Received: by 2002:a05:6358:11c7:b0:104:8066:f915 with SMTP id i7csp353937rwl; Tue, 11 Apr 2023 20:01:25 -0700 (PDT) X-Google-Smtp-Source: AKy350Z85qmtE9qVo5lPeAwa0WPLDNn9vaqRku9D6XGBC/nyHX+zkN5DCJyfbFd7F9KWt6fCjn2a X-Received: by 2002:a17:902:e5cb:b0:1a0:5349:6606 with SMTP id u11-20020a170902e5cb00b001a053496606mr876201plf.56.1681268485072; Tue, 11 Apr 2023 20:01:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1681268485; cv=none; d=google.com; s=arc-20160816; b=b8gYKVvkyMPQ559a+BVNVoTtmrfprOeDtD/Kj0HalVZocDLr/wI/X+Lfw/dfJ6XJCU D+px1vm7f/rpxEpiWN/xz9SFZJ+0NoPHkXyAMWlzJzVStnf1UlQaRiAlLrj9D6W8rp8d Rlh+GEliNP8/jTR1m+bpoFEyGtlQqMFajiA1yjGf/Sbr6fw+U75BFcF2RvhEBgLR7uhy t/841cPLK5UE/P7pdYvip7BLfMnyJCYXk7ghJ3zZPZrT9osiKtnbBZCn33j9CMaoB98f GxtuyC2Umw5oLvoM5KDbn0DZ4uiwaP7SXEgf2AGNUi7JSYeTeXBoQZnfpTN/jkaKQyO2 P/Bw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=zRuRID1z90VR55CAaVZuRCvfNFHtlJxq/Hc6njhL5mQ=; b=zwCSCQDEJD4qptOuaDB1W1JcGnXD4p/wcIarV7sJ/Wnyxy47EYYTTA2TG8c7CFNcMo YEAHLEkcFGeYAOItS5D2YGs6Gnjbwi5lMwHQU010nwPGaisU9fUfFbuapEyybnyGQpXq Fhuwlzoy+NuIxdZj/Ap/aOzDu1aK2gEZLyiJYDv+1KikdlUbNWqTa5/33BbjkfwpFo3H dw5V37O++0Ssq6w2qsELv6+81dAOuFQjo3AiU3Tu0xsfxh9722b38F6OUUtt1VNCPAUe 6c7bo541Rq4bnAgXnpyefmp1rWKzLs2IKOXDSWawWoWdJdVXizf/2yQ+Z+j4kp4PhkYh YkDw== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@mit.edu header.s=outgoing header.b=Q6eq9W5j; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=mit.edu Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id w185-20020a6382c2000000b005186e9530f6si6061728pgd.13.2023.04.11.20.01.12; Tue, 11 Apr 2023 20:01:25 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=fail header.i=@mit.edu header.s=outgoing header.b=Q6eq9W5j; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=mit.edu Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229700AbjDLC7K (ORCPT + 99 others); Tue, 11 Apr 2023 22:59:10 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52316 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229622AbjDLC7C (ORCPT ); Tue, 11 Apr 2023 22:59:02 -0400 Received: from outgoing.mit.edu (outgoing-auth-1.mit.edu [18.9.28.11]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 50FBF4C0D for ; Tue, 11 Apr 2023 19:58:55 -0700 (PDT) Received: from cwcc.thunk.org (pool-173-48-120-46.bstnma.fios.verizon.net [173.48.120.46]) (authenticated bits=0) (User authenticated as tytso@ATHENA.MIT.EDU) by outgoing.mit.edu (8.14.7/8.12.4) with ESMTP id 33C2wZZu031187 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 11 Apr 2023 22:58:35 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mit.edu; s=outgoing; t=1681268317; bh=zRuRID1z90VR55CAaVZuRCvfNFHtlJxq/Hc6njhL5mQ=; h=Date:From:To:Cc:Subject:References:In-Reply-To; b=Q6eq9W5jIgLrV8r00PWgoLh8tmlUMRKmdjaw0YJ336taBk5oeHJLMsyV+PNvUYj1j B7S4GEevbzPi16GfrHyODh/6aR/z5zYTwwr2hf4nUe2MV81szeLQoFMviD/x/OuP70 DAq3detdKfDy+K6qDRHC5yCHkP/bJ7ZHd7lUKxmxQjJiTHvn8SSn5sWuTii8UkX6UH 7+2wbd5q3LIOaOYa898dz5YZtZX9HkeEXshwyJz6XaIMaWp7hMleN7k20mddTontM8 p1aXjRJukUkBycSjm+JIkpVsFu8s6H0mgk3Opi99+tGhHn4dLIGWcS8lynVv+sklMW kswFWN5WOY0LA== Received: by cwcc.thunk.org (Postfix, from userid 15806) id E999015C4935; Tue, 11 Apr 2023 22:58:34 -0400 (EDT) Date: Tue, 11 Apr 2023 22:58:34 -0400 From: "Theodore Ts'o" To: Miguel Ojeda Cc: Deborah Brouwer , Daniel Almeida , wedsonaf@gmail.com, ojeda@kernel.org, mchehab@kernel.org, hverkuil@xs4all.nl, rust-for-linux@vger.kernel.org, linux-kernel@vger.kernel.org, linux-media@vger.kernel.org, kernel@collabora.com Subject: Re: [PATCH 0/6] Initial Rust V4L2 support Message-ID: <20230412025834.GA301301@mit.edu> References: <20230406215615.122099-1-daniel.almeida@collabora.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-4.0 required=5.0 tests=BAYES_00,DKIM_INVALID, DKIM_SIGNED,RCVD_IN_DNSWL_MED,SPF_HELO_NONE,SPF_NONE,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Apr 11, 2023 at 04:22:56PM +0200, Miguel Ojeda wrote: > > Thanks, it is great to hear that the guide helped! :) > > On resources: nowadays we have a webpage, too. Still to be completed, > but you may find it useful already: https://rust-for-linux.com Something that would perhaps be useful is to document (a) what versions of Rust is available for various distributions, or pointers to how to get that information for various distributions. For example, you can get that information from Debian using [1]. It appears that Fedora isn't distributing rustc at *all*, at least according to [2], so apparently for Fedora people will need to install it from source. [1] https://packages.debian.org/search?keywords=rustc&searchon=names&suite=all§ion=all [2] https://idroot.us/install-rust-fedora-37/ The other thing that would be worth documenting is (b) something about what versions of Rust people have actually tested. The comments at [3] are quite scary, since per [4], the minimum version of Rustc supported is 1.62.0 --- and per [3], **only** Rust 1.62.0 is supported, since we use unstable Rust features. [3] https://rust-for-linux.com/rust-version-policy [4] https://docs.kernel.org/process/changes.html But for example, with Debian, Debian stable is shipping Rust 1.48.0, and Debian testing (which is currently in "hard freeze" so it can be released as Debian stable this summer) is shipping Rustc 1.63.0. Since I use Debian testing, the question which is foremost in my mind is whether I can expect to have things work if I use the distro-provided 1.63.0 rustc, or is this really a case of "it's not Rust 1.62.0, so good luck to you"? If the goal is accelerate adoption of Rustc, and calm people's fears vis-a-vis using Rust, it's not enough to say, "why don't you use the distribution-provided version or Rust"? It would be helpful if those Rust pioneers can share what versions of Rust they have tested against, especially for those commonly used distributions, such as Debian, and give us a report whether we should expect things to work, so we can ignore the scary warning from the build system that we're using an unsupported version of Rust, and if it breaks, we get to keep both pieces. And for those distributions that don't currently ship Rust, such as Fedora, if someone could build their own unofficial packages, until we can convince Red Hat to start shipping -their own supported Rust compilers, that might be a great way of bridging that gap. Cheers, - Ted