A patch to
Allow net devices to contribute to the kernel entropy pool
	aka netdev-random

Newest version should always be available at
	/pub/linux/kernel/people/rml/netdev-random
on your favorite kernel.org mirror. Also,
	http://tech9.net/rml/linux
has information and links.

This patch lets the user configure whether interrupt timings from network
devices contribute to the kernel entropy pool (/dev/random).  Currently,
block devices and some other drivers feed the pool, although very few
network devices do.  This patch makes a user configurable policy out of
the issue: either allow or disallow them all.

Some users are on a headless or diskless system that generates very little
entropy -- this patch provides a needed source.

Other users fear that entropy from an open network is a security problem --
this patch will then make sure no network devices contribute to the pool.
Note that without the patch, some network devices do.

New versions of this patchset come in two pieces:
netdev-random-core-rml-x.y.z-w.patch, which is the core support, revision w,
for kernel x.y.z, and netdev-random-drivers-rml-x.y.z-w.patch which is the
modified drivers.

Old versions were available in the form netdev-random-rml-x.y.z-w.patch, where
w was confusingly 1 for the core patch and 2 for the driver patch.

Use:
Patch the proper kernel with both patches.  Enable CONFIG_NET_RANDOM in
`Network Devices' to allow network devices to feed the pool.  Disable said
option to disallow contribution.  Compile.

Driver writers:
Set the flag SA_NET_RANDOM in request_irq() in your network device.
SA_NET_RANDOM defines to zero or SA_SAMPLE_RANDOM based on the value of
CONFIG_NET_RANDOM.

Help:
Patches against new drivers are always welcome.

	Enjoy,
	Robert Love
	rml@tech9.net