Bugzilla – Bug 925178
Internal error in module YaST2 network on RPi 2B system (armv7l)
Last modified: 2019-03-27 09:37:05 UTC
When configuring the network using YaST2 ncurses on a Rasberry Pi 2 with openSUSE Tumbleweed, I got the following error: Error Internal error. Please report a bug report with logs. Details: undefined method `[]' for nil:NilClass Caller: /usr/share/YaST2/modules/NetworkInterfaces.rb:831:in `block in Write Logs will be attached.
Created attachment 629420 [details] The requested y2logs.tgz Made using "save_y2logs ./y2logs.tgz" immediately after ending "yast network" on the console.
Thanks for the report. It would be helpful if you could write what was the action which caused "internal error". What did you try to configure?
First I tried to configure the whole network configuration. Finally I only did the IPv4 configuration, which succeeded. After that I tried to add a fixed IPv6 address and the default route of IPv6. At that moment I got the same error. So it has to do with configuring a fixed IPv6 and IPv6 gateway address. Previously this worked OK and I saved the files in /etc/sysconfig/network/ Comparing these files I added two lines to ifcfg-eth0 and one line to ifroute-eth0 specifying the above mentioned addresses. After "systemctl restart network.service" the network came up with the required fixed addresses, both IPv4 and IPv6.
This problem seems to have replaced by another problem in YaST network. Now I get the following error: Internal error. Please report a bug report with logs. Details: undefined method `ReadHardware' for #<Yast::LanItemsClass:0x243e400> Caller: /usr/share/YaST2/modules/LanItems.rb:988:in `ReadHw' Looks a bit like the other errors with libstorage-ruby, but the error message is different. Does the following help? rpi2test:~ # irb irb(main):001:0> load /usr/share/YaST2/modules/LanItems.rb SyntaxError: (irb):1: unknown regexp options - har from /usr/bin/irb:11:in `<main>' irb(main):002:0> load /usr/share/YaST2/modules/LanItems.rb SyntaxError: (irb):2: unknown regexp options - har from /usr/bin/irb:11:in `<main>' irb(main):003:0> quit rpi2test:~ #
Thanks for reporting this, nice analysis. I will check it
Ah, wrong, you do not load it as string, but as regexp, please try require "yast" load "/usr/share/YaST2/modules/LanItems.rb" Thanks
Below is the result: rpi2test:~ # irb irb(main):001:0> require "yast" => true irb(main):002:0> load "/usr/share/YaST2/modules/LanItems.rb" /usr/share/YaST2/modules/LanItems.rb:222: warning: duplicated key at line 230 ignored: "rt73usb" /usr/share/YaST2/modules/LanItems.rb:262: warning: duplicated key at line 273 ignored: "WIRELESS_CLIENT_CERT" /usr/share/YaST2/modules/LanItems.rb:263: warning: duplicated key at line 276 ignored: "WIRELESS_CA_CERT" NameError: component cannot import namespace 'Storage' from /usr/lib/ruby/vendor_ruby/2.2.0/yast/yast.rb:162:in `import_pure' from /usr/lib/ruby/vendor_ruby/2.2.0/yast/yast.rb:162:in `import' from /usr/share/YaST2/modules/LanItems.rb:55:in `main' from /usr/share/YaST2/modules/LanItems.rb:2669:in `<module:Yast>' from /usr/share/YaST2/modules/LanItems.rb:26:in `<top (required)>' from (irb):2:in `load' from (irb):2 from /usr/bin/irb:11:in `<main>' irb(main):003:0> quit rpi2test:~ # Same problem with Storage.
Yep, it is related, I so I close it as dup. Better error reporting is also already reported. *** This bug has been marked as a duplicate of bug 933274 ***
SUSE-SU-2019:0765-1: An update that solves 13 vulnerabilities and has 215 fixes is now available. Category: security (important) Bug References: 1046305,1046306,1050252,1050549,1051510,1054610,1055121,1056658,1056662,1056787,1060463,1063638,1065600,1068032,1070995,1071995,1074562,1074578,1074701,1075006,1075419,1075748,1078355,1080039,1082943,1083548,1083647,1084216,1086095,1086282,1086301,1086313,1086314,1086323,1087082,1087084,1087092,1087939,1088133,1094555,1098382,1098425,1098995,1102055,1103429,1104353,1106105,1106434,1106811,1107078,1107665,1108101,1108870,1109695,1110096,1110705,1111666,1113042,1113712,1113722,1113769,1113939,1114279,1114585,1114893,1117108,1117155,1117645,1117947,1118338,1119019,1119086,1119766,1119843,1120008,1120318,1120601,1120758,1120854,1120902,1120909,1120955,1121317,1121726,1121789,1121805,1122019,1122159,1122192,1122292,1122324,1122554,1122662,1122764,1122779,1122822,1122885,1122927,1122944,1122971,1122982,1123060,1123061,1123161,1123317,1123348,1123357,1123456,1123538,1123697,1123882,1123933,1124055,1124204,1124235,1124579,1124589,1124728,1124732,1124735,1124969,1124974,1124975,1124976,1124978,1124979,1124980,1124981,1124982,1124984,1124985,1125109,1125125,1125252,1125315,1125614,1125728,1125780,1125797,1125799,1125800,1125907,1125947,1126131,1126209,1126389,1126393,1126476,1126480,1126481,1126488,1126495,1126555,1126579,1126789,1126790,1126802,1126803,1126804,1126805,1126806,1126807,1127042,1127062,1127082,1127154,1127285,1127286,1127307,1127363,1127493,1127494,1127495,1127496,1127497,1127498,1127534,1127561,1127567,1127595,1127603,1127682,1127731,1127750,1127836,1127961,1128094,1128166,1128351,1128451,1128895,1129046,1129080,1129163,1129179,1129181,1129182,1129183,1129184,1129205,1129281,1129284,1129285,1129291,1129292,1129293,1129294,1129295,1129296,1129326,1129327,1129330,1129363,1129366,1129497,1129519,1129543,1129547,1129551,1129581,1129625,1129664,1129739,1129923,807502,824948,828192,925178 CVE References: CVE-2017-5753,CVE-2018-20669,CVE-2019-2024,CVE-2019-3459,CVE-2019-3460,CVE-2019-3819,CVE-2019-6974,CVE-2019-7221,CVE-2019-7222,CVE-2019-7308,CVE-2019-8912,CVE-2019-8980,CVE-2019-9213 Sources used: SUSE Linux Enterprise Workstation Extension 12-SP4 (src): kernel-default-4.12.14-95.13.1 SUSE Linux Enterprise Software Development Kit 12-SP4 (src): kernel-docs-4.12.14-95.13.1, kernel-obs-build-4.12.14-95.13.1 SUSE Linux Enterprise Server 12-SP4 (src): kernel-default-4.12.14-95.13.1, kernel-source-4.12.14-95.13.1, kernel-syms-4.12.14-95.13.1 SUSE Linux Enterprise High Availability 12-SP4 (src): kernel-default-4.12.14-95.13.1 SUSE Linux Enterprise Desktop 12-SP4 (src): kernel-default-4.12.14-95.13.1, kernel-source-4.12.14-95.13.1, kernel-syms-4.12.14-95.13.1 *** NOTE: This information is not intended to be used for external communication, because this may only be a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2019:0765-1: An update that solves 13 vulnerabilities and has 215 fixes is now available. Category: security (important) Bug References: 1046305,1046306,1050252,1050549,1051510,1054610,1055121,1056658,1056662,1056787,1060463,1063638,1065600,1068032,1070995,1071995,1074562,1074578,1074701,1075006,1075419,1075748,1078355,1080039,1082943,1083548,1083647,1084216,1086095,1086282,1086301,1086313,1086314,1086323,1087082,1087084,1087092,1087939,1088133,1094555,1098382,1098425,1098995,1102055,1103429,1104353,1106105,1106434,1106811,1107078,1107665,1108101,1108870,1109695,1110096,1110705,1111666,1113042,1113712,1113722,1113769,1113939,1114279,1114585,1114893,1117108,1117155,1117645,1117947,1118338,1119019,1119086,1119766,1119843,1120008,1120318,1120601,1120758,1120854,1120902,1120909,1120955,1121317,1121726,1121789,1121805,1122019,1122159,1122192,1122292,1122324,1122554,1122662,1122764,1122779,1122822,1122885,1122927,1122944,1122971,1122982,1123060,1123061,1123161,1123317,1123348,1123357,1123456,1123538,1123697,1123882,1123933,1124055,1124204,1124235,1124579,1124589,1124728,1124732,1124735,1124969,1124974,1124975,1124976,1124978,1124979,1124980,1124981,1124982,1124984,1124985,1125109,1125125,1125252,1125315,1125614,1125728,1125780,1125797,1125799,1125800,1125907,1125947,1126131,1126209,1126389,1126393,1126476,1126480,1126481,1126488,1126495,1126555,1126579,1126789,1126790,1126802,1126803,1126804,1126805,1126806,1126807,1127042,1127062,1127082,1127154,1127285,1127286,1127307,1127363,1127493,1127494,1127495,1127496,1127497,1127498,1127534,1127561,1127567,1127595,1127603,1127682,1127731,1127750,1127836,1127961,1128094,1128166,1128351,1128451,1128895,1129046,1129080,1129163,1129179,1129181,1129182,1129183,1129184,1129205,1129281,1129284,1129285,1129291,1129292,1129293,1129294,1129295,1129296,1129326,1129327,1129330,1129363,1129366,1129497,1129519,1129543,1129547,1129551,1129581,1129625,1129664,1129739,1129923,807502,824948,828192,925178 CVE References: CVE-2017-5753,CVE-2018-20669,CVE-2019-2024,CVE-2019-3459,CVE-2019-3460,CVE-2019-3819,CVE-2019-6974,CVE-2019-7221,CVE-2019-7222,CVE-2019-7308,CVE-2019-8912,CVE-2019-8980,CVE-2019-9213 Sources used: SUSE Linux Enterprise Workstation Extension 12-SP4 (src): kernel-default-4.12.14-95.13.1 SUSE Linux Enterprise Software Development Kit 12-SP4 (src): kernel-docs-4.12.14-95.13.1, kernel-obs-build-4.12.14-95.13.1 SUSE Linux Enterprise Server 12-SP4 (src): kernel-default-4.12.14-95.13.1, kernel-source-4.12.14-95.13.1, kernel-syms-4.12.14-95.13.1 SUSE Linux Enterprise Live Patching 12-SP4 (src): kgraft-patch-SLE12-SP4_Update_3-1-6.7.1 SUSE Linux Enterprise High Availability 12-SP4 (src): kernel-default-4.12.14-95.13.1 SUSE Linux Enterprise Desktop 12-SP4 (src): kernel-default-4.12.14-95.13.1, kernel-source-4.12.14-95.13.1, kernel-syms-4.12.14-95.13.1 *** NOTE: This information is not intended to be used for external communication, because this may only be a partial fix. If you have questions please reach out to maintenance coordination.