[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <1562664759-16009-3-git-send-email-info@metux.net>
Date: Tue, 9 Jul 2019 11:32:38 +0200
From: "Enrico Weigelt, metux IT consult" <info@...ux.net>
To: linux-kernel@...r.kernel.org
Cc: yamada.masahiro@...ionext.com, michal.lkml@...kovi.net,
info@...ux.net, apw@...onical.com, joe@...ches.com,
linux-kbuild@...r.kernel.org, linux-riscv@...ts.infradead.org,
clang-built-linux@...glegroups.com
Subject: [PATCH 3/4] scripts: checkpatch.pl: don't complain that debian/rules is executable
checkpatch.pl complains when adding executable "debian/rules",
obviously a false alarm. Therefore add an exception for that.
Signed-off-by: Enrico Weigelt, metux IT consult <info@...ux.net>
---
scripts/checkpatch.pl | 1 +
1 file changed, 1 insertion(+)
diff --git a/scripts/checkpatch.pl b/scripts/checkpatch.pl
index 342c7c7..caf0146 100755
--- a/scripts/checkpatch.pl
+++ b/scripts/checkpatch.pl
@@ -2587,6 +2587,7 @@ sub process {
if ($line =~ /^new (file )?mode.*[7531]\d{0,2}$/) {
my $permhere = $here . "FILE: $realfile\n";
if ($realfile !~ m@...ipts/@ &&
+ $realfile !~ "debian/rules" &&
$realfile !~ /\.(py|pl|awk|sh)$/) {
ERROR("EXECUTE_PERMISSIONS",
"do not set execute permissions for source files\n" . $permhere);
--
1.9.1
Powered by blists - more mailing lists