I amended the author on the lone commit in this pull request. For some reason I was thinking using the "From:" line in the commit body was how I should make things show up as Thomas as the author and me as the committer, but looks like that’s not true.
I also removed my own Signed-off-by line from the pull request body and included it in the commit instead of the Reviewed-by line. Thanks, Micah The following changes since commit 3d77e6a8804abcc0504c904bd6e5cdf3a5cf8162: Linux 5.7 (2020-05-31 16:49:15 -0700) are available in the Git repository at: https://github.com/micah-morton/linux.git tags/LSM-add-setgid-hook-5.8-author-fix for you to fetch changes up to 39030e1351aa1aa7443bb2da24426573077c83da: security: Add LSM hooks to set*gid syscalls (2020-06-14 10:52:02 -0700) ---------------------------------------------------------------- Add additional LSM hooks for SafeSetID SafeSetID is capable of making allow/deny decisions for set*uid calls on a system, and we want to add similar functionality for set*gid calls. The work to do that is not yet complete, so probably won't make it in for v5.8, but we are looking to get this simple patch in for v5.8 since we have it ready. We are planning on the rest of the work for extending the SafeSetID LSM being merged during the v5.9 merge window. This patch was sent to the security mailing list and there were no objections. ---------------------------------------------------------------- Thomas Cedeno (1): security: Add LSM hooks to set*gid syscalls include/linux/lsm_hook_defs.h | 2 ++ include/linux/lsm_hooks.h | 9 +++++++++ include/linux/security.h | 9 +++++++++ kernel/sys.c | 15 ++++++++++++++- security/security.c | 6 ++++++ 5 files changed, 40 insertions(+), 1 deletion(-) On Fri, Jun 12, 2020 at 2:23 PM Linus Torvalds <torva...@linux-foundation.org> wrote: > > Finally emptied my normal pull request queue and starting to look at > things I wanted to look at more closely.. > > On Tue, Jun 9, 2020 at 11:26 AM Micah Morton <mort...@chromium.org> wrote: > > > > This patch was sent to the security mailing list and there were no > > objections. > > That patch as committed has both the wrong authorship, and the wrong > sign-off chain. > > Not pulling. > > Linus