[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <1552049064-32044-5-git-send-email-info@metux.net>
Date: Fri, 8 Mar 2019 13:44:23 +0100
From: "Enrico Weigelt, metux IT consult" <info@...ux.net>
To: linux-kernel@...r.kernel.org
Cc: yamada.masahiro@...ionext.com, michal.lkml@...kovi.net,
info@...ux.net, apw@...onical.com, joe@...ches.com,
linux-kbuild@...r.kernel.org, linux-riscv@...ts.infradead.org
Subject: [PATCH v1 4/5] scripts: checkpatch.pl: don't complain that debian/rules is executable
checkpatch.pl complains when adding executable "debian/rules",
obviously a false alarm. Therefore add an exception for that.
Signed-off-by: Enrico Weigelt, metux IT consult <info@...ux.net>
---
scripts/checkpatch.pl | 1 +
1 file changed, 1 insertion(+)
diff --git a/scripts/checkpatch.pl b/scripts/checkpatch.pl
index b737ca9..7bcc70a 100755
--- a/scripts/checkpatch.pl
+++ b/scripts/checkpatch.pl
@@ -2576,6 +2576,7 @@ sub process {
if ($line =~ /^new (file )?mode.*[7531]\d{0,2}$/) {
my $permhere = $here . "FILE: $realfile\n";
if ($realfile !~ m@...ipts/@ &&
+ $realfile !~ "debian/rules" &&
$realfile !~ /\.(py|pl|awk|sh)$/) {
ERROR("EXECUTE_PERMISSIONS",
"do not set execute permissions for source files\n" . $permhere);
--
1.9.1
Powered by blists - more mailing lists