[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20231003-coccicheck-v1-0-07d2d900a52a@axis.com>
Date: Tue, 3 Oct 2023 16:25:13 +0200
From: Anton Eliasson <anton.eliasson@...s.com>
To: Julia Lawall <Julia.Lawall@...ia.fr>,
Nicolas Palix <nicolas.palix@...g.fr>
CC: <cocci@...ia.fr>, <linux-kernel@...r.kernel.org>,
Anton Eliasson <anton.eliasson@...s.com>, <kernel@...s.com>
Subject: [PATCH 0/2] coccicheck bugfix and CI improvement
Patch 1 is a plain bugfix. Patch 2 allows us running coccicheck on an
external kernel module in a Makefile target like this:
MODULE_SRC_DIR := $(shell pwd)/src
coccicheck:
$(MAKE) --no-print-directory -C $(KERNEL_SRC) M=$(MODULE_SRC_DIR) coccicheck MODE=report
$(MAKE) --no-print-directory -C $(KERNEL_SRC) M=$(MODULE_SRC_DIR) coccicheck MODE=report COCCI=$(MODULE_SRC_DIR)/../coccinelle/custom-spatch.cocci
The output from this target is fairly compact. After filtering out the
"Please check for false positives..." message and sorting the remaining
lines it can be diffed with/without a proposed patch in a continuous
integration system in order to highlight newly introduced spatch
warnings.
Signed-off-by: Anton Eliasson <anton.eliasson@...s.com>
---
Anton Eliasson (2):
scripts: coccicheck: Return error from run_cmd_parmap
scripts: coccicheck: Separate spatch stdout and stderr
scripts/coccicheck | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
---
base-commit: 831fe284d8275987596b7d640518dddba5735f61
change-id: 20231003-coccicheck-64b270430709
Best regards,
--
Anton Eliasson <anton.eliasson@...s.com>
Powered by blists - more mailing lists