[{"id":3675501,"web_url":"http://patchwork.ozlabs.org/comment/3675501/","msgid":"<CAPYWp2o5SU4yR9jgnUV5QP=01sBqpHN7GcU9wfc_UFWJ4hHNsQ@mail.gmail.com>","list_archive_url":null,"date":"2026-04-09T20:33:29","subject":"ACK: [SRU][J:linux-gcp/N:linux-gcp/Q:linux-gcp/R:linux-gcp][PATCH\n 0/1] Make idpf built-in","submitter":{"id":87961,"url":"http://patchwork.ozlabs.org/api/people/87961/","name":"Kevin Becker","email":"kevin.becker@canonical.com"},"content":"On Thu, Apr 9, 2026 at 4:22 PM Ian Whitfield <ian.whitfield@canonical.com>\nwrote:\n\n> BugLink: https://bugs.launchpad.net/bugs/2144694\n>\n> [ Impact ]\n>\n> * On Google bare metal instances, cloud-init may fail to detect the correct\n>   datasource during the local init stage if the kernel hasn’t initialized\n> the\n>   NIC in time. This can prevent metadata fetching and block SSH on first\n> boot.\n>\n> * Users of these instances may be unable to log in immediately after first\n>   boot, breaking automated deployments, cloud-init-based provisioning, and\n>   scripts relying on metadata.\n>\n> * Including `IDPF` as built-in would minimize the race condition between\n> cloud-\n>   init local and the kernel initilizing the NIC, allowing the NIC to come\n>   up early enough for cloud-init local to be able to successfully detect\n> the\n>   correct datasource.\n>\n> [ Test Plan ]\n>\n>  * 1. Launch a Questing c3-standard-192-metal machine on Google cloud.\n>\n>  * 2. Wait several minutes after the instance reaches running, then\n> attempt to\n>       SSH into the instance. You will see this error:\n>       Permission denied (publickey).\n>\n>  * 3. Switch disks to one where the kernel has IDPF built-in\n>\n>  * 4. Reboot the machine and check the following:\n>\n>       * SSH works immediately\n>\n>       * Check the journal logs with the following command:\n>         journalctl -b 0 -o short-monotonic |\n>         grep -E \"cloud-init|idpf|enp5s0f0|wait-online\"\n>\n>       * In the journal logs, the NIC should come up before\n>         cloud-init local finishes running\n>\n>       * In the journal logs, the NIC should have LINK UP,\n>         gained carrier, and DCHP aquired before Net device\n>         info is printed\n>\n>       * `cloud-init status --long` should show the\n>          correct datasource (DataSourceGCELocal)\n>\n> [ Where problems could occur ]\n>\n>  * Making `IDPF` built-in does not address the underlying race condition\n> between\n>    cloud-init local and the kernel finishing NIC initialization. It simply\n>    minimizes it enough to \"fix\" the issue as a temporary workaround.\n>\n>  * Problems may occur if `IDPF` needs to support features that rely on\n> loadable\n>    drivers, such as RDMA.\n>\n> [ Other Info ]\n>\n>  * We can try and revisit modularization once the cloud-init first-boot\n> races\n>    are fully resolved.\n>\n> cloud-init bug: https://github.com/canonical/cloud-init/issues/6737\n>\n> SF: 00424355\n>\n>\n>\n> Ian Whitfield (1):\n>   UBUNTU: [Config] gcp: Make idpf built-in\n>\n>  debian.gcp/config/annotations | 4 ++--\n>  1 file changed, 2 insertions(+), 2 deletions(-)\n>\n> --\n> 2.43.0\n>\n>\n> --\n> kernel-team mailing list\n> kernel-team@lists.ubuntu.com\n> https://lists.ubuntu.com/mailman/listinfo/kernel-team\n\n\nAcked-by: Kevin Becker <kevin.becker@canonical.com>","headers":{"Return-Path":"<kernel-team-bounces@lists.ubuntu.com>","X-Original-To":"incoming@patchwork.ozlabs.org","Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=fail reason=\"signature verification failed\" (4096-bit key;\n unprotected) header.d=canonical.com header.i=@canonical.com\n header.a=rsa-sha256 header.s=20251003 header.b=iimOKGEC;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.ubuntu.com\n (client-ip=185.125.189.65; helo=lists.ubuntu.com;\n envelope-from=kernel-team-bounces@lists.ubuntu.com;\n receiver=patchwork.ozlabs.org)"],"Received":["from lists.ubuntu.com (lists.ubuntu.com [185.125.189.65])\n\t(using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fsBVG1Nv6z1xy1\n\tfor <incoming@patchwork.ozlabs.org>; Fri, 10 Apr 2026 06:33:57 +1000 (AEST)","from localhost ([127.0.0.1] helo=lists.ubuntu.com)\n\tby lists.ubuntu.com with esmtp (Exim 4.86_2)\n\t(envelope-from <kernel-team-bounces@lists.ubuntu.com>)\n\tid 1wAw4S-00077n-Ak; Thu, 09 Apr 2026 20:33:48 +0000","from smtp-relay-internal-1.internal ([10.131.114.114]\n helo=smtp-relay-internal-1.canonical.com)\n by lists.ubuntu.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128)\n (Exim 4.86_2) (envelope-from <kevin.becker@canonical.com>)\n id 1wAw4R-00077T-5X\n for kernel-team@lists.ubuntu.com; Thu, 09 Apr 2026 20:33:47 +0000","from mail-ej1-f69.google.com (mail-ej1-f69.google.com\n [209.85.218.69])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest\n SHA256)\n (No client certificate requested)\n by smtp-relay-internal-1.canonical.com (Postfix) with ESMTPS id 06C453F13F\n for <kernel-team@lists.ubuntu.com>; Thu,  9 Apr 2026 20:33:47 +0000 (UTC)","by mail-ej1-f69.google.com with SMTP id\n a640c23a62f3a-b9c5f899463so181866866b.1\n for <kernel-team@lists.ubuntu.com>; Thu, 09 Apr 2026 13:33:47 -0700 (PDT)"],"DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com;\n s=20251003; t=1775766827;\n bh=vzvD8imvqlW2bDk9o4AdSEgkxVcMUXQ1wwJagszWG2g=;\n h=MIME-Version:References:In-Reply-To:From:Date:Message-ID:Subject:\n To:Cc:Content-Type;\n b=iimOKGECsjPt0mD79ZlTXyuU3f0Nc/7xOWKWWX7ypuBRs+nQyDzQHexfg3NU4c/1S\n 5MfCIAjP+EUj28rRMFKhdMTSZTnSzWtjMDLdd3b5Rxr6g63q1m5G827ATOtw5t/COo\n l2fx79yy3S4aLmODNnvX7w1MsAg2oYysp8rjtdjUOPi7KRkytaLtbGUPyv3wBM4COo\n +kmQFk0NbGwDblyYAFviq93WlsbqHr9WFjonY1AXQqP7Z08f4vz5pNs6OYshskrTUG\n b0X5gR906mB9CTVuRpFVYPUUgxKk/M94pxiVhRLKJ91O+88c8nEL3xO8SlN3vbqkI0\n kOkf7WPOIiS33xZSUu7Zm4e95RYSSUHSzdcl3ZDmDy0HBc6xKyrKdLDONhc8tIoHPx\n grKpiVRuVTtzuIcMjF5SIsbnuaB3qocMTRWCmgnTE73psO8V9j3+OxvYRugU6veUwH\n JT2ysDzH9jBpjDlNLG69HKhhSANq1rZ/rZMfTwSrgUHzk0I/8F6yCh/4oK0gGqDxJH\n 64NAtHP0A/gS11ZcV/u38p/bluvbmvePiP4jYucMU5Eby3XCL0bp3eACSfiYGGr4ww\n pmX/qCJw6Nv8iN/F2m7eR4VC5pdBVysQPdWbxk2W7OplFrTFgYagVEf2+YTSJjFr7E\n uOlMYYnt5hmUKl15C8Chef9w=","ARC-Seal":"i=1; a=rsa-sha256; t=1775766826; cv=none;\n d=google.com; s=arc-20240605;\n b=CcBABqA4xPMWjlHomF8KU88BT9e6Rhf+LePnqcDYHmWfLthI2GWuLY1QF95fqzmjV0\n p9BCGkplTqKwyCDDCXqr9nTgr3yt8EpywUyZAWClQ/wWRhwZh19fRC9c4CAk6oGdg7xo\n Jl2117IpWiLSVaR9TTjdbBj0ZwfbRU57uCWsC0qX/TxViZXoIX1zaexH4OzbafrDryhh\n R2S84DJT5Q591gTlumqYRSUCKwdBb/GSt1NA0anT+Ll3LoaaLo2bjQZe+9kSz0Sv9GKr\n ImqLuAvOz0S+J8Lohu9dgyhH3PbU/hd/Q5zhxjtlBWAH9P8XSiERrq+MfbkxPsHtEud+\n bwcQ==","ARC-Message-Signature":"i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com;\n s=arc-20240605;\n h=cc:to:subject:message-id:date:from:in-reply-to:references\n :mime-version;\n bh=vzvD8imvqlW2bDk9o4AdSEgkxVcMUXQ1wwJagszWG2g=;\n fh=gUGJDje7HAPD8HmMZH4ClrlQCY5TX9Qie1X8lKDs3Sg=;\n b=T6o4MzNX6AwaBLLOWX4pE4iGyUlU1rssxQkhW8F5/KHk8GjNwYZKJdX9bGpDXJiVCe\n xHevuJpftiC+NDRc/+Z+cuD+lvzVv/1NIfaSiGVlogQ5dcodXdqkcwb9XHghP3H6YMcj\n vFm8DQMA/v8yz4qo1SJ2Qc9zTtTH5GC+Z6nZNPt5hAQW5+injLiuztBfLS/wbFvWUCEE\n +pT/E73iZ2y889eH/v8z3RV8u+GvaJ7qKw2RM+ZIKebwFIryfKz9IiqwF7S25NqoJytD\n W9B8iNoE0ydnRUhYVHI7gUHfpgflQWEecnHIDedADU0r3I6ucWtySnT9I8CdHPvKOUvb\n /n5w==; darn=lists.ubuntu.com","ARC-Authentication-Results":"i=1; mx.google.com; arc=none","X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1775766826; x=1776371626;\n h=cc:to:subject:message-id:date:from:in-reply-to:references\n :mime-version:x-gm-gg:x-gm-message-state:from:to:cc:subject:date\n :message-id:reply-to;\n bh=vzvD8imvqlW2bDk9o4AdSEgkxVcMUXQ1wwJagszWG2g=;\n b=XfQDMbWJ2VXZdjdyr1co99DSI39cjMOjotYSJfOOQcHeaMhSppgA2D7x8AZM8cmr4W\n gqQbk0MDeLRC4QlGT8aKj/DnOa0hT2MxRdG9P8yubRAHwc/ViRkLyavezdZow+dSaIte\n 2/Tnr0jgNRPraTSssq0SQkcxBdFvevB7dFA6vPENEqDXIIZ5gyZh6wvGCY27td5RP+hP\n CSsbovMyiPa/Bm0dF83EU/NySRoj3cz2qDUtdSWKFnJ4TCn7SwVVKmxtHbiVaHuk/lKa\n SRT3setU90SR5RBw0iXeBhTqR69FwSZmagxYQQj+yIDK22nm54ha5qALgRVSBMbGYftP\n BjEQ==","X-Gm-Message-State":"AOJu0YyEO8X2GqhVyJ0SxqHsiJbsz5V0ZILvBNeruB+ViqDmqRS9APp0\n UlcJQVYerWNk8F86Ddd1xKbt8+zHs6jHGlMzvXs59mvaKDB7GXGCwrR2pMeZSM2FapfraWgoYjy\n iXzrHroShXqNMFFDNy0IAjDGNmHRF2Q9nldRaDycnmHFT1JRYCCDoMJSafK1o/OeoX0a7sxuxge\n fu66MmtxvMFf+bZdkH4LtnGPsyctxWO1uPbmpB9wxxDKPNp4iqnm3u1pak","X-Gm-Gg":"AeBDietQUBY04CuEc19mcOhNyT56/FlgGrCPx0k3z9mkWVOMslrmVJp51wos2jHlkmY\n 86rZi+FmQAr1m2urViOeijJF5coMOuEsYlORoCFXKY6YB5dMXt45tahAdmawp4dAHaSrumqigZe\n LuG71LaVMrLs5P8aYIB3Uf5vb1/MJSClXxAZZate/eQHJzXxtqDVTuEsPV5m1PGLPzpjRgIkUK7\n TD6","X-Received":["by 2002:a17:907:7f86:b0:b96:f4f6:2a02 with SMTP id\n a640c23a62f3a-b9d4626722bmr265129366b.25.1775766826419;\n Thu, 09 Apr 2026 13:33:46 -0700 (PDT)","by 2002:a17:907:7f86:b0:b96:f4f6:2a02 with SMTP id\n a640c23a62f3a-b9d4626722bmr265127866b.25.1775766825866; Thu, 09 Apr 2026\n 13:33:45 -0700 (PDT)"],"MIME-Version":"1.0","References":"<20260409202159.162994-1-ian.whitfield@canonical.com>","In-Reply-To":"<20260409202159.162994-1-ian.whitfield@canonical.com>","From":"Kevin Becker <kevin.becker@canonical.com>","Date":"Thu, 9 Apr 2026 16:33:29 -0400","X-Gm-Features":"AQROBzCo7GPffYS9BAC4fIOkzfOwX5Pe4NG5ME3HxfUA8pd0gIlRG85Q7vnYF1I","Message-ID":"\n <CAPYWp2o5SU4yR9jgnUV5QP=01sBqpHN7GcU9wfc_UFWJ4hHNsQ@mail.gmail.com>","Subject":"ACK: [SRU][J:linux-gcp/N:linux-gcp/Q:linux-gcp/R:linux-gcp][PATCH\n 0/1] Make idpf built-in","To":"Ian Whitfield <ian.whitfield@canonical.com>","X-BeenThere":"kernel-team@lists.ubuntu.com","X-Mailman-Version":"2.1.20","Precedence":"list","List-Id":"Kernel team discussions <kernel-team.lists.ubuntu.com>","List-Unsubscribe":"<https://lists.ubuntu.com/mailman/options/kernel-team>,\n <mailto:kernel-team-request@lists.ubuntu.com?subject=unsubscribe>","List-Archive":"<https://lists.ubuntu.com/archives/kernel-team>","List-Post":"<mailto:kernel-team@lists.ubuntu.com>","List-Help":"<mailto:kernel-team-request@lists.ubuntu.com?subject=help>","List-Subscribe":"<https://lists.ubuntu.com/mailman/listinfo/kernel-team>,\n <mailto:kernel-team-request@lists.ubuntu.com?subject=subscribe>","Cc":"kernel-team@lists.ubuntu.com","Content-Type":"multipart/mixed; boundary=\"===============8122416021727908596==\"","Errors-To":"kernel-team-bounces@lists.ubuntu.com","Sender":"\"kernel-team\" <kernel-team-bounces@lists.ubuntu.com>"}},{"id":3675510,"web_url":"http://patchwork.ozlabs.org/comment/3675510/","msgid":"<adgQ5TVk07s4dnZ_@tswhison-laptop>","list_archive_url":null,"date":"2026-04-09T20:49:41","subject":"ACK: [SRU][J:linux-gcp/N:linux-gcp/Q:linux-gcp/R:linux-gcp][PATCH\n 0/1] Make idpf built-in","submitter":{"id":89903,"url":"http://patchwork.ozlabs.org/api/people/89903/","name":"Tim Whisonant","email":"tim.whisonant@canonical.com"},"content":"On Thu, Apr 09, 2026 at 04:21:58PM -0400, Ian Whitfield wrote:\n> BugLink: https://bugs.launchpad.net/bugs/2144694\n> \n> [ Impact ]\n> \n> * On Google bare metal instances, cloud-init may fail to detect the correct\n>   datasource during the local init stage if the kernel hasn’t initialized the\n>   NIC in time. This can prevent metadata fetching and block SSH on first boot.\n> \n> * Users of these instances may be unable to log in immediately after first\n>   boot, breaking automated deployments, cloud-init-based provisioning, and\n>   scripts relying on metadata.\n> \n> * Including `IDPF` as built-in would minimize the race condition between cloud-\n>   init local and the kernel initilizing the NIC, allowing the NIC to come\n>   up early enough for cloud-init local to be able to successfully detect the\n>   correct datasource.\n> \n> [ Test Plan ]\n> \n>  * 1. Launch a Questing c3-standard-192-metal machine on Google cloud.\n> \n>  * 2. Wait several minutes after the instance reaches running, then attempt to\n>       SSH into the instance. You will see this error:\n>       Permission denied (publickey).\n> \n>  * 3. Switch disks to one where the kernel has IDPF built-in\n> \n>  * 4. Reboot the machine and check the following:\n> \n>       * SSH works immediately\n> \n>       * Check the journal logs with the following command:\n>         journalctl -b 0 -o short-monotonic |\n>         grep -E \"cloud-init|idpf|enp5s0f0|wait-online\"\n> \n>       * In the journal logs, the NIC should come up before\n>         cloud-init local finishes running\n> \n>       * In the journal logs, the NIC should have LINK UP,\n>         gained carrier, and DCHP aquired before Net device\n>         info is printed\n> \n>       * `cloud-init status --long` should show the\n>          correct datasource (DataSourceGCELocal)\n> \n> [ Where problems could occur ]\n> \n>  * Making `IDPF` built-in does not address the underlying race condition between\n>    cloud-init local and the kernel finishing NIC initialization. It simply\n>    minimizes it enough to \"fix\" the issue as a temporary workaround.\n> \n>  * Problems may occur if `IDPF` needs to support features that rely on loadable\n>    drivers, such as RDMA.\n> \n> [ Other Info ]\n> \n>  * We can try and revisit modularization once the cloud-init first-boot races\n>    are fully resolved.\n> \n> cloud-init bug: https://github.com/canonical/cloud-init/issues/6737\n> \n> SF: 00424355\n> \n> \n> \n> Ian Whitfield (1):\n>   UBUNTU: [Config] gcp: Make idpf built-in\n> \n>  debian.gcp/config/annotations | 4 ++--\n>  1 file changed, 2 insertions(+), 2 deletions(-)\n> \n> -- \n> 2.43.0\n> \n\nAcked-by: Tim Whisonant <tim.whisonant@canonical.com>","headers":{"Return-Path":"<kernel-team-bounces@lists.ubuntu.com>","X-Original-To":"incoming@patchwork.ozlabs.org","Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=fail reason=\"signature verification failed\" (4096-bit key;\n unprotected) header.d=canonical.com header.i=@canonical.com\n header.a=rsa-sha256 header.s=20251003 header.b=BrY4JMPI;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.ubuntu.com\n (client-ip=185.125.189.65; helo=lists.ubuntu.com;\n envelope-from=kernel-team-bounces@lists.ubuntu.com;\n receiver=patchwork.ozlabs.org)"],"Received":["from lists.ubuntu.com (lists.ubuntu.com [185.125.189.65])\n\t(using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fsBrf161sz1y05\n\tfor <incoming@patchwork.ozlabs.org>; Fri, 10 Apr 2026 06:49:54 +1000 (AEST)","from localhost ([127.0.0.1] helo=lists.ubuntu.com)\n\tby lists.ubuntu.com with esmtp (Exim 4.86_2)\n\t(envelope-from <kernel-team-bounces@lists.ubuntu.com>)\n\tid 1wAwJv-0001Yx-7U; Thu, 09 Apr 2026 20:49:47 +0000","from smtp-relay-internal-0.internal ([10.131.114.225]\n helo=smtp-relay-internal-0.canonical.com)\n by lists.ubuntu.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128)\n (Exim 4.86_2) (envelope-from <tim.whisonant@canonical.com>)\n id 1wAwJu-0001Yj-89\n for kernel-team@lists.ubuntu.com; Thu, 09 Apr 2026 20:49:46 +0000","from mail-yw1-f200.google.com (mail-yw1-f200.google.com\n [209.85.128.200])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest\n SHA256)\n (No client certificate requested)\n by smtp-relay-internal-0.canonical.com (Postfix) with ESMTPS id 1FF473F65B\n for <kernel-team@lists.ubuntu.com>; Thu,  9 Apr 2026 20:49:46 +0000 (UTC)","by mail-yw1-f200.google.com with SMTP id\n 00721157ae682-798656130b0so22214117b3.1\n for <kernel-team@lists.ubuntu.com>; Thu, 09 Apr 2026 13:49:46 -0700 (PDT)","from localhost (104-6-108-11.lightspeed.frokca.sbcglobal.net.\n [104.6.108.11]) by smtp.gmail.com with ESMTPSA id\n 00721157ae682-7af400ec8dcsm4133447b3.46.2026.04.09.13.49.43\n for <kernel-team@lists.ubuntu.com>\n (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n Thu, 09 Apr 2026 13:49:43 -0700 (PDT)"],"DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com;\n s=20251003; t=1775767786;\n bh=Fb8Ef6o9bEzufZ6f1cJLVOQFLTbKmDEdAnBR3RnOwJk=;\n h=Date:From:To:Subject:Message-ID:References:MIME-Version:\n Content-Type:In-Reply-To;\n b=BrY4JMPIyhohbi6bg47GkkamrsFLc2tQADyl8xSmpCyW7+lJHDXFq9SsGJdVid91K\n 3/yw9fg+0n8ja65/HhUbBfQR1sgiuU5sFEi2oDcMO2+U/xbiIhM9OKIdFRBMywumSe\n 1GMfwP4kGH7+8TMQqn/rFLUK1CaQUtLvLF0f+cc1nDg0ypOGUXXuiTl0Ct77dmx9XO\n ThXw4QljjDnkHrGqg4y9D6i+WpJ5N34aTf/vLarIMUGtHknz9MHZZa8mfwHJQML8XN\n KxlLGfTzy+v9wg6IvSMCVIg3fEq59rmjZkZ00SCggCWtE93q9Dkt5LP4/ERzIvNJba\n adkH2aGBRYvoss7cUQOHOhVvs8MnAKEKcon9vyZCNP4roQY8hoiMh8EInTzH1Ngql1\n gH9JJRAUmQqFJPzvxh1IBLv9/qsq/02NGRJa1XIEtpn48iGrk//OzuCbmPf0sMQJrT\n hlryx6AKufc7SCq8JYJT5G+IUz45aK2jrTB3NPrj/9ZiIle7pfc/vrBIW468Fa4yLC\n rgs8Lih1N6UTToC0uIuLDoqtYG1KVnPyE9G+nf3+S6ZwdOwcHhyMUiSvz2D4eR1FOb\n 62mKfnUx7U9S5d7d59/HAq2uitDAWk8ffjsX1ZVauYV8m2bwex42JUkVAyIeWea7iR\n PJ2p2OENfPahtn31JZBLpn8o=","X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1775767784; x=1776372584;\n h=in-reply-to:content-transfer-encoding:content-disposition\n :mime-version:references:message-id:subject:to:from:date:x-gm-gg\n :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to;\n bh=Fb8Ef6o9bEzufZ6f1cJLVOQFLTbKmDEdAnBR3RnOwJk=;\n b=g6KXOBBMvlZY6pVy1yQqbx7IiYI6CArHNL50HWnV/uyv9wcChLQVuOEWoeZsqEkL4V\n FXacr8G5VJQ4EEy13IiSCQ1HO+pcc7hcc5eAU4Lij6z141A7MCZixMwAHLRzo2Rzv5Q4\n IndTKJrdiT/33ZmvdmExqgUPILjahdC0cVNkXIylxt5J8yeSOqdYsFNqw9S9lcM0peTL\n Hs8gSxjFhhnGhKBVt1Qk+jq5ReiVQ64pKDg8J8UCLqQuo9FUmUpbB90wxS+55bHrA6Hx\n bTqNvvCdZiGOsYWkcfR8EvP0w6wF1s3YZBA1sVnaSV3CQPR2cK75L1Py4xVUvaASyYju\n n5lA==","X-Gm-Message-State":"AOJu0YyahVAxOQG/bdIx5MC3vEe9DY176wfliztpRfgCB93g1dbYMP9Z\n 1gaNxGo1PXYPvX9cjiRmGM5965Rr5veaC6umKXb2TfAKLmi8DIfqKEGFB8um7yFBol2ZvDkTMwe\n 7cYcC1w+mJzaKrr9CqO7ZMwpy2xhcykt3XkL0AHk9hXwPwZvmhMGWdrBdn0r0R3vABiH1j5SZXv\n 0ffpRyAv108vvwTg==","X-Gm-Gg":"AeBDievp51ftA56Y1XjXxJqMubecX1Bw7ULdTKrcoDe3ZPTpaalEWoXXcSiL6YWmYp9\n v5C4iUOyLUQMPReogXxn3SfDd1D5VlR0YAoNCfZi8gz3EgEv9xwZtw2hXe/CxKFGkTWOdfq4P+f\n A/88XaLOp9f1LOoHicMU8jsRwOEDXJENdNiYnDCv7ODd8qx+jvbERI99DRZoyriiqJN5MURInNr\n KN8O3LVgqMGirBryGQrVwjVQpdDceBzEM9zy1WTjG1IVuTpjUPpUGKKFBOXd90pa7MPOOb9T6ee\n w37sSSTYMzIDKrWlVkgM63GzszNjCQXqez9puhH7ArVTBg/dWiWo7b4yGr3YH1sJKkGH5qCy7ka\n QhhxWUQJ9GaSCBv5/cyha+l2iTfMHZ2j5Pg2rhGJ39fgER6qd2tQz/tA33JrCvLsvir+hCI76Xr\n vGaA==","X-Received":["by 2002:a05:690c:e4c4:b0:79b:d56a:a7c2 with SMTP id\n 00721157ae682-7af72245f80mr4899187b3.48.1775767784322;\n Thu, 09 Apr 2026 13:49:44 -0700 (PDT)","by 2002:a05:690c:e4c4:b0:79b:d56a:a7c2 with SMTP id\n 00721157ae682-7af72245f80mr4899007b3.48.1775767783969;\n Thu, 09 Apr 2026 13:49:43 -0700 (PDT)"],"Date":"Thu, 9 Apr 2026 13:49:41 -0700","From":"Tim Whisonant <tim.whisonant@canonical.com>","To":"kernel-team@lists.ubuntu.com","Subject":"ACK: [SRU][J:linux-gcp/N:linux-gcp/Q:linux-gcp/R:linux-gcp][PATCH\n 0/1] Make idpf built-in","Message-ID":"<adgQ5TVk07s4dnZ_@tswhison-laptop>","References":"<20260409202159.162994-1-ian.whitfield@canonical.com>","MIME-Version":"1.0","Content-Disposition":"inline","In-Reply-To":"<20260409202159.162994-1-ian.whitfield@canonical.com>","X-BeenThere":"kernel-team@lists.ubuntu.com","X-Mailman-Version":"2.1.20","Precedence":"list","List-Id":"Kernel team discussions <kernel-team.lists.ubuntu.com>","List-Unsubscribe":"<https://lists.ubuntu.com/mailman/options/kernel-team>,\n <mailto:kernel-team-request@lists.ubuntu.com?subject=unsubscribe>","List-Archive":"<https://lists.ubuntu.com/archives/kernel-team>","List-Post":"<mailto:kernel-team@lists.ubuntu.com>","List-Help":"<mailto:kernel-team-request@lists.ubuntu.com?subject=help>","List-Subscribe":"<https://lists.ubuntu.com/mailman/listinfo/kernel-team>,\n <mailto:kernel-team-request@lists.ubuntu.com?subject=subscribe>","Content-Type":"text/plain; charset=\"utf-8\"","Content-Transfer-Encoding":"base64","Errors-To":"kernel-team-bounces@lists.ubuntu.com","Sender":"\"kernel-team\" <kernel-team-bounces@lists.ubuntu.com>"}}]