On 2015-07-01 21:08:19 +0200, Vincent Lefevre wrote: > It seems that sensord uses an inconsistent set of data for its > RRD update, yielding data loss. "rrd update" no longer updates > the sensord.rrd database: [...]
This has happened again on a different machine. The update of the RRD database stopped a few days ago: -rw-r--r-- 1 root root 213992 2015-07-23 16:45:00 sensord.rrd apparently due to a security update of the kernel: 2015-07-23 16:45:59 upgrade linux-image-3.16.0-4-amd64:amd64 3.16.7-ckt11-1 3.16.7-ckt11-1+deb8u2 2015-07-23 16:45:59 status half-configured linux-image-3.16.0-4-amd64:amd64 3.16.7-ckt11-1 2015-07-23 16:45:59 status unpacked linux-image-3.16.0-4-amd64:amd64 3.16.7-ckt11-1 2015-07-23 16:45:59 status half-installed linux-image-3.16.0-4-amd64:amd64 3.16.7-ckt11-1 2015-07-23 16:46:09 status half-installed linux-image-3.16.0-4-amd64:amd64 3.16.7-ckt11-1 2015-07-23 16:46:09 status unpacked linux-image-3.16.0-4-amd64:amd64 3.16.7-ckt11-1+deb8u2 2015-07-23 16:46:09 status unpacked linux-image-3.16.0-4-amd64:amd64 3.16.7-ckt11-1+deb8u2 [...] 2015-07-23 16:47:01 configure linux-image-3.16.0-4-amd64:amd64 3.16.7-ckt11-1+deb8u2 <none> 2015-07-23 16:47:01 status unpacked linux-image-3.16.0-4-amd64:amd64 3.16.7-ckt11-1+deb8u2 2015-07-23 16:47:01 status half-configured linux-image-3.16.0-4-amd64:amd64 3.16.7-ckt11-1+deb8u2 2015-07-23 16:47:07 status installed linux-image-3.16.0-4-amd64:amd64 3.16.7-ckt11-1+deb8u2 which corresponds to: linux (3.16.7-ckt11-1+deb8u2) jessie-security; urgency=high * [amd64] Restore "perf/x86: Further optimize copy_from_user_nmi()" * [amd64] Fix nested NMI handling (CVE-2015-3290, CVE-2015-3291) - Enable nested do_nmi handling for 64-bit kernels - Remove asm code that saves cr2 - Switch stacks on userspace NMI entry - Reorder nested NMI checks - Use DF to avoid userspace RSP confusing nested NMI detection -- Ben Hutchings <b...@decadent.org.uk> Fri, 17 Jul 2015 21:28:00 +0100 linux (3.16.7-ckt11-1+deb8u1) jessie-security; urgency=medium * udf: Remove repeated loads blocksize * udf: Check length of extended attributes and allocation descriptors (CVE-2015-4167) * udp: fix behavior of wrong checksums (CVE-2015-5364, CVE-2015-5366) * [amd64] Revert "perf/x86: Further optimize copy_from_user_nmi()" (CVE-2015-3290) -- Ben Hutchings <b...@decadent.org.uk> Thu, 16 Jul 2015 20:18:18 +0100 The syslog file contains errors like: Jul 27 17:00:00 zira sensord: Error updating RRD file: /var/log/sensord.rrd: /var/log/sensord.rrd: expected 13 data source readings (got 12) from N Jul 27 17:00:00 zira sensord: rrd update error (-1) -- Vincent Lefèvre <vinc...@vinc17.net> - Web: <https://www.vinc17.net/> 100% accessible validated (X)HTML - Blog: <https://www.vinc17.net/blog/> Work: CR INRIA - computer arithmetic / AriC project (LIP, ENS-Lyon) -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org