[gcc(refs/users/guojiufu/heads/personal-branch)] bpf: more flexible support for kernel helpers
Jiu Fu Guo
guojiufu@gcc.gnu.org
Mon Aug 10 07:43:13 GMT 2020
https://gcc.gnu.org/g:af30b83b50953fbbe671d93d44ea6ac2f7a50ce9
commit af30b83b50953fbbe671d93d44ea6ac2f7a50ce9
Author: Jose E. Marchesi <jose.marchesi@oracle.com>
Date: Thu Aug 6 14:13:59 2020 +0200
bpf: more flexible support for kernel helpers
This patch changes the existing support for BPF kernel helpers to be
more flexible, in two main ways.
First, there is no longer a hardcoded list of kernel helpers defined
in the compiler internals. This is replaced by a new target-specific
attribute `kernel_helper' that the user can use to define her own
helpers, annotating function prototypes.
Second, following feedback from the kernel hackers, the pre-defined
helpers in the distributed bpf-helpers.h are no longer available
conditionally depending on the kernel version used in -mkernel. The
command-line option stays for now, as it may be useful for other
things.
Target tests and documentation updated.
2020-08-06 Jose E. Marchesi <jose.marchesi@oracle.com>
gcc/
* config/bpf/bpf-helpers.h (KERNEL_HELPER): Define.
(KERNEL_VERSION): Remove.
* config/bpf/bpf-helpers.def: Delete.
* config/bpf/bpf.c (bpf_handle_fndecl_attribute): New function.
(bpf_attribute_table): Define.
(bpf_helper_names): Delete.
(bpf_helper_code): Likewise.
(enum bpf_builtins): Adjust to new helpers mechanism.
(bpf_output_call): Likewise.
(bpf_init_builtins): Likewise.
(bpf_init_builtins): Likewise.
* doc/extend.texi (BPF Function Attributes): New section.
(BPF Kernel Helpers): Delete section.
gcc/testsuite/
* gcc.target/bpf/helper-bind.c: Adjust to new kernel helpers
mechanism.
* gcc.target/bpf/helper-bpf-redirect.c: Likewise.
* gcc.target/bpf/helper-clone-redirect.c: Likewise.
* gcc.target/bpf/helper-csum-diff.c: Likewise.
* gcc.target/bpf/helper-csum-update.c: Likewise.
* gcc.target/bpf/helper-current-task-under-cgroup.c: Likewise.
* gcc.target/bpf/helper-fib-lookup.c: Likewise.
* gcc.target/bpf/helper-get-cgroup-classid.c: Likewise.
* gcc.target/bpf/helper-get-current-cgroup-id.c: Likewise.
* gcc.target/bpf/helper-get-current-comm.c: Likewise.
* gcc.target/bpf/helper-get-current-pid-tgid.c: Likewise.
* gcc.target/bpf/helper-get-current-task.c: Likewise.
* gcc.target/bpf/helper-get-current-uid-gid.c: Likewise.
* gcc.target/bpf/helper-get-hash-recalc.c: Likewise.
* gcc.target/bpf/helper-get-listener-sock.c: Likewise.
* gcc.target/bpf/helper-get-local-storage.c: Likewise.
* gcc.target/bpf/helper-get-numa-node-id.c: Likewise.
* gcc.target/bpf/helper-get-prandom-u32.c: Likewise.
* gcc.target/bpf/helper-get-route-realm.c: Likewise.
* gcc.target/bpf/helper-get-smp-processor-id.c: Likewise.
* gcc.target/bpf/helper-get-socket-cookie.c: Likewise.
* gcc.target/bpf/helper-get-socket-uid.c: Likewise.
* gcc.target/bpf/helper-get-stack.c: Likewise.
* gcc.target/bpf/helper-get-stackid.c: Likewise.
* gcc.target/bpf/helper-getsockopt.c: Likewise.
* gcc.target/bpf/helper-ktime-get-ns.c: Likewise.
* gcc.target/bpf/helper-l3-csum-replace.c: Likewise.
* gcc.target/bpf/helper-l4-csum-replace.c: Likewise.
* gcc.target/bpf/helper-lwt-push-encap.c: Likewise.
* gcc.target/bpf/helper-lwt-seg6-action.c: Likewise.
* gcc.target/bpf/helper-lwt-seg6-adjust-srh.c: Likewise.
* gcc.target/bpf/helper-lwt-seg6-store-bytes.c: Likewise.
* gcc.target/bpf/helper-map-delete-elem.c: Likewise.
* gcc.target/bpf/helper-map-lookup-elem.c: Likewise.
* gcc.target/bpf/helper-map-peek-elem.c: Likewise.
* gcc.target/bpf/helper-map-pop-elem.c: Likewise.
* gcc.target/bpf/helper-map-push-elem.c: Likewise.
* gcc.target/bpf/helper-map-update-elem.c: Likewise.
* gcc.target/bpf/helper-msg-apply-bytes.c: Likewise.
* gcc.target/bpf/helper-msg-cork-bytes.c: Likewise.
* gcc.target/bpf/helper-msg-pop-data.c: Likewise.
* gcc.target/bpf/helper-msg-pull-data.c: Likewise.
* gcc.target/bpf/helper-msg-push-data.c: Likewise.
* gcc.target/bpf/helper-msg-redirect-hash.c: Likewise.
* gcc.target/bpf/helper-msg-redirect-map.c: Likewise.
* gcc.target/bpf/helper-override-return.c: Likewise.
* gcc.target/bpf/helper-perf-event-output.c: Likewise.
* gcc.target/bpf/helper-perf-event-read-value.c: Likewise.
* gcc.target/bpf/helper-perf-event-read.c: Likewise.
* gcc.target/bpf/helper-perf-prog-read-value.c: Likewise.
* gcc.target/bpf/helper-probe-read-str.c: Likewise.
* gcc.target/bpf/helper-probe-read.c: Likewise.
* gcc.target/bpf/helper-probe-write-user.c: Likewise.
* gcc.target/bpf/helper-rc-keydown.c: Likewise.
* gcc.target/bpf/helper-rc-pointer-rel.c: Likewise.
* gcc.target/bpf/helper-rc-repeat.c: Likewise.
* gcc.target/bpf/helper-redirect-map.c: Likewise.
* gcc.target/bpf/helper-set-hash-invalid.c: Likewise.
* gcc.target/bpf/helper-set-hash.c: Likewise.
* gcc.target/bpf/helper-setsockopt.c: Likewise.
* gcc.target/bpf/helper-sk-fullsock.c: Likewise.
* gcc.target/bpf/helper-sk-lookup-tcp.c: Likewise.
* gcc.target/bpf/helper-sk-lookup-upd.c: Likewise.
* gcc.target/bpf/helper-sk-redirect-hash.c: Likewise.
* gcc.target/bpf/helper-sk-redirect-map.c: Likewise.
* gcc.target/bpf/helper-sk-release.c: Likewise.
* gcc.target/bpf/helper-sk-select-reuseport.c: Likewise.
* gcc.target/bpf/helper-sk-storage-delete.c: Likewise.
* gcc.target/bpf/helper-sk-storage-get.c: Likewise.
* gcc.target/bpf/helper-skb-adjust-room.c: Likewise.
* gcc.target/bpf/helper-skb-cgroup-id.c: Likewise.
* gcc.target/bpf/helper-skb-change-head.c: Likewise.
* gcc.target/bpf/helper-skb-change-proto.c: Likewise.
* gcc.target/bpf/helper-skb-change-tail.c: Likewise.
* gcc.target/bpf/helper-skb-change-type.c: Likewise.
* gcc.target/bpf/helper-skb-ecn-set-ce.c: Likewise.
* gcc.target/bpf/helper-skb-get-tunnel-key.c: Likewise.
* gcc.target/bpf/helper-skb-get-tunnel-opt.c: Likewise.
* gcc.target/bpf/helper-skb-get-xfrm-state.c: Likewise.
* gcc.target/bpf/helper-skb-load-bytes-relative.c: Likewise.
* gcc.target/bpf/helper-skb-load-bytes.c: Likewise.
* gcc.target/bpf/helper-skb-pull-data.c: Likewise.
* gcc.target/bpf/helper-skb-set-tunnel-key.c: Likewise.
* gcc.target/bpf/helper-skb-set-tunnel-opt.c: Likewise.
* gcc.target/bpf/helper-skb-store-bytes.c: Likewise.
* gcc.target/bpf/helper-skb-under-cgroup.c: Likewise.
* gcc.target/bpf/helper-skb-vlan-pop.c: Likewise.
* gcc.target/bpf/helper-skb-vlan-push.c: Likewise.
* gcc.target/bpf/helper-skc-lookup-tcp.c: Likewise.
* gcc.target/bpf/helper-sock-hash-update.c: Likewise.
* gcc.target/bpf/helper-sock-map-update.c: Likewise.
* gcc.target/bpf/helper-sock-ops-cb-flags-set.c: Likewise.
* gcc.target/bpf/helper-spin-lock.c: Likewise.
* gcc.target/bpf/helper-spin-unlock.c: Likewise.
* gcc.target/bpf/helper-strtol.c: Likewise.
* gcc.target/bpf/helper-strtoul.c: Likewise.
* gcc.target/bpf/helper-sysctl-get-current-value.c: Likewise.
* gcc.target/bpf/helper-sysctl-get-name.c: Likewise.
* gcc.target/bpf/helper-sysctl-get-new-value.c: Likewise.
* gcc.target/bpf/helper-sysctl-set-new-value.c: Likewise.
* gcc.target/bpf/helper-tail-call.c: Likewise.
* gcc.target/bpf/helper-tcp-check-syncookie.c: Likewise.
* gcc.target/bpf/helper-tcp-sock.c: Likewise.
* gcc.target/bpf/helper-trace-printk.c: Likewise.
* gcc.target/bpf/helper-xdp-adjust-head.c: Likewise.
* gcc.target/bpf/helper-xdp-adjust-meta.c: Likewise.
* gcc.target/bpf/helper-xdp-adjust-tail.c: Likewise.
* gcc.target/bpf/skb-ancestor-cgroup-id.c: Likewise.
Diff:
---
gcc/config/bpf/bpf-helpers.def | 194 --------
gcc/config/bpf/bpf-helpers.h | 530 ++++++++++++---------
gcc/config/bpf/bpf.c | 172 +++----
gcc/doc/extend.texi | 172 +------
gcc/testsuite/gcc.target/bpf/helper-bind.c | 4 +-
gcc/testsuite/gcc.target/bpf/helper-bpf-redirect.c | 4 +-
.../gcc.target/bpf/helper-clone-redirect.c | 4 +-
gcc/testsuite/gcc.target/bpf/helper-csum-diff.c | 4 +-
gcc/testsuite/gcc.target/bpf/helper-csum-update.c | 4 +-
.../bpf/helper-current-task-under-cgroup.c | 4 +-
gcc/testsuite/gcc.target/bpf/helper-fib-lookup.c | 4 +-
.../gcc.target/bpf/helper-get-cgroup-classid.c | 4 +-
.../gcc.target/bpf/helper-get-current-cgroup-id.c | 4 +-
.../gcc.target/bpf/helper-get-current-comm.c | 4 +-
.../gcc.target/bpf/helper-get-current-pid-tgid.c | 4 +-
.../gcc.target/bpf/helper-get-current-task.c | 4 +-
.../gcc.target/bpf/helper-get-current-uid-gid.c | 4 +-
.../gcc.target/bpf/helper-get-hash-recalc.c | 4 +-
.../gcc.target/bpf/helper-get-listener-sock.c | 4 +-
.../gcc.target/bpf/helper-get-local-storage.c | 4 +-
.../gcc.target/bpf/helper-get-numa-node-id.c | 4 +-
.../gcc.target/bpf/helper-get-prandom-u32.c | 4 +-
.../gcc.target/bpf/helper-get-route-realm.c | 4 +-
.../gcc.target/bpf/helper-get-smp-processor-id.c | 4 +-
.../gcc.target/bpf/helper-get-socket-cookie.c | 4 +-
.../gcc.target/bpf/helper-get-socket-uid.c | 4 +-
gcc/testsuite/gcc.target/bpf/helper-get-stack.c | 4 +-
gcc/testsuite/gcc.target/bpf/helper-get-stackid.c | 4 +-
gcc/testsuite/gcc.target/bpf/helper-getsockopt.c | 6 +-
gcc/testsuite/gcc.target/bpf/helper-ktime-get-ns.c | 4 +-
.../gcc.target/bpf/helper-l3-csum-replace.c | 4 +-
.../gcc.target/bpf/helper-l4-csum-replace.c | 4 +-
.../gcc.target/bpf/helper-lwt-push-encap.c | 4 +-
.../gcc.target/bpf/helper-lwt-seg6-action.c | 6 +-
.../gcc.target/bpf/helper-lwt-seg6-adjust-srh.c | 4 +-
.../gcc.target/bpf/helper-lwt-seg6-store-bytes.c | 5 +-
.../gcc.target/bpf/helper-map-delete-elem.c | 5 +-
.../gcc.target/bpf/helper-map-lookup-elem.c | 5 +-
.../gcc.target/bpf/helper-map-peek-elem.c | 5 +-
gcc/testsuite/gcc.target/bpf/helper-map-pop-elem.c | 5 +-
.../gcc.target/bpf/helper-map-push-elem.c | 4 +-
.../gcc.target/bpf/helper-map-update-elem.c | 4 +-
.../gcc.target/bpf/helper-msg-apply-bytes.c | 4 +-
.../gcc.target/bpf/helper-msg-cork-bytes.c | 4 +-
gcc/testsuite/gcc.target/bpf/helper-msg-pop-data.c | 4 +-
.../gcc.target/bpf/helper-msg-pull-data.c | 7 +-
.../gcc.target/bpf/helper-msg-push-data.c | 4 +-
.../gcc.target/bpf/helper-msg-redirect-hash.c | 4 +-
.../gcc.target/bpf/helper-msg-redirect-map.c | 4 +-
.../gcc.target/bpf/helper-override-return.c | 4 +-
.../gcc.target/bpf/helper-perf-event-output.c | 3 +-
.../gcc.target/bpf/helper-perf-event-read-value.c | 4 +-
.../gcc.target/bpf/helper-perf-event-read.c | 4 +-
.../gcc.target/bpf/helper-perf-prog-read-value.c | 4 +-
.../gcc.target/bpf/helper-probe-read-str.c | 4 +-
gcc/testsuite/gcc.target/bpf/helper-probe-read.c | 4 +-
.../gcc.target/bpf/helper-probe-write-user.c | 4 +-
gcc/testsuite/gcc.target/bpf/helper-rc-keydown.c | 4 +-
.../gcc.target/bpf/helper-rc-pointer-rel.c | 4 +-
gcc/testsuite/gcc.target/bpf/helper-rc-repeat.c | 4 +-
gcc/testsuite/gcc.target/bpf/helper-redirect-map.c | 4 +-
.../gcc.target/bpf/helper-set-hash-invalid.c | 4 +-
gcc/testsuite/gcc.target/bpf/helper-set-hash.c | 4 +-
gcc/testsuite/gcc.target/bpf/helper-setsockopt.c | 5 +-
gcc/testsuite/gcc.target/bpf/helper-sk-fullsock.c | 4 +-
.../gcc.target/bpf/helper-sk-lookup-tcp.c | 10 +-
.../gcc.target/bpf/helper-sk-lookup-upd.c | 4 +-
.../gcc.target/bpf/helper-sk-redirect-hash.c | 5 +-
.../gcc.target/bpf/helper-sk-redirect-map.c | 4 +-
gcc/testsuite/gcc.target/bpf/helper-sk-release.c | 4 +-
.../gcc.target/bpf/helper-sk-select-reuseport.c | 4 +-
.../gcc.target/bpf/helper-sk-storage-delete.c | 4 +-
.../gcc.target/bpf/helper-sk-storage-get.c | 5 +-
.../gcc.target/bpf/helper-skb-adjust-room.c | 4 +-
.../gcc.target/bpf/helper-skb-cgroup-id.c | 4 +-
.../gcc.target/bpf/helper-skb-change-head.c | 4 +-
.../gcc.target/bpf/helper-skb-change-proto.c | 4 +-
.../gcc.target/bpf/helper-skb-change-tail.c | 4 +-
.../gcc.target/bpf/helper-skb-change-type.c | 4 +-
.../gcc.target/bpf/helper-skb-ecn-set-ce.c | 4 +-
.../gcc.target/bpf/helper-skb-get-tunnel-key.c | 4 +-
.../gcc.target/bpf/helper-skb-get-tunnel-opt.c | 4 +-
.../gcc.target/bpf/helper-skb-get-xfrm-state.c | 6 +-
.../bpf/helper-skb-load-bytes-relative.c | 8 +-
.../gcc.target/bpf/helper-skb-load-bytes.c | 4 +-
.../gcc.target/bpf/helper-skb-pull-data.c | 4 +-
.../gcc.target/bpf/helper-skb-set-tunnel-key.c | 4 +-
.../gcc.target/bpf/helper-skb-set-tunnel-opt.c | 4 +-
.../gcc.target/bpf/helper-skb-store-bytes.c | 4 +-
.../gcc.target/bpf/helper-skb-under-cgroup.c | 4 +-
gcc/testsuite/gcc.target/bpf/helper-skb-vlan-pop.c | 4 +-
.../gcc.target/bpf/helper-skb-vlan-push.c | 4 +-
.../gcc.target/bpf/helper-skc-lookup-tcp.c | 6 +-
.../gcc.target/bpf/helper-sock-hash-update.c | 4 +-
.../gcc.target/bpf/helper-sock-map-update.c | 4 +-
.../gcc.target/bpf/helper-sock-ops-cb-flags-set.c | 4 +-
gcc/testsuite/gcc.target/bpf/helper-spin-lock.c | 4 +-
gcc/testsuite/gcc.target/bpf/helper-spin-unlock.c | 4 +-
gcc/testsuite/gcc.target/bpf/helper-strtol.c | 4 +-
gcc/testsuite/gcc.target/bpf/helper-strtoul.c | 4 +-
.../bpf/helper-sysctl-get-current-value.c | 5 +-
.../gcc.target/bpf/helper-sysctl-get-name.c | 5 +-
.../gcc.target/bpf/helper-sysctl-get-new-value.c | 5 +-
.../gcc.target/bpf/helper-sysctl-set-new-value.c | 5 +-
gcc/testsuite/gcc.target/bpf/helper-tail-call.c | 5 +-
.../gcc.target/bpf/helper-tcp-check-syncookie.c | 8 +-
gcc/testsuite/gcc.target/bpf/helper-tcp-sock.c | 4 +-
gcc/testsuite/gcc.target/bpf/helper-trace-printk.c | 5 +-
.../gcc.target/bpf/helper-xdp-adjust-head.c | 4 +-
.../gcc.target/bpf/helper-xdp-adjust-meta.c | 4 +-
.../gcc.target/bpf/helper-xdp-adjust-tail.c | 3 +-
.../gcc.target/bpf/skb-ancestor-cgroup-id.c | 4 +-
112 files changed, 750 insertions(+), 787 deletions(-)
diff --git a/gcc/config/bpf/bpf-helpers.def b/gcc/config/bpf/bpf-helpers.def
deleted file mode 100644
index 249ad248a48..00000000000
--- a/gcc/config/bpf/bpf-helpers.def
+++ /dev/null
@@ -1,194 +0,0 @@
-/* Kernel helpers database.
- Copyright (C) 2019-2020 Free Software Foundation, Inc.
-
-This file is part of GCC.
-
-GCC is free software; you can redistribute it and/or modify
-it under the terms of the GNU General Public License as published by
-the Free Software Foundation; either version 3, or (at your option)
-any later version.
-
-GCC is distributed in the hope that it will be useful,
-but WITHOUT ANY WARRANTY; without even the implied warranty of
-MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
-GNU General Public License for more details.
-
-You should have received a copy of the GNU General Public License
-along with GCC; see the file COPYING3. If not see
-<http://www.gnu.org/licenses/>. */
-
-/* This file contains the definition of the kernel helpers that are
- available to eBPF programs.
-
- The primary source for information on kernel helpers is the
- linux/include/uapi/linux/bpf.h file in the Linux source tree.
- Please keep this database in sync.
-
- The first column is the first kernel version featuring the helper
- function. This should be an enumerate from bpf_kernel_version,
- defined in bpf-opts.h. Note that the backend assumes that helpers
- never get deprecated in the kernel. If that eventually happens,
- then we will need to use a bitmask here instead of an enumerate.
-
- The second column is the constant-name for the helper.
- The third column is the program-name of the helper.
-
- The fourth column is a list of names describing the types of the
- values returned and accepted by the helper, in one of these forms:
-
- TYPES (type1, type2, ..., 0)
- VTYPES (type1, type2, ..., 0)
-
- VTYPES should be used should the helper accept a variable number of
- arguments, TYPES otherwise. The valid type names are:
-
- `vt' for void.
- `it' for signed int.
- `ut' for unsigned int.
- `pt' for void*.
- `cpt' for const void*.
- `st' for short int.
- `ust' for unsigned short int.
- `cst' for const char *.
- `ullt' for unsigned long long.
- `llt' for long long.
- `u32t' for uint32.
- `u64t' for uint64.
-
- In types descriptions, the firt entry corresponds to the value
- returned by the helper. Subsequent names correspond to the helper
- arguments. Finally, a 0 should close the list.
-
- VERY IMPORTANT: the helper entries should be listed in the same
- order than in the definition of __BPF_FUNC_MAPPER in
- linux/include/uapi/linux/bpf.h! */
-
-DEF_HELPER (LINUX_V4_0, MAP_LOOKUP_ELEM, map_lookup_elem, TYPES (pt, pt, pt, 0))
-DEF_HELPER (LINUX_V4_0, MAP_UPDATE_ELEM, map_update_elem, TYPES (it, pt, pt, pt, ullt, 0))
-DEF_HELPER (LINUX_V4_0, MAP_DELETE_ELEM, map_delete_elem, TYPES (it, pt, pt, 0))
-DEF_HELPER (LINUX_V4_1, PROBE_READ, probe_read, TYPES (it, pt, ut, cpt, 0))
-DEF_HELPER (LINUX_V4_1, KTIME_GET_NS, ktime_get_ns, TYPES (ullt, 0))
-DEF_HELPER (LINUX_V4_1, TRACE_PRINTK, trace_printk, VTYPES (it, cst, it, 0))
-DEF_HELPER (LINUX_V4_1, GET_PRANDOM_U32, get_prandom_u32, TYPES (ullt, 0))
-DEF_HELPER (LINUX_V4_1, GET_SMP_PROCESSOR_ID, get_smp_processor_id, TYPES (ullt, 0))
-DEF_HELPER (LINUX_V4_1, SKB_STORE_BYTES, skb_store_bytes, TYPES (it, pt, it, pt, it, it, 0))
-DEF_HELPER (LINUX_V4_1, L3_CSUM_REPLACE, l3_csum_replace, TYPES (it, pt, it, it ,it ,it, 0))
-DEF_HELPER (LINUX_V4_1, L4_CSUM_REPLACE, l4_csum_replace, TYPES (it, pt, it, it, it, it, 0))
-DEF_HELPER (LINUX_V4_2, TAIL_CALL, tail_call, TYPES (vt, pt, pt, it, 0))
-DEF_HELPER (LINUX_V4_2, CLONE_REDIRECT, clone_redirect, TYPES (it, pt, it, it, 0))
-DEF_HELPER (LINUX_V4_2, GET_CURRENT_PID_TGID, get_current_pid_tgid, TYPES (ullt, 0))
-DEF_HELPER (LINUX_V4_2, GET_CURRENT_UID_GID, get_current_uid_gid, TYPES (ullt, 0))
-DEF_HELPER (LINUX_V4_2, GET_CURRENT_COMM, get_current_comm, TYPES (it, pt, it, 0))
-DEF_HELPER (LINUX_V4_3, GET_CGROUP_CLASSID, get_cgroup_classid, TYPES (it, pt, 0))
-DEF_HELPER (LINUX_V4_3, SKB_VLAN_PUSH, skb_vlan_push, TYPES (it, pt, st, ust, 0))
-DEF_HELPER (LINUX_V4_3, SKB_VLAN_POP, skb_vlan_pop, TYPES (it, pt, 0))
-DEF_HELPER (LINUX_V4_3, SKB_GET_TUNNEL_KEY, skb_get_tunnel_key, TYPES (it, pt, pt, it, it, 0))
-DEF_HELPER (LINUX_V4_3, SKB_SET_TUNNEL_KEY, skb_set_tunnel_key, TYPES (it, pt, pt, it, it, 0))
-DEF_HELPER (LINUX_V4_3, PERF_EVENT_READ, perf_event_read, TYPES (ullt, pt, ullt, 0))
-DEF_HELPER (LINUX_V4_4, REDIRECT, redirect, TYPES (it, it, it, 0))
-DEF_HELPER (LINUX_V4_4, GET_ROUTE_REALM, get_route_realm, TYPES (ut, pt, 0))
-DEF_HELPER (LINUX_V4_4, PERF_EVENT_OUTPUT, perf_event_output, \
- TYPES (it, pt, pt, ullt, pt, it, 0))
-DEF_HELPER (LINUX_V4_5, SKB_LOAD_BYTES, skb_load_bytes, TYPES (it, pt, it, pt, it, 0))
-DEF_HELPER (LINUX_V4_6, GET_STACKID, get_stackid, TYPES (it, pt, pt, it, 0))
-DEF_HELPER (LINUX_V4_6, CSUM_DIFF, csum_diff, TYPES (it, pt, it, pt, it, it, 0))
-DEF_HELPER (LINUX_V4_6, SKB_GET_TUNNEL_OPT, skb_get_tunnel_opt, TYPES (it, pt, pt, it, 0))
-DEF_HELPER (LINUX_V4_6, SKB_SET_TUNNEL_OPT, skb_set_tunnel_opt, TYPES (it, pt, pt, it, 0))
-DEF_HELPER (LINUX_V4_8, SKB_CHANGE_PROTO, skb_change_proto, TYPES (it, pt, st, u64t, 0))
-DEF_HELPER (LINUX_V4_8, SKB_CHANGE_TYPE, skb_change_type, TYPES (it, pt, u32t, 0))
-DEF_HELPER (LINUX_V4_8, SKB_UNDER_CGROUP, skb_under_cgroup, TYPES (it, pt, pt, it, 0))
-DEF_HELPER (LINUX_V4_8, GET_HASH_RECALC, get_hash_recalc, TYPES (ut, pt, 0))
-DEF_HELPER (LINUX_V4_8, GET_CURRENT_TASK, get_current_task, TYPES (ullt, 0))
-DEF_HELPER (LINUX_V4_8, PROBE_WRITE_USER, probe_write_user, TYPES (it, pt, cpt, ut, 0))
-DEF_HELPER (LINUX_V4_9, CURRENT_TASK_UNDER_CGROUP, current_task_under_cgroup, \
- TYPES (it, pt, it, 0))
-DEF_HELPER (LINUX_V4_9, SKB_CHANGE_TAIL, skb_change_tail, TYPES (it, pt, ut, u64t, 0))
-DEF_HELPER (LINUX_V4_9, SKB_PULL_DATA, skb_pull_data, TYPES (it, pt, it, 0))
-DEF_HELPER (LINUX_V4_9, CSUM_UPDATE, csum_update, TYPES (llt, pt, u32t, 0))
-DEF_HELPER (LINUX_V4_9, SET_HASH_INVALID, set_hash_invalid, TYPES (vt, pt, 0))
-DEF_HELPER (LINUX_V4_10, GET_NUMA_NODE_ID, get_numa_node_id, TYPES (it, 0))
-DEF_HELPER (LINUX_V4_10, SKB_CHANGE_HEAD, skb_change_head, TYPES (it, pt, it, it, 0))
-DEF_HELPER (LINUX_V4_10, XDP_ADJUST_HEAD, xdp_adjust_head, TYPES (it, pt, it, 0))
-DEF_HELPER (LINUX_V4_11, PROBE_READ_STR, probe_read_str, TYPES (it, pt, u32t, cpt, 0))
-DEF_HELPER (LINUX_V4_12, GET_SOCKET_COOKIE, get_socket_cookie, TYPES (it, pt, 0))
-DEF_HELPER (LINUX_V4_12, GET_SOCKET_UID, get_socket_uid, TYPES (ut, pt, 0))
-DEF_HELPER (LINUX_V4_13, SET_HASH, set_hash, TYPES (ut, pt, u32t, 0))
-DEF_HELPER (LINUX_V4_13, SETSOCKOPT, setsockopt, TYPES (it, pt, it, it, pt, it, 0))
-DEF_HELPER (LINUX_V4_13, SKB_ADJUST_ROOM, skb_adjust_room, TYPES (it, pt, st, u32t, ullt, 0))
-DEF_HELPER (LINUX_V4_14, REDIRECT_MAP, redirect_map, TYPES (it, pt, it, it, 0))
-DEF_HELPER (LINUX_V4_14, SK_REDIRECT_MAP, sk_redirect_map, TYPES (it, pt, pt, it, it, 0))
-DEF_HELPER (LINUX_V4_14, SOCK_MAP_UPDATE, sock_map_update, TYPES (it, pt, pt, pt, ullt, 0))
-DEF_HELPER (LINUX_V4_15, XDP_ADJUST_META, xdp_adjust_meta, TYPES (it, pt, it, 0))
-DEF_HELPER (LINUX_V4_15, PERF_EVENT_READ_VALUE, perf_event_read_value,
- TYPES (it, pt, ullt, pt, ut, 0))
-DEF_HELPER (LINUX_V4_15, PERF_PROG_READ_VALUE, perf_prog_read_value,
- TYPES (it, pt, pt, ut, 0))
-DEF_HELPER (LINUX_V4_15, GETSOCKOPT, getsockopt, TYPES (it, pt, it, it, pt, it, 0))
-
-DEF_HELPER (LINUX_V4_16, OVERRIDE_RETURN, override_return, TYPES (it, pt, ult, 0))
-DEF_HELPER (LINUX_V4_16, SOCK_OPS_CB_FLAGS_SET, sock_ops_cb_flags_set, TYPES (it, pt, it, 0))
-DEF_HELPER (LINUX_V4_17, MSG_REDIRECT_MAP, msg_redirect_map, TYPES (it, pt, pt, it, it, 0))
-DEF_HELPER (LINUX_V4_17, MSG_APPLY_BYTES, msg_apply_bytes, TYPES (it, pt, it, 0))
-DEF_HELPER (LINUX_V4_17, MSG_CORK_BYTES, msg_cork_bytes, TYPES (it, pt, it, 0))
-DEF_HELPER (LINUX_V4_17, MSG_PULL_DATA, msg_pull_data, TYPES (it, pt, it, it, it, 0))
-DEF_HELPER (LINUX_V4_17, BIND, bind, TYPES (it, pt, pt, it, 0))
-DEF_HELPER (LINUX_V4_18, XDP_ADJUST_TAIL, xdp_adjust_tail, TYPES (it, pt, it, 0))
-DEF_HELPER (LINUX_V4_18, SKB_GET_XFRM_STATE,
- skb_get_xfrm_state, TYPES (it, pt, it, pt, it, it, 0))
-DEF_HELPER (LINUX_V4_18, GET_STACK, get_stack, TYPES (it, pt, pt, it, it, 0))
-DEF_HELPER (LINUX_V4_18, SKB_LOAD_BYTES_RELATIVE, skb_load_bytes_relative,
- TYPES (it, pt, it, pt, it, ut, 0))
-DEF_HELPER (LINUX_V4_18, FIB_LOOKUP, fib_lookup, TYPES (it, pt, pt, it, ut, 0))
-DEF_HELPER (LINUX_V4_18, SOCK_HASH_UPDATE, sock_hash_update, TYPES (it, pt, pt, pt, ullt, 0))
-DEF_HELPER (LINUX_V4_18, MSG_REDIRECT_HASH, msg_redirect_hash, TYPES (it, pt, pt, pt, it, 0))
-DEF_HELPER (LINUX_V4_18, SK_REDIRECT_HASH, sk_redirect_hash, TYPES (it, pt, pt, pt, it, 0))
-DEF_HELPER (LINUX_V4_18, LWT_PUSH_ENCAP, lwt_push_encap, TYPES (it, pt, ut, pt, ut, 0))
-DEF_HELPER (LINUX_V4_18, LWT_SEG6_STORE_BYTES, lwt_seg6_store_bytes,
- TYPES (it, pt, ut, pt, ut, 0))
-DEF_HELPER (LINUX_V4_18, LWT_SEG6_ADJUST_SRH, lwt_seg6_adjust_srh, TYPES (it, pt, ut, ut, 0))
-DEF_HELPER (LINUX_V4_18, LWT_SEG6_ACTION, lwt_seg6_action, TYPES (it, pt, ut, pt, ut, 0))
-DEF_HELPER (LINUX_V4_18, RC_REPEAT, rc_repeat, TYPES (it, pt, 0))
-DEF_HELPER (LINUX_V4_18, RC_KEYDOWN, rc_keydown, TYPES (it, pt, ut, ullt, ut, 0))
-DEF_HELPER (LINUX_V4_18, SKB_CGROUP_ID, skb_cgroup_id, TYPES (ullt, pt, 0))
-DEF_HELPER (LINUX_V4_18, GET_CURRENT_CGROUP_ID, get_current_cgroup_id, TYPES (ullt, 0))
-DEF_HELPER (LINUX_V4_19, GET_LOCAL_STORAGE, get_local_storage, TYPES (pt, pt, ullt, 0))
-DEF_HELPER (LINUX_V4_19, SK_SELECT_REUSEPORT, sk_select_reuseport,
- TYPES (it, pt, pt, pt, ut, 0))
-DEF_HELPER (LINUX_V4_19, SKB_ANCESTOR_CGROUP_ID, skb_ancestor_cgroup_id,
- TYPES (ullt, pt, it, 0))
-DEF_HELPER (LINUX_V4_20, SK_LOOKUP_TCP, sk_lookup_tcp, TYPES (pt, pt, pt, it, ullt, ullt, 0))
-DEF_HELPER (LINUX_V4_20, SK_LOOKUP_UDP, sk_lookup_udp, TYPES (pt, pt, pt, it, ullt, ullt, 0))
-DEF_HELPER (LINUX_V4_20, SK_RELEASE, sk_release, TYPES (it, pt, 0))
-DEF_HELPER (LINUX_V4_20, MAP_PUSH_ELEM, map_push_elem, TYPES (it, pt, pt, ullt, 0))
-DEF_HELPER (LINUX_V4_20, MAP_POP_ELEM, map_pop_elem, TYPES (it, pt, pt, 0))
-DEF_HELPER (LINUX_V4_20, MAP_PEEK_ELEM, map_peek_elem, TYPES (it, pt, pt, 0))
-DEF_HELPER (LINUX_V4_20, MSG_PUSH_DATA, msg_push_data, TYPES (it, pt, it, it, it, 0))
-DEF_HELPER (LINUX_V5_0, MSG_POP_DATA, msg_pop_data, TYPES (it, pt, it, it, it, 0))
-DEF_HELPER (LINUX_V5_0, RC_POINTER_REL, rc_pointer_rel, TYPES (it, pt, it, it, 0))
-DEF_HELPER (LINUX_V5_1, SPIN_LOCK, spin_lock, TYPES (vt, pt, 0))
-DEF_HELPER (LINUX_V5_1, SPIN_UNLOCK, spin_unlock, TYPES (vt, pt, 0))
-DEF_HELPER (LINUX_V5_1, SK_FULLSOCK, sk_fullsock, TYPES (pt, pt, 0))
-DEF_HELPER (LINUX_V5_1, TCP_SOCK, tcp_sock, TYPES (pt, pt, 0))
-DEF_HELPER (LINUX_V5_1, SKB_ECN_SET_CE, skb_ecn_set_ce, TYPES (it, pt, 0))
-DEF_HELPER (LINUX_V5_1, GET_LISTENER_SOCK, get_listener_sock, TYPES (pt, pt, 0))
-DEF_HELPER (LINUX_V5_2, SKC_LOOKUP_TCP, skc_lookup_tcp,
- TYPES (pt, pt, pt, u32t, u64t, u64t, 0))
-DEF_HELPER (LINUX_V5_2, TCP_CHECK_SYNCOOKIE, tcp_check_syncookie,
- TYPES (it, pt, pt, u32t, pt, u32t, 0))
-DEF_HELPER (LINUX_V5_2, SYSCTL_GET_NAME, sysctl_get_name, TYPES (it, pt, pt, ullt, u64t, 0))
-DEF_HELPER (LINUX_V5_2, SYSCTL_GET_CURRENT_VALUE, sysctl_get_current_value,
- TYPES (it, pt, pt, ullt, 0))
-DEF_HELPER (LINUX_V5_2, SYSCTL_GET_NEW_VALUE, sysctl_get_new_value,
- TYPES (it, pt, pt, ullt, 0))
-DEF_HELPER (LINUX_V5_2, SYSCTL_SET_NEW_VALUE, sysctl_set_new_value,
- TYPES (it, pt, pt, ullt, 0))
-DEF_HELPER (LINUX_V5_2, STRTOL, strtol, TYPES (it, cst, ullt, u64t, pt, 0))
-DEF_HELPER (LINUX_V5_2, STRTOUL, strtoul, TYPES (it, pt, ullt, u64t, pt, 0))
-DEF_HELPER (LINUX_V5_2, SK_STORAGE_GET, sk_storage_get, TYPES (pt, pt, pt, pt, u64t, 0))
-DEF_HELPER (LINUX_V5_2, SK_STORAGE_DELETE, sk_storage_delete, TYPES (it, pt, pt, 0))
-
-/*
-Local variables:
-mode:c
-End:
-*/
diff --git a/gcc/config/bpf/bpf-helpers.h b/gcc/config/bpf/bpf-helpers.h
index 1dd05c8ef69..a615321c622 100644
--- a/gcc/config/bpf/bpf-helpers.h
+++ b/gcc/config/bpf/bpf-helpers.h
@@ -30,6 +30,7 @@
#define __BPF_HELPERS_H
#define SEC(NAME) __attribute__((section(NAME), used))
+#define KERNEL_HELPER(NUM) __attribute__((kernel_helper(NUM)))
/* Flags used in some kernel helpers. */
@@ -41,277 +42,376 @@
#define BPF_F_NO_COMMON_LRU (1U << 1)
#define BPF_F_NUMA_NODE (1U << 2)
-/* Functions to call kernel helpers. We provide the "standard" bpf_*
- names as synonyms of the corresponding GCC builtins. In some
- cases, where non-void pointers are passed to the helper, inline
- functions are used to achieve proper type checking. */
+/* Prototypes of functions to call kernel helpers.
+ Please keep these protoypes sorted by helper number. */
-#ifndef KERNEL_VERSION
-# define KERNEL_VERSION(a,b,c) (((a) << 16) + ((b) << 8) + (c))
-#endif
+void *bpf_map_lookup_elem (void *map, const void *key)
+ KERNEL_HELPER (1);
-#if __BPF_KERNEL_VERSION_CODE__ >= KERNEL_VERSION (4,0,0)
+int bpf_map_update_elem (void *map, const void *key, const void *value,
+ unsigned long long flags)
+ KERNEL_HELPER (2);
-#define bpf_map_lookup_elem __builtin_bpf_helper_map_lookup_elem
-#define bpf_map_update_elem __builtin_bpf_helper_map_update_elem
-#define bpf_map_delete_elem __builtin_bpf_helper_map_delete_elem
+int bpf_map_delete_elem (void *map, const void *key)
+ KERNEL_HELPER (3);
-#if __BPF_KERNEL_VERSION_CODE__ >= KERNEL_VERSION (4,1,0)
+int bpf_probe_read (void *dst, int size, const void *unsafe_ptr)
+ KERNEL_HELPER (4);
-#define bpf_probe_read __builtin_bpf_helper_probe_read
-#define bpf_ktime_get_ns __builtin_bpf_helper_ktime_get_ns
-#define bpf_trace_printk __builtin_bpf_helper_trace_printk
-#define bpf_get_prandom_u32 __builtin_bpf_helper_get_prandom_u32
-#define bpf_get_smp_processor_id __builtin_bpf_helper_get_smp_processor_id
-#define bpf_skb_store_bytes __builtin_bpf_helper_skb_store_bytes
-#define bpf_l3_csum_replace __builtin_bpf_helper_l3_csum_replace
-#define bpf_l4_csum_replace __builtin_bpf_helper_l4_csum_replace
+unsigned long long bpf_ktime_get_ns (void)
+ KERNEL_HELPER (5);
-#if __BPF_KERNEL_VERSION_CODE__ >= KERNEL_VERSION (4,2,0)
+int bpf_trace_printk (const char *fmt, int fmt_size, ...)
+ KERNEL_HELPER (6);
-#define bpf_tail_call __builtin_bpf_helper_tail_call
-#define bpf_clone_redirect __builtin_bpf_helper_clone_redirect
-#define bpf_get_current_pid_tgid __builtin_bpf_helper_get_current_pid_tgid
-#define bpf_get_current_uid_gid __builtin_bpf_helper_get_current_uid_gid
-#define bpf_get_current_comm __builtin_bpf_helper_get_current_comm
+unsigned long long bpf_get_prandom_u32 (void)
+ KERNEL_HELPER (7);
-#if __BPF_KERNEL_VERSION_CODE__ >= KERNEL_VERSION (4,3,0)
+unsigned long long bpf_get_smp_processor_id (void)
+ KERNEL_HELPER (8);
-#define bpf_get_cgroup_classid __builtin_bpf_helper_get_cgroup_classid
-#define bpf_skb_vlan_push __builtin_bpf_helper_skb_vlan_push
-#define bpf_skb_vlan_pop __builtin_bpf_helper_skb_vlan_pop
-#define bpf_skb_get_tunnel_key __builtin_bpf_helper_skb_get_tunnel_key
-#define bpf_skb_set_tunnel_key __builtin_bpf_helper_skb_set_tunnel_key
-#define bpf_perf_event_read __builtin_bpf_helper_perf_event_read
+int bpf_skb_store_bytes (void *ctx, int off, void *from, int len,
+ unsigned int start_header)
+ KERNEL_HELPER (9);
-#if __BPF_KERNEL_VERSION_CODE__ >= KERNEL_VERSION (4,4,0)
+int bpf_l3_csum_replace (void *ctx, int off, int from, int to, int flags)
+ KERNEL_HELPER (10);
-#define bpf_redirect __builtin_bpf_helper_redirect
-#define bpf_get_route_realm __builtin_bpf_helper_get_route_realm
-#define bpf_perf_event_output __builtin_bpf_helper_perf_event_output
+int bpf_l4_csum_replace (void *ctx, int off, int from, int to, int flags)
+ KERNEL_HELPER (11);
-#if __BPF_KERNEL_VERSION_CODE__ >= KERNEL_VERSION (4,5,0)
+int bpf_tail_call (void *ctx, void *map, unsigned int index)
+ KERNEL_HELPER (12);
-#define bpf_skb_load_bytes __builtin_bpf_helper_skb_load_bytes
+int bpf_clone_redirect (void *ctx, int ifindex, int flags)
+ KERNEL_HELPER (13);
-#if __BPF_KERNEL_VERSION_CODE__ >= KERNEL_VERSION (4,6,0)
+unsigned long long bpf_get_current_pid_tgid (void)
+ KERNEL_HELPER (14);
-#define bpf_get_stackid __builtin_bpf_helper_get_stackid
-#define bpf_csum_diff __builtin_bpf_helper_csum_diff
-#define bpf_skb_get_tunnel_opt __builtin_bpf_helper_skb_get_tunnel_opt
-#define bpf_skb_set_tunnel_opt __builtin_bpf_helper_skb_set_tunnel_opt
+unsigned long long bpf_get_current_uid_gid (void)
+ KERNEL_HELPER (15);
-#if __BPF_KERNEL_VERSION_CODE__ >= KERNEL_VERSION (4,8,0)
+int bpf_get_current_comm (void *buf, int buf_size)
+ KERNEL_HELPER (16);
-#define bpf_skb_change_proto __builtin_bpf_helper_skb_change_proto
-#define bpf_skb_change_type __builtin_bpf_helper_skb_change_type
-#define bpf_skb_under_cgroup __builtin_bpf_helper_skb_under_cgroup
-#define bpf_get_hash_recalc __builtin_bpf_helper_get_hash_recalc
-#define bpf_get_current_task __builtin_bpf_helper_get_current_task
-#define bpf_probe_write_user __builtin_bpf_helper_probe_write_user
+unsigned int bpf_get_cgroup_classid (void *ctx)
+ KERNEL_HELPER (17);
-#if __BPF_KERNEL_VERSION_CODE__ >= KERNEL_VERSION (4,9,0)
+int bpf_skb_vlan_push (void *ctx, short vlan_proto,
+ unsigned short vlan_tci)
+ KERNEL_HELPER (18);
-#define bpf_current_task_under_cgroup __builtin_bpf_helper_current_task_under_cgroup
-#define bpf_skb_change_tail __builtin_bpf_helper_skb_change_tail
-#define bpf_skb_pull_data __builtin_bpf_helper_skb_pull_data
-#define bpf_csum_update __builtin_bpf_helper_csum_update
-#define bpf_set_hash_invalid __builtin_bpf_helper_set_hash_invalid
+int bpf_skb_vlan_pop (void *ctx)
+ KERNEL_HELPER (19);
-#if __BPF_KERNEL_VERSION_CODE__ >= KERNEL_VERSION (4,10,0)
+int bpf_skb_get_tunnel_key (void *ctx, void *key, int size, int flags)
+ KERNEL_HELPER (20);
-#define bpf_get_numa_node_id __builtin_bpf_helper_get_numa_node_id
-#define bpf_skb_change_head __builtin_bpf_helper_skb_change_head
-#define bpf_xdp_adjust_head __builtin_bpf_helper_xdp_adjust_head
+int bpf_skb_set_tunnel_key (void *ctx, void *key, int size, int flags)
+ KERNEL_HELPER (21);
-#if __BPF_KERNEL_VERSION_CODE__ >= KERNEL_VERSION (4,11,0)
+unsigned long long bpf_perf_event_read (void *map, unsigned long long flags)
+ KERNEL_HELPER (22);
-#define bpf_probe_read_str __builtin_bpf_helper_probe_read_str
+int bpf_redirect (int ifindex, int flags)
+ KERNEL_HELPER (23);
-#if __BPF_KERNEL_VERSION_CODE__ >= KERNEL_VERSION (4,12,0)
+unsigned int bpf_get_route_realm (void *ctx)
+ KERNEL_HELPER (24);
-#define bpf_get_socket_cookie __builtin_bpf_helper_get_socket_cookie
-#define bpf_get_socket_uid __builtin_bpf_helper_get_socket_uid
+int bpf_perf_event_output (void *ctx, void *map, unsigned long long flags,
+ void *data, int size)
+ KERNEL_HELPER (25);
-#if __BPF_KERNEL_VERSION_CODE__ >= KERNEL_VERSION (4,13,0)
+int bpf_skb_load_bytes (void *ctx, int off, void *to, int len)
+ KERNEL_HELPER (26);
-#define bpf_set_hash __builtin_bpf_helper_set_hash
-#define bpf_setsockopt __builtin_bpf_helper_setsockopt
-#define bpf_skb_adjust_room __builtin_bpf_helper_skb_adjust_room
+int bpf_get_stackid (void *ctx, void *map, int flags)
+ KERNEL_HELPER (27);
-#if __BPF_KERNEL_VERSION_CODE__ >= KERNEL_VERSION (4,14,0)
+int bpf_csum_diff (void *from, int from_size, void *to, int to_size, int seed)
+ KERNEL_HELPER (28);
-#define bpf_redirect_map __builtin_bpf_helper_redirect_map
-#define bpf_sk_redirect_map __builtin_bpf_helper_sk_redirect_map
-#define bpf_sock_map_update __builtin_bpf_helper_sock_map_update
+int bpf_skb_get_tunnel_opt (void *ctx, void *md, int size)
+ KERNEL_HELPER (29);
-#if __BPF_KERNEL_VERSION_CODE__ >= KERNEL_VERSION (4,15,0)
+int bpf_skb_set_tunnel_opt (void *ctx, void *md, int size)
+ KERNEL_HELPER (30);
-#define bpf_perf_event_read_value __builtin_bpf_helper_perf_event_read_value
-#define bpf_perf_prog_read_value __builtin_bpf_helper_perf_prog_read_value
-#define bpf_getsockopt __builtin_bpf_helper_getsockopt
-#define bpf_xdp_adjust_meta __builtin_bpf_helper_xdp_adjust_meta
+int bpf_skb_change_proto (void *ctx, short proto, unsigned long flags)
+ KERNEL_HELPER (31);
-#if __BPF_KERNEL_VERSION_CODE__ >= KERNEL_VERSION (4,16,0)
+int bpf_skb_change_type (void *ctx, unsigned int type)
+ KERNEL_HELPER (32);
-#define bpf_override_return __builtin_bpf_helper_override_return
-#define bpf_sock_ops_cb_flags_set __builtin_bpf_helper_sock_ops_cb_flags_set
+int bpf_skb_under_cgroup (void *ctx, void *map, int index)
+ KERNEL_HELPER (33);
-#if __BPF_KERNEL_VERSION_CODE__ >= KERNEL_VERSION (4,17,0)
+unsigned int bpf_get_hash_recalc (void *ctx)
+ KERNEL_HELPER (34);
-#define bpf_msg_redirect_map __builtin_bpf_helper_msg_redirect_map
-#define bpf_msg_apply_bytes __builtin_bpf_helper_msg_apply_bytes
-#define bpf_msg_cork_bytes __builtin_bpf_helper_msg_cork_bytes
-#define bpf_pull_data __builtin_bpf_helper_pull_data
-#define bpf_bind __builtin_bpf_helper_bpf_bind
+unsigned long long bpf_get_current_task (void)
+ KERNEL_HELPER (35);
-#if __BPF_KERNEL_VERSION_CODE__ >= KERNEL_VERSION (4,18,0)
+int bpf_probe_write_user (void *dst, const void *src, int size)
+ KERNEL_HELPER (36);
-#define bpf_xdp_adjust_tail __builtin_bpf_helper_xdp_adjust_tail
-#define bpf_skb_get_xfrm_state __builtin_bpf_helper_skb_get_xfrm_state
-#define bpf_get_stack __builtin_bpf_helper_get_stack
-#define bpf_skb_load_bytes_relative __builtin_bpf_helper_skb_load_bytes_relative
-#define bpf_sock_hash_update __builtin_bpf_helper_sock_hash_update
-#define bpf_msg_redirect_hash __builtin_bpf_helper_msg_redirect_hash
-#define bpf_sk_redirect_hash __builtin_bpf_helper_sk_redirect_hash
-#define bpf_lwt_push_encap __builtin_bpf_helper_lwt_push_encap
-#define bpf_lwt_seg6_store_bytes __builtin_bpf_helper_lwt_seg6_store_bytes
-#define bpf_lwt_seg6_adjust_srh __builtin_bpf_helper_lwt_seg6_adjust_srh
-#define bpf_lwt_seg6_action __builtin_bpf_helper_lwt_seg6_action
-#define bpf_rc_repeat __builtin_bpf_helper_rc_repeat
-#define bpf_rc_keydown __builtin_bpf_helper_rc_keydown
-#define bpf_skb_cgroup_id __builtin_bpf_helper_skb_cgroup_id
-#define bpf_get_current_cgroup_id __builtin_bpf_helper_get_current_cgroup_id
+int bpf_current_task_under_cgroup (void *map, int index)
+ KERNEL_HELPER (37);
-static inline int
-bpf_fib_lookup (void *ctx, struct bpf_fib_lookup *param, int plen,
- unsigned int flags)
-{
- return __builtin_bpf_helper_fib_lookup (ctx, (void *) param, plen, flags);
-}
+int bpf_skb_change_tail (void *ctx, unsigned int len, unsigned long flags)
+ KERNEL_HELPER (38);
+int bpf_skb_pull_data (void *, int len)
+ KERNEL_HELPER (39);
-#if __BPF_KERNEL_VERSION_CODE__ >= KERNEL_VERSION (4,19,0)
+long long bpf_csum_update (void *ctx, unsigned int csum)
+ KERNEL_HELPER (40);
-#define bpf_get_local_storage __builtin_bpf_helper_get_local_storage
-#define bpf_sk_select_reuseport __builtin_bpf_helper_sk_select_reuseport
-#define bpf_skb_ancestor_cgroup_id __builtin_bpf_helper_skb_ancestor_cgroup_id
+void bpf_set_hash_invalid (void *ctx)
+ KERNEL_HELPER (41);
-#if __BPF_KERNEL_VERSION_CODE__ >= KERNEL_VERSION (4,20,0)
+int bpf_get_numa_node_id (void)
+ KERNEL_HELPER (42);
-#define bpf_sk_release __builtin_bpf_helper_sk_release
-#define bpf_map_push_elem __builtin_bpf_helper_map_push_elem
-#define bpf_map_pop_elem __builtin_bpf_helper_map_pop_elem
-#define bpf_map_peek_elem __builtin_bpf_helper_map_peek_elem
-#define bpf_msg_push_data __builtin_bpf_helper_msg_push_data
+int bpf_skb_change_head (void *, int len, int flags)
+ KERNEL_HELPER (43);
-static inline struct bpf_sock *
-bpf_sk_lookup_tcp (void *ctx, struct bpf_sock_tuple *tuple,
- int size, unsigned long long netns_id,
- unsigned long long flags)
-{
- return
- (struct bpf_sock *) __builtin_bpf_helper_sk_lookup_tcp (ctx,
- (void *) tuple,
- size,
- netns_id, flags);
-}
-
-static inline struct bpf_sock *
-bpf_sk_lookup_udp (void *ctx, struct bpf_sock_tuple *tuple,
- int size, unsigned long long netns_id,
- unsigned long long flags)
-{
- return
- (struct bpf_sock *) __builtin_bpf_helper_sk_lookup_udp (ctx,
- (void *) tuple,
- size,
- netns_id, flags);
-}
+int bpf_xdp_adjust_head (void *ctx, int offset)
+ KERNEL_HELPER (44);
-#if __BPF_KERNEL_VERSION_CODE__ >= KERNEL_VERSION (5,0,0)
+int bpf_probe_read_str (void *ctx, unsigned int size, const void *unsafe_ptr)
+ KERNEL_HELPER (45);
-#define bpf_msg_pop_data __builtin_bpf_helper_pop_data
-#define bpf_rc_pointer_rel __builtin_bpf_helper_rc_pointer_rel
+int bpf_get_socket_cookie (void *ctx)
+ KERNEL_HELPER (46);
-#if __BPF_KERNEL_VERSION_CODE__ >= KERNEL_VERSION (5,1,0)
+unsigned int bpf_get_socket_uid (void *ctx)
+ KERNEL_HELPER (47);
-#define bpf_spin_lock __builtin_bpf_helper_spin_lock
-#define bpf_spin_unlock __builtin_bpf_helper_spin_unlock
-#define bpf_skb_ecn_set_ce __builtin_bpf_helper_skb_ecn_set_ce
+unsigned int bpf_set_hash (void *ctx, unsigned int hash)
+ KERNEL_HELPER (48);
-static inline struct bpf_sock *
-bpf_sk_fullsock (struct bpf_sock *sk)
-{
- return
- (struct bpf_sock *) __builtin_bpf_helper_sk_fullsock ((void *) sk);
-}
+int bpf_setsockopt (void *ctx, int level, int optname, void *optval, int optlen)
+ KERNEL_HELPER (49);
-static inline struct bpf_sock *
-bpf_tcp_sock (struct bpf_sock *sk)
-{
- return
- (struct bpf_sock *) __builtin_bpf_helper_tcp_sock ((void *) sk);
-}
+int bpf_skb_adjust_room (void *ctx, int len_diff, unsigned int mode,
+ unsigned long long flags)
+ KERNEL_HELPER (50);
-static inline struct bpf_sock *
-bpf_get_listener_sock (struct bpf_sock *sk)
-{
- return
- (struct bpf_sock *) __builtin_bpf_helper_get_listener_sock ((void *) sk);
-}
-
-#if __BPF_KERNEL_VERSION_CODE__ >= KERNEL_VERSION (5,2,0)
-
-
-#endif /* 5.2 */
-#endif /* 5.1 */
-#endif /* 5.0 */
-#endif /* 4.20 */
-#endif /* 4.19 */
-#endif /* 4.18 */
-#endif /* 4.17 */
-#endif /* 4.16 */
-#endif /* 4.15 */
-#endif /* 4.14 */
-#endif /* 4.13 */
-#endif /* 4.12 */
-#endif /* 4.11 */
-#endif /* 4.10 */
-#endif /* 4.9 */
-#endif /* 4.8 */
-#endif /* 4.6 */
-#endif /* 4.5 */
-#endif /* 4.4 */
-#endif /* 4.3 */
-#endif /* 4.2 */
-#endif /* 4.1 */
-#endif /* 4.0 */
+int bpf_redirect_map (void *map, int key, int flags)
+ KERNEL_HELPER (51);
+
+int bpf_sk_redirect_map (void *ctx, void *map, int key, int flags)
+ KERNEL_HELPER (52);
+
+int bpf_sock_map_update (void *map, void *key, void *value,
+ unsigned long long flags)
+ KERNEL_HELPER (53);
+
+int bpf_xdp_adjust_meta (void *ctx, int offset)
+ KERNEL_HELPER (54);
+
+int bpf_perf_event_read_value (void *map, unsigned long long flags,
+ void *buf, unsigned int buf_size)
+ KERNEL_HELPER (55);
+
+int bpf_perf_prog_read_value (void *ctx, void *buf, unsigned int buf_size)
+ KERNEL_HELPER (56);
+
+int bpf_getsockopt (void *ctx, int level, int optname, void *optval,
+ int optlen)
+ KERNEL_HELPER (57);
+
+int bpf_override_return (void *ctx, unsigned long rc)
+ KERNEL_HELPER (58);
+
+int bpf_sock_ops_cb_flags_set (void *ctx, int flags)
+ KERNEL_HELPER (59);
+
+int bpf_msg_redirect_map (void *ctx, void *map, int key, int flags)
+ KERNEL_HELPER (60);
+
+int bpf_msg_apply_bytes (void *ctx, int len)
+ KERNEL_HELPER (61);
+
+int bpf_msg_cork_bytes (void *ctx, int len)
+ KERNEL_HELPER (62);
+
+int bpf_msg_pull_data (void *, int len)
+ KERNEL_HELPER (63);
+
+int bpf_bind (void *ctx, void *addr, int addr_len)
+ KERNEL_HELPER (64);
+
+int bpf_xdp_adjust_tail (struct xdp_md *xdp_md, int delta)
+ KERNEL_HELPER (65);
+
+int bpf_skb_get_xfrm_state (void *ctx, int index, void *state,
+ int size, int flags)
+ KERNEL_HELPER (66);
+
+int bpf_get_stack (void *ctx, void *buf, int size, int flags)
+ KERNEL_HELPER (67);
+
+int bpf_skb_load_bytes_relative (void *ctx, int off, void *to, int len,
+ unsigned int start_header)
+ KERNEL_HELPER (68);
+
+int bpf_fib_lookup (void *ctx, struct bpf_fib_lookup *params,
+ int plen, unsigned int flags)
+ KERNEL_HELPER (69);
+
+int bpf_sock_hash_update (void *map, void *key, void *value,
+ unsigned long long flags)
+ KERNEL_HELPER (70);
+
+int bpf_msg_redirect_hash (void *ctx, void *map, void *key, int flags)
+ KERNEL_HELPER (71);
+
+int bpf_sk_redirect_hash (void *ctx, void *map, void *key, int flags)
+ KERNEL_HELPER (72);
+
+int bpf_lwt_push_encap (void *ctx, unsigned int type, void *hdr,
+ unsigned int len)
+ KERNEL_HELPER (73);
+
+int bpf_lwt_seg6_store_bytes (void *ctx, unsigned int offset,
+ void *from, unsigned int len)
+ KERNEL_HELPER (74);
+
+int bpf_lwt_seg6_adjust_srh (void *ctx, unsigned int offset,
+ unsigned int len)
+ KERNEL_HELPER (75);
+
+int bpf_lwt_seg6_action (void *ctx, unsigned int action, void *param,
+ unsigned int param_len)
+ KERNEL_HELPER (76);
+
+int bpf_rc_repeat (void *ctx)
+ KERNEL_HELPER (77);
+
+int bpf_rc_keydown (void *ctx, unsigned int protocol,
+ unsigned long long scancode, unsigned int toggle)
+ KERNEL_HELPER (78);
+
+unsigned bpf_skb_cgroup_id (void *ctx)
+ KERNEL_HELPER (79);
+
+unsigned long long bpf_get_current_cgroup_id (void)
+ KERNEL_HELPER (80);
+
+void *bpf_get_local_storage (void *map, unsigned long long flags)
+ KERNEL_HELPER (81);
+
+int bpf_sk_select_reuseport (void *ctx, void *map, void *key, unsigned int flags)
+ KERNEL_HELPER (82);
+
+unsigned long long bpf_skb_ancestor_cgroup_id (void *ctx, int level)
+ KERNEL_HELPER (83);
+
+struct bpf_sock *bpf_sk_lookup_tcp (void *ctx, struct bpf_sock_tuple *tuple,
+ int size, unsigned long long netns_id,
+ unsigned long long flags)
+ KERNEL_HELPER (84);
+
+struct bpf_sock *bpf_sk_lookup_udp (void *ctx, struct bpf_sock_tuple *tuple,
+ int size, unsigned long long netns_id,
+ unsigned long long flags)
+ KERNEL_HELPER (85);
+
+int bpf_sk_release (struct bpf_sock *sk)
+ KERNEL_HELPER (86);
+
+int bpf_map_push_elem (void *map, const void *value, unsigned long long flags)
+ KERNEL_HELPER (87);
+
+int bpf_map_pop_elem (void *map, void *value)
+ KERNEL_HELPER (88);
+
+int bpf_map_peek_elem (void *map, void *value)
+ KERNEL_HELPER (89);
+
+int bpf_msg_push_data (void *ctx, int start, int cut, int flags)
+ KERNEL_HELPER (90);
+
+int bpf_msg_pop_data (void *ctx, int start, int cut, int flags)
+ KERNEL_HELPER (91);
+
+int bpf_rc_pointer_rel (void *ctx, int rel_x, int rel_y)
+ KERNEL_HELPER (92);
+
+void bpf_spin_lock (struct bpf_spin_lock *lock)
+ KERNEL_HELPER (93);
+
+void bpf_spin_unlock (struct bpf_spin_lock *lock)
+ KERNEL_HELPER (94);
+
+struct bpf_sock *bpf_sk_fullsock (struct bpf_sock *sk)
+ KERNEL_HELPER (95);
+
+struct bpf_sock *bpf_tcp_sock (struct bpf_sock *sk)
+ KERNEL_HELPER (96);
+
+int bpf_skb_ecn_set_ce (void *ctx)
+ KERNEL_HELPER (97);
+
+struct bpf_sock *bpf_get_listener_sock (struct bpf_sock *sk)
+ KERNEL_HELPER (98);
+
+struct bpf_sock *bpf_skc_lookup_tcp (void *ctx,
+ struct bpf_sock_tuple *tuple,
+ unsigned int tuple_size,
+ unsigned long netns,
+ unsigned long flags)
+ KERNEL_HELPER (99);
+
+int bpf_tcp_check_syncookie (struct bpf_sock *sk, void *iph,
+ unsigned int iph_len,
+ struct tcp_hdr *th,
+ unsigned int th_len)
+ KERNEL_HELPER (100);
+
+int bpf_sysctl_get_name (struct bpf_sysctl *ctx,
+ char *buf, unsigned long buf_len,
+ unsigned long flags)
+ KERNEL_HELPER (101);
+
+int bpf_sysctl_get_current_value (struct bpf_sysctl *ctx,
+ char *buf, unsigned long buf_len)
+ KERNEL_HELPER (102);
+
+int bpf_sysctl_get_new_value (struct bpf_sysctl *ctx, char *buf,
+ unsigned long buf_len)
+ KERNEL_HELPER (103);
+
+int bpf_sysctl_set_new_value (struct bpf_sysctl *ctx, const char *buf,
+ unsigned long buf_len)
+ KERNEL_HELPER (104);
+
+int bpf_strtol (const char *buf, unsigned long buf_len,
+ unsigned long flags, long *res)
+ KERNEL_HELPER (105);
+
+int bpf_strtoul (const char *buf, unsigned long buf_len,
+ unsigned long flags, unsigned long *res)
+ KERNEL_HELPER (106);
+
+void *bpf_sk_storage_get (void *map, struct bpf_sock *sk,
+ void *value, long flags)
+ KERNEL_HELPER (107);
+
+int bpf_sk_storage_delete (void *map, struct bpf_sock *sk)
+ KERNEL_HELPER (108);
/* Functions to emit BPF_LD_ABS and BPF_LD_IND instructions. We
provide the "standard" names as synonyms of the corresponding GCC
builtins. Note how the SKB argument is ignored. */
-static inline long long
-load_byte (void *skb __attribute__ ((unused)),
- unsigned long long off)
-{
- return __builtin_bpf_load_byte (off);
-}
-
-static inline long long
-load_half (void *skb __attribute__ ((unused)),
- unsigned long long off)
-{
- return __builtin_bpf_load_half (off);
-}
-
-static inline long long
-load_word (void *skb __attribute__ ((unused)),
- unsigned long long off)
-{
- return __builtin_bpf_load_word (off);
-}
+#define load_byte(SKB,OFF) __builtin_bpf_load_byte ((OFF))
+#define load_half(SKB,OFF) __builtin_bpf_load_half ((OFF))
+#define load_word(SKB,OFF) __builtin_bpf_load_word ((OFF))
struct bpf_map_def
{
diff --git a/gcc/config/bpf/bpf.c b/gcc/config/bpf/bpf.c
index 36e08338630..84d17d4a27f 100644
--- a/gcc/config/bpf/bpf.c
+++ b/gcc/config/bpf/bpf.c
@@ -66,6 +66,63 @@ struct GTY(()) machine_function
int callee_saved_reg_size;
};
+/* Handle an attribute requiring a FUNCTION_DECL;
+ arguments as in struct attribute_spec.handler. */
+
+static tree
+bpf_handle_fndecl_attribute (tree *node, tree name,
+ tree args,
+ int flags ATTRIBUTE_UNUSED,
+ bool *no_add_attrs)
+{
+ if (TREE_CODE (*node) != FUNCTION_DECL)
+ {
+ warning (OPT_Wattributes, "%qE attribute only applies to functions",
+ name);
+ *no_add_attrs = true;
+ }
+
+ if (is_attribute_p ("kernel_helper", name))
+ {
+ if (args)
+ {
+ tree cst = TREE_VALUE (args);
+ if (TREE_CODE (cst) != INTEGER_CST)
+ {
+ warning (OPT_Wattributes, "%qE attribute requires an integer argument",
+ name);
+ *no_add_attrs = true;
+ }
+ }
+ else
+ {
+ warning (OPT_Wattributes, "%qE requires an argument", name);
+ *no_add_attrs = true;
+ }
+ }
+
+ return NULL_TREE;
+}
+
+/* Target-specific attributes. */
+
+static const struct attribute_spec bpf_attribute_table[] =
+{
+ /* Syntax: { name, min_len, max_len, decl_required, type_required,
+ function_type_required, affects_type_identity, handler,
+ exclude } */
+
+ /* Attribute to mark function prototypes as kernel helpers. */
+ { "kernel_helper", 1, 1, true, false, false, false,
+ bpf_handle_fndecl_attribute, NULL },
+
+ /* The last attribute spec is set to be NULL. */
+ { NULL, 0, 0, false, false, false, false, NULL, NULL }
+};
+
+#undef TARGET_ATTRIBUTE_TABLE
+#define TARGET_ATTRIBUTE_TABLE bpf_attribute_table
+
/* Data structures for the eBPF specific built-ins. */
/* Maximum number of arguments taken by a builtin function, plus
@@ -75,47 +132,13 @@ struct GTY(()) machine_function
enum bpf_builtins
{
BPF_BUILTIN_UNUSED = 0,
- /* Built-ins for kernel helpers. */
-#define DEF_HELPER(V,D,N,T) BPF_BUILTIN_HELPER_##D,
-# include "bpf-helpers.def"
-#undef DEF_HELPER
- BPF_BUILTIN_HELPER_MAX,
/* Built-ins for non-generic loads and stores. */
- BPF_BUILTIN_LOAD_BYTE = BPF_BUILTIN_HELPER_MAX,
+ BPF_BUILTIN_LOAD_BYTE,
BPF_BUILTIN_LOAD_HALF,
BPF_BUILTIN_LOAD_WORD,
BPF_BUILTIN_MAX,
};
-/* This table is indexed by an enum bpf_builtin. */
-static const char *bpf_helper_names[] =
-{
- NULL,
-#define DEF_HELPER(V,D,N,T) #N,
-# include "bpf-helpers.def"
-#undef DEF_HELPER
- NULL,
- NULL,
- NULL,
- NULL
-};
-
-/* Return the builtin code corresponding to the kernel helper builtin
- __builtin_NAME, or 0 if the name doesn't correspond to a kernel
- helper builtin. */
-
-static inline int
-bpf_helper_code (const char *name)
-{
- int i;
-
- for (i = 1; i < BPF_BUILTIN_HELPER_MAX; ++i)
- if (strcmp (name, bpf_helper_names[i]) == 0)
- return i;
-
- return 0;
-}
-
static GTY (()) tree bpf_builtins[(int) BPF_BUILTIN_MAX];
/* Initialize the per-function machine status. */
@@ -149,7 +172,7 @@ void
bpf_target_macros (cpp_reader *pfile)
{
builtin_define ("__BPF__");
-
+
if (TARGET_BIG_ENDIAN)
builtin_define ("__BPF_BIG_ENDIAN__");
else
@@ -187,7 +210,7 @@ bpf_target_macros (cpp_reader *pfile)
case LINUX_V5_1: version_code = "0x50100"; break;
case LINUX_V5_2: version_code = "0x50200"; break;
default:
- gcc_unreachable ();
+ gcc_unreachable ();
}
kernel_version_code = ACONCAT (("__BPF_KERNEL_VERSION_CODE__=",
@@ -359,7 +382,7 @@ bpf_expand_prologue (void)
insn = emit_move_insn (stack_pointer_rtx,
hard_frame_pointer_rtx);
RTX_FRAME_RELATED_P (insn) = 1;
-
+
if (size > 0)
{
insn = emit_insn (gen_rtx_SET (stack_pointer_rtx,
@@ -528,7 +551,7 @@ bpf_legitimate_address_p (machine_mode mode ATTRIBUTE_UNUSED,
rtx x0 = XEXP (x, 0);
rtx x1 = XEXP (x, 1);
-
+
if (bpf_address_base_p (x0, strict) && GET_CODE (x1) == CONST_INT)
return IN_RANGE (INTVAL (x1), -1 - 0x7fff, 0x7fff);
@@ -681,13 +704,16 @@ bpf_output_call (rtx target)
break;
case SYMBOL_REF:
{
- const char *function_name = XSTR (target, 0);
- int code;
-
- if (strncmp (function_name, "__builtin_bpf_helper_", 21) == 0
- && ((code = bpf_helper_code (function_name + 21)) != 0))
+ tree decl = SYMBOL_REF_DECL (target);
+ tree attr;
+
+ if (decl
+ && (attr = lookup_attribute ("kernel_helper",
+ DECL_ATTRIBUTES (decl))))
{
- xops[0] = GEN_INT (code);
+ tree attr_args = TREE_VALUE (attr);
+
+ xops[0] = GEN_INT (TREE_INT_CST_LOW (TREE_VALUE (attr_args)));
output_asm_insn ("call\t%0", xops);
}
else
@@ -792,40 +818,7 @@ def_builtin (const char *name, enum bpf_builtins code, tree type)
static void
bpf_init_builtins (void)
{
- /* Built-ins for calling kernel helpers. */
-
- tree pt = build_pointer_type (void_type_node);
- tree const_void_type
- = build_qualified_type (void_type_node, TYPE_QUAL_CONST);
- tree cpt = build_pointer_type (const_void_type);
- tree st = short_integer_type_node;
- tree ust = uint16_type_node;
- tree it = integer_type_node;
- tree ut = unsigned_type_node;
- tree const_char_type
- = build_qualified_type (char_type_node, TYPE_QUAL_CONST);
- tree cst = build_pointer_type (const_char_type);
- tree vt = void_type_node;
- tree ult = long_unsigned_type_node;
- tree u32t = uint32_type_node;
- tree u64t = uint64_type_node;
- tree llt = long_long_integer_type_node;
tree ullt = long_long_unsigned_type_node;
-
-#define TYPES build_function_type_list
-#define VTYPES build_varargs_function_type_list
-#define DEF_HELPER(V,D,N,T) \
- do \
- { \
- if (bpf_kernel >= (V)) \
- def_builtin ("__builtin_bpf_helper_" #N, \
- BPF_BUILTIN_HELPER_##D, \
- T); \
- } while (0);
-# include "bpf-helpers.def"
-#undef TYPES
-#undef VTYPES
-#undef DEF_HELPER
/* Built-ins for BPF_LD_ABS and BPF_LD_IND instructions. */
@@ -844,30 +837,17 @@ bpf_init_builtins (void)
with bpf_init_builtins. */
static rtx
-bpf_expand_builtin (tree exp, rtx target,
+bpf_expand_builtin (tree exp, rtx target ATTRIBUTE_UNUSED,
rtx subtarget ATTRIBUTE_UNUSED,
machine_mode mode ATTRIBUTE_UNUSED,
- int ignore)
+ int ignore ATTRIBUTE_UNUSED)
{
tree fndecl = TREE_OPERAND (CALL_EXPR_FN (exp), 0);
int code = DECL_MD_FUNCTION_CODE (fndecl);
- if (code >= 1 && code < BPF_BUILTIN_HELPER_MAX)
- {
- /* This is a builtin to call a kernel helper function.
-
- For these builtins, we just expand the function call normally
- with expand_call like we would do for a libcall. The function
- bpf_output_call below will then do The Right Thing (TM),
- recognizing the name of the called __builtin_helper_* symbol
- and emitting the corresponding CALL N instruction whenever
- necessary. */
-
- return expand_call (exp, target, ignore);
- }
- else if (code == BPF_BUILTIN_LOAD_BYTE
- || code == BPF_BUILTIN_LOAD_HALF
- || code == BPF_BUILTIN_LOAD_WORD)
+ if (code == BPF_BUILTIN_LOAD_BYTE
+ || code == BPF_BUILTIN_LOAD_HALF
+ || code == BPF_BUILTIN_LOAD_WORD)
{
/* Expand an indirect load from the sk_buff in the context.
There is just one argument to the builtin, which is the
diff --git a/gcc/doc/extend.texi b/gcc/doc/extend.texi
index 37a675aa2a5..79833171c5a 100644
--- a/gcc/doc/extend.texi
+++ b/gcc/doc/extend.texi
@@ -2446,6 +2446,7 @@ GCC plugins may provide their own attributes.
* ARM Function Attributes::
* AVR Function Attributes::
* Blackfin Function Attributes::
+* BPF Function Attributes::
* CR16 Function Attributes::
* C-SKY Function Attributes::
* Epiphany Function Attributes::
@@ -4657,6 +4658,24 @@ all registers except the stack pointer should be saved in the prologue
regardless of whether they are used or not.
@end table
+@node BPF Function Attributes
+@subsection BPF Function Attributes
+
+These function attributes are supported by the BPF back end:
+
+@table @code
+@item kernel_helper
+@cindex @code{kernel helper}, function attribute, BPF
+use this attribute to indicate the specified function declaration is a
+kernel helper. The helper function is passed as an argument to the
+attribute. Example:
+
+@smallexample
+int bpf_probe_read (void *dst, int size, const void *unsafe_ptr)
+ __attribute__ ((kernel_helper (4)));
+@end smallexample
+@end table
+
@node CR16 Function Attributes
@subsection CR16 Function Attributes
@@ -13858,7 +13877,6 @@ instructions, but allow the compiler to schedule those calls.
* AVR Built-in Functions::
* Blackfin Built-in Functions::
* BPF Built-in Functions::
-* BPF Kernel Helpers::
* FR-V Built-in Functions::
* MIPS DSP Built-in Functions::
* MIPS Paired-Single Support::
@@ -14879,158 +14897,6 @@ Load 16-bits from the @code{struct sk_buff} packet data pointed by the register
Load 32-bits from the @code{struct sk_buff} packet data pointed by the register @code{%r6} and return it.
@end deftypefn
-@node BPF Kernel Helpers
-@subsection BPF Kernel Helpers
-
-These built-in functions are available for calling kernel helpers, and
-they are available depending on the kernel version selected as the
-CPU.
-
-Rather than using the built-ins directly, it is preferred for programs
-to include @file{bpf-helpers.h} and use the wrappers defined there.
-
-For a full description of what the helpers do, the arguments they
-take, and the returned value, see the
-@file{linux/include/uapi/linux/bpf.h} in a Linux source tree.
-
-@smallexample
-void *__builtin_bpf_helper_map_lookup_elem (void *map, void *key)
-int __builtin_bpf_helper_map_update_elem (void *map, void *key,
- void *value,
- unsigned long long flags)
-int __builtin_bpf_helper_map_delete_elem (void *map, const void *key)
-int __builtin_bpf_helper_map_push_elem (void *map, const void *value,
- unsigned long long flags)
-int __builtin_bpf_helper_map_pop_elem (void *map, void *value)
-int __builtin_bpf_helper_map_peek_elem (void *map, void *value)
-int __builtin_bpf_helper_clone_redirect (void *skb,
- unsigned int ifindex,
- unsigned long long flags)
-int __builtin_bpf_helper_skb_get_tunnel_key (void *ctx, void *key, int size, int flags)
-int __builtin_bpf_helper_skb_set_tunnel_key (void *ctx, void *key, int size, int flags)
-int __builtin_bpf_helper_skb_get_tunnel_opt (void *ctx, void *md, int size)
-int __builtin_bpf_helper_skb_set_tunnel_opt (void *ctx, void *md, int size)
-int __builtin_bpf_helper_skb_get_xfrm_state (void *ctx, int index, void *state,
- int size, int flags)
-static unsigned long long __builtin_bpf_helper_skb_cgroup_id (void *ctx)
-static unsigned long long __builtin_bpf_helper_skb_ancestor_cgroup_id
- (void *ctx, int level)
-int __builtin_bpf_helper_skb_vlan_push (void *ctx, __be16 vlan_proto, __u16 vlan_tci)
-int __builtin_bpf_helper_skb_vlan_pop (void *ctx)
-int __builtin_bpf_helper_skb_ecn_set_ce (void *ctx)
-
-int __builtin_bpf_helper_skb_load_bytes (void *ctx, int off, void *to, int len)
-int __builtin_bpf_helper_skb_load_bytes_relative (void *ctx, int off, void *to, int len, __u32 start_header)
-int __builtin_bpf_helper_skb_store_bytes (void *ctx, int off, void *from, int len, int flags)
-int __builtin_bpf_helper_skb_under_cgroup (void *ctx, void *map, int index)
-int __builtin_bpf_helper_skb_change_head (void *, int len, int flags)
-int __builtin_bpf_helper_skb_pull_data (void *, int len)
-int __builtin_bpf_helper_skb_change_proto (void *ctx, __be16 proto, __u64 flags)
-int __builtin_bpf_helper_skb_change_type (void *ctx, __u32 type)
-int __builtin_bpf_helper_skb_change_tail (void *ctx, __u32 len, __u64 flags)
-int __builtin_bpf_helper_skb_adjust_room (void *ctx, __s32 len_diff, __u32 mode,
- unsigned long long flags)
-@end smallexample
-
-Other helpers:
-
-@smallexample
-int __builtin_bpf_helper_probe_read (void *dst, unsigned int size, void *src)
-unsigned long long __builtin_bpf_helper_ktime_get_ns (void)
-int __builtin_bpf_helper_trace_printk (const char *fmt, unsigned int fmt_size, ...)
-void __builtin_bpf_helper_tail_call (void *ctx, void *prog_array_map, unsigned int index)
-unsigned int __builtin_bpf_helper_get_smp_processor_id (void)
-unsigned long long __builtin_bpf_helper_get_current_pid_tgid (void)
-unsigned long long __builtin_bpf_helper_get_current_uid_gid (void)
-int __builtin_bpf_helper_get_current_comm (void *buf, unsigned int size_of_buf)
-unsigned long long __builtin_bpf_helper_perf_event_read (void *map, unsigned long long flags)
-
-int __builtin_bpf_helper_redirect (unsigned int ifindex, unsigned long long flags)
-int __builtin_bpf_helper_redirect_map (void *map, unsigned int key, unsigned long long flags)
-int __builtin_bpf_helper_perf_event_output (void *ctx,void *map, unsigned long long flags, void *data, unsigned long long size)
-int __builtin_bpf_helper_get_stackid (void *ctx, void *map, unsigned long long flags)
-int __builtin_bpf_helper_probe_write_user (void *dst, const void *src, unsigned int len)
-int __builtin_bpf_helper_current_task_under_cgroup (void *map, unsigned int index)
-
-static unsigned long long __builtin_bpf_helper_get_prandom_u32 (void)
-int __builtin_bpf_helper_xdp_adjust_head (void *ctx, int offset)
-int __builtin_bpf_helper_xdp_adjust_meta (void *ctx, int offset)
-int __builtin_bpf_helper_get_socket_cookie (void *ctx)
-int __builtin_bpf_helper_setsockopt (void *ctx, int level, int optname, void *optval,
- int optlen)
-int __builtin_bpf_helper_getsockopt (void *ctx, int level, int optname, void *optval,
- int optlen)
-int __builtin_bpf_helper_sock_ops_cb_flags_set (void *ctx, int flags)
-int __builtin_bpf_helper_sk_redirect_map (void *ctx, void *map, int key, int flags)
-int __builtin_bpf_helper_sk_redirect_hash (void *ctx, void *map, void *key, int flags)
-int __builtin_bpf_helper_sock_map_update (void *map, void *key, void *value,
- unsigned long long flags)
-int __builtin_bpf_helper_sock_hash_update (void *map, void *key, void *value,
- unsigned long long flags)
-int __builtin_bpf_helper_perf_event_read_value (void *map, unsigned long long flags,
- void *buf, unsigned int buf_size)
-int __builtin_bpf_helper_perf_prog_read_value (void *ctx, void *buf,
- unsigned int buf_size)
-
-int __builtin_bpf_helper_override_return (void *ctx, unsigned long rc)
-int __builtin_bpf_helper_msg_redirect_map (void *ctx, void *map, int key, int flags)
-int __builtin_bpf_helper_msg_redirect_hash (void *ctx,
- void *map, void *key, int flags)
-int __builtin_bpf_helper_msg_apply_bytes (void *ctx, int len)
-int __builtin_bpf_helper_msg_cork_bytes (void *ctx, int len)
-int __builtin_bpf_helper_msg_pull_data (void *ctx, int start, int end, int flags)
-int __builtin_bpf_helper_msg_push_data (void *ctx, int start, int end, int flags)
-int __builtin_bpf_helper_msg_pop_data (void *ctx, int start, int cut, int flags)
-int __builtin_bpf_helper_bind (void *ctx, void *addr, int addr_len)
-int __builtin_bpf_helper_xdp_adjust_tail (void *ctx, int offset)
-int __builtin_bpf_helper_sk_select_reuseport (void *ctx, void *map, void *key, __u32 flags)
-int __builtin_bpf_helper_get_stack (void *ctx, void *buf, int size, int flags)
-int __builtin_bpf_helper_fib_lookup (void *ctx, struct bpf_fib_lookup *params,
- int plen, __u32 flags)
-
-int __builtin_bpf_helper_lwt_push_encap (void *ctx, unsigned int type, void *hdr,
- unsigned int len)
-int __builtin_bpf_helper_lwt_seg6_store_bytes (void *ctx, unsigned int offset,
- void *from, unsigned int len)
-int __builtin_bpf_helper_lwt_seg6_action (void *ctx, unsigned int action, void *param,
- unsigned int param_len)
-int __builtin_bpf_helper_lwt_seg6_adjust_srh (void *ctx, unsigned int offset,
- unsigned int len)
-int __builtin_bpf_helper_rc_repeat (void *ctx)
-int __builtin_bpf_helper_rc_keydown (void *ctx, unsigned int protocol,
- unsigned long long scancode, unsigned int toggle)
-static unsigned long long __builtin_bpf_helper_get_current_cgroup_id (void)
-static void *__builtin_bpf_helper_get_local_storage (void *map, unsigned long long flags)
-static struct bpf_sock *__builtin_bpf_helper_sk_lookup_tcp (void *ctx, void *tuple, int size, unsigned long long netns_id, unsigned long long flags)
-static struct bpf_sock *__builtin_bpf_helper_sk_lookup_udp (void *ctx, void *tuple, int size, unsigned long long netns_id, unsigned long long flags)
-int __builtin_bpf_helper_sk_release (struct bpf_sock *sk)
-int __builtin_bpf_helper_rc_pointer_rel (void *ctx, int rel_x, int rel_y)
-static void __builtin_bpf_helper_spin_lock (struct bpf_spin_lock *lock)
-static void __builtin_bpf_helper_spin_unlock (struct bpf_spin_lock *lock)
-
-static struct bpf_sock *__builtin_bpf_helper_sk_fullsock (struct bpf_sock *sk)
-static struct bpf_tcp_sock *__builtin_bpf_helper_tcp_sock (struct bpf_sock *sk)
-static struct bpf_sock *__builtin_bpf_helper_get_listener_sock (struct bpf_sock *sk)
-
-int __builtin_bpf_helper_l3_csum_replace (void *ctx, int off, int from, int to, int flags)
-int __builtin_bpf_helper_l4_csum_replace (void *ctx, int off, int from, int to, int flags)
-int __builtin_bpf_helper_csum_diff (void *from, int from_size, void *to, int to_size, int seed)
-
-static unsigned int __builtin_bpf_helper_get_cgroup_classid (void *ctx)
-static unsigned int __builtin_bpf_helper_get_route_realm (void *ctx)
-static unsigned int __builtin_bpf_helper_get_hash_recalc (void *ctx)
-static unsigned long long __builtin_bpf_helper_get_current_task (void *ctx)
-
-static long long __builtin_bpf_helper_csum_update (void *ctx, __u32 csum)
-static void __builtin_bpf_helper_set_hash_invalid (void *ctx)
-int __builtin_bpf_helper_get_numa_node_id (void)
-int __builtin_bpf_helper_probe_read_str (void *ctx, __u32 size,
- const void *unsafe_ptr)
-static unsigned int __builtin_bpf_helper_get_socket_uid (void *ctx)
-static unsigned int __builtin_bpf_helper_set_hash (void *ctx, __u32 hash)
-@end smallexample
-
-
@node FR-V Built-in Functions
@subsection FR-V Built-in Functions
diff --git a/gcc/testsuite/gcc.target/bpf/helper-bind.c b/gcc/testsuite/gcc.target/bpf/helper-bind.c
index 2d1fedc4ce8..8dfde242a23 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-bind.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-bind.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -9,7 +11,7 @@ foo ()
void *ctx, *addr;
int addr_len;
- ret = __builtin_bpf_helper_bind (ctx, addr, addr_len);
+ ret = bpf_bind (ctx, addr, addr_len);
}
/* { dg-final { scan-assembler "call\t64" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-bpf-redirect.c b/gcc/testsuite/gcc.target/bpf/helper-bpf-redirect.c
index 844c88d3e34..9937d5ab4cc 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-bpf-redirect.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-bpf-redirect.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -9,7 +11,7 @@ foo ()
uint32_t ifindex;
uint64_t flags;
- ret = __builtin_bpf_helper_redirect (ifindex, flags);
+ ret = bpf_redirect (ifindex, flags);
}
/* { dg-final { scan-assembler "call\t23" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-clone-redirect.c b/gcc/testsuite/gcc.target/bpf/helper-clone-redirect.c
index a4fb8139234..e38adbc40e7 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-clone-redirect.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-clone-redirect.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -10,7 +12,7 @@ foo ()
uint32_t ifindex;
uint64_t flags;
- ret = __builtin_bpf_helper_clone_redirect (skb, ifindex, flags);
+ ret = bpf_clone_redirect (skb, ifindex, flags);
}
/* { dg-final { scan-assembler "call\t13" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-csum-diff.c b/gcc/testsuite/gcc.target/bpf/helper-csum-diff.c
index ef38192efd3..a1c8bf5a026 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-csum-diff.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-csum-diff.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -10,7 +12,7 @@ foo ()
uint64_t to_size, from_size;
int seed;
- ret = __builtin_bpf_helper_csum_diff (from, from_size, to, to_size, seed);
+ ret = bpf_csum_diff (from, from_size, to, to_size, seed);
}
/* { dg-final { scan-assembler "call\t28" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-csum-update.c b/gcc/testsuite/gcc.target/bpf/helper-csum-update.c
index 3cde8678cb5..4f65033acb4 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-csum-update.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-csum-update.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -9,7 +11,7 @@ foo ()
void *skb;
int csum;
- ret = __builtin_bpf_helper_csum_update (skb, csum);
+ ret = bpf_csum_update (skb, csum);
}
/* { dg-final { scan-assembler "call\t40" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-current-task-under-cgroup.c b/gcc/testsuite/gcc.target/bpf/helper-current-task-under-cgroup.c
index a7eb6e617e8..5b05378a730 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-current-task-under-cgroup.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-current-task-under-cgroup.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -9,7 +11,7 @@ foo ()
void *map;
uint32_t index;
- ret = __builtin_bpf_helper_current_task_under_cgroup (map, index);
+ ret = bpf_current_task_under_cgroup (map, index);
}
/* { dg-final { scan-assembler "call\t37" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-fib-lookup.c b/gcc/testsuite/gcc.target/bpf/helper-fib-lookup.c
index 9a9f79d402c..8290234108a 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-fib-lookup.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-fib-lookup.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -10,7 +12,7 @@ foo ()
int plen;
uint32_t flags;
- ret = __builtin_bpf_helper_fib_lookup (ctx, params, plen, flags);
+ ret = bpf_fib_lookup (ctx, params, plen, flags);
}
/* { dg-final { scan-assembler "call\t69" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-get-cgroup-classid.c b/gcc/testsuite/gcc.target/bpf/helper-get-cgroup-classid.c
index 6cfd14d0ad1..5d85a89c632 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-get-cgroup-classid.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-get-cgroup-classid.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -8,7 +10,7 @@ foo ()
uint32_t ret;
void *skb;
- ret = __builtin_bpf_helper_get_cgroup_classid (skb);
+ ret = bpf_get_cgroup_classid (skb);
}
/* { dg-final { scan-assembler "call\t17" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-get-current-cgroup-id.c b/gcc/testsuite/gcc.target/bpf/helper-get-current-cgroup-id.c
index 916dc4d3bb1..b0c0b74c11f 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-get-current-cgroup-id.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-get-current-cgroup-id.c
@@ -1,13 +1,15 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
{
uint64_t ret;
- ret = __builtin_bpf_helper_get_current_cgroup_id ();
+ ret = bpf_get_current_cgroup_id ();
}
/* { dg-final { scan-assembler "call\t80" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-get-current-comm.c b/gcc/testsuite/gcc.target/bpf/helper-get-current-comm.c
index efc330c3c98..1e25cd1cc7e 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-get-current-comm.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-get-current-comm.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -9,7 +11,7 @@ foo ()
void *buf;
uint32_t size_of_buf;
- ret = __builtin_bpf_helper_get_current_comm (buf, size_of_buf);
+ ret = bpf_get_current_comm (buf, size_of_buf);
}
/* { dg-final { scan-assembler "call\t16" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-get-current-pid-tgid.c b/gcc/testsuite/gcc.target/bpf/helper-get-current-pid-tgid.c
index 32d3e9c91d1..1dd7a1e507b 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-get-current-pid-tgid.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-get-current-pid-tgid.c
@@ -1,13 +1,15 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
{
uint64_t ret;
- ret = __builtin_bpf_helper_get_current_pid_tgid ();
+ ret = bpf_get_current_pid_tgid ();
}
/* { dg-final { scan-assembler "call\t14" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-get-current-task.c b/gcc/testsuite/gcc.target/bpf/helper-get-current-task.c
index 016c134b132..79344d15abf 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-get-current-task.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-get-current-task.c
@@ -1,13 +1,15 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
{
uint64_t ret;
- ret = __builtin_bpf_helper_get_current_task ();
+ ret = bpf_get_current_task ();
}
/* { dg-final { scan-assembler "call\t35" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-get-current-uid-gid.c b/gcc/testsuite/gcc.target/bpf/helper-get-current-uid-gid.c
index 1dc2f9f41e5..b3e7261c35b 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-get-current-uid-gid.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-get-current-uid-gid.c
@@ -1,13 +1,15 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
{
uint64_t ret;
- ret = __builtin_bpf_helper_get_current_uid_gid ();
+ ret = bpf_get_current_uid_gid ();
}
/* { dg-final { scan-assembler "call\t15" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-get-hash-recalc.c b/gcc/testsuite/gcc.target/bpf/helper-get-hash-recalc.c
index 1db5d871c26..e9d87ae9bcc 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-get-hash-recalc.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-get-hash-recalc.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -8,7 +10,7 @@ foo ()
uint32_t ret;
void *skb;
- ret = __builtin_bpf_helper_get_hash_recalc (skb);
+ ret = bpf_get_hash_recalc (skb);
}
/* { dg-final { scan-assembler "call\t34" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-get-listener-sock.c b/gcc/testsuite/gcc.target/bpf/helper-get-listener-sock.c
index 298da1c949b..500ba787a3a 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-get-listener-sock.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-get-listener-sock.c
@@ -1,13 +1,15 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
{
void *ret, *sk;
- ret = __builtin_bpf_helper_get_listener_sock (sk);
+ ret = bpf_get_listener_sock (sk);
}
/* { dg-final { scan-assembler "call\t98" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-get-local-storage.c b/gcc/testsuite/gcc.target/bpf/helper-get-local-storage.c
index 88da67e99ae..1c28ef52c11 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-get-local-storage.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-get-local-storage.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -8,7 +10,7 @@ foo ()
void *ret, *map;
uint64_t flags;
- ret = __builtin_bpf_helper_get_local_storage (map, flags);
+ ret = bpf_get_local_storage (map, flags);
}
/* { dg-final { scan-assembler "call\t81" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-get-numa-node-id.c b/gcc/testsuite/gcc.target/bpf/helper-get-numa-node-id.c
index 628e1012152..e6477a5c1ff 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-get-numa-node-id.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-get-numa-node-id.c
@@ -1,13 +1,15 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
{
int ret;
- ret = __builtin_bpf_helper_get_numa_node_id ();
+ ret = bpf_get_numa_node_id ();
}
/* { dg-final { scan-assembler "call\t42" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-get-prandom-u32.c b/gcc/testsuite/gcc.target/bpf/helper-get-prandom-u32.c
index 6d3e5bc7a22..f30cafd36b0 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-get-prandom-u32.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-get-prandom-u32.c
@@ -1,13 +1,15 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
{
uint32_t ret;
- ret = __builtin_bpf_helper_get_prandom_u32 ();
+ ret = bpf_get_prandom_u32 ();
}
/* { dg-final { scan-assembler "call\t7" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-get-route-realm.c b/gcc/testsuite/gcc.target/bpf/helper-get-route-realm.c
index 5056c4adb1f..b7794307802 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-get-route-realm.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-get-route-realm.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -8,7 +10,7 @@ foo ()
uint32_t ret;
void *skb;
- ret = __builtin_bpf_helper_get_route_realm (skb);
+ ret = bpf_get_route_realm (skb);
}
/* { dg-final { scan-assembler "call\t24" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-get-smp-processor-id.c b/gcc/testsuite/gcc.target/bpf/helper-get-smp-processor-id.c
index 655b87341df..7d0e9869826 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-get-smp-processor-id.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-get-smp-processor-id.c
@@ -1,13 +1,15 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
{
uint32_t ret;
- ret = __builtin_bpf_helper_get_smp_processor_id ();
+ ret = bpf_get_smp_processor_id ();
}
/* { dg-final { scan-assembler "call\t8" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-get-socket-cookie.c b/gcc/testsuite/gcc.target/bpf/helper-get-socket-cookie.c
index afd17ddcd50..e2e421f9859 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-get-socket-cookie.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-get-socket-cookie.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -8,7 +10,7 @@ foo ()
uint64_t ret;
void *skb;
- ret = __builtin_bpf_helper_get_socket_cookie (skb);
+ ret = bpf_get_socket_cookie (skb);
}
/* { dg-final { scan-assembler "call\t46" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-get-socket-uid.c b/gcc/testsuite/gcc.target/bpf/helper-get-socket-uid.c
index 3a274c965f7..343f86656d1 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-get-socket-uid.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-get-socket-uid.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -8,7 +10,7 @@ foo ()
uint32_t ret;
void *skb;
- ret = __builtin_bpf_helper_get_socket_uid (skb);
+ ret = bpf_get_socket_uid (skb);
}
/* { dg-final { scan-assembler "call\t47" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-get-stack.c b/gcc/testsuite/gcc.target/bpf/helper-get-stack.c
index bbcdeb58775..cc3f6a06bb2 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-get-stack.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-get-stack.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -10,7 +12,7 @@ foo ()
uint32_t size;
uint64_t flags;
- ret = __builtin_bpf_helper_get_stack (regs, buf, size, flags);
+ ret = bpf_get_stack (regs, buf, size, flags);
}
/* { dg-final { scan-assembler "call\t67" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-get-stackid.c b/gcc/testsuite/gcc.target/bpf/helper-get-stackid.c
index 319d15cd2fa..cc3ecb01a05 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-get-stackid.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-get-stackid.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -9,7 +11,7 @@ foo ()
void *ctx, *map;
uint64_t flags;
- ret = __builtin_bpf_helper_get_stackid (ctx, map, flags);
+ ret = bpf_get_stackid (ctx, map, flags);
}
/* { dg-final { scan-assembler "call\t27" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-getsockopt.c b/gcc/testsuite/gcc.target/bpf/helper-getsockopt.c
index fb16f15e6ea..c4b32982ed7 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-getsockopt.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-getsockopt.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -10,8 +12,8 @@ foo ()
int level, optname, optlen;
char *optval;
- ret = __builtin_bpf_helper_getsockopt (bpf_socket, level,
- optname, optval, optlen);
+ ret = bpf_getsockopt (bpf_socket, level,
+ optname, optval, optlen);
}
/* { dg-final { scan-assembler "call\t57" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-ktime-get-ns.c b/gcc/testsuite/gcc.target/bpf/helper-ktime-get-ns.c
index 405df057e30..77f1661f387 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-ktime-get-ns.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-ktime-get-ns.c
@@ -1,12 +1,14 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
{
uint64_t ret;
- ret = __builtin_bpf_helper_ktime_get_ns ();
+ ret = bpf_ktime_get_ns ();
}
/* { dg-final { scan-assembler "call\t5" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-l3-csum-replace.c b/gcc/testsuite/gcc.target/bpf/helper-l3-csum-replace.c
index ac17662c5d6..c3f1b78397a 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-l3-csum-replace.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-l3-csum-replace.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -10,7 +12,7 @@ foo ()
uint32_t offset;
uint64_t from, to, size;
- ret = __builtin_bpf_helper_l3_csum_replace (skb, offset, from, to, size);
+ ret = bpf_l3_csum_replace (skb, offset, from, to, size);
}
/* { dg-final { scan-assembler "call\t10" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-l4-csum-replace.c b/gcc/testsuite/gcc.target/bpf/helper-l4-csum-replace.c
index 52b5514b6cb..fd54f0b5e88 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-l4-csum-replace.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-l4-csum-replace.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -10,7 +12,7 @@ foo ()
uint32_t offset;
uint64_t from, to, size;
- ret = __builtin_bpf_helper_l4_csum_replace (skb, offset, from, to, size);
+ ret = bpf_l4_csum_replace (skb, offset, from, to, size);
}
/* { dg-final { scan-assembler "call\t11" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-lwt-push-encap.c b/gcc/testsuite/gcc.target/bpf/helper-lwt-push-encap.c
index 1baed27fac7..c6d4769b742 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-lwt-push-encap.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-lwt-push-encap.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -9,7 +11,7 @@ foo ()
void *skb, *hdr;
uint32_t type, len;
- ret = __builtin_bpf_helper_lwt_push_encap (skb, type, hdr, len);
+ ret = bpf_lwt_push_encap (skb, type, hdr, len);
}
/* { dg-final { scan-assembler "call\t73" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-lwt-seg6-action.c b/gcc/testsuite/gcc.target/bpf/helper-lwt-seg6-action.c
index ccc94c1af9d..4cd7052806b 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-lwt-seg6-action.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-lwt-seg6-action.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -9,8 +11,8 @@ foo ()
void *skb, *param;
uint32_t action, param_len;
- ret = __builtin_bpf_helper_lwt_seg6_action (skb, action,
- param, param_len);
+ ret = bpf_lwt_seg6_action (skb, action,
+ param, param_len);
}
/* { dg-final { scan-assembler "call\t76" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-lwt-seg6-adjust-srh.c b/gcc/testsuite/gcc.target/bpf/helper-lwt-seg6-adjust-srh.c
index 5e95124ad0f..adc8dc414df 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-lwt-seg6-adjust-srh.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-lwt-seg6-adjust-srh.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -9,7 +11,7 @@ foo ()
void *skb;
uint32_t offset, delta;
- ret = __builtin_bpf_helper_lwt_seg6_adjust_srh (skb, offset,
+ ret = bpf_lwt_seg6_adjust_srh (skb, offset,
delta);
}
diff --git a/gcc/testsuite/gcc.target/bpf/helper-lwt-seg6-store-bytes.c b/gcc/testsuite/gcc.target/bpf/helper-lwt-seg6-store-bytes.c
index 098f97680f2..a35e917d575 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-lwt-seg6-store-bytes.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-lwt-seg6-store-bytes.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -9,8 +11,7 @@ foo ()
void *skb, *from;
uint32_t offset, len;
- ret = __builtin_bpf_helper_lwt_seg6_store_bytes (skb, offset,
- from, len);
+ ret = bpf_lwt_seg6_store_bytes (skb, offset, from, len);
}
/* { dg-final { scan-assembler "call\t74" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-map-delete-elem.c b/gcc/testsuite/gcc.target/bpf/helper-map-delete-elem.c
index b8a6cdec4ee..0200b15eb45 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-map-delete-elem.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-map-delete-elem.c
@@ -1,4 +1,7 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
+
+#include <bpf-helpers.h>
char *map () { return 0; }
@@ -8,7 +11,7 @@ foo ()
int ret;
char *key = 0;
- ret = __builtin_bpf_helper_map_delete_elem (map (), key);
+ ret = bpf_map_delete_elem (map (), key);
}
/* { dg-final { scan-assembler "call\t3" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-map-lookup-elem.c b/gcc/testsuite/gcc.target/bpf/helper-map-lookup-elem.c
index 839cfc423a7..1d443a05138 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-map-lookup-elem.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-map-lookup-elem.c
@@ -1,4 +1,7 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
+
+#include <bpf-helpers.h>
char *map () { return 0; }
@@ -6,7 +9,7 @@ void
foo ()
{
char *key = 0, *value = 0;
- value = __builtin_bpf_helper_map_lookup_elem (map (), key);
+ value = bpf_map_lookup_elem (map (), key);
}
/* { dg-final { scan-assembler "call\t1" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-map-peek-elem.c b/gcc/testsuite/gcc.target/bpf/helper-map-peek-elem.c
index 6d0acb1dcb7..de833f202a9 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-map-peek-elem.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-map-peek-elem.c
@@ -1,4 +1,7 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
+
+#include <bpf-helpers.h>
char *map () { return 0; }
@@ -8,7 +11,7 @@ foo ()
int ret;
char *value = 0;
- ret = __builtin_bpf_helper_map_peek_elem (map (), value);
+ ret = bpf_map_peek_elem (map (), value);
}
/* { dg-final { scan-assembler "call\t89" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-map-pop-elem.c b/gcc/testsuite/gcc.target/bpf/helper-map-pop-elem.c
index 71a7851ca9c..7d76f853f38 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-map-pop-elem.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-map-pop-elem.c
@@ -1,4 +1,7 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
+
+#include <bpf-helpers.h>
char *map () { return 0; }
@@ -8,7 +11,7 @@ foo ()
int ret;
char *value = 0;
- ret = __builtin_bpf_helper_map_pop_elem (map (), value);
+ ret = bpf_map_pop_elem (map (), value);
}
/* { dg-final { scan-assembler "call\t88" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-map-push-elem.c b/gcc/testsuite/gcc.target/bpf/helper-map-push-elem.c
index 53bc0ac5dd7..b4b2a8ef1ef 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-map-push-elem.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-map-push-elem.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
/* { dg-options "-std=gnu99" } */
+#include <bpf-helpers.h>
+
char *map () { return 0; }
void
@@ -10,7 +12,7 @@ foo ()
char *value = 0;
long long flags = 0;
- ret = __builtin_bpf_helper_map_push_elem (map (), value, flags);
+ ret = bpf_map_push_elem (map (), value, flags);
}
/* { dg-final { scan-assembler "call\t87" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-map-update-elem.c b/gcc/testsuite/gcc.target/bpf/helper-map-update-elem.c
index 6281442ba3d..6cceafe62e3 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-map-update-elem.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-map-update-elem.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
/* { dg-options "-std=gnu99" } */
+#include <bpf-helpers.h>
+
char *map () { return 0; }
void
@@ -10,7 +12,7 @@ foo ()
long long flags = 0;
char *key = 0, *value = 0;
- ret = __builtin_bpf_helper_map_update_elem (map (), key, value, flags);
+ ret = bpf_map_update_elem (map (), key, value, flags);
}
/* { dg-final { scan-assembler "call\t2" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-msg-apply-bytes.c b/gcc/testsuite/gcc.target/bpf/helper-msg-apply-bytes.c
index 3b831acad64..9c8ef9d0c88 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-msg-apply-bytes.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-msg-apply-bytes.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -9,7 +11,7 @@ foo ()
void *msg;
uint32_t bytes;
- ret = __builtin_bpf_helper_msg_apply_bytes (msg, bytes);
+ ret = bpf_msg_apply_bytes (msg, bytes);
}
/* { dg-final { scan-assembler "call\t61" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-msg-cork-bytes.c b/gcc/testsuite/gcc.target/bpf/helper-msg-cork-bytes.c
index 2c4ee218832..988a04dfb15 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-msg-cork-bytes.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-msg-cork-bytes.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -9,7 +11,7 @@ foo ()
void *msg;
uint32_t bytes;
- ret = __builtin_bpf_helper_msg_cork_bytes (msg, bytes);
+ ret = bpf_msg_cork_bytes (msg, bytes);
}
/* { dg-final { scan-assembler "call\t62" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-msg-pop-data.c b/gcc/testsuite/gcc.target/bpf/helper-msg-pop-data.c
index 377c036603e..567904433f9 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-msg-pop-data.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-msg-pop-data.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -10,7 +12,7 @@ foo ()
uint32_t start, pop;
uint64_t flags;
- ret = __builtin_bpf_helper_msg_pop_data (skb, start, pop, flags);
+ ret = bpf_msg_pop_data (skb, start, pop, flags);
}
/* { dg-final { scan-assembler "call\t91" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-msg-pull-data.c b/gcc/testsuite/gcc.target/bpf/helper-msg-pull-data.c
index ef27493122b..77141019a9a 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-msg-pull-data.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-msg-pull-data.c
@@ -1,16 +1,17 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
{
int ret;
void *msg;
- uint32_t start, end;
- uint64_t flags;
+ int len;
- ret = __builtin_bpf_helper_msg_pull_data (msg, start, end, flags);
+ ret = bpf_msg_pull_data (msg, len);
}
/* { dg-final { scan-assembler "call\t63" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-msg-push-data.c b/gcc/testsuite/gcc.target/bpf/helper-msg-push-data.c
index 9e256bc5ca7..40b936162fc 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-msg-push-data.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-msg-push-data.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -10,7 +12,7 @@ foo ()
uint32_t start, len;
uint64_t flags;
- ret = __builtin_bpf_helper_msg_push_data (skb, start, len, flags);
+ ret = bpf_msg_push_data (skb, start, len, flags);
}
/* { dg-final { scan-assembler "call\t90" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-msg-redirect-hash.c b/gcc/testsuite/gcc.target/bpf/helper-msg-redirect-hash.c
index 2e9d4137d66..6ac680cc098 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-msg-redirect-hash.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-msg-redirect-hash.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -9,7 +11,7 @@ foo ()
void *msg, *map, *key;
uint64_t flags;
- ret = __builtin_bpf_helper_msg_redirect_hash (msg, map, key,
+ ret = bpf_msg_redirect_hash (msg, map, key,
flags);
}
diff --git a/gcc/testsuite/gcc.target/bpf/helper-msg-redirect-map.c b/gcc/testsuite/gcc.target/bpf/helper-msg-redirect-map.c
index f5f8405e324..ef69f111183 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-msg-redirect-map.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-msg-redirect-map.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -10,7 +12,7 @@ foo ()
uint64_t key;
uint64_t flags;
- ret = __builtin_bpf_helper_msg_redirect_map (msg, map, key,
+ ret = bpf_msg_redirect_map (msg, map, key,
flags);
}
diff --git a/gcc/testsuite/gcc.target/bpf/helper-override-return.c b/gcc/testsuite/gcc.target/bpf/helper-override-return.c
index 3bd5424353f..380fd59567d 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-override-return.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-override-return.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -9,7 +11,7 @@ foo ()
void *regs;
uint64_t rc;
- ret = __builtin_bpf_helper_override_return (regs, rc);
+ ret = bpf_override_return (regs, rc);
}
/* { dg-final { scan-assembler "call\t58" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-perf-event-output.c b/gcc/testsuite/gcc.target/bpf/helper-perf-event-output.c
index afb32010bdd..24ed565097e 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-perf-event-output.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-perf-event-output.c
@@ -1,6 +1,7 @@
/* { dg-do compile } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -11,7 +12,7 @@ foo ()
void *data;
uint64_t size;
- ret = __builtin_bpf_helper_perf_event_output (ctx, map, flags, data, size);
+ ret = bpf_perf_event_output (ctx, map, flags, data, size);
}
/* { dg-final { scan-assembler "call\t25" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-perf-event-read-value.c b/gcc/testsuite/gcc.target/bpf/helper-perf-event-read-value.c
index 1d512c9ec65..6692f649437 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-perf-event-read-value.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-perf-event-read-value.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -10,7 +12,7 @@ foo ()
uint64_t flags;
uint64_t buf_size;
- ret = __builtin_bpf_helper_perf_event_read_value (map, flags, buf, buf_size);
+ ret = bpf_perf_event_read_value (map, flags, buf, buf_size);
}
/* { dg-final { scan-assembler "call\t55" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-perf-event-read.c b/gcc/testsuite/gcc.target/bpf/helper-perf-event-read.c
index f099a09d66f..674058daa8d 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-perf-event-read.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-perf-event-read.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -9,7 +11,7 @@ foo ()
void *map;
uint64_t flags;
- ret = __builtin_bpf_helper_perf_event_read (map, flags);
+ ret = bpf_perf_event_read (map, flags);
}
/* { dg-final { scan-assembler "call\t22" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-perf-prog-read-value.c b/gcc/testsuite/gcc.target/bpf/helper-perf-prog-read-value.c
index 00c4a3a78b5..7f0a8011ed2 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-perf-prog-read-value.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-perf-prog-read-value.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -9,7 +11,7 @@ foo ()
void *ctx, *buf;
uint64_t buf_size;
- ret = __builtin_bpf_helper_perf_prog_read_value (ctx, buf, buf_size);
+ ret = bpf_perf_prog_read_value (ctx, buf, buf_size);
}
/* { dg-final { scan-assembler "call\t56" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-probe-read-str.c b/gcc/testsuite/gcc.target/bpf/helper-probe-read-str.c
index fd04760221d..0774da42ad3 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-probe-read-str.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-probe-read-str.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -10,7 +12,7 @@ foo ()
void *dst;
const void *unsafe_ptr;
- ret = __builtin_bpf_helper_probe_read_str (dst, size, unsafe_ptr);
+ ret = bpf_probe_read_str (dst, size, unsafe_ptr);
}
/* { dg-final { scan-assembler "call\t45" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-probe-read.c b/gcc/testsuite/gcc.target/bpf/helper-probe-read.c
index a77a907767b..64261c56f92 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-probe-read.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-probe-read.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -9,7 +11,7 @@ foo ()
void *src, *dst;
uint32_t size;
- ret = __builtin_bpf_helper_probe_read (dst, size, src);
+ ret = bpf_probe_read (dst, size, src);
}
/* { dg-final { scan-assembler "call\t4" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-probe-write-user.c b/gcc/testsuite/gcc.target/bpf/helper-probe-write-user.c
index bf226206769..127ae61c8a4 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-probe-write-user.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-probe-write-user.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -9,7 +11,7 @@ foo ()
void *dst, *src;
uint32_t len;
- ret = __builtin_bpf_helper_probe_write_user (dst, src, len);
+ ret = bpf_probe_write_user (dst, src, len);
}
/* { dg-final { scan-assembler "call\t36" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-rc-keydown.c b/gcc/testsuite/gcc.target/bpf/helper-rc-keydown.c
index 58e9395dbeb..c419ee06c5c 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-rc-keydown.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-rc-keydown.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -10,7 +12,7 @@ foo ()
uint32_t protocol, toggle;
uint64_t scancode;
- ret = __builtin_bpf_helper_rc_keydown (ctx, protocol,
+ ret = bpf_rc_keydown (ctx, protocol,
scancode, toggle);
}
diff --git a/gcc/testsuite/gcc.target/bpf/helper-rc-pointer-rel.c b/gcc/testsuite/gcc.target/bpf/helper-rc-pointer-rel.c
index e776bc75963..ca0a5c4ac75 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-rc-pointer-rel.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-rc-pointer-rel.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -9,7 +11,7 @@ foo ()
void *ctx;
int32_t rel_x, rel_y;
- ret = __builtin_bpf_helper_rc_pointer_rel (ctx, rel_x, rel_y);
+ ret = bpf_rc_pointer_rel (ctx, rel_x, rel_y);
}
/* { dg-final { scan-assembler "call\t92" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-rc-repeat.c b/gcc/testsuite/gcc.target/bpf/helper-rc-repeat.c
index 0ebc7de5bdf..52d83e4a980 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-rc-repeat.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-rc-repeat.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -8,7 +10,7 @@ foo ()
int ret;
void *ctx;
- ret = __builtin_bpf_helper_rc_repeat (ctx);
+ ret = bpf_rc_repeat (ctx);
}
/* { dg-final { scan-assembler "call\t77" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-redirect-map.c b/gcc/testsuite/gcc.target/bpf/helper-redirect-map.c
index daeecc2a01e..0d059778781 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-redirect-map.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-redirect-map.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -10,7 +12,7 @@ foo ()
uint32_t key;
uint64_t flags;
- ret = __builtin_bpf_helper_redirect_map (map, key, flags);
+ ret = bpf_redirect_map (map, key, flags);
}
/* { dg-final { scan-assembler "call\t51" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-set-hash-invalid.c b/gcc/testsuite/gcc.target/bpf/helper-set-hash-invalid.c
index 4bc63ffa063..adbc41bce19 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-set-hash-invalid.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-set-hash-invalid.c
@@ -1,13 +1,15 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
{
void *skb;
- __builtin_bpf_helper_set_hash_invalid (skb);
+ bpf_set_hash_invalid (skb);
}
/* { dg-final { scan-assembler "call\t41" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-set-hash.c b/gcc/testsuite/gcc.target/bpf/helper-set-hash.c
index d01ae6eb268..a36cd6b56ec 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-set-hash.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-set-hash.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -9,7 +11,7 @@ foo ()
void *skb;
uint32_t hash;
- ret = __builtin_bpf_helper_set_hash (skb, hash);
+ ret = bpf_set_hash (skb, hash);
}
/* { dg-final { scan-assembler "call\t48" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-setsockopt.c b/gcc/testsuite/gcc.target/bpf/helper-setsockopt.c
index 6f3b450639e..f79c2a86783 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-setsockopt.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-setsockopt.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -12,8 +14,7 @@ foo ()
void *optval;
int optlen;
- ret = __builtin_bpf_helper_setsockopt (bpf_socket, level, optname,
- optval, optlen);
+ ret = bpf_setsockopt (bpf_socket, level, optname, optval, optlen);
}
/* { dg-final { scan-assembler "call\t49" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-sk-fullsock.c b/gcc/testsuite/gcc.target/bpf/helper-sk-fullsock.c
index abe813d94f6..9e66e94f57f 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-sk-fullsock.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-sk-fullsock.c
@@ -1,13 +1,15 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
{
void *ret, *sk;
- ret = __builtin_bpf_helper_sk_fullsock (sk);
+ ret = bpf_sk_fullsock (sk);
}
/* { dg-final { scan-assembler "call\t95" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-sk-lookup-tcp.c b/gcc/testsuite/gcc.target/bpf/helper-sk-lookup-tcp.c
index 4408640a6b2..1adcc692068 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-sk-lookup-tcp.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-sk-lookup-tcp.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -10,10 +12,10 @@ foo ()
uint32_t tuple_size;
uint64_t netns, flags;
- ret = __builtin_bpf_helper_sk_lookup_tcp (ctx,
- tuple,
- tuple_size,
- netns, flags);
+ ret = bpf_sk_lookup_tcp (ctx,
+ tuple,
+ tuple_size,
+ netns, flags);
}
/* { dg-final { scan-assembler "call\t84" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-sk-lookup-upd.c b/gcc/testsuite/gcc.target/bpf/helper-sk-lookup-upd.c
index 4c50f9c6327..8bbd40bf387 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-sk-lookup-upd.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-sk-lookup-upd.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -10,7 +12,7 @@ foo ()
uint32_t tuple_size;
uint64_t netns, flags;
- ret = __builtin_bpf_helper_sk_lookup_udp (ctx,
+ ret = bpf_sk_lookup_udp (ctx,
tuple,
tuple_size,
netns, flags);
diff --git a/gcc/testsuite/gcc.target/bpf/helper-sk-redirect-hash.c b/gcc/testsuite/gcc.target/bpf/helper-sk-redirect-hash.c
index 7047c9f1290..f449b5b8254 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-sk-redirect-hash.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-sk-redirect-hash.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -9,8 +11,7 @@ foo ()
void *skb, *map, *key;
uint64_t flags;
- ret = __builtin_bpf_helper_sk_redirect_hash (skb, map, key,
- flags);
+ ret = bpf_sk_redirect_hash (skb, map, key, flags);
}
/* { dg-final { scan-assembler "call\t72" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-sk-redirect-map.c b/gcc/testsuite/gcc.target/bpf/helper-sk-redirect-map.c
index 5afb0ac4100..0ebb315d087 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-sk-redirect-map.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-sk-redirect-map.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -10,7 +12,7 @@ foo ()
uint32_t key;
uint64_t flags;
- ret = __builtin_bpf_helper_sk_redirect_map (ctx, map, key, flags);
+ ret = bpf_sk_redirect_map (ctx, map, key, flags);
}
/* { dg-final { scan-assembler "call\t52" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-sk-release.c b/gcc/testsuite/gcc.target/bpf/helper-sk-release.c
index f054c90652c..620dbe9a2ba 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-sk-release.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-sk-release.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -8,7 +10,7 @@ foo ()
int ret;
void *sock;
- ret = __builtin_bpf_helper_sk_release (sock);
+ ret = bpf_sk_release (sock);
}
/* { dg-final { scan-assembler "call\t86" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-sk-select-reuseport.c b/gcc/testsuite/gcc.target/bpf/helper-sk-select-reuseport.c
index 399ad2c0231..0505fc95f66 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-sk-select-reuseport.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-sk-select-reuseport.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -9,7 +11,7 @@ foo ()
void *reuse, *map, *key;
uint64_t flags;
- ret = __builtin_bpf_helper_sk_select_reuseport (reuse, map,
+ ret = bpf_sk_select_reuseport (reuse, map,
key, flags);
}
diff --git a/gcc/testsuite/gcc.target/bpf/helper-sk-storage-delete.c b/gcc/testsuite/gcc.target/bpf/helper-sk-storage-delete.c
index 07c5875d930..a25421f0017 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-sk-storage-delete.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-sk-storage-delete.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -8,7 +10,7 @@ foo ()
int ret;
void *map, *sk;
- ret = __builtin_bpf_helper_sk_storage_delete (map, sk);
+ ret = bpf_sk_storage_delete (map, sk);
}
/* { dg-final { scan-assembler "call\t108" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-sk-storage-get.c b/gcc/testsuite/gcc.target/bpf/helper-sk-storage-get.c
index a199ef0ae64..6d047dd99f4 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-sk-storage-get.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-sk-storage-get.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -9,8 +11,7 @@ foo ()
void *map, *sk, *value;
uint64_t flags;
- ret = __builtin_bpf_helper_sk_storage_get (map, sk, value,
- flags);
+ ret = bpf_sk_storage_get (map, sk, value, flags);
}
/* { dg-final { scan-assembler "call\t107" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-skb-adjust-room.c b/gcc/testsuite/gcc.target/bpf/helper-skb-adjust-room.c
index 88196f5e070..6b1eef9c8cf 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-skb-adjust-room.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-skb-adjust-room.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -11,7 +13,7 @@ foo ()
uint32_t mode;
uint64_t flags;
- ret = __builtin_bpf_helper_skb_adjust_room (skb, len_diff, mode, flags);
+ ret = bpf_skb_adjust_room (skb, len_diff, mode, flags);
}
/* { dg-final { scan-assembler "call\t50" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-skb-cgroup-id.c b/gcc/testsuite/gcc.target/bpf/helper-skb-cgroup-id.c
index 7c9021e1763..7ad08c17582 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-skb-cgroup-id.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-skb-cgroup-id.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -8,7 +10,7 @@ foo ()
uint64_t ret;
void *skb;
- ret = __builtin_bpf_helper_skb_cgroup_id (skb);
+ ret = bpf_skb_cgroup_id (skb);
}
/* { dg-final { scan-assembler "call\t79" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-skb-change-head.c b/gcc/testsuite/gcc.target/bpf/helper-skb-change-head.c
index de6281539fd..f93cefab854 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-skb-change-head.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-skb-change-head.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -10,7 +12,7 @@ foo ()
uint32_t len;
uint64_t flags;
- ret = __builtin_bpf_helper_skb_change_head (skb, len, flags);
+ ret = bpf_skb_change_head (skb, len, flags);
}
/* { dg-final { scan-assembler "call\t43" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-skb-change-proto.c b/gcc/testsuite/gcc.target/bpf/helper-skb-change-proto.c
index 5738f3cc59b..a41d197fd52 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-skb-change-proto.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-skb-change-proto.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -10,7 +12,7 @@ foo ()
int16_t proto;
uint64_t flags;
- ret = __builtin_bpf_helper_skb_change_proto (skb, proto, flags);
+ ret = bpf_skb_change_proto (skb, proto, flags);
}
/* { dg-final { scan-assembler "call\t31" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-skb-change-tail.c b/gcc/testsuite/gcc.target/bpf/helper-skb-change-tail.c
index 1fb6b45cd1b..2bfc5979a92 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-skb-change-tail.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-skb-change-tail.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -10,7 +12,7 @@ foo ()
uint32_t len;
uint64_t flags;
- ret = __builtin_bpf_helper_skb_change_tail (skb, len, flags);
+ ret = bpf_skb_change_tail (skb, len, flags);
}
/* { dg-final { scan-assembler "call\t38" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-skb-change-type.c b/gcc/testsuite/gcc.target/bpf/helper-skb-change-type.c
index bcf22cebc28..46a94213fb3 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-skb-change-type.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-skb-change-type.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -9,7 +11,7 @@ foo ()
void *skb;
uint32_t type;
- ret = __builtin_bpf_helper_skb_change_type (skb, type);
+ ret = bpf_skb_change_type (skb, type);
}
/* { dg-final { scan-assembler "call\t32" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-skb-ecn-set-ce.c b/gcc/testsuite/gcc.target/bpf/helper-skb-ecn-set-ce.c
index f769993f120..c028ec1d6bb 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-skb-ecn-set-ce.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-skb-ecn-set-ce.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -8,7 +10,7 @@ foo ()
int ret;
void *skb;
- ret = __builtin_bpf_helper_skb_ecn_set_ce (skb);
+ ret = bpf_skb_ecn_set_ce (skb);
}
/* { dg-final { scan-assembler "call\t97" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-skb-get-tunnel-key.c b/gcc/testsuite/gcc.target/bpf/helper-skb-get-tunnel-key.c
index 0d4db236865..aad847256ec 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-skb-get-tunnel-key.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-skb-get-tunnel-key.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -10,7 +12,7 @@ foo ()
uint32_t size;
uint64_t flags;
- ret = __builtin_bpf_helper_skb_get_tunnel_key (skb, key, size, flags);
+ ret = bpf_skb_get_tunnel_key (skb, key, size, flags);
}
/* { dg-final { scan-assembler "call\t20" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-skb-get-tunnel-opt.c b/gcc/testsuite/gcc.target/bpf/helper-skb-get-tunnel-opt.c
index 9428657b932..0b39ad728a1 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-skb-get-tunnel-opt.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-skb-get-tunnel-opt.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -10,7 +12,7 @@ foo ()
uint8_t *opt;
uint32_t size;
- ret = __builtin_bpf_helper_skb_get_tunnel_opt (skb, opt, size);
+ ret = bpf_skb_get_tunnel_opt (skb, opt, size);
}
/* { dg-final { scan-assembler "call\t29" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-skb-get-xfrm-state.c b/gcc/testsuite/gcc.target/bpf/helper-skb-get-xfrm-state.c
index 8217b4a17df..de83d91849e 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-skb-get-xfrm-state.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-skb-get-xfrm-state.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -10,8 +12,8 @@ foo ()
uint32_t index, size;
uint64_t flags;
- ret = __builtin_bpf_helper_skb_get_xfrm_state (skb, index,
- xfrm_state, size, flags);
+ ret = bpf_skb_get_xfrm_state (skb, index,
+ xfrm_state, size, flags);
}
/* { dg-final { scan-assembler "call\t66" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-skb-load-bytes-relative.c b/gcc/testsuite/gcc.target/bpf/helper-skb-load-bytes-relative.c
index bcaa43be9de..cd8c2c2437e 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-skb-load-bytes-relative.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-skb-load-bytes-relative.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -9,9 +11,9 @@ foo ()
void *skb, *to;
uint32_t offset, len, start_header;
- ret = __builtin_bpf_helper_skb_load_bytes_relative (skb, offset,
- to, len,
- start_header);
+ ret = bpf_skb_load_bytes_relative (skb, offset,
+ to, len,
+ start_header);
}
/* { dg-final { scan-assembler "call\t68" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-skb-load-bytes.c b/gcc/testsuite/gcc.target/bpf/helper-skb-load-bytes.c
index 9da545400c7..1e4612a5c98 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-skb-load-bytes.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-skb-load-bytes.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -9,7 +11,7 @@ foo ()
void *skb, *to;
uint32_t offset, len;
- ret = __builtin_bpf_helper_skb_load_bytes (skb, offset, to, len);
+ ret = bpf_skb_load_bytes (skb, offset, to, len);
}
/* { dg-final { scan-assembler "call\t26" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-skb-pull-data.c b/gcc/testsuite/gcc.target/bpf/helper-skb-pull-data.c
index 9bb8b8d6e78..579d8562e3d 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-skb-pull-data.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-skb-pull-data.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -9,7 +11,7 @@ foo ()
void *skb;
uint32_t len;
- ret = __builtin_bpf_helper_skb_pull_data (skb, len);
+ ret = bpf_skb_pull_data (skb, len);
}
/* { dg-final { scan-assembler "call\t39" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-skb-set-tunnel-key.c b/gcc/testsuite/gcc.target/bpf/helper-skb-set-tunnel-key.c
index 21b835f5cef..85754fdb88a 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-skb-set-tunnel-key.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-skb-set-tunnel-key.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -10,7 +12,7 @@ foo ()
uint32_t size;
uint64_t flags;
- ret = __builtin_bpf_helper_skb_set_tunnel_key (skb, key, size, flags);
+ ret = bpf_skb_set_tunnel_key (skb, key, size, flags);
}
/* { dg-final { scan-assembler "call\t21" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-skb-set-tunnel-opt.c b/gcc/testsuite/gcc.target/bpf/helper-skb-set-tunnel-opt.c
index 5a0528ec0a3..591eb48d6ad 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-skb-set-tunnel-opt.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-skb-set-tunnel-opt.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -10,7 +12,7 @@ foo ()
uint8_t *opt;
uint32_t size;
- ret = __builtin_bpf_helper_skb_set_tunnel_opt (skb, opt, size);
+ ret = bpf_skb_set_tunnel_opt (skb, opt, size);
}
/* { dg-final { scan-assembler "call\t30" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-skb-store-bytes.c b/gcc/testsuite/gcc.target/bpf/helper-skb-store-bytes.c
index a41967cb904..17f8e02e55c 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-skb-store-bytes.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-skb-store-bytes.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -12,7 +14,7 @@ foo ()
uint32_t len;
uint64_t flags;
- ret = __builtin_bpf_helper_skb_store_bytes (skb, offset, from, len, flags);
+ ret = bpf_skb_store_bytes (skb, offset, from, len, flags);
}
/* { dg-final { scan-assembler "call\t9" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-skb-under-cgroup.c b/gcc/testsuite/gcc.target/bpf/helper-skb-under-cgroup.c
index 0ccee8bed5c..72adfcd9f3f 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-skb-under-cgroup.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-skb-under-cgroup.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -9,7 +11,7 @@ foo ()
void *skb, *map;
uint32_t index;
- ret = __builtin_bpf_helper_skb_under_cgroup (skb, map, index);
+ ret = bpf_skb_under_cgroup (skb, map, index);
}
/* { dg-final { scan-assembler "call\t33" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-skb-vlan-pop.c b/gcc/testsuite/gcc.target/bpf/helper-skb-vlan-pop.c
index e99a0ac7802..4d5b347d6da 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-skb-vlan-pop.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-skb-vlan-pop.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -8,7 +10,7 @@ foo ()
int ret;
void *skb;
- ret = __builtin_bpf_helper_skb_vlan_pop (skb);
+ ret = bpf_skb_vlan_pop (skb);
}
/* { dg-final { scan-assembler "call\t19" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-skb-vlan-push.c b/gcc/testsuite/gcc.target/bpf/helper-skb-vlan-push.c
index dbe52aee1b8..1a43bd42e07 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-skb-vlan-push.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-skb-vlan-push.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -10,7 +12,7 @@ foo ()
int16_t vlan_proto;
uint16_t vlan_tci;
- ret = __builtin_bpf_helper_skb_vlan_push (skb, vlan_proto, vlan_tci);
+ ret = bpf_skb_vlan_push (skb, vlan_proto, vlan_tci);
}
/* { dg-final { scan-assembler "call\t18" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-skc-lookup-tcp.c b/gcc/testsuite/gcc.target/bpf/helper-skc-lookup-tcp.c
index bbc4b99a808..8ed2d46c813 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-skc-lookup-tcp.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-skc-lookup-tcp.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -10,8 +12,8 @@ foo ()
uint32_t tuple_size;
uint64_t netns, flags;
- ret = __builtin_bpf_helper_skc_lookup_tcp (ctx, tuple,
- tuple_size, netns, flags);
+ ret = bpf_skc_lookup_tcp (ctx, tuple,
+ tuple_size, netns, flags);
}
/* { dg-final { scan-assembler "call\t99" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-sock-hash-update.c b/gcc/testsuite/gcc.target/bpf/helper-sock-hash-update.c
index bbb77ef9ad5..81ff4dd7e8b 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-sock-hash-update.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-sock-hash-update.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -9,7 +11,7 @@ foo ()
void *skops, *map, *key;
uint64_t flags;
- ret = __builtin_bpf_helper_sock_hash_update (skops, map, key,
+ ret = bpf_sock_hash_update (skops, map, key,
flags);
}
diff --git a/gcc/testsuite/gcc.target/bpf/helper-sock-map-update.c b/gcc/testsuite/gcc.target/bpf/helper-sock-map-update.c
index 301e59e975b..fbb5d7556d4 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-sock-map-update.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-sock-map-update.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -9,7 +11,7 @@ foo ()
void *skops, *map, *key;
uint64_t flags;
- ret = __builtin_bpf_helper_sock_map_update (skops, map, key,
+ ret = bpf_sock_map_update (skops, map, key,
flags);
}
diff --git a/gcc/testsuite/gcc.target/bpf/helper-sock-ops-cb-flags-set.c b/gcc/testsuite/gcc.target/bpf/helper-sock-ops-cb-flags-set.c
index 2056312bcf3..4efd69a5543 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-sock-ops-cb-flags-set.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-sock-ops-cb-flags-set.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -9,7 +11,7 @@ foo ()
void *bpf_sock;
int argval;
- ret = __builtin_bpf_helper_sock_ops_cb_flags_set (bpf_sock,
+ ret = bpf_sock_ops_cb_flags_set (bpf_sock,
argval);
}
diff --git a/gcc/testsuite/gcc.target/bpf/helper-spin-lock.c b/gcc/testsuite/gcc.target/bpf/helper-spin-lock.c
index 4178914ae13..8358e88fd9e 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-spin-lock.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-spin-lock.c
@@ -1,13 +1,15 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
{
void *lock;
- __builtin_bpf_helper_spin_lock (lock);
+ bpf_spin_lock (lock);
}
/* { dg-final { scan-assembler "call\t93" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-spin-unlock.c b/gcc/testsuite/gcc.target/bpf/helper-spin-unlock.c
index c2416b66994..400695f7aae 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-spin-unlock.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-spin-unlock.c
@@ -1,13 +1,15 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
{
void *lock;
- __builtin_bpf_helper_spin_unlock (lock);
+ bpf_spin_unlock (lock);
}
/* { dg-final { scan-assembler "call\t94" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-strtol.c b/gcc/testsuite/gcc.target/bpf/helper-strtol.c
index e15b6d6b968..53830126d45 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-strtol.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-strtol.c
@@ -1,7 +1,9 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
#include <stddef.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -12,7 +14,7 @@ foo ()
uint64_t flags;
size_t buf_len;
- ret = __builtin_bpf_helper_strtol (buf, buf_len, flags, &res);
+ ret = bpf_strtol (buf, buf_len, flags, &res);
}
/* { dg-final { scan-assembler "call\t105" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-strtoul.c b/gcc/testsuite/gcc.target/bpf/helper-strtoul.c
index bc0d77656d2..f648a2bb54c 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-strtoul.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-strtoul.c
@@ -1,7 +1,9 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
#include <stddef.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -12,7 +14,7 @@ foo ()
uint64_t flags;
size_t buf_len;
- ret = __builtin_bpf_helper_strtoul (buf, buf_len, flags, &res);
+ ret = bpf_strtoul (buf, buf_len, flags, &res);
}
/* { dg-final { scan-assembler "call\t106" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-sysctl-get-current-value.c b/gcc/testsuite/gcc.target/bpf/helper-sysctl-get-current-value.c
index 803584171dd..55a31e4f55c 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-sysctl-get-current-value.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-sysctl-get-current-value.c
@@ -1,7 +1,9 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
#include <stddef.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -10,8 +12,7 @@ foo ()
void *ctx, *buf;
size_t buf_len;
- ret = __builtin_bpf_helper_sysctl_get_current_value (ctx, buf,
- buf_len);
+ ret = bpf_sysctl_get_current_value (ctx, buf, buf_len);
}
/* { dg-final { scan-assembler "call\t102" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-sysctl-get-name.c b/gcc/testsuite/gcc.target/bpf/helper-sysctl-get-name.c
index a748b4bf911..bacb288c4a9 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-sysctl-get-name.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-sysctl-get-name.c
@@ -1,7 +1,9 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
#include <stddef.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -11,8 +13,7 @@ foo ()
size_t buf_len;
uint64_t flags;
- ret = __builtin_bpf_helper_sysctl_get_name (ctx, buf,
- buf_len, flags);
+ ret = bpf_sysctl_get_name (ctx, buf, buf_len, flags);
}
/* { dg-final { scan-assembler "call\t101" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-sysctl-get-new-value.c b/gcc/testsuite/gcc.target/bpf/helper-sysctl-get-new-value.c
index 2c4835100c9..5ad36442280 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-sysctl-get-new-value.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-sysctl-get-new-value.c
@@ -1,7 +1,9 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
#include <stddef.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -10,8 +12,7 @@ foo ()
void *ctx, *buf;
size_t buf_len;
- ret = __builtin_bpf_helper_sysctl_get_new_value (ctx, buf,
- buf_len);
+ ret = bpf_sysctl_get_new_value (ctx, buf, buf_len);
}
/* { dg-final { scan-assembler "call\t103" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-sysctl-set-new-value.c b/gcc/testsuite/gcc.target/bpf/helper-sysctl-set-new-value.c
index fc3780da7e2..2b3b3af6355 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-sysctl-set-new-value.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-sysctl-set-new-value.c
@@ -1,7 +1,9 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
#include <stddef.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -10,8 +12,7 @@ foo ()
void *ctx, *buf;
size_t buf_len;
- ret = __builtin_bpf_helper_sysctl_set_new_value (ctx, buf,
- buf_len);
+ ret = bpf_sysctl_set_new_value (ctx, buf, buf_len);
}
/* { dg-final { scan-assembler "call\t104" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-tail-call.c b/gcc/testsuite/gcc.target/bpf/helper-tail-call.c
index 618064f4aea..0f35b00a786 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-tail-call.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-tail-call.c
@@ -1,14 +1,17 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
{
+ int ret;
void *ctx, *prog_array_map;
uint32_t index;
- __builtin_bpf_helper_tail_call (ctx, prog_array_map, index);
+ ret = bpf_tail_call (ctx, prog_array_map, index);
}
/* { dg-final { scan-assembler "call\t12" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-tcp-check-syncookie.c b/gcc/testsuite/gcc.target/bpf/helper-tcp-check-syncookie.c
index 95846c6f2d7..bada09f3546 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-tcp-check-syncookie.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-tcp-check-syncookie.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -9,9 +11,9 @@ foo ()
void *sk, *iph, *th;
uint32_t iph_len, th_len;
- ret = __builtin_bpf_helper_tcp_check_syncookie (sk, iph,
- iph_len,
- th, th_len);
+ ret = bpf_tcp_check_syncookie (sk, iph,
+ iph_len,
+ th, th_len);
}
/* { dg-final { scan-assembler "call\t100" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-tcp-sock.c b/gcc/testsuite/gcc.target/bpf/helper-tcp-sock.c
index ab8f2de05d8..cd6d995f5bf 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-tcp-sock.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-tcp-sock.c
@@ -1,13 +1,15 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
{
void *ret, *sk;
- ret = __builtin_bpf_helper_tcp_sock (sk);
+ ret = bpf_tcp_sock (sk);
}
/* { dg-final { scan-assembler "call\t96" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-trace-printk.c b/gcc/testsuite/gcc.target/bpf/helper-trace-printk.c
index fcf9d5c9e50..135ae295d84 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-trace-printk.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-trace-printk.c
@@ -1,4 +1,7 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
+
+#include <bpf-helpers.h>
char *map () { return 0; }
@@ -7,7 +10,7 @@ foo ()
{
int ret;
- ret = __builtin_bpf_helper_trace_printk ("foo %d %d", sizeof ("foo %d %d"), 10, 20);
+ ret = bpf_trace_printk ("foo %d %d", sizeof ("foo %d %d"), 10, 20);
}
/* { dg-final { scan-assembler "call\t6" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-xdp-adjust-head.c b/gcc/testsuite/gcc.target/bpf/helper-xdp-adjust-head.c
index 3dce5434535..352d9d68023 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-xdp-adjust-head.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-xdp-adjust-head.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -9,7 +11,7 @@ foo ()
void *xdp_md;
int delta;
- ret = __builtin_bpf_helper_xdp_adjust_head (xdp_md, delta);
+ ret = bpf_xdp_adjust_head (xdp_md, delta);
}
/* { dg-final { scan-assembler "call\t44" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-xdp-adjust-meta.c b/gcc/testsuite/gcc.target/bpf/helper-xdp-adjust-meta.c
index 38a13748737..ef5da4b10e2 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-xdp-adjust-meta.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-xdp-adjust-meta.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -9,7 +11,7 @@ foo ()
void *xdp_md;
int delta;
- ret = __builtin_bpf_helper_xdp_adjust_meta (xdp_md, delta);
+ ret = bpf_xdp_adjust_meta (xdp_md, delta);
}
/* { dg-final { scan-assembler "call\t54" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/helper-xdp-adjust-tail.c b/gcc/testsuite/gcc.target/bpf/helper-xdp-adjust-tail.c
index 319b65a233d..db55168144b 100644
--- a/gcc/testsuite/gcc.target/bpf/helper-xdp-adjust-tail.c
+++ b/gcc/testsuite/gcc.target/bpf/helper-xdp-adjust-tail.c
@@ -1,6 +1,7 @@
/* { dg-do compile } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -9,7 +10,7 @@ foo ()
void *xdp_md;
int delta;
- ret = __builtin_bpf_helper_xdp_adjust_tail (xdp_md, delta);
+ ret = bpf_xdp_adjust_tail (xdp_md, delta);
}
/* { dg-final { scan-assembler "call\t65" } } */
diff --git a/gcc/testsuite/gcc.target/bpf/skb-ancestor-cgroup-id.c b/gcc/testsuite/gcc.target/bpf/skb-ancestor-cgroup-id.c
index ce193ec14bf..8e88c93cac9 100644
--- a/gcc/testsuite/gcc.target/bpf/skb-ancestor-cgroup-id.c
+++ b/gcc/testsuite/gcc.target/bpf/skb-ancestor-cgroup-id.c
@@ -1,6 +1,8 @@
/* { dg-do compile } */
+/* { dg-options "-std=gnu99" } */
#include <stdint.h>
+#include <bpf-helpers.h>
void
foo ()
@@ -9,7 +11,7 @@ foo ()
void *skb;
int ancestor_level;
- ret = __builtin_bpf_helper_skb_ancestor_cgroup_id (skb,
+ ret = bpf_skb_ancestor_cgroup_id (skb,
ancestor_level);
}
More information about the Gcc-cvs
mailing list