From nobody Sun Feb 8 14:31:12 2026 Received: from mail-wm1-f50.google.com (mail-wm1-f50.google.com [209.85.128.50]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 8E0171F1512 for ; Thu, 1 May 2025 14:28:28 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.128.50 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1746109711; cv=none; b=hr3fIVVWAt38P+EywM9hbjNdVnO3cO6zpDjwznvvPz+lLmiz7mp5buwRQxkX1FLF+mpFhQEVV0G2I285Qkl4u//ZoK3g9I1AiYDjTbB1vCjD0yVXEhF7al/AfqfDPlLyBakhwBdnVnvqDi5a7CsnkAF/hYd04n0WvPvpKS4YEU8= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1746109711; c=relaxed/simple; bh=Bdk+C4naWZdvQAznGsmCl57RU0n4Z14M9ctNJtILpyE=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=RmBXXO5/rmFLrwPuwLkZKpjZ+ctNX6by/jK5Nh8/e3PGEHldSJBPnV3kZIxvYn4ZCnbCwy8hEuuj7BCMQ1nUNMDbQY1RNSjcVeLvf+LoW5bTlYq/NWzPC0vFcquhcXYKvEonVxIyTqyqQhiTFZyfIlkAk+t1NoIFpZQ1yipKRU8= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=isovalent.com; spf=pass smtp.mailfrom=isovalent.com; dkim=pass (2048-bit key) header.d=isovalent.com header.i=@isovalent.com header.b=gXRCHB6m; arc=none smtp.client-ip=209.85.128.50 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=isovalent.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=isovalent.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=isovalent.com header.i=@isovalent.com header.b="gXRCHB6m" Received: by mail-wm1-f50.google.com with SMTP id 5b1f17b1804b1-441ab63a415so9463285e9.3 for ; Thu, 01 May 2025 07:28:28 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=isovalent.com; s=google; t=1746109707; x=1746714507; darn=vger.kernel.org; h=cc:to:in-reply-to:references:message-id:content-transfer-encoding :mime-version:subject:date:from:from:to:cc:subject:date:message-id :reply-to; bh=rQvdlwU602sy2200o3Yv2M/yNfMxMp0HA+iE0MAoltw=; b=gXRCHB6mtmqMV/okRDRU9EyktzsXSmmV5WPy+DfL0lDyiWr0OB5HCc/1ZrT4ew0kHu nIndcfA/LBA6um74Q1eZmr41F0vbLUxiNlxgAiUsx/uX9SUqaiVcwRbx9XBFLPe199Zm CY/yHy587MbF25y7T6CqrdrlQK4JwLqVlMHg1iISal17vLmYWpL4Ibs+SYS1lH4FB7L5 dCDdM1oyODjVwkifMBoQM+Uoo5UQytv93bR+OQvCttuuKmHECIK3gxhRKmU/WNslRLpl zo8gcYTUKtLKuK1Hv5+TczEYerBM4VwS95z6CXICTVieAyHedlnr69nzEW9K8oHh65yF Hbuw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1746109707; x=1746714507; h=cc:to:in-reply-to:references:message-id:content-transfer-encoding :mime-version:subject:date:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=rQvdlwU602sy2200o3Yv2M/yNfMxMp0HA+iE0MAoltw=; b=aRA+11zRN9SiGERR/h28pNasXzg0+pN1IbOWjNS2EWaEt1jRUf7XVGUYzuk4gOxQGW te1mLffBPVqfp4Wkq48i2VI89eKmzyAfuu+7c1/eTPbyRQH92XZJIchXBpKaOljS/y4N WVQ37b+iCgzH+VHdEQqdDyEXB1sFqduhPnpmuYtRWcMnqUkeumaAJU+vOOG8Vf0/fCY6 TUlIi9TZADJxLB6FsjkpYqqrym+iZV6BNPJzERvbUM4awMoxh38de0Dd92CEXAxb1nbZ xVO/lkbUsKNWpvHbc0zv9fcch5a0656+imjMoulRw5BI7leynuNQBXElitFQura4L09X li9w== X-Forwarded-Encrypted: i=1; AJvYcCUNpEw10IGCjLvoUtraT2OjtEvwrr16R2bhmKKzQ3EDxsK0RM0ghfouc6+29nSap6BujWsBNQFnOc2DoIE=@vger.kernel.org X-Gm-Message-State: AOJu0YwkClX91+HJngYXwSVAglI4zHBpziPC+P1jCcEjvDMN/f0NXf3F w4HXKe5gl63/cJBOu5AcGdi/PgqaOlWbbpq9+0KyAG6xTXdTbO7v67Q3FmVC4s0= X-Gm-Gg: ASbGncuzIaLDas4CocYhE0CJhua0gaBlxPHOxDUfuDI1CpfAH5ErLPEdp7HRuE2bbi0 jYyg/bZB//3zbErhgMf7iuYWFFtPeppOpQHDUDbMLzpUUxcwg4twexkjHkQnapcpQpb9VfGi4Zy EYC50IoKA5/Y/mvw2I0MWNHEzdNyz+/7/ktqTgGLLekXVVyrZM+6LLWQIMXBt6GW1oqNDAosIVG hdA5ZyXgnC70VfePU+5T33xotYXcOVCUtuECIeknf0PDXmlw8XUqka2I/5Xfy+bXmtmPxxvCxZ3 M/CGqoWTPHz2W/KOF/8OMrHodIIsCx+HdMWjMHLoBleJM4RmS3nPgbrizLN1GmhHieb6vigjG6E nVaUkhinCCgdxZDBtOwW2VK+5TDr/6saV+xId X-Google-Smtp-Source: AGHT+IGy0LDUHyJXOVHAC98GhTWux6/a5g/Z2ztBK4/3fRtxG05OxDLTr5GuNeJQsjhZZpo79dJY/A== X-Received: by 2002:a05:600c:502b:b0:43c:fb8e:aec0 with SMTP id 5b1f17b1804b1-441b1f2f0fdmr58254725e9.1.1746109706849; Thu, 01 May 2025 07:28:26 -0700 (PDT) Received: from [192.168.1.240] (0.0.6.0.0.0.0.0.0.0.0.0.0.0.0.0.f.f.6.2.a.5.a.7.0.b.8.0.1.0.0.2.ip6.arpa. [2001:8b0:7a5a:26ff::600]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-441b89d15dasm13908445e9.16.2025.05.01.07.28.26 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 01 May 2025 07:28:26 -0700 (PDT) From: Lorenz Bauer Date: Thu, 01 May 2025 15:28:21 +0100 Subject: [PATCH bpf-next 1/2] btf: allow mmap of vmlinux btf Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Message-Id: <20250501-vmlinux-mmap-v1-1-aa2724572598@isovalent.com> References: <20250501-vmlinux-mmap-v1-0-aa2724572598@isovalent.com> In-Reply-To: <20250501-vmlinux-mmap-v1-0-aa2724572598@isovalent.com> To: Arnd Bergmann , Alexei Starovoitov , Daniel Borkmann , Andrii Nakryiko , Martin KaFai Lau , Eduard Zingerman , Song Liu , Yonghong Song , John Fastabend , KP Singh , Stanislav Fomichev , Hao Luo , Jiri Olsa , Mykola Lysenko , Shuah Khan Cc: linux-arch@vger.kernel.org, linux-kernel@vger.kernel.org, bpf@vger.kernel.org, linux-kselftest@vger.kernel.org, Lorenz Bauer X-Mailer: b4 0.14.2 User space needs access to kernel BTF for many modern features of BPF. Right now each process needs to read the BTF blob either in pieces or as a whole. Allow mmaping the sysfs file so that processes can directly access the memory allocated for it in the kernel. Signed-off-by: Lorenz Bauer --- include/asm-generic/vmlinux.lds.h | 3 ++- kernel/bpf/sysfs_btf.c | 25 +++++++++++++++++++++++-- 2 files changed, 25 insertions(+), 3 deletions(-) diff --git a/include/asm-generic/vmlinux.lds.h b/include/asm-generic/vmlinu= x.lds.h index 58a635a6d5bdf0c53c267c2a3d21a5ed8678ce73..1750390735fac7637cc4d2fa05f= 96cb2a36aa448 100644 --- a/include/asm-generic/vmlinux.lds.h +++ b/include/asm-generic/vmlinux.lds.h @@ -667,10 +667,11 @@ defined(CONFIG_AUTOFDO_CLANG) || defined(CONFIG_PROPE= LLER_CLANG) */ #ifdef CONFIG_DEBUG_INFO_BTF #define BTF \ + . =3D ALIGN(PAGE_SIZE); \ .BTF : AT(ADDR(.BTF) - LOAD_OFFSET) { \ BOUNDED_SECTION_BY(.BTF, _BTF) \ } \ - . =3D ALIGN(4); \ + . =3D ALIGN(PAGE_SIZE); \ .BTF_ids : AT(ADDR(.BTF_ids) - LOAD_OFFSET) { \ *(.BTF_ids) \ } diff --git a/kernel/bpf/sysfs_btf.c b/kernel/bpf/sysfs_btf.c index 81d6cf90584a7157929c50f62a5c6862e7a3d081..7651f37b82c78b8afd96078567a= 5b6612f5f4d97 100644 --- a/kernel/bpf/sysfs_btf.c +++ b/kernel/bpf/sysfs_btf.c @@ -7,18 +7,39 @@ #include #include #include +#include +#include =20 /* See scripts/link-vmlinux.sh, gen_btf() func for details */ extern char __start_BTF[]; extern char __stop_BTF[]; =20 +struct kobject *btf_kobj; + +static int btf_vmlinux_mmap(struct file *filp, struct kobject *kobj, + const struct bin_attribute *attr, + struct vm_area_struct *vma) +{ + size_t btf_size =3D __stop_BTF - __start_BTF; + + if (kobj !=3D btf_kobj) + return -EINVAL; + + if (vma->vm_flags & (VM_WRITE|VM_EXEC|VM_MAYSHARE)) + return -EACCES; + + vm_flags_clear(vma, VM_MAYEXEC); + vm_flags_clear(vma, VM_MAYWRITE); + + return vm_iomap_memory(vma, virt_to_phys(__start_BTF), btf_size); +} + static struct bin_attribute bin_attr_btf_vmlinux __ro_after_init =3D { .attr =3D { .name =3D "vmlinux", .mode =3D 0444, }, .read_new =3D sysfs_bin_attr_simple_read, + .mmap =3D btf_vmlinux_mmap, }; =20 -struct kobject *btf_kobj; - static int __init btf_vmlinux_init(void) { bin_attr_btf_vmlinux.private =3D __start_BTF; --=20 2.49.0 From nobody Sun Feb 8 14:31:12 2026 Received: from mail-wr1-f46.google.com (mail-wr1-f46.google.com [209.85.221.46]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 797F71F1537 for ; Thu, 1 May 2025 14:28:29 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.221.46 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1746109711; cv=none; b=PbcoC6qFmxIi0+lsUkB/oawFgXNcn0kbuIHo8IycePvRsZupBMmn6eyHkw51RA6ryUGWLI/dMEyvzPTitD5vq6w/FMMez7qDEMhAoTQhNR11V6IUf420MYx/Hyr2TiWMYJDaVE3b1mz3DnENDaNZLA/hfrqY58wKv68ZlbahdHQ= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1746109711; c=relaxed/simple; bh=UHf0Gnh8ksl5dQCn2tzgemavr4ewEn7RVYTj5JxtNW4=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=HqV09UZPECWIW55BE8rX7+Z0XK049Zg88Ghn99CeU8Bhkqfm75msCYAs5kovm+1eyNEcTZtrB+Qq4w/Loxo5nNHI2aJK2Fmf/1J3udAzuGfEX8g+Iz/yrs5kwRecfaCfK9C2nawKpBSNzzphWRmsFW60ZInAW6rg4ehC2Al7Nic= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=isovalent.com; spf=pass smtp.mailfrom=isovalent.com; dkim=pass (2048-bit key) header.d=isovalent.com header.i=@isovalent.com header.b=buCczSth; arc=none smtp.client-ip=209.85.221.46 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=isovalent.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=isovalent.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=isovalent.com header.i=@isovalent.com header.b="buCczSth" Received: by mail-wr1-f46.google.com with SMTP id ffacd0b85a97d-39c1efc4577so401467f8f.0 for ; Thu, 01 May 2025 07:28:29 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=isovalent.com; s=google; t=1746109708; x=1746714508; darn=vger.kernel.org; h=cc:to:in-reply-to:references:message-id:content-transfer-encoding :mime-version:subject:date:from:from:to:cc:subject:date:message-id :reply-to; bh=6DcGQefvvptQYw7ehSGQN9HwujMvdj5ehwVheaE79Vw=; b=buCczSth0/Yuz7dl0yp9Y3lXiuguynm+Hqk4NgKbCgX595+O1a6Ga6BXpWzCHwvzTR qN3TylHzcwBzJHvEQR8qwFd4W8uLAgJCmafR4J2Ny6HNGQsNTqTpgacx6cYAKECMxV4T oopaCoCpiTZRi0OFJG9bTeXVPnPtQUbTm/p92ib2VfOoOPYB8iuELWyuXLRqWc5gtmKn 4A5+vA3S8R8GI5S2Kp23rGn0rLi2oO0x4Fg4HbekbeTLg8AQH6SOC6tY0yO1FtVn7cMV aKxB11yvnJhrqbxHsiyV4G17jevIZgdgB9MAsASsccVpBkPw0E9Z1SvucqQO43DWNnYl kFUg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1746109708; x=1746714508; h=cc:to:in-reply-to:references:message-id:content-transfer-encoding :mime-version:subject:date:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=6DcGQefvvptQYw7ehSGQN9HwujMvdj5ehwVheaE79Vw=; b=na1mjvlC9CTGrOpMznZCuYw6rzEcdpUCoQ6XguAwREmLbiHBwCOxRP1kDLoBQc7SDU jFrx5Ivmf3Y05qu+JYhFJJY+bwG68pc0+g3FBdO4liRwfNVGT6MHArhU1+d2ByrJCilv qmYwE2Ruv8Rz0SFoVj1JwD/beVZDR2jjXTHOaS45tJCkPNyHEXPZHNAKj4Czv1UWByLN tqb4Vs/Ph3+os2F3xvohJZQa2baIkSdcjOnL0Blb0ApyM/r9z6BAc6YVIqryRhHFa80K 59FFE2mLYkrSKGMq7TbeDNQjlGylLYgfY4lQOiVZCp9w7Wv9OT+2klXn1FkTpI1hqCAI LW+g== X-Forwarded-Encrypted: i=1; AJvYcCWJj/QYHNbX+kIk/okqdw+aXiZo0lA1RfeqzaxshxBIQr5icQabIqgjGxeimfToAxx1I5KufUJQXyfE6+A=@vger.kernel.org X-Gm-Message-State: AOJu0Yw786JR5LFGAf1OzG4GRSSxiWz1UmEpZIKrI/osBrF/tbinC7nW +XS86GrhukSoglc7FN8wneKTG62lWViki5XND/0twYK/RlZRCwV0aZvlB0pEw54= X-Gm-Gg: ASbGncv7Pe4i66dUjQ550e5MuQRcd5cvnDrGSkHZ0fhWH0573fktDbs1bG4g8aGcbR5 UE5qyUwdg9IXfNYlypyOzZ/LuhllguNuLQod7/C08QJ+aYuebFrD5mhpoGW/bYYKPWf+pq2lGlM lRoqlF3XMiml7NJ1qQj4MAPUn/zWw1sUUOFsSBL1ekpofRfllFZU8wkEAzU6Jh52v3Iq0+ee2jw m4giUJ+1bL2slnrikcAl89WIbOAlTGKg9Ey+9HSF/ZHUS2RA+cTEptBfxI0yZUvCOJcCECs4/nb VFNGpAmboMYu0PooXbI7z4sUMZ472dltFdT/zPcCx3bVOA5boVMAv0Z83IRzJd2Rory7QHKuWNN uK2FgXSo+6RvLo6Aw8AJRmRkTc8oUmH6OTTMR X-Google-Smtp-Source: AGHT+IGYI7eWshvOXOMSQIj5XTh7ey/sDlfBCCJhBg/3GXyALEfYIYT/c6FPdhLIsltARyEhoSfGtw== X-Received: by 2002:a05:6000:2af:b0:3a0:7f85:1905 with SMTP id ffacd0b85a97d-3a094003b65mr2315851f8f.0.1746109707752; Thu, 01 May 2025 07:28:27 -0700 (PDT) Received: from [192.168.1.240] (0.0.6.0.0.0.0.0.0.0.0.0.0.0.0.0.f.f.6.2.a.5.a.7.0.b.8.0.1.0.0.2.ip6.arpa. [2001:8b0:7a5a:26ff::600]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-441b89d15dasm13908445e9.16.2025.05.01.07.28.26 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 01 May 2025 07:28:27 -0700 (PDT) From: Lorenz Bauer Date: Thu, 01 May 2025 15:28:22 +0100 Subject: [PATCH bpf-next 2/2] selftests: bpf: add a test for mmapable vmlinux BTF Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Message-Id: <20250501-vmlinux-mmap-v1-2-aa2724572598@isovalent.com> References: <20250501-vmlinux-mmap-v1-0-aa2724572598@isovalent.com> In-Reply-To: <20250501-vmlinux-mmap-v1-0-aa2724572598@isovalent.com> To: Arnd Bergmann , Alexei Starovoitov , Daniel Borkmann , Andrii Nakryiko , Martin KaFai Lau , Eduard Zingerman , Song Liu , Yonghong Song , John Fastabend , KP Singh , Stanislav Fomichev , Hao Luo , Jiri Olsa , Mykola Lysenko , Shuah Khan Cc: linux-arch@vger.kernel.org, linux-kernel@vger.kernel.org, bpf@vger.kernel.org, linux-kselftest@vger.kernel.org, Lorenz Bauer X-Mailer: b4 0.14.2 Add a basic test for the ability to mmap /sys/kernel/btf/vmlinux. Since libbpf doesn't have an API to parse BTF from memory we do some basic sanity checks ourselves. Signed-off-by: Lorenz Bauer --- tools/testing/selftests/bpf/prog_tests/btf_sysfs.c | 79 ++++++++++++++++++= ++++ 1 file changed, 79 insertions(+) diff --git a/tools/testing/selftests/bpf/prog_tests/btf_sysfs.c b/tools/tes= ting/selftests/bpf/prog_tests/btf_sysfs.c new file mode 100644 index 0000000000000000000000000000000000000000..8dffed136b4757779028ec0971b= 56ff541f2218c --- /dev/null +++ b/tools/testing/selftests/bpf/prog_tests/btf_sysfs.c @@ -0,0 +1,79 @@ +// SPDX-License-Identifier: GPL-2.0 OR BSD-2-Clause +/* Copyright (c) 2025 Isovalent */ + +#include +#include +#include +#include +#include +#include + +#define BTF_MAGIC 0xeB9F + +static const char *btf_path =3D "/sys/kernel/btf/vmlinux"; + +void test_btf_sysfs(void) +{ + struct stat st; + __u64 btf_size; + void *raw_data =3D NULL; + int fd =3D -1; + size_t trailing; + long page_size; + + page_size =3D sysconf(_SC_PAGESIZE); + if (!ASSERT_GE(page_size, 0, "get_page_size")) + goto cleanup; + + if (!ASSERT_OK(stat(btf_path, &st), "stat_btf")) + goto cleanup; + + btf_size =3D st.st_size; + trailing =3D page_size - (btf_size % page_size) % page_size; + + fd =3D open(btf_path, O_RDONLY); + if (!ASSERT_GE(fd, 0, "open_btf")) + goto cleanup; + + raw_data =3D mmap(NULL, btf_size, PROT_READ | PROT_WRITE, MAP_PRIVATE, fd= , 0); + if (!ASSERT_EQ(raw_data, MAP_FAILED, "mmap_btf_writable")) + goto cleanup; + + raw_data =3D mmap(NULL, btf_size, PROT_READ, MAP_SHARED, fd, 0); + if (!ASSERT_EQ(raw_data, MAP_FAILED, "mmap_btf_shared")) + goto cleanup; + + raw_data =3D mmap(NULL, btf_size + trailing + 1, PROT_READ, MAP_PRIVATE, = fd, 0); + if (!ASSERT_EQ(raw_data, MAP_FAILED, "mmap_btf_invalid_size")) + goto cleanup; + + raw_data =3D mmap(NULL, btf_size, PROT_READ, MAP_PRIVATE, fd, 0); + if (!ASSERT_NEQ(raw_data, MAP_FAILED, "mmap_btf")) + goto cleanup; + + if (!ASSERT_EQ(mprotect(raw_data, btf_size, PROT_READ | PROT_WRITE), -1, + "mprotect_writable")) + goto cleanup; + + if (!ASSERT_EQ(mprotect(raw_data, btf_size, PROT_READ | PROT_EXEC), -1, + "mprotect_executable")) + goto cleanup; + + /* Check BTF magic value */ + if (!ASSERT_EQ(*(__u16 *)raw_data, BTF_MAGIC, "btf_magic")) + goto cleanup; + + /* Check padding is zeroed */ + for (int i =3D 0; i < trailing; i++) { + if (((__u8 *)raw_data)[btf_size + i] !=3D 0) { + PRINT_FAIL("tail of BTF is not zero at page offset %d\n", i); + goto cleanup; + } + } + +cleanup: + if (raw_data && raw_data !=3D MAP_FAILED) + munmap(raw_data, btf_size); + if (fd >=3D 0) + close(fd); +} --=20 2.49.0