Hi Petter,

On 2026-03-25 06:21, Petter Reinholdtsen wrote:
> Note, Debian Edu used the following hack for some years when running low
> on entropy during installation.  It was removed when switching to using
> the haveged udeb as it became available:

> Perhaps it can provide some ideas on how to get around lack of entropy
> in the kernel.  Note, this process was running as root.

While indeed a useful workaround, I think it can be avoided entirely here.

The random data is only used to seed a PRNG during a test. I consider
this unusual; for reproducibility purposes, a fixed seed should be used,
which is what my attempted fix does.

If upstream insists on a random seed, it would need to come from a
source that cannot block.

And this all assumes that the random data is the source of the block,
which might not be the case. I don't know enough about LXC containers
(what ci.debian.net uses) but I'd be surprised if they'd obstruct
libstdc++ functionality like that.

Best,
Christian

Reply via email to