From owner-freebsd-hackers@freebsd.org Thu Oct 4 11:16:35 2018 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id B9CEA10A33DB; Thu, 4 Oct 2018 11:16:35 +0000 (UTC) (envelope-from hps@selasky.org) Received: from mail.turbocat.net (turbocat.net [IPv6:2a01:4f8:c17:6c4b::2]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 5C743905D5; Thu, 4 Oct 2018 11:16:35 +0000 (UTC) (envelope-from hps@selasky.org) Received: from hps2016.home.selasky.org (unknown [178.17.145.230]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.turbocat.net (Postfix) with ESMTPSA id DC94E2600F1; Thu, 4 Oct 2018 13:16:32 +0200 (CEST) Subject: Re: Is there a standard way to check patch before submitting for review or upstreaming? To: Rajesh Kumar , freebsd-hackers@freebsd.org, freebsd-current@freebsd.org References: From: Hans Petter Selasky Message-ID: <66407016-2998-060c-83c7-b5e771872b4f@selasky.org> Date: Thu, 4 Oct 2018 13:16:03 +0200 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:60.0) Gecko/20100101 Thunderbird/60.0.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 04 Oct 2018 11:16:35 -0000 On 10/4/18 1:08 PM, Rajesh Kumar wrote: > Hi, > > Do we have any standard tools/process in FreeBSD to check/validate the > patch for basic issues before we submit them for review or upstreaming? > Basically, something like checkpatch.pl in Linux. > > Thanks, > Rajesh. Hi, There is something in /usr/src/tools/tools/indent_wrapper . --HPS