Bug 925178

Summary: Internal error in module YaST2 network on RPi 2B system (armv7l)
Product: [openSUSE] openSUSE Tumbleweed Reporter: Freek de Kruijf <freek>
Component: YaST2Assignee: Michal Filka <mfilka>
Status: RESOLVED DUPLICATE QA Contact: Jiri Srain <jsrain>
Severity: Normal    
Priority: P5 - None CC: freek, jreidinger, mfilka
Version: 201503*   
Target Milestone: ---   
Hardware: armv7   
OS: SUSE Other   
Whiteboard:
Found By: --- Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---
Attachments: The requested y2logs.tgz

Description Freek de Kruijf 2015-03-31 11:37:57 UTC
When configuring the network using YaST2 ncurses on a Rasberry Pi 2 with openSUSE Tumbleweed, I got the following error:

Error
Internal error. Please report a bug report with logs.
Details: undefined method `[]' for nil:NilClass
Caller:  /usr/share/YaST2/modules/NetworkInterfaces.rb:831:in `block in Write

Logs will be attached.
Comment 1 Freek de Kruijf 2015-03-31 11:48:27 UTC
Created attachment 629420 [details]
The requested y2logs.tgz

Made using "save_y2logs ./y2logs.tgz" immediately after ending "yast network" on the console.
Comment 2 Michal Filka 2015-03-31 11:52:22 UTC
Thanks for the report.

It would be helpful if you could write what was the action which caused "internal error". What did you try to configure?
Comment 3 Freek de Kruijf 2015-03-31 13:06:55 UTC
First I tried to configure the whole network configuration. Finally I only did the IPv4 configuration, which succeeded. After that I tried to add a fixed IPv6 address and the default route of IPv6. At that moment I got the same error. So it has to do with configuring a fixed IPv6 and IPv6 gateway address.
Previously this worked OK and I saved the files in /etc/sysconfig/network/ Comparing these files I added two lines to ifcfg-eth0 and one line to ifroute-eth0 specifying the above mentioned addresses. After "systemctl restart network.service" the network came up with the required fixed addresses, both IPv4 and IPv6.
Comment 4 Freek de Kruijf 2015-06-04 20:49:17 UTC
This problem seems to have replaced by another problem in YaST network. Now I get the following error:

Internal error. Please report a bug report with logs.
Details: undefined method `ReadHardware' for #<Yast::LanItemsClass:0x243e400>
Caller:  /usr/share/YaST2/modules/LanItems.rb:988:in `ReadHw'

Looks a bit like the other errors with libstorage-ruby, but the error message is different.

Does the following help?

rpi2test:~ # irb
irb(main):001:0> load /usr/share/YaST2/modules/LanItems.rb
SyntaxError: (irb):1: unknown regexp options - har
        from /usr/bin/irb:11:in `<main>'
irb(main):002:0> load /usr/share/YaST2/modules/LanItems.rb
SyntaxError: (irb):2: unknown regexp options - har
        from /usr/bin/irb:11:in `<main>'
irb(main):003:0> quit
rpi2test:~ #
Comment 5 Josef Reidinger 2015-06-05 07:20:58 UTC
Thanks for reporting this, nice analysis. I will check it
Comment 6 Josef Reidinger 2015-06-05 07:32:51 UTC
Ah, wrong, you do not load it as string, but as regexp, please try

require "yast"
load "/usr/share/YaST2/modules/LanItems.rb"

Thanks
Comment 7 Freek de Kruijf 2015-06-05 08:35:22 UTC
Below is the result:

rpi2test:~ # irb
irb(main):001:0> require "yast"
=> true
irb(main):002:0> load "/usr/share/YaST2/modules/LanItems.rb"
/usr/share/YaST2/modules/LanItems.rb:222: warning: duplicated key at line 230 ignored: "rt73usb"
/usr/share/YaST2/modules/LanItems.rb:262: warning: duplicated key at line 273 ignored: "WIRELESS_CLIENT_CERT"
/usr/share/YaST2/modules/LanItems.rb:263: warning: duplicated key at line 276 ignored: "WIRELESS_CA_CERT"
NameError: component cannot import namespace 'Storage'
        from /usr/lib/ruby/vendor_ruby/2.2.0/yast/yast.rb:162:in `import_pure'
        from /usr/lib/ruby/vendor_ruby/2.2.0/yast/yast.rb:162:in `import'
        from /usr/share/YaST2/modules/LanItems.rb:55:in `main'
        from /usr/share/YaST2/modules/LanItems.rb:2669:in `<module:Yast>'
        from /usr/share/YaST2/modules/LanItems.rb:26:in `<top (required)>'
        from (irb):2:in `load'
        from (irb):2
        from /usr/bin/irb:11:in `<main>'
irb(main):003:0> quit
rpi2test:~ #

Same problem with Storage.
Comment 8 Josef Reidinger 2015-06-05 08:51:35 UTC
Yep, it is related, I so I close it as dup. Better error reporting is also already reported.

*** This bug has been marked as a duplicate of bug 933274 ***
Comment 9 Swamp Workflow Management 2019-03-26 20:43:50 UTC
SUSE-SU-2019:0765-1: An update that solves 13 vulnerabilities and has 215 fixes is now available.

Category: security (important)
Bug References: 1046305,1046306,1050252,1050549,1051510,1054610,1055121,1056658,1056662,1056787,1060463,1063638,1065600,1068032,1070995,1071995,1074562,1074578,1074701,1075006,1075419,1075748,1078355,1080039,1082943,1083548,1083647,1084216,1086095,1086282,1086301,1086313,1086314,1086323,1087082,1087084,1087092,1087939,1088133,1094555,1098382,1098425,1098995,1102055,1103429,1104353,1106105,1106434,1106811,1107078,1107665,1108101,1108870,1109695,1110096,1110705,1111666,1113042,1113712,1113722,1113769,1113939,1114279,1114585,1114893,1117108,1117155,1117645,1117947,1118338,1119019,1119086,1119766,1119843,1120008,1120318,1120601,1120758,1120854,1120902,1120909,1120955,1121317,1121726,1121789,1121805,1122019,1122159,1122192,1122292,1122324,1122554,1122662,1122764,1122779,1122822,1122885,1122927,1122944,1122971,1122982,1123060,1123061,1123161,1123317,1123348,1123357,1123456,1123538,1123697,1123882,1123933,1124055,1124204,1124235,1124579,1124589,1124728,1124732,1124735,1124969,1124974,1124975,1124976,1124978,1124979,1124980,1124981,1124982,1124984,1124985,1125109,1125125,1125252,1125315,1125614,1125728,1125780,1125797,1125799,1125800,1125907,1125947,1126131,1126209,1126389,1126393,1126476,1126480,1126481,1126488,1126495,1126555,1126579,1126789,1126790,1126802,1126803,1126804,1126805,1126806,1126807,1127042,1127062,1127082,1127154,1127285,1127286,1127307,1127363,1127493,1127494,1127495,1127496,1127497,1127498,1127534,1127561,1127567,1127595,1127603,1127682,1127731,1127750,1127836,1127961,1128094,1128166,1128351,1128451,1128895,1129046,1129080,1129163,1129179,1129181,1129182,1129183,1129184,1129205,1129281,1129284,1129285,1129291,1129292,1129293,1129294,1129295,1129296,1129326,1129327,1129330,1129363,1129366,1129497,1129519,1129543,1129547,1129551,1129581,1129625,1129664,1129739,1129923,807502,824948,828192,925178
CVE References: CVE-2017-5753,CVE-2018-20669,CVE-2019-2024,CVE-2019-3459,CVE-2019-3460,CVE-2019-3819,CVE-2019-6974,CVE-2019-7221,CVE-2019-7222,CVE-2019-7308,CVE-2019-8912,CVE-2019-8980,CVE-2019-9213
Sources used:
SUSE Linux Enterprise Workstation Extension 12-SP4 (src):    kernel-default-4.12.14-95.13.1
SUSE Linux Enterprise Software Development Kit 12-SP4 (src):    kernel-docs-4.12.14-95.13.1, kernel-obs-build-4.12.14-95.13.1
SUSE Linux Enterprise Server 12-SP4 (src):    kernel-default-4.12.14-95.13.1, kernel-source-4.12.14-95.13.1, kernel-syms-4.12.14-95.13.1
SUSE Linux Enterprise High Availability 12-SP4 (src):    kernel-default-4.12.14-95.13.1
SUSE Linux Enterprise Desktop 12-SP4 (src):    kernel-default-4.12.14-95.13.1, kernel-source-4.12.14-95.13.1, kernel-syms-4.12.14-95.13.1

*** NOTE: This information is not intended to be used for external
    communication, because this may only be a partial fix.
    If you have questions please reach out to maintenance coordination.
Comment 10 Swamp Workflow Management 2019-03-27 09:37:05 UTC
SUSE-SU-2019:0765-1: An update that solves 13 vulnerabilities and has 215 fixes is now available.

Category: security (important)
Bug References: 1046305,1046306,1050252,1050549,1051510,1054610,1055121,1056658,1056662,1056787,1060463,1063638,1065600,1068032,1070995,1071995,1074562,1074578,1074701,1075006,1075419,1075748,1078355,1080039,1082943,1083548,1083647,1084216,1086095,1086282,1086301,1086313,1086314,1086323,1087082,1087084,1087092,1087939,1088133,1094555,1098382,1098425,1098995,1102055,1103429,1104353,1106105,1106434,1106811,1107078,1107665,1108101,1108870,1109695,1110096,1110705,1111666,1113042,1113712,1113722,1113769,1113939,1114279,1114585,1114893,1117108,1117155,1117645,1117947,1118338,1119019,1119086,1119766,1119843,1120008,1120318,1120601,1120758,1120854,1120902,1120909,1120955,1121317,1121726,1121789,1121805,1122019,1122159,1122192,1122292,1122324,1122554,1122662,1122764,1122779,1122822,1122885,1122927,1122944,1122971,1122982,1123060,1123061,1123161,1123317,1123348,1123357,1123456,1123538,1123697,1123882,1123933,1124055,1124204,1124235,1124579,1124589,1124728,1124732,1124735,1124969,1124974,1124975,1124976,1124978,1124979,1124980,1124981,1124982,1124984,1124985,1125109,1125125,1125252,1125315,1125614,1125728,1125780,1125797,1125799,1125800,1125907,1125947,1126131,1126209,1126389,1126393,1126476,1126480,1126481,1126488,1126495,1126555,1126579,1126789,1126790,1126802,1126803,1126804,1126805,1126806,1126807,1127042,1127062,1127082,1127154,1127285,1127286,1127307,1127363,1127493,1127494,1127495,1127496,1127497,1127498,1127534,1127561,1127567,1127595,1127603,1127682,1127731,1127750,1127836,1127961,1128094,1128166,1128351,1128451,1128895,1129046,1129080,1129163,1129179,1129181,1129182,1129183,1129184,1129205,1129281,1129284,1129285,1129291,1129292,1129293,1129294,1129295,1129296,1129326,1129327,1129330,1129363,1129366,1129497,1129519,1129543,1129547,1129551,1129581,1129625,1129664,1129739,1129923,807502,824948,828192,925178
CVE References: CVE-2017-5753,CVE-2018-20669,CVE-2019-2024,CVE-2019-3459,CVE-2019-3460,CVE-2019-3819,CVE-2019-6974,CVE-2019-7221,CVE-2019-7222,CVE-2019-7308,CVE-2019-8912,CVE-2019-8980,CVE-2019-9213
Sources used:
SUSE Linux Enterprise Workstation Extension 12-SP4 (src):    kernel-default-4.12.14-95.13.1
SUSE Linux Enterprise Software Development Kit 12-SP4 (src):    kernel-docs-4.12.14-95.13.1, kernel-obs-build-4.12.14-95.13.1
SUSE Linux Enterprise Server 12-SP4 (src):    kernel-default-4.12.14-95.13.1, kernel-source-4.12.14-95.13.1, kernel-syms-4.12.14-95.13.1
SUSE Linux Enterprise Live Patching 12-SP4 (src):    kgraft-patch-SLE12-SP4_Update_3-1-6.7.1
SUSE Linux Enterprise High Availability 12-SP4 (src):    kernel-default-4.12.14-95.13.1
SUSE Linux Enterprise Desktop 12-SP4 (src):    kernel-default-4.12.14-95.13.1, kernel-source-4.12.14-95.13.1, kernel-syms-4.12.14-95.13.1

*** NOTE: This information is not intended to be used for external
    communication, because this may only be a partial fix.
    If you have questions please reach out to maintenance coordination.