mirror of
https://github.com/torvalds/linux.git
synced 2026-04-18 06:44:00 -04:00
Use msg->msg_namelen as a place holder instead of a temporary variable, notably in inet[6]_recvmsg(). This removes stack canaries and allows tail-calls. $ scripts/bloat-o-meter -t vmlinux.old vmlinux add/remove: 0/0 grow/shrink: 2/19 up/down: 26/-532 (-506) Function old new delta rawv6_recvmsg 744 767 +23 vsock_dgram_recvmsg 55 58 +3 vsock_connectible_recvmsg 50 47 -3 unix_stream_recvmsg 161 158 -3 unix_seqpacket_recvmsg 62 59 -3 unix_dgram_recvmsg 42 39 -3 tcp_recvmsg 546 543 -3 mptcp_recvmsg 1568 1565 -3 ping_recvmsg 806 800 -6 tcp_bpf_recvmsg_parser 983 974 -9 ip_recv_error 588 576 -12 ipv6_recv_rxpmtu 442 428 -14 udp_recvmsg 1243 1224 -19 ipv6_recv_error 1046 1024 -22 udpv6_recvmsg 1487 1461 -26 raw_recvmsg 465 437 -28 udp_bpf_recvmsg 1027 984 -43 sock_common_recvmsg 103 27 -76 inet_recvmsg 257 175 -82 inet6_recvmsg 257 175 -82 tcp_bpf_recvmsg 663 568 -95 Total: Before=25143834, After=25143328, chg -0.00% Signed-off-by: Eric Dumazet <edumazet@google.com> Reviewed-by: Willem de Bruijn <willemb@google.com> Link: https://patch.msgid.link/20260227151120.1346573-1-edumazet@google.com Signed-off-by: Jakub Kicinski <kuba@kernel.org>
83 lines
2.8 KiB
C
83 lines
2.8 KiB
C
/* SPDX-License-Identifier: GPL-2.0 */
|
|
#ifndef _INET_COMMON_H
|
|
#define _INET_COMMON_H
|
|
|
|
#include <linux/indirect_call_wrapper.h>
|
|
#include <linux/net.h>
|
|
#include <linux/netdev_features.h>
|
|
#include <linux/types.h>
|
|
#include <net/sock.h>
|
|
|
|
extern const struct proto_ops inet_stream_ops;
|
|
extern const struct proto_ops inet_dgram_ops;
|
|
|
|
/*
|
|
* INET4 prototypes used by INET6
|
|
*/
|
|
|
|
struct msghdr;
|
|
struct net;
|
|
struct page;
|
|
struct sock;
|
|
struct socket;
|
|
|
|
int inet_release(struct socket *sock);
|
|
int inet_stream_connect(struct socket *sock, struct sockaddr_unsized *uaddr,
|
|
int addr_len, int flags);
|
|
int __inet_stream_connect(struct socket *sock, struct sockaddr_unsized *uaddr,
|
|
int addr_len, int flags, int is_sendmsg);
|
|
int inet_dgram_connect(struct socket *sock, struct sockaddr_unsized *uaddr,
|
|
int addr_len, int flags);
|
|
int inet_accept(struct socket *sock, struct socket *newsock,
|
|
struct proto_accept_arg *arg);
|
|
void __inet_accept(struct socket *sock, struct socket *newsock,
|
|
struct sock *newsk);
|
|
int inet_send_prepare(struct sock *sk);
|
|
int inet_sendmsg(struct socket *sock, struct msghdr *msg, size_t size);
|
|
void inet_splice_eof(struct socket *sock);
|
|
int inet_recvmsg(struct socket *sock, struct msghdr *msg, size_t size,
|
|
int flags);
|
|
int inet_shutdown(struct socket *sock, int how);
|
|
int inet_listen(struct socket *sock, int backlog);
|
|
int __inet_listen_sk(struct sock *sk, int backlog);
|
|
void inet_sock_destruct(struct sock *sk);
|
|
int inet_bind(struct socket *sock, struct sockaddr_unsized *uaddr, int addr_len);
|
|
int inet_bind_sk(struct sock *sk, struct sockaddr_unsized *uaddr, int addr_len);
|
|
/* Don't allocate port at this moment, defer to connect. */
|
|
#define BIND_FORCE_ADDRESS_NO_PORT (1 << 0)
|
|
/* Grab and release socket lock. */
|
|
#define BIND_WITH_LOCK (1 << 1)
|
|
/* Called from BPF program. */
|
|
#define BIND_FROM_BPF (1 << 2)
|
|
/* Skip CAP_NET_BIND_SERVICE check. */
|
|
#define BIND_NO_CAP_NET_BIND_SERVICE (1 << 3)
|
|
int __inet_bind(struct sock *sk, struct sockaddr_unsized *uaddr, int addr_len,
|
|
u32 flags);
|
|
int inet_getname(struct socket *sock, struct sockaddr *uaddr,
|
|
int peer);
|
|
int inet_ioctl(struct socket *sock, unsigned int cmd, unsigned long arg);
|
|
int inet_ctl_sock_create(struct sock **sk, unsigned short family,
|
|
unsigned short type, unsigned char protocol,
|
|
struct net *net);
|
|
int inet_recv_error(struct sock *sk, struct msghdr *msg, int len);
|
|
|
|
struct sk_buff *inet_gro_receive(struct list_head *head, struct sk_buff *skb);
|
|
int inet_gro_complete(struct sk_buff *skb, int nhoff);
|
|
struct sk_buff *inet_gso_segment(struct sk_buff *skb,
|
|
netdev_features_t features);
|
|
|
|
static inline void inet_ctl_sock_destroy(struct sock *sk)
|
|
{
|
|
if (sk)
|
|
sock_release(sk->sk_socket);
|
|
}
|
|
|
|
#define indirect_call_gro_receive(f2, f1, cb, head, skb) \
|
|
({ \
|
|
unlikely(gro_recursion_inc_test(skb)) ? \
|
|
NAPI_GRO_CB(skb)->flush |= 1, NULL : \
|
|
INDIRECT_CALL_2(cb, f2, f1, head, skb); \
|
|
})
|
|
|
|
#endif
|