xref: /linux/tools/lib/bpf/linker.c (revision cbf33b8e0b360f667b17106c15d9e2aac77a76a1)
1 // SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause)
2 /*
3  * BPF static linker
4  *
5  * Copyright (c) 2021 Facebook
6  */
7 #ifndef _GNU_SOURCE
8 #define _GNU_SOURCE
9 #endif
10 
11 #include <stdbool.h>
12 #include <stddef.h>
13 #include <stdio.h>
14 #include <stdlib.h>
15 #include <string.h>
16 #include <unistd.h>
17 #include <errno.h>
18 #include <linux/err.h>
19 #include <linux/btf.h>
20 #include <elf.h>
21 #include <libelf.h>
22 #include <fcntl.h>
23 #include <sys/mman.h>
24 #include "libbpf.h"
25 #include "btf.h"
26 #include "libbpf_internal.h"
27 #include "strset.h"
28 
29 #define BTF_EXTERN_SEC ".extern"
30 
31 struct src_sec {
32 	const char *sec_name;
33 	/* positional (not necessarily ELF) index in an array of sections */
34 	int id;
35 	/* positional (not necessarily ELF) index of a matching section in a final object file */
36 	int dst_id;
37 	/* section data offset in a matching output section */
38 	int dst_off;
39 	/* whether section is omitted from the final ELF file */
40 	bool skipped;
41 	/* whether section is an ephemeral section, not mapped to an ELF section */
42 	bool ephemeral;
43 
44 	/* ELF info */
45 	size_t sec_idx;
46 	Elf_Scn *scn;
47 	Elf64_Shdr *shdr;
48 	Elf_Data *data;
49 
50 	/* corresponding BTF DATASEC type ID */
51 	int sec_type_id;
52 };
53 
54 struct src_obj {
55 	const char *filename;
56 	int fd;
57 	Elf *elf;
58 	/* Section header strings section index */
59 	size_t shstrs_sec_idx;
60 	/* SYMTAB section index */
61 	size_t symtab_sec_idx;
62 
63 	struct btf *btf;
64 	struct btf_ext *btf_ext;
65 
66 	/* List of sections (including ephemeral). Slot zero is unused. */
67 	struct src_sec *secs;
68 	int sec_cnt;
69 
70 	/* mapping of symbol indices from src to dst ELF */
71 	int *sym_map;
72 	/* mapping from the src BTF type IDs to dst ones */
73 	int *btf_type_map;
74 };
75 
76 /* single .BTF.ext data section */
77 struct btf_ext_sec_data {
78 	size_t rec_cnt;
79 	__u32 rec_sz;
80 	void *recs;
81 };
82 
83 struct glob_sym {
84 	/* ELF symbol index */
85 	int sym_idx;
86 	/* associated section id for .ksyms, .kconfig, etc, but not .extern */
87 	int sec_id;
88 	/* extern name offset in STRTAB */
89 	int name_off;
90 	/* optional associated BTF type ID */
91 	int btf_id;
92 	/* BTF type ID to which VAR/FUNC type is pointing to; used for
93 	 * rewriting types when extern VAR/FUNC is resolved to a concrete
94 	 * definition
95 	 */
96 	int underlying_btf_id;
97 	/* sec_var index in the corresponding dst_sec, if exists */
98 	int var_idx;
99 
100 	/* extern or resolved/global symbol */
101 	bool is_extern;
102 	/* weak or strong symbol, never goes back from strong to weak */
103 	bool is_weak;
104 };
105 
106 struct dst_sec {
107 	char *sec_name;
108 	/* positional (not necessarily ELF) index in an array of sections */
109 	int id;
110 
111 	bool ephemeral;
112 
113 	/* ELF info */
114 	size_t sec_idx;
115 	Elf_Scn *scn;
116 	Elf64_Shdr *shdr;
117 	Elf_Data *data;
118 
119 	/* final output section size */
120 	int sec_sz;
121 	/* final output contents of the section */
122 	void *raw_data;
123 
124 	/* corresponding STT_SECTION symbol index in SYMTAB */
125 	int sec_sym_idx;
126 
127 	/* section's DATASEC variable info, emitted on BTF finalization */
128 	bool has_btf;
129 	int sec_var_cnt;
130 	struct btf_var_secinfo *sec_vars;
131 
132 	/* section's .BTF.ext data */
133 	struct btf_ext_sec_data func_info;
134 	struct btf_ext_sec_data line_info;
135 	struct btf_ext_sec_data core_relo_info;
136 };
137 
138 struct bpf_linker {
139 	char *filename;
140 	int fd;
141 	Elf *elf;
142 	Elf64_Ehdr *elf_hdr;
143 	bool swapped_endian;
144 
145 	/* Output sections metadata */
146 	struct dst_sec *secs;
147 	int sec_cnt;
148 
149 	struct strset *strtab_strs; /* STRTAB unique strings */
150 	size_t strtab_sec_idx; /* STRTAB section index */
151 	size_t symtab_sec_idx; /* SYMTAB section index */
152 
153 	struct btf *btf;
154 	struct btf_ext *btf_ext;
155 
156 	/* global (including extern) ELF symbols */
157 	int glob_sym_cnt;
158 	struct glob_sym *glob_syms;
159 
160 	bool fd_is_owned;
161 };
162 
163 #define pr_warn_elf(fmt, ...)									\
164 	libbpf_print(LIBBPF_WARN, "libbpf: " fmt ": %s\n", ##__VA_ARGS__, elf_errmsg(-1))
165 
166 static int init_output_elf(struct bpf_linker *linker);
167 
168 static int bpf_linker_add_file(struct bpf_linker *linker, int fd,
169 			       const char *filename);
170 
171 static int linker_load_obj_file(struct bpf_linker *linker,
172 				struct src_obj *obj);
173 static int linker_sanity_check_elf(struct src_obj *obj);
174 static int linker_sanity_check_elf_symtab(struct src_obj *obj, struct src_sec *sec);
175 static int linker_sanity_check_elf_relos(struct src_obj *obj, struct src_sec *sec);
176 static int linker_sanity_check_btf(struct src_obj *obj);
177 static int linker_sanity_check_btf_ext(struct src_obj *obj);
178 static int linker_fixup_btf(struct src_obj *obj);
179 static int linker_append_sec_data(struct bpf_linker *linker, struct src_obj *obj);
180 static int linker_append_elf_syms(struct bpf_linker *linker, struct src_obj *obj);
181 static int linker_append_elf_sym(struct bpf_linker *linker, struct src_obj *obj,
182 				 Elf64_Sym *sym, const char *sym_name, int src_sym_idx);
183 static int linker_append_elf_relos(struct bpf_linker *linker, struct src_obj *obj);
184 static int linker_append_btf(struct bpf_linker *linker, struct src_obj *obj);
185 static int linker_append_btf_ext(struct bpf_linker *linker, struct src_obj *obj);
186 
187 static int finalize_btf(struct bpf_linker *linker);
188 static int finalize_btf_ext(struct bpf_linker *linker);
189 
190 void bpf_linker__free(struct bpf_linker *linker)
191 {
192 	int i;
193 
194 	if (!linker)
195 		return;
196 
197 	free(linker->filename);
198 
199 	if (linker->elf)
200 		elf_end(linker->elf);
201 
202 	if (linker->fd >= 0 && linker->fd_is_owned)
203 		close(linker->fd);
204 
205 	strset__free(linker->strtab_strs);
206 
207 	btf__free(linker->btf);
208 	btf_ext__free(linker->btf_ext);
209 
210 	for (i = 1; i < linker->sec_cnt; i++) {
211 		struct dst_sec *sec = &linker->secs[i];
212 
213 		free(sec->sec_name);
214 		free(sec->raw_data);
215 		free(sec->sec_vars);
216 
217 		free(sec->func_info.recs);
218 		free(sec->line_info.recs);
219 		free(sec->core_relo_info.recs);
220 	}
221 	free(linker->secs);
222 
223 	free(linker->glob_syms);
224 	free(linker);
225 }
226 
227 struct bpf_linker *bpf_linker__new(const char *filename, struct bpf_linker_opts *opts)
228 {
229 	struct bpf_linker *linker;
230 	int err;
231 
232 	if (!OPTS_VALID(opts, bpf_linker_opts))
233 		return errno = EINVAL, NULL;
234 
235 	if (elf_version(EV_CURRENT) == EV_NONE) {
236 		pr_warn_elf("libelf initialization failed");
237 		return errno = EINVAL, NULL;
238 	}
239 
240 	linker = calloc(1, sizeof(*linker));
241 	if (!linker)
242 		return errno = ENOMEM, NULL;
243 
244 	linker->filename = strdup(filename);
245 	if (!linker->filename) {
246 		err = -ENOMEM;
247 		goto err_out;
248 	}
249 
250 	linker->fd = open(filename, O_WRONLY | O_CREAT | O_TRUNC | O_CLOEXEC, 0644);
251 	if (linker->fd < 0) {
252 		err = -errno;
253 		pr_warn("failed to create '%s': %d\n", filename, err);
254 		goto err_out;
255 	}
256 	linker->fd_is_owned = true;
257 
258 	err = init_output_elf(linker);
259 	if (err)
260 		goto err_out;
261 
262 	return linker;
263 
264 err_out:
265 	bpf_linker__free(linker);
266 	return errno = -err, NULL;
267 }
268 
269 struct bpf_linker *bpf_linker__new_fd(int fd, struct bpf_linker_opts *opts)
270 {
271 	struct bpf_linker *linker;
272 	char filename[32];
273 	int err;
274 
275 	if (fd < 0)
276 		return errno = EINVAL, NULL;
277 
278 	if (!OPTS_VALID(opts, bpf_linker_opts))
279 		return errno = EINVAL, NULL;
280 
281 	if (elf_version(EV_CURRENT) == EV_NONE) {
282 		pr_warn_elf("libelf initialization failed");
283 		return errno = EINVAL, NULL;
284 	}
285 
286 	linker = calloc(1, sizeof(*linker));
287 	if (!linker)
288 		return errno = ENOMEM, NULL;
289 
290 	snprintf(filename, sizeof(filename), "fd:%d", fd);
291 	linker->filename = strdup(filename);
292 	if (!linker->filename) {
293 		err = -ENOMEM;
294 		goto err_out;
295 	}
296 
297 	linker->fd = fd;
298 	linker->fd_is_owned = false;
299 
300 	err = init_output_elf(linker);
301 	if (err)
302 		goto err_out;
303 
304 	return linker;
305 
306 err_out:
307 	bpf_linker__free(linker);
308 	return errno = -err, NULL;
309 }
310 
311 static struct dst_sec *add_dst_sec(struct bpf_linker *linker, const char *sec_name)
312 {
313 	struct dst_sec *secs = linker->secs, *sec;
314 	size_t new_cnt = linker->sec_cnt ? linker->sec_cnt + 1 : 2;
315 
316 	secs = libbpf_reallocarray(secs, new_cnt, sizeof(*secs));
317 	if (!secs)
318 		return NULL;
319 
320 	/* zero out newly allocated memory */
321 	memset(secs + linker->sec_cnt, 0, (new_cnt - linker->sec_cnt) * sizeof(*secs));
322 
323 	linker->secs = secs;
324 	linker->sec_cnt = new_cnt;
325 
326 	sec = &linker->secs[new_cnt - 1];
327 	sec->id = new_cnt - 1;
328 	sec->sec_name = strdup(sec_name);
329 	if (!sec->sec_name)
330 		return NULL;
331 
332 	return sec;
333 }
334 
335 static Elf64_Sym *add_new_sym(struct bpf_linker *linker, size_t *sym_idx)
336 {
337 	struct dst_sec *symtab = &linker->secs[linker->symtab_sec_idx];
338 	Elf64_Sym *syms, *sym;
339 	size_t sym_cnt = symtab->sec_sz / sizeof(*sym);
340 
341 	syms = libbpf_reallocarray(symtab->raw_data, sym_cnt + 1, sizeof(*sym));
342 	if (!syms)
343 		return NULL;
344 
345 	sym = &syms[sym_cnt];
346 	memset(sym, 0, sizeof(*sym));
347 
348 	symtab->raw_data = syms;
349 	symtab->sec_sz += sizeof(*sym);
350 	symtab->shdr->sh_size += sizeof(*sym);
351 	symtab->data->d_size += sizeof(*sym);
352 
353 	if (sym_idx)
354 		*sym_idx = sym_cnt;
355 
356 	return sym;
357 }
358 
359 static int init_output_elf(struct bpf_linker *linker)
360 {
361 	int err, str_off;
362 	Elf64_Sym *init_sym;
363 	struct dst_sec *sec;
364 
365 	linker->elf = elf_begin(linker->fd, ELF_C_WRITE, NULL);
366 	if (!linker->elf) {
367 		pr_warn_elf("failed to create ELF object");
368 		return -EINVAL;
369 	}
370 
371 	/* ELF header */
372 	linker->elf_hdr = elf64_newehdr(linker->elf);
373 	if (!linker->elf_hdr) {
374 		pr_warn_elf("failed to create ELF header");
375 		return -EINVAL;
376 	}
377 
378 	linker->elf_hdr->e_machine = EM_BPF;
379 	linker->elf_hdr->e_type = ET_REL;
380 	/* Set unknown ELF endianness, assign later from input files */
381 	linker->elf_hdr->e_ident[EI_DATA] = ELFDATANONE;
382 
383 	/* STRTAB */
384 	/* initialize strset with an empty string to conform to ELF */
385 	linker->strtab_strs = strset__new(INT_MAX, "", sizeof(""));
386 	if (libbpf_get_error(linker->strtab_strs))
387 		return libbpf_get_error(linker->strtab_strs);
388 
389 	sec = add_dst_sec(linker, ".strtab");
390 	if (!sec)
391 		return -ENOMEM;
392 
393 	sec->scn = elf_newscn(linker->elf);
394 	if (!sec->scn) {
395 		pr_warn_elf("failed to create STRTAB section");
396 		return -EINVAL;
397 	}
398 
399 	sec->shdr = elf64_getshdr(sec->scn);
400 	if (!sec->shdr)
401 		return -EINVAL;
402 
403 	sec->data = elf_newdata(sec->scn);
404 	if (!sec->data) {
405 		pr_warn_elf("failed to create STRTAB data");
406 		return -EINVAL;
407 	}
408 
409 	str_off = strset__add_str(linker->strtab_strs, sec->sec_name);
410 	if (str_off < 0)
411 		return str_off;
412 
413 	sec->sec_idx = elf_ndxscn(sec->scn);
414 	linker->elf_hdr->e_shstrndx = sec->sec_idx;
415 	linker->strtab_sec_idx = sec->sec_idx;
416 
417 	sec->shdr->sh_name = str_off;
418 	sec->shdr->sh_type = SHT_STRTAB;
419 	sec->shdr->sh_flags = SHF_STRINGS;
420 	sec->shdr->sh_offset = 0;
421 	sec->shdr->sh_link = 0;
422 	sec->shdr->sh_info = 0;
423 	sec->shdr->sh_addralign = 1;
424 	sec->shdr->sh_size = sec->sec_sz = 0;
425 	sec->shdr->sh_entsize = 0;
426 
427 	/* SYMTAB */
428 	sec = add_dst_sec(linker, ".symtab");
429 	if (!sec)
430 		return -ENOMEM;
431 
432 	sec->scn = elf_newscn(linker->elf);
433 	if (!sec->scn) {
434 		pr_warn_elf("failed to create SYMTAB section");
435 		return -EINVAL;
436 	}
437 
438 	sec->shdr = elf64_getshdr(sec->scn);
439 	if (!sec->shdr)
440 		return -EINVAL;
441 
442 	sec->data = elf_newdata(sec->scn);
443 	if (!sec->data) {
444 		pr_warn_elf("failed to create SYMTAB data");
445 		return -EINVAL;
446 	}
447 	/* Ensure libelf translates byte-order of symbol records */
448 	sec->data->d_type = ELF_T_SYM;
449 
450 	str_off = strset__add_str(linker->strtab_strs, sec->sec_name);
451 	if (str_off < 0)
452 		return str_off;
453 
454 	sec->sec_idx = elf_ndxscn(sec->scn);
455 	linker->symtab_sec_idx = sec->sec_idx;
456 
457 	sec->shdr->sh_name = str_off;
458 	sec->shdr->sh_type = SHT_SYMTAB;
459 	sec->shdr->sh_flags = 0;
460 	sec->shdr->sh_offset = 0;
461 	sec->shdr->sh_link = linker->strtab_sec_idx;
462 	/* sh_info should be one greater than the index of the last local
463 	 * symbol (i.e., binding is STB_LOCAL). But why and who cares?
464 	 */
465 	sec->shdr->sh_info = 0;
466 	sec->shdr->sh_addralign = 8;
467 	sec->shdr->sh_entsize = sizeof(Elf64_Sym);
468 
469 	/* .BTF */
470 	linker->btf = btf__new_empty();
471 	err = libbpf_get_error(linker->btf);
472 	if (err)
473 		return err;
474 
475 	/* add the special all-zero symbol */
476 	init_sym = add_new_sym(linker, NULL);
477 	if (!init_sym)
478 		return -EINVAL;
479 
480 	init_sym->st_name = 0;
481 	init_sym->st_info = 0;
482 	init_sym->st_other = 0;
483 	init_sym->st_shndx = SHN_UNDEF;
484 	init_sym->st_value = 0;
485 	init_sym->st_size = 0;
486 
487 	return 0;
488 }
489 
490 static int bpf_linker_add_file(struct bpf_linker *linker, int fd,
491 			       const char *filename)
492 {
493 	struct src_obj obj = {};
494 	int err = 0;
495 
496 	obj.filename = filename;
497 	obj.fd = fd;
498 
499 	err = err ?: linker_load_obj_file(linker, &obj);
500 	err = err ?: linker_append_sec_data(linker, &obj);
501 	err = err ?: linker_append_elf_syms(linker, &obj);
502 	err = err ?: linker_append_elf_relos(linker, &obj);
503 	err = err ?: linker_append_btf(linker, &obj);
504 	err = err ?: linker_append_btf_ext(linker, &obj);
505 
506 	/* free up src_obj resources */
507 	free(obj.btf_type_map);
508 	btf__free(obj.btf);
509 	btf_ext__free(obj.btf_ext);
510 	free(obj.secs);
511 	free(obj.sym_map);
512 	if (obj.elf)
513 		elf_end(obj.elf);
514 
515 	return err;
516 }
517 
518 int bpf_linker__add_file(struct bpf_linker *linker, const char *filename,
519 			 const struct bpf_linker_file_opts *opts)
520 {
521 	int fd, err;
522 
523 	if (!OPTS_VALID(opts, bpf_linker_file_opts))
524 		return libbpf_err(-EINVAL);
525 
526 	if (!linker->elf)
527 		return libbpf_err(-EINVAL);
528 
529 	fd = open(filename, O_RDONLY | O_CLOEXEC);
530 	if (fd < 0) {
531 		err = -errno;
532 		pr_warn("failed to open file '%s': %s\n", filename, errstr(err));
533 		return libbpf_err(err);
534 	}
535 
536 	err = bpf_linker_add_file(linker, fd, filename);
537 	close(fd);
538 	return libbpf_err(err);
539 }
540 
541 int bpf_linker__add_fd(struct bpf_linker *linker, int fd,
542 		       const struct bpf_linker_file_opts *opts)
543 {
544 	char filename[32];
545 	int err;
546 
547 	if (!OPTS_VALID(opts, bpf_linker_file_opts))
548 		return libbpf_err(-EINVAL);
549 
550 	if (!linker->elf)
551 		return libbpf_err(-EINVAL);
552 
553 	if (fd < 0)
554 		return libbpf_err(-EINVAL);
555 
556 	snprintf(filename, sizeof(filename), "fd:%d", fd);
557 	err = bpf_linker_add_file(linker, fd, filename);
558 	return libbpf_err(err);
559 }
560 
561 int bpf_linker__add_buf(struct bpf_linker *linker, void *buf, size_t buf_sz,
562 			const struct bpf_linker_file_opts *opts)
563 {
564 	char filename[32];
565 	int fd, written, ret;
566 
567 	if (!OPTS_VALID(opts, bpf_linker_file_opts))
568 		return libbpf_err(-EINVAL);
569 
570 	if (!linker->elf)
571 		return libbpf_err(-EINVAL);
572 
573 	snprintf(filename, sizeof(filename), "mem:%p+%zu", buf, buf_sz);
574 
575 	fd = sys_memfd_create(filename, 0);
576 	if (fd < 0) {
577 		ret = -errno;
578 		pr_warn("failed to create memfd '%s': %s\n", filename, errstr(ret));
579 		return libbpf_err(ret);
580 	}
581 
582 	written = 0;
583 	while (written < buf_sz) {
584 		ret = write(fd, buf, buf_sz);
585 		if (ret < 0) {
586 			ret = -errno;
587 			pr_warn("failed to write '%s': %s\n", filename, errstr(ret));
588 			goto err_out;
589 		}
590 		written += ret;
591 	}
592 
593 	ret = bpf_linker_add_file(linker, fd, filename);
594 err_out:
595 	close(fd);
596 	return libbpf_err(ret);
597 }
598 
599 static bool is_dwarf_sec_name(const char *name)
600 {
601 	/* approximation, but the actual list is too long */
602 	return strncmp(name, ".debug_", sizeof(".debug_") - 1) == 0;
603 }
604 
605 static bool is_ignored_sec(struct src_sec *sec)
606 {
607 	Elf64_Shdr *shdr = sec->shdr;
608 	const char *name = sec->sec_name;
609 
610 	/* no special handling of .strtab */
611 	if (shdr->sh_type == SHT_STRTAB)
612 		return true;
613 
614 	/* ignore .llvm_addrsig section as well */
615 	if (shdr->sh_type == SHT_LLVM_ADDRSIG)
616 		return true;
617 
618 	/* no subprograms will lead to an empty .text section, ignore it */
619 	if (shdr->sh_type == SHT_PROGBITS && shdr->sh_size == 0 &&
620 	    strcmp(sec->sec_name, ".text") == 0)
621 		return true;
622 
623 	/* DWARF sections */
624 	if (is_dwarf_sec_name(sec->sec_name))
625 		return true;
626 
627 	if (strncmp(name, ".rel", sizeof(".rel") - 1) == 0) {
628 		name += sizeof(".rel") - 1;
629 		/* DWARF section relocations */
630 		if (is_dwarf_sec_name(name))
631 			return true;
632 
633 		/* .BTF and .BTF.ext don't need relocations */
634 		if (strcmp(name, BTF_ELF_SEC) == 0 ||
635 		    strcmp(name, BTF_EXT_ELF_SEC) == 0)
636 			return true;
637 	}
638 
639 	return false;
640 }
641 
642 static struct src_sec *add_src_sec(struct src_obj *obj, const char *sec_name)
643 {
644 	struct src_sec *secs = obj->secs, *sec;
645 	size_t new_cnt = obj->sec_cnt ? obj->sec_cnt + 1 : 2;
646 
647 	secs = libbpf_reallocarray(secs, new_cnt, sizeof(*secs));
648 	if (!secs)
649 		return NULL;
650 
651 	/* zero out newly allocated memory */
652 	memset(secs + obj->sec_cnt, 0, (new_cnt - obj->sec_cnt) * sizeof(*secs));
653 
654 	obj->secs = secs;
655 	obj->sec_cnt = new_cnt;
656 
657 	sec = &obj->secs[new_cnt - 1];
658 	sec->id = new_cnt - 1;
659 	sec->sec_name = sec_name;
660 
661 	return sec;
662 }
663 
664 static int linker_load_obj_file(struct bpf_linker *linker,
665 				struct src_obj *obj)
666 {
667 	int err = 0;
668 	Elf_Scn *scn;
669 	Elf_Data *data;
670 	Elf64_Ehdr *ehdr;
671 	Elf64_Shdr *shdr;
672 	struct src_sec *sec;
673 	unsigned char obj_byteorder;
674 	unsigned char link_byteorder = linker->elf_hdr->e_ident[EI_DATA];
675 #if __BYTE_ORDER__ == __ORDER_LITTLE_ENDIAN__
676 	const unsigned char host_byteorder = ELFDATA2LSB;
677 #elif __BYTE_ORDER__ == __ORDER_BIG_ENDIAN__
678 	const unsigned char host_byteorder = ELFDATA2MSB;
679 #else
680 #error "Unknown __BYTE_ORDER__"
681 #endif
682 
683 	pr_debug("linker: adding object file '%s'...\n", obj->filename);
684 
685 	obj->elf = elf_begin(obj->fd, ELF_C_READ_MMAP, NULL);
686 	if (!obj->elf) {
687 		pr_warn_elf("failed to parse ELF file '%s'", obj->filename);
688 		return -EINVAL;
689 	}
690 
691 	/* Sanity check ELF file high-level properties */
692 	ehdr = elf64_getehdr(obj->elf);
693 	if (!ehdr) {
694 		pr_warn_elf("failed to get ELF header for %s", obj->filename);
695 		return -EINVAL;
696 	}
697 
698 	/* Linker output endianness set by first input object */
699 	obj_byteorder = ehdr->e_ident[EI_DATA];
700 	if (obj_byteorder != ELFDATA2LSB && obj_byteorder != ELFDATA2MSB) {
701 		err = -EOPNOTSUPP;
702 		pr_warn("unknown byte order of ELF file %s\n", obj->filename);
703 		return err;
704 	}
705 	if (link_byteorder == ELFDATANONE) {
706 		linker->elf_hdr->e_ident[EI_DATA] = obj_byteorder;
707 		linker->swapped_endian = obj_byteorder != host_byteorder;
708 		pr_debug("linker: set %s-endian output byte order\n",
709 			 obj_byteorder == ELFDATA2MSB ? "big" : "little");
710 	} else if (link_byteorder != obj_byteorder) {
711 		err = -EOPNOTSUPP;
712 		pr_warn("byte order mismatch with ELF file %s\n", obj->filename);
713 		return err;
714 	}
715 
716 	if (ehdr->e_type != ET_REL
717 	    || ehdr->e_machine != EM_BPF
718 	    || ehdr->e_ident[EI_CLASS] != ELFCLASS64) {
719 		err = -EOPNOTSUPP;
720 		pr_warn_elf("unsupported kind of ELF file %s", obj->filename);
721 		return err;
722 	}
723 
724 	if (elf_getshdrstrndx(obj->elf, &obj->shstrs_sec_idx)) {
725 		pr_warn_elf("failed to get SHSTRTAB section index for %s", obj->filename);
726 		return -EINVAL;
727 	}
728 
729 	scn = NULL;
730 	while ((scn = elf_nextscn(obj->elf, scn)) != NULL) {
731 		size_t sec_idx = elf_ndxscn(scn);
732 		const char *sec_name;
733 
734 		shdr = elf64_getshdr(scn);
735 		if (!shdr) {
736 			pr_warn_elf("failed to get section #%zu header for %s",
737 				    sec_idx, obj->filename);
738 			return -EINVAL;
739 		}
740 
741 		sec_name = elf_strptr(obj->elf, obj->shstrs_sec_idx, shdr->sh_name);
742 		if (!sec_name) {
743 			pr_warn_elf("failed to get section #%zu name for %s",
744 				    sec_idx, obj->filename);
745 			return -EINVAL;
746 		}
747 
748 		data = elf_getdata(scn, 0);
749 		if (!data) {
750 			pr_warn_elf("failed to get section #%zu (%s) data from %s",
751 				    sec_idx, sec_name, obj->filename);
752 			return -EINVAL;
753 		}
754 
755 		sec = add_src_sec(obj, sec_name);
756 		if (!sec)
757 			return -ENOMEM;
758 
759 		sec->scn = scn;
760 		sec->shdr = shdr;
761 		sec->data = data;
762 		sec->sec_idx = elf_ndxscn(scn);
763 
764 		if (is_ignored_sec(sec)) {
765 			sec->skipped = true;
766 			continue;
767 		}
768 
769 		switch (shdr->sh_type) {
770 		case SHT_SYMTAB:
771 			if (obj->symtab_sec_idx) {
772 				err = -EOPNOTSUPP;
773 				pr_warn("multiple SYMTAB sections found, not supported\n");
774 				return err;
775 			}
776 			obj->symtab_sec_idx = sec_idx;
777 			break;
778 		case SHT_STRTAB:
779 			/* we'll construct our own string table */
780 			break;
781 		case SHT_PROGBITS:
782 			if (strcmp(sec_name, BTF_ELF_SEC) == 0) {
783 				obj->btf = btf__new(data->d_buf, shdr->sh_size);
784 				err = libbpf_get_error(obj->btf);
785 				if (err) {
786 					pr_warn("failed to parse .BTF from %s: %s\n",
787 						obj->filename, errstr(err));
788 					return err;
789 				}
790 				sec->skipped = true;
791 				continue;
792 			}
793 			if (strcmp(sec_name, BTF_EXT_ELF_SEC) == 0) {
794 				obj->btf_ext = btf_ext__new(data->d_buf, shdr->sh_size);
795 				err = libbpf_get_error(obj->btf_ext);
796 				if (err) {
797 					pr_warn("failed to parse .BTF.ext from '%s': %s\n",
798 						obj->filename, errstr(err));
799 					return err;
800 				}
801 				sec->skipped = true;
802 				continue;
803 			}
804 
805 			/* data & code */
806 			break;
807 		case SHT_NOBITS:
808 			/* BSS */
809 			break;
810 		case SHT_REL:
811 			/* relocations */
812 			break;
813 		default:
814 			pr_warn("unrecognized section #%zu (%s) in %s\n",
815 				sec_idx, sec_name, obj->filename);
816 			err = -EINVAL;
817 			return err;
818 		}
819 	}
820 
821 	err = err ?: linker_sanity_check_elf(obj);
822 	err = err ?: linker_sanity_check_btf(obj);
823 	err = err ?: linker_sanity_check_btf_ext(obj);
824 	err = err ?: linker_fixup_btf(obj);
825 
826 	return err;
827 }
828 
829 static int linker_sanity_check_elf(struct src_obj *obj)
830 {
831 	struct src_sec *sec;
832 	int i, err;
833 
834 	if (!obj->symtab_sec_idx) {
835 		pr_warn("ELF is missing SYMTAB section in %s\n", obj->filename);
836 		return -EINVAL;
837 	}
838 	if (!obj->shstrs_sec_idx) {
839 		pr_warn("ELF is missing section headers STRTAB section in %s\n", obj->filename);
840 		return -EINVAL;
841 	}
842 
843 	for (i = 1; i < obj->sec_cnt; i++) {
844 		sec = &obj->secs[i];
845 
846 		if (sec->sec_name[0] == '\0') {
847 			pr_warn("ELF section #%zu has empty name in %s\n", sec->sec_idx, obj->filename);
848 			return -EINVAL;
849 		}
850 
851 		if (is_dwarf_sec_name(sec->sec_name))
852 			continue;
853 
854 		if (sec->shdr->sh_addralign && !is_pow_of_2(sec->shdr->sh_addralign)) {
855 			pr_warn("ELF section #%zu alignment %llu is non pow-of-2 alignment in %s\n",
856 				sec->sec_idx, (long long unsigned)sec->shdr->sh_addralign,
857 				obj->filename);
858 			return -EINVAL;
859 		}
860 		if (sec->shdr->sh_addralign != sec->data->d_align) {
861 			pr_warn("ELF section #%zu has inconsistent alignment addr=%llu != d=%llu in %s\n",
862 				sec->sec_idx, (long long unsigned)sec->shdr->sh_addralign,
863 				(long long unsigned)sec->data->d_align, obj->filename);
864 			return -EINVAL;
865 		}
866 
867 		if (sec->shdr->sh_size != sec->data->d_size) {
868 			pr_warn("ELF section #%zu has inconsistent section size sh=%llu != d=%llu in %s\n",
869 				sec->sec_idx, (long long unsigned)sec->shdr->sh_size,
870 				(long long unsigned)sec->data->d_size, obj->filename);
871 			return -EINVAL;
872 		}
873 
874 		switch (sec->shdr->sh_type) {
875 		case SHT_SYMTAB:
876 			err = linker_sanity_check_elf_symtab(obj, sec);
877 			if (err)
878 				return err;
879 			break;
880 		case SHT_STRTAB:
881 			break;
882 		case SHT_PROGBITS:
883 			if (sec->shdr->sh_flags & SHF_EXECINSTR) {
884 				if (sec->shdr->sh_size % sizeof(struct bpf_insn) != 0) {
885 					pr_warn("ELF section #%zu has unexpected size alignment %llu in %s\n",
886 						sec->sec_idx, (long long unsigned)sec->shdr->sh_size,
887 						obj->filename);
888 					return -EINVAL;
889 				}
890 			}
891 			break;
892 		case SHT_NOBITS:
893 			break;
894 		case SHT_REL:
895 			err = linker_sanity_check_elf_relos(obj, sec);
896 			if (err)
897 				return err;
898 			break;
899 		case SHT_LLVM_ADDRSIG:
900 			break;
901 		default:
902 			pr_warn("ELF section #%zu (%s) has unrecognized type %zu in %s\n",
903 				sec->sec_idx, sec->sec_name, (size_t)sec->shdr->sh_type, obj->filename);
904 			return -EINVAL;
905 		}
906 	}
907 
908 	return 0;
909 }
910 
911 static int linker_sanity_check_elf_symtab(struct src_obj *obj, struct src_sec *sec)
912 {
913 	struct src_sec *link_sec;
914 	Elf64_Sym *sym;
915 	int i, n;
916 
917 	if (sec->shdr->sh_entsize != sizeof(Elf64_Sym))
918 		return -EINVAL;
919 	if (sec->shdr->sh_size % sec->shdr->sh_entsize != 0)
920 		return -EINVAL;
921 
922 	if (!sec->shdr->sh_link || sec->shdr->sh_link >= obj->sec_cnt) {
923 		pr_warn("ELF SYMTAB section #%zu points to missing STRTAB section #%zu in %s\n",
924 			sec->sec_idx, (size_t)sec->shdr->sh_link, obj->filename);
925 		return -EINVAL;
926 	}
927 	link_sec = &obj->secs[sec->shdr->sh_link];
928 	if (link_sec->shdr->sh_type != SHT_STRTAB) {
929 		pr_warn("ELF SYMTAB section #%zu points to invalid STRTAB section #%zu in %s\n",
930 			sec->sec_idx, (size_t)sec->shdr->sh_link, obj->filename);
931 		return -EINVAL;
932 	}
933 
934 	n = sec->shdr->sh_size / sec->shdr->sh_entsize;
935 	sym = sec->data->d_buf;
936 	for (i = 0; i < n; i++, sym++) {
937 		int sym_type = ELF64_ST_TYPE(sym->st_info);
938 		int sym_bind = ELF64_ST_BIND(sym->st_info);
939 		int sym_vis = ELF64_ST_VISIBILITY(sym->st_other);
940 
941 		if (i == 0) {
942 			if (sym->st_name != 0 || sym->st_info != 0
943 			    || sym->st_other != 0 || sym->st_shndx != 0
944 			    || sym->st_value != 0 || sym->st_size != 0) {
945 				pr_warn("ELF sym #0 is invalid in %s\n", obj->filename);
946 				return -EINVAL;
947 			}
948 			continue;
949 		}
950 		if (sym_bind != STB_LOCAL && sym_bind != STB_GLOBAL && sym_bind != STB_WEAK) {
951 			pr_warn("ELF sym #%d in section #%zu has unsupported symbol binding %d\n",
952 				i, sec->sec_idx, sym_bind);
953 			return -EINVAL;
954 		}
955 		if (sym_vis != STV_DEFAULT && sym_vis != STV_HIDDEN) {
956 			pr_warn("ELF sym #%d in section #%zu has unsupported symbol visibility %d\n",
957 				i, sec->sec_idx, sym_vis);
958 			return -EINVAL;
959 		}
960 		if (sym->st_shndx == 0) {
961 			if (sym_type != STT_NOTYPE || sym_bind == STB_LOCAL
962 			    || sym->st_value != 0 || sym->st_size != 0) {
963 				pr_warn("ELF sym #%d is invalid extern symbol in %s\n",
964 					i, obj->filename);
965 
966 				return -EINVAL;
967 			}
968 			continue;
969 		}
970 		if (sym->st_shndx < SHN_LORESERVE && sym->st_shndx >= obj->sec_cnt) {
971 			pr_warn("ELF sym #%d in section #%zu points to missing section #%zu in %s\n",
972 				i, sec->sec_idx, (size_t)sym->st_shndx, obj->filename);
973 			return -EINVAL;
974 		}
975 		if (sym_type == STT_SECTION) {
976 			if (sym->st_value != 0)
977 				return -EINVAL;
978 			continue;
979 		}
980 	}
981 
982 	return 0;
983 }
984 
985 static int linker_sanity_check_elf_relos(struct src_obj *obj, struct src_sec *sec)
986 {
987 	struct src_sec *link_sec, *sym_sec;
988 	Elf64_Rel *relo;
989 	int i, n;
990 
991 	if (sec->shdr->sh_entsize != sizeof(Elf64_Rel))
992 		return -EINVAL;
993 	if (sec->shdr->sh_size % sec->shdr->sh_entsize != 0)
994 		return -EINVAL;
995 
996 	/* SHT_REL's sh_link should point to SYMTAB */
997 	if (sec->shdr->sh_link != obj->symtab_sec_idx) {
998 		pr_warn("ELF relo section #%zu points to invalid SYMTAB section #%zu in %s\n",
999 			sec->sec_idx, (size_t)sec->shdr->sh_link, obj->filename);
1000 		return -EINVAL;
1001 	}
1002 
1003 	/* SHT_REL's sh_info points to relocated section */
1004 	if (!sec->shdr->sh_info || sec->shdr->sh_info >= obj->sec_cnt) {
1005 		pr_warn("ELF relo section #%zu points to missing section #%zu in %s\n",
1006 			sec->sec_idx, (size_t)sec->shdr->sh_info, obj->filename);
1007 		return -EINVAL;
1008 	}
1009 	link_sec = &obj->secs[sec->shdr->sh_info];
1010 
1011 	/* .rel<secname> -> <secname> pattern is followed */
1012 	if (strncmp(sec->sec_name, ".rel", sizeof(".rel") - 1) != 0
1013 	    || strcmp(sec->sec_name + sizeof(".rel") - 1, link_sec->sec_name) != 0) {
1014 		pr_warn("ELF relo section #%zu name has invalid name in %s\n",
1015 			sec->sec_idx, obj->filename);
1016 		return -EINVAL;
1017 	}
1018 
1019 	/* don't further validate relocations for ignored sections */
1020 	if (link_sec->skipped)
1021 		return 0;
1022 
1023 	/* relocatable section is data or instructions */
1024 	if (link_sec->shdr->sh_type != SHT_PROGBITS && link_sec->shdr->sh_type != SHT_NOBITS) {
1025 		pr_warn("ELF relo section #%zu points to invalid section #%zu in %s\n",
1026 			sec->sec_idx, (size_t)sec->shdr->sh_info, obj->filename);
1027 		return -EINVAL;
1028 	}
1029 
1030 	/* check sanity of each relocation */
1031 	n = sec->shdr->sh_size / sec->shdr->sh_entsize;
1032 	relo = sec->data->d_buf;
1033 	sym_sec = &obj->secs[obj->symtab_sec_idx];
1034 	for (i = 0; i < n; i++, relo++) {
1035 		size_t sym_idx = ELF64_R_SYM(relo->r_info);
1036 		size_t sym_type = ELF64_R_TYPE(relo->r_info);
1037 
1038 		if (sym_type != R_BPF_64_64 && sym_type != R_BPF_64_32 &&
1039 		    sym_type != R_BPF_64_ABS64 && sym_type != R_BPF_64_ABS32) {
1040 			pr_warn("ELF relo #%d in section #%zu has unexpected type %zu in %s\n",
1041 				i, sec->sec_idx, sym_type, obj->filename);
1042 			return -EINVAL;
1043 		}
1044 
1045 		if (!sym_idx || sym_idx * sizeof(Elf64_Sym) >= sym_sec->shdr->sh_size) {
1046 			pr_warn("ELF relo #%d in section #%zu points to invalid symbol #%zu in %s\n",
1047 				i, sec->sec_idx, sym_idx, obj->filename);
1048 			return -EINVAL;
1049 		}
1050 
1051 		if (link_sec->shdr->sh_flags & SHF_EXECINSTR) {
1052 			if (relo->r_offset % sizeof(struct bpf_insn) != 0) {
1053 				pr_warn("ELF relo #%d in section #%zu points to missing symbol #%zu in %s\n",
1054 					i, sec->sec_idx, sym_idx, obj->filename);
1055 				return -EINVAL;
1056 			}
1057 		}
1058 	}
1059 
1060 	return 0;
1061 }
1062 
1063 static int check_btf_type_id(__u32 *type_id, void *ctx)
1064 {
1065 	struct btf *btf = ctx;
1066 
1067 	if (*type_id >= btf__type_cnt(btf))
1068 		return -EINVAL;
1069 
1070 	return 0;
1071 }
1072 
1073 static int check_btf_str_off(__u32 *str_off, void *ctx)
1074 {
1075 	struct btf *btf = ctx;
1076 	const char *s;
1077 
1078 	s = btf__str_by_offset(btf, *str_off);
1079 
1080 	if (!s)
1081 		return -EINVAL;
1082 
1083 	return 0;
1084 }
1085 
1086 static int linker_sanity_check_btf(struct src_obj *obj)
1087 {
1088 	struct btf_type *t;
1089 	int i, n, err;
1090 
1091 	if (!obj->btf)
1092 		return 0;
1093 
1094 	n = btf__type_cnt(obj->btf);
1095 	for (i = 1; i < n; i++) {
1096 		struct btf_field_iter it;
1097 		__u32 *type_id, *str_off;
1098 
1099 		t = btf_type_by_id(obj->btf, i);
1100 
1101 		err = btf_field_iter_init(&it, t, BTF_FIELD_ITER_IDS);
1102 		if (err)
1103 			return err;
1104 		while ((type_id = btf_field_iter_next(&it))) {
1105 			if (*type_id >= n)
1106 				return -EINVAL;
1107 		}
1108 
1109 		err = btf_field_iter_init(&it, t, BTF_FIELD_ITER_STRS);
1110 		if (err)
1111 			return err;
1112 		while ((str_off = btf_field_iter_next(&it))) {
1113 			if (!btf__str_by_offset(obj->btf, *str_off))
1114 				return -EINVAL;
1115 		}
1116 	}
1117 
1118 	return 0;
1119 }
1120 
1121 static int linker_sanity_check_btf_ext(struct src_obj *obj)
1122 {
1123 	int err = 0;
1124 
1125 	if (!obj->btf_ext)
1126 		return 0;
1127 
1128 	/* can't use .BTF.ext without .BTF */
1129 	if (!obj->btf)
1130 		return -EINVAL;
1131 
1132 	err = err ?: btf_ext_visit_type_ids(obj->btf_ext, check_btf_type_id, obj->btf);
1133 	err = err ?: btf_ext_visit_str_offs(obj->btf_ext, check_btf_str_off, obj->btf);
1134 	if (err)
1135 		return err;
1136 
1137 	return 0;
1138 }
1139 
1140 static int init_sec(struct bpf_linker *linker, struct dst_sec *dst_sec, struct src_sec *src_sec)
1141 {
1142 	Elf_Scn *scn;
1143 	Elf_Data *data;
1144 	Elf64_Shdr *shdr;
1145 	int name_off;
1146 
1147 	dst_sec->sec_sz = 0;
1148 	dst_sec->sec_idx = 0;
1149 	dst_sec->ephemeral = src_sec->ephemeral;
1150 
1151 	/* ephemeral sections are just thin section shells lacking most parts */
1152 	if (src_sec->ephemeral)
1153 		return 0;
1154 
1155 	scn = elf_newscn(linker->elf);
1156 	if (!scn)
1157 		return -ENOMEM;
1158 	data = elf_newdata(scn);
1159 	if (!data)
1160 		return -ENOMEM;
1161 	shdr = elf64_getshdr(scn);
1162 	if (!shdr)
1163 		return -ENOMEM;
1164 
1165 	dst_sec->scn = scn;
1166 	dst_sec->shdr = shdr;
1167 	dst_sec->data = data;
1168 	dst_sec->sec_idx = elf_ndxscn(scn);
1169 
1170 	name_off = strset__add_str(linker->strtab_strs, src_sec->sec_name);
1171 	if (name_off < 0)
1172 		return name_off;
1173 
1174 	shdr->sh_name = name_off;
1175 	shdr->sh_type = src_sec->shdr->sh_type;
1176 	shdr->sh_flags = src_sec->shdr->sh_flags;
1177 	shdr->sh_size = 0;
1178 	/* sh_link and sh_info have different meaning for different types of
1179 	 * sections, so we leave it up to the caller code to fill them in, if
1180 	 * necessary
1181 	 */
1182 	shdr->sh_link = 0;
1183 	shdr->sh_info = 0;
1184 	shdr->sh_addralign = src_sec->shdr->sh_addralign;
1185 	shdr->sh_entsize = src_sec->shdr->sh_entsize;
1186 
1187 	data->d_type = src_sec->data->d_type;
1188 	data->d_size = 0;
1189 	data->d_buf = NULL;
1190 	data->d_align = src_sec->data->d_align;
1191 	data->d_off = 0;
1192 
1193 	return 0;
1194 }
1195 
1196 static struct dst_sec *find_dst_sec_by_name(struct bpf_linker *linker, const char *sec_name)
1197 {
1198 	struct dst_sec *sec;
1199 	int i;
1200 
1201 	for (i = 1; i < linker->sec_cnt; i++) {
1202 		sec = &linker->secs[i];
1203 
1204 		if (strcmp(sec->sec_name, sec_name) == 0)
1205 			return sec;
1206 	}
1207 
1208 	return NULL;
1209 }
1210 
1211 static bool secs_match(struct dst_sec *dst, struct src_sec *src)
1212 {
1213 	if (dst->ephemeral || src->ephemeral)
1214 		return true;
1215 
1216 	if (dst->shdr->sh_type != src->shdr->sh_type) {
1217 		pr_warn("sec %s types mismatch\n", dst->sec_name);
1218 		return false;
1219 	}
1220 	if (dst->shdr->sh_flags != src->shdr->sh_flags) {
1221 		pr_warn("sec %s flags mismatch\n", dst->sec_name);
1222 		return false;
1223 	}
1224 	if (dst->shdr->sh_entsize != src->shdr->sh_entsize) {
1225 		pr_warn("sec %s entsize mismatch\n", dst->sec_name);
1226 		return false;
1227 	}
1228 
1229 	return true;
1230 }
1231 
1232 static bool sec_content_is_same(struct dst_sec *dst_sec, struct src_sec *src_sec)
1233 {
1234 	if (dst_sec->sec_sz != src_sec->shdr->sh_size)
1235 		return false;
1236 	if (memcmp(dst_sec->raw_data, src_sec->data->d_buf, dst_sec->sec_sz) != 0)
1237 		return false;
1238 	return true;
1239 }
1240 
1241 static bool is_exec_sec(struct dst_sec *sec)
1242 {
1243 	if (!sec || sec->ephemeral)
1244 		return false;
1245 	return (sec->shdr->sh_type == SHT_PROGBITS) &&
1246 	       (sec->shdr->sh_flags & SHF_EXECINSTR);
1247 }
1248 
1249 static void exec_sec_bswap(void *raw_data, int size)
1250 {
1251 	const int insn_cnt = size / sizeof(struct bpf_insn);
1252 	struct bpf_insn *insn = raw_data;
1253 	int i;
1254 
1255 	for (i = 0; i < insn_cnt; i++, insn++)
1256 		bpf_insn_bswap(insn);
1257 }
1258 
1259 static int extend_sec(struct bpf_linker *linker, struct dst_sec *dst, struct src_sec *src)
1260 {
1261 	void *tmp;
1262 	size_t dst_align, src_align;
1263 	size_t dst_align_sz, dst_final_sz;
1264 	int err;
1265 
1266 	/* Ephemeral source section doesn't contribute anything to ELF
1267 	 * section data.
1268 	 */
1269 	if (src->ephemeral)
1270 		return 0;
1271 
1272 	/* Some sections (like .maps) can contain both externs (and thus be
1273 	 * ephemeral) and non-externs (map definitions). So it's possible that
1274 	 * it has to be "upgraded" from ephemeral to non-ephemeral when the
1275 	 * first non-ephemeral entity appears. In such case, we add ELF
1276 	 * section, data, etc.
1277 	 */
1278 	if (dst->ephemeral) {
1279 		err = init_sec(linker, dst, src);
1280 		if (err)
1281 			return err;
1282 	}
1283 
1284 	dst_align = dst->shdr->sh_addralign;
1285 	src_align = src->shdr->sh_addralign;
1286 	if (dst_align == 0)
1287 		dst_align = 1;
1288 	if (dst_align < src_align)
1289 		dst_align = src_align;
1290 
1291 	dst_align_sz = (dst->sec_sz + dst_align - 1) / dst_align * dst_align;
1292 
1293 	/* no need to re-align final size */
1294 	dst_final_sz = dst_align_sz + src->shdr->sh_size;
1295 
1296 	if (src->shdr->sh_type != SHT_NOBITS) {
1297 		tmp = realloc(dst->raw_data, dst_final_sz);
1298 		/* If dst_align_sz == 0, realloc() behaves in a special way:
1299 		 * 1. When dst->raw_data is NULL it returns:
1300 		 *    "either NULL or a pointer suitable to be passed to free()" [1].
1301 		 * 2. When dst->raw_data is not-NULL it frees dst->raw_data and returns NULL,
1302 		 *    thus invalidating any "pointer suitable to be passed to free()" obtained
1303 		 *    at step (1).
1304 		 *
1305 		 * The dst_align_sz > 0 check avoids error exit after (2), otherwise
1306 		 * dst->raw_data would be freed again in bpf_linker__free().
1307 		 *
1308 		 * [1] man 3 realloc
1309 		 */
1310 		if (!tmp && dst_align_sz > 0)
1311 			return -ENOMEM;
1312 		dst->raw_data = tmp;
1313 
1314 		/* pad dst section, if it's alignment forced size increase */
1315 		memset(dst->raw_data + dst->sec_sz, 0, dst_align_sz - dst->sec_sz);
1316 		/* now copy src data at a properly aligned offset */
1317 		memcpy(dst->raw_data + dst_align_sz, src->data->d_buf, src->shdr->sh_size);
1318 
1319 		/* convert added bpf insns to native byte-order */
1320 		if (linker->swapped_endian && is_exec_sec(dst))
1321 			exec_sec_bswap(dst->raw_data + dst_align_sz, src->shdr->sh_size);
1322 	}
1323 
1324 	dst->sec_sz = dst_final_sz;
1325 	dst->shdr->sh_size = dst_final_sz;
1326 	dst->data->d_size = dst_final_sz;
1327 
1328 	dst->shdr->sh_addralign = dst_align;
1329 	dst->data->d_align = dst_align;
1330 
1331 	src->dst_off = dst_align_sz;
1332 
1333 	return 0;
1334 }
1335 
1336 static bool is_data_sec(struct src_sec *sec)
1337 {
1338 	if (!sec || sec->skipped)
1339 		return false;
1340 	/* ephemeral sections are data sections, e.g., .kconfig, .ksyms */
1341 	if (sec->ephemeral)
1342 		return true;
1343 	return sec->shdr->sh_type == SHT_PROGBITS || sec->shdr->sh_type == SHT_NOBITS;
1344 }
1345 
1346 static bool is_relo_sec(struct src_sec *sec)
1347 {
1348 	if (!sec || sec->skipped || sec->ephemeral)
1349 		return false;
1350 	return sec->shdr->sh_type == SHT_REL;
1351 }
1352 
1353 static int linker_append_sec_data(struct bpf_linker *linker, struct src_obj *obj)
1354 {
1355 	int i, err;
1356 
1357 	for (i = 1; i < obj->sec_cnt; i++) {
1358 		struct src_sec *src_sec;
1359 		struct dst_sec *dst_sec;
1360 
1361 		src_sec = &obj->secs[i];
1362 		if (!is_data_sec(src_sec))
1363 			continue;
1364 
1365 		dst_sec = find_dst_sec_by_name(linker, src_sec->sec_name);
1366 		if (!dst_sec) {
1367 			dst_sec = add_dst_sec(linker, src_sec->sec_name);
1368 			if (!dst_sec)
1369 				return -ENOMEM;
1370 			err = init_sec(linker, dst_sec, src_sec);
1371 			if (err) {
1372 				pr_warn("failed to init section '%s'\n", src_sec->sec_name);
1373 				return err;
1374 			}
1375 		} else {
1376 			if (!secs_match(dst_sec, src_sec)) {
1377 				pr_warn("ELF sections %s are incompatible\n", src_sec->sec_name);
1378 				return -EINVAL;
1379 			}
1380 
1381 			/* "license" and "version" sections are deduped */
1382 			if (strcmp(src_sec->sec_name, "license") == 0
1383 			    || strcmp(src_sec->sec_name, "version") == 0) {
1384 				if (!sec_content_is_same(dst_sec, src_sec)) {
1385 					pr_warn("non-identical contents of section '%s' are not supported\n", src_sec->sec_name);
1386 					return -EINVAL;
1387 				}
1388 				src_sec->skipped = true;
1389 				src_sec->dst_id = dst_sec->id;
1390 				continue;
1391 			}
1392 		}
1393 
1394 		/* record mapped section index */
1395 		src_sec->dst_id = dst_sec->id;
1396 
1397 		err = extend_sec(linker, dst_sec, src_sec);
1398 		if (err)
1399 			return err;
1400 	}
1401 
1402 	return 0;
1403 }
1404 
1405 static int linker_append_elf_syms(struct bpf_linker *linker, struct src_obj *obj)
1406 {
1407 	struct src_sec *symtab = &obj->secs[obj->symtab_sec_idx];
1408 	Elf64_Sym *sym = symtab->data->d_buf;
1409 	int i, n = symtab->shdr->sh_size / symtab->shdr->sh_entsize, err;
1410 	int str_sec_idx = symtab->shdr->sh_link;
1411 	const char *sym_name;
1412 
1413 	obj->sym_map = calloc(n + 1, sizeof(*obj->sym_map));
1414 	if (!obj->sym_map)
1415 		return -ENOMEM;
1416 
1417 	for (i = 0; i < n; i++, sym++) {
1418 		/* We already validated all-zero symbol #0 and we already
1419 		 * appended it preventively to the final SYMTAB, so skip it.
1420 		 */
1421 		if (i == 0)
1422 			continue;
1423 
1424 		sym_name = elf_strptr(obj->elf, str_sec_idx, sym->st_name);
1425 		if (!sym_name) {
1426 			pr_warn("can't fetch symbol name for symbol #%d in '%s'\n", i, obj->filename);
1427 			return -EINVAL;
1428 		}
1429 
1430 		err = linker_append_elf_sym(linker, obj, sym, sym_name, i);
1431 		if (err)
1432 			return err;
1433 	}
1434 
1435 	return 0;
1436 }
1437 
1438 static Elf64_Sym *get_sym_by_idx(struct bpf_linker *linker, size_t sym_idx)
1439 {
1440 	struct dst_sec *symtab = &linker->secs[linker->symtab_sec_idx];
1441 	Elf64_Sym *syms = symtab->raw_data;
1442 
1443 	return &syms[sym_idx];
1444 }
1445 
1446 static struct glob_sym *find_glob_sym(struct bpf_linker *linker, const char *sym_name)
1447 {
1448 	struct glob_sym *glob_sym;
1449 	const char *name;
1450 	int i;
1451 
1452 	for (i = 0; i < linker->glob_sym_cnt; i++) {
1453 		glob_sym = &linker->glob_syms[i];
1454 		name = strset__data(linker->strtab_strs) + glob_sym->name_off;
1455 
1456 		if (strcmp(name, sym_name) == 0)
1457 			return glob_sym;
1458 	}
1459 
1460 	return NULL;
1461 }
1462 
1463 static struct glob_sym *add_glob_sym(struct bpf_linker *linker)
1464 {
1465 	struct glob_sym *syms, *sym;
1466 
1467 	syms = libbpf_reallocarray(linker->glob_syms, linker->glob_sym_cnt + 1,
1468 				   sizeof(*linker->glob_syms));
1469 	if (!syms)
1470 		return NULL;
1471 
1472 	sym = &syms[linker->glob_sym_cnt];
1473 	memset(sym, 0, sizeof(*sym));
1474 	sym->var_idx = -1;
1475 
1476 	linker->glob_syms = syms;
1477 	linker->glob_sym_cnt++;
1478 
1479 	return sym;
1480 }
1481 
1482 static bool glob_sym_btf_matches(const char *sym_name, bool exact,
1483 				 const struct btf *btf1, __u32 id1,
1484 				 const struct btf *btf2, __u32 id2)
1485 {
1486 	const struct btf_type *t1, *t2;
1487 	bool is_static1, is_static2;
1488 	const char *n1, *n2;
1489 	int i, n;
1490 
1491 recur:
1492 	n1 = n2 = NULL;
1493 	t1 = skip_mods_and_typedefs(btf1, id1, &id1);
1494 	t2 = skip_mods_and_typedefs(btf2, id2, &id2);
1495 
1496 	/* check if only one side is FWD, otherwise handle with common logic */
1497 	if (!exact && btf_is_fwd(t1) != btf_is_fwd(t2)) {
1498 		n1 = btf__str_by_offset(btf1, t1->name_off);
1499 		n2 = btf__str_by_offset(btf2, t2->name_off);
1500 		if (strcmp(n1, n2) != 0) {
1501 			pr_warn("global '%s': incompatible forward declaration names '%s' and '%s'\n",
1502 				sym_name, n1, n2);
1503 			return false;
1504 		}
1505 		/* validate if FWD kind matches concrete kind */
1506 		if (btf_is_fwd(t1)) {
1507 			if (btf_kflag(t1) && btf_is_union(t2))
1508 				return true;
1509 			if (!btf_kflag(t1) && btf_is_struct(t2))
1510 				return true;
1511 			pr_warn("global '%s': incompatible %s forward declaration and concrete kind %s\n",
1512 				sym_name, btf_kflag(t1) ? "union" : "struct", btf_kind_str(t2));
1513 		} else {
1514 			if (btf_kflag(t2) && btf_is_union(t1))
1515 				return true;
1516 			if (!btf_kflag(t2) && btf_is_struct(t1))
1517 				return true;
1518 			pr_warn("global '%s': incompatible %s forward declaration and concrete kind %s\n",
1519 				sym_name, btf_kflag(t2) ? "union" : "struct", btf_kind_str(t1));
1520 		}
1521 		return false;
1522 	}
1523 
1524 	if (btf_kind(t1) != btf_kind(t2)) {
1525 		pr_warn("global '%s': incompatible BTF kinds %s and %s\n",
1526 			sym_name, btf_kind_str(t1), btf_kind_str(t2));
1527 		return false;
1528 	}
1529 
1530 	switch (btf_kind(t1)) {
1531 	case BTF_KIND_STRUCT:
1532 	case BTF_KIND_UNION:
1533 	case BTF_KIND_ENUM:
1534 	case BTF_KIND_ENUM64:
1535 	case BTF_KIND_FWD:
1536 	case BTF_KIND_FUNC:
1537 	case BTF_KIND_VAR:
1538 		n1 = btf__str_by_offset(btf1, t1->name_off);
1539 		n2 = btf__str_by_offset(btf2, t2->name_off);
1540 		if (strcmp(n1, n2) != 0) {
1541 			pr_warn("global '%s': incompatible %s names '%s' and '%s'\n",
1542 				sym_name, btf_kind_str(t1), n1, n2);
1543 			return false;
1544 		}
1545 		break;
1546 	default:
1547 		break;
1548 	}
1549 
1550 	switch (btf_kind(t1)) {
1551 	case BTF_KIND_UNKN: /* void */
1552 	case BTF_KIND_FWD:
1553 		return true;
1554 	case BTF_KIND_INT:
1555 	case BTF_KIND_FLOAT:
1556 	case BTF_KIND_ENUM:
1557 	case BTF_KIND_ENUM64:
1558 		/* ignore encoding for int and enum values for enum */
1559 		if (t1->size != t2->size) {
1560 			pr_warn("global '%s': incompatible %s '%s' size %u and %u\n",
1561 				sym_name, btf_kind_str(t1), n1, t1->size, t2->size);
1562 			return false;
1563 		}
1564 		return true;
1565 	case BTF_KIND_PTR:
1566 		/* just validate overall shape of the referenced type, so no
1567 		 * contents comparison for struct/union, and allowed fwd vs
1568 		 * struct/union
1569 		 */
1570 		exact = false;
1571 		id1 = t1->type;
1572 		id2 = t2->type;
1573 		goto recur;
1574 	case BTF_KIND_ARRAY:
1575 		/* ignore index type and array size */
1576 		id1 = btf_array(t1)->type;
1577 		id2 = btf_array(t2)->type;
1578 		goto recur;
1579 	case BTF_KIND_FUNC:
1580 		/* extern and global linkages are compatible */
1581 		is_static1 = btf_func_linkage(t1) == BTF_FUNC_STATIC;
1582 		is_static2 = btf_func_linkage(t2) == BTF_FUNC_STATIC;
1583 		if (is_static1 != is_static2) {
1584 			pr_warn("global '%s': incompatible func '%s' linkage\n", sym_name, n1);
1585 			return false;
1586 		}
1587 
1588 		id1 = t1->type;
1589 		id2 = t2->type;
1590 		goto recur;
1591 	case BTF_KIND_VAR:
1592 		/* extern and global linkages are compatible */
1593 		is_static1 = btf_var(t1)->linkage == BTF_VAR_STATIC;
1594 		is_static2 = btf_var(t2)->linkage == BTF_VAR_STATIC;
1595 		if (is_static1 != is_static2) {
1596 			pr_warn("global '%s': incompatible var '%s' linkage\n", sym_name, n1);
1597 			return false;
1598 		}
1599 
1600 		id1 = t1->type;
1601 		id2 = t2->type;
1602 		goto recur;
1603 	case BTF_KIND_STRUCT:
1604 	case BTF_KIND_UNION: {
1605 		const struct btf_member *m1, *m2;
1606 
1607 		if (!exact)
1608 			return true;
1609 
1610 		if (btf_vlen(t1) != btf_vlen(t2)) {
1611 			pr_warn("global '%s': incompatible number of %s fields %u and %u\n",
1612 				sym_name, btf_kind_str(t1), btf_vlen(t1), btf_vlen(t2));
1613 			return false;
1614 		}
1615 
1616 		n = btf_vlen(t1);
1617 		m1 = btf_members(t1);
1618 		m2 = btf_members(t2);
1619 		for (i = 0; i < n; i++, m1++, m2++) {
1620 			n1 = btf__str_by_offset(btf1, m1->name_off);
1621 			n2 = btf__str_by_offset(btf2, m2->name_off);
1622 			if (strcmp(n1, n2) != 0) {
1623 				pr_warn("global '%s': incompatible field #%d names '%s' and '%s'\n",
1624 					sym_name, i, n1, n2);
1625 				return false;
1626 			}
1627 			if (m1->offset != m2->offset) {
1628 				pr_warn("global '%s': incompatible field #%d ('%s') offsets\n",
1629 					sym_name, i, n1);
1630 				return false;
1631 			}
1632 			if (!glob_sym_btf_matches(sym_name, exact, btf1, m1->type, btf2, m2->type))
1633 				return false;
1634 		}
1635 
1636 		return true;
1637 	}
1638 	case BTF_KIND_FUNC_PROTO: {
1639 		const struct btf_param *m1, *m2;
1640 
1641 		if (btf_vlen(t1) != btf_vlen(t2)) {
1642 			pr_warn("global '%s': incompatible number of %s params %u and %u\n",
1643 				sym_name, btf_kind_str(t1), btf_vlen(t1), btf_vlen(t2));
1644 			return false;
1645 		}
1646 
1647 		n = btf_vlen(t1);
1648 		m1 = btf_params(t1);
1649 		m2 = btf_params(t2);
1650 		for (i = 0; i < n; i++, m1++, m2++) {
1651 			/* ignore func arg names */
1652 			if (!glob_sym_btf_matches(sym_name, exact, btf1, m1->type, btf2, m2->type))
1653 				return false;
1654 		}
1655 
1656 		/* now check return type as well */
1657 		id1 = t1->type;
1658 		id2 = t2->type;
1659 		goto recur;
1660 	}
1661 
1662 	/* skip_mods_and_typedefs() make this impossible */
1663 	case BTF_KIND_TYPEDEF:
1664 	case BTF_KIND_VOLATILE:
1665 	case BTF_KIND_CONST:
1666 	case BTF_KIND_RESTRICT:
1667 	/* DATASECs are never compared with each other */
1668 	case BTF_KIND_DATASEC:
1669 	default:
1670 		pr_warn("global '%s': unsupported BTF kind %s\n",
1671 			sym_name, btf_kind_str(t1));
1672 		return false;
1673 	}
1674 }
1675 
1676 static bool map_defs_match(const char *sym_name,
1677 			   const struct btf *main_btf,
1678 			   const struct btf_map_def *main_def,
1679 			   const struct btf_map_def *main_inner_def,
1680 			   const struct btf *extra_btf,
1681 			   const struct btf_map_def *extra_def,
1682 			   const struct btf_map_def *extra_inner_def)
1683 {
1684 	const char *reason;
1685 
1686 	if (main_def->map_type != extra_def->map_type) {
1687 		reason = "type";
1688 		goto mismatch;
1689 	}
1690 
1691 	/* check key type/size match */
1692 	if (main_def->key_size != extra_def->key_size) {
1693 		reason = "key_size";
1694 		goto mismatch;
1695 	}
1696 	if (!!main_def->key_type_id != !!extra_def->key_type_id) {
1697 		reason = "key type";
1698 		goto mismatch;
1699 	}
1700 	if ((main_def->parts & MAP_DEF_KEY_TYPE)
1701 	     && !glob_sym_btf_matches(sym_name, true /*exact*/,
1702 				      main_btf, main_def->key_type_id,
1703 				      extra_btf, extra_def->key_type_id)) {
1704 		reason = "key type";
1705 		goto mismatch;
1706 	}
1707 
1708 	/* validate value type/size match */
1709 	if (main_def->value_size != extra_def->value_size) {
1710 		reason = "value_size";
1711 		goto mismatch;
1712 	}
1713 	if (!!main_def->value_type_id != !!extra_def->value_type_id) {
1714 		reason = "value type";
1715 		goto mismatch;
1716 	}
1717 	if ((main_def->parts & MAP_DEF_VALUE_TYPE)
1718 	     && !glob_sym_btf_matches(sym_name, true /*exact*/,
1719 				      main_btf, main_def->value_type_id,
1720 				      extra_btf, extra_def->value_type_id)) {
1721 		reason = "key type";
1722 		goto mismatch;
1723 	}
1724 
1725 	if (main_def->max_entries != extra_def->max_entries) {
1726 		reason = "max_entries";
1727 		goto mismatch;
1728 	}
1729 	if (main_def->map_flags != extra_def->map_flags) {
1730 		reason = "map_flags";
1731 		goto mismatch;
1732 	}
1733 	if (main_def->numa_node != extra_def->numa_node) {
1734 		reason = "numa_node";
1735 		goto mismatch;
1736 	}
1737 	if (main_def->pinning != extra_def->pinning) {
1738 		reason = "pinning";
1739 		goto mismatch;
1740 	}
1741 
1742 	if ((main_def->parts & MAP_DEF_INNER_MAP) != (extra_def->parts & MAP_DEF_INNER_MAP)) {
1743 		reason = "inner map";
1744 		goto mismatch;
1745 	}
1746 
1747 	if (main_def->parts & MAP_DEF_INNER_MAP) {
1748 		char inner_map_name[128];
1749 
1750 		snprintf(inner_map_name, sizeof(inner_map_name), "%s.inner", sym_name);
1751 
1752 		return map_defs_match(inner_map_name,
1753 				      main_btf, main_inner_def, NULL,
1754 				      extra_btf, extra_inner_def, NULL);
1755 	}
1756 
1757 	return true;
1758 
1759 mismatch:
1760 	pr_warn("global '%s': map %s mismatch\n", sym_name, reason);
1761 	return false;
1762 }
1763 
1764 static bool glob_map_defs_match(const char *sym_name,
1765 				struct bpf_linker *linker, struct glob_sym *glob_sym,
1766 				struct src_obj *obj, Elf64_Sym *sym, int btf_id)
1767 {
1768 	struct btf_map_def dst_def = {}, dst_inner_def = {};
1769 	struct btf_map_def src_def = {}, src_inner_def = {};
1770 	const struct btf_type *t;
1771 	int err;
1772 
1773 	t = btf__type_by_id(obj->btf, btf_id);
1774 	if (!btf_is_var(t)) {
1775 		pr_warn("global '%s': invalid map definition type [%d]\n", sym_name, btf_id);
1776 		return false;
1777 	}
1778 	t = skip_mods_and_typedefs(obj->btf, t->type, NULL);
1779 
1780 	err = parse_btf_map_def(sym_name, obj->btf, t, true /*strict*/, &src_def, &src_inner_def);
1781 	if (err) {
1782 		pr_warn("global '%s': invalid map definition\n", sym_name);
1783 		return false;
1784 	}
1785 
1786 	/* re-parse existing map definition */
1787 	t = btf__type_by_id(linker->btf, glob_sym->btf_id);
1788 	t = skip_mods_and_typedefs(linker->btf, t->type, NULL);
1789 	err = parse_btf_map_def(sym_name, linker->btf, t, true /*strict*/, &dst_def, &dst_inner_def);
1790 	if (err) {
1791 		/* this should not happen, because we already validated it */
1792 		pr_warn("global '%s': invalid dst map definition\n", sym_name);
1793 		return false;
1794 	}
1795 
1796 	/* Currently extern map definition has to be complete and match
1797 	 * concrete map definition exactly. This restriction might be lifted
1798 	 * in the future.
1799 	 */
1800 	return map_defs_match(sym_name, linker->btf, &dst_def, &dst_inner_def,
1801 			      obj->btf, &src_def, &src_inner_def);
1802 }
1803 
1804 static bool glob_syms_match(const char *sym_name,
1805 			    struct bpf_linker *linker, struct glob_sym *glob_sym,
1806 			    struct src_obj *obj, Elf64_Sym *sym, size_t sym_idx, int btf_id)
1807 {
1808 	const struct btf_type *src_t;
1809 
1810 	/* if we are dealing with externs, BTF types describing both global
1811 	 * and extern VARs/FUNCs should be completely present in all files
1812 	 */
1813 	if (!glob_sym->btf_id || !btf_id) {
1814 		pr_warn("BTF info is missing for global symbol '%s'\n", sym_name);
1815 		return false;
1816 	}
1817 
1818 	src_t = btf__type_by_id(obj->btf, btf_id);
1819 	if (!btf_is_var(src_t) && !btf_is_func(src_t)) {
1820 		pr_warn("only extern variables and functions are supported, but got '%s' for '%s'\n",
1821 			btf_kind_str(src_t), sym_name);
1822 		return false;
1823 	}
1824 
1825 	/* deal with .maps definitions specially */
1826 	if (glob_sym->sec_id && strcmp(linker->secs[glob_sym->sec_id].sec_name, MAPS_ELF_SEC) == 0)
1827 		return glob_map_defs_match(sym_name, linker, glob_sym, obj, sym, btf_id);
1828 
1829 	if (!glob_sym_btf_matches(sym_name, true /*exact*/,
1830 				  linker->btf, glob_sym->btf_id, obj->btf, btf_id))
1831 		return false;
1832 
1833 	return true;
1834 }
1835 
1836 static bool btf_is_non_static(const struct btf_type *t)
1837 {
1838 	return (btf_is_var(t) && btf_var(t)->linkage != BTF_VAR_STATIC)
1839 	       || (btf_is_func(t) && btf_func_linkage(t) != BTF_FUNC_STATIC);
1840 }
1841 
1842 static int find_glob_sym_btf(struct src_obj *obj, Elf64_Sym *sym, const char *sym_name,
1843 			     int *out_btf_sec_id, int *out_btf_id)
1844 {
1845 	int i, j, n, m, btf_id = 0;
1846 	const struct btf_type *t;
1847 	const struct btf_var_secinfo *vi;
1848 	const char *name;
1849 
1850 	if (!obj->btf) {
1851 		pr_warn("failed to find BTF info for object '%s'\n", obj->filename);
1852 		return -EINVAL;
1853 	}
1854 
1855 	n = btf__type_cnt(obj->btf);
1856 	for (i = 1; i < n; i++) {
1857 		t = btf__type_by_id(obj->btf, i);
1858 
1859 		/* some global and extern FUNCs and VARs might not be associated with any
1860 		 * DATASEC, so try to detect them in the same pass
1861 		 */
1862 		if (btf_is_non_static(t)) {
1863 			name = btf__str_by_offset(obj->btf, t->name_off);
1864 			if (strcmp(name, sym_name) != 0)
1865 				continue;
1866 
1867 			/* remember and still try to find DATASEC */
1868 			btf_id = i;
1869 			continue;
1870 		}
1871 
1872 		if (!btf_is_datasec(t))
1873 			continue;
1874 
1875 		vi = btf_var_secinfos(t);
1876 		for (j = 0, m = btf_vlen(t); j < m; j++, vi++) {
1877 			t = btf__type_by_id(obj->btf, vi->type);
1878 			name = btf__str_by_offset(obj->btf, t->name_off);
1879 
1880 			if (strcmp(name, sym_name) != 0)
1881 				continue;
1882 			if (btf_is_var(t) && btf_var(t)->linkage == BTF_VAR_STATIC)
1883 				continue;
1884 			if (btf_is_func(t) && btf_func_linkage(t) == BTF_FUNC_STATIC)
1885 				continue;
1886 
1887 			if (btf_id && btf_id != vi->type) {
1888 				pr_warn("global/extern '%s' BTF is ambiguous: both types #%d and #%u match\n",
1889 					sym_name, btf_id, vi->type);
1890 				return -EINVAL;
1891 			}
1892 
1893 			*out_btf_sec_id = i;
1894 			*out_btf_id = vi->type;
1895 
1896 			return 0;
1897 		}
1898 	}
1899 
1900 	/* free-floating extern or global FUNC */
1901 	if (btf_id) {
1902 		*out_btf_sec_id = 0;
1903 		*out_btf_id = btf_id;
1904 		return 0;
1905 	}
1906 
1907 	pr_warn("failed to find BTF info for global/extern symbol '%s'\n", sym_name);
1908 	return -ENOENT;
1909 }
1910 
1911 static struct src_sec *find_src_sec_by_name(struct src_obj *obj, const char *sec_name)
1912 {
1913 	struct src_sec *sec;
1914 	int i;
1915 
1916 	for (i = 1; i < obj->sec_cnt; i++) {
1917 		sec = &obj->secs[i];
1918 
1919 		if (strcmp(sec->sec_name, sec_name) == 0)
1920 			return sec;
1921 	}
1922 
1923 	return NULL;
1924 }
1925 
1926 static int complete_extern_btf_info(struct btf *dst_btf, int dst_id,
1927 				    struct btf *src_btf, int src_id)
1928 {
1929 	struct btf_type *dst_t = btf_type_by_id(dst_btf, dst_id);
1930 	struct btf_type *src_t = btf_type_by_id(src_btf, src_id);
1931 	struct btf_param *src_p, *dst_p;
1932 	const char *s;
1933 	int i, n, off;
1934 
1935 	/* We already made sure that source and destination types (FUNC or
1936 	 * VAR) match in terms of types and argument names.
1937 	 */
1938 	if (btf_is_var(dst_t)) {
1939 		btf_var(dst_t)->linkage = BTF_VAR_GLOBAL_ALLOCATED;
1940 		return 0;
1941 	}
1942 
1943 	dst_t->info = btf_type_info(BTF_KIND_FUNC, BTF_FUNC_GLOBAL, 0);
1944 
1945 	/* now onto FUNC_PROTO types */
1946 	src_t = btf_type_by_id(src_btf, src_t->type);
1947 	dst_t = btf_type_by_id(dst_btf, dst_t->type);
1948 
1949 	/* Fill in all the argument names, which for extern FUNCs are missing.
1950 	 * We'll end up with two copies of FUNCs/VARs for externs, but that
1951 	 * will be taken care of by BTF dedup at the very end.
1952 	 * It might be that BTF types for extern in one file has less/more BTF
1953 	 * information (e.g., FWD instead of full STRUCT/UNION information),
1954 	 * but that should be (in most cases, subject to BTF dedup rules)
1955 	 * handled and resolved by BTF dedup algorithm as well, so we won't
1956 	 * worry about it. Our only job is to make sure that argument names
1957 	 * are populated on both sides, otherwise BTF dedup will pedantically
1958 	 * consider them different.
1959 	 */
1960 	src_p = btf_params(src_t);
1961 	dst_p = btf_params(dst_t);
1962 	for (i = 0, n = btf_vlen(dst_t); i < n; i++, src_p++, dst_p++) {
1963 		if (!src_p->name_off)
1964 			continue;
1965 
1966 		/* src_btf has more complete info, so add name to dst_btf */
1967 		s = btf__str_by_offset(src_btf, src_p->name_off);
1968 		off = btf__add_str(dst_btf, s);
1969 		if (off < 0)
1970 			return off;
1971 		dst_p->name_off = off;
1972 	}
1973 	return 0;
1974 }
1975 
1976 static void sym_update_bind(Elf64_Sym *sym, int sym_bind)
1977 {
1978 	sym->st_info = ELF64_ST_INFO(sym_bind, ELF64_ST_TYPE(sym->st_info));
1979 }
1980 
1981 static void sym_update_type(Elf64_Sym *sym, int sym_type)
1982 {
1983 	sym->st_info = ELF64_ST_INFO(ELF64_ST_BIND(sym->st_info), sym_type);
1984 }
1985 
1986 static void sym_update_visibility(Elf64_Sym *sym, int sym_vis)
1987 {
1988 	/* libelf doesn't provide setters for ST_VISIBILITY,
1989 	 * but it is stored in the lower 2 bits of st_other
1990 	 */
1991 	sym->st_other &= ~0x03;
1992 	sym->st_other |= sym_vis;
1993 }
1994 
1995 static int linker_append_elf_sym(struct bpf_linker *linker, struct src_obj *obj,
1996 				 Elf64_Sym *sym, const char *sym_name, int src_sym_idx)
1997 {
1998 	struct src_sec *src_sec = NULL;
1999 	struct dst_sec *dst_sec = NULL;
2000 	struct glob_sym *glob_sym = NULL;
2001 	int name_off, sym_type, sym_bind, sym_vis, err;
2002 	int btf_sec_id = 0, btf_id = 0;
2003 	size_t dst_sym_idx;
2004 	Elf64_Sym *dst_sym;
2005 	bool sym_is_extern;
2006 
2007 	sym_type = ELF64_ST_TYPE(sym->st_info);
2008 	sym_bind = ELF64_ST_BIND(sym->st_info);
2009 	sym_vis = ELF64_ST_VISIBILITY(sym->st_other);
2010 	sym_is_extern = sym->st_shndx == SHN_UNDEF;
2011 
2012 	if (sym_is_extern) {
2013 		if (!obj->btf) {
2014 			pr_warn("externs without BTF info are not supported\n");
2015 			return -ENOTSUP;
2016 		}
2017 	} else if (sym->st_shndx < SHN_LORESERVE) {
2018 		src_sec = &obj->secs[sym->st_shndx];
2019 		if (src_sec->skipped)
2020 			return 0;
2021 		dst_sec = &linker->secs[src_sec->dst_id];
2022 
2023 		/* allow only one STT_SECTION symbol per section */
2024 		if (sym_type == STT_SECTION && dst_sec->sec_sym_idx) {
2025 			obj->sym_map[src_sym_idx] = dst_sec->sec_sym_idx;
2026 			return 0;
2027 		}
2028 	}
2029 
2030 	if (sym_bind == STB_LOCAL)
2031 		goto add_sym;
2032 
2033 	/* find matching BTF info */
2034 	err = find_glob_sym_btf(obj, sym, sym_name, &btf_sec_id, &btf_id);
2035 	if (err)
2036 		return err;
2037 
2038 	if (sym_is_extern && btf_sec_id) {
2039 		const char *sec_name = NULL;
2040 		const struct btf_type *t;
2041 
2042 		t = btf__type_by_id(obj->btf, btf_sec_id);
2043 		sec_name = btf__str_by_offset(obj->btf, t->name_off);
2044 
2045 		/* Clang puts unannotated extern vars into
2046 		 * '.extern' BTF DATASEC. Treat them the same
2047 		 * as unannotated extern funcs (which are
2048 		 * currently not put into any DATASECs).
2049 		 * Those don't have associated src_sec/dst_sec.
2050 		 */
2051 		if (strcmp(sec_name, BTF_EXTERN_SEC) != 0) {
2052 			src_sec = find_src_sec_by_name(obj, sec_name);
2053 			if (!src_sec) {
2054 				pr_warn("failed to find matching ELF sec '%s'\n", sec_name);
2055 				return -ENOENT;
2056 			}
2057 			dst_sec = &linker->secs[src_sec->dst_id];
2058 		}
2059 	}
2060 
2061 	glob_sym = find_glob_sym(linker, sym_name);
2062 	if (glob_sym) {
2063 		/* Preventively resolve to existing symbol. This is
2064 		 * needed for further relocation symbol remapping in
2065 		 * the next step of linking.
2066 		 */
2067 		obj->sym_map[src_sym_idx] = glob_sym->sym_idx;
2068 
2069 		/* If both symbols are non-externs, at least one of
2070 		 * them has to be STB_WEAK, otherwise they are in
2071 		 * a conflict with each other.
2072 		 */
2073 		if (!sym_is_extern && !glob_sym->is_extern
2074 		    && !glob_sym->is_weak && sym_bind != STB_WEAK) {
2075 			pr_warn("conflicting non-weak symbol #%d (%s) definition in '%s'\n",
2076 				src_sym_idx, sym_name, obj->filename);
2077 			return -EINVAL;
2078 		}
2079 
2080 		if (!glob_syms_match(sym_name, linker, glob_sym, obj, sym, src_sym_idx, btf_id))
2081 			return -EINVAL;
2082 
2083 		dst_sym = get_sym_by_idx(linker, glob_sym->sym_idx);
2084 
2085 		/* If new symbol is strong, then force dst_sym to be strong as
2086 		 * well; this way a mix of weak and non-weak extern
2087 		 * definitions will end up being strong.
2088 		 */
2089 		if (sym_bind == STB_GLOBAL) {
2090 			/* We still need to preserve type (NOTYPE or
2091 			 * OBJECT/FUNC, depending on whether the symbol is
2092 			 * extern or not)
2093 			 */
2094 			sym_update_bind(dst_sym, STB_GLOBAL);
2095 			glob_sym->is_weak = false;
2096 		}
2097 
2098 		/* Non-default visibility is "contaminating", with stricter
2099 		 * visibility overwriting more permissive ones, even if more
2100 		 * permissive visibility comes from just an extern definition.
2101 		 * Currently only STV_DEFAULT and STV_HIDDEN are allowed and
2102 		 * ensured by ELF symbol sanity checks above.
2103 		 */
2104 		if (sym_vis > ELF64_ST_VISIBILITY(dst_sym->st_other))
2105 			sym_update_visibility(dst_sym, sym_vis);
2106 
2107 		/* If the new symbol is extern, then regardless if
2108 		 * existing symbol is extern or resolved global, just
2109 		 * keep the existing one untouched.
2110 		 */
2111 		if (sym_is_extern)
2112 			return 0;
2113 
2114 		/* If existing symbol is a strong resolved symbol, bail out,
2115 		 * because we lost resolution battle have nothing to
2116 		 * contribute. We already checked above that there is no
2117 		 * strong-strong conflict. We also already tightened binding
2118 		 * and visibility, so nothing else to contribute at that point.
2119 		 */
2120 		if (!glob_sym->is_extern && sym_bind == STB_WEAK)
2121 			return 0;
2122 
2123 		/* At this point, new symbol is strong non-extern,
2124 		 * so overwrite glob_sym with new symbol information.
2125 		 * Preserve binding and visibility.
2126 		 */
2127 		sym_update_type(dst_sym, sym_type);
2128 		dst_sym->st_shndx = dst_sec->sec_idx;
2129 		dst_sym->st_value = src_sec->dst_off + sym->st_value;
2130 		dst_sym->st_size = sym->st_size;
2131 
2132 		/* see comment below about dst_sec->id vs dst_sec->sec_idx */
2133 		glob_sym->sec_id = dst_sec->id;
2134 		glob_sym->is_extern = false;
2135 
2136 		if (complete_extern_btf_info(linker->btf, glob_sym->btf_id,
2137 					     obj->btf, btf_id))
2138 			return -EINVAL;
2139 
2140 		/* request updating VAR's/FUNC's underlying BTF type when appending BTF type */
2141 		glob_sym->underlying_btf_id = 0;
2142 
2143 		obj->sym_map[src_sym_idx] = glob_sym->sym_idx;
2144 		return 0;
2145 	}
2146 
2147 add_sym:
2148 	name_off = strset__add_str(linker->strtab_strs, sym_name);
2149 	if (name_off < 0)
2150 		return name_off;
2151 
2152 	dst_sym = add_new_sym(linker, &dst_sym_idx);
2153 	if (!dst_sym)
2154 		return -ENOMEM;
2155 
2156 	dst_sym->st_name = name_off;
2157 	dst_sym->st_info = sym->st_info;
2158 	dst_sym->st_other = sym->st_other;
2159 	dst_sym->st_shndx = dst_sec ? dst_sec->sec_idx : sym->st_shndx;
2160 	dst_sym->st_value = (src_sec ? src_sec->dst_off : 0) + sym->st_value;
2161 	dst_sym->st_size = sym->st_size;
2162 
2163 	obj->sym_map[src_sym_idx] = dst_sym_idx;
2164 
2165 	if (sym_type == STT_SECTION && dst_sec) {
2166 		dst_sec->sec_sym_idx = dst_sym_idx;
2167 		dst_sym->st_value = 0;
2168 	}
2169 
2170 	if (sym_bind != STB_LOCAL) {
2171 		glob_sym = add_glob_sym(linker);
2172 		if (!glob_sym)
2173 			return -ENOMEM;
2174 
2175 		glob_sym->sym_idx = dst_sym_idx;
2176 		/* we use dst_sec->id (and not dst_sec->sec_idx), because
2177 		 * ephemeral sections (.kconfig, .ksyms, etc) don't have
2178 		 * sec_idx (as they don't have corresponding ELF section), but
2179 		 * still have id. .extern doesn't have even ephemeral section
2180 		 * associated with it, so dst_sec->id == dst_sec->sec_idx == 0.
2181 		 */
2182 		glob_sym->sec_id = dst_sec ? dst_sec->id : 0;
2183 		glob_sym->name_off = name_off;
2184 		/* we will fill btf_id in during BTF merging step */
2185 		glob_sym->btf_id = 0;
2186 		glob_sym->is_extern = sym_is_extern;
2187 		glob_sym->is_weak = sym_bind == STB_WEAK;
2188 	}
2189 
2190 	return 0;
2191 }
2192 
2193 static int linker_append_elf_relos(struct bpf_linker *linker, struct src_obj *obj)
2194 {
2195 	struct src_sec *src_symtab = &obj->secs[obj->symtab_sec_idx];
2196 	int i, err;
2197 
2198 	for (i = 1; i < obj->sec_cnt; i++) {
2199 		struct src_sec *src_sec, *src_linked_sec;
2200 		struct dst_sec *dst_sec, *dst_linked_sec;
2201 		Elf64_Rel *src_rel, *dst_rel;
2202 		int j, n;
2203 
2204 		src_sec = &obj->secs[i];
2205 		if (!is_relo_sec(src_sec))
2206 			continue;
2207 
2208 		/* shdr->sh_info points to relocatable section */
2209 		src_linked_sec = &obj->secs[src_sec->shdr->sh_info];
2210 		if (src_linked_sec->skipped)
2211 			continue;
2212 
2213 		dst_sec = find_dst_sec_by_name(linker, src_sec->sec_name);
2214 		if (!dst_sec) {
2215 			dst_sec = add_dst_sec(linker, src_sec->sec_name);
2216 			if (!dst_sec)
2217 				return -ENOMEM;
2218 			err = init_sec(linker, dst_sec, src_sec);
2219 			if (err) {
2220 				pr_warn("failed to init section '%s'\n", src_sec->sec_name);
2221 				return err;
2222 			}
2223 		} else if (!secs_match(dst_sec, src_sec)) {
2224 			pr_warn("sections %s are not compatible\n", src_sec->sec_name);
2225 			return -EINVAL;
2226 		}
2227 
2228 		/* shdr->sh_link points to SYMTAB */
2229 		dst_sec->shdr->sh_link = linker->symtab_sec_idx;
2230 
2231 		/* shdr->sh_info points to relocated section */
2232 		dst_linked_sec = &linker->secs[src_linked_sec->dst_id];
2233 		dst_sec->shdr->sh_info = dst_linked_sec->sec_idx;
2234 
2235 		src_sec->dst_id = dst_sec->id;
2236 		err = extend_sec(linker, dst_sec, src_sec);
2237 		if (err)
2238 			return err;
2239 
2240 		src_rel = src_sec->data->d_buf;
2241 		dst_rel = dst_sec->raw_data + src_sec->dst_off;
2242 		n = src_sec->shdr->sh_size / src_sec->shdr->sh_entsize;
2243 		for (j = 0; j < n; j++, src_rel++, dst_rel++) {
2244 			size_t src_sym_idx, dst_sym_idx, sym_type;
2245 			Elf64_Sym *src_sym;
2246 
2247 			src_sym_idx = ELF64_R_SYM(src_rel->r_info);
2248 			src_sym = src_symtab->data->d_buf + sizeof(*src_sym) * src_sym_idx;
2249 
2250 			dst_sym_idx = obj->sym_map[src_sym_idx];
2251 			dst_rel->r_offset += src_linked_sec->dst_off;
2252 			sym_type = ELF64_R_TYPE(src_rel->r_info);
2253 			dst_rel->r_info = ELF64_R_INFO(dst_sym_idx, sym_type);
2254 
2255 			if (ELF64_ST_TYPE(src_sym->st_info) == STT_SECTION) {
2256 				struct src_sec *sec = &obj->secs[src_sym->st_shndx];
2257 				struct bpf_insn *insn;
2258 
2259 				if (src_linked_sec->shdr->sh_flags & SHF_EXECINSTR) {
2260 					/* calls to the very first static function inside
2261 					 * .text section at offset 0 will
2262 					 * reference section symbol, not the
2263 					 * function symbol. Fix that up,
2264 					 * otherwise it won't be possible to
2265 					 * relocate calls to two different
2266 					 * static functions with the same name
2267 					 * (rom two different object files)
2268 					 */
2269 					insn = dst_linked_sec->raw_data + dst_rel->r_offset;
2270 					if (insn->code == (BPF_JMP | BPF_CALL))
2271 						insn->imm += sec->dst_off / sizeof(struct bpf_insn);
2272 					else
2273 						insn->imm += sec->dst_off;
2274 				} else {
2275 					pr_warn("relocation against STT_SECTION in non-exec section is not supported!\n");
2276 					return -EINVAL;
2277 				}
2278 			}
2279 
2280 		}
2281 	}
2282 
2283 	return 0;
2284 }
2285 
2286 static Elf64_Sym *find_sym_by_name(struct src_obj *obj, size_t sec_idx,
2287 				   int sym_type, const char *sym_name)
2288 {
2289 	struct src_sec *symtab = &obj->secs[obj->symtab_sec_idx];
2290 	Elf64_Sym *sym = symtab->data->d_buf;
2291 	int i, n = symtab->shdr->sh_size / symtab->shdr->sh_entsize;
2292 	int str_sec_idx = symtab->shdr->sh_link;
2293 	const char *name;
2294 
2295 	for (i = 0; i < n; i++, sym++) {
2296 		if (sym->st_shndx != sec_idx)
2297 			continue;
2298 		if (ELF64_ST_TYPE(sym->st_info) != sym_type)
2299 			continue;
2300 
2301 		name = elf_strptr(obj->elf, str_sec_idx, sym->st_name);
2302 		if (!name)
2303 			return NULL;
2304 
2305 		if (strcmp(sym_name, name) != 0)
2306 			continue;
2307 
2308 		return sym;
2309 	}
2310 
2311 	return NULL;
2312 }
2313 
2314 static int linker_fixup_btf(struct src_obj *obj)
2315 {
2316 	const char *sec_name;
2317 	struct src_sec *sec;
2318 	int i, j, n, m;
2319 
2320 	if (!obj->btf)
2321 		return 0;
2322 
2323 	n = btf__type_cnt(obj->btf);
2324 	for (i = 1; i < n; i++) {
2325 		struct btf_var_secinfo *vi;
2326 		struct btf_type *t;
2327 
2328 		t = btf_type_by_id(obj->btf, i);
2329 		if (btf_kind(t) != BTF_KIND_DATASEC)
2330 			continue;
2331 
2332 		sec_name = btf__str_by_offset(obj->btf, t->name_off);
2333 		sec = find_src_sec_by_name(obj, sec_name);
2334 		if (sec) {
2335 			/* record actual section size, unless ephemeral */
2336 			if (sec->shdr)
2337 				t->size = sec->shdr->sh_size;
2338 		} else {
2339 			/* BTF can have some sections that are not represented
2340 			 * in ELF, e.g., .kconfig, .ksyms, .extern, which are used
2341 			 * for special extern variables.
2342 			 *
2343 			 * For all but one such special (ephemeral)
2344 			 * sections, we pre-create "section shells" to be able
2345 			 * to keep track of extra per-section metadata later
2346 			 * (e.g., those BTF extern variables).
2347 			 *
2348 			 * .extern is even more special, though, because it
2349 			 * contains extern variables that need to be resolved
2350 			 * by static linker, not libbpf and kernel. When such
2351 			 * externs are resolved, we are going to remove them
2352 			 * from .extern BTF section and might end up not
2353 			 * needing it at all. Each resolved extern should have
2354 			 * matching non-extern VAR/FUNC in other sections.
2355 			 *
2356 			 * We do support leaving some of the externs
2357 			 * unresolved, though, to support cases of building
2358 			 * libraries, which will later be linked against final
2359 			 * BPF applications. So if at finalization we still
2360 			 * see unresolved externs, we'll create .extern
2361 			 * section on our own.
2362 			 */
2363 			if (strcmp(sec_name, BTF_EXTERN_SEC) == 0)
2364 				continue;
2365 
2366 			sec = add_src_sec(obj, sec_name);
2367 			if (!sec)
2368 				return -ENOMEM;
2369 
2370 			sec->ephemeral = true;
2371 			sec->sec_idx = 0; /* will match UNDEF shndx in ELF */
2372 		}
2373 
2374 		/* remember ELF section and its BTF type ID match */
2375 		sec->sec_type_id = i;
2376 
2377 		/* fix up variable offsets */
2378 		vi = btf_var_secinfos(t);
2379 		for (j = 0, m = btf_vlen(t); j < m; j++, vi++) {
2380 			const struct btf_type *vt = btf__type_by_id(obj->btf, vi->type);
2381 			const char *var_name;
2382 			int var_linkage;
2383 			Elf64_Sym *sym;
2384 
2385 			/* could be a variable or function */
2386 			if (!btf_is_var(vt))
2387 				continue;
2388 
2389 			var_name = btf__str_by_offset(obj->btf, vt->name_off);
2390 			var_linkage = btf_var(vt)->linkage;
2391 
2392 			/* no need to patch up static or extern vars */
2393 			if (var_linkage != BTF_VAR_GLOBAL_ALLOCATED)
2394 				continue;
2395 
2396 			sym = find_sym_by_name(obj, sec->sec_idx, STT_OBJECT, var_name);
2397 			if (!sym) {
2398 				pr_warn("failed to find symbol for variable '%s' in section '%s'\n", var_name, sec_name);
2399 				return -ENOENT;
2400 			}
2401 
2402 			vi->offset = sym->st_value;
2403 		}
2404 	}
2405 
2406 	return 0;
2407 }
2408 
2409 static int linker_append_btf(struct bpf_linker *linker, struct src_obj *obj)
2410 {
2411 	const struct btf_type *t;
2412 	int i, j, n, start_id, id, err;
2413 	const char *name;
2414 
2415 	if (!obj->btf)
2416 		return 0;
2417 
2418 	start_id = btf__type_cnt(linker->btf);
2419 	n = btf__type_cnt(obj->btf);
2420 
2421 	obj->btf_type_map = calloc(n + 1, sizeof(int));
2422 	if (!obj->btf_type_map)
2423 		return -ENOMEM;
2424 
2425 	for (i = 1; i < n; i++) {
2426 		struct glob_sym *glob_sym = NULL;
2427 
2428 		t = btf__type_by_id(obj->btf, i);
2429 
2430 		/* DATASECs are handled specially below */
2431 		if (btf_kind(t) == BTF_KIND_DATASEC)
2432 			continue;
2433 
2434 		if (btf_is_non_static(t)) {
2435 			/* there should be glob_sym already */
2436 			name = btf__str_by_offset(obj->btf, t->name_off);
2437 			glob_sym = find_glob_sym(linker, name);
2438 
2439 			/* VARs without corresponding glob_sym are those that
2440 			 * belong to skipped/deduplicated sections (i.e.,
2441 			 * license and version), so just skip them
2442 			 */
2443 			if (!glob_sym)
2444 				continue;
2445 
2446 			/* linker_append_elf_sym() might have requested
2447 			 * updating underlying type ID, if extern was resolved
2448 			 * to strong symbol or weak got upgraded to non-weak
2449 			 */
2450 			if (glob_sym->underlying_btf_id == 0)
2451 				glob_sym->underlying_btf_id = -t->type;
2452 
2453 			/* globals from previous object files that match our
2454 			 * VAR/FUNC already have a corresponding associated
2455 			 * BTF type, so just make sure to use it
2456 			 */
2457 			if (glob_sym->btf_id) {
2458 				/* reuse existing BTF type for global var/func */
2459 				obj->btf_type_map[i] = glob_sym->btf_id;
2460 				continue;
2461 			}
2462 		}
2463 
2464 		id = btf__add_type(linker->btf, obj->btf, t);
2465 		if (id < 0) {
2466 			pr_warn("failed to append BTF type #%d from file '%s'\n", i, obj->filename);
2467 			return id;
2468 		}
2469 
2470 		obj->btf_type_map[i] = id;
2471 
2472 		/* record just appended BTF type for var/func */
2473 		if (glob_sym) {
2474 			glob_sym->btf_id = id;
2475 			glob_sym->underlying_btf_id = -t->type;
2476 		}
2477 	}
2478 
2479 	/* remap all the types except DATASECs */
2480 	n = btf__type_cnt(linker->btf);
2481 	for (i = start_id; i < n; i++) {
2482 		struct btf_type *dst_t = btf_type_by_id(linker->btf, i);
2483 		struct btf_field_iter it;
2484 		__u32 *type_id;
2485 
2486 		err = btf_field_iter_init(&it, dst_t, BTF_FIELD_ITER_IDS);
2487 		if (err)
2488 			return err;
2489 
2490 		while ((type_id = btf_field_iter_next(&it))) {
2491 			int new_id = obj->btf_type_map[*type_id];
2492 
2493 			/* Error out if the type wasn't remapped. Ignore VOID which stays VOID. */
2494 			if (new_id == 0 && *type_id != 0) {
2495 				pr_warn("failed to find new ID mapping for original BTF type ID %u\n",
2496 					*type_id);
2497 				return -EINVAL;
2498 			}
2499 
2500 			*type_id = obj->btf_type_map[*type_id];
2501 		}
2502 	}
2503 
2504 	/* Rewrite VAR/FUNC underlying types (i.e., FUNC's FUNC_PROTO and VAR's
2505 	 * actual type), if necessary
2506 	 */
2507 	for (i = 0; i < linker->glob_sym_cnt; i++) {
2508 		struct glob_sym *glob_sym = &linker->glob_syms[i];
2509 		struct btf_type *glob_t;
2510 
2511 		if (glob_sym->underlying_btf_id >= 0)
2512 			continue;
2513 
2514 		glob_sym->underlying_btf_id = obj->btf_type_map[-glob_sym->underlying_btf_id];
2515 
2516 		glob_t = btf_type_by_id(linker->btf, glob_sym->btf_id);
2517 		glob_t->type = glob_sym->underlying_btf_id;
2518 	}
2519 
2520 	/* append DATASEC info */
2521 	for (i = 1; i < obj->sec_cnt; i++) {
2522 		struct src_sec *src_sec;
2523 		struct dst_sec *dst_sec;
2524 		const struct btf_var_secinfo *src_var;
2525 		struct btf_var_secinfo *dst_var;
2526 
2527 		src_sec = &obj->secs[i];
2528 		if (!src_sec->sec_type_id || src_sec->skipped)
2529 			continue;
2530 		dst_sec = &linker->secs[src_sec->dst_id];
2531 
2532 		/* Mark section as having BTF regardless of the presence of
2533 		 * variables. In some cases compiler might generate empty BTF
2534 		 * with no variables information. E.g., when promoting local
2535 		 * array/structure variable initial values and BPF object
2536 		 * file otherwise has no read-only static variables in
2537 		 * .rodata. We need to preserve such empty BTF and just set
2538 		 * correct section size.
2539 		 */
2540 		dst_sec->has_btf = true;
2541 
2542 		t = btf__type_by_id(obj->btf, src_sec->sec_type_id);
2543 		src_var = btf_var_secinfos(t);
2544 		n = btf_vlen(t);
2545 		for (j = 0; j < n; j++, src_var++) {
2546 			void *sec_vars = dst_sec->sec_vars;
2547 			int new_id = obj->btf_type_map[src_var->type];
2548 			struct glob_sym *glob_sym = NULL;
2549 
2550 			t = btf_type_by_id(linker->btf, new_id);
2551 			if (btf_is_non_static(t)) {
2552 				name = btf__str_by_offset(linker->btf, t->name_off);
2553 				glob_sym = find_glob_sym(linker, name);
2554 				if (glob_sym->sec_id != dst_sec->id) {
2555 					pr_warn("global '%s': section mismatch %d vs %d\n",
2556 						name, glob_sym->sec_id, dst_sec->id);
2557 					return -EINVAL;
2558 				}
2559 			}
2560 
2561 			/* If there is already a member (VAR or FUNC) mapped
2562 			 * to the same type, don't add a duplicate entry.
2563 			 * This will happen when multiple object files define
2564 			 * the same extern VARs/FUNCs.
2565 			 */
2566 			if (glob_sym && glob_sym->var_idx >= 0) {
2567 				__s64 sz;
2568 
2569 				/* FUNCs don't have size, nothing to update */
2570 				if (btf_is_func(t))
2571 					continue;
2572 
2573 				dst_var = &dst_sec->sec_vars[glob_sym->var_idx];
2574 				/* Because underlying BTF type might have
2575 				 * changed, so might its size have changed, so
2576 				 * re-calculate and update it in sec_var.
2577 				 */
2578 				sz = btf__resolve_size(linker->btf, glob_sym->underlying_btf_id);
2579 				if (sz < 0) {
2580 					pr_warn("global '%s': failed to resolve size of underlying type: %d\n",
2581 						name, (int)sz);
2582 					return -EINVAL;
2583 				}
2584 				dst_var->size = sz;
2585 				continue;
2586 			}
2587 
2588 			sec_vars = libbpf_reallocarray(sec_vars,
2589 						       dst_sec->sec_var_cnt + 1,
2590 						       sizeof(*dst_sec->sec_vars));
2591 			if (!sec_vars)
2592 				return -ENOMEM;
2593 
2594 			dst_sec->sec_vars = sec_vars;
2595 			dst_sec->sec_var_cnt++;
2596 
2597 			dst_var = &dst_sec->sec_vars[dst_sec->sec_var_cnt - 1];
2598 			dst_var->type = obj->btf_type_map[src_var->type];
2599 			dst_var->size = src_var->size;
2600 			dst_var->offset = src_sec->dst_off + src_var->offset;
2601 
2602 			if (glob_sym)
2603 				glob_sym->var_idx = dst_sec->sec_var_cnt - 1;
2604 		}
2605 	}
2606 
2607 	return 0;
2608 }
2609 
2610 static void *add_btf_ext_rec(struct btf_ext_sec_data *ext_data, const void *src_rec)
2611 {
2612 	void *tmp;
2613 
2614 	tmp = libbpf_reallocarray(ext_data->recs, ext_data->rec_cnt + 1, ext_data->rec_sz);
2615 	if (!tmp)
2616 		return NULL;
2617 	ext_data->recs = tmp;
2618 
2619 	tmp += ext_data->rec_cnt * ext_data->rec_sz;
2620 	memcpy(tmp, src_rec, ext_data->rec_sz);
2621 
2622 	ext_data->rec_cnt++;
2623 
2624 	return tmp;
2625 }
2626 
2627 static int linker_append_btf_ext(struct bpf_linker *linker, struct src_obj *obj)
2628 {
2629 	const struct btf_ext_info_sec *ext_sec;
2630 	const char *sec_name, *s;
2631 	struct src_sec *src_sec;
2632 	struct dst_sec *dst_sec;
2633 	int rec_sz, str_off, i;
2634 
2635 	if (!obj->btf_ext)
2636 		return 0;
2637 
2638 	rec_sz = obj->btf_ext->func_info.rec_size;
2639 	for_each_btf_ext_sec(&obj->btf_ext->func_info, ext_sec) {
2640 		struct bpf_func_info_min *src_rec, *dst_rec;
2641 
2642 		sec_name = btf__name_by_offset(obj->btf, ext_sec->sec_name_off);
2643 		src_sec = find_src_sec_by_name(obj, sec_name);
2644 		if (!src_sec) {
2645 			pr_warn("can't find section '%s' referenced from .BTF.ext\n", sec_name);
2646 			return -EINVAL;
2647 		}
2648 		dst_sec = &linker->secs[src_sec->dst_id];
2649 
2650 		if (dst_sec->func_info.rec_sz == 0)
2651 			dst_sec->func_info.rec_sz = rec_sz;
2652 		if (dst_sec->func_info.rec_sz != rec_sz) {
2653 			pr_warn("incompatible .BTF.ext record sizes for section '%s'\n", sec_name);
2654 			return -EINVAL;
2655 		}
2656 
2657 		for_each_btf_ext_rec(&obj->btf_ext->func_info, ext_sec, i, src_rec) {
2658 			dst_rec = add_btf_ext_rec(&dst_sec->func_info, src_rec);
2659 			if (!dst_rec)
2660 				return -ENOMEM;
2661 
2662 			dst_rec->insn_off += src_sec->dst_off;
2663 			dst_rec->type_id = obj->btf_type_map[dst_rec->type_id];
2664 		}
2665 	}
2666 
2667 	rec_sz = obj->btf_ext->line_info.rec_size;
2668 	for_each_btf_ext_sec(&obj->btf_ext->line_info, ext_sec) {
2669 		struct bpf_line_info_min *src_rec, *dst_rec;
2670 
2671 		sec_name = btf__name_by_offset(obj->btf, ext_sec->sec_name_off);
2672 		src_sec = find_src_sec_by_name(obj, sec_name);
2673 		if (!src_sec) {
2674 			pr_warn("can't find section '%s' referenced from .BTF.ext\n", sec_name);
2675 			return -EINVAL;
2676 		}
2677 		dst_sec = &linker->secs[src_sec->dst_id];
2678 
2679 		if (dst_sec->line_info.rec_sz == 0)
2680 			dst_sec->line_info.rec_sz = rec_sz;
2681 		if (dst_sec->line_info.rec_sz != rec_sz) {
2682 			pr_warn("incompatible .BTF.ext record sizes for section '%s'\n", sec_name);
2683 			return -EINVAL;
2684 		}
2685 
2686 		for_each_btf_ext_rec(&obj->btf_ext->line_info, ext_sec, i, src_rec) {
2687 			dst_rec = add_btf_ext_rec(&dst_sec->line_info, src_rec);
2688 			if (!dst_rec)
2689 				return -ENOMEM;
2690 
2691 			dst_rec->insn_off += src_sec->dst_off;
2692 
2693 			s = btf__str_by_offset(obj->btf, src_rec->file_name_off);
2694 			str_off = btf__add_str(linker->btf, s);
2695 			if (str_off < 0)
2696 				return -ENOMEM;
2697 			dst_rec->file_name_off = str_off;
2698 
2699 			s = btf__str_by_offset(obj->btf, src_rec->line_off);
2700 			str_off = btf__add_str(linker->btf, s);
2701 			if (str_off < 0)
2702 				return -ENOMEM;
2703 			dst_rec->line_off = str_off;
2704 
2705 			/* dst_rec->line_col is fine */
2706 		}
2707 	}
2708 
2709 	rec_sz = obj->btf_ext->core_relo_info.rec_size;
2710 	for_each_btf_ext_sec(&obj->btf_ext->core_relo_info, ext_sec) {
2711 		struct bpf_core_relo *src_rec, *dst_rec;
2712 
2713 		sec_name = btf__name_by_offset(obj->btf, ext_sec->sec_name_off);
2714 		src_sec = find_src_sec_by_name(obj, sec_name);
2715 		if (!src_sec) {
2716 			pr_warn("can't find section '%s' referenced from .BTF.ext\n", sec_name);
2717 			return -EINVAL;
2718 		}
2719 		dst_sec = &linker->secs[src_sec->dst_id];
2720 
2721 		if (dst_sec->core_relo_info.rec_sz == 0)
2722 			dst_sec->core_relo_info.rec_sz = rec_sz;
2723 		if (dst_sec->core_relo_info.rec_sz != rec_sz) {
2724 			pr_warn("incompatible .BTF.ext record sizes for section '%s'\n", sec_name);
2725 			return -EINVAL;
2726 		}
2727 
2728 		for_each_btf_ext_rec(&obj->btf_ext->core_relo_info, ext_sec, i, src_rec) {
2729 			dst_rec = add_btf_ext_rec(&dst_sec->core_relo_info, src_rec);
2730 			if (!dst_rec)
2731 				return -ENOMEM;
2732 
2733 			dst_rec->insn_off += src_sec->dst_off;
2734 			dst_rec->type_id = obj->btf_type_map[dst_rec->type_id];
2735 
2736 			s = btf__str_by_offset(obj->btf, src_rec->access_str_off);
2737 			str_off = btf__add_str(linker->btf, s);
2738 			if (str_off < 0)
2739 				return -ENOMEM;
2740 			dst_rec->access_str_off = str_off;
2741 
2742 			/* dst_rec->kind is fine */
2743 		}
2744 	}
2745 
2746 	return 0;
2747 }
2748 
2749 int bpf_linker__finalize(struct bpf_linker *linker)
2750 {
2751 	struct dst_sec *sec;
2752 	size_t strs_sz;
2753 	const void *strs;
2754 	int err, i;
2755 
2756 	if (!linker->elf)
2757 		return libbpf_err(-EINVAL);
2758 
2759 	err = finalize_btf(linker);
2760 	if (err)
2761 		return libbpf_err(err);
2762 
2763 	/* Finalize strings */
2764 	strs_sz = strset__data_size(linker->strtab_strs);
2765 	strs = strset__data(linker->strtab_strs);
2766 
2767 	sec = &linker->secs[linker->strtab_sec_idx];
2768 	sec->data->d_align = 1;
2769 	sec->data->d_off = 0LL;
2770 	sec->data->d_buf = (void *)strs;
2771 	sec->data->d_type = ELF_T_BYTE;
2772 	sec->data->d_size = strs_sz;
2773 	sec->shdr->sh_size = strs_sz;
2774 
2775 	for (i = 1; i < linker->sec_cnt; i++) {
2776 		sec = &linker->secs[i];
2777 
2778 		/* STRTAB is handled specially above */
2779 		if (sec->sec_idx == linker->strtab_sec_idx)
2780 			continue;
2781 
2782 		/* special ephemeral sections (.ksyms, .kconfig, etc) */
2783 		if (!sec->scn)
2784 			continue;
2785 
2786 		/* restore sections with bpf insns to target byte-order */
2787 		if (linker->swapped_endian && is_exec_sec(sec))
2788 			exec_sec_bswap(sec->raw_data, sec->sec_sz);
2789 
2790 		sec->data->d_buf = sec->raw_data;
2791 	}
2792 
2793 	/* Finalize ELF layout */
2794 	if (elf_update(linker->elf, ELF_C_NULL) < 0) {
2795 		err = -EINVAL;
2796 		pr_warn_elf("failed to finalize ELF layout");
2797 		return libbpf_err(err);
2798 	}
2799 
2800 	/* Write out final ELF contents */
2801 	if (elf_update(linker->elf, ELF_C_WRITE) < 0) {
2802 		err = -EINVAL;
2803 		pr_warn_elf("failed to write ELF contents");
2804 		return libbpf_err(err);
2805 	}
2806 
2807 	elf_end(linker->elf);
2808 	linker->elf = NULL;
2809 
2810 	if (linker->fd_is_owned)
2811 		close(linker->fd);
2812 	linker->fd = -1;
2813 
2814 	return 0;
2815 }
2816 
2817 static int emit_elf_data_sec(struct bpf_linker *linker, const char *sec_name,
2818 			     size_t align, const void *raw_data, size_t raw_sz)
2819 {
2820 	Elf_Scn *scn;
2821 	Elf_Data *data;
2822 	Elf64_Shdr *shdr;
2823 	int name_off;
2824 
2825 	name_off = strset__add_str(linker->strtab_strs, sec_name);
2826 	if (name_off < 0)
2827 		return name_off;
2828 
2829 	scn = elf_newscn(linker->elf);
2830 	if (!scn)
2831 		return -ENOMEM;
2832 	data = elf_newdata(scn);
2833 	if (!data)
2834 		return -ENOMEM;
2835 	shdr = elf64_getshdr(scn);
2836 	if (!shdr)
2837 		return -EINVAL;
2838 
2839 	shdr->sh_name = name_off;
2840 	shdr->sh_type = SHT_PROGBITS;
2841 	shdr->sh_flags = 0;
2842 	shdr->sh_size = raw_sz;
2843 	shdr->sh_link = 0;
2844 	shdr->sh_info = 0;
2845 	shdr->sh_addralign = align;
2846 	shdr->sh_entsize = 0;
2847 
2848 	data->d_type = ELF_T_BYTE;
2849 	data->d_size = raw_sz;
2850 	data->d_buf = (void *)raw_data;
2851 	data->d_align = align;
2852 	data->d_off = 0;
2853 
2854 	return 0;
2855 }
2856 
2857 static int finalize_btf(struct bpf_linker *linker)
2858 {
2859 	enum btf_endianness link_endianness;
2860 	LIBBPF_OPTS(btf_dedup_opts, opts);
2861 	struct btf *btf = linker->btf;
2862 	const void *raw_data;
2863 	int i, j, id, err;
2864 	__u32 raw_sz;
2865 
2866 	/* bail out if no BTF data was produced */
2867 	if (btf__type_cnt(linker->btf) == 1)
2868 		return 0;
2869 
2870 	for (i = 1; i < linker->sec_cnt; i++) {
2871 		struct dst_sec *sec = &linker->secs[i];
2872 
2873 		if (!sec->has_btf)
2874 			continue;
2875 
2876 		id = btf__add_datasec(btf, sec->sec_name, sec->sec_sz);
2877 		if (id < 0) {
2878 			pr_warn("failed to add consolidated BTF type for datasec '%s': %d\n",
2879 				sec->sec_name, id);
2880 			return id;
2881 		}
2882 
2883 		for (j = 0; j < sec->sec_var_cnt; j++) {
2884 			struct btf_var_secinfo *vi = &sec->sec_vars[j];
2885 
2886 			if (btf__add_datasec_var_info(btf, vi->type, vi->offset, vi->size))
2887 				return -EINVAL;
2888 		}
2889 	}
2890 
2891 	err = finalize_btf_ext(linker);
2892 	if (err) {
2893 		pr_warn(".BTF.ext generation failed: %s\n", errstr(err));
2894 		return err;
2895 	}
2896 
2897 	opts.btf_ext = linker->btf_ext;
2898 	err = btf__dedup(linker->btf, &opts);
2899 	if (err) {
2900 		pr_warn("BTF dedup failed: %s\n", errstr(err));
2901 		return err;
2902 	}
2903 
2904 	/* Set .BTF and .BTF.ext output byte order */
2905 	link_endianness = linker->elf_hdr->e_ident[EI_DATA] == ELFDATA2MSB ?
2906 			  BTF_BIG_ENDIAN : BTF_LITTLE_ENDIAN;
2907 	btf__set_endianness(linker->btf, link_endianness);
2908 	if (linker->btf_ext)
2909 		btf_ext__set_endianness(linker->btf_ext, link_endianness);
2910 
2911 	/* Emit .BTF section */
2912 	raw_data = btf__raw_data(linker->btf, &raw_sz);
2913 	if (!raw_data)
2914 		return -ENOMEM;
2915 
2916 	err = emit_elf_data_sec(linker, BTF_ELF_SEC, 8, raw_data, raw_sz);
2917 	if (err) {
2918 		pr_warn("failed to write out .BTF ELF section: %s\n", errstr(err));
2919 		return err;
2920 	}
2921 
2922 	/* Emit .BTF.ext section */
2923 	if (linker->btf_ext) {
2924 		raw_data = btf_ext__raw_data(linker->btf_ext, &raw_sz);
2925 		if (!raw_data)
2926 			return -ENOMEM;
2927 
2928 		err = emit_elf_data_sec(linker, BTF_EXT_ELF_SEC, 8, raw_data, raw_sz);
2929 		if (err) {
2930 			pr_warn("failed to write out .BTF.ext ELF section: %s\n", errstr(err));
2931 			return err;
2932 		}
2933 	}
2934 
2935 	return 0;
2936 }
2937 
2938 static int emit_btf_ext_data(struct bpf_linker *linker, void *output,
2939 			     const char *sec_name, struct btf_ext_sec_data *sec_data)
2940 {
2941 	struct btf_ext_info_sec *sec_info;
2942 	void *cur = output;
2943 	int str_off;
2944 	size_t sz;
2945 
2946 	if (!sec_data->rec_cnt)
2947 		return 0;
2948 
2949 	str_off = btf__add_str(linker->btf, sec_name);
2950 	if (str_off < 0)
2951 		return -ENOMEM;
2952 
2953 	sec_info = cur;
2954 	sec_info->sec_name_off = str_off;
2955 	sec_info->num_info = sec_data->rec_cnt;
2956 	cur += sizeof(struct btf_ext_info_sec);
2957 
2958 	sz = sec_data->rec_cnt * sec_data->rec_sz;
2959 	memcpy(cur, sec_data->recs, sz);
2960 	cur += sz;
2961 
2962 	return cur - output;
2963 }
2964 
2965 static int finalize_btf_ext(struct bpf_linker *linker)
2966 {
2967 	size_t funcs_sz = 0, lines_sz = 0, core_relos_sz = 0, total_sz = 0;
2968 	size_t func_rec_sz = 0, line_rec_sz = 0, core_relo_rec_sz = 0;
2969 	struct btf_ext_header *hdr;
2970 	void *data, *cur;
2971 	int i, err, sz;
2972 
2973 	/* validate that all sections have the same .BTF.ext record sizes
2974 	 * and calculate total data size for each type of data (func info,
2975 	 * line info, core relos)
2976 	 */
2977 	for (i = 1; i < linker->sec_cnt; i++) {
2978 		struct dst_sec *sec = &linker->secs[i];
2979 
2980 		if (sec->func_info.rec_cnt) {
2981 			if (func_rec_sz == 0)
2982 				func_rec_sz = sec->func_info.rec_sz;
2983 			if (func_rec_sz != sec->func_info.rec_sz) {
2984 				pr_warn("mismatch in func_info record size %zu != %u\n",
2985 					func_rec_sz, sec->func_info.rec_sz);
2986 				return -EINVAL;
2987 			}
2988 
2989 			funcs_sz += sizeof(struct btf_ext_info_sec) + func_rec_sz * sec->func_info.rec_cnt;
2990 		}
2991 		if (sec->line_info.rec_cnt) {
2992 			if (line_rec_sz == 0)
2993 				line_rec_sz = sec->line_info.rec_sz;
2994 			if (line_rec_sz != sec->line_info.rec_sz) {
2995 				pr_warn("mismatch in line_info record size %zu != %u\n",
2996 					line_rec_sz, sec->line_info.rec_sz);
2997 				return -EINVAL;
2998 			}
2999 
3000 			lines_sz += sizeof(struct btf_ext_info_sec) + line_rec_sz * sec->line_info.rec_cnt;
3001 		}
3002 		if (sec->core_relo_info.rec_cnt) {
3003 			if (core_relo_rec_sz == 0)
3004 				core_relo_rec_sz = sec->core_relo_info.rec_sz;
3005 			if (core_relo_rec_sz != sec->core_relo_info.rec_sz) {
3006 				pr_warn("mismatch in core_relo_info record size %zu != %u\n",
3007 					core_relo_rec_sz, sec->core_relo_info.rec_sz);
3008 				return -EINVAL;
3009 			}
3010 
3011 			core_relos_sz += sizeof(struct btf_ext_info_sec) + core_relo_rec_sz * sec->core_relo_info.rec_cnt;
3012 		}
3013 	}
3014 
3015 	if (!funcs_sz && !lines_sz && !core_relos_sz)
3016 		return 0;
3017 
3018 	total_sz += sizeof(struct btf_ext_header);
3019 	if (funcs_sz) {
3020 		funcs_sz += sizeof(__u32); /* record size prefix */
3021 		total_sz += funcs_sz;
3022 	}
3023 	if (lines_sz) {
3024 		lines_sz += sizeof(__u32); /* record size prefix */
3025 		total_sz += lines_sz;
3026 	}
3027 	if (core_relos_sz) {
3028 		core_relos_sz += sizeof(__u32); /* record size prefix */
3029 		total_sz += core_relos_sz;
3030 	}
3031 
3032 	cur = data = calloc(1, total_sz);
3033 	if (!data)
3034 		return -ENOMEM;
3035 
3036 	hdr = cur;
3037 	hdr->magic = BTF_MAGIC;
3038 	hdr->version = BTF_VERSION;
3039 	hdr->flags = 0;
3040 	hdr->hdr_len = sizeof(struct btf_ext_header);
3041 	cur += sizeof(struct btf_ext_header);
3042 
3043 	/* All offsets are in bytes relative to the end of this header */
3044 	hdr->func_info_off = 0;
3045 	hdr->func_info_len = funcs_sz;
3046 	hdr->line_info_off = funcs_sz;
3047 	hdr->line_info_len = lines_sz;
3048 	hdr->core_relo_off = funcs_sz + lines_sz;
3049 	hdr->core_relo_len = core_relos_sz;
3050 
3051 	if (funcs_sz) {
3052 		*(__u32 *)cur = func_rec_sz;
3053 		cur += sizeof(__u32);
3054 
3055 		for (i = 1; i < linker->sec_cnt; i++) {
3056 			struct dst_sec *sec = &linker->secs[i];
3057 
3058 			sz = emit_btf_ext_data(linker, cur, sec->sec_name, &sec->func_info);
3059 			if (sz < 0) {
3060 				err = sz;
3061 				goto out;
3062 			}
3063 
3064 			cur += sz;
3065 		}
3066 	}
3067 
3068 	if (lines_sz) {
3069 		*(__u32 *)cur = line_rec_sz;
3070 		cur += sizeof(__u32);
3071 
3072 		for (i = 1; i < linker->sec_cnt; i++) {
3073 			struct dst_sec *sec = &linker->secs[i];
3074 
3075 			sz = emit_btf_ext_data(linker, cur, sec->sec_name, &sec->line_info);
3076 			if (sz < 0) {
3077 				err = sz;
3078 				goto out;
3079 			}
3080 
3081 			cur += sz;
3082 		}
3083 	}
3084 
3085 	if (core_relos_sz) {
3086 		*(__u32 *)cur = core_relo_rec_sz;
3087 		cur += sizeof(__u32);
3088 
3089 		for (i = 1; i < linker->sec_cnt; i++) {
3090 			struct dst_sec *sec = &linker->secs[i];
3091 
3092 			sz = emit_btf_ext_data(linker, cur, sec->sec_name, &sec->core_relo_info);
3093 			if (sz < 0) {
3094 				err = sz;
3095 				goto out;
3096 			}
3097 
3098 			cur += sz;
3099 		}
3100 	}
3101 
3102 	linker->btf_ext = btf_ext__new(data, total_sz);
3103 	err = libbpf_get_error(linker->btf_ext);
3104 	if (err) {
3105 		linker->btf_ext = NULL;
3106 		pr_warn("failed to parse final .BTF.ext data: %s\n", errstr(err));
3107 		goto out;
3108 	}
3109 
3110 out:
3111 	free(data);
3112 	return err;
3113 }
3114