Mailinglist Archive: opensuse-bugs (4292 mails)

< Previous Next >
[Bug 1037115] New: kernel: random: systemd: uninitialized urandom read (16 bytes read, 10 bits of entropy available)
  • From: bugzilla_noreply@xxxxxxxxxx
  • Date: Tue, 02 May 2017 07:20:52 +0000
  • Message-id: <bug-1037115-21960@http.bugzilla.opensuse.org/>
http://bugzilla.opensuse.org/show_bug.cgi?id=1037115


Bug ID: 1037115
Summary: kernel: random: systemd: uninitialized urandom read
(16 bytes read, 10 bits of entropy available)
Classification: openSUSE
Product: openSUSE Distribution
Version: Leap 42.2
Hardware: x86-64
OS: openSUSE 42.2
Status: NEW
Severity: Minor
Priority: P5 - None
Component: Basesystem
Assignee: bnc-team-screening@xxxxxxxxxxxxxxxxxxxxxx
Reporter: Ulrich.Windl@xxxxxxxxxxxxxxxxxxxx
QA Contact: qa-bugs@xxxxxxx
Found By: ---
Blocker: ---

During boot systemd seems to read more randomness than available. Maybe it's
related to using encrypted filesystems. Example:
May 02 08:50:45 linux-n9gv systemd[1]: RTC configured in localtime, applying
delta of 120 minutes to system time.
May 02 08:50:45 linux-n9gv kernel: random: systemd: uninitialized urandom read
(16 bytes read, 10 bits of entropy available)
May 02 08:50:45 linux-n9gv kernel: random: systemd: uninitialized urandom read
(16 bytes read, 10 bits of entropy available)
May 02 08:50:45 linux-n9gv kernel: random: systemd: uninitialized urandom read
(16 bytes read, 10 bits of entropy available)
May 02 08:50:45 linux-n9gv systemd[1]: systemd 228 running in system mode.
(+PAM -AUDIT +SELINUX -IMA +APPARMOR -SMACK +SYSVINIT +UTMP +LIBCRYPTSETUP
+GCRYPT -GNU
May 02 08:50:45 linux-n9gv systemd[1]: Detected architecture x86-64.
May 02 08:50:45 linux-n9gv systemd[1]: Running in initial RAM disk.
May 02 08:50:45 linux-n9gv systemd[1]: Set hostname to <linux-n9gv>.
May 02 08:50:45 linux-n9gv kernel: random: systemd-cryptse: uninitialized
urandom read (16 bytes read, 10 bits of entropy available)
May 02 08:50:45 linux-n9gv kernel: random: systemd: uninitialized urandom read
(16 bytes read, 10 bits of entropy available)
May 02 08:50:45 linux-n9gv kernel: random: systemd: uninitialized urandom read
(16 bytes read, 10 bits of entropy available)
May 02 08:50:45 linux-n9gv kernel: random: systemd: uninitialized urandom read
(16 bytes read, 10 bits of entropy available)
May 02 08:50:45 linux-n9gv kernel: random: systemd: uninitialized urandom read
(16 bytes read, 10 bits of entropy available)
May 02 08:50:45 linux-n9gv kernel: random: systemd: uninitialized urandom read
(16 bytes read, 10 bits of entropy available)
May 02 08:50:45 linux-n9gv kernel: random: systemd: uninitialized urandom read
(16 bytes read, 10 bits of entropy available)
May 02 08:50:45 linux-n9gv systemd[1]: Reached target Swap.

This is for an AMD Phenom II CPU, but I see similar with an Intel Core Gen 4
CPU (that should have a built-in random generator).

--
You are receiving this mail because:
You are on the CC list for the bug.
< Previous Next >