Bug ID | 1037115 |
---|---|
Summary | kernel: random: systemd: uninitialized urandom read (16 bytes read, 10 bits of entropy available) |
Classification | openSUSE |
Product | openSUSE Distribution |
Version | Leap 42.2 |
Hardware | x86-64 |
OS | openSUSE 42.2 |
Status | NEW |
Severity | Minor |
Priority | P5 - None |
Component | Basesystem |
Assignee | bnc-team-screening@forge.provo.novell.com |
Reporter | Ulrich.Windl@rz.uni-regensburg.de |
QA Contact | qa-bugs@suse.de |
Found By | --- |
Blocker | --- |
During boot systemd seems to read more randomness than available. Maybe it's related to using encrypted filesystems. Example: May 02 08:50:45 linux-n9gv systemd[1]: RTC configured in localtime, applying delta of 120 minutes to system time. May 02 08:50:45 linux-n9gv kernel: random: systemd: uninitialized urandom read (16 bytes read, 10 bits of entropy available) May 02 08:50:45 linux-n9gv kernel: random: systemd: uninitialized urandom read (16 bytes read, 10 bits of entropy available) May 02 08:50:45 linux-n9gv kernel: random: systemd: uninitialized urandom read (16 bytes read, 10 bits of entropy available) May 02 08:50:45 linux-n9gv systemd[1]: systemd 228 running in system mode. (+PAM -AUDIT +SELINUX -IMA +APPARMOR -SMACK +SYSVINIT +UTMP +LIBCRYPTSETUP +GCRYPT -GNU May 02 08:50:45 linux-n9gv systemd[1]: Detected architecture x86-64. May 02 08:50:45 linux-n9gv systemd[1]: Running in initial RAM disk. May 02 08:50:45 linux-n9gv systemd[1]: Set hostname to <linux-n9gv>. May 02 08:50:45 linux-n9gv kernel: random: systemd-cryptse: uninitialized urandom read (16 bytes read, 10 bits of entropy available) May 02 08:50:45 linux-n9gv kernel: random: systemd: uninitialized urandom read (16 bytes read, 10 bits of entropy available) May 02 08:50:45 linux-n9gv kernel: random: systemd: uninitialized urandom read (16 bytes read, 10 bits of entropy available) May 02 08:50:45 linux-n9gv kernel: random: systemd: uninitialized urandom read (16 bytes read, 10 bits of entropy available) May 02 08:50:45 linux-n9gv kernel: random: systemd: uninitialized urandom read (16 bytes read, 10 bits of entropy available) May 02 08:50:45 linux-n9gv kernel: random: systemd: uninitialized urandom read (16 bytes read, 10 bits of entropy available) May 02 08:50:45 linux-n9gv kernel: random: systemd: uninitialized urandom read (16 bytes read, 10 bits of entropy available) May 02 08:50:45 linux-n9gv systemd[1]: Reached target Swap. This is for an AMD Phenom II CPU, but I see similar with an Intel Core Gen 4 CPU (that should have a built-in random generator).