On 2015-07-01 21:08:19 +0200, Vincent Lefevre wrote:
> It seems that sensord uses an inconsistent set of data for its
> RRD update, yielding data loss. "rrd update" no longer updates
> the sensord.rrd database:
[...]

This has happened again on a different machine. The update of
the RRD database stopped a few days ago:

-rw-r--r-- 1 root root             213992 2015-07-23 16:45:00 sensord.rrd

apparently due to a security update of the kernel:

2015-07-23 16:45:59 upgrade linux-image-3.16.0-4-amd64:amd64 3.16.7-ckt11-1 
3.16.7-ckt11-1+deb8u2
2015-07-23 16:45:59 status half-configured linux-image-3.16.0-4-amd64:amd64 
3.16.7-ckt11-1
2015-07-23 16:45:59 status unpacked linux-image-3.16.0-4-amd64:amd64 
3.16.7-ckt11-1
2015-07-23 16:45:59 status half-installed linux-image-3.16.0-4-amd64:amd64 
3.16.7-ckt11-1
2015-07-23 16:46:09 status half-installed linux-image-3.16.0-4-amd64:amd64 
3.16.7-ckt11-1
2015-07-23 16:46:09 status unpacked linux-image-3.16.0-4-amd64:amd64 
3.16.7-ckt11-1+deb8u2
2015-07-23 16:46:09 status unpacked linux-image-3.16.0-4-amd64:amd64 
3.16.7-ckt11-1+deb8u2
[...]
2015-07-23 16:47:01 configure linux-image-3.16.0-4-amd64:amd64 
3.16.7-ckt11-1+deb8u2 <none>
2015-07-23 16:47:01 status unpacked linux-image-3.16.0-4-amd64:amd64 
3.16.7-ckt11-1+deb8u2
2015-07-23 16:47:01 status half-configured linux-image-3.16.0-4-amd64:amd64 
3.16.7-ckt11-1+deb8u2
2015-07-23 16:47:07 status installed linux-image-3.16.0-4-amd64:amd64 
3.16.7-ckt11-1+deb8u2

which corresponds to:

linux (3.16.7-ckt11-1+deb8u2) jessie-security; urgency=high

  * [amd64] Restore "perf/x86: Further optimize copy_from_user_nmi()"
  * [amd64] Fix nested NMI handling (CVE-2015-3290, CVE-2015-3291)
    - Enable nested do_nmi handling for 64-bit kernels
    - Remove asm code that saves cr2
    - Switch stacks on userspace NMI entry
    - Reorder nested NMI checks
    - Use DF to avoid userspace RSP confusing nested NMI detection

 -- Ben Hutchings <b...@decadent.org.uk>  Fri, 17 Jul 2015 21:28:00 +0100

linux (3.16.7-ckt11-1+deb8u1) jessie-security; urgency=medium

  * udf: Remove repeated loads blocksize
  * udf: Check length of extended attributes and allocation descriptors
    (CVE-2015-4167)
  * udp: fix behavior of wrong checksums (CVE-2015-5364, CVE-2015-5366)
  * [amd64] Revert "perf/x86: Further optimize copy_from_user_nmi()"
    (CVE-2015-3290)

 -- Ben Hutchings <b...@decadent.org.uk>  Thu, 16 Jul 2015 20:18:18 +0100

The syslog file contains errors like:

Jul 27 17:00:00 zira sensord: Error updating RRD file: /var/log/sensord.rrd: 
/var/log/sensord.rrd: expected 13 data source readings (got 12) from N
Jul 27 17:00:00 zira sensord: rrd update error (-1)

-- 
Vincent Lefèvre <vinc...@vinc17.net> - Web: <https://www.vinc17.net/>
100% accessible validated (X)HTML - Blog: <https://www.vinc17.net/blog/>
Work: CR INRIA - computer arithmetic / AriC project (LIP, ENS-Lyon)


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to