Date: Mon, 23 Jan 2017 23:10:51 +0100 From: Jilles Tjoelker <jilles@stack.nl> To: "Simon J. Gerraty" <sjg@juniper.net> Cc: Lu Tung-Pin <lutungpin@openmailbox.org>, freebsd-current@freebsd.org, des@freebsd.org Subject: Re: Fix /etc/rc.d/random umask handling (/entropy permissions) Message-ID: <20170123221050.GA77550@stack.nl> In-Reply-To: <43886.1485197541@kaos.jnpr.net> References: <14f5a2fdf191c33e4ed1dc882b288e81@openmailbox.org> <20170121220136.GA59654@stack.nl> <43886.1485197541@kaos.jnpr.net>
index | next in thread | previous in thread | raw e-mail
On Mon, Jan 23, 2017 at 10:52:21AM -0800, Simon J. Gerraty wrote:
> Jilles Tjoelker <jilles@stack.nl> wrote:
> > Index: etc/rc.d/random
> > ===================================================================
> > --- etc/rc.d/random (revision 311446)
> > +++ etc/rc.d/random (working copy)
> > @@ -20,12 +20,14 @@
> >
> > save_dev_random()
> > {
> > + oumask=`umask`
> why not simply use a sub-shell to tighten umask
> (umask 077; what-ever)
With our /bin/sh, the save-restore method saves a fork. A command
substitution with a single umask command does not fork, while a subshell
containing umask and something else does.
The effect is fairly minor, but good performance is often the product of
many small optimizations.
--
Jilles Tjoelker
help
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20170123221050.GA77550>
