From owner-svn-src-all@freebsd.org Tue Sep 3 14:07:47 2019 Return-Path: Delivered-To: svn-src-all@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 3E9C0DD1EF; Tue, 3 Sep 2019 14:06:57 +0000 (UTC) (envelope-from yuripv@freebsd.org) Received: from freefall.freebsd.org (freefall.freebsd.org [96.47.72.132]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "freefall.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46N8006s7xz4Q4N; Tue, 3 Sep 2019 14:06:56 +0000 (UTC) (envelope-from yuripv@freebsd.org) Received: by freefall.freebsd.org (Postfix, from userid 1452) id 6E6231ADE3; Tue, 3 Sep 2019 14:06:22 +0000 (UTC) X-Original-To: yuripv@localmail.freebsd.org Delivered-To: yuripv@localmail.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [96.47.72.80]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (Client CN "mx1.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by freefall.freebsd.org (Postfix) with ESMTPS id 8EC2A1B545; Tue, 16 Apr 2019 13:19:02 +0000 (UTC) (envelope-from owner-src-committers@freebsd.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2610:1c1:1:6074::16:84]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "freefall.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 341C68BAE9; Tue, 16 Apr 2019 13:19:02 +0000 (UTC) (envelope-from owner-src-committers@freebsd.org) Received: by freefall.freebsd.org (Postfix, from userid 538) id 198DA1B544; Tue, 16 Apr 2019 13:19:02 +0000 (UTC) Delivered-To: src-committers@localmail.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [96.47.72.80]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (Client CN "mx1.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by freefall.freebsd.org (Postfix) with ESMTPS id 7CE591B53E for ; Tue, 16 Apr 2019 13:18:59 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: from mail-qt1-x82b.google.com (mail-qt1-x82b.google.com [IPv6:2607:f8b0:4864:20::82b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 484E68BADC for ; Tue, 16 Apr 2019 13:18:59 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: by mail-qt1-x82b.google.com with SMTP id w30so23156673qta.8 for ; Tue, 16 Apr 2019 06:18:59 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bsdimp-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=YYTVFVHGP1B8pLhMF/hQocYKm5q5B5l1WgRuLhJMQ8g=; b=N7MzRjF0KKpYM+9V2jx7TFaFza4vPwKi7f5vpV8MGuUBZ1z1xaHCFwiUPkC0Ssx1gy vyS5BNOWpaBXKl+/+o4+dNoc5BFQDargvhOHMlhR6HcWUw8eaPrwcjcgvVDfekFT5hs3 bq8v8aTKxhKWPgDOf7DrQWrgmqO+6z92NwoZbrhpJrLYBQfe7Cp9nR8/M2BW2KyWOoBZ +FMbnnBE6OLHeH2S4poBpqgw7hNv5oNfM8DP9VpswmRugnA5DTPWBVMrwTtPJ2RzU2oZ UwN2F55rB5Tql5HhpTPkkxwj9IRVbRngZsR3dSvt86rmCvmg3rZ5LiLRQTeP64FBzOJi OuPA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=YYTVFVHGP1B8pLhMF/hQocYKm5q5B5l1WgRuLhJMQ8g=; b=Bl6smMApYx8w82gsK4Fd5wLqLdBd/UZeojZxzSNwveoIsoPV8nr5UCdWgAhZ8jpXsl OgdBrZwzLE8vU+5emLWN6JH9+JJdnwtYuYUKlN/+7TNyu4tBpjOhWHwndF8pnCfoN+mX ywOFUpFntdIj3IyOrgMJiMNhEEMaAgGnWO1/rVRuqIsTB0do4Qm0so81q1fyi++T6NFW nDylgh/D+e3/ZpZpJFU2w/RPWMJlps7OkCp89isAf73eP6yUJqPis2dsbQd57dTApzva pAvkhtbRvEBSLDMINdkGoDhbsTFCoW9BL0NDCOALY/+xlqFB9GCJCRSpEn3DWIdesUNS mUWQ== X-Gm-Message-State: APjAAAUVXW6a5tmUWJoFzxlHhIY7IdaUDoaqFx3eiG8L3u0izbaO5tBi iehpgXAzKfexISwPoD0/gFtsbHsvOEwzs8sMUCN0/A== X-Google-Smtp-Source: APXvYqy2R6ruSXPPye4t9gDmY4d8Ecn4uTjx9G7WW1JpKb/BPkxt7+j8Qb55gUdmoE/7UwMZPlzOcSJmbGOr/ZgDStw= X-Received: by 2002:ac8:5493:: with SMTP id h19mr50937101qtq.23.1555420738542; Tue, 16 Apr 2019 06:18:58 -0700 (PDT) MIME-Version: 1.0 References: <201904151840.x3FIeaEQ009242@repo.freebsd.org> <20190416150352.c604a280368ccb2992a861e8@bidouilliste.com> In-Reply-To: <20190416150352.c604a280368ccb2992a861e8@bidouilliste.com> From: Warner Losh Message-ID: Subject: Re: svn commit: r346250 - in head: share/man/man4 share/man/man9 sys/dev/random sys/kern sys/libkern sys/sys To: Emmanuel Vadot Cc: "Conrad E. Meyer" , Justin Hibbits , src-committers , svn-src-all , svn-src-head Precedence: bulk X-Loop: FreeBSD.org Sender: owner-src-committers@freebsd.org X-Rspamd-Queue-Id: 341C68BAE9 X-Spamd-Bar: ------ Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-6.96 / 15.00]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; REPLY(-4.00)[]; NEURAL_HAM_SHORT(-0.96)[-0.964,0] Status: O Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: svn-src-all@freebsd.org X-Mailman-Version: 2.1.29 List-Id: "SVN commit messages for the entire src tree \(except for " user" and " projects" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Date: Tue, 03 Sep 2019 14:07:48 -0000 X-Original-Date: Tue, 16 Apr 2019 07:18:46 -0600 X-List-Received-Date: Tue, 03 Sep 2019 14:07:48 -0000 On Tue, Apr 16, 2019, 7:04 AM Emmanuel Vadot wrote: > On Mon, 15 Apr 2019 17:54:56 -0700 > Conrad Meyer wrote: > > > On Mon, Apr 15, 2019 at 5:53 PM Conrad Meyer wrote: > > > E.g., the CI infrastructure for > > > Riscv/Arm is/was generating minimal filesystem images and not > > > populating /boot/entropy. > > > > I should add, I say "is/was" because I have a PR out which may address > > the problem: https://github.com/freebsd/freebsd-ci/pull/31 > > > > Best, > > Conrad > > It's not only CI, all release images (memstick, iso) don't have > a /boot/entropy. > Also all arm/arm64 image don't have this file too. > If /boot/entropy is needed and isn't present loader(8) should gather > some entropy and pass this to the kernel for the first boot. > Maybe we need to bootstrap the entropy file as part of buildworld. I'm not sure if the loader can find enough... Warner -- > Emmanuel Vadot > >