Received: by 10.192.165.148 with SMTP id m20csp2522683imm; Thu, 26 Apr 2018 12:27:05 -0700 (PDT) X-Google-Smtp-Source: AIpwx4+fsugrm818tDfoxLe9Vs0/xHyMkwqg7JsLkCogQYDZ/CieW3l/RY0eSmSOuZpbvRFCigXV X-Received: by 10.98.237.17 with SMTP id u17mr33564466pfh.78.1524770825485; Thu, 26 Apr 2018 12:27:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524770825; cv=none; d=google.com; s=arc-20160816; b=jdalqd5Ve6hntGN4L6MEv0csqO4ubjZJ12u81vPVyYm9teDSs4FI0tZXQhXFW0G4pT 3gNZKxf610vlDmMX2hZl9PlnLX6LDeqZA8+3ZsU5FfUvtoMWYsVletb0yWMPMpJe3sjF yUo9503CEeePlMpaRj/J/NmBsbBDii9sqGoXgt7mRWkHtCNFGe6ImCRNyyUt43aTjntD w7JWE9n+I0vX3hxGl0mfaZ04EpNXCAiQBVl5cKENlEICi+HzsDe/WtrER6bbPWOr72EM X7hHRvdpAvuzEaQnAewUrexdo45CVYZ/0aY4K3IDCmrdjEQ2KtPq2fUR/sN7GryIwPfS 7Ypw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-transfer-encoding:content-disposition:mime-version :references:mail-followup-to:message-id:subject:cc:to:from:date :dkim-signature:arc-authentication-results; bh=0hFjXtI2xMbnZChvjXRNZckw3EmRrk3Uuili9TcoPz0=; b=UqdlLyJ2yNTZcPwKqkUvnxRIy0gsYnpnIIKkPcLztJMAfe7U6VCYwa3wQU7eO4fG02 jE+bFT0EMAbXoTOn/XQAkSuxSTQhW+GbIR6+nf1RxbffxJ6bNHiVGX1w3C8nlAsT5fmg M6pS0AxCvc5gcpukSvES4rmtC5mXbKUjMSvjjqHrHU220eKDKP1lsprzkOdct6B8U+K3 qn/DFu65eqvowImc3PIC/pwJLNjSSCT+XjA14mrm/vf1s6Ojvqfo/goPMEP2G7//ykd/ 9tXZx34qLa8pl7diMg2Vd4ZrDt0HU8tVaWvIeIOrtjQ5eW3ISQGjQQLqKXb/2KW9ZOXr OxhA== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@thunk.org header.s=ef5046eb header.b=yk36mIBZ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 30-v6si17184503plf.104.2018.04.26.12.26.50; Thu, 26 Apr 2018 12:27:05 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@thunk.org header.s=ef5046eb header.b=yk36mIBZ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754593AbeDZTZd (ORCPT + 99 others); Thu, 26 Apr 2018 15:25:33 -0400 Received: from imap.thunk.org ([74.207.234.97]:35396 "EHLO imap.thunk.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751262AbeDZTZc (ORCPT ); Thu, 26 Apr 2018 15:25:32 -0400 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=thunk.org; s=ef5046eb; h=In-Reply-To:Content-Transfer-Encoding:Content-Type: MIME-Version:References:Message-ID:Subject:Cc:To:From:Date:Sender:Reply-To: Content-ID:Content-Description:Resent-Date:Resent-From:Resent-Sender: Resent-To:Resent-Cc:Resent-Message-ID:List-Id:List-Help:List-Unsubscribe: List-Subscribe:List-Post:List-Owner:List-Archive; bh=0hFjXtI2xMbnZChvjXRNZckw3EmRrk3Uuili9TcoPz0=; b=yk36mIBZExqNDu7CPMKzYx5SVL V0zd2kpfJx4V+cNZOo//8WAo/Q/bRnsLfcDNqHGOqeFfw93vNAg+rvr+Up1MlZlkDWajzg85dIHZn prZwPcBzDfg2GbrooBeXl7rLDmLWZGqiNSXVSuwHNNoBTi+dD17EAX73gRU3WrBUWK4U=; Received: from root (helo=callcc.thunk.org) by imap.thunk.org with local-esmtp (Exim 4.89) (envelope-from ) id 1fBmWI-0008KO-Sr; Thu, 26 Apr 2018 19:25:31 +0000 Received: by callcc.thunk.org (Postfix, from userid 15806) id EE0347A0147; Thu, 26 Apr 2018 15:25:24 -0400 (EDT) Date: Thu, 26 Apr 2018 15:25:24 -0400 From: "Theodore Y. Ts'o" To: Sultan Alsawaf Cc: linux-kernel@vger.kernel.org, Jann Horn Subject: Re: Linux messages full of `random: get_random_u32 called from` Message-ID: <20180426192524.GD5965@thunk.org> Mail-Followup-To: "Theodore Y. Ts'o" , Sultan Alsawaf , linux-kernel@vger.kernel.org, Jann Horn References: <20180426050056.GF18803@thunk.org> <20180426073255.GH18803@thunk.org> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: User-Agent: Mutt/1.9.5 (2018-04-13) X-SA-Exim-Connect-IP: X-SA-Exim-Mail-From: tytso@thunk.org X-SA-Exim-Scanned: No (on imap.thunk.org); SAEximRunCond expanded to false Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Apr 26, 2018 at 08:17:34AM -0700, Sultan Alsawaf wrote: > > Hmm, can you let the boot hang for a while? It should continue after > > a few minutes if you wait long enough, but wait a minute or two, then > > give it entropy so the boot can continue. Then can you use > > "systemd-analyze blame" or "systemd-analyize critical-chain" and we > > can see what process was trying to get randomness during the boot > > startup and blocking waiting for the CRNG to be fully initialized. > > > > - Ted > > systemd-analyze blame: https://hastebin.com/ikipavevew.css > systemd-analyze critical-chain: https://hastebin.com/odoyuqeges.pl > dmesg: https://hastebin.com/waracebeja.vbs > Hmm, it looks like the multiuser startup is getting blocked on snapd: 29.060s snapd.service graphical.target @1min 32.145s └─multi-user.target @1min 32.145s └─hddtemp.service @6.512s +28ms └─network-online.target @6.508s └─NetworkManager-wait-online.service @2.428s +4.079s └─NetworkManager.service @2.016s +404ms └─dbus.service @1.869s └─basic.target @1.824s └─sockets.target @1.824s └─snapd.socket @1.821s +1ms └─sysinit.target @1.812s └─apparmor.service @587ms +1.224s └─local-fs.target @585ms └─local-fs-pre.target @585ms └─keyboard-setup.service @235ms +346ms └─systemd-journald.socket @226ms └─system.slice @225ms └─-.slice @220ms This appears to be some kind of new package management system for Ubuntu: Description-en: Tool to interact with Ubuntu Core Snappy. Install, configure, refresh and remove snap packages. Snaps are 'universal' packages that work across many different Linux systems, enabling secure distribution of the latest apps and utilities for cloud, servers, desktops and the internet of things. Why it the Ubuntu package believes it needs to be fully started before the login screen can display is unclear to me. It might be worth using systemctl to disable snapd.serivce and see if that makes things work better for you. - Ted