معرفی شرکت ها


bpftool-3.10.0-1160.81.1.el7.centos.plus.x86_64.rpm


Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر

توضیحات

Inspection and simple manipulation of eBPF programs and maps
ویژگی مقدار
سیستم عامل Linux
توزیع CentOS 7
مخزن Centos centosplus x86_64
نام بسته bpftool
نام فایل بسته bpftool-3.10.0-1160.81.1.el7.centos.plus.x86_64.rpm
نسخه بسته 3.10.0
انتشار بسته 1160.81.1.el7.centos.plus
معماری بسته x86_64
نگهدارنده -
تاریخ ساخت Mon 02 Jan 2023 06
هاست سازنده kbuilder.bsys.centos.org
نوع بسته .rpm
آدرس صفحه اصلی http://www.kernel.org/
مجوز GPLv2
حجم دانلود 8.6M
حجم نصب 1.926M
This package contains the bpftool, which allows inspection and simple manipulation of eBPF programs and maps.


جایگزین ها

بسته نسخه معماری مخزن
bpftool-3.10.0-1160.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.2.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.88.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.83.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.53.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.31.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.15.2.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.2.2.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.36.2.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.80.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.62.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.76.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.42.2.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.6.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.21.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.45.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.59.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.41.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.11.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.25.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.49.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.24.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.80.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.81.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.59.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.41.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.49.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.2.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.95.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.53.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.36.2.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.76.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.24.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.99.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.25.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.21.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.102.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.2.2.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.6.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.42.2.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.92.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.83.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.11.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.62.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.31.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.15.2.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.88.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.66.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.71.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.90.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.45.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-957.1.3.el7.azure.x86_64.rpm 3.10.0 x86_64 CentOS virt


نیازمندی

مقدار نام
- libc.so.6()(64bit)
- libc.so.6(GLIBC_2.11)(64bit)
- libc.so.6(GLIBC_2.14)(64bit)
- libc.so.6(GLIBC_2.17)(64bit)
- libc.so.6(GLIBC_2.2.5)(64bit)
- libc.so.6(GLIBC_2.3)(64bit)
- libc.so.6(GLIBC_2.3.4)(64bit)
- libc.so.6(GLIBC_2.4)(64bit)
- libc.so.6(GLIBC_2.7)(64bit)
- libc.so.6(GLIBC_2.8)(64bit)
- libdl.so.2()(64bit)
- libdl.so.2(GLIBC_2.2.5)(64bit)
- libelf.so.1()(64bit)
- libelf.so.1(ELFUTILS_1.0)(64bit)
- libz.so.1()(64bit)
- libz.so.1(ZLIB_1.2.0)(64bit)
- rtld(GNU_HASH)


ارائه دهنده

مقدار نام
= 3.10.0-1160.81.1.el7.centos.plus bpftool
= 3.10.0-1160.81.1.el7.centos.plus bpftool(x86-64)


نحوه نصب


نصب پکیج rpm bpftool:

    sudo yum localinstall bpftool-3.10.0-1160.81.1.el7.centos.plus.x86_64.rpm


فایل ها

مسیرها
/etc/bash_completion.d/bpftool
/usr/sbin/bpftool
/usr/share/man/man8/bpftool-cgroup.8.gz
/usr/share/man/man8/bpftool-map.8.gz
/usr/share/man/man8/bpftool-prog.8.gz
/usr/share/man/man8/bpftool.8.gz


گزارش تغییرات

تاریخ آخرین تغییر جزئیات
2022-12-14

Apply debranding changes
Roll in i686 mods
audit-stop-scri-stack-frame.patch [puias]
32bit-Werror-warnings.patch [bug#12412]
32bit.patch [ay]
7-4.patch [T.Kabe, bug#13890]
efi-32bit.patch [ay]
spec_ctrl_i686.patch [T.Kabe bug#14353]
862.3.2) [pgreco]
862.11.6) [pgreco, bug#15174]
32bit-fixes-7_8.patch [puias+bug#12412]
i686-rate-7_8.patch [pgreco]
i686-mce-7_8.patch [pgreco]
Modify config file for x86_64 with extra features turned on including
Add in a patch that allows non-LogiTech remote to work [bug#5780]
JFS enabled [bug#7350]
NUMACHIP enabled [bug#7498]
AIC7xxx enabled [bug#7552]
Enabled via_velocity [bug#7877]
Add in a patch that fixes em28xx-cards [bug#8285]
Enabled ECRYPT_FS with a patch to fix build error [bug#7369]
Enabled Keyboard GPIO [bug#9063]
Enabled XEN_FBDEV_FRONTEND [bug#9463]
Enabled LINE6_USB [bug#9569]
Enabled I2C_MUX [bug#9592]
Enabled spidev [bug#9955]
Add a patch [bug#10447]
Enable ATM drivers [bug#10845]
Add 9pfs config options [bug#10849]
Enable VFIO_PCI_VGA [bug#12435]
Rremove initramfs-xxxkdump.img upon kernel removal [bug#12703]
Add a patch from [bug#12841]
Add a patch from [bug#12818]
Enabled RT2800USB_RT3573 [bug#13162]
Enable LDM_PARTITION [bug#13526]
Add a patch to fix misleading warning [bug#13990]
Add BuildRequires: openssl-devel to the with_perf section [bug#13990]
Add a patch to fix build errors for EL7.5 [bug#14425]
Added a patch to fix alsa potentail crash [bug14779]
Add a patch to fix race in virtio_balloon [bug#15216]
Add shim requirement to the spec file for x86_64
Apply patches that fix ecryptfs issue [see bugs #7369, #15353] provided by @pgreco
Add an i686 patch to fix Hyper-V issue [bug#15374]
Enable NIU and add a patch that fixes build errors submitted by h-masuda [bug#15040]
Apply a patch to fix cifs [bug#16824]
Added a triggerin scriptlet to rebuild the initramfs image
wireguard added
UEFI disabled in 32-bit kernel

2022-11-24

[netdrv] bnxt: don't lock the tx queue from napi poll (Jamie Bainbridge) [2110869]
[netdrv] bnxt_en: reverse order of TX disable and carrier off (Jamie Bainbridge) [2110869]
[netdrv] qede: confirm skb is allocated before using (Jamie Bainbridge) [2131145]

2022-10-08

scsi: lpfc: Fix FCP I/O flush functionality for TMF routines (Dick Kennedy) [1969988]
scsi: lpfc: Fix illegal memory access on Abort IOCBs (Dick Kennedy) [1969988]
NFS: Fix extra call to dput() in nfs_prime_dcache (Benjamin Coddington) [2117856]

2022-09-22

x86/speculation: Add LFENCE to RSB fill sequence (Rafael Aquini) [2115073] {CVE-2022-26373}
x86/speculation: Protect against userspace-userspace spectreRSB (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/speculation: cope with spectre_v2=retpoline cmdline on retbleed-affected Intel CPUs (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
KVM: emulate: do not adjust size of fastop and setcc subroutines (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/kvm: fix FASTOP_SIZE when return thunks are enabled (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/speculation: Disable RRSBA behavior (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/kexec: Disable RET on kexec (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/bugs: Do not enable IBPB-on-entry when IBPB is not supported (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/bugs: Add Cannon lake to RETBleed affected CPU list (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/cpu/amd: Enumerate BTC_NO (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/common: Stamp out the stepping madness (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/cpu/amd: Add Spectral Chicken (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/bugs: Do IBPB fallback check only once (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/bugs: Add retbleed=ibpb (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/bugs: Report Intel retbleed vulnerability (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/bugs: Enable STIBP for JMP2RET (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/bugs: Add AMD retbleed= boot parameter (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/bugs: Report AMD retbleed vulnerability (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86: Add magic AMD return-thunk (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86: Use return-thunk in asm code (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/sev: Avoid using __x86_return_thunk (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/vsyscall_emu/64: Don't use RET in vsyscall emulation (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/kvm: Fix SETcc emulation for return thunks (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86,objtool: Create .return_sites (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86: Undo return-thunk damage (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/retpoline: Use -mfunction-return (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/cpufeatures: Move RETPOLINE flags to word 11 (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
objtool: Add ELF writing capability (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86: Prepare asm files for straight-line-speculation (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86: Prepare inline-asm for straight-line-speculation (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/kvm: Fix fastop function ELF metadata (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/kvm: Move kvm_fastop_exception to .fixup section (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/vdso: Fix vDSO build if a retpoline is emitted (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/cpufeatures: Combine word 11 and 12 into a new scattered features word (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/cpufeatures: Carve out CQM features retrieval (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/cpufeatures: Re-tabulate the X86_FEATURE definitions (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/cpufeature: Move processor tracing out of scattered features (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/cpu: Probe CPUID leaf 6 even when cpuid_level == 6 (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/alternatives: Cleanup DPRINTK macro (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}

2022-09-15

net_sched: cls_route: remove from list when handle is 0 (Davide Caratti) [2121809] {CVE-2022-2588}

2022-09-08

net/mlx5: Add Fast teardown support (Jay Shin) [2077711]
net/mlx5: Free IRQs in shutdown path (Jay Shin) [2077711]
net/mlx5: Change teardown with force mode failure message to warning (Jay Shin) [2077711]
net/mlx5: Cancel health poll before sending panic teardown command (Jay Shin) [2077711]
net/mlx5: Add fast unload support in shutdown flow (Jay Shin) [2077711]
net/mlx5: Expose command polling interface (Jay Shin) [2077711]
posix-timers: Remove remaining uses of tasklist_lock (Oleg Nesterov) [2115147]
posix-timers: Use sighand lock instead of tasklist_lock on timer deletion (Oleg Nesterov) [2115147]
posix-cpu-timers: remove tasklist_lock in posix_cpu_clock_get() (Oleg Nesterov) [2115147]

2022-07-26

sfc: complete the next packet when we receive a timestamp (Íñigo Huguet) [1793280]

2022-07-19

xfs: fix up non-directory creation in SGID directories (Andrey Albershteyn) [2089360]
x86/speculation/mmio: Print SMT warning (Rafael Aquini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
KVM: x86/speculation: Disable Fill buffer clear within guests (Rafael Aquini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
x86/speculation/mmio: Reuse SRBDS mitigation for SBDS (Rafael Aquini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
x86/speculation/srbds: Update SRBDS mitigation selection (Rafael Aquini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
x86/speculation/mmio: Add sysfs reporting for Processor MMIO Stale Data (Rafael Aquini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
cpu/speculation: Add prototype for cpu_show_srbds() (Rafael Aquini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
x86/speculation/mmio: Enable CPU Fill buffer clearing on idle (Rafael Aquini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
x86/bugs: Group MDS, TAA & Processor MMIO Stale Data mitigations (Rafael Aquini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data (Rafael Aquini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
x86/speculation: Add a common function for MD_CLEAR mitigation update (Rafael Aquini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
x86/speculation/mmio: Enumerate Processor MMIO Stale Data bug (Rafael Aquini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
Documentation: Add documentation for Processor MMIO Stale Data (Rafael Aquini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
[s390] s390/zcrypt: use kvmalloc instead of kmalloc for 256k alloc (Mete Durlu) [2072970]

2022-07-13

tracing: Fix bad use of igrab in trace_uprobe.c (Oleg Nesterov) [2096884]

2022-07-07

qede: Reduce verbosity of ptp tx timestamp (Manish Chopra) [2080646]
RDMA/cma: Fix unbalanced cm_id reference count during address resolve (Kamal Heib) [2085425]

2022-06-28

sched,perf: Fix periodic timers (Valentin Schneider) [2077346]
sched: debug: Remove the cfs bandwidth timer_active printout (Valentin Schneider) [2077346]
sched: Cleanup bandwidth timers (Valentin Schneider) [2077346]

2022-06-15

netfilter: nf_tables: disallow non-stateful expression in sets earlier (Phil Sutter) [2093000] {CVE-2022-1966}
netfilter: nf_tables: fix memory leak if expr init fails (Phil Sutter) [2093000]

2022-06-14

perf: Fix sys_perf_event_open() race against self (Michael Petlan) [2087954]

2022-06-06

mm: memcg: charge memsw as well in __GFP_NOFAIL case (Rafael Aquini) [2082564]

2022-05-26

libceph: fix potential use-after-free on linger ping and resends (Ilya Dryomov) [2088025]
xfs: use length to balance duplicate bno buffers in perag rb_tree (Brian Foster) [2050464]
sock: sock_dequeue_err_skb() needs hard irq safety (Kenneth Yin) [2070408]

2022-05-17

mm/rmap.c: explicitly reset vma->anon_vma in unlink_anon_vmas() (Rafael Aquini) [1824109 2069962]
mm/rmap.c: don't reuse anon_vma if we just want a copy (Rafael Aquini) [1824109 2069962]
mm/mmap.c: rb_parent is not necessary in __vma_link_list() (Rafael Aquini) [1824109 2069962]
mm/mmap.c: extract __vma_unlink_list() as counterpart for __vma_link_list() (Rafael Aquini) [1824109 2069962]
mm/mmap.c: __vma_unlink_prev() is not necessary now (Rafael Aquini) [1824109 2069962]
mm/mmap.c: prev could be retrieved from vma->vm_prev (Rafael Aquini) [1824109 2069962]