Bug ID 1037115
Summary kernel: random: systemd: uninitialized urandom read (16 bytes read, 10 bits of entropy available)
Classification openSUSE
Product openSUSE Distribution
Version Leap 42.2
Hardware x86-64
OS openSUSE 42.2
Status NEW
Severity Minor
Priority P5 - None
Component Basesystem
Assignee bnc-team-screening@forge.provo.novell.com
Reporter Ulrich.Windl@rz.uni-regensburg.de
QA Contact qa-bugs@suse.de
Found By ---
Blocker ---

During boot systemd seems to read more randomness than available. Maybe it's
related to using encrypted filesystems. Example:
May 02 08:50:45 linux-n9gv systemd[1]: RTC configured in localtime, applying
delta of 120 minutes to system time.
May 02 08:50:45 linux-n9gv kernel: random: systemd: uninitialized urandom read
(16 bytes read, 10 bits of entropy available)
May 02 08:50:45 linux-n9gv kernel: random: systemd: uninitialized urandom read
(16 bytes read, 10 bits of entropy available)
May 02 08:50:45 linux-n9gv kernel: random: systemd: uninitialized urandom read
(16 bytes read, 10 bits of entropy available)
May 02 08:50:45 linux-n9gv systemd[1]: systemd 228 running in system mode.
(+PAM -AUDIT +SELINUX -IMA +APPARMOR -SMACK +SYSVINIT +UTMP +LIBCRYPTSETUP
+GCRYPT -GNU
May 02 08:50:45 linux-n9gv systemd[1]: Detected architecture x86-64.
May 02 08:50:45 linux-n9gv systemd[1]: Running in initial RAM disk.
May 02 08:50:45 linux-n9gv systemd[1]: Set hostname to <linux-n9gv>.
May 02 08:50:45 linux-n9gv kernel: random: systemd-cryptse: uninitialized
urandom read (16 bytes read, 10 bits of entropy available)
May 02 08:50:45 linux-n9gv kernel: random: systemd: uninitialized urandom read
(16 bytes read, 10 bits of entropy available)
May 02 08:50:45 linux-n9gv kernel: random: systemd: uninitialized urandom read
(16 bytes read, 10 bits of entropy available)
May 02 08:50:45 linux-n9gv kernel: random: systemd: uninitialized urandom read
(16 bytes read, 10 bits of entropy available)
May 02 08:50:45 linux-n9gv kernel: random: systemd: uninitialized urandom read
(16 bytes read, 10 bits of entropy available)
May 02 08:50:45 linux-n9gv kernel: random: systemd: uninitialized urandom read
(16 bytes read, 10 bits of entropy available)
May 02 08:50:45 linux-n9gv kernel: random: systemd: uninitialized urandom read
(16 bytes read, 10 bits of entropy available)
May 02 08:50:45 linux-n9gv systemd[1]: Reached target Swap.

This is for an AMD Phenom II CPU, but I see similar with an Intel Core Gen 4
CPU (that should have a built-in random generator).


You are receiving this mail because: