Received: by 2002:a05:6358:a55:b0:ec:fcf4:3ecf with SMTP id 21csp772831rwb; Fri, 13 Jan 2023 04:05:38 -0800 (PST) X-Google-Smtp-Source: AMrXdXs7KX56x8SYxdU0xkf6vGncsGOxTTTazocuxdT4AHK2V/f0NmrRVRF3URLFMdxpq+23gn1Y X-Received: by 2002:a17:907:b608:b0:7c1:4623:400e with SMTP id vl8-20020a170907b60800b007c14623400emr75081961ejc.16.1673611537996; Fri, 13 Jan 2023 04:05:37 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1673611537; cv=none; d=google.com; s=arc-20160816; b=nirfgc07wHt03/kmcIJepBYS3iJXJG0P8rRwe9hicY7Ltf56yEvk51XjdpLx98cEVe 2ym/KGWLFuqrgjF2EB+OaoYHlFoX06j6of/mmkD+T5EXZkJA5fWl8x0lLhbK53xV/Ip9 5r+OPfIL8Nl+Gw/cPq+z0QQrRwlvt0WQlNlpLxoGm2DEL0BYIOJ7b3Bt9HXqioyUepFh yoVL8J/innSfRi24t8iA6QUobA1fbwnFns8gsXwLA6ymLIZseVjxJBBPhgiYxM52Jcs7 qDCHj6jf3/Gkzh3ncGLQMSqcRCd/S9eSHyCQRWZCcXU7Nqkuap9azjFzlDJZK2oy8stH Ey0g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=xor79Gbrc9Vb1YnolVejCEkFtUjH4jtYrPaq7aQo/N4=; b=yhySMzVK4wLWcm1AWMCVCv5kIvkaGs9iJH4AEME7JQ/f0t7/VxafL9Dfz3IkwuL0me 3jGwSaxwQEfkai6RpxgnZscnsOYlbybLlarqd2BgTn0LVuPW3e48Ci74cRGIZockSv6h qRTOwrk1+IN6aHhO9L+YqlxIJVQBpzE+5HH1PBbG+G882kufT8sNWclwCilQtpsSDsX/ JQNGZ9S0bbaJze+ZAJJctqgYtwxPJVMUaKEjjwZzGWKWajSbsILp0qrNP/VZ0ZMuQdp5 ghaCbJ6CIoW4cwKHSx1UDmYhO4W0zUc6EpsnLqh8eUcSpFLs2fZ/nrEe6j4k/kEYBy6t usDw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="bA/PtKBZ"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id js10-20020a17090797ca00b007707b853e46si22973167ejc.882.2023.01.13.04.05.25; Fri, 13 Jan 2023 04:05:37 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="bA/PtKBZ"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237550AbjAMLix (ORCPT + 51 others); Fri, 13 Jan 2023 06:38:53 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54192 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233190AbjAMLhk (ORCPT ); Fri, 13 Jan 2023 06:37:40 -0500 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 7CC1A5F917 for ; Fri, 13 Jan 2023 03:27:25 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 32940B8211C for ; Fri, 13 Jan 2023 11:27:24 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 0976AC433D2; Fri, 13 Jan 2023 11:27:21 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1673609242; bh=DL7Rv8R8ZcSMbuTUDBTyVdswyoWOualPuASbLY1fd4A=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=bA/PtKBZVejYKfCRXPKGl6CKieE7XHaOYE4uCU353hYo4uWsmGiLhY7D9mDnCAkly SGHbgt3A3B8ME3Uc6B5aO8xGfIT63XaewEbIlaZ06eKTPYcd0UeugM8E/ealcZpFeM ICYwWQtbAIL1RNS8ohYQXGwddx0yAMDg1U77ECuc= Date: Fri, 13 Jan 2023 12:27:16 +0100 From: Greg KH To: Michal Simek Cc: Kris Chaplin , Linux Kernel Mailing List Subject: Re: Reg the next LTS kernel (6.1?) Message-ID: References: <96e41e6d-bec9-f8cf-22ed-1fa5d9022238@amd.com> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <96e41e6d-bec9-f8cf-22ed-1fa5d9022238@amd.com> X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Jan 12, 2023 at 01:26:28PM +0100, Michal Simek wrote: > Hi Greg, > > On 1/12/23 13:23, Kris Chaplin wrote: > > Hello Greg, > > > > > You tell me please.? How has your testing gone for 6.1 so far?? Does it > > > work properly for you?? Are you and/or your company willing to test out > > > the -rc releases and provide feedback if it works or not for your > > > systems?? Do you have problems with 6.1.y vs. older kernels?? Is there > > > anything missing in it that you feel needs to be addressed with a newer > > > kernel instead? > > > > We have been integrating and testing 6.1 on the Microblaze, ARM32 and > > ARM64-bit architectures over the past few weeks.? These builds have > > been successful and we are able to run our regression tests on hardware > > targeting our FPGA SoC devices. > > > > We're continuing our tests as new updates to the 6.1 kernel series > > appear. > > As Kris said AMD/Xilinx has already moved internal SOC tree to 6.1 based > kernel in expectation that 6.1 will become next LTS. > And I am not aware about any issue from testing team related to 6.1 kernel > version. And we are covering our AMD/Xilinx SOCs based on arm32/arm64 and > Microblaze CPUs. > > It would be good to continue with the same strategy which using the latest > kernel at that year which is what I am hearing all the time from others that > 6.1 was last kernel at that year and it should be LTS. Generally yes, I pick the last release of the year but we need people to verify and validate that both it works for them, and that they are going to be using it in their systems and can provide testing results to us (as well as providing a way for their devices to actually be updated to the new releases, we've had previous stable kernel releases that were never actually shipped out to devices...) > I didn't run any stats but normally also more patches are going to this > version to be the part of LTS. What do you mean by this? The patches accepted so far since 6.1.0 was released, or up until 6.1.0 was released? For the patches since 6.1.0 was released, that's due to more developers/maintainers tagging patches during the -rc1 merge window for stable releases (honestly they should have gotten them into the -final release first), and due to us having better tools in digging up potential stable patches (i.e. Sasha's AUTOSEL bot work.) thanks, greg k-h