معرفی شرکت ها


qemu-guest-agent-6.2.0-11.module_el8.6.0+3259+f1e4044a.5.s390x.rpm


Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر

توضیحات

QEMU guest agent
ویژگی مقدار
سیستم عامل Linux
توزیع AlmaLinux 8
مخزن AlmaLinux AppStream s390x
نام بسته qemu-guest-agent
نام فایل بسته qemu-guest-agent-6.2.0-11.module_el8.6.0+3259+f1e4044a.5.s390x.rpm
نسخه بسته 6.2.0
انتشار بسته 11.module_el8.6.0+3259+f1e4044a.5
معماری بسته s390x
نگهدارنده -
تاریخ ساخت Tue 13 Sep 2022 02
هاست سازنده alma-build.sinenomine.net
نوع بسته .rpm
آدرس صفحه اصلی http://www.qemu.org/
مجوز GPLv2 and GPLv2+ and CC-BY
حجم دانلود 333K
حجم نصب 554.654K
qemu-kvm is an open source virtualizer that provides hardware emulation for the KVM hypervisor. This package provides an agent to run inside guests, which communicates with the host over a virtio-serial channel named "org.qemu.guest_agent.0" This package does not need to be installed on the host OS.


جایگزین ها



نیازمندی

مقدار نام
- /bin/sh
- /bin/sh
- /bin/sh
- /bin/sh
= 15:6.2.0-11.module_el8.6.0+3259+f1e4044a.5 config(qemu-guest-agent)
- libc.so.6()(64bit)
- libc.so.6(GLIBC_2.10)(64bit)
- libc.so.6(GLIBC_2.11)(64bit)
- libc.so.6(GLIBC_2.17)(64bit)
- libc.so.6(GLIBC_2.2)(64bit)
- libc.so.6(GLIBC_2.28)(64bit)
- libc.so.6(GLIBC_2.3)(64bit)
- libc.so.6(GLIBC_2.3.2)(64bit)
- libc.so.6(GLIBC_2.3.4)(64bit)
- libc.so.6(GLIBC_2.4)(64bit)
- libc.so.6(GLIBC_2.7)(64bit)
- libc.so.6(GLIBC_2.9)(64bit)
- libgcc_s.so.1()(64bit)
- libgcc_s.so.1(GCC_3.0)(64bit)
- libgcc_s.so.1(GCC_3.3.1)(64bit)
- libglib-2.0.so.0()(64bit)
- libm.so.6()(64bit)
- libm.so.6(GLIBC_2.2)(64bit)
- libpthread.so.0()(64bit)
- libpthread.so.0(GLIBC_2.12)(64bit)
- libpthread.so.0(GLIBC_2.2)(64bit)
- libpthread.so.0(GLIBC_2.3.2)(64bit)
- libudev.so.1()(64bit)
- libudev.so.1(LIBUDEV_183)(64bit)
- rtld(GNU_HASH)
- systemd-units
- systemd-units
- systemd-units


ارائه دهنده

مقدار نام
= 15:6.2.0-11.module_el8.6.0+3259+f1e4044a.5 config(qemu-guest-agent)
= 15:6.2.0-11.module_el8.6.0+3259+f1e4044a.5 qemu-guest-agent
= 15:6.2.0-11.module_el8.6.0+3259+f1e4044a.5 qemu-guest-agent(s390-64)


نحوه نصب


نصب پکیج rpm qemu-guest-agent:

    dnf install qemu-guest-agent-6.2.0-11.module_el8.6.0+3259+f1e4044a.5.s390x.rpm


فایل ها

مسیرها
/etc/qemu-ga
/etc/qemu-ga/fsfreeze-hook
/etc/qemu-ga/fsfreeze-hook.d
/etc/qemu-kvm/fsfreeze-hook
/etc/sysconfig/qemu-ga
/usr/bin/qemu-ga
/usr/lib/.build-id
/usr/lib/.build-id/84
/usr/lib/.build-id/84/a6bfe2ea55fb564bc6838126c88a7b700c7d71
/usr/lib/systemd/system/qemu-guest-agent.service
/usr/lib/udev/rules.d/99-qemu-guest-agent.rules
/usr/share/doc/qemu-guest-agent
/usr/share/doc/qemu-guest-agent/COPYING
/usr/share/doc/qemu-guest-agent/README.rst
/usr/share/man/man8/qemu-ga.8.gz
/usr/share/qemu-kvm/qemu-ga
/usr/share/qemu-kvm/qemu-ga/fsfreeze-hook.d
/usr/share/qemu-kvm/qemu-ga/fsfreeze-hook.d/mysql-flush.sh.sample
/var/log/qemu-ga


گزارش تغییرات

تاریخ آخرین تغییر جزئیات
2022-08-29

kvm-linux-aio-fix-unbalanced-plugged-counter-in-laio_io_.patch [bz#2109570]
kvm-linux-aio-explain-why-max-batch-is-checked-in-laio_i.patch [bz#2109570]
Resolves: bz#2109570
8.6.0.z])

2022-08-16

kvm-migration-Never-call-twice-qemu_target_page_size.patch [bz#2117252]
kvm-multifd-Rename-used-field-to-num.patch [bz#2117252]
kvm-multifd-Add-missing-documention.patch [bz#2117252]
kvm-multifd-The-variable-is-only-used-inside-the-loop.patch [bz#2117252]
kvm-multifd-remove-used-parameter-from-send_prepare-meth.patch [bz#2117252]
kvm-multifd-remove-used-parameter-from-send_recv_pages-m.patch [bz#2117252]
kvm-multifd-Fill-offset-and-block-for-reception.patch [bz#2117252]
kvm-multifd-Make-zstd-compression-method-not-use-iovs.patch [bz#2117252]
kvm-multifd-Make-zlib-compression-method-not-use-iovs.patch [bz#2117252]
kvm-migration-All-this-fields-are-unsigned.patch [bz#2117252]
kvm-multifd-Move-iov-from-pages-to-params.patch [bz#2117252]
kvm-multifd-Make-zlib-use-iov-s.patch [bz#2117252]
kvm-multifd-Make-zstd-use-iov-s.patch [bz#2117252]
kvm-multifd-Remove-send_write-method.patch [bz#2117252]
kvm-multifd-Use-a-single-writev-on-the-send-side.patch [bz#2117252]
kvm-multifd-Use-normal-pages-array-on-the-send-side.patch [bz#2117252]
kvm-QIOChannel-Add-flags-on-io_writev-and-introduce-io_f.patch [bz#2117252]
kvm-QIOChannelSocket-Implement-io_writev-zero-copy-flag-.patch [bz#2117252]
kvm-migration-Add-zero-copy-send-parameter-for-QMP-HMP-f.patch [bz#2117252]
kvm-migration-Add-migrate_use_tls-helper.patch [bz#2117252]
kvm-multifd-multifd_send_sync_main-now-returns-negative-.patch [bz#2117252]
kvm-multifd-Send-header-packet-without-flags-if-zero-cop.patch [bz#2117252]
kvm-multifd-Implement-zero-copy-write-in-multifd-migrati.patch [bz#2117252]
kvm-QIOChannelSocket-Introduce-assert-and-reduce-ifdefs-.patch [bz#2117252]
kvm-QIOChannelSocket-Fix-zero-copy-send-so-socket-flush-.patch [bz#2117252]
kvm-migration-Change-zero_copy_send-from-migration-param.patch [bz#2117252]
kvm-migration-Introduce-ram_transferred_add.patch [bz#2117252]
kvm-migration-Tally-pre-copy-downtime-and-post-copy-byte.patch [bz#2117252]
kvm-QIOChannelSocket-Fix-zero-copy-flush-returning-code-.patch [bz#2117252]
kvm-Add-dirty-sync-missed-zero-copy-migration-stat.patch [bz#2117252]
kvm-migration-multifd-Report-to-user-when-zerocopy-not-w.patch [bz#2117252]
kvm-migration-Avoid-false-positive-on-non-supported-scen.patch [bz#2117252]
kvm-migration-add-remaining-params-has_-true-in-migratio.patch [bz#2117252]
kvm-QIOChannelSocket-Add-support-for-MSG_ZEROCOPY-IPV6.patch [bz#2117252]
Resolves: bz#2117252
8.6.0.z])

2022-08-08

kvm-virtio-net-setup-vhost_dev-and-notifiers-for-cvq-onl.patch [bz#2095794]
kvm-virtio-net-align-ctrl_vq-index-for-non-mq-guest-for-.patch [bz#2095794]
kvm-vhost-vdpa-fix-improper-cleanup-in-net_init_vhost_vd.patch [bz#2095794]
kvm-vhost-net-fix-improper-cleanup-in-vhost_net_start.patch [bz#2095794]
kvm-vhost-vdpa-backend-feature-should-set-only-once.patch [bz#2095794]
kvm-vhost-vdpa-change-name-and-polarity-for-vhost_vdpa_o.patch [bz#2095794]
kvm-virtio-net-don-t-handle-mq-request-in-userspace-hand.patch [bz#2095794]
Resolves: bz#2095794
8.6.0.z])

2022-06-15

kvm-Revert-redhat-Add-some-devices-for-exporting-upstrea.patch [bz#2077928]
kvm-ui-cursor-fix-integer-overflow-in-cursor_alloc-CVE-2.patch [bz#2082622]
Resolves: bz#2077928
only devices from the qemu-kvm binary [rhel-8.6.0.z])
Resolves: bz#2082622
2021-4206 virt:rhel/qemu-kvm: QEMU: QXL: integer overflow in cursor_alloc() can lead to heap buffer overflow [rhel-8.6.0.z])

2022-05-25

kvm-RHEL-disable-seqpacket-for-vhost-vsock-device-in-rhe.patch [bz#2071103]
kvm-hw-intc-arm_gicv3-Check-for-MEMTX_OK-instead-of-MEMT.patch [bz#2075686]
kvm-softmmu-physmem-Simplify-flatview_write-and-address_.patch [bz#2075686]
kvm-softmmu-physmem-Introduce-MemTxAttrs-memory-field-an.patch [bz#2075686]
kvm-display-qxl-render-fix-race-condition-in-qxl_cursor-.patch [bz#2075683]
kvm-virtio-net-fix-map-leaking-on-error-during-receive.patch [bz#2075637]
kvm-vhost-vsock-detach-the-virqueue-element-in-case-of-e.patch [bz#2075639]
kvm-qcow2-Improve-refcount-structure-rebuilding.patch [bz#2072242]
kvm-iotests-108-Test-new-refcount-rebuild-algorithm.patch [bz#2072242]
kvm-qcow2-Add-errp-to-rebuild_refcount_structure.patch [bz#2072242]
kvm-iotests-108-Fix-when-missing-user_allow_other.patch [bz#2072242]
Resolves: bz#2071103
8.6.0.z])
Resolves: bz#2075686
2021-3750 virt:rhel/qemu-kvm: QEMU: hcd-ehci: DMA reentrancy issue leads to use-after-free [rhel-8] [rhel-8.6.0.z])
Resolves: bz#2075683
2021-4207 virt:rhel/qemu-kvm: QEMU: QXL: double fetch in qxl_cursor() can lead to heap buffer overflow [rhel-8] [rhel-8.6.0.z])
Resolves: bz#2075637
2022-26353 virt:rhel/qemu-kvm: QEMU: virtio-net: map leaking on error during receive [rhel-8] [rhel-8.6.0.z])
Resolves: bz#2075639
2022-26354 virt:rhel/qemu-kvm: QEMU: vhost-vsock: missing virtqueue detach on error can lead to memory leak [rhel-8] [rhel-8.6.0.z])
Resolves: bz#2072242
8.6.0.z])

2022-04-05

kvm-target-i386-properly-reset-TSC-on-reset.patch [bz#1975840]
Resolves: bz#1975840

2022-03-21

kvm-vmxcap-Add-5-level-EPT-bit.patch [bz#2056986]
kvm-i386-Add-Icelake-Server-v6-CPU-model-with-5-level-EP.patch [bz#2056986]
kvm-acpi-fix-QEMU-crash-when-started-with-SLIC-table.patch [bz#2059311]
kvm-tests-acpi-whitelist-expected-blobs-before-changing-.patch [bz#2059311]
kvm-tests-acpi-add-SLIC-table-test.patch [bz#2059311]
kvm-tests-acpi-SLIC-update-expected-blobs.patch [bz#2059311]
kvm-tests-acpi-manually-pad-OEM_ID-OEM_TABLE_ID-for-test.patch [bz#2059311]
kvm-tests-acpi-whitelist-nvdimm-s-SSDT-and-FACP.slic-exp.patch [bz#2059311]
kvm-acpi-fix-OEM-ID-OEM-Table-ID-padding.patch [bz#2059311]
kvm-tests-acpi-update-expected-blobs.patch [bz#2059311]
kvm-tests-acpi-test-short-OEM_ID-OEM_TABLE_ID-values-in-.patch [bz#2059311]
kvm-rhel-workaround-for-lack-of-binary-patches-in-SRPM.patch [bz#2059311]
Resolves: bz#2056986
-install -d Ubuntu-20.04')
Resolves: bz#2059311

2022-03-12

kvm-Revert-redhat-Add-hw_compat_4_2_extra-and-apply-to-u.patch [bz#2061856]
kvm-Revert-redhat-Enable-FDC-device-for-upstream-machine.patch [bz#2061856]
kvm-Revert-redhat-Expose-upstream-machines-pc-4.2-and-pc.patch [bz#2061856]
kvm-hw-virtio-vdpa-Fix-leak-of-host-notifier-memory-regi.patch [bz#2027208]
kvm-pci-expose-TYPE_XIO3130_DOWNSTREAM-name.patch [bz#2054597]
kvm-acpi-pcihp-pcie-set-power-on-cap-on-parent-slot.patch [bz#2054597]
Resolves: bz#2061856
specific Ubuntu-compatibility machine type for 8.6-AV GA)
Resolves: bz#2027208
Resolves: bz#2054597

2022-02-22

kvm-block-nbd-Delete-reconnect-delay-timer-when-done.patch [bz#2035185]
kvm-block-nbd-Assert-there-are-no-timers-when-closed.patch [bz#2035185]
kvm-iotests.py-Add-QemuStorageDaemon-class.patch [bz#2035185]
kvm-iotests-281-Test-lingering-timers.patch [bz#2035185]
kvm-block-nbd-Move-s-ioc-on-AioContext-change.patch [bz#2035185]
kvm-iotests-281-Let-NBD-connection-yield-in-iothread.patch [bz#2035185]
Resolves: bz#2035185

2022-02-15

kvm-numa-Enable-numa-for-SGX-EPC-sections.patch [bz#1518984]
kvm-numa-Support-SGX-numa-in-the-monitor-and-Libvirt-int.patch [bz#1518984]
kvm-doc-Add-the-SGX-numa-description.patch [bz#1518984]
kvm-Enable-SGX-RH-Only.patch [bz#1518984]
kvm-qapi-Cleanup-SGX-related-comments-and-restore-sectio.patch [bz#1518984]
kvm-block-io-Update-BSC-only-if-want_zero-is-true.patch [bz#2041480]
kvm-iotests-block-status-cache-New-test.patch [bz#2041480]
Resolves: bz#1518984
kvm: SGX 1.5 (SGX1 + Flexible Launch Control) support)
Resolves: bz#2041480
nbd)

2022-02-08

kvm-virtiofsd-Drop-membership-of-all-supplementary-group.patch [bz#2046198]
kvm-softmmu-fix-device-deletion-events-with-device-JSON-.patch [bz#2033279]
kvm-block-backend-prevent-dangling-BDS-pointers-across-a.patch [bz#2021778 bz#2036178]
kvm-iotests-stream-error-on-reset-New-test.patch [bz#2021778 bz#2036178]
kvm-block-rbd-fix-handling-of-holes-in-.bdrv_co_block_st.patch [bz#2037135]
kvm-block-rbd-workaround-for-ceph-issue-53784.patch [bz#2037135]
Resolves: bz#2046198
2022-0358 virt:av/qemu-kvm: QEMU: virtiofsd: potential privilege escalation via CVE-2018-13405 [rhel-8.6])
Resolves: bz#2033279
kvm 6.2] The hot-unplugged device can not be hot-plugged back)
Resolves: bz#2021778
Resolves: bz#2036178
stream to a snapshot node on non-enough space storage)
Resolves: bz#2037135

2022-01-25

kvm-acpi-validate-hotplug-selector-on-access.patch [bz#2036580]
kvm-x86-Add-q35-RHEL-8.6.0-machine-type.patch [bz#2031035]
Resolves: bz#2036580
2021-4158 virt:rhel/qemu-kvm: QEMU: NULL pointer dereference in pci_write() in hw/acpi/pcihp.c [rhel-8])
Resolves: bz#2031035
8.6.0 machine types for RHEL 8.6 [x86])

2022-01-17

kvm-hw-arm-virt-Register-iommu-as-a-class-property.patch [bz#2031039]
kvm-hw-arm-virt-Register-its-as-a-class-property.patch [bz#2031039]
kvm-hw-arm-virt-Rename-default_bus_bypass_iommu.patch [bz#2031039]
kvm-hw-arm-virt-Add-8.6-machine-type.patch [bz#2031039]
kvm-hw-arm-virt-Check-no_tcg_its-and-minor-style-changes.patch [bz#2031039]
kvm-rhel-machine-types-x86-set-prefer_sockets.patch [bz#2029582]
Resolves: bz#2031039
8.6.0 machine types for RHEL 8.6 [aarch64])
Resolves: bz#2029582

2022-01-03

kvm-redhat-Add-rhel8.6.0-machine-type-for-s390x.patch [bz#2005325]
kvm-redhat-Define-pseries-rhel8.6.0-machine-type.patch [bz#2031041]
Resolves: bz#2005325
qemu part)
Resolves: bz#2031041
8.6.0 machine types for RHEL 8.6 [ppc64le])

2021-12-16

Rebase to qemu-kvm 6.2.0
Resolves bz#2027716

2021-11-22

kvm-e1000-fix-tx-re-entrancy-problem.patch [bz#1930092]
kvm-hw-scsi-scsi-disk-MODE_PAGE_ALLS-not-allowed-in-MODE.patch [bz#2020720]
Resolves: bz#1930092
2021-20257 virt:rhel/qemu-kvm: QEMU: net: e1000: infinite loop while processing transmit descriptors [rhel-8.5.0])
Resolves: bz#2020720
2021-3930 virt:rhel/qemu-kvm: QEMU: off-by-one error in mode_sense_page() in hw/scsi/scsi-disk.c [rhel-8])