linux-kselftest.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2019-05-07 19:20:16 to 2019-05-10 15:28:52 UTC [more...]

[PATCH v11 0/7] ptrace: add PTRACE_GET_SYSCALL_INFO request
 2019-05-10 15:28 UTC  (4+ messages)
` [PATCH v11 7/7] selftests/ptrace: add a test case for PTRACE_GET_SYSCALL_INFO

[PATCH 0/4] x86: int3 fallout
 2019-05-10 14:54 UTC  (58+ messages)
` [PATCH 1/4] x86/entry/32: Clean up return from interrupt preemption path
` [PATCH 2/4] x86/kprobes: Fix frame pointer annotations
` [PATCH 3/4] x86/ftrace: Add pt_regs frame annotations
` [RFC][PATCH 4/4] x86_32: Provide consistent pt_regs

[PATCH v2 00/17] kunit: introduce KUnit, the Linux kernel unit testing framework
 2019-05-10 12:12 UTC  (79+ messages)
` [PATCH v2 06/17] kbuild: enable building KUnit
` [PATCH v2 14/17] Documentation: kunit: add documentation for KUnit

[PATCH] selftests/bpf: Fix compile warning in bpf selftest
 2019-05-10  0:00 UTC  (6+ messages)

[PATCH v3] kheaders: Move from proc to sysfs
 2019-05-09 22:47 UTC  (5+ messages)

[PATCH] selftests/lkdtm: Add tests for LKDTM targets
 2019-05-09 17:14 UTC  (2+ messages)

[PATCH linux-next v10 0/7] ptrace: add PTRACE_GET_SYSCALL_INFO request
 2019-05-09 16:14 UTC  (3+ messages)

next-20190509 kselftest results
 2019-05-09  7:00 UTC  (2+ messages)

[for-next][PATCH 02/13] x86_64: Allow breakpoints to emulate call instructions
 2019-05-08 20:24 UTC  (4+ messages)
` [for-next][PATCH 03/13] ftrace/x86_64: Emulate call function while updating in breakpoint handler

Build-time tests?
 2019-05-08 19:30 UTC  (2+ messages)

[RFC][PATCH 1/2] x86: Allow breakpoints to emulate call functions
 2019-05-08 16:37 UTC  (17+ messages)

[PATCH] selftests: fix install target to use default install path
 2019-05-08 16:26 UTC  (2+ messages)

[net-next v2] net: sched: Introduce act_ctinfo action
 2019-05-08 16:12 UTC  (12+ messages)
` [net-next v3] "
    ` [PATCH net-next v4] "

[PATCH 0/3] x86_64/ftrace: Emulate calls from int3 when patching functions
 2019-05-08 16:06 UTC  (14+ messages)
` [PATCH 1/3] x86_64: Add gap to int3 to allow for call emulation
` [PATCH 2/3] x86_64: Allow breakpoints to emulate call instructions
` [PATCH 3/3] ftrace/x86_64: Emulate call function while updating in breakpoint handler

next-20190508 kselftest results
 2019-05-08  9:00 UTC  (2+ messages)

next-20190507 kselftest results
 2019-05-08  9:00 UTC  (2+ messages)

[RFC][PATCH 0/3] x86_64/ftrace: Emulate calls from int3 when patching functions
 2019-05-07 20:02 UTC  (13+ messages)
` [RFC][PATCH 2/3] x86_64: Allow breakpoints to emulate call functions


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).