[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <201706250409.PFosMVWz%fengguang.wu@intel.com>
Date: Sun, 25 Jun 2017 05:02:24 +0800
From: kbuild test robot <lkp@...el.com>
To: Stefan Berger <stefanb@...ux.vnet.ibm.com>
Cc: kbuild-all@...org, ebiederm@...ssion.com,
containers@...ts.linux-foundation.org, lkp@...org,
xiaolong.ye@...el.com, linux-kernel@...r.kernel.org,
zohar@...ux.vnet.ibm.com, serge@...lyn.com, tycho@...ker.com,
James.Bottomley@...senPartnership.com,
christian.brauner@...lbox.org, stefanb@...ux.vnet.ibm.com,
vgoyal@...hat.com, amir73il@...il.com,
linux-security-module@...r.kernel.org
Subject: Re: [PATCH 1/3] xattr: Enable security.capability in user namespaces
Hi Stefan,
[auto build test WARNING on linus/master]
[also build test WARNING on v4.12-rc6 next-20170623]
[if your patch is applied to the wrong git tree, please drop us a note to help improve the system]
url: https://github.com/0day-ci/linux/commits/Stefan-Berger/Enable-namespaced-file-capabilities/20170625-001722
coccinelle warnings: (new ones prefixed by >>)
>> fs/xattr.c:516:10-17: WARNING opportunity for kstrdep (strcpy on line 519)
Please review and possibly fold the followup patch.
---
0-DAY kernel test infrastructure Open Source Technology Center
https://lists.01.org/pipermail/kbuild-all Intel Corporation
Powered by blists - more mailing lists