpcauth_uptodatecred(struct rpc_task *task) | 452 | rpcauth_uptodatecred(struct rpc_task *task) |
453 | { | 453 | { |
454 | return !(task->tk_msg.rpc_cred) || | 454 | struct rpc_cred *cred = task->tk_msg.rpc_cred; |
455 | (task->tk_msg.rpc_cred->cr_flags & RPCAUTH_CRED_UPTODATE); | 455 | |
456 | return cred == NULL || | ||
457 | test_bit(RPCAUTH_CRED_UPTODATE, &cred->cr_flags) != 0; | ||
456 | } | 458 | } |