Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753737AbZLAIql (ORCPT ); Tue, 1 Dec 2009 03:46:41 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1753458AbZLAIql (ORCPT ); Tue, 1 Dec 2009 03:46:41 -0500 Received: from e23smtp07.au.ibm.com ([202.81.31.140]:58443 "EHLO e23smtp07.au.ibm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752891AbZLAIqk (ORCPT ); Tue, 1 Dec 2009 03:46:40 -0500 Date: Tue, 1 Dec 2009 14:16:42 +0530 From: Sripathi Kodi To: linux-kernel@vger.kernel.org Cc: Darren Hart , sripathik@in.ibm.com Subject: [RFC] [PATCH 0/2] Futex fault injection Message-ID: <20091201141642.398e7b7d@sripathi> X-Mailer: Claws Mail 3.7.2 (GTK+ 2.16.5; i586-redhat-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 483 Lines: 13 Hi, This patch set adds fault injection for futex subsystem. It adds faults at places where reading/writing from user space can return EFAULT. This will be useful in testing any significant change to futex subsystem. Thanks, Sripathi. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/