2019-04-29 21:25:05 +00:00
|
|
|
// Copyright 2018 The gVisor Authors.
|
2018-07-09 21:03:03 +00:00
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
2018-05-02 05:50:55 +00:00
|
|
|
|
2019-02-22 21:33:49 +00:00
|
|
|
package icmp
|
2018-05-02 05:50:55 +00:00
|
|
|
|
|
|
|
import (
|
2019-08-15 18:12:28 +00:00
|
|
|
"gvisor.dev/gvisor/pkg/tcpip"
|
2019-06-13 23:49:09 +00:00
|
|
|
"gvisor.dev/gvisor/pkg/tcpip/buffer"
|
|
|
|
"gvisor.dev/gvisor/pkg/tcpip/stack"
|
2018-05-02 05:50:55 +00:00
|
|
|
)
|
|
|
|
|
2019-02-22 21:33:49 +00:00
|
|
|
// saveData saves icmpPacket.data field.
|
|
|
|
func (p *icmpPacket) saveData() buffer.VectorisedView {
|
2018-05-02 05:50:55 +00:00
|
|
|
// We cannot save p.data directly as p.data.views may alias to p.views,
|
|
|
|
// which is not allowed by state framework (in-struct pointer).
|
|
|
|
return p.data.Clone(nil)
|
|
|
|
}
|
|
|
|
|
2019-02-22 21:33:49 +00:00
|
|
|
// loadData loads icmpPacket.data field.
|
|
|
|
func (p *icmpPacket) loadData(data buffer.VectorisedView) {
|
2018-05-02 05:50:55 +00:00
|
|
|
// NOTE: We cannot do the p.data = data.Clone(p.views[:]) optimization
|
|
|
|
// here because data.views is not guaranteed to be loaded by now. Plus,
|
|
|
|
// data.views will be allocated anyway so there really is little point
|
|
|
|
// of utilizing p.views for data.views.
|
|
|
|
p.data = data
|
|
|
|
}
|
|
|
|
|
|
|
|
// beforeSave is invoked by stateify.
|
|
|
|
func (e *endpoint) beforeSave() {
|
|
|
|
// Stop incoming packets from being handled (and mutate endpoint state).
|
2018-05-11 23:20:01 +00:00
|
|
|
// The lock will be released after savercvBufSizeMax(), which would have
|
|
|
|
// saved e.rcvBufSizeMax and set it to 0 to continue blocking incoming
|
|
|
|
// packets.
|
2018-05-02 05:50:55 +00:00
|
|
|
e.rcvMu.Lock()
|
|
|
|
}
|
|
|
|
|
2018-05-11 23:20:01 +00:00
|
|
|
// saveRcvBufSizeMax is invoked by stateify.
|
|
|
|
func (e *endpoint) saveRcvBufSizeMax() int {
|
|
|
|
max := e.rcvBufSizeMax
|
|
|
|
// Make sure no new packets will be handled regardless of the lock.
|
|
|
|
e.rcvBufSizeMax = 0
|
|
|
|
// Release the lock acquired in beforeSave() so regular endpoint closing
|
|
|
|
// logic can proceed after save.
|
|
|
|
e.rcvMu.Unlock()
|
|
|
|
return max
|
|
|
|
}
|
|
|
|
|
|
|
|
// loadRcvBufSizeMax is invoked by stateify.
|
|
|
|
func (e *endpoint) loadRcvBufSizeMax(max int) {
|
|
|
|
e.rcvBufSizeMax = max
|
|
|
|
}
|
|
|
|
|
2018-05-02 05:50:55 +00:00
|
|
|
// afterLoad is invoked by stateify.
|
|
|
|
func (e *endpoint) afterLoad() {
|
2019-08-08 19:32:00 +00:00
|
|
|
stack.StackFromEnv.RegisterRestoredEndpoint(e)
|
2018-05-02 05:50:55 +00:00
|
|
|
}
|
2019-08-15 18:12:28 +00:00
|
|
|
|
|
|
|
// Resume implements tcpip.ResumableEndpoint.Resume.
|
|
|
|
func (e *endpoint) Resume(s *stack.Stack) {
|
|
|
|
e.stack = s
|
|
|
|
|
|
|
|
if e.state != stateBound && e.state != stateConnected {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
var err *tcpip.Error
|
|
|
|
if e.state == stateConnected {
|
2019-10-10 00:54:51 +00:00
|
|
|
e.route, err = e.stack.FindRoute(e.RegisterNICID, e.BindAddr, e.ID.RemoteAddress, e.NetProto, false /* multicastLoop */)
|
2019-08-15 18:12:28 +00:00
|
|
|
if err != nil {
|
2019-08-15 18:56:44 +00:00
|
|
|
panic(err)
|
2019-08-15 18:12:28 +00:00
|
|
|
}
|
|
|
|
|
2019-10-10 00:54:51 +00:00
|
|
|
e.ID.LocalAddress = e.route.LocalAddress
|
|
|
|
} else if len(e.ID.LocalAddress) != 0 { // stateBound
|
|
|
|
if e.stack.CheckLocalAddress(e.RegisterNICID, e.NetProto, e.ID.LocalAddress) == 0 {
|
2019-08-15 18:12:28 +00:00
|
|
|
panic(tcpip.ErrBadLocalAddress)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-10-10 00:54:51 +00:00
|
|
|
e.ID, err = e.registerWithStack(e.RegisterNICID, []tcpip.NetworkProtocolNumber{e.NetProto}, e.ID)
|
2019-08-15 18:12:28 +00:00
|
|
|
if err != nil {
|
2019-08-15 18:56:44 +00:00
|
|
|
panic(err)
|
2019-08-15 18:12:28 +00:00
|
|
|
}
|
|
|
|
}
|