Sounds like a nice computer, but without the model number, cores, bus
speed it's hard to tell just how fast it can work or move a Tb or two of
data.
You're right.
Supermicro X9SR
Intel Xeon E5 1620v2
4 cores / 8 threads
3.7 GHz / 3,9 GHz
10 Mo cache
64Go DDR3 ECC 1600 MHz
Debian 8 stable.
I'
On 02/07/2018 12:27 AM, Stéphane Rivière wrote:
Thanks Jimmy for your help,
I would use 'apt-mark'. # apt-mark hold 'package-name'
and # apt-mark unhold 'package-name'
It appears that apt-mark hold and aptitude hold have same effects, you
could obtain the same with some tricks with dpkg.
If
Thanks Jimmy for your help,
I would use 'apt-mark'. # apt-mark hold 'package-name'
and # apt-mark unhold 'package-name'
It appears that apt-mark hold and aptitude hold have same effects, you
could obtain the same with some tricks with dpkg.
If I used apt-get, it should be wise to use apt-mar
On 02/06/2018 09:00 AM, Stéphane Rivière wrote:
Hi all,
I wanted to avoid kernel updates after the Spectre/Meltdown 'bug', also
known as KPTI or kaiser CPU flaw. In my specific context, these patches
are useless or even harmful.
Before applying an aptitude update/upgrade to all the servers
At first thanks you all for you good advices.
I will follow them, update kernels and apply the appropriate options
(thanks for the link). I did not find what exactly is the nokaiser
option and I will use nopti.
I agree dpkg-jiu-jitsu is an uncomfortable sport and understand i've
hold the wro
On 2018-02-06 at 12:00, Stéphane Rivière wrote:
> Hi all,
>
> I wanted to avoid kernel updates after the Spectre/Meltdown 'bug',
> also known as KPTI or kaiser CPU flaw. In my specific context, these
> patches are useless or even harmful.
As indicated by Andy Smith, you should probably upgrade a
Stéphane Rivière wrote:
> I wanted to avoid kernel updates after the Spectre/Meltdown 'bug', also
> known as KPTI or kaiser CPU flaw.
No, it is not known as this.
> In my specific context, these patches are useless or even harmful.
Possible. You do know you can just add "pti=off" to the kerne
Hello,
On Tue, Feb 06, 2018 at 06:00:16PM +0100, Stéphane Rivière wrote:
> So, after an aptitude search ~i~linux- I hold theses meta-packages :
>
> aptitude hold linux-image-amd64
> aptitude hold linux-headers-amd64
I think you also would need to hold package
linux-image-4.9.0-4-amd64.
> Hopefu
Hi all,
I wanted to avoid kernel updates after the Spectre/Meltdown 'bug', also
known as KPTI or kaiser CPU flaw. In my specific context, these patches
are useless or even harmful.
Before applying an aptitude update/upgrade to all the servers and VMs
I'm in charge, I've done a little test
9 matches
Mail list logo