معرفی شرکت ها


bpftool-3.10.0-1160.88.1.el7.centos.plus.x86_64.rpm


Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر

توضیحات

Inspection and simple manipulation of eBPF programs and maps
ویژگی مقدار
سیستم عامل Linux
توزیع CentOS 7
مخزن Centos centosplus x86_64
نام بسته bpftool
نام فایل بسته bpftool-3.10.0-1160.88.1.el7.centos.plus.x86_64.rpm
نسخه بسته 3.10.0
انتشار بسته 1160.88.1.el7.centos.plus
معماری بسته x86_64
نگهدارنده -
تاریخ ساخت Wed 08 Mar 2023 07
هاست سازنده kbuilder.bsys.centos.org
نوع بسته .rpm
آدرس صفحه اصلی http://www.kernel.org/
مجوز GPLv2
حجم دانلود 8.6M
حجم نصب 1.926M
This package contains the bpftool, which allows inspection and simple manipulation of eBPF programs and maps.


جایگزین ها

بسته نسخه معماری مخزن
bpftool-3.10.0-1160.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.81.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.2.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.83.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.53.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.31.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.15.2.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.2.2.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.36.2.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.80.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.62.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.76.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.42.2.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.6.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.21.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.45.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.59.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.41.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.11.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.25.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.49.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.24.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
bpftool-3.10.0-1160.80.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.81.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.59.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.41.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.49.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.2.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.95.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.53.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.36.2.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.76.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.24.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.99.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.25.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.21.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.102.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.2.2.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.6.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.42.2.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.92.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.83.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.11.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.62.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.31.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.15.2.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.88.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.66.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.71.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.90.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-1160.45.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
bpftool-3.10.0-957.1.3.el7.azure.x86_64.rpm 3.10.0 x86_64 CentOS virt


نیازمندی

مقدار نام
- libc.so.6()(64bit)
- libc.so.6(GLIBC_2.11)(64bit)
- libc.so.6(GLIBC_2.14)(64bit)
- libc.so.6(GLIBC_2.17)(64bit)
- libc.so.6(GLIBC_2.2.5)(64bit)
- libc.so.6(GLIBC_2.3)(64bit)
- libc.so.6(GLIBC_2.3.4)(64bit)
- libc.so.6(GLIBC_2.4)(64bit)
- libc.so.6(GLIBC_2.7)(64bit)
- libc.so.6(GLIBC_2.8)(64bit)
- libdl.so.2()(64bit)
- libdl.so.2(GLIBC_2.2.5)(64bit)
- libelf.so.1()(64bit)
- libelf.so.1(ELFUTILS_1.0)(64bit)
- libz.so.1()(64bit)
- libz.so.1(ZLIB_1.2.0)(64bit)
- rtld(GNU_HASH)


ارائه دهنده

مقدار نام
= 3.10.0-1160.88.1.el7.centos.plus bpftool
= 3.10.0-1160.88.1.el7.centos.plus bpftool(x86-64)


نحوه نصب


نصب پکیج rpm bpftool:

    sudo yum localinstall bpftool-3.10.0-1160.88.1.el7.centos.plus.x86_64.rpm


فایل ها

مسیرها
/etc/bash_completion.d/bpftool
/usr/sbin/bpftool
/usr/share/man/man8/bpftool-cgroup.8.gz
/usr/share/man/man8/bpftool-map.8.gz
/usr/share/man/man8/bpftool-prog.8.gz
/usr/share/man/man8/bpftool.8.gz


گزارش تغییرات

تاریخ آخرین تغییر جزئیات
2023-03-07

Apply debranding changes
Roll in i686 mods
audit-stop-scri-stack-frame.patch [puias]
32bit-Werror-warnings.patch [bug#12412]
32bit.patch [ay]
7-4.patch [T.Kabe, bug#13890]
efi-32bit.patch [ay]
spec_ctrl_i686.patch [T.Kabe bug#14353]
862.3.2) [pgreco]
862.11.6) [pgreco, bug#15174]
32bit-fixes-7_8.patch [puias+bug#12412]
i686-rate-7_8.patch [pgreco]
i686-mce-7_8.patch [pgreco]
Modify config file for x86_64 with extra features turned on including
Add in a patch that allows non-LogiTech remote to work [bug#5780]
JFS enabled [bug#7350]
NUMACHIP enabled [bug#7498]
AIC7xxx enabled [bug#7552]
Enabled via_velocity [bug#7877]
Add in a patch that fixes em28xx-cards [bug#8285]
Enabled ECRYPT_FS with a patch to fix build error [bug#7369]
Enabled Keyboard GPIO [bug#9063]
Enabled XEN_FBDEV_FRONTEND [bug#9463]
Enabled LINE6_USB [bug#9569]
Enabled I2C_MUX [bug#9592]
Enabled spidev [bug#9955]
Add a patch [bug#10447]
Enable ATM drivers [bug#10845]
Add 9pfs config options [bug#10849]
Enable VFIO_PCI_VGA [bug#12435]
Rremove initramfs-xxxkdump.img upon kernel removal [bug#12703]
Add a patch from [bug#12841]
Add a patch from [bug#12818]
Enabled RT2800USB_RT3573 [bug#13162]
Enable LDM_PARTITION [bug#13526]
Add a patch to fix misleading warning [bug#13990]
Add BuildRequires: openssl-devel to the with_perf section [bug#13990]
Add a patch to fix build errors for EL7.5 [bug#14425]
Added a patch to fix alsa potentail crash [bug14779]
Add a patch to fix race in virtio_balloon [bug#15216]
Add shim requirement to the spec file for x86_64
Apply patches that fix ecryptfs issue [see bugs #7369, #15353] provided by @pgreco
Add an i686 patch to fix Hyper-V issue [bug#15374]
Enable NIU and add a patch that fixes build errors submitted by h-masuda [bug#15040]
Apply a patch to fix cifs [bug#16824]
Added a triggerin scriptlet to rebuild the initramfs image
wireguard added
UEFI disabled in 32-bit kernel

2023-02-18

KVM: x86: add bit to indicate correct tsc_shift (Marcelo Tosatti) [2152838]
KVM: x86: rewrite handling of scaled TSC for kvmclock (Marcelo Tosatti) [2152838]
KVM: x86: rename argument to kvm_set_tsc_khz (Marcelo Tosatti) [2152838]

2023-02-10

Revert "openvswitch: fix flow actions reallocation" (Rado Vrbovsky) [2141780] {CVE-2022-2639}
Revert "openvswitch: fix OOB access in reserve_sfa_size()" (Rado Vrbovsky) [2141780] {CVE-2022-2639}
kvm/emulate: Fix SETcc emulation function offsets with SLS (Vitaly Kuznetsov) [2143438]
mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse (Rafael Aquini) [2138620] {CVE-2022-42703}
mm, rmap: handle anon_vma_prepare() common case inline (Rafael Aquini) [2138620] {CVE-2022-42703}
proc: proc_skip_spaces() shouldn't think it is working on C strings (Wander Lairson Costa) [2152565] {CVE-2022-4378}
proc: avoid integer type confusion in get_proc_long (Wander Lairson Costa) [2152565] {CVE-2022-4378}
scsi: qla2xxx: Fix crash due to stale SRB access around I/O timeouts (Nilesh Javali) [2092105]
fs: Add missing umask strip in vfs_tmpfile (Andrey Albershteyn) [2159946] {CVE-2018-13405 CVE-2021-4037}
fs: add mode_strip_sgid() helper (Andrey Albershteyn) [2159946] {CVE-2018-13405 CVE-2021-4037}

2023-02-02

openvswitch: fix OOB access in reserve_sfa_size() (Rado Vrbovsky) [2141780] {CVE-2022-2639}
openvswitch: fix flow actions reallocation (Rado Vrbovsky) [2141780] {CVE-2022-2639}
gitlab-ci: use CI templates from production branch (Michael Hofmann)
mm: prevent page_frag_alloc() from corrupting the memory (Rafael Aquini) [2141062]
mm: Use fixed constant in page_frag_alloc instead of size + 1 (Rafael Aquini) [2141062]
mm: page_alloc: fix ref bias in page_frag_alloc() for 1-byte allocs (Rafael Aquini) [2141062]
x86/pat: Pass valid address to sanitize_phys() (Jeff Moyer) [1974485]

2023-01-19

sctp: do asoc update earlier in sctp_sf_do_dupcook_b (Xin Long) [2054037]
sctp: do asoc update earlier in sctp_sf_do_dupcook_a (Xin Long) [2054037]
sctp: handle errors when updating asoc (Xin Long) [2054037]
sctp: no need to check assoc id before calling sctp_assoc_set_id (Xin Long) [2054037]
s390/topology: fix warning when disabling cpus (Tobias Huschle) [2071980]

2023-01-12

blk-mq: fix flush-rq race (Ming Lei) [2088029]
scsi: target: iscsi: Fix a race condition between login_work and the login thread (Maurizio Lombardi) [2154243]

2022-12-19

x86/sme: avoid using __x86_return_thunk (Rafael Aquini) [2122158]
scsi: core: Simplify control flow in scmd_eh_abort_handler() (Ewan D. Milne) [2128337]
scsi: core: Avoid leaving shost->last_reset with stale value if EH does not run (Ewan D. Milne) [2128337]
[netdrv] i40e: Fix freeing of uninitialized misc IRQ vector (Jamie Bainbridge) [2129248]
x86/speculation: Use generic retpoline by default on AMD (Rafael Aquini) [2062165] {CVE-2021-26401}

2022-12-08

net: usb: ax88179_178a: Fix packet receiving (Jose Ignacio Tornos Martinez) [2120504] {CVE-2022-2964}
net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup (Jose Ignacio Tornos Martinez) [2120504] {CVE-2022-2964}
net: usb: Merge cpu_to_le32s + memcpy to put_unaligned_le32 (Jose Ignacio Tornos Martinez) [2120504] {CVE-2022-2964}
ax88179_178a: Merge memcpy + le32_to_cpus to get_unaligned_le32 (Jose Ignacio Tornos Martinez) [2120504] {CVE-2022-2964}
net: usb: ax88179_178a: fix packet alignment padding (Jose Ignacio Tornos Martinez) [2120504] {CVE-2022-2964}
mm: swap: disable swap_vma_readahead for PPC64 (Rafael Aquini) [2142455]

2022-11-24

[netdrv] bnxt: don't lock the tx queue from napi poll (Jamie Bainbridge) [2110869]
[netdrv] bnxt_en: reverse order of TX disable and carrier off (Jamie Bainbridge) [2110869]
[netdrv] qede: confirm skb is allocated before using (Jamie Bainbridge) [2131145]

2022-10-08

scsi: lpfc: Fix FCP I/O flush functionality for TMF routines (Dick Kennedy) [1969988]
scsi: lpfc: Fix illegal memory access on Abort IOCBs (Dick Kennedy) [1969988]
NFS: Fix extra call to dput() in nfs_prime_dcache (Benjamin Coddington) [2117856]

2022-09-22

x86/speculation: Add LFENCE to RSB fill sequence (Rafael Aquini) [2115073] {CVE-2022-26373}
x86/speculation: Protect against userspace-userspace spectreRSB (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/speculation: cope with spectre_v2=retpoline cmdline on retbleed-affected Intel CPUs (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
KVM: emulate: do not adjust size of fastop and setcc subroutines (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/kvm: fix FASTOP_SIZE when return thunks are enabled (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/speculation: Disable RRSBA behavior (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/kexec: Disable RET on kexec (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/bugs: Do not enable IBPB-on-entry when IBPB is not supported (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/bugs: Add Cannon lake to RETBleed affected CPU list (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/cpu/amd: Enumerate BTC_NO (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/common: Stamp out the stepping madness (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/cpu/amd: Add Spectral Chicken (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/bugs: Do IBPB fallback check only once (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/bugs: Add retbleed=ibpb (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/bugs: Report Intel retbleed vulnerability (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/bugs: Enable STIBP for JMP2RET (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/bugs: Add AMD retbleed= boot parameter (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/bugs: Report AMD retbleed vulnerability (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86: Add magic AMD return-thunk (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86: Use return-thunk in asm code (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/sev: Avoid using __x86_return_thunk (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/vsyscall_emu/64: Don't use RET in vsyscall emulation (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/kvm: Fix SETcc emulation for return thunks (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86,objtool: Create .return_sites (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86: Undo return-thunk damage (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/retpoline: Use -mfunction-return (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/cpufeatures: Move RETPOLINE flags to word 11 (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
objtool: Add ELF writing capability (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86: Prepare asm files for straight-line-speculation (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86: Prepare inline-asm for straight-line-speculation (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/kvm: Fix fastop function ELF metadata (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/kvm: Move kvm_fastop_exception to .fixup section (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/vdso: Fix vDSO build if a retpoline is emitted (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/cpufeatures: Combine word 11 and 12 into a new scattered features word (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/cpufeatures: Carve out CQM features retrieval (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/cpufeatures: Re-tabulate the X86_FEATURE definitions (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/cpufeature: Move processor tracing out of scattered features (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/cpu: Probe CPUID leaf 6 even when cpuid_level == 6 (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/alternatives: Cleanup DPRINTK macro (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}

2022-09-15

net_sched: cls_route: remove from list when handle is 0 (Davide Caratti) [2121809] {CVE-2022-2588}

2022-09-08

net/mlx5: Add Fast teardown support (Jay Shin) [2077711]
net/mlx5: Free IRQs in shutdown path (Jay Shin) [2077711]
net/mlx5: Change teardown with force mode failure message to warning (Jay Shin) [2077711]
net/mlx5: Cancel health poll before sending panic teardown command (Jay Shin) [2077711]
net/mlx5: Add fast unload support in shutdown flow (Jay Shin) [2077711]
net/mlx5: Expose command polling interface (Jay Shin) [2077711]
posix-timers: Remove remaining uses of tasklist_lock (Oleg Nesterov) [2115147]
posix-timers: Use sighand lock instead of tasklist_lock on timer deletion (Oleg Nesterov) [2115147]
posix-cpu-timers: remove tasklist_lock in posix_cpu_clock_get() (Oleg Nesterov) [2115147]

2022-07-26

sfc: complete the next packet when we receive a timestamp (Íñigo Huguet) [1793280]

2022-07-19

xfs: fix up non-directory creation in SGID directories (Andrey Albershteyn) [2089360]
x86/speculation/mmio: Print SMT warning (Rafael Aquini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
KVM: x86/speculation: Disable Fill buffer clear within guests (Rafael Aquini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
x86/speculation/mmio: Reuse SRBDS mitigation for SBDS (Rafael Aquini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
x86/speculation/srbds: Update SRBDS mitigation selection (Rafael Aquini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
x86/speculation/mmio: Add sysfs reporting for Processor MMIO Stale Data (Rafael Aquini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
cpu/speculation: Add prototype for cpu_show_srbds() (Rafael Aquini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
x86/speculation/mmio: Enable CPU Fill buffer clearing on idle (Rafael Aquini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
x86/bugs: Group MDS, TAA & Processor MMIO Stale Data mitigations (Rafael Aquini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data (Rafael Aquini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
x86/speculation: Add a common function for MD_CLEAR mitigation update (Rafael Aquini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
x86/speculation/mmio: Enumerate Processor MMIO Stale Data bug (Rafael Aquini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
Documentation: Add documentation for Processor MMIO Stale Data (Rafael Aquini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
[s390] s390/zcrypt: use kvmalloc instead of kmalloc for 256k alloc (Mete Durlu) [2072970]

2022-07-13

tracing: Fix bad use of igrab in trace_uprobe.c (Oleg Nesterov) [2096884]