معرفی شرکت ها


python-perf-3.10.0-1160.92.1.el7.x86_64.rpm


Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر

توضیحات

Python bindings for apps which will manipulate perf events
ویژگی مقدار
سیستم عامل Linux
توزیع CentOS 7
مخزن Centos updates x86_64
نام بسته python-perf
نام فایل بسته python-perf-3.10.0-1160.92.1.el7.x86_64.rpm
نسخه بسته 3.10.0
انتشار بسته 1160.92.1.el7
معماری بسته x86_64
نگهدارنده -
تاریخ ساخت Tue 20 Jun 2023 03
هاست سازنده kbuilder.bsys.centos.org
نوع بسته .rpm
آدرس صفحه اصلی http://www.kernel.org/
مجوز GPLv2
حجم دانلود 8.2M
حجم نصب 336.162K
The python-perf package contains a module that permits applications written in the Python programming language to use the interface to manipulate perf events.


جایگزین ها

بسته نسخه معماری مخزن
python-perf-3.10.0-1160.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
python-perf-3.10.0-1160.53.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
python-perf-3.10.0-1160.21.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
python-perf-3.10.0-1160.80.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
python-perf-3.10.0-1160.11.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
python-perf-3.10.0-1160.2.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
python-perf-3.10.0-1160.24.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
python-perf-3.10.0-1160.41.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
python-perf-3.10.0-1160.25.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
python-perf-3.10.0-1160.88.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
python-perf-3.10.0-1160.62.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
python-perf-3.10.0-1160.49.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
python-perf-3.10.0-1160.42.2.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
python-perf-3.10.0-1160.2.2.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
python-perf-3.10.0-1160.59.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
python-perf-3.10.0-1160.76.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
python-perf-3.10.0-1160.83.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
python-perf-3.10.0-1160.81.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
python-perf-3.10.0-1160.15.2.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
python-perf-3.10.0-1160.36.2.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
python-perf-3.10.0-1160.45.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
python-perf-3.10.0-1160.6.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
python-perf-3.10.0-1160.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
python-perf-3.10.0-1160.31.1.el7.centos.plus.x86_64.rpm 3.10.0 x86_64 CentOS centosplus
python-perf-3.10.0-1160.2.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
python-perf-3.10.0-1160.99.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
python-perf-3.10.0-1160.2.2.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
python-perf-3.10.0-1160.42.2.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
python-perf-3.10.0-1160.71.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
python-perf-3.10.0-1160.81.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
python-perf-3.10.0-1160.62.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
python-perf-3.10.0-1160.21.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
python-perf-3.10.0-1160.25.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
python-perf-3.10.0-1160.36.2.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
python-perf-3.10.0-1160.53.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
python-perf-3.10.0-1160.66.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
python-perf-3.10.0-1160.49.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
python-perf-3.10.0-1160.80.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
python-perf-3.10.0-1160.31.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
python-perf-3.10.0-1160.83.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
python-perf-3.10.0-1160.6.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
python-perf-3.10.0-1160.41.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
python-perf-3.10.0-1160.11.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
python-perf-3.10.0-1160.59.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
python-perf-3.10.0-1160.88.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
python-perf-3.10.0-1160.95.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
python-perf-3.10.0-1160.76.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
python-perf-3.10.0-1160.90.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
python-perf-3.10.0-1160.45.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
python-perf-3.10.0-1160.24.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
python-perf-3.10.0-1160.15.2.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates
python-perf-3.10.0-1160.102.1.el7.x86_64.rpm 3.10.0 x86_64 CentOS updates


نیازمندی

مقدار نام
- libc.so.6()(64bit)
- libc.so.6(GLIBC_2.14)(64bit)
- libc.so.6(GLIBC_2.2.5)(64bit)
- libc.so.6(GLIBC_2.3)(64bit)
- libc.so.6(GLIBC_2.3.4)(64bit)
- libc.so.6(GLIBC_2.4)(64bit)
- libc.so.6(GLIBC_2.7)(64bit)
- libc.so.6(GLIBC_2.8)(64bit)
- libpthread.so.0()(64bit)
- libpthread.so.0(GLIBC_2.2.5)(64bit)
- libpython2.7.so.1.0()(64bit)
= 2.7 python(abi)
- rtld(GNU_HASH)


ارائه دهنده

مقدار نام
= 3.10.0-1160.92.1.el7 python-perf
= 3.10.0-1160.92.1.el7 python-perf(x86-64)


نحوه نصب


نصب پکیج rpm python-perf:

    sudo yum localinstall python-perf-3.10.0-1160.92.1.el7.x86_64.rpm


فایل ها

مسیرها
/usr/lib64/python2.7/site-packages
/usr/lib64/python2.7/site-packages/perf-0.1-py2.7.egg-info
/usr/lib64/python2.7/site-packages/perf.so


گزارش تغییرات

تاریخ آخرین تغییر جزئیات
2023-05-18

packet: fix use-after-free in prb_retire_rx_blk_timer_expired() (Florian Westphal) [2182642]
x86/bugs: Workaround for incorrectly set X86_BUG_RETBLEED under VMware (Waiman Long) [2189556]

2023-04-21

target: iscsi: use GFP_NOIO with loopback connections (Maurizio Lombardi) [2181931]

2023-03-17

NFSv4.1: Fix open stateid recovery (Benjamin Coddington) [2156890]
NFS: Don't open code clearing of delegation state (Benjamin Coddington) [2156890]

2023-02-23

usb: mon: make mmapped memory read only (Desnes Nunes) [2161212] {CVE-2022-43750}

2023-02-18

KVM: x86: add bit to indicate correct tsc_shift (Marcelo Tosatti) [2152838]
KVM: x86: rewrite handling of scaled TSC for kvmclock (Marcelo Tosatti) [2152838]
KVM: x86: rename argument to kvm_set_tsc_khz (Marcelo Tosatti) [2152838]

2023-02-10

Revert "openvswitch: fix flow actions reallocation" (Rado Vrbovsky) [2141780] {CVE-2022-2639}
Revert "openvswitch: fix OOB access in reserve_sfa_size()" (Rado Vrbovsky) [2141780] {CVE-2022-2639}
kvm/emulate: Fix SETcc emulation function offsets with SLS (Vitaly Kuznetsov) [2143438]
mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse (Rafael Aquini) [2138620] {CVE-2022-42703}
mm, rmap: handle anon_vma_prepare() common case inline (Rafael Aquini) [2138620] {CVE-2022-42703}
proc: proc_skip_spaces() shouldn't think it is working on C strings (Wander Lairson Costa) [2152565] {CVE-2022-4378}
proc: avoid integer type confusion in get_proc_long (Wander Lairson Costa) [2152565] {CVE-2022-4378}
scsi: qla2xxx: Fix crash due to stale SRB access around I/O timeouts (Nilesh Javali) [2092105]
fs: Add missing umask strip in vfs_tmpfile (Andrey Albershteyn) [2159946] {CVE-2018-13405 CVE-2021-4037}
fs: add mode_strip_sgid() helper (Andrey Albershteyn) [2159946] {CVE-2018-13405 CVE-2021-4037}

2023-02-02

openvswitch: fix OOB access in reserve_sfa_size() (Rado Vrbovsky) [2141780] {CVE-2022-2639}
openvswitch: fix flow actions reallocation (Rado Vrbovsky) [2141780] {CVE-2022-2639}
gitlab-ci: use CI templates from production branch (Michael Hofmann)
mm: prevent page_frag_alloc() from corrupting the memory (Rafael Aquini) [2141062]
mm: Use fixed constant in page_frag_alloc instead of size + 1 (Rafael Aquini) [2141062]
mm: page_alloc: fix ref bias in page_frag_alloc() for 1-byte allocs (Rafael Aquini) [2141062]
x86/pat: Pass valid address to sanitize_phys() (Jeff Moyer) [1974485]

2023-01-19

sctp: do asoc update earlier in sctp_sf_do_dupcook_b (Xin Long) [2054037]
sctp: do asoc update earlier in sctp_sf_do_dupcook_a (Xin Long) [2054037]
sctp: handle errors when updating asoc (Xin Long) [2054037]
sctp: no need to check assoc id before calling sctp_assoc_set_id (Xin Long) [2054037]
s390/topology: fix warning when disabling cpus (Tobias Huschle) [2071980]

2023-01-12

blk-mq: fix flush-rq race (Ming Lei) [2088029]
scsi: target: iscsi: Fix a race condition between login_work and the login thread (Maurizio Lombardi) [2154243]

2022-12-19

x86/sme: avoid using __x86_return_thunk (Rafael Aquini) [2122158]
scsi: core: Simplify control flow in scmd_eh_abort_handler() (Ewan D. Milne) [2128337]
scsi: core: Avoid leaving shost->last_reset with stale value if EH does not run (Ewan D. Milne) [2128337]
[netdrv] i40e: Fix freeing of uninitialized misc IRQ vector (Jamie Bainbridge) [2129248]
x86/speculation: Use generic retpoline by default on AMD (Rafael Aquini) [2062165] {CVE-2021-26401}

2022-12-08

net: usb: ax88179_178a: Fix packet receiving (Jose Ignacio Tornos Martinez) [2120504] {CVE-2022-2964}
net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup (Jose Ignacio Tornos Martinez) [2120504] {CVE-2022-2964}
net: usb: Merge cpu_to_le32s + memcpy to put_unaligned_le32 (Jose Ignacio Tornos Martinez) [2120504] {CVE-2022-2964}
ax88179_178a: Merge memcpy + le32_to_cpus to get_unaligned_le32 (Jose Ignacio Tornos Martinez) [2120504] {CVE-2022-2964}
net: usb: ax88179_178a: fix packet alignment padding (Jose Ignacio Tornos Martinez) [2120504] {CVE-2022-2964}
mm: swap: disable swap_vma_readahead for PPC64 (Rafael Aquini) [2142455]

2022-11-24

[netdrv] bnxt: don't lock the tx queue from napi poll (Jamie Bainbridge) [2110869]
[netdrv] bnxt_en: reverse order of TX disable and carrier off (Jamie Bainbridge) [2110869]
[netdrv] qede: confirm skb is allocated before using (Jamie Bainbridge) [2131145]

2022-10-08

scsi: lpfc: Fix FCP I/O flush functionality for TMF routines (Dick Kennedy) [1969988]
scsi: lpfc: Fix illegal memory access on Abort IOCBs (Dick Kennedy) [1969988]
NFS: Fix extra call to dput() in nfs_prime_dcache (Benjamin Coddington) [2117856]

2022-09-22

x86/speculation: Add LFENCE to RSB fill sequence (Rafael Aquini) [2115073] {CVE-2022-26373}
x86/speculation: Protect against userspace-userspace spectreRSB (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/speculation: cope with spectre_v2=retpoline cmdline on retbleed-affected Intel CPUs (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
KVM: emulate: do not adjust size of fastop and setcc subroutines (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/kvm: fix FASTOP_SIZE when return thunks are enabled (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/speculation: Disable RRSBA behavior (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/kexec: Disable RET on kexec (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/bugs: Do not enable IBPB-on-entry when IBPB is not supported (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/bugs: Add Cannon lake to RETBleed affected CPU list (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/cpu/amd: Enumerate BTC_NO (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/common: Stamp out the stepping madness (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/cpu/amd: Add Spectral Chicken (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/bugs: Do IBPB fallback check only once (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/bugs: Add retbleed=ibpb (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/bugs: Report Intel retbleed vulnerability (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/bugs: Enable STIBP for JMP2RET (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/bugs: Add AMD retbleed= boot parameter (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/bugs: Report AMD retbleed vulnerability (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86: Add magic AMD return-thunk (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86: Use return-thunk in asm code (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/sev: Avoid using __x86_return_thunk (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/vsyscall_emu/64: Don't use RET in vsyscall emulation (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/kvm: Fix SETcc emulation for return thunks (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86,objtool: Create .return_sites (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86: Undo return-thunk damage (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/retpoline: Use -mfunction-return (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/cpufeatures: Move RETPOLINE flags to word 11 (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
objtool: Add ELF writing capability (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86: Prepare asm files for straight-line-speculation (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86: Prepare inline-asm for straight-line-speculation (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/kvm: Fix fastop function ELF metadata (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/kvm: Move kvm_fastop_exception to .fixup section (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/vdso: Fix vDSO build if a retpoline is emitted (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/cpufeatures: Combine word 11 and 12 into a new scattered features word (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/cpufeatures: Carve out CQM features retrieval (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/cpufeatures: Re-tabulate the X86_FEATURE definitions (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/cpufeature: Move processor tracing out of scattered features (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/cpu: Probe CPUID leaf 6 even when cpuid_level == 6 (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}
x86/alternatives: Cleanup DPRINTK macro (Rafael Aquini) [2090227] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901}

2022-09-15

net_sched: cls_route: remove from list when handle is 0 (Davide Caratti) [2121809] {CVE-2022-2588}

2022-09-08

net/mlx5: Add Fast teardown support (Jay Shin) [2077711]
net/mlx5: Free IRQs in shutdown path (Jay Shin) [2077711]
net/mlx5: Change teardown with force mode failure message to warning (Jay Shin) [2077711]
net/mlx5: Cancel health poll before sending panic teardown command (Jay Shin) [2077711]
net/mlx5: Add fast unload support in shutdown flow (Jay Shin) [2077711]
net/mlx5: Expose command polling interface (Jay Shin) [2077711]
posix-timers: Remove remaining uses of tasklist_lock (Oleg Nesterov) [2115147]
posix-timers: Use sighand lock instead of tasklist_lock on timer deletion (Oleg Nesterov) [2115147]
posix-cpu-timers: remove tasklist_lock in posix_cpu_clock_get() (Oleg Nesterov) [2115147]