|
Bugzilla – Full Text Bug Listing |
| Summary: | Internal error in module YaST2 network on RPi 2B system (armv7l) | ||
|---|---|---|---|
| Product: | [openSUSE] openSUSE Tumbleweed | Reporter: | Freek de Kruijf <freek> |
| Component: | YaST2 | Assignee: | Michal Filka <mfilka> |
| Status: | RESOLVED DUPLICATE | QA Contact: | Jiri Srain <jsrain> |
| Severity: | Normal | ||
| Priority: | P5 - None | CC: | freek, jreidinger, mfilka |
| Version: | 201503* | ||
| Target Milestone: | --- | ||
| Hardware: | armv7 | ||
| OS: | SUSE Other | ||
| Whiteboard: | |||
| Found By: | --- | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
| Attachments: | The requested y2logs.tgz | ||
|
Description
Freek de Kruijf
2015-03-31 11:37:57 UTC
Created attachment 629420 [details]
The requested y2logs.tgz
Made using "save_y2logs ./y2logs.tgz" immediately after ending "yast network" on the console.
Thanks for the report. It would be helpful if you could write what was the action which caused "internal error". What did you try to configure? First I tried to configure the whole network configuration. Finally I only did the IPv4 configuration, which succeeded. After that I tried to add a fixed IPv6 address and the default route of IPv6. At that moment I got the same error. So it has to do with configuring a fixed IPv6 and IPv6 gateway address. Previously this worked OK and I saved the files in /etc/sysconfig/network/ Comparing these files I added two lines to ifcfg-eth0 and one line to ifroute-eth0 specifying the above mentioned addresses. After "systemctl restart network.service" the network came up with the required fixed addresses, both IPv4 and IPv6. This problem seems to have replaced by another problem in YaST network. Now I get the following error:
Internal error. Please report a bug report with logs.
Details: undefined method `ReadHardware' for #<Yast::LanItemsClass:0x243e400>
Caller: /usr/share/YaST2/modules/LanItems.rb:988:in `ReadHw'
Looks a bit like the other errors with libstorage-ruby, but the error message is different.
Does the following help?
rpi2test:~ # irb
irb(main):001:0> load /usr/share/YaST2/modules/LanItems.rb
SyntaxError: (irb):1: unknown regexp options - har
from /usr/bin/irb:11:in `<main>'
irb(main):002:0> load /usr/share/YaST2/modules/LanItems.rb
SyntaxError: (irb):2: unknown regexp options - har
from /usr/bin/irb:11:in `<main>'
irb(main):003:0> quit
rpi2test:~ #
Thanks for reporting this, nice analysis. I will check it Ah, wrong, you do not load it as string, but as regexp, please try require "yast" load "/usr/share/YaST2/modules/LanItems.rb" Thanks Below is the result:
rpi2test:~ # irb
irb(main):001:0> require "yast"
=> true
irb(main):002:0> load "/usr/share/YaST2/modules/LanItems.rb"
/usr/share/YaST2/modules/LanItems.rb:222: warning: duplicated key at line 230 ignored: "rt73usb"
/usr/share/YaST2/modules/LanItems.rb:262: warning: duplicated key at line 273 ignored: "WIRELESS_CLIENT_CERT"
/usr/share/YaST2/modules/LanItems.rb:263: warning: duplicated key at line 276 ignored: "WIRELESS_CA_CERT"
NameError: component cannot import namespace 'Storage'
from /usr/lib/ruby/vendor_ruby/2.2.0/yast/yast.rb:162:in `import_pure'
from /usr/lib/ruby/vendor_ruby/2.2.0/yast/yast.rb:162:in `import'
from /usr/share/YaST2/modules/LanItems.rb:55:in `main'
from /usr/share/YaST2/modules/LanItems.rb:2669:in `<module:Yast>'
from /usr/share/YaST2/modules/LanItems.rb:26:in `<top (required)>'
from (irb):2:in `load'
from (irb):2
from /usr/bin/irb:11:in `<main>'
irb(main):003:0> quit
rpi2test:~ #
Same problem with Storage.
Yep, it is related, I so I close it as dup. Better error reporting is also already reported. *** This bug has been marked as a duplicate of bug 933274 *** SUSE-SU-2019:0765-1: An update that solves 13 vulnerabilities and has 215 fixes is now available.
Category: security (important)
Bug References: 1046305,1046306,1050252,1050549,1051510,1054610,1055121,1056658,1056662,1056787,1060463,1063638,1065600,1068032,1070995,1071995,1074562,1074578,1074701,1075006,1075419,1075748,1078355,1080039,1082943,1083548,1083647,1084216,1086095,1086282,1086301,1086313,1086314,1086323,1087082,1087084,1087092,1087939,1088133,1094555,1098382,1098425,1098995,1102055,1103429,1104353,1106105,1106434,1106811,1107078,1107665,1108101,1108870,1109695,1110096,1110705,1111666,1113042,1113712,1113722,1113769,1113939,1114279,1114585,1114893,1117108,1117155,1117645,1117947,1118338,1119019,1119086,1119766,1119843,1120008,1120318,1120601,1120758,1120854,1120902,1120909,1120955,1121317,1121726,1121789,1121805,1122019,1122159,1122192,1122292,1122324,1122554,1122662,1122764,1122779,1122822,1122885,1122927,1122944,1122971,1122982,1123060,1123061,1123161,1123317,1123348,1123357,1123456,1123538,1123697,1123882,1123933,1124055,1124204,1124235,1124579,1124589,1124728,1124732,1124735,1124969,1124974,1124975,1124976,1124978,1124979,1124980,1124981,1124982,1124984,1124985,1125109,1125125,1125252,1125315,1125614,1125728,1125780,1125797,1125799,1125800,1125907,1125947,1126131,1126209,1126389,1126393,1126476,1126480,1126481,1126488,1126495,1126555,1126579,1126789,1126790,1126802,1126803,1126804,1126805,1126806,1126807,1127042,1127062,1127082,1127154,1127285,1127286,1127307,1127363,1127493,1127494,1127495,1127496,1127497,1127498,1127534,1127561,1127567,1127595,1127603,1127682,1127731,1127750,1127836,1127961,1128094,1128166,1128351,1128451,1128895,1129046,1129080,1129163,1129179,1129181,1129182,1129183,1129184,1129205,1129281,1129284,1129285,1129291,1129292,1129293,1129294,1129295,1129296,1129326,1129327,1129330,1129363,1129366,1129497,1129519,1129543,1129547,1129551,1129581,1129625,1129664,1129739,1129923,807502,824948,828192,925178
CVE References: CVE-2017-5753,CVE-2018-20669,CVE-2019-2024,CVE-2019-3459,CVE-2019-3460,CVE-2019-3819,CVE-2019-6974,CVE-2019-7221,CVE-2019-7222,CVE-2019-7308,CVE-2019-8912,CVE-2019-8980,CVE-2019-9213
Sources used:
SUSE Linux Enterprise Workstation Extension 12-SP4 (src): kernel-default-4.12.14-95.13.1
SUSE Linux Enterprise Software Development Kit 12-SP4 (src): kernel-docs-4.12.14-95.13.1, kernel-obs-build-4.12.14-95.13.1
SUSE Linux Enterprise Server 12-SP4 (src): kernel-default-4.12.14-95.13.1, kernel-source-4.12.14-95.13.1, kernel-syms-4.12.14-95.13.1
SUSE Linux Enterprise High Availability 12-SP4 (src): kernel-default-4.12.14-95.13.1
SUSE Linux Enterprise Desktop 12-SP4 (src): kernel-default-4.12.14-95.13.1, kernel-source-4.12.14-95.13.1, kernel-syms-4.12.14-95.13.1
*** NOTE: This information is not intended to be used for external
communication, because this may only be a partial fix.
If you have questions please reach out to maintenance coordination.
SUSE-SU-2019:0765-1: An update that solves 13 vulnerabilities and has 215 fixes is now available.
Category: security (important)
Bug References: 1046305,1046306,1050252,1050549,1051510,1054610,1055121,1056658,1056662,1056787,1060463,1063638,1065600,1068032,1070995,1071995,1074562,1074578,1074701,1075006,1075419,1075748,1078355,1080039,1082943,1083548,1083647,1084216,1086095,1086282,1086301,1086313,1086314,1086323,1087082,1087084,1087092,1087939,1088133,1094555,1098382,1098425,1098995,1102055,1103429,1104353,1106105,1106434,1106811,1107078,1107665,1108101,1108870,1109695,1110096,1110705,1111666,1113042,1113712,1113722,1113769,1113939,1114279,1114585,1114893,1117108,1117155,1117645,1117947,1118338,1119019,1119086,1119766,1119843,1120008,1120318,1120601,1120758,1120854,1120902,1120909,1120955,1121317,1121726,1121789,1121805,1122019,1122159,1122192,1122292,1122324,1122554,1122662,1122764,1122779,1122822,1122885,1122927,1122944,1122971,1122982,1123060,1123061,1123161,1123317,1123348,1123357,1123456,1123538,1123697,1123882,1123933,1124055,1124204,1124235,1124579,1124589,1124728,1124732,1124735,1124969,1124974,1124975,1124976,1124978,1124979,1124980,1124981,1124982,1124984,1124985,1125109,1125125,1125252,1125315,1125614,1125728,1125780,1125797,1125799,1125800,1125907,1125947,1126131,1126209,1126389,1126393,1126476,1126480,1126481,1126488,1126495,1126555,1126579,1126789,1126790,1126802,1126803,1126804,1126805,1126806,1126807,1127042,1127062,1127082,1127154,1127285,1127286,1127307,1127363,1127493,1127494,1127495,1127496,1127497,1127498,1127534,1127561,1127567,1127595,1127603,1127682,1127731,1127750,1127836,1127961,1128094,1128166,1128351,1128451,1128895,1129046,1129080,1129163,1129179,1129181,1129182,1129183,1129184,1129205,1129281,1129284,1129285,1129291,1129292,1129293,1129294,1129295,1129296,1129326,1129327,1129330,1129363,1129366,1129497,1129519,1129543,1129547,1129551,1129581,1129625,1129664,1129739,1129923,807502,824948,828192,925178
CVE References: CVE-2017-5753,CVE-2018-20669,CVE-2019-2024,CVE-2019-3459,CVE-2019-3460,CVE-2019-3819,CVE-2019-6974,CVE-2019-7221,CVE-2019-7222,CVE-2019-7308,CVE-2019-8912,CVE-2019-8980,CVE-2019-9213
Sources used:
SUSE Linux Enterprise Workstation Extension 12-SP4 (src): kernel-default-4.12.14-95.13.1
SUSE Linux Enterprise Software Development Kit 12-SP4 (src): kernel-docs-4.12.14-95.13.1, kernel-obs-build-4.12.14-95.13.1
SUSE Linux Enterprise Server 12-SP4 (src): kernel-default-4.12.14-95.13.1, kernel-source-4.12.14-95.13.1, kernel-syms-4.12.14-95.13.1
SUSE Linux Enterprise Live Patching 12-SP4 (src): kgraft-patch-SLE12-SP4_Update_3-1-6.7.1
SUSE Linux Enterprise High Availability 12-SP4 (src): kernel-default-4.12.14-95.13.1
SUSE Linux Enterprise Desktop 12-SP4 (src): kernel-default-4.12.14-95.13.1, kernel-source-4.12.14-95.13.1, kernel-syms-4.12.14-95.13.1
*** NOTE: This information is not intended to be used for external
communication, because this may only be a partial fix.
If you have questions please reach out to maintenance coordination.
|