From nobody Sat Oct 4 00:32:11 2025 Received: from mail.loongson.cn (mail.loongson.cn [114.242.206.163]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 0D2ED1A9FB7; Thu, 21 Aug 2025 14:01:30 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=114.242.206.163 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1755784893; cv=none; b=rao3T3S72k0Y6/N89qLW8xiSmt8PLLafdg98zVfaAiDJSfPMLa2DQjXuFn02t61wqyTrwRKG/dcwC5SIpXnBw9fXq5o/aUuxoj+r4W/ZoBjgyJIWmG2hTNAzVuKsILnW6VeCH03Lh3c9QmG4ZVmUMUBGKV1uT+q5W9LmgsiIKvw= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1755784893; c=relaxed/simple; bh=PIPpAMMJ1ZSiP7NTsuJsRo0VG6UhzEC6KrlvtQ8eIhI=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=FPQrkZyLujKIso8lGCN9wshNQPdO767Xyc15wvSS4IM4PgKOHVZwJMJfCWGm890t/YyPKAWAaKQH5zF4qasdQ2JVegu99izs90DgrJbjnfnbZzxK1MzDgUlVV5OkbFl2YDYJoJg4od5lxXHEINM7F/MvCFZrNrt68u4LHoyBBYM= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=loongson.cn; spf=pass smtp.mailfrom=loongson.cn; arc=none smtp.client-ip=114.242.206.163 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=loongson.cn Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=loongson.cn Received: from loongson.cn (unknown [113.200.148.30]) by gateway (Coremail) with SMTP id _____8DxLvC3Jqdo_XUBAA--.2833S3; Thu, 21 Aug 2025 22:01:27 +0800 (CST) Received: from linux.localdomain (unknown [113.200.148.30]) by front1 (Coremail) with SMTP id qMiowJBxpeSyJqdorsZdAA--.26328S3; Thu, 21 Aug 2025 22:01:26 +0800 (CST) From: Tiezhu Yang To: Huacai Chen , Hengqi Chen Cc: loongarch@lists.linux.dev, bpf@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [RFC PATCH 1/2] LoongArch: BPF: Add struct arguments support for trampoline Date: Thu, 21 Aug 2025 22:01:21 +0800 Message-ID: <20250821140122.29752-2-yangtiezhu@loongson.cn> X-Mailer: git-send-email 2.42.0 In-Reply-To: <20250821140122.29752-1-yangtiezhu@loongson.cn> References: <20250821140122.29752-1-yangtiezhu@loongson.cn> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-CM-TRANSID: qMiowJBxpeSyJqdorsZdAA--.26328S3 X-CM-SenderInfo: p1dqw3xlh2x3gn0dqz5rrqw2lrqou0/ X-Coremail-Antispam: 1Uk129KBj93XoW3GF4DGF4rJw4kKr45Ar4UZFc_yoW7ZFy5pF 1qkr43CF4rJFW7Wa1kXr4UWFyakFZ3A3y3urWUG3ySyw45Wr98JF48KFn0yFy5GrykAryf ursYvryqkF1xJwcCm3ZEXasCq-sJn29KB7ZKAUJUUUU5529EdanIXcx71UUUUU7KY7ZEXa sCq-sGcSsGvfJ3Ic02F40EFcxC0VAKzVAqx4xG6I80ebIjqfuFe4nvWSU5nxnvy29KBjDU 0xBIdaVrnRJUUUkjb4IE77IF4wAFF20E14v26r1j6r4UM7CY07I20VC2zVCF04k26cxKx2 IYs7xG6rWj6s0DM7CIcVAFz4kK6r1Y6r17M28lY4IEw2IIxxk0rwA2F7IY1VAKz4vEj48v e4kI8wA2z4x0Y4vE2Ix0cI8IcVAFwI0_Xr0_Ar1l84ACjcxK6xIIjxv20xvEc7CjxVAFwI 0_Gr0_Cr1l84ACjcxK6I8E87Iv67AKxVW0oVCq3wA2z4x0Y4vEx4A2jsIEc7CjxVAFwI0_ GcCE3s1le2I262IYc4CY6c8Ij28IcVAaY2xG8wAqjxCEc2xF0cIa020Ex4CE44I27wAqx4 xG64xvF2IEw4CE5I8CrVC2j2WlYx0E2Ix0cI8IcVAFwI0_Jw0_WrylYx0Ex4A2jsIE14v2 6r4j6F4UMcvjeVCFs4IE7xkEbVWUJVW8JwACjcxG0xvY0x0EwIxGrwCF04k20xvY0x0EwI xGrwCFx2IqxVCFs4IE7xkEbVWUJVW8JwC20s026c02F40E14v26r1j6r18MI8I3I0E7480 Y4vE14v26r106r1rMI8E67AF67kF1VAFwI0_JF0_Jw1lIxkGc2Ij64vIr41lIxAIcVC0I7 IYx2IY67AKxVW5JVW7JwCI42IY6xIIjxv20xvEc7CjxVAFwI0_Gr0_Cr1lIxAIcVCF04k2 6cxKx2IYs7xG6r1j6r1xMIIF0xvEx4A2jsIE14v26r4j6F4UMIIF0xvEx4A2jsIEc7CjxV AFwI0_Gr0_Gr1UYxBIdaVFxhVjvjDU0xZFpf9x07josjUUUUUU= Content-Type: text/plain; charset="utf-8" In the current BPF code, the struct argument size is at most 16 bytes, enforced by the verifier [1]. According to the Procedure Call Standard for LoongArch [2], struct argument size below 16 bytes are provided as part of the 8 argument registers, that is to say, the struct argument may be passed in a pair of registers if its size is more than 8 bytes and no more than 16 bytes. Extend the BPF trampoline JIT to support attachment to functions that take small structures (up to 16 bytes) as argument, save and restore a number of "argument registers" rather than a number of arguments. The initial aim is to pass the following related testcase: sudo ./test_progs -a tracing_struct/struct_args but there exist some other problems now, maybe it is related with the following failed testcase: sudo ./test_progs -t module_attach Link: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/tr= ee/kernel/bpf/btf.c#n7383 [1] Link: https://github.com/loongson/la-abi-specs/blob/release/lapcs.adoc#stru= ctures [2] Signed-off-by: Tiezhu Yang --- arch/loongarch/net/bpf_jit.c | 47 ++++++++++++++++++++---------------- 1 file changed, 26 insertions(+), 21 deletions(-) diff --git a/arch/loongarch/net/bpf_jit.c b/arch/loongarch/net/bpf_jit.c index a87f51f5b708..7bd4b132755a 100644 --- a/arch/loongarch/net/bpf_jit.c +++ b/arch/loongarch/net/bpf_jit.c @@ -1340,21 +1340,21 @@ int bpf_arch_text_invalidate(void *dst, size_t len) return ret; } =20 -static void store_args(struct jit_ctx *ctx, int nargs, int args_off) +static void store_args(struct jit_ctx *ctx, int nregs, int args_off) { int i; =20 - for (i =3D 0; i < nargs; i++) { + for (i =3D 0; i < nregs; i++) { emit_insn(ctx, std, LOONGARCH_GPR_A0 + i, LOONGARCH_GPR_FP, -args_off); args_off -=3D 8; } } =20 -static void restore_args(struct jit_ctx *ctx, int nargs, int args_off) +static void restore_args(struct jit_ctx *ctx, int nregs, int args_off) { int i; =20 - for (i =3D 0; i < nargs; i++) { + for (i =3D 0; i < nregs; i++) { emit_insn(ctx, ldd, LOONGARCH_GPR_A0 + i, LOONGARCH_GPR_FP, -args_off); args_off -=3D 8; } @@ -1477,8 +1477,8 @@ static int __arch_prepare_bpf_trampoline(struct jit_c= tx *ctx, struct bpf_tramp_i void *func_addr, u32 flags) { int i, ret, save_ret; - int stack_size =3D 0, nargs =3D 0; - int retval_off, args_off, nargs_off, ip_off, run_ctx_off, sreg_off, tcc_p= tr_off; + int stack_size =3D 0, nregs =3D m->nr_args; + int retval_off, args_off, nregs_off, ip_off, run_ctx_off, sreg_off, tcc_p= tr_off; bool is_struct_ops =3D flags & BPF_TRAMP_F_INDIRECT; void *orig_call =3D func_addr; struct bpf_tramp_links *fentry =3D &tlinks[BPF_TRAMP_FENTRY]; @@ -1498,11 +1498,11 @@ static int __arch_prepare_bpf_trampoline(struct jit= _ctx *ctx, struct bpf_tramp_i * * FP - retval_off [ return value ] BPF_TRAMP_F_CALL_ORIG or * BPF_TRAMP_F_RET_FENTRY_RET - * [ argN ] + * [ arg regN ] * [ ... ] - * FP - args_off [ arg1 ] + * FP - args_off [ arg reg1 ] * - * FP - nargs_off [ regs count ] + * FP - nregs_off [ arg regs count ] * * FP - ip_off [ traced func ] BPF_TRAMP_F_IP_ARG * @@ -1516,10 +1516,16 @@ static int __arch_prepare_bpf_trampoline(struct jit= _ctx *ctx, struct bpf_tramp_i if (m->nr_args > LOONGARCH_MAX_REG_ARGS) return -ENOTSUPP; =20 - /* don't support struct argument */ + /* extra regiters for struct arguments */ for (i =3D 0; i < m->nr_args; i++) { - if (m->arg_flags[i] & BTF_FMODEL_STRUCT_ARG) - return -ENOTSUPP; + /* + * The struct argument size is at most 16 bytes, + * enforced by the verifier. The struct argument + * may be passed in a pair of registers if its + * size is more than 8 bytes and no more than 16 + * bytes. + */ + nr_arg_slots +=3D round_up(m->arg_size[i], 8) / 8; } =20 if (flags & (BPF_TRAMP_F_ORIG_STACK | BPF_TRAMP_F_SHARE_IPMODIFY)) @@ -1538,13 +1544,12 @@ static int __arch_prepare_bpf_trampoline(struct jit= _ctx *ctx, struct bpf_tramp_i } =20 /* Room of trampoline frame to store args */ - nargs =3D m->nr_args; - stack_size +=3D nargs * 8; + stack_size +=3D nregs * 8; args_off =3D stack_size; =20 /* Room of trampoline frame to store args number */ stack_size +=3D 8; - nargs_off =3D stack_size; + nregs_off =3D stack_size; =20 /* Room of trampoline frame to store ip address */ if (flags & BPF_TRAMP_F_IP_ARG) { @@ -1607,11 +1612,11 @@ static int __arch_prepare_bpf_trampoline(struct jit= _ctx *ctx, struct bpf_tramp_i emit_insn(ctx, std, LOONGARCH_GPR_T1, LOONGARCH_GPR_FP, -ip_off); } =20 - /* store nargs number */ - move_imm(ctx, LOONGARCH_GPR_T1, nargs, false); - emit_insn(ctx, std, LOONGARCH_GPR_T1, LOONGARCH_GPR_FP, -nargs_off); + /* store arg regs count */ + move_imm(ctx, LOONGARCH_GPR_T1, nregs, false); + emit_insn(ctx, std, LOONGARCH_GPR_T1, LOONGARCH_GPR_FP, -nregs_off); =20 - store_args(ctx, nargs, args_off); + store_args(ctx, nregs, args_off); =20 /* To traced function */ /* Ftrace jump skips 2 NOP instructions */ @@ -1643,7 +1648,7 @@ static int __arch_prepare_bpf_trampoline(struct jit_c= tx *ctx, struct bpf_tramp_i } =20 if (flags & BPF_TRAMP_F_CALL_ORIG) { - restore_args(ctx, m->nr_args, args_off); + restore_args(ctx, nregs, args_off); =20 if (flags & BPF_TRAMP_F_TAIL_CALL_CTX) emit_insn(ctx, ldd, REG_TCC, LOONGARCH_GPR_FP, -tcc_ptr_off); @@ -1680,7 +1685,7 @@ static int __arch_prepare_bpf_trampoline(struct jit_c= tx *ctx, struct bpf_tramp_i } =20 if (flags & BPF_TRAMP_F_RESTORE_REGS) - restore_args(ctx, m->nr_args, args_off); + restore_args(ctx, nregs, args_off); =20 if (save_ret) { emit_insn(ctx, ldd, LOONGARCH_GPR_A0, LOONGARCH_GPR_FP, -retval_off); --=20 2.42.0 From nobody Sat Oct 4 00:32:11 2025 Received: from mail.loongson.cn (mail.loongson.cn [114.242.206.163]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 1054B1FAC42; Thu, 21 Aug 2025 14:01:31 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=114.242.206.163 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1755784894; cv=none; b=YuMCsllZ20MUOlIic7ztDEMvQmGmUj5Gr2I1m/MKJSTRP8rjNfiW57Zf1/A5Liq5YpTXAPTUucvj13yIrdBq6okSAlgr2yHv6FfsRu0WWCPTAn5sZUr1BKBvG94v6pyrR9lFj40UmJdkuJ+PONmuS8n502H2LlLRFn0zZVMHpNM= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1755784894; c=relaxed/simple; bh=r/+8ODg0b9YgcL33UXUKZFg5Kqh5wZuQHj1SZZR1Jdo=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=sGBEWC4b+ENMRqNXneElJm+wWFXEMlmmpnSnIh1/CZz2O8ruYkAhGHy7ts11sATzf1mP5uHA/K6K5z6cetp8SUMDyM/p4qF8QLGfFs2mPagvhIMMGMByExMlx6cJxYWaNwVs8H0lfEw73Rgaf4LtmnkqF9tLnZxacKZU3q1zV2Q= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=loongson.cn; spf=pass smtp.mailfrom=loongson.cn; arc=none smtp.client-ip=114.242.206.163 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=loongson.cn Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=loongson.cn Received: from loongson.cn (unknown [113.200.148.30]) by gateway (Coremail) with SMTP id _____8DxO9K4JqdoAXYBAA--.2704S3; Thu, 21 Aug 2025 22:01:28 +0800 (CST) Received: from linux.localdomain (unknown [113.200.148.30]) by front1 (Coremail) with SMTP id qMiowJBxpeSyJqdorsZdAA--.26328S4; Thu, 21 Aug 2025 22:01:28 +0800 (CST) From: Tiezhu Yang To: Huacai Chen , Hengqi Chen Cc: loongarch@lists.linux.dev, bpf@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [RFC PATCH 2/2] LoongArch: BPF: Add 12 function arguments support for trampoline Date: Thu, 21 Aug 2025 22:01:22 +0800 Message-ID: <20250821140122.29752-3-yangtiezhu@loongson.cn> X-Mailer: git-send-email 2.42.0 In-Reply-To: <20250821140122.29752-1-yangtiezhu@loongson.cn> References: <20250821140122.29752-1-yangtiezhu@loongson.cn> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-CM-TRANSID: qMiowJBxpeSyJqdorsZdAA--.26328S4 X-CM-SenderInfo: p1dqw3xlh2x3gn0dqz5rrqw2lrqou0/ X-Coremail-Antispam: 1Uk129KBj93XoW3Gr15uw4DWF4DuFW7WF1fXwc_yoW7uF1kpF 1qkFsY9F18tFW7Wa97XF4Uur1Ykan3A3y5KrW7Ja92gws8Zr98GayrtF1akFy5Gr1kZr1x Aws0vryYkF1xJrbCm3ZEXasCq-sJn29KB7ZKAUJUUUU8529EdanIXcx71UUUUU7KY7ZEXa sCq-sGcSsGvfJ3Ic02F40EFcxC0VAKzVAqx4xG6I80ebIjqfuFe4nvWSU5nxnvy29KBjDU 0xBIdaVrnRJUUUkjb4IE77IF4wAFF20E14v26r1j6r4UM7CY07I20VC2zVCF04k26cxKx2 IYs7xG6rWj6s0DM7CIcVAFz4kK6r126r13M28lY4IEw2IIxxk0rwA2F7IY1VAKz4vEj48v e4kI8wA2z4x0Y4vE2Ix0cI8IcVAFwI0_Xr0_Ar1l84ACjcxK6xIIjxv20xvEc7CjxVAFwI 0_Gr0_Cr1l84ACjcxK6I8E87Iv67AKxVW0oVCq3wA2z4x0Y4vEx4A2jsIEc7CjxVAFwI0_ GcCE3s1le2I262IYc4CY6c8Ij28IcVAaY2xG8wAqjxCEc2xF0cIa020Ex4CE44I27wAqx4 xG64xvF2IEw4CE5I8CrVC2j2WlYx0E2Ix0cI8IcVAFwI0_Jw0_WrylYx0Ex4A2jsIE14v2 6r4j6F4UMcvjeVCFs4IE7xkEbVWUJVW8JwACjcxG0xvY0x0EwIxGrwCF04k20xvY0x0EwI xGrwCFx2IqxVCFs4IE7xkEbVWUJVW8JwC20s026c02F40E14v26r1j6r18MI8I3I0E7480 Y4vE14v26r106r1rMI8E67AF67kF1VAFwI0_JF0_Jw1lIxkGc2Ij64vIr41lIxAIcVC0I7 IYx2IY67AKxVW5JVW7JwCI42IY6xIIjxv20xvEc7CjxVAFwI0_Gr0_Cr1lIxAIcVCF04k2 6cxKx2IYs7xG6r1j6r1xMIIF0xvEx4A2jsIE14v26r4j6F4UMIIF0xvEx4A2jsIEc7CjxV AFwI0_Gr0_Gr1UYxBIdaVFxhVjvjDU0xZFpf9x07j5l1kUUUUU= Content-Type: text/plain; charset="utf-8" Currently, LoongArch bpf trampoline supports up to 8 function arguments. According to the statistics from commit 473e3150e30a ("bpf, x86: allow function arguments up to 12 for TRACING"), there are over 200 functions accept 9 to 12 arguments, so add 12 arguments support for trampoline. The initial aim is to pass the following related testcases: sudo ./test_progs -a tracing_struct/struct_many_args sudo ./test_progs -a fentry_test/fentry_many_args sudo ./test_progs -a fexit_test/fexit_many_args but there exist some other problems now, maybe it is related with the following failed testcase: sudo ./test_progs -t module_attach Signed-off-by: Tiezhu Yang --- arch/loongarch/net/bpf_jit.c | 57 ++++++++++++++++++++++++++++-------- 1 file changed, 45 insertions(+), 12 deletions(-) diff --git a/arch/loongarch/net/bpf_jit.c b/arch/loongarch/net/bpf_jit.c index 7bd4b132755a..805fa6dba2d8 100644 --- a/arch/loongarch/net/bpf_jit.c +++ b/arch/loongarch/net/bpf_jit.c @@ -1340,26 +1340,48 @@ int bpf_arch_text_invalidate(void *dst, size_t len) return ret; } =20 -static void store_args(struct jit_ctx *ctx, int nregs, int args_off) +static void store_args(struct jit_ctx *ctx, int nr_arg_slots, int args_off) { int i; =20 - for (i =3D 0; i < nregs; i++) { - emit_insn(ctx, std, LOONGARCH_GPR_A0 + i, LOONGARCH_GPR_FP, -args_off); + for (i =3D 0; i < nr_arg_slots; i++) { + if (i < LOONGARCH_MAX_REG_ARGS) { + emit_insn(ctx, std, LOONGARCH_GPR_A0 + i, LOONGARCH_GPR_FP, -args_off); + } else { + /* skip slots for T0 and FP of traced function */ + emit_insn(ctx, ldd, LOONGARCH_GPR_T1, LOONGARCH_GPR_FP, + 16 + (i - LOONGARCH_MAX_REG_ARGS) * 8); + emit_insn(ctx, std, LOONGARCH_GPR_T1, LOONGARCH_GPR_FP, -args_off); + } args_off -=3D 8; } } =20 -static void restore_args(struct jit_ctx *ctx, int nregs, int args_off) +static void restore_args(struct jit_ctx *ctx, int nr_reg_args, int args_of= f) { int i; =20 - for (i =3D 0; i < nregs; i++) { + for (i =3D 0; i < nr_reg_args; i++) { emit_insn(ctx, ldd, LOONGARCH_GPR_A0 + i, LOONGARCH_GPR_FP, -args_off); args_off -=3D 8; } } =20 +static void restore_stk_args(struct jit_ctx *ctx, int nr_stk_args, + int args_off, int stk_arg_off) +{ + int i; + + for (i =3D 0; i < nr_stk_args; i++) { + emit_insn(ctx, ldd, LOONGARCH_GPR_T1, LOONGARCH_GPR_FP, + -(args_off - LOONGARCH_MAX_REG_ARGS * 8)); + emit_insn(ctx, std, LOONGARCH_GPR_T1, LOONGARCH_GPR_FP, + -stk_arg_off); + args_off -=3D 8; + stk_arg_off -=3D 8; + } +} + static int invoke_bpf_prog(struct jit_ctx *ctx, struct bpf_tramp_link *l, const struct btf_func_model *m, int args_off, int retval_off, int run_ctx_off, bool save_ret) @@ -1477,7 +1499,7 @@ static int __arch_prepare_bpf_trampoline(struct jit_c= tx *ctx, struct bpf_tramp_i void *func_addr, u32 flags) { int i, ret, save_ret; - int stack_size =3D 0, nregs =3D m->nr_args; + int stack_size =3D 0, nr_arg_slots =3D 0, stk_arg_off; int retval_off, args_off, nregs_off, ip_off, run_ctx_off, sreg_off, tcc_p= tr_off; bool is_struct_ops =3D flags & BPF_TRAMP_F_INDIRECT; void *orig_call =3D func_addr; @@ -1511,9 +1533,13 @@ static int __arch_prepare_bpf_trampoline(struct jit_= ctx *ctx, struct bpf_tramp_i * FP - sreg_off [ callee saved reg ] * * FP - tcc_ptr_off [ tail_call_cnt_ptr ] + * + * [ stack_argN ] + * [ ... ] + * FP - stk_arg_off [ stack_arg1 ] BPF_TRAMP_F_CALL_ORIG */ =20 - if (m->nr_args > LOONGARCH_MAX_REG_ARGS) + if (m->nr_args > MAX_BPF_FUNC_ARGS) return -ENOTSUPP; =20 /* extra regiters for struct arguments */ @@ -1544,7 +1570,7 @@ static int __arch_prepare_bpf_trampoline(struct jit_c= tx *ctx, struct bpf_tramp_i } =20 /* Room of trampoline frame to store args */ - stack_size +=3D nregs * 8; + stack_size +=3D nr_arg_slots * 8; args_off =3D stack_size; =20 /* Room of trampoline frame to store args number */ @@ -1570,8 +1596,14 @@ static int __arch_prepare_bpf_trampoline(struct jit_= ctx *ctx, struct bpf_tramp_i tcc_ptr_off =3D stack_size; } =20 + if ((flags & BPF_TRAMP_F_CALL_ORIG) && (nr_arg_slots - LOONGARCH_MAX_REG_= ARGS > 0)) + stack_size +=3D (nr_arg_slots - LOONGARCH_MAX_REG_ARGS) * 8; + stack_size =3D round_up(stack_size, 16); =20 + /* Room for args on stack must be at the top of stack */ + stk_arg_off =3D stack_size; + if (is_struct_ops) { /* * For the trampoline called directly, just handle @@ -1613,10 +1645,10 @@ static int __arch_prepare_bpf_trampoline(struct jit= _ctx *ctx, struct bpf_tramp_i } =20 /* store arg regs count */ - move_imm(ctx, LOONGARCH_GPR_T1, nregs, false); + move_imm(ctx, LOONGARCH_GPR_T1, nr_arg_slots, false); emit_insn(ctx, std, LOONGARCH_GPR_T1, LOONGARCH_GPR_FP, -nregs_off); =20 - store_args(ctx, nregs, args_off); + store_args(ctx, nr_arg_slots, args_off); =20 /* To traced function */ /* Ftrace jump skips 2 NOP instructions */ @@ -1648,7 +1680,8 @@ static int __arch_prepare_bpf_trampoline(struct jit_c= tx *ctx, struct bpf_tramp_i } =20 if (flags & BPF_TRAMP_F_CALL_ORIG) { - restore_args(ctx, nregs, args_off); + restore_args(ctx, min_t(int, nr_arg_slots, LOONGARCH_MAX_REG_ARGS), args= _off); + restore_stk_args(ctx, nr_arg_slots - LOONGARCH_MAX_REG_ARGS, args_off, s= tk_arg_off); =20 if (flags & BPF_TRAMP_F_TAIL_CALL_CTX) emit_insn(ctx, ldd, REG_TCC, LOONGARCH_GPR_FP, -tcc_ptr_off); @@ -1685,7 +1718,7 @@ static int __arch_prepare_bpf_trampoline(struct jit_c= tx *ctx, struct bpf_tramp_i } =20 if (flags & BPF_TRAMP_F_RESTORE_REGS) - restore_args(ctx, nregs, args_off); + restore_args(ctx, min_t(int, nr_arg_slots, LOONGARCH_MAX_REG_ARGS), args= _off); =20 if (save_ret) { emit_insn(ctx, ldd, LOONGARCH_GPR_A0, LOONGARCH_GPR_FP, -retval_off); --=20 2.42.0