Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 17 Apr 2019 11:22:29 -0700
From:      Adrian Chadd <adrian.chadd@gmail.com>
To:        Conrad Meyer <cem@freebsd.org>
Cc:        src-committers <src-committers@freebsd.org>, svn-src-all@freebsd.org,  svn-src-head@freebsd.org
Subject:   Re: svn commit: r346250 - in head: share/man/man4 share/man/man9 sys/dev/random sys/kern sys/libkern sys/sys
Message-ID:  <CAJ-Vmo=Xb495Dhs8OMgMRCOFs1Miw1=sLubpgMs6btSsT8CFsw@mail.gmail.com>
In-Reply-To: <201904151840.x3FIeaEQ009242@repo.freebsd.org>
References:  <201904151840.x3FIeaEQ009242@repo.freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help
On Mon, 15 Apr 2019 at 11:40, Conrad Meyer <cem@freebsd.org> wrote:

> Author: cem
> Date: Mon Apr 15 18:40:36 2019
> New Revision: 346250
> URL: https://svnweb.freebsd.org/changeset/base/346250
>
> Log:
>   random(4): Block read_random(9) on initial seeding
>

Sniffle, this broke on my mips boards whilst debugging why I'm seeing
transmit crashes and other bad behaviours. if_arge has some hacks to
randomly allocate mac addresses if the board doesn't supply them. This is
going to be a common thing to deal with during board bring-up before you do
things like, I dunno, make storage work. I'm going to fix if_arge to use
the new API to generate MAC addresses but there'll be other places where
this will bite you.

Please reconsider this a bit. I know people are trying to improve our
security and cryptography support. But some of us are trying to use FreeBSD
code in fun places and maybe occasionally do some more porting work. :-)


-adrian



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAJ-Vmo=Xb495Dhs8OMgMRCOFs1Miw1=sLubpgMs6btSsT8CFsw>