lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <1559161113889-196429735-0-diffsplit-thomas@m3y3r.de> Date: Wed, 29 May 2019 22:21:32 +0200 From: "Thomas Meyer" <thomas@...3r.de> To: linux-kernel@...r.kernel.org Subject: Cocci spatch "pool_zalloc-simple" - v5.2-rc1 Use *_pool_zalloc rather than *_pool_alloc followed by memset with 0. Found by coccinelle spatch "api/alloc/pool_zalloc-simple.cocci" Run against version v5.2-rc1 P.S. If you find this email unwanted, set up a procmail rule junking on the header: X-Patch: Cocci