aboutsummaryrefslogtreecommitdiff
path: root/tools/perf/scripts/python/syscall-counts.py
diff options
context:
space:
mode:
authorEric Dumazet <edumazet@google.com>2014-08-17 12:10:45 +0300
committerdoc <doc.divxm@gmail.com>2014-08-17 12:10:51 +0300
commitc71fdd1a459301651f35e4e12a5522018a358123 (patch)
tree8664a2aa98dbacb04a650e5237681322c7af1fa8 /tools/perf/scripts/python/syscall-counts.py
parentc246490c7d0177db734167d0bcfc799cfb89d93f (diff)
ipv6: use a stronger hash for tcp
It looks like its possible to open thousands of TCP IPv6 sessions on a server, all landing in a single slot of TCP hash table. Incoming packets have to lookup sockets in a very long list. We should hash all bits from foreign IPv6 addresses, using a salt and hash mix, not a simple XOR. inet6_ehashfn() can also separately use the ports, instead of xoring them. Change-Id: Ibd708e9d1d9d2bdb7bea6488c259edc576b98780 Reported-by: Neal Cardwell <ncardwell@google.com> Signed-off-by: Eric Dumazet <edumazet@google.com> Cc: Yuchung Cheng <ycheng@google.com> Signed-off-by: David S. Miller <davem@davemloft.net> Signed-off-by: Iliyan Malchev <malchev@google.com>
Diffstat (limited to 'tools/perf/scripts/python/syscall-counts.py')
0 files changed, 0 insertions, 0 deletions