On 2015-07-01 21:08:19 +0200, Vincent Lefevre wrote:
> It seems that sensord uses an inconsistent set of data for its
> RRD update, yielding data loss. "rrd update" no longer updates
> the sensord.rrd database:
[...]
This has happened again on a different machine. The update of
the RRD database stopped a few days ago:
-rw-r--r-- 1 root root 213992 2015-07-23 16:45:00 sensord.rrd
apparently due to a security update of the kernel:
2015-07-23 16:45:59 upgrade linux-image-3.16.0-4-amd64:amd64 3.16.7-ckt11-1
3.16.7-ckt11-1+deb8u2
2015-07-23 16:45:59 status half-configured linux-image-3.16.0-4-amd64:amd64
3.16.7-ckt11-1
2015-07-23 16:45:59 status unpacked linux-image-3.16.0-4-amd64:amd64
3.16.7-ckt11-1
2015-07-23 16:45:59 status half-installed linux-image-3.16.0-4-amd64:amd64
3.16.7-ckt11-1
2015-07-23 16:46:09 status half-installed linux-image-3.16.0-4-amd64:amd64
3.16.7-ckt11-1
2015-07-23 16:46:09 status unpacked linux-image-3.16.0-4-amd64:amd64
3.16.7-ckt11-1+deb8u2
2015-07-23 16:46:09 status unpacked linux-image-3.16.0-4-amd64:amd64
3.16.7-ckt11-1+deb8u2
[...]
2015-07-23 16:47:01 configure linux-image-3.16.0-4-amd64:amd64
3.16.7-ckt11-1+deb8u2 <none>
2015-07-23 16:47:01 status unpacked linux-image-3.16.0-4-amd64:amd64
3.16.7-ckt11-1+deb8u2
2015-07-23 16:47:01 status half-configured linux-image-3.16.0-4-amd64:amd64
3.16.7-ckt11-1+deb8u2
2015-07-23 16:47:07 status installed linux-image-3.16.0-4-amd64:amd64
3.16.7-ckt11-1+deb8u2
which corresponds to:
linux (3.16.7-ckt11-1+deb8u2) jessie-security; urgency=high
* [amd64] Restore "perf/x86: Further optimize copy_from_user_nmi()"
* [amd64] Fix nested NMI handling (CVE-2015-3290, CVE-2015-3291)
- Enable nested do_nmi handling for 64-bit kernels
- Remove asm code that saves cr2
- Switch stacks on userspace NMI entry
- Reorder nested NMI checks
- Use DF to avoid userspace RSP confusing nested NMI detection
-- Ben Hutchings <[email protected]> Fri, 17 Jul 2015 21:28:00 +0100
linux (3.16.7-ckt11-1+deb8u1) jessie-security; urgency=medium
* udf: Remove repeated loads blocksize
* udf: Check length of extended attributes and allocation descriptors
(CVE-2015-4167)
* udp: fix behavior of wrong checksums (CVE-2015-5364, CVE-2015-5366)
* [amd64] Revert "perf/x86: Further optimize copy_from_user_nmi()"
(CVE-2015-3290)
-- Ben Hutchings <[email protected]> Thu, 16 Jul 2015 20:18:18 +0100
The syslog file contains errors like:
Jul 27 17:00:00 zira sensord: Error updating RRD file: /var/log/sensord.rrd:
/var/log/sensord.rrd: expected 13 data source readings (got 12) from N
Jul 27 17:00:00 zira sensord: rrd update error (-1)
--
Vincent Lefèvre <[email protected]> - Web: <https://www.vinc17.net/>
100% accessible validated (X)HTML - Blog: <https://www.vinc17.net/blog/>
Work: CR INRIA - computer arithmetic / AriC project (LIP, ENS-Lyon)
--
To UNSUBSCRIBE, email to [email protected]
with a subject of "unsubscribe". Trouble? Contact [email protected]