From patchwork Thu May 1 14:28:21 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Lorenz Bauer X-Patchwork-Id: 886810 Received: from mail-wm1-f48.google.com (mail-wm1-f48.google.com [209.85.128.48]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 952681F8BDD for ; Thu, 1 May 2025 14:28:28 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.128.48 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1746109710; cv=none; b=sLdg2wc899oL94dCdgOOn9Syt4DUNccv2rAdbLb6U2dPriA6WOPRF4of/fTedeDtbxgPl4WMl2WLG5N21CAgFECEoWXgNMtWc3oqnO/zn/WilqP/o5tn4PFZ2cW0jZuMMhlDmgbcNwPqb2vGqU3Lt+eU758CpX5eGRWTPIkp0Ac= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1746109710; c=relaxed/simple; bh=Bdk+C4naWZdvQAznGsmCl57RU0n4Z14M9ctNJtILpyE=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=W9FabELHvhAJqutvCw5l+DAcCYNYxArWicRf+AazQuBPLwYgqWsmGgYk7ymkR+PcF211vc7dOYwfY8t7KrpXrI3pZKB0MOCzEDUCXwjrqumBEok+7eCNeG26FABcHPWM8Uhwrm3jIQDiVKLlCSuLG6qt/X0q4rpy96Swpjbxvds= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=isovalent.com; spf=pass smtp.mailfrom=isovalent.com; dkim=pass (2048-bit key) header.d=isovalent.com header.i=@isovalent.com header.b=gXRCHB6m; arc=none smtp.client-ip=209.85.128.48 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=isovalent.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=isovalent.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=isovalent.com header.i=@isovalent.com header.b="gXRCHB6m" Received: by mail-wm1-f48.google.com with SMTP id 5b1f17b1804b1-43ea40a6e98so7806135e9.1 for ; Thu, 01 May 2025 07:28:28 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=isovalent.com; s=google; t=1746109707; x=1746714507; darn=vger.kernel.org; h=cc:to:in-reply-to:references:message-id:content-transfer-encoding :mime-version:subject:date:from:from:to:cc:subject:date:message-id :reply-to; bh=rQvdlwU602sy2200o3Yv2M/yNfMxMp0HA+iE0MAoltw=; b=gXRCHB6mtmqMV/okRDRU9EyktzsXSmmV5WPy+DfL0lDyiWr0OB5HCc/1ZrT4ew0kHu nIndcfA/LBA6um74Q1eZmr41F0vbLUxiNlxgAiUsx/uX9SUqaiVcwRbx9XBFLPe199Zm CY/yHy587MbF25y7T6CqrdrlQK4JwLqVlMHg1iISal17vLmYWpL4Ibs+SYS1lH4FB7L5 dCDdM1oyODjVwkifMBoQM+Uoo5UQytv93bR+OQvCttuuKmHECIK3gxhRKmU/WNslRLpl zo8gcYTUKtLKuK1Hv5+TczEYerBM4VwS95z6CXICTVieAyHedlnr69nzEW9K8oHh65yF Hbuw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1746109707; x=1746714507; h=cc:to:in-reply-to:references:message-id:content-transfer-encoding :mime-version:subject:date:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=rQvdlwU602sy2200o3Yv2M/yNfMxMp0HA+iE0MAoltw=; b=O0jGa4yvtId9kEsHR4ONWDAqGrE4rZOE+ios/3A4Vmkv1nQSHAezGTlTECYoUN7FgD +dTEzepmEEhQNOdjxaSBvMxwf4hHMbjxto0bqHHb/b/XVYmbWm9b5f/0XcU+tSPddJaZ wsgQUpQRXwDJI3sYviSaXb27zlO8Sd6tLFJvsYqaiOfyQpRuDGfk0BDclPW5hv4z/rlK heO7yIyK6d0OASlNm6kXL+iaXSbnl31pzMl2BT8CUs/KRQ6Q5gOex7PRlMbfouFNwazS K12oFH8pW0G6HzquhQW9k7PwQN3LLkGL782ZV3uhSxYa6d+q5IRP7NVO0GmqKk23GVrf QMgg== X-Forwarded-Encrypted: i=1; AJvYcCU0wePRqii5vQpKQoSsvFulvGXCZRRzK/xk+eBwHZ4zrrAIH/wQwMbEhYcYAUFniZODOh0aSR8ASsMLb8+rPyg=@vger.kernel.org X-Gm-Message-State: AOJu0YzYbLsBFSmnMrku+WDkBoisGnq2eWxHRrTmAvXRNzmOyJXqzvgk ZEupfg8HL1N4VhGjQe9uPxk00F2YT5PsBZEwVkr7vaYK0x8evy/Kcrriak+VGhY= X-Gm-Gg: ASbGncsLRcA9+z3ws8NPadLclC54PwrhRbzgV6p51PC7xPcnw529j1r/diCvzvs1xmU URKQCZ9Kg4l8R1BloGIkAASKnVSZilfLCF1n4PLU31EMpv5m+iyzvuCUUGkuL/+OPD4gyBbGUfT nFBN/GgOr5JTzR2PsA2BhYqf1WcoN6JgvlfGXScsiZLZchQr3n2PzMPXpCfQt/YPqkT4otJtyH1 Ao6UNLagpHy9CRP0Xwvx1j2dln2wzm9YeJ9MaiO9QGWolcBqVuVFtSIfkZrWnlSVq/150v4hXvi 8/qxTSU7T3pi39P023VOt29/H037VuDDviqhp/A256tLgZqdAQBiDNlvMA4UiIVrm7oL+mqxgJ3 zYp8hL7T5zH2bGZYRIiYZYEoaBGsietXgLK3h X-Google-Smtp-Source: AGHT+IGy0LDUHyJXOVHAC98GhTWux6/a5g/Z2ztBK4/3fRtxG05OxDLTr5GuNeJQsjhZZpo79dJY/A== X-Received: by 2002:a05:600c:502b:b0:43c:fb8e:aec0 with SMTP id 5b1f17b1804b1-441b1f2f0fdmr58254725e9.1.1746109706849; Thu, 01 May 2025 07:28:26 -0700 (PDT) Received: from [192.168.1.240] (0.0.6.0.0.0.0.0.0.0.0.0.0.0.0.0.f.f.6.2.a.5.a.7.0.b.8.0.1.0.0.2.ip6.arpa. [2001:8b0:7a5a:26ff::600]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-441b89d15dasm13908445e9.16.2025.05.01.07.28.26 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 01 May 2025 07:28:26 -0700 (PDT) From: Lorenz Bauer Date: Thu, 01 May 2025 15:28:21 +0100 Subject: [PATCH bpf-next 1/2] btf: allow mmap of vmlinux btf Precedence: bulk X-Mailing-List: linux-kselftest@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Message-Id: <20250501-vmlinux-mmap-v1-1-aa2724572598@isovalent.com> References: <20250501-vmlinux-mmap-v1-0-aa2724572598@isovalent.com> In-Reply-To: <20250501-vmlinux-mmap-v1-0-aa2724572598@isovalent.com> To: Arnd Bergmann , Alexei Starovoitov , Daniel Borkmann , Andrii Nakryiko , Martin KaFai Lau , Eduard Zingerman , Song Liu , Yonghong Song , John Fastabend , KP Singh , Stanislav Fomichev , Hao Luo , Jiri Olsa , Mykola Lysenko , Shuah Khan Cc: linux-arch@vger.kernel.org, linux-kernel@vger.kernel.org, bpf@vger.kernel.org, linux-kselftest@vger.kernel.org, Lorenz Bauer X-Mailer: b4 0.14.2 User space needs access to kernel BTF for many modern features of BPF. Right now each process needs to read the BTF blob either in pieces or as a whole. Allow mmaping the sysfs file so that processes can directly access the memory allocated for it in the kernel. Signed-off-by: Lorenz Bauer --- include/asm-generic/vmlinux.lds.h | 3 ++- kernel/bpf/sysfs_btf.c | 25 +++++++++++++++++++++++-- 2 files changed, 25 insertions(+), 3 deletions(-) diff --git a/include/asm-generic/vmlinux.lds.h b/include/asm-generic/vmlinux.lds.h index 58a635a6d5bdf0c53c267c2a3d21a5ed8678ce73..1750390735fac7637cc4d2fa05f96cb2a36aa448 100644 --- a/include/asm-generic/vmlinux.lds.h +++ b/include/asm-generic/vmlinux.lds.h @@ -667,10 +667,11 @@ defined(CONFIG_AUTOFDO_CLANG) || defined(CONFIG_PROPELLER_CLANG) */ #ifdef CONFIG_DEBUG_INFO_BTF #define BTF \ + . = ALIGN(PAGE_SIZE); \ .BTF : AT(ADDR(.BTF) - LOAD_OFFSET) { \ BOUNDED_SECTION_BY(.BTF, _BTF) \ } \ - . = ALIGN(4); \ + . = ALIGN(PAGE_SIZE); \ .BTF_ids : AT(ADDR(.BTF_ids) - LOAD_OFFSET) { \ *(.BTF_ids) \ } diff --git a/kernel/bpf/sysfs_btf.c b/kernel/bpf/sysfs_btf.c index 81d6cf90584a7157929c50f62a5c6862e7a3d081..7651f37b82c78b8afd96078567a5b6612f5f4d97 100644 --- a/kernel/bpf/sysfs_btf.c +++ b/kernel/bpf/sysfs_btf.c @@ -7,18 +7,39 @@ #include #include #include +#include +#include /* See scripts/link-vmlinux.sh, gen_btf() func for details */ extern char __start_BTF[]; extern char __stop_BTF[]; +struct kobject *btf_kobj; + +static int btf_vmlinux_mmap(struct file *filp, struct kobject *kobj, + const struct bin_attribute *attr, + struct vm_area_struct *vma) +{ + size_t btf_size = __stop_BTF - __start_BTF; + + if (kobj != btf_kobj) + return -EINVAL; + + if (vma->vm_flags & (VM_WRITE|VM_EXEC|VM_MAYSHARE)) + return -EACCES; + + vm_flags_clear(vma, VM_MAYEXEC); + vm_flags_clear(vma, VM_MAYWRITE); + + return vm_iomap_memory(vma, virt_to_phys(__start_BTF), btf_size); +} + static struct bin_attribute bin_attr_btf_vmlinux __ro_after_init = { .attr = { .name = "vmlinux", .mode = 0444, }, .read_new = sysfs_bin_attr_simple_read, + .mmap = btf_vmlinux_mmap, }; -struct kobject *btf_kobj; - static int __init btf_vmlinux_init(void) { bin_attr_btf_vmlinux.private = __start_BTF; From patchwork Thu May 1 14:28:22 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Lorenz Bauer X-Patchwork-Id: 886809 Received: from mail-wr1-f41.google.com (mail-wr1-f41.google.com [209.85.221.41]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 735F31F151E for ; Thu, 1 May 2025 14:28:29 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.221.41 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1746109711; cv=none; b=LsanCRbzWdKye05ZrFeIvXXJSBkqocT+mZxlYCcIrrBfOzeYLJU2Ro6k1vD8riSDt+jvzeScfCmMX9/WivP1XXSjHnTWSLThzIradItz2eG+PsN7CYsmaWz1eNScBx2w8r9FHxvFtOxWJ/gSwdN5mz5Dv6sBDZxJfYD5vz/EkqE= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1746109711; c=relaxed/simple; bh=UHf0Gnh8ksl5dQCn2tzgemavr4ewEn7RVYTj5JxtNW4=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=HqV09UZPECWIW55BE8rX7+Z0XK049Zg88Ghn99CeU8Bhkqfm75msCYAs5kovm+1eyNEcTZtrB+Qq4w/Loxo5nNHI2aJK2Fmf/1J3udAzuGfEX8g+Iz/yrs5kwRecfaCfK9C2nawKpBSNzzphWRmsFW60ZInAW6rg4ehC2Al7Nic= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=isovalent.com; spf=pass smtp.mailfrom=isovalent.com; dkim=pass (2048-bit key) header.d=isovalent.com header.i=@isovalent.com header.b=buCczSth; arc=none smtp.client-ip=209.85.221.41 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=isovalent.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=isovalent.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=isovalent.com header.i=@isovalent.com header.b="buCczSth" Received: by mail-wr1-f41.google.com with SMTP id ffacd0b85a97d-39c0dfad22aso632608f8f.2 for ; Thu, 01 May 2025 07:28:29 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=isovalent.com; s=google; t=1746109708; x=1746714508; darn=vger.kernel.org; h=cc:to:in-reply-to:references:message-id:content-transfer-encoding :mime-version:subject:date:from:from:to:cc:subject:date:message-id :reply-to; bh=6DcGQefvvptQYw7ehSGQN9HwujMvdj5ehwVheaE79Vw=; b=buCczSth0/Yuz7dl0yp9Y3lXiuguynm+Hqk4NgKbCgX595+O1a6Ga6BXpWzCHwvzTR qN3TylHzcwBzJHvEQR8qwFd4W8uLAgJCmafR4J2Ny6HNGQsNTqTpgacx6cYAKECMxV4T oopaCoCpiTZRi0OFJG9bTeXVPnPtQUbTm/p92ib2VfOoOPYB8iuELWyuXLRqWc5gtmKn 4A5+vA3S8R8GI5S2Kp23rGn0rLi2oO0x4Fg4HbekbeTLg8AQH6SOC6tY0yO1FtVn7cMV aKxB11yvnJhrqbxHsiyV4G17jevIZgdgB9MAsASsccVpBkPw0E9Z1SvucqQO43DWNnYl kFUg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1746109708; x=1746714508; h=cc:to:in-reply-to:references:message-id:content-transfer-encoding :mime-version:subject:date:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=6DcGQefvvptQYw7ehSGQN9HwujMvdj5ehwVheaE79Vw=; b=VYGB/yBPqzu+JPwron2ab0kFhJ0X0wergw+F3G8js7xjZN/e3e5TaT6zrN3MsNIqPa cnzYXWgIqGoBjMYEgwP/pVggGVC73o7COGrRdDbYbNGvkIJsfPPKz8DB3tqO1PloLdDC PcasRrU6Y85KWGzcAe+M8ICa9PdtOVZIidtBJqfNjSoJjVUEOfJcc8Kv62b4KUSexCjo FrIixwEHUzDpQITqXcZV1OTqsJR8N76pEgJgGymkBS7XRHYAXoe4PJy/03EtPvAhFL+r 5+lTQqkFnjD8z+4RyIe3VwGnrXhr+67MkqRUZWB6M5YOURKRkxWd5vm5Y2aCve5VEwKs FyOA== X-Forwarded-Encrypted: i=1; AJvYcCXJ+zQwLHQmsPTbAGrn/PabU3xtjqOV77jdsGE0xI8awnuqsJR3o8X8bAPKKspaYe/8UoBNkY4OayAlazB+ki0=@vger.kernel.org X-Gm-Message-State: AOJu0Yz7jJEtZwbZUE9kPWf2UQhcCKtynjAvCluvPD7imItmZcakd6OH w+IFOOtt50M036jRRhNCK9TXpfEmjQu2rXp/7mt2CGSfGzwCeXGAa6WB++pzfZI= X-Gm-Gg: ASbGncvDkwTqO2L4jQ/RAYZzNvOMZ8pVcU7tmssNCio04F/yqYrUuvNmJoeDTpccg+m Nbm76EPNEZb3x5/OJUuVOupC2pR2gODrOj6gC2WyMkOQvvz/UKHusEqn4HfyTvVGCeoRC4x/Mnj ymbWvi4NyW720uDieUj3DDxALxp5VrqHtUvPL6zNrkjSKgFShS9Wtda+BI0xOVHzRafbYoBmglt 3cSJXmJi1rmm4TRSFsNmXELLWb//mmcP9PwI9nS0tQ+sAbs7fQAMnt43/sCHiV5rrUvgjCeok+h 2jCzQEdw/DlZFh2PgGiNygDZno525/rQ3Fyy/NDJ1CcDH+Pl57kl0Xl1ZGagaq1AgTeLrKavONu KTm8SW+7Wiwh2FEa/qiKFrjc1Lv0Gcm0HPJzd X-Google-Smtp-Source: AGHT+IGYI7eWshvOXOMSQIj5XTh7ey/sDlfBCCJhBg/3GXyALEfYIYT/c6FPdhLIsltARyEhoSfGtw== X-Received: by 2002:a05:6000:2af:b0:3a0:7f85:1905 with SMTP id ffacd0b85a97d-3a094003b65mr2315851f8f.0.1746109707752; Thu, 01 May 2025 07:28:27 -0700 (PDT) Received: from [192.168.1.240] (0.0.6.0.0.0.0.0.0.0.0.0.0.0.0.0.f.f.6.2.a.5.a.7.0.b.8.0.1.0.0.2.ip6.arpa. [2001:8b0:7a5a:26ff::600]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-441b89d15dasm13908445e9.16.2025.05.01.07.28.26 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 01 May 2025 07:28:27 -0700 (PDT) From: Lorenz Bauer Date: Thu, 01 May 2025 15:28:22 +0100 Subject: [PATCH bpf-next 2/2] selftests: bpf: add a test for mmapable vmlinux BTF Precedence: bulk X-Mailing-List: linux-kselftest@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Message-Id: <20250501-vmlinux-mmap-v1-2-aa2724572598@isovalent.com> References: <20250501-vmlinux-mmap-v1-0-aa2724572598@isovalent.com> In-Reply-To: <20250501-vmlinux-mmap-v1-0-aa2724572598@isovalent.com> To: Arnd Bergmann , Alexei Starovoitov , Daniel Borkmann , Andrii Nakryiko , Martin KaFai Lau , Eduard Zingerman , Song Liu , Yonghong Song , John Fastabend , KP Singh , Stanislav Fomichev , Hao Luo , Jiri Olsa , Mykola Lysenko , Shuah Khan Cc: linux-arch@vger.kernel.org, linux-kernel@vger.kernel.org, bpf@vger.kernel.org, linux-kselftest@vger.kernel.org, Lorenz Bauer X-Mailer: b4 0.14.2 Add a basic test for the ability to mmap /sys/kernel/btf/vmlinux. Since libbpf doesn't have an API to parse BTF from memory we do some basic sanity checks ourselves. Signed-off-by: Lorenz Bauer --- tools/testing/selftests/bpf/prog_tests/btf_sysfs.c | 79 ++++++++++++++++++++++ 1 file changed, 79 insertions(+) diff --git a/tools/testing/selftests/bpf/prog_tests/btf_sysfs.c b/tools/testing/selftests/bpf/prog_tests/btf_sysfs.c new file mode 100644 index 0000000000000000000000000000000000000000..8dffed136b4757779028ec0971b56ff541f2218c --- /dev/null +++ b/tools/testing/selftests/bpf/prog_tests/btf_sysfs.c @@ -0,0 +1,79 @@ +// SPDX-License-Identifier: GPL-2.0 OR BSD-2-Clause +/* Copyright (c) 2025 Isovalent */ + +#include +#include +#include +#include +#include +#include + +#define BTF_MAGIC 0xeB9F + +static const char *btf_path = "/sys/kernel/btf/vmlinux"; + +void test_btf_sysfs(void) +{ + struct stat st; + __u64 btf_size; + void *raw_data = NULL; + int fd = -1; + size_t trailing; + long page_size; + + page_size = sysconf(_SC_PAGESIZE); + if (!ASSERT_GE(page_size, 0, "get_page_size")) + goto cleanup; + + if (!ASSERT_OK(stat(btf_path, &st), "stat_btf")) + goto cleanup; + + btf_size = st.st_size; + trailing = page_size - (btf_size % page_size) % page_size; + + fd = open(btf_path, O_RDONLY); + if (!ASSERT_GE(fd, 0, "open_btf")) + goto cleanup; + + raw_data = mmap(NULL, btf_size, PROT_READ | PROT_WRITE, MAP_PRIVATE, fd, 0); + if (!ASSERT_EQ(raw_data, MAP_FAILED, "mmap_btf_writable")) + goto cleanup; + + raw_data = mmap(NULL, btf_size, PROT_READ, MAP_SHARED, fd, 0); + if (!ASSERT_EQ(raw_data, MAP_FAILED, "mmap_btf_shared")) + goto cleanup; + + raw_data = mmap(NULL, btf_size + trailing + 1, PROT_READ, MAP_PRIVATE, fd, 0); + if (!ASSERT_EQ(raw_data, MAP_FAILED, "mmap_btf_invalid_size")) + goto cleanup; + + raw_data = mmap(NULL, btf_size, PROT_READ, MAP_PRIVATE, fd, 0); + if (!ASSERT_NEQ(raw_data, MAP_FAILED, "mmap_btf")) + goto cleanup; + + if (!ASSERT_EQ(mprotect(raw_data, btf_size, PROT_READ | PROT_WRITE), -1, + "mprotect_writable")) + goto cleanup; + + if (!ASSERT_EQ(mprotect(raw_data, btf_size, PROT_READ | PROT_EXEC), -1, + "mprotect_executable")) + goto cleanup; + + /* Check BTF magic value */ + if (!ASSERT_EQ(*(__u16 *)raw_data, BTF_MAGIC, "btf_magic")) + goto cleanup; + + /* Check padding is zeroed */ + for (int i = 0; i < trailing; i++) { + if (((__u8 *)raw_data)[btf_size + i] != 0) { + PRINT_FAIL("tail of BTF is not zero at page offset %d\n", i); + goto cleanup; + } + } + +cleanup: + if (raw_data && raw_data != MAP_FAILED) + munmap(raw_data, btf_size); + if (fd >= 0) + close(fd); +}