* Sasha Levin (levinsasha928@xxxxxxxxx) wrote: [...] > -/* Session hash global list for L2TPv3. > - * The session_id SHOULD be random according to RFC3931, but several > - * L2TP implementations use incrementing session_ids. So we do a real > - * hash on the session_id, rather than a simple bitmask. > - */ > -static inline struct hlist_head * > -l2tp_session_id_hash_2(struct l2tp_net *pn, u32 session_id) > -{ > - return &pn->l2tp_session_hlist[hash_32(session_id, L2TP_HASH_BITS_2)]; > - > -} I understand that you removed this hash function, as well as "l2tp_session_id_hash" below, but is there any way we could leave those comments in place ? They look useful. > -/* Session hash list. > - * The session_id SHOULD be random according to RFC2661, but several > - * L2TP implementations (Cisco and Microsoft) use incrementing > - * session_ids. So we do a real hash on the session_id, rather than a > - * simple bitmask. Ditto. > - */ > -static inline struct hlist_head * > -l2tp_session_id_hash(struct l2tp_tunnel *tunnel, u32 session_id) > -{ > - return &tunnel->session_hlist[hash_32(session_id, L2TP_HASH_BITS)]; > -} > - > /* Lookup a session by id > */ Thanks, Mathieu -- Mathieu Desnoyers Operating System Efficiency R&D Consultant EfficiOS Inc. http://www.efficios.com -- To unsubscribe from this list: send the line "unsubscribe linux-nfs" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html