Cover Letter Detail
Show a cover letter.
GET /api/1.1/covers/2221567/?format=api
{ "id": 2221567, "url": "http://patchwork.ozlabs.org/api/1.1/covers/2221567/?format=api", "web_url": "http://patchwork.ozlabs.org/project/ubuntu-kernel/cover/20260409202159.162994-1-ian.whitfield@canonical.com/", "project": { "id": 15, "url": "http://patchwork.ozlabs.org/api/1.1/projects/15/?format=api", "name": "Ubuntu Kernel", "link_name": "ubuntu-kernel", "list_id": "kernel-team.lists.ubuntu.com", "list_email": "kernel-team@lists.ubuntu.com", "web_url": null, "scm_url": null, "webscm_url": null }, "msgid": "<20260409202159.162994-1-ian.whitfield@canonical.com>", "date": "2026-04-09T20:21:58", "name": "[SRU,J:linux-gcp/N:linux-gcp/Q:linux-gcp/R:linux-gcp,0/1] Make idpf built-in", "submitter": { "id": 89403, "url": "http://patchwork.ozlabs.org/api/1.1/people/89403/?format=api", "name": "Ian Whitfield", "email": "ian.whitfield@canonical.com" }, "mbox": "http://patchwork.ozlabs.org/project/ubuntu-kernel/cover/20260409202159.162994-1-ian.whitfield@canonical.com/mbox/", "series": [ { "id": 499352, "url": "http://patchwork.ozlabs.org/api/1.1/series/499352/?format=api", "web_url": "http://patchwork.ozlabs.org/project/ubuntu-kernel/list/?series=499352", "date": "2026-04-09T20:21:58", "name": "Make idpf built-in", "version": 1, "mbox": "http://patchwork.ozlabs.org/series/499352/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/covers/2221567/comments/", "headers": { "Return-Path": "<kernel-team-bounces@lists.ubuntu.com>", "X-Original-To": "incoming@patchwork.ozlabs.org", "Delivered-To": "patchwork-incoming@legolas.ozlabs.org", "Authentication-Results": [ "legolas.ozlabs.org;\n\tdkim=fail reason=\"signature verification failed\" (4096-bit key;\n unprotected) header.d=canonical.com header.i=@canonical.com\n header.a=rsa-sha256 header.s=20251003 header.b=Zz8pCVuQ;\n\tdkim-atps=neutral", "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.ubuntu.com\n (client-ip=185.125.189.65; helo=lists.ubuntu.com;\n envelope-from=kernel-team-bounces@lists.ubuntu.com;\n receiver=patchwork.ozlabs.org)" ], "Received": [ "from lists.ubuntu.com (lists.ubuntu.com [185.125.189.65])\n\t(using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fsBDd7215z1yHG\n\tfor <incoming@patchwork.ozlabs.org>; Fri, 10 Apr 2026 06:22:09 +1000 (AEST)", "from localhost ([127.0.0.1] helo=lists.ubuntu.com)\n\tby lists.ubuntu.com with esmtp (Exim 4.86_2)\n\t(envelope-from <kernel-team-bounces@lists.ubuntu.com>)\n\tid 1wAvt5-0003Ov-D0; Thu, 09 Apr 2026 20:22:03 +0000", "from smtp-relay-internal-0.internal ([10.131.114.225]\n helo=smtp-relay-internal-0.canonical.com)\n by lists.ubuntu.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128)\n (Exim 4.86_2) (envelope-from <ian.whitfield@canonical.com>)\n id 1wAvt4-0003Oi-AO\n for kernel-team@lists.ubuntu.com; Thu, 09 Apr 2026 20:22:02 +0000", "from mail-qv1-f69.google.com (mail-qv1-f69.google.com\n [209.85.219.69])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest\n SHA256)\n (No client certificate requested)\n by smtp-relay-internal-0.canonical.com (Postfix) with ESMTPS id 298533F787\n for <kernel-team@lists.ubuntu.com>; Thu, 9 Apr 2026 20:22:02 +0000 (UTC)", "by mail-qv1-f69.google.com with SMTP id\n 6a1803df08f44-8a16036c90eso39556056d6.2\n for <kernel-team@lists.ubuntu.com>; Thu, 09 Apr 2026 13:22:02 -0700 (PDT)", "from localhost ([2600:4041:dc:e800:aa76:3654:c667:9924])\n by smtp.gmail.com with ESMTPSA id\n 6a1803df08f44-8ac84cb135fsm4747486d6.38.2026.04.09.13.22.00\n for <kernel-team@lists.ubuntu.com>\n (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n Thu, 09 Apr 2026 13:22:00 -0700 (PDT)" ], "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com;\n s=20251003; t=1775766122;\n bh=Yv3oTdvMCF3E1Ydfachp3pQaec5D3AZeHfbkXd6nGe8=;\n h=From:To:Subject:Date:Message-ID:MIME-Version:Content-Type;\n b=Zz8pCVuQTAlxq6BON6cC+nY+n94STFHuanLNvU/p38TtoBc3JtJWsZjroaGlgapHh\n 1+4iQ/Pr5yndaF06KZIvce/fHEhx/smSUbcCcs2MntAGO4J3jtfk9x3rRNjeFfyuQB\n BBg5vTIuAa60Ciq7/OLVmSLYMGtDqy6i53wUjI4l7HE5jxuA1jm67N9cWhGPTVLLdl\n gf0fZYlcXLnk0w5xmfHaP/P2V9sF3XRSXbWK3T/f56WM8uQttcTQbMKzAWTidZH9/s\n 4J/hS09XXddHFfv30PCKPpbuK36189U/TPAl3Kv08fqn/uH79oHZWcqADul8zmGDY9\n lGOD4Q5fLyleRZTKaQ8A80tvpMxVxb1XgERrUwwvUtbyv0Vlgd6QeSJmpjYOUdB2pE\n ETAOjjxJ7bTKrXHXbw3TNOV7O/J2RugGLEP8O0HkC/00wXZe/pNcH2cFFA0xdu3/H4\n +KrZpQ1g+kOoMhd6G5lBIC3Ah9hD0P2olHm52p2nXhm+qkDLQHzjqHTJLGEgGyecJq\n ogU6ZGdbiv+LrsSUnix3aPzR5/NFoeJJu8Lh3IpIvPqVrVt5UuaK42UVzy3UwvnGaY\n Te4fKp1H+i30NAoV4nCFQ9hh3rVm8RuGeXPyqsoc/GUpjwyiiolmf5Q4KTJNgDqttT\n leNKJHW4C/SSRR4VDGC8yyDM=", "X-Google-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1775766121; x=1776370921;\n h=content-transfer-encoding:mime-version:message-id:date:subject:to\n :from:x-gm-gg:x-gm-message-state:from:to:cc:subject:date:message-id\n :reply-to;\n bh=Yv3oTdvMCF3E1Ydfachp3pQaec5D3AZeHfbkXd6nGe8=;\n b=pBY1Q7U/hpQUQi/8+PowJiqBYjlki6FKgMIWY88cX4/GZB5EMs5B2LlDW1tOTy3pbJ\n lprmZiu4sOEpDlyGbLsUWI4syEkVuU0hj1h2Umz5Cc5VJljo7l1+bxy7/NLyq5uudMdE\n Ubckyv+6OzIFC4TGUzTJz0gvos1KHe8LtpcKGysxo3eJ8U/ymOi9ha8QYWlp2Dlshbgb\n bHu/5/OClFvRQ6RSTCEv1grfCBJVb5CWhEhJHhuaHw4ciiYNA37zrHohkyXFU/5aJdxG\n J6vJjArS5tVvqeFkLZC43rQ1Pv7r/CIi2RmaqXYf1SPqb4PNjif12b2YiUULc11DpvQu\n GLvg==", "X-Gm-Message-State": "AOJu0YylfCdIA3q4KDkOsuYgLmloIovjkzsAxoH6YxdD9HEBRJxumP6X\n 1Rc21K0Y9ac9mlgTp0CU9S+kTq7+5YAVJieGG4moaWt+WR0Qe9waoMEahnHjg2EZOLS9TtAC6TE\n BRidiuHn6DwLGXhqiBzwMqYDjJefrWTdHHJFN94CgF6za8qnQXqiAiVBHtJWx3TVqHNTdOfPuTM\n UgQ97Bwz421OSoyQ==", "X-Gm-Gg": "AeBDiesaf0HHSWxsLvcfLZ/J5I34EhSdmgZP3Hyiybl7h1PvrVueGDoxAAQGnLwqYEH\n AI/8zOwRAuH9zdMcl0eEOCQVPrHTk4L0cGum3NYdy6xUXQDrWbbJfcgcJiM8Vb17jRih40mfYTu\n dbew5IlpvIP69yd0uU28tqPv1rFK1GTFXcgGR9VILZeqtEMTDNoXFnqhZ+4++ED5hs6vSWeprZ7\n G6MQJqB8RGw2Ul5TB4jJsV29ssnjeUn3glQISiVmxCsoe7b1zd0WOEjjLIycd8YNBNYNqU9aZsY\n On1yjUzP/PUI2LTzHpkmsYR4PMSsEATVqzaA7CB4+Zp0REJLiEJLoJUdp1AKs/fM+HJqQWS8MG6\n pwB6yhtE/aa/csYaVdqhmTR2vTpXTCqI=", "X-Received": [ "by 2002:a05:6214:6112:b0:8a3:8f4c:3b6f with SMTP id\n 6a1803df08f44-8ac862f20b2mr3146026d6.51.1775766120950;\n Thu, 09 Apr 2026 13:22:00 -0700 (PDT)", "by 2002:a05:6214:6112:b0:8a3:8f4c:3b6f with SMTP id\n 6a1803df08f44-8ac862f20b2mr3145746d6.51.1775766120509;\n Thu, 09 Apr 2026 13:22:00 -0700 (PDT)" ], "From": "Ian Whitfield <ian.whitfield@canonical.com>", "To": "kernel-team@lists.ubuntu.com", "Subject": "[SRU][J:linux-gcp/N:linux-gcp/Q:linux-gcp/R:linux-gcp][PATCH 0/1]\n Make idpf built-in", "Date": "Thu, 9 Apr 2026 16:21:58 -0400", "Message-ID": "<20260409202159.162994-1-ian.whitfield@canonical.com>", "X-Mailer": "git-send-email 2.43.0", "MIME-Version": "1.0", "X-BeenThere": "kernel-team@lists.ubuntu.com", "X-Mailman-Version": "2.1.20", "Precedence": "list", "List-Id": "Kernel team discussions <kernel-team.lists.ubuntu.com>", "List-Unsubscribe": "<https://lists.ubuntu.com/mailman/options/kernel-team>,\n <mailto:kernel-team-request@lists.ubuntu.com?subject=unsubscribe>", "List-Archive": "<https://lists.ubuntu.com/archives/kernel-team>", "List-Post": "<mailto:kernel-team@lists.ubuntu.com>", "List-Help": "<mailto:kernel-team-request@lists.ubuntu.com?subject=help>", "List-Subscribe": "<https://lists.ubuntu.com/mailman/listinfo/kernel-team>,\n <mailto:kernel-team-request@lists.ubuntu.com?subject=subscribe>", "Content-Type": "text/plain; charset=\"utf-8\"", "Content-Transfer-Encoding": "base64", "Errors-To": "kernel-team-bounces@lists.ubuntu.com", "Sender": "\"kernel-team\" <kernel-team-bounces@lists.ubuntu.com>" }, "content": "BugLink: https://bugs.launchpad.net/bugs/2144694\n\n[ Impact ]\n\n* On Google bare metal instances, cloud-init may fail to detect the correct\n datasource during the local init stage if the kernel hasn’t initialized the\n NIC in time. This can prevent metadata fetching and block SSH on first boot.\n\n* Users of these instances may be unable to log in immediately after first\n boot, breaking automated deployments, cloud-init-based provisioning, and\n scripts relying on metadata.\n\n* Including `IDPF` as built-in would minimize the race condition between cloud-\n init local and the kernel initilizing the NIC, allowing the NIC to come\n up early enough for cloud-init local to be able to successfully detect the\n correct datasource.\n\n[ Test Plan ]\n\n * 1. Launch a Questing c3-standard-192-metal machine on Google cloud.\n\n * 2. Wait several minutes after the instance reaches running, then attempt to\n SSH into the instance. You will see this error:\n Permission denied (publickey).\n\n * 3. Switch disks to one where the kernel has IDPF built-in\n\n * 4. Reboot the machine and check the following:\n\n * SSH works immediately\n\n * Check the journal logs with the following command:\n journalctl -b 0 -o short-monotonic |\n grep -E \"cloud-init|idpf|enp5s0f0|wait-online\"\n\n * In the journal logs, the NIC should come up before\n cloud-init local finishes running\n\n * In the journal logs, the NIC should have LINK UP,\n gained carrier, and DCHP aquired before Net device\n info is printed\n\n * `cloud-init status --long` should show the\n correct datasource (DataSourceGCELocal)\n\n[ Where problems could occur ]\n\n * Making `IDPF` built-in does not address the underlying race condition between\n cloud-init local and the kernel finishing NIC initialization. It simply\n minimizes it enough to \"fix\" the issue as a temporary workaround.\n\n * Problems may occur if `IDPF` needs to support features that rely on loadable\n drivers, such as RDMA.\n\n[ Other Info ]\n\n * We can try and revisit modularization once the cloud-init first-boot races\n are fully resolved.\n\ncloud-init bug: https://github.com/canonical/cloud-init/issues/6737\n\nSF: 00424355\n\n\n\nIan Whitfield (1):\n UBUNTU: [Config] gcp: Make idpf built-in\n\n debian.gcp/config/annotations | 4 ++--\n 1 file changed, 2 insertions(+), 2 deletions(-)" }