diff options
author | Eric Dumazet <edumazet@google.com> | 2013-02-21 13:18:52 +0100 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2013-02-22 00:15:58 +0100 |
commit | 08dcdbf6a7b9d14c2302c5bd0c5390ddf122f664 (patch) | |
tree | fc1d00005fda323296b93064416d255b81fdab73 /include/net/inet_sock.h | |
parent | qlcnic: Bump up the version to 5.1.35 (diff) | |
download | linux-08dcdbf6a7b9d14c2302c5bd0c5390ddf122f664.tar.xz linux-08dcdbf6a7b9d14c2302c5bd0c5390ddf122f664.zip |
ipv6: use a stronger hash for tcp
It looks like its possible to open thousands of TCP IPv6
sessions on a server, all landing in a single slot of TCP hash
table. Incoming packets have to lookup sockets in a very
long list.
We should hash all bits from foreign IPv6 addresses, using
a salt and hash mix, not a simple XOR.
inet6_ehashfn() can also separately use the ports, instead
of xoring them.
Reported-by: Neal Cardwell <ncardwell@google.com>
Signed-off-by: Eric Dumazet <edumazet@google.com>
Cc: Yuchung Cheng <ycheng@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'include/net/inet_sock.h')
-rw-r--r-- | include/net/inet_sock.h | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/include/net/inet_sock.h b/include/net/inet_sock.h index a4196cbc84ec..7235ae73a1e8 100644 --- a/include/net/inet_sock.h +++ b/include/net/inet_sock.h @@ -203,6 +203,7 @@ static inline void inet_sk_copy_descendant(struct sock *sk_to, extern int inet_sk_rebuild_header(struct sock *sk); extern u32 inet_ehash_secret; +extern u32 ipv6_hash_secret; extern void build_ehash_secret(void); static inline unsigned int inet_ehashfn(struct net *net, |