Received: by 2002:ac0:bc90:0:0:0:0:0 with SMTP id a16csp3634135img; Mon, 25 Mar 2019 14:29:31 -0700 (PDT) X-Google-Smtp-Source: APXvYqybAR7FrCGDK/uXE9+Ww+eEH1tNe1GIm72HAZaLNhanCwG97ORCi3WJh3WSXUX5V4IaLS8y X-Received: by 2002:a62:1c4:: with SMTP id 187mr26035545pfb.256.1553549371538; Mon, 25 Mar 2019 14:29:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1553549371; cv=none; d=google.com; s=arc-20160816; b=qe/FDNB8jsLTjCgDcFm056OAznDXuaxojvJo7vM5QPfuG2bSZ+cCaAC25LaaNwwYBI +zLpRyDZPrzlWk4R6azHaXVzbY4HZEayq8ZboPD8cypOh5sOxBzMnENHd1SSYOCw4hKu uomi7kkxTZc1hLqmeEfxaPa5CFvxQkebEwc/mFG5oO3LQstc9v52rTvG6Kx3SzPZh7LC fY8/z8Dex1lcPyWrVFK4YwMc55jKHaIlk6dRfZuGhHFg/6vJHJjb/w6IlUvRB4dI5Ky7 /9zvT9xeHwYs50oyLmo5VrH5vGHhhCi0ENRJcEXRJDpJWFaJ+ure8jTpqO4HZWKE1DCZ 22hQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=CJ5jVfIlom96CR1ID8hEsCTqdO4ahSVTtHaeFnIbT2Q=; b=QGW8KUelg9Pez5feapuq/IvFtBbjMBqVkZiLq/TTMUnHukhk2c/D18QkvWlBDdQ+gE TnbqWFlitXVeHrlUcv/7dsKvd4Dg3dIxFdRT/ursARc93+xZMpjXrrwmYUPxCYL/w/gb QucQr9aG//xtSm7QY9Tiz/QFD9ycz/M4S2XmI+tS9BxeEhhjjsnd3RDO2DcOhwJ4hITh f42eUy97v3wfK1C66AHZ4R0llgXQdbXQVAnO8/SfIH53p5F5f4PI6rPdGcj8T7V3FLFD B4SBPT7zhRZ4rbk6pP4gKwPEqpaPMO5ybde9roYKGQZd42f4NtOO5rpdL2ksVjxTQ5Av JcEA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z20si14825421pgf.324.2019.03.25.14.29.16; Mon, 25 Mar 2019 14:29:31 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730527AbfCYV1K (ORCPT + 99 others); Mon, 25 Mar 2019 17:27:10 -0400 Received: from smtprelay0086.hostedemail.com ([216.40.44.86]:50341 "EHLO smtprelay.hostedemail.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1729693AbfCYV1K (ORCPT ); Mon, 25 Mar 2019 17:27:10 -0400 Received: from filter.hostedemail.com (clb03-v110.bra.tucows.net [216.40.38.60]) by smtprelay07.hostedemail.com (Postfix) with ESMTP id B6988181D341F; Mon, 25 Mar 2019 21:27:08 +0000 (UTC) X-Session-Marker: 6A6F6540706572636865732E636F6D X-Spam-Summary: 2,0,0,,d41d8cd98f00b204,joe@perches.com,:::::::::::::::::::::::,RULES_HIT:41:69:355:379:541:800:960:968:973:988:989:1260:1345:1359:1437:1534:1542:1711:1730:1747:1777:1792:2198:2199:2393:2553:2559:2562:2894:3138:3139:3140:3141:3142:3353:3865:3866:3867:3868:3870:3874:4321:4605:5007:6119:6261:6742:7264:7514:7688:8557:9121:10004:10848:11233:11658:11914:12043:12262:12291:12295:12438:12555:12679:12683:12740:12895:12986:13161:13229:14110:14181:14721:21080:21365:21451:21627:30054:30091,0,RBL:47.151.153.53:@perches.com:.lbl8.mailshell.net-62.8.0.100 64.201.201.201,CacheIP:none,Bayesian:0.5,0.5,0.5,Netcheck:none,DomainCache:0,MSF:not bulk,SPF:fn,MSBL:0,DNSBL:none,Custom_rules:0:0:0,LFtime:104,LUA_SUMMARY:none X-HE-Tag: brass23_20f9e36b16e4b X-Filterd-Recvd-Size: 3426 Received: from joe-laptop.perches.com (unknown [47.151.153.53]) (Authenticated sender: joe@perches.com) by omf05.hostedemail.com (Postfix) with ESMTPA; Mon, 25 Mar 2019 21:27:06 +0000 (UTC) From: Joe Perches To: linux-kernel@vger.kernel.org Cc: James Bottomley , Jarkko Sakkinen , Mimi Zohar , linux-integrity@vger.kernel.org, keyrings@vger.kernel.org, Mimi Zohar , David Howells , James Morris , Denis Kenzior , Marcel Holtmann , James Morris Subject: Bad file pattern in MAINTAINERS section 'KEYS-TRUSTED' Date: Mon, 25 Mar 2019 14:27:05 -0700 Message-Id: <20190325212705.26837-1-joe@perches.com> X-Mailer: git-send-email 2.15.0 In-Reply-To: <7cd8d12f59bcacd18a78f599b46dac555f7f16c0.camel@perches.com> References: <7cd8d12f59bcacd18a78f599b46dac555f7f16c0.camel@perches.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org A file pattern line in this section of the MAINTAINERS file in linux-next does not have a match in the linux source files. This could occur because a matching filename was never added, was deleted or renamed in some other commit. The commits that added and if found renamed or removed the file pattern are shown below. Please fix this defect appropriately. 1: --------------------------------------------------------------------------- linux-next MAINTAINERS section: 8587 KEYS-TRUSTED 8588 M: James Bottomley 8589 M: Jarkko Sakkinen 8590 M: Mimi Zohar 8591 L: linux-integrity@vger.kernel.org 8592 L: keyrings@vger.kernel.org 8593 S: Supported 8594 F: Documentation/security/keys/trusted-encrypted.rst 8595 F: include/keys/trusted-type.h 8596 F: security/keys/trusted.c --> 8597 F: security/keys/trusted.h 2: --------------------------------------------------------------------------- The most recent commit that added or modified file pattern 'security/keys/trusted.h': commit 7f3c68bee977ab872827e44de017216736fe21d7 Author: Mimi Zohar Date: Tue Jan 18 09:07:13 2011 -0500 keys: add trusted and encrypted maintainers Add myself and David Safford as maintainers for trusted/encrypted keys. Signed-off-by: Mimi Zohar Acked-by: David Howells Signed-off-by: James Morris MAINTAINERS | 22 ++++++++++++++++++++++ 1 file changed, 22 insertions(+) 3: --------------------------------------------------------------------------- The last commit with a real presence of file pattern 'security/keys/trusted.h': commit 22447981fc050b5f1bdd0e7cbee89b4152a2b2d8 Author: Denis Kenzior Date: Tue Oct 9 17:48:49 2018 +0100 KEYS: Move trusted.h to include/keys [ver #2] Signed-off-by: Denis Kenzior Signed-off-by: David Howells Tested-by: Marcel Holtmann Reviewed-by: Marcel Holtmann Signed-off-by: James Morris {security => include}/keys/trusted.h | 0 security/keys/trusted.c | 2 +- 2 files changed, 1 insertion(+), 1 deletion(-)