معرفی شرکت ها


bpftool-3.10.0-1160.80.1.el7.x86_64.rpm


Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر

توضیحات

Inspection and simple manipulation of eBPF programs and maps
ویژگی مقدار
سیستم عامل Linux
توزیع CentOS 7
مخزن Centos updates x86_64
نام بسته bpftool
نام فایل بسته bpftool-3.10.0-1160.80.1.el7.x86_64.rpm
نسخه بسته 3.10.0
انتشار بسته 1160.80.1.el7
معماری بسته x86_64
نگهدارنده -
تاریخ ساخت Tue 08 Nov 2022 07
هاست سازنده kbuilder.bsys.centos.org
نوع بسته .rpm
آدرس صفحه اصلی http://www.kernel.org/
مجوز GPLv2
حجم دانلود 8.6M
حجم نصب 1.926M
This package contains the bpftool, which allows inspection and simple manipulation of eBPF programs and maps.


جایگزین ها

بسته نسخه معماری مخزن
bpftool-3.10.0-1160.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.81.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.2.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.88.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.83.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.53.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.31.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.15.2.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.2.2.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.36.2.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.80.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.62.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.76.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.42.2.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.6.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.21.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.45.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.59.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.41.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.11.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.25.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.49.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.24.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.81.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.59.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.41.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.49.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.2.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.95.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.53.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.36.2.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.76.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.24.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.99.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.25.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.21.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.102.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.2.2.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.6.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.42.2.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.92.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.83.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.11.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.62.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.31.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.15.2.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.88.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.66.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.71.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.90.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.45.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-957.1.3.el7.azure.x86_64.rpm 3.10.0 x86_64 CentOS virt


نیازمندی

مقدار نام
- libc.so.6()(64bit)
- libc.so.6(GLIBC_2.11)(64bit)
- libc.so.6(GLIBC_2.14)(64bit)
- libc.so.6(GLIBC_2.17)(64bit)
- libc.so.6(GLIBC_2.2.5)(64bit)
- libc.so.6(GLIBC_2.3)(64bit)
- libc.so.6(GLIBC_2.3.4)(64bit)
- libc.so.6(GLIBC_2.4)(64bit)
- libc.so.6(GLIBC_2.7)(64bit)
- libc.so.6(GLIBC_2.8)(64bit)
- libdl.so.2()(64bit)
- libdl.so.2(GLIBC_2.2.5)(64bit)
- libelf.so.1()(64bit)
- libelf.so.1(ELFUTILS_1.0)(64bit)
- libz.so.1()(64bit)
- libz.so.1(ZLIB_1.2.0)(64bit)
- rtld(GNU_HASH)


ارائه دهنده

مقدار نام
= 3.10.0-1160.80.1.el7 bpftool
= 3.10.0-1160.80.1.el7 bpftool(x86-64)


نحوه نصب


نصب پکیج rpm bpftool:

    sudo yum localinstall bpftool-3.10.0-1160.80.1.el7.x86_64.rpm


فایل ها

مسیرها
/etc/bash_completion.d/bpftool
/usr/sbin/bpftool
/usr/share/man/man8/bpftool-cgroup.8.gz
/usr/share/man/man8/bpftool-map.8.gz
/usr/share/man/man8/bpftool-prog.8.gz
/usr/share/man/man8/bpftool.8.gz


گزارش تغییرات

تاریخ آخرین تغییر جزئیات
2022-10-08

scsi: lpfc: Fix FCP I/O flush functionality for TMF routines (Dick Kennedy) [1969988]
scsi: lpfc: Fix illegal memory access on Abort IOCBs (Dick Kennedy) [1969988]
NFS: Fix extra call to dput() in nfs_prime_dcache (Benjamin Coddington) [2117856]

2022-09-22

x86/speculation: Add LFENCE to RSB fill sequence (Rafael Aquini) [2115073] {CVE-2022-26373}
x86/speculation: Protect against userspace-userspace spectreRSB (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/speculation: cope with spectre_v2=retpoline cmdline on retbleed-affected Intel CPUs (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
KVM: emulate: do not adjust size of fastop and setcc subroutines (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/kvm: fix FASTOP_SIZE when return thunks are enabled (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/speculation: Disable RRSBA behavior (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/kexec: Disable RET on kexec (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/bugs: Do not enable IBPB-on-entry when IBPB is not supported (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/bugs: Add Cannon lake to RETBleed affected CPU list (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/cpu/amd: Enumerate BTC_NO (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/common: Stamp out the stepping madness (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/cpu/amd: Add Spectral Chicken (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/bugs: Do IBPB fallback check only once (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/bugs: Add retbleed=ibpb (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/bugs: Report Intel retbleed vulnerability (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/bugs: Enable STIBP for JMP2RET (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/bugs: Add AMD retbleed= boot parameter (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/bugs: Report AMD retbleed vulnerability (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86: Add magic AMD return-thunk (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86: Use return-thunk in asm code (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/sev: Avoid using __x86_return_thunk (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/vsyscall_emu/64: Don't use RET in vsyscall emulation (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/kvm: Fix SETcc emulation for return thunks (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86,objtool: Create .return_sites (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86: Undo return-thunk damage (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/retpoline: Use -mfunction-return (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/cpufeatures: Move RETPOLINE flags to word 11 (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
objtool: Add ELF writing capability (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86: Prepare asm files for straight-line-speculation (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86: Prepare inline-asm for straight-line-speculation (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/kvm: Fix fastop function ELF metadata (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/kvm: Move kvm_fastop_exception to .fixup section (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/vdso: Fix vDSO build if a retpoline is emitted (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/cpufeatures: Combine word 11 and 12 into a new scattered features word (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/cpufeatures: Carve out CQM features retrieval (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/cpufeatures: Re-tabulate the X86_FEATURE definitions (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/cpufeature: Move processor tracing out of scattered features (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/cpu: Probe CPUID leaf 6 even when cpuid_level == 6 (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/alternatives: Cleanup DPRINTK macro (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}

2022-09-15

net_sched: cls_route: remove from list when handle is 0 (Davide Caratti) [2121809] {CVE-2022-2588}

2022-09-08

net/mlx5: Add Fast teardown support (Jay Shin) [2077711]
net/mlx5: Free IRQs in shutdown path (Jay Shin) [2077711]
net/mlx5: Change teardown with force mode failure message to warning (Jay Shin) [2077711]
net/mlx5: Cancel health poll before sending panic teardown command (Jay Shin) [2077711]
net/mlx5: Add fast unload support in shutdown flow (Jay Shin) [2077711]
net/mlx5: Expose command polling interface (Jay Shin) [2077711]
posix-timers: Remove remaining uses of tasklist_lock (Oleg Nesterov) [2115147]
posix-timers: Use sighand lock instead of tasklist_lock on timer deletion (Oleg Nesterov) [2115147]
posix-cpu-timers: remove tasklist_lock in posix_cpu_clock_get() (Oleg Nesterov) [2115147]

2022-07-26

sfc: complete the next packet when we receive a timestamp (Íñigo Huguet) [1793280]

2022-07-19

xfs: fix up non-directory creation in SGID directories (Andrey Albershteyn) [2089360]
x86/speculation/mmio: Print SMT warning (Rafael Aquini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
KVM: x86/speculation: Disable Fill buffer clear within guests (Rafael Aquini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
x86/speculation/mmio: Reuse SRBDS mitigation for SBDS (Rafael Aquini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
x86/speculation/srbds: Update SRBDS mitigation selection (Rafael Aquini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
x86/speculation/mmio: Add sysfs reporting for Processor MMIO Stale Data (Rafael Aquini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
cpu/speculation: Add prototype for cpu_show_srbds() (Rafael Aquini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
x86/speculation/mmio: Enable CPU Fill buffer clearing on idle (Rafael Aquini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
x86/bugs: Group MDS, TAA & Processor MMIO Stale Data mitigations (Rafael Aquini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data (Rafael Aquini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
x86/speculation: Add a common function for MD_CLEAR mitigation update (Rafael Aquini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
x86/speculation/mmio: Enumerate Processor MMIO Stale Data bug (Rafael Aquini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
Documentation: Add documentation for Processor MMIO Stale Data (Rafael Aquini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
[s390] s390/zcrypt: use kvmalloc instead of kmalloc for 256k alloc (Mete Durlu) [2072970]

2022-07-13

tracing: Fix bad use of igrab in trace_uprobe.c (Oleg Nesterov) [2096884]

2022-07-07

qede: Reduce verbosity of ptp tx timestamp (Manish Chopra) [2080646]
RDMA/cma: Fix unbalanced cm_id reference count during address resolve (Kamal Heib) [2085425]

2022-06-28

sched,perf: Fix periodic timers (Valentin Schneider) [2077346]
sched: debug: Remove the cfs bandwidth timer_active printout (Valentin Schneider) [2077346]
sched: Cleanup bandwidth timers (Valentin Schneider) [2077346]

2022-06-15

netfilter: nf_tables: disallow non-stateful expression in sets earlier (Phil Sutter) [2093000] {CVE-2022-1966}
netfilter: nf_tables: fix memory leak if expr init fails (Phil Sutter) [2093000]

2022-06-14

perf: Fix sys_perf_event_open() race against self (Michael Petlan) [2087954]

2022-06-06

mm: memcg: charge memsw as well in __GFP_NOFAIL case (Rafael Aquini) [2082564]

2022-05-26

libceph: fix potential use-after-free on linger ping and resends (Ilya Dryomov) [2088025]
xfs: use length to balance duplicate bno buffers in perag rb_tree (Brian Foster) [2050464]
sock: sock_dequeue_err_skb() needs hard irq safety (Kenneth Yin) [2070408]

2022-05-17

mm/rmap.c: explicitly reset vma->anon_vma in unlink_anon_vmas() (Rafael Aquini) [1824109 2069962]
mm/rmap.c: don't reuse anon_vma if we just want a copy (Rafael Aquini) [1824109 2069962]
mm/mmap.c: rb_parent is not necessary in __vma_link_list() (Rafael Aquini) [1824109 2069962]
mm/mmap.c: extract __vma_unlink_list() as counterpart for __vma_link_list() (Rafael Aquini) [1824109 2069962]
mm/mmap.c: __vma_unlink_prev() is not necessary now (Rafael Aquini) [1824109 2069962]
mm/mmap.c: prev could be retrieved from vma->vm_prev (Rafael Aquini) [1824109 2069962]

2022-04-27

net-sysfs: add check for netdevice being present to speed_show (William Zhao) [2055457]
CI: Drop baseline runs (Veronika Kabatova)
perf/x86/intel: Add more Icelake CPUIDs (Michael Petlan) [2072317]
perf vendor events intel: Add Icelake V1.00 event file (Michael Petlan) [2072317]
perf vendor events intel: Add core event list for Icelake Server (Michael Petlan) [2072317]

2022-04-13

CI: Remove deprecated option (Veronika Kabatova)
RDMA/core: Fix panic when port_pkey_list isn't initialized (Kamal Heib) [2046571]