From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from eggs.gnu.org ([140.186.70.92]:37071) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1QlK7F-0002Ad-QM for qemu-devel@nongnu.org; Mon, 25 Jul 2011 08:18:34 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1QlK7E-0006Zm-Mi for qemu-devel@nongnu.org; Mon, 25 Jul 2011 08:18:33 -0400 Received: from mx1.redhat.com ([209.132.183.28]:34790) by eggs.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1QlK7E-0006Zc-DM for qemu-devel@nongnu.org; Mon, 25 Jul 2011 08:18:32 -0400 Message-ID: <4E2D5F0D.2040303@redhat.com> Date: Mon, 25 Jul 2011 15:18:21 +0300 From: Avi Kivity MIME-Version: 1.0 References: <1311583872-362-1-git-send-email-avi@redhat.com> <4E2D5D7C.40208@codemonkey.ws> In-Reply-To: <4E2D5D7C.40208@codemonkey.ws> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Subject: Re: [Qemu-devel] [PATCH] Introduce QEMU_NEW() List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: Anthony Liguori Cc: qemu-devel@nongnu.org, kvm@vger.kernel.org On 07/25/2011 03:11 PM, Anthony Liguori wrote: > On 07/25/2011 03:51 AM, Avi Kivity wrote: >> qemu_malloc() is type-unsafe as it returns a void pointer. Introduce >> QEMU_NEW() (and QEMU_NEWZ()), which return the correct type. > > Just use g_new() and g_new0() > These bypass qemu_malloc(). Are we okay with that? I suppose so, since many library functions can allocate memory and bypass qemu_malloc()? -- error compiling committee.c: too many arguments to function