summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
Diffstat (limited to '2.6.32/1044_linux-2.6.32.45.patch')
-rw-r--r--2.6.32/1044_linux-2.6.32.45.patch1051
1 files changed, 0 insertions, 1051 deletions
diff --git a/2.6.32/1044_linux-2.6.32.45.patch b/2.6.32/1044_linux-2.6.32.45.patch
deleted file mode 100644
index bc45921..0000000
--- a/2.6.32/1044_linux-2.6.32.45.patch
+++ /dev/null
@@ -1,1051 +0,0 @@
-diff --git a/arch/powerpc/kernel/prom_init.c b/arch/powerpc/kernel/prom_init.c
-index bafac2e..2edcfed 100644
---- a/arch/powerpc/kernel/prom_init.c
-+++ b/arch/powerpc/kernel/prom_init.c
-@@ -890,7 +890,7 @@ static unsigned long __init alloc_up(unsigned long size, unsigned long align)
- }
- if (addr == 0)
- return 0;
-- RELOC(alloc_bottom) = addr;
-+ RELOC(alloc_bottom) = addr + size;
-
- prom_debug(" -> %x\n", addr);
- prom_debug(" alloc_bottom : %x\n", RELOC(alloc_bottom));
-@@ -1704,7 +1704,7 @@ static void __init *make_room(unsigned long *mem_start, unsigned long *mem_end,
- chunk = alloc_up(room, 0);
- if (chunk == 0)
- prom_panic("No memory for flatten_device_tree (claim failed)");
-- *mem_end = RELOC(alloc_top);
-+ *mem_end = chunk + room;
- }
-
- ret = (void *)*mem_start;
-@@ -1923,7 +1923,7 @@ static void __init flatten_device_tree(void)
- mem_start = (unsigned long)alloc_up(room, PAGE_SIZE);
- if (mem_start == 0)
- prom_panic("Can't allocate initial device-tree chunk\n");
-- mem_end = RELOC(alloc_top);
-+ mem_end = mem_start + room;
-
- /* Get root of tree */
- root = call_prom("peer", 1, 1, (phandle)0);
-diff --git a/arch/powerpc/platforms/pseries/lpar.c b/arch/powerpc/platforms/pseries/lpar.c
-index 5f2c511..d5db4c6 100644
---- a/arch/powerpc/platforms/pseries/lpar.c
-+++ b/arch/powerpc/platforms/pseries/lpar.c
-@@ -371,7 +371,7 @@ static void pSeries_lpar_hptab_clear(void)
- unsigned long ptel;
- } ptes[4];
- long lpar_rc;
-- int i, j;
-+ unsigned long i, j;
-
- /* Read in batches of 4,
- * invalidate only valid entries not in the VRMA
-diff --git a/crypto/md5.c b/crypto/md5.c
-index 83eb529..156b6bc 100644
---- a/crypto/md5.c
-+++ b/crypto/md5.c
-@@ -20,6 +20,7 @@
- #include <linux/module.h>
- #include <linux/string.h>
- #include <linux/types.h>
-+#include <linux/cryptohash.h>
- #include <asm/byteorder.h>
-
- #define MD5_DIGEST_SIZE 16
-@@ -27,103 +28,12 @@
- #define MD5_BLOCK_WORDS 16
- #define MD5_HASH_WORDS 4
-
--#define F1(x, y, z) (z ^ (x & (y ^ z)))
--#define F2(x, y, z) F1(z, x, y)
--#define F3(x, y, z) (x ^ y ^ z)
--#define F4(x, y, z) (y ^ (x | ~z))
--
--#define MD5STEP(f, w, x, y, z, in, s) \
-- (w += f(x, y, z) + in, w = (w<<s | w>>(32-s)) + x)
--
- struct md5_ctx {
- u32 hash[MD5_HASH_WORDS];
- u32 block[MD5_BLOCK_WORDS];
- u64 byte_count;
- };
-
--static void md5_transform(u32 *hash, u32 const *in)
--{
-- u32 a, b, c, d;
--
-- a = hash[0];
-- b = hash[1];
-- c = hash[2];
-- d = hash[3];
--
-- MD5STEP(F1, a, b, c, d, in[0] + 0xd76aa478, 7);
-- MD5STEP(F1, d, a, b, c, in[1] + 0xe8c7b756, 12);
-- MD5STEP(F1, c, d, a, b, in[2] + 0x242070db, 17);
-- MD5STEP(F1, b, c, d, a, in[3] + 0xc1bdceee, 22);
-- MD5STEP(F1, a, b, c, d, in[4] + 0xf57c0faf, 7);
-- MD5STEP(F1, d, a, b, c, in[5] + 0x4787c62a, 12);
-- MD5STEP(F1, c, d, a, b, in[6] + 0xa8304613, 17);
-- MD5STEP(F1, b, c, d, a, in[7] + 0xfd469501, 22);
-- MD5STEP(F1, a, b, c, d, in[8] + 0x698098d8, 7);
-- MD5STEP(F1, d, a, b, c, in[9] + 0x8b44f7af, 12);
-- MD5STEP(F1, c, d, a, b, in[10] + 0xffff5bb1, 17);
-- MD5STEP(F1, b, c, d, a, in[11] + 0x895cd7be, 22);
-- MD5STEP(F1, a, b, c, d, in[12] + 0x6b901122, 7);
-- MD5STEP(F1, d, a, b, c, in[13] + 0xfd987193, 12);
-- MD5STEP(F1, c, d, a, b, in[14] + 0xa679438e, 17);
-- MD5STEP(F1, b, c, d, a, in[15] + 0x49b40821, 22);
--
-- MD5STEP(F2, a, b, c, d, in[1] + 0xf61e2562, 5);
-- MD5STEP(F2, d, a, b, c, in[6] + 0xc040b340, 9);
-- MD5STEP(F2, c, d, a, b, in[11] + 0x265e5a51, 14);
-- MD5STEP(F2, b, c, d, a, in[0] + 0xe9b6c7aa, 20);
-- MD5STEP(F2, a, b, c, d, in[5] + 0xd62f105d, 5);
-- MD5STEP(F2, d, a, b, c, in[10] + 0x02441453, 9);
-- MD5STEP(F2, c, d, a, b, in[15] + 0xd8a1e681, 14);
-- MD5STEP(F2, b, c, d, a, in[4] + 0xe7d3fbc8, 20);
-- MD5STEP(F2, a, b, c, d, in[9] + 0x21e1cde6, 5);
-- MD5STEP(F2, d, a, b, c, in[14] + 0xc33707d6, 9);
-- MD5STEP(F2, c, d, a, b, in[3] + 0xf4d50d87, 14);
-- MD5STEP(F2, b, c, d, a, in[8] + 0x455a14ed, 20);
-- MD5STEP(F2, a, b, c, d, in[13] + 0xa9e3e905, 5);
-- MD5STEP(F2, d, a, b, c, in[2] + 0xfcefa3f8, 9);
-- MD5STEP(F2, c, d, a, b, in[7] + 0x676f02d9, 14);
-- MD5STEP(F2, b, c, d, a, in[12] + 0x8d2a4c8a, 20);
--
-- MD5STEP(F3, a, b, c, d, in[5] + 0xfffa3942, 4);
-- MD5STEP(F3, d, a, b, c, in[8] + 0x8771f681, 11);
-- MD5STEP(F3, c, d, a, b, in[11] + 0x6d9d6122, 16);
-- MD5STEP(F3, b, c, d, a, in[14] + 0xfde5380c, 23);
-- MD5STEP(F3, a, b, c, d, in[1] + 0xa4beea44, 4);
-- MD5STEP(F3, d, a, b, c, in[4] + 0x4bdecfa9, 11);
-- MD5STEP(F3, c, d, a, b, in[7] + 0xf6bb4b60, 16);
-- MD5STEP(F3, b, c, d, a, in[10] + 0xbebfbc70, 23);
-- MD5STEP(F3, a, b, c, d, in[13] + 0x289b7ec6, 4);
-- MD5STEP(F3, d, a, b, c, in[0] + 0xeaa127fa, 11);
-- MD5STEP(F3, c, d, a, b, in[3] + 0xd4ef3085, 16);
-- MD5STEP(F3, b, c, d, a, in[6] + 0x04881d05, 23);
-- MD5STEP(F3, a, b, c, d, in[9] + 0xd9d4d039, 4);
-- MD5STEP(F3, d, a, b, c, in[12] + 0xe6db99e5, 11);
-- MD5STEP(F3, c, d, a, b, in[15] + 0x1fa27cf8, 16);
-- MD5STEP(F3, b, c, d, a, in[2] + 0xc4ac5665, 23);
--
-- MD5STEP(F4, a, b, c, d, in[0] + 0xf4292244, 6);
-- MD5STEP(F4, d, a, b, c, in[7] + 0x432aff97, 10);
-- MD5STEP(F4, c, d, a, b, in[14] + 0xab9423a7, 15);
-- MD5STEP(F4, b, c, d, a, in[5] + 0xfc93a039, 21);
-- MD5STEP(F4, a, b, c, d, in[12] + 0x655b59c3, 6);
-- MD5STEP(F4, d, a, b, c, in[3] + 0x8f0ccc92, 10);
-- MD5STEP(F4, c, d, a, b, in[10] + 0xffeff47d, 15);
-- MD5STEP(F4, b, c, d, a, in[1] + 0x85845dd1, 21);
-- MD5STEP(F4, a, b, c, d, in[8] + 0x6fa87e4f, 6);
-- MD5STEP(F4, d, a, b, c, in[15] + 0xfe2ce6e0, 10);
-- MD5STEP(F4, c, d, a, b, in[6] + 0xa3014314, 15);
-- MD5STEP(F4, b, c, d, a, in[13] + 0x4e0811a1, 21);
-- MD5STEP(F4, a, b, c, d, in[4] + 0xf7537e82, 6);
-- MD5STEP(F4, d, a, b, c, in[11] + 0xbd3af235, 10);
-- MD5STEP(F4, c, d, a, b, in[2] + 0x2ad7d2bb, 15);
-- MD5STEP(F4, b, c, d, a, in[9] + 0xeb86d391, 21);
--
-- hash[0] += a;
-- hash[1] += b;
-- hash[2] += c;
-- hash[3] += d;
--}
--
- /* XXX: this stuff can be optimized */
- static inline void le32_to_cpu_array(u32 *buf, unsigned int words)
- {
-diff --git a/drivers/char/random.c b/drivers/char/random.c
-index 908ac1f..3a19e2d 100644
---- a/drivers/char/random.c
-+++ b/drivers/char/random.c
-@@ -1339,330 +1339,14 @@ ctl_table random_table[] = {
- };
- #endif /* CONFIG_SYSCTL */
-
--/********************************************************************
-- *
-- * Random funtions for networking
-- *
-- ********************************************************************/
--
--/*
-- * TCP initial sequence number picking. This uses the random number
-- * generator to pick an initial secret value. This value is hashed
-- * along with the TCP endpoint information to provide a unique
-- * starting point for each pair of TCP endpoints. This defeats
-- * attacks which rely on guessing the initial TCP sequence number.
-- * This algorithm was suggested by Steve Bellovin.
-- *
-- * Using a very strong hash was taking an appreciable amount of the total
-- * TCP connection establishment time, so this is a weaker hash,
-- * compensated for by changing the secret periodically.
-- */
--
--/* F, G and H are basic MD4 functions: selection, majority, parity */
--#define F(x, y, z) ((z) ^ ((x) & ((y) ^ (z))))
--#define G(x, y, z) (((x) & (y)) + (((x) ^ (y)) & (z)))
--#define H(x, y, z) ((x) ^ (y) ^ (z))
--
--/*
-- * The generic round function. The application is so specific that
-- * we don't bother protecting all the arguments with parens, as is generally
-- * good macro practice, in favor of extra legibility.
-- * Rotation is separate from addition to prevent recomputation
-- */
--#define ROUND(f, a, b, c, d, x, s) \
-- (a += f(b, c, d) + x, a = (a << s) | (a >> (32 - s)))
--#define K1 0
--#define K2 013240474631UL
--#define K3 015666365641UL
-+static u32 random_int_secret[MD5_MESSAGE_BYTES / 4] ____cacheline_aligned;
-
--#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
--
--static __u32 twothirdsMD4Transform(__u32 const buf[4], __u32 const in[12])
-+static int __init random_int_secret_init(void)
- {
-- __u32 a = buf[0], b = buf[1], c = buf[2], d = buf[3];
--
-- /* Round 1 */
-- ROUND(F, a, b, c, d, in[ 0] + K1, 3);
-- ROUND(F, d, a, b, c, in[ 1] + K1, 7);
-- ROUND(F, c, d, a, b, in[ 2] + K1, 11);
-- ROUND(F, b, c, d, a, in[ 3] + K1, 19);
-- ROUND(F, a, b, c, d, in[ 4] + K1, 3);
-- ROUND(F, d, a, b, c, in[ 5] + K1, 7);
-- ROUND(F, c, d, a, b, in[ 6] + K1, 11);
-- ROUND(F, b, c, d, a, in[ 7] + K1, 19);
-- ROUND(F, a, b, c, d, in[ 8] + K1, 3);
-- ROUND(F, d, a, b, c, in[ 9] + K1, 7);
-- ROUND(F, c, d, a, b, in[10] + K1, 11);
-- ROUND(F, b, c, d, a, in[11] + K1, 19);
--
-- /* Round 2 */
-- ROUND(G, a, b, c, d, in[ 1] + K2, 3);
-- ROUND(G, d, a, b, c, in[ 3] + K2, 5);
-- ROUND(G, c, d, a, b, in[ 5] + K2, 9);
-- ROUND(G, b, c, d, a, in[ 7] + K2, 13);
-- ROUND(G, a, b, c, d, in[ 9] + K2, 3);
-- ROUND(G, d, a, b, c, in[11] + K2, 5);
-- ROUND(G, c, d, a, b, in[ 0] + K2, 9);
-- ROUND(G, b, c, d, a, in[ 2] + K2, 13);
-- ROUND(G, a, b, c, d, in[ 4] + K2, 3);
-- ROUND(G, d, a, b, c, in[ 6] + K2, 5);
-- ROUND(G, c, d, a, b, in[ 8] + K2, 9);
-- ROUND(G, b, c, d, a, in[10] + K2, 13);
--
-- /* Round 3 */
-- ROUND(H, a, b, c, d, in[ 3] + K3, 3);
-- ROUND(H, d, a, b, c, in[ 7] + K3, 9);
-- ROUND(H, c, d, a, b, in[11] + K3, 11);
-- ROUND(H, b, c, d, a, in[ 2] + K3, 15);
-- ROUND(H, a, b, c, d, in[ 6] + K3, 3);
-- ROUND(H, d, a, b, c, in[10] + K3, 9);
-- ROUND(H, c, d, a, b, in[ 1] + K3, 11);
-- ROUND(H, b, c, d, a, in[ 5] + K3, 15);
-- ROUND(H, a, b, c, d, in[ 9] + K3, 3);
-- ROUND(H, d, a, b, c, in[ 0] + K3, 9);
-- ROUND(H, c, d, a, b, in[ 4] + K3, 11);
-- ROUND(H, b, c, d, a, in[ 8] + K3, 15);
--
-- return buf[1] + b; /* "most hashed" word */
-- /* Alternative: return sum of all words? */
--}
--#endif
--
--#undef ROUND
--#undef F
--#undef G
--#undef H
--#undef K1
--#undef K2
--#undef K3
--
--/* This should not be decreased so low that ISNs wrap too fast. */
--#define REKEY_INTERVAL (300 * HZ)
--/*
-- * Bit layout of the tcp sequence numbers (before adding current time):
-- * bit 24-31: increased after every key exchange
-- * bit 0-23: hash(source,dest)
-- *
-- * The implementation is similar to the algorithm described
-- * in the Appendix of RFC 1185, except that
-- * - it uses a 1 MHz clock instead of a 250 kHz clock
-- * - it performs a rekey every 5 minutes, which is equivalent
-- * to a (source,dest) tulple dependent forward jump of the
-- * clock by 0..2^(HASH_BITS+1)
-- *
-- * Thus the average ISN wraparound time is 68 minutes instead of
-- * 4.55 hours.
-- *
-- * SMP cleanup and lock avoidance with poor man's RCU.
-- * Manfred Spraul <manfred@colorfullife.com>
-- *
-- */
--#define COUNT_BITS 8
--#define COUNT_MASK ((1 << COUNT_BITS) - 1)
--#define HASH_BITS 24
--#define HASH_MASK ((1 << HASH_BITS) - 1)
--
--static struct keydata {
-- __u32 count; /* already shifted to the final position */
-- __u32 secret[12];
--} ____cacheline_aligned ip_keydata[2];
--
--static unsigned int ip_cnt;
--
--static void rekey_seq_generator(struct work_struct *work);
--
--static DECLARE_DELAYED_WORK(rekey_work, rekey_seq_generator);
--
--/*
-- * Lock avoidance:
-- * The ISN generation runs lockless - it's just a hash over random data.
-- * State changes happen every 5 minutes when the random key is replaced.
-- * Synchronization is performed by having two copies of the hash function
-- * state and rekey_seq_generator always updates the inactive copy.
-- * The copy is then activated by updating ip_cnt.
-- * The implementation breaks down if someone blocks the thread
-- * that processes SYN requests for more than 5 minutes. Should never
-- * happen, and even if that happens only a not perfectly compliant
-- * ISN is generated, nothing fatal.
-- */
--static void rekey_seq_generator(struct work_struct *work)
--{
-- struct keydata *keyptr = &ip_keydata[1 ^ (ip_cnt & 1)];
--
-- get_random_bytes(keyptr->secret, sizeof(keyptr->secret));
-- keyptr->count = (ip_cnt & COUNT_MASK) << HASH_BITS;
-- smp_wmb();
-- ip_cnt++;
-- schedule_delayed_work(&rekey_work,
-- round_jiffies_relative(REKEY_INTERVAL));
--}
--
--static inline struct keydata *get_keyptr(void)
--{
-- struct keydata *keyptr = &ip_keydata[ip_cnt & 1];
--
-- smp_rmb();
--
-- return keyptr;
--}
--
--static __init int seqgen_init(void)
--{
-- rekey_seq_generator(NULL);
-+ get_random_bytes(random_int_secret, sizeof(random_int_secret));
- return 0;
- }
--late_initcall(seqgen_init);
--
--#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
--__u32 secure_tcpv6_sequence_number(__be32 *saddr, __be32 *daddr,
-- __be16 sport, __be16 dport)
--{
-- __u32 seq;
-- __u32 hash[12];
-- struct keydata *keyptr = get_keyptr();
--
-- /* The procedure is the same as for IPv4, but addresses are longer.
-- * Thus we must use twothirdsMD4Transform.
-- */
--
-- memcpy(hash, saddr, 16);
-- hash[4] = ((__force u16)sport << 16) + (__force u16)dport;
-- memcpy(&hash[5], keyptr->secret, sizeof(__u32) * 7);
--
-- seq = twothirdsMD4Transform((const __u32 *)daddr, hash) & HASH_MASK;
-- seq += keyptr->count;
--
-- seq += ktime_to_ns(ktime_get_real());
--
-- return seq;
--}
--EXPORT_SYMBOL(secure_tcpv6_sequence_number);
--#endif
--
--/* The code below is shamelessly stolen from secure_tcp_sequence_number().
-- * All blames to Andrey V. Savochkin <saw@msu.ru>.
-- */
--__u32 secure_ip_id(__be32 daddr)
--{
-- struct keydata *keyptr;
-- __u32 hash[4];
--
-- keyptr = get_keyptr();
--
-- /*
-- * Pick a unique starting offset for each IP destination.
-- * The dest ip address is placed in the starting vector,
-- * which is then hashed with random data.
-- */
-- hash[0] = (__force __u32)daddr;
-- hash[1] = keyptr->secret[9];
-- hash[2] = keyptr->secret[10];
-- hash[3] = keyptr->secret[11];
--
-- return half_md4_transform(hash, keyptr->secret);
--}
--
--#ifdef CONFIG_INET
--
--__u32 secure_tcp_sequence_number(__be32 saddr, __be32 daddr,
-- __be16 sport, __be16 dport)
--{
-- __u32 seq;
-- __u32 hash[4];
-- struct keydata *keyptr = get_keyptr();
--
-- /*
-- * Pick a unique starting offset for each TCP connection endpoints
-- * (saddr, daddr, sport, dport).
-- * Note that the words are placed into the starting vector, which is
-- * then mixed with a partial MD4 over random data.
-- */
-- hash[0] = (__force u32)saddr;
-- hash[1] = (__force u32)daddr;
-- hash[2] = ((__force u16)sport << 16) + (__force u16)dport;
-- hash[3] = keyptr->secret[11];
--
-- seq = half_md4_transform(hash, keyptr->secret) & HASH_MASK;
-- seq += keyptr->count;
-- /*
-- * As close as possible to RFC 793, which
-- * suggests using a 250 kHz clock.
-- * Further reading shows this assumes 2 Mb/s networks.
-- * For 10 Mb/s Ethernet, a 1 MHz clock is appropriate.
-- * For 10 Gb/s Ethernet, a 1 GHz clock should be ok, but
-- * we also need to limit the resolution so that the u32 seq
-- * overlaps less than one time per MSL (2 minutes).
-- * Choosing a clock of 64 ns period is OK. (period of 274 s)
-- */
-- seq += ktime_to_ns(ktime_get_real()) >> 6;
--
-- return seq;
--}
--
--/* Generate secure starting point for ephemeral IPV4 transport port search */
--u32 secure_ipv4_port_ephemeral(__be32 saddr, __be32 daddr, __be16 dport)
--{
-- struct keydata *keyptr = get_keyptr();
-- u32 hash[4];
--
-- /*
-- * Pick a unique starting offset for each ephemeral port search
-- * (saddr, daddr, dport) and 48bits of random data.
-- */
-- hash[0] = (__force u32)saddr;
-- hash[1] = (__force u32)daddr;
-- hash[2] = (__force u32)dport ^ keyptr->secret[10];
-- hash[3] = keyptr->secret[11];
--
-- return half_md4_transform(hash, keyptr->secret);
--}
--EXPORT_SYMBOL_GPL(secure_ipv4_port_ephemeral);
--
--#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
--u32 secure_ipv6_port_ephemeral(const __be32 *saddr, const __be32 *daddr,
-- __be16 dport)
--{
-- struct keydata *keyptr = get_keyptr();
-- u32 hash[12];
--
-- memcpy(hash, saddr, 16);
-- hash[4] = (__force u32)dport;
-- memcpy(&hash[5], keyptr->secret, sizeof(__u32) * 7);
--
-- return twothirdsMD4Transform((const __u32 *)daddr, hash);
--}
--#endif
--
--#if defined(CONFIG_IP_DCCP) || defined(CONFIG_IP_DCCP_MODULE)
--/* Similar to secure_tcp_sequence_number but generate a 48 bit value
-- * bit's 32-47 increase every key exchange
-- * 0-31 hash(source, dest)
-- */
--u64 secure_dccp_sequence_number(__be32 saddr, __be32 daddr,
-- __be16 sport, __be16 dport)
--{
-- u64 seq;
-- __u32 hash[4];
-- struct keydata *keyptr = get_keyptr();
--
-- hash[0] = (__force u32)saddr;
-- hash[1] = (__force u32)daddr;
-- hash[2] = ((__force u16)sport << 16) + (__force u16)dport;
-- hash[3] = keyptr->secret[11];
--
-- seq = half_md4_transform(hash, keyptr->secret);
-- seq |= ((u64)keyptr->count) << (32 - HASH_BITS);
--
-- seq += ktime_to_ns(ktime_get_real());
-- seq &= (1ull << 48) - 1;
--
-- return seq;
--}
--EXPORT_SYMBOL(secure_dccp_sequence_number);
--#endif
--
--#endif /* CONFIG_INET */
--
-+late_initcall(random_int_secret_init);
-
- /*
- * Get a random word for internal kernel use only. Similar to urandom but
-@@ -1670,17 +1354,15 @@ EXPORT_SYMBOL(secure_dccp_sequence_number);
- * value is not cryptographically secure but for several uses the cost of
- * depleting entropy is too high
- */
--DEFINE_PER_CPU(__u32 [4], get_random_int_hash);
-+DEFINE_PER_CPU(__u32 [MD5_DIGEST_WORDS], get_random_int_hash);
- unsigned int get_random_int(void)
- {
-- struct keydata *keyptr;
- __u32 *hash = get_cpu_var(get_random_int_hash);
-- int ret;
-+ unsigned int ret;
-
-- keyptr = get_keyptr();
- hash[0] += current->pid + jiffies + get_cycles();
--
-- ret = half_md4_transform(hash, keyptr->secret);
-+ md5_transform(hash, random_int_secret);
-+ ret = hash[0];
- put_cpu_var(get_random_int_hash);
-
- return ret;
-diff --git a/include/linux/cryptohash.h b/include/linux/cryptohash.h
-index c118b2ad..1ba279b 100644
---- a/include/linux/cryptohash.h
-+++ b/include/linux/cryptohash.h
-@@ -7,6 +7,11 @@
- void sha_init(__u32 *buf);
- void sha_transform(__u32 *digest, const char *data, __u32 *W);
-
-+#define MD5_DIGEST_WORDS 4
-+#define MD5_MESSAGE_BYTES 64
-+
-+void md5_transform(__u32 *hash, __u32 const *in);
-+
- __u32 half_md4_transform(__u32 buf[4], __u32 const in[8]);
-
- #endif
-diff --git a/include/linux/random.h b/include/linux/random.h
-index 25d02fe..2948046 100644
---- a/include/linux/random.h
-+++ b/include/linux/random.h
-@@ -53,17 +53,6 @@ extern void add_interrupt_randomness(int irq);
- extern void get_random_bytes(void *buf, int nbytes);
- void generate_random_uuid(unsigned char uuid_out[16]);
-
--extern __u32 secure_ip_id(__be32 daddr);
--extern u32 secure_ipv4_port_ephemeral(__be32 saddr, __be32 daddr, __be16 dport);
--extern u32 secure_ipv6_port_ephemeral(const __be32 *saddr, const __be32 *daddr,
-- __be16 dport);
--extern __u32 secure_tcp_sequence_number(__be32 saddr, __be32 daddr,
-- __be16 sport, __be16 dport);
--extern __u32 secure_tcpv6_sequence_number(__be32 *saddr, __be32 *daddr,
-- __be16 sport, __be16 dport);
--extern u64 secure_dccp_sequence_number(__be32 saddr, __be32 daddr,
-- __be16 sport, __be16 dport);
--
- #ifndef MODULE
- extern const struct file_operations random_fops, urandom_fops;
- #endif
-diff --git a/include/net/secure_seq.h b/include/net/secure_seq.h
-new file mode 100644
-index 0000000..d97f689
---- /dev/null
-+++ b/include/net/secure_seq.h
-@@ -0,0 +1,20 @@
-+#ifndef _NET_SECURE_SEQ
-+#define _NET_SECURE_SEQ
-+
-+#include <linux/types.h>
-+
-+extern __u32 secure_ip_id(__be32 daddr);
-+extern __u32 secure_ipv6_id(const __be32 daddr[4]);
-+extern u32 secure_ipv4_port_ephemeral(__be32 saddr, __be32 daddr, __be16 dport);
-+extern u32 secure_ipv6_port_ephemeral(const __be32 *saddr, const __be32 *daddr,
-+ __be16 dport);
-+extern __u32 secure_tcp_sequence_number(__be32 saddr, __be32 daddr,
-+ __be16 sport, __be16 dport);
-+extern __u32 secure_tcpv6_sequence_number(__be32 *saddr, __be32 *daddr,
-+ __be16 sport, __be16 dport);
-+extern u64 secure_dccp_sequence_number(__be32 saddr, __be32 daddr,
-+ __be16 sport, __be16 dport);
-+extern u64 secure_dccpv6_sequence_number(__be32 *saddr, __be32 *daddr,
-+ __be16 sport, __be16 dport);
-+
-+#endif /* _NET_SECURE_SEQ */
-diff --git a/lib/Makefile b/lib/Makefile
-index 452f188..5ecf2ba 100644
---- a/lib/Makefile
-+++ b/lib/Makefile
-@@ -10,7 +10,7 @@ endif
- lib-y := ctype.o string.o vsprintf.o cmdline.o \
- rbtree.o radix-tree.o dump_stack.o \
- idr.o int_sqrt.o extable.o prio_tree.o \
-- sha1.o irq_regs.o reciprocal_div.o argv_split.o \
-+ sha1.o md5.o irq_regs.o reciprocal_div.o argv_split.o \
- proportions.o prio_heap.o ratelimit.o show_mem.o \
- is_single_threaded.o plist.o decompress.o flex_array.o
-
-diff --git a/lib/md5.c b/lib/md5.c
-new file mode 100644
-index 0000000..c777180
---- /dev/null
-+++ b/lib/md5.c
-@@ -0,0 +1,95 @@
-+#include <linux/kernel.h>
-+#include <linux/module.h>
-+#include <linux/cryptohash.h>
-+
-+#define F1(x, y, z) (z ^ (x & (y ^ z)))
-+#define F2(x, y, z) F1(z, x, y)
-+#define F3(x, y, z) (x ^ y ^ z)
-+#define F4(x, y, z) (y ^ (x | ~z))
-+
-+#define MD5STEP(f, w, x, y, z, in, s) \
-+ (w += f(x, y, z) + in, w = (w<<s | w>>(32-s)) + x)
-+
-+void md5_transform(__u32 *hash, __u32 const *in)
-+{
-+ u32 a, b, c, d;
-+
-+ a = hash[0];
-+ b = hash[1];
-+ c = hash[2];
-+ d = hash[3];
-+
-+ MD5STEP(F1, a, b, c, d, in[0] + 0xd76aa478, 7);
-+ MD5STEP(F1, d, a, b, c, in[1] + 0xe8c7b756, 12);
-+ MD5STEP(F1, c, d, a, b, in[2] + 0x242070db, 17);
-+ MD5STEP(F1, b, c, d, a, in[3] + 0xc1bdceee, 22);
-+ MD5STEP(F1, a, b, c, d, in[4] + 0xf57c0faf, 7);
-+ MD5STEP(F1, d, a, b, c, in[5] + 0x4787c62a, 12);
-+ MD5STEP(F1, c, d, a, b, in[6] + 0xa8304613, 17);
-+ MD5STEP(F1, b, c, d, a, in[7] + 0xfd469501, 22);
-+ MD5STEP(F1, a, b, c, d, in[8] + 0x698098d8, 7);
-+ MD5STEP(F1, d, a, b, c, in[9] + 0x8b44f7af, 12);
-+ MD5STEP(F1, c, d, a, b, in[10] + 0xffff5bb1, 17);
-+ MD5STEP(F1, b, c, d, a, in[11] + 0x895cd7be, 22);
-+ MD5STEP(F1, a, b, c, d, in[12] + 0x6b901122, 7);
-+ MD5STEP(F1, d, a, b, c, in[13] + 0xfd987193, 12);
-+ MD5STEP(F1, c, d, a, b, in[14] + 0xa679438e, 17);
-+ MD5STEP(F1, b, c, d, a, in[15] + 0x49b40821, 22);
-+
-+ MD5STEP(F2, a, b, c, d, in[1] + 0xf61e2562, 5);
-+ MD5STEP(F2, d, a, b, c, in[6] + 0xc040b340, 9);
-+ MD5STEP(F2, c, d, a, b, in[11] + 0x265e5a51, 14);
-+ MD5STEP(F2, b, c, d, a, in[0] + 0xe9b6c7aa, 20);
-+ MD5STEP(F2, a, b, c, d, in[5] + 0xd62f105d, 5);
-+ MD5STEP(F2, d, a, b, c, in[10] + 0x02441453, 9);
-+ MD5STEP(F2, c, d, a, b, in[15] + 0xd8a1e681, 14);
-+ MD5STEP(F2, b, c, d, a, in[4] + 0xe7d3fbc8, 20);
-+ MD5STEP(F2, a, b, c, d, in[9] + 0x21e1cde6, 5);
-+ MD5STEP(F2, d, a, b, c, in[14] + 0xc33707d6, 9);
-+ MD5STEP(F2, c, d, a, b, in[3] + 0xf4d50d87, 14);
-+ MD5STEP(F2, b, c, d, a, in[8] + 0x455a14ed, 20);
-+ MD5STEP(F2, a, b, c, d, in[13] + 0xa9e3e905, 5);
-+ MD5STEP(F2, d, a, b, c, in[2] + 0xfcefa3f8, 9);
-+ MD5STEP(F2, c, d, a, b, in[7] + 0x676f02d9, 14);
-+ MD5STEP(F2, b, c, d, a, in[12] + 0x8d2a4c8a, 20);
-+
-+ MD5STEP(F3, a, b, c, d, in[5] + 0xfffa3942, 4);
-+ MD5STEP(F3, d, a, b, c, in[8] + 0x8771f681, 11);
-+ MD5STEP(F3, c, d, a, b, in[11] + 0x6d9d6122, 16);
-+ MD5STEP(F3, b, c, d, a, in[14] + 0xfde5380c, 23);
-+ MD5STEP(F3, a, b, c, d, in[1] + 0xa4beea44, 4);
-+ MD5STEP(F3, d, a, b, c, in[4] + 0x4bdecfa9, 11);
-+ MD5STEP(F3, c, d, a, b, in[7] + 0xf6bb4b60, 16);
-+ MD5STEP(F3, b, c, d, a, in[10] + 0xbebfbc70, 23);
-+ MD5STEP(F3, a, b, c, d, in[13] + 0x289b7ec6, 4);
-+ MD5STEP(F3, d, a, b, c, in[0] + 0xeaa127fa, 11);
-+ MD5STEP(F3, c, d, a, b, in[3] + 0xd4ef3085, 16);
-+ MD5STEP(F3, b, c, d, a, in[6] + 0x04881d05, 23);
-+ MD5STEP(F3, a, b, c, d, in[9] + 0xd9d4d039, 4);
-+ MD5STEP(F3, d, a, b, c, in[12] + 0xe6db99e5, 11);
-+ MD5STEP(F3, c, d, a, b, in[15] + 0x1fa27cf8, 16);
-+ MD5STEP(F3, b, c, d, a, in[2] + 0xc4ac5665, 23);
-+
-+ MD5STEP(F4, a, b, c, d, in[0] + 0xf4292244, 6);
-+ MD5STEP(F4, d, a, b, c, in[7] + 0x432aff97, 10);
-+ MD5STEP(F4, c, d, a, b, in[14] + 0xab9423a7, 15);
-+ MD5STEP(F4, b, c, d, a, in[5] + 0xfc93a039, 21);
-+ MD5STEP(F4, a, b, c, d, in[12] + 0x655b59c3, 6);
-+ MD5STEP(F4, d, a, b, c, in[3] + 0x8f0ccc92, 10);
-+ MD5STEP(F4, c, d, a, b, in[10] + 0xffeff47d, 15);
-+ MD5STEP(F4, b, c, d, a, in[1] + 0x85845dd1, 21);
-+ MD5STEP(F4, a, b, c, d, in[8] + 0x6fa87e4f, 6);
-+ MD5STEP(F4, d, a, b, c, in[15] + 0xfe2ce6e0, 10);
-+ MD5STEP(F4, c, d, a, b, in[6] + 0xa3014314, 15);
-+ MD5STEP(F4, b, c, d, a, in[13] + 0x4e0811a1, 21);
-+ MD5STEP(F4, a, b, c, d, in[4] + 0xf7537e82, 6);
-+ MD5STEP(F4, d, a, b, c, in[11] + 0xbd3af235, 10);
-+ MD5STEP(F4, c, d, a, b, in[2] + 0x2ad7d2bb, 15);
-+ MD5STEP(F4, b, c, d, a, in[9] + 0xeb86d391, 21);
-+
-+ hash[0] += a;
-+ hash[1] += b;
-+ hash[2] += c;
-+ hash[3] += d;
-+}
-+EXPORT_SYMBOL(md5_transform);
-diff --git a/net/core/Makefile b/net/core/Makefile
-index 796f46e..ace37e4 100644
---- a/net/core/Makefile
-+++ b/net/core/Makefile
-@@ -3,7 +3,7 @@
- #
-
- obj-y := sock.o request_sock.o skbuff.o iovec.o datagram.o stream.o scm.o \
-- gen_stats.o gen_estimator.o net_namespace.o
-+ gen_stats.o gen_estimator.o net_namespace.o secure_seq.o
-
- obj-$(CONFIG_SYSCTL) += sysctl_net_core.o
- obj-$(CONFIG_HAS_DMA) += skb_dma_map.o
-diff --git a/net/core/secure_seq.c b/net/core/secure_seq.c
-new file mode 100644
-index 0000000..45329d7
---- /dev/null
-+++ b/net/core/secure_seq.c
-@@ -0,0 +1,184 @@
-+#include <linux/kernel.h>
-+#include <linux/init.h>
-+#include <linux/cryptohash.h>
-+#include <linux/module.h>
-+#include <linux/cache.h>
-+#include <linux/random.h>
-+#include <linux/hrtimer.h>
-+#include <linux/ktime.h>
-+#include <linux/string.h>
-+
-+#include <net/secure_seq.h>
-+
-+static u32 net_secret[MD5_MESSAGE_BYTES / 4] ____cacheline_aligned;
-+
-+static int __init net_secret_init(void)
-+{
-+ get_random_bytes(net_secret, sizeof(net_secret));
-+ return 0;
-+}
-+late_initcall(net_secret_init);
-+
-+static u32 seq_scale(u32 seq)
-+{
-+ /*
-+ * As close as possible to RFC 793, which
-+ * suggests using a 250 kHz clock.
-+ * Further reading shows this assumes 2 Mb/s networks.
-+ * For 10 Mb/s Ethernet, a 1 MHz clock is appropriate.
-+ * For 10 Gb/s Ethernet, a 1 GHz clock should be ok, but
-+ * we also need to limit the resolution so that the u32 seq
-+ * overlaps less than one time per MSL (2 minutes).
-+ * Choosing a clock of 64 ns period is OK. (period of 274 s)
-+ */
-+ return seq + (ktime_to_ns(ktime_get_real()) >> 6);
-+}
-+
-+#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
-+__u32 secure_tcpv6_sequence_number(__be32 *saddr, __be32 *daddr,
-+ __be16 sport, __be16 dport)
-+{
-+ u32 secret[MD5_MESSAGE_BYTES / 4];
-+ u32 hash[MD5_DIGEST_WORDS];
-+ u32 i;
-+
-+ memcpy(hash, saddr, 16);
-+ for (i = 0; i < 4; i++)
-+ secret[i] = net_secret[i] + daddr[i];
-+ secret[4] = net_secret[4] +
-+ (((__force u16)sport << 16) + (__force u16)dport);
-+ for (i = 5; i < MD5_MESSAGE_BYTES / 4; i++)
-+ secret[i] = net_secret[i];
-+
-+ md5_transform(hash, secret);
-+
-+ return seq_scale(hash[0]);
-+}
-+EXPORT_SYMBOL(secure_tcpv6_sequence_number);
-+
-+u32 secure_ipv6_port_ephemeral(const __be32 *saddr, const __be32 *daddr,
-+ __be16 dport)
-+{
-+ u32 secret[MD5_MESSAGE_BYTES / 4];
-+ u32 hash[MD5_DIGEST_WORDS];
-+ u32 i;
-+
-+ memcpy(hash, saddr, 16);
-+ for (i = 0; i < 4; i++)
-+ secret[i] = net_secret[i] + (__force u32) daddr[i];
-+ secret[4] = net_secret[4] + (__force u32)dport;
-+ for (i = 5; i < MD5_MESSAGE_BYTES / 4; i++)
-+ secret[i] = net_secret[i];
-+
-+ md5_transform(hash, secret);
-+
-+ return hash[0];
-+}
-+#endif
-+
-+#ifdef CONFIG_INET
-+__u32 secure_ip_id(__be32 daddr)
-+{
-+ u32 hash[MD5_DIGEST_WORDS];
-+
-+ hash[0] = (__force __u32) daddr;
-+ hash[1] = net_secret[13];
-+ hash[2] = net_secret[14];
-+ hash[3] = net_secret[15];
-+
-+ md5_transform(hash, net_secret);
-+
-+ return hash[0];
-+}
-+
-+__u32 secure_ipv6_id(const __be32 daddr[4])
-+{
-+ __u32 hash[4];
-+
-+ memcpy(hash, daddr, 16);
-+ md5_transform(hash, net_secret);
-+
-+ return hash[0];
-+}
-+
-+__u32 secure_tcp_sequence_number(__be32 saddr, __be32 daddr,
-+ __be16 sport, __be16 dport)
-+{
-+ u32 hash[MD5_DIGEST_WORDS];
-+
-+ hash[0] = (__force u32)saddr;
-+ hash[1] = (__force u32)daddr;
-+ hash[2] = ((__force u16)sport << 16) + (__force u16)dport;
-+ hash[3] = net_secret[15];
-+
-+ md5_transform(hash, net_secret);
-+
-+ return seq_scale(hash[0]);
-+}
-+
-+u32 secure_ipv4_port_ephemeral(__be32 saddr, __be32 daddr, __be16 dport)
-+{
-+ u32 hash[MD5_DIGEST_WORDS];
-+
-+ hash[0] = (__force u32)saddr;
-+ hash[1] = (__force u32)daddr;
-+ hash[2] = (__force u32)dport ^ net_secret[14];
-+ hash[3] = net_secret[15];
-+
-+ md5_transform(hash, net_secret);
-+
-+ return hash[0];
-+}
-+EXPORT_SYMBOL_GPL(secure_ipv4_port_ephemeral);
-+#endif
-+
-+#if defined(CONFIG_IP_DCCP) || defined(CONFIG_IP_DCCP_MODULE)
-+u64 secure_dccp_sequence_number(__be32 saddr, __be32 daddr,
-+ __be16 sport, __be16 dport)
-+{
-+ u32 hash[MD5_DIGEST_WORDS];
-+ u64 seq;
-+
-+ hash[0] = (__force u32)saddr;
-+ hash[1] = (__force u32)daddr;
-+ hash[2] = ((__force u16)sport << 16) + (__force u16)dport;
-+ hash[3] = net_secret[15];
-+
-+ md5_transform(hash, net_secret);
-+
-+ seq = hash[0] | (((u64)hash[1]) << 32);
-+ seq += ktime_to_ns(ktime_get_real());
-+ seq &= (1ull << 48) - 1;
-+
-+ return seq;
-+}
-+EXPORT_SYMBOL(secure_dccp_sequence_number);
-+
-+#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
-+u64 secure_dccpv6_sequence_number(__be32 *saddr, __be32 *daddr,
-+ __be16 sport, __be16 dport)
-+{
-+ u32 secret[MD5_MESSAGE_BYTES / 4];
-+ u32 hash[MD5_DIGEST_WORDS];
-+ u64 seq;
-+ u32 i;
-+
-+ memcpy(hash, saddr, 16);
-+ for (i = 0; i < 4; i++)
-+ secret[i] = net_secret[i] + daddr[i];
-+ secret[4] = net_secret[4] +
-+ (((__force u16)sport << 16) + (__force u16)dport);
-+ for (i = 5; i < MD5_MESSAGE_BYTES / 4; i++)
-+ secret[i] = net_secret[i];
-+
-+ md5_transform(hash, secret);
-+
-+ seq = hash[0] | (((u64)hash[1]) << 32);
-+ seq += ktime_to_ns(ktime_get_real());
-+ seq &= (1ull << 48) - 1;
-+
-+ return seq;
-+}
-+EXPORT_SYMBOL(secure_dccpv6_sequence_number);
-+#endif
-+#endif
-diff --git a/net/dccp/ipv4.c b/net/dccp/ipv4.c
-index 7302e14..d14c0a3 100644
---- a/net/dccp/ipv4.c
-+++ b/net/dccp/ipv4.c
-@@ -25,6 +25,7 @@
- #include <net/timewait_sock.h>
- #include <net/tcp_states.h>
- #include <net/xfrm.h>
-+#include <net/secure_seq.h>
-
- #include "ackvec.h"
- #include "ccid.h"
-diff --git a/net/dccp/ipv6.c b/net/dccp/ipv6.c
-index e48ca5d..9ed1962 100644
---- a/net/dccp/ipv6.c
-+++ b/net/dccp/ipv6.c
-@@ -28,6 +28,7 @@
- #include <net/transp_v6.h>
- #include <net/ip6_checksum.h>
- #include <net/xfrm.h>
-+#include <net/secure_seq.h>
-
- #include "dccp.h"
- #include "ipv6.h"
-@@ -69,13 +70,7 @@ static inline void dccp_v6_send_check(struct sock *sk, int unused_value,
- dh->dccph_checksum = dccp_v6_csum_finish(skb, &np->saddr, &np->daddr);
- }
-
--static inline __u32 secure_dccpv6_sequence_number(__be32 *saddr, __be32 *daddr,
-- __be16 sport, __be16 dport )
--{
-- return secure_tcpv6_sequence_number(saddr, daddr, sport, dport);
--}
--
--static inline __u32 dccp_v6_init_sequence(struct sk_buff *skb)
-+static inline __u64 dccp_v6_init_sequence(struct sk_buff *skb)
- {
- return secure_dccpv6_sequence_number(ipv6_hdr(skb)->daddr.s6_addr32,
- ipv6_hdr(skb)->saddr.s6_addr32,
-diff --git a/net/ipv4/inet_hashtables.c b/net/ipv4/inet_hashtables.c
-index 625cc5f..d717267 100644
---- a/net/ipv4/inet_hashtables.c
-+++ b/net/ipv4/inet_hashtables.c
-@@ -21,6 +21,7 @@
-
- #include <net/inet_connection_sock.h>
- #include <net/inet_hashtables.h>
-+#include <net/secure_seq.h>
- #include <net/ip.h>
-
- /*
-diff --git a/net/ipv4/inetpeer.c b/net/ipv4/inetpeer.c
-index b1fbe18..13b229f 100644
---- a/net/ipv4/inetpeer.c
-+++ b/net/ipv4/inetpeer.c
-@@ -19,6 +19,7 @@
- #include <linux/net.h>
- #include <net/ip.h>
- #include <net/inetpeer.h>
-+#include <net/secure_seq.h>
-
- /*
- * Theory of operations.
-diff --git a/net/ipv4/netfilter/nf_nat_proto_common.c b/net/ipv4/netfilter/nf_nat_proto_common.c
-index 6c4f11f..2d5073a 100644
---- a/net/ipv4/netfilter/nf_nat_proto_common.c
-+++ b/net/ipv4/netfilter/nf_nat_proto_common.c
-@@ -12,6 +12,7 @@
- #include <linux/ip.h>
-
- #include <linux/netfilter.h>
-+#include <net/secure_seq.h>
- #include <net/netfilter/nf_nat.h>
- #include <net/netfilter/nf_nat_core.h>
- #include <net/netfilter/nf_nat_rule.h>
-diff --git a/net/ipv4/route.c b/net/ipv4/route.c
-index 6c8f6c9..58f141b 100644
---- a/net/ipv4/route.c
-+++ b/net/ipv4/route.c
-@@ -107,6 +107,7 @@
- #ifdef CONFIG_SYSCTL
- #include <linux/sysctl.h>
- #endif
-+#include <net/secure_seq.h>
-
- #define RT_FL_TOS(oldflp) \
- ((u32)(oldflp->fl4_tos & (IPTOS_RT_MASK | RTO_ONLINK)))
-diff --git a/net/ipv4/tcp_ipv4.c b/net/ipv4/tcp_ipv4.c
-index 7cda24b..6fc7961 100644
---- a/net/ipv4/tcp_ipv4.c
-+++ b/net/ipv4/tcp_ipv4.c
-@@ -71,6 +71,7 @@
- #include <net/timewait_sock.h>
- #include <net/xfrm.h>
- #include <net/netdma.h>
-+#include <net/secure_seq.h>
-
- #include <linux/inet.h>
- #include <linux/ipv6.h>
-diff --git a/net/ipv6/inet6_hashtables.c b/net/ipv6/inet6_hashtables.c
-index 1bcc343..093e9b2 100644
---- a/net/ipv6/inet6_hashtables.c
-+++ b/net/ipv6/inet6_hashtables.c
-@@ -20,6 +20,7 @@
- #include <net/inet_connection_sock.h>
- #include <net/inet_hashtables.h>
- #include <net/inet6_hashtables.h>
-+#include <net/secure_seq.h>
- #include <net/ip.h>
-
- void __inet6_hash(struct sock *sk)
-diff --git a/net/ipv6/tcp_ipv6.c b/net/ipv6/tcp_ipv6.c
-index 21d100b..faae6df 100644
---- a/net/ipv6/tcp_ipv6.c
-+++ b/net/ipv6/tcp_ipv6.c
-@@ -60,6 +60,7 @@
- #include <net/timewait_sock.h>
- #include <net/netdma.h>
- #include <net/inet_common.h>
-+#include <net/secure_seq.h>
-
- #include <asm/uaccess.h>
-
-diff --git a/sound/core/timer.c b/sound/core/timer.c
-index 8f8b17a..4a13844 100644
---- a/sound/core/timer.c
-+++ b/sound/core/timer.c
-@@ -530,6 +530,8 @@ int snd_timer_stop(struct snd_timer_instance *timeri)
- if (err < 0)
- return err;
- timer = timeri->timer;
-+ if (!timer)
-+ return -EINVAL;
- spin_lock_irqsave(&timer->lock, flags);
- timeri->cticks = timeri->ticks;
- timeri->pticks = 0;
-diff --git a/sound/usb/caiaq/input.c b/sound/usb/caiaq/input.c
-index a48d309..c93e1aa 100644
---- a/sound/usb/caiaq/input.c
-+++ b/sound/usb/caiaq/input.c
-@@ -28,7 +28,7 @@ static unsigned short keycode_ak1[] = { KEY_C, KEY_B, KEY_A };
- static unsigned short keycode_rk2[] = { KEY_1, KEY_2, KEY_3, KEY_4,
- KEY_5, KEY_6, KEY_7 };
- static unsigned short keycode_rk3[] = { KEY_1, KEY_2, KEY_3, KEY_4,
-- KEY_5, KEY_6, KEY_7, KEY_5, KEY_6 };
-+ KEY_5, KEY_6, KEY_7, KEY_8, KEY_9 };
-
- static unsigned short keycode_kore[] = {
- KEY_FN_F1, /* "menu" */