On Tue, 22 Sep 2020, Taylor R Campbell wrote:
Date: Tue, 22 Sep 2020 13:07:04 +0300
From: Andreas Gustafsson
The following patch will cause a kernel message to be logged when a
process blocks on /dev/random or some other randomness API. It may
help some users befuddled by pkgsrc builds blocki
> Date: Tue, 22 Sep 2020 13:07:04 +0300
> From: Andreas Gustafsson
>
> The following patch will cause a kernel message to be logged when a
> process blocks on /dev/random or some other randomness API. It may
> help some users befuddled by pkgsrc builds blocking on /dev/random,
> and I'm finding
David Brownlee writes:
> What would people think of installing an original copy of the etc set
> in /usr/share/examples/etc or similar - its 4.9M extracted and ~500K
> compressed and the ability to compare what is on the system to what it
> was shipped with would have saved me so much effort ove
On Tue, 22 Sep 2020 at 18:02, Jonathan A. Kollasch
wrote:
>
> On Tue, Sep 22, 2020 at 05:53:49PM +0100, David Brownlee wrote:
> > Should NetBSD be shipping a default boot.cfg in /usr/share/examples
> > (*) - thinking primarily of people who have upgraded from earlier
> > NetBSD versions.
> >
> > I
On Tue, Sep 22, 2020 at 05:53:49PM +0100, David Brownlee wrote:
> Should NetBSD be shipping a default boot.cfg in /usr/share/examples
> (*) - thinking primarily of people who have upgraded from earlier
> NetBSD versions.
>
> I was looking to add in rndseed & just generally sync with the latest
> v
Should NetBSD be shipping a default boot.cfg in /usr/share/examples
(*) - thinking primarily of people who have upgraded from earlier
NetBSD versions.
I was looking to add in rndseed & just generally sync with the latest
version but there doesn't seem to be a default example shipped with
the syste
Andreas Gustafsson writes:
> The following patch will cause a kernel message to be logged when a
> process blocks on /dev/random or some other randomness API. It may
> help some users befuddled by pkgsrc builds blocking on /dev/random,
> and I'm finding it useful when testing changes aimed at f
On Tue, 22 Sep 2020 at 12:35, Manuel Bouyer wrote:
>
> On Tue, Sep 22, 2020 at 02:31:50PM +0300, Andreas Gustafsson wrote:
> > Manuel Bouyer wrote:
> > > I'm not sure we want a user-triggerable kernel printf enabled by default.
> > > This could be used to DOS the system (especially on serial conso
On Tue, Sep 22, 2020 at 03:23:59PM +0300, Andreas Gustafsson wrote:
> Manuel Bouyer wrote:
> > > In -current, entropy does not run out.
> >
> > So, how can it block ?
>
> When there's too little entropy to begin with. Once you have
> gathered enough, it unblocks, and never blocks again.
>
> Thi
On Tue, Sep 22, 2020 at 02:12:19PM +0200, Manuel Bouyer wrote:
> So, how can it block ?
When the system never had enough entropy.
I would consider this a bug in the setup of the system, but as of now we do
not deal with it at all during installation, and on systems that are not
installed (bootabl
Manuel Bouyer wrote:
> > In -current, entropy does not run out.
>
> So, how can it block ?
When there's too little entropy to begin with. Once you have
gathered enough, it unblocks, and never blocks again.
This is assuming default settings. If you actually want entropy
to run out, you can do "
On Tue, Sep 22, 2020 at 03:05:34PM +0300, Andreas Gustafsson wrote:
> Manuel Bouyer wrote:
> > If you run a dd on /dev/random I guess the system will run out of
> > entropy pretty fast.
>
> In -current, entropy does not run out.
So, how can it block ?
--
Manuel Bouyer
NetBSD: 26 ans d'exp
Manuel Bouyer wrote:
> If you run a dd on /dev/random I guess the system will run out of
> entropy pretty fast.
In -current, entropy does not run out.
--
Andreas Gustafsson, g...@gson.org
On Tue, Sep 22, 2020 at 02:50:37PM +0300, Andreas Gustafsson wrote:
> Manuel Bouyer wrote:
> > I think we should find and remove theses (or make them conditional)
> > instead of adding unconditional new ones
>
> It would already be conditional in the sense that it's only printed if
> the system ha
Manuel Bouyer wrote:
> I think we should find and remove theses (or make them conditional)
> instead of adding unconditional new ones
It would already be conditional in the sense that it's only printed if
the system has no entropy. If a multi-user system is lacking entropy,
a user spamming the co
On Tue, Sep 22, 2020 at 02:31:50PM +0300, Andreas Gustafsson wrote:
> Manuel Bouyer wrote:
> > I'm not sure we want a user-triggerable kernel printf enabled by default.
> > This could be used to DOS the system (especially on serial consoles)
>
> You can already trigger kernel printfs as an unprivi
Manuel Bouyer wrote:
> I'm not sure we want a user-triggerable kernel printf enabled by default.
> This could be used to DOS the system (especially on serial consoles)
You can already trigger kernel printfs as an unprivileged user.
The first one that comes to mind is "sorry, pid %d was killed:
orp
On Tue, Sep 22, 2020 at 01:07:04PM +0300, Andreas Gustafsson wrote:
> All,
>
> The following patch will cause a kernel message to be logged when a
> process blocks on /dev/random or some other randomness API. It may
> help some users befuddled by pkgsrc builds blocking on /dev/random,
> and I'm f
All,
The following patch will cause a kernel message to be logged when a
process blocks on /dev/random or some other randomness API. It may
help some users befuddled by pkgsrc builds blocking on /dev/random,
and I'm finding it useful when testing changes aimed at fixing PR
55659.
OK to commit?
19 matches
Mail list logo