summaryrefslogtreecommitdiffhomepage
path: root/pkg/sentry/fs/gofer/session_state.go
blob: d045e04ff6a109da4e5b5d34a4a35fec6bdbf896 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
// Copyright 2018 The gVisor Authors.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
//     http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.

package gofer

import (
	"fmt"

	"gvisor.dev/gvisor/pkg/p9"
	"gvisor.dev/gvisor/pkg/sentry/context"
	"gvisor.dev/gvisor/pkg/sentry/fs"
	"gvisor.dev/gvisor/pkg/unet"
)

// beforeSave is invoked by stateify.
func (s *session) beforeSave() {
	if s.endpoints != nil {
		if err := s.fillPathMap(); err != nil {
			panic("failed to save paths to endpoint map before saving" + err.Error())
		}
	}
}

// afterLoad is invoked by stateify.
func (s *session) afterLoad() {
	// The restore environment contains the 9p connection of this mount.
	fsys := filesystem{}
	env, ok := fs.CurrentRestoreEnvironment()
	if !ok {
		panic("failed to find restore environment")
	}
	mounts, ok := env.MountSources[fsys.Name()]
	if !ok {
		panic("failed to find mounts for filesystem type " + fsys.Name())
	}
	var args fs.MountArgs
	var found bool
	for _, mount := range mounts {
		if mount.Dev == s.connID {
			args = mount
			found = true
		}
	}
	if !found {
		panic(fmt.Sprintf("no connection for connection id %q", s.connID))
	}

	// Validate the mount flags and options.
	opts, err := options(args.DataString)
	if err != nil {
		panic("failed to parse mount options: " + err.Error())
	}
	if opts.msize != s.msize {
		panic(fmt.Sprintf("new message size %v, want %v", opts.msize, s.msize))
	}
	if opts.version != s.version {
		panic(fmt.Sprintf("new version %v, want %v", opts.version, s.version))
	}
	if opts.policy != s.cachePolicy {
		panic(fmt.Sprintf("new cache policy %v, want %v", opts.policy, s.cachePolicy))
	}
	if opts.aname != s.aname {
		panic(fmt.Sprintf("new attach name %v, want %v", opts.aname, s.aname))
	}

	// Check if endpointMaps exist when uds sockets are enabled
	// (only pathmap will actualy have been saved).
	if opts.privateunixsocket != (s.endpoints != nil) {
		panic(fmt.Sprintf("new privateunixsocket option %v, want %v", opts.privateunixsocket, s.endpoints != nil))
	}
	if args.Flags != s.superBlockFlags {
		panic(fmt.Sprintf("new mount flags %v, want %v", args.Flags, s.superBlockFlags))
	}

	// Manually restore the connection.
	conn, err := unet.NewSocket(opts.fd)
	if err != nil {
		panic(fmt.Sprintf("failed to create Socket for FD %d: %v", opts.fd, err))
	}

	// Manually restore the client.
	s.client, err = p9.NewClient(conn, s.msize, s.version)
	if err != nil {
		panic(fmt.Sprintf("failed to connect client to server: %v", err))
	}

	// Manually restore the attach point.
	s.attach.file, err = s.client.Attach(s.aname)
	if err != nil {
		panic(fmt.Sprintf("failed to attach to aname: %v", err))
	}

	// If private unix sockets are enabled, create and fill the session's endpoint
	// maps.
	if opts.privateunixsocket {
		// TODO(b/38173783): Context is not plumbed to save/restore.
		ctx := &dummyClockContext{context.Background()}

		if err = s.restoreEndpointMaps(ctx); err != nil {
			panic("failed to restore endpoint maps: " + err.Error())
		}
	}
}