perf probe: Fix memory leak when synthesizing SDT probes
[linux-2.6-microblaze.git] / net / core / filter.c
index 2ca5eec..255aeee 100644 (file)
@@ -4910,6 +4910,9 @@ static int _bpf_setsockopt(struct sock *sk, int level, int optname,
                                tp->notsent_lowat = val;
                                sk->sk_write_space(sk);
                                break;
+                       case TCP_WINDOW_CLAMP:
+                               ret = tcp_set_window_clamp(sk, val);
+                               break;
                        default:
                                ret = -EINVAL;
                        }
@@ -6995,6 +6998,8 @@ sock_addr_func_proto(enum bpf_func_id func_id, const struct bpf_prog *prog)
                return &bpf_sk_storage_delete_proto;
        case BPF_FUNC_setsockopt:
                switch (prog->expected_attach_type) {
+               case BPF_CGROUP_INET4_BIND:
+               case BPF_CGROUP_INET6_BIND:
                case BPF_CGROUP_INET4_CONNECT:
                case BPF_CGROUP_INET6_CONNECT:
                        return &bpf_sock_addr_setsockopt_proto;
@@ -7003,6 +7008,8 @@ sock_addr_func_proto(enum bpf_func_id func_id, const struct bpf_prog *prog)
                }
        case BPF_FUNC_getsockopt:
                switch (prog->expected_attach_type) {
+               case BPF_CGROUP_INET4_BIND:
+               case BPF_CGROUP_INET6_BIND:
                case BPF_CGROUP_INET4_CONNECT:
                case BPF_CGROUP_INET6_CONNECT:
                        return &bpf_sock_addr_getsockopt_proto;
@@ -10406,6 +10413,24 @@ const struct bpf_func_proto bpf_skc_to_udp6_sock_proto = {
        .ret_btf_id             = &btf_sock_ids[BTF_SOCK_TYPE_UDP6],
 };
 
+BPF_CALL_1(bpf_sock_from_file, struct file *, file)
+{
+       return (unsigned long)sock_from_file(file);
+}
+
+BTF_ID_LIST(bpf_sock_from_file_btf_ids)
+BTF_ID(struct, socket)
+BTF_ID(struct, file)
+
+const struct bpf_func_proto bpf_sock_from_file_proto = {
+       .func           = bpf_sock_from_file,
+       .gpl_only       = false,
+       .ret_type       = RET_PTR_TO_BTF_ID_OR_NULL,
+       .ret_btf_id     = &bpf_sock_from_file_btf_ids[0],
+       .arg1_type      = ARG_PTR_TO_BTF_ID,
+       .arg1_btf_id    = &bpf_sock_from_file_btf_ids[1],
+};
+
 static const struct bpf_func_proto *
 bpf_sk_base_func_proto(enum bpf_func_id func_id)
 {