[Bug 1037115] New: kernel: random: systemd: uninitialized urandom read (16 bytes read, 10 bits of entropy available)
http://bugzilla.opensuse.org/show_bug.cgi?id=1037115 Bug ID: 1037115 Summary: kernel: random: systemd: uninitialized urandom read (16 bytes read, 10 bits of entropy available) Classification: openSUSE Product: openSUSE Distribution Version: Leap 42.2 Hardware: x86-64 OS: openSUSE 42.2 Status: NEW Severity: Minor Priority: P5 - None Component: Basesystem Assignee: bnc-team-screening@forge.provo.novell.com Reporter: Ulrich.Windl@rz.uni-regensburg.de QA Contact: qa-bugs@suse.de Found By: --- Blocker: --- During boot systemd seems to read more randomness than available. Maybe it's related to using encrypted filesystems. Example: May 02 08:50:45 linux-n9gv systemd[1]: RTC configured in localtime, applying delta of 120 minutes to system time. May 02 08:50:45 linux-n9gv kernel: random: systemd: uninitialized urandom read (16 bytes read, 10 bits of entropy available) May 02 08:50:45 linux-n9gv kernel: random: systemd: uninitialized urandom read (16 bytes read, 10 bits of entropy available) May 02 08:50:45 linux-n9gv kernel: random: systemd: uninitialized urandom read (16 bytes read, 10 bits of entropy available) May 02 08:50:45 linux-n9gv systemd[1]: systemd 228 running in system mode. (+PAM -AUDIT +SELINUX -IMA +APPARMOR -SMACK +SYSVINIT +UTMP +LIBCRYPTSETUP +GCRYPT -GNU May 02 08:50:45 linux-n9gv systemd[1]: Detected architecture x86-64. May 02 08:50:45 linux-n9gv systemd[1]: Running in initial RAM disk. May 02 08:50:45 linux-n9gv systemd[1]: Set hostname to <linux-n9gv>. May 02 08:50:45 linux-n9gv kernel: random: systemd-cryptse: uninitialized urandom read (16 bytes read, 10 bits of entropy available) May 02 08:50:45 linux-n9gv kernel: random: systemd: uninitialized urandom read (16 bytes read, 10 bits of entropy available) May 02 08:50:45 linux-n9gv kernel: random: systemd: uninitialized urandom read (16 bytes read, 10 bits of entropy available) May 02 08:50:45 linux-n9gv kernel: random: systemd: uninitialized urandom read (16 bytes read, 10 bits of entropy available) May 02 08:50:45 linux-n9gv kernel: random: systemd: uninitialized urandom read (16 bytes read, 10 bits of entropy available) May 02 08:50:45 linux-n9gv kernel: random: systemd: uninitialized urandom read (16 bytes read, 10 bits of entropy available) May 02 08:50:45 linux-n9gv kernel: random: systemd: uninitialized urandom read (16 bytes read, 10 bits of entropy available) May 02 08:50:45 linux-n9gv systemd[1]: Reached target Swap. This is for an AMD Phenom II CPU, but I see similar with an Intel Core Gen 4 CPU (that should have a built-in random generator). -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=1037115 http://bugzilla.opensuse.org/show_bug.cgi?id=1037115#c1 --- Comment #1 from Ulrich Windl <Ulrich.Windl@rz.uni-regensburg.de> --- Using latest updates like these: # rpm -q systemd linux-kernel dracut systemd-228-25.1.x86_64 package linux-kernel is not installed dracut-044-16.3.1.x86_64 -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=1037115 Andreas Stieger <astieger@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Component|Basesystem |Kernel Assignee|bnc-team-screening@forge.pr |kernel-maintainers@forge.pr |ovo.novell.com |ovo.novell.com -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=1037115 http://bugzilla.opensuse.org/show_bug.cgi?id=1037115#c2 Andreas Stieger <astieger@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |astieger@suse.com Component|Kernel |Basesystem Assignee|kernel-maintainers@forge.pr |systemd-maintainers@suse.de |ovo.novell.com | --- Comment #2 from Andreas Stieger <astieger@suse.com> --- https://github.com/systemd/systemd/issues/4167 -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=1037115 http://bugzilla.opensuse.org/show_bug.cgi?id=1037115#c3 --- Comment #3 from Ulrich Windl <Ulrich.Windl@rz.uni-regensburg.de> --- Probably if systemd does not need stronger randomness it shouldn't use /dev/urandom, especially considering the fact that /dev/urandom is not able to provide stronger randomness if its pool is empty. -- You are receiving this mail because: You are on the CC list for the bug.
participants (1)
-
bugzilla_noreply@novell.com