On Sun, Jul 17, 2005 at 12:32:27AM +0200, Jesper Juhl wrote:
> 
> --- linux-2.6.13-rc3-orig/drivers/block/cryptoloop.c  2005-06-17 
> 21:48:29.000000000 +0200
> +++ linux-2.6.13-rc3/drivers/block/cryptoloop.c       2005-07-16 
> 23:35:55.000000000 +0200
> @@ -227,14 +227,14 @@ cryptoloop_ioctl(struct loop_device *lo,
>  static int
>  cryptoloop_release(struct loop_device *lo)
>  {
> -     struct crypto_tfm *tfm = (struct crypto_tfm *) lo->key_data;
> -     if (tfm != NULL) {
> -             crypto_free_tfm(tfm);
> -             lo->key_data = NULL;
> -             return 0;
> +     struct crypto_tfm *tfm = lo->key_data;
> +     if (!tfm) {
> +             printk(KERN_ERR "cryptoloop_release(): tfm == NULL?\n");
> +             return -EINVAL;
>       }
> -     printk(KERN_ERR "cryptoloop_release(): tfm == NULL?\n");
> -     return -EINVAL;
> +     crypto_free_tfm(tfm);
> +     lo->key_data = NULL;
> +     return 0;
>  }

This change looks rather pointless.

The rest of the patch looks good.

Thanks,
-- 
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <[EMAIL PROTECTED]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Reply via email to