From owner-svn-src-all@freebsd.org Tue Sep 3 14:07:48 2019 Return-Path: Delivered-To: svn-src-all@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id A207ADD20F; Tue, 3 Sep 2019 14:06:57 +0000 (UTC) (envelope-from yuripv@freebsd.org) Received: from freefall.freebsd.org (freefall.freebsd.org [96.47.72.132]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "freefall.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46N8010NYCz4Q4S; Tue, 3 Sep 2019 14:06:57 +0000 (UTC) (envelope-from yuripv@freebsd.org) Received: by freefall.freebsd.org (Postfix, from userid 1452) id 8E4431ADEF; Tue, 3 Sep 2019 14:06:22 +0000 (UTC) X-Original-To: yuripv@localmail.freebsd.org Delivered-To: yuripv@localmail.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (Client CN "mx1.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by freefall.freebsd.org (Postfix) with ESMTPS id 886DE1C59B; Tue, 16 Apr 2019 14:24:11 +0000 (UTC) (envelope-from owner-src-committers@freebsd.org) Received: from freefall.freebsd.org (freefall.freebsd.org [96.47.72.132]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "freefall.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 37E398E19A; Tue, 16 Apr 2019 14:24:11 +0000 (UTC) (envelope-from owner-src-committers@freebsd.org) Received: by freefall.freebsd.org (Postfix, from userid 538) id 206991C599; Tue, 16 Apr 2019 14:24:11 +0000 (UTC) Delivered-To: src-committers@localmail.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [96.47.72.80]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (Client CN "mx1.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by freefall.freebsd.org (Postfix) with ESMTPS id D3C751C592; Tue, 16 Apr 2019 14:24:07 +0000 (UTC) (envelope-from chmeeedalf@gmail.com) Received: from mail-it1-x133.google.com (mail-it1-x133.google.com [IPv6:2607:f8b0:4864:20::133]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 9028F8E190; Tue, 16 Apr 2019 14:24:07 +0000 (UTC) (envelope-from chmeeedalf@gmail.com) Received: by mail-it1-x133.google.com with SMTP id 139so32769387ita.4; Tue, 16 Apr 2019 07:24:07 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=date:from:to:cc:subject:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=UIGAeRLdsge4kEwVaDCVfmNGLXdC0M0ryWRahl6VSIw=; b=kIkYUFxrSZNdLhQududHgRN369JhELrXCYqwC+M5Fe2A9hHcYs4vz3ME08meRQgsuM GkPv1IOQMYOIhF+3RLrPQZBANDy/ve+Cbu+WF7ZCQpV1UXR3WUIJZA0Gx7HXEs9mqOlf YYjm0BtoyJp6aeRRtR/dTFq8MWnv3Lsbq17BcOjsuJKqp4ozJhoIHhl1HGXUFviV8n5r +P1VqZ9A6El2DOojtK5UeE+OOx5aCRNq6AvO4THEGU73SnSa8zEGDOqEB8/oRHuVBTvS HeoVe+x8DJYdxFx38s1NAB9z1PSd0/4VUku+SWAGD3kcPsnEciICyZ21BXlgz/fsYXg7 cHZQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=UIGAeRLdsge4kEwVaDCVfmNGLXdC0M0ryWRahl6VSIw=; b=NGmaAp/b5PLIipyw/DS17hvxTboAp0k8S8M+ONtOA4iXdAHFtGLeTYqcuOtSpxdcKD cggmmMzZhCtrigw7ds1bg8u9G2Njy3njEu846q+PpMRFM6mEpfZc1qACk7qxLLl4Ucbw GmmDpUUSipVLWZisVKsdoV8y/kgfy84YKTvkWt0ltAmP95voFlVxP2WjZFi7AkJ5UmSv aINoQfG8HsVAm4Kv4DHpC8uyqoWQjTlAeI9BCFJQnQTOGcqjcqBbwf2v3uEvZDii75O6 LFO3lahR3nP3iPvbuZC186BzUUTRKWgRwz8d7PZlEsjrTLEPGKyfWxygWbmF/klM71q4 6yhw== X-Gm-Message-State: APjAAAXQxgCPVkq4oB79EG7veG/hBCWZ5WPyPwsGOdsD4ELLHFObaJvX CUKwvvbbbQa1vcowhsAA+XtePfVJ/kQ= X-Google-Smtp-Source: APXvYqxLYPz4lWLE/s0+Zb4jfKx7lknfY8n6Tg25/HphNFVRrynX9r/haMBaP128Oo5qKyQhC/XxxQ== X-Received: by 2002:a02:a892:: with SMTP id l18mr15190694jam.28.1555424646371; Tue, 16 Apr 2019 07:24:06 -0700 (PDT) Received: from titan.knownspace (173-25-245-129.client.mchsi.com. [173.25.245.129]) by smtp.gmail.com with ESMTPSA id k11sm9388650itk.25.2019.04.16.07.24.05 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Tue, 16 Apr 2019 07:24:06 -0700 (PDT) From: Justin Hibbits To: Conrad Meyer Cc: src-committers , svn-src-all , svn-src-head Subject: Re: svn commit: r346250 - in head: share/man/man4 share/man/man9 sys/dev/random sys/kern sys/libkern sys/sys Message-ID: <20190416092402.4288bc90@titan.knownspace> In-Reply-To: References: <201904151840.x3FIeaEQ009242@repo.freebsd.org> X-Mailer: Claws Mail 3.17.3 (GTK+ 2.24.32; powerpc64-portbld-freebsd13.0) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Precedence: bulk X-Loop: FreeBSD.org Sender: owner-src-committers@freebsd.org X-Rspamd-Queue-Id: 37E398E19A X-Spamd-Bar: ------ Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-6.98 / 15.00]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; NEURAL_HAM_SHORT(-0.98)[-0.977,0]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; REPLY(-4.00)[] Status: O X-BeenThere: svn-src-all@freebsd.org X-Mailman-Version: 2.1.29 List-Id: "SVN commit messages for the entire src tree \(except for " user" and " projects" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Date: Tue, 03 Sep 2019 14:07:48 -0000 X-Original-Date: Tue, 16 Apr 2019 09:24:02 -0500 X-List-Received-Date: Tue, 03 Sep 2019 14:07:48 -0000 Hi Conrad, On Mon, 15 Apr 2019 17:53:17 -0700 Conrad Meyer wrote: > Hi Justin, > > On Mon, Apr 15, 2019 at 5:01 PM Justin Hibbits > wrote: > > Given the discussion over there it would probably also fail on > > powernv, which also does not use loader. > > Does power use bsdinstall (which populates /boot/entropy at install > time via usr.sbin/bsdinstall/scripts/entropy) and install the > libexec/rc/rc.d/random rc script (which re-emits new /boot/entropy on > every startup)? If so, it should be ok. > > The problem is new installs that don't use bsdinstall or otherwise > provide initial /boot/entropy. E.g., the CI infrastructure for > Riscv/Arm is/was generating minimal filesystem images and not > populating /boot/entropy. > > Best, > Conrad It does use bsdinstall to install. How is entropy loaded at startup, which causes the problem noted in github? If it's loaded before filesystems get mounted, that could be a problem for us, because /boot is on a different filesystem (msdosfs, to be read by petitboot). Petitboot also does not have a way to preload modules, so all we have at startup, until spawning init, is the kernel. - Justin