Skip to content

Conversation

@gladion136
Copy link

Hello, this PR adds tuxedo-drivers to akmods. It corresponding to this issue. The whole thing is currently WIP, so this PR is first on draft.

Can someone help me out a bit?
Is it possible to build akmods locally to debug the errors? Since the code restructuring I have not found a way..
And is "extra" the right area for the tuxedo-driver?

Source Repository: https://gitlab.com/tuxedocomputers/development/packages/tuxedo-drivers
Spec Source Repository: https://github.com/gladion136/tuxedo-drivers-kmod
Copr: https://copr.fedorainfracloud.org/coprs/gladion136/tuxedo-drivers-kmod/

@gladion136 gladion136 requested a review from castrojo as a code owner April 18, 2025 14:18
@dosubot dosubot bot added size:S This PR changes 10-29 lines, ignoring generated files. enhancement New feature or request question Further information is requested labels Apr 18, 2025
@gladion136 gladion136 marked this pull request as draft April 18, 2025 14:38
@bsherman
Copy link
Contributor

bsherman commented May 3, 2025

Hi @gladion136. Thank you for the PR and for your efforts to get this ready for inclusion in Universal Blue.

I recognize it's a bit tricky to build akmods locally since the recent changes to include kernel-cache as part of the akmods process.

I'm working on a small cleanup of akmods right now, after which I'll get back to you with some thoughts on how to get a local build going. Longer term, I want to clean this up even more so it's much simpler to run local builds, but that's a different topic.

@castrojo
Copy link
Contributor

castrojo commented Jun 14, 2025

Does someone have time to review this again? Would love to have better support for hardware manufacturers that support linux ootb. I would ship this in bluefin!

@bsherman
Copy link
Contributor

bsherman commented Jun 14, 2025

I was looking at this last night.

Where this got stuck is our current way of caching kernels makes it awkward to only do local akmod build testing.

I think the minimal solution is to move the kernel cache logic into a Justfile and probably a build akmods recipe as well.

At that point the original contributor can easily test the submission.

@m2Giles
Copy link
Member

m2Giles commented Jun 14, 2025

Agreed. With the current setup it makes it difficult for local builds and for those that do not have write permissions

@jlnr
Copy link

jlnr commented Jun 15, 2025

Oh this looks great, I can also try this on my IBP 14 Gen8 once it's ready for that.

@tobehn
Copy link

tobehn commented Jun 15, 2025

I was looking at this last night.

Where this got stuck is our current way of caching kernels makes it awkward to only do local akmod build testing.

I think the minimal solution is to move the kernel cache logic into a Justfile and probably a build akmods recipe as well.

At that point the original contributor can easily test the submission.

ujust tuxedo and boom installed drivers plus optionally tuxedo control center would probably satisfy most Tuxedo computer owners.

@gladion136 gladion136 force-pushed the feat/extra-add-tuxedo-driver branch 2 times, most recently from f931cc3 to f96c0da Compare June 17, 2025 22:07
@m2Giles
Copy link
Member

m2Giles commented Jul 3, 2025

I finally reworked the local building for akmods. Once that lands you will be able to locally build through kmod. #356

The kmod will be signed with our test key. You can either disable secureboot or enroll the test key to test out the kmod.

To then test the kmod, you will need to either locally layer the rpm with rpm-ostree.

@gladion136 gladion136 force-pushed the feat/extra-add-tuxedo-driver branch 2 times, most recently from d246219 to 4487a6f Compare July 13, 2025 14:38
Copy link
Member

@m2Giles m2Giles left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This looks good. You can put this in the block for common.

Are you now able to test building this?


ARCH="$(rpm -E '%_arch')"
KERNEL="$(rpm -q "${KERNEL_NAME}" --queryformat '%{VERSION}-%{RELEASE}.%{ARCH}')"
RELEASE="$(rpm -E '%fedora')"
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Are you only building for Fedora?

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yes, should I build for others too? I tried to keep it similar to the kvmfr script (https://copr.fedorainfracloud.org/coprs/hikariknight/looking-glass-kvmfr/).

KERNEL="$(rpm -q "${KERNEL_NAME}" --queryformat '%{VERSION}-%{RELEASE}.%{ARCH}')"
RELEASE="$(rpm -E '%fedora')"

if [[ "${RELEASE}" -ge 41 ]]; then
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Rawhide is F43. We also currently don't publish a rawhide akmods image.

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks, I removed the statement 👍 I also updated the copr to build for 43 and rawhide too.

@gladion136 gladion136 force-pushed the feat/extra-add-tuxedo-driver branch 2 times, most recently from abe3cca to 9328248 Compare October 19, 2025 12:12
@gladion136 gladion136 force-pushed the feat/extra-add-tuxedo-driver branch from 9328248 to 5ebc9bd Compare October 19, 2025 12:13
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

enhancement New feature or request question Further information is requested size:S This PR changes 10-29 lines, ignoring generated files.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

6 participants