http://bugzilla.opensuse.org/show_bug.cgi?id=1037115 Bug ID: 1037115 Summary: kernel: random: systemd: uninitialized urandom read (16 bytes read, 10 bits of entropy available) Classification: openSUSE Product: openSUSE Distribution Version: Leap 42.2 Hardware: x86-64 OS: openSUSE 42.2 Status: NEW Severity: Minor Priority: P5 - None Component: Basesystem Assignee: bnc-team-screening@forge.provo.novell.com Reporter: Ulrich.Windl@rz.uni-regensburg.de QA Contact: qa-bugs@suse.de Found By: --- Blocker: --- During boot systemd seems to read more randomness than available. Maybe it's related to using encrypted filesystems. Example: May 02 08:50:45 linux-n9gv systemd[1]: RTC configured in localtime, applying delta of 120 minutes to system time. May 02 08:50:45 linux-n9gv kernel: random: systemd: uninitialized urandom read (16 bytes read, 10 bits of entropy available) May 02 08:50:45 linux-n9gv kernel: random: systemd: uninitialized urandom read (16 bytes read, 10 bits of entropy available) May 02 08:50:45 linux-n9gv kernel: random: systemd: uninitialized urandom read (16 bytes read, 10 bits of entropy available) May 02 08:50:45 linux-n9gv systemd[1]: systemd 228 running in system mode. (+PAM -AUDIT +SELINUX -IMA +APPARMOR -SMACK +SYSVINIT +UTMP +LIBCRYPTSETUP +GCRYPT -GNU May 02 08:50:45 linux-n9gv systemd[1]: Detected architecture x86-64. May 02 08:50:45 linux-n9gv systemd[1]: Running in initial RAM disk. May 02 08:50:45 linux-n9gv systemd[1]: Set hostname to <linux-n9gv>. May 02 08:50:45 linux-n9gv kernel: random: systemd-cryptse: uninitialized urandom read (16 bytes read, 10 bits of entropy available) May 02 08:50:45 linux-n9gv kernel: random: systemd: uninitialized urandom read (16 bytes read, 10 bits of entropy available) May 02 08:50:45 linux-n9gv kernel: random: systemd: uninitialized urandom read (16 bytes read, 10 bits of entropy available) May 02 08:50:45 linux-n9gv kernel: random: systemd: uninitialized urandom read (16 bytes read, 10 bits of entropy available) May 02 08:50:45 linux-n9gv kernel: random: systemd: uninitialized urandom read (16 bytes read, 10 bits of entropy available) May 02 08:50:45 linux-n9gv kernel: random: systemd: uninitialized urandom read (16 bytes read, 10 bits of entropy available) May 02 08:50:45 linux-n9gv kernel: random: systemd: uninitialized urandom read (16 bytes read, 10 bits of entropy available) May 02 08:50:45 linux-n9gv systemd[1]: Reached target Swap. This is for an AMD Phenom II CPU, but I see similar with an Intel Core Gen 4 CPU (that should have a built-in random generator). -- You are receiving this mail because: You are on the CC list for the bug.