Or unless your hash function is somewhere accessible to
black-hats (eg. in the networking code), and the worst
case is so bad it can be used for a DOS attack.
-- Erik Corry erik@arbat.com Ceterum censeo, Microsoftem esse delendam!- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.rutgers.edu Please read the FAQ at http://www.tux.org/lkml/