Date: Wed, 17 Apr 2019 11:22:29 -0700 From: Adrian Chadd <adrian.chadd@gmail.com> To: Conrad Meyer <cem@freebsd.org> Cc: src-committers <src-committers@freebsd.org>, svn-src-all@freebsd.org, svn-src-head@freebsd.org Subject: Re: svn commit: r346250 - in head: share/man/man4 share/man/man9 sys/dev/random sys/kern sys/libkern sys/sys Message-ID: <CAJ-Vmo=Xb495Dhs8OMgMRCOFs1Miw1=sLubpgMs6btSsT8CFsw@mail.gmail.com> In-Reply-To: <201904151840.x3FIeaEQ009242@repo.freebsd.org> References: <201904151840.x3FIeaEQ009242@repo.freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On Mon, 15 Apr 2019 at 11:40, Conrad Meyer <cem@freebsd.org> wrote: > Author: cem > Date: Mon Apr 15 18:40:36 2019 > New Revision: 346250 > URL: https://svnweb.freebsd.org/changeset/base/346250 > > Log: > random(4): Block read_random(9) on initial seeding > Sniffle, this broke on my mips boards whilst debugging why I'm seeing transmit crashes and other bad behaviours. if_arge has some hacks to randomly allocate mac addresses if the board doesn't supply them. This is going to be a common thing to deal with during board bring-up before you do things like, I dunno, make storage work. I'm going to fix if_arge to use the new API to generate MAC addresses but there'll be other places where this will bite you. Please reconsider this a bit. I know people are trying to improve our security and cryptography support. But some of us are trying to use FreeBSD code in fun places and maybe occasionally do some more porting work. :-) -adrian
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAJ-Vmo=Xb495Dhs8OMgMRCOFs1Miw1=sLubpgMs6btSsT8CFsw>