Re: How to safely hold kernel packages ?

2018-02-13 Thread Stéphane Rivière
Sounds like a nice computer, but without the model number, cores, bus speed it's hard to tell just how fast it can work or move a Tb or two of data. You're right. Supermicro X9SR Intel Xeon E5 1620v2 4 cores / 8 threads 3.7 GHz / 3,9 GHz 10 Mo cache 64Go DDR3 ECC 1600 MHz Debian 8 stable.

Re: How to safely hold kernel packages ?

2018-02-08 Thread Jimmy Johnson
On 02/07/2018 12:27 AM, Stéphane Rivière wrote: Thanks Jimmy for your help, I would use 'apt-mark'.  # apt-mark hold 'package-name' and # apt-mark unhold 'package-name' It appears that apt-mark hold and aptitude hold have same effects, you could obtain the same with some tricks with dpkg.

Re: How to safely hold kernel packages ?

2018-02-07 Thread Stéphane Rivière
Thanks Jimmy for your help, I would use 'apt-mark'.  # apt-mark hold 'package-name' and # apt-mark unhold 'package-name' It appears that apt-mark hold and aptitude hold have same effects, you could obtain the same with some tricks with dpkg. If I used apt-get, it should be wise to use

Re: How to safely hold kernel packages ?

2018-02-06 Thread Jimmy Johnson
On 02/06/2018 09:00 AM, Stéphane Rivière wrote: Hi all, I wanted to avoid kernel updates after the Spectre/Meltdown 'bug', also known as KPTI or kaiser CPU flaw. In my specific context, these patches are useless or even harmful. Before applying an aptitude update/upgrade to all the

Re: How to safely hold kernel packages ?

2018-02-06 Thread Stéphane Rivière
At first thanks you all for you good advices. I will follow them, update kernels and apply the appropriate options (thanks for the link). I did not find what exactly is the nokaiser option and I will use nopti. I agree dpkg-jiu-jitsu is an uncomfortable sport and understand i've hold the

Re: How to safely hold kernel packages ?

2018-02-06 Thread The Wanderer
On 2018-02-06 at 12:00, Stéphane Rivière wrote: > Hi all, > > I wanted to avoid kernel updates after the Spectre/Meltdown 'bug', > also known as KPTI or kaiser CPU flaw. In my specific context, these > patches are useless or even harmful. As indicated by Andy Smith, you should probably upgrade

Re: How to safely hold kernel packages ?

2018-02-06 Thread Sven Hartge
Stéphane Rivière wrote: > I wanted to avoid kernel updates after the Spectre/Meltdown 'bug', also > known as KPTI or kaiser CPU flaw. No, it is not known as this. > In my specific context, these patches are useless or even harmful. Possible. You do know you can just add

Re: How to safely hold kernel packages ?

2018-02-06 Thread Andy Smith
Hello, On Tue, Feb 06, 2018 at 06:00:16PM +0100, Stéphane Rivière wrote: > So, after an aptitude search ~i~linux- I hold theses meta-packages : > > aptitude hold linux-image-amd64 > aptitude hold linux-headers-amd64 I think you also would need to hold package linux-image-4.9.0-4-amd64. >

How to safely hold kernel packages ?

2018-02-06 Thread Stéphane Rivière
Hi all, I wanted to avoid kernel updates after the Spectre/Meltdown 'bug', also known as KPTI or kaiser CPU flaw. In my specific context, these patches are useless or even harmful. Before applying an aptitude update/upgrade to all the servers and VMs I'm in charge, I've done a little test