lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAJq09z4WBqURH8YaLW=nqW0mOFLJubss5v6x4_xJuV9do0uDHg@mail.gmail.com>
Date: Tue, 23 Jan 2024 19:30:48 -0300
From: Luiz Angelo Daros de Luca <luizluca@...il.com>
To: Linus Walleij <linus.walleij@...aro.org>
Cc: netdev@...r.kernel.org, alsi@...g-olufsen.dk, andrew@...n.ch, 
	f.fainelli@...il.com, olteanv@...il.com, davem@...emloft.net, 
	edumazet@...gle.com, kuba@...nel.org, pabeni@...hat.com, 
	arinc.unal@...nc9.com, ansuelsmth@...il.com
Subject: Re: [PATCH 00/11] net: dsa: realtek: variants to drivers, interfaces
 to a common module

> Why not check out the "b4" tool? It helps with this kind of
> stuff.
> https://lore.kernel.org/netdev/CACRpkdaXV=P7NZZpS8YC67eQ2BDvR+oMzgJcjJ+GW9vFhy+3iQ@mail.gmail.com/
>
> It's not very magical, from v4 I would create a new branch:
> b4 prep -n rtl83xx -f v6.8-rc1
> b4 prep --force-version 5
> b4 prep --set-prefixes net-next
> b4 prep --edit cover
> <insert contents of patch 0/11 cover letter>
> then cherry pick the 11 patches on top of that branch
> and next time you b4 send it, it will pop out as v5.
>
> OK I know it's a bit of threshold but the b4 threshold is
> really low.
>
> Yours,
> Linus Walleij

Thanks Linus,

It definitely looks nice and it was already on my TODO list. I'll try
that in the next round. I just need to test it a little bit more.
That's why I used my old workflow this time.

Regards,

Luiz

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ