mirror of
				https://github.com/superseriousbusiness/gotosocial.git
				synced 2025-11-02 16:52:25 -06:00 
			
		
		
		
	[chore]: Bump github.com/KimMachineGun/automemlimit from 0.2.4 to 0.2.5 (#1666)
Bumps [github.com/KimMachineGun/automemlimit](https://github.com/KimMachineGun/automemlimit) from 0.2.4 to 0.2.5. - [Release notes](https://github.com/KimMachineGun/automemlimit/releases) - [Commits](https://github.com/KimMachineGun/automemlimit/compare/v0.2.4...v0.2.5) --- updated-dependencies: - dependency-name: github.com/KimMachineGun/automemlimit dependency-type: direct:production update-type: version-update:semver-patch ... Signed-off-by: dependabot[bot] <support@github.com> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
This commit is contained in:
		
					parent
					
						
							
								3f9b2336c0
							
						
					
				
			
			
				commit
				
					
						57dc742c76
					
				
			
		
					 200 changed files with 16392 additions and 38190 deletions
				
			
		
							
								
								
									
										96
									
								
								vendor/github.com/containerd/cgroups/v2/ebpf.go
									
										
									
										generated
									
									
										vendored
									
									
								
							
							
						
						
									
										96
									
								
								vendor/github.com/containerd/cgroups/v2/ebpf.go
									
										
									
										generated
									
									
										vendored
									
									
								
							| 
						 | 
				
			
			@ -1,96 +0,0 @@
 | 
			
		|||
/*
 | 
			
		||||
   Copyright The containerd Authors.
 | 
			
		||||
 | 
			
		||||
   Licensed under the Apache License, Version 2.0 (the "License");
 | 
			
		||||
   you may not use this file except in compliance with the License.
 | 
			
		||||
   You may obtain a copy of the License at
 | 
			
		||||
 | 
			
		||||
       http://www.apache.org/licenses/LICENSE-2.0
 | 
			
		||||
 | 
			
		||||
   Unless required by applicable law or agreed to in writing, software
 | 
			
		||||
   distributed under the License is distributed on an "AS IS" BASIS,
 | 
			
		||||
   WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
			
		||||
   See the License for the specific language governing permissions and
 | 
			
		||||
   limitations under the License.
 | 
			
		||||
*/
 | 
			
		||||
 | 
			
		||||
package v2
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"fmt"
 | 
			
		||||
 | 
			
		||||
	"github.com/cilium/ebpf"
 | 
			
		||||
	"github.com/cilium/ebpf/asm"
 | 
			
		||||
	"github.com/cilium/ebpf/link"
 | 
			
		||||
	"github.com/opencontainers/runtime-spec/specs-go"
 | 
			
		||||
	"golang.org/x/sys/unix"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
// LoadAttachCgroupDeviceFilter installs eBPF device filter program to /sys/fs/cgroup/<foo> directory.
 | 
			
		||||
//
 | 
			
		||||
// Requires the system to be running in cgroup2 unified-mode with kernel >= 4.15 .
 | 
			
		||||
//
 | 
			
		||||
// https://github.com/torvalds/linux/commit/ebc614f687369f9df99828572b1d85a7c2de3d92
 | 
			
		||||
func LoadAttachCgroupDeviceFilter(insts asm.Instructions, license string, dirFD int) (func() error, error) {
 | 
			
		||||
	nilCloser := func() error {
 | 
			
		||||
		return nil
 | 
			
		||||
	}
 | 
			
		||||
	spec := &ebpf.ProgramSpec{
 | 
			
		||||
		Type:         ebpf.CGroupDevice,
 | 
			
		||||
		Instructions: insts,
 | 
			
		||||
		License:      license,
 | 
			
		||||
	}
 | 
			
		||||
	prog, err := ebpf.NewProgram(spec)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return nilCloser, err
 | 
			
		||||
	}
 | 
			
		||||
	err = link.RawAttachProgram(link.RawAttachProgramOptions{
 | 
			
		||||
		Target:  dirFD,
 | 
			
		||||
		Program: prog,
 | 
			
		||||
		Attach:  ebpf.AttachCGroupDevice,
 | 
			
		||||
		Flags:   unix.BPF_F_ALLOW_MULTI,
 | 
			
		||||
	})
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return nilCloser, fmt.Errorf("failed to call BPF_PROG_ATTACH (BPF_CGROUP_DEVICE, BPF_F_ALLOW_MULTI): %w", err)
 | 
			
		||||
	}
 | 
			
		||||
	closer := func() error {
 | 
			
		||||
		err = link.RawDetachProgram(link.RawDetachProgramOptions{
 | 
			
		||||
			Target:  dirFD,
 | 
			
		||||
			Program: prog,
 | 
			
		||||
			Attach:  ebpf.AttachCGroupDevice,
 | 
			
		||||
		})
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			return fmt.Errorf("failed to call BPF_PROG_DETACH (BPF_CGROUP_DEVICE): %w", err)
 | 
			
		||||
		}
 | 
			
		||||
		return nil
 | 
			
		||||
	}
 | 
			
		||||
	return closer, nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func isRWM(cgroupPermissions string) bool {
 | 
			
		||||
	r := false
 | 
			
		||||
	w := false
 | 
			
		||||
	m := false
 | 
			
		||||
	for _, rn := range cgroupPermissions {
 | 
			
		||||
		switch rn {
 | 
			
		||||
		case 'r':
 | 
			
		||||
			r = true
 | 
			
		||||
		case 'w':
 | 
			
		||||
			w = true
 | 
			
		||||
		case 'm':
 | 
			
		||||
			m = true
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
	return r && w && m
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// the logic is from runc
 | 
			
		||||
// https://github.com/opencontainers/runc/blob/master/libcontainer/cgroups/fs/devices_v2.go#L44
 | 
			
		||||
func canSkipEBPFError(devices []specs.LinuxDeviceCgroup) bool {
 | 
			
		||||
	for _, dev := range devices {
 | 
			
		||||
		if dev.Allow || !isRWM(dev.Access) {
 | 
			
		||||
			return false
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
	return true
 | 
			
		||||
}
 | 
			
		||||
		Loading…
	
	Add table
		Add a link
		
	
		Reference in a new issue