]> git.proxmox.com Git - mirror_qemu.git/blob - fsdev/qemu-fsdev.c
hw/9pfs: Read-only support for 9p export
[mirror_qemu.git] / fsdev / qemu-fsdev.c
1 /*
2 * Virtio 9p
3 *
4 * Copyright IBM, Corp. 2010
5 *
6 * Authors:
7 * Gautham R Shenoy <ego@in.ibm.com>
8 *
9 * This work is licensed under the terms of the GNU GPL, version 2. See
10 * the COPYING file in the top-level directory.
11 *
12 */
13 #include <stdio.h>
14 #include <string.h>
15 #include "qemu-fsdev.h"
16 #include "qemu-queue.h"
17 #include "osdep.h"
18 #include "qemu-common.h"
19 #include "qemu-config.h"
20
21 static QTAILQ_HEAD(FsDriverEntry_head, FsDriverListEntry) fsdriver_entries =
22 QTAILQ_HEAD_INITIALIZER(fsdriver_entries);
23
24 static FsDriverTable FsDrivers[] = {
25 { .name = "local", .ops = &local_ops},
26 { .name = "handle", .ops = &handle_ops},
27 };
28
29 int qemu_fsdev_add(QemuOpts *opts)
30 {
31 struct FsDriverListEntry *fsle;
32 int i;
33 const char *fsdev_id = qemu_opts_id(opts);
34 const char *fsdriver = qemu_opt_get(opts, "fsdriver");
35 const char *path = qemu_opt_get(opts, "path");
36 const char *sec_model = qemu_opt_get(opts, "security_model");
37 const char *writeout = qemu_opt_get(opts, "writeout");
38 bool ro = qemu_opt_get_bool(opts, "readonly", 0);
39
40 if (!fsdev_id) {
41 fprintf(stderr, "fsdev: No id specified\n");
42 return -1;
43 }
44
45 if (fsdriver) {
46 for (i = 0; i < ARRAY_SIZE(FsDrivers); i++) {
47 if (strcmp(FsDrivers[i].name, fsdriver) == 0) {
48 break;
49 }
50 }
51
52 if (i == ARRAY_SIZE(FsDrivers)) {
53 fprintf(stderr, "fsdev: fsdriver %s not found\n", fsdriver);
54 return -1;
55 }
56 } else {
57 fprintf(stderr, "fsdev: No fsdriver specified\n");
58 return -1;
59 }
60
61 if (!strcmp(fsdriver, "local") && !sec_model) {
62 fprintf(stderr, "security model not specified, "
63 "local fs needs security model\nvalid options are:"
64 "\tsecurity_model=[passthrough|mapped|none]\n");
65 return -1;
66 }
67
68 if (strcmp(fsdriver, "local") && sec_model) {
69 fprintf(stderr, "only local fs driver needs security model\n");
70 return -1;
71 }
72
73 if (!path) {
74 fprintf(stderr, "fsdev: No path specified.\n");
75 return -1;
76 }
77
78 fsle = g_malloc(sizeof(*fsle));
79
80 fsle->fse.fsdev_id = g_strdup(fsdev_id);
81 fsle->fse.path = g_strdup(path);
82 fsle->fse.ops = FsDrivers[i].ops;
83 fsle->fse.export_flags = 0;
84 if (writeout) {
85 if (!strcmp(writeout, "immediate")) {
86 fsle->fse.export_flags |= V9FS_IMMEDIATE_WRITEOUT;
87 }
88 }
89 if (ro) {
90 fsle->fse.export_flags |= V9FS_RDONLY;
91 } else {
92 fsle->fse.export_flags &= ~V9FS_RDONLY;
93 }
94
95 if (strcmp(fsdriver, "local")) {
96 goto done;
97 }
98
99 if (!strcmp(sec_model, "passthrough")) {
100 fsle->fse.export_flags |= V9FS_SM_PASSTHROUGH;
101 } else if (!strcmp(sec_model, "mapped")) {
102 fsle->fse.export_flags |= V9FS_SM_MAPPED;
103 } else if (!strcmp(sec_model, "none")) {
104 fsle->fse.export_flags |= V9FS_SM_NONE;
105 } else {
106 fprintf(stderr, "Invalid security model %s specified, valid options are"
107 "\n\t [passthrough|mapped|none]\n", sec_model);
108 return -1;
109 }
110 done:
111 QTAILQ_INSERT_TAIL(&fsdriver_entries, fsle, next);
112 return 0;
113 }
114
115 FsDriverEntry *get_fsdev_fsentry(char *id)
116 {
117 if (id) {
118 struct FsDriverListEntry *fsle;
119
120 QTAILQ_FOREACH(fsle, &fsdriver_entries, next) {
121 if (strcmp(fsle->fse.fsdev_id, id) == 0) {
122 return &fsle->fse;
123 }
124 }
125 }
126 return NULL;
127 }
128
129 static void fsdev_register_config(void)
130 {
131 qemu_add_opts(&qemu_fsdev_opts);
132 qemu_add_opts(&qemu_virtfs_opts);
133 }
134 machine_init(fsdev_register_config);
135