summaryrefslogtreecommitdiffhomepage
path: root/pkg/sentry/fs/gofer/session.go
diff options
context:
space:
mode:
authorFabricio Voznika <fvoznika@google.com>2019-01-31 12:53:00 -0800
committerShentubot <shentubot@google.com>2019-01-31 12:54:00 -0800
commita497f5ed5f97e4ad49ed60dd46f0146ae45eefd6 (patch)
tree8673e58e90036bc078eca13b548db123ae0a0c12 /pkg/sentry/fs/gofer/session.go
parentf1c1ee8a8ea6c0035aa799af3d7f5733fa2275d0 (diff)
Invalidate COW mappings when file is truncated
This changed required making fsutil.HostMappable use a backing file to ensure the correct FD would be used for read/write operations. RELNOTES: relnotes is needed for the parent CL. PiperOrigin-RevId: 231836164 Change-Id: I8ae9639715529874ea7d80a65e2c711a5b4ce254
Diffstat (limited to 'pkg/sentry/fs/gofer/session.go')
-rw-r--r--pkg/sentry/fs/gofer/session.go17
1 files changed, 7 insertions, 10 deletions
diff --git a/pkg/sentry/fs/gofer/session.go b/pkg/sentry/fs/gofer/session.go
index b5b1c8202..d626b86f5 100644
--- a/pkg/sentry/fs/gofer/session.go
+++ b/pkg/sentry/fs/gofer/session.go
@@ -197,17 +197,14 @@ func newInodeOperations(ctx context.Context, s *session, file contextFile, qid p
}
}
- var hm *fsutil.HostMappable
- if s.cachePolicy == cacheRemoteRevalidating && fs.IsFile(sattr) {
- hm = fsutil.NewHostMappable()
- }
-
fileState := &inodeFileState{
- s: s,
- file: file,
- sattr: sattr,
- key: deviceKey,
- hostMappable: hm,
+ s: s,
+ file: file,
+ sattr: sattr,
+ key: deviceKey,
+ }
+ if s.cachePolicy == cacheRemoteRevalidating && fs.IsFile(sattr) {
+ fileState.hostMappable = fsutil.NewHostMappable(fileState)
}
uattr := unstable(ctx, valid, attr, s.mounter, s.client)