mirror of
https://github.com/Evolution-X-Devices/kernel_google_b1c1
synced 2026-02-13 03:10:58 +00:00
The days are gone when this was not an issue, there are folks out there with huge bot networks that can be used to attack the established hash tables on remote systems. So just like the routing cache and connection tracking hash, use Jenkins hash with random secret input. Signed-off-by: David S. Miller <davem@davemloft.net>