[<prev] [next>] [day] [month] [year] [list]
Message-Id: <201309030742.r837gW70012541@bldhmenny.dell-idc.com>
Date: Tue, 3 Sep 2013 10:42:32 +0300
From: Menny Hamburger <Menny_Hamburger@...l.com>
To: linux-kernel@...r.kernel.org
Subject: [PATCH 2/4] Per IP network statistics: hash table implementation
diff -r -U 4 a/include/linux/sysctl.h b/include/linux/sysctl.h
--- a/include/linux/sysctl.h 2013-09-02 12:44:17.415733555 +0300
+++ b/include/linux/sysctl.h 2013-09-02 12:44:17.537622128 +0300
@@ -436,8 +436,16 @@
NET_TCP_FRTO_RESPONSE=125,
#ifdef CONFIG_NET_IPV4_SNMP_MAPPING
NET_IPV4_SNMP_MAP_LEVEL=150,
#endif
+#ifdef CONFIG_NET_IPV4_STAT_HASHTABLES
+ NET_IPV4_STAT_HASHTABLE_ENABLE=151,
+ NET_IPV4_STAT_HASHTABLE_DEBUG_LEVEL=152,
+ NET_IPV4_STAT_HASHTABLE_LOOPBACK=153,
+ NET_IPV4_STAT_HASHTABLE_DELETE=154,
+ NET_IPV4_STAT_HASHTABLE_ZERO=155,
+ NET_IPV4_STAT_HASHTABLE_MAX=156,
+#endif
};
enum {
NET_IPV4_ROUTE_FLUSH=1,
@@ -592,8 +600,13 @@
NET_IPV6_RTR_PROBE_INTERVAL=21,
NET_IPV6_ACCEPT_RA_RT_INFO_MAX_PLEN=22,
NET_IPV6_PROXY_NDP=23,
NET_IPV6_ACCEPT_SOURCE_ROUTE=25,
+#ifdef CONFIG_IPV6_STAT_HASHTABLES
+ NET_IPV6_STAT_HASHTABLE_ENABLE=50,
+ NET_IPV6_STAT_HASHTABLE_DELETE=51,
+ NET_IPV6_STAT_HASHTABLE_ZERO=52,
+#endif
__NET_IPV6_MAX
};
/* /proc/sys/net/ipv6/icmp */
diff -r -U 4 a/include/net/stat_hashtable_cookie.h b/include/net/stat_hashtable_cookie.h
--- a/include/net/stat_hashtable_cookie.h 2013-09-02 12:44:17.425622445 +0300
+++ b/include/net/stat_hashtable_cookie.h 2013-09-02 12:44:17.553639794 +0300
@@ -0,0 +1,67 @@
+#ifndef _STAT_HASHTABLE_COOKIE_H
+#define _STAT_HASHTABLE_COOKIE_H
+
+#ifdef CONFIG_NET_IPV4_STAT_HASHTABLES
+
+struct stat_hash_cookie {
+ struct {
+ u16 family;
+ u16 bucket;
+ } hash;
+ atomic_t seq;
+};
+
+static inline void
+stat_hash_init_cookie(struct stat_hash_cookie *cookie)
+{
+ memset(cookie, 0, sizeof(struct stat_hash_cookie));
+}
+
+#define STAT_INIT_COOKIE(cookie) stat_hash_init_cookie(cookie)
+
+static inline void
+stat_hash_copy_cookie(struct stat_hash_cookie *tgt, struct stat_hash_cookie *src)
+{
+ memcpy(tgt, src, sizeof(struct stat_hash_cookie));
+}
+
+static inline void
+stat_hash_copy_cookie_atomic(struct stat_hash_cookie *tgt, struct stat_hash_cookie *src)
+{
+ tgt->hash.family = src->hash.family;
+ tgt->hash.bucket = src->hash.bucket;
+ smp_mb();
+ atomic_set(&tgt->seq, src->seq.counter);
+ smp_mb();
+}
+
+#define STAT_COOKIE_POLLUTE_NOENT (INT_MAX)
+
+static inline bool
+stat_hash_cookie_useable(struct stat_hash_cookie *cookie)
+{
+ u32 value = ((cookie != NULL) ? cookie->seq.counter : 0);
+
+ return (value && (value != STAT_COOKIE_POLLUTE_NOENT));
+}
+
+static inline void
+stat_hash_cookie_pollute(struct stat_hash_cookie *cookie, int code)
+{
+ smp_mb();
+ atomic_set(&cookie->seq, code);
+ smp_mb();
+}
+
+/* We use memory barriers to setup the cookie so we don't have to use atomics (locking) */
+#define STAT_COOKIE_EMPTY(cookie) \
+ ((cookie)->seq.counter == 0)
+
+#else
+
+#define STAT_INIT_COOKIE(cookie)
+
+#endif
+
+#endif
+
diff -r -U 4 a/include/net/stat_hashtable.h b/include/net/stat_hashtable.h
--- a/include/net/stat_hashtable.h 2013-09-02 12:44:17.432630047 +0300
+++ b/include/net/stat_hashtable.h 2013-09-02 12:44:17.569622398 +0300
@@ -0,0 +1,565 @@
+/*
+ * Per-ip statistics hashtable implmentation
+ *
+ * Menny Hamburger<menny_hamburger@...l.com>
+ */
+
+#ifndef _STAT_HASHMAP_H
+#define _STAT_HASHMAP_H
+
+#ifdef CONFIG_NET_IPV4_STAT_HASHTABLES
+
+#include <linux/jhash.h>
+#include <net/snmp_map.h>
+#include <net/stat_hashtable_cookie.h>
+
+
+extern bool stat_hash_data_collection_started;
+extern int stat_hash_start_data_collection(void);
+extern void stat_hash_stop_data_collection(void);
+
+/*
+ * Macros used for updating the statistics counters by use of a previousely stored cookie.
+ * Use of a cookie reduces CPU cycles by eliminating the need to call jhash when we need to update the counters
+ * contained in a hashtable entry (the cookie includes the bucket in which the entry is stored).
+ */
+#define MAP_FROM_COOKIE(cookie, m, field) \
+ struct snmp_mib_map *map = ((stat_hash_cookie_useable(cookie) ? stat_hash_##m##_ptr(cookie, field) : NULL))
+
+
+#define SNMP_INC_STATS_HASH_BH(cookie, m, field) \
+ do { \
+ MAP_FROM_COOKIE(cookie, m, field); \
+ SNMP_INC_STATS_MAPPING_BH(map, field); \
+ } while (0)
+#define SNMP_INC_STATS_HASH_USER(cookie, m, field) \
+ do { \
+ MAP_FROM_COOKIE(cookie, m, field); \
+ SNMP_INC_STATS_MAPPING_USER(map, field); \
+ } while (0)
+#define SNMP_INC_STATS_HASH(cookie, m, field) \
+ do { \
+ MAP_FROM_COOKIE(cookie, m, field); \
+ SNMP_INC_STATS_MAPPING(map, field); \
+ } while (0)
+#define SNMP_DEC_STATS_HASH(cookie, m, field) \
+ do { \
+ MAP_FROM_COOKIE(cookie, m, field); \
+ SNMP_DEC_STATS_MAPPING(map, field); \
+ } while (0)
+#define SNMP_ADD_STATS_HASH(cookie, m, field, addend) \
+ do { \
+ MAP_FROM_COOKIE(cookie, m, field); \
+ SNMP_ADD_STATS_MAPPING(map, field, addend); \
+ } while (0)
+#define SNMP_ADD_STATS_HASH_BH(cookie, m, field, addend) \
+ do { \
+ MAP_FROM_COOKIE(cookie, m, field); \
+ SNMP_ADD_STATS_MAPPING_BH(map, field, addend); \
+ } while (0)
+#define SNMP_ADD_STATS_HASH_USER(cookie, m, field, addend) \
+ do { \
+ MAP_FROM_COOKIE(cookie, m, field); \
+ SNMP_ADD_STATS_MAPPING_USER(map, field, addend); \
+ } while (0)
+
+/*
+ * Address definitions used for accessing the hash table.
+ * The address is used both when inserting a new entry into the hash (supplying a cookie to the caller),
+ * or when we need to update the counters contained in a hash entry and don't have a cookie.
+ */
+union stat_hash_inet_addr {
+ __be32 ip;
+ struct in_addr in;
+ __be32 ip6[4];
+ struct in6_addr in6;
+};
+
+struct stat_hash_addr {
+ u16 family;
+ union stat_hash_inet_addr saddr;
+ union stat_hash_inet_addr daddr;
+};
+
+/* Macros used for updating the statistics counters by supplying an address */
+#define MAP_FROM_ADDRESS(initval, addr, m, field) \
+ struct snmp_mib_map *map = stat_hash_##m##_ptr_from_address(initval, addr, field)
+
+#define SNMP_INC_STATS_HASH_ADDR_BH(initval, addr, m, field) \
+ do { \
+ MAP_FROM_ADDRESS(initval, addr, m, field); \
+ SNMP_INC_STATS_MAPPING_BH(map, field); \
+ } while (0)
+#define SNMP_INC_STATS_HASH_ADDR_USER(initval, addr, m, field) \
+ do { \
+ MAP_FROM_ADDRESS(initval, addr, m, field); \
+ SNMP_INC_STATS_MAPPING_USER(map, field); \
+ } while (0)
+#define SNMP_INC_STATS_HASH_ADDR(initval, addr, m, field) \
+ do { \
+ MAP_FROM_ADDRESS(initval, addr, m, field); \
+ SNMP_INC_STATS_MAPPING(map, field); \
+ } while (0)
+#define SNMP_DEC_STATS_HASH_ADDR(initval, addr, m, field) \
+ do { \
+ MAP_FROM_ADDRESS(initval, addr, m, field); \
+ SNMP_DEC_STATS_MAPPING(map, field); \
+ } while (0)
+#define SNMP_ADD_STATS_HASH_ADDR(initval, addr, m, field, addend) \
+ do { \
+ MAP_FROM_ADDRESS(initval, addr, m, field); \
+ SNMP_ADD_STATS_MAPPING(map, field, addend); \
+ } while (0)
+#define SNMP_ADD_STATS_HASH_ADDR_BH(addr, m, field, addend) \
+ do { \
+ MAP_FROM_ADDRESS(initval, addr, m, field); \
+ SNMP_ADD_STATS_MAPPING_BH(map, field, addend); \
+ } while (0)
+#define SNMP_ADD_STATS_HASH_ADDR_USER(initval, addr, m, field, addend) \
+ do { \
+ MAP_FROM_ADDRESS(initval, addr, m, field); \
+ SNMP_ADD_STATS_MAPPING_USER(map, field, addend); \
+ } while (0)
+
+
+/* Available values for state member of stat_hash_entry_mappings */
+enum {
+ STAT_HASH_MAPPING_STATE_NEW,
+ STAT_HASH_MAPPING_STATE_ENTRY,
+ STAT_HASH_MAPPING_STATE_ALLOCATING,
+ STAT_HASH_MAPPING_STATE_ALLOCATED,
+};
+
+struct stat_hash_entry_mappings;
+/* delayed work section of an entry, used for allocating the per CPU counters lazily if necassary */
+struct state_hash_entry_delayed {
+ struct stat_hash_entry_mappings *mapping;
+ struct delayed_work alloc_work;
+};
+
+/* Data structure for storing counters of single mapping level */
+struct stat_hash_entry_mappings {
+ atomic_t state;
+ /* We are only interested in TCP statistics for now */
+ DEFINE_SNMP_MIB_MAP(struct tcp_mib_map, tcp_stats);
+ DEFINE_SNMP_MIB_MAP(struct linux_mib_map, lnx_stats);
+ struct state_hash_entry_delayed *delayed;
+};
+
+struct stat_hash_entry {
+ struct hlist_node hlist;
+ struct rcu_head rcu;
+
+ /* A sequence number used for identifying the entry using a previousely stored cookie */
+ u32 sequence;
+
+ /* The contained address */
+ struct stat_hash_addr addr;
+
+ /* the actual mappings that countain the per CPU counters for every available SNMP map level */
+ struct stat_hash_entry_mappings mappings[SNMP_MAP_LEVEL_MAX];
+};
+
+struct stat_hash_lookup_info {
+ int len;
+ /*
+ * Sequence number assigned to the entry with the lowest number in the hashtable.
+ * When hashtable is emptied and the entries are deleted using proc interface, this is updated.
+ * If the sequence number specified in a cookie is less than then the value of this, it can only mean
+ * that the hashtable was emptied at at least once (using the proc interface) and the entry we are looking
+ * for does not exist.
+ */
+ u32 first_sequence;
+ struct hlist_head *htable;
+};
+
+enum {
+ STAT_HASH_IPV4_INFO,
+#ifdef CONFIG_IPV6_STAT_HASHTABLES
+ STAT_HASH_IPV6_INFO,
+#endif
+ STAT_HASH_INFO_MAX,
+};
+
+extern struct stat_hash_lookup_info *stat_lookup_info[STAT_HASH_INFO_MAX];
+
+static inline struct stat_hash_lookup_info *
+stat_hash_get_lookup_info(u16 family)
+{
+ struct stat_hash_lookup_info *info = NULL;
+
+ switch (family) {
+ case AF_INET:
+ info = stat_lookup_info[STAT_HASH_IPV4_INFO];
+ break;
+#ifdef CONFIG_IPV6_STAT_HASHTABLES
+ case AF_INET6:
+ info = stat_lookup_info[STAT_HASH_IPV6_INFO];
+ break;
+#endif
+ default:
+ break;
+ }
+
+ return info;
+}
+
+static inline struct snmp_mib_map *
+stat_hash_get_mapping(struct stat_hash_entry_mappings *mapping, u8 mibid)
+{
+ struct snmp_mib_map *map = NULL;
+
+ switch (mibid) {
+ case SNMP_TCP_MIB:
+ map = (struct snmp_mib_map *) &mapping->tcp_stats;
+ break;
+ case SNMP_LINUX_MIB:
+ map = (struct snmp_mib_map *) &mapping->lnx_stats;
+ break;
+ default:
+ break;
+ }
+
+ return map;
+}
+
+static inline bool
+stat_hash_mapping_state_equals(struct stat_hash_entry_mappings *mapping, int state)
+{
+ return (state == atomic_read(&mapping->state));
+}
+
+static inline bool
+stat_hash_mapping_state_equals_nonatomic(struct stat_hash_entry_mappings *mapping, int state)
+{
+ return (state == mapping->state.counter);
+}
+
+static inline bool
+stat_hash_mapping_state(struct stat_hash_entry *entry, int maplvl, int state)
+{
+ return stat_hash_mapping_state_equals(&entry->mappings[maplvl], state);
+}
+
+static inline bool
+stat_hash_mapping_state_nonatomic(struct stat_hash_entry *entry, int maplvl, int state)
+{
+ return stat_hash_mapping_state_equals_nonatomic(&entry->mappings[maplvl], state);
+}
+
+static inline bool
+stat_hash_mapping_allocated(struct stat_hash_entry *entry, int maplvl)
+{
+ return stat_hash_mapping_state(entry, maplvl, STAT_HASH_MAPPING_STATE_ALLOCATED);
+}
+
+/* Non atomic version for use in lookup */
+static inline bool
+stat_hash_mapping_allocated_nonatomic(struct stat_hash_entry *entry, int maplvl)
+{
+ return stat_hash_mapping_state_nonatomic(entry, maplvl, STAT_HASH_MAPPING_STATE_ALLOCATED);
+}
+
+static inline bool
+stat_hash_any_allocated(struct stat_hash_entry *entry)
+{
+ int i;
+
+ for (i = 0; i < SNMP_MAP_LEVEL_MAX; i++) {
+ if (stat_hash_mapping_allocated(entry, i))
+ return true;
+ }
+
+ return false;
+}
+
+/*
+ * Lookup function for accessing a hash entry using a previousely stored cookie.
+ * This is the preferred method for accessing the hashtables and should be used always
+ * unless we don't have access to a cookie.
+ */
+static inline struct snmp_mib_map *
+stat_hash_lookup_by_cookie(struct stat_hash_cookie *cookie, u8 mibid, u8 field)
+{
+ struct stat_hash_lookup_info *info;
+ struct stat_hash_entry *entry = NULL;
+ struct hlist_head *head;
+ struct hlist_node *pos;
+
+ info = stat_hash_get_lookup_info(cookie->hash.family);
+ if (info == NULL)
+ return NULL;
+
+ /*
+ * If the requested entry was deleted from the hashtable, we want the container to stop using the cookie for looking up
+ * the hash entry, or in other words we want to pollute the cookie so it will no longer be used.
+ */
+ if (cookie->seq.counter < info->first_sequence) {
+ stat_hash_cookie_pollute(cookie, STAT_COOKIE_POLLUTE_NOENT);
+ return NULL;
+ }
+
+ head = &info->htable[cookie->hash.bucket];
+ hlist_for_each_entry_rcu(entry, pos, head, hlist) {
+ if (entry->sequence == cookie->seq.counter) {
+ int maplvl = snmp_map_get_map_level(mibid, field);
+ if ((maplvl != SNMP_MAP_UNMAPPED) && stat_hash_mapping_allocated_nonatomic(entry, maplvl)) {
+ return stat_hash_get_mapping(&entry->mappings[maplvl], mibid);
+ }
+ }
+ }
+
+ return NULL;
+}
+
+
+/*************************************************************************************
+ * Helper functions for looking up an entry in the hashtable by address
+ *************************************************************************************/
+
+
+static inline u16 stat4_ehashfn(u16 sz, u32 initval, struct stat_hash_addr *addr)
+{
+ return jhash_2words(addr->saddr.ip, addr->daddr.ip, initval) & (sz - 1);
+}
+
+
+static inline void
+stat4_reverse_address(struct stat_hash_addr *tgt, struct stat_hash_addr *src)
+{
+ tgt->saddr.ip = src->daddr.ip;
+ tgt->daddr.ip = src->saddr.ip;
+}
+
+static inline bool
+stat4_compare_entry_addr(struct stat_hash_entry *entry, struct stat_hash_addr *addr)
+{
+ return (entry->addr.saddr.ip == addr->saddr.ip) && (entry->addr.daddr.ip == addr->daddr.ip);
+}
+
+#ifdef CONFIG_IPV6_STAT_HASHTABLES
+static inline u16
+stat6_ehashfn(u16 sz, u32 initval, struct stat_hash_addr *addr)
+{
+ u32 key[4];
+
+ key[0] = (__force u32)(&addr->saddr.in6)->s6_addr32[2];
+ key[1] = (__force u32)(&addr->saddr.in6)->s6_addr32[3];
+ key[2] = (__force u32)(&addr->daddr.in6)->s6_addr32[2];
+ key[3] = (__force u32)(&addr->daddr.in6)->s6_addr32[3];
+
+ return jhash2(key, 4, initval) & (sz - 1);
+}
+
+static inline void
+stat6_reverse_address(struct stat_hash_addr *tgt, struct stat_hash_addr *src)
+{
+ ipv6_addr_copy(&tgt->saddr.in6, &src->daddr.in6);
+ ipv6_addr_copy(&tgt->daddr.in6, &src->saddr.in6);
+}
+
+static inline bool
+stat6_compare_entry_addr(struct stat_hash_entry *entry, struct stat_hash_addr *addr)
+{
+ return ((ipv6_addr_equal(&entry->addr.saddr.in6, &addr->saddr.in6) &&
+ ipv6_addr_equal(&entry->addr.daddr.in6, &addr->daddr.in6)));
+}
+#endif
+
+static inline u16
+stat_hash_bucket(int len, u32 initval, struct stat_hash_addr *addr)
+{
+ if (addr->family == AF_INET)
+ return stat4_ehashfn(len, initval, addr);
+#ifdef CONFIG_IPV6_STAT_HASHTABLES
+ else
+ return stat6_ehashfn(len, initval, addr);
+#endif
+}
+
+static inline bool
+stat_hash_match(struct stat_hash_entry *entry, struct stat_hash_addr *addr)
+{
+ if (addr->family == AF_INET)
+ return stat4_compare_entry_addr(entry, addr);
+#ifdef CONFIG_IPV6_STAT_HASHTABLES
+ else
+ return stat6_compare_entry_addr(entry, addr);
+#endif
+}
+
+static inline void
+stat_hash_reverse_address(struct stat_hash_addr *tgt, struct stat_hash_addr *src)
+{
+ tgt->family = src->family;
+ if (src->family == AF_INET)
+ stat4_reverse_address(tgt, src);
+#ifdef CONFIG_IPV6_STAT_HASHTABLES
+ else
+ stat6_reverse_address(tgt, src);
+#endif
+}
+
+static inline struct stat_hash_entry *
+stat_hash_lookup_addr(u32 initval, struct stat_hash_addr *addr, u16 *bucket_in)
+{
+ struct stat_hash_lookup_info *info;
+ struct hlist_head *head;
+ struct hlist_node *pos;
+ struct stat_hash_entry *entry;
+ struct stat_hash_addr raddr;
+ u16 bucket;
+
+ info = stat_hash_get_lookup_info(addr->family);
+ if (info == NULL)
+ return NULL;
+
+ bucket = stat_hash_bucket(info->len, initval, addr);
+ if (bucket_in != NULL)
+ *bucket_in = bucket;
+
+ head = &info->htable[bucket];
+ hlist_for_each_entry_rcu(entry, pos, head, hlist) {
+ if (stat_hash_match(entry, addr))
+ return entry;
+ }
+
+ /* There is a single hash entry for both in and out traffic */
+ stat_hash_reverse_address(&raddr, addr);
+ bucket = stat_hash_bucket(info->len, initval, &raddr);
+ if (bucket_in != NULL)
+ *bucket_in = bucket;
+
+ head = &info->htable[bucket];
+ hlist_for_each_entry_rcu(entry, pos, head, hlist) {
+ if (stat_hash_match(entry, &raddr))
+ return entry;
+ }
+
+ return NULL;
+}
+
+
+
+/*
+ * Lookup function for accessing a hash entry using an address.
+ * This method uses jhash for recomputing the hash bucket using a suppliyed address,
+ * thus tskes some more cpu and should only be used if we don't have a cookie to work with.
+ */
+static inline struct snmp_mib_map *
+stat_hash_lookup_by_address(int initval, struct stat_hash_addr *addr, u8 mibid, u8 field)
+{
+ struct stat_hash_entry *entry = NULL;
+
+ entry = stat_hash_lookup_addr(initval, addr, NULL);
+ if (entry) {
+ int maplvl = snmp_map_get_map_level(mibid, field);
+ if ((maplvl != SNMP_MAP_UNMAPPED) && stat_hash_mapping_allocated_nonatomic(entry, maplvl)) {
+ return stat_hash_get_mapping(&entry->mappings[maplvl], mibid);
+ }
+ }
+
+ return NULL;
+}
+
+/* Helper function to access specific SNMP MIB statistics in the hash entry by cookie */
+static inline struct snmp_mib_map *
+stat_hash_tcp_stats_ptr(struct stat_hash_cookie *cookie, u8 field)
+{
+ return stat_hash_lookup_by_cookie(cookie, SNMP_TCP_MIB, field);
+}
+
+static inline struct snmp_mib_map *
+stat_hash_lnx_stats_ptr(struct stat_hash_cookie *cookie, u8 field)
+{
+ return stat_hash_lookup_by_cookie(cookie, SNMP_LINUX_MIB, field);
+}
+
+/* Helper function to access specific SNMP MIB statistics in the hash entry by address */
+static inline struct snmp_mib_map *
+stat_hash_tcp_stats_ptr_from_address(int initval, struct stat_hash_addr *addr, u8 field)
+{
+ return stat_hash_lookup_by_address(initval, addr, SNMP_TCP_MIB, field);
+}
+
+static inline struct snmp_mib_map *
+stat_hash_lnx_stats_ptr_from_address(int initval, struct stat_hash_addr *addr, u8 field)
+{
+ return stat_hash_lookup_by_address(initval, addr, SNMP_LINUX_MIB, field);
+}
+
+/* possible flags for alloc_flag argument to stat_hash_get_entry */
+enum {
+ /*
+ * If an entry containing the address does not exists - don't allocate a new one.
+ * If an entry does exists, don't try to add new mapping levels to it (sort of a "read only" flag).
+ */
+ STAT_HASH_ALLOC_FLAG_NOALLOC,
+ /*
+ * If an entry doesn't exists we will allocate it and add it to the hashtable,
+ * where the per CPU counters are allocated for all mappings up to snmp_map_level.
+ * If an entry exists, missing per CPU counters up to snmp_map_level will be allocated.
+ */
+ STAT_HASH_ALLOC_FLAG_ALLOC,
+ /*
+ * If an entry doesn't exists we will allocate it and add it to the hashtable,
+ * where the per CPU counters are allocated for all mappings up to snmp_map_level in delayed work.
+ */
+ STAT_HASH_ALLOC_FLAG_DELAYED_ALLOC,
+};
+
+/*
+ * Main entry point for inserting an entry containing a specified address into the statistics hashtable.
+ * Arguments:
+ * initval: used by jhash
+ * existing: were expecting an entry containing the address to exists, if it doesn't we do not try to allocate insert a new entry.
+ * alloc_flag: used for specifying how an entry per CPU counters should be allocated per mapping level (stat_hash_entry_mappings)
+ * SNMP MIB per CPU counters are allocated with GFP_KERNEL, which is not suitible for allocation inside an atomic context
+ * or spinlock. Instead of revising the infrastructure with an option to allocate the counters with GFP_ATOMIC,
+ * we add an option to allocate the counters lazily using delayed work.
+ */
+struct stat_hash_entry *
+stat_hash_get_entry(u32 initval, struct stat_hash_addr *addr,
+ bool existing, int alloc_flag, struct stat_hash_cookie *cookie);
+
+
+
+
+
+/* Used for printing the IP address for debugging purposes */
+void stat_hash_dump_address(struct stat_hash_addr *addr);
+
+extern int net_stat_hashtable;
+extern int net_stat_hash_loopback;
+extern int net_stat_ipv4_sysctl_hash_delete;
+extern int net_stat_ipv4_sysctl_hash_zero;
+extern int stat_hash_enable_handler(ctl_table *table, int write, void __user *buffer, size_t *length, loff_t *ppos);
+extern int stat_hash_ipv4_delete_hash_handler(ctl_table *table, int write, void __user *buffer, size_t *length, loff_t *ppos);
+extern int stat_hash_ipv4_zero_hash_handler(ctl_table *table, int write, void __user *buffer, size_t *length, loff_t *ppos);
+
+#ifdef CONFIG_IPV6_STAT_HASHTABLES
+extern int net_stat_hashtable_ipv6;
+extern int net_stat_ipv6_sysctl_hash_delete;
+extern int net_stat_ipv6_sysctl_hash_zero;
+extern int stat_hash_ipv6_delete_hash_handler(ctl_table *table, int write, void __user *buffer, size_t *length, loff_t *ppos);
+extern int stat_hash_ipv6_zero_hash_handler(ctl_table *table, int write, void __user *buffer, size_t *length, loff_t *ppos);
+#endif
+
+extern int stat_hash_sysctl_hash_max[STAT_HASH_INFO_MAX];
+
+#ifdef CONFIG_NET_IPV4_STAT_HASHTABLE_DEBUG
+enum {
+ STAT_HASH_MESSAGE_ERROR,
+ STAT_HASH_MESSAGE_WARNING,
+ STAT_HASH_MESSAGE_NOTICE,
+ STAT_HASH_MESSAGE_INFO,
+ STAT_HASH_MESSAGE_DEBUG,
+ STAT_HASH_MESSAGE_DEBUG_VERBOSE,
+};
+
+extern int stat_hash_debug_level;
+#endif
+
+#endif
+
+#endif
diff -r -U 4 a/kernel/sysctl_check.c b/kernel/sysctl_check.c
--- a/kernel/sysctl_check.c 2013-09-02 12:44:17.440680048 +0300
+++ b/kernel/sysctl_check.c 2013-09-02 12:44:17.586622176 +0300
@@ -541,8 +541,11 @@
{ NET_NF_CONNTRACK_FRAG6_TIMEOUT, "nf_conntrack_frag6_timeout" },
{ NET_NF_CONNTRACK_FRAG6_LOW_THRESH, "nf_conntrack_frag6_low_thresh" },
{ NET_NF_CONNTRACK_FRAG6_HIGH_THRESH, "nf_conntrack_frag6_high_thresh" },
{ NET_IPV6_MLD_MAX_MSF, "mld_max_msf" },
+#ifdef CONFIG_NET_IPV4_STAT_HASHTABLES
+ { NET_CORE_STAT_HASHTABLE_IPV6, "stat_hash_ipv6" },
+#endif
{ 2088 /* IPQ_QMAX */, "ip6_queue_maxlen" },
{}
};
diff -r -U 4 a/net/ipv4/Kconfig b/net/ipv4/Kconfig
--- a/net/ipv4/Kconfig 2013-09-02 12:44:17.452622191 +0300
+++ b/net/ipv4/Kconfig 2013-09-02 12:44:17.612729975 +0300
@@ -650,4 +650,23 @@
the counters are allocated per CPU and each counter is 8 bytes.
This feature enables allocation of only a subset of counters from within a stat mib
by defining a mapping between the whole range of counters to a smaller set.
+config NET_IPV4_STAT_HASHTABLES
+ boolean "Define a hash table to hold per-ip IPV4 statistics"
+ depends on NET_IPV4_SNMP_MAPPING
+ default y
+ ---help---
+ Define a hash table to hold per-ip IPV4 statistics
+
+config NET_IPV4_STAT_HASHTABLE_SIZE
+ int "Define size of per-ip statistics hashtable"
+ depends on NET_IPV4_STAT_HASHTABLES
+ default "2048"
+
+config NET_IPV4_STAT_HASHTABLE_DEBUG
+ boolean "Debug statistics hash table functionality"
+ depends on NET_IPV4_STAT_HASHTABLES
+ default n
+ ---help---
+ Debug statistics hash table functionality
+
diff -r -U 4 a/net/ipv4/Makefile b/net/ipv4/Makefile
--- a/net/ipv4/Makefile 2013-09-02 12:44:17.459626370 +0300
+++ b/net/ipv4/Makefile 2013-09-02 12:44:17.636812490 +0300
@@ -52,5 +52,6 @@
obj-$(CONFIG_XFRM) += xfrm4_policy.o xfrm4_state.o xfrm4_input.o \
xfrm4_output.o
obj-$(CONFIG_NET_IPV4_SNMP_MAPPING) += snmp_map.o
+obj-$(CONFIG_NET_IPV4_STAT_HASHTABLES) += stat_hashtable.o
diff -r -U 4 a/net/ipv4/proc.c b/net/ipv4/proc.c
--- a/net/ipv4/proc.c 2013-09-02 12:44:17.467626639 +0300
+++ b/net/ipv4/proc.c 2013-09-02 12:44:17.651769979 +0300
@@ -44,8 +44,12 @@
#include <linux/seq_file.h>
#include <net/sock.h>
#include <net/raw.h>
+#ifdef CONFIG_NET_IPV4_STAT_HASHTABLES
+#include <net/snmp_map.h>
+#endif
+
/*
* Report socket allocation statistics [mea@....fi]
*/
static int sockstat_seq_show(struct seq_file *seq, void *v)
@@ -450,19 +454,43 @@
.llseek = seq_lseek,
.release = single_release_net,
};
+#ifdef CONFIG_NET_IPV4_STAT_HASHTABLES
+extern int show_hash4_info(struct seq_file *, void *v);
+
+static int stat4_open(struct inode *inode, struct file *file)
+{
+ return single_open(file, show_hash4_info, NULL);
+}
+
+static const struct file_operations stat4_hash_seq_fops = {
+ .owner = THIS_MODULE,
+ .open = stat4_open,
+ .read = seq_read,
+ .llseek = seq_lseek,
+ .release = single_release,
+};
+#endif
+
static __net_init int ip_proc_init_net(struct net *net)
{
if (!proc_net_fops_create(net, "sockstat", S_IRUGO, &sockstat_seq_fops))
goto out_sockstat;
if (!proc_net_fops_create(net, "netstat", S_IRUGO, &netstat_seq_fops))
goto out_netstat;
if (!proc_net_fops_create(net, "snmp", S_IRUGO, &snmp_seq_fops))
goto out_snmp;
-
+#ifdef CONFIG_NET_IPV4_STAT_HASHTABLES
+ if (!proc_net_fops_create(net, "perip", S_IRUGO, &stat4_hash_seq_fops))
+ goto out_hash;
+#endif
return 0;
+#ifdef CONFIG_NET_IPV4_STAT_HASHTABLES
+out_hash:
+ proc_net_remove(net, "snmp");
+#endif
out_snmp:
proc_net_remove(net, "netstat");
out_netstat:
proc_net_remove(net, "sockstat");
@@ -471,8 +499,11 @@
}
static __net_exit void ip_proc_exit_net(struct net *net)
{
+#ifdef CONFIG_NET_IPV4_STAT_HASHTABLES
+ proc_net_remove(net, "perip");
+#endif
proc_net_remove(net, "snmp");
proc_net_remove(net, "netstat");
proc_net_remove(net, "sockstat");
}
@@ -483,7 +514,11 @@
};
int __init ip_misc_proc_init(void)
{
+#ifdef CONFIG_NET_IPV4_STAT_HASHTABLES
+ snmp_map_register_labels(SNMP_TCP_MIB, snmp4_tcp_list, sizeof(snmp4_tcp_list) / sizeof(struct snmp_mib));
+ snmp_map_register_labels(SNMP_LINUX_MIB, snmp4_net_list, sizeof(snmp4_net_list) / sizeof(struct snmp_mib));
+#endif
return register_pernet_subsys(&ip_proc_ops);
}
diff -r -U 4 a/net/ipv4/stat_hashtable.c b/net/ipv4/stat_hashtable.c
--- a/net/ipv4/stat_hashtable.c 2013-09-02 12:44:17.474632471 +0300
+++ b/net/ipv4/stat_hashtable.c 2013-09-02 12:44:17.667792078 +0300
@@ -0,0 +1,876 @@
+#include <linux/module.h>
+#include <linux/random.h>
+#include <linux/sched.h>
+#include <linux/slab.h>
+#include <linux/wait.h>
+#include <linux/seq_file.h>
+#include <linux/ip.h>
+#include <linux/list.h>
+#include <linux/slab.h>
+#include <linux/socket.h>
+#include <linux/spinlock.h>
+#include <linux/types.h>
+#include <linux/jhash.h>
+#include <linux/bitmap.h>
+#include <linux/kthread.h>
+#ifdef CONFIG_IPV6_STAT_HASHTABLES
+#include <linux/in6.h>
+#include <linux/ipv6.h>
+#include <net/ipv6.h>
+#endif
+
+#include <net/stat_hashtable.h>
+
+int net_stat_hashtable = 1;
+EXPORT_SYMBOL(net_stat_hashtable);
+
+#ifdef CONFIG_NET_IPV4_STAT_HASHTABLE_DEBUG
+int stat_hash_debug_level = 0;
+EXPORT_SYMBOL(stat_hash_debug_level);
+#endif
+
+bool stat_hash_data_collection_started = false;
+EXPORT_SYMBOL(stat_hash_data_collection_started);
+
+int net_stat_hash_loopback = 0;
+int net_stat_ipv4_sysctl_hash_delete;
+int net_stat_ipv4_sysctl_hash_zero;
+
+#ifdef CONFIG_IPV6_STAT_HASHTABLES
+int net_stat_hashtable_ipv6 = 0;
+EXPORT_SYMBOL(net_stat_hashtable_ipv6);
+
+int net_stat_ipv6_sysctl_hash_delete;
+EXPORT_SYMBOL(net_stat_ipv6_sysctl_hash_delete);
+
+int net_stat_ipv6_sysctl_hash_zero;
+EXPORT_SYMBOL(net_stat_ipv6_sysctl_hash_zero);
+#endif
+
+#define STAT_HASH_MAX_DEFAULT 1024
+int stat_hash_sysctl_hash_max[STAT_HASH_INFO_MAX] = {
+ STAT_HASH_MAX_DEFAULT,
+#ifdef CONFIG_IPV6_STAT_HASHTABLES
+ STAT_HASH_MAX_DEFAULT
+#endif
+};
+
+#define STAT_HASH_PREFIX "stat_hash: "
+
+#ifdef CONFIG_NET_IPV4_STAT_HASHTABLE_DEBUG
+#define stat_dprintk(level, format...) \
+ if ((stat_hash_debug_level) >= (level)) \
+ printk(KERN_DEBUG STAT_HASH_PREFIX format)
+#else
+#define stat_dprintk(level, format...)
+#endif
+
+#define atomic_set_mb(v,i) \
+ do { \
+ smp_mb(); \
+ atomic_set(v,i); \
+ smp_mb(); \
+ } while (0)
+
+typedef void (*stat_hash_copy_entry_addr_t)(struct stat_hash_entry *entry, struct stat_hash_addr *addr);
+typedef void (*stat_hash_print_t)(struct stat_hash_addr *addr);
+typedef void (*stat_hash_print_seq_t)(struct seq_file *seq, struct stat_hash_entry *entry);
+
+static void stat_hash_alloc_delayed(struct work_struct *);
+
+struct stat_hash_access_info {
+ spinlock_t lock;
+ atomic_t sequence;
+ atomic_t count;
+ int *max;
+ stat_hash_print_t print;
+ stat_hash_print_seq_t print_seq;
+ stat_hash_copy_entry_addr_t copy;
+ void *lock_bitmap;
+};
+
+static void stat4_copy_entry_addr(struct stat_hash_entry *entry, struct stat_hash_addr *addr);
+static void stat4_dump_address(struct stat_hash_addr *addr);
+static void stat4_dump_entry_address(struct seq_file *seq, struct stat_hash_entry *entry);
+
+#define STAT4_HASH_TABLE_SIZE CONFIG_NET_IPV4_STAT_HASHTABLE_SIZE
+static struct hlist_head stat4_hashtable[STAT4_HASH_TABLE_SIZE];
+static DECLARE_BITMAP(stat4_hashtable_lock_bitmap, STAT4_HASH_TABLE_SIZE);
+static struct stat_hash_access_info stat4_access_info = {
+ .lock = SPIN_LOCK_UNLOCKED,
+ .sequence = ATOMIC_INIT(0),
+ .count = ATOMIC_INIT(0),
+ .max = &stat_hash_sysctl_hash_max[STAT_HASH_IPV4_INFO],
+ .print = stat4_dump_address,
+ .print_seq = stat4_dump_entry_address,
+ .copy = stat4_copy_entry_addr,
+ .lock_bitmap = stat4_hashtable_lock_bitmap,
+};
+
+struct stat_hash_lookup_info stat4_lookup_info = {
+ .len = STAT4_HASH_TABLE_SIZE,
+ .first_sequence = 0,
+ .htable = stat4_hashtable,
+};
+
+#ifdef CONFIG_IPV6_STAT_HASHTABLES
+
+static void stat6_copy_entry_addr(struct stat_hash_entry *entry, struct stat_hash_addr *addr);
+static void stat6_dump_address(struct stat_hash_addr *addr);
+static void stat6_dump_entry_address(struct seq_file *seq, struct stat_hash_entry *entry);
+
+#define STAT6_HASH_TABLE_SIZE CONFIG_NET_IPV4_STAT_HASHTABLE_SIZE
+static struct hlist_head stat6_hashtable[STAT6_HASH_TABLE_SIZE];
+static DECLARE_BITMAP(stat6_hashtable_lock_bitmap, STAT6_HASH_TABLE_SIZE);
+static struct stat_hash_access_info stat6_access_info = {
+ .lock = SPIN_LOCK_UNLOCKED,
+ .sequence = ATOMIC_INIT(0),
+ .count = ATOMIC_INIT(0),
+ .max = &stat_hash_sysctl_hash_max[STAT_HASH_IPV6_INFO],
+ .print = stat6_dump_address,
+ .print_seq = stat6_dump_entry_address,
+ .copy = stat6_copy_entry_addr,
+ .lock_bitmap = stat6_hashtable_lock_bitmap,
+};
+
+struct stat_hash_lookup_info stat6_lookup_info = {
+ .len = STAT6_HASH_TABLE_SIZE,
+ .first_sequence = 0,
+ .htable = stat6_hashtable,
+};
+#endif
+
+static struct stat_hash_access_info *stat_access_info[] = {
+ &stat4_access_info,
+#ifdef CONFIG_IPV6_STAT_HASHTABLES
+ &stat6_access_info,
+#endif
+};
+
+struct stat_hash_lookup_info *stat_lookup_info[STAT_HASH_INFO_MAX] = {
+ &stat4_lookup_info,
+#ifdef CONFIG_IPV6_STAT_HASHTABLES
+ &stat6_lookup_info,
+#endif
+};
+EXPORT_SYMBOL(stat_lookup_info);
+
+static inline struct stat_hash_access_info *
+stat_hash_get_access_info(u16 family)
+{
+ struct stat_hash_access_info *info = NULL;
+
+ switch (family) {
+ case AF_INET:
+ info = stat_access_info[STAT_HASH_IPV4_INFO];
+ break;
+#ifdef CONFIG_IPV6_STAT_HASHTABLES
+ case AF_INET6:
+ info = stat_access_info[STAT_HASH_IPV6_INFO];
+ break;
+#endif
+ default:
+ stat_dprintk(STAT_HASH_MESSAGE_NOTICE, "unsupported family %d\n", family);
+ break;
+ }
+
+ return info;
+}
+
+static inline int
+stat_hash_get_info(u16 family, struct stat_hash_access_info **access_info,
+ struct stat_hash_lookup_info **lookup_info)
+{
+ struct stat_hash_access_info *a = stat_hash_get_access_info(family);
+ struct stat_hash_lookup_info *l = stat_hash_get_lookup_info(family);
+
+ if (a == NULL || l == NULL)
+ return -EINVAL;
+
+ *access_info = a;
+ *lookup_info = l;
+
+ return 0;
+}
+
+static void stat_destroy(struct stat_hash_entry *entry);
+
+/*
+ * Helper functions shared by both ipv4 and ipv6
+ */
+static struct stat_hash_entry *
+__alloc_stat_entry(void)
+{
+ struct stat_hash_entry *entry = NULL;
+ int err, i;
+
+ entry = kzalloc(sizeof(*entry), GFP_ATOMIC);
+ if (entry == NULL) {
+ printk(KERN_NOTICE STAT_HASH_PREFIX "OOM while allocating a new hash entry\n");
+ err = -ENOMEM;
+ goto out;
+ }
+
+ INIT_RCU_HEAD(&entry->rcu);
+
+ for (i = 0; i < SNMP_MAP_LEVEL_MAX; i++) {
+ entry->mappings[i].delayed = kzalloc(sizeof(struct state_hash_entry_delayed), GFP_ATOMIC);
+ if (entry->mappings[i].delayed == NULL) {
+ printk(KERN_NOTICE STAT_HASH_PREFIX "OOM while allocating delayed work section for a new hash entry\n");
+ err = -ENOMEM;
+ goto out_destroy;
+ }
+ entry->mappings[i].state.counter = STAT_HASH_MAPPING_STATE_ENTRY;
+ entry->mappings[i].delayed->mapping = &entry->mappings[i];
+ INIT_DELAYED_WORK(&entry->mappings[i].delayed->alloc_work, stat_hash_alloc_delayed);
+ }
+
+ return entry;
+
+out_destroy:
+ for (i = 0; i < SNMP_MAP_LEVEL_MAX; i++) {
+ if (entry->mappings[i].delayed != NULL)
+ kfree(entry->mappings[i].delayed);
+ }
+ kfree(entry);
+out:
+ return ERR_PTR(err);
+}
+
+static int
+stat_alloc_mibs(struct stat_hash_entry_mappings *mapping)
+{
+ int err, maplvl;
+ struct stat_hash_entry *entry;
+
+ maplvl = mapping->tcp_stats.maplvl;
+ entry = container_of(mapping, struct stat_hash_entry, mappings[maplvl]);
+
+ if ((err = snmp_map_mib_init((struct snmp_mib_map *) &mapping->tcp_stats)) < 0)
+ goto out_err;
+
+ if ((err = snmp_map_mib_init((struct snmp_mib_map *) &mapping->lnx_stats)) < 0)
+ goto out_free_tcp_mib;
+
+ stat_dprintk(STAT_HASH_MESSAGE_INFO, "mapping %d has been allocated for entry sequence %d\n",
+ maplvl, entry->sequence);
+
+ return 0;
+
+out_free_tcp_mib:
+ snmp_map_mib_free((struct snmp_mib_map *) &mapping->tcp_stats);
+out_err:
+
+ return err;
+}
+
+static void
+stat_free_mibs(struct stat_hash_entry *entry)
+{
+ int i;
+
+ for (i = SNMP_MAP_LEVEL_MAX - 1; i > 0; i--) {
+ smp_mb();
+ if (atomic_cmpxchg(&entry->mappings[i].state, STAT_HASH_MAPPING_STATE_ALLOCATED,
+ STAT_HASH_MAPPING_STATE_ENTRY) == STAT_HASH_MAPPING_STATE_ALLOCATED) {
+ smp_mb();
+ snmp_map_mib_free((struct snmp_mib_map *) &entry->mappings[i].tcp_stats);
+ snmp_map_mib_free((struct snmp_mib_map *) &entry->mappings[i].lnx_stats);
+ }
+ }
+}
+
+static int
+stat_hash_alloc_counters(struct stat_hash_entry_mappings *mapping)
+{
+ int err;
+
+ if ((err = stat_alloc_mibs(mapping)) < 0)
+ return err;
+
+ /* We don't need the delayed allocation stuff any more */
+ kfree(mapping->delayed);
+ mapping->delayed = NULL;
+
+ atomic_set_mb(&mapping->state, STAT_HASH_MAPPING_STATE_ALLOCATED);
+
+ return 0;
+}
+
+#define STAT_DELAYED_ALLOC_PERIOD ((2 * HZ)/3)
+static void
+stat_hash_alloc_delayed(struct work_struct *work)
+{
+ int err, maplvl;
+ struct stat_hash_entry *entry;
+ struct state_hash_entry_delayed *delayed = container_of(work, struct state_hash_entry_delayed, alloc_work.work);
+ struct stat_hash_entry_mappings *mapping = delayed->mapping;
+
+ maplvl = mapping->tcp_stats.maplvl;
+ entry = container_of(mapping, struct stat_hash_entry, mappings[maplvl]);
+
+ stat_dprintk(STAT_HASH_MESSAGE_INFO, "proccessing delayed allocation for entry sequence %d, mapping %d\n",
+ entry->sequence, maplvl);
+
+ if ((err = stat_hash_alloc_counters(mapping)) < 0) {
+ printk(KERN_NOTICE STAT_HASH_PREFIX "error %d while allocating mapping %d for entry sequence %d\n",
+ err, maplvl, entry->sequence);
+
+ atomic_set_mb(&mapping->state, STAT_HASH_MAPPING_STATE_ENTRY);
+ }
+}
+
+static int
+stat_hash_alloc_mappings(struct stat_hash_entry *entry, int alloc_flag)
+{
+ int err = 0, i, map_level = snmp_map_level, again = 0;
+ struct stat_hash_entry_mappings *mapping;
+
+ for (i = 0; i <= map_level; i++) {
+ mapping = &entry->mappings[i];
+ smp_mb();
+ if (atomic_cmpxchg(&mapping->state, STAT_HASH_MAPPING_STATE_ENTRY,
+ STAT_HASH_MAPPING_STATE_ALLOCATING) == STAT_HASH_MAPPING_STATE_ENTRY) {
+ smp_mb();
+ if (alloc_flag == STAT_HASH_ALLOC_FLAG_ALLOC) {
+ if ((err = stat_hash_alloc_counters(mapping)) < 0)
+ goto out_rollback;
+ } else {
+ stat_dprintk(STAT_HASH_MESSAGE_INFO, "scheduled delayed allocation for entry sequence %d, mapping %d\n",
+ entry->sequence, i);
+
+ schedule_delayed_work(&mapping->delayed->alloc_work, STAT_DELAYED_ALLOC_PERIOD);
+ }
+ } else {
+ again = 1;
+ continue;
+ }
+ }
+
+ return ((again) ? -EAGAIN : err);
+
+out_rollback:
+ atomic_set_mb(&mapping->state, STAT_HASH_MAPPING_STATE_ENTRY);
+
+ printk(KERN_NOTICE STAT_HASH_PREFIX "error %d while allocating mapping %d for entry sequence %d\n",
+ err, i, entry->sequence);
+
+ return err;
+}
+
+static int
+stat_hash_init_mappings(struct stat_hash_entry *entry)
+{
+ int err = 0, i;
+ struct stat_hash_entry_mappings *mapping;
+
+ for (i = 0; i < SNMP_MAP_LEVEL_MAX; i++) {
+ mapping = &entry->mappings[i];
+ if ((err = snmp_map_init_map(i, SNMP_TCP_MIB, (struct snmp_mib_map *) &mapping->tcp_stats)) < 0)
+ break;
+
+ if ((err = snmp_map_init_map(i, SNMP_LINUX_MIB, (struct snmp_mib_map *) &mapping->lnx_stats)) < 0)
+ break;
+ }
+
+ if (err != 0)
+ printk(KERN_NOTICE STAT_HASH_PREFIX "error %d while initializing mapping %d for new entry\n",
+ err, i);
+
+ return err;
+}
+
+static struct stat_hash_cookie *
+stat_fill_cookie(struct stat_hash_entry *entry, u16 family, u16 bucket, struct stat_hash_cookie *cookie)
+{
+ if (cookie != NULL) {
+ cookie->hash.family = family;
+ cookie->hash.bucket = bucket;
+ atomic_set_mb(&cookie->seq, entry->sequence);
+ }
+
+ return cookie;
+}
+
+/*
+ * IPV4 stat hashtable
+ */
+static void
+stat4_copy_entry_addr(struct stat_hash_entry *entry, struct stat_hash_addr *addr)
+{
+ entry->addr.family = addr->family;
+ entry->addr.saddr.ip = addr->saddr.ip;
+ entry->addr.daddr.ip = addr->daddr.ip;
+}
+
+static void
+stat4_dump_address(struct stat_hash_addr *addr)
+{
+ printk(KERN_NOTICE STAT_HASH_PREFIX "IPV4 address pair: %pI4, %pI4\n", &addr->saddr, &addr->daddr);
+}
+
+static void
+stat4_dump_entry_address(struct seq_file *seq, struct stat_hash_entry *entry)
+{
+ seq_printf(seq, "%pI4, %pI4", &entry->addr.saddr, &entry->addr.daddr);
+}
+
+#ifdef CONFIG_IPV6_STAT_HASHTABLES
+static void
+stat6_copy_entry_addr(struct stat_hash_entry *entry, struct stat_hash_addr *addr)
+{
+ entry->addr.family = addr->family;
+ ipv6_addr_copy(&entry->addr.saddr.in6, &addr->saddr.in6);
+ ipv6_addr_copy(&entry->addr.daddr.in6, &addr->daddr.in6);
+}
+
+static void
+stat6_dump_address(struct stat_hash_addr *addr)
+{
+ printk(KERN_NOTICE STAT_HASH_PREFIX "IPV6 addresss pair: %pI6, %pI6\n", &addr->saddr.in6, &addr->daddr.in6);
+}
+
+static void
+stat6_dump_entry_address(struct seq_file *seq, struct stat_hash_entry *entry)
+{
+ seq_printf(seq, "%pI6, %pI6", &entry->addr.saddr.in6, &entry->addr.daddr.in6);
+}
+#endif
+
+static struct stat_hash_entry *
+stat_hash_alloc_entry(u32 initval, struct stat_hash_addr *addr)
+{
+ struct stat_hash_entry *entry = NULL;
+ struct stat_hash_access_info *access_info;
+ struct stat_hash_lookup_info *lookup_info;
+
+ if (stat_hash_get_info(addr->family, &access_info, &lookup_info) < 0)
+ return NULL;
+
+ entry = __alloc_stat_entry();
+ if (entry && !IS_ERR(entry)) {
+ entry->sequence = atomic_inc_return(&access_info->sequence);
+ access_info->copy(entry, addr);
+ }
+
+ return entry;
+}
+
+static bool
+stat_hash_all_processed_allocate(struct stat_hash_entry *entry)
+{
+ int i, map_level = snmp_map_level;
+
+ for (i = 0; i < map_level; i++) {
+ if (!stat_hash_mapping_state(entry, i, STAT_HASH_MAPPING_STATE_ALLOCATING) ||
+ !stat_hash_mapping_state(entry, i, STAT_HASH_MAPPING_STATE_ALLOCATED))
+ return false;
+ }
+
+ return true;
+}
+
+struct stat_hash_entry *
+stat_hash_get_entry(u32 initval, struct stat_hash_addr *addr,
+ bool existing, int alloc_flag, struct stat_hash_cookie *cookie)
+{
+ struct stat_hash_access_info *access_info = NULL;
+ struct stat_hash_lookup_info *lookup_info = NULL;
+ struct stat_hash_entry *entry = NULL;
+ u16 bucket = 0;
+ int err;
+
+ if (stat_hash_get_info(addr->family, &access_info, &lookup_info) < 0)
+ return NULL;
+
+ /* Fail here if we are looking for an existing entry and it does not exists */
+ entry = stat_hash_lookup_addr(initval, addr, &bucket);
+
+
+ if (existing && (entry == NULL)) {
+ stat_dprintk(STAT_HASH_MESSAGE_DEBUG, "hash entry does not exist - unable to reuse\n");
+ return NULL;
+ }
+
+ /*
+ * If we find an entry reuse it, possibly allocating additional map levels.
+ */
+ if (entry != NULL) {
+ stat_fill_cookie(entry, addr->family, bucket, cookie);
+ stat_dprintk(STAT_HASH_MESSAGE_DEBUG, "reusining entry (family = %d, bucket = %d, sequence = %d)\n",
+ cookie->hash.family, cookie->hash.bucket, entry->sequence);
+
+ if (!stat_hash_all_processed_allocate(entry)) {
+ if ((err = stat_hash_alloc_mappings(entry, alloc_flag)) < 0) {
+ if (err == -EAGAIN) {
+ stat_dprintk(STAT_HASH_MESSAGE_DEBUG, "mapping not in correct state for alloc (family = %d, bucket = %d, sequence = %d)\n",
+ cookie->hash.family, cookie->hash.bucket, entry->sequence);
+ } else {
+ stat_dprintk(STAT_HASH_MESSAGE_NOTICE, "error %d while allocating mapping (family = %d, bucket = %d, sequence = %d)\n",
+ err, cookie->hash.family, cookie->hash.bucket, entry->sequence);
+ }
+ }
+ }
+
+ return entry;
+ }
+
+ /* we cannot allocate a new entry - bail out */
+ if (alloc_flag == STAT_HASH_ALLOC_FLAG_NOALLOC) {
+ stat_dprintk(STAT_HASH_MESSAGE_INFO, "cannot allocate a new entry at this stage\n");
+ return NULL;
+ }
+
+ if (atomic_read(&access_info->count) >= *(access_info->max)) {
+ stat_dprintk(STAT_HASH_MESSAGE_NOTICE, "insert failed - reached maximum entry count\n");
+ return NULL;
+ }
+
+ bucket = stat_hash_bucket(lookup_info->len, initval, addr);
+ if (test_and_set_bit(bucket, access_info->lock_bitmap)) {
+ stat_dprintk(STAT_HASH_MESSAGE_INFO, "insert failed - bucket lock held\n");
+ return NULL;
+ }
+
+ /* Allocate a new entry for the supplied address. */
+ entry = stat_hash_alloc_entry(initval, addr);
+ if (IS_ERR(entry))
+ goto err_unlock;
+ else {
+ if ((err = stat_hash_init_mappings(entry)) < 0)
+ goto err_destroy;
+
+ if ((err = stat_hash_alloc_mappings(entry, alloc_flag)) < 0)
+ goto err_destroy;
+
+ stat_fill_cookie(entry, addr->family, bucket, cookie);
+ stat_dprintk(STAT_HASH_MESSAGE_NOTICE, "new entry added (family = %d, bucket = %d, sequence = %d)\n",
+ cookie->hash.family, cookie->hash.bucket, entry->sequence);
+
+#ifdef CONFIG_NET_IPV4_STAT_HASHTABLE_DEBUG
+ if (stat_hash_debug_level >= STAT_HASH_MESSAGE_NOTICE)
+ access_info->print(addr);
+#endif
+ spin_lock(&access_info->lock);
+ hlist_add_head_rcu(&entry->hlist, &lookup_info->htable[bucket]);
+ atomic_inc(&access_info->count);
+ spin_unlock(&access_info->lock);
+ clear_bit(bucket, access_info->lock_bitmap);
+ smp_mb();
+
+ }
+
+ return entry;
+
+err_destroy:
+ kfree(entry);
+err_unlock:
+ clear_bit(bucket, access_info->lock_bitmap);
+ smp_mb();
+
+ return NULL;
+}
+
+void
+stat_hash_dump_address(struct stat_hash_addr *addr)
+{
+ struct stat_hash_access_info *info;
+
+ info = stat_hash_get_access_info(addr->family);
+ if (info == NULL)
+ return;
+
+ info->print(addr);
+}
+
+static void
+stat_destroy_rcu(struct rcu_head *head)
+{
+ struct stat_hash_entry *entry = container_of(head, struct stat_hash_entry, rcu);
+ stat_free_mibs(entry);
+ kfree(entry);
+}
+
+static void
+stat_destroy(struct stat_hash_entry *entry)
+{
+ hlist_del_rcu(&entry->hlist);
+ call_rcu(&entry->rcu, stat_destroy_rcu);
+}
+
+static void
+stat_zero(struct stat_hash_entry *entry, int maplvl)
+{
+ if (stat_hash_mapping_allocated(entry, maplvl)) {
+ snmp_map_mib_zero((struct snmp_mib_map *) &entry->mappings[maplvl].tcp_stats);
+ snmp_map_mib_zero((struct snmp_mib_map *) &entry->mappings[maplvl].lnx_stats);
+ }
+}
+
+static void
+stat_hash_dump_stats(struct seq_file *seq, struct stat_hash_entry *entry)
+{
+ int i, initialized = 0, map_level = snmp_map_level;
+ union snmp_mib_map_bitmaps test_negative;
+
+ if (!stat_hash_any_allocated(entry))
+ return;
+
+ /* Setup counters to be tested for negative value and possibly zeroed prior to display */
+ memset(&test_negative, 0, sizeof(union snmp_mib_map_bitmaps));
+ set_bit(TCP_MIB_CURRESTAB, test_negative.bmap.bitmap);
+
+ for (i = 0; i <= map_level; i++) {
+ if (stat_hash_mapping_allocated(entry, i)) {
+ if (snmp_map_count((struct snmp_mib_map *) &entry->mappings[i].tcp_stats) > 0) {
+ if (0 == initialized++)
+ seq_printf(seq, "Tcp:\n");
+ snmp_map_print_stats(seq, (struct snmp_mib_map *) &entry->mappings[i].tcp_stats, &test_negative);
+ }
+ }
+ }
+ if (initialized > 0)
+ seq_putc(seq, '\n');
+
+ initialized = 0;
+ for (i = 0; i <= map_level; i++) {
+ if (stat_hash_mapping_allocated(entry, i)) {
+ if (snmp_map_count((struct snmp_mib_map *) &entry->mappings[i].lnx_stats) > 0) {
+ if (0 == initialized++)
+ seq_printf(seq, "TcpExt:\n");
+ snmp_map_print_stats(seq, (struct snmp_mib_map *) &entry->mappings[i].lnx_stats, NULL);
+ }
+ }
+ }
+ if (initialized > 0)
+ seq_putc(seq, '\n');
+}
+
+static void
+stat_hash_show_entry(u16 family, struct seq_file *seq, struct stat_hash_entry *entry)
+{
+ struct stat_hash_access_info *info;
+
+ info = stat_hash_get_access_info(family);
+ if (info == NULL)
+ return;
+
+ info->print_seq(seq, entry);
+ seq_printf(seq, ":\n");
+ stat_hash_dump_stats(seq, entry);
+ seq_putc(seq, '\n');
+}
+
+static void
+stat_hash_delete_all(u16 family)
+{
+ struct stat_hash_access_info *access_info;
+ struct stat_hash_lookup_info *lookup_info;
+ struct hlist_head *htable;
+ struct hlist_head *head;
+ struct hlist_node *pos, *n;
+ struct stat_hash_entry *entry;
+ int i;
+
+ if (stat_hash_get_info(family, &access_info, &lookup_info) < 0)
+ return;
+
+ htable = lookup_info->htable;
+
+ spin_lock(&access_info->lock);
+ for (i = 0; i < lookup_info->len; i++) {
+ head = &htable[i];
+ hlist_for_each_entry_safe(entry, pos, n, head, hlist)
+ stat_destroy(entry);
+ }
+ lookup_info->first_sequence = atomic_read(&access_info->sequence);
+ atomic_set_mb(&access_info->count, 0);
+ spin_unlock(&access_info->lock);
+}
+
+static void
+stat_hash_zero_mapping(u16 family, int maplvl)
+{
+ struct stat_hash_access_info *access_info;
+ struct stat_hash_lookup_info *lookup_info;
+ struct hlist_head *htable;
+ struct hlist_head *head;
+ struct hlist_node *pos;
+ struct stat_hash_entry *entry;
+ int i;
+
+ if (stat_hash_get_info(family, &access_info, &lookup_info) < 0)
+ return;
+
+ htable = lookup_info->htable;
+
+ spin_lock(&access_info->lock);
+ for (i = 0; i < lookup_info->len; i++) {
+ head = &htable[i];
+ hlist_for_each_entry(entry, pos, head, hlist)
+ stat_zero(entry, maplvl);
+ }
+ spin_unlock(&access_info->lock);
+}
+
+static void
+stat_hash_iter(u16 family, struct seq_file *seq)
+{
+ struct stat_hash_lookup_info *lookup_info = NULL;
+ struct stat_hash_entry *entry;
+ struct hlist_head *head;
+ struct hlist_node *pos;
+ struct hlist_head *htable;
+ int i;
+
+ lookup_info = stat_hash_get_lookup_info(family);
+ if (lookup_info == NULL)
+ return;
+
+ htable = lookup_info->htable;
+
+ for (i = 0; i < lookup_info->len; i++) {
+ head = &htable[i];
+ hlist_for_each_entry_rcu(entry, pos, head, hlist) {
+ stat_hash_show_entry(family, seq, entry);
+ }
+ }
+}
+
+int
+show_hash4_info(struct seq_file *seq, void *v)
+{
+ stat_hash_iter(AF_INET, seq);
+ return 0;
+}
+
+int
+show_hash6_info(struct seq_file *seq, void *v)
+{
+ stat_hash_iter(AF_INET6, seq);
+ return 0;
+}
+EXPORT_SYMBOL(show_hash6_info);
+
+static int
+stat_hash_delete_hash_handler(u16 family, int *var, ctl_table *table, int write, void __user *buffer, size_t *length, loff_t *ppos)
+{
+ int err = 0;
+
+ if (!write)
+ err = -EINVAL;
+ else {
+ err = proc_dointvec_minmax(table, write, buffer, length, ppos);
+ if (err == 0) {
+ if (*var <= 0) {
+ printk(KERN_WARNING "invalid argument (valid argument > 0)\n");
+ err = -EINVAL;
+ } else
+ stat_hash_delete_all(family);
+ }
+ }
+
+ return err;
+}
+
+int
+stat_hash_ipv4_delete_hash_handler(ctl_table *table, int write, void __user *buffer, size_t *length, loff_t *ppos)
+{
+ return stat_hash_delete_hash_handler(AF_INET, &net_stat_ipv4_sysctl_hash_delete, table, write, buffer, length, ppos);
+}
+
+#ifdef CONFIG_IPV6_STAT_HASHTABLES
+int
+stat_hash_ipv6_delete_hash_handler(ctl_table *table, int write, void __user *buffer, size_t *length, loff_t *ppos)
+{
+ return stat_hash_delete_hash_handler(AF_INET6, &net_stat_ipv6_sysctl_hash_delete, table, write, buffer, length, ppos);
+}
+EXPORT_SYMBOL(stat_hash_ipv6_delete_hash_handler);
+#endif
+
+static int
+stat_hash_zero_hash_handler(u16 family, int *var, ctl_table *table, int write, void __user *buffer, size_t *length, loff_t *ppos)
+{
+ int err = 0;
+
+ if (!write)
+ err = -EINVAL;
+ else {
+ err = proc_dointvec_minmax(table, write, buffer, length, ppos);
+ if (err == 0) {
+ if (*var < 0 || *var >= SNMP_MAP_LEVEL_MAX) {
+ printk(KERN_WARNING "invalid map level (valid argument: %d - %d)\n", 0, SNMP_MAP_LEVEL_MAX - 1);
+ err = -EINVAL;
+ } else
+ stat_hash_zero_mapping(family, *var);
+ }
+ }
+
+ return err;
+}
+
+int
+stat_hash_ipv4_zero_hash_handler(ctl_table *table, int write, void __user *buffer, size_t *length, loff_t *ppos)
+{
+ return stat_hash_zero_hash_handler(AF_INET, &net_stat_ipv4_sysctl_hash_zero, table, write, buffer, length, ppos);
+}
+
+#ifdef CONFIG_IPV6_STAT_HASHTABLES
+int
+stat_hash_ipv6_zero_hash_handler(ctl_table *table, int write, void __user *buffer, size_t *length, loff_t *ppos)
+{
+ return stat_hash_zero_hash_handler(AF_INET6, &net_stat_ipv6_sysctl_hash_zero, table, write, buffer, length, ppos);
+}
+EXPORT_SYMBOL(stat_hash_ipv6_zero_hash_handler);
+#endif
+
+int
+stat_hash_enable_handler(ctl_table *table, int write, void __user *buffer, size_t *length, loff_t *ppos)
+{
+ int err = proc_dointvec_minmax(table, write, buffer, length, ppos);
+ if ((err == 0) && write)
+ smp_mb();
+
+ return err;
+}
+
+int
+stat_hash_start_data_collection(void)
+{
+ int err = 0;
+
+ if (stat_hash_data_collection_started) {
+ printk(KERN_NOTICE STAT_HASH_PREFIX "data collection already started\n");
+ return 0;
+ }
+
+ stat_hash_data_collection_started = true;
+ smp_mb();
+
+ return err;
+}
+EXPORT_SYMBOL(stat_hash_start_data_collection);
+
+void
+stat_hash_stop_data_collection(void)
+{
+ if (!stat_hash_data_collection_started) {
+ printk(KERN_NOTICE STAT_HASH_PREFIX "data collection was not started\n");
+ return;
+ }
+
+ stat_hash_data_collection_started = false;
+ smp_mb();
+}
+EXPORT_SYMBOL(stat_hash_stop_data_collection);
+
+static __init int
+stat_hash_init(void)
+{
+ memset(stat4_hashtable_lock_bitmap, 0, sizeof(stat4_hashtable_lock_bitmap));
+ memset(stat6_hashtable_lock_bitmap, 0, sizeof(stat6_hashtable_lock_bitmap));
+ return 0;
+}
+
+__initcall(stat_hash_init);
+
diff -r -U 4 a/net/ipv4/sysctl_net_ipv4.c b/net/ipv4/sysctl_net_ipv4.c
--- a/net/ipv4/sysctl_net_ipv4.c 2013-09-02 12:44:17.481628441 +0300
+++ b/net/ipv4/sysctl_net_ipv4.c 2013-09-02 12:44:17.687767866 +0300
@@ -825,8 +825,64 @@
.proc_handler = snmp_map_level_handler,
.strategy = &sysctl_intvec,
},
#endif
+#ifdef CONFIG_NET_IPV4_STAT_HASHTABLES
+ {
+ .ctl_name = NET_IPV4_STAT_HASHTABLE_ENABLE,
+ .procname = "perip_stats",
+ .data = &net_stat_hashtable,
+ .maxlen = sizeof(int),
+ .mode = 0644,
+ .proc_handler = stat_hash_enable_handler,
+ .strategy = &sysctl_intvec,
+ },
+#ifdef CONFIG_NET_IPV4_STAT_HASHTABLE_DEBUG
+ {
+ .ctl_name = NET_IPV4_STAT_HASHTABLE_DEBUG_LEVEL,
+ .procname = "perip_stats_debug",
+ .data = &stat_hash_debug_level,
+ .maxlen = sizeof(int),
+ .mode = 0644,
+ .proc_handler = proc_dointvec
+ },
+#endif
+ {
+ .ctl_name = NET_IPV4_STAT_HASHTABLE_LOOPBACK,
+ .procname = "perip_stats_loopback",
+ .data = &net_stat_hash_loopback,
+ .maxlen = sizeof(int),
+ .mode = 0644,
+ .proc_handler = proc_dointvec
+ },
+ {
+ .ctl_name = NET_IPV4_STAT_HASHTABLE_DELETE,
+ .procname = "perip_stats_delete_entries",
+ .data = &net_stat_ipv4_sysctl_hash_delete,
+ .maxlen = sizeof(int),
+ .mode = 0644,
+ .proc_handler = stat_hash_ipv4_delete_hash_handler,
+ .strategy = &sysctl_intvec,
+ },
+ {
+ .ctl_name = NET_IPV4_STAT_HASHTABLE_ZERO,
+ .procname = "perip_stats_zero_counters",
+ .data = &net_stat_ipv4_sysctl_hash_zero,
+ .maxlen = sizeof(int),
+ .mode = 0644,
+ .proc_handler = stat_hash_ipv4_zero_hash_handler,
+ .strategy = &sysctl_intvec,
+ },
+ {
+ .ctl_name = NET_IPV4_STAT_HASHTABLE_MAX,
+ .procname = "perip_stats_max_entries",
+ .data = &stat_hash_sysctl_hash_max,
+ .maxlen = sizeof(stat_hash_sysctl_hash_max),
+ .mode = 0644,
+ .proc_handler = proc_dointvec_minmax,
+ .strategy = &sysctl_intvec,
+ },
+#endif
{ .ctl_name = 0 }
};
static struct ctl_table ipv4_net_table[] = {
diff -r -U 4 a/net/ipv6/Kconfig b/net/ipv6/Kconfig
--- a/net/ipv6/Kconfig 2013-09-02 12:44:17.491622411 +0300
+++ b/net/ipv6/Kconfig 2013-09-02 12:44:17.708919635 +0300
@@ -216,5 +216,12 @@
---help---
Support for IPv6 PIM multicast routing protocol PIM-SMv2.
If unsure, say N.
+config IPV6_STAT_HASHTABLES
+ boolean "Define a hash table to hold per-ip IPV6 statistics"
+ depends on IPV6 && NET_IPV4_STAT_HASHTABLES
+ default y
+ ---help---
+ Define a hash table to hold per-ip IPV6 statistics
+
endif # IPV6
diff -r -U 4 a/net/ipv6/proc.c b/net/ipv6/proc.c
--- a/net/ipv6/proc.c 2013-09-02 12:44:17.498640683 +0300
+++ b/net/ipv6/proc.c 2013-09-02 12:44:17.724867731 +0300
@@ -231,8 +231,25 @@
.llseek = seq_lseek,
.release = single_release,
};
+#ifdef CONFIG_NET_IPV4_STAT_HASHTABLES
+extern int show_hash6_info(struct seq_file *, void *v);
+
+static int stat6_open(struct inode *inode, struct file *file)
+{
+ return single_open(file, show_hash6_info, NULL);
+}
+
+static const struct file_operations stat6_hash_seq_fops = {
+ .owner = THIS_MODULE,
+ .open = stat6_open,
+ .read = seq_read,
+ .llseek = seq_lseek,
+ .release = single_release,
+};
+#endif
+
int snmp6_register_dev(struct inet6_dev *idev)
{
struct proc_dir_entry *p;
struct net *net;
@@ -278,10 +295,20 @@
net->mib.proc_net_devsnmp6 = proc_mkdir("dev_snmp6", net->proc_net);
if (!net->mib.proc_net_devsnmp6)
goto proc_dev_snmp6_fail;
+
+#ifdef CONFIG_NET_IPV4_STAT_HASHTABLES
+ if (!proc_net_fops_create(net, "perip6", S_IRUGO, &stat6_hash_seq_fops))
+ goto proc_hash6_fail;
+#endif
+
return 0;
+#ifdef CONFIG_NET_IPV4_STAT_HASHTABLES
+proc_hash6_fail:
+ proc_net_remove(net, "dev_snmp6");
+#endif
proc_snmp6_fail:
proc_net_remove(net, "sockstat6");
proc_dev_snmp6_fail:
proc_net_remove(net, "dev_snmp6");
@@ -292,8 +319,11 @@
{
proc_net_remove(net, "sockstat6");
proc_net_remove(net, "dev_snmp6");
proc_net_remove(net, "snmp6");
+#ifdef CONFIG_NET_IPV4_STAT_HASHTABLES
+ proc_net_remove(net, "perip6");
+#endif
}
static struct pernet_operations ipv6_proc_ops = {
.init = ipv6_proc_init_net,
diff -r -U 4 a/net/ipv6/reassembly.c b/net/ipv6/reassembly.c
--- a/net/ipv6/reassembly.c 2013-09-02 12:44:17.505628399 +0300
+++ b/net/ipv6/reassembly.c 2013-09-02 12:44:17.741702887 +0300
@@ -53,8 +53,12 @@
#include <net/ndisc.h>
#include <net/addrconf.h>
#include <net/inet_frag.h>
+#ifdef CONFIG_IPV6_STAT_HASHTABLES
+#include <net/ip.h>
+#endif
+
struct ip6frag_skb_cb
{
struct inet6_skb_parm h;
int offset;
@@ -589,8 +593,36 @@
.mode = 0644,
.proc_handler = proc_dointvec_jiffies,
.strategy = sysctl_jiffies,
},
+#ifdef CONFIG_IPV6_STAT_HASHTABLES
+ {
+ .ctl_name = NET_IPV6_STAT_HASHTABLE_ENABLE,
+ .procname = "perip_stats_ipv6",
+ .data = &net_stat_hashtable_ipv6,
+ .maxlen = sizeof(int),
+ .mode = 0644,
+ .proc_handler = proc_dointvec
+ },
+ {
+ .ctl_name = NET_IPV6_STAT_HASHTABLE_DELETE,
+ .procname = "perip_stats_delete_entries",
+ .data = &net_stat_ipv6_sysctl_hash_delete,
+ .maxlen = sizeof(int),
+ .mode = 0644,
+ .proc_handler = stat_hash_ipv6_delete_hash_handler,
+ .strategy = &sysctl_intvec,
+ },
+ {
+ .ctl_name = NET_IPV6_STAT_HASHTABLE_ZERO,
+ .procname = "perip_stats_zero_counters",
+ .data = &net_stat_ipv6_sysctl_hash_zero,
+ .maxlen = sizeof(int),
+ .mode = 0644,
+ .proc_handler = stat_hash_ipv6_zero_hash_handler,
+ .strategy = &sysctl_intvec,
+ },
+#endif
{ }
};
static struct ctl_table ip6_frags_ctl_table[] = {
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists