Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp121929ybi; Thu, 1 Aug 2019 15:51:54 -0700 (PDT) X-Google-Smtp-Source: APXvYqxUPjRqdXrQCjXZ4e23MvotOetb0l72r7Zpd12Fin1e9cgXhKYswNGjXng8nILMIYpJeEpS X-Received: by 2002:a17:90a:db52:: with SMTP id u18mr1122668pjx.107.1564699914107; Thu, 01 Aug 2019 15:51:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1564699914; cv=none; d=google.com; s=arc-20160816; b=tUcKWgspCTZgumM3D/diqnE8SwKAa5L/UHVWKrD8D5UL7hbIEDpujStF6qBiL3uMUl mXa2Ly2HeVVD9E4ddpcTLc8sgUigNnC0VVPtX/bnwW5IHBns42nFPLM0msaJdTaNMPVB 6aKLlpjYuGsVkxAY9v43Jzzq5VngcD5xr0DZtHkoIqce77bnvbgFBcWGwchfewIoQmN1 tMGlgqtZtKu+Kh4zFdpHgbxjXFAl2e18IfUDP7JmNOuTBAeyRq5pr0aAmm8uP8DqBIZc NYtRJDzk1t+S8Ozlko3gzq2pRjIVvbuBjq/4m6sIJjeCD2ouj3cFU/xXXBaOiFKxt9fK y3xQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=7MPd9Z2BvCtW7Jj5gv1G0oE0SQQ2Vxu4lTK1/nmzm1Y=; b=pPFj3EWylUuoEYRcXTMCZTwut+r+wKnfMJpJ7Y/aJmymkMdFaIE9GcO1Yjb8Vk/cag de/0pOJlXFZyVRAo6Gp9MwOQdWhQrhLUGvlB6DQnAD+9DsJzDBpJ4s4Y5n691srqEf2s 7HKuQzZyEUcDX2bO578+mR+N7wqe7ghR7ASRCe0ff2q0qZ4aezHnh/2hge07a0MlEN/I UCWjdsLs/0Hn5XbWF2NkzpFAqqydXWZyAsRKWa8c1VAxSpoDeVFR3EHXTJHkHJHddIUG vD+Ak8dp1vcujvmLqyj5bjKDtIPYLsZlClS4AsaQIPG5MQzyToHsMeu2u9yhyDe5ZNrk JLfA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=mjjKlnnd; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 1si37971099pfe.271.2019.08.01.15.51.25; Thu, 01 Aug 2019 15:51:54 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=mjjKlnnd; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388033AbfHASLr (ORCPT + 99 others); Thu, 1 Aug 2019 14:11:47 -0400 Received: from mail-io1-f67.google.com ([209.85.166.67]:34519 "EHLO mail-io1-f67.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732904AbfHASLq (ORCPT ); Thu, 1 Aug 2019 14:11:46 -0400 Received: by mail-io1-f67.google.com with SMTP id k8so146453222iot.1 for ; Thu, 01 Aug 2019 11:11:46 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=7MPd9Z2BvCtW7Jj5gv1G0oE0SQQ2Vxu4lTK1/nmzm1Y=; b=mjjKlnndG/GVdJ2j0Hg/y21fENjZrPYmRXprn1WIV7jx1SFh4AKaGH6jAMk+6QX0b7 8MAe2ZM+HcBcGCigoIvlWqL3V9NE0D8RrWqeVkaXe7XqLQWa9/3iAo7hvm1eoLZsDCTD KPZu7tNADpUrbzM3RdL9AfiLGqRc71KwRISis= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=7MPd9Z2BvCtW7Jj5gv1G0oE0SQQ2Vxu4lTK1/nmzm1Y=; b=AsjrvsEKOb+Xh6lYbTOQm2WYAwLThjfmMWCW0wP6snyVm+MvAQiDF61I9gH5bq1D/h L4MTdLfd52dngZ1KSjR8vu7zYIwyrW1+yPAySQ4xK18R0U5IN4EG6yLrDOMpEUdhYhgc NKF7fqeocfBLlEZ5qz1EXstDDnA+QO1z79Gr0llTHfrORE9w2IdaHJb5TZ3Z9SocQpWI nbAA3BWFmtAweT9u+j/xM/piiS80VYATVRs6v07Ego5yv5DR5YlgdRMR/fsqFnm8cUtL SP6tIo334lkE+NI37l6O6g/H9hBzCEYiGw//vdjWwthYc/uqGl/8i6b3CwvIFA5NMz/H V/Cg== X-Gm-Message-State: APjAAAXRBgRIwT00ZxFq5Y77DZrG0H170o6iY2VvdLSZE5PRigndZUeF dMHLc6mp+S2PoBVVDFWtVps68Po6vqMhaym3uBnABD0Eohg= X-Received: by 2002:a6b:e60b:: with SMTP id g11mr125198636ioh.9.1564683105971; Thu, 01 Aug 2019 11:11:45 -0700 (PDT) MIME-Version: 1.0 References: In-Reply-To: From: Micah Morton Date: Thu, 1 Aug 2019 11:11:34 -0700 Message-ID: Subject: Re: [GIT PULL] SafeSetID MAINTAINERS file update for v5.3 To: Linus Torvalds Cc: linux-security-module , Linux Kernel Mailing List Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Sorry about that. To fix it I did a "git reset hard" to before any of those commits by Jann Horn, then fast-forwarded to the v5.3-rc2 tag and force pushed that to my origin/master then pushed a new branch up with my MAINTAINERS file changes. Hopefully this is a valid fix. -- The following changes since commit 609488bc979f99f805f34e9a32c1e3b71179d10b: Linux 5.3-rc2 (2019-07-28 12:47:02 -0700) are available in the Git repository at: https://github.com/micah-morton/linux.git tags/safesetid-maintainers-correction-5.3-rc2 for you to fetch changes up to fc5b34a35458314df1dd00281f6e41f419581aa9: Add entry in MAINTAINERS file for SafeSetID LSM (2019-08-01 10:30:57 -0700) ---------------------------------------------------------------- Add entry in MAINTAINERS file for SafeSetID LSM. Has not had any bake time or testing, since its just changes to a text file. ---------------------------------------------------------------- Micah Morton (1): Add entry in MAINTAINERS file for SafeSetID LSM MAINTAINERS | 6 ++++++ 1 file changed, 6 insertions(+) On Thu, Aug 1, 2019 at 6:25 AM Linus Torvalds wrote: > > On Wed, Jul 31, 2019 at 2:30 PM Micah Morton wrote: > > > > You mentioned a couple weeks ago it would be good if I added myself to > > the MAINTAINERS file for the SafeSetID LSM. Here's the pull request > > for v5.3. > > There's a lot more than the maintainer ID in there. You've rebased old > patches that I already had etc: > > Jann Horn (10): > LSM: SafeSetID: fix pr_warn() to include newline > LSM: SafeSetID: fix check for setresuid(new1, new2, new3) > LSM: SafeSetID: refactor policy hash table > LSM: SafeSetID: refactor safesetid_security_capable() > LSM: SafeSetID: refactor policy parsing > LSM: SafeSetID: fix userns handling in securityfs > LSM: SafeSetID: rewrite userspace API to atomic updates > LSM: SafeSetID: add read handler > LSM: SafeSetID: verify transitive constrainedness > LSM: SafeSetID: fix use of literal -1 in capable hook > > Micah Morton (2): > Merge commit 'v5.3-rc2^0' > Add entry in MAINTAINERS file for SafeSetID LSM > > Not pulled. > > Linus