cachepc-linux

Fork of AMDESE/linux with modifications for CachePC side-channel attack
git clone https://git.sinitax.com/sinitax/cachepc-linux
Log | Files | Refs | README | LICENSE | sfeed.txt

linker.c (77172B)


      1// SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause)
      2/*
      3 * BPF static linker
      4 *
      5 * Copyright (c) 2021 Facebook
      6 */
      7#include <stdbool.h>
      8#include <stddef.h>
      9#include <stdio.h>
     10#include <stdlib.h>
     11#include <string.h>
     12#include <unistd.h>
     13#include <errno.h>
     14#include <linux/err.h>
     15#include <linux/btf.h>
     16#include <elf.h>
     17#include <libelf.h>
     18#include <fcntl.h>
     19#include "libbpf.h"
     20#include "btf.h"
     21#include "libbpf_internal.h"
     22#include "strset.h"
     23
     24#define BTF_EXTERN_SEC ".extern"
     25
     26struct src_sec {
     27	const char *sec_name;
     28	/* positional (not necessarily ELF) index in an array of sections */
     29	int id;
     30	/* positional (not necessarily ELF) index of a matching section in a final object file */
     31	int dst_id;
     32	/* section data offset in a matching output section */
     33	int dst_off;
     34	/* whether section is omitted from the final ELF file */
     35	bool skipped;
     36	/* whether section is an ephemeral section, not mapped to an ELF section */
     37	bool ephemeral;
     38
     39	/* ELF info */
     40	size_t sec_idx;
     41	Elf_Scn *scn;
     42	Elf64_Shdr *shdr;
     43	Elf_Data *data;
     44
     45	/* corresponding BTF DATASEC type ID */
     46	int sec_type_id;
     47};
     48
     49struct src_obj {
     50	const char *filename;
     51	int fd;
     52	Elf *elf;
     53	/* Section header strings section index */
     54	size_t shstrs_sec_idx;
     55	/* SYMTAB section index */
     56	size_t symtab_sec_idx;
     57
     58	struct btf *btf;
     59	struct btf_ext *btf_ext;
     60
     61	/* List of sections (including ephemeral). Slot zero is unused. */
     62	struct src_sec *secs;
     63	int sec_cnt;
     64
     65	/* mapping of symbol indices from src to dst ELF */
     66	int *sym_map;
     67	/* mapping from the src BTF type IDs to dst ones */
     68	int *btf_type_map;
     69};
     70
     71/* single .BTF.ext data section */
     72struct btf_ext_sec_data {
     73	size_t rec_cnt;
     74	__u32 rec_sz;
     75	void *recs;
     76};
     77
     78struct glob_sym {
     79	/* ELF symbol index */
     80	int sym_idx;
     81	/* associated section id for .ksyms, .kconfig, etc, but not .extern */
     82	int sec_id;
     83	/* extern name offset in STRTAB */
     84	int name_off;
     85	/* optional associated BTF type ID */
     86	int btf_id;
     87	/* BTF type ID to which VAR/FUNC type is pointing to; used for
     88	 * rewriting types when extern VAR/FUNC is resolved to a concrete
     89	 * definition
     90	 */
     91	int underlying_btf_id;
     92	/* sec_var index in the corresponding dst_sec, if exists */
     93	int var_idx;
     94
     95	/* extern or resolved/global symbol */
     96	bool is_extern;
     97	/* weak or strong symbol, never goes back from strong to weak */
     98	bool is_weak;
     99};
    100
    101struct dst_sec {
    102	char *sec_name;
    103	/* positional (not necessarily ELF) index in an array of sections */
    104	int id;
    105
    106	bool ephemeral;
    107
    108	/* ELF info */
    109	size_t sec_idx;
    110	Elf_Scn *scn;
    111	Elf64_Shdr *shdr;
    112	Elf_Data *data;
    113
    114	/* final output section size */
    115	int sec_sz;
    116	/* final output contents of the section */
    117	void *raw_data;
    118
    119	/* corresponding STT_SECTION symbol index in SYMTAB */
    120	int sec_sym_idx;
    121
    122	/* section's DATASEC variable info, emitted on BTF finalization */
    123	bool has_btf;
    124	int sec_var_cnt;
    125	struct btf_var_secinfo *sec_vars;
    126
    127	/* section's .BTF.ext data */
    128	struct btf_ext_sec_data func_info;
    129	struct btf_ext_sec_data line_info;
    130	struct btf_ext_sec_data core_relo_info;
    131};
    132
    133struct bpf_linker {
    134	char *filename;
    135	int fd;
    136	Elf *elf;
    137	Elf64_Ehdr *elf_hdr;
    138
    139	/* Output sections metadata */
    140	struct dst_sec *secs;
    141	int sec_cnt;
    142
    143	struct strset *strtab_strs; /* STRTAB unique strings */
    144	size_t strtab_sec_idx; /* STRTAB section index */
    145	size_t symtab_sec_idx; /* SYMTAB section index */
    146
    147	struct btf *btf;
    148	struct btf_ext *btf_ext;
    149
    150	/* global (including extern) ELF symbols */
    151	int glob_sym_cnt;
    152	struct glob_sym *glob_syms;
    153};
    154
    155#define pr_warn_elf(fmt, ...)									\
    156	libbpf_print(LIBBPF_WARN, "libbpf: " fmt ": %s\n", ##__VA_ARGS__, elf_errmsg(-1))
    157
    158static int init_output_elf(struct bpf_linker *linker, const char *file);
    159
    160static int linker_load_obj_file(struct bpf_linker *linker, const char *filename,
    161				const struct bpf_linker_file_opts *opts,
    162				struct src_obj *obj);
    163static int linker_sanity_check_elf(struct src_obj *obj);
    164static int linker_sanity_check_elf_symtab(struct src_obj *obj, struct src_sec *sec);
    165static int linker_sanity_check_elf_relos(struct src_obj *obj, struct src_sec *sec);
    166static int linker_sanity_check_btf(struct src_obj *obj);
    167static int linker_sanity_check_btf_ext(struct src_obj *obj);
    168static int linker_fixup_btf(struct src_obj *obj);
    169static int linker_append_sec_data(struct bpf_linker *linker, struct src_obj *obj);
    170static int linker_append_elf_syms(struct bpf_linker *linker, struct src_obj *obj);
    171static int linker_append_elf_sym(struct bpf_linker *linker, struct src_obj *obj,
    172				 Elf64_Sym *sym, const char *sym_name, int src_sym_idx);
    173static int linker_append_elf_relos(struct bpf_linker *linker, struct src_obj *obj);
    174static int linker_append_btf(struct bpf_linker *linker, struct src_obj *obj);
    175static int linker_append_btf_ext(struct bpf_linker *linker, struct src_obj *obj);
    176
    177static int finalize_btf(struct bpf_linker *linker);
    178static int finalize_btf_ext(struct bpf_linker *linker);
    179
    180void bpf_linker__free(struct bpf_linker *linker)
    181{
    182	int i;
    183
    184	if (!linker)
    185		return;
    186
    187	free(linker->filename);
    188
    189	if (linker->elf)
    190		elf_end(linker->elf);
    191
    192	if (linker->fd >= 0)
    193		close(linker->fd);
    194
    195	strset__free(linker->strtab_strs);
    196
    197	btf__free(linker->btf);
    198	btf_ext__free(linker->btf_ext);
    199
    200	for (i = 1; i < linker->sec_cnt; i++) {
    201		struct dst_sec *sec = &linker->secs[i];
    202
    203		free(sec->sec_name);
    204		free(sec->raw_data);
    205		free(sec->sec_vars);
    206
    207		free(sec->func_info.recs);
    208		free(sec->line_info.recs);
    209		free(sec->core_relo_info.recs);
    210	}
    211	free(linker->secs);
    212
    213	free(linker->glob_syms);
    214	free(linker);
    215}
    216
    217struct bpf_linker *bpf_linker__new(const char *filename, struct bpf_linker_opts *opts)
    218{
    219	struct bpf_linker *linker;
    220	int err;
    221
    222	if (!OPTS_VALID(opts, bpf_linker_opts))
    223		return errno = EINVAL, NULL;
    224
    225	if (elf_version(EV_CURRENT) == EV_NONE) {
    226		pr_warn_elf("libelf initialization failed");
    227		return errno = EINVAL, NULL;
    228	}
    229
    230	linker = calloc(1, sizeof(*linker));
    231	if (!linker)
    232		return errno = ENOMEM, NULL;
    233
    234	linker->fd = -1;
    235
    236	err = init_output_elf(linker, filename);
    237	if (err)
    238		goto err_out;
    239
    240	return linker;
    241
    242err_out:
    243	bpf_linker__free(linker);
    244	return errno = -err, NULL;
    245}
    246
    247static struct dst_sec *add_dst_sec(struct bpf_linker *linker, const char *sec_name)
    248{
    249	struct dst_sec *secs = linker->secs, *sec;
    250	size_t new_cnt = linker->sec_cnt ? linker->sec_cnt + 1 : 2;
    251
    252	secs = libbpf_reallocarray(secs, new_cnt, sizeof(*secs));
    253	if (!secs)
    254		return NULL;
    255
    256	/* zero out newly allocated memory */
    257	memset(secs + linker->sec_cnt, 0, (new_cnt - linker->sec_cnt) * sizeof(*secs));
    258
    259	linker->secs = secs;
    260	linker->sec_cnt = new_cnt;
    261
    262	sec = &linker->secs[new_cnt - 1];
    263	sec->id = new_cnt - 1;
    264	sec->sec_name = strdup(sec_name);
    265	if (!sec->sec_name)
    266		return NULL;
    267
    268	return sec;
    269}
    270
    271static Elf64_Sym *add_new_sym(struct bpf_linker *linker, size_t *sym_idx)
    272{
    273	struct dst_sec *symtab = &linker->secs[linker->symtab_sec_idx];
    274	Elf64_Sym *syms, *sym;
    275	size_t sym_cnt = symtab->sec_sz / sizeof(*sym);
    276
    277	syms = libbpf_reallocarray(symtab->raw_data, sym_cnt + 1, sizeof(*sym));
    278	if (!syms)
    279		return NULL;
    280
    281	sym = &syms[sym_cnt];
    282	memset(sym, 0, sizeof(*sym));
    283
    284	symtab->raw_data = syms;
    285	symtab->sec_sz += sizeof(*sym);
    286	symtab->shdr->sh_size += sizeof(*sym);
    287	symtab->data->d_size += sizeof(*sym);
    288
    289	if (sym_idx)
    290		*sym_idx = sym_cnt;
    291
    292	return sym;
    293}
    294
    295static int init_output_elf(struct bpf_linker *linker, const char *file)
    296{
    297	int err, str_off;
    298	Elf64_Sym *init_sym;
    299	struct dst_sec *sec;
    300
    301	linker->filename = strdup(file);
    302	if (!linker->filename)
    303		return -ENOMEM;
    304
    305	linker->fd = open(file, O_WRONLY | O_CREAT | O_TRUNC | O_CLOEXEC, 0644);
    306	if (linker->fd < 0) {
    307		err = -errno;
    308		pr_warn("failed to create '%s': %d\n", file, err);
    309		return err;
    310	}
    311
    312	linker->elf = elf_begin(linker->fd, ELF_C_WRITE, NULL);
    313	if (!linker->elf) {
    314		pr_warn_elf("failed to create ELF object");
    315		return -EINVAL;
    316	}
    317
    318	/* ELF header */
    319	linker->elf_hdr = elf64_newehdr(linker->elf);
    320	if (!linker->elf_hdr) {
    321		pr_warn_elf("failed to create ELF header");
    322		return -EINVAL;
    323	}
    324
    325	linker->elf_hdr->e_machine = EM_BPF;
    326	linker->elf_hdr->e_type = ET_REL;
    327#if __BYTE_ORDER__ == __ORDER_LITTLE_ENDIAN__
    328	linker->elf_hdr->e_ident[EI_DATA] = ELFDATA2LSB;
    329#elif __BYTE_ORDER__ == __ORDER_BIG_ENDIAN__
    330	linker->elf_hdr->e_ident[EI_DATA] = ELFDATA2MSB;
    331#else
    332#error "Unknown __BYTE_ORDER__"
    333#endif
    334
    335	/* STRTAB */
    336	/* initialize strset with an empty string to conform to ELF */
    337	linker->strtab_strs = strset__new(INT_MAX, "", sizeof(""));
    338	if (libbpf_get_error(linker->strtab_strs))
    339		return libbpf_get_error(linker->strtab_strs);
    340
    341	sec = add_dst_sec(linker, ".strtab");
    342	if (!sec)
    343		return -ENOMEM;
    344
    345	sec->scn = elf_newscn(linker->elf);
    346	if (!sec->scn) {
    347		pr_warn_elf("failed to create STRTAB section");
    348		return -EINVAL;
    349	}
    350
    351	sec->shdr = elf64_getshdr(sec->scn);
    352	if (!sec->shdr)
    353		return -EINVAL;
    354
    355	sec->data = elf_newdata(sec->scn);
    356	if (!sec->data) {
    357		pr_warn_elf("failed to create STRTAB data");
    358		return -EINVAL;
    359	}
    360
    361	str_off = strset__add_str(linker->strtab_strs, sec->sec_name);
    362	if (str_off < 0)
    363		return str_off;
    364
    365	sec->sec_idx = elf_ndxscn(sec->scn);
    366	linker->elf_hdr->e_shstrndx = sec->sec_idx;
    367	linker->strtab_sec_idx = sec->sec_idx;
    368
    369	sec->shdr->sh_name = str_off;
    370	sec->shdr->sh_type = SHT_STRTAB;
    371	sec->shdr->sh_flags = SHF_STRINGS;
    372	sec->shdr->sh_offset = 0;
    373	sec->shdr->sh_link = 0;
    374	sec->shdr->sh_info = 0;
    375	sec->shdr->sh_addralign = 1;
    376	sec->shdr->sh_size = sec->sec_sz = 0;
    377	sec->shdr->sh_entsize = 0;
    378
    379	/* SYMTAB */
    380	sec = add_dst_sec(linker, ".symtab");
    381	if (!sec)
    382		return -ENOMEM;
    383
    384	sec->scn = elf_newscn(linker->elf);
    385	if (!sec->scn) {
    386		pr_warn_elf("failed to create SYMTAB section");
    387		return -EINVAL;
    388	}
    389
    390	sec->shdr = elf64_getshdr(sec->scn);
    391	if (!sec->shdr)
    392		return -EINVAL;
    393
    394	sec->data = elf_newdata(sec->scn);
    395	if (!sec->data) {
    396		pr_warn_elf("failed to create SYMTAB data");
    397		return -EINVAL;
    398	}
    399
    400	str_off = strset__add_str(linker->strtab_strs, sec->sec_name);
    401	if (str_off < 0)
    402		return str_off;
    403
    404	sec->sec_idx = elf_ndxscn(sec->scn);
    405	linker->symtab_sec_idx = sec->sec_idx;
    406
    407	sec->shdr->sh_name = str_off;
    408	sec->shdr->sh_type = SHT_SYMTAB;
    409	sec->shdr->sh_flags = 0;
    410	sec->shdr->sh_offset = 0;
    411	sec->shdr->sh_link = linker->strtab_sec_idx;
    412	/* sh_info should be one greater than the index of the last local
    413	 * symbol (i.e., binding is STB_LOCAL). But why and who cares?
    414	 */
    415	sec->shdr->sh_info = 0;
    416	sec->shdr->sh_addralign = 8;
    417	sec->shdr->sh_entsize = sizeof(Elf64_Sym);
    418
    419	/* .BTF */
    420	linker->btf = btf__new_empty();
    421	err = libbpf_get_error(linker->btf);
    422	if (err)
    423		return err;
    424
    425	/* add the special all-zero symbol */
    426	init_sym = add_new_sym(linker, NULL);
    427	if (!init_sym)
    428		return -EINVAL;
    429
    430	init_sym->st_name = 0;
    431	init_sym->st_info = 0;
    432	init_sym->st_other = 0;
    433	init_sym->st_shndx = SHN_UNDEF;
    434	init_sym->st_value = 0;
    435	init_sym->st_size = 0;
    436
    437	return 0;
    438}
    439
    440int bpf_linker__add_file(struct bpf_linker *linker, const char *filename,
    441			 const struct bpf_linker_file_opts *opts)
    442{
    443	struct src_obj obj = {};
    444	int err = 0;
    445
    446	if (!OPTS_VALID(opts, bpf_linker_file_opts))
    447		return libbpf_err(-EINVAL);
    448
    449	if (!linker->elf)
    450		return libbpf_err(-EINVAL);
    451
    452	err = err ?: linker_load_obj_file(linker, filename, opts, &obj);
    453	err = err ?: linker_append_sec_data(linker, &obj);
    454	err = err ?: linker_append_elf_syms(linker, &obj);
    455	err = err ?: linker_append_elf_relos(linker, &obj);
    456	err = err ?: linker_append_btf(linker, &obj);
    457	err = err ?: linker_append_btf_ext(linker, &obj);
    458
    459	/* free up src_obj resources */
    460	free(obj.btf_type_map);
    461	btf__free(obj.btf);
    462	btf_ext__free(obj.btf_ext);
    463	free(obj.secs);
    464	free(obj.sym_map);
    465	if (obj.elf)
    466		elf_end(obj.elf);
    467	if (obj.fd >= 0)
    468		close(obj.fd);
    469
    470	return libbpf_err(err);
    471}
    472
    473static bool is_dwarf_sec_name(const char *name)
    474{
    475	/* approximation, but the actual list is too long */
    476	return strncmp(name, ".debug_", sizeof(".debug_") - 1) == 0;
    477}
    478
    479static bool is_ignored_sec(struct src_sec *sec)
    480{
    481	Elf64_Shdr *shdr = sec->shdr;
    482	const char *name = sec->sec_name;
    483
    484	/* no special handling of .strtab */
    485	if (shdr->sh_type == SHT_STRTAB)
    486		return true;
    487
    488	/* ignore .llvm_addrsig section as well */
    489	if (shdr->sh_type == SHT_LLVM_ADDRSIG)
    490		return true;
    491
    492	/* no subprograms will lead to an empty .text section, ignore it */
    493	if (shdr->sh_type == SHT_PROGBITS && shdr->sh_size == 0 &&
    494	    strcmp(sec->sec_name, ".text") == 0)
    495		return true;
    496
    497	/* DWARF sections */
    498	if (is_dwarf_sec_name(sec->sec_name))
    499		return true;
    500
    501	if (strncmp(name, ".rel", sizeof(".rel") - 1) == 0) {
    502		name += sizeof(".rel") - 1;
    503		/* DWARF section relocations */
    504		if (is_dwarf_sec_name(name))
    505			return true;
    506
    507		/* .BTF and .BTF.ext don't need relocations */
    508		if (strcmp(name, BTF_ELF_SEC) == 0 ||
    509		    strcmp(name, BTF_EXT_ELF_SEC) == 0)
    510			return true;
    511	}
    512
    513	return false;
    514}
    515
    516static struct src_sec *add_src_sec(struct src_obj *obj, const char *sec_name)
    517{
    518	struct src_sec *secs = obj->secs, *sec;
    519	size_t new_cnt = obj->sec_cnt ? obj->sec_cnt + 1 : 2;
    520
    521	secs = libbpf_reallocarray(secs, new_cnt, sizeof(*secs));
    522	if (!secs)
    523		return NULL;
    524
    525	/* zero out newly allocated memory */
    526	memset(secs + obj->sec_cnt, 0, (new_cnt - obj->sec_cnt) * sizeof(*secs));
    527
    528	obj->secs = secs;
    529	obj->sec_cnt = new_cnt;
    530
    531	sec = &obj->secs[new_cnt - 1];
    532	sec->id = new_cnt - 1;
    533	sec->sec_name = sec_name;
    534
    535	return sec;
    536}
    537
    538static int linker_load_obj_file(struct bpf_linker *linker, const char *filename,
    539				const struct bpf_linker_file_opts *opts,
    540				struct src_obj *obj)
    541{
    542#if __BYTE_ORDER__ == __ORDER_LITTLE_ENDIAN__
    543	const int host_endianness = ELFDATA2LSB;
    544#elif __BYTE_ORDER__ == __ORDER_BIG_ENDIAN__
    545	const int host_endianness = ELFDATA2MSB;
    546#else
    547#error "Unknown __BYTE_ORDER__"
    548#endif
    549	int err = 0;
    550	Elf_Scn *scn;
    551	Elf_Data *data;
    552	Elf64_Ehdr *ehdr;
    553	Elf64_Shdr *shdr;
    554	struct src_sec *sec;
    555
    556	pr_debug("linker: adding object file '%s'...\n", filename);
    557
    558	obj->filename = filename;
    559
    560	obj->fd = open(filename, O_RDONLY | O_CLOEXEC);
    561	if (obj->fd < 0) {
    562		err = -errno;
    563		pr_warn("failed to open file '%s': %d\n", filename, err);
    564		return err;
    565	}
    566	obj->elf = elf_begin(obj->fd, ELF_C_READ_MMAP, NULL);
    567	if (!obj->elf) {
    568		err = -errno;
    569		pr_warn_elf("failed to parse ELF file '%s'", filename);
    570		return err;
    571	}
    572
    573	/* Sanity check ELF file high-level properties */
    574	ehdr = elf64_getehdr(obj->elf);
    575	if (!ehdr) {
    576		err = -errno;
    577		pr_warn_elf("failed to get ELF header for %s", filename);
    578		return err;
    579	}
    580	if (ehdr->e_ident[EI_DATA] != host_endianness) {
    581		err = -EOPNOTSUPP;
    582		pr_warn_elf("unsupported byte order of ELF file %s", filename);
    583		return err;
    584	}
    585	if (ehdr->e_type != ET_REL
    586	    || ehdr->e_machine != EM_BPF
    587	    || ehdr->e_ident[EI_CLASS] != ELFCLASS64) {
    588		err = -EOPNOTSUPP;
    589		pr_warn_elf("unsupported kind of ELF file %s", filename);
    590		return err;
    591	}
    592
    593	if (elf_getshdrstrndx(obj->elf, &obj->shstrs_sec_idx)) {
    594		err = -errno;
    595		pr_warn_elf("failed to get SHSTRTAB section index for %s", filename);
    596		return err;
    597	}
    598
    599	scn = NULL;
    600	while ((scn = elf_nextscn(obj->elf, scn)) != NULL) {
    601		size_t sec_idx = elf_ndxscn(scn);
    602		const char *sec_name;
    603
    604		shdr = elf64_getshdr(scn);
    605		if (!shdr) {
    606			err = -errno;
    607			pr_warn_elf("failed to get section #%zu header for %s",
    608				    sec_idx, filename);
    609			return err;
    610		}
    611
    612		sec_name = elf_strptr(obj->elf, obj->shstrs_sec_idx, shdr->sh_name);
    613		if (!sec_name) {
    614			err = -errno;
    615			pr_warn_elf("failed to get section #%zu name for %s",
    616				    sec_idx, filename);
    617			return err;
    618		}
    619
    620		data = elf_getdata(scn, 0);
    621		if (!data) {
    622			err = -errno;
    623			pr_warn_elf("failed to get section #%zu (%s) data from %s",
    624				    sec_idx, sec_name, filename);
    625			return err;
    626		}
    627
    628		sec = add_src_sec(obj, sec_name);
    629		if (!sec)
    630			return -ENOMEM;
    631
    632		sec->scn = scn;
    633		sec->shdr = shdr;
    634		sec->data = data;
    635		sec->sec_idx = elf_ndxscn(scn);
    636
    637		if (is_ignored_sec(sec)) {
    638			sec->skipped = true;
    639			continue;
    640		}
    641
    642		switch (shdr->sh_type) {
    643		case SHT_SYMTAB:
    644			if (obj->symtab_sec_idx) {
    645				err = -EOPNOTSUPP;
    646				pr_warn("multiple SYMTAB sections found, not supported\n");
    647				return err;
    648			}
    649			obj->symtab_sec_idx = sec_idx;
    650			break;
    651		case SHT_STRTAB:
    652			/* we'll construct our own string table */
    653			break;
    654		case SHT_PROGBITS:
    655			if (strcmp(sec_name, BTF_ELF_SEC) == 0) {
    656				obj->btf = btf__new(data->d_buf, shdr->sh_size);
    657				err = libbpf_get_error(obj->btf);
    658				if (err) {
    659					pr_warn("failed to parse .BTF from %s: %d\n", filename, err);
    660					return err;
    661				}
    662				sec->skipped = true;
    663				continue;
    664			}
    665			if (strcmp(sec_name, BTF_EXT_ELF_SEC) == 0) {
    666				obj->btf_ext = btf_ext__new(data->d_buf, shdr->sh_size);
    667				err = libbpf_get_error(obj->btf_ext);
    668				if (err) {
    669					pr_warn("failed to parse .BTF.ext from '%s': %d\n", filename, err);
    670					return err;
    671				}
    672				sec->skipped = true;
    673				continue;
    674			}
    675
    676			/* data & code */
    677			break;
    678		case SHT_NOBITS:
    679			/* BSS */
    680			break;
    681		case SHT_REL:
    682			/* relocations */
    683			break;
    684		default:
    685			pr_warn("unrecognized section #%zu (%s) in %s\n",
    686				sec_idx, sec_name, filename);
    687			err = -EINVAL;
    688			return err;
    689		}
    690	}
    691
    692	err = err ?: linker_sanity_check_elf(obj);
    693	err = err ?: linker_sanity_check_btf(obj);
    694	err = err ?: linker_sanity_check_btf_ext(obj);
    695	err = err ?: linker_fixup_btf(obj);
    696
    697	return err;
    698}
    699
    700static bool is_pow_of_2(size_t x)
    701{
    702	return x && (x & (x - 1)) == 0;
    703}
    704
    705static int linker_sanity_check_elf(struct src_obj *obj)
    706{
    707	struct src_sec *sec;
    708	int i, err;
    709
    710	if (!obj->symtab_sec_idx) {
    711		pr_warn("ELF is missing SYMTAB section in %s\n", obj->filename);
    712		return -EINVAL;
    713	}
    714	if (!obj->shstrs_sec_idx) {
    715		pr_warn("ELF is missing section headers STRTAB section in %s\n", obj->filename);
    716		return -EINVAL;
    717	}
    718
    719	for (i = 1; i < obj->sec_cnt; i++) {
    720		sec = &obj->secs[i];
    721
    722		if (sec->sec_name[0] == '\0') {
    723			pr_warn("ELF section #%zu has empty name in %s\n", sec->sec_idx, obj->filename);
    724			return -EINVAL;
    725		}
    726
    727		if (sec->shdr->sh_addralign && !is_pow_of_2(sec->shdr->sh_addralign))
    728			return -EINVAL;
    729		if (sec->shdr->sh_addralign != sec->data->d_align)
    730			return -EINVAL;
    731
    732		if (sec->shdr->sh_size != sec->data->d_size)
    733			return -EINVAL;
    734
    735		switch (sec->shdr->sh_type) {
    736		case SHT_SYMTAB:
    737			err = linker_sanity_check_elf_symtab(obj, sec);
    738			if (err)
    739				return err;
    740			break;
    741		case SHT_STRTAB:
    742			break;
    743		case SHT_PROGBITS:
    744			if (sec->shdr->sh_flags & SHF_EXECINSTR) {
    745				if (sec->shdr->sh_size % sizeof(struct bpf_insn) != 0)
    746					return -EINVAL;
    747			}
    748			break;
    749		case SHT_NOBITS:
    750			break;
    751		case SHT_REL:
    752			err = linker_sanity_check_elf_relos(obj, sec);
    753			if (err)
    754				return err;
    755			break;
    756		case SHT_LLVM_ADDRSIG:
    757			break;
    758		default:
    759			pr_warn("ELF section #%zu (%s) has unrecognized type %zu in %s\n",
    760				sec->sec_idx, sec->sec_name, (size_t)sec->shdr->sh_type, obj->filename);
    761			return -EINVAL;
    762		}
    763	}
    764
    765	return 0;
    766}
    767
    768static int linker_sanity_check_elf_symtab(struct src_obj *obj, struct src_sec *sec)
    769{
    770	struct src_sec *link_sec;
    771	Elf64_Sym *sym;
    772	int i, n;
    773
    774	if (sec->shdr->sh_entsize != sizeof(Elf64_Sym))
    775		return -EINVAL;
    776	if (sec->shdr->sh_size % sec->shdr->sh_entsize != 0)
    777		return -EINVAL;
    778
    779	if (!sec->shdr->sh_link || sec->shdr->sh_link >= obj->sec_cnt) {
    780		pr_warn("ELF SYMTAB section #%zu points to missing STRTAB section #%zu in %s\n",
    781			sec->sec_idx, (size_t)sec->shdr->sh_link, obj->filename);
    782		return -EINVAL;
    783	}
    784	link_sec = &obj->secs[sec->shdr->sh_link];
    785	if (link_sec->shdr->sh_type != SHT_STRTAB) {
    786		pr_warn("ELF SYMTAB section #%zu points to invalid STRTAB section #%zu in %s\n",
    787			sec->sec_idx, (size_t)sec->shdr->sh_link, obj->filename);
    788		return -EINVAL;
    789	}
    790
    791	n = sec->shdr->sh_size / sec->shdr->sh_entsize;
    792	sym = sec->data->d_buf;
    793	for (i = 0; i < n; i++, sym++) {
    794		int sym_type = ELF64_ST_TYPE(sym->st_info);
    795		int sym_bind = ELF64_ST_BIND(sym->st_info);
    796		int sym_vis = ELF64_ST_VISIBILITY(sym->st_other);
    797
    798		if (i == 0) {
    799			if (sym->st_name != 0 || sym->st_info != 0
    800			    || sym->st_other != 0 || sym->st_shndx != 0
    801			    || sym->st_value != 0 || sym->st_size != 0) {
    802				pr_warn("ELF sym #0 is invalid in %s\n", obj->filename);
    803				return -EINVAL;
    804			}
    805			continue;
    806		}
    807		if (sym_bind != STB_LOCAL && sym_bind != STB_GLOBAL && sym_bind != STB_WEAK) {
    808			pr_warn("ELF sym #%d in section #%zu has unsupported symbol binding %d\n",
    809				i, sec->sec_idx, sym_bind);
    810			return -EINVAL;
    811		}
    812		if (sym_vis != STV_DEFAULT && sym_vis != STV_HIDDEN) {
    813			pr_warn("ELF sym #%d in section #%zu has unsupported symbol visibility %d\n",
    814				i, sec->sec_idx, sym_vis);
    815			return -EINVAL;
    816		}
    817		if (sym->st_shndx == 0) {
    818			if (sym_type != STT_NOTYPE || sym_bind == STB_LOCAL
    819			    || sym->st_value != 0 || sym->st_size != 0) {
    820				pr_warn("ELF sym #%d is invalid extern symbol in %s\n",
    821					i, obj->filename);
    822
    823				return -EINVAL;
    824			}
    825			continue;
    826		}
    827		if (sym->st_shndx < SHN_LORESERVE && sym->st_shndx >= obj->sec_cnt) {
    828			pr_warn("ELF sym #%d in section #%zu points to missing section #%zu in %s\n",
    829				i, sec->sec_idx, (size_t)sym->st_shndx, obj->filename);
    830			return -EINVAL;
    831		}
    832		if (sym_type == STT_SECTION) {
    833			if (sym->st_value != 0)
    834				return -EINVAL;
    835			continue;
    836		}
    837	}
    838
    839	return 0;
    840}
    841
    842static int linker_sanity_check_elf_relos(struct src_obj *obj, struct src_sec *sec)
    843{
    844	struct src_sec *link_sec, *sym_sec;
    845	Elf64_Rel *relo;
    846	int i, n;
    847
    848	if (sec->shdr->sh_entsize != sizeof(Elf64_Rel))
    849		return -EINVAL;
    850	if (sec->shdr->sh_size % sec->shdr->sh_entsize != 0)
    851		return -EINVAL;
    852
    853	/* SHT_REL's sh_link should point to SYMTAB */
    854	if (sec->shdr->sh_link != obj->symtab_sec_idx) {
    855		pr_warn("ELF relo section #%zu points to invalid SYMTAB section #%zu in %s\n",
    856			sec->sec_idx, (size_t)sec->shdr->sh_link, obj->filename);
    857		return -EINVAL;
    858	}
    859
    860	/* SHT_REL's sh_info points to relocated section */
    861	if (!sec->shdr->sh_info || sec->shdr->sh_info >= obj->sec_cnt) {
    862		pr_warn("ELF relo section #%zu points to missing section #%zu in %s\n",
    863			sec->sec_idx, (size_t)sec->shdr->sh_info, obj->filename);
    864		return -EINVAL;
    865	}
    866	link_sec = &obj->secs[sec->shdr->sh_info];
    867
    868	/* .rel<secname> -> <secname> pattern is followed */
    869	if (strncmp(sec->sec_name, ".rel", sizeof(".rel") - 1) != 0
    870	    || strcmp(sec->sec_name + sizeof(".rel") - 1, link_sec->sec_name) != 0) {
    871		pr_warn("ELF relo section #%zu name has invalid name in %s\n",
    872			sec->sec_idx, obj->filename);
    873		return -EINVAL;
    874	}
    875
    876	/* don't further validate relocations for ignored sections */
    877	if (link_sec->skipped)
    878		return 0;
    879
    880	/* relocatable section is data or instructions */
    881	if (link_sec->shdr->sh_type != SHT_PROGBITS && link_sec->shdr->sh_type != SHT_NOBITS) {
    882		pr_warn("ELF relo section #%zu points to invalid section #%zu in %s\n",
    883			sec->sec_idx, (size_t)sec->shdr->sh_info, obj->filename);
    884		return -EINVAL;
    885	}
    886
    887	/* check sanity of each relocation */
    888	n = sec->shdr->sh_size / sec->shdr->sh_entsize;
    889	relo = sec->data->d_buf;
    890	sym_sec = &obj->secs[obj->symtab_sec_idx];
    891	for (i = 0; i < n; i++, relo++) {
    892		size_t sym_idx = ELF64_R_SYM(relo->r_info);
    893		size_t sym_type = ELF64_R_TYPE(relo->r_info);
    894
    895		if (sym_type != R_BPF_64_64 && sym_type != R_BPF_64_32 &&
    896		    sym_type != R_BPF_64_ABS64 && sym_type != R_BPF_64_ABS32) {
    897			pr_warn("ELF relo #%d in section #%zu has unexpected type %zu in %s\n",
    898				i, sec->sec_idx, sym_type, obj->filename);
    899			return -EINVAL;
    900		}
    901
    902		if (!sym_idx || sym_idx * sizeof(Elf64_Sym) >= sym_sec->shdr->sh_size) {
    903			pr_warn("ELF relo #%d in section #%zu points to invalid symbol #%zu in %s\n",
    904				i, sec->sec_idx, sym_idx, obj->filename);
    905			return -EINVAL;
    906		}
    907
    908		if (link_sec->shdr->sh_flags & SHF_EXECINSTR) {
    909			if (relo->r_offset % sizeof(struct bpf_insn) != 0) {
    910				pr_warn("ELF relo #%d in section #%zu points to missing symbol #%zu in %s\n",
    911					i, sec->sec_idx, sym_idx, obj->filename);
    912				return -EINVAL;
    913			}
    914		}
    915	}
    916
    917	return 0;
    918}
    919
    920static int check_btf_type_id(__u32 *type_id, void *ctx)
    921{
    922	struct btf *btf = ctx;
    923
    924	if (*type_id >= btf__type_cnt(btf))
    925		return -EINVAL;
    926
    927	return 0;
    928}
    929
    930static int check_btf_str_off(__u32 *str_off, void *ctx)
    931{
    932	struct btf *btf = ctx;
    933	const char *s;
    934
    935	s = btf__str_by_offset(btf, *str_off);
    936
    937	if (!s)
    938		return -EINVAL;
    939
    940	return 0;
    941}
    942
    943static int linker_sanity_check_btf(struct src_obj *obj)
    944{
    945	struct btf_type *t;
    946	int i, n, err = 0;
    947
    948	if (!obj->btf)
    949		return 0;
    950
    951	n = btf__type_cnt(obj->btf);
    952	for (i = 1; i < n; i++) {
    953		t = btf_type_by_id(obj->btf, i);
    954
    955		err = err ?: btf_type_visit_type_ids(t, check_btf_type_id, obj->btf);
    956		err = err ?: btf_type_visit_str_offs(t, check_btf_str_off, obj->btf);
    957		if (err)
    958			return err;
    959	}
    960
    961	return 0;
    962}
    963
    964static int linker_sanity_check_btf_ext(struct src_obj *obj)
    965{
    966	int err = 0;
    967
    968	if (!obj->btf_ext)
    969		return 0;
    970
    971	/* can't use .BTF.ext without .BTF */
    972	if (!obj->btf)
    973		return -EINVAL;
    974
    975	err = err ?: btf_ext_visit_type_ids(obj->btf_ext, check_btf_type_id, obj->btf);
    976	err = err ?: btf_ext_visit_str_offs(obj->btf_ext, check_btf_str_off, obj->btf);
    977	if (err)
    978		return err;
    979
    980	return 0;
    981}
    982
    983static int init_sec(struct bpf_linker *linker, struct dst_sec *dst_sec, struct src_sec *src_sec)
    984{
    985	Elf_Scn *scn;
    986	Elf_Data *data;
    987	Elf64_Shdr *shdr;
    988	int name_off;
    989
    990	dst_sec->sec_sz = 0;
    991	dst_sec->sec_idx = 0;
    992	dst_sec->ephemeral = src_sec->ephemeral;
    993
    994	/* ephemeral sections are just thin section shells lacking most parts */
    995	if (src_sec->ephemeral)
    996		return 0;
    997
    998	scn = elf_newscn(linker->elf);
    999	if (!scn)
   1000		return -ENOMEM;
   1001	data = elf_newdata(scn);
   1002	if (!data)
   1003		return -ENOMEM;
   1004	shdr = elf64_getshdr(scn);
   1005	if (!shdr)
   1006		return -ENOMEM;
   1007
   1008	dst_sec->scn = scn;
   1009	dst_sec->shdr = shdr;
   1010	dst_sec->data = data;
   1011	dst_sec->sec_idx = elf_ndxscn(scn);
   1012
   1013	name_off = strset__add_str(linker->strtab_strs, src_sec->sec_name);
   1014	if (name_off < 0)
   1015		return name_off;
   1016
   1017	shdr->sh_name = name_off;
   1018	shdr->sh_type = src_sec->shdr->sh_type;
   1019	shdr->sh_flags = src_sec->shdr->sh_flags;
   1020	shdr->sh_size = 0;
   1021	/* sh_link and sh_info have different meaning for different types of
   1022	 * sections, so we leave it up to the caller code to fill them in, if
   1023	 * necessary
   1024	 */
   1025	shdr->sh_link = 0;
   1026	shdr->sh_info = 0;
   1027	shdr->sh_addralign = src_sec->shdr->sh_addralign;
   1028	shdr->sh_entsize = src_sec->shdr->sh_entsize;
   1029
   1030	data->d_type = src_sec->data->d_type;
   1031	data->d_size = 0;
   1032	data->d_buf = NULL;
   1033	data->d_align = src_sec->data->d_align;
   1034	data->d_off = 0;
   1035
   1036	return 0;
   1037}
   1038
   1039static struct dst_sec *find_dst_sec_by_name(struct bpf_linker *linker, const char *sec_name)
   1040{
   1041	struct dst_sec *sec;
   1042	int i;
   1043
   1044	for (i = 1; i < linker->sec_cnt; i++) {
   1045		sec = &linker->secs[i];
   1046
   1047		if (strcmp(sec->sec_name, sec_name) == 0)
   1048			return sec;
   1049	}
   1050
   1051	return NULL;
   1052}
   1053
   1054static bool secs_match(struct dst_sec *dst, struct src_sec *src)
   1055{
   1056	if (dst->ephemeral || src->ephemeral)
   1057		return true;
   1058
   1059	if (dst->shdr->sh_type != src->shdr->sh_type) {
   1060		pr_warn("sec %s types mismatch\n", dst->sec_name);
   1061		return false;
   1062	}
   1063	if (dst->shdr->sh_flags != src->shdr->sh_flags) {
   1064		pr_warn("sec %s flags mismatch\n", dst->sec_name);
   1065		return false;
   1066	}
   1067	if (dst->shdr->sh_entsize != src->shdr->sh_entsize) {
   1068		pr_warn("sec %s entsize mismatch\n", dst->sec_name);
   1069		return false;
   1070	}
   1071
   1072	return true;
   1073}
   1074
   1075static bool sec_content_is_same(struct dst_sec *dst_sec, struct src_sec *src_sec)
   1076{
   1077	if (dst_sec->sec_sz != src_sec->shdr->sh_size)
   1078		return false;
   1079	if (memcmp(dst_sec->raw_data, src_sec->data->d_buf, dst_sec->sec_sz) != 0)
   1080		return false;
   1081	return true;
   1082}
   1083
   1084static int extend_sec(struct bpf_linker *linker, struct dst_sec *dst, struct src_sec *src)
   1085{
   1086	void *tmp;
   1087	size_t dst_align, src_align;
   1088	size_t dst_align_sz, dst_final_sz;
   1089	int err;
   1090
   1091	/* Ephemeral source section doesn't contribute anything to ELF
   1092	 * section data.
   1093	 */
   1094	if (src->ephemeral)
   1095		return 0;
   1096
   1097	/* Some sections (like .maps) can contain both externs (and thus be
   1098	 * ephemeral) and non-externs (map definitions). So it's possible that
   1099	 * it has to be "upgraded" from ephemeral to non-ephemeral when the
   1100	 * first non-ephemeral entity appears. In such case, we add ELF
   1101	 * section, data, etc.
   1102	 */
   1103	if (dst->ephemeral) {
   1104		err = init_sec(linker, dst, src);
   1105		if (err)
   1106			return err;
   1107	}
   1108
   1109	dst_align = dst->shdr->sh_addralign;
   1110	src_align = src->shdr->sh_addralign;
   1111	if (dst_align == 0)
   1112		dst_align = 1;
   1113	if (dst_align < src_align)
   1114		dst_align = src_align;
   1115
   1116	dst_align_sz = (dst->sec_sz + dst_align - 1) / dst_align * dst_align;
   1117
   1118	/* no need to re-align final size */
   1119	dst_final_sz = dst_align_sz + src->shdr->sh_size;
   1120
   1121	if (src->shdr->sh_type != SHT_NOBITS) {
   1122		tmp = realloc(dst->raw_data, dst_final_sz);
   1123		if (!tmp)
   1124			return -ENOMEM;
   1125		dst->raw_data = tmp;
   1126
   1127		/* pad dst section, if it's alignment forced size increase */
   1128		memset(dst->raw_data + dst->sec_sz, 0, dst_align_sz - dst->sec_sz);
   1129		/* now copy src data at a properly aligned offset */
   1130		memcpy(dst->raw_data + dst_align_sz, src->data->d_buf, src->shdr->sh_size);
   1131	}
   1132
   1133	dst->sec_sz = dst_final_sz;
   1134	dst->shdr->sh_size = dst_final_sz;
   1135	dst->data->d_size = dst_final_sz;
   1136
   1137	dst->shdr->sh_addralign = dst_align;
   1138	dst->data->d_align = dst_align;
   1139
   1140	src->dst_off = dst_align_sz;
   1141
   1142	return 0;
   1143}
   1144
   1145static bool is_data_sec(struct src_sec *sec)
   1146{
   1147	if (!sec || sec->skipped)
   1148		return false;
   1149	/* ephemeral sections are data sections, e.g., .kconfig, .ksyms */
   1150	if (sec->ephemeral)
   1151		return true;
   1152	return sec->shdr->sh_type == SHT_PROGBITS || sec->shdr->sh_type == SHT_NOBITS;
   1153}
   1154
   1155static bool is_relo_sec(struct src_sec *sec)
   1156{
   1157	if (!sec || sec->skipped || sec->ephemeral)
   1158		return false;
   1159	return sec->shdr->sh_type == SHT_REL;
   1160}
   1161
   1162static int linker_append_sec_data(struct bpf_linker *linker, struct src_obj *obj)
   1163{
   1164	int i, err;
   1165
   1166	for (i = 1; i < obj->sec_cnt; i++) {
   1167		struct src_sec *src_sec;
   1168		struct dst_sec *dst_sec;
   1169
   1170		src_sec = &obj->secs[i];
   1171		if (!is_data_sec(src_sec))
   1172			continue;
   1173
   1174		dst_sec = find_dst_sec_by_name(linker, src_sec->sec_name);
   1175		if (!dst_sec) {
   1176			dst_sec = add_dst_sec(linker, src_sec->sec_name);
   1177			if (!dst_sec)
   1178				return -ENOMEM;
   1179			err = init_sec(linker, dst_sec, src_sec);
   1180			if (err) {
   1181				pr_warn("failed to init section '%s'\n", src_sec->sec_name);
   1182				return err;
   1183			}
   1184		} else {
   1185			if (!secs_match(dst_sec, src_sec)) {
   1186				pr_warn("ELF sections %s are incompatible\n", src_sec->sec_name);
   1187				return -1;
   1188			}
   1189
   1190			/* "license" and "version" sections are deduped */
   1191			if (strcmp(src_sec->sec_name, "license") == 0
   1192			    || strcmp(src_sec->sec_name, "version") == 0) {
   1193				if (!sec_content_is_same(dst_sec, src_sec)) {
   1194					pr_warn("non-identical contents of section '%s' are not supported\n", src_sec->sec_name);
   1195					return -EINVAL;
   1196				}
   1197				src_sec->skipped = true;
   1198				src_sec->dst_id = dst_sec->id;
   1199				continue;
   1200			}
   1201		}
   1202
   1203		/* record mapped section index */
   1204		src_sec->dst_id = dst_sec->id;
   1205
   1206		err = extend_sec(linker, dst_sec, src_sec);
   1207		if (err)
   1208			return err;
   1209	}
   1210
   1211	return 0;
   1212}
   1213
   1214static int linker_append_elf_syms(struct bpf_linker *linker, struct src_obj *obj)
   1215{
   1216	struct src_sec *symtab = &obj->secs[obj->symtab_sec_idx];
   1217	Elf64_Sym *sym = symtab->data->d_buf;
   1218	int i, n = symtab->shdr->sh_size / symtab->shdr->sh_entsize, err;
   1219	int str_sec_idx = symtab->shdr->sh_link;
   1220	const char *sym_name;
   1221
   1222	obj->sym_map = calloc(n + 1, sizeof(*obj->sym_map));
   1223	if (!obj->sym_map)
   1224		return -ENOMEM;
   1225
   1226	for (i = 0; i < n; i++, sym++) {
   1227		/* We already validated all-zero symbol #0 and we already
   1228		 * appended it preventively to the final SYMTAB, so skip it.
   1229		 */
   1230		if (i == 0)
   1231			continue;
   1232
   1233		sym_name = elf_strptr(obj->elf, str_sec_idx, sym->st_name);
   1234		if (!sym_name) {
   1235			pr_warn("can't fetch symbol name for symbol #%d in '%s'\n", i, obj->filename);
   1236			return -EINVAL;
   1237		}
   1238
   1239		err = linker_append_elf_sym(linker, obj, sym, sym_name, i);
   1240		if (err)
   1241			return err;
   1242	}
   1243
   1244	return 0;
   1245}
   1246
   1247static Elf64_Sym *get_sym_by_idx(struct bpf_linker *linker, size_t sym_idx)
   1248{
   1249	struct dst_sec *symtab = &linker->secs[linker->symtab_sec_idx];
   1250	Elf64_Sym *syms = symtab->raw_data;
   1251
   1252	return &syms[sym_idx];
   1253}
   1254
   1255static struct glob_sym *find_glob_sym(struct bpf_linker *linker, const char *sym_name)
   1256{
   1257	struct glob_sym *glob_sym;
   1258	const char *name;
   1259	int i;
   1260
   1261	for (i = 0; i < linker->glob_sym_cnt; i++) {
   1262		glob_sym = &linker->glob_syms[i];
   1263		name = strset__data(linker->strtab_strs) + glob_sym->name_off;
   1264
   1265		if (strcmp(name, sym_name) == 0)
   1266			return glob_sym;
   1267	}
   1268
   1269	return NULL;
   1270}
   1271
   1272static struct glob_sym *add_glob_sym(struct bpf_linker *linker)
   1273{
   1274	struct glob_sym *syms, *sym;
   1275
   1276	syms = libbpf_reallocarray(linker->glob_syms, linker->glob_sym_cnt + 1,
   1277				   sizeof(*linker->glob_syms));
   1278	if (!syms)
   1279		return NULL;
   1280
   1281	sym = &syms[linker->glob_sym_cnt];
   1282	memset(sym, 0, sizeof(*sym));
   1283	sym->var_idx = -1;
   1284
   1285	linker->glob_syms = syms;
   1286	linker->glob_sym_cnt++;
   1287
   1288	return sym;
   1289}
   1290
   1291static bool glob_sym_btf_matches(const char *sym_name, bool exact,
   1292				 const struct btf *btf1, __u32 id1,
   1293				 const struct btf *btf2, __u32 id2)
   1294{
   1295	const struct btf_type *t1, *t2;
   1296	bool is_static1, is_static2;
   1297	const char *n1, *n2;
   1298	int i, n;
   1299
   1300recur:
   1301	n1 = n2 = NULL;
   1302	t1 = skip_mods_and_typedefs(btf1, id1, &id1);
   1303	t2 = skip_mods_and_typedefs(btf2, id2, &id2);
   1304
   1305	/* check if only one side is FWD, otherwise handle with common logic */
   1306	if (!exact && btf_is_fwd(t1) != btf_is_fwd(t2)) {
   1307		n1 = btf__str_by_offset(btf1, t1->name_off);
   1308		n2 = btf__str_by_offset(btf2, t2->name_off);
   1309		if (strcmp(n1, n2) != 0) {
   1310			pr_warn("global '%s': incompatible forward declaration names '%s' and '%s'\n",
   1311				sym_name, n1, n2);
   1312			return false;
   1313		}
   1314		/* validate if FWD kind matches concrete kind */
   1315		if (btf_is_fwd(t1)) {
   1316			if (btf_kflag(t1) && btf_is_union(t2))
   1317				return true;
   1318			if (!btf_kflag(t1) && btf_is_struct(t2))
   1319				return true;
   1320			pr_warn("global '%s': incompatible %s forward declaration and concrete kind %s\n",
   1321				sym_name, btf_kflag(t1) ? "union" : "struct", btf_kind_str(t2));
   1322		} else {
   1323			if (btf_kflag(t2) && btf_is_union(t1))
   1324				return true;
   1325			if (!btf_kflag(t2) && btf_is_struct(t1))
   1326				return true;
   1327			pr_warn("global '%s': incompatible %s forward declaration and concrete kind %s\n",
   1328				sym_name, btf_kflag(t2) ? "union" : "struct", btf_kind_str(t1));
   1329		}
   1330		return false;
   1331	}
   1332
   1333	if (btf_kind(t1) != btf_kind(t2)) {
   1334		pr_warn("global '%s': incompatible BTF kinds %s and %s\n",
   1335			sym_name, btf_kind_str(t1), btf_kind_str(t2));
   1336		return false;
   1337	}
   1338
   1339	switch (btf_kind(t1)) {
   1340	case BTF_KIND_STRUCT:
   1341	case BTF_KIND_UNION:
   1342	case BTF_KIND_ENUM:
   1343	case BTF_KIND_FWD:
   1344	case BTF_KIND_FUNC:
   1345	case BTF_KIND_VAR:
   1346		n1 = btf__str_by_offset(btf1, t1->name_off);
   1347		n2 = btf__str_by_offset(btf2, t2->name_off);
   1348		if (strcmp(n1, n2) != 0) {
   1349			pr_warn("global '%s': incompatible %s names '%s' and '%s'\n",
   1350				sym_name, btf_kind_str(t1), n1, n2);
   1351			return false;
   1352		}
   1353		break;
   1354	default:
   1355		break;
   1356	}
   1357
   1358	switch (btf_kind(t1)) {
   1359	case BTF_KIND_UNKN: /* void */
   1360	case BTF_KIND_FWD:
   1361		return true;
   1362	case BTF_KIND_INT:
   1363	case BTF_KIND_FLOAT:
   1364	case BTF_KIND_ENUM:
   1365		/* ignore encoding for int and enum values for enum */
   1366		if (t1->size != t2->size) {
   1367			pr_warn("global '%s': incompatible %s '%s' size %u and %u\n",
   1368				sym_name, btf_kind_str(t1), n1, t1->size, t2->size);
   1369			return false;
   1370		}
   1371		return true;
   1372	case BTF_KIND_PTR:
   1373		/* just validate overall shape of the referenced type, so no
   1374		 * contents comparison for struct/union, and allowd fwd vs
   1375		 * struct/union
   1376		 */
   1377		exact = false;
   1378		id1 = t1->type;
   1379		id2 = t2->type;
   1380		goto recur;
   1381	case BTF_KIND_ARRAY:
   1382		/* ignore index type and array size */
   1383		id1 = btf_array(t1)->type;
   1384		id2 = btf_array(t2)->type;
   1385		goto recur;
   1386	case BTF_KIND_FUNC:
   1387		/* extern and global linkages are compatible */
   1388		is_static1 = btf_func_linkage(t1) == BTF_FUNC_STATIC;
   1389		is_static2 = btf_func_linkage(t2) == BTF_FUNC_STATIC;
   1390		if (is_static1 != is_static2) {
   1391			pr_warn("global '%s': incompatible func '%s' linkage\n", sym_name, n1);
   1392			return false;
   1393		}
   1394
   1395		id1 = t1->type;
   1396		id2 = t2->type;
   1397		goto recur;
   1398	case BTF_KIND_VAR:
   1399		/* extern and global linkages are compatible */
   1400		is_static1 = btf_var(t1)->linkage == BTF_VAR_STATIC;
   1401		is_static2 = btf_var(t2)->linkage == BTF_VAR_STATIC;
   1402		if (is_static1 != is_static2) {
   1403			pr_warn("global '%s': incompatible var '%s' linkage\n", sym_name, n1);
   1404			return false;
   1405		}
   1406
   1407		id1 = t1->type;
   1408		id2 = t2->type;
   1409		goto recur;
   1410	case BTF_KIND_STRUCT:
   1411	case BTF_KIND_UNION: {
   1412		const struct btf_member *m1, *m2;
   1413
   1414		if (!exact)
   1415			return true;
   1416
   1417		if (btf_vlen(t1) != btf_vlen(t2)) {
   1418			pr_warn("global '%s': incompatible number of %s fields %u and %u\n",
   1419				sym_name, btf_kind_str(t1), btf_vlen(t1), btf_vlen(t2));
   1420			return false;
   1421		}
   1422
   1423		n = btf_vlen(t1);
   1424		m1 = btf_members(t1);
   1425		m2 = btf_members(t2);
   1426		for (i = 0; i < n; i++, m1++, m2++) {
   1427			n1 = btf__str_by_offset(btf1, m1->name_off);
   1428			n2 = btf__str_by_offset(btf2, m2->name_off);
   1429			if (strcmp(n1, n2) != 0) {
   1430				pr_warn("global '%s': incompatible field #%d names '%s' and '%s'\n",
   1431					sym_name, i, n1, n2);
   1432				return false;
   1433			}
   1434			if (m1->offset != m2->offset) {
   1435				pr_warn("global '%s': incompatible field #%d ('%s') offsets\n",
   1436					sym_name, i, n1);
   1437				return false;
   1438			}
   1439			if (!glob_sym_btf_matches(sym_name, exact, btf1, m1->type, btf2, m2->type))
   1440				return false;
   1441		}
   1442
   1443		return true;
   1444	}
   1445	case BTF_KIND_FUNC_PROTO: {
   1446		const struct btf_param *m1, *m2;
   1447
   1448		if (btf_vlen(t1) != btf_vlen(t2)) {
   1449			pr_warn("global '%s': incompatible number of %s params %u and %u\n",
   1450				sym_name, btf_kind_str(t1), btf_vlen(t1), btf_vlen(t2));
   1451			return false;
   1452		}
   1453
   1454		n = btf_vlen(t1);
   1455		m1 = btf_params(t1);
   1456		m2 = btf_params(t2);
   1457		for (i = 0; i < n; i++, m1++, m2++) {
   1458			/* ignore func arg names */
   1459			if (!glob_sym_btf_matches(sym_name, exact, btf1, m1->type, btf2, m2->type))
   1460				return false;
   1461		}
   1462
   1463		/* now check return type as well */
   1464		id1 = t1->type;
   1465		id2 = t2->type;
   1466		goto recur;
   1467	}
   1468
   1469	/* skip_mods_and_typedefs() make this impossible */
   1470	case BTF_KIND_TYPEDEF:
   1471	case BTF_KIND_VOLATILE:
   1472	case BTF_KIND_CONST:
   1473	case BTF_KIND_RESTRICT:
   1474	/* DATASECs are never compared with each other */
   1475	case BTF_KIND_DATASEC:
   1476	default:
   1477		pr_warn("global '%s': unsupported BTF kind %s\n",
   1478			sym_name, btf_kind_str(t1));
   1479		return false;
   1480	}
   1481}
   1482
   1483static bool map_defs_match(const char *sym_name,
   1484			   const struct btf *main_btf,
   1485			   const struct btf_map_def *main_def,
   1486			   const struct btf_map_def *main_inner_def,
   1487			   const struct btf *extra_btf,
   1488			   const struct btf_map_def *extra_def,
   1489			   const struct btf_map_def *extra_inner_def)
   1490{
   1491	const char *reason;
   1492
   1493	if (main_def->map_type != extra_def->map_type) {
   1494		reason = "type";
   1495		goto mismatch;
   1496	}
   1497
   1498	/* check key type/size match */
   1499	if (main_def->key_size != extra_def->key_size) {
   1500		reason = "key_size";
   1501		goto mismatch;
   1502	}
   1503	if (!!main_def->key_type_id != !!extra_def->key_type_id) {
   1504		reason = "key type";
   1505		goto mismatch;
   1506	}
   1507	if ((main_def->parts & MAP_DEF_KEY_TYPE)
   1508	     && !glob_sym_btf_matches(sym_name, true /*exact*/,
   1509				      main_btf, main_def->key_type_id,
   1510				      extra_btf, extra_def->key_type_id)) {
   1511		reason = "key type";
   1512		goto mismatch;
   1513	}
   1514
   1515	/* validate value type/size match */
   1516	if (main_def->value_size != extra_def->value_size) {
   1517		reason = "value_size";
   1518		goto mismatch;
   1519	}
   1520	if (!!main_def->value_type_id != !!extra_def->value_type_id) {
   1521		reason = "value type";
   1522		goto mismatch;
   1523	}
   1524	if ((main_def->parts & MAP_DEF_VALUE_TYPE)
   1525	     && !glob_sym_btf_matches(sym_name, true /*exact*/,
   1526				      main_btf, main_def->value_type_id,
   1527				      extra_btf, extra_def->value_type_id)) {
   1528		reason = "key type";
   1529		goto mismatch;
   1530	}
   1531
   1532	if (main_def->max_entries != extra_def->max_entries) {
   1533		reason = "max_entries";
   1534		goto mismatch;
   1535	}
   1536	if (main_def->map_flags != extra_def->map_flags) {
   1537		reason = "map_flags";
   1538		goto mismatch;
   1539	}
   1540	if (main_def->numa_node != extra_def->numa_node) {
   1541		reason = "numa_node";
   1542		goto mismatch;
   1543	}
   1544	if (main_def->pinning != extra_def->pinning) {
   1545		reason = "pinning";
   1546		goto mismatch;
   1547	}
   1548
   1549	if ((main_def->parts & MAP_DEF_INNER_MAP) != (extra_def->parts & MAP_DEF_INNER_MAP)) {
   1550		reason = "inner map";
   1551		goto mismatch;
   1552	}
   1553
   1554	if (main_def->parts & MAP_DEF_INNER_MAP) {
   1555		char inner_map_name[128];
   1556
   1557		snprintf(inner_map_name, sizeof(inner_map_name), "%s.inner", sym_name);
   1558
   1559		return map_defs_match(inner_map_name,
   1560				      main_btf, main_inner_def, NULL,
   1561				      extra_btf, extra_inner_def, NULL);
   1562	}
   1563
   1564	return true;
   1565
   1566mismatch:
   1567	pr_warn("global '%s': map %s mismatch\n", sym_name, reason);
   1568	return false;
   1569}
   1570
   1571static bool glob_map_defs_match(const char *sym_name,
   1572				struct bpf_linker *linker, struct glob_sym *glob_sym,
   1573				struct src_obj *obj, Elf64_Sym *sym, int btf_id)
   1574{
   1575	struct btf_map_def dst_def = {}, dst_inner_def = {};
   1576	struct btf_map_def src_def = {}, src_inner_def = {};
   1577	const struct btf_type *t;
   1578	int err;
   1579
   1580	t = btf__type_by_id(obj->btf, btf_id);
   1581	if (!btf_is_var(t)) {
   1582		pr_warn("global '%s': invalid map definition type [%d]\n", sym_name, btf_id);
   1583		return false;
   1584	}
   1585	t = skip_mods_and_typedefs(obj->btf, t->type, NULL);
   1586
   1587	err = parse_btf_map_def(sym_name, obj->btf, t, true /*strict*/, &src_def, &src_inner_def);
   1588	if (err) {
   1589		pr_warn("global '%s': invalid map definition\n", sym_name);
   1590		return false;
   1591	}
   1592
   1593	/* re-parse existing map definition */
   1594	t = btf__type_by_id(linker->btf, glob_sym->btf_id);
   1595	t = skip_mods_and_typedefs(linker->btf, t->type, NULL);
   1596	err = parse_btf_map_def(sym_name, linker->btf, t, true /*strict*/, &dst_def, &dst_inner_def);
   1597	if (err) {
   1598		/* this should not happen, because we already validated it */
   1599		pr_warn("global '%s': invalid dst map definition\n", sym_name);
   1600		return false;
   1601	}
   1602
   1603	/* Currently extern map definition has to be complete and match
   1604	 * concrete map definition exactly. This restriction might be lifted
   1605	 * in the future.
   1606	 */
   1607	return map_defs_match(sym_name, linker->btf, &dst_def, &dst_inner_def,
   1608			      obj->btf, &src_def, &src_inner_def);
   1609}
   1610
   1611static bool glob_syms_match(const char *sym_name,
   1612			    struct bpf_linker *linker, struct glob_sym *glob_sym,
   1613			    struct src_obj *obj, Elf64_Sym *sym, size_t sym_idx, int btf_id)
   1614{
   1615	const struct btf_type *src_t;
   1616
   1617	/* if we are dealing with externs, BTF types describing both global
   1618	 * and extern VARs/FUNCs should be completely present in all files
   1619	 */
   1620	if (!glob_sym->btf_id || !btf_id) {
   1621		pr_warn("BTF info is missing for global symbol '%s'\n", sym_name);
   1622		return false;
   1623	}
   1624
   1625	src_t = btf__type_by_id(obj->btf, btf_id);
   1626	if (!btf_is_var(src_t) && !btf_is_func(src_t)) {
   1627		pr_warn("only extern variables and functions are supported, but got '%s' for '%s'\n",
   1628			btf_kind_str(src_t), sym_name);
   1629		return false;
   1630	}
   1631
   1632	/* deal with .maps definitions specially */
   1633	if (glob_sym->sec_id && strcmp(linker->secs[glob_sym->sec_id].sec_name, MAPS_ELF_SEC) == 0)
   1634		return glob_map_defs_match(sym_name, linker, glob_sym, obj, sym, btf_id);
   1635
   1636	if (!glob_sym_btf_matches(sym_name, true /*exact*/,
   1637				  linker->btf, glob_sym->btf_id, obj->btf, btf_id))
   1638		return false;
   1639
   1640	return true;
   1641}
   1642
   1643static bool btf_is_non_static(const struct btf_type *t)
   1644{
   1645	return (btf_is_var(t) && btf_var(t)->linkage != BTF_VAR_STATIC)
   1646	       || (btf_is_func(t) && btf_func_linkage(t) != BTF_FUNC_STATIC);
   1647}
   1648
   1649static int find_glob_sym_btf(struct src_obj *obj, Elf64_Sym *sym, const char *sym_name,
   1650			     int *out_btf_sec_id, int *out_btf_id)
   1651{
   1652	int i, j, n, m, btf_id = 0;
   1653	const struct btf_type *t;
   1654	const struct btf_var_secinfo *vi;
   1655	const char *name;
   1656
   1657	if (!obj->btf) {
   1658		pr_warn("failed to find BTF info for object '%s'\n", obj->filename);
   1659		return -EINVAL;
   1660	}
   1661
   1662	n = btf__type_cnt(obj->btf);
   1663	for (i = 1; i < n; i++) {
   1664		t = btf__type_by_id(obj->btf, i);
   1665
   1666		/* some global and extern FUNCs and VARs might not be associated with any
   1667		 * DATASEC, so try to detect them in the same pass
   1668		 */
   1669		if (btf_is_non_static(t)) {
   1670			name = btf__str_by_offset(obj->btf, t->name_off);
   1671			if (strcmp(name, sym_name) != 0)
   1672				continue;
   1673
   1674			/* remember and still try to find DATASEC */
   1675			btf_id = i;
   1676			continue;
   1677		}
   1678
   1679		if (!btf_is_datasec(t))
   1680			continue;
   1681
   1682		vi = btf_var_secinfos(t);
   1683		for (j = 0, m = btf_vlen(t); j < m; j++, vi++) {
   1684			t = btf__type_by_id(obj->btf, vi->type);
   1685			name = btf__str_by_offset(obj->btf, t->name_off);
   1686
   1687			if (strcmp(name, sym_name) != 0)
   1688				continue;
   1689			if (btf_is_var(t) && btf_var(t)->linkage == BTF_VAR_STATIC)
   1690				continue;
   1691			if (btf_is_func(t) && btf_func_linkage(t) == BTF_FUNC_STATIC)
   1692				continue;
   1693
   1694			if (btf_id && btf_id != vi->type) {
   1695				pr_warn("global/extern '%s' BTF is ambiguous: both types #%d and #%u match\n",
   1696					sym_name, btf_id, vi->type);
   1697				return -EINVAL;
   1698			}
   1699
   1700			*out_btf_sec_id = i;
   1701			*out_btf_id = vi->type;
   1702
   1703			return 0;
   1704		}
   1705	}
   1706
   1707	/* free-floating extern or global FUNC */
   1708	if (btf_id) {
   1709		*out_btf_sec_id = 0;
   1710		*out_btf_id = btf_id;
   1711		return 0;
   1712	}
   1713
   1714	pr_warn("failed to find BTF info for global/extern symbol '%s'\n", sym_name);
   1715	return -ENOENT;
   1716}
   1717
   1718static struct src_sec *find_src_sec_by_name(struct src_obj *obj, const char *sec_name)
   1719{
   1720	struct src_sec *sec;
   1721	int i;
   1722
   1723	for (i = 1; i < obj->sec_cnt; i++) {
   1724		sec = &obj->secs[i];
   1725
   1726		if (strcmp(sec->sec_name, sec_name) == 0)
   1727			return sec;
   1728	}
   1729
   1730	return NULL;
   1731}
   1732
   1733static int complete_extern_btf_info(struct btf *dst_btf, int dst_id,
   1734				    struct btf *src_btf, int src_id)
   1735{
   1736	struct btf_type *dst_t = btf_type_by_id(dst_btf, dst_id);
   1737	struct btf_type *src_t = btf_type_by_id(src_btf, src_id);
   1738	struct btf_param *src_p, *dst_p;
   1739	const char *s;
   1740	int i, n, off;
   1741
   1742	/* We already made sure that source and destination types (FUNC or
   1743	 * VAR) match in terms of types and argument names.
   1744	 */
   1745	if (btf_is_var(dst_t)) {
   1746		btf_var(dst_t)->linkage = BTF_VAR_GLOBAL_ALLOCATED;
   1747		return 0;
   1748	}
   1749
   1750	dst_t->info = btf_type_info(BTF_KIND_FUNC, BTF_FUNC_GLOBAL, 0);
   1751
   1752	/* now onto FUNC_PROTO types */
   1753	src_t = btf_type_by_id(src_btf, src_t->type);
   1754	dst_t = btf_type_by_id(dst_btf, dst_t->type);
   1755
   1756	/* Fill in all the argument names, which for extern FUNCs are missing.
   1757	 * We'll end up with two copies of FUNCs/VARs for externs, but that
   1758	 * will be taken care of by BTF dedup at the very end.
   1759	 * It might be that BTF types for extern in one file has less/more BTF
   1760	 * information (e.g., FWD instead of full STRUCT/UNION information),
   1761	 * but that should be (in most cases, subject to BTF dedup rules)
   1762	 * handled and resolved by BTF dedup algorithm as well, so we won't
   1763	 * worry about it. Our only job is to make sure that argument names
   1764	 * are populated on both sides, otherwise BTF dedup will pedantically
   1765	 * consider them different.
   1766	 */
   1767	src_p = btf_params(src_t);
   1768	dst_p = btf_params(dst_t);
   1769	for (i = 0, n = btf_vlen(dst_t); i < n; i++, src_p++, dst_p++) {
   1770		if (!src_p->name_off)
   1771			continue;
   1772
   1773		/* src_btf has more complete info, so add name to dst_btf */
   1774		s = btf__str_by_offset(src_btf, src_p->name_off);
   1775		off = btf__add_str(dst_btf, s);
   1776		if (off < 0)
   1777			return off;
   1778		dst_p->name_off = off;
   1779	}
   1780	return 0;
   1781}
   1782
   1783static void sym_update_bind(Elf64_Sym *sym, int sym_bind)
   1784{
   1785	sym->st_info = ELF64_ST_INFO(sym_bind, ELF64_ST_TYPE(sym->st_info));
   1786}
   1787
   1788static void sym_update_type(Elf64_Sym *sym, int sym_type)
   1789{
   1790	sym->st_info = ELF64_ST_INFO(ELF64_ST_BIND(sym->st_info), sym_type);
   1791}
   1792
   1793static void sym_update_visibility(Elf64_Sym *sym, int sym_vis)
   1794{
   1795	/* libelf doesn't provide setters for ST_VISIBILITY,
   1796	 * but it is stored in the lower 2 bits of st_other
   1797	 */
   1798	sym->st_other &= ~0x03;
   1799	sym->st_other |= sym_vis;
   1800}
   1801
   1802static int linker_append_elf_sym(struct bpf_linker *linker, struct src_obj *obj,
   1803				 Elf64_Sym *sym, const char *sym_name, int src_sym_idx)
   1804{
   1805	struct src_sec *src_sec = NULL;
   1806	struct dst_sec *dst_sec = NULL;
   1807	struct glob_sym *glob_sym = NULL;
   1808	int name_off, sym_type, sym_bind, sym_vis, err;
   1809	int btf_sec_id = 0, btf_id = 0;
   1810	size_t dst_sym_idx;
   1811	Elf64_Sym *dst_sym;
   1812	bool sym_is_extern;
   1813
   1814	sym_type = ELF64_ST_TYPE(sym->st_info);
   1815	sym_bind = ELF64_ST_BIND(sym->st_info);
   1816	sym_vis = ELF64_ST_VISIBILITY(sym->st_other);
   1817	sym_is_extern = sym->st_shndx == SHN_UNDEF;
   1818
   1819	if (sym_is_extern) {
   1820		if (!obj->btf) {
   1821			pr_warn("externs without BTF info are not supported\n");
   1822			return -ENOTSUP;
   1823		}
   1824	} else if (sym->st_shndx < SHN_LORESERVE) {
   1825		src_sec = &obj->secs[sym->st_shndx];
   1826		if (src_sec->skipped)
   1827			return 0;
   1828		dst_sec = &linker->secs[src_sec->dst_id];
   1829
   1830		/* allow only one STT_SECTION symbol per section */
   1831		if (sym_type == STT_SECTION && dst_sec->sec_sym_idx) {
   1832			obj->sym_map[src_sym_idx] = dst_sec->sec_sym_idx;
   1833			return 0;
   1834		}
   1835	}
   1836
   1837	if (sym_bind == STB_LOCAL)
   1838		goto add_sym;
   1839
   1840	/* find matching BTF info */
   1841	err = find_glob_sym_btf(obj, sym, sym_name, &btf_sec_id, &btf_id);
   1842	if (err)
   1843		return err;
   1844
   1845	if (sym_is_extern && btf_sec_id) {
   1846		const char *sec_name = NULL;
   1847		const struct btf_type *t;
   1848
   1849		t = btf__type_by_id(obj->btf, btf_sec_id);
   1850		sec_name = btf__str_by_offset(obj->btf, t->name_off);
   1851
   1852		/* Clang puts unannotated extern vars into
   1853		 * '.extern' BTF DATASEC. Treat them the same
   1854		 * as unannotated extern funcs (which are
   1855		 * currently not put into any DATASECs).
   1856		 * Those don't have associated src_sec/dst_sec.
   1857		 */
   1858		if (strcmp(sec_name, BTF_EXTERN_SEC) != 0) {
   1859			src_sec = find_src_sec_by_name(obj, sec_name);
   1860			if (!src_sec) {
   1861				pr_warn("failed to find matching ELF sec '%s'\n", sec_name);
   1862				return -ENOENT;
   1863			}
   1864			dst_sec = &linker->secs[src_sec->dst_id];
   1865		}
   1866	}
   1867
   1868	glob_sym = find_glob_sym(linker, sym_name);
   1869	if (glob_sym) {
   1870		/* Preventively resolve to existing symbol. This is
   1871		 * needed for further relocation symbol remapping in
   1872		 * the next step of linking.
   1873		 */
   1874		obj->sym_map[src_sym_idx] = glob_sym->sym_idx;
   1875
   1876		/* If both symbols are non-externs, at least one of
   1877		 * them has to be STB_WEAK, otherwise they are in
   1878		 * a conflict with each other.
   1879		 */
   1880		if (!sym_is_extern && !glob_sym->is_extern
   1881		    && !glob_sym->is_weak && sym_bind != STB_WEAK) {
   1882			pr_warn("conflicting non-weak symbol #%d (%s) definition in '%s'\n",
   1883				src_sym_idx, sym_name, obj->filename);
   1884			return -EINVAL;
   1885		}
   1886
   1887		if (!glob_syms_match(sym_name, linker, glob_sym, obj, sym, src_sym_idx, btf_id))
   1888			return -EINVAL;
   1889
   1890		dst_sym = get_sym_by_idx(linker, glob_sym->sym_idx);
   1891
   1892		/* If new symbol is strong, then force dst_sym to be strong as
   1893		 * well; this way a mix of weak and non-weak extern
   1894		 * definitions will end up being strong.
   1895		 */
   1896		if (sym_bind == STB_GLOBAL) {
   1897			/* We still need to preserve type (NOTYPE or
   1898			 * OBJECT/FUNC, depending on whether the symbol is
   1899			 * extern or not)
   1900			 */
   1901			sym_update_bind(dst_sym, STB_GLOBAL);
   1902			glob_sym->is_weak = false;
   1903		}
   1904
   1905		/* Non-default visibility is "contaminating", with stricter
   1906		 * visibility overwriting more permissive ones, even if more
   1907		 * permissive visibility comes from just an extern definition.
   1908		 * Currently only STV_DEFAULT and STV_HIDDEN are allowed and
   1909		 * ensured by ELF symbol sanity checks above.
   1910		 */
   1911		if (sym_vis > ELF64_ST_VISIBILITY(dst_sym->st_other))
   1912			sym_update_visibility(dst_sym, sym_vis);
   1913
   1914		/* If the new symbol is extern, then regardless if
   1915		 * existing symbol is extern or resolved global, just
   1916		 * keep the existing one untouched.
   1917		 */
   1918		if (sym_is_extern)
   1919			return 0;
   1920
   1921		/* If existing symbol is a strong resolved symbol, bail out,
   1922		 * because we lost resolution battle have nothing to
   1923		 * contribute. We already checked abover that there is no
   1924		 * strong-strong conflict. We also already tightened binding
   1925		 * and visibility, so nothing else to contribute at that point.
   1926		 */
   1927		if (!glob_sym->is_extern && sym_bind == STB_WEAK)
   1928			return 0;
   1929
   1930		/* At this point, new symbol is strong non-extern,
   1931		 * so overwrite glob_sym with new symbol information.
   1932		 * Preserve binding and visibility.
   1933		 */
   1934		sym_update_type(dst_sym, sym_type);
   1935		dst_sym->st_shndx = dst_sec->sec_idx;
   1936		dst_sym->st_value = src_sec->dst_off + sym->st_value;
   1937		dst_sym->st_size = sym->st_size;
   1938
   1939		/* see comment below about dst_sec->id vs dst_sec->sec_idx */
   1940		glob_sym->sec_id = dst_sec->id;
   1941		glob_sym->is_extern = false;
   1942
   1943		if (complete_extern_btf_info(linker->btf, glob_sym->btf_id,
   1944					     obj->btf, btf_id))
   1945			return -EINVAL;
   1946
   1947		/* request updating VAR's/FUNC's underlying BTF type when appending BTF type */
   1948		glob_sym->underlying_btf_id = 0;
   1949
   1950		obj->sym_map[src_sym_idx] = glob_sym->sym_idx;
   1951		return 0;
   1952	}
   1953
   1954add_sym:
   1955	name_off = strset__add_str(linker->strtab_strs, sym_name);
   1956	if (name_off < 0)
   1957		return name_off;
   1958
   1959	dst_sym = add_new_sym(linker, &dst_sym_idx);
   1960	if (!dst_sym)
   1961		return -ENOMEM;
   1962
   1963	dst_sym->st_name = name_off;
   1964	dst_sym->st_info = sym->st_info;
   1965	dst_sym->st_other = sym->st_other;
   1966	dst_sym->st_shndx = dst_sec ? dst_sec->sec_idx : sym->st_shndx;
   1967	dst_sym->st_value = (src_sec ? src_sec->dst_off : 0) + sym->st_value;
   1968	dst_sym->st_size = sym->st_size;
   1969
   1970	obj->sym_map[src_sym_idx] = dst_sym_idx;
   1971
   1972	if (sym_type == STT_SECTION && dst_sym) {
   1973		dst_sec->sec_sym_idx = dst_sym_idx;
   1974		dst_sym->st_value = 0;
   1975	}
   1976
   1977	if (sym_bind != STB_LOCAL) {
   1978		glob_sym = add_glob_sym(linker);
   1979		if (!glob_sym)
   1980			return -ENOMEM;
   1981
   1982		glob_sym->sym_idx = dst_sym_idx;
   1983		/* we use dst_sec->id (and not dst_sec->sec_idx), because
   1984		 * ephemeral sections (.kconfig, .ksyms, etc) don't have
   1985		 * sec_idx (as they don't have corresponding ELF section), but
   1986		 * still have id. .extern doesn't have even ephemeral section
   1987		 * associated with it, so dst_sec->id == dst_sec->sec_idx == 0.
   1988		 */
   1989		glob_sym->sec_id = dst_sec ? dst_sec->id : 0;
   1990		glob_sym->name_off = name_off;
   1991		/* we will fill btf_id in during BTF merging step */
   1992		glob_sym->btf_id = 0;
   1993		glob_sym->is_extern = sym_is_extern;
   1994		glob_sym->is_weak = sym_bind == STB_WEAK;
   1995	}
   1996
   1997	return 0;
   1998}
   1999
   2000static int linker_append_elf_relos(struct bpf_linker *linker, struct src_obj *obj)
   2001{
   2002	struct src_sec *src_symtab = &obj->secs[obj->symtab_sec_idx];
   2003	struct dst_sec *dst_symtab;
   2004	int i, err;
   2005
   2006	for (i = 1; i < obj->sec_cnt; i++) {
   2007		struct src_sec *src_sec, *src_linked_sec;
   2008		struct dst_sec *dst_sec, *dst_linked_sec;
   2009		Elf64_Rel *src_rel, *dst_rel;
   2010		int j, n;
   2011
   2012		src_sec = &obj->secs[i];
   2013		if (!is_relo_sec(src_sec))
   2014			continue;
   2015
   2016		/* shdr->sh_info points to relocatable section */
   2017		src_linked_sec = &obj->secs[src_sec->shdr->sh_info];
   2018		if (src_linked_sec->skipped)
   2019			continue;
   2020
   2021		dst_sec = find_dst_sec_by_name(linker, src_sec->sec_name);
   2022		if (!dst_sec) {
   2023			dst_sec = add_dst_sec(linker, src_sec->sec_name);
   2024			if (!dst_sec)
   2025				return -ENOMEM;
   2026			err = init_sec(linker, dst_sec, src_sec);
   2027			if (err) {
   2028				pr_warn("failed to init section '%s'\n", src_sec->sec_name);
   2029				return err;
   2030			}
   2031		} else if (!secs_match(dst_sec, src_sec)) {
   2032			pr_warn("sections %s are not compatible\n", src_sec->sec_name);
   2033			return -1;
   2034		}
   2035
   2036		/* add_dst_sec() above could have invalidated linker->secs */
   2037		dst_symtab = &linker->secs[linker->symtab_sec_idx];
   2038
   2039		/* shdr->sh_link points to SYMTAB */
   2040		dst_sec->shdr->sh_link = linker->symtab_sec_idx;
   2041
   2042		/* shdr->sh_info points to relocated section */
   2043		dst_linked_sec = &linker->secs[src_linked_sec->dst_id];
   2044		dst_sec->shdr->sh_info = dst_linked_sec->sec_idx;
   2045
   2046		src_sec->dst_id = dst_sec->id;
   2047		err = extend_sec(linker, dst_sec, src_sec);
   2048		if (err)
   2049			return err;
   2050
   2051		src_rel = src_sec->data->d_buf;
   2052		dst_rel = dst_sec->raw_data + src_sec->dst_off;
   2053		n = src_sec->shdr->sh_size / src_sec->shdr->sh_entsize;
   2054		for (j = 0; j < n; j++, src_rel++, dst_rel++) {
   2055			size_t src_sym_idx = ELF64_R_SYM(src_rel->r_info);
   2056			size_t sym_type = ELF64_R_TYPE(src_rel->r_info);
   2057			Elf64_Sym *src_sym, *dst_sym;
   2058			size_t dst_sym_idx;
   2059
   2060			src_sym_idx = ELF64_R_SYM(src_rel->r_info);
   2061			src_sym = src_symtab->data->d_buf + sizeof(*src_sym) * src_sym_idx;
   2062
   2063			dst_sym_idx = obj->sym_map[src_sym_idx];
   2064			dst_sym = dst_symtab->raw_data + sizeof(*dst_sym) * dst_sym_idx;
   2065			dst_rel->r_offset += src_linked_sec->dst_off;
   2066			sym_type = ELF64_R_TYPE(src_rel->r_info);
   2067			dst_rel->r_info = ELF64_R_INFO(dst_sym_idx, sym_type);
   2068
   2069			if (ELF64_ST_TYPE(src_sym->st_info) == STT_SECTION) {
   2070				struct src_sec *sec = &obj->secs[src_sym->st_shndx];
   2071				struct bpf_insn *insn;
   2072
   2073				if (src_linked_sec->shdr->sh_flags & SHF_EXECINSTR) {
   2074					/* calls to the very first static function inside
   2075					 * .text section at offset 0 will
   2076					 * reference section symbol, not the
   2077					 * function symbol. Fix that up,
   2078					 * otherwise it won't be possible to
   2079					 * relocate calls to two different
   2080					 * static functions with the same name
   2081					 * (rom two different object files)
   2082					 */
   2083					insn = dst_linked_sec->raw_data + dst_rel->r_offset;
   2084					if (insn->code == (BPF_JMP | BPF_CALL))
   2085						insn->imm += sec->dst_off / sizeof(struct bpf_insn);
   2086					else
   2087						insn->imm += sec->dst_off;
   2088				} else {
   2089					pr_warn("relocation against STT_SECTION in non-exec section is not supported!\n");
   2090					return -EINVAL;
   2091				}
   2092			}
   2093
   2094		}
   2095	}
   2096
   2097	return 0;
   2098}
   2099
   2100static Elf64_Sym *find_sym_by_name(struct src_obj *obj, size_t sec_idx,
   2101				   int sym_type, const char *sym_name)
   2102{
   2103	struct src_sec *symtab = &obj->secs[obj->symtab_sec_idx];
   2104	Elf64_Sym *sym = symtab->data->d_buf;
   2105	int i, n = symtab->shdr->sh_size / symtab->shdr->sh_entsize;
   2106	int str_sec_idx = symtab->shdr->sh_link;
   2107	const char *name;
   2108
   2109	for (i = 0; i < n; i++, sym++) {
   2110		if (sym->st_shndx != sec_idx)
   2111			continue;
   2112		if (ELF64_ST_TYPE(sym->st_info) != sym_type)
   2113			continue;
   2114
   2115		name = elf_strptr(obj->elf, str_sec_idx, sym->st_name);
   2116		if (!name)
   2117			return NULL;
   2118
   2119		if (strcmp(sym_name, name) != 0)
   2120			continue;
   2121
   2122		return sym;
   2123	}
   2124
   2125	return NULL;
   2126}
   2127
   2128static int linker_fixup_btf(struct src_obj *obj)
   2129{
   2130	const char *sec_name;
   2131	struct src_sec *sec;
   2132	int i, j, n, m;
   2133
   2134	if (!obj->btf)
   2135		return 0;
   2136
   2137	n = btf__type_cnt(obj->btf);
   2138	for (i = 1; i < n; i++) {
   2139		struct btf_var_secinfo *vi;
   2140		struct btf_type *t;
   2141
   2142		t = btf_type_by_id(obj->btf, i);
   2143		if (btf_kind(t) != BTF_KIND_DATASEC)
   2144			continue;
   2145
   2146		sec_name = btf__str_by_offset(obj->btf, t->name_off);
   2147		sec = find_src_sec_by_name(obj, sec_name);
   2148		if (sec) {
   2149			/* record actual section size, unless ephemeral */
   2150			if (sec->shdr)
   2151				t->size = sec->shdr->sh_size;
   2152		} else {
   2153			/* BTF can have some sections that are not represented
   2154			 * in ELF, e.g., .kconfig, .ksyms, .extern, which are used
   2155			 * for special extern variables.
   2156			 *
   2157			 * For all but one such special (ephemeral)
   2158			 * sections, we pre-create "section shells" to be able
   2159			 * to keep track of extra per-section metadata later
   2160			 * (e.g., those BTF extern variables).
   2161			 *
   2162			 * .extern is even more special, though, because it
   2163			 * contains extern variables that need to be resolved
   2164			 * by static linker, not libbpf and kernel. When such
   2165			 * externs are resolved, we are going to remove them
   2166			 * from .extern BTF section and might end up not
   2167			 * needing it at all. Each resolved extern should have
   2168			 * matching non-extern VAR/FUNC in other sections.
   2169			 *
   2170			 * We do support leaving some of the externs
   2171			 * unresolved, though, to support cases of building
   2172			 * libraries, which will later be linked against final
   2173			 * BPF applications. So if at finalization we still
   2174			 * see unresolved externs, we'll create .extern
   2175			 * section on our own.
   2176			 */
   2177			if (strcmp(sec_name, BTF_EXTERN_SEC) == 0)
   2178				continue;
   2179
   2180			sec = add_src_sec(obj, sec_name);
   2181			if (!sec)
   2182				return -ENOMEM;
   2183
   2184			sec->ephemeral = true;
   2185			sec->sec_idx = 0; /* will match UNDEF shndx in ELF */
   2186		}
   2187
   2188		/* remember ELF section and its BTF type ID match */
   2189		sec->sec_type_id = i;
   2190
   2191		/* fix up variable offsets */
   2192		vi = btf_var_secinfos(t);
   2193		for (j = 0, m = btf_vlen(t); j < m; j++, vi++) {
   2194			const struct btf_type *vt = btf__type_by_id(obj->btf, vi->type);
   2195			const char *var_name = btf__str_by_offset(obj->btf, vt->name_off);
   2196			int var_linkage = btf_var(vt)->linkage;
   2197			Elf64_Sym *sym;
   2198
   2199			/* no need to patch up static or extern vars */
   2200			if (var_linkage != BTF_VAR_GLOBAL_ALLOCATED)
   2201				continue;
   2202
   2203			sym = find_sym_by_name(obj, sec->sec_idx, STT_OBJECT, var_name);
   2204			if (!sym) {
   2205				pr_warn("failed to find symbol for variable '%s' in section '%s'\n", var_name, sec_name);
   2206				return -ENOENT;
   2207			}
   2208
   2209			vi->offset = sym->st_value;
   2210		}
   2211	}
   2212
   2213	return 0;
   2214}
   2215
   2216static int remap_type_id(__u32 *type_id, void *ctx)
   2217{
   2218	int *id_map = ctx;
   2219	int new_id = id_map[*type_id];
   2220
   2221	/* Error out if the type wasn't remapped. Ignore VOID which stays VOID. */
   2222	if (new_id == 0 && *type_id != 0) {
   2223		pr_warn("failed to find new ID mapping for original BTF type ID %u\n", *type_id);
   2224		return -EINVAL;
   2225	}
   2226
   2227	*type_id = id_map[*type_id];
   2228
   2229	return 0;
   2230}
   2231
   2232static int linker_append_btf(struct bpf_linker *linker, struct src_obj *obj)
   2233{
   2234	const struct btf_type *t;
   2235	int i, j, n, start_id, id;
   2236	const char *name;
   2237
   2238	if (!obj->btf)
   2239		return 0;
   2240
   2241	start_id = btf__type_cnt(linker->btf);
   2242	n = btf__type_cnt(obj->btf);
   2243
   2244	obj->btf_type_map = calloc(n + 1, sizeof(int));
   2245	if (!obj->btf_type_map)
   2246		return -ENOMEM;
   2247
   2248	for (i = 1; i < n; i++) {
   2249		struct glob_sym *glob_sym = NULL;
   2250
   2251		t = btf__type_by_id(obj->btf, i);
   2252
   2253		/* DATASECs are handled specially below */
   2254		if (btf_kind(t) == BTF_KIND_DATASEC)
   2255			continue;
   2256
   2257		if (btf_is_non_static(t)) {
   2258			/* there should be glob_sym already */
   2259			name = btf__str_by_offset(obj->btf, t->name_off);
   2260			glob_sym = find_glob_sym(linker, name);
   2261
   2262			/* VARs without corresponding glob_sym are those that
   2263			 * belong to skipped/deduplicated sections (i.e.,
   2264			 * license and version), so just skip them
   2265			 */
   2266			if (!glob_sym)
   2267				continue;
   2268
   2269			/* linker_append_elf_sym() might have requested
   2270			 * updating underlying type ID, if extern was resolved
   2271			 * to strong symbol or weak got upgraded to non-weak
   2272			 */
   2273			if (glob_sym->underlying_btf_id == 0)
   2274				glob_sym->underlying_btf_id = -t->type;
   2275
   2276			/* globals from previous object files that match our
   2277			 * VAR/FUNC already have a corresponding associated
   2278			 * BTF type, so just make sure to use it
   2279			 */
   2280			if (glob_sym->btf_id) {
   2281				/* reuse existing BTF type for global var/func */
   2282				obj->btf_type_map[i] = glob_sym->btf_id;
   2283				continue;
   2284			}
   2285		}
   2286
   2287		id = btf__add_type(linker->btf, obj->btf, t);
   2288		if (id < 0) {
   2289			pr_warn("failed to append BTF type #%d from file '%s'\n", i, obj->filename);
   2290			return id;
   2291		}
   2292
   2293		obj->btf_type_map[i] = id;
   2294
   2295		/* record just appended BTF type for var/func */
   2296		if (glob_sym) {
   2297			glob_sym->btf_id = id;
   2298			glob_sym->underlying_btf_id = -t->type;
   2299		}
   2300	}
   2301
   2302	/* remap all the types except DATASECs */
   2303	n = btf__type_cnt(linker->btf);
   2304	for (i = start_id; i < n; i++) {
   2305		struct btf_type *dst_t = btf_type_by_id(linker->btf, i);
   2306
   2307		if (btf_type_visit_type_ids(dst_t, remap_type_id, obj->btf_type_map))
   2308			return -EINVAL;
   2309	}
   2310
   2311	/* Rewrite VAR/FUNC underlying types (i.e., FUNC's FUNC_PROTO and VAR's
   2312	 * actual type), if necessary
   2313	 */
   2314	for (i = 0; i < linker->glob_sym_cnt; i++) {
   2315		struct glob_sym *glob_sym = &linker->glob_syms[i];
   2316		struct btf_type *glob_t;
   2317
   2318		if (glob_sym->underlying_btf_id >= 0)
   2319			continue;
   2320
   2321		glob_sym->underlying_btf_id = obj->btf_type_map[-glob_sym->underlying_btf_id];
   2322
   2323		glob_t = btf_type_by_id(linker->btf, glob_sym->btf_id);
   2324		glob_t->type = glob_sym->underlying_btf_id;
   2325	}
   2326
   2327	/* append DATASEC info */
   2328	for (i = 1; i < obj->sec_cnt; i++) {
   2329		struct src_sec *src_sec;
   2330		struct dst_sec *dst_sec;
   2331		const struct btf_var_secinfo *src_var;
   2332		struct btf_var_secinfo *dst_var;
   2333
   2334		src_sec = &obj->secs[i];
   2335		if (!src_sec->sec_type_id || src_sec->skipped)
   2336			continue;
   2337		dst_sec = &linker->secs[src_sec->dst_id];
   2338
   2339		/* Mark section as having BTF regardless of the presence of
   2340		 * variables. In some cases compiler might generate empty BTF
   2341		 * with no variables information. E.g., when promoting local
   2342		 * array/structure variable initial values and BPF object
   2343		 * file otherwise has no read-only static variables in
   2344		 * .rodata. We need to preserve such empty BTF and just set
   2345		 * correct section size.
   2346		 */
   2347		dst_sec->has_btf = true;
   2348
   2349		t = btf__type_by_id(obj->btf, src_sec->sec_type_id);
   2350		src_var = btf_var_secinfos(t);
   2351		n = btf_vlen(t);
   2352		for (j = 0; j < n; j++, src_var++) {
   2353			void *sec_vars = dst_sec->sec_vars;
   2354			int new_id = obj->btf_type_map[src_var->type];
   2355			struct glob_sym *glob_sym = NULL;
   2356
   2357			t = btf_type_by_id(linker->btf, new_id);
   2358			if (btf_is_non_static(t)) {
   2359				name = btf__str_by_offset(linker->btf, t->name_off);
   2360				glob_sym = find_glob_sym(linker, name);
   2361				if (glob_sym->sec_id != dst_sec->id) {
   2362					pr_warn("global '%s': section mismatch %d vs %d\n",
   2363						name, glob_sym->sec_id, dst_sec->id);
   2364					return -EINVAL;
   2365				}
   2366			}
   2367
   2368			/* If there is already a member (VAR or FUNC) mapped
   2369			 * to the same type, don't add a duplicate entry.
   2370			 * This will happen when multiple object files define
   2371			 * the same extern VARs/FUNCs.
   2372			 */
   2373			if (glob_sym && glob_sym->var_idx >= 0) {
   2374				__s64 sz;
   2375
   2376				dst_var = &dst_sec->sec_vars[glob_sym->var_idx];
   2377				/* Because underlying BTF type might have
   2378				 * changed, so might its size have changed, so
   2379				 * re-calculate and update it in sec_var.
   2380				 */
   2381				sz = btf__resolve_size(linker->btf, glob_sym->underlying_btf_id);
   2382				if (sz < 0) {
   2383					pr_warn("global '%s': failed to resolve size of underlying type: %d\n",
   2384						name, (int)sz);
   2385					return -EINVAL;
   2386				}
   2387				dst_var->size = sz;
   2388				continue;
   2389			}
   2390
   2391			sec_vars = libbpf_reallocarray(sec_vars,
   2392						       dst_sec->sec_var_cnt + 1,
   2393						       sizeof(*dst_sec->sec_vars));
   2394			if (!sec_vars)
   2395				return -ENOMEM;
   2396
   2397			dst_sec->sec_vars = sec_vars;
   2398			dst_sec->sec_var_cnt++;
   2399
   2400			dst_var = &dst_sec->sec_vars[dst_sec->sec_var_cnt - 1];
   2401			dst_var->type = obj->btf_type_map[src_var->type];
   2402			dst_var->size = src_var->size;
   2403			dst_var->offset = src_sec->dst_off + src_var->offset;
   2404
   2405			if (glob_sym)
   2406				glob_sym->var_idx = dst_sec->sec_var_cnt - 1;
   2407		}
   2408	}
   2409
   2410	return 0;
   2411}
   2412
   2413static void *add_btf_ext_rec(struct btf_ext_sec_data *ext_data, const void *src_rec)
   2414{
   2415	void *tmp;
   2416
   2417	tmp = libbpf_reallocarray(ext_data->recs, ext_data->rec_cnt + 1, ext_data->rec_sz);
   2418	if (!tmp)
   2419		return NULL;
   2420	ext_data->recs = tmp;
   2421
   2422	tmp += ext_data->rec_cnt * ext_data->rec_sz;
   2423	memcpy(tmp, src_rec, ext_data->rec_sz);
   2424
   2425	ext_data->rec_cnt++;
   2426
   2427	return tmp;
   2428}
   2429
   2430static int linker_append_btf_ext(struct bpf_linker *linker, struct src_obj *obj)
   2431{
   2432	const struct btf_ext_info_sec *ext_sec;
   2433	const char *sec_name, *s;
   2434	struct src_sec *src_sec;
   2435	struct dst_sec *dst_sec;
   2436	int rec_sz, str_off, i;
   2437
   2438	if (!obj->btf_ext)
   2439		return 0;
   2440
   2441	rec_sz = obj->btf_ext->func_info.rec_size;
   2442	for_each_btf_ext_sec(&obj->btf_ext->func_info, ext_sec) {
   2443		struct bpf_func_info_min *src_rec, *dst_rec;
   2444
   2445		sec_name = btf__name_by_offset(obj->btf, ext_sec->sec_name_off);
   2446		src_sec = find_src_sec_by_name(obj, sec_name);
   2447		if (!src_sec) {
   2448			pr_warn("can't find section '%s' referenced from .BTF.ext\n", sec_name);
   2449			return -EINVAL;
   2450		}
   2451		dst_sec = &linker->secs[src_sec->dst_id];
   2452
   2453		if (dst_sec->func_info.rec_sz == 0)
   2454			dst_sec->func_info.rec_sz = rec_sz;
   2455		if (dst_sec->func_info.rec_sz != rec_sz) {
   2456			pr_warn("incompatible .BTF.ext record sizes for section '%s'\n", sec_name);
   2457			return -EINVAL;
   2458		}
   2459
   2460		for_each_btf_ext_rec(&obj->btf_ext->func_info, ext_sec, i, src_rec) {
   2461			dst_rec = add_btf_ext_rec(&dst_sec->func_info, src_rec);
   2462			if (!dst_rec)
   2463				return -ENOMEM;
   2464
   2465			dst_rec->insn_off += src_sec->dst_off;
   2466			dst_rec->type_id = obj->btf_type_map[dst_rec->type_id];
   2467		}
   2468	}
   2469
   2470	rec_sz = obj->btf_ext->line_info.rec_size;
   2471	for_each_btf_ext_sec(&obj->btf_ext->line_info, ext_sec) {
   2472		struct bpf_line_info_min *src_rec, *dst_rec;
   2473
   2474		sec_name = btf__name_by_offset(obj->btf, ext_sec->sec_name_off);
   2475		src_sec = find_src_sec_by_name(obj, sec_name);
   2476		if (!src_sec) {
   2477			pr_warn("can't find section '%s' referenced from .BTF.ext\n", sec_name);
   2478			return -EINVAL;
   2479		}
   2480		dst_sec = &linker->secs[src_sec->dst_id];
   2481
   2482		if (dst_sec->line_info.rec_sz == 0)
   2483			dst_sec->line_info.rec_sz = rec_sz;
   2484		if (dst_sec->line_info.rec_sz != rec_sz) {
   2485			pr_warn("incompatible .BTF.ext record sizes for section '%s'\n", sec_name);
   2486			return -EINVAL;
   2487		}
   2488
   2489		for_each_btf_ext_rec(&obj->btf_ext->line_info, ext_sec, i, src_rec) {
   2490			dst_rec = add_btf_ext_rec(&dst_sec->line_info, src_rec);
   2491			if (!dst_rec)
   2492				return -ENOMEM;
   2493
   2494			dst_rec->insn_off += src_sec->dst_off;
   2495
   2496			s = btf__str_by_offset(obj->btf, src_rec->file_name_off);
   2497			str_off = btf__add_str(linker->btf, s);
   2498			if (str_off < 0)
   2499				return -ENOMEM;
   2500			dst_rec->file_name_off = str_off;
   2501
   2502			s = btf__str_by_offset(obj->btf, src_rec->line_off);
   2503			str_off = btf__add_str(linker->btf, s);
   2504			if (str_off < 0)
   2505				return -ENOMEM;
   2506			dst_rec->line_off = str_off;
   2507
   2508			/* dst_rec->line_col is fine */
   2509		}
   2510	}
   2511
   2512	rec_sz = obj->btf_ext->core_relo_info.rec_size;
   2513	for_each_btf_ext_sec(&obj->btf_ext->core_relo_info, ext_sec) {
   2514		struct bpf_core_relo *src_rec, *dst_rec;
   2515
   2516		sec_name = btf__name_by_offset(obj->btf, ext_sec->sec_name_off);
   2517		src_sec = find_src_sec_by_name(obj, sec_name);
   2518		if (!src_sec) {
   2519			pr_warn("can't find section '%s' referenced from .BTF.ext\n", sec_name);
   2520			return -EINVAL;
   2521		}
   2522		dst_sec = &linker->secs[src_sec->dst_id];
   2523
   2524		if (dst_sec->core_relo_info.rec_sz == 0)
   2525			dst_sec->core_relo_info.rec_sz = rec_sz;
   2526		if (dst_sec->core_relo_info.rec_sz != rec_sz) {
   2527			pr_warn("incompatible .BTF.ext record sizes for section '%s'\n", sec_name);
   2528			return -EINVAL;
   2529		}
   2530
   2531		for_each_btf_ext_rec(&obj->btf_ext->core_relo_info, ext_sec, i, src_rec) {
   2532			dst_rec = add_btf_ext_rec(&dst_sec->core_relo_info, src_rec);
   2533			if (!dst_rec)
   2534				return -ENOMEM;
   2535
   2536			dst_rec->insn_off += src_sec->dst_off;
   2537			dst_rec->type_id = obj->btf_type_map[dst_rec->type_id];
   2538
   2539			s = btf__str_by_offset(obj->btf, src_rec->access_str_off);
   2540			str_off = btf__add_str(linker->btf, s);
   2541			if (str_off < 0)
   2542				return -ENOMEM;
   2543			dst_rec->access_str_off = str_off;
   2544
   2545			/* dst_rec->kind is fine */
   2546		}
   2547	}
   2548
   2549	return 0;
   2550}
   2551
   2552int bpf_linker__finalize(struct bpf_linker *linker)
   2553{
   2554	struct dst_sec *sec;
   2555	size_t strs_sz;
   2556	const void *strs;
   2557	int err, i;
   2558
   2559	if (!linker->elf)
   2560		return libbpf_err(-EINVAL);
   2561
   2562	err = finalize_btf(linker);
   2563	if (err)
   2564		return libbpf_err(err);
   2565
   2566	/* Finalize strings */
   2567	strs_sz = strset__data_size(linker->strtab_strs);
   2568	strs = strset__data(linker->strtab_strs);
   2569
   2570	sec = &linker->secs[linker->strtab_sec_idx];
   2571	sec->data->d_align = 1;
   2572	sec->data->d_off = 0LL;
   2573	sec->data->d_buf = (void *)strs;
   2574	sec->data->d_type = ELF_T_BYTE;
   2575	sec->data->d_size = strs_sz;
   2576	sec->shdr->sh_size = strs_sz;
   2577
   2578	for (i = 1; i < linker->sec_cnt; i++) {
   2579		sec = &linker->secs[i];
   2580
   2581		/* STRTAB is handled specially above */
   2582		if (sec->sec_idx == linker->strtab_sec_idx)
   2583			continue;
   2584
   2585		/* special ephemeral sections (.ksyms, .kconfig, etc) */
   2586		if (!sec->scn)
   2587			continue;
   2588
   2589		sec->data->d_buf = sec->raw_data;
   2590	}
   2591
   2592	/* Finalize ELF layout */
   2593	if (elf_update(linker->elf, ELF_C_NULL) < 0) {
   2594		err = -errno;
   2595		pr_warn_elf("failed to finalize ELF layout");
   2596		return libbpf_err(err);
   2597	}
   2598
   2599	/* Write out final ELF contents */
   2600	if (elf_update(linker->elf, ELF_C_WRITE) < 0) {
   2601		err = -errno;
   2602		pr_warn_elf("failed to write ELF contents");
   2603		return libbpf_err(err);
   2604	}
   2605
   2606	elf_end(linker->elf);
   2607	close(linker->fd);
   2608
   2609	linker->elf = NULL;
   2610	linker->fd = -1;
   2611
   2612	return 0;
   2613}
   2614
   2615static int emit_elf_data_sec(struct bpf_linker *linker, const char *sec_name,
   2616			     size_t align, const void *raw_data, size_t raw_sz)
   2617{
   2618	Elf_Scn *scn;
   2619	Elf_Data *data;
   2620	Elf64_Shdr *shdr;
   2621	int name_off;
   2622
   2623	name_off = strset__add_str(linker->strtab_strs, sec_name);
   2624	if (name_off < 0)
   2625		return name_off;
   2626
   2627	scn = elf_newscn(linker->elf);
   2628	if (!scn)
   2629		return -ENOMEM;
   2630	data = elf_newdata(scn);
   2631	if (!data)
   2632		return -ENOMEM;
   2633	shdr = elf64_getshdr(scn);
   2634	if (!shdr)
   2635		return -EINVAL;
   2636
   2637	shdr->sh_name = name_off;
   2638	shdr->sh_type = SHT_PROGBITS;
   2639	shdr->sh_flags = 0;
   2640	shdr->sh_size = raw_sz;
   2641	shdr->sh_link = 0;
   2642	shdr->sh_info = 0;
   2643	shdr->sh_addralign = align;
   2644	shdr->sh_entsize = 0;
   2645
   2646	data->d_type = ELF_T_BYTE;
   2647	data->d_size = raw_sz;
   2648	data->d_buf = (void *)raw_data;
   2649	data->d_align = align;
   2650	data->d_off = 0;
   2651
   2652	return 0;
   2653}
   2654
   2655static int finalize_btf(struct bpf_linker *linker)
   2656{
   2657	LIBBPF_OPTS(btf_dedup_opts, opts);
   2658	struct btf *btf = linker->btf;
   2659	const void *raw_data;
   2660	int i, j, id, err;
   2661	__u32 raw_sz;
   2662
   2663	/* bail out if no BTF data was produced */
   2664	if (btf__type_cnt(linker->btf) == 1)
   2665		return 0;
   2666
   2667	for (i = 1; i < linker->sec_cnt; i++) {
   2668		struct dst_sec *sec = &linker->secs[i];
   2669
   2670		if (!sec->has_btf)
   2671			continue;
   2672
   2673		id = btf__add_datasec(btf, sec->sec_name, sec->sec_sz);
   2674		if (id < 0) {
   2675			pr_warn("failed to add consolidated BTF type for datasec '%s': %d\n",
   2676				sec->sec_name, id);
   2677			return id;
   2678		}
   2679
   2680		for (j = 0; j < sec->sec_var_cnt; j++) {
   2681			struct btf_var_secinfo *vi = &sec->sec_vars[j];
   2682
   2683			if (btf__add_datasec_var_info(btf, vi->type, vi->offset, vi->size))
   2684				return -EINVAL;
   2685		}
   2686	}
   2687
   2688	err = finalize_btf_ext(linker);
   2689	if (err) {
   2690		pr_warn(".BTF.ext generation failed: %d\n", err);
   2691		return err;
   2692	}
   2693
   2694	opts.btf_ext = linker->btf_ext;
   2695	err = btf__dedup(linker->btf, &opts);
   2696	if (err) {
   2697		pr_warn("BTF dedup failed: %d\n", err);
   2698		return err;
   2699	}
   2700
   2701	/* Emit .BTF section */
   2702	raw_data = btf__raw_data(linker->btf, &raw_sz);
   2703	if (!raw_data)
   2704		return -ENOMEM;
   2705
   2706	err = emit_elf_data_sec(linker, BTF_ELF_SEC, 8, raw_data, raw_sz);
   2707	if (err) {
   2708		pr_warn("failed to write out .BTF ELF section: %d\n", err);
   2709		return err;
   2710	}
   2711
   2712	/* Emit .BTF.ext section */
   2713	if (linker->btf_ext) {
   2714		raw_data = btf_ext__get_raw_data(linker->btf_ext, &raw_sz);
   2715		if (!raw_data)
   2716			return -ENOMEM;
   2717
   2718		err = emit_elf_data_sec(linker, BTF_EXT_ELF_SEC, 8, raw_data, raw_sz);
   2719		if (err) {
   2720			pr_warn("failed to write out .BTF.ext ELF section: %d\n", err);
   2721			return err;
   2722		}
   2723	}
   2724
   2725	return 0;
   2726}
   2727
   2728static int emit_btf_ext_data(struct bpf_linker *linker, void *output,
   2729			     const char *sec_name, struct btf_ext_sec_data *sec_data)
   2730{
   2731	struct btf_ext_info_sec *sec_info;
   2732	void *cur = output;
   2733	int str_off;
   2734	size_t sz;
   2735
   2736	if (!sec_data->rec_cnt)
   2737		return 0;
   2738
   2739	str_off = btf__add_str(linker->btf, sec_name);
   2740	if (str_off < 0)
   2741		return -ENOMEM;
   2742
   2743	sec_info = cur;
   2744	sec_info->sec_name_off = str_off;
   2745	sec_info->num_info = sec_data->rec_cnt;
   2746	cur += sizeof(struct btf_ext_info_sec);
   2747
   2748	sz = sec_data->rec_cnt * sec_data->rec_sz;
   2749	memcpy(cur, sec_data->recs, sz);
   2750	cur += sz;
   2751
   2752	return cur - output;
   2753}
   2754
   2755static int finalize_btf_ext(struct bpf_linker *linker)
   2756{
   2757	size_t funcs_sz = 0, lines_sz = 0, core_relos_sz = 0, total_sz = 0;
   2758	size_t func_rec_sz = 0, line_rec_sz = 0, core_relo_rec_sz = 0;
   2759	struct btf_ext_header *hdr;
   2760	void *data, *cur;
   2761	int i, err, sz;
   2762
   2763	/* validate that all sections have the same .BTF.ext record sizes
   2764	 * and calculate total data size for each type of data (func info,
   2765	 * line info, core relos)
   2766	 */
   2767	for (i = 1; i < linker->sec_cnt; i++) {
   2768		struct dst_sec *sec = &linker->secs[i];
   2769
   2770		if (sec->func_info.rec_cnt) {
   2771			if (func_rec_sz == 0)
   2772				func_rec_sz = sec->func_info.rec_sz;
   2773			if (func_rec_sz != sec->func_info.rec_sz) {
   2774				pr_warn("mismatch in func_info record size %zu != %u\n",
   2775					func_rec_sz, sec->func_info.rec_sz);
   2776				return -EINVAL;
   2777			}
   2778
   2779			funcs_sz += sizeof(struct btf_ext_info_sec) + func_rec_sz * sec->func_info.rec_cnt;
   2780		}
   2781		if (sec->line_info.rec_cnt) {
   2782			if (line_rec_sz == 0)
   2783				line_rec_sz = sec->line_info.rec_sz;
   2784			if (line_rec_sz != sec->line_info.rec_sz) {
   2785				pr_warn("mismatch in line_info record size %zu != %u\n",
   2786					line_rec_sz, sec->line_info.rec_sz);
   2787				return -EINVAL;
   2788			}
   2789
   2790			lines_sz += sizeof(struct btf_ext_info_sec) + line_rec_sz * sec->line_info.rec_cnt;
   2791		}
   2792		if (sec->core_relo_info.rec_cnt) {
   2793			if (core_relo_rec_sz == 0)
   2794				core_relo_rec_sz = sec->core_relo_info.rec_sz;
   2795			if (core_relo_rec_sz != sec->core_relo_info.rec_sz) {
   2796				pr_warn("mismatch in core_relo_info record size %zu != %u\n",
   2797					core_relo_rec_sz, sec->core_relo_info.rec_sz);
   2798				return -EINVAL;
   2799			}
   2800
   2801			core_relos_sz += sizeof(struct btf_ext_info_sec) + core_relo_rec_sz * sec->core_relo_info.rec_cnt;
   2802		}
   2803	}
   2804
   2805	if (!funcs_sz && !lines_sz && !core_relos_sz)
   2806		return 0;
   2807
   2808	total_sz += sizeof(struct btf_ext_header);
   2809	if (funcs_sz) {
   2810		funcs_sz += sizeof(__u32); /* record size prefix */
   2811		total_sz += funcs_sz;
   2812	}
   2813	if (lines_sz) {
   2814		lines_sz += sizeof(__u32); /* record size prefix */
   2815		total_sz += lines_sz;
   2816	}
   2817	if (core_relos_sz) {
   2818		core_relos_sz += sizeof(__u32); /* record size prefix */
   2819		total_sz += core_relos_sz;
   2820	}
   2821
   2822	cur = data = calloc(1, total_sz);
   2823	if (!data)
   2824		return -ENOMEM;
   2825
   2826	hdr = cur;
   2827	hdr->magic = BTF_MAGIC;
   2828	hdr->version = BTF_VERSION;
   2829	hdr->flags = 0;
   2830	hdr->hdr_len = sizeof(struct btf_ext_header);
   2831	cur += sizeof(struct btf_ext_header);
   2832
   2833	/* All offsets are in bytes relative to the end of this header */
   2834	hdr->func_info_off = 0;
   2835	hdr->func_info_len = funcs_sz;
   2836	hdr->line_info_off = funcs_sz;
   2837	hdr->line_info_len = lines_sz;
   2838	hdr->core_relo_off = funcs_sz + lines_sz;
   2839	hdr->core_relo_len = core_relos_sz;
   2840
   2841	if (funcs_sz) {
   2842		*(__u32 *)cur = func_rec_sz;
   2843		cur += sizeof(__u32);
   2844
   2845		for (i = 1; i < linker->sec_cnt; i++) {
   2846			struct dst_sec *sec = &linker->secs[i];
   2847
   2848			sz = emit_btf_ext_data(linker, cur, sec->sec_name, &sec->func_info);
   2849			if (sz < 0) {
   2850				err = sz;
   2851				goto out;
   2852			}
   2853
   2854			cur += sz;
   2855		}
   2856	}
   2857
   2858	if (lines_sz) {
   2859		*(__u32 *)cur = line_rec_sz;
   2860		cur += sizeof(__u32);
   2861
   2862		for (i = 1; i < linker->sec_cnt; i++) {
   2863			struct dst_sec *sec = &linker->secs[i];
   2864
   2865			sz = emit_btf_ext_data(linker, cur, sec->sec_name, &sec->line_info);
   2866			if (sz < 0) {
   2867				err = sz;
   2868				goto out;
   2869			}
   2870
   2871			cur += sz;
   2872		}
   2873	}
   2874
   2875	if (core_relos_sz) {
   2876		*(__u32 *)cur = core_relo_rec_sz;
   2877		cur += sizeof(__u32);
   2878
   2879		for (i = 1; i < linker->sec_cnt; i++) {
   2880			struct dst_sec *sec = &linker->secs[i];
   2881
   2882			sz = emit_btf_ext_data(linker, cur, sec->sec_name, &sec->core_relo_info);
   2883			if (sz < 0) {
   2884				err = sz;
   2885				goto out;
   2886			}
   2887
   2888			cur += sz;
   2889		}
   2890	}
   2891
   2892	linker->btf_ext = btf_ext__new(data, total_sz);
   2893	err = libbpf_get_error(linker->btf_ext);
   2894	if (err) {
   2895		linker->btf_ext = NULL;
   2896		pr_warn("failed to parse final .BTF.ext data: %d\n", err);
   2897		goto out;
   2898	}
   2899
   2900out:
   2901	free(data);
   2902	return err;
   2903}