Ich habe mein System in letzter Zeit 4 Mal neu aktualisiert mit einem
1 | sudo apt-get dist-upgrade |
Dabei sind mir in der Boot-Partition die folgenden neuen Einträge aufgefallen:
1 2 3 4 | -rw-r--r-- 1 root root 2747 Feb 13 00:57 retpoline-4.4.0-116-generic -rw-r--r-- 1 root root 255 Apr 13 17:21 retpoline-4.4.0-121-generic -rw-r--r-- 1 root root 255 Apr 23 18:41 retpoline-4.4.0-122-generic -rw-r--r-- 1 root root 255 Mai 2 15:58 retpoline-4.4.0-124-generic |
Ich kann mit den Einträgen und dem Inhalt der Dateien nichts anfangen. Kann mir jemand sagen was das ist und ob ich es beachten muss?
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 | cat retpoline-4.4.0-116-generic aesni-intel.ko .altinstr_replacement callq *%r11 aesni-intel.ko .altinstr_replacement callq *%r11 aesni-intel.ko aesni_xts_crypt8 callq *%r11 aesni-intel.ko aesni_xts_crypt8 callq *%r11 camellia-aesni-avx-x86_64.ko .altinstr_replacement callq *%r9 camellia-aesni-avx-x86_64.ko camellia_xts_crypt_16way callq *%r9 camellia-aesni-avx2.ko .altinstr_replacement callq *%r9 camellia-aesni-avx2.ko camellia_xts_crypt_32way callq *%r9 hpwdt.ko asminline_call callq *%r12 hv_vmbus.ko hv_do_hypercall callq *%r10 kvm-intel.ko vmx_handle_external_intr callq *%rdx kvm.ko em_loop callq *%rdx kvm.ko fastop callq *%rsi kvm.ko x86_emulate_insn callq *%rax kvm.ko x86_emulate_insn callq *%rax kvm.ko x86_emulate_insn callq *%rax vmlinux .altinstr_replacement callq *%rbx vmlinux .altinstr_replacement jmpq *%r10 vmlinux .altinstr_replacement jmpq *%r11 vmlinux .altinstr_replacement jmpq *%r12 vmlinux .altinstr_replacement jmpq *%r13 vmlinux .altinstr_replacement jmpq *%r14 vmlinux .altinstr_replacement jmpq *%r15 vmlinux .altinstr_replacement jmpq *%r8 vmlinux .altinstr_replacement jmpq *%r9 vmlinux .altinstr_replacement jmpq *%rax vmlinux .altinstr_replacement jmpq *%rbp vmlinux .altinstr_replacement jmpq *%rbx vmlinux .altinstr_replacement jmpq *%rcx vmlinux .altinstr_replacement jmpq *%rdi vmlinux .altinstr_replacement jmpq *%rdi vmlinux .altinstr_replacement jmpq *%rdi vmlinux .altinstr_replacement jmpq *%rdx vmlinux .altinstr_replacement jmpq *%rsi vmlinux .altinstr_replacement jmpq *%rsp vmlinux __x86_indirect_thunk_r10 jmpq *%r10 vmlinux __x86_indirect_thunk_r11 jmpq *%r11 vmlinux __x86_indirect_thunk_r12 jmpq *%r12 vmlinux __x86_indirect_thunk_r13 jmpq *%r13 vmlinux __x86_indirect_thunk_r14 jmpq *%r14 vmlinux __x86_indirect_thunk_r15 jmpq *%r15 vmlinux __x86_indirect_thunk_r8 jmpq *%r8 vmlinux __x86_indirect_thunk_r9 jmpq *%r9 vmlinux __x86_indirect_thunk_rax jmpq *%rax vmlinux __x86_indirect_thunk_rbp jmpq *%rbp vmlinux __x86_indirect_thunk_rbx jmpq *%rbx vmlinux __x86_indirect_thunk_rcx jmpq *%rcx vmlinux __x86_indirect_thunk_rdi jmpq *%rdi vmlinux __x86_indirect_thunk_rdx jmpq *%rdx vmlinux __x86_indirect_thunk_rsi jmpq *%rsi vmlinux __x86_indirect_thunk_rsp jmpq *%rsp vmlinux continue_block jmpq *%rdi vmlinux core_restore_code jmpq *%r8 vmlinux efi64_thunk callq *%rbx vmlinux efi_call callq *%rdi vmlinux efi_enter32 callq *%rdi vmlinux identity_mapped callq *%rdx vmlinux restore_image jmpq *%rcx vmlinux ret_from_fork callq *%rbx vmlinux return_to_handler jmpq *%rdi vmlinux secondary_startup_64 jmpq *%rax vmlinux wakeup_long64 jmpq *%rax vmlinux xen_mc_flush callq *%rax xen-privcmd.ko privcmd_ioctl callq *%rax |
1 2 3 4 | cat retpoline-4.4.0-121-generic arch/x86/platform/efi/efi_stub_64.S .text efi_call callq *%rdi arch/x86/platform/efi/efi_thunk_64.S .text efi64_thunk callq *%rbx arch/x86/platform/efi/efi_thunk_64.S .text efi_enter32 callq *%rdi |