diff options
| author | Eric Dumazet <edumazet@google.com> | 2014-08-17 12:10:45 +0300 |
|---|---|---|
| committer | doc <doc.divxm@gmail.com> | 2014-08-17 12:10:51 +0300 |
| commit | c71fdd1a459301651f35e4e12a5522018a358123 (patch) | |
| tree | 8664a2aa98dbacb04a650e5237681322c7af1fa8 /tools/perf/scripts/python/syscall-counts.py | |
| parent | c246490c7d0177db734167d0bcfc799cfb89d93f (diff) | |
ipv6: use a stronger hash for tcp
It looks like its possible to open thousands of TCP IPv6
sessions on a server, all landing in a single slot of TCP hash
table. Incoming packets have to lookup sockets in a very
long list.
We should hash all bits from foreign IPv6 addresses, using
a salt and hash mix, not a simple XOR.
inet6_ehashfn() can also separately use the ports, instead
of xoring them.
Change-Id: Ibd708e9d1d9d2bdb7bea6488c259edc576b98780
Reported-by: Neal Cardwell <ncardwell@google.com>
Signed-off-by: Eric Dumazet <edumazet@google.com>
Cc: Yuchung Cheng <ycheng@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Iliyan Malchev <malchev@google.com>
Diffstat (limited to 'tools/perf/scripts/python/syscall-counts.py')
0 files changed, 0 insertions, 0 deletions
