4 * Copyright IBM, Corp. 2010
7 * Gautham R Shenoy <ego@in.ibm.com>
9 * This work is licensed under the terms of the GNU GPL, version 2. See
10 * the COPYING file in the top-level directory.
15 #include "qemu-fsdev.h"
16 #include "qemu-queue.h"
18 #include "qemu-common.h"
19 #include "qemu-config.h"
21 static QTAILQ_HEAD(FsDriverEntry_head
, FsDriverListEntry
) fsdriver_entries
=
22 QTAILQ_HEAD_INITIALIZER(fsdriver_entries
);
24 static FsDriverTable FsDrivers
[] = {
25 { .name
= "local", .ops
= &local_ops
},
26 #ifdef CONFIG_OPEN_BY_HANDLE
27 { .name
= "handle", .ops
= &handle_ops
},
29 { .name
= "synth", .ops
= &synth_ops
},
32 int qemu_fsdev_add(QemuOpts
*opts
)
34 struct FsDriverListEntry
*fsle
;
36 const char *fsdev_id
= qemu_opts_id(opts
);
37 const char *fsdriver
= qemu_opt_get(opts
, "fsdriver");
38 const char *path
= qemu_opt_get(opts
, "path");
39 const char *sec_model
= qemu_opt_get(opts
, "security_model");
40 const char *writeout
= qemu_opt_get(opts
, "writeout");
41 bool ro
= qemu_opt_get_bool(opts
, "readonly", 0);
44 fprintf(stderr
, "fsdev: No id specified\n");
49 for (i
= 0; i
< ARRAY_SIZE(FsDrivers
); i
++) {
50 if (strcmp(FsDrivers
[i
].name
, fsdriver
) == 0) {
55 if (i
== ARRAY_SIZE(FsDrivers
)) {
56 fprintf(stderr
, "fsdev: fsdriver %s not found\n", fsdriver
);
60 fprintf(stderr
, "fsdev: No fsdriver specified\n");
64 if (!strcmp(fsdriver
, "local") && !sec_model
) {
65 fprintf(stderr
, "security model not specified, "
66 "local fs needs security model\nvalid options are:"
67 "\tsecurity_model=[passthrough|mapped|none]\n");
71 if (strcmp(fsdriver
, "local") && sec_model
) {
72 fprintf(stderr
, "only local fs driver needs security model\n");
77 fprintf(stderr
, "fsdev: No path specified.\n");
81 fsle
= g_malloc(sizeof(*fsle
));
83 fsle
->fse
.fsdev_id
= g_strdup(fsdev_id
);
84 fsle
->fse
.path
= g_strdup(path
);
85 fsle
->fse
.ops
= FsDrivers
[i
].ops
;
86 fsle
->fse
.export_flags
= 0;
88 if (!strcmp(writeout
, "immediate")) {
89 fsle
->fse
.export_flags
|= V9FS_IMMEDIATE_WRITEOUT
;
93 fsle
->fse
.export_flags
|= V9FS_RDONLY
;
95 fsle
->fse
.export_flags
&= ~V9FS_RDONLY
;
98 if (strcmp(fsdriver
, "local")) {
102 if (!strcmp(sec_model
, "passthrough")) {
103 fsle
->fse
.export_flags
|= V9FS_SM_PASSTHROUGH
;
104 } else if (!strcmp(sec_model
, "mapped")) {
105 fsle
->fse
.export_flags
|= V9FS_SM_MAPPED
;
106 } else if (!strcmp(sec_model
, "none")) {
107 fsle
->fse
.export_flags
|= V9FS_SM_NONE
;
109 fprintf(stderr
, "Invalid security model %s specified, valid options are"
110 "\n\t [passthrough|mapped|none]\n", sec_model
);
114 QTAILQ_INSERT_TAIL(&fsdriver_entries
, fsle
, next
);
118 FsDriverEntry
*get_fsdev_fsentry(char *id
)
121 struct FsDriverListEntry
*fsle
;
123 QTAILQ_FOREACH(fsle
, &fsdriver_entries
, next
) {
124 if (strcmp(fsle
->fse
.fsdev_id
, id
) == 0) {
132 static void fsdev_register_config(void)
134 qemu_add_opts(&qemu_fsdev_opts
);
135 qemu_add_opts(&qemu_virtfs_opts
);
137 machine_init(fsdev_register_config
);