Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751765AbdIUGXb (ORCPT ); Thu, 21 Sep 2017 02:23:31 -0400 Received: from www17.your-server.de ([213.133.104.17]:59858 "EHLO www17.your-server.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751602AbdIUGX2 (ORCPT ); Thu, 21 Sep 2017 02:23:28 -0400 Subject: [PATCH 0/6] Cocci spatch "pool_zalloc-simple" - v4.14-rc1 From: Thomas Meyer To: linux-kernel@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Mime-Version: 1.0 Message-ID: <1505974468535-2047238743-0-diffsplit-thomas@m3y3r.de> Date: Thu, 21 Sep 2017 08:15:26 +0200 X-Mailer: Evolution 3.22.6-1 Content-Transfer-Encoding: 7bit X-Authenticated-Sender: thomas@m3y3r.de Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 378 Lines: 9 Use *_pool_zalloc rather than *_pool_alloc followed by memset with 0. Found by coccinelle spatch "api/alloc/pool_zalloc-simple.cocci" Run against version v4.14-rc1 Let me know when you as a maintainer are not interested in these kind of patches. I can exclude you by path; e.g. all findings in "drivers/scsi" will never be reported again by this semi-automatic program runs.