summaryrefslogtreecommitdiffhomepage
path: root/pkg/sentry/fs/proc/sys_net_state.go
blob: 6eba709c6e1f75ebdc040bcb31b184b5cfa7f8d8 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
// Copyright 2018 The gVisor Authors.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
//     http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.

package proc

import "fmt"

// beforeSave is invoked by stateify.
func (t *tcpMemInode) beforeSave() {
	size, err := readSize(t.dir, t.s)
	if err != nil {
		panic(fmt.Sprintf("failed to read TCP send / receive buffer sizes: %v", err))
	}
	t.size = size
}

// afterLoad is invoked by stateify.
func (t *tcpMemInode) afterLoad() {
	if err := writeSize(t.dir, t.s, t.size); err != nil {
		panic(fmt.Sprintf("failed to write previous TCP send / receive buffer sizes [%v]: %v", t.size, err))
	}
}

// afterLoad is invoked by stateify.
func (s *tcpSack) afterLoad() {
	if s.enabled != nil {
		if err := s.stack.SetTCPSACKEnabled(*s.enabled); err != nil {
			panic(fmt.Sprintf("failed to set previous TCP sack configuration [%v]: %v", *s.enabled, err))
		}
	}
}