On Tue, Oct 22, 2013 at 22:05, William Orr wrote:
I guess I misunderstood, as I thought that /dev/random dumped the entropy
pool, and that /dev/arandom put the random data through a stream cipher so
that grabbing random data would never block.
That was true some time ago, but since at least
Hi William,
I have an almost identical diff in my tree for a driver for octeon's
RNG. On which machines did you test this?
I wrote mine for DSR-500. But I remember the reads had some hick-ups.
Since why I did not commit the diff until now.
From: Mike Belopuhov m...@belopuhov.com
Date: Tue, 22 Oct 2013 15:48:22 +0200
On 22 October 2013 15:22, Mark Kettenis mark.kette...@xs4all.nl wrote:
Diff below makes bioctl(4) print the cache policy for that's currently
in effect for RAID volumes. It only prints the state (WB for
On Oct 23, 2013, at 4:38 AM, Paul Irofti p...@irofti.net wrote:
Hi William,
I have an almost identical diff in my tree for a driver for octeon's RNG. On
which machines did you test this?
I wrote mine for DSR-500. But I remember the reads had some hick-ups. Since
why I did not commit
On Oct 22, 2013, at 11:54 PM, Ted Unangst t...@tedunangst.com wrote:
On Tue, Oct 22, 2013 at 22:05, William Orr wrote:
I guess I misunderstood, as I thought that /dev/random dumped the entropy
pool, and that /dev/arandom put the random data through a stream cipher so
that grabbing random
Commenting differences I find between your patch and the one I sent
On Tue, Oct 15, 2013 at 03:32:29PM +0200, Martin Pelikan wrote:
Index: Makefile
+CFLAGS+=-D__NO_TLS
I had removed parts that used TLS, but this is better.
Index: arch/amd64/gdtoa/strtold.c
I didn't have this (neither for