Hi Petter, On 2026-03-25 06:21, Petter Reinholdtsen wrote: > Note, Debian Edu used the following hack for some years when running low > on entropy during installation. It was removed when switching to using > the haveged udeb as it became available:
> Perhaps it can provide some ideas on how to get around lack of entropy > in the kernel. Note, this process was running as root. While indeed a useful workaround, I think it can be avoided entirely here. The random data is only used to seed a PRNG during a test. I consider this unusual; for reproducibility purposes, a fixed seed should be used, which is what my attempted fix does. If upstream insists on a random seed, it would need to come from a source that cannot block. And this all assumes that the random data is the source of the block, which might not be the case. I don't know enough about LXC containers (what ci.debian.net uses) but I'd be surprised if they'd obstruct libstdc++ functionality like that. Best, Christian

