From patchwork Fri Mar 10 15:16:49 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Juerg Haefliger X-Patchwork-Id: 1755286 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.ubuntu.com (client-ip=91.189.94.19; helo=huckleberry.canonical.com; envelope-from=kernel-team-bounces@lists.ubuntu.com; receiver=) Authentication-Results: legolas.ozlabs.org; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=canonical.com header.i=@canonical.com header.a=rsa-sha256 header.s=20210705 header.b=DtSbBmrY; dkim-atps=neutral Received: from huckleberry.canonical.com (huckleberry.canonical.com [91.189.94.19]) (using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4PY8mQ25xKz1yWp for ; Sat, 11 Mar 2023 02:17:09 +1100 (AEDT) Received: from localhost ([127.0.0.1] helo=huckleberry.canonical.com) by huckleberry.canonical.com with esmtp (Exim 4.86_2) (envelope-from ) id 1paeUL-00011B-61; Fri, 10 Mar 2023 15:16:57 +0000 Received: from smtp-relay-internal-0.internal ([10.131.114.225] helo=smtp-relay-internal-0.canonical.com) by huckleberry.canonical.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1paeUJ-000114-10 for kernel-team@lists.ubuntu.com; Fri, 10 Mar 2023 15:16:55 +0000 Received: from mail-ed1-f70.google.com (mail-ed1-f70.google.com [209.85.208.70]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by smtp-relay-internal-0.canonical.com (Postfix) with ESMTPS id C090A3F07F for ; Fri, 10 Mar 2023 15:16:53 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com; s=20210705; t=1678461413; bh=YHxHB9HlTka1XPXcljb9267xyiwb2wvuXo31IML0FYE=; h=From:To:Subject:Date:Message-Id:MIME-Version; b=DtSbBmrYc0hUs6K+HDKFpNMX6vfUPUcbwamSZQNTpdB1PLv8ogLxvSJsHDEVUp7sw arBaLC6wp6N4ezrrp7HJzHuoWujwBy5/Fp659qYApLgwP4KE6Lus35zD3B9GmBk9Zm O3/KPKJiMVm2KDrKtcf6FUtJoAHHt66v+az2I0PB1Dg7AO3EQpPPZ8XAMCgAZLsydG 9XiAwZeX3SgrPQ+2r2wsf1LJvMt+0H3p5p1pxsdiNJkRwsVwUs8L8k9i0LO6m/ZjGH gZzAPD2+bs7YRDp7VnILcR2bLCMHeT+XG6Xi4qsXtesFs7nmZxHOKo06Wqm2FnUnKq JVmm9SNPqNm8A== Received: by mail-ed1-f70.google.com with SMTP id q13-20020a5085cd000000b004af50de0bcfso8243083edh.15 for ; Fri, 10 Mar 2023 07:16:53 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; t=1678461413; h=content-transfer-encoding:mime-version:message-id:date:subject:to :from:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=YHxHB9HlTka1XPXcljb9267xyiwb2wvuXo31IML0FYE=; b=rp00B0BmwQZvRgP6ASYs081IDj/Jo2vBwsKVvUrvum5CpTNMgPxWxtTlgY+MgMVQp3 zJQlwDMrn4lLa06KM8Z765HAVl5RgbUD5PLdnrhpHvGMq8JUSwFV+vvdlvcdPM8dsDvp EG8Z4NJ8uID1wWJjzO7Nj3/6ON7cfgknImQHYMpIi0chJoZq0R8sXQmBahFgVXAh0MbI wKfo5hm5u3ME9HH+2q70mAvlLGfgGimkHY2E3oF5/0s58A39QxaaYMDxhACewUWExgCY aIe86BjbTBI0UipdKji3dnSSWvD16yObZYbQVIbS4Q1xum0DiV4MZ0I+i/kxcL+sqDne 7FEA== X-Gm-Message-State: AO0yUKWvC+84Y1rSoubWAS11eCE5+cqdJnI/IxPmH/TRutoCEFJKS19P 7wdf2XQw3MofR2NjBzVfQrxO8YNkc3qjmCyTMnGPRjK9ycxNOGI8rYh925Vtvuyn0uBYbsnLUtG 0uWsaLPhodxZvP0m4VCBseM/BBeIP1CXPY6h8n6WLwg2vUqEdBA== X-Received: by 2002:a17:906:274f:b0:87b:3d29:2990 with SMTP id a15-20020a170906274f00b0087b3d292990mr28171389ejd.9.1678461413541; Fri, 10 Mar 2023 07:16:53 -0800 (PST) X-Google-Smtp-Source: AK7set/1ItNapGyXF1KOOQeL8uwzWtzKCh0BuSBueYbuwJgK+l4x8SRJCPs0AegblSjzBML3dc9yQg== X-Received: by 2002:a17:906:274f:b0:87b:3d29:2990 with SMTP id a15-20020a170906274f00b0087b3d292990mr28171377ejd.9.1678461413321; Fri, 10 Mar 2023 07:16:53 -0800 (PST) Received: from localhost.localdomain ([194.191.244.86]) by smtp.gmail.com with ESMTPSA id g9-20020a1709061e0900b008c607dd7cefsm3524ejj.79.2023.03.10.07.16.52 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 10 Mar 2023 07:16:52 -0800 (PST) From: Juerg Haefliger To: kernel-team@lists.ubuntu.com Subject: [SRU][L/K/J:raspi][PATCH] UBUNTU: [Packaging] raspi: Include sunrpc and auth modules in linux-modules Date: Fri, 10 Mar 2023 16:16:49 +0100 Message-Id: <20230310151649.1745545-1-juerg.haefliger@canonical.com> X-Mailer: git-send-email 2.34.1 MIME-Version: 1.0 X-BeenThere: kernel-team@lists.ubuntu.com X-Mailman-Version: 2.1.20 Precedence: list List-Id: Kernel team discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: kernel-team-bounces@lists.ubuntu.com Sender: "kernel-team" BugLink: https://bugs.launchpad.net/bugs/2009597 These are required for Kerberos protected NFS connections, which is a generic enough use case, so include them in the linux-modules package. Signed-off-by: Juerg Haefliger Acked-by: Cory Todd Acked-by: Luke Nowakowski-krijger --- debian.raspi/control.d/raspi.inclusion-list | 2 ++ 1 file changed, 2 insertions(+) diff --git a/debian.raspi/control.d/raspi.inclusion-list b/debian.raspi/control.d/raspi.inclusion-list index f1d17b81b290..d27448f2341c 100644 --- a/debian.raspi/control.d/raspi.inclusion-list +++ b/debian.raspi/control.d/raspi.inclusion-list @@ -68,6 +68,8 @@ net/ipv4/* net/ipv6/* net/netfilter/* net/sched/* +net/sunrpc/auth_gss/* +net/sunrpc/sunrpc* net/vmw_vsock/* net/wireless/* sound/core/*